source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Golo%20%28programming%20language%29
Golo is computer software, a programming language for the Java virtual machine (JVM). It is simple, with dynamic, weak typing. It was created in 2012 as part of the research activities of the DynaMid group of the Centre of Innovation in Telecommunications and Integration of service (CITI) Laboratory at Institut national des sciences appliquées de Lyon (INSA). It is distributed as free and open-source software under the Eclipse Public License 2.0. History It has been built as a showcase on how to build a language runtime with invokedynamic. Golo is largely interoperable with the programming language Java and other JVM languages (e.g., numeric types are boxing classes from java.lang, and collection literals leverage java.util classes), that runs on the JVM. In June 2015, Golo became an official Eclipse Foundation project. The project was terminated in September 2022. Technical details The language features have been initially designed around the abilities of invokedynamic – JSR 292 that appeared in Java SE 7. Golo uses ahead-of-time compilation of bytecode. While the bytecode remains stable over a program execution, the invokedynamic-based reconfigurable call sites support the adaptive dispatch mechanisms put in place for helping the HotSpot just-in-time compiler (JIT) to extract reasonable performance. Publications Baptiste Maingret, Frédéric Le Mouël, Julien Ponge, Nicolas Stouls, Jian Cia and Yannick Loiseau. Towards a Decoupled Context-Oriented Programming Language for the Internet of Things. To appear in the 7th International Workshop on Context-Oriented Programming hosted at ECOOP 2015. Prague, Czech Republic. July 2015. Julien Ponge, Frédéric Le Mouël, Nicolas Stouls, Yannick Loiseau. Opportunities for a Truffle-based Golo Interpreter. Technical report arXiv:1505.06003 (cs.PL) and HAL-INRIA deposit Julien Ponge, Frédéric Le Mouël and Nicolas Stouls. Golo, a Dynamic, Light and Efficient Language for Post-Invokedynamic JVM. In Procs. of PPPJ'13. Stuttga
https://en.wikipedia.org/wiki/Emmanuelle%20Charpentier
Emmanuelle Marie Charpentier (; born 11 December 1968) is a French professor and researcher in microbiology, genetics, and biochemistry. As of 2015, she has been a director at the Max Planck Institute for Infection Biology in Berlin. In 2018, she founded an independent research institute, the Max Planck Unit for the Science of Pathogens. In 2020, Charpentier and American biochemist Jennifer Doudna of the University of California, Berkeley, were awarded the Nobel Prize in Chemistry "for the development of a method for genome editing" (through CRISPR). This was the first science Nobel Prize ever won by two women only. Early life and education Born in 1968 in Juvisy-sur-Orge in France, Charpentier studied biochemistry, microbiology, and genetics at the Pierre and Marie Curie University (which became the Faculty of Science of Sorbonne University) in Paris. She was a graduate student at the Institut Pasteur from 1992 to 1995 and was awarded a research doctorate. Charpentier's PhD work investigated molecular mechanisms involved in antibiotic resistance. Her paternal grandfather was an Armenian who escaped to France during the Armenian genocide and met his wife in Marseille. Career and research Charpentier worked as a university teaching assistant at Pierre and Marie Curie University from 1993 to 1995 and as a postdoctoral fellow at the Institut Pasteur from 1995 to 1996. She moved to the US and worked as a postdoctoral fellow at Rockefeller University in New York from 1996 to 1997. During this time, Charpentier worked in the lab of microbiologist Elaine Tuomanen. Tuomanen's lab investigated how the pathogen Streptococcus pneumoniae utilizes mobile genetic elements to alter its genome. Charpentier also helped to demonstrate how S. pneumoniae develops vancomycin resistance. Charpentier worked as an assistant research scientist at the New York University Medical Center from 1997 to 1999. There she worked in the lab of Pamela Cowin, a skin-cell biologist interested in
https://en.wikipedia.org/wiki/Ecosystem%20Functional%20Type
Ecosystem Functional Type (EFT) is an ecological concept to characterize ecosystem functioning. Ecosystem Functional Types are defined as groups of ecosystems or patches of the land surface that share similar dynamics of matter and energy exchanges between the biota and the physical environment. The EFT concept is analogous to the Plant Functional Types (PFTs) concept, but defined at a higher level of the biological organization. As plant species can be grouped according to common functional characteristics, ecosystems can be grouped according to their common functional behavior. One of the most used approaches to implement this concept has been the identification of EFTs from the satellite-derived dynamics of primary production, an essential and integrative descriptor of ecosystem functioning. History In 1992, Soriano and Paruelo proposed the concept of Biozones to identify vegetation units that share ecosystem functional characteristics using time-series of satellite images of spectral vegetation indices. Biozones were later renamed to EFTs by Paruelo et al. (2001), using an equivalent definition and methodology. was one of the first authors that used the term EFT as "aggregated components of ecosystems whose interactions with one another and with the environment produce differences in patterns of ecosystem structure and dynamics". Walker (1997) proposed the use of a similar term, vegetation functional types, for groups of PFTs in sets that constitute the different states of vegetation succession in non-equilibrium ecosystems. The same term was applied by Scholes et al. in a wider sense for those areas having similar ecological attributes, such as PFTs composition, structure, phenology, biomass or productivity. Several studies have applied hierarchy and patch dynamic theories for the definition of ecosystem and landscape functional types at different spatial scales, by scaling-up emergent structural and functional properties from patches to regions. Valentin
https://en.wikipedia.org/wiki/Paysbuy
Paysbuy is a payment processor and one of Thailand's three major payment service providers. It is a subsidiary of DTAC. Paysbuy is licensed by the Bank of Thailand to operate an e-money business and is accredited with Trustmark (DBD Verified) by the Department of Business Development, Ministry of Commerce. History Paysbuy was founded in 2004 by Aung Kyaw Moe and Suchote Cheewakoseth. In 2008, DTAC acquired the majority stake in the company. Paysbuy was the first e-wallet service in Thailand and was acquired by Omise in 2017. See also PayPal DTAC True Money References External links Companies based in Bangkok Online payments Financial services companies of Thailand
https://en.wikipedia.org/wiki/TrueMoney
TrueMoney is a financial technology brand, providing e-payment services in Southeast Asia. In Thailand, the platform includes TrueMoney Wallet, WeCard by MasterCard, TrueMoney Cash Card, Kiosk, Express, Payment Gateway and Remittance. History TrueMoney was founded in 2003 as part of True Corporation but now reorganized under Ascend Group in 2014, a spin-off of True Corporation and a subsidiary of Charoen Pokphand Group. TrueMoney features a remittance service, and has initiated cross-border remittance from Myanmar and Cambodia, to Thailand. Products Payment gateway Stored value card Electronic bill payment Cash on delivery Controlled payment number Regional expansion TrueMoney has offices in Thailand, Vietnam, Cambodia, Myanmar, Indonesia and the Philippines. TrueMoney has licenses to operate e-money in almost every Southeast Asian country. As the flagship venture, Thailand's TrueMoney counts Google and Alipay as partner payment platforms. See also PayPal Paysbuy References Companies based in Bangkok Charoen Pokphand Ascend Group True Corporation Online payments Financial services companies of Thailand Thai brands
https://en.wikipedia.org/wiki/Desuspension
In topology, a field within mathematics, desuspension is an operation inverse to suspension. Definition In general, given an n-dimensional space , the suspension has dimension n + 1. Thus, the operation of suspension creates a way of moving up in dimension. In the 1950s, to define a way of moving down, mathematicians introduced an inverse operation , called desuspension. Therefore, given an n-dimensional space , the desuspension has dimension n – 1. In general, . Reasons The reasons to introduce desuspension: Desuspension makes the category of spaces a triangulated category. If arbitrary coproducts were allowed, desuspension would result in all cohomology functors being representable. See also Cone (topology) Equidimensionality Join (topology) References External links Desuspension at an Odd Prime When can you desuspend a homotopy cogroup? Topology Homotopy theory
https://en.wikipedia.org/wiki/Open%20Food%20Facts
Open Food Facts is a free, online and crowdsourced database of food products from around the world licensed under the Open Database License (ODBL) while its artwork—uploaded by contributors—is distributed under a Creative Commons Attribution–Share Alike license. The project was launched on 19 May 2012 by French programmer Stéphane Gigandet during the Food Revolution Day organized by Jamie Oliver and has won the 2013 Dataconnexions Award from Etalab and the 2015 OKFN Award from Open Knowledge. In May 2016, its database contained more than 80,000 products from 141 countries. In June 2017, thanks to the growing ecosystem of apps and open data imports from various countries, this number rose to 880,000. In October 2019 OFF passed the 1,000,000 products milestone. By the 10th anniversary in May 2022, the database already contained 2.3 million products from 182 countries. Overview The project gathers information and data on food products from around the world. For each item, the database stores its generic name, quantity, type of packaging, brand, category, manufacturing or processing locations, countries and stores where the product is sold, list of ingredients, any traces (for allergies, dietary laws or any specific diet), food additives and nutritional information. The nutritional value is calculated using the Nutri-Score. Each contributor can add or edit food items based on the information explicitly shown on the package. As a result, the GTIN (Global Trade Item Number) embedded in the barcode on the packaging of the product (when available) is generally used as the identifier. Mobile phone applications allow for capturing photos and information that are reprocessed manually by volunteers. Due to similar mechanisms for modification, extension, or deletion of content and structure, the project is sometimes compared to Wikipedia in the media. Reuses The data is reused by various projects on issues related to palm oil, sugar, and location of the producers. The
https://en.wikipedia.org/wiki/Porn%20Time
Porn Time was an online streaming application formed from Popcorn Time, for the purpose of viewing pornographic content. It was released on June 6, 2015 and has since acquired a large user base. The desktop app was downloaded by 450,000 users in the first week after it launched, overloading the download servers. Torrentfreak quoted the development team saying: “We’re pretty shocked and find it a little hard to believe and amusing in a way. But Porn Time, the Popcorn Time for Porn, became an Internet phenomenon just one week after it went live!” The country which has the most downloads of Porn Time is the US, followed by France and Brazil. Porn Time was initially released for Windows, Mac and Linux, and is also available for Android devices. According to the team leader, Porn Time was created due to the demand for porn in Popcorn Time. See also Popcorn Time References External links 2015 software Free BitTorrent clients Free media players Peer-to-peer Streaming media systems Streaming software Video on demand services
https://en.wikipedia.org/wiki/Automatic%20content%20recognition
How it works To start the recognition, a short media clip (audio, video, or both) is selected from within a media file or captured as displayed on a device such as a smart TV. Using techniques such as fingerprinting and watermarking, the selected content is compared by the ACR software with a database of known recorded works. If the fingerprint of the media clip finds a match, the ACR software returns the corresponding metadata regarding the media as well as other associated or recommended content back to the client application for display to the user, or for collection by the device manufacturer or a data aggregator. Fingerprints and watermarking Two leading methodologies for audio-based ACR are acoustic fingerprinting and watermarking. Similarly, video fingerprinting is used to facilitate ACR for visual media. Acoustic fingerprinting generates unique fingerprints from the audio content itself. Fingerprinting techniques are agnostic to content format, codec, bit rate and compression techniques. This makes employment of acoustic fingerprinting possible across various networks and channels and is widely used for interactive TV, second screen application, and content monitoring sectors. Popular apps like Shazam, YouTube, Facebook, Thetake, WeChat and Weibo reportedly use audio fingerprinting methodology to recognize content played from a TV to trigger additional features like votes, lotteries, topics or purchases. In contrast to fingerprinting, digital watermarking require the inclusion of digital "tags" embedded within the digital content stream prior to distribution. For example, a broadcast encoder might insert a watermark every few seconds that could be used to identify the broadcast channel, program ID, and time stamp. This watermark is normally inaudible or invisible to the users, but is detectable by display devices like phones or tablets which can read the watermarks to identify the content it is playing. Watermarking technology is also utilized in the
https://en.wikipedia.org/wiki/ESP8266
The ESP8266 is a low-cost Wi-Fi microchip, with built-in TCP/IP networking software, and microcontroller capability, produced by Espressif Systems in Shanghai, China. The chip was popularized in the English-speaking maker community in August 2014 via the ESP-01 module, made by a third-party manufacturer Ai-Thinker. This small module allows microcontrollers to connect to a Wi-Fi network and make simple TCP/IP connections using Hayes-style commands. However, at first, there was almost no English-language documentation on the chip and the commands it accepted. The very low price and the fact that there were very few external components on the module, which suggested that it could eventually be very inexpensive in volume, attracted many hackers to explore the module, the chip, and the software on it, as well as to translate the Chinese documentation. The ESP8285 is a similar chip with a built-in 1 MiB flash memory, allowing the design of single-chip devices capable of connecting via Wi-Fi. These microcontroller chips have been succeeded by the ESP32 family of devices. Features Processor: L106 32-bit RISC microprocessor core based on the Tensilica Diamond Standard 106Micro running at 80 or 160 MHz Memory: 32 KiB instruction RAM 32 KiB instruction cache RAM 80 KiB user-data RAM 16 KiB ETS system-data RAM External QSPI flash: up to 16 MiB is supported (512 KiB to 4 MiB typically included) IEEE 802.11 b/g/n Wi-Fi Integrated TR switch, balun, LNA, power amplifier and matching network WEP or WPA/WPA2 authentication, or open networks 17 GPIO pins Serial Peripheral Interface Bus (SPI) I²C (software implementation) I²S interfaces with DMA (sharing pins with GPIO) UART on dedicated pins, plus a transmit-only UART can be enabled on GPIO2 10-bit ADC (successive approximation ADC) Pinout of ESP-01 The pinout is as follows for the common ESP-01 module: GND, Ground (0 V) GPIO 2, General-purpose input/output No. 2 GPIO 0, General-purpose input/output No. 0
https://en.wikipedia.org/wiki/Koch%27s%20triangle
Koch's triangle, named after the German pathologist Walter Koch, is an anatomical area located in the superficial paraseptal endocardium of the right atrium, which its boundaries are the coronary sinus orifice, tendon of Todaro, and septal leaflet of the right atrioventricular valve. It is anatomically significant because the atrioventricular node is located at the apex of the triangle. Also the elements anatomically near to it are the membranous septum and the Eustachian ridge. This triangle ends at the site of the coronary sinus orifice inferiorly and, continuous with the sub-Eustachian pouch. The tendon of Todaro forms the hypotenuse of the triangle and the base is formed by the coronary sinus orifice and the vestibule of the right atrium. Variations in the size of Koch's triangle are common. References Further reading External links Cardiac anatomy Human anatomy Anatomy named for one who described it
https://en.wikipedia.org/wiki/Grand%20Kingdom
Grand Kingdom is a tactical role-playing video game developed by Monochrome Corporation for the PlayStation 4 and PlayStation Vita. It was published by Spike Chunsoft in Japan in 2015, and NIS America in the West in 2016. Following a mercenary group in the employ of different nations formed in the wake of a collapsed empire, the player engages in turn-based combat while navigating paths on maps similar to a board game. Online competitive asynchronous multiplayer where chosen teams of characters fight for a chosen nation was originally featured, but this ended as servers were shut down by 2019 in the West and 2022 in Japan. Grand Kingdom began development in 2011 under director Tomohiko Deguchi, a former Vanillaware staff member, using similar design and aesthetic concepts to Grand Knights History (2011). The asynchronous multiplayer was developed to prove its viability in Japan, allowing a casual time investment from players. Manga artist Chizu Hashii designed the characters, who was asked to avoid moe design traits. The music was composed by a team from Basiscape, including Mitsuhiro Kaneda and Masaharu Iwata; it was one of Iwata's last original projects for Basiscape before leaving in 2017. The game was announced in June 2015, when development was around 65% complete. Single-player downloadable content was released in Japan featuring scenarios around the nations and new player units between 2015 and 2016, all of which were bundled into the Western release. Reception was generally positive, with praise going to its gameplay and art design, though its audio saw some mixed response, and critics were generally indifferent to its narrative. Gameplay Grand Kingdom is a tactical role-playing video game (RPG) in which players take on the role of a mercenary commander, who forms squads of fighters to complete missions for the four warring nations of Resonail. The game opens with the player naming the player character and mercenary group. The game is divided between sing
https://en.wikipedia.org/wiki/Fare%20Thee%20Well%3A%20Celebrating%2050%20Years%20of%20the%20Grateful%20Dead
Fare Thee Well: Celebrating 50 Years of the Grateful Dead was a series of concerts that were performed by most of the surviving members of the Grateful Dead: Bob Weir, Phil Lesh, Bill Kreutzmann and Mickey Hart, joined by Trey Anastasio, Bruce Hornsby and Jeff Chimenti, to celebrate the 50th anniversary of the Grateful Dead. The performances took place at Santa Clara's Levi Stadium on June 27 and 28, 2015 and Chicago's Soldier Field on July 3, 4 and 5, 2015. These performances marked the first time Weir, Lesh, Kreutzmann and Hart had performed together since the Dead's 2009 tour and was publicized as the final time the musicians would all perform together. Tickets The three shows in Chicago were initially announced on January 16, 2015 as the only three Fare Thee Well performances. Tickets were first made available through the Grateful Dead's GDSTOO mail order system. Deadheads mailed in more than 60,000 envelopes, requesting a total of more than 360,000 tickets. As a result, only about one in ten requests was fulfilled. On February 28, 2015 when tickets became available on Ticketmaster, over 500,000 people logged on to purchase tickets, which set a new Ticketmaster record for ticket demand for a concert. Following the initial sellout of these concerts, seats were made available behind the stage, and prices on secondary ticket sites such as StubHub averaged $2,000 each. Due to the high demand for the Chicago concerts, concert promoter Peter Shapiro announced two more concerts in Santa Clara, California on June 27 and 28, 2015. To help prevent scalpers from obtaining tickets for resale to these concerts, tickets were only made available through an online lottery. Tickets to the Santa Clara shows were initially sold at very high prices on StubHub but ended up dropping as low as $19 by the week before the concerts. Prices for the Chicago concerts also fell in the weeks prior to the shows but were still averaging about $200. The first show in Chicago drew an attendanc
https://en.wikipedia.org/wiki/Mus%C3%A9e%20protestant
The Musée protestant, created in 2003 by the Fondation pasteur Eugène Bersier, recounts the history of Protestantism in France from the 16th century to the present. History In March 1994, The Fédération protestante de France authorized the Fondation pasteur Eugène Bersier to find a new location for its offices in Paris, France. After evolving toward a memorial site and a museum of the Bible and of Protestantism, the project was abandoned. In 2000, unable to participate in the creation of an actual museum on the history of Protestantism, the Foundation decided, with the Historical Society of French Protestantism, to set up a museum on the Internet: the Virtual Museum of French Protestantism, which seeks to share the specific characteristics of Protestants through the history of Protestantism. The museum site, which can be visited free of charge, opened in January 2003. It quickly attracted a wide audience, which increased with the offering of English and German versions of the site, thanks to the support of the Île-de-France region and the Ministry of culture. In 2014, the design and navigation of the site were completely revamped while preserving the existing content. In 2018, the Museum changed its name and became the Musée protestant (the Protestant Museum). Content The Musée protestant offers over a thousand articles, classified into four headings, illustrated by 3,000 images. The articles are augmented with video clips, documents and bibliographic references and are accessible in French, English and German. The articles can also be organized into tours that group these articles by theme in a relevant order, similar to guided tours. On the home page, a time line illustrates the major dates of the history of Protestantism. The four main headings of the museum are the following: History, Key figures, Themes, Art – Heritage. A few exhibits that have been presented by Protestant museums are also offered with specific articles. Since May 4, 2015, the Mus
https://en.wikipedia.org/wiki/Fecal%20sludge%20management
Fecal sludge management (FSM) (or faecal sludge management in British English) is the storage, collection, transport, treatment and safe end use or disposal of fecal sludge. Together, the collection, transport, treatment and end use of fecal sludge constitute the "value chain" or "service chain" of fecal sludge management. Fecal sludge is defined very broadly as what accumulates in onsite sanitation systems (e.g. pit latrines, septic tanks and container-based solutions) and specifically is not transported through a sewer. It is composed of human excreta, but also anything else that may go into an onsite containment technology, such as flushwater, cleansing materials (e.g. toilet paper and anal cleansing materials), menstrual hygiene products, grey water (i.e. bathing or kitchen water, including fats, oils and grease), and solid waste. Fecal sludge that is removed from septic tanks is called septage. It is estimated that one-third of the world’s population is served by onsite sanitation, and that in low-income countries less than 10% of urban areas are served by sewers. In low-income countries, the majority of fecal sludge is discharged untreated into the urban environment, placing a huge burden on public and environmental health. Hence, FSM plays a critical role in safely managed sanitation and the protection of public health. FSM services are provided by a range of formal and informal private sector services providers, local governments, water authorities, and public utilities. This can also result in unreliable services with relatively high costs at the household level. Fecal sludge collection can be arranged on a scheduled basis or on a call-for-service basis (also known as on-demand, on-request, or non-scheduled services). The collected fecal sludge may be manually or mechanically emptied, and then transported to treatment plants with a vacuum truck, a tank and pump mounted on a flatbed truck, a small tank pulled by a motorcycle, or in containers on a handcart
https://en.wikipedia.org/wiki/Gauge%20%28software%29
Gauge is a light weight cross-platform test automation tool. It uses markdown to author test cases and scenarios. Its modular architecture makes it flexible and scalable. Markdown Gauge specifications are written in the business language. For example, Find movies playing near me =========================== The System Under Test in this example is a web application to find and book movie tickets Search for movies ----------------- * Specify location as "Bangalore" * Search for movie "Star Wars" * Verify that "INOX" is playing "Star Wars" at "7:30 pm" Book movie ticket ----------------- * Sign up with email address <user@example.com> * Complete the verification * Select location as "Bangalore", the movie "Star Wars" and "3" seats * Confirm and pay * Verify the "e-ticket" has been sent to the registered email. This Gauge specification describes a feature of the System Under Test. The scenarios Search for movies and Book movie ticket represent a flow in this specification. Steps are executable parts of a specification. Test Code Specifications in Markdown abstracts code behind the steps. For example, the step Specify location as "Bangalore" implementation in Java would look like // This Method can be written in any java class as long as it is in classpath. public class StepImplementation { @Step("Specify location as <location>") public void helloWorld(String location) { // Step implementation } } Gauge has Support for writing test code in: Java Ruby C# The Community contributed language runners are: JavaScript Python Golang Execution Gauge tests can be executed from the command line or the supported IDEs. The default command gauge specs run the tests sequentially. The command gauge -p specs will execute the tests in Parallel. Reports Gauge gives comprehensive test reports that provides the required details of a given run. IDE support Gauge's IDE support helps to write and maintain the test suite. References External links Free
https://en.wikipedia.org/wiki/Carrier%20frequency%20offset
Carrier frequency offset (CFO) is one of many non-ideal conditions that may affect in baseband receiver design. In designing a baseband receiver, we should notice not only the degradation invoked by non-ideal channel and noise, we should also regard RF and analog parts as the main consideration. Those non-idealities include sampling clock offset, IQ imbalance, power amplifier, phase noise and carrier frequency offset nonlinearity. Carrier frequency offset often occurs when the local oscillator signal for down-conversion in the receiver does not synchronize with the carrier signal contained in the received signal. This phenomenon can be attributed to two important factors: frequency mismatch in the transmitter and the receiver oscillators; and the Doppler effect as the transmitter or the receiver is moving. When this occurs, the received signal will be shifted in frequency. For an OFDM system, the orthogonality among sub carriers is maintained only if the receiver uses a local oscillation signal that is synchronous with the carrier signal contained in the received signal. Otherwise, mismatch in carrier frequency can result in inter-carrier interference (ICI). The oscillators in the transmitter and the receiver can never be oscillating at identical frequency. Hence, carrier frequency offset always exists even if there is no Doppler effect. In a standard-compliant communication system, such as the IEEE 802.11 WLAN the oscillator precision tolerance is specified to be less than ±20 ppm, so that CFO is in the range from - 40 ppm to +40 ppm. Example If the TX oscillator runs at a frequency that is 20 ppm above the nominal frequency and if the RX oscillator is running at 20 ppm below, then the received baseband signal will have a CFO of 40 ppm. With a carrier frequency of 5.2 GHz in this standard, the CFO is up to ±208 kHz. In addition, if the transmitter or the receiver is moving, the Doppler effect adds some hundreds of hertz in frequency spreading. Compared to th
https://en.wikipedia.org/wiki/FlexGen%20Power%20Systems
FlexGen is a United States energy storage technology company. The company is headquartered in Durham, North Carolina and was founded in 2009. FlexGen is the developer of the FlexGen HybridOS energy management system, which is capable of automating the dispatch of energy storage, renewable, and conventional power generation to provide enhanced capability and lower cost of energy. FlexGen originally designed energy storage products for the United States Military, these hybrid power systems were sold to the US Marine Corps, US Army, US Navy SEALs, and the Joint Special Operations Forces-Afghanistan. Systems that were fielded in those military branches showed at least 52% reduction in fuel consumption and an 80% reduction in generator runtime. Venture Capital Funding On August 3, 2015, FlexGen Power Systems completed a $25.5M Series A venture capital funding round. Led by Denver-based Altira Group, the venture funding round also included investments from General Electric Ventures and Caterpillar Ventures. On August 25, 2021, it was announced that Apollo Global Management Inc. invested $150M into FlexGen. References External links www.flexgen.com: Official website Energy storage Electrical generators Energy companies of the United States Technology companies of the United States Manufacturing companies based in Texas Companies based in Houston American companies established in 2009 Energy companies established in 2009 Manufacturing companies established in 2009 Non-renewable resource companies established in 2009 Technology companies established in 2009 2009 establishments in Texas Petroleum in Texas
https://en.wikipedia.org/wiki/Intellec
The Intellec computers were a series of early microcomputers Intel produced in the 1970s as a development platform for their processors. The Intellec computers were among the first microcomputers ever sold, predating the Altair 8800 by at least two years. Introduction The first series of Intellecs included the Intellec 4 for the 4004, the Intellec 4 Mod 40 for the 4040, the Intellec 8 for the 8008, and the Intellec 8 Mod 80 for the 8080. The Intellec 4 and 8 were introduced at the June 1973 National Computer Conference in the New York Coliseum. The Intellec computers were sold not to the general public, only to developers, and a very limited number were built. The Intellec 8 retailed for $2,395. Features The Intellecs have resident monitors stored in ROMs. They also included an assembler, linker, and debugger, as well as the ability to act as an in-circuit emulator. Additionally, a PL/M compiler, cross-assembler and simulator were available, which allowed writing programs in a higher-level language than assembly. FORTRAN compilers were also available. The Intellec 8 supported a Teletype operating at 110 baud, a high speed punched paper tape reader and a CRT terminal at 1200 baud. The Intellec 8 is able to address up to 16 K of memory and came with 5 K pre-installed. The Intellec 4 came with 1 K of PROM and 4 K of RAM for instruction memory, as well as 320 4-bit words of data memory, expandable to 2560 words. The Intellec 8 ran with a two-phase clock of 800 kHz, resulting in an instruction cycle time of 12.5 us. The Intellec 4 ran at a slower clock rate of 750 kHz, but had a faster instruction cycle time of 10.8 us. Both systems were available in "Bare Bones" editions, which omitted the front panel, power supply, and completed chassis; instead, it is designed to mount into a rack. Both systems also weighed . Usage Intel did not market the Intellec as a general-purpose microcomputer, but rather as a development system. As the first microprocessors were intended
https://en.wikipedia.org/wiki/MedCity%20%28London%29
MedCity (London) describes the collaboration between the Mayor of London and the capital's health science centres of three premier academic institutions Imperial College London, King's College London and University College London comprising the London part of the 'golden triangle'. MedCity was launched in 2014 to increase collaboration between Imperial College, King’s College and University College London — the capital’s three main science universities — and promote the broader 'golden triangle' between London, Cambridge and Oxford to investors. This collaboration is supported by HEFCE and London & Partners and works with the life sciences sector across the greater south-east of England. MedCity is funded by King's Health Partners, Imperial College Academic Health Science Centre, UCL Partners and the Mayor of London. Main areas of work MedCity is positioned in the centre of academic research, industry, investors and the London authority to facilitate and enable various services with a focus on providing a front door service, promote the region, develop an entrepreneurial environment and explain the market. Front door service MedCity acts as a ‘front door’ for businesses, entrepreneurs, investors and academics to come to when they are confused by the complex environment across the region. MedCity welcomes, directs and supports large pharmaceutical companies to digital entrepreneurs, businesses seeking research collaborations and investors looking for investment and considering setting up new funds. Tightly involved with its partners, MedCity provides signposting and relationship formation within and across the region. MedCity also provides help in finding lab, office, shared or co-located work spaces or for specialist laboratories and equipment as the greater south east offers a wide variety of options. Promote the region Promoting the region as a base for life science investment and growth, MedCity is London's life science representative at business, academic a
https://en.wikipedia.org/wiki/Neoichnology
Neoichnology (Greek néos „new“, íchnos „footprint“, logos „science“) is the science of footprints and traces of extant animals. Thus, it is a counterpart to paleoichnology, which investigates tracks and traces of fossil animals. Neoichnological methods are used in order to study the locomotion and the resulting tracks of both invertebrates and vertebrates. Often these methods are applied in the field of palaeobiology to gain a deeper understanding of fossilized footprints. Neoichnological methods Working with living animals Typically, when working with living animals, a race track is prepared and covered with a substrate, which allows for the production of footprints, i.e. sand of varying moisture content, clay or mud. After preparation, the animal is lured or shooed over the race track. This results in the production of numerous footprints that constitute a complete track. In some cases the animal is filmed during track production in order to subsequently study the impact of the animal's velocity or its behavior on the produced track. This poses an important advantage of working with living animals: changes in speed or direction, resting, slippage or moments of fright become visible in the produced tracks. After track production and prior to reuse, the track can be photographed, drawn or molded. Changes in the experimental setup are possible throughout the experiment, i. e. regulation of the moisture content of the substrate. As an alternative, also tracks of free living animals can be studied in nature (i.e. nearby lakes) and without any special experimental setup. However, without the standardized environment of the lab, matching the tracks with the behavior of the animal during track production is undoubtedly harder. Working with foot models or severed limbs Another field of methods is the experimental work done with foot models or severed limbs. With these methods, the natural behavior of the animal is excluded from the analysis. In a typical experimen
https://en.wikipedia.org/wiki/Stomatol%20Sign
The Stomatol Sign is Sweden's first animated commercial display and the oldest still working. It represents a toothbrush and a toothpaste tube of the Swedish brand Stomatol. It was first erected on November 22, 1909, on the old Katarina Elevator, in the area of Slussenområdet, Stockholm. References Brands of toothpaste Swedish brands Signage
https://en.wikipedia.org/wiki/Brivo
Brivo, Inc. is a smart building company providing cloud-based access control and video surveillance products for physical security and internet of things applications. Executive Leadership Steve Van Till is an early Brivo hire (initially as CTO) and today serves as CEO. Dean Drako is chairman of the board. History Brivo was co-founded in 1999 by Carter Griffin, Tim Ogilvie and Mark Stein. After completing a series A financing round of individual investors, the company secured an investment from IDEO Ventures, whose affiliate IDEO product design became its development partner for Brivo's first product – a last mile delivery solution for unattended and asynchronous delivery of parcels. In 2002, Griffin, Ogilvie and Stein transitioned the company to what became Brivo's primary market with the introduction of Brivo's building access control SaaS platform. In 2002, Brivo introduced cloud-based access control to the physical security market. The physical access control system works with door card readers and similar devices, and locks or unlock things once an individual has been authenticated. Brivo released the ACS5000 access control system in 2005, with Ethernet and GSM cellular connectivity options. In 2007, Brivo introduced its XML application programming interface (API). In 2017, Brivo introduced the availability of two new door access controllers, the ACS6000 and the ACS300, to complement its existing product lines, as well as integration with the Authentic Mercury open platform. Brivo introduced its IP door controller (IPDC) in 2011, an Ethernet access control panel in a compact form factor, with power over ethernet and FIPS 140-2 validated encryption. IPDC used standard network cabling to the door. In 2013, Brivo announced Brivo Onair, a cloud-based access control and video surveillance physical security system for businesses that automates facility access from one interface. As of 2015, Brivo stated its cloud-based access control system serviced more tha
https://en.wikipedia.org/wiki/ERP%20security
ERP Security is a wide range of measures aimed at protecting Enterprise resource planning (ERP) systems from illicit access ensuring accessibility and integrity of system data. ERP system is a computer software that serves to unify the information intended to manage the organization including Production, Supply Chain Management, Financial Management, Human Resource Management, Customer Relationship Management, Enterprise Performance Management. Review ERP system integrates business processes enabling procurement, payment, transport, human resources management, product management, and financial planning. As ERP system stores confidential information, the Information Systems Audit and Control Association (ISACA) recommends to regularly conduct a comprehensive assessment of ERP system security, checking ERP servers for software vulnerabilities, configuration errors, segregation of duties conflicts, compliance with relevant standards and recommendations, and recommendations of vendors. Causes for vulnerabilities in ERP systems Complexity ERP systems process transactions and implement procedures to ensure that users have different access privileges. There are hundreds of authorization objects in SAP permitting users to perform actions in the system. In case of 200 users of the company, there are approximately 800,000 (100*2*20*200) ways to customize security settings of ERP systems. With the growth of complexity, the possibility of errors and segregation of duties conflicts increases. Specificity Vendors fix vulnerabilities on the regular basis since hackers monitor business applications to find and exploit security issues. SAP releases patches monthly on Patch Tuesday, Oracle issues security fixes every quarter in Oracle Critical Patch Update. Business applications are becoming more exposed to the Internet or migrate to the cloud. Lack of competent specialists ERP Cybersecurity survey revealed that organizations running ERP systems "lack both awareness and a
https://en.wikipedia.org/wiki/Project%20Sidekick
Sidekick is a project developed by NASA and Microsoft, started in December 2015 on the International Space Station, which provides virtual assistance to astronauts using Microsoft HoloLens augmented reality glasses. Functionality Sidekick has two modes of operation. Remote Expert Mode uses the functionality of the Holographic Skype application—voice and video chat, real-time virtual annotation—to allow a ground operator and space crew member to collaborate directly over what the astronaut sees, with the ground operator able to see the crew member's view in 3D, provide interactive guidance, and draw annotations into the crew member's environment. In Procedure Mode, animated virtual illustrations display on top of objects as a crew member interacts with them. This mode can be used for guidance and instructional purposes in standalone scenarios. Applications include inventory management, in which the system recognizes an inventory item, and can display a path to where the item should be stored. Previously, crew members would rely primarily on printed instructions and voice-based communication when performing complex tasks. The capabilities provided by Sidekick have been promoted as potential enabling features allowing for reduced crew training requirements and increased efficiency in deep space missions in which communication delays can complicate difficult operations. History After having performed simulated reduced-gravity testing in its Weightless Wonder C9 aircraft, NASA attempted to launch a pair of HoloLens units aboard the SpaceX CRS-7 launch to the International Space Station on June 28, 2015, but the Falcon 9 rocket carrying the payload exploded at 2 minutes and 19 seconds into the flight. Sidekick was tested at the Aquarius laboratory from late July to early August 2015 as part of the two-week long NASA Extreme Environment Missions Operations 20 expedition, demonstrating its operation in tasks such as equipment checks and setup. HoloLens' hardware was succe
https://en.wikipedia.org/wiki/IQ%20imbalance
IQ imbalance is a performance-limiting issue in the design of a class of radio receivers known as direct conversion receivers. These translate the received radio frequency (RF, or pass-band) signal directly from the carrier frequency to baseband using a single mixing stage. Direct conversion receivers contain a local oscillator (LO) which generates both a sine wave at and a copy delayed by 90°. These are individually mixed with the RF signal, producing what are known respectively as the in-phase and quadrature signals, labelled and . However, in the analog domain, the phase difference is never exactly 90°. Neither is the gain perfectly matched between the parallel sections of circuitry dealing with the two signal paths. IQ imbalance results from these two imperfections, and is one of the two major drawbacks of direct-conversion receivers compared to traditional superheterodyne receivers. (The other is DC offset.) Their design must include measures to control IQ imbalance, so as to limit errors in the demodulated signal. Definition A direct-conversion receiver uses two quadrature sinusoidal signals to perform the so-called quadrature down-conversion. This process requires shifting the LO signal by 90° to produce a quadrature sinusoidal component, and a matched pair of mixers converting the same input signal with the two versions of the LO. Mismatches between the two LO signals and/or along the two branches of down-conversion mixers, and any following amplifiers, and low-pass filters, cause the quadrature baseband signals to be corrupted, either due to amplitude or phase differences. Suppose the received pass-band signal is identical to the transmitted signal and is given by:where is the transmitted base-band signal. Assume that the gain error is dB and the phase error is degrees. Then we can model such imbalance using mismatched local oscillator output signals:Multiplying the pass-band signal by the two LO signals and passing through a pair of low-pass fil
https://en.wikipedia.org/wiki/Reference%20Broadcast%20Infrastructure%20Synchronization
The Reference Broadcast Infrastructure Synchronization (RBIS) protocol is a master/slave synchronization protocol. RBIS, as the Reference Broadcast Time Synchronization (RBS), is a receiver/receiver synchronization protocol, as a consequence timestamps used for clock regulation are acquired only on the receiving of synchronization events. RBIS is specifically tailored to be used in IEEE 802.11 Wi-Fi networks configured in infrastructure mode. Such a kind of networks are based on an access point that coordinates the communication between the wireless nodes (i.e., the STAs), and they are very common. The advantages of RBIS are that it can be directly used with common access points, no modification is required to the STAs (or minor modifications to improve synchronization performance) and a very small overhead is added to the wireless channel (typically a message every 1 second). Moreover, it allows an easily synchronization with an external time source, because it is a master/slave protocol. Its major drawback is that it does not compensate the propagation delay. This fact limits the achievable synchronization quality to a couple of microsecond, which is typically enough for the very majority of the applications, especially for home automation. An example is the connection of wireless speakers to a television. References Synchronization Clocks
https://en.wikipedia.org/wiki/Wiener%E2%80%93Araya%20graph
The Wiener–Araya graph is, in graph theory, a graph on 42 vertices with 67 edges. It is hypohamiltonian, which means that it does not itself have a Hamiltonian cycle but every graph formed by removing a single vertex from it is Hamiltonian. It is also planar. History Hypohamiltonian graphs were first studied by Sousselier in Problèmes plaisants et délectables (1963). In 1967, Lindgren built an infinite sequence of hypohamiltonian graphs. He first cited Gaudin, Herz and Rossi, then Busacker and Saaty as pioneers on this topic. From the start, the smallest hypohamiltonian graph is known: the Petersen graph. However, the hunt for the smallest planar hypohamiltonian graph continues. This question was first raised by Václav Chvátal in 1973. The first candidate answer was provided in 1976 by Carsten Thomassen, who exhibited a 105-vertices construction, the 105-Thomassen graph. In 1979, Hatzel improved this result with a planar hypohamiltonian graph on 57 vertices : the Hatzel graph. This bound was lowered in 2007 by the 48-Zamfirescu graph. In 2009, a graph built by Gábor Wiener and Makoto Araya became (with its 42 vertices) the smallest planar hypohamiltonian graph known. In their paper, Wiener and Araya conjectured their graph to be optimal arguing that its order (42) appears to be the answer to The Ultimate Question of Life, the Universe, and Everything from The Hitchhiker's Guide to the Galaxy, a Douglas Adams novel. However, subsequently, smaller planar hypohamiltonian graphs have been discovered. References External links Individual graphs Planar graphs
https://en.wikipedia.org/wiki/Two-dimensional%20liquid
A two-dimensional liquid (2D liquid) is a collection of objects constrained to move in a planar or other two-dimensional space in a liquid state. Relations with 3D liquids The movement of the particles in a 2D liquid is similar to 3D, but with limited degrees of freedom. E.g. rotational motion can be limited to rotation about only one axis, in contrast to a 3D liquid, where rotation of molecules about two or three axis would be possible. The same is true for the translational motion. The particles in 2D liquids can move in a 2D plane, whereas the particles is a 3D liquid can move in three directions inside the 3D volume. Vibrational motion is in most cases not constrained in comparison to 3D. The relations with other states of aggregation (see below) are also analogously in 2D and 3D. Relation to other states of aggregation 2D liquids are related to 2D gases. If the density of a 2D liquid is decreased, a 2D gas is formed. This was observed by scanning tunnelling microscopy under ultra-high vacuum (UHV) conditions for molecular adsorbates. 2D liquids are related to 2D solids. If the density of a 2D liquid is increased, the rotational degree of freedom is frozen and a 2D solid is created. References Liquids Non-equilibrium thermodynamics Statistical mechanics
https://en.wikipedia.org/wiki/Bloch%27s%20higher%20Chow%20group
In algebraic geometry, Bloch's higher Chow groups, a generalization of Chow group, is a precursor and a basic example of motivic cohomology (for smooth varieties). It was introduced by Spencer Bloch and the basic theory has been developed by Bloch and Marc Levine. In more precise terms, a theorem of Voevodsky implies: for a smooth scheme X over a field and integers p, q, there is a natural isomorphism between motivic cohomology groups and higher Chow groups. Motivation One of the motivations for higher Chow groups comes from homotopy theory. In particular, if are algebraic cycles in which are rationally equivalent via a cycle , then can be thought of as a path between and , and the higher Chow groups are meant to encode the information of higher homotopy coherence. For example,can be thought of as the homotopy classes of cycles whilecan be thought of as the homotopy classes of homotopies of cycles. Definition Let X be a quasi-projective algebraic scheme over a field (“algebraic” means separated and of finite type). For each integer , define which is an algebraic analog of a standard q-simplex. For each sequence , the closed subscheme , which is isomorphic to , is called a face of . For each i, there is the embedding We write for the group of algebraic i-cycles on X and for the subgroup generated by closed subvarieties that intersect properly with for each face F of . Since is an effective Cartier divisor, there is the Gysin homomorphism: , that (by definition) maps a subvariety V to the intersection Define the boundary operator which yields the chain complex Finally, the q-th higher Chow group of X is defined as the q-th homology of the above complex: (More simply, since is naturally a simplicial abelian group, in view of the Dold–Kan correspondence, higher Chow groups can also be defined as homotopy groups .) For example, if is a closed subvariety such that the intersections with the faces are proper, then and this means, by Proposit
https://en.wikipedia.org/wiki/Dubins%E2%80%93Spanier%20theorems
The Dubins–Spanier theorems are several theorems in the theory of fair cake-cutting. They were published by Lester Dubins and Edwin Spanier in 1961. Although the original motivation for these theorems is fair division, they are in fact general theorems in measure theory. Setting There is a set , and a set which is a sigma-algebra of subsets of . There are partners. Every partner has a personal value measure . This function determines how much each subset of is worth to that partner. Let a partition of to measurable sets: . Define the matrix as the following matrix: This matrix contains the valuations of all players to all pieces of the partition. Let be the collection of all such matrices (for the same value measures, the same , and different partitions): The Dubins–Spanier theorems deal with the topological properties of . Statements If all value measures are countably-additive and nonatomic, then: is a compact set; is a convex set. This was already proved by Dvoretzky, Wald, and Wolfowitz. Corollaries Consensus partition A cake partition to k pieces is called a consensus partition with weights (also called exact division) if: I.e, there is a consensus among all partners that the value of piece j is exactly . Suppose, from now on, that are weights whose sum is 1: and the value measures are normalized such that each partner values the entire cake as exactly 1: The convexity part of the DS theorem implies that: If all value measures are countably-additive and nonatomic, then a consensus partition exists. PROOF: For every , define a partition as follows: In the partition , all partners value the -th piece as 1 and all other pieces as 0. Hence, in the matrix , there are ones on the -th column and zeros everywhere else. By convexity, there is a partition such that: In that matrix, the -th column contains only the value . This means that, in the partition , all partners value the -th piece as exactly . Note: this corollary con
https://en.wikipedia.org/wiki/System%20virtual%20machine
In computing, a system virtual machine is a virtual machine (VM) that provides a complete system platform and supports the execution of a complete operating system (OS). These usually emulate an existing architecture, and are built with the purpose of either providing a platform to run programs where the real hardware is not available for use (for example, executing on otherwise obsolete platforms), or of having multiple instances of virtual machines leading to more efficient use of computing resources, both in terms of energy consumption and cost effectiveness (known as hardware virtualization, the key to a cloud computing environment), or both. A VM was originally defined by Popek and Goldberg as "an efficient, isolated duplicate of a real machine". System virtual machines System virtual machine advantages: Multiple OS environments can co-exist on the same primary hard drive, with a virtual partition that allows sharing of files generated in either the "host" operating system or "guest" virtual environment. Adjunct software installations, wireless connectivity, and remote replication, such as printing and faxing, can be generated in any of the guest or host operating systems. Regardless of the system, all files are stored on the hard drive of the host OS. Application provisioning, maintenance, high availability and disaster recovery are inherent in the virtual machine software selected. Can provide emulated hardware environments different from the host's instruction set architecture (ISA), through emulation or by using just-in-time compilation. The main disadvantages of VMs are: A virtual machine is less efficient than an actual machine when it accesses the host hard drive indirectly. When multiple VMs are concurrently running on the hard drive of the actual host, adjunct virtual machines may exhibit a varying and/or unstable performance (speed of execution and malware protection). This depends on the data load imposed on the system by other VMs, unless th
https://en.wikipedia.org/wiki/Spiral%20wave
Spiral waves are travelling waves that rotate outward from a center in a spiral. They are a feature of many excitable media. Spiral waves have been observed in various biological systems including systems such as heart ventricular fibrillation, retinal spreading depression, Xenopus oocyte calcium waves, and glial calcium waves in cortical tissue culture. References Nonlinear systems Pattern formation Articles containing video clips
https://en.wikipedia.org/wiki/Thermal%20integrity%20profiling
Thermal Integrity Profiling (TIP) is a non-destructive testing method used to evaluate the integrity of concrete foundations. It is standardized by ASTM D7949 - Standard Test Methods for Thermal Integrity Profiling of Concrete Deep Foundations. The testing method was first developed in the mid 1990s at the University of South Florida. It relates the heat generated by curing of cement to the integrity and quality of drilled shafts, augered cast in place (ACIP) piles and other concrete foundations. In general, a shortage of competent concrete (necks or inclusions) is registered by relative cool regions; the presence of extra concrete (over-pour bulging into soft soil strata) is registered by relative warm regions. Concrete temperatures along the length of the foundation element are sampled throughout the concrete hydration process. TIP analysis is performed at the point of peak temperature, generally 18 to 24hrs post-concreting. Measurements are available relatively soon after pouring (6 to 72 hours),generally before other integrity testing methods such as cross hole sonic logging and low strain integrity testing can be performed. TIP can be performed using a probe lowered down standard access tubes or by installing embedded thermal wires along the length of the reinforcement cage. Four thermal wires are commonly installed along the steel cage, each 90 degrees from one another, forming a north-east-south-west configuration. If records at a certain depth show regions with cooler temperatures (when compared to the average temperature at that depth), a concrete deficiency or defect may be present. An average temperature at a certain depth that is significantly lower than the average temperatures at other depths may also be indication of a potential problem. It is also possible to estimate the effective area of the foundation, and to assess if the reinforcing cage is properly aligned and centered. References Cement Concrete Corrosion
https://en.wikipedia.org/wiki/SpotX
SpotX is a video advertising and monetization platform. Billions of video ad decisions are transacted through the SpotX platform daily, with ads delivered to over 70 million US households. The company is headquartered north of Denver, Colorado with additional offices worldwide, including Belfast, London, New York, Salt Lake City, San Francisco, Singapore, Sydney, and Tokyo. History SpotX was founded as a division of the search engine marketing technologies and services company, Booyah Networks. The company's founders are Michael Shehan (CEO) and Steve Swoboda (COO and CFO). In March 2007, SpotX, initially SpotXchange, formed a separate company from Booyah that focused on digital video advertising technology. In 2009, SpotX launched targeting tools to help advertisers reach their audiences. In 2010, SpotX launched its real-time bidding solution, which helps companies tailor their bids on an impression-by-impression basis when bidding on in-stream and in-banner video ad inventory. In July 2016, RTL Group announced its 65% majority stake purchase of SpotX at $144 million and completed its 100% acquisition of the company in October 2017 for $145 million in a deal that valued SpotX at $404 million. In 2015, SpotXchange rebranded as SpotX. In 2017, SpotX relaunched its website. In 2020, SpotX made a strategic investment in SpringServe, a supply-side ad server for CTV. In 2021, SpotX was acquired by Magnite, Inc., the world's largest independent sell-side advertising platform, for $1.17 billion. References Online advertising services and affiliate networks
https://en.wikipedia.org/wiki/AirG%20Inc.
airG Incorporated (airG) is a Canadian software company. History AirG was founded and incorporated in April 2000 by Frederick Ghahramani, Vincent Yen, and Bryce Pasechnik. as a mobile entertainment content supplier and was headquartered in Vancouver, British Columbia. The company surpassed 20 million customers in 2007, and in 2014 the company surpassed 100 million customers, representing around 40 countries. In 2010 a study determined airG's weekly media time as one of the top 10 most frequented services on mobile phones in the United States. Products Mobile games airG released AtomicDove, a 'persistent' and 'multiplayer' game, in November 2001. In 2002, AtomicDove generated 100 million minutes of mobile data traffic. The company also developed the multiplayer farming game Big Barn World. Some games were marketed through private networks, while other were marketed internationally. Mobile chat The company was one of the first mobile-only social media networks. airG was the provider of the Sprint 'Games Lobby Lounge'. airG ran Conexion Latina, which was for about one million Spanish speaking customers, and created the Boost Hookt social network. Mobile advertising airG sold just 2% of its 20+ billion mobile advertising impressions in 2006. It then began to use interactive polls, and engagement units specifically to customers based on their profile information. The company has also partnered with sports sponsorship companies like Red Bull. Recognition In 2001, airG was awarded the BMO Bank of Montreal First Place Prize in their New Ventures B.C. competition. In 2005 airG's founders won the Young Entrepreneur of the Year award from the Business Development Bank of Canada. References External links airG Official website Canadian entertainment websites Companies based in Vancouver Mobile game companies Video game companies of Canada Video game companies established in 2000 Mobile software Mobile telecommunications Mobile web Video game development companies
https://en.wikipedia.org/wiki/SaneBox
SaneBox is an email management software as a service that integrates with IMAP and Exchange Web Services (EWS) email accounts. Its primary function is to filter email messages that it deems unimportant into a folder for later processing. History SaneBox is a self-funded company with locations in Boston, Massachusetts, and Venice, California. It was founded by Stuart Roseman in 2010 in response to articles written by Bijan Sabet, Fred Wilson (financier) and Michael Arrington. As an entrepreneur, Roseman previously founded and sold other companies, including Gamesville and Gamelogic. In 2012, SaneBox announced SaneBox for Business in a shift toward becoming more business-to-business focused. Operation SaneBox integrates with a user’s email server and analyzes past email usage in order to infer what emails are important. Messages deemed important remain in the inbox, while those deemed unimportant are filtered into a different folder for later reference. The algorithms and filtering are primarily based on the email sender, the subject line and the timestamp. A second type of filtering deletes incoming emails from designated senders, a feature that is intended to serve a similar purpose to unsubscribing from email lists. Other functions of the service including "snoozing," or deferring, emails, and a Dropbox integration that moves email attachments of a certain size into Dropbox and replaces them with the Dropbox link. Similar attachment support is available for Box, EverNote, Google Drive and IBM SmartCloud. References Email
https://en.wikipedia.org/wiki/Interest%20Flooding%20Attack
An Interest Flooding Attack (IFA) is a denial-of-service attack in an Information-centric network (or Content-Centric Networking (CCN) or Named Data Networking (NDN)). An attacker requests existing or non-existing content in order to overload the distribution infrastructure. This can be implemented by sending Interest packets, which are not resolved at all or not resolved fast enough and thus lead to malicious CPU or memory consumption. This attack was previously denoted an open problem in ICN, only heuristic countermeasures available. In 2016, Aubrey Alston and Tamer Refaei of The MITRE Corporation presented an exact solution to this problem which utilizes an in-packet cryptographic mechanism to remove the ability of high-volume Interest traffic to overload the distribution infrastructure of the network. References Denial-of-service attacks Cyberwarfare Computer network security
https://en.wikipedia.org/wiki/The%20Bridges%20Organization
The Bridges Organization is an organization that was founded in Kansas, United States, in 1998 with the goal of promoting interdisciplinary work in mathematics and art. The Bridges Conference is an annual conference on connections between art and mathematics. The conference features papers, educational workshops, an art exhibition, a mathematical poetry reading, and a short movie festival. List of Bridges conferences References External links 1998 establishments in Kansas Arts organizations established in 1998 Arts organizations based in Kansas Mathematics organizations Mathematics and art
https://en.wikipedia.org/wiki/XFdtd
XFdtd is electromagnetic simulation software with a very wide variety of applications in RF circuit, antenna, military/defense, medical EM, photonics, radar, component, metamaterial, and related fields. It originally stood for X (Window System) Finite Difference Time Domain and was first developed in the mid 1990s by Remcom Incorporated of State College, PA in the United States. XFdtd includes full wave (FDTD), electrostatic, thermal-biological, circuit, and 2D Eigen solver and integrates with PO/MEC, and GTD/UTD method solvers. See also Computational electromagnetics References 3D Electromagnetic Simulation vs. Planar MoM Ich Finite element software Electronic design automation software Electromagnetic simulation software
https://en.wikipedia.org/wiki/The%20Cactaceae
The Cactaceae is a monograph on plants of the cactus family written by the American botanists Nathaniel Lord Britton and Joseph Nelson Rose and published in multiple volumes between 1919 and 1923. It was landmark study that extensively reorganized cactus taxonomy and is still considered a cornerstone of the field. It was illustrated with drawings and color plates principally by the British botanical artist Mary Emily Eaton as well as with black-and-white photographs. History Nathaniel Lord Britton was a Columbia University geology and biology professor who left the university in 1895 to become the founding director of the New York Botanical Garden. Much of his own field work was done in the Caribbean. Joseph Nelson Rose was an authority on several plant families, including parsley (Apiaceae) and cacti (Cactaceae). He had been a plant curator at the Smithsonian since 1896, and while working there he made several field trips to Mexico, collecting specimens for the Smithsonian and for Britton's newly founded New York Botanical Garden. Together, Britton and Rose published many articles on the stonecrop family (Crassulaceae) before embarking in 1904 on research leading towards The Cactaceae. With the support of Douglas T. MacDougal, director of the Carnegie Institution for Science's Desert Botanical Laboratory, the Carnegie Institution agreed to fund the project. Rose took a leave of absence from the Smithsonian to pursue it, and both Rose and Britton were named Carnegie Institution Research Associates in 1912, when more focused work on the project began. Between 1912 and 1916 Rose and Britton did extensive field work, collecting specimens and touring the botanical gardens and notable collections of Europe, the Caribbean, and North, Central, and South America. In this period, cactus taxonomy was in a disorganized state with only a few very large and heterogeneous genera. Britton and Rose broke these old-style catch-all genera into smaller, more defined genera, ultimat
https://en.wikipedia.org/wiki/European%20Information%20Technologies%20Certification
The European Information Technologies Certification (EITC) programme is an international professional ICT knowledge and skills certification standard. It is developed and governed by the EITCI Institute, a non-profit organization based in Brussels that provides certification of individuals' knowledge and skills in narrow, specialized single-subject areas of ICT such as office software, computer-aided project management, online collaboration systems, and raster graphics processing. See also EITCA programme EITCI institute References External links EITCI Official Website EITCI certificate and accreditation validation page International standards Computer standards Cryptography standards Information technology qualifications Computer security qualifications Professional titles and certifications EITCI certification programmes Digital divide
https://en.wikipedia.org/wiki/European%20Information%20Technologies%20Certification%20Academy
European Information Technologies Certification Academy (EITCA) programme is an international professional ICT knowledge and skills certification standard, developed and governed by the EITCI Institute – a non-profit organization based in Brussels, that provides certification of individuals' knowledge and skills in broad field-oriented areas of ICT expertise such as Computer graphics, Information security etc. The EITCA programmes, referred to as EITCA Academies, include selected sets of several to over a dozen of individual EITC programmes, that together comprise a particular area of qualifications. EITCA Academies As of June 2015 the EITCA certification standard includes the following Academies: See also EITC programme EITCI institute References External links EITCI Official Website EITCI certificate and accreditation validation page Certification Academy International standards Computer standards Cryptography standards Information technology qualifications Computer security qualifications Professional titles and certifications EITCI certification programmes Digital divide
https://en.wikipedia.org/wiki/Graph-based%20access%20control
Graph-based access control (GBAC) is a declarative way to define access rights, task assignments, recipients and content in information systems. Access rights are granted to objects like files or documents, but also business objects such as an account. GBAC can also be used for the assignment of agents to tasks in workflow environments. Organizations are modeled as a specific kind of semantic graph comprising the organizational units, the roles and functions as well as the human and automatic agents (i.a. persons, machines). The main difference with other approaches such as role-based access control or attribute-based access control is that in GBAC access rights are defined using an organizational query language instead of total enumeration. History The foundations of GBAC go back to a research project named CoCoSOrg (Configurable Cooperation System) [] (in English language please see ) at Bamberg University. In CoCoSOrg an organization is represented as a semantic graph and a formal language is used to specify agents and their access rights in a workflow environment. Within the C-Org-Project at Hof University's Institute for Information Systems (iisys), the approach was extended by features like separation of duty, access control in virtual organizations and subject-oriented access control. Definition Graph-based access control consists of two building blocks: A semantic graph modeling an organization A query language. Organizational graph The organizational graph is divided into a type and an instance level. On the instance level there are node types for organizational units, functional units and agents. The basic structure of an organization is defined using so called "structural relations". They define the "is part of"- relations between functional units and organizational units as well as the mapping of agents to functional units. Additionally there are specific relationship types like "deputyship" or "informed_by". These types can be extended by th
https://en.wikipedia.org/wiki/Monokaryon
A monokaryon is a fungal mycelium or hypha in which each cell contains a single nucleus. It also refers to a mononuclear spore or cell of a fungus that produces a dikaryon in its life cycle. See also Dikaryon References Mycology
https://en.wikipedia.org/wiki/Lattice%20model%20%28biophysics%29
Lattice models in biophysics represent a class of statistical-mechanical models which consider a biological macromacromolecule (such as DNA, protein, actin, etc.) as a lattice of units, each unit being in different states or conformations. For example, DNA in chromatin can be represented as a one-dimensional lattice, whose elementary units are the nucleotide, base pair or nucleosome. Different states of the unit can be realized either by chemical modifications (e.g. DNA methylation or modifications of DNA-bound histones), or due to quantized internal degrees of freedom (e.g. different angles of the bond joining two neighboring units), or due to binding events involving a given unit (e.g. reversible binding of small ligands or proteins to DNA, or binding/unbinding of two complementary nucleotides in the DNA base pair). DNA-ligand binding models DNA double helix melting models DNA coil-globule / fractal models References Further reading Ewans J. W. (1993). Random and cooperative sequential adsorption. Rev. Mod. Phys., 65, 1281-1329] Poland D., Scheraga H.A. (1970). Theory of Helix-Coil Transitions in Biopolymers: Statistical Mechanical Theory of Order-disorder Transitions in Biological Macromolecules. Academic Press, 797 pages. Khokhlov A.R., Grosberg A.Yu. 1997. Statistical Physics of Macromolecules. Statistical mechanics Biophysics Molecular biology Lattice models
https://en.wikipedia.org/wiki/Liouvillian%20function
In mathematics, the Liouvillian functions comprise a set of functions including the elementary functions and their repeated integrals. Liouvillian functions can be recursively defined as integrals of other Liouvillian functions. More explicitly, a Liouvillian function is a function of one variable which is the composition of a finite number of arithmetic operations , exponentials, constants, solutions of algebraic equations (a generalization of nth roots), and antiderivatives. The logarithm function does not need to be explicitly included since it is the integral of . It follows directly from the definition that the set of Liouvillian functions is closed under arithmetic operations, composition, and integration. It is also closed under differentiation. It is not closed under limits and infinite sums. Liouvillian functions were introduced by Joseph Liouville in a series of papers from 1833 to 1841. Examples All elementary functions are Liouvillian. Examples of well-known functions which are Liouvillian but not elementary are the nonelementary antiderivatives, for example: The error function, The exponential (Ei), logarithmic (Li or li) and Fresnel (S and C) integrals. All Liouvillian functions are solutions of algebraic differential equations, but not conversely. Examples of functions which are solutions of algebraic differential equations but not Liouvillian include: the Bessel functions (except special cases); the hypergeometric functions (except special cases). Examples of functions which are not solutions of algebraic differential equations and thus not Liouvillian include all transcendentally transcendental functions, such as: the gamma function; the zeta function. See also References Further reading Differential algebra Computer algebra Types of functions
https://en.wikipedia.org/wiki/Cell%20mechanics
Cell mechanics is a sub-field of biophysics that focuses on the mechanical properties and behavior of living cells and how it relates to cell function. It encompasses aspects of cell biophysics, biomechanics, soft matter physics and rheology, mechanobiology and cell biology. Eukaryotic Eukaryotic cells are cells that consist of membrane-bound organelles, a membrane-bound nucleus, and more than one linear chromosome. Being much more complex than prokaryotic cells, cells without a true nucleus, eukaryotes must protect its organelles from outside forces. Plant Plant cell mechanics combines principles of biomechanics and mechanobiology to investigate the growth and shaping of the plant cells. Plant cells, similar to animal cells, respond to externally applied forces, such as by reorganization of their cytoskeletal network. The presence of a considerably rigid extracellular matrix, the cell wall, however, bestows the plant cells with a set of particular properties. Mainly, the growth of plant cells is controlled by the mechanics and chemical composition of the cell wall. A major part of research in plant cell mechanics is put toward the measurement and modeling of the cell wall mechanics to understand how modification of its composition and mechanical properties affects the cell function, growth and morphogenesis. Animal Because animal cells do not have cell walls to protect them like plant cells, they require other specialized structures to sustain external mechanical forces. All animal cells are encased within a cell membrane made of a thin lipid bilayer that protects the cell from exposure to the outside environment. Using receptors composed of protein structures, the cell membrane is able to let selected molecules within the cell. Inside the cell membrane includes the cytoplasm, which contains the cytoskeleton. A network of filamentous proteins including microtubules, intermediate filaments, and actin filaments makes up the cytoskeleton and helps maintain th
https://en.wikipedia.org/wiki/Plaque%20hybridization
Plaque hybridization is a technique used in Molecular biology for the identification of recombinant phages. The procedure can also be used for the detection of differentially represented repetitive DNA. The technique (similar to colony hybridization) involves hybridizing isolated phage DNA to a label probe for the gene of study. This is followed by autoradiography to detect the position of the label. The plaque hybridization procedure has some advantages over colony hybridization due to the smaller and well defined area of the filter to which the DNA binds. References Molecular biology Molecular biology techniques
https://en.wikipedia.org/wiki/Aquatic%20Conservation%3A%20Marine%20and%20Freshwater%20Ecosystems
Aquatic Conservation: Marine and Freshwater Ecosystems is a bimonthly peer-reviewed scientific journal published by Wiley-Blackwell. The journal is dedicated to publishing original papers that relate specifically to freshwater, brackish or marine habitats and encouraging work that spans these ecosystems. According to the Journal Citation Reports, the journal has a 2014 impact factor of 2.136. References External links Ecology journals Conservation biology English-language journals Academic journals established in 1991 Wiley-Blackwell academic journals Bimonthly journals 1991 establishments in the United Kingdom
https://en.wikipedia.org/wiki/Ultra-processed%20food
Ultra-processed food (UPF) is an industrially formulated edible substance derived from natural food or synthesized from other organic compounds. The resulting products are designed to be highly profitable, convenient, and hyperpalatable, often through food additives such as preservatives, colourings, and flavourings. The state of research into ultra-processed foods and their effects is evolving rapidly as of 2023. Epidemiological data suggest that consumption of ultra-processed foods is associated with higher risks of certain diseases, including obesity, type 2 diabetes, cardiovascular diseases, and certain types of cancer. Researchers also present ultra-processing as a facet of environmental degradation caused by the food industry. Definitions Concerns around food processing have existed since at least the Industrial Revolution. Many critics identified 'processed food' as problematic, and movements such as raw foodism attempted to eschew food processing entirely, but since even basic cookery results in processed food, this concept failed in itself to influence public policy surrounding the epidemiology of obesity. Michael Pollan's influential book The Omnivore's Dilemma referred to highly processed industrial food as 'edible food-like substances'. Carlos Augusto Monteiro cited Pollan as an influence in coining the term 'ultra-processed food' in a 2009 commentary. Monteiro's team developed the Nova classification for grouping unprocessed and processed foods beginning in 2010, whose definition of ultra-processing has become most widely accepted and has gradually become more refined through successive publications. The identification of ultra-processed foods, as well as the category itself, is a subject of debate among nutrition and public health scientists, and other definitions have been proposed. A survey of systems for classifying levels of food processing in 2021 identified four 'defining themes': Extent of change (from natural state); Nature of change (p
https://en.wikipedia.org/wiki/Contest%20competition
In ecology, contest competition refers to a situation where available resources, such as food and mates, are utilized only by one or a few individuals, thus preventing development or reproduction of other individuals. It refers to a hypothetical situation in which several individuals stage a contest for which one eventually emerges victorious. Contest competition is the opposite of scramble competition, a situation in which available resources are shared equally among individuals. As contest competition allows the monopolization of resources, offspring will typically always be produced and survive until adulthood independent of the population size, resulting in stable population dynamics. This is in stark contrast to scramble competition which can result in periodic or chaotic population dynamics. The Beverton–Holt model is often used to represent population dynamics arising from contest competition. This model, and a few other well-known population models, can be explicitly derived from individual-level processes assuming contest competition and a random distribution of individuals among resources. Contest competition has been observed in a variety of species. In white-faced monkeys, Cebus capucinus, regardless of aggression, avoidance, or sex, higher ranking monkeys had higher energy intake within their group. For female Microcebus murinus groups, if the resource (fruit) could be monopolized, they would compete within their group for it. In a controlled lab experiment with three parasitic wasp species (Dinarmus basalis, Anisopteromalus calandrae, and Heterospilus prosopidis) they found that between the first larvae in the host and the second, the larvae that would win depended on the time between them. There was also a Nicholson–Bailey model made to partially explain the relationship between Heterospilus prosopidis and its host Callosobruchus maculatus. Fitness gains for the winner of the contest is not always known. For example, in mountain gorillas, Gorilla b
https://en.wikipedia.org/wiki/ARITH%20Symposium%20on%20Computer%20Arithmetic
The IEEE International Symposium on Computer Arithmetic (ARITH) is a conference in the area of computer arithmetic. The symposium was established in 1969, initially as three-year event, then as a biennial event, and, finally, from 2015 as an annual symposium. ARITH topics span from theoretical aspects and algorithms for operations, to hardware implementations of arithmetic units and applications of computer arithmetic. ARITH symposia are sponsored by IEEE Computer Society. They have been described as one of "the most prestigious forums for computer arithmetic" by researchers at the National Institute of Standards and Technology, as the main conference forum for new research publications in computer arithmetic by , and as a forum for interacting with the "international community of arithmeticians" by participants Peter Kornerup and David W. Matula. List of ARITH symposia References Computer arithmetic Computer science conferences Computer conferences IEEE conferences
https://en.wikipedia.org/wiki/Human%20performance%20modeling
Human performance modeling (HPM) is a method of quantifying human behavior, cognition, and processes. It is a tool used by human factors researchers and practitioners for both the analysis of human function and for the development of systems designed for optimal user experience and interaction . It is a complementary approach to other usability testing methods for evaluating the impact of interface features on operator performance. History The Human Factors and Ergonomics Society (HFES) formed the Human Performance Modeling Technical Group in 2004. Although a recent discipline, human factors practitioners have been constructing and applying models of human performance since World War II. Notable early examples of human performance models include Paul Fitts' model of aimed motor movement (1954), the choice reaction time models of Hick (1952) and Hyman (1953), and the Swets et al. (1964) work on signal detection. It is suggested that the earliest developments in HPM arose out of the need to quantify human-system feedback for those military systems in development during WWII (see Manual Control Theory below), with continued interest in the development of these models augmented by the cognitive revolution (see Cognition & Memory below). Human Performance Models Human performance models predict human behavior in a task, domain, or system. However, these models must be based upon and compared against empirical human-in-the-loop data to ensure that the human performance predictions are correct. As human behavior is inherently complex, simplified representations of interactions are essential to the success of a given model. As no model is able to capture the complete breadth and detail of human performance within a system, domain, or even task, details are abstracted away to these keep models manageable. Although the omission of details is an issue in basic psychological research, it is less of a concern in applied contexts such as those of most concern to the human fac
https://en.wikipedia.org/wiki/Mitotic%20cell%20rounding
Mitotic cell rounding is a shape change that occurs in most animal cells that undergo mitosis. Cells abandon the spread or elongated shape characteristic of interphase and contract into a spherical morphology during mitosis. The phenomenon is seen both in artificial cultures in vitro and naturally forming tissue in vivo. Early observations In 1935, one of the first published accounts of mitotic rounding in live tissue described cell rounding in the pseudostratified epithelium of the mammalian neural tube. Sauer noticed that cells in mitosis rounded up to the apical, or luminal, surface of the columnar epithelium before dividing and returning to their elongated morphology. Significance For a long time it was not clear why cells became round in mitosis. Recent studies in the epithelia and epidermis of various organisms, however, show that mitotic cell rounding might serve several important functions. Firstly, mitotic cell rounding in combination with maintenance of apical cell-cell junctions appears to be necessary for correct mitotic spindle alignment, so that daughter cells divide parallel to the tissue plane, thus sharing apical surface to maintain tissue homeostasis. Failure to achieve this may result in mislocalization of one daughter cell to the basal region on the tissue layer and clearance via apoptotic cell death. Secondly, mitotic rounding has been proposed to be a driver for morphological events during tissue development. Examples include epithelial invagination of the Drosophila melanogaster tracheal placode and the anisotropic shape and growth of the inner ear lumen in Zebrafish. Thirdly, mitotic rounding has been shown to be important to generate sufficient space and appropriate geometry for proper mitotic spindle function, which is necessary for timely and accurate progression through mitosis. Thus, mitotic cell rounding is involved in tissue organization and homeostasis. Mechanisms To understand the physical mechanisms of how cells round up in mi
https://en.wikipedia.org/wiki/QN%20Signals
The QN Signals are Morse code operating signals that were introduced for Amateur radio net operation in 1939 on the Michigan QMN Net to lighten the burdens of net control operators. Originally created by a committee of the Detroit Amateur Radio Association led by Ralph Thetreat, W8FX. Ev Battey W1UE (W4IA-SK), then ARRL assistant communications manager, later printed them in QST. The QN Signals are defined in ARRL document FSD-218 and listed in the ARRL Operating Manual. Although these codes are within the Aeronautical Code signals range (QAA–QNZ) and thus conflict with official international Q signals beginning with QN, the ARRL informally queried FCC's legal branch about the conflict. The opinion then of the FCC was that "no difficulty was as long as we continued to use them only in amateur nets." ARRL QN Signals For CW Net Use * QN-codes marked with an asterisk (*) are only for use by the Net Control Station. See also ACP-131 ARRL Brevity code Morse code National Traffic System Prosigns for Morse code Q code Z code References Operating signals Encodings Morse code Amateur radio
https://en.wikipedia.org/wiki/Endian%20Firewall
Endian Firewall is an open-source router, firewall and gateway security Linux distribution developed by the South Tyrolean company Endian. The product is available as either free software, commercial software with guaranteed support services, or as a hardware appliance (including support services). Description Endian Firewall is a Linux security distribution, which is an independent, security management operating system. The system is installed on a PC using a boot CD, and can be operated without a monitor through its online interface or via a keyboard in a command-line interface. The server can be configured via a web interface or the serial interface. The main task of Endian Firewall is as a gateway, router and firewall, and can act as a proxy for web, email, FTP, SIP and DNS. Up to four different networks (dependent on the number of network cards installed in the host PC) can be managed. Networks are configured through the web interface. With Endian these are differentiated by their color coding: Red Network: connection to the insecure Internet. Green Network: Secure intranet, e.g. file server. Orange Network: Part Safe Demilitarized Zone (DMZ). This includes devices that operate their own server and must be accessible over the Internet, such as Web or FTP servers. Blue Network: Secure wireless part, here on wireless devices can be connected. Thus, they are separated from the green network, which increases its security. Endian Firewall includes support for load balancing, which means you can add another connection to the Internet from the red network. Endian Firewall then distributes the network load on both network interface controllers. License The software is developed by the Italian Endian Spa from Appiano, South Tyrol and a community of volunteer developers. The license model of Endian provides a commercial version and a free version: The commercial version can be purchased either as a standalone software (the product is called Endian or simply E
https://en.wikipedia.org/wiki/Genetics%20of%20infertility
About 10–15% of human couples are infertile, unable to conceive. In approximately in half of these cases, the underlying cause is related to the male. The underlying causative factors in the male infertility can be attributed to environmental toxins, systemic disorders such as, hypothalamic–pituitary disease, testicular cancers and germ-cell aplasia. Genetic factors including aneuploidies and single-gene mutations are also contributed to the male infertility. Patients with nonobstructive azoospermia or oligozoospermia show microdeletions in the long arm of the Y chromosome and/or chromosomal abnormalities, each with the respective frequency of 9.7% and 13%. A large percentage of human male infertility is estimated to be caused by mutations in genes involved in primary or secondary spermatogenesis and sperm quality and function. Single-gene defects are the focus of most research carried out in this field. NR5A1 mutations are associated with male infertility, suggesting the possibility that these mutations cause the infertility. However, it is possible that these mutations individually have no major effect and only contribute to the male infertility by collaboration with other contributors such as environmental factors and other genomics variants. Vice versa, existence of the other alleles could reduce the phenotypic effects of impaired NR5A1 proteins and attenuate the expression of abnormal phenotypes and manifest male infertility solely. NR5A1 roles in sex development and related disorders Nuclear receptor subfamily 5 group A member 1 (NR5A1), also known as SF1 or Ad4BP (MIM 184757), is located on the long arm of chromosome 9 (9q33.3). The NR5A1 is an orphan nuclear receptor that was first identified following the search for a common regulator of the cytochrome P450 steroid hydroxylase enzyme family. This receptor is a pivotal transcriptional regulator of an array of genes involved in reproduction, steroidogenesis and male sexual differentiation and also plays a c
https://en.wikipedia.org/wiki/Florian%20Brody
Florian Brody is an Austrian/American digital media creator, inventor, writer, public speaker, academic, and global business consultant. He is best known for his contributions to the invention and development of Expanded Books, an early form of E-books, at the Voyager Company, and for his writings and public speaking about digital media innovation and marketing, including TEDx talks in Austria, as well as his 1999 essay "The Medium is the Memory," originally published in MIT Press's The Digital Dialectic: New Essays on New Media, edited by Peter Lunenfeld. Brody is a certified executive leadership coach, and supports European start-up businesses looking to enter the U.S. market. He served as principal at The Halo Agency from 2013 to 2017. Career Digital media innovation In the late 1980s and early 1990s, Brody was head of the Expanded Books Project at the Voyager Company and was involved in the development and creation of their "expanded books", originally designed to be read on the then-new Apple PowerBook 100. The Voyager Company released their first expanded books on floppy disk for the PowerBook in 1992, and presented them at that year's MacWorld Expo. The books on this original disk were Jurassic Park by Michael Crichton, The Hitchhiker's Guide to the Galaxy by Douglas Adams, and Alice's Adventures in Wonderland by Lewis Carroll. Brody's public statements at the time on the Voyager Company's early expanded books, or 'e-books', were that he believed they were more of an experiment than a definitive 'product', paving the way for future versions of e-books for the next generation of less expensive, more lightweight, and more high-powered portable computers. Digital evangelism Brody has spoken about digital media innovation and marketing in both Europe and the US. He has done multiple TEDx talks in Austria. Business and consultant work Brody has been a principal partner at The Halo Agency, which provides business consultation to European start-up tech-base
https://en.wikipedia.org/wiki/Polynomial%20decomposition
In mathematics, a polynomial decomposition expresses a polynomial f as the functional composition of polynomials g and h, where g and h have degree greater than 1; it is an algebraic functional decomposition. Algorithms are known for decomposing univariate polynomials in polynomial time. Polynomials which are decomposable in this way are composite polynomials; those which are not are indecomposable polynomials or sometimes prime polynomials (not to be confused with irreducible polynomials, which cannot be factored into products of polynomials). The degree of a composite polynomial is always a composite number, the product of the degrees of the composed polynomials. The rest of this article discusses only univariate polynomials; algorithms also exist for multivariate polynomials of arbitrary degree. Examples In the simplest case, one of the polynomials is a monomial. For example, decomposes into since using the ring operator symbol ∘ to denote function composition. Less trivially, Uniqueness A polynomial may have distinct decompositions into indecomposable polynomials where where for some . The restriction in the definition to polynomials of degree greater than one excludes the infinitely many decompositions possible with linear polynomials. Joseph Ritt proved that , and the degrees of the components are the same up to linear transformations, but possibly in different order; this is Ritt's polynomial decomposition theorem. For example, . Applications A polynomial decomposition may enable more efficient evaluation of a polynomial. For example, can be calculated with 3 multiplications and 3 additions using the decomposition, while Horner's method would require 7 multiplications and 8 additions. A polynomial decomposition enables calculation of symbolic roots using radicals, even for some irreducible polynomials. This technique is used in many computer algebra systems. For example, using the decomposition the roots of this irreducible polynomial can b
https://en.wikipedia.org/wiki/List%20of%20WebGL%20frameworks
Frameworks are available to create WebGL content quickly and easily without building from the ground up. Note: The following list mixes WebGL libraries with game engines as well as cloud services without any distinctions. See also WebGL List of game engines References 3D graphics APIs Cross-platform software Graphics libraries Web development
https://en.wikipedia.org/wiki/Kaby%20Lake
Kaby Lake is Intel's codename for its seventh generation Core microprocessor family announced on August 30, 2016. Like the preceding Skylake, Kaby Lake is produced using a 14 nanometer manufacturing process technology. Breaking with Intel's previous "tick–tock" manufacturing and design model, Kaby Lake represents the optimized step of the newer process–architecture–optimization model. Kaby Lake began shipping to manufacturers and OEMs in the second quarter of 2016, with its desktop chips officially launched in January 2017. In August 2017, Intel announced Kaby Lake Refresh (Kaby Lake R) marketed as the 8th generation mobile CPUs, breaking the long cycle where architectures matched the corresponding generations of CPUs. Skylake was anticipated to be succeeded by the 10 nanometer Cannon Lake, but it was announced in July 2015 that Cannon Lake had been delayed until the second half of 2017. In the meantime, Intel released a fourth 14 nm generation on October 5, 2017, named Coffee Lake. Cannon Lake would ultimately emerge in 2018, but only a single mobile CPU was released before it was discontinued the following year. Development history As with previous Intel processors (such as the 8088, Banias, Dothan, Conroe, Sandy Bridge, Ivy Bridge, and Skylake), Kaby Lake's development was led by Intel's Israeli team, based in Haifa. Intel Israel Development Centers manager Ran Senderovitz said: "When we started out on the project, we were only thinking about basic improvements from the previous generation. But we began looking at things differently with a lot of innovation and determination and we achieved major improvements." He added that the performance of the seventh generation chips was improved by 12% for applications and 19% for Internet use compared with the sixth generation chips. Third-party benchmarks do not confirm these percentages as far as gaming is concerned. Features Built on an improved 14 nm process (14FF+), Kaby Lake features faster CPU clock speeds, cl
https://en.wikipedia.org/wiki/Akshamsaddin
Akshamsaddin (Muhammad Shams al-Din bin Hamzah, ) (1389, Damascus – 16 February 1459, Göynük, Bolu), was an influential Ottoman Sunni Muslim scholar, poet, and mystic saint. Biography He was the grandson of Shahab al-Din al-Suhrawardi and a descendant of Abu Bakr al-Siddiq. He was an influential tutor and adviser to Sultan Mehmed the Conqueror. After completing his work with his master Sheikh Hacı Bayram-ı Veli, he founded the Shamsiyya-Bayramiyya Sufi order. He discovered the lost grave of Abu Ayyub al-Ansari (the companion of Muhammad) in Constantinople preceding the Siege of Constantinople. In addition to his fame in religious sciences and Tasawwuf, Akshemsaddin was popular in the fields of medicine and pharmacology. There is not much reference to how he acquired this knowledge, but the Orientalist Elias John Wilkinson Gibb notes in his work History of Ottoman Poetry that Akshamsaddin learned from Haji Bayram Wali during his years with him. Akshamsaddin was also knowledgeable in the treatment of psychological and spiritual disorders. Akshamsaddin mentioned the microbe in his work Maddat ul-Hayat (The Material of Life) about two centuries prior to Antonie van Leeuwenhoek's discovery through experimentation: Works Risalat an-Nuriya Khall-e Mushkilat Maqamat-e Awliya Kitab ut-Tib Maddat ul-Hayat References Abu Ayyub al-Ansari Abu Bakr Bayramiye order Turkish Muslims 15th-century Muslim scholars of Islam 15th-century Muslim theologians Ottoman Sufis Turkish Sufis Sunni Sufis Sunni Muslim scholars of Islam 15th-century writers from the Ottoman Empire 1389 births 1459 deaths Microbiology 15th-century poets from the Ottoman Empire Mehmed the Conqueror Male poets from the Ottoman Empire Scientists from the Ottoman Empire
https://en.wikipedia.org/wiki/Backgammon%20match%20strategy
In backgammon, there are a number of strategies that are distinct to match play as opposed to money play. These differences are most apparent when a player is within a few points of winning the match. Match format Backgammon matches are played to a set number of points, ranging from 3 for informal matches to 25 or more for high level tournaments. Traditionally matches are played to an odd number of points, however there is no theoretical reason why a match should not be played to an even number of points. The doubling cube As with money play, the doubling cube is used. At the start of each game, the doubling cube is placed on the bar with the number 64 showing; the cube is then said to be "centered, on 1". When the cube is centered, the player about to roll may propose that the game be played for twice the current stakes. Their opponent must either accept ("take") the doubled stakes or resign ("drop" or "pass") the game immediately. If a player accepts a double, the cube is placed on their side of the board with the corresponding power of two facing upward, to indicate that the right to re-double belongs exclusively to the player who last accepted a double; this player is then said to "own" the cube. A player who drops a double loses the game at the current value of the doubling cube. For example, if the cube is currently at 2 and a player wants to redouble the stakes to put it at 4, the opponent choosing to drop the redouble would concede 2 points to the opponent. There is no limit to the number of redoubles, although once the cube gets large enough further re-cubes won't matter to the outcome of the match and the cube is said to be "dead"; in practice a game is rarely doubled beyond 4 points. If a game is played to completion, the score is determined by the value of the doubling cube, multipled by 2 in the case of a gammon, and by 3 in the case of a backgammon. For example, a player losing a gammon with the cube at 2 would concede 4 points to the opponent. Th
https://en.wikipedia.org/wiki/Flying-spot%20store
The flying-spot store was an optical digital memory used in early stored program control components of electronic switching systems. The flying-spot store used a photographic plate as the store of binary data. Each spot on the plate was an opaque (logical 0) or transparent (logical 1) area that stored one bit. Spots were read and written with an optical mechanism with an access time of ca. one microsecond. The optical system consisted of a cathode ray tube that functioned as a flying-spot scanner, the source of light beams produced on its face and focused onto the photographic plates with a system of lenses. A photomultiplier detected the light beam. The light beam could be split into several components to read multiple plates simultaneously, permitting the formation of a group of bits for each location. A flying-spot store was the main permanent program and data memory for the first electronic central office installed on a trial basis in Morris, Illinois in 1960. The memory was organized as a set of nine photographic plates and permitted reading two spots per memory address, yielding a word size of 18 bits. For temporary data, the system used a barrier-grid electrostatic storage tube. See also 1ESS switch References Computer memory Cathode ray tube
https://en.wikipedia.org/wiki/National%20Cyber%20Security%20Centre%20%28Ireland%29
The National Cyber Security Centre (NCSC) is a government computer security organisation in Ireland, an operational arm of the Department of the Environment, Climate and Communications. The NCSC was developed in 2013 and formally established by the Irish government in July 2015. It is responsible for Ireland's cyber security, with a primary focus on securing government networks, protecting critical national infrastructure, and assisting businesses and citizens in protecting their own systems. The NCSC incorporates the Computer Security Incident Response Team (CSIRT-IE). The NCSC is headquartered at 29/31 Adelaide Road, Dublin 2. Mandate and organisation The mandate for the NCSC includes; activities to reduce the vulnerability of critical systems and networks within the state to incidents and cyber-attacks; effective response when such attacks occur; responsibility for the protection of critical information infrastructure; establishing and maintaining cooperative relationships with national and international partners. Threats identified to Ireland's critical infrastructure and government networks include: lone individuals, activist groups, criminal groups, terrorist groups, and nation states seeking to gather intelligence or to damage or degrade infrastructure. Incidents arising through extreme weather, human error and hardware or software failure also pose significant risks to individuals, businesses and public administration. Work relating to the National Cyber Security Centre, and any records associated with the security of ICT systems in the state and outside it, are exempt from being disclosed under freedom of information (FOI). Richard Browne was appointed as the NCSC's director in January 2022, having served as acting director for the previous 18 months. Computer Security Incident Response Team (CSIRT-IE) The Computer Security Incident Response Team (CSIRT-IE) was established in late 2011 (prior to the official formation of the NCSC) within the Depa
https://en.wikipedia.org/wiki/Pulsatile%20secretion
Pulsatile secretion is a biochemical phenomenon observed in a wide variety of cell and tissue types, in which chemical products are secreted in a regular temporal pattern. The most common cellular products observed to be released in this manner are intercellular signaling molecules such as hormones or neurotransmitters. Examples of hormones that are secreted pulsatilely include insulin, thyrotropin, TRH, gonadotropin-releasing hormone (GnRH) and growth hormone (GH). In the nervous system, pulsatility is observed in oscillatory activity from central pattern generators. In the heart, pacemakers are able to work and secrete in a pulsatile manner. A pulsatile secretion pattern is critical to the function of many hormones in order to maintain the delicate homeostatic balance necessary for essential life processes, such as development and reproduction. Variations of the concentration in a certain frequency can be critical to hormone function, as evidenced by the case of GnRH agonists, which cause functional inhibition of the receptor for GnRH due to profound downregulation in response to constant (tonic) stimulation. Pulsatility may function to sensitize target tissues to the hormone of interest and upregulate receptors, leading to improved responses. This heightened response may have served to improve the animal's fitness in its environment and promote its evolutionary retention. Pulsatile secretion in its various forms is observed in: Hypothalamic-pituitary-gonadal axis (HPG) related hormones Glucocorticoids Insulin Growth hormone Parathyroid hormone Neuroendocrine Pulsatility Nervous system control over hormone release is based in the hypothalamus, from which the neurons that populate the pariventricular and arcuate nuclei originate. These neurons project to the median eminence, where they secrete releasing hormones into the hypophysial portal system connecting the hypothalamus with the pituitary gland. There, they dictate endocrine function via the four Hyp
https://en.wikipedia.org/wiki/Rice%20University%20Electrical%20and%20Computer%20Engineering
The Rice University Department of Electrical and Computer Engineering is one of nine academic departments at the George R. Brown School of Engineering at Rice University. Ashutosh Sabharwal is the Department Chair. Originally the Rice Department of Electrical Engineering, it was renamed in 1984 to Electrical and Computer Engineering. Research Rice ECE Faculty perform research in the following areas: Computer Engineering; Data Science, Neuroengineering; Photonics, Electronics and Nano-devices, and Systems. Rice has a long history in digital signal processing (DSP) dating back to its inception in the late 1960s. Computer Engineering faculty have a research focus in analog and mixed-signal design, VLSI signal processing, computer architecture and embedded systems, biosensors and computer vision, and hardware security and storage systems, including applications to education. Biosensors and mobile wireless healthcare are growing application areas in embedded systems research. Smartphones with imaging devices are leading to new areas in computer vision and sensing. In the area of computer architecture, research interests include parallel computing, large-scale storage systems, and resource scheduling for performance and power. Data Science faculty integrate the foundations, tools and techniques involving data acquisition (sensors and systems), data analytics (machine learning, statistics), data storage and computing infrastructure (GPU/CPU computing, FPGAs, cloud computing, security and privacy) in order to enable meaningful extraction of actionable information from diverse and potentially massive data sources. Neuroengineering faculty are members of the Rice Center for Neuroengineering, a collaborative effort with Texas Medical Center researchers. They develop technology for treating and diagnosing neural diseases. Current research areas include interrogating neural circuits at the cellular level, analyzing neuronal data in real-time, and manipulating healthy or dise
https://en.wikipedia.org/wiki/Norton%20%28software%29
Norton, formerly known as Norton by Symantec, is a brand of Gen Digital (formerly NortonLifeLock) based in Tempe, Arizona. Since being acquired by the Symantec Corporation in 1990, Norton offers a variety of products and services related to digital security, identity protection, and online privacy. In 2014, Norton's parent company Symantec separated their business into two units. One was focused on security and the other was focused on information management; Norton was placed in the unit focused on security. The company originally provided utility software for DOS. History Peter Norton Computing, Inc. was a software company founded by Peter Norton. Norton and his company developed various DOS utilities including the Norton Utilities which did not include antivirus features. In 1990, the company was acquired by Symantec and renamed Peter Norton Consulting Group. Symantec's consumer antivirus and data management utilities are still marketed under the Norton name. In early 1991, Symantec's Norton Group launched Norton AntiVirus 1.0 for PC and compatible computers. The company updated and diversified its product line until finally combining its offerings into one seamless product, Norton Security. Products and Services Norton's products are primarily digital security tools for personal computers, server devices and, more recently, mobile devices. In the 1990s, Norton provided software to check computer systems for Y2K compliance. The company's primary product is Norton Security. The software is licensed to individuals, small businesses and enterprises. It includes malware prevention and removal during the subscription period for up to five devices. Other features included in the product are a personal firewall, email spam filtering and phishing protection. The program was released in September 2014, replacing Norton 360, Norton Internet Security, and Norton AntiVirus. A mesh Wi-Fi network is developed by Norton, intended to protect computers inside the network fr
https://en.wikipedia.org/wiki/Dose-fractionation%20theorem
The dose-fractionation theorem for tomographic imaging is a statement that says the total dose required to achieve statistical significance for each voxel of a computed 3D reconstruction is the same as that required to obtain a single 2D image of that isolated voxel at the same level of statistical significance. Hegerl and Hoppe have pointed out that a statistically significant 3D image can be computed from statistically insignificant projections, as long as the total dose that is distributed among these projections is high enough that it would have resulted in a statistically significant projection, if applied to only one image. The original derivations assumed weak-contrast imaging with additive noise, however, the dose-fractionation theorem was demonstrated using a more complete noise model by Yalisove, Sung, et al. References Condensed matter physics Electron microscopy Medical imaging Geometric measurement X-ray computed tomography Multidimensional signal processing
https://en.wikipedia.org/wiki/Crowther%20criterion
The conventional method to evaluate the resolution of a tomography reconstruction is determined by the Crowther criterion. The minimum number of views, m, to reconstruct a particle of diameter D to a resolution of d (=1/R) is given by References Condensed matter physics Electron microscopy Medical imaging Geometric measurement X-ray computed tomography Multidimensional signal processing
https://en.wikipedia.org/wiki/Registration%20Data%20Access%20Protocol
The Registration Data Access Protocol (RDAP) is a computer network communications protocol standardized by a working group at the Internet Engineering Task Force in 2015, after experimental developments and thorough discussions. It is a successor to the WHOIS protocol, used to look up relevant registration data from such Internet resources as domain names, IP addresses, and autonomous system numbers. While WHOIS essentially retrieves free text, RDAP delivers data in a standard, machine-readable JSON format. In order to accomplish this goal, the output of all operative WHOIS servers was analyzed, taking a census of the labels they used. RDAP designers, many of whom are members of number or name registries, strove to keep the protocol as simple as possible, since complexity was considered one of the reasons why previous attempts, such as CRISP, failed. RDAP is based on RESTful web services, so that error codes, user identification, authentication, and access control can be delivered through HTTP. The biggest delay in getting RDAP done turned out to be the bootstrap, figuring out where the server is for each top level domain, IP range, or ASN range. IANA agreed to host the bootstrap information in suitable registries, and publish it at a well-known location URLs in JSON format. Those registries started empty and will be gradually populated as registrants of domains and address spaces provide RDAP server information to IANA. For number registries, ARIN set up a public RDAP service which also features a bootstrap URL, similar to what they do for WHOIS. For name registries, ICANN requires RDAP compliance since 2013. Number resources RDAP databases for assigned IP numbers are maintained by five Regional Internet registries. ARIN maintains a bootstrap database. Thanks to the standard document format, tasks such as, for example, getting the abuse team address of a given IP number can be accomplished in a fully automated manner. Name resources RDAP databases fo
https://en.wikipedia.org/wiki/Nigerian%20Association%20of%20Mathematical%20Physics
The Nigerian Association of Mathematical Physics is a professional academic association of Nigerian mathematical physicists. The association is governed by its Council, which is chaired by the association's President, according to a set of Statutes and Standing Orders. Notable members Professor Awele Maduemezia Professor Garba Babaji References Professional associations based in Nigeria Mathematical physics
https://en.wikipedia.org/wiki/Coupon%20%28PWB%29
A coupon or test coupon is a printed circuit board (PCB) used to test the quality of a printed wiring board (PWB) fabrication process. Test coupons are fabricated on the same panel as the PWBs, typically at the edges. Coupons are then inspected to ensure proper layer alignment, electrical connectivity, and cross sectioned to inspect internal structures. Coupons can be designed custom for a PWB or selected from a vendor library. Overview A coupon is designed to include traces and vias with the same dimensions and structures as those of the main PWB. It is standard practice to locate coupons on the edges of a panel, from which multiple PWBs are fabricated, to verify the consistency of plating, etching, and lamination across the whole panel. The use of coupons for testing is a necessary step in accurately and reliably monitoring fabrication quality and consistency. References Further reading https://www.polarinstruments.com/support/si/AP8186.html https://www.polarinstruments.com/support/cits/AP132.html https://electronics.stackexchange.com/questions/208856/how-do-i-lay-out-pcb-traces-for-a-given-differential-impedance https://electronics.stackexchange.com/questions/216015/what-component-does-the-coupon-label-refer-to-in-terms-of-pcbs Printed circuit board manufacturing Quality control tools
https://en.wikipedia.org/wiki/Golgi%20tendon%20organ
The Golgi tendon organ (GTO) (also called Golgi organ, tendon organ, neurotendinous organ or neurotendinous spindle) is a proprioceptor – a type of sensory receptor that senses changes in muscle tension. It lies at the interface between a muscle and its tendon known as the musculotendinous junction also known as the myotendinous junction. It provides the sensory component of the Golgi tendon reflex. The Golgi tendon organ is one of several eponymous terms named after the Italian physician Camillo Golgi. Structure The body of the Golgi tendon organ is made up of braided strands of collagen (intrafusal fasciculi) that are less compact than elsewhere in the tendon and are encapsulated. The capsule is connected in series (along a single path) with a group of muscle fibers () at one end, and merge into the tendon proper at the other. Each capsule is about long, has a diameter of about , and is perforated by one or more afferent type Ib sensory nerve fibers (Aɑ fiber), which are large myelinated axons that can conduct nerve impulses very rapidly. Inside the capsule, the afferent fibers lose their medullary sheaths, branch, intertwine with the collagen fibers, and terminate as flattened leaf-like endings between the collagen strands (see figure). Function When the muscle generates force, the sensory terminals are compressed. This stretching deforms the terminals of the Ib afferent axon, opening stretch-sensitive cation channels. As a result, the Ib axon is depolarized and fires nerve impulses that are propagated to the spinal cord. The action potential frequency signals the force being developed by 10-20 extrafusal muscle fibers in the muscle. Average level of activity in a tendon organ population is representative of the whole muscle force. The Ib sensory feedback generates stretch reflexes and supraspinal responses which control muscle contraction. Ib afferents synapse with interneurons in the spinal cord that also project to the brain cerebellum and cerebral cor
https://en.wikipedia.org/wiki/CoderDojo
CoderDojo is a global volunteer-led community of free programming workshops for young people (not to be confused with Code Ninjas who is also a coding business that refers to their locations as dojos). The movement is a grassroots organisation with individual clubs (called "Dojos") acting independently. A charity called the CoderDojo Foundation operates out of Dublin, Ireland, and supports the various clubs by providing a central website and other support services. Supporters of CoderDojo believe it is part of the solution to addressing the global shortage of programmers by getting young people more involved with ICT learning. The movement has seen significant growth since its founding. The CoderDojo Foundation estimates 1,250 Dojos spread across 69 countries, with a growth rate of several new Dojos every week. History Founded in July 2011 by James Whelton and Bill Liao, the first Dojo took place in NSC Cork, Ireland, on 23 July. James and Bill were self-taught programmers and wanted to create a space where young people could learn code in a social environment. In less than one year, the CoderDojo movement was spread across Ireland and other cities like London in England, and San Francisco in the United States. In May 2017, Raspberry Pi foundation merged with CoderDojo. Press Coverage CoderDojo received positive reviews from newspapers including BBC, CNN, The Guardian, The Irish Times and TechCrunch. In 2015, Salesforce announced a partnership and a grant of $200,000 to CoderDojo in order to help "support 14 CoderDojo code clubs – or Dojos – globally, with each of them being run by Salesforce.com "champions". CoderDojo Girls Many CoderDojo volunteers focus on improving the extreme shortage of women in technology by using specific strategies to engage girls. In particular, challenging the socially accepted idea among young women that the world of the computer sciences is "not for them". Some Dojos have even chosen to run special CoderDojo Girls sessions to en
https://en.wikipedia.org/wiki/Von%20Foerster%20equation
The McKendrick–von Foerster equation is a linear first-order partial differential equation encountered in several areas of mathematical biology – for example, demography and cell proliferation modeling; it is applied when age structure is an important feature in the mathematical model. It was first presented by Anderson Gray McKendrick in 1926 as a deterministic limit of lattice models applied to epidemiology, and subsequently independently in 1959 by biophysics professor Heinz von Foerster for describing cell cycles. Mathematical formula The mathematical formula can be derived from first principles. It reads:where the population density is a function of age and time , and is the death function. When , we have: It relates that a population ages, and that fact is the only one that influences change in population density; the negative sign shows that time flows in just one direction, that there is no birth and the population is going to die out. Derivation Suppose that for a change in time and change in age , the population density is:That is, during a time period the population density decreases by a percentage . Taking a Taylor series expansion to order gives us that:We know that , since the change of age with time is 1. Therefore, after collecting terms, we must have that: Analytical solution The von Foerster equation is a continuity equation; it can be solved using the method of characteristics. Another way is by similarity solution; and a third is a numerical approach such as finite differences. To get the solution, the following boundary conditions should be added: which states that the initial births should be conserved (see Sharpe–Lotka–McKendrick’s equation for otherwise), and that: which states that the initial population must be given; then it will evolve according to the partial differential equation. Similar equations In Sebastian Aniţa, Viorel Arnăutu, Vincenzo Capasso. An Introduction to Optimal Control Problems in Life Sciences and Eco
https://en.wikipedia.org/wiki/Electronic%20entropy
Electronic entropy is the entropy of a system attributable to electrons' probabilistic occupation of states. This entropy can take a number of forms. The first form can be termed a density of states based entropy. The Fermi–Dirac distribution implies that each eigenstate of a system, , is occupied with a certain probability, . As the entropy is given by a sum over the probabilities of occupation of those states, there is an entropy associated with the occupation of the various electronic states. In most molecular systems, the energy spacing between the highest occupied molecular orbital and the lowest unoccupied molecular orbital is usually large, and thus the probabilities associated with the occupation of the excited states are small. Therefore, the electronic entropy in molecular systems can safely be neglected. Electronic entropy is thus most relevant for the thermodynamics of condensed phases, where the density of states at the Fermi level can be quite large, and the electronic entropy can thus contribute substantially to thermodynamic behavior. A second form of electronic entropy can be attributed to the configurational entropy associated with localized electrons and holes. This entropy is similar in form to the configurational entropy associated with the mixing of atoms on a lattice. Electronic entropy can substantially modify phase behavior, as in lithium ion battery electrodes, high temperature superconductors, and some perovskites. It is also the driving force for the coupling of heat and charge transport in thermoelectric materials, via the Onsager reciprocal relations. From the density of states General Formulation The entropy due to a set of states that can be either occupied with probability or empty with probability can be written as: , where is Boltzmann constant. For a continuously distributed set of states as a function of energy, such as the eigenstates in an electronic band structure, the above sum can be written as an integral over the
https://en.wikipedia.org/wiki/Sleeping%20sickness%20of%20Kalachi%2C%20Kazakhstan
The sleeping sickness of Kalachi, Kazakhstan (with the place or the syndrome sometimes called sleepy hollow) is a conjectured medical condition which causes a person to sleep for days or weeks at a time, together with other symptoms such as hallucinations, nausea, intoxicated behavior, disorientation and memory loss. The phenomenon was only reported in Kalachi and the nearby village of Krasnogorsk. It was first reported in March 2013 and by 2016 had affected about 150 people. The syndrome appeared to be non-communicable. The disease disappeared for some time but re-emerged in 2015, and affected all age groups. Potential causes of the syndrome were suggested to be carbon monoxide poisoning or contamination of the ground water supply by chemicals used for military operations in the region. Signs and symptoms Other than excessive sleep, the disease causes hallucination, nausea and vomiting, and disorientation. Victims of the disease would sometimes act as if they were drunk, would experience memory loss about what they had done and experienced, and would often experience hallucinations like a "snail walking over their face". In a statement, a professor from Tomsk Polytechnic University, Leonid Rikhvanov, of the department of geo-ecology and geo-chemistry, said that radon gas from the mine could be the cause of the symptoms. The affected people would fall asleep during day-to-day activities and always feel sleepy. As a local nurse described the phenomenon to an RT news crew, "You wake them up, they can speak to you, reply to you, but as soon as you stop talking and ask what bothers them, they just want to sleep, sleep, sleep." Cause Kazakh officials gave a report about the disease, stating that heightened levels of carbon monoxide, along with other hydrocarbons due to flooding of an abandoned Soviet-era uranium mine nearby, was causing the syndrome, by spreading through the village's air. Concentration of carbon monoxide and reduced oxygen in the air were concluded
https://en.wikipedia.org/wiki/Etherington%27s%20reciprocity%20theorem
The Etherington's distance-duality equation is the relationship between the luminosity distance of standard candles and the angular diameter distance. The equation is as follows: , where is the redshift, is the luminosity distance and the angular-diameter distance. History and derivations When Ivor Etherington introduced this equation in 1933, he mentioned that this equation was proposed by Tolman as a way to test a cosmological model. Ellis proposed a proof of this equation in the context of Riemannian geometry. A quote from Ellis: "The core of the reciprocity theorem is the fact that many geometric properties are invariant when the roles of the source and observer in astronomical observations are transposed". This statement is fundamental in the derivation of the reciprocity theorem. Validation from astronomical observations The Etherington's distance-duality equation has been validated from astronomical observations based on the X-ray surface brightness and the Sunyaev–Zel'dovich effect of galaxy clusters. The reciprocity theorem is considered to be true when photon number is conserved, gravity is described by a metric theory with photons traveling on unique null geodesics. Any violation of the distance duality would be attributed to exotic physics provided that astrophysical effects altering the cosmic distance measurements are well below the statistical errors. For instance, an incorrect modelling of the three-dimensional gas density profile in galaxy clusters may introduce systematic uncertainties in the determination of the cluster angular diameter distance from X-ray and/or SZ observations, thus altering the outcome of the distance-duality test. Similarly, unaccounted extinction from a diffuse dust component in the inter-galactic medium can affect the determination of luminosity distances and cause a violation of the distance-duality relation. See also Distance measures (cosmology) References Physical quantities
https://en.wikipedia.org/wiki/Molecular%20vapor%20deposition
Molecular vapor deposition is the gas-phase reaction between surface reactive chemicals and an appropriately receptive surface. Often bi-functional silanes are used in which one termination of the molecule is reactive. For example, a functional chlorosilane (R-Si-Cl3) can react with surface hydroxyl groups (-OH) resulting a radicalized (R) deposition on the surface. The advantage of a gas phase reaction over a comparable liquid phase process is the control of moisture from the ambient environment, which often results in cross polymerization of the silane leading to particulates on the treated surface. Often a heated sub-atmospheric vacuum chamber is used to allow precise control of the reactants and water content. Additionally the gas phase process allows for easy treatment of complex parts since the coverage of the reactant is generally diffusion limited. Microelectromechanical Systems (MEMS) sensors often use molecular vapor deposition as a technique to address stiction and other parasitic issues relative to surface-to-surface interactions. References Industrial processes Thin film deposition
https://en.wikipedia.org/wiki/ICTACEM
The International Conference on Theoretical, Applied, Computational and Experimental Mechanics (ICTACEM) is a professional organization in the field of Engineering. The ICTACEM was founded by (Late) Prof. P.K. Sinha of Department of Aerospace Engineering, Indian Institute of Technology Kharagpur as Conference on Theoretical applied, Computation and experimental mechanics(CTACEM) in 1998, which was later dignified as ICTACEM in 2001. The first International conference was held on December 1, 1998. Since then, the organization has constituted more than 250 committee members and delegates, all over the world. The conference has been organized every three years since the inaugural in 1998. The conference is known for addressing a major-scale of renowned Scientist, Astronauts, Researchers and Professors throughout the world. Conference Themes ICTACEM 2017 [10] Fluid Mechanics, Solid Mechanics, Flight Mechanics & Control, Propulsion [11] References External links 1998 conferences International conferences in India Aerospace engineering organizations Indian engineering organisations International professional associations Professional associations based in India International conferences
https://en.wikipedia.org/wiki/Zero%3A%20The%20Biography%20of%20a%20Dangerous%20Idea
Zero: The Biography of a Dangerous Idea is a non-fiction book by American author and journalist Charles Seife. The book was initially released on February 7, 2000, by Viking. Background The book offers a comprehensive look at number 0 and its controverting role as one of the great paradoxes of human thought and history since its invention by the ancient Babylonians or the Indian people. Even though zero is a fundamental idea for the modern science, initially the notion of a complete absence got a largely negative, sometimes hostile, treatment by the Western world and Greco-Roman philosophy. Zero won the 2001 PEN/Martha Albrand Award for First Nonfiction Book. Review See also References External links Profile on goodreads.com Popular mathematics books 2000 non-fiction books Biographical books Philosophy of mathematics literature
https://en.wikipedia.org/wiki/User%20behavior%20analytics
User behavior analytics (UBA) or User and Entity Behavior Analytics (UEBA), is the concept of analyzing the behavior of users, subjects, visitors, etc. for a specific purpose. It allows cybersecurity tools to build a profile of each individual's normal activity, by looking at patterns of human behavior, and then highlighting deviations from that profile (or anomalies) that may indicate a potential compromise. Purpose of UBA The reason for using UBA, according to Johna Till Johnson from Nemertes Research, is that "security systems provide so much information that it is tough to uncover information that truly indicates a potential for a real attack. Analytics tools help make sense of the vast amount of data that SIEM, IDS/IPS, system logs, and other tools gather. UBA tools use a specialized type of security analytics that focuses on the behavior of systems and the people using them. UBA technology first evolved in the field of marketing, to help companies understand and predict consumer-buying patterns. But as it turns out, UBA can be extraordinarily useful in the security context too." Distinction between UBA and UEBA The E in UEBA extends the analysis to include entity activities that take place but that are not necessarily directly linked or tied to a user's specific actions but that can still correlate to a vulnerability, reconnaissance, intrusion breach or exploit occurrence. The term "UEBA" was coined by Gartner in 2015. UEBA tracks the activity of devices, applications, servers and data. UEBA systems produce more data and provide more complex reporting options than UBA systems. Difference with EDR UEBA Tools differ from Endpoint detection and response (EDR) capabilities in that UEBA is an analytic focus on the user whereas EDR has an analytic focus on the endpoint. See also Behavioral analytics Network behavior anomaly detection User activity monitoring References External links ABC's Of UBA Software
https://en.wikipedia.org/wiki/List%20of%20video%20game%20museums
This list of video game museums shows video game museums in the world. Video game museums Online video game museums See also List of museums Video game List of computer museums References External links Internet Arcade – web-based library of arcade (coin-operated) video games from the 1970s through to the 1990s Software Library: MS-DOS Games Lists of museums by subject Virtual museums
https://en.wikipedia.org/wiki/Warwick%20Tucker
Warwick Tucker is an Australian mathematician at Monash University (previously deputy Chair and Chair at the Department of Mathematics at Uppsala University 2009–2020) who works on dynamical systems, chaos theory and computational mathematics. He is a recipient of the 2002 R. E. Moore Prize, and the 2004 EMS Prize. Tucker obtained his Ph.D. in 1998 at Uppsala University (thesis: The Lorenz attractor exists) with Lennart Carleson as advisor. In 2002, Tucker succeeded in solving an important open problem that had been posed by Stephen Smale (the fourteenth problem on Smale's list of problems). He was an invited speaker at the conference Dynamics, Equations and Applications in Kraków in 2019. References External links Year of birth missing (living people) Living people Swedish mathematicians Dynamical systems theorists Australian mathematicians Academic staff of Uppsala University
https://en.wikipedia.org/wiki/What%20%28ITS%20utility%29
What (typed as in the prompt) was a small information utility available in the Incompatible Timesharing System. It could provide information about incoming email, bus schedule on the MIT campus, executable source files or answer the user in a humorous manner. Implementation was written in the MIDAS assembly language. It can still be used on some of the ITS instances maintained across the web. The last traceable edit of the source code was by Ken L. Harrenstien on 16 May 1988. Usage examples Without arguments would print information about inbox status: *:what You don't seem to have any recent messages. :KILL E$J * With the argument bus it would print out information about the next few buses leaving from the MIT campus: *:what bus It is now 12:50 Bus 83 leaves Central Sq 13:10, 13:30, 13:45, 14:00, ... Bus 83 leaves Ringworld/Alewife 13:00, 13:20, 13:40, 13:55, ... :KILL E$J * Asked about source for NAME, responded with paths to source files corresponding to NAME: *:what source for what UP:SYSENG; 0 WHAT 201 3 +487 11/30/1987 17:33:23 (5/2/2015) KLH 0 WHAT 204 3 +493 5/16/1988 19:13:03 (5/4/2015) KLH * Not knowing the answer, it would often resort to humor: *:what is life You tell me. :KILL E$J * Finally, displayed some amount of introspection: *:what is this It's an all purpose utility program, dummy! :KILL E$J *:what are you I am an omniscient utility program, idiot! :KILL E$J * See also Incompatible Timesharing System Dynamic debugging technique Maclisp External links ITS System Documentation UP: Public ITS system operated by the Update Computer Club at Uppsala University Website for ITS system hobbyists with much information and documentation Massachusetts Institute of Technology Time-sharing operating systems Utility software
https://en.wikipedia.org/wiki/Online%20Egyptological%20Bibliography
The Online Egyptological Bibliography (OEB) is an online database of printed publications in the field of Egyptology, published by the Griffith Institute, Oxford. The OEB is the successor of the Annual Egyptological Bibliography (AEB), which appeared in print until 2001. Annual Egyptological Bibliography One of the initial goals of the International Association of Egyptologists (IAE) at its foundation in 1947 was to produce overviews of literature relevant to Egyptology, to aid Egyptological research. Jozef M.A. Janssen, a Dutch Egyptologist at Leiden University, was asked to publish a yearly list of titles with abstracts. The first volume appeared in 1948. Volumes 1 (1947)-30 (1976) were published by Brill, volumes 31 (1977)-35 (1981) by Aris & Phillips Ltd. After Janssen’s death in 1963, Dutch Egyptologist M.S.G.H. Heerma van Voss assumed the task of AEB Editor-in-Chief, with the help of a number of assistant editors. He was succeeded by Jac. J. Janssen (1967–1978), L.M.J. Zonhoven (1979–1984), and W. Hovestreydt (1984–2008). In the 1980s, yearly volumes of Preliminary Egyptological Bibliography were also published. Due to budget cuts at Leiden University, The Netherlands Institute for the Near East (NINO) took responsibility for the AEB in 1992. Volumes 36 (1982)-53 (2001) were published by NINO. Hovestreydt together with H.S. van den Berg developed a digital administration of the bibliographical information, which led to the publication in 2001 of the CD-ROM Egyptological bibliography 1822–1997 (which included the digitized information of C. Beinlich's Bibliographie Altägypten 1822–1947), and the AEB Online website in 2007. Move to Oxford Starting from 2009, the AEB was transferred to Oxford and renamed to the Online Egyptological Bibliography. No more print volumes were published. In 2011, the German bibliography Aigyptos was incorporated. External links Egyptology Online databases
https://en.wikipedia.org/wiki/SolidRun
SolidRun is an Israeli company producing Embedded systems components, mainly mini computers, Single-board computers and computer-on-module devices. It is specially known for the CuBox family of mini-computers, and for producing motherboards and processing components such as the HummingBoard motherboard. Situated in Acre, Israel, SolidRun develops and manufactures products aimed both for the private entertainment sector, and for companies developing processor based products, notably components of "Internet of Things" technology systems. Within the scope of the IoT technology, SolidRun's mini computers are aimed to cover the intermediate sphere, between sensors and user devices, and between the larger network or Cloud framework. Within such a network, mini computers or system-on-module devices, act as mediators gathering and processing information from sensors or user devices and communicating with the network - this is also known as Edge computing. History SolidRun was founded in 2010 by co-founders Rabeeh Khoury (formally an engineer at Marvell Technology Group) and Kossay Omary. The goal of SolidRun has been to develop, produce and market components aimed for integration with IoT systems. The company today is situated in Acre in the Northern District of Israel, and headed by Dr. Atai Ziv (CEO). The major product development line aimed at the consumer market is the CuBox family of mini-computers. The first of which was announced in December 2011, followed by the development of the CuBox-i series, announced in November 2013. The most recent addition to the CuBox line has been the CuBoxTV (announced in December 2014), which has been marketed primarily for the home entertainment market. A further primary product developed by SolidRun is the Hummingboard, an uncased single-board computer, marketed to developers as an integrated processing component. SolidRun develops all of its products using Open-source software (such as Linux and OpenELEC), identifying itself a
https://en.wikipedia.org/wiki/Enterprise%20legal%20management
Enterprise legal management (ELM) is a practice management strategy of corporate legal departments, insurance claims departments, and government legal and contract management departments. ELM developed during the 1990s in response to increased corporate demands for accountability, transparency, and predictability, and employs software to manage internal legal documents and workflows, electronic billing and invoicing, and to guide decision-making through reporting and analytics. Definitions Still an evolving term, ELM is a recognized management discipline and a strategic objective of general counsel. Some have argued that ELM falls within the broader category of corporate governance, risk, and compliance (GRC); others maintain that ELM and GRC are separate entities along a continuum. Separate but related technologies include information governance, electronic discovery, legal hold, contract management, corporate secretary, and board of directors’ communications. ELM software may integrate some or all of these components. Historical development Early practice management Law practice management refers to the business aspect of operating a law firm or in-house legal team. Components include economics, workplace communication and management, ethics, and client service. Historically, corporate legal spend was considered a “black box” with limited predictability and transparency, making it difficult for corporate legal teams to parse differences of efficiency and cost among outside firms, or to benchmark firm performance against previously hired counsel. Transition and early adoption Several factors led to a shift away from traditional, low-technology solutions and toward ELM, most notably the expansion of the Internet during the 1990s and subsequent development of Software as a service (SaaS) platforms. Within legal departments, factors included greater regulatory compliance risk, smaller budgets, and board member demands for greater accountability, predictabilit
https://en.wikipedia.org/wiki/Eddystone%20%28Google%29
Eddystone was a Bluetooth Low Energy beacon profile released by Google in July 2015. In December 2018 Google stopped delivering both Eddystone and Physical Web beacon notifications. The Apache 2.0-licensed, cross-platform, and versioned profile contained several frame types, including Eddystone-UID, Eddystone-URL, and Eddystone-TLM. Eddystone-URL was used by the Physical Web project, whereas Eddystone-UID was typically used by native apps on a user's device, including Google's first party apps such as Google Maps. Background The format was named after the Eddystone Lighthouse in the UK, motivated by the simplicity of a lighthouse-signal and its one-directional nature. Technical details Though similar to the iBeacon profile released by Apple in 2013, Eddystone can be implemented without restriction. Eddystone also contains a telemetry frame (Eddystone-TLM) designed for reporting on a beacon's health, including, for example, battery level. Like other beacon technology, beacons with Eddystone can give devices a better indication of what objects and places are around them. Importantly, beacons do not generally accept connections from other devices, meaning that the beacon itself cannot record what devices are in its vicinity. In many cases, the simplicity of the beacon frame means that an app (for example Google Chrome) is required in order to interpret the beacon's signal. Nearby Messages is the API that can be used off of this protocol to receive data that is stored within beacons. Differing from iBeacon, Google beacons use not only Bluetooth but also WiFi and near ultrasonic sounds to communicate between devices. Eddystone has 4 frame types. Eddystone-UID broadcasts an identifying code that allows apps to retrieve information from app servers. These can be used for indoor location, identification of physical objects, and to interact with apps in any way the developer decides. Eddystone-EID broadcasts an encrypted rotating identifier in order to increase the sec
https://en.wikipedia.org/wiki/The%20Art%20of%20Mathematics
The Art of Mathematics (), written by Hong Sung-Dae (), is a series of mathematics textbooks for high school students in South Korea. First published in 1966, it is the best-selling book series in South Korea, with about 46 million copies sold as of 2016. In Jeongeup, North Jeolla Province, the hometown of Hong Sung-Dae, a street is named Suhakjeongseok-gil () in honor of the author.' Controversy The similarities with the Japanese Textbook series Chart-Style Math () have caused the author to receive accusations of plagiarism. The chapter division, style of explanation, and formatting are visibly similar between the books. For instance, in the Japanese books, the order of questions are in "Example Questions, Practice Questions, Exercise Questions," while in The Art of Mathematics it is "Example Questions, Similar Questions, Practice Questions". The author Hong has denied all accusations, although he has admitted that the questions in the books were selected from 20 reference books around the world. Major topics in the 11th edition Changes in the 11th edition, published 2013-2015, reflect the 2009 revision of South Korea's National Curriculum. Each of the six volumes consist of two versions, one for average students () and one for higher-ability students (). Mathematics I Polynomials (다항식 da-hang-sik) Equations and Inequalities (방정식과 부등식 bang-jeong-sik-gwa boo-deung-sik) Graphs of Equations (방정식의 그래프 bang-jeong-sik-eui geu-re-pu) Mathematics II Sets and Propositions (집합과 명제 jib-hab-gwa myung-jeh) Functions (함수 ham-soo) Sequences (수열 soo-yeul) Exponents and Logarithms (지수와 로그함수 ji-soo-wa lo-geu-ham-soo) Probability and Statistics Permutations and Combinations (순열과 조합 soon-yeul-gwa jo-hab) Probability (확률 hwang-lyul) Statistics (통계 tong-gye) Calculus I Limits of Sequences (수열의 극한 soo-yeul-eui geuk-han) Limits and Continuity (극한과 연속성 geuk-han-gwa yeon-sok-sung) Differentiation of Polynomial Functions (다항식의 미분 da-hang-sik-eui mi-boon) Integration of Polynomial
https://en.wikipedia.org/wiki/Franklin%27s%20electrostatic%20machine
Franklin's electrostatic machine is a high-voltage static electricity-generating device used by Benjamin Franklin in the mid-18th century for research into electrical phenomena. Its key components are a glass globe which turned on an axis via a crank, a cloth pad in contact with the spinning globe, a set of metal needles to conduct away the charge developed on the globe by its friction with the pad, and a Leyden jara high-voltage capacitorto accumulate the charge. Franklin's experiments with the machine eventually led to new theories about electricity and inventing the lightning rod. Background Franklin was not the first to build an electrostatic generator. European scientists developed machines to generate static electricity decades earlier. In 1663, Otto von Guericke generated static electricity with a device that used a sphere of sulfur. Francis Hauksbee developed a more advanced electrostatic generator around 1704 using a glass bulb that had a vacuum. He later replaced the globe with a glass tube of about emptied of air. The glass tube was a less effective static generator than the globe, but it became more popular because it was easier to use. Machines that generated static electricity with a glass disc were popular and widespread in Europe by 1740. In 1745, German cleric Ewald Georg von Kleist and Dutch scientist Pieter van Musschenbroek discovered independently that the electric charge from these machines could be stored in a Leyden jar, named after the city of Leiden in the Netherlands. In 1745, Peter Collinson, a businessman from London who corresponded with American and European scientists, donated a German "glass tube" along with instructions how to make static electricity, to Franklin's Library Company of Philadelphia. Collinson was the library's London agent and provided the latest technology news from Europe. Franklin wrote a letter to Collinson on March 28, 1747, thanking him, and saying the tube and instructions had motivated several colleague
https://en.wikipedia.org/wiki/Miss%20Universe%202016
Miss Universe 2016 was the 65th Miss Universe pageant, held at the SM Mall of Asia Arena, in Pasay, Metro Manila, Philippines on 30 January 2017. This is the second time in the history of the competition that the pageant skipped an entire year, following the 2014 pageant which was held in January 2015. At the end of the event, Pia Wurtzbach of the Philippines crowned Iris Mittenaere of France as Miss Universe 2016. This is France's first victory in sixty-three years, and the second victory of the country in the pageant's history. Contestants from eighty-six countries and territories competed in this year's pageant. The competition featured Steve Harvey as host, and supermodel Ashley Graham as the backstage host. American entertainers Flo Rida and Boyz II Men performed in this year's pageant. Background Location and date The Miss Universe Organization was in talks to host the Miss Universe 2016 competition in the Philippines. Discussions began when Miss Universe 2015 Pia Wurtzbach met with then-Philippine President Rodrigo Duterte. Although Duterte was open to having the pageant hosted by the Philippines, he did not want the government to pay the expense of doing so. About two weeks after the meeting, the Department of Tourism named the Philippines as the host country. According to Miss Universe Organization president Paula Shugart, the Philippines is the organization's top choice for hosting the pageant. However, other countries were being considered, according to a spokesperson for the department. Despite the statement made by the Department of Tourism, the decision to hold the pageant in the Philippines is not yet final, and over the next few months, the Miss Universe Organization changed its mind several times on the matter. Initial reports did not disclose the reasons for the breakdowns in negotiations, but a report linked the Organization's concerns with Duterte's controversial remarks regarding U.S. President Barack Obama, as well as his plans to separat
https://en.wikipedia.org/wiki/Sentroller
A sentroller, used in the Internet of things is a sensor, controller or actuator or combination of these three. Sentrollers in the Internet of things The current Internet is an Internet of people, based on people communicating with people, using smartphones, tablets, laptops and computers, but this is changing: equipment and devices connected to the Internet (e.g. set-top boxes, cameras, cars) are starting to shift the balance away from people towards things. The future is clearly moving into a direction where the number of things connected to the Internet will overwhelm the number of connected people. Predictions range up to a factor of 100 to 1 or more, and thus the Internet of people will transform into the Internet of things. Thereby, the Internet of things will connect to and communicate directly with other "things", rather than directly with people. Many of the new things connected to the Internet will be sentrollers, which means they are either actuators, sensors, controllers, or combinations of these three things. One simple example is a home thermostat. A thermostat is a sentroller as it senses the temperature in the home, checks whether the home or room in which the thermostat is monitoring temperature is at the desired temperature, and if not, turns on the heater or the air conditioner. Therefore, a thermostat is a sensor and a controller – a sentroller. No human interaction with the thermostat or the cloud will be necessary for the thermostat to keep the heat in the home at the right level. In practice, sentrollers absorb and/or produce very limited amounts of information, but connectivity to the internet is essential for their operation. The Internet of things will host the applications that know how to interpret the information provided by sentrollers and what action to be taken. The smarts of the smart home, smart energy, smart buildings, etc. actually reside in the cloud. The sentrollers are the end nodes that will become the majority population o
https://en.wikipedia.org/wiki/Delpher
Delpher is a website providing full-text Dutch-language digitized historical newspapers, books, journals and copy sheets for radio news broadcasts. The material is provided by libraries, museums and other heritage institutions and is developed and managed by the Royal Library of the Netherlands. Delpher is freely available and includes as of June 2022 in total over 130 million pages from about 2 million newspapers, 900,000 books and 12 million journal pages that date back to the 15th century. Collections Books: 900,000 books, from the 17th century onwards Journals: 12 million journal articles from 1800-2000 Newspapers: about 17 million pages from more than 2 million issues from the Netherlands, Dutch East Indies, Netherlands Antilles and Surinam, from 1618 to 2005. This represents about 15% of the total published newspaper output in the Netherlands in this period. Typoscripts for radio broadcasts by the Algemeen Nederlands Persbureau (ANP), 1.474.359 million typed sheets from 1937 to 1984. Notes External links Geschiedenis24 tests Delpher; New search system of great value for research, Jurryt van de Vooren on NPO Geschiedenis, 20-11-2013 Van beta naar beter, M. Napolitano en M. Laan, Informatieprofessional 2015-01 (offline) Dutch digital libraries Online archives Scholarly search services
https://en.wikipedia.org/wiki/Nikolai%20Ivanov%20%28mathematician%29
Nikolai V. Ivanov (, born 1954) is a Russian mathematician who works on topology, geometry and group theory (particularly, modular Teichmüller groups). He is a professor at Michigan State University. He obtained his Ph.D. under the guidance of Vladimir Abramovich Rokhlin in 1980 at the Steklov Mathematical Institute. According to Google Scholar, on 5 July 2020, Ivanov's works had received 2,376 citations and his h-index was 22. He is a fellow of the American Mathematical Society since 2012. He is the author of the 1992 book Subgroups of Teichmüller Modular Groups. Among his contributions to mathematics are his classification of subgroups of surface mapping class groups, and the establishment that surface mapping class groups satisfy the Tits alternative. Selected publications "Automorphisms of complexes of curves and of Teichmuller spaces" (1997), International Mathematics Research Notices 14, pp. 651–666. with John D. McCarthy: "On injective homomorphisms between Teichmüller modular groups I" (1999), Inventiones mathematicae 135 (2), pp. 425–486. "On the homology stability for Teichmüller modular groups: closed surfaces and twisted coefficients" (1993), Contemporary Mathematics 150, pp. 149–149. References External links N. V. Ivanov website Ivanov's blog 1954 births Topologists Geometers Living people Fellows of the American Mathematical Society Michigan State University faculty Steklov Institute of Mathematics alumni 20th-century Russian mathematicians 21st-century Russian mathematicians Soviet mathematicians
https://en.wikipedia.org/wiki/Soil-adjusted%20vegetation%20index
Empirically derived NDVI products have been shown to be unstable, varying with soil colour, soil moisture, and saturation effects from high density vegetation. In an attempt to improve NDVI, Huete developed a vegetation index that accounted for the differential red and near-infrared extinction through the vegetation canopy. The index is a transformation technique that minimizes soil brightness influences from spectral vegetation indices involving red and near-infrared (NIR) wavelengths. The index is given as: where L is a canopy background adjustment factor. An L value of 0.5 in reflectance space was found to minimize soil brightness variations and eliminate the need for additional calibration for different soils. The transformation was found to nearly eliminate soil-induced variations in vegetation indices. References External links SAVI Derivation from First Principles SAVI Specifications for Landsat SAVI vs NDVI Spectral Comparison Satellite meteorology Remote sensing Biogeography
https://en.wikipedia.org/wiki/Vivado
Vivado Design Suite is a software suite produced by AMD (previously Xilinx) for synthesis and analysis of hardware description language (HDL) designs, superseding Xilinx ISE with additional features for system on a chip development and high-level synthesis. Vivado represents a ground-up rewrite and re-thinking of the entire design flow (compared to ISE). Like the later versions of ISE, Vivado includes the in-built logic simulator. Vivado also introduces high-level synthesis, with a toolchain that converts C code into programmable logic. Replacing the 15 year old ISE with Vivado Design Suite took 1000 man-years and cost US$200 million. Features Vivado was introduced in April 2012, and is an integrated design environment (IDE) with system-to-IC level tools built on a shared scalable data model and a common debug environment. Vivado includes electronic system level (ESL) design tools for synthesizing and verifying C-based algorithmic IP; standards based packaging of both algorithmic and RTL IP for reuse; standards based IP stitching and systems integration of all types of system building blocks; and the verification of blocks and systems. A free version WebPACK Edition of Vivado provides designers with a limited version of the design environment. Components The Vivado High-Level Synthesis compiler enables C, C++ and SystemC programs to be directly targeted into Xilinx devices without the need to manually create RTL. Vivado HLS is widely reviewed to increase developer productivity, and is confirmed to support C++ classes, templates, functions and operator overloading. Vivado 2014.1 introduced support for automatically converting OpenCL kernels to IP for Xilinx devices. OpenCL kernels are programs that execute across various CPU, GPU and FPGA platforms. The Vivado Simulator is a component of the Vivado Design Suite. It is a compiled-language simulator that supports mixed-language, Tcl scripts, encrypted IP and enhanced verification. The Vivado IP Integrator allows
https://en.wikipedia.org/wiki/Peirce%27s%20law
In logic, Peirce's law is named after the philosopher and logician Charles Sanders Peirce. It was taken as an axiom in his first axiomatisation of propositional logic. It can be thought of as the law of excluded middle written in a form that involves only one sort of connective, namely implication. In propositional calculus, Peirce's law says that ((P→Q)→P)→P. Written out, this means that P must be true if there is a proposition Q such that the truth of P follows from the truth of "if P then Q". In particular, when Q is taken to be a false formula, the law says that if P must be true whenever it implies falsity, then P is true. In this way Peirce's law implies the law of excluded middle. Peirce's law does not hold in intuitionistic logic or intermediate logics and cannot be deduced from the deduction theorem alone. Under the Curry–Howard isomorphism, Peirce's law is the type of continuation operators, e.g. call/cc in Scheme. History Here is Peirce's own statement of the law: A fifth icon is required for the principle of excluded middle and other propositions connected with it. One of the simplest formulae of this kind is: This is hardly axiomatical. That it is true appears as follows. It can only be false by the final consequent x being false while its antecedent (x → y) → x is true. If this is true, either its consequent, x, is true, when the whole formula would be true, or its antecedent x → y is false. But in the last case the antecedent of x → y, that is x, must be true. (Peirce, the Collected Papers 3.384). Peirce goes on to point out an immediate application of the law: From the formula just given, we at once get: where the a is used in such a sense that (x → y) → a means that from (x → y) every proposition follows. With that understanding, the formula states the principle of excluded middle, that from the falsity of the denial of x follows the truth of x. (Peirce, the Collected Papers 3.384). Warning: ((x→y)→a)→x is not a tautology. How