source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Ultra-high-definition%20television | Ultra-high-definition television (also known as Ultra HD television, Ultra HD, UHDTV, UHD and Super Hi-Vision) today includes 4K UHD and 8K UHD, which are two digital video formats with an aspect ratio of 16:9. These were first proposed by NHK Science & Technology Research Laboratories and later defined and approved by the International Telecommunication Union (ITU).
The Consumer Electronics Association announced on October 17, 2012, that "Ultra High Definition", or "Ultra HD", would be used for displays that have an aspect ratio of 16:9 or wider and at least one digital input capable of carrying and presenting native video at a minimum resolution of . In 2015, the Ultra HD Forum was created to bring together the end-to-end video production ecosystem to ensure interoperability and produce industry guidelines so that adoption of ultra-high-definition television could accelerate. From just 30 in Q3 2015, the forum published a list up to 55 commercial services available around the world offering 4K resolution.
The "UHD Alliance", an industry consortium of content creators, distributors, and hardware manufacturers, announced during a Consumer Electronics Show (CES) 2016 press conference its "Ultra HD Premium" specification, which defines resolution, bit depth, color gamut, high dynamic range (HDR) performance required for Ultra HD (UHDTV) content and displays to carry their Ultra HD Premium logo.
Alternative terms
Ultra-high-definition television is also known as Ultra HD, UHD, UHDTV, and 4K. In Japan, 8K UHDTV will be known as Super Hi-Vision since Hi-Vision was the term used in Japan for HDTV. In the consumer electronics market companies had previously only used the term 4K at the 2012 CES but that had changed to "Ultra HD" during CES 2013. "Ultra HD" was selected by the Consumer Electronics Association after extensive consumer research, as the term has also been established with the introduction of "Ultra HD Blu-ray".
Technical details
Resolution
Two resolutio |
https://en.wikipedia.org/wiki/%C3%93scar%20Pastor%20%28computer%20scientist%29 | Óscar Pastor (born 3 March 1962 in Valencia) is a Spanish computer scientist, Professor of software production methods at the Department of Information Systems and Computing of Universitat Politècnica de València, and the director of the Research Centre in Software Production Methods (PROS).
Biography
Óscar ended high school in Instituto Benlliure (Valencia) in 1980. In 1985, he received a bachelor's degree on Physics from Universitat de València, where he specialised in Electronics and Computer Science. In 1992, he received a PhD from Universitat Politècnica de València with his thesis Diseño y Desarrollo de un Entorno de Producción Automática de Software basado en el Modelo Orientado a Objetos, supervised by Isidro Ramos.
Former researcher at HP Labs (Bristol, UK), in 1986 he became an associate professor at the Faculty of Computer Science of Universitat Politècnica de València. From 1996 to 2002 he was a tenured professor. From 2002 to date, he is Full Professor.
Work
His main research interests include Software Engineering, Conceptual modeling, Model-driven development, genomic information systems (for Bioinformatics, Translational bioinformatics, Health informatics, etc.), and Empirical software engineering. He received the ER Fellow Award in 2010 for his contributions to the conceptual modeling area, and has been keynote speaker at a dozen of international conferences. He has also been strongly committed to technology transfer activities through the creation of spin-off companies such as Integranova and GEM Biosoft.
Within the area of model-driven software development, he advocates a full-model driven software lifecycle. He authored the OO-Method, an object-oriented, model-driven method for enterprise information systems, that is currently supported by the Integranova Software Solutions technology. The OO-Method covers the Platform-independent model layer (according to the Model-driven architecture paradigm). To tackle with modelling layers that are closer |
https://en.wikipedia.org/wiki/NG-PON2 | NG-PON2 (also known as TWDM-PON), Next-Generation Passive Optical Network 2 is a 2015 telecommunications network standard for a passive optical network (PON). The standard was developed by ITU and details an architecture capable of total network throughput of 40 Gbit/s, corresponding to up to 10 Gbit/s symmetric upstream/downstream speeds available at each subscriber.
A passive optical network is a last mile, fibre-to-the-x telecommunications network that broadcasts data through fibre optic cables. PONs are managed by passive optics such as unpowered splitters and filters, offering high reliability and low cost compared to active networks. The PON data stream is generally converted to a more traditional service such as Ethernet and Wi-Fi at the subscriber's location.
NG-PON2 is compatible with existing PON fibre by replacing optical line terminal (OLT) at the central office, and the optical network unit (ONU) near each end-user.
Unique to this standard is the use of both active filters and tunable lasers in the ONU.
From 2019 until 2021 a series of new Recommendations under the header Higher Speed PON (G.9804 series) was released intended as successors to NG-PON2.
Technical details
Wavelength allocations include 1524 nm to 1544 nm in the upstream direction and 1596 nm to 1602 nm in the downstream direction.
The architecture calls for time- and wavelength-division multiplexing (TWDM) in the upstream and downstream directions. Wavelength-division multiplexing is provided in the downstream direction by combining light from four fixed wavelength OLT lasers with a wavelength mux. The light is then filtered at each ONU with an actively tunable filter that passes only the desired downstream wavelength to its receiver. In the upstream direction, tunable lasers at each ONU are dynamically assigned to a wavelength. Fibres from all ONUs are combined with a passive mux/splitter. Time-division multiplexing is provided in the upstream direction through the use of burst l |
https://en.wikipedia.org/wiki/Online%20Abuse%20Prevention%20Initiative | The Online Abuse Prevention Initiative (OAPI) is a non-profit organization whose aim is to study and combat abuse on the Internet.
History
OAPI was created by Randi Lee Harper in response to Twitter's lack of tools for filtering online harassment. OAPI was founded in 2015, with Crash Override Network's Zoë Quinn and Alex Lifschitz stated as serving on the inaugural board of directors. In March 2015 Quinn announced a formal partnership between the two organizations.
Activities
The stated goals of the OAPI are to study online abuse, and to reduce and mitigate it through technical measures and collaboration with tech companies. Its first public campaign was an open letter to ICANN, the organization responsible for coordinating the Internet's Domain Name System, opposing the latter's plans to end anonymity of WHOIS records for commercial websites. OAPI argues that ICANN's proposals will make it easier for abusers to physically endanger domain name registrants through doxxing and swatting, and that those marginalized for their race, gender, or sexual orientation are disproportionately at risk. The letter attracted signatures and support from over fifty organizations supporting online privacy or protection of at-risk communities, including the Electronic Frontier Foundation, The Tor Project, and the National Coalition Against Domestic Violence.
References
External links
Cyberbullying
Gamergate (harassment campaign)
Internet culture
Organizations established in 2015
Video game culture |
https://en.wikipedia.org/wiki/BellaNaija | BellaNaija is a Nigerian lifestyle, entertainment, and fashion website headquartered in Lagos, Nigeria.
History
BellaNaija was founded by Uche Eze in 2006. In its early form, BellaNaija featured scanned magazine articles, pictures, and interviews of Nigerian fashion personalities.
Achievements
In 2013, BellaNaija was ranked fourth in AfricaRanking's "Top 10 African Entertainment Websites." Uche Pedro and BellaNaija were also recognized on the SME 100 List of the 100 most creative female-owned firms in Nigeria. They completed the Stanford Seed program and the BBNWonderland – BN Lead Weddings Flagship Event with Baileys.
Awards
References
External links
Nigerian news websites
Lifestyle websites
Magazines established in 2006
2006 establishments in Nigeria
Online magazines
Magazines published in Lagos
Online magazines published in Nigeria |
https://en.wikipedia.org/wiki/Ternary%20equivalence%20relation | In mathematics, a ternary equivalence relation is a kind of ternary relation analogous to a binary equivalence relation. A ternary equivalence relation is symmetric, reflexive, and transitive. The classic example is the relation of collinearity among three points in Euclidean space. In an abstract set, a ternary equivalence relation determines a collection of equivalence classes or pencils that form a linear space in the sense of incidence geometry. In the same way, a binary equivalence relation on a set determines a partition.
Definition
A ternary equivalence relation on a set is a relation , written , that satisfies the following axioms:
Symmetry: If then and . (Therefore also , , and .)
Reflexivity: . Equivalently, if , , and are not all distinct, then .
Transitivity: If and and then . (Therefore also .)
References
Mathematical relations
Incidence geometry
Projective geometry |
https://en.wikipedia.org/wiki/Apache%20Brooklyn | Apache Brooklyn is an open-source framework for modeling, deploying and managing distributed applications defined using declarative YAML blueprints. The design is influenced by Autonomic computing and promise theory and implements the OASIS CAMP (Cloud Application Management for Platforms).
Apache Brooklyn blueprint
Brooklyn blueprint can define application topology, application topology component and cloud or non-cloud location.
Related projects
Cloudsoft AMP expands Apache Brooklyn and allows to write application blueprints in TOSCA (Topology and Orchestration Specification for Cloud Applications) as well as in CAMP.
References
External links
https://brooklyn.apache.org/learnmore/theory.html
https://brooklyn.apache.org/learnmore/features/index.html
Configuration management
Brooklyn
Software using the Apache license
Java platform
Software distribution
2012 software |
https://en.wikipedia.org/wiki/Francisco%20Santos%20Leal | Francisco (Paco) Santos Leal (born May 28, 1968) is a Spanish mathematician at the University of Cantabria, known for finding a counterexample to the Hirsch conjecture in polyhedral combinatorics. In 2015 he won the Fulkerson Prize for this research.
Santos was born in Valladolid, Spain. He earned a licenciate in mathematics from the University of Cantabria in 1991, and a master's degree in pure mathematics from Joseph Fourier University in Grenoble, France in the same year. He returned to Cantabria for his doctorate, which he finished in 1995, with a thesis on the combinatorial geometry of algebraic curves and Delaunay triangulations supervised by Tomás Recio. He also has a second licenciate, in physics, from Cantabria in 1996. After postdoctoral studies at the University of Oxford he returned to Cantabria as a faculty member in 1997, and was promoted to full professor in 2008. From 2009 to 2013 he has been vice-dean of the Faculty of Sciences at Cantabria.
As well as being honored by the Fulkerson Prize in 2015 for a counter-example of the Hirsch conjecture, he was an invited sectional speaker at the 2006 International Congress of Mathematicians.
Santos is an Editor-in-Chief of the Electronic Journal of Combinatorics.
References
External links
Home page
Google scholar profile
1968 births
Living people
People from Valladolid
Geometers
Academic staff of the University of Cantabria
20th-century Spanish mathematicians
21st-century Spanish mathematicians
Grenoble Alpes University alumni |
https://en.wikipedia.org/wiki/Sensor%20fish | A sensor fish is a small, plastic tubular device containing sensors. It is designed to record information such as the physical stresses that a fish experiences while navigating currents from dam turbines.
Description
Created by the US Department of Energy's Pacific Northwest National Laboratory (PNNL), the tubular device is long, in diameter, and weighs . It is roughly the same size as a juvenile salmon. The sensor fish has neutral buoyancy allowing it to remain underwater. Inside are sensors and a lithium-ion battery. Taking 2,048 measurements each second, it is able to record five minutes of turbulence, pressure, and acceleration, saving the data to flash memory. It records a maximum of 1.2 MPa (174 pounds per square inch) of external pressure, up to 200 gs of acceleration, temperatures ranging from -40 to 127 °C (-40 and +260 degrees F), and rotational velocity of up to 2,000 degrees per second.
Construction
The sensor fish is built manually at the Bio-Acoustics & Flow Laboratory within the PNNL. It receives funding from the Electric Power Research Institute and the US Department of Energy's Office of Energy Efficiency and Renewable Energy.
Specifications
The following are the specifications as stated by the Pacific Northwest National Laboratory:
Power: rechargeable 3.7-volt lithium-ion battery
Length: ~90 mm
Diameter: ~25 mm
Mass: ~42.1g
Cost: $1,200 each
Gyroscope: Model ITG-3200, InvenSense Inc.
Orientation: Model LSM303DLHC eCompass module made by STMicroelectronics, Geneva, Switzerland
Usage: Kaplan turbine; Francis turbine; small hydropower structures; pumped storage hydroelectric facilities
Memory: ~5 minutes of data with flash memory
Speed: 2,048 measurements per second
Pressure: Model MS5412-BM, Measurement Specialties, Inc., made in Hampton, Virginia capable of 174 pounds per square inch of pressure
Acceleration: Model ADXL377 accelerometer, Analog Devices, Inc.
Rotational velocity: 2,000 degrees per second
Temperature range: -40 to +125 degrees |
https://en.wikipedia.org/wiki/Brain%E2%80%93brain%20interface | A brain–brain interface is a direct communication pathway between the brain of one animal and the brain of another animal.
Brain to brain interfaces have been used to help rats collaborate with each other. When a second rat was unable to choose the correct lever, the first rat noticed (not getting a second reward), and produced a round of task-related neuron firing that made the second rat more likely to choose the correct lever.
In 2013, Rajesh Rao was able to use electrical brain recordings and a form of magnetic stimulation to send a brain signal to Andrea Stocco on the other side of the University of Washington campus. In 2015, researchers linked up multiple brains, of both monkeys and rats, to form an "organic computer".
It is hypothesized that by using brain-to-brain interfaces (BTBIs) a biological computer, or brain-net, could be constructed using animal brains as its computational units. Initial exploratory work demonstrated collaboration between rats in distant cages linked by signals from cortical microelectrode arrays implanted in their brains. The rats were rewarded when actions were performed by the "decoding rat" which conformed to incoming signals and when signals were transmitted by the "encoding rat" which resulted in the desired action. In the initial experiment the rewarded action was pushing a lever in the remote location corresponding to the position of a lever near a lighted LED at the home location. About a month was required for the rats to acclimate themselves to incoming "brainwaves."
Lastly, it is important to stress that the topology of BTBI does not need to be restricted to one encoder and one decoder subjects. Instead, we have already proposed that, in theory, channel accuracy can be increased if instead of a dyad a whole grid of multiple reciprocally interconnected brains are employed. Such a computing structure could define the first example of an organic computer capable of solving heuristic problems that would be deemed non-comp |
https://en.wikipedia.org/wiki/Kerry%20Mitchell | Kerry Mitchell (born 1961) is an American artist known for his algorithmic and fractal art, which has been exhibited at the Nature in Art Museum, The Bridges Conference, and the Los Angeles Center for Digital Art, and for his "Fractal Art Manifesto".
Life
Mitchell was born in Iowa, United States, in 1961. His parents were LeRoy and Shirley Mitchell. His father was an art teacher and mother was a stay-at-home mother until Mitchell started seventh grade. Mitchell was a Presidential Scholar in 1979 and went on to pursue engineering at and graduated from Purdue University in aerospace engineering, did a master's degree at Stanford University, and then a PhD work at Purdue. He worked at NASA doing aerospace research. He then worked as a scientist at Arizona Science Center. He served as a mathematics and science professor at the University of Advancing Technology in Tempe, Arizona. As of 2015, he works as a manager at Maricopa County Community College District in Tempe, Arizona.
Artwork
Alongside his technical career, Mitchell works on algorithmic art. He ascribes his artistic awakening to a 1985 article in Scientific American on the Mandelbrot set, explaining:
In 1999, Mitchell published his Fractal Art Manifesto. The artist Janet Parke notes that in the manifesto, Mitchell suggests that fractal art cannot be made by a computer alone, and that not everyone who has a computer can necessarily make good fractal art. Instead, she explains, Mitchell is arguing that the artist's creative process is needed to inject elements such as the considered selection of colours and gradients, the merging of multiple layers, and decisions on composition such as by zooming in to a fractal.
Mitchell also prepared tutorials on how to create fractal art with tools including Ultra Fractal. In 2011 he served on the panel of the "Fractal Art Contest".
Exhibitions, collections
Nature in Art Museum, Gloucestershire, 2007
The Bridges Conference, 2015
Los Angeles Center for Digital Art ( |
https://en.wikipedia.org/wiki/KDE%20Gear | The KDE Gear (also known as the KDE Applications Bundle or KDE Applications) is a set of applications and supporting libraries that are developed by the KDE community, primarily used on Linux-based operating systems but mostly multiplatform, and released on a common release schedule.
The bundle is composed of over 100 applications. Examples of prominent applications in the bundle include the file manager Dolphin, document viewer Okular, text editor Kate, archiving tool Ark and terminal emulator Konsole.
Previously the KDE Applications Bundle was part of the KDE Software Compilation.
Extragear
Software that is not part of the official KDE Applications bundle can be found in the "Extragear" section. They release on their own schedule and feature their own versioning numbers. There are many standalone applications like KTorrent, Krita or Amarok that are mostly designed to be portable between operating systems and deployable independent of a particular workspace or desktop environment. Some brands consist of multiple applications, such as Calligra Office Suite or KDE Kontact. There are several options for obtaining and installing KDE applications under Linux. Moreover, most of the KDE platform and applications have been ported to OpenBSD and NetBSD. While prior editions of KDE were often seen on other flavors of Unix, such as Solaris the popularity of the open source alternatives running on a wide range of hardware (having been ported to nearly every RISC and x86 64 processors) has made KDE projects on similar OSs less obvious.
List of applications part of the bundle
Development
Software development
KDE SDK is a collection of two dozen distinct integrated (both within the SDK but also with other KDE applications, e.g. many work with Dolphin, the default file manager) applications and components that work with/are part of KDevelop, and is suitable for general purpose software development in a range of languages. It provides the tooling used to engineer KDE, an |
https://en.wikipedia.org/wiki/C%C3%A9sar%20Camacho | César Leopoldo Camacho Manco (born 15 April 1943 in Lima, Peru), better known as simply César Camacho, is a Peruvian-born Brazilian mathematician and former director of the IMPA. His area of research is dynamical systems theory.
Camacho earned his Ph.D. from the University of California, Berkeley in 1971 under the supervision of Stephen Smale.
He is a member of the Brazilian Academy of Sciences and a recipient of 1996 TWAS Prize.
Selected publications
C. Camacho, P. Sad. "Invariant varieties through singularities of holomorphic vector fields", Annals of Mathematics, 1982
C. Camacho, A. L. Neto, P. Sad. "Topological invariants and equidesingularization for holomorphic vector fields", Journal of Differential Geometry, 1984
References
1943 births
Living people
Members of the Brazilian Academy of Sciences
Dynamical systems theorists
People from Lima
Instituto Nacional de Matemática Pura e Aplicada researchers
20th-century Brazilian mathematicians
TWAS laureates |
https://en.wikipedia.org/wiki/Giovanni%20Forni | Giovanni Forni is an Italian mathematician at the University of Maryland known for his research in dynamical systems.
After graduating from the University of Bologna in 1989, he obtained his PhD in 1993 from Princeton University, under the supervision of John Mather.
He was an invited speaker at the 2002 International Congress of Mathematicians in Beijing.
For his work on solutions of cohomological equations for flows on surfaces, and on the Kontsevich–Zorich conjecture concerning deviation of ergodic averages, he was awarded the 2008 Michael Brin Prize in Dynamical Systems.
In 2012, he became a fellow of the American Mathematical Society.
References
Living people
Italian mathematicians
University of Bologna alumni
Princeton University alumni
University of Maryland, College Park faculty
Fellows of the American Mathematical Society
Dynamical systems theorists
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/JamBase | JamBase is an online database and news portal of live music and festivals with a focus on jam bands. It was founded by Andy Gadiel and Ted Kartzman in 1998. The website primarily acts as a service, providing a public API that concert promoters and venues use to publish concert data to the site. The data is also used by third-party developers for other products. In addition to raw data, the website includes a news section publishing information about concerts in a blog format.
, JamBase ranks as the 4,945th most visited sites in the United States according to Alexa, and 27,837th globally.
, JamBase's public API at http://api.jambase.com has been re-enabled, allowing developers to incorporate concert listings into their apps and services.
References
External links
Online databases
1998 establishments in the United States
American music websites |
https://en.wikipedia.org/wiki/Integer%20complexity | In number theory, the integer complexity of an integer is the smallest number of ones that can be used to represent it using ones and any number of additions, multiplications, and parentheses. It is always within a constant factor of the logarithm of the given integer.
Example
For instance, the number 11 may be represented using eight ones:
11 = (1 + 1 + 1) × (1 + 1 + 1) + 1 + 1.
However, it has no representation using seven or fewer ones. Therefore, its complexity is eight.
The complexities of the numbers 1, 2, 3, ... are
1, 2, 3, 4, 5, 5, 6, 6, 6, 7, 8, 7, 8, 8, 8, 8, 9, 8, ...
The smallest numbers with complexity 1, 2, 3, ... are
1, 2, 3, 4, 5, 7, 10, 11, 17, 22, 23, 41, 47, ...
Upper and lower bounds
The question of expressing integers in this way was originally considered by . They asked for the largest number with a given complexity ; later, Selfridge showed that this number is
For example, when , and the largest integer that can be expressed using ten ones is . Its expression is
(1 + 1) × (1 + 1) × (1 + 1 + 1) × (1 + 1 + 1).
Thus, the complexity of an integer is at least . The complexity of is at most (approximately ): an expression of this length for can be found by applying Horner's method to the binary representation of . Almost all integers have a representation whose length is bounded by a logarithm with a smaller constant factor, .
Algorithms and counterexamples
The complexities of all integers up to some threshold can be calculated in total time .
Algorithms for computing the integer complexity have been used to disprove several conjectures about the complexity.
In particular, it is not necessarily the case that the optimal expression for a number is obtained either by subtracting one from or by expressing as the product of two smaller factors. The smallest example of a number whose optimal expression is not of this form is 353942783. It is a prime number, and therefore also disproves a conjecture of Richard K. Guy that the complexity |
https://en.wikipedia.org/wiki/WJNK-LD | WJNK-LD (channel 34) is a low-power television station in Nashville, Tennessee, United States. The station is owned by Edge Spectrum, Inc.
History
Early years
The station signed on the air on June 25, 1986, under the ownership of Tiger Eye Broadcasting as W61AR, broadcasting on analog UHF channel 61. The station moved to analog channel 54 for a few months under the callsign W52AR from January until April 1989, when it returned to channel 61 and reverted to the station's original callsign. The station became WJNK-LP when it relocated to analog channel 34 in 1997, and had broadcasting on that channel ever since. From the station's sign on in 1986 until 1999, the station was an independent station and also carried FamilyNet as a secondary affiliation.
As a 3ABN O&O station
On January 20, 1999, Tiger Eye Broadcasting sold WJNK-LP to 3ABN. The sale of the station was finalized on April 13, 1999, and at the same time, the station switched to broadcasting Religious Programming from 3ABN 24 hours a day, as the station would broadcast in that format & broadcast programming from 3ABN until December 10, 2021.
Sale to Edge Spectrum
On March 9, 2017, Three Angels Broadcasting Network filed to sell WJNK-LD to Edge Spectrum Inc. The sale & transfer was finalized on August 31, 2017. 3ABN would continue to operate the Station, Until October 1, 2018, when Edge Spectrum fully took over operations of WJNK. Also under new ownership & on October 1, 2018, 3ABN Proclaim was discontinued from 34.2, to make way for a new religious network "Quo Vadis", which debuted on November 1, 2018, In addition, 3ABN Latino was also discontinued from 34.4, and it would be replaced a month later with Daystar on November 15, 2018. However, on January 1, 2019, both Quo Vadis and Daystar would be discontinued from channels 34.2 and 34.4 at the same time without warning.
Conversion to ATSC 3.0
Edge Spectrum (Owner of WJNK-LD) recently announced that all of their stations (including WJNK-LD) will convert t |
https://en.wikipedia.org/wiki/Paramural%20body | Paramural bodies are membranous or vesicular structures located between the cell walls and cell membranes of plant and fungal cells. When these are continuous with the cell wall, they are termed lomasomes, while they are referred to as plasmalemmasomes if associated with the plasmalemma.
Function
While their function has not yet been studied in great detail, it has been speculated that due to the morphological similarity of paramural bodies to the exosomes produced by mammalian cells, they may perform similar functions such as membrane vesicle trafficking between cells. Current evidence suggests that, like exosomes, paramural bodies are derived from multivesicular bodies.
See also
Exosome
Endosome
Golgi apparatus
References
Cell biology
Biochemistry |
https://en.wikipedia.org/wiki/Beck%20Technology | Beck Technology is a software development company servicing the construction industry. The company is based in Dallas, Texas. Beck Technology offers a suite of products under DESTINI: design estimation integration initiative. Products include DESTINI Estimator, DESTINI Bid Day, DESTINI Profiler (aka DProfiler), and DESTINI Optioneer (as a service). Beck Technology serves builders as well as owners/developers with pro formas and scope build out.
Beck Technology was founded in 1996 as an internal group of The Beck Group. DESTINI Profiler was a proprietary software which provides immediate costs for buildings as they were modeled in the conceptual and schematic design phases. In 2006, DESTINI Profiler was launched commercially to the construction market. A consulting arm of Beck Technology was formed in 2008 to assist owners, developers, and general contractors with the use of DESTINI Profiler. DESTINI Profiler gives builders the tools to provide real-time cost data and feedback to owners and architects, as well as giving the preconstruction team a major advantage and winning contracts.
In 2013, Sundt Construction approached Beck Technology to provide significant input on a new estimating platform to work with DESTINI Profiler data. The result of the project was the first iteration of DESTINI Estimator. DESTINI Estimator was rolled out in 2014 to Sundt Construction and then commercially released in 2015. As of 2022, over 3,000 estimators in the United States and Canada use DESTINI Estimator to estimate complex commercial construction projects.
In 2022, Beck Technology released DESTINI Bid Day, a bid leveling software. Bid Day was the first software from Beck Technology to be fully hosted on the web and allows users to quickly mitigate risk in the selection of sub-contractors while pulling sub-contractor data into the estimate within DESTINI Estimator.
Presently, the company is headquartered in Santander Tower (formerly called Thanksgiving Tower) of Downtown Dallas. |
https://en.wikipedia.org/wiki/JADE%20%28planning%20system%29 | Joint Assistant for Development and Execution (JADE) is a U.S. military system used for planning the deployment of military forces in crisis situations.
The U.S. military developed this automated planning software system in order to expedite the creation of the detailed planning needed to deploy military forces for a military operation. JADE uses Artificial Intelligence (AI) technology combining user input, a knowledge base of stored plans, and suggestions by the system to provide the ability to develop large-scale and complex plans in minimal time.
History
In 1999, the operational tool used for managing force deployment planning in the U.S. military was the Joint Operation Planning and Execution System (JOPES). The JADE tool for rapid crisis action planning had been developed by BBN Technologies under a contract to DARPA within the ARPA-Rome Planning Initiative, but was available only in a prototype environment. In subsequent years, JADE was successfully demonstrated and then integrated into the Global Command and Control System (GCCS) and the Adaptive Course of Action (ACOA) environment while meeting the requirements of the Defense Information Infrastructure Common Operating Environment (DII-COE).
An official 2016 document approved for public release titled Human Systems Roadmap Review describes plans to create autonomous weapon systems that analyze social media and make decisions, including the use of lethal force, with minimal human involvement. This type of system is referred to as a Lethal Autonomous Weapon System (LAWS).
The name "JADE" comes from the jade green color seen on the island of Oahu in Hawaii where the U.S. Pacific Command (PACOM) is headquartered.
JFRG II will be replaced with JADE.
Components
JADE integrates the technology of three software systems:
ForMAT (Force Management and Analysis Tool) – a case-based reasoning (CBR) force deployment planning tool that uses past experience (past planned Force modules (FMs)); the tool was developed |
https://en.wikipedia.org/wiki/Mathematical%20sculpture | A mathematical sculpture is a sculpture which uses mathematics as an essential conception. Helaman Ferguson, George W. Hart, Bathsheba Grossman, Peter Forakis and Jacobus Verhoeff are well-known mathematical sculptors.
References
Mathematics and art
Sculpture |
https://en.wikipedia.org/wiki/Howard%20the%20Duck%20%28video%20game%29 | Howard the Duck, also known as Howard the Duck: Adventure on Volcano Island, is an action video game released in 1986 by Activision for the ZX Spectrum, Commodore 64 and Apple II. The game is a tie-in to the film Howard the Duck from the same year.
Gameplay
The game involves players controlling Howard the Duck to save his best friends, Phil and Beverly. After being parachuted to Volcano Island, Howard needs to find a backpack to proceed with the search. The game consists then of four levels, in the last of which Howard, armed with a neutron gun, will finally face Overlord.
Reception
Like the film, the game also received fairly negative reviews. Computer Gamer gave an overall 55%, by stating "beautifully presented, and well-programmed, it rates as one of Activision's better recent releases and deserves consideration outside its unfortunate tie-in", predicting, however, low longevity. Aktueller Software Markt described the game as not fulfilling the expectancies and not worth the money.
References
External links
Howard the Duck at IGN
Howard the Duck at MobyGames
1986 video games
Activision beat 'em ups
Action games
Amstrad CPC games
Apple II games
Commodore 64 games
MSX games
Superhero video games
Video games scored by Russell Lieblich
Video games developed in the United Kingdom
ZX Spectrum games
Video games about birds
Video games based on Marvel Comics films
Video games based on films
Video games based on adaptations
Video games set on fictional islands
Alternative Software games |
https://en.wikipedia.org/wiki/Rate%20sensor | A rate sensor is a sensor that measures a rate (or rate of change). It may refer to:
Angular rate sensor
Rate gyro
Yaw-rate sensor
Heart rate sensor
Breath rate sensor
Oxygen transmission rate sensors
Moisture vapor transmission rate sensors
See also
Sensor based Variable Rate Application
Sensors |
https://en.wikipedia.org/wiki/Denso%20mapcode | The Denso MapCode system is a spatial reference system (not to be confused with the international mapcode system, a different spatial reference system). Denso MapCodes are 7- to 10-digit codes identifying specific 900-square-meter areas in Japan.
History
The Denso MapCode system was developed in 1997 by Denso Corporation for easy identification of any location in Japan by Japanese navigation systems. Car navigation systems are unable to identify locations for which addresses or telephone numbers are not available or house numbers, like in Japan, are not sequential. The Denso MapCode system enables accurate pinpointing by number, predetermined according to latitude and longitude.
The use of MapCodes is free to end users but corporations wanting to commercialise it will need to sign a contract with Denso and pay a fee. In Japan, car navigation system suppliers such as Denso itself, Clarion, Kenwood, Fujitsu Ten, Sony, Panasonic, Pioneer and Alpine Electronics have adopted the system and Toyota, Honda, Nissan, Fuji Heavy Industries, BMW Japan, General Motors Japan, Jaguar Japan and Land Rover Japan have introduced it in their vehicles.
Design principles
The Denso MapCode system divided Japan into 1162 zones, each zone into 900 blocks, and each block into 900 areas. A Denso MapCode number consists of the zone number (up to 4 digits), the block number (always 3 digits) and the area number (always 3 digits), a numeric code of up to 10 digits.
As the MapCode numbers proved too coarse for certain situations (this first version identified an area with a radius of about 100 meters ), the system was extended in 2004: by adding an asterisk and two extra digits, a specific cell of 9 square meters can be identified within an area. The design of the division in blocks is graphically explained on the website of Denso.
Application
Unfortunately, neither Garmin nor TomTom publish their own car navigation maps for Japan, although a third-party map for Garmin is available from |
https://en.wikipedia.org/wiki/DRUM%20Agency | DRUM Agency was an independently owned marketing agency with operations in Atlanta, New York City and Chicago. It shut down without notice on April 15, 2020. It was the result of the merger of BKV (Bennett Kuhn Varner), unified.agency, Hiccup and Umarketing firms. The oldest agency, BKV, originally specialized in direct response marketing, then later expanded into traditional media, followed by digital media. Clients included both for-profit businesses and nonprofit organizations.
History
BKV
BKV was founded as Bennet Kuhn Varner in 1981 with Six Flags Theme Parks as one of the first clients.
In 1996, BKV created and produced a two-minute DRTV commercial for Dirt Devil to introduce the Broom Vac three months before a retail launch. This direct response television campaign sold a total of 100,000 units during the period. The ad was launched after the Christmas season and helped lead into the Mother's Day gift-buying season.
Early and mid-March 2001, BKV launched a series of direct response television commercials for Marietta's Matria Healthcare Inc. for their diabetes self-care division. The DRTV commercials target audience was seniors age 65 and over. They were to call a toll-free number to order diabetes-care supplies through the mail instead of through pharmacies.
June 2001, Direct Results Network was created as a sister company of BKV. In 2002, the name was changed to Response Mine Interactive (RMI).
In 2002, Ad Age named BKV one of the top agencies by U.S. direct marketing revenue at #49.
On Sept 2, 2005, BKV employees collected money on the streets of Buckhead for victims of Hurricane Katrina. Agency owners Brent Kuhn and Maribett Varner matched the donation raised and BKV sent $3,218 to the American Red Cross.
In 2006, BKV began using marketing techniques to better reach clients and consumers by using video and audio Podcasts and mobile platforms.
In 2007, Equifax chose BKV to handle its $11 million account for direct response, search engine optimi |
https://en.wikipedia.org/wiki/Error%20level%20analysis | Error level analysis (ELA) is the analysis of compression artifacts in digital data with lossy compression such as JPEG.
Principles
When used, lossy compression is normally applied uniformly to a set of data, such as an image, resulting in a uniform level of compression artifacts.
Alternatively, the data may consist of parts with different levels of compression artifacts. This difference may arise from the different parts having been repeatedly subjected to the same lossy compression a different number of times, or the different parts having been subjected to different kinds of lossy compression. A difference in the level of compression artifacts in different parts of the data may therefore indicate that the data has been edited.
In the case of JPEG, even a composite with parts subjected to matching compressions will have a difference in the compression artifacts.
In order to make the typically faint compression artifacts more readily visible, the data to be analyzed is subjected to an additional round of lossy compression, this time at a known, uniform level, and the result is subtracted from the original data under investigation. The resulting difference image is then inspected manually for any variation in the level of compression artifacts. In 2007, N. Krawetz denoted this method "error level analysis".
Additionally, digital data formats such as JPEG sometimes include metadata describing the specific lossy compression used. If in such data the observed compression artifacts differ from those expected from the given metadata description, then the metadata may not describe the actual compressed data, and thus indicate that the data have been edited.
Limitations
By its nature, data without lossy compression, such as a PNG image, cannot be subjected to error level analysis. Consequently, since editing could have been performed on data without lossy compression with lossy compression applied uniformly to the edited, composite data, the presence of a uniform |
https://en.wikipedia.org/wiki/Glaeser%27s%20continuity%20theorem | In mathematical analysis, Glaeser's continuity theorem is a characterization of the continuity of the derivative of the square roots of functions of class . It was introduced in 1963 by Georges Glaeser, and was later simplified by Jean Dieudonné.
The theorem states: Let be a function of class in an open set U contained in , then is of class in U if and only if its partial derivatives of first and second order vanish in the zeros of f.
References
Theorems in analysis |
https://en.wikipedia.org/wiki/Kolmogorov%E2%80%93Arnold%20representation%20theorem | In real analysis and approximation theory, the Kolmogorov–Arnold representation theorem (or superposition theorem) states that every multivariate continuous function can be represented as a superposition of the two-argument addition of continuous functions of one variable. It solved a more constrained form of Hilbert's thirteenth problem, so the original Hilbert's thirteenth problem is a corollary.
The works of Vladimir Arnold and Andrey Kolmogorov established that if f is a multivariate continuous function, then f can be written as a finite composition of continuous functions of a single variable and the binary operation of addition. More specifically,
.
where and .
There are proofs with specific constructions.
In a sense, they showed that the only true multivariate function is the sum, since every other function can be written using univariate functions and summing.
History
The Kolmogorov–Arnold representation theorem is closely related to Hilbert's 13th problem. In his Paris lecture at the International Congress of Mathematicians in 1900, David Hilbert formulated 23 problems which in his opinion were important for the further development of mathematics. The 13th of these problems dealt with the solution of general equations of higher degrees. It is known that for algebraic equations of degree 4 the solution can be computed by formulae that only contain radicals and arithmetic operations. For higher orders, Galois theory shows us that the solutions of algebraic equations cannot be expressed in terms of basic algebraic operations. It follows from the so called Tschirnhaus transformation that the general algebraic equation
can be translated to the form . The Tschirnhaus transformation is given by a formula containing only radicals and arithmetic operations and transforms. Therefore, the solution of an algebraic equation of degree can be represented as a superposition of functions of two variables if and as a superposition of functions of variables if . |
https://en.wikipedia.org/wiki/PerfKitBenchmarker | PerfKit Benchmarker is an open source benchmarking tool used to measure and compare cloud offerings. PerfKit Benchmarker is licensed under the Apache 2 license terms. PerfKit Benchmarker is a community effort involving over 500 participants including researchers, academic institutions and companies together with the originator, Google.
General
PerfKit Benchmarker (PKB) is a community effort to deliver a repeatable, consistent, and open way of measuring Cloud Performance. It supports a growing list of cloud providers including: Alibaba Cloud, Amazon Web Services, CloudStack, DigitalOcean, Google Cloud Platform, Kubernetes, Microsoft Azure, OpenStack, Rackspace, IBM Bluemix (Softlayer). In addition to Cloud Providers to supports container orchestration including Kubernetes and Mesos and local "static" workstations and clusters of computers .
The goal is to create an open source living benchmark [framework] that represents how Cloud developers are building applications, evaluating Cloud alternatives, learning how to architect applications for each cloud. Living because it will change and morph quickly as developers change.
PerfKit Benchmarker measures the end to end time to provision resources in the cloud, in addition to reporting on the most standard metrics of peak performance, e.g.: latency, throughput, time-to-complete, IOPS. PerfKit Benchmarker reduces the complexity in running benchmarks on supported cloud providers by unified and simple commands. It's designed to operate via vendor provided command line tools.
PerfKit Benchmarker contains a canonical set of public benchmarks. All benchmarks are running with default/initial state and configuration (Not tuned to in favor of any providers). This provides a way to benchmark across cloud platforms, while getting a transparent view of application throughput, latency, variance, and overhead.
History
PerfKit Benchmarker (PKB) was started by Anthony F. Voellm, Alain Hamel, and Eric Hankland at Google in 2014. |
https://en.wikipedia.org/wiki/Dilution%20ratio | In chemistry and biology, the dilution ratio and dilution factor are two related (but slightly different) expressions of the change in concentration of a liquid substance when mixing it with another liquid substance. They are often used for simple dilutions, one in which a unit volume of a liquid material of interest is combined with an appropriate volume of a solvent liquid to achieve the desired concentration. The diluted material must be thoroughly mixed to achieve the true dilution.
For example, in a solution with a 1:5 dilution ratio, entails combining 1 unit volume of solute (the material to be diluted) with 5 unit volumes of the solvent to give 6 total units of total volume.
In photographic development, dilutions are normally given in a '1+x' format. For example '1+49' would typically mean 1 part concentrate and 49 parts water, meaning a 500ml solution would require 10ml concentrate and 490ml water.
Dilution factor
The "dilution factor" is an expression which describes the ratio of the aliquot volume to the final volume. Dilution factor is a notation often used in commercial assays. For example, in solution with a 1/5 dilution factor (which may be abbreviated as x5 dilution), entails combining 1 unit volume of solute (the material to be diluted) with (approximately) 4 unit volumes of the solvent to give 5 units of total volume. The following formulas can be used to calculate the volumes of solute () and solvent () to be used:
where is the desired total volume, and is the desired dilution factor number (the number in the position of if expressed as " dilution factor" or " dilution").
However, some solutions and mixtures take up slightly less volume than their components.
In other areas of science such as pharmacy, and in non-scientific usage, a dilution is normally given as a plain ratio of solvent to solute. For large factors, this confusion makes only a minor difference, but in precise work it can be important to make clear whether dilution ratio or |
https://en.wikipedia.org/wiki/One-to-one%20%28data%20model%29 | In systems analysis, a one-to-one relationship is a type of cardinality that refers to the relationship between two entities (see also entity–relationship model) A and B in which one element of A may only be linked to one element of B, and vice versa. In mathematical terms, there exists a bijective function from A to B.
For instance, think of A as the set of all human beings, and B as the set of all their brains. Any person from A can and must have only one brain from B, and any human brain in B can and must belong to only one person that is contained in A.
In a relational database, a one-to-one relationship exists when one row in a table may be linked with only one row in another table and vice versa. It is important to note that a one-to-one relationship is not a property of the data, but rather of the relationship itself. A list of mothers and their children may happen to describe mothers with only one child, in which case one row of the mothers table will refer to only one row of the children table and vice versa, but the relationship itself is not one-to-one, because mothers may have more than one child, thus forming a one-to-many relationship.
See also
One-to-many (data model)
Many-to-many (data model)
External links
Design pattern: many-to-many (order entry), Tomjewett.com
Data modeling |
https://en.wikipedia.org/wiki/One-to-many%20%28data%20model%29 | In systems analysis, a one-to-many relationship is a type of cardinality that refers to the relationship between two entities (see also entity–relationship model) A and B in which an element of A may be linked to many elements of B, but a member of B is linked to only one element of A. For instance, think of A as books, and B as pages. A book can have many pages, but a page can only be in one book.
In a relational database, a one-to-many relationship exists when one row in table A may be linked with many rows in table B, but one row in table B is linked to only one row in table A. It is important to note that a one-to-many relationship is not a property of the data, but rather of the relationship itself. A list of authors and their books may happen to describe books with only one author, in which case one row of the books table will refer to only one row of the authors table, but the relationship itself is not one-to-many, because books may have more than one author, forming a many-to-many relationship.
The opposite of one-to-many is many-to-one. The transpose of a one-to-many relationship is a many-to-one relationship.
Entity relationship diagram (ERD) notations
One notation as described in Entity Relationship modeling is Chen notation or formally Chen ERD notation created originally by Peter Chen in 1976 where a one-to-many relationship is notated as 1:N where N represents the cardinality and can be 0 or higher.
A many-to-one relationship is sometimes notated as N:1.
See also
One-to-one (data model)
Many-to-many (data model)
References
Data modeling |
https://en.wikipedia.org/wiki/Translation%20of%20axes | In mathematics, a translation of axes in two dimensions is a mapping from an xy-Cartesian coordinate system to an x'y'-Cartesian coordinate system in which the x' axis is parallel to the x axis and k units away, and the y' axis is parallel to the y axis and h units away. This means that the origin O' of the new coordinate system has coordinates (h, k) in the original system. The positive x' and y' directions are taken to be the same as the positive x and y directions. A point P has coordinates (x, y) with respect to the original system and coordinates (x', y') with respect to the new system, where
or equivalently
In the new coordinate system, the point P will appear to have been translated in the opposite direction. For example, if the xy-system is translated a distance h to the right and a distance k upward, then P will appear to have been translated a distance h to the left and a distance k downward in the x'y'-system . A translation of axes in more than two dimensions is defined similarly. A translation of axes is a rigid transformation, but not a linear map. (See Affine transformation.)
Motivation
Coordinate systems are essential for studying the equations of curves using the methods of analytic geometry. To use the method of coordinate geometry, the axes are placed at a convenient position with respect to the curve under consideration. For example, to study the equations of ellipses and hyperbolas, the foci are usually located on one of the axes and are situated symmetrically with respect to the origin. If the curve (hyperbola, parabola, ellipse, etc.) is not situated conveniently with respect to the axes, the coordinate system should be changed to place the curve at a convenient and familiar location and orientation. The process of making this change is called a transformation of coordinates.
The solutions to many problems can be simplified by translating the coordinate axes to obtain new axes parallel to the original ones.
Translation of conic |
https://en.wikipedia.org/wiki/DeepDream | DeepDream is a computer vision program created by Google engineer Alexander Mordvintsev that uses a convolutional neural network to find and enhance patterns in images via algorithmic pareidolia, thus creating a dream-like appearance reminiscent of a psychedelic experience in the deliberately overprocessed images.
Google's program popularized the term (deep) "dreaming" to refer to the generation of images that produce desired activations in a trained deep network, and the term now refers to a collection of related approaches.
History
The DeepDream software, originated in a deep convolutional network codenamed "Inception" after the film of the same name, was developed for the ImageNet Large-Scale Visual Recognition Challenge (ILSVRC) in 2014 and released in July 2015.
The dreaming idea and name became popular on the internet in 2015 thanks to Google's DeepDream program. The idea dates from early in the history of neural networks, and similar methods have been used to synthesize visual textures.
Related visualization ideas were developed (prior to Google's work) by several research groups.
After Google published their techniques and made their code open-source, a number of tools in the form of web services, mobile applications, and desktop software appeared on the market to enable users to transform their own photos.
Process
The software is designed to detect faces and other patterns in images, with the aim of automatically classifying images. However, once trained, the network can also be run in reverse, being asked to adjust the original image slightly so that a given output neuron (e.g. the one for faces or certain animals) yields a higher confidence score. This can be used for visualizations to understand the emergent structure of the neural network better, and is the basis for the DeepDream concept. This reversal procedure is never perfectly clear and unambiguous because it utilizes a one-to-many mapping process. However, after enough reiterations, even im |
https://en.wikipedia.org/wiki/Oriented%20energy%20filters | Oriented energy filters are used to grant sight to intelligent machines and sensors. The light comes in and is filtered so that it can be properly computed and analyzed by the computer allowing it to “perceive” what it is measuring. These energy measurements are then calculated to take a real time measurement of the oriented space time structure.
3D Gaussian filters are used to extract orientation measurements. They were chosen due to their ability to capture a broad spectrum and easy and efficient computations.
The use of these vision systems can then be used in smart room, human interface and surveillance applications. The computations used can tell more than the standalone frame that most perceived motion devices such as a television frame. The objects captured by these devices would tell the velocity and energy of an object and its direction in relation to space and time. This also allows for better tracking ability and recognition.
References
Artificial intelligence
Lidar |
https://en.wikipedia.org/wiki/Graphical%20password | A graphical password or graphical user authentication is a form of authentication using images rather than letters, digits, or special characters. The type of images used and the ways, in which users interact with them vary between implementations.
Content types and mechanisms
Image sequence
Graphical passwords frequently require the user to select images in a particular order or respond to images presented in a particular order.
Image-generated text
Another graphical password solution creates a one-time password using a randomly generated grid of images. Each time the user is required to authenticate, they look for the images that fit their pre-chosen categories and enter the randomly generated alphanumeric character that appears in the image to form the one-time password.
Facial recognition
One system requires users to select a series of faces as a password, utilizing the human brain's ability to recall faces easily.
Draw-a-Secret (DAS)
Draw-a-Secret is a type of graphical password that requires the user to draw a picture over a grid. The user must exactly remember the user-drawn gestures in order to be authenticated. A larger stroke count corresponds with an increase in security, since it is harder for an attacker to copy the strokes and the order in which they are performed.
Weaknesses
When not used in a private setting, graphical passwords are typically more susceptible than text-based passwords to "shoulder-surfing attacks", in which an attacker learns the password by watching the screen, as a user gains access.
References
Password authentication |
https://en.wikipedia.org/wiki/Collaborative%20diffusion | Collaborative Diffusion is a type of pathfinding algorithm which uses the concept of antiobjects, objects within a computer program that function opposite to what would be conventionally expected. Collaborative Diffusion is typically used in video games, when multiple agents must path towards a single target agent. For example, the ghosts in Pac-Man. In this case, the background tiles serve as antiobjects, carrying out the necessary calculations for creating a path and having the foreground objects react accordingly, whereas having foreground objects be responsible for their own pathing would be conventionally expected.
Collaborative Diffusion is favored for its efficiency over other pathfinding algorithms, such as A*, when handling multiple agents. Also, this method allows elements of competition and teamwork to easily be incorporated between tracking agents. Notably, the time taken to calculate paths remains constant as the number of agents increases.
References
Algorithms |
https://en.wikipedia.org/wiki/Go%20continuous%20delivery | GoCD is an open-source tool which is used in software development to help teams and organizations automate the continuous delivery (CD) of software. It supports automating the entire build-test-release process from code check-in to deployment. It helps to keep producing valuable software in short cycles and ensure that the software can be reliably released at any time. It supports several version control tools including Git, Mercurial, Subversion, Perforce and TFVC (a la TFS). Other version control software can be supported by installing additional plugins. GoCD is released under the Apache 2 License.
History
GoCD was originally developed at ThoughtWorks Studios in 2007 and was called Cruise before being renamed GoCD in 2010. GoCD was released as open source software in 2014 under the Apache 2 License.
Plugins
GoCD allows for extending its feature by allowing users to install several plugins to allow integration with authentication and authorization software, version control software, build tools, notification and chat tools and cloud computing providers.
See also
Comparison of continuous integration software
References
External links
Free software
Software development kits
Software release
2015 software
Java development tools |
https://en.wikipedia.org/wiki/Zero-Force%20Evolutionary%20Law | The Zero-Force Evolutionary Law (ZFEL) is a theory proposed by Daniel McShea and Robert Brandon regarding the evolution of diversity and complexity. Under the ZFEL, diversity is understood as the variation among organisms and complexity as the variation among the parts within an organism. A part is understood as a system that is to some degree internally integrated and isolated from its surroundings. In a multicellular organism, for example, a cell is a part, and therefore complexity is the number of different cell types. Like the theory of relativity, the theory has a special and general formulation. The special formulation states that in the absence of natural selection, an evolutionary system with variation and heredity will tend spontaneously to diversify and complexify. The general formulation states that evolutionary systems have a tendency to diversify and complexify, but that these processes may be amplified or constrained by other forces, including natural selection. The mechanism of the ZFEL is the inherently error-prone process of replication and reproduction. In the absence of selection, errors tend to accumulate, with the result that individuals within a population tend to become more different from each other (diversity) and parts within an individual tend to become more different from each other (complexity). Both of these tendencies can be overcome by selection, including stabilizing or negative selection, with the result that diversity or complexity often does not change, or even decreases. What the ZFEL offers is not so much a prediction as a null expectation, telling us what will happen in evolution when selection is absent. It is the analogue of Newton's law of momentum, which tells us the trajectory of a moving object in the absence of forces (a straight line).
See also
Constructive neutral evolution
Evolution of biological complexity
Neutral theory of molecular evolution
References
Evolutionary biology
Neutral theory |
https://en.wikipedia.org/wiki/Subjective%20expected%20relative%20similarity | Subjective expected relative similarity (SERS) is a normative and descriptive theory that predicts and explains cooperation levels in a family of games termed Similarity Sensitive Games (SSG), among them the well-known Prisoner's Dilemma game (PD). SERS was originally developed in order to (i) provide a new rational solution to the PD game and (ii) to predict human behavior in single-step PD games. It was further developed to account for: (i) repeated PD games, (ii) evolutionary perspectives and, as mentioned above, (iii) the SSG subgroup of 2×2 games.
SERS predicts that individuals cooperate whenever their subjectively perceived similarity with their opponent exceeds a situational index derived from the game's payoffs, termed the similarity threshold of the game. SERS proposes a solution to the rational paradox associated with the single step PD and provides accurate behavioral predictions. The theory was developed by Prof. Ilan Fischer at the University of Haifa.
The Prisoner's Dilemma
The dilemma is described by a 2 × 2 payoff matrix that allows each player to choose between a cooperative and a competitive (or defective) move. If both players cooperate, each player obtains the reward (R) payoff. If both defect, each player obtains the punishment (P) payoff. However, if one player defects while the other cooperates, the defector obtains the temptation (T) payoff and the cooperator obtains the sucker's (S) payoff, where (and, assuring that sharing the payoffs awarded for uncoordinated choices does not exceed the payoffs obtained by mutual cooperation).
Given the payoff structure of the game (see Table 1), each individual player has a dominant strategy of defection. This dominant strategy yields a better payoff regardless of the opponent's choice. By choosing to defect, players protect themselves from exploitation and retain the option to exploit a trusting opponent. Because this is the case for both players, mutual defection is the only Nash equilibrium of t |
https://en.wikipedia.org/wiki/Neural%20efficiency%20hypothesis | The neural efficiency hypothesis proposes that while performing a cognitive task, individuals with higher intelligence levels exhibit lower brain activation in comparison to individuals with lower intelligence levels. This hypothesis suggests that individual differences in cognitive abilities are due to differences in the efficiency of neural processing. Essentially, individuals with higher cognitive abilities utilize fewer neural resources to perform a given task than those with lower cognitive abilities.
History
Since the late 19th century, there has been a growing interest among psychologists to understand the influence of individual differences in intelligence and the underlying neural mechanisms of intelligence. The Neural efficiency hypothesis was first introduced by Haier et al. in 1988 through a Position Emission Tomography (PET) study aimed at investigating the relationship between intelligence and brain activation. PET is a type of nuclear medicine procedure that measures the metabolic activity of the cells of body tissues.
During the study, participants underwent PET of the head while completing different cognitive tasks such as Raven’s Advanced Progressive Matrices (RAPM) and Continuous Performance Tests (CPT). The PET Scans showed that task performance activated specific regions of the participant’s brain. Also, a negative correlation was found between brain glucose metabolism levels and intelligence test scores. The results of the study indicated that individuals with higher intelligence levels exhibited lower levels of brain glucose metabolism while solving cognitive tasks. A few years later, Haier confirmed the results of the study by replicating it while considering learning as a factor.
Research
The early studies mainly focused on certain cognitive tasks such as intelligence tests to test the hypothesis, potentially confounding efficiency during the intelligence-test performance with neural efficiency in general. To overcome this limitation re |
https://en.wikipedia.org/wiki/OxygenOS | OxygenOS () is an Android-based operating system (OS) developed by Chinese smartphone manufacturer OnePlus exclusively for their smartphones. OxygenOS was developed for their overseas market. There used to also be another version of the OS designed specifically for the Chinese market called HydrogenOS ().
In an interview published on 3 September 2016, XDA Developers revealed OnePlus was "actively merging both platforms (OxygenOS and HydrogenOS) into a single cohesive operating system based on Android".
Features
Version 1.0 was based on Android 5.0.1 and was available only for the OnePlus One via a flashable ZIP provided through the OnePlus website.
Notable features of version 2.0 and 2.1.1 include app permissions, Waves MaxxAudio, Microsoft SwiftKey keyboard, off-screen gestures, custom icons, dark mode, manual camera mode, and RAW support for 3rd party apps, like Camera FV-5 2.75.
On 31 December 2016, OnePlus released OxygenOS 4.0.0 based on Android Nougat and includes its features and several other modifications to the public via OTA download.
On 31 January 2018, OnePlus released OxygenOS 5.0.3 based on Android Oreo to the public via OTA download. In May 2018, OnePlus launched OnePlus 6 with OxygenOS based on Android Oreo 8.1.
On 29 October 2018, OnePlus launched OnePlus 6T with OxygenOS 9.0 based on Android Pie.
On 25 December 2018, OnePlus released OxygenOS 9.0.0 based on Android Pie for OnePlus 5/5T to the public via OTA download.
On 21 September 2019, OnePlus announced the release of OxygenOS version 10.0 based on Android 10 for OnePlus 7 and 7 Pro. This initial release was followed by Android 10 based builds for older devices later.
On 06 August 2022, OnePlus announced OxygenOS 13 which is based on Android 13. OxygenOS 13 is eligible for OnePlus 10 series to OnePlus 8 series smartphones and some Nord smartphones.
On 25 September 2023, OnePlus recently announced that it will globally launch the Android 14-based OxygenOS 14.
Privacy
OnePl |
https://en.wikipedia.org/wiki/Teardrop%20%28electronics%29 | A teardrop is typically drop-shaped feature on a printed circuit board and can be found on the junction of vias or contact pads.
Purpose
The main purpose of teardrops is to enhance structural integrity in presence of thermal or mechanical stresses, for example due to vibration or flexing. Structural integrity may be compromised, e.g., by misalignment during drilling, so that too much copper may be removed by the drill hole in the area where a trace connects to the pad or via. An extra advantage is the enlarging of manufacturing tolerances, making manufacturing easier and cheaper.
While a typical shape of a teardrop is straight-line tapering, they may be concave. This type of teardrop is also called filleting or straight. To produce a snowman-shaped teardrop, a secondary pad of smaller size is added at the junction overlapping with the primary pad (hence the nickname).
Necking
For similar reasons, a technique called trace necking reduces (or necks down) the width of a trace that approaches a narrower pad of a surface-mounted device or a through-hole with a diameter that is less than the width of the trace, or when the trace passes through bottlenecks (for example, between the pads of a component).
References
Printed circuit board manufacturing |
https://en.wikipedia.org/wiki/Dragon%20Quest%20Heroes%20II | Dragon Quest Heroes II is a hack-and-slash game developed by Omega Force and published by Square Enix for PlayStation 3, PlayStation 4, PlayStation Vita, Nintendo Switch, and Windows. It was released in Japan in May 2016, and worldwide in April 2017. The game is a sequel to Dragon Quest Heroes: The World Tree's Woe and the Blight Below.
Gameplay
Dragon Quest Heroes II mixes the hack-and-slash combat of Koei Tecmo's Dynasty Warriors series of video games with the characters, monsters, universe, and lore from Square Enix's Dragon Quest series. The game is heavier on the RPG elements than most of Omega Force's other titles. World exploration was changed to resemble the typical Dragon Quest experience. Players can move their party to visit towns, wander the world map and initiate battle stages (similar to dungeons). Seamless random monster encounters may break up the pace between locations. Special ingredients and treasure boxes can be discovered across the world map. Weather can fluctuate and sometimes affect the party's status.
Characters are able to dash to wherever they please, but certain areas are blocked until the player proceeds with the main story. As the players proceed with the main story, they can unlock Zoomstones on the world map. These monuments allow the party to instantly warp to previously visited locations.
Accordia acts as the new main town. One major change from the previous game's features is the class change feature for the main protagonists Lazarel and Teresa. Switching classes changes equipment types and potential skills for each protagonist. Known classes include martial artist, mage, monk, thief and warrior. A new Martial Master can teach new weapon skills to the protagonist, depending on their proficiency with each weapon type. Individual weapons and outfits have all been changed to only provide aesthetic changes. Accessories can still be strengthened to alter stats.
Battle stages are mandatory for progressing the main story and behave li |
https://en.wikipedia.org/wiki/Gordon%20E.%20Moore%20Medal%20for%20Outstanding%20Achievement%20in%20Solid%20State%20Science%20and%20Technology | The Gordon E. Moore Medal for Outstanding Achievement in Solid State Science and Technology (formerly the Solid-State Science and Technology Award) was established by The Electrochemical Society in 1971 to recognize individuals distinguished for outstanding contributions to solid-state science and technology. The award is presented every two years, and recipients receive a silver medal, wall plaque, cash prize, Society Life membership, and a complimentary meeting registration.
History
Despite the fact that the solid-state community represented a major force in The Electrochemical Society, there was no form of recognition at the Society level of achievements in the field prior to the establishment of this award. Known as the Solid-State Science and Technology Award until 2005, the award was then renamed after Intel co-founder and author of Moore's Law, Gordon E. Moore, who is a long-time member of The Electrochemical Society.
Notable Recipients
As listed by ECS:
2023 Fred Roozeboom
2021 Hiroshi Iwai
2019 David J. Lockwood
2015 Yue Kuo
2005 Dennis Hess
1999 Isamu Akasaki
1995 Wayne L. Worrell
1993 Bruce E. Deal
1987 Alfred Y. Cho
1985 Jerry M. Woodall
1983 Nick Holonyak, Jr.
1981 Gerald L. Pearson
1979 Morton B. Panish
1977 Robert N. Hall
1973 William G. Pfann
See also
List of chemistry awards
References
External links
Gordon E. Moore Medal Recipients
Materials science awards
Electrochemistry |
https://en.wikipedia.org/wiki/Kathryn%20E.%20Hare | Kathryn Elizabeth Hare (born 1959) is a Canadian mathematician specializing in harmonic analysis and fractal geometry. She was the Chair of the Pure Mathematics Department at the University of Waterloo from 2014 to 2018. She retired from the University of Waterloo in 2021.
Education and career
Hare did her undergraduate studies at the University of Waterloo, graduating in 1981. She earned a Ph.D. from the University of British Columbia in 1986. Her dissertation, under the supervision of John J. F. Fournier, was Thin Sets and Strict-Two-Associatedness, and concerned group representation theory.
She was an assistant professor at the University of Alberta from 1986 to 1988, before she moved back to Waterloo.
Awards and recognition
In 2011, the Chalmers University of Technology awarded her an Honorary Doctorate for her "prominent research, both in extent and depth, within classical and abstract harmonic analysis". In 2020 she was named as a Fellow of the Canadian Mathematical Society.
Selected publications
.
.
.
References
20th-century Canadian mathematicians
21st-century Canadian mathematicians
Mathematical analysts
University of Waterloo alumni
University of British Columbia alumni
Academic staff of the University of Waterloo
1959 births
Living people
20th-century women mathematicians
21st-century women mathematicians
Fellows of the Canadian Mathematical Society |
https://en.wikipedia.org/wiki/Flail%20space%20model | The flail space model (FSM) is a model of how a car passenger moves in a vehicle that collides with a roadside feature such as a guardrail or a crash cushion. Its principal purpose is to assess the potential risk of harm to the hypothetical occupant as he or she impacts the interior of the passenger compartment and, ultimately, the efficacy of an experimental roadside feature undergoing full-scale vehicle crash testing.
The FSM eliminates the complexity and expense of using instrumented anthropometric dummies during the crash test experiments. Furthermore, while crash test dummies were developed to model collisions between vehicles, they are not accurate when used for the sorts of collision angles that occur when a vehicle collides with a roadside feature; by contrast, the FSM was designed for such collisions.
History
The FSM is based on research performed at Southwest Research Institute in 1980 and published in 1981 in the paper entitled "Collision Risk Assessment Based on Occupant Flail-Space Model" by Jarvis D. Michie. The FSM (coined by Michie) was accepted by the highway community and published as a key part of the "Recommended Procedures for the Safety Evaluation of Highway Appurtenances" published in 1981 in National Cooperative Highway Research Program (NCHRP) Report 230. In 1993, the NCHRP Report was updated and presented as NCHRP Report 350; in this research effort performed by the Texas Transportation Research Institute, the FSM was reexamined and was unmodified in the new publication. In 2004, Douglas Gabauer further examined the efficacy of the FSM in his PhD thesis. The American Association of State Highway and Transportation Officials (AASHTO) retained the FSM as the method of assessing the risk of harm to vehicle occupants in the 2009 "Manual for Assessing Safety Hardware" that replaced NCHRP Report 350, stating that the FSM had "served its intended purpose well".
Details
The FSM hypothesis divides the collision into two stages. In stage one, t |
https://en.wikipedia.org/wiki/Immunologic%20checkpoint | An immune checkpoint regulator is a modulator of the immune system, that allows initiation of a productive immune response and prevents the onset of autoimmunity. Examples of such a molecule are cytotoxic T-lymphocyte antigen 4 (CTLA-4 or CD152), which is an inhibitory receptor found on immune cells and programmed cell death 1 (CD279), which has an important role in down-regulating the immune system by preventing the activation of T-cells.
Tumours involve certain immune-checkpoint pathways as a major mechanism of immune resistance, particularly against T cells that are specific for tumor antigens. Therefore, the strategy in using immunological checkpoints in cancer therapy is to inhibit inhibitory molecules of the immune system, thus stimulating the immune system. The ability to interfere with the inhibitory function of checkpoint receptors CD152 and CD279 (programmed death-1) in oncology has proved successful. In metastatic melanoma FDA approved an αCD152 monoclonal antibody Ipilimumab, that was found to prolong survival. In melanoma, nonsmall cell lung cancer, and renal cell carcinoma there is hope with CD279 blocking Ab, that promotes antitumor responses. In hematologic malignancies a humanized αCD279 IgG1 needs further research. In solid tumors the use of CD279 IgG4 Ab is promising, and further CD273/PD-L2 in stage IV.
In autoimmune rheumatic diseases, impaired tolerance leads to the development of diseases such as rheumatoid arthritis, systemic sclerosis, systemic lupus erythematosus, Sjogren’s syndrome, etc. Therefore, in autoimmune diseases the converse strategy of engaging immunological checkpoints may be beneficial: stimulate inhibitory molecules of the immune system, thus inhibiting the immune system (therefore, increase self-tolerance). What is known to work is Abatacept, an CD152-Ig used in treating rheumatoid arthritis and juvenile idiopathic arthritis.
Not studied enough yet are the therapeutic opportunities using Programmed death-1 pathway.
Refe |
https://en.wikipedia.org/wiki/3D%20XPoint | 3D XPoint (pronounced three-D cross point) is a discontinued non-volatile memory (NVM) technology developed jointly by Intel and Micron Technology. It was announced in July 2015 and was available on the open market under the brand name Optane (Intel) from April 2017 to July 2022. Bit storage is based on a change of bulk resistance, in conjunction with a stackable cross-grid data access array. Initial prices are less than dynamic random-access memory (DRAM) but more than flash memory.
As a non-volatile memory, 3D XPoint has a number of features that distinguish it from other currently available RAM and NVRAM. Although the first generations of 3D XPoint were not especially large or fast, 3D XPoint was used to create some of the fastest SSDs available as of 2019, with small-write latency. As the memory is inherently fast, and byte-addressable, techniques such as read-modify-write and caching used to enhance traditional SSDs are not needed to obtain high performance. In addition, chipsets such as Cascade Lake are designed with inbuilt support for 3D XPoint, that allow it to be used as a caching or acceleration disk, and it is also fast enough to be used as non-volatile RAM (NVRAM) in a DIMM package.
History
Development
Development of 3D XPoint began around 2012. Intel and Micron had developed other non-volatile phase-change memory (PCM) technologies previously; Mark Durcan of Micron said 3D XPoint architecture differs from previous offerings of PCM, and uses chalcogenide materials for both selector and storage parts of the memory cell that are faster and more stable than traditional PCM materials like GST. But today, it is thought of as a subset of ReRAM.
3D XPoint has been stated to use electrical resistance and to be bit addressable. Similarities to the resistive random-access memory under development by Crossbar Inc. have been noted, but 3D XPoint uses different storage physics. Specifically, transistors are replaced by threshold switches as selectors in the memo |
https://en.wikipedia.org/wiki/SourceMeter | SourceMeter is a source code analyzer tool, which can perform deep static program analysis of the source code of complex programs in C, C++, Java, Python, C#, and RPG (AS/400). FrontEndART has developed SourceMeter based on the Columbus technology researched and developed at the Department of Software Engineering of the University of Szeged.
Background
During the static analysis, an abstract semantic graph (ASG) is constructed from the language elements of the source code. This ASG is then processed by the different tools in the package to calculate product metrics like LLOC, NLE or NOA, identify duplicate code (copy-pasted code; clones), coding rule violations, etc.
SourceMeter can analyze source code conforming to Java 8 and earlier versions, C/C++, RPG III and RPG IV versions (including free-form), C# 6.0 and earlier versions and Python 2.7.8 and earlier versions.
In the case of C/C++, SourceMeter supports the ISO/IEC 14882:2011 international standard extended with several new features from ISO/IEC 14882:2014, and C language defined by the ANSI/ISO 9899:1990, ISO/IEC 9899:1999 and ISO/IEC 9899:2011 standards. Besides the standard features, several GCC and Microsoft specific extensions are also supported.
Features
Precise and deep static analysis, building full semantic graphs, containing semantic edges (calls, references), comments, etc.
60+ source code metrics (complexity, coupling, cohesion, inheritance, etc.), on different levels (package, namespace, class, method, etc.)
Type-2 duplications regarding syntax boundaries
Code duplication metrics (stability, embeddedness, dispersion, etc.)
Detecting inconsistent changes of duplications
Checking coding rules (Differences between PMD rule violations and FaultHunter rule violations)
Detecting security vulnerabilities based on data-flow (SQL injection, XSS, etc.)
Checking metric-based rule violations
Checking Android specific rule violations
Detecting runtime exceptions by means of symbolic code executio |
https://en.wikipedia.org/wiki/Jill%20Smythies%20Award | The Jill Smythies Award of the Linnean Society of London was established in 1986 and is awarded annually to a botanical artist.
The award was established by Bertram Smythies, in honour of his wife, Florence Mary Smythies ("Jill"), whose career as a botanical artist was cut short by an accident to her right hand.
Recipients of the Jill Smythies Award
Alice Tangerini (2020)
Deborah Lambkin (2019)
Niki Simpson and Juliet Williamson (2018)
Karin Douthit and David Williamson (2017)
Anita Barley (2016)
Claire Banks (2015)
Esmee Somers Winkel (2014)
not awarded (2013)
not awarded (2012)
Margaret Tebbs (2011)
Susan Sex (2010)
Halina Bednarek-Ochyra (2009)
Patricia Eckel (2008)
Jan van Os (2007)
Bobbi Angell (2006)
Lesley Elkan (2005)
Lucy Theres Smith (2004)
Maya Koistinen (2003)
Jenny Brasier (2002)
Juan Luis Castillo (2001)
Bo Mossberg and Jean Annette Paton (2000)
Pandora Sellars (1999)
Rodella Anne Purves (1998)
Celia Elizabeth Rosser (1997)
Bent Jonsen (1996)
Rosemary Wise (1995)
Joy Claire Allison Dalby (1994)
Caroline Mary Bates (1993)
John Mark Fothergill (1992)
Dale Edna Evans (1991)
Gillian Condy (1990)
Christabel King (1989)
Ann Farrer (1988)
See also
List of European art awards
References
British art awards
Linnean Society of London
Botanical art
Awards established in 1986
1986 establishments in England |
https://en.wikipedia.org/wiki/Irene%20Manton%20Prize | The Irene Manton Prize of the Linnean Society of London is awarded annually for the "best thesis in botany examined for a doctorate of philosophy during a single academic year" in the United Kingdom.
The prize is named in honour of Irene Manton FRS, the first female president of the Linnean Society of London. She pioneered the biological use of electron microscopy. Her work revealed the structure of the flagellum and cilia, which are central to many systems of cellular motility.
Recipients of the Irene Manton Prize
Sophie Harrington, University of East Anglia (2021)
James Clark (2020)
Leanne Melbourne (2019) University of Bristol; The effect of environmental change on the structure, composition and subsequently the structural integrity of un-attached corallines
Sandy Hetherington (2018) University of Oxford; Evolution and morphology of lycophyte root systems
Shanna Ludwig (2015) University of Bristol; Ecological and evolutionary genetics, focusing on reproductive biology and speciation in diploid and polyploid Sorbus populations
Simon Renny-Byfield (2014) Queen Mary, University of London; Evolution of repetitive DNA in angiosperms: Examples from Nicotiana
Janine Pendleton (2013) University of Sheffield; Carboniferous plants and spores from the Bristol Coalfield
Alexander S T Papadopulos (2012) Imperial College London;
Tiina Sarkinen (2011)
Christopher Thorogood (2010)
Chris Yesson (2009)
James Clarkson and Silvia Pressel (2008)
Lionel Navarro (2007); University of East Anglia; Plant innate immunity and bacterial pathogenesis
Yuki Yasumura (2006)
Alex Wortley (2005)
Mark Clegg (2003)
Julie King (2002)
Alison Gwen Roberts (2001)
James Edward Richardson (2000)
Melissa Spielman (1999)
Alexander Weir (1998)
Colin Edward Hughes (1997)
Dorothy Steane (1996)
Sally Glockling (1995)
William Justin Goodrich (1993)
Sharon Anita Robinson and Robert Winning Scotland (1992)
not awarded (1991)
Christine Masterson (1990)
See also
List of biology awards
|
https://en.wikipedia.org/wiki/Trail-Crisp%20Award | The Trail-Crisp Award, of the Linnean Society of London, was established in 1966 and is an amalgamation of The Trail Award and The Crisp Award (both founded in 1910).
The Trail-Crisp Award is presented at intervals "in recognition of an outstanding contribution to biological microscopy that has been published in the UK".
Recipients
Trail Award
1915: Leonard Doncaster
1920: Helen Gwynne-Vaughan
1937: Carl Pantin
1948: Honor Fell
1954: Irene Manton
1960: L.E.R. Picken
Trail-Crisp Award
See also
List of biology awards
References
Biology awards
Biology in the United Kingdom
British science and technology awards
Linnean Society of London |
https://en.wikipedia.org/wiki/Creepy%20treehouse | Creepy treehouse is a social media term, or internet slang, referring to websites or social networking platforms that professors use for educational purposes, but students regard as an invasion of privacy. The term, first described in 2008 by Utah Valley University instructional-design services director Jared Stein, describes "technological innovations by faculty members that make students’ skin crawl." The term also refers to online accounts and websites that users tend to avoid, especially young people who avoid visiting the pages of educators and other adults. Author Martin Weller defines creepy treehouse as a digital space where authority figures are viewed as invading younger people's privacy.
University of Regina professor Alec Couros suggests that instead of "forcing" student participation with their own digital platforms, professors should use methods like online forums.
References
Internet culture
Internet forum terminology
Social media |
https://en.wikipedia.org/wiki/Bruno%20Degazio | Bruno Degazio (born March 31, 1958) is a composer, researcher and film sound designer based in Ontario, Canada, where he is also a professor at Sheridan College. Degazio is an expert on computer music.
Education
Degazio received bachelor's and master's degrees in music from the University of Toronto, where he studied music composition with Gustav Ciamaga, as well as Schenkerian analysis, and sound synthesis. He helped establish a contemporary music ensemble, and finished his studies there in 1981.
Career
Degazio is notable for, among other things, implementing computer music algorithms that were devised by the music theorist Joseph Schillinger, and for designing systems to reverse engineer music production from theories about music theory. He has also studied musical aspects of fractal geometry, for automated composition of music. Degazio was one of the first people in the world to apply fractal techniques to algorithmic composition with some degree of depth.
Degazio is proficient with wind controllers, also known as wind synthesizers. His arrangements for this instrument include works by Johann Sebastian Bach and others. Degazio's work on films led to a Genie award nomination for the film Bye Bye Blues, plus prizes from the Baltimore Film Festival and the Toronto Advertising Awards. He also has developed sound tracks for two 3-D IMAX films at the 1990 World's Fair in Osaka, Japan.
Arrangements of the Goldberg Variations
Degazio has arranged a number of pieces from the Goldberg Variations for other instruments. Following are several examples, performed on electronic wind instrument:
Writings
"Musical aspects of fractal geometry", Proceedings of the International Computer Music Conference, (San Francisco 1986)
"The MIDIFORTH computer music system", Proceedings of Printemps Electroacoustique (Montreal 1987)
"The development of context sensitivity in the MIDIFORTH computer music system", Proceedings of the International Computer Music Conference, (Cologne 1988)
" |
https://en.wikipedia.org/wiki/Dyadic%20space%20%28cell%20biology%29 | The dyadic space is the name for the volume of cytoplasm between pairs (dyads) of areas where the cell membrane and an organelle such as the endoplasmic reticulum (or sarcoplasmic reticulum) come into close contact (within 10-12 nanometers) of each other, creating what are known as dyadic clefts.
The space is important for ionic signalling. For example, the phenomenon of calcium-induced calcium release, when extracellular calcium enters the cell through ion channels in T-Tubules, leading to a rapidly increased calcium concentration in the dyadic space, triggering ryanodine receptors on the sarcoplasmic reticulum to release more calcium and trigger cardiac myocyte contraction - the heart beat.
References
Cell biology
Cell anatomy |
https://en.wikipedia.org/wiki/Joaquim%20Gomes%20de%20Souza | Joaquim Gomes de Souza "Souzinha" (15 February 1829, in Itapecuru Mirim – 1 June 1864, in London) was a Brazilian mathematician who worked on numerical analysis and differential equations. He was a pioneer on the study of mathematics in Brazil, and was described by José Leite Lopes as "the first great mathematician from Brazil".
In 1844, Gomes de Souza enrolled at the Faculdade de Medicina do Rio de Janeiro (now a part of the Federal University of Rio de Janeiro) to study medicine. He had a deep love for the natural sciences, which led him to also be interested in mathematics, and so he started to learn mathematics as a self-taught in parallel with his studies of medicine.
In 1848, he obtained his doctorate in mathematics from the Escola Real Militar, with the thesis Dissertação Sobre o Modo de Indagar novos Astros sem o Auxílio das Observações Directas (Dissertation about the means of investigating new celestial objects without the aid of direct observations).
He later went to the Sorbonne, in France, where he continued his mathematical studies. He was a personal friend of Cauchy, of whose classes he attended (in one of them, Souza spotted a mathematical mistake by Cauchy, he then asked his license and corrected it on the blackboard). In 1856, he obtained a doctorate in medicine from Paris Faculty of Medicine. In the same year, he presented his mathematical works at the Académie des sciences.
Souza held a paid public post in Brazil, and after much time in Europe, he was noticed he should return immediately to Brazil because he had been elected a member of the parliament. Souza had already married Rosa Edith in England and then had to return to Brazil without her.
In his book Mélanges de calcul intégral (1882), Souza aimed to obtain a general method to solve PDEs, according to Manfredo do Carmo: "[in his book] He [Souza] employed methods not entirely rigorous and it is not clear exactly how much of his work would remain if submitted to a careful scrutiny; as fa |
https://en.wikipedia.org/wiki/Facebook%20Bluetooth%20Beacon | The Facebook Bluetooth Beacon is a hardware beacon released by Facebook in 2015. The beacon uses a bluetooth connection to communicate with the Facebook app on the user's smartphone, informing it of the phone's location. The technology allows location-specific advertising to be pushed to the user's Facebook feed.
In June 2015, Facebook gave free beacons to a number of businesses in the United States.
See also
Bluetooth low energy beacon
Eddystone
References
Automatic identification and data capture
Bluetooth
Facebook
Geopositioning
Indoor positioning system
Ubiquitous computing |
https://en.wikipedia.org/wiki/Traverse%20%28trench%20warfare%29 | In trench warfare, a traverse is an adaptation to reduce casualties to defenders occupying a trench. One form of traverse is a U-shaped detour in the trench with the trench going around a protrusion formed of earth and sandbags. The fragments or shrapnel, or shockwave from a shell landing and exploding within a trench then cannot spread horizontally past the obstacle the traverse interposes. Also, an enemy that has entered a trench is unable to fire down the length at the defenders, or otherwise enfilade the trench.
A traverse trench is a trench dug perpendicular to a trench line, but extending away from the enemy. It has two functions. One function is to provide an entry into the main trench. A second function is to provide a place for defenders to shelter and regroup should the enemy have penetrated into the main trench and be able to fire down the main trench's length.
On an approach trench, that is, a trench leading from the rear to the frontline or firing trench, defenders may construct an island traverse. With an island traverse, the approach trench splits to go around both sides of a traverse before coming together again.
Lastly, a flying or bridge traverse is a sandbagged covering for a stretch of trench to block shrapnel or shell fragments from entering the trench.
References
Anon. (1917) Professional Memoirs, Engineer Bureau, United States Army, Volume 9. (Engineer School).
Smith, J.S. (1917) Trench Warfare: A Manual for Officers and Men. (New York: E.P. Dutton & Co.).
Military terminology
Trench warfare
Military engineering |
https://en.wikipedia.org/wiki/Vomocytosis | Vomocytosis (sometimes called non-lytic expulsion) is the cellular process by phagocytes expel live organisms that they have engulfed without destroying the organism. Vomocytosis is one of many methods used by cells to expel internal materials into their external environment, yet it is distinct in that both the engulfed organism and host cell remain undamaged by expulsion. As engulfed organisms are released without being destroyed, vomocytosis has been hypothesized to be utilized by pathogens as an escape mechanism from the immune system. The exact mechanisms, as well as the repertoire of cells that utilize this mechanism, are currently unknown, yet interest in this unique cellular process is driving continued research with the hopes of elucidating these unknowns.
Discovery
Vomocytosis was first reported in 2006 by two groups, working simultaneously in the UK and the US, based on time-lapse microscopy footage characterising the interaction between macrophages and the human fungal pathogen Cryptococcus neoformans. Subsequently, this process has also been seen with other fungal pathogens such as Candida albicans and Candida krusei. It has also been speculated that the process may be related to the expulsion of bacterial pathogens such as Mycobacterium marinum from host cells. Vomocytosis has been observed in phagocytic cells from mice, humans and birds, as well as being directly observed in zebrafish and indirectly detected (via flow cytometry) in mice. Amoebae exhibit a similar process to vomocytosis whereby phagosomal material that cannot be digested is exocytosed. Cryptococci are exocytosed from amoebae via this mechanism but inhibition of the constitutive pathway demonstrated that cryptococci could also be expelled via vomocytosis.
Mechanism
A full understanding of the mechanisms involved in vomocytosis is not currently known, yet advances in research have driven initial mechanistic descriptions and crucial steps involved in the process. Research has shown |
https://en.wikipedia.org/wiki/Dave%20Needle | David Lewis Needle (December 17, 1947 – February 20, 2016) was an American computer engineer. He was a key engineer and co-chief architect in the creation of the Amiga 1000 computer with Jay Miner, Dave Morse, and R. J. Mical. He was one of the main designers and developers of the custom chips of the Amiga computer. Later he co-invented the Atari Lynx and the 3DO Interactive Multiplayer with Morse and Mical.
A 1995 article in Next Generation commented: "It's true that of the machines that Mical and Needle have created, only the Amiga has been a true global mass market hit ... But it's only fair to put forward the argument that this is down to the marketing of the machines rather than the quality of the product."
Dave Needle died on February 20, 2016.
References
American engineers
1947 births
2016 deaths
Computer hardware engineers |
https://en.wikipedia.org/wiki/Solar%20observation | Solar observation is the scientific endeavor of studying the Sun and its behavior and relation to the Earth and the remainder of the Solar System. Deliberate solar observation began thousands of years ago. That initial era of direct observation gave way to telescopes in the 1600s followed by satellites in the twentieth century.
Prehistory
Stratigraphic data suggest that solar cycles have occurred for hundreds of millions of years, if not longer; measuring varves in precambrian sedimentary rock has revealed repeating peaks in layer thickness corresponding to the cycle. It is possible that the early atmosphere on Earth was more sensitive to solar irradiation than today, so that greater glacial melting (and thicker sediment deposits) could have occurred during years with greater sunspot activity.
This would presume annual layering; however, alternative explanations (diurnal) have also been proposed.
Analysis of tree rings revealed a detailed picture of past solar cycles: Dendrochronologically dated radiocarbon concentrations have allowed for a reconstruction of sunspot activity covering 11,400 years.
Early observations
Solar activity and related events have been regularly recorded since the time of the Babylonians. In the 8th century BC, they described solar eclipses and possibly predicted them from numerological rules. The earliest extant report of sunspots dates back to the Chinese Book of Changes, . The phrases used in the book translate to "A dou is seen in the Sun" and "A mei is seen in the Sun", where dou and mei would be darkening or obscuration (based on the context). Observations were regularly noted by Chinese and Korean astronomers at the behest of the emperors, rather than independently.
The first clear mention of a sunspot in Western literature, around 300 BC, was by the ancient Greek scholar Theophrastus, student of Plato and Aristotle and successor to the latter. On 17 March AD 807 Benedictine monk Adelmus observed a large sunspot that was visible fo |
https://en.wikipedia.org/wiki/Trackbuster | Trackbuster is an online service used to identify and remove email trackers.
Email tracking was mainly used in the beginning by marketers to monitor the delivery of emails. However, new tools now allow individuals to track emails easily, and this practice is on the rise. In addition to revealing when and whether an email has been opened or not, email trackers can also reveal one’s software configuration and geographic location (through IP geolocation). Trackbuster helps email users get rid of these trackers, by detecting and disabling tracking images and tracked links.
At launch, Trackbuster received praise and positive press from well-known figures in the tech world, including Robert Scoble, Om Malik and Chris Messina.
Trackbuster is currently compatible with Gmail and Google Apps.
References
Internet privacy software
Email
2015 software |
https://en.wikipedia.org/wiki/Hamiltonian%20field%20theory | In theoretical physics, Hamiltonian field theory is the field-theoretic analogue to classical Hamiltonian mechanics. It is a formalism in classical field theory alongside Lagrangian field theory. It also has applications in quantum field theory.
Definition
The Hamiltonian for a system of discrete particles is a function of their generalized coordinates and conjugate momenta, and possibly, time. For continua and fields, Hamiltonian mechanics is unsuitable but can be extended by considering a large number of point masses, and taking the continuous limit, that is, infinitely many particles forming a continuum or field. Since each point mass has one or more degrees of freedom, the field formulation has infinitely many degrees of freedom.
One scalar field
The Hamiltonian density is the continuous analogue for fields; it is a function of the fields, the conjugate "momentum" fields, and possibly the space and time coordinates themselves. For one scalar field , the Hamiltonian density is defined from the Lagrangian density by
with the "del" or "nabla" operator, is the position vector of some point in space, and is time. The Lagrangian density is a function of the fields in the system, their space and time derivatives, and possibly the space and time coordinates themselves. It is the field analogue to the Lagrangian function for a system of discrete particles described by generalized coordinates.
As in Hamiltonian mechanics where every generalized coordinate has a corresponding generalized momentum, the field has a conjugate momentum field , defined as the partial derivative of the Lagrangian density with respect to the time derivative of the field,
in which the overdot denotes a partial time derivative , not a total time derivative .
Many scalar fields
For many fields and their conjugates the Hamiltonian density is a function of them all:
where each conjugate field is defined with respect to its field,
In general, for any number of fields, the volume integr |
https://en.wikipedia.org/wiki/Dark0de | dark0de, also known as Darkode, is a cybercrime forum and black marketplace described by Europol as "the most prolific English-speaking cybercriminal forum to date". The site, which was launched in 2007, serves as a venue for the sale and trade of hacking services, botnets, malware, stolen personally identifiable information, credit card information, hacked server credentials, and other illicit goods and services.
History
In early 2013, it came under a large DDoS attack moving from bulletproof hosting provider Santrex to off-shore, the latter being a participant of the Stophaus campaign against Spamhaus. The site has had an ongoing feud with security researcher Brian Krebs.
In April 2014, various site users were attacked via the Heartbleed exploit, gaining access to private areas of the site.
Takedown
The forum was the target of Operation Shrouded Horizon, an international law enforcement effort led by the Federal Bureau of Investigation which culminated in the site's seizure and arrests of several of its members in July 2015. According to the FBI, the case is "believed to be the largest-ever coordinated law enforcement effort directed at an online cyber criminal forum". Upon announcing the 12 charges issued by the United States, Attorney David Hickton called the site "a cyber hornet's nest of criminal hackers", "the most sophisticated English-speaking forum for criminal computer hackers in the world" which "represented one of the gravest threats to the integrity of data on computers in the United States".
On Monday, September 21, 2015, Daniel Placek appeared on the podcast Radiolab discussing his role in starting Darkode and his eventual cooperation with the United States government in its efforts to take down the site.
Revivals
Only two weeks after the announcement of the raid, the site reappeared with increased security, employing blockchain-based authentication and operating on the Tor anonymity network. Researchers from MalwareTech suggested the relau |
https://en.wikipedia.org/wiki/Tor%20Carding%20Forum | The Tor Carding Forum (TCF) was a Tor-based forum specializing in the trade of stolen credit card details, identity theft and currency counterfeiting. The site was founded by an individual known as 'Verto' who also founded the now defunct Evolution darknet market.
The site required $50 for registration.
A 2013 investigation into counterfeit banknotes in Pittsburgh led to a source of Ugandan fakes being identified as having been purchased via the Tor Carding Forums. By December 2014 Ryan Andrew Gustafson a.k.a. "Jack Farrel" and "Willy Clock", a US citizen living in Uganda was arrested for large scale sale of counterfeit United States currency by the U.S. Secret Service which was being sold through the Tor Carding Forums as well as other crime forums.
In December 2014 the site closed following a hack, directing users to Evolution's forums.
In June 2015 a dark web researcher identified the clearnet IP address of a similar hidden service branded 'The Tor Carding Forum V2' which was subsequently shut down.
References
Internet forums
Carding
Crime forums
Carding (fraud)
Defunct darknet markets |
https://en.wikipedia.org/wiki/Hobson%27s%20joint | A Hobson's joint or Hobson's coupling is a type of right-angle constant-velocity joint; rods bent 90° are able to transmit torque around a corner because they are all free to turn in their mounting holes in both legs of the coupling.
Hobson's joints are used to make elbow engines, a novelty device, but also for practical purposes in tools and shaft-driven bicycle gearing.
External links
References
Gears
Rotating shaft couplings |
https://en.wikipedia.org/wiki/Integrated%20Middleware%20Platform | IMP is an integrated middleware platform for external system aiming to service logic communication. The IMP receives the messages from outside and translates into messages understandable by SCS. By this way, IMP isolates the external platform and enhances the communication of efficiency and safety. By the other way, IMP will connect with OLC Server and CSIP Server by northbound interface.
Middleware |
https://en.wikipedia.org/wiki/Comparison%20of%20scrum%20software | This page compares software with specific support for the scrum framework. Although the features of some general project management software can be conceptualized around scrum, general project management software is not included on this list unless it has, or a plugin for it has, specific support for scrum.
General information
Sprint features
Story features
Task features
Integration features
See also
Comparison of project management software
Kanban (development)
Notes and references
Notes
References
Scrum software, comparison of
Scrum |
https://en.wikipedia.org/wiki/Nitrogen%20dioxide%20poisoning | Nitrogen dioxide poisoning is the illness resulting from the toxic effect of nitrogen dioxide (). It usually occurs after the inhalation of the gas beyond the threshold limit value.
Nitrogen dioxide is reddish-brown with a very harsh smell at high concentrations, at lower concentrations it is colorless but may still have a harsh odour. Nitrogen dioxide poisoning depends on the duration, frequency, and intensity of exposure.
Nitrogen dioxide is an irritant of the mucous membrane linked with another air pollutant that causes pulmonary diseases such as obstructive lung disease, asthma, chronic obstructive pulmonary disease and sometimes acute exacerbation of COPD and in fatal cases, deaths.
Its poor solubility in water enhances its passage and its ability to pass through the moist oral mucosa of the respiratory tract.
Like most toxic gases, the dose inhaled determines the toxicity on the respiratory tract. Occupational exposures constitute the highest risk of toxicity and domestic exposure is uncommon. Prolonged exposure to low concentration of the gas may have lethal effects, as can short-term exposure to high concentrations like chlorine gas poisoning. It is one of the major air pollutants capable of causing severe health hazards such as coronary artery disease as well as stroke.
Nitrogen dioxide is often released into the environment as a byproduct of fuel combustion but rarely released by spontaneous combustion. Known sources of nitrogen dioxide gas poisoning include automobile exhaust and power stations.
The toxicity may also result from non-combustible sources such as the one released from anaerobic fermentation of food grains and anaerobic digestion of biodegradable waste.
The World Health Organization (WHO) developed a global recommendation limiting exposures to less than 20 parts per billion for chronic exposure and value less 100 ppb for one hour for acute exposure, using nitrogen dioxide as a marker for other pollutants from fuel combustion.
There is a |
https://en.wikipedia.org/wiki/Uthapuram | Uthapuram is a village in Madurai district, Tamil Nadu, India. It is known for a wall which segregated Dalits from the village for two decades.
Geography and Demographics
Uthapuram is located in Peraiyur taluk of Madurai district. It is 41 kilometers away from the district capital Madurai. As of census 2011, it has population of 5149 of which scheduled caste consists 2172. It comes under the Usilampatti assembly constituency and Theni parliamentary constituency.
Uthapuram wall
The village have two major communities, one is dominant caste Hindu Pillai another one is scheduled caste Dalit Pallar community. The caste violence occurred occasionally between these communities. The violence happened in 1948, 1964 and 1989. After 1989 violence caste Hindus constructed a 30 meter long wall to segregate Dalits from the village. The wall later described as "wall of untouchability". The Dalits were not allowed to enter the streets of caste Hindus. Following this, Tamil Nadu Untouchability Eradication Front (TNUEF) of Communist Party of India (Marxist) and Dalit organizations protested against the construction of the wall. The caste Hindus argued that the wall was built on the private land. In May 2008, Madurai district administration demolished the wall and allowed the Dalits into the village. After demolition, violence occurred between the communities. The caste Hindus threatened that they would leave the village. To control the situation police opened fire in that one person died. The cases were filed against the incident. In 2012, Madras High Court ordered compensation to the people who suffered during the violence.
The district administration initiated the peace agreement between the communities. Therefore, the Dalits were allowed to enter local Muthalamman-Mariamman temple who prevented since 1989.
See also
Separation barrier
References
Villages in Madurai district
Separation barriers
Racial segregation
Caste
Caste-related violence in India |
https://en.wikipedia.org/wiki/Banff%20Classification | The Banff Classification is a schema for nomenclature and classification of kidney transplant pathology, established in 1991 by Kim Solez and Lorraine C. Racusen in Banff, Canada. The initiative was "inspired by the then recent development of a consensus grading system for diagnosis of rejection in cardiac allografts led by Dr Margaret Billingham, a key participant at the first Banff transplant pathology meeting". Prior the Banff Classification there was no standardized, international classification for renal allograft biopsies, which resulted in considerable heterogeneity among pathologists in characterization of renal allograft biopsies. The first Banff schema was published in 1993, and has since undergone updates at regular intervals. The classification is expanded and updated every two years in meetings organized by the Banff Foundation for Allograft Pathology. An evaluation of the Banff Classification in March 2000 confirmed significant association between the revised Banff '97 classification and graft outcome. The classification is unusual in that there is no competing standard. It has been used worldwide for 28+ years and shows how useful consensus meetings in a medical subspecialty area can be. In 2018 a user guide for the classification was published in the journal Transplantation.
References
External links
http://banfffoundation.org/wp-content/uploads/2015/05/The-Banff-classification-revisited.pdf
https://journals.lww.com/transplantjournal/Fulltext/2017/10000/Kim_Solez,_Edmonton,_Alberta,_Canada_Banff___A.4.aspx
https://journals.lww.com/transplantjournal/fulltext/2018/11000/A_2018_Reference_Guide_to_the_Banff_Classification.14.aspx
Pathology
Organ transplantation |
https://en.wikipedia.org/wiki/Eastern%20Asia%20%28WGSRPD%29 | Eastern Asia is one of the regions of temperate Asia defined in the World Geographical Scheme for Recording Plant Distributions (WGSRPD) for use in recording the distribution of plants. It is very much smaller than common definitions of East Asia. It consists of the Korean Peninsula, Japan (Hokkaido, Honshu, Kyushu and Shikoku, plus associated offshore islands – the Volcano Islands (Kazan-retto), the Ryukyu Islands (Nansei-shoto) and the Bonin Islands (Ogasawara-shoto)), and Taiwan. Some islands belonging to Japan politically, such as Marcus Island (Minami-Tori-shima), have greater floristic affinity with similar Pacific islands and are placed in the botanical continent of the Pacific.
WGSRPD system
The WGSRPD is a biogeographical system developed by the international Biodiversity Information Standards (TDWG) organization. The system provides clear definitions and codes for recording plant distributions at four scales or levels, from "botanical continents" down to parts of large countries. The top two levels are given numerical codes. The botanical continent 3 Asia-Temperate has nine regions, one of which is 38 Eastern Asia.
Organizations and works using the scheme include the International Union for Conservation of Nature (IUCN), the Germplasm Resources Information Network (GRIN), and the World Checklist of Selected Plant Families (WCSP). For example, the entry for Lilium concolor in the WCSP includes the numerical codes "30 31 36 37 38", the initial "3" showing these are all regions of Asia-Temperate, with "38" being Eastern Asia.
Eastern Asia subdivisions
The Eastern Asia region is subdivided into areas and "basic recording units", which are given letter codes:
Changes
Some small changes were made to the Eastern Asia region between the first and second editions of the WGSRPD. The Volcano Islands (Kazan-retto) and the Bonin Islands (Ogasawara-shoto) were moved from the Pacific botanical continent to Eastern Asia within Asia-Temperate as they have many endemic |
https://en.wikipedia.org/wiki/Matt%20Parker | Matthew Thomas Parker (born 22 December 1980) is an Australian recreational mathematician, author, comedian, YouTube personality and science communicator based in the United Kingdom. His book Humble Pi was the first maths book in the UK to be a Sunday Times No. 1 bestseller. Parker was the Public Engagement in Mathematics Fellow at Queen Mary University of London. He is a former maths teacher and has helped popularise maths via his tours and videos.
Early life and education
Matt Parker was born in Perth, Australia, and grew up in the northern suburb of Duncraig. He began showing an interest in maths and science from a young age, and at one point was part of his school's titration team.
Parker went to the University of Western Australia and started off studying mechanical engineering before he "realized the very real risk of being employable at the end of it." He switched into physics and later mathematics. His love of maths led him to want a job in the subject.
While at university, Parker wrote comedy for Pelican, the students' magazine, and produced comedy sketches. Having become interested in comedy, he enrolled on course for stand-up.
Career
After college, Parker taught maths in Australia for a while before moving to London and continuing teaching. He became involved in support education, working with universities and other organizations to arrange maths talks. He later went back to teaching, before stopping after one year. He now helps students communicate mathematics to other people, speaks at schools, does media work, and occasionally writes about maths. His goal is "to get more people more excited about maths."
Parker has appeared in numerous YouTube videos, talking about various subjects related to mathematics. He has his own YouTube channel, "Stand-up Maths", with over one million subscribers, and also frequently appears as a guest on other popular channels such as Brady Haran's Numberphile and James May's Head Squeeze (now BritLab). Parker has made |
https://en.wikipedia.org/wiki/HackBB | HackBB was a Tor hidden service Internet forum specializing in buying stolen credit cards, skimming ATMs, and hacking computers, servers and accounts. The site was often a destination for hacked and stolen data dumps. At some point the site was hosted by Tor hosting company Freedom Hosting.
The site was founded by 'OptimusCrime' in the earlier days of Tor. In June 2012, user 'Boneless' was promoted to an administrator role, who went on to handle site escrow. However, in March 2013 Boneless's account was used to destroy the site's database, and again in May by some accounts he secretly created. The site initially recovered from this, but shut down sometime afterwards due to the loss of faith in the site's administration and the raid on its host Freedom Hosting in August 2013.
References
Internet forums
Defunct Tor hidden services
Crime forums
Hacker groups
Carding (fraud) |
https://en.wikipedia.org/wiki/Rescator | Rescator is the name of a Ukrainian hacker specialising in the sale of credit card details. According to Russian cyber-security consultancy Group-IB, "Rescator" (AKA Helkern and ikaikki) runs his own marketplace at rescator.cm and uploaded over 5 million card details onto the SWIPED carder marketplace.
Credit card details have been stolen from places like Minnesota and the United Kingdom, the website allows searches by zip code so that stolen card numbers can be cashed out more locally to their victim to avoid alerting banks. Unlike the now defunct Tor Carding Forums, the site is free to use, payments requiring direct Bitcoin payments to sellers without escrow features more common on darknet markets. Many of the stolen details from the Target, Home Depot and Sally Beauty data breaches ended up at the site.
In March 2014, the site was briefly defaced by a rival hacker.
References
Internet forums
Crime forums
Computer criminals
Ukrainian criminals
Dark web
Carding (fraud) |
https://en.wikipedia.org/wiki/Carder.su | Carder.su is a crime forum and online marketplace specialising in the sale of credit card details and identity theft.
Since 2007, Operation Open Market, an operation run by the HSI and the United States Secret Service has targeted the site, believed to be based in Las Vegas in the US.
In 2011, an alleged major vendor of credit card dumps and prominent Carder.su member, Roman Seleznev, was apprehended in the Maldives by US law enforcement.
In 2012, identity thief David Ray Camez was arrested and charged with everyone else in an unprecedented use of the RICO legislation.
In early 2012, American cash-out master and top level carder Cameron "Kilobit" Harrison and 38 other people were indicted under the R.I.C.O. statute and arrested for buying and selling hacked and or otherwise compromised card details via Carder.su. In November 2014, Kilobit (Cameron Harrison) was sentenced to 115 months in Federal Prison and ordered to pay $50.8 million in restitution after rejecting and refusing any plea deals that were offered by the government. His release date is set as 02/19/2021.
In January 2015 a Macedonian man Jordan Georgievski was arrested in relation to the site.
In March 2015 the US Department of State has issued a reward for information leading to the arrest of mid-level leader Konstantin Lopatin, aka "Graf" and leader Roman Olegovich Zolotarev.
References
External links
https://www.justice.gov/sites/default/files/usao-nv/legacy/2013/05/23/Open%20market%20indictment%2012-cr-00084.pdf
https://www.justice.gov/sites/default/files/usao-nv/legacy/2013/05/23/open%20market%2013-cr-00120%20indictment.pdf
https://www.justice.gov/sites/default/files/usao-nv/legacy/2013/05/23/12-04%20indictment.pdf
https://www.justice.gov/sites/default/files/usao-nv/legacy/2013/05/23/omar%20butt%2012-83%20indictmentpdf.pdf
Internet forums
Crime forums
Carding (fraud) |
https://en.wikipedia.org/wiki/Expiration%20date | An expiration date or expiry date is a previously determined date after which something should no longer be used, either by operation of law or by exceeding the anticipated shelf life for perishable goods. Expiration dates are applied to selected food products and to some other manufactured products like infant car seats where the age of the product may impact its safe use.
The legal definition and usage of terms will vary between countries and products.
Different terms may be used for products that tend to spoil and those that tend to be shelf-stable.
The term Use by is often applied to products such as milk and meat that are more likely to spoil and can become dangerous to those eating them. Such products should not be consumed past the date shown.
The term Best before is often applied to products that may deteriorate slightly in quality, but are unlikely to become dangerous as a result, such as dried foods. Such products can be eaten after their Best before date at the discretion of the consumer.
Storage and handling conditions will affect whether and when an item will spoil, so there is inherent variability in dating.
A time temperature indicator is a sensing label or device that indicates whether a product has been exposed to dangerously high or low temperatures. These indicators are often used for determining whether a product is spoiled due to external factors even if it is before the expiration date.
Arbitrary expiration dates are also commonly applied by companies to product coupons, promotional offers and credit cards. In these contexts, the expiration date is chosen for business reasons or to provide some security function rather than any product safety concern.
Expiration date is often abbreviated EXP or ED.
Terms
Use by
Generally, foods that have a use by date written on the packaging should not be eaten after the specified date. This term is generally applied to foods that may go bad due to physical instability, chemical spoilage, bacterial s |
https://en.wikipedia.org/wiki/NinKi%3A%20Urgency%20of%20Proximate%20Drawing%20Photograph | The NinKi: Urgency of Proximate Drawing Photograph (NinKi:UoPDP) was initiated by Bangladeshi visual artist Firoz Mahmud ( ফিরোজ মাহমুদ, フィロズ・マハムド ). This is a drawing photograph project to rhetorically rescue popular icons with geometric structure drawings or make photo image of the people tactically static. His pigeonhole or kind of compartmental examples of doodling were engaged on found images in various printed media and also were found in his sketchbook, books, notebooks and often in his borrowed books. The word 'Ninki' (人気) is a Japanese word which means be Popular or popularity. The Ninki: UoPDP art Project of drawing on photographs consist of numerous archetypal images of popular celebrities in vague appearance. Their career, character, fame, obscurity, activities and character are insurgent and idiosyncratic. Artist Firoz has started on any image and then specifically on Bengal tiger and more significantly on Japanese Sumo Wrestler as artist based in Japan and fascinated by sports, media and interested on humorous aspect of entertainment industries.
About
The `Urgency of Proximate Drawing Photograph` (NinKi:UoPDP) is Firoz Mahmud`s one of art projects, started as anonymously. Gradually with the requests of curators and many of his friends, he started to exhibit in public spaces and major art venues. It was initially created for changing the meaning of visual images from the original photo images which Firoz took, collected or found to experiment that how general people react seeing each one's popular icons.
History
From the inception when Firoz Mahmud exposed these drawing photographs, he focused anonymously without using his name at billboards, undergrounds, signage board or in other exhibition venues in Japan. He created this on-going art project in Tokyo since 2008 as his leisure time drawing doodle on newspapers, magazines, and found images. NinKi: Urgency of Proximate Drawing was first exhibited at the 9th Sharjah Art Biennial in 2009 in Sharjah, UA |
https://en.wikipedia.org/wiki/LogSumExp | The LogSumExp (LSE) (also called RealSoftMax or multivariable softplus) function is a smooth maximum – a smooth approximation to the maximum function, mainly used by machine learning algorithms. It is defined as the logarithm of the sum of the exponentials of the arguments:
Properties
The LogSumExp function domain is , the real coordinate space, and its codomain is , the real line.
It is an approximation to the maximum with the following bounds
The first inequality is strict unless . The second inequality is strict unless all arguments are equal.
(Proof: Let . Then . Applying the logarithm to the inequality gives the result.)
In addition, we can scale the function to make the bounds tighter. Consider the function . Then
(Proof: Replace each with for some in the inequalities above, to give
and, since
finally, dividing by gives the result.)
Also, if we multiply by a negative number instead, we of course find a comparison to the function:
The LogSumExp function is convex, and is strictly increasing everywhere in its domain (but not strictly convex everywhere).
Writing the partial derivatives are:
which means the gradient of LogSumExp is the softmax function.
The convex conjugate of LogSumExp is the negative entropy.
log-sum-exp trick for log-domain calculations
The LSE function is often encountered when the usual arithmetic computations are performed on a logarithmic scale, as in log probability.
Similar to multiplication operations in linear-scale becoming simple additions in log-scale, an addition operation in
linear-scale becomes the LSE in log-scale:
A common purpose of using log-domain computations is to increase accuracy and avoid underflow and overflow problems
when very small or very large numbers are represented directly (i.e. in a linear domain) using limited-precision
floating point numbers.
Unfortunately, the use of LSE directly in this case can again cause overflow/underflow problems. Therefore, the
following equivalent must |
https://en.wikipedia.org/wiki/Ahmia | Ahmia is a clearnet search engine for Tor's hidden services created by Juha Nurmi.
Overview
Developed during the 2014 Google Summer of Code with support from the Tor Project, the open source search engine was initially built in Django and PostgreSQL. It collects the peculiar anonymous identifier called .onion URLs from the Tor network and feeds these to its index except those containing a robots.txt file. The search engine filters out child pornography and keeps a blacklist of abusive services.
The service partners with GlobaLeaks's submissions and Tor2web statistics for hidden service discovery and as of July 2015 has indexed about 5000 sites. Ahmia is also affiliated with Hermes Center for Transparency and Digital Rights, an organization that promotes transparency and freedom-enabling technologies.
In July 2015 the site published a list of hundreds of fraudulent fake versions of web pages (including such sites as DuckDuckGo, as well a dark web page). According to Nurmi, "someone runs a fake site on a similar address to the original one and tries to fool people with that" with the intent of scamming people (e.g. gathering bitcoin money by spoofing bitcoin addresses). The background photo of this site is "Hakaniemi in Helsinki".
See also
Comparison of web search engines
List of search engines
List of search engines by popularity
References
Internet search engines
Dark web
Tor onion services |
https://en.wikipedia.org/wiki/Halo%20Wars%202 | Halo Wars 2 is a real-time strategy video game developed by 343 Industries and Creative Assembly. It was published by Microsoft Studios and released in February 2017 on Windows and Xbox One. The game is set in the science fiction universe of the Halo franchise in 2559. It is a sequel to Halo Wars (2009). The story follows the crew of Spirit of Fire, a United Nations Space Command (UNSC) ship. Spirit of Fire arrives at the Ark, a Forerunner installation responsible for constructing and remotely controlling the titular Halo rings. Conflict breaks out between the UNSC forces and an alien faction known as the Banished over control of the Ark.
In Halo Wars 2, players construct a base of operations, accumulate resources to produce infantry and vehicle units, and command their armies from a bird's-eye view of the battlefield. The primary goal during a battle is typically to destroy an opponent's bases or to capture and control territories on the battlefield. Combat is balanced by a "rock–paper–scissors" counter-attack system, in which ground vehicles are effective in combat against infantry, infantry are effective against aircraft, and aircraft are effective against ground vehicles. The game supports online multiplayer for playing cooperatively or competitively with other players.
Development of Halo Wars 2 began in 2014 when Halo franchise developer 343 Industries approached development studio Creative Assembly about a collaboration. Creative Assembly were chosen for their years of experience in developing real-time strategy games. 343 Industries wanted to integrate the story of Halo Wars 2 more closely with the ongoing storyline of the Halo series, leading them to set the game 28 years after the original Halo Wars to fix the story in the current timeline of the franchise. The game was announced in 2015 at Gamescom and showcased at a number of video game events before release. Two open betas ran during the final year of the game's production so the development team coul |
https://en.wikipedia.org/wiki/Zelle | Zelle () is a United States–based digital payments network run by a private financial services company owned by the banks Bank of America, Truist, Capital One, JPMorgan Chase, PNC Bank, U.S. Bank, and Wells Fargo. The Zelle service enables individuals to electronically transfer money from their bank account to another registered user's bank account (within the United States) using a mobile device or the website of a participating banking institution.
The Zelle instant payment service was launched in June 2017, as the successor to the clearXchange payment service. Zelle has expanded, and as of 2022 eighty percent of the US population could connect to Zelle through their banking app, with support by over 1600 financial institutions. It has been criticized for being a platform that has facilitated online financial fraud in the United States. In 2022 at a Senate Banking Committee hearing it was censured for not giving refunds to people who were tricked by criminals using Zelle.
History
In April 2011, the clearXchange service was launched. It was originally owned and operated by Bank of America, JPMorgan Chase, and Wells Fargo. The service offered person-to-person (P2P), business-to-consumer (B2C), and government-to-consumer (G2C) payments.
For person-to-person payments, clearXchange enabled users to send money to other registered users having accounts at participating banks in the United States. Users accessed the network within the websites and apps of member financial institutions, and through clearXchange's website. The network connected with existing bank accounts, so consumers would not need to fund a separate account to use the service. This feature and the lack of fees for using the service were highlighted as advantages for competition with other person-to-person payment services such as PayPal, Popmoney, and Square. The system associated each user bank account with an email address and mobile phone number, so only the recipient's email address or mobile num |
https://en.wikipedia.org/wiki/Hubert%20Bray | Hubert Lewis Bray is a mathematician and differential geometer. He is known for having proved the Riemannian Penrose inequality. He works as professor of mathematics and physics at Duke University.
Early life and education
He earned his B.A. and B.S. degrees in Mathematics and Physics in 1992 from Rice University and obtained his Ph.D. in 1997 from Stanford University under the mentorship of Richard Melvin Schoen.
Career
He was an invited speaker at the 2002 International Congress of Mathematicians in Beijing (in the section of differential geometry).
He is one of the inaugural fellows of the American Mathematical Society.
Hubert was appointed professor of mathematics in 2004, an additionally professor of physics in 2019. In 2019, he was appointed director of undergraduate studies of Duke's mathematics department.
Personal life
Hubert is the grandson of Hubert Evelyn Bray, professor of mathematics at Rice University and the first person awarded a Ph.D. by the then Rice Institute.
Hubert Bray and his brother Clark Bray share similar educations and jobs, both having studied at Rice University (undergraduate), Stanford University (graduate), and are professors of mathematics at Duke University.
See also
Duke University
References
Year of birth missing (living people)
Living people
20th-century American mathematicians
Duke University faculty
Fellows of the American Mathematical Society
Theoretical physicists
Stanford University alumni
Rice University alumni
Mathematical physicists
Geometers
Mathematical analysts
21st-century American mathematicians |
https://en.wikipedia.org/wiki/Selberg%27s%20identity | In number theory, Selberg's identity is an approximate identity involving logarithms of primes named after Atle Selberg. The identity, discovered jointly by Selberg and Paul Erdős, was used in the first elementary proof for the prime number theorem.
Statement
There are several different but equivalent forms of Selberg's identity. One form is
where the sums are over primes p and q.
Explanation
The strange-looking expression on the left side of Selberg's identity is (up to smaller terms) the sum
where the numbers
are the coefficients of the Dirichlet series
This function has a pole of order 2 at s = 1 with coefficient 2, which gives the dominant term 2x log(x) in the asymptotic expansion of
Another variation of the identity
Selberg's identity sometimes also refers to the following divisor sum identity involving the von Mangoldt function and the Möbius function when :
This variant of Selberg's identity is proved using the concept of taking derivatives of arithmetic functions defined by in Section 2.18 of Apostol's book (see also this link).
References
Prime numbers
Mathematical identities |
https://en.wikipedia.org/wiki/Swathanthra%20Malayalam%20Computing | Swathanthra Malayalam Computing (SMC) is a free software community and non profit charitable society working on Malayalam and other Indic languages. It is the biggest language computing developer community in India. This group has been involved in the Malayalam translation of GNOME, KDE, and Mozilla projects like Firefox. They developed Indic Keyboard which is a multi-language keyboard for Android. They have created several Malayalam fonts. The community also actively contributes towards Malayalam Wikipedia.
They supported Swatantra 2014 and were a part of Google Summer of Code in the years 2007, 2013, and 2014. Along with ICFOSS and The Frequently Used Entries for Localization (FUEL) Project, SMC was involved in creating a standard set of Malayalam words that developers can use while creating interfaces for mobile apps. Since August 2016, SMC community is an ICANN At-Large Structure.
References
External links
Official website
SMC fonts
Information technology organisations based in India
Free Software Foundation
Software industry in India
Indic computing |
https://en.wikipedia.org/wiki/C.%20Robert%20Wieser | C. Robert Wieser (January 19, 1919 – March 1, 2011) qualified from MIT as an electrical engineer and later became a developer of electrical and computing technology. He was especially and particularly noted for having contributed to the development of the Cape Cod Air Defense system (Cape Cod Air Force Station) and SAGE system.
Wieser directed the first successful testing of the technology necessary for the creation of an airborne interception system (using radar and computers), which from this embryonic state, would later develop into the Semi-Automatic Ground Environment system (SAGE). The SAGE system led to the development of technology known as packet switching, which contributed directly, from being a composite element of technology, to the creation of the ARPANET and ultimately the Internet.
Short biography
Wieser was born Charles Robert Wieser in New Rochelle, New York on January 19, 1919.
The following information shows a biographical history of C. Robert Wieser made using three sources:
1940 - graduated from MIT with a Bachelor in Science in Electrical Engineering and a Masters of Science in the subject Electrical Engineering.
from 1940 to 1942 - worked for the Boston Edison Company.
worked for MIT Servornechanisms Laboratory, developing the application of the Whirlwind I to air traffic control and subsequently to air defence usage (circa 1949).
1951 - joined the MIT Lincoln Laboratory, where he was leader of a group developing the Cape Cod Air Defense Direction Center, and involved in the preparation of the operational and mathematical specifications for the SAGE air defence system. Later he was appointed as head, assistant director, and finally as deputy director of the Systems Division.
1968 - was employed at the Office of the Secretary of Defense.
1971 - appointed as director of the Advanced Weapons Programs within the Douglas Astronautics Company.
1982 - vice president and general manager of the Western Division of Physical Dynamics, In |
https://en.wikipedia.org/wiki/5%2C6-Dihydroxycytosine | 5,6-Dihydroxycytosine (Isouramil) can be formed from treatment of DNA with osmium tetroxide.
References
DNA
Biochemistry
Pyrimidinediones |
https://en.wikipedia.org/wiki/Leonard%20Redshaw | Sir Leonard Redshaw (15 April 1911 – 29 April 1989) was a shipbuilder from Barrow-in-Furness, England.
Like his father, Redshaw became an apprentice ships' draughtsman at Vickers shipyard at the age of 16. Though this was unusual at the time, he completed graduate work at Liverpool University in naval architecture, including some time in German plants in 1934. After advancing through management, he became the Shipbuilding Manager at the yard in 1950, aged 39, and then the managing director of the Barrow-based Vickers Shipbuilding Group in 1965. In 1968, he became the chairman of the company, and was knighted for his contributions to British exports in 1972. He retired in 1976, having been promoted to deputy chairman of Vickers. In later life, he was a member of a so-called "Suicide Squad" of older engineers and scientists who volunteered to be first responders in disasters involving nuclear reactors.
At Barrow, Redshaw oversaw the building of HMS Dreadnought, the United Kingdom's first nuclear-powered submarine, and subsequently saw Barrow achieve a monopoly on the construction of British nuclear submarines. The Dreadnought success also led to the yard being appointed the primary builder of the submarines for the UK Polaris programme. During this time, Redshaw was named as the "Builders Chief Polaris Executive"; on this project, he worked opposite and alongside Rear Admiral Hugh McKenzie of the Royal Navy. The pair were mutually hostile, with Redshaw doubting that McKenzie had the business acumen to handle the project, and McKenzie thinking Redshaw and Barrow's plant to be highly outdated.
The shipyard was highly profitable under his management, succeeding while other shipbuilding ventures were failing and becoming the major profit centre of the wider Vickers company. Despite this, Redshaw had a series of protracted disagreements with the ship builders' unions concerning the company's direction, and he was in turn critical of the unions' power.
Redshaw published |
https://en.wikipedia.org/wiki/Lars%20Eilebrecht | Lars Eilebrecht (born March 1972) is a German software engineer, solutions architect, IT security expert, and Open Source evangelist. He is one of the original developers of the Apache HTTP Server, and co-founder and former Vice President of the Apache Software Foundation. Lars was based in the United Kingdom between 2009 and 2019 where he founded the IT consultancy company Primevation Ltd. Since 2019 he is based in Germany where he works as a Chief Information Security Officer.
Open Source
Lars has been active in open software projects, and most notably the Apache HTTP Server project. He was a member of the Apache Group, and is co-founder and member of the Apache Software Foundation.
Since the beginning of the Apache Software Foundation he was a member of the Conferences Committee helping the foundation to organise ApacheCon events. He served as Vice President, Conference Planning from 2007 to 2009. Additionally he is a member of the ASF Security Team and the ASF Public Relations Committee.
Lars is an Open Source evangelist and received O'Reilly's Appaloosa Award for raising awareness of Apache.
Career
Between 2008 and 2019 Lars worked as an independent IT consultant for companies such as the BBC, Channel 4, Heise Media, El Tiempo and Pearson. Lars was owner and managing director of Primevation Ltd, and partner at pliXos GmbH. Previous employers of Lars Eilebrecht include Ciphire Labs, Quam, Parc Technologies, CyberSolutions, and Cable & Wireless.
Lars has an interest in IT security and cryptography. He has worked as a CISO for the Widas Group and polypoly, was Director Security Solutions and Chief Security Architect at Ciphire Labs, and speaker at conferences such as Financial Cryptography and Data Security and the 21st Chaos Communication Congress (21C3). Lars was a member of the International Financial Cryptography Association from 2005 to 2006.
In 1998 Lars received a Master of Science degree in Computer Engineering from the University of Siegen in Germ |
https://en.wikipedia.org/wiki/Human%E2%80%93animal%20hybrid | A human–animal hybrid and animal–human hybrid is an organism that incorporates elements from both humans and non-human animals. Technically, in a human–animal hybrid, each cell has both human and non-human genetic material. It is in contrast to an individual where some cells are human and some are derived from a different organism, called a human-animal chimera.
Examples of human–animal hybrids mainly include humanized mice that have been genetically modified by xenotransplantation of human genes. Humanized mice are commonly used as small animal models in biological and medical research for human therapeutics.
Human-animal hybrids are the subject of legal, moral, and technological debate in the context of recent advances in genetic engineering.
Human–animal hybrids have existed throughout social cultures for a long time (particularly in terms of mythology), being a part of storytelling across multiple continents, and have also been incorporated into comic books, films, video games, and other related mass media in recent decades.
Terminology
Defined by the magazine H+ as "genetic alterations that are blendings [sic] of animal and human forms", such hybrids may be referred by other names occasionally such as "para-humans". They may additionally may be called "humanized animals". Technically speaking, they are also related to "cybrids" (cytoplasmic hybrids), with "cybrid" cells featuring foreign human nuclei inside of them being a topic of interest. Possibly, a real-world human-animal hybrid may be an entity formed from either a human egg fertilized by a nonhuman sperm or a nonhuman egg fertilized by a human sperm.
Throughout past human evolution, there has been interbreeding between archaic and modern humans. For example, Neanderthal genes accounts for 1–4% of modern human genomes for people outside Sub-Saharan Africa. However, as archaic humans may not be classified as animals, such interbreeding is generally not classified as human–animal hybridization.
Examp |
https://en.wikipedia.org/wiki/Essential%20monomorphism | In mathematics, specifically category theory, an essential monomorphism is a monomorphism f in a category C such that for a morphism g in C, the morphism is a monomorphism only when g is a monomorphism. Essential monomorphisms in a category of modules are those whose image is an essential submodule of the codomain. An injective hull of an object X is an essential monomorphism from X to an injective object.
References
Category theory |
https://en.wikipedia.org/wiki/Pancake%20machine | A pancake machine is an electrically-powered machine that automatically produces cooked pancakes. It is believed that the earliest known pancake machine was invented in the United States in 1928. Several types of pancake machines exist that perform in various manners, for both commercial and home use. Some are fully automatic in operation, while others are semi-automatic. Some companies mass-produce pancake machines, and some have been homemade. The Happy Egg Company constructed a novelty pancake machine in 2013 in commemoration of Pancake Day in the United Kingdom.
History
In 1928, a man in Portland, Oregon, invented an electric pancake machine that operated by the process of batter being dropped onto a revolving heated flattop grill from a storage cylinder atop the grill. The grill was heated using electricity. The amount of batter dropped was controlled by using controlled amounts of compressed air, which pushed batter out of the storage cylinder. As the batter revolved on the hot grill, the pancake was flipped halfway through the cooking process by a shelf atop the grill. After being flipped, the completed pancake was ejected from the machine upon contact with a gate.
In 1955 in the United States, an automatic pancake machine was developed by Vendo, which used a specially formulated pancake batter mix that was manufactured by the Quaker Oats Company's Aunt Jemima branch. The Vendo machine could produce pancakes "in less than three minutes". It was a semi-automatic machine that performed all of the cooking functions except for the pouring of the pancake batter.
In 1956, four Racine, Wisconsin, engineers developed and fabricated two, 5' diameter gas burning pancake machines for the annual
Pancake Day sponsored by the Kiwanis Club there in Racine.
Types and uses
Various types of pancake machines exist, such as those that run pancake batter through a heated conveyor inside of a box unit, and those that automatically drop pancake batter onto a flattop grill. So |
https://en.wikipedia.org/wiki/Fraunhofer%20Institute%20for%20Telecommunications | The Fraunhofer Institute for Telecommunications, Heinrich Hertz Institute, HHI, also known as Fraunhofer HHI or Fraunhofer Heinrich Hertz Institute, is an organization of the Fraunhofer Society based in Berlin. The institute engages in applied research and development in the fields of physics, electrical engineering and computer sciences.
Competencies
The Fraunhofer Heinrich Hertz Institute develops mobile and stationary broadband communication networks and multimedia systems. Focal points of independent and contract research conducted by Fraunhofer HHI are photonic components and systems, fiber optic sensor systems, and image signal processing and transmission. Future applications for broadband networks are developed as well. Research in this area focuses on 3D displays, UHD panorama video production, human-machine interaction through gesture control, optical satellite communication and data transmission technologies such as visible light communications.
Scientists at the institute work together with national and international research and industry partners. For example, institute researchers were involved in the development of the H.264 AVC video compression standard and its successor H.265 HEVC as part of the Moving Picture Experts Group (MPEG) and the Video Coding Experts Group (VCEG). Work on the various video compression standards received the Technology and Engineering Emmy award multiple times.
Research
The research and development work of the Fraunhofer HHI takes place in six departments.
The research focus of the Photonic Networks and Systems department are high-performance optical transmission systems for use in in-house, access, metropolitan, wide-area and satellite communication networks. The focus is on increasing the capacity as well as improving security and energy efficiency.
The Photonic Components department develops optoelectronic semiconductor components as well as integrated optical circuits for data transmission. Another focus is on inf |
https://en.wikipedia.org/wiki/QPACE2 | QPACE 2 (QCD Parallel Computing Engine) is a massively parallel and scalable supercomputer. It was designed for applications in lattice quantum chromodynamics but is also suitable for a wider range of applications..
Overview
QPACE 2 is a follow-up to the QPACE supercomputer and the iDataCool hot-water cooling project.
It is a combined effort of the particle physics group at the University of Regensburg and the Italian company Eurotech. The academic design team consisted of about 10 junior and senior physicists.
Details of the project are described in.
QPACE 2 uses Intel Xeon Phi processors (a.k.a. KNC), interconnected by a combination of PCI Express (abbreviated PCIe) and FDR InfiniBand.
The main features of the QPACE 2 prototype installed at the University of Regensburg are
scalability
high packaging density
warm-water cooling (no chillers are needed)
high energy efficiency
cost-effective design
The prototype is a one-rack installation that consists of 64 nodes with 15,872 physical cores in total and a peak performance of 310 TFlop/s. It was deployed in the summer of 2015 and is being used for simulations of lattice quantum chromodynamics. In November 2015, QPACE 2 was ranked #500 on the Top500 list of the most powerful supercomputers and #15 on the Green 500 list of the most energy-efficient supercomputers of the world.
QPACE 2 was funded by the German Research Foundation (DFG) in the framework of SFB/TRR-55 and by Eurotech.
Architecture
Many current supercomputers are hybrid architectures that use accelerator cards with a PCIe interface to boost the compute performance. In general, server processors support only a limited number of accelerators due to the limited number of PCIe lanes (typically 40 for the Intel Haswell architecture). The common approach to integrate multiple accelerators cards into the host system is to arrange multiple server processors, typically two or four, as distributed shared memory systems. This approach allows for a high |
https://en.wikipedia.org/wiki/Outline%20of%20fungi | The following outline is provided as an overview of and topical guide to fungi and mycology:
Fungi – "Fungi" is plural for "fungus". A fungus is any member of the group of eukaryotic organisms that includes unicellular microorganisms such as yeasts and molds, as well as multicellular fungi that produce familiar fruiting forms known as mushrooms. Biologists classify these organisms as a kingdom, Fungi, the second highest taxonomic rank of living organism beneath the Eukaryota domain; other kingdoms include plants, animals, protists, and bacteria. One difference that places fungi in a different kingdom is that their cell walls contain chitin, unlike the cell walls of plants, bacteria and some protists. Similar to animals, fungi are heterotrophs, that is, they acquire their food by absorbing dissolved molecules, typically by secreting digestive enzymes into their environment. Growth is their means of mobility, except for spores (a few of which are flagellated), which may travel through air or water. Fungi function as the principal decomposers in ecological systems.
Types of fungi
By form
Molds
Aspergillus (list)
Fusarium (list)
Mushrooms
Agaricus (list)
Amanita (list)
Armillaria (list)
Boletus (list)
Coprinellus (list)
Coprinopsis (list)
Cortinarius (list)
Entoloma (list)
Gymnopilus (list)
Gymnopus (list)
Hebeloma (list)
Hygrocybe (list)
Hygrophorus (list)
Inocybe (list)
Lactarius (list)
Lactifluus (list)
Lepiota (list)
Leucoagaricus (list)
Leccinum (list)
Marasmius (list)
Pleurotus (list)
Yeasts
Other
Cyathus (list)
By activity
Carnivorous fungi
Pathogenic fungi
Poisonous fungi
Poisonous mushrooms
List of poisonous mushrooms
List of deadly mushrooms
By aspect
Bioluminescent fungi
Deadly fungi
By use
Medicinal fungi
Edible fungi
Edible molds
Penicillium camemberti – used in the production of Brie cheese and Camembert cheese
Penicillium glaucum – used in making Gorgonzola cheese
Penicillium roqueforti – used in making Roq |
https://en.wikipedia.org/wiki/Riseup | Riseup is a volunteer-run collective providing secure email, email lists, a VPN service, online chat, and other online services. This organization was launched by activists in Seattle with borrowed equipment and a few users in 1999 or 2000, and quickly grew to millions of accounts.
As of 2013, Riseup features 6 million subscribers spread across 14,000 lists. Their projects have included the Stop Watching Us campaign against global surveillance disclosures revealed by Edward Snowden.
Products
Riseup provides products to facilitate secure communications, including use of strong encryption, anonymizing services, and minimal data retention, which aimed at individuals and non-profit and activist groups. Riseup's two most popular features are secure, privacy-focused email and mailing list management services.
The email service is available through IMAP, POP3, and a web interface. The web interface is a variant of Roundcube or SquirrelMail.
According to Kate Krauss at Technical.ly in April 2017, "riseup is a famously ethical nonprofit organization", and "the riseup VPN does not log your IP address, unlike most other VPNs." In 2012, discussing an attack against a Microsoft-developed authentication scheme that makes it trivial to break the encryption used by hundreds of anonymity and security services, Moxie Marlinspike, who unveiled the attack, said VPN services offered by riseup.net, for example, selected a 21-character password on behalf of the user that used a combination of 96 different numbers, symbols, and upper- and lower-case letters to withstand such attacks.
Legal
In 2011 Riseup was said to be the only one of several subpoenaed groups to resist subpoenas related to 2008 Bash Back protests.
In 2014, Riseup Network was one of several claimants against GCHQ in international court. Devin Theriot-Orr of Riseup.net said, "People have a fundamental right to communicate with each other free from pervasive government surveillance. The right to communicate, and the |
https://en.wikipedia.org/wiki/Reference%20mark | The reference mark or reference symbol "※" is a typographic mark or word used in Chinese, Japanese and Korean (CJK) writing.
The symbol was used historically to call attention to an important sentence or idea, such as a prologue or footnote. As an indicator of a note, the mark serves the same purpose as the asterisk in English. However, in Japanese usage, the note text is placed directly into the main text immediately after the reference mark, rather than at the bottom of the page or end of chapter as is the case in English writing.
Names
The Japanese name, (; , , ), refers to the symbol's visual similarity to the for "rice" ().
In Korean, the symbol's name, (), simply means "reference mark". Informally, the symbol is often called (; ), as it is often used to indicate the presence of pool halls, due to its visual similarity to two crossed cue sticks and four billiard balls.
In Chinese, the symbol is called () or ( due to its visual similarity to "rice"). It is not often used in Chinese writing.
Unicode
In Unicode, the symbol has code point
See also
, also called reference signal or midamble in wireless communications.
References
Symbols
Japanese writing system
Korean writing system |
https://en.wikipedia.org/wiki/Launching%20gantry | A launching gantry (also called beam launcher, girder launcher, bridge building crane, and bridge-building machine, locally nicknamed the "Iron Monster") is a special-purpose mobile gantry crane used in bridge construction, specifically segmental bridges that use precast box girder bridge segments or precast girders in highway and high-speed rail bridge construction projects. The launching gantry is used to lift and support bridge segments or girders as they are placed while being supported by the bridge piers instead of the ground.
While superficially similar, launching gantry machines should not be confused with movable scaffolding systems, which also are used in segmental bridge construction. Both feature long girders spanning multiple bridge spans which move with the work, but launching gantry machines are used to lift and support precast bridge segments and bridge girders, while movable scaffolding systems are used for cast-in-place construction of bridge segments.
Operation and design
Typically, precast segmental bridges and precast girders are placed using ground-based cranes to lift each segment or girder. However, ground access to the spans may be challenged by the presence of existing infrastructure or bodies of water, or the height to which the segments must be raised can exceed the reach of ground-based cranes. A launching gantry can be used to solve these issues.
The most visible feature of a launching gantry are the twin parallel girders, which can either be above (upper-beam) or below (lower-beam or underslung) the bridge deck. However, a single beam can also be used, typically in upper-beam configuration. The launching gantry machine usually is sized to the construction project, with the length of the twin main girders approximately 2.3 times the distance between spans. This length enables the launching gantry to span the gap between two adjacent bridge piers while providing allowances for the distance required for launching to the next span and f |
https://en.wikipedia.org/wiki/Glacial%20refugium | A glacial refugium (plural refugia) is a geographic region which made possible the survival of flora and fauna during ice ages and allowed for post-glacial re-colonization. Different types of glacial refugia can be distinguished, namely nunatak, peripheral, and lowland. Glacial refugia have been suggested as a major cause of floral and faunal distribution patterns in both temperate and tropical latitudes. With respect to disjunct populations of modern-day species, especially in birds, doubt has been cast on the validity of such inferences, as much of the differentiation between populations observed today may have occurred before or after their restriction to refugia. In contrast, isolated geographic locales that host one or more critically endangered species (regarded as paleoendemics or glacial relicts) are generally uncontested as bona fide glacial refugia.
Identification of glacial refugia
Traditionally, the identification of glacial refugia has occurred through palaeoecological analysis, which examines fossil organisms and their remains to determine the origins of modern taxa. For example, paleoecological approaches have been used to reconstruct the distributions of pollen in Europe for the 13,000 years since the last glaciation. Researchers in this case ultimately established the spread of forest trees from the mountainous southern fringe of Europe, which suggests that this area served as a glacial refugium during this time.
Different types of glacial refugia
In studies exploring the extent of glacial refugia in mountain species, three distinct types of glacial refugium have been identified.
Nunatak glacial refugia
A nunatak is a type of glacial refugium that is located on the snow-free, exposed peaks of mountains, which lie above the ice sheet during glaciations. The identification of ‘diversity hotspots’ in areas, which should have been migration regions during major glacial episodes, is evidence for nunatak glacial refugia. For example, the Monte Ros |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.