source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Carding%20%28fraud%29 | Carding is a term describing the trafficking and unauthorized use of credit cards. The stolen credit cards or credit card numbers are then used to buy prepaid gift cards to cover up the tracks. Activities also encompass exploitation of personal data, and money laundering techniques. Modern carding sites have been described as full-service commercial entities.
Acquisition
There are a great many of methods to acquire credit card and associated financial and personal data. The earliest known carding methods have also included "trashing" for financial data, raiding mail boxes and working with insiders. Some bank card numbers can be semi-automatically generated based on known sequences via a "BIN attack". Carders might attempt a "distributed guessing attack" to discover valid numbers by submitting numbers across a high number of ecommerce sites simultaneously.
Today, various methodologies include skimmers at ATMs, hacking or web skimming an ecommerce or payment processing site or even intercepting card data within a point of sale network. Randomly calling hotel room phones asking guests to "confirm" credit card details is example of a social engineering attack vector.
Resale
Stolen data may be bundled as a "Base" or "First-hand base" if the seller participated in the theft themselves. Resellers may buy "packs" of dumps from multiple sources. Ultimately, the data may be sold on darknet markets and other carding sites and forums specialising in these types of illegal goods. Teenagers have gotten involved in fraud such as using card details to order pizzas.
On the more sophisticated of such sites, individual "dumps" may be purchased by zip code and country so as to avoid alerting banks about their misuse. Automatic checker services perform validation en masse in order to quickly check if a card has yet to be blocked. Sellers will advertise their dump's "valid rate", based on estimates or checker data. Cards with a greater than 90% valid rate command higher prices. |
https://en.wikipedia.org/wiki/Syllabical%20and%20Steganographical%20Table | Syllabical and Steganographical Table (French: Tableau syllabique et stéganographique) is an eighteenth-century cryptographical work by P. R. Wouves. Published by Benjamin Franklin Bache in 1797, it provided a method for representing pairs of letters by numbers. It may have been the first chart for cryptographic purposes to have been printed in the United States.
References
1797 non-fiction books
American non-fiction books
History of cryptography
Cryptography books
Works of uncertain authorship
Benjamin Franklin |
https://en.wikipedia.org/wiki/Alfonso%20Farina | Alfonso Farina (born January 25, 1948) is an Italian electronic engineer and former industry manager. He is most noted for the development of the track while scan techniques for radars and generally for the development of a wide range of signal processing techniques used for sensors where tracking plays an essential role. He is author of about 1000 publications. His work was aimed to a synergistic cooperation between industry and academy.
Biography
Alfonso Farina was born in Petrella Salto, a small town near Rieti in 1948. He obtained a doctoral – laurea - degree in electronic engineering on 1973 at University La Sapienza in Rome. In 1974 he joined Selenia, a Finmeccanica company then become Selex ES. Here he held the role of director of the analysis of integrate systems unit and then chief engineer of large business systems division. More recently, he has been the senior VP CTO of the company and then senior advisor to the CTO. From 1979 to 1985 he also was professor ("incaricato") of radar techniques at the University of Naples.
He retired in October 2014 but, currently, works as a consultant.
Work
The activity of Alfonso Farina spans a wide range of arguments in the area of radars and sensors. His pioneering work on track while scan, now widely used in all radars, was recounted in a classical set of two books
that due to their widespread relevance have gone published also with Russian and Chinese translations. A more recent publication by him also accounts for ideas and applications on adaptive radar signal processing.
He has also been the contributor to the article on ECCM, invited by Merrill Skolnik, in the second edition of the Radar Handbook (Ch. 9)
and the third (Ch. 24)
Together with Artenio Russo, he has generalised the well-known Swerling target fluctuation cases these being special cases.
Together with Sergio Barbarossa, he introduced time-frequency distributions in the analysis of synthetic-aperture radar signals The methods are useful, in p |
https://en.wikipedia.org/wiki/List%20of%20mechanical%20keyboards | Mechanical keyboards (or mechanical-switch keyboards) are computer keyboards which have an individual switch for each key.
The following table is a compilation list of mechanical keyboard models, brands, and series:
Mechanical keyboards
References
Computer keyboards
Mechanical keyboards |
https://en.wikipedia.org/wiki/Theory%20of%20fructification | In economics, the theory of fructification is a theory of the interest rate which was proposed by French economist and finance minister Anne Robert Jacques Turgot. The term theory of fructification is due to Eugen von Böhm-Bawerk who considered Turgot as the first economist who tried to develop a scientific explanation of the interest rate.
According to Turgot, a capitalist can either lend his money, or employ it in the purchase of a plot of land. Because fruitful land yields an annual rent forever, its price is given by the formula of a perpetual annuity: If A denotes the land's annual rent and r denotes the interest rate, the land price is simply A/r. From this formula, Turgot concluded that "the lower the interest rate, the more valuable is the land." Specifically, if the interest rate approached zero, the land price would become infinite. Because land prices must be finite, it follows that the interest rate is strictly positive. Turgot argued also that the mechanism which keeps interest rates above zero crowds out inefficient capital formation.
Böhm-Bawerk, who sponsored a different interest theory, considered Turgot's approach as circular. However, according to Joseph Schumpeter, the eminent economic historian, "Turgot's contribution is not only by far the greatest performance in the field of interest theory the eighteenth century produced but it clearly foreshadowed much of the best thought of the last decades of the nineteenth."
Much later, economists demonstrated that the theory of fructification can be stated rigorously in a general equilibrium model. They also generalized Turgot's proposition in two respects. First, land which is useful for residential or industrial purposes can be substituted for agricultural land. Second, in a growing economy, the existence of land implies that the interest rate exceeds the growth rate if the land's income share is bounded away from zero. The latter result is notable because it states that land ensures dynamic effici |
https://en.wikipedia.org/wiki/Cape%20Provinces | The Cape Provinces of South Africa is a biogeographical area used in the World Geographical Scheme for Recording Plant Distributions (WGSRPD). It is part of the WGSRPD region 27 Southern Africa. The area has the code "CPP". It includes the South African provinces of the Eastern Cape, the Northern Cape and the Western Cape, together making up most of the former Cape Province.
The area includes the Cape Floristic Region, the smallest of the six recognised floral kingdoms of the world, an area of extraordinarily high diversity and endemism, home to more than 9,000 vascular plant species, of which 69 percent are endemic.
See also
Northern Provinces
References
Bibliography
Biogeography |
https://en.wikipedia.org/wiki/Matroid%20girth | In matroid theory, a mathematical discipline, the girth of a matroid is the size of its smallest circuit or dependent set. The cogirth of a matroid is the girth of its dual matroid. Matroid girth generalizes the notion of the shortest cycle in a graph, the edge connectivity of a graph, Hall sets in bipartite graphs, even sets in families of sets, and general position of point sets. It is hard to compute, but fixed-parameter tractable for linear matroids when parameterized both by the matroid rank and the field size of a linear representation.
Examples
The "girth" terminology generalizes the use of girth in graph theory, meaning the length of the shortest cycle in a graph: the girth of a graphic matroid is the same as the girth of its underlying graph.
The girth of other classes of matroids also corresponds to important combinatorial problems. For instance, the girth of a co-graphic matroid (or the cogirth of a graphic matroid) equals the edge connectivity of the underlying graph, the number of edges in a minimum cut of the graph. The girth of a transversal matroid gives the cardinality of a minimum Hall set in a bipartite graph: this is a set of vertices on one side of the bipartition that does not form the set of endpoints of a matching in the graph.
Any set of points in Euclidean space gives rise to a real linear matroid by interpreting the Cartesian coordinates of the points as the vectors of a matroid representation.
The girth of the resulting matroid equals one plus the dimension of the space when the underlying set of point is in general position, and is smaller otherwise.
Girths of real linear matroids also arise in compressed sensing, where the same concept is referred to as the spark of a matrix.
The girth of a binary matroid gives the cardinality of a minimum even set, a subcollection of a family of sets that includes an even number of copies of each set element.
Computational complexity
Determining the girth of a binary matroid is NP-hard.
Addition |
https://en.wikipedia.org/wiki/Surface%20plasmon%20resonance%20microscopy | Surface plasmon resonance microscopy (SPRM), also called surface plasmon resonance imaging (SPRI), is a label free analytical tool that combines the surface plasmon resonance of metallic surfaces with imaging of the metallic surface.
The heterogeneity of the refractive index of the metallic surface imparts high contrast images, caused by the shift in the resonance angle. SPRM can achieve a sub-nanometer thickness sensitivity and lateral resolution achieves values of micrometer scale. SPRM is used to characterize surfaces such as self-assembled monolayers, multilayer films, metal nanoparticles, oligonucleotide arrays, and binding and reduction reactions. Surface plasmon polaritons are surface electromagnetic waves coupled to oscillating free electrons of a metallic surface that propagate along a metal/dielectric interface. Since polaritons are highly sensitive to small changes in the refractive index of the metallic material, it can be used as a biosensing tool that does not require labeling. SPRM measurements can be made in real-time, such as measuring binding kinetics of membrane proteins in single cells, or DNA hybridization.
History
The concept of classical SPR has been since 1968 but the SPR imaging technique was introduced in 1988 by Rothenhäusler and Knoll. Capturing a high resolution image of low contrast samples for optical measuring techniques is a near impossible task until the introduction of SPRM technique that came into existence in the year 1988. In SPRM technique, plasmon surface polariton (PSP) waves are used for illumination. In simple words, SPRI technology is an advanced version of classical SPR analysis, where the sample is monitored without label through the use of a CCD camera. The SPRI technology with the aid of CCD camera gives advantage of recording the sensograms and SPR images, and simultaneously analyzes hundreds of interactions.
Principles
Surface plasmons or surface plasmon polaritons are generated by coupling of electrical field wit |
https://en.wikipedia.org/wiki/Northern%20Provinces | The Northern Provinces of South Africa is a biogeographical area used in the World Geographical Scheme for Recording Plant Distributions (WGSRPD). It is part of the WGSRPD region 27 Southern Africa. The area has the code "TVL". It includes the South African provinces of Gauteng, Mpumalanga, Limpopo (Northern Province) and North West, together making up an area slightly larger than the former Transvaal Province.
See also
Cape Provinces
References
Bibliography
Biogeography |
https://en.wikipedia.org/wiki/BisQue%20%28Bioimage%20Analysis%20and%20Management%20Platform%29 | BisQue is a free, open source web-based platform for the exchange and exploration of large, complex datasets. It is being developed at the Vision Research Lab at the University of California, Santa Barbara. BisQue specifically supports large scale, multi-dimensional multimodal-images and image analysis. Metadata is stored as arbitrarily nested and linked tag/value pairs, allowing for domain-specific data organization. Image analysis modules can be added to perform complex analysis tasks on compute clusters. Analysis results are stored within the database for further querying and processing. The data and analysis provenance is maintained for reproducibility of results. BisQue can be easily deployed in cloud computing environments or on computer clusters for scalability. BisQue has been integrated into the NSF Cyberinfrastructure project CyVerse. The user interacts with BisQue via any modern web browser.
History
Project BisQue originally started in 2004 as part of the US National Science Foundation (NSF) supported Center for Bio-Image Informatics at UCSB, to facilitate integration of database and image analysis methods, specifically in the context of microscopy images. Given the diversity of imaging equipment and image formats, there was an urgent need to access multiple formats in a uniform way. More importantly, there was also a need for maintaining the analysis provenance for reproducing image analysis results. Very early on, it was realized that BisQue has to go schema-less to support the needs of diverse biological experiments—each experiment and analysis results are unique and slightly different. Further, from the beginning, BisQue focused on using the web browser as the standard interface. These posed unique database and visualization challenges while dealing with large scale multimodal data, and in the process BisQue has developed a unique and novel framework for visualizing very large images (100k x 100k pixels, for example), and currently supports over 25 |
https://en.wikipedia.org/wiki/Transient%20photocurrent | Transient photocurrent (TPC) is a measurement technique, typically employed in the physics of thin film semiconductors. TPC allows to study the time-dependent (on a microsecond time scale) extraction of charges generated by photovoltaic effect in semiconductor devices, such as solar cells.
A semiconductor is sandwiched between two extracting electrodes. When it is excited with a short pulse of light (as short as 100 femtoseconds), the photogenerated charges are extracted on the electrodes, resulting in a current, which is detected by an oscilloscope in form of voltage across a resistor. Since the excitation pulse is square, there are two ways to measure TPC: in a “light on” and a “light off” positions. In a “Light on”, the signal is recorded as soon as the excitation pulse is switched on, allowing to observe the build-up of charges on the electrode after the start of excitation. “Light off” measurements show how the charges decay after the pulse is switched off.
In contrast to transient photovoltage, TPC measurements are conducted under short circuit condition and yield information about extractable charges, charge recombination and density of states. Quite often, TPC measurements help to build “drift-diffusion” model which reflects trapping and detrapping of the photogenerated charges and the quality of contact between different layers.
TPC allows varying different measurement parameters, such as intensity or length of the light pulse, applied voltage, etc.
See also
Time resolved microwave conductivity
Photoconductance decay
References
Guo, F. et al. A nanocomposite ultraviolet photodetector based on interfacial trap-controlled charge injection. Nat. Nanotechnol. 7, 798–802 (2012).
MacKenzie, R. C. I., Shuttle, C. G., Chabinyc, M. L. & Nelson, J. Extracting Microscopic Device Parameters from Transient Photocurrent Measurements of P3HT:PCBM Solar Cells. Adv. Energy Mater. 2, 662–669 (2012).
External links
OPV characterization techniques
Transient phot |
https://en.wikipedia.org/wiki/Absolute%20Linux | Absolute Linux is a lightweight Linux distribution that works on older hardware and is based on Slackware Linux. The client is designed for everyday use (internet, multimedia, documents). Absolute Linux's default window and file managers are IceWM and ROX-Filer. Some of the programs offered by default include: GIMP, LibreOffice, Firefox, Xfburn, p7zip, qBittorrent, and Vivaldi. Many script utilities are included with Absolute Linux to aid with configuration and maintenance of the system.
Absolute Linux uses a graphical frontend to XPKGTOOL. Absolute Linux also bundles Gsplat, a Graphical frontend to Slapt-get which works similarly to Apt-get.
See also
IceWM
Lightweight Portable Security
Lightweight Linux distribution
Slackware
Slapt-get
Linux distribution
References
External links
Operating system distributions bootable from read-only media
Live USB
Light-weight Linux distributions
Linux distributions without systemd
Linux distributions |
https://en.wikipedia.org/wiki/Clearfield%2C%20Inc. | Clearfield, Inc. manufactures and distributes passive connectivity products. Their fiber management and enclosure platform consolidates, distributes, and protects fiber through inside plant facilities, to outside plant facilities, to the home, and to the drop-off points in between. Clearfield's products service the wireless, cable, and telephone service providers, municipal-owned utilities, and non-traditional providers. Clearfield was founded in 2008 and is headquartered in Minneapolis, Minnesota.
History
1981–2008
Clearfield's history began in the late 1980s with the merging of Americable and Computer System Products. Moving forward under the business name Americable, in 2003 the company was purchased by APA Enterprises. In 2007, APA Enterprises changed course after several consecutive years of profit losses. In June 2007, Cheri Beranek took the new role of CEO. Under the new leadership, APA Enterprises redefined itself with a new vision by rebranding the company as Clearfield at the start of 2008.
2008–Present
Clearfield reported its first profitable quarter on September, 30th 2008. The company moved into its 60% larger Minneapolis Headquarters in January 2015.
Organization
Clearfield, Inc. manufacturers its fiber optic components out of its corporate office in Minneapolis, Minnesota and out of its satellite plant in Tijuana, Mexico.
Awards
Clearfield rated #14 in the top 25 small businesses in America in 2013
Eureka! Award for ingenuity and innovation
External links
Clearfield's Official Website
References
Manufacturing companies based in Minnesota
American companies established in 2008
Networking hardware companies
Wire and cable manufacturers
Companies listed on the New York Stock Exchange
Computer companies of the United States |
https://en.wikipedia.org/wiki/Homotopy%20Lie%20algebra | In mathematics, in particular abstract algebra and topology, a homotopy Lie algebra (or -algebra) is a generalisation of the concept of a differential graded Lie algebra. To be a little more specific, the Jacobi identity only holds up to homotopy. Therefore, a differential graded Lie algebra can be seen as a homotopy Lie algebra where the Jacobi identity holds on the nose. These homotopy algebras are useful in classifying deformation problems over characteristic 0 in deformation theory because deformation functors are classified by quasi-isomorphism classes of -algebras. This was later extended to all characteristics by Jonathan Pridham.
Homotopy Lie algebras have applications within mathematics and mathematical physics; they are linked, for instance, to the Batalin–Vilkovisky formalism much like differential graded Lie algebras are.
Definition
There exists several different definitions of a homotopy Lie algebra, some particularly suited to certain situations more than others. The most traditional definition is via symmetric multi-linear maps, but there also exists a more succinct geometric definition using the language of formal geometry. Here the blanket assumption that the underlying field is of characteristic zero is made.
Geometric definition
A homotopy Lie algebra on a graded vector space is a continuous derivation, , of order that squares to zero on the formal manifold . Here is the completed symmetric algebra, is the suspension of a graded vector space, and denotes the linear dual. Typically one describes as the homotopy Lie algebra and with the differential as its representing commutative differential graded algebra.
Using this definition of a homotopy Lie algebra, one defines a morphism of homotopy Lie algebras, , as a morphism of their representing commutative differential graded algebras that commutes with the vector field, i.e., . Homotopy Lie algebras and their morphisms define a category.
Definition via multi-linear maps
The more tradit |
https://en.wikipedia.org/wiki/Eugenia%20Cheng | Eugenia Loh-Gene Cheng is a British mathematician, educator and concert pianist. Her mathematical interests include higher category theory, and as a pianist she specialises in lieder and art song. She is also known for explaining mathematics to non-mathematicians to combat math phobia, often using analogies with food and baking. Cheng is a scientist-in-residence at the School of the Art Institute of Chicago.
Early life and education
Cheng was born in Hampshire, England. She moved to Sussex at the age of one. Her family is originally from Hong Kong. Her interest in mathematics stemmed from a young age thanks largely to her mother who made mathematics a part of life.
Cheng attended Roedean School. She studied the Mathematical Tripos at the University of Cambridge, where she was a student of Gonville and Caius College, Cambridge. Her postgraduate research was supervised by Martin Hyland.
Career and research
As of 2020, Cheng is a scientist-in-residence at the School of the Art Institute of Chicago, where she teaches mathematics to arts students. Cheng formerly held academic appointments at the University of Nice Sophia Antipolis, the University of Sheffield and the University of Chicago.
She has published over a dozen research papers across several journals within her area of category theory. Former doctoral students include Nick Gurski and Thomas Cottrell.
Mathematics and baking
Cheng's research interests are in category theory, which she has written about for a general audience by using analogies from baking. Her vision is to rid the world of mathematics phobia. In How to Bake Pi, published on May 5, 2015, each chapter begins with a recipe for a dessert, to illustrate the commonalities in the methods and principles of mathematics and cooking. The book was well received and has since been translated into French.
Cheng has also written a number of papers with similar themes, such as On the perfect quantity of cream for a scone and On the perfect size for a pizz |
https://en.wikipedia.org/wiki/International%20Ground%20Source%20Heat%20Pump%20Association | Established in 1987, the International Ground Source Heat Pump Association (IGSHPA) is a nonprofit, membership-based organization that promotes geothermal heat pump technology. It was a outreach unit of the College of Engineering, Architecture and Technology (CEAT) at Oklahoma State University until 2020. In June 2020, the OSU Board of Regents voted to approve a transfer of IGSHPA, its intellectual property, and assets to the control of the Geothermal Exchange Organization (GEO).
Primary Efforts
IGSHPA is the main organization for establishing standards of practice and standards of design for Geothermal Heat Pump (GHP) systems in the US. Related organizations have been formed in other countries on four continents, including Australia, Canada, China, India, South Korea, and Sweden.
Conferences
Each year the association hosts an annual conference for people such as manufacturers, contractors, distributors, and drillers.
Standards
IGSHPA sets and revises standards for Geothermal Heat Pump (GHP) system installs based on ongoing research and field application results.
See also
Association of Energy Engineers
Geothermal heat pump (GHP)
Thermal battery
Renewable thermal energy
External links
International Ground Source Heat Pump Association
References
Heat pumps
Heating, ventilation, and air conditioning
Engineering organizations
Trade associations based in the United States
Energy business associations |
https://en.wikipedia.org/wiki/GIWS%20%28software%29 | GIWS is a wrapper generator intended to simplify calling Java from C or C++ by automatically generating the necessary JNI code.
GIWS is released under the CeCILL license.
Example
The following Java class does some simple computation.
package basic_example;
import java.lang.Math;
public class MyComplexClass{
public MyComplexClass(){
// the constructor
}
public long myVeryComplexComputation(double a, double b){
return Math.round(Math.cos(a)+Math.sin(b)*9);
}
}
GIWS gives the capability to call it from C++.
#include <iostream>
#include "basic_example.hxx"
#include <jni.h>
JavaVM* create_vm() {
JavaVM* jvm;
JNIEnv* env;
JavaVMInitArgs args;
JavaVMOption options[2];
args.version = JNI_VERSION_1_4;
args.nOptions = 2;
options[0].optionString = const_cast<char*>("-Djava.class.path=.");
options[1].optionString = const_cast<char*>("-Xcheck:jni");
args.options = options;
args.ignoreUnrecognized = JNI_FALSE;
JNI_CreateJavaVM(&jvm, (void **)&env, &args);
return jvm;
}
using namespace basic_example;
using namespace std;
int main(){
JavaVM* jvm = create_vm();
MyComplexClass *testOfMyClass = new MyComplexClass(jvm);
cout << "My Computation: " << testOfMyClass->myVeryComplexComputation(1.2,80) << endl;
return 0;
}
To generate the binding, GIWS uses a XML declaration. GIWS will generate the JNI code to call the Java object.
<package name="basic_example">
<object name="MyComplexClass">
<method name="myVeryComplexComputation" returnType="long">
<param type="double" name="a" />
<param type="double" name="b" />
</method>
</object>
</package>
See also
SWIG allows one to call C or C++ from higher level languages
External links
Programming tools
Cross-platform software
Free computer programming tools
Java platform |
https://en.wikipedia.org/wiki/English%20Broadside%20Ballad%20Archive | The English Broadside Ballad Archive (EBBA) is a digital library of 17th-century English Broadside Ballads, a project of the English Department of the University of California, Santa Barbara. The project archives ballads in multiple accessible digital formats.
History
The English Broadside Ballad Archive was created in 2003 by Patricia Fumerton, Professor of English at UCSB to digitize broadside ballads of the heyday of the 17th century. Many of these ballads are currently held in difficult to access libraries in both North America and the United Kingdom, often in fragile condition, and EBBA's aim is to make them accessible to users in a variety of digital formats. Since then, EBBA has received six Collections and Resources grants from the National Endowment for the Humanities (NEH), an NEH Digital Humanities Start-Up Grant, and Faculty Research Grants and Instructional Improvement Grants from the University of California, Santa Barbara. As of August 2015, the project has archived over 7000 of the estimated 11,000 extant broadside ballads.
Scope
As of August 2015, EBBA has archived 7,124 broadside ballads, from 20 different collections held at six different libraries worldwide. The collections range from the very well-known and recognized by name - such as those housed at the Pepys Library of Magdalene College, Cambridge - to the relatively unknown. The project has currently archived ballads from the following libraries, with partnerships in place to begin archiving ballads from several other libraries in the next two years.
Holding Libraries and Named Collections
British Library
Roxburghe Ballads
Glasgow University Library
Euing Collection
Houghton Library of Harvard University
Huth Collection
Huntington Library
Bindley Collection
Bridgewater Collection
Britwell Collection
Magdalene College, Cambridge
Pepys Ballads
National Library of Scotland
Crawford Collection
Rosebery Collection
Archival Formats
In addition to cataloging all of its holdin |
https://en.wikipedia.org/wiki/Fluidmesh%20Networks | Fluidmesh Networks was a hardware and software manufacturer of wireless point-to-point networks, wireless point-to-multipoint networks, and wireless mesh networks. Fluidmesh products are used in video-surveillance, enterprise, industrial, railway, maritime, and military projects.
Corporate history
Fluidmesh was founded in 2005 by four Italian engineers: Umberto Malesci, Cosimo Malesci, Andrea Orioli, and Torquato Bertani. Fluidmesh was a spin-off company from MIT where Umberto Malesci and Cosimo Malesci were graduate students in the Department of Engineering. In 2005, Umberto Malesci was a graduate student working at the MIT Computer Science and Artificial Intelligence Laboratory with Prof. Samuel Madden (MIT) when he developed Fluidmesh's initial software based on the Roofnet open-source project leveraging Click Modular Router. The Company was initially incubated at the Politecnico di Milano, in Milan, Italy. Over the years, Fluidmesh Networks expanded into the United States, Europe, the Middle East and Latin America, and obtained exposure on the Italian national press and television as a successful example of innovation-driven entrepreneurship in the high tech space. Within ten years, Fluidmesh had sold and installed approximately 24,000 miles of wireless links.
In 2010, Fluidmesh partnered with CCTV camera manufacturer, Pelco.
In April 2011, Fluidmesh Networks announced it had been acquired by Generation 3 Capital and Waveland Investments, two private equity firms based in Chicago.
In 2016, Fluidmesh Networks and Cisco announced a partnership to combine Cisco Connected Rail Solutions and Fluidmesh train-to-ground wireless technology into a single solution.
On April 6, 2020, Cisco announced its intent to acquire Fluidmesh. The acquisition was completed July 7, 2020.
Products and services
Trackside WiFi and Mobile Connectivity for Trains and Railroads
Internet of Things (IoT) for Vessels and Maritime Applications
Wireless Backhaul for fixed wireless |
https://en.wikipedia.org/wiki/Glossary%20of%20virology | This glossary of virology is a list of definitions of terms and concepts used in virology, the study of viruses, particularly in the description of viruses and their actions. Related fields include microbiology, molecular biology, and genetics.
A
B
C
D
E
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
Z
See also
Glossary of biology
Glossary of genetics
Glossary of scientific naming
Introduction to viruses
List of viruses
References
Virology
Virology
Wikipedia glossaries using description lists |
https://en.wikipedia.org/wiki/Swedish%20Commission%20on%20Security%20and%20Integrity%20Protection | The Swedish Commission on Security and Integrity Protection () is a Swedish administrative authority sorting under the Ministry of Justice responsible for supervising law enforcement agencies' use of secret surveillance techniques, assumed identities and other associated activities. The commission also supervise the processing of personal data by the Swedish Police Authority. It is also obliged to check whether someone has been the subject of secret surveillance or subject to the processing of personal data, at the request of an individual, and if it was done within bounds of applicable legislation.
See also
Swedish Economic Crime Authority
Swedish Police Authority
Swedish Security Service
References
External links
Government agencies of Sweden
Information privacy
Privacy |
https://en.wikipedia.org/wiki/Open%20Location%20Code | The Open Location Code (OLC) is a geocode based in a system of regular grids for identifying an area anywhere on the Earth.
It was developed at Google's Zürich engineering office, and released late October 2014. Location codes created by the OLC system are referred to as "plus codes".
Open Location Code is a way of encoding location into a form that is easier to use than showing coordinates in the usual form of latitude and longitude. Plus codes are designed to be used like street addresses, and may be especially useful in places where there is no formal system to identify buildings, such as street names, house numbers, and post codes.
Plus codes are derived from latitude and longitude coordinates, so they already exist everywhere. They are similar in length to a telephone number – 849VCWC8+R9, for example – but can often be shortened to only four or six digits when combined with a locality (CWC8+R9, Mountain View). Locations close to each other have similar codes. They can be encoded or decoded offline. The character set avoids similar looking characters, to reduce confusion and errors, and avoids vowels to make it unlikely that a code spells existing words. Plus codes are not case-sensitive, and can therefore be easily exchanged over the phone.
Since August 2015, Google Maps supports plus codes in its search engine. The algorithm is licensed under the Apache License 2.0. and available on GitHub.
Google has shown practical usage of plus codes for addressing purposes in Cape Verde, parts of Kolkata and Kolhapur in India, and the Navajo Nation in the United States.
Specification
The Open Location Code system is based on latitudes and longitudes in WGS84 coordinates. Each code describes an area bounded by two parallels and two meridians out of a fixed grid, identified by the South-West corner and its size. The largest grid has blocks of 20 by 20 degrees (9 rows and 18 columns), and is divided in 20 by 20 subblocks up to four times. From that level onwards, div |
https://en.wikipedia.org/wiki/Chromosome%20territories | In cell biology, chromosome territories are regions of the nucleus preferentially occupied by particular chromosomes.
Interphase chromosomes are long DNA strands that are extensively folded, and are often described as appearing like a bowl of spaghetti. The chromosome territory concept holds that despite this apparent disorder, chromosomes largely occupy defined regions of the nucleus. Most eukaryotes are thought to have chromosome territories, although the budding yeast S. cerevisiae is an exception to this.
Characteristics
Chromosome territories are spheroid with diameters on the order of one to few micrometers.
Nuclear compartments devoid of DNA called interchromatin compartments have been reported to tunnel into chromosome territories to facilitate molecular diffusion into the otherwise tightly packed chromosome-occupied regions.
History and experimental support
The concept of chromosome territories was proposed by Carl Rabl in 1885 based on studies of Salamandra maculata.
Chromosome territories have gained recognition using fluorescence labeling techniques (fluorescence in situ hybridization).
Studies of genomic proximity using techniques like chromosome conformation capture have supported the chromosome territory concept by showing that DNA-DNA contacts predominantly happen within particular chromosomes.
See also
References
Molecular biology
Nuclear organization |
https://en.wikipedia.org/wiki/Dictionary%20of%20Irish%20Architects | The Dictionary of Irish Architects is an online database which contains biographical and bibliographical information on architects, builders and craftsmen born or working in Ireland during the period 1720 to 1940, and information on the buildings on which they worked. Although it is principally devoted to architects, it includes engineers who designed buildings and structures, some builders, some artists and craftsmen, and some amateurs and writers on architectural subjects.
Architects from Britain and elsewhere who never resided in Ireland but designed buildings there are not given full biographical treatment, and only their Irish works are listed. Irish-born architects who emigrated are similarly treated; their careers after their departure from Ireland are not described in detail, and only their Irish works are listed in full.
The Dictionary of Irish Architects was created and compiled in the Irish Architectural Archive (IAA) over a period of thirty years. It was made publicly available online in January 2009. According to the IAA it remains a "work in progress" with new data added and updated since its initial release. As of 2018, it reportedly contained 6,700 entries.
References
External links
Online databases
Architecture in Ireland
Architects
Online encyclopedias |
https://en.wikipedia.org/wiki/Fluentd | Fluentd is a cross-platform open-source data collection software project originally developed at Treasure Data. It is written primarily in the Ruby programming language.
Overview
Fluentd was positioned for "big data", semi- or un-structured data sets. It analyzes event logs, application logs, and clickstreams. According to Suonsyrjä and Mikkonen, the "core idea of Fluentd is to be the unifying layer between different types of log inputs and outputs.", Fluentd is available on Linux, macOS, and Windows.
History
Fluentd was created by Sadayuki Furuhashi as a project of the Mountain View-based firm Treasure Data. Written primarily in Ruby, its source code was released as open-source software in October 2011.
The company announced $5 million of funding in 2013.
Treasure Data was then sold to Arm Ltd. in 2018.
Users
Fluentd was one of the data collection tools recommended by Amazon Web Services in 2013, when it was said to be similar to Apache Flume or Scribe. Google Cloud Platform's BigQuery recommends Fluentd as the default real-time data-ingestion tool, and uses Google's customized version of Fluentd, called google-fluentd, as a default logging agent.
Fluent Bit
Fluent Bit is a log processor and log forwarder which is being developed as a CNCF sub-project under the umbrella of Fluentd project. Fluentd is written in C and Ruby and built as a Ruby gem so it consumes some amount of memory resources. On the other hand, since Fluent Bit is written only in C and has no dependencies, the consumed memory usage much decreased compared to Fluentd which makes it easy to run on the embedded Linux and container environment.
References
Further reading
Goasguen, Sébastien (2014). 60 Recipes for Apache CloudStack: Using the CloudStack Ecosystem, "Chapter 6: Advanced Recipes". O'Reilly Media.
Wilkins, Phil (2022). Logging in Action, With Fluentd, Kubernetes and more. Manning.
External links
Source Code on GitHub
Big data companies
Data warehousing products
Data securit |
https://en.wikipedia.org/wiki/Michael%20Brin%20Prize%20in%20Dynamical%20Systems | The Michael Brin Prize in Dynamical Systems, abbreviated as the Brin Prize, is awarded to mathematicians who have made outstanding advances in the field of dynamical systems and are within 14 years of their PhD. The prize is endowed by and named after Michael Brin, whose son Sergey Brin is a co-founder of Google. Michael Brin is a retired mathematician at the University of Maryland and a specialist in dynamical systems.
The first prize was awarded in 2008, between 2009 and 2017 it has been awarded bi-annually, and since 2017 annually. Artur Avila, the 2011 awardee, went on to win the Fields Medal in 2014.
Past winners
2008 : Giovanni Forni for his work on area-preserving flows.
2009 : Dmitry Dolgopyat for his work on rapid mixing of flows.
2011 : Artur Avila for his work on Teichmüller dynamics and interval-exchange transformations.
2013 : Omri Sarig for his work on the thermodynamics of countable Markov shifts and his Markov partition for surface diffeomorphisms.
2015 : Federico Rodriguez Hertz for his work on geometric and measure rigidity and on stable ergodicity of partially hyperbolic systems.
2017 : Lewis Bowen for creation of entropy theory for a broad class of non-amenable groups and solution of the long-standing isomorphism problem for Bernoulli actions of such groups.
2018 : Mike Hochman for his work in ergodic theory and fractal geometry.
2019 : Sébastien Gouëzel for his work on the spectral theory of transfer operators and statistical properties of hyperbolic dynamical systems and random walks on hyperbolic groups.
2020 : Corinna Ulcigrai for her work on the ergodic theory of locally Hamiltonian flows on surfaces and translation flows on periodic surfaces.
2021 : Tim Austin for his proof the weak Pinsker conjecture, for his groundbreaking approach to non-conventional multiple ergodic theorems, and his contributions to geometric group theory.
2022 : Zhiren Wang for his fundamental contributions to the study of topological and measure rigidity |
https://en.wikipedia.org/wiki/Tillie%20the%20All-Time%20Teller | Tillie the All-Time Teller was one of the first ATMs, run by the First National Bank of Atlanta and considered to be one of the most successful ATMs in the banking industry. Tillie the All-Time Teller had a picture of a smiling blonde girl on the front of the machine to suggest it was user-friendly, had an apparent personality, and could greet people by name. Many banks hired women dressed as this person to show their customers how to use Tillie the All-Time Teller.
History
It was introduced by the First National Bank of Atlanta on May 15, 1974. It started out at only eleven locations. They were in commerce starting May 20, 1974. Starting 1977, other banks purchased rights to use Tillie the All-Time Teller as their ATM system. By March 21, 1981, they were available at 70 locations, including on a college campus. On October 15, 2013, Susan Bennett revealed that she played the voice for Tillie the All-Time Teller, noting that she "started [her] life as a machine quite young."
Appearance
Tillie the All-Time Teller machines were red and gold to make them look more attractive. On the bottom left was the place to enter an "access card," which featured a cartoon character. Above that was a place to enter a "secret code" that the customer chose. On the bottom center was a picture of a cartoon blonde girl with china-blue eyes and a red hat. Above that was the place it handed out cash and coins. On the top right was the place to enter a desired amount of money.
How it worked
Customers could use Tillie the All-Time Teller by following these steps:
Inserting an "Alltime Tellercard"
Following instructions presented on its TV screen
Entering a "secret code" and entering a desired amount of money on the "money keyboard" ($200 was the limit)
The machine would automatically hand out the desired amount of money.
Entering a transaction envelope into the deposit slot
Advertising
There were a variety of advertisements made by the First National Bank of Atlanta in order to pr |
https://en.wikipedia.org/wiki/NPL%20network | The NPL network, or NPL Data Communications Network, was a local area computer network operated by a team from the National Physical Laboratory in London that pioneered the concept of packet switching.
Based on designs first conceived by Donald Davies in 1965, development work began in 1968. Elements of the first version of the network, the Mark I, became operational during 1969 then fully operational in January 1970, and the Mark II version operated from 1973 until 1986. The NPL network followed by the ARPANET in the United States were the first two computer networks that implemented packet switching and the NPL network was the first to use high-speed links. It was, along with the ARPANET project, laid down the technical foundations of modern internet.
Origins
In 1965, Donald Davies, who was later appointed to head of the NPL Division of Computer Science, proposed a commercial national data network based on packet switching in Proposal for the Development of a National Communications Service for On-line Data Processing. After the proposal was not taken up nationally, during 1966 he headed a team which produced a design for a local network to serve the needs of NPL and prove the feasibility of packet switching. The design was the first to describe the concept of an "Interface computer", today known as a router.
The next year, a written version of the proposal entitled NPL Data Network was presented by Roger Scantlebury at the Symposium on Operating Systems Principles. It described how computers (nodes) used to transmit signals (packets) would be connected by electrical links to re-transmit the signals between and to the nodes, and interface computers would be used to link node networks to so-called time-sharing computers and other users. The interface computers would transmit multiplex signals between networks, and nodes would switch transmissions while connected to electrical circuitry functioning at a rate of processing amounting to mega-bits. In Scantlebury's |
https://en.wikipedia.org/wiki/Teleadministration | Teleadministration is based on the concept that documents in electronic format have legal value. Administrative informatics is not new, but for many years it was merely Information Technology applied to legal documents, that is, the reproduction of paper-based legal documents into electronic file systems. Instead, Teleadministration turns this approach into its head. It is based on research conducted in 1978, the year when, at a conference promoted by the Court of Cassation, Giovanni Duni launched the then-futuristic idea that an electronic document could have legal value. 1978 was also the year in which the first research on digital signatures (RSA) was published in the United States, yet it would take more than twenty-five years for jurists and mathematicians to start working together.
For many years, and even before 1978, IT helped Public Administration but kept a “safe distance”, assuming that the ‘sacred nature’ of the Law demanded the use of pen and paper. Information Technology merely managed and filed copies of legal documents: it was known as “parallel IT”, since it was an accessory to the activity with formal value, the one based on pen and paper.
Thus, the logical, legal and material premise of Teleadministration is the conferment of legal value to IT documents.
Origins and terminology
In Italy, the linguistic expression teleamministrazione was first used in 1991 at the Roman ‘La Sapienza’ university, during a conference organised by the Court of Cassation, in which it was said that: «the new system of administrative information technology is called “teleadministration” because all the work of the Public Administration will be carried out through devices, that could also be computers, linked to the central server through a network.» Teleadministration was indeed considered a type of teleworking.
With Teleadministration, administrative procedures become electronic administrative procedures and, more specifically, those that are initiated by a party |
https://en.wikipedia.org/wiki/List%20of%20female%20fellows%20of%20the%20Royal%20Academy%20of%20Engineering | The page lists female fellows of the Royal Academy of Engineering (FREng), elected by the Royal Academy of Engineering in the UK.
The Royal Academy of Engineering (RAEng), founded in 1976, is the youngest of the five national academies in the UK. It represents the nation's best practising engineers, innovators, and entrepreneurs, who are very often in leading roles in industry, business, and academia. Fellowship of the RAEng is a national honour, bringing prestige to both the individual and any organisation the Fellow is associated with. In recent years between 50 and 60 new fellows have been chosen each year by peer review from nominations made by the current fellowship;. Those proposed for fellowship must come “from among eminent engineers regarded by virtue of their personal achievements in the field of engineering as being of exceptional merit and distinction”.
All 130 of the founding fellows in 1976 were men. Four women were elected in the first 20 years, the first in 1982. In all, 13 female fellows pre-date 2000, with a further 20 elected before 2010 and 65 in the decade before 2020. In 2010 the Council determined a policy that over time 10–20% of newly elected fellows should be women.
The Academy published a diversity and inclusion action plan for the five years from 2020 but does not regularly publish the proportion of female engineers in the current fellowship, estimated in 2019 to be less than 7%. In July 2020 it launched a campaign aimed at delivering a 'Fellowship that is Fit for the Future' by the time it celebrates its 50th anniversary in 2026 and set an aspiration that at least half of all candidates elected each year will be from under-represented target groups. In 2023 six of the 60 new Fellows were female.
As of 2023, 137 women have been elected to Fellowship, plus twelve international fellows, twelve honorary fellows, and one royal fellow.
Fellows
International Fellows
International Fellows are engineers of international distinction who |
https://en.wikipedia.org/wiki/Sigurd%20Angenent | Sigurd Bernardus Angenent (born 1960) is a Dutch-born mathematician and professor at the University of Wisconsin–Madison. Angenent works on partial differential equations and dynamical systems, with his recent research focusing on heat equation and diffusion equation. The Angenent torus and Angenent ovals are special solutions to the mean curvature flow published by Angenent in 1992; the Angenent torus remains self-similar as it collapses to a point under the flow, and the Angenent ovals are the only compact convex ancient solutions other than circles for the curve-shortening flow.
Angenent was raised in Haarlem, the Netherlands. He obtained his PhD in Mathematics from Leiden University in 1986. In 1996 Angenent became a correspondent of the Royal Netherlands Academy of Arts and Sciences.
At the University of Wisconsin–Madison he is director of the Undergraduate Mathematics Program. After becoming frustrated with high prices of textbooks and poor quality he wrote and made available his own notes for all classes.
References
External links
Profile at the Mathematics Genealogy Project
Profile at University of Wisconsin–Madison
1960 births
Living people
20th-century Dutch mathematicians
21st-century Dutch mathematicians
Dynamical systems theorists
Leiden University alumni
Members of the Royal Netherlands Academy of Arts and Sciences
Scientists from Haarlem
University of Wisconsin–Madison faculty |
https://en.wikipedia.org/wiki/Confiture | A confiture is any fruit jam, marmalade, paste, sweetmeat, or fruit stewed in thick syrup. Confit, the root of the word, comes from the French word confire which means literally "preserved"; a confit being any type of food that is cooked slowly over a long period of time as a method of preservation.
See also
Fruit preserves – fruits combined with sugar readied in a manner appropriate for long-term storage
Konfyt – South African jam
spoon sweets - Fruits candied in a syrupy glaze, offered in Greece as a gesture of hospitality.
varenye - Russian preserves made with whole fruits or large fruit pieces.
slatko - A whole-fruit preserve in Eastern European cuisine.
List of spreads
References
Condiments
Culinary terminology
Food ingredients
Food preservation
French cuisine
Spreads (food)
Preserved fruit |
https://en.wikipedia.org/wiki/Alexander%20Barvinok | Alexander I. Barvinok (born March 27, 1963) is a professor of mathematics at the University of Michigan.
Barvinok received his Ph.D. from St. Petersburg State University in 1988 under the supervision of Anatoly Moiseevich Vershik.
In 1999, Barvinok received the Presidential Early Career Award for Scientists and Engineers (PECASE) from President Bill Clinton.
Barvinok gave an invited talk at the 2006 International Congress of Mathematicians in Madrid.
In 2012, Barvinok became a Fellow of the American Mathematical Society.
In 2023, Barvinok left the American Mathematical Society by refusing to renew his membership in protest of its non-opposition to "DEI statements" and "compelled language", referencing his experiences in the Soviet Union.
References
Living people
Fellows of the American Mathematical Society
20th-century American mathematicians
21st-century American mathematicians
Russian mathematicians
University of Michigan faculty
Combinatorialists
Recipients of the Presidential Early Career Award for Scientists and Engineers
1963 births |
https://en.wikipedia.org/wiki/The%20Audience%20Engine | The Audience Engine is announced open-source, customizable suite of fundraising tools for public radio being developed by the Congera Corporation, a subsidiary of WFMU Radio. It was conceived by and is being developed under the supervision of WFMU management, but as of November 2020 no product has been announced, demoed or released thus rendering the project as effectively vaporware.
The platform is based on WFMU's own model of fundraising and listener-community relations, a project that began development in 1998 and WFMU claims helps raise 70% of its annual $2.5 million operating budget via its website. The developers explain that "by pairing online content, real-time playlist information, social media, and community interaction tools directly with crowdfunding campaigns, WFMU has not only built a positive and intelligent online community, but also a sustainable model that can be adopted by other organizations." Besides radio, Audience Engine has potential usage for online television and journalism. The goal is to "enable organizations ... to build audiences and become self sufficient."
A large part of Audience Engine's potential appeal is its tightly integrated fundraising capabilities. "Audience Engine comes with a set of tools that integrates crowdfunding-inspired donation tools throughout a publisher's site, with on and off-site widgets for donations as well as gift reward management, and a full suite of analytics underlying it all for that publisher to gain insight on what is and isn't raising money," noted Flanagan. Freedman observed that "Kickstarter did a great job of borrowing or stealing the concept of the pledge drive, and vastly improved it as well. Public media hasn't borrowed it back yet! That's what we're trying to do."
Although aimed primarily towards small and mid-sized radio stations, larger public radio stations such as WBUR and WNYC have considered harnessing the platform's possible uses in their operations.
A draft of the platform was publi |
https://en.wikipedia.org/wiki/Wilma%20%28software%29 | Wilma is a Service virtualization software tool that computer programmers and testers use for developing and testing other software. It sits between software components, software services, microservices, as a transparent proxy, and captures the communication traffic between the software components. Based on its actual configuration, evaluates the captured messages and decides between proxying the request or providing response by itself, as a service stub. Therefore, it is a combined Transparent Proxy and Service Stub. It is written in Java, and Open Sourced under the license GPL.
Situations when Wilma helps
In case there is component that communicates to other components (SOA environment or by simply using 3rd party services/microservices) but need to be tested without the availability of other components, Wilma can act as stub. The environment can be - among others - a local development environment, a CI test environment, or an integration test environment
In similar case, if some of the components are available but some not, Wilma can stub the missing ones, meanwhile proxying the request to the available components
If there is a new feature in a 3rd party component/service, that will be developed later, and not yet available, and if the interface is defined, Wilma can emulate the new feature of the 3rd party component/service, and the feature in the owned component can be developed without waiting for the implementation of the feature in the 3rd party component/service
It is possible to emulate special behavior of 3rd party components/services like: timeouts, slow or bad answers, special - error-nous - answers and error codes - without doing special test environment setup changes, and even if forcing the 3rd party component/service to produce such special answers would be hard/impossible
It is possible to substitute both the request and the response messages real-time, partially and/or completely.
Also - as it can log the messages - it helps testers/deve |
https://en.wikipedia.org/wiki/Citrix%20Workspace | Citrix Workspace (formerly Citrix Workspace Suite) is a digital workspace software platform developed by Citrix Systems. Launched in 2018, it is Citrix Systems' flagship product. Citrix Workspace is an information retrieval service where users can access programs and files from a variety of sources through a central application or a Web browser. In addition to Citrix Virtual Apps and Desktops (formerly XenApp and XenDesktop), Citrix Workspace services include Citrix Endpoint Management (formerly XenMobile), Citrix Content Collaboration (formerly ShareFile), Citrix Access Control, microapp capabilities, usage analytics, and single sign-on capabilities to SaaS and Web apps.
Its central application, Citrix Workspace app (formerly Citrix Receiver), is client software that allows access to all of a user's files and apps from one interface. This includes mobile files and desktops, in addition to SaaS and virtual apps.
Citrix Workspace app replaced Citrix Receiver, which was the client component of Citrix products XenDesktop and XenApp, now Citrix Virtual Apps and Desktops. It was released initially in 2009; devices with Receiver installed were able to access full desktops via XenDesktop or individual applications via XenApp from a centralized host, such as a server or cloud infrastructure. The product's intended users were employees of businesses and organizations.
References
Business software
Centralized computing
Citrix Systems
Remote desktop |
https://en.wikipedia.org/wiki/MicroLED | MicroLED, also known as micro-LED, mLED or μLED is an emerging flat-panel display technology consisting of arrays of microscopic LEDs forming the individual pixel elements. Inorganic semiconductor microLED (μLED) technology was first invented in 2000 by the research group of Hongxing Jiang and Jingyu Lin of Texas Tech University while they were at Kansas State University. The first high-resolution and video-capable InGaN microLED microdisplay in VGA format was realized in 2009 by Hongxing Jiang and Jingyu Lin and their colleagues at Texas Tech University and III-N Technology, Inc. via active driving of microLED array by a complementary metal-oxide semiconductor (CMOS) IC. Compared to widespread LCD technology, microLED displays offer better contrast, response times, and energy efficiency. They are also capable of high speed modulation, and have been proposed for chip-to-chip interconnect applications.
MicroLED offers greatly reduced energy requirements when compared to conventional LCD displays while also offering pixel-level light control and a high contrast ratio. The inorganic nature of microLEDs gives them a longer lifetime advantage over OLEDs and allows them to display brighter images with minimal risk of screen burn-in. The sub-nanosecond response time of μLED has a huge advantage over other display technologies for 3D/AR/VR displays since these devices need more images, more pixels per image, more frames per second and fast response.
, microLED displays have not been mass-produced, although Sony, Samsung, and Konka sell microLED video walls. LG, Tianma, PlayNitride, TCL/CSoT, Jasper Display, Jade Bird Display, Plessey Semiconductors Ltd, and Ostendo Technologies, Inc. have demonstrated prototypes. Sony already sells microLED displays as a replacement for conventional cinema screens. BOE, Epistar, and Leyard have plans for microLED mass production. MicroLED can be made flexible and transparent, just like OLEDs.
Research
Following the first report of electr |
https://en.wikipedia.org/wiki/Wi-Fi%20deauthentication%20attack | A Wi-Fi deauthentication attack is a type of denial-of-service attack that targets communication between a user and a Wi-Fi wireless access point.
Technical details
Unlike most radio jammers, deauthentication acts in a unique way. The IEEE 802.11 (Wi-Fi) protocol contains the provision for a deauthentication frame. Sending the frame from the access point to a station is called a "sanctioned technique to inform a rogue station that they have been disconnected from the network".
An attacker can send a deauthentication frame at any time to a wireless access point, with a spoofed address for the victim. The protocol does not require any encryption for this frame, even when the session was established with Wired Equivalent Privacy (WEP), WPA or WPA2 for data privacy, and the attacker only needs to know the victim's MAC address, which is available in the clear through wireless network sniffing.
Usage
Evil twin access points
One of the main purposes of deauthentication used in the hacking community is to force clients to connect to an evil twin access point which then can be used to capture network packets transferred between the client and the access point.
The attacker conducts a deauthentication attack to the target client, disconnecting it from its current network, thus allowing the client to automatically connect to the evil twin access point.
Password attacks
In order to mount a brute-force or dictionary based WPA password cracking attack on a WiFi user with WPA or WPA2 enabled, a hacker must first sniff the WPA 4-way handshake. The user can be elicited to provide this sequence by first forcing them offline with the deauthentication attack.
In a similar phishing style attack without password cracking, Wifiphisher starts with a deauthentication attack to disconnect the user from their legitimate base station, then mounts a man-in-the-middle attack to collect passwords supplied by an unwitting user.
Attacks on hotel guests and convention attendees
The Federa |
https://en.wikipedia.org/wiki/List%20of%20places%20with%20numeric%20names | Places that have numerals in their names include:
0
, ('zero'), Netherlands, old name for a hamlet in Putten
Nullarbor, locality in South Australia (Latin: no trees)
Nullarbor Plain, desert region in Western and South Australia (Latin: no trees)
1/2 (half)
, ('half town'), several places
Half Hollow Hills, New York, US
Half Moon Bay, California, US
Half Rock, Missouri, US
Half Tree Hollow, Saint Helena
Halfway, Missouri, US
1
1 Decembrie ('1st of December'), Romania, a commune south of Bucharest
Aintree, England ('one tree')
Een, The Netherlands ('one')
Einhaus, Germany ('Onehouse')
Einsiedeln, Switzerland
Einsiedelei ('one (person) living (place)', eremitage), a (forgotten) place on the foot of a hill in the West of Graz, Austria
Province No. 1, Nepal
2
Aberdaucleddau ('mouth of the two rivers Cleddau'), Welsh name for Milford Haven, Wales
Deux-Sèvres, France (refers to two rivers in the department called Sèvre)
Dois Vizinhos ('2 neighbours'), Paraná, Brazil
Duas Bocas Biological Reserve ('2 mouths'), Brazil
Duas Barras ('2 bars'), Rio de Janeiro, Brazil
Duas Estradas ('2 roads'), Paraíba, Brazil
Duas Igrejas ('2 churches'), Paredes, Portugal
Dos Pilas ('2 wells'), Guatemala
Dos Vientos and Dos Vientos Open Space ('2 winds'), California, US
Dos Hermanas ('two sisters'), Andalusia, Spain
Dvigrad ('two towns'), Croatia
El Segundo ('the second'), California, United States
Río Segundo in Argentina and Costa Rica, 'second river'
Llanddeusant, Anglesey, Wales ('church of two saints')
Llanddeusant, Carmarthenshire, Wales ('church of two saints')
Second Garrotte, California, US
Second Mesa, Arizona, US
Song District, Phrae, Thailand but the name () is same as the Thai word () that means 'two'.
Song Khwae District ('two waterways'), Nan, Thailand
Song Phi Nong District ('two siblings'), Suphan Buri, Thailand
Twee Riviere ('two rivers'), a town in South Africa
Twee Rivieren ('two rivers'), a suburb in South Africa
Tweebuffelsme |
https://en.wikipedia.org/wiki/Haruki%27s%20Theorem | Haruki's Theorem says that given three intersecting circles that only intersect each other at two points that the lines connecting the inner intersecting points to the outer satisfy:
where are the measure of segments connecting the inner and outer intersection points
References
Geometry |
https://en.wikipedia.org/wiki/Robot%20research%20initiative | Robot Research Initiative (RRI) is a research institute dedicated to advanced robotics research. It is an affiliated organization of Chonnam National University in Gwangju, Republic of Korea. Prof. Jong Oh Park moved from the Korea Institute of Science and Technology to Chonnam National University in early 2005 and established RRI in March 2008, where he is still actively in charge. RRI is currently a leading institute in the medical robotics field, especially in the area of biomedical micro/nano robotics. RRI is one of the largest institutions among university robotics laboratories in Korea and competes globally.
The current research focuses of RRI are biomedical micro/nano robotics, surgery robotics, cable robotics, and so on. The Korean government invests roughly 200 million USD annually in the Korean robotics industry, and almost 90% of this budget is designated for R&D. RRI has been actively involved in the government-funded R&D projects. After an over 10-year investment in personal service robotics, as well as IT–based ubiquitous robotics, the government has been strategically investing in medical robotics for the past 6 years. The biomedical micro/nano robotics field in Korea has been exclusively initiated by RRI, and the reputation and status of RRI is currently stable.
The global networking of RRI is mostly focused on biomedical micro/nano robotics, covering engineering and scientific approaches. Prof. Park and his staff have led both government- and industry-funded R&D robotics projects. As the industry partners Samsung Electronics, Hyundai Motors, Daewoo Motors, and DSME.
History
The Robot Research Initiative was established at the building of engineering 1A, Chonnam National University in March 2008. As a director of the Robot Research Initiative, Professor Jong Oh Park was nominated a month later.
In year 2008, Robot Research Initiative signed MOU for mutual cooperation with KIST Europe, Dario Lab in Scuola Superior Sant’Anna in Italy and Sitti Lab |
https://en.wikipedia.org/wiki/Poimapper | Poimapper is field data collection, sharing and analysing software.
Mobile application is used to collect data and update data. By uploading data to a cloud server it is shared among other mobile and office workers.
Poimapper is developed by Pajat Solutions Ltd. Pajat Solutions was founded in 2009 and is headquartered in Finland. In 2013 Pajat was awarded the European CSR award for innovative, non-business partnerships that have helped to solve social problems while creating business advantage. The award came from a partnership where NGO's like Plan International were using Poimapper in their health-related monitoring and evaluation work.
References
External links
Data analysis software |
https://en.wikipedia.org/wiki/Codeanywhere | Codeanywhere is a cross-platform cloud integrated development environment (IDE) created by Codeanywhere, Inc. Codeanywhere enables users to write, edit, collaborate, and run web development projects from a web browser or mobile device.
Codeanywhere is written in JavaScript. The editor is based on CodeMirror and uses OpenVZ containers for the development environments. Codeanywhere is platform agnostic, enabling the user to run code in Codeanywhere's environments called DevBoxes or connect to their own VMs via SSH or FTP protocol and also connect to Dropbox and Google Drive. The environment supports more than 75 programming languages, including HTML, JavaScript, Node.js, io.js PHP, Ruby, Python, and Go.
In 2017, the company acquired Codebender, another cloud IDE. Codebender is used to develop for Arduino devices.
History
In 2009, the predecessor to Codeanywhere, PHPanywhere, was launched. PHPanywhere was a web-based FTP client and text editor designed for PHP. That project stayed idle until May 22, 2013, when the founders launched Codeanywhere. The founders, Ivan Burazin and Vedran Jukić, reside in Split, Croatia.
Codeanywhere raised $600,000 from World Wide Web Hosting on July 15, 2013. In August 2014, Codeanywhere was accepted in Techstars's Fall Boston Class. In 2014, as part of the TechCrunch Disrupt NY Conference, the audience voted Codeanywhere the best company in Startup Alley.
In 2022 following the new trend of Cloud Developer Environments or CDEs (including GitHub Codespaces), Codeanywhere launched its new Beta project utilising Infrastructure as Code to relieve developers of having to configure development environments.
See also
Online JavaScript IDE
Integrated Development Environment
References
External links
Official blog
Why Cloud IDEs Are Shifting to a Platform-as-a-Service Model
Companies based in Palo Alto, California
Technology companies established in 2013
Software companies of Croatia
Croatian brands
Online integrated development envi |
https://en.wikipedia.org/wiki/T-cell%20growth%20factor | T-cell growth factors acronym: TCGF(s) are signaling molecules collectively called growth factors which stimulate the production and development of T-cells. A number of them have been discovered, among them many members of the interleukin family. The thymus is one organ which releases TCGFs. TCGFs have been able to induce T-cell production outside the body for injection.
List of TCGFs
IL-2
IL-7
IL-9
IL-15
References
Immunology
Growth factors |
https://en.wikipedia.org/wiki/Ke%20T%27ing-sui | Kê T'ing-sui or Ge Tingsui (; May 3, 1913 – April 29, 2000), also known as T.S. Kê, was a Chinese physicist and writer renowned for his contributions in internal friction, anelasticity, solid state physics and metallurgy. He was the member of the Chinese Academy of Sciences, known for the Kê-type pendulum and Kê grain-boundary internal friction peak named after him. In March 1982, he founded the Institute of Solid State Physics in Hefei, Anhui, China.
Biography
Kê was born in Penglai, Shandong province. He was admitted to Tsinghua University in 1930 but suffered pulmonary disease which required him to rest for two years where he earned a B.S. in physics in 1937. He obtained an M.S. in physics at Yenching University in 1940. In July 1941, Kê married He Yizhen in Shanghai and the following month they traveled together to California. Kê received his Ph.D. in physics after only pursuing it for two years at the University of California at Berkeley in 1943. In the years 1943–1945 and 1945–1949, respectively, he worked as a staff member at the Massachusetts Institute of Technology and research associate at the University of Chicago.
In 1949, Kê returned to China and became a professor in physics at Tsinghua University and a research associate at the Applied Physics Laboratory of the Chinese Academy of Sciences (CAS). In October 1952, he relocated to Shenyang to participate in the establishment of the Institute of Metal Research of CAS as a research associate where he became deputy director from 1961 to 1981. In 1955, Kê was elected academician of CAS and became a member of the Mathematics and Physics Committee of CAS. In 1980, he was transferred to Hefei for the establishment of the Hefei branch of CAS where he served as its deputy director and later jointly became the first head of the Institute of Solid State Physics incepted in March 1982.
In 1979 he was a visiting professor at the Max-Planck Institut für Metallforschung in Germany, and in 1980, a guest professor at |
https://en.wikipedia.org/wiki/ThothX%20Tower | The ThothX Tower is a space launch platform tower design by Canadian aerospace company Thoth Technologies (ThothX). It is not a full space elevator, but a inflatable tubular tower structure in diameter, using elevators to transfer up and down to the stratospheric platform where rocket launch vehicles would land, refuel, load, and launch from to reach and return from orbit. It is projected that a launch from the top of the tower would save 30% of the fuel needed to reach orbit. From the top of the tower, the horizon would be away. The design has received UK and U.S. patent protection. The design is projected to cost and take 10 years to build. The full-sized tower would be about 20x taller than the tallest building as of 2015, Burj Khalifa of
Self-climbing electric elevators would travel within the inflated structure to convey material between the top platform and base. The cars would either run in the tower or along the outside and would carry about . Normal elevator cables cannot stretch longer than high. The tower would be built out of stacked kevlar cells inflated to extreme pressures with hydrogen or helium gas. Flywheels would be used to stabilize the structure, as the structure is much too tall for guywires to work. The tower is designed to be able to survive Category 5 hurricanes. With the reduction in fuel needed to reach orbit, it is projected that single-stage-to-orbit craft can be practicably used with current technology. The tower is high as most orbital rockets go up before curving towards orbit, and this tower could eliminate that portion of flight.
A tower model was unveiled in 2009. A demonstration tower is planned to be built. The basic design may be extended to towers.
Among other projected uses for the tower would be as a communications tower, low-altitude replacement for satellites, high-altitude wind turbine platforms.
References
Further reading
USPTO Patent no. 9085897 "Space Elevator" granted 21 July 2015.
Could A Sky Rail Work |
https://en.wikipedia.org/wiki/Yamaha%20YM2154 | The Yamaha YM2154, also known as RYP4 (Rhythm Processor), is an audio microchip that was produced by the Yamaha Corporation. It been used for keyboards and drum machines. It has twelve individual samples and also an ADPCM Rompler and a ten channel Analog-to-digital converter.
Products
The chip was used in (1985) for the Porta Tone PSR-60, PSR-70 and PSR-80. It was also used in the RX-11, RX-15 and RX-17 drum machines.
References
Yamaha sound chips |
https://en.wikipedia.org/wiki/Digital%20signal%20%28signal%20processing%29 | In the context of digital signal processing (DSP), a digital signal is a discrete time, quantized amplitude signal. In other words, it is a sampled signal consisting of samples that take on values from a discrete set (a countable set that can be mapped one-to-one to a subset of integers). If that discrete set is finite, the discrete values can be represented with digital words of a finite width. Most commonly, these discrete values are represented as fixed-point words (either proportional to the waveform values or companded) or floating-point words.
The process of analog-to-digital conversion produces a digital signal. The conversion process can be thought of as occurring in two steps:
sampling, which produces a continuous-valued discrete-time signal, and
quantization, which replaces each sample value with an approximation selected from a given discrete set (for example, by truncating or rounding).
It can be shown that an analog signal can be reconstructed after conversion to digital (down to the precision afforded by the quantization used), provided that the signal has negligible power in frequencies above the Nyquist limit and does not saturate the quantizer.
Common practical digital signals are represented as 8-bit (256 levels), 16-bit (65,536 levels), 24-bit (16.8 million levels), and 32-bit (4.3 billion levels) using pulse-code modulation where the number of quantization levels is not necessarily limited to powers of two. A floating point representation is used in many DSP applications.
References
Digital signal processing |
https://en.wikipedia.org/wiki/ArangoDB | ArangoDB is a graph database system developed by ArangoDB Inc. ArangoDB is a multi-model database system since it supports three data models (graphs, JSON documents, key/value) with one database core and a unified query language AQL (ArangoDB Query Language). AQL is mainly a declarative language and allows the combination of different data access patterns in a single query.
ArangoDB is a NoSQL database system but AQL is similar in many ways to SQL, it uses RocksDB as a storage engine.
History
ArangoDB Inc. was founded in 2015 by Claudius Weinberger and Frank Celler. They originally called the database system “A Versatile Object Container", or AVOC for short, leading them to call the database AvocadoDB. Later, they changed the name to ArangoDB. The word "arango" refers to a little-known avocado variety grown in Cuba.
In January 2017 ArangoDB raised a seed round investment of 4.2 million Euros led by Target Partners. In March 2019 ArangoDB raised 10 million dollars in series A funding led by Bow Capital. In October 2021 ArangoDB raised 27.8 million dollars in series B funding led by Iris Capital.
Release history
Features
JSON: ArangoDB uses JSON as a default storage format, but internally it uses ArangoDB VelocyPack – a fast and compact binary format for serialization and storage. ArangoDB can natively store a nested JSON object as a data entry inside a collection. Therefore, there is no need to disassemble the resulting JSON objects. Thus, the stored data would simply inherit the tree structure of the JSON data.
Predictable performance: ArangoDB is written mainly in C++ and manages its own memory to avoid unpredictable performance arising from garbage collection.
Scaling: ArangoDB provides scaling through clustering.
Reliability: ArangoDB provides datacenter-to-datacenter replication.
Kubernetes: ArangoDB runs on Kubernetes, including cloud-based Kubernetes services Amazon Elastic Kubernetes Service (EKS), Google Kubernetes Engine (GKE), and Microsoft |
https://en.wikipedia.org/wiki/Virophysics | Virophysics is a branch of biophysics in which the theoretical concepts and experimental techniques of physics are applied to study the mechanics and dynamics driving the interactions between virions and cells.
Overview
Research in virophysics typically focuses on resolving the physical structure and structural properties of viruses, the dynamics of their assembly and disassembly, their population kinetics over the course of an infection, and the emergence and evolution of various strains. The common aim of these efforts is to establish a set of models (expressions or laws) that quantitatively describe the details of all processes involved in viral infections with reliable predictive power. Having such a quantitative understanding of viruses would not only rationalize the development of strategies to prevent, guide, or control the course of viral infections, but could also be used to exploit virus processes and put virus to work in areas such as nanosciences, materials, and biotechnologies.
Traditionally, in vivo and in vitro experimentation has been the only way to study viral infections. This approach for deriving knowledge based solely on experimental observations relies on common-sense assumptions (e.g., a higher virus count means a fitter virus). These assumptions often go untested due to difficulties controlling individual components of these complex systems without affecting others. The use of mathematical models and computer simulations to describe such systems, however, makes it possible to deconstruct an experimental system into individual components and determine how the pieces combine to create the infection we observe.
Virophysics has large overlaps with other fields. For example, the modelling of infectious disease dynamics is a popular research topic in mathematics, notably in applied mathematics or mathematical biology. While most modelling efforts in mathematics have focused on elucidating the dynamics of spread of infectious diseases at an epid |
https://en.wikipedia.org/wiki/Frailty%20index | The frailty index (FI) can be used to measure the health status of older individuals; it serves as a proxy measure of aging and vulnerability to poor outcomes.
FI was developed by Dr. Kenneth Rockwood and Dr. Arnold Mitnitski at Dalhousie University in Canada.
FI is defined as the proportion of deficits present in an individual out of the total number of age-related health variables considered. A frailty index can be created in most secondary data sources related to health by utilizing health deficits that are routinely collected in health assessments. These deficits include diseases, signs and symptoms, laboratory abnormalities, cognitive impairments, and disabilities in activities of daily living.
Frailty Index (FI) = (number of health deficits present) ÷ (number of health deficits measured)
For example, a person with 20 of 40 deficits collected has an FI score of 20/40 = 0.5; whilst for someone with 10 deficits, the FI score is 10/40 = 0.25. The FI takes advantage of the high redundancy in the human organism. This is why it is replicable across different databases even when different items and different numbers of items are used. The standard procedure for creating a frailty index are found in an open-access publication.
There are several frailty indices, including a clinical deficits frailty index (FI-CD) and a biomarker-based frailty index (FI-B).
See also
Disability
Physiological functional capacity
References
Geriatrics
Gerontology
Medical scales |
https://en.wikipedia.org/wiki/Women%27s%20Museum%20Istanbul | Women's Museum Istanbul (), located in Istanbul, Turkey, is an online museum devoted to the role played by women in the city.
Launched online in 2012, it is Turkey's first-ever and the world's third city museum dedicated to women.
The permanent exhibition of the Women's Museum Istanbul presents the biographies of women who chose a different lifestyle than that which was expected in their times. Short texts accompanying the installations in the permanent exhibition illustrate the social, cultural, economic and political dynamics of each life.
The Women's Museum Istanbul is currently in search of a building that would be suitable for the concept it envisages.
Gallery
References
External links
Top 7 important women in Istanbul's history
Museums in Istanbul
Museums established in 2012
Virtual museums
2012 establishments in Turkey
Women's museums in Turkey |
https://en.wikipedia.org/wiki/Vedantu | Vedantu is an Indian multinational online tutoring platform launched in 2014 based in Bengaluru, India. It primarily provides services to students from grades 4 to 12.
History
The company was launched in 2014. Its name Vedantu is derivative Sanskrit words Veda (knowledge) and Tantu (network). The organization is run by IIT alumni Vamsi Krishna (co-founder & CEO), Pulkit Jain (co-founder and head of product), Saurabh Saxena (co-founder) and Anand Prakash (co-founder and head of academics). Earlier, the team founded Lakshya, which was acquired by MT Educare (a subsidiary of Zee Learn) in the year 2012.
It primarily provides services to students from grades 4 to 12 of Indian Certificate of Secondary Education (ICSE) and Central Board of Secondary Education. The company's primary business is live online tutoring in STEM, Hindi, English, Sanskrit, German, French, environmental science and social science. It uses a White Board Audio Video Environment (WAVE) method for their 1-1 student-teacher live sessions. It provides test preparation courses for Indian Institute of Technology Joint Entrance Examination (JEE) Foundation, National Talent Search Examination (NTSE), National Eligibility cum Entrance Test (NEET) and Problem Solving Assessment (PSA). Other courses include Coding, Mathematics, Reading and Public Speaking.
In 2019, Vedantu suffered a data breach exposing the data of about 687,000 users including email and IP address, names, phone numbers, genders and passwords.
In January 2022, the company joined Byju's, Simplilearn, Unacademy, PrepInsta Prime and upGrad became one of the founding members of IAMAI's India EdTech Consortium. In March 2022, it launched W.A.V.E 2.0, an interactive platform that aims to support Artificial Intelligence/Machine Learning.
Funding
The firm raised its first round of funding after six months of current operational format. It has raised million from Accel Partners and Tiger Global Management in its series A funding. It plans to |
https://en.wikipedia.org/wiki/ColorOS | ColorOS is a user interface created by Oppo based on the Android Open Source Project. Initially, Realme phones used ColorOS until it was replaced by Realme UI in 2020. Realme UI uses some of ColorOS's apps. Starting from OnePlus 9 series OnePlus will preinstall ColorOS on all smartphones that are sold in mainland China instead of HydrogenOS (Chinese version of OxygenOS).
The first version of ColorOS was launched in September 2013. Oppo had released plenty of Android smartphones before then. It was not stock Android, but Oppo did not label it as ColorOS. Over the years, Oppo launched new official versions of the operating system. To make things less confusing, in 2020 the company revealed that it would adopt the same numbering scheme as mainline Android, and as such ColorOS jumped from ColorOS7 to ColorOS 11.
In the future, ColorOS, OnePlus' Oxygen OS and Realme UI will merge together to form a single Android skin that will appear on all OnePlus, Oppo and Realme UI phones.
Version history
Further reading
How OPPO's ColorOS 13 Pushes the Trend of Android Customization
References
External links
Android (operating system)
Android (operating system) forks
ARM operating systems
Mobile Linux
Software forks
Linux distributions
Custom Android firmware |
https://en.wikipedia.org/wiki/Goanna%20%28software%29 | Goanna is an open-source browser engine that was forked from Mozilla's Gecko. It is used in the Pale Moon and Basilisk browsers. It underlies the Interlink mail client, Hyperbola's IceWeasel, and other UXP-based applications. It was also unofficially ported to Windows XP for the K-Meleon browser and Mypal.
Goanna as an independent fork of Gecko was first released in January 2016. The project's founder and lead developer, M. C. Straver, had both technical and trademark motives to do this in the context of Pale Moon's increasing divergence from Firefox. There are two significant aspects of Goanna's divergence: it does not have any of the Rust language components that were added to Gecko during Mozilla's Quantum project, and applications that use Goanna always run in single-process mode, whereas Firefox became a multi-process application.
References
2016 software
Cross-platform software
Free layout engines
Free software programmed in C++
Gecko-based software
Software forks
Software that uses Cairo (graphics) |
https://en.wikipedia.org/wiki/Dmitry%20Dolgopyat | Dmitry Dolgopyat is a Russian-American mathematician at the University of Maryland known for his research in dynamical systems.
Biography
He graduated from Moscow State School 57 mathematical class in 1989. From 1989 to 1994, he was an undergraduate student at Moscow State University. From 1994 to 1997, he was enrolled in Princeton University, where he earned a PhD under the guidance of Yakov Sinai.
He was an invited speaker at the 2006 International Congress of Mathematicians in Madrid.
In 2009, he was awarded the Michael Brin Prize in Dynamical Systems for his fundamental contributions to the theory of hyperbolic dynamics.
References
Living people
Russian mathematicians
Moscow State University alumni
Princeton University alumni
University of Maryland, College Park faculty
Dynamical systems theorists
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Mean%20operation | In algebraic topology, a mean or mean operation on a topological space X is a continuous, commutative, idempotent binary operation on X. If the operation is also associative, it defines a semilattice. A classic problem is to determine which spaces admit a mean. For example, Euclidean spaces admit a mean -- the usual average of two vectors -- but spheres of positive dimension do not, including the circle.
Further reading
.
.
.
.
Binary operations
Means |
https://en.wikipedia.org/wiki/Phase-locked%20loop%20range | The terms hold-in range, pull-in range (acquisition range), and lock-in range are widely used by engineers for the concepts of frequency deviation ranges within which phase-locked loop-based circuits can achieve lock under various additional conditions.
History
In the classic books on phase-locked loops, published in 1966, such concepts as hold-in, pull-in, lock-in, and other frequency ranges for which PLL can achieve lock, were introduced. They are widely used nowadays (see, e.g. contemporary engineering literature and other publications). Usually in engineering literature only non-strict definitions are given for these concepts.
Many years of using definitions based on the above concepts has led to the advice given in a handbook on synchronization and communications, namely to check the definitions carefully before using them. Later some rigorous mathematical definitions were given in.
Gardner problem on the lock-in range definition
In the 1st edition of his well-known work, Phaselock Techniques, Floyd M. Gardner introduced a lock-in concept: If, for some reason, the frequency difference between input and VCO is less than the loop bandwidth, the loop will lock up almost instantaneously without slipping cycles. The maximum frequency difference for which this fast acquisition is possible is called the lock-in frequency. His notion of the lock-in frequency and corresponding definition of the lock-in range have become popular and nowadays are given in various engineering publications. However, since even for zero frequency difference there may exist initial states of loop such that cycle slipping may take place during the acquisition process, the consideration of initial state of the loop is of utmost importance for the cycle slip analysis and, therefore, Gardner’s concept of lock-in frequency lacked rigor and required clarification.
In the 2nd edition of his book, Gardner stated: "there is no natural way to define exactly any unique lock-in frequency", and he wro |
https://en.wikipedia.org/wiki/PassMap | PassMap is a map-based graphical password method of authentication, similar to passwords, proposed by National Tsing Hua University researchers. The word PassMap originates from the word password by substituting word with map.
History and usage
PassMap was proposed by National Tsing Hua University researchers Hung-Min Sun, Yao-Hsin Chen, Chiung-Cheng Fang, and Shih-Ying Chang at the 7th Association for Computing Machinery Symposium on Information, Computer and Communications Security. They defined PassMap as letting a consumer get authenticated by choosing a series of points on a big world map. Their study showed that for people, PassMap passwords are more user-friendly and memorable.
Users are shown Google Maps on their screen, through which they can zoom in to choose any two points they want to become their PassMap password. Since PassMap uses Google Maps, it cannot be used in applications that lack Internet access or Google Maps integration. By default, PassMap's screen is set to the eighth zoom level and is centered on Taiwan. PassMap has no constraints on the zoom level, so consumers are allowed to select dots at unsafer, lower levels, like level 8. It does not normalize error tolerance based on a screen's zoom position. PassMap's effective login percentage is 92.59%.
Commentary
Ritika Sachdev wrote in the International Journal of Pure and Applied Research in Engineering and Technology that based on psychological studies, people can effortlessly recall the milestones they have visited. Sachdev called PassMap a "highly subjective or customized based password to ensure security".
S. Rajarajan, M. Prabhu, and S. Palanivel praised PassMap for having "good memorability due to the usage of map for the password mechanism". But they noted that, like many graphical passwords, PassMap is susceptible to a shoulder surfing intrusion.
References
Password authentication |
https://en.wikipedia.org/wiki/Belavkin%20equation | In quantum probability, the Belavkin equation, also known as Belavkin-Schrödinger equation, quantum filtering equation, stochastic master equation, is a quantum stochastic differential equation describing the dynamics of a quantum system undergoing observation in continuous time. It was derived and henceforth studied by Viacheslav Belavkin in 1988.
Overview
Unlike the Schrödinger equation, which describes the deterministic evolution of the wavefunction of a closed system (without interaction), the Belavkin equation describes the stochastic evolution of a random wavefunction of an open quantum system interacting with an observer:
Here, is a self-adjoint operator (or a column vector of operators) of the system coupled to the external field, is the Hamiltonian, is the imaginary unit, is the Planck constant, and is a stochastic process representing the measurement noise that is a martingale with independent increments with respect to the input probability measure . Note that this noise has dependent increments with respect to the output probability measure representing the output innovation process (the observation). For , the equation becomes the standard Schrödinger equation.
The stochastic process can be a mixture of two basic types: the Poisson (or jump) type , where is a Poisson process corresponding to counting observation, and the Brownian (or diffusion) type , where is the standard Wiener process corresponding to continuous observation. The equations of the diffusion type can be derived as the central limit of the jump type equations with the expected rate of the jumps increasing to infinity.
The random wavefunction is normalized only in the mean-squared sense , but generally fails to be normalized for each . The normalization of for each gives the random posterior state vector , the evolution of which is described by the posterior Belavkin equation, which is nonlinear, because operators and depend on due to normalization. The stochas |
https://en.wikipedia.org/wiki/AstroPrint | AstroPrint is a cloud platform and application marketplace designed for consumer 3D printing by 3DaGoGo Inc., a private San Diego-based technology company.
AstroPrint develops software to enable the management of desktop 3D printers from any web enabled device, without requiring any technical expertise. AstroPrint maintains partnerships with National Institutes of Health, 3D Hubs, i.materialise and 3D Slash. The 3D printer manufacturer Airwolf 3D ships 3D Printers integrated with AstroPrint software.
Background
In May 2014, while part of the Betaspring seed accelerator, AstroPrint was successfully funded through the crowdfunding platform Kickstarter. Subsequently, AstroPrint attended and graduated from the 500 Startups seed accelerator in Mountain View, CA. Notable investors of AstroPrint include Dave McClure, Will Bunker, Dave Hodson (Co-Founder & CTO of MessageCast Inc.) and Christine Tsai.
On January 5, 2016, AstroPrint unveiled a joint project with Marvell at CES 2016. The project involved the designing of a consumer-friendly 3D printer containing embedded software by AstroPrint using the Kinoma platform.
In May 2017, AstroPrint successfully funded the development of the AstroBox Touch. The device, a cloud-enabled touchscreen for desktop 3D Printing, was released shortly thereafter. Along with the AstroBox Touch, AstroPrint released cross-platform desktop and mobile apps alongside a public API designed to enhance the 3D printing experience on its platform. Toy Maker, a mobile app that allowed children to 3D print toys at home, was released in November 2017. Toy Maker helped to feature the content delivery capabilities of the AstroPrint platform.
Media coverage
On May 18, 2015, AstroPrint received the Editors Choice award by Maker Faire & Make Magazine. Tech Cocktail named AstroPrint one of "[t]he Top 5 Technologies VCs Will Fund in 2015".
In July 2015, AstroPrint received coverage by the San Diego Business Journal for enabling Dr. Peter Manning at the N |
https://en.wikipedia.org/wiki/Department%20of%20Zoology%2C%20University%20of%20Oxford | The Department of Zoology was a former science department in the University of Oxford's Mathematical, Physical and Life Sciences Division founded in 1860. From 1 August 2022 its functionality merged with the Department of Plant Sciences to become the Department of Biology at the University of Oxford.
Many distinguished scientists worked in the department at various stages in their careers, including three Nobel Laureates (Peter Medawar, Niko Tinbergen, and Sir John Gurdon), three winners of the Crafoord Prize (Bill Hamilton, Ilkka Hanski, Bob May), the Kyoto Prize (Bill Hamilton) and Blue Planet Prize (Bob May), as well as four winners of the Copley Medal (the Royal Society's premier research award).
History
The Department of Zoology was housed in the Tinbergen Building in Oxford, designed in 1965 by Sir Leslie Martin (who also designed the Royal Festival Hall) and opened in 1971, the Tinbergen Building was a large Modernist building housing over 1,600 staff and students. It was Oxford University's largest building.
In February 2017, university officials announced that the Tinbergen Building would be closed for two years and all research and teaching activities of the Zoology Department would be moved elsewhere. This was due to the discovery of more asbestos than had been previously known; too much than could be removed during necessary maintenance with the building remaining occupied.
On the 1 August 2022 the Department of Zoology merged with the Department of Plant Sciences to form the Department of Biology. The Department of Biology currently primarily located in various places, including temporary accommodation at 11a Mansfield Road and on South Parks Road.
The Tinbergen Building was demolished in spring 2020. It is to be replaced by a new £200m, 26,000 sq/m building, named the Life & Mind Building, scheduled to open in 2024. Planning permission was granted in early 2021. On completion, the building will house the Department of Biology and the Department of |
https://en.wikipedia.org/wiki/Recirculating%20aquaculture%20system | Recirculating aquaculture systems (RAS) are used in home aquaria and for fish production where water exchange is limited and the use of biofiltration is required to reduce ammonia toxicity. Other types of filtration and environmental control are often also necessary to maintain clean water and provide a suitable habitat for fish. The main benefit of RAS is the ability to reduce the need for fresh, clean water while still maintaining a healthy environment for fish. To be operated economically commercial RAS must have high fish stocking densities, and many researchers are currently conducting studies to determine if RAS is a viable form of intensive aquaculture.
RAS water treatment processes
A series of treatment processes is utilized to maintain water quality in intensive fish farming operations. These steps are often done in order or sometimes in tandem. After leaving the vessel holding fish the water is first treated for solids before entering a biofilter to convert ammonia, next degassing and oxygenation occur, often followed by heating/cooling and sterilization. Each of these processes can be completed by using a variety of different methods and equipment, but regardless all must take place to ensure a healthy environment that maximizes fish growth and health.
Biofiltration
All RAS relies on biofiltration to convert ammonia (NH4+ and NH3) excreted by the fish into nitrate. Ammonia is a waste product of fish metabolism and high concentrations (>.02 mg/L) are toxic to most finfish. Nitrifying bacteria are chemoautotrophs that convert ammonia into nitrite then nitrate. A biofilter provides a substrate for the bacterial community, which results in thick biofilm growing within the filter. Water is pumped through the filter, and ammonia is utilized by the bacteria for energy. Nitrate is less toxic than ammonia (>100 mg/L), and can be removed by a denitrifying biofilter or by water replacement. Stable environmental conditions and regular maintenance are required to |
https://en.wikipedia.org/wiki/Law%20on%20the%20fight%20against%20terrorism | The Law on the fight against terrorism (), abbreviated LCT, is a 2006 French counter-terrorism legislation designed to improve state security and strengthen border control. The legislation was passed on 23 January 2006 under the leadership of Nicolas Sarkozy, then the Minister of the Interior. Notably the law increased punitive measures for criminal association and gave the government more power to access personal information online.
Background
After the 2005 London bombings perpetrated by Islamic extremists, Sarkozy pushed to strengthen counter-terrorism measures in France. Sarkozy introduced the bill in the French Senate on 28 October 2005, saying that while France had never yielded to terrorist intimidation and never would, the rise in global terrorism necessitated change in policy.
Legislation
The legislation amended several previous criminal codes, including the first French counter-terrorism law, introduced in 1986. The 2006 act particularly increased the breadth of government surveillance without judicial control.
Police may access an individual's computer files without a warrant to prevent a terrorist act.
Internet service providers and Internet cafes are required to retain login and connection data for one year and to provide this data to authorities if requested.
Authorities may receive telephone and cell phone usage details, without the permission of a judge.
The time a person can be held without charges was increased from four to six days in cases of "serious risk of imminent terrorist action in France or abroad."
Increased CCTV surveillance in public
Identity checks, including on board international trains, are strengthened.
The Prime Minister or a person qualified in the Interior Ministry may authorize listening devices to record conversations.
Criticisms
The law was criticized for encroaching on personal freedoms and liberties, in particular, accessing phone and Internet data without a signed warrant from a judicial authority. "Interne |
https://en.wikipedia.org/wiki/Penumbra%20%28law%29 | In United States constitutional law, the penumbra includes a group of rights derived, by implication, from other rights explicitly protected in the Bill of Rights. These rights have been identified through a process of "reasoning-by-interpolation", where specific principles are recognized from "general idea[s]" that are explicitly expressed in other constitutional provisions. Although researchers have traced the origin of the term to the nineteenth century, the term first gained significant popular attention in 1965, when Justice William O. Douglas's majority opinion in Griswold v. Connecticut identified a right to privacy in the penumbra of the constitution.
Origins of the term
Commentators disagree about the precise origin of the use of the term penumbra in American legal scholarship, but most believe it was first used in the late nineteenth century. Burr Henly, for example, traces the first use of the word to an 1873 law review article written by Oliver Wendell Holmes, in which he argued that it is better for new law to grow "in the penumbra between darkness and light, than to remain in uncertainty". Luis Sirico and Henry T. Greely, on the other hand, trace the term to Justice Stephen Johnson Field's 1871 circuit court opinion in Montgomery v. Bevans, where Justice Field used the term to describe a period of time in which it was uncertain whether an individual could legally be considered deceased. Other commentators, including Glenn H. Reynolds and Brannon P. Denning, note that elements of penumbral reasoning can be found in much older cases that precede the first use of the term penumbra; they trace the origins of penumbral reasoning to United States Supreme Court cases from the early nineteenth century. For example, Reynolds and Denning describe Chief Justice John Marshall's opinion in McCulloch v. Maryland as "the quintessential example of penumbral reasoning".
Definition
Although the meaning of the term has varied over time, scholars now generally agree th |
https://en.wikipedia.org/wiki/Exchange%20spring%20media | Exchange spring media (also exchange coupled composite media or ECC) is a magnetic storage technology for hard disk drives that allows to increase the storage density in magnetic recording. The idea, proposed in 2004 by Suess et al., is that the recording media consists of exchange coupled soft and hard magnetic layers. Exchange spring media allows a good writability due to the write-assist nature of the soft layer. Hence, hard magnetic layers such as FePt, CoCrPt-alloys or hard magnetic multilayer structures can be written with conventional write heads. Due to the high anisotropy these grains are thermally stable even for small grain sizes. Small grain sizes are required for high density recording. The introduction of the soft layer does not decrease the thermal stability of the entire structure if the hard layer is sufficiently thick. The required thickness of the hard layer for best thermal stability is the exchange length of the hard layer material.
The first experimental realization of exchange spring media was done on Co-PdSiO multilayers as the hard layer which was coupled via a PdSi interlayer to a FeSiO soft layer.
Besides the improved writeability, another advantage of exchange spring media is, that the switching field distribution of the grains, which has to be as small as possible to allow for high storage densities, can be decreased. This effect was predicted theoretically and experimentally verified on Co/Pd multilayers as hard layer coupled to Co/Ni multilayers as soft layer.
In commercial hard disks exchange spring media is used since about 2007.
See also
Heat-assisted magnetic recording — Another technology to improve the writeability of high coercive materials such as FePt
Patterned media
Shingled magnetic recording
References
Computer storage technologies
Magnetic devices |
https://en.wikipedia.org/wiki/Visage%20SDK | Visage SDK (distributed as visage SDK) is a multi-platform software development kit (SDK) created by Visage Technologies AB. Visage SDK allows software programmers to build facial motion capture and eye tracking applications.
Technologies
Face Track
Face Track tracks 3D head poses, facial features, and eyes/gaze for multiple faces in a camera stream or from a video file. Face Track has configurable packages that include: facial tracking, face and facial landmarks/features detection, head tracking, and eye tracking.
Face Analysis
Face Analysis includes machine learning algorithms to determine gender, emotions and age. Face Analysis is compatible with Face Track to find/track faces in images or video, and determine the gender, emotions and age for a specified face.
Face Recognition
Face Recognition is used to identify or verify a person from a digital image or a video source using a pre-stored facial data. Visage SDK's face recognition algorithms can measure similarities between people and recognize a person’s identity from a frontal facial image by comparing it to pre-stored faces.
History and application
The development of Visage SDK began in 2002 when Visage Technologies AB was founded in Linköping, Sweden. The founders were among the contributors to the MPEG-4 Face and Body Animation International Standard.
Visage SDK is used in various application fields, such as game development, arts and entertainment, marketing and retail, marketing research, automotive industry, industrial safety, assistive technologies, health care, biometrics, audio processing and robotics. Recently, visage SDK has been used to create solutions in virtual make-up and 3D face filtering.
Features
Tracks multiple faces and facial features in input video, images or in real time
Returns 2D and 3D head pose, the coordinates of facial feature points (e.g. chin tip, nose tip, lip corners, mouth contour, chin pose, eyebrow contours), fitted 3D face model, and eye closure and eye rot |
https://en.wikipedia.org/wiki/Visage%20Technologies%20AB | Visage Technologies AB is a private company that produces computer vision software for face tracking (head tracking, face detection, eye tracking, face recognition) and face analysis (age detection, emotion recognition, gender detection), along with a special business unit in automotive industry. The primary product of Visage Technologies is a multiplatform software development kit visageSDK.
History
Visage Technologies AB was founded in Linköping, Sweden in 2002. The founders of Visage Technologies were among the main contributors to the MPEG-4 Face and Body Animation International Standard. Since Visage Technologies' founders have academic background, Visage Technologies promotes research collaboration with academic institutions, especially with Faculty of Electrical Engineering and Computing, University of Zagreb and University of Linköping. From 2015, the company expanded with a new automotive industry business unit that works with object tracking.
Application
Visage Technologies AB is licensing facial tracking technology for industrial and academic clients. Some of the previous and current industrial clients are: Fujitsu, BMW, Coca-Cola, Publicis Groupe, Facerig and Emotiv, while some agencies used visageSDK for mobile apps for Samsung, FX, or X Factor, along with marketing campaigns for Disney, Armani or Škoda.
Various academic institutions as well use visage|SDK to aid them in research, such as United States Naval Academy, Princeton University, Rutgers University, City College of New York, and McGill University. in the fields of face tracking and detection, artificial intelligence, natural language processing, and other computer vision studies and applications.
Recently, visageSDK has been used to create solutions for virtual makeup (Oriflame etc.) and 3D face filtering (face masking).
See also
Automotive industry
Biometrics
Computer vision
Emotion recognition
Eye tracking
Face detection
Facial motion capture
Facial recognition system
Game |
https://en.wikipedia.org/wiki/Forum%20Geometricorum | Forum Geometricorum: A Journal on Classical Euclidean Geometry is a peer-reviewed open-access academic journal that specializes in mathematical research papers on Euclidean geometry.
It was founded in 2001, is published by Florida Atlantic University, and is indexed among others by Mathematical Reviews and . Its founding editor-in-chief was Paul Yiu, a professor of mathematics at Florida Atlantic, now retired. All papers are available online immediately upon acceptance through the journal's web site.
, Forum Geometricorum is no longer accepting submissions. Prior issues are still available.
See also
International Journal of Geometry
References
External links
Mathematics journals
Open access journals
Academic journals established in 2001
Florida Atlantic University
English-language journals |
https://en.wikipedia.org/wiki/International%20Association%20for%20Lichenology | The International Association for Lichenology (IAL) is an organisation that encourages the understanding of lichens and lichenology, and promotes their study and conservation worldwide. It unites lichenologists across the globe, as well as national and regional organisations into one group. It is affiliated to the International Union of Biological Sciences (IUBS). The IAL organises field courses and excursions, as well as symposia which are the biggest events in lichenology on the international level. The 8th International Symposium will be held in Helsinki, Finland, in August 2016.
The IAL publishes a biennial journal, the International Lichenological Newsletter which was the raison d'etre for the IAL being formed in 1967 in order to provide a forum for lichenologists worldwide to communicate with one other. Nowadays the IAL also operates an online discussion forum for lichenologists known as 'lichens-L'.
History
The International Lichenological Association arose out of the 10th International Botanical Congress, held in Edinburgh in 1964, when a small group of lichenologists approved a motion to form an international association. The intention was to produce a newsletter to disseminate information quickly amongst lichenologists around the world, and a small committee comprising Rolf Santesson, Peter James and Vernon Ahmadjian was appointed to get it established.
The association's official inauguration took place at the 11th International Botanical Congress in Seattle in 1969 when the General Assembly of the IUBS officially recognised the new organisation.
Awards
The IAL currently hands out four awards to recognise significant contributions made to lichenology.
The Acharius Medal is awarded to distinguished lichenologists in recognition of their lifetime achievements. Recipients have included David Hawksworth (2002), Nina Golubkova (2000), Vernon Ahmadjian (1996), Irwin Brodo (1994), William Culberson (1992), Aino Henssen (1992), Hildur Krog (1992) and Hans Tras |
https://en.wikipedia.org/wiki/Robotic%20process%20automation | Robotic process automation (RPA) is a form of business process automation that is based on software robots (bots) or artificial intelligence (AI) agents. It is sometimes referred to as software robotics (not to be confused with robot software).
In traditional workflow automation tools, a software developer produces a list of actions to automate a task and interface to the back end system using internal application programming interfaces (APIs) or dedicated scripting language. In contrast, RPA systems develop the action list by watching the user perform that task in the application's graphical user interface (GUI), and then perform the automation by repeating those tasks directly in the GUI. This can lower the barrier to the use of automation in products that might not otherwise feature APIs for this purpose.
RPA tools have strong technical similarities to graphical user interface testing tools. These tools also automate interactions with the GUI, and often do so by repeating a set of demonstration actions performed by a user. RPA tools differ from such systems in that they allow data to be handled in and between multiple applications, for instance, receiving email containing an invoice, extracting the data, and then typing that into a bookkeeping system.
Historic evolution
The typical benefits of robotic automation include reduced cost; increased speed, accuracy, and consistency; improved quality and scalability of production. Automation can also provide extra security, especially for sensitive data and financial services.
As a form of automation, the concept has been around for a long time in the form of screen scraping, which can be traced back to early forms of malware. However, RPA is much more extensible, consisting of API integration into other enterprise applications, connectors into ITSM systems, terminal services and even some types of AI (e.g. Machine Learning) services such as image recognition. It is considered to be a significant technological ev |
https://en.wikipedia.org/wiki/Lattice%20network | A symmetrical lattice is a two-port electrical wave filter in which diagonally-crossed shunt elements are present – a configuration which sets it apart from ladder networks. The component arrangement of the lattice is shown in the diagram below. The filter properties of this circuit were first developed using image impedance concepts, but later the more general techniques of network analysis were applied to it.
There is a duplication of components in the lattice network as the "series impedances" (instances of Za) and "shunt impedances" (instances of Zb) both occur twice, an arrangement that offers increased flexibility to the circuit designer with a variety of responses achievable. It is possible for the lattice network to have the characteristics of: a delay network, an amplitude or phase correcting network, a dispersive network or as a linear phase filter, according to the choice of components for the lattice elements.
Configuration
The basic configuration of the symmetrical lattice is shown in the left-hand diagram. A commonly used short-hand version is shown on the right, with dotted lines indicating the presence the second pair of matching impedances.
It is possible with this circuit to have the characteristic impedance specified independently of its transmission properties, a feature not available to ladder filter structures. In addition, it is possible to design the circuit to be a constant-resistance network for a range of circuit characteristics.
The lattice structure can be converted to an unbalanced form (see below), for insertion in circuits with a ground plane. Such conversions also reduce the component count and relax component tolerances.
It is possible to redraw the lattice in the Wheatstone bridge configuration (as shown in the article Zobel network). However, this is not a convenient format in which to investigate the properties of lattice filters, especially their behavior in cascade.
Basic properties
Results from image theory
Filter th |
https://en.wikipedia.org/wiki/Nanolamination | Nanolamination is the production of materials that are fully dense, ultra-fine grained solids that exhibit a high concentration of interface defects. The properties of fabricated nanolaminates depend on their compositions and thicknesses.
Production
Nanolaminates can be grown using atom-by-atom deposition techniques that are designed with different stacking sequences and layer thicknesses.
Electrolytic reduction
Electrolytic reduction allows the production of metals and metal alloys in sub-µm-thick layers. It can be employed to create alloys with properties such as improved toughness, strength, thermal properties and corrosion that are a function of the interfaces in the nanolayers. They can be created using a bath containing multiple metal ion elements. By changing the current at precise moments to select a different element, it can create a layered structure. Coatings of up to a centimeter thick have been created.
It is claimed to offer the benefits of high-cost materials at much lower costs, because such materials can coat lower-cost materials that have other necessary properties such as strength.
Commercial production was introduced in the 2010s by a new company named Modumetal.
Atomic layer deposition
Many hybrid thin film oxides can be created using atomic layer deposition (ALD) with unique physical, chemical, and electronic properties. For example, a rough oxide layer can be further coated with a smooth oxide layer to provide a required surface texture. Properties may also depend on deposition temperature and the stratum to which the nanolaminate is applied.
Performance
In autoclave testing, some nanolaminated alloys have shown 8 times the resistance of carbon steels to degradation and in some cases, no measurable degradation.
Applications
Application include those that take advantage of enhanced mechanical properties or for devices such as energy storage and memory storage capacitors.
Oil and gas
Corrosion-resistant, structural tubulars a |
https://en.wikipedia.org/wiki/Crawford%20Dunn | Crawford Boddie Dunn (October 26, 1918 – September 17, 1980) was a designer specializing in graphics and corporate communication. Dunn is known for his modern design aesthetic and holistic approach to graphic identity and communication, which he applied to a variety of clients in the Southwest. In a 1975 newspaper article, Dunn said of the range of his work, "This spectrum comprises the design of print graphics, architectural graphics as well as corporate identity." A company brochure identifies another aspect of his work, "environmental signing design."
Early life and work history
Dunn was born in Bogalusa, Louisiana, and attended Haverford College and the University of Alabama before graduating with a bachelor's degree in industrial design from the Art Institute of Chicago. Dunn arrived in Dallas in 1951 where he first worked at the Vought Corporation. Ten years later he opened his own design firm, Crawford Dunn, Inc. A newspaper article from 1963 identifies his firm as Ikonogenics, Inc., and a later article announced his affiliation with the RYA Group to form RYA Crawford Dunn Incorporated. Upon his death in 1980 his firm was known as R.Y.A. Graphics.
Communication philosophy
Dunn's central philosophy of visual communication is expressed in his 1971 article "Alphasignal, Parasignal, Infrasignal: Notes Toward a Theory of Communication." In the article he defines three interrelated levels of communication signals ranging from a those containing pure information (alphsignal) to those colored or distorted by uncontrollable factors (infrasignal). Another concept developed by Dunn, ikonogenic, refers to the removal of all peripheral and secondary "noise" that lessens the impact of a message.
Range of clients
Dunn worked with a plethora of organizations on various design projects, including the World Trade Center in Dallas (signage), Texas Stadium, Zale Corporation, North Texas State University, the University of Texas at Arlington, Marsalis Zoo, the Southland Cor |
https://en.wikipedia.org/wiki/Discrete%20Applied%20Mathematics | Discrete Applied Mathematics is a peer-reviewed scientific journal covering algorithmic and applied areas of discrete mathematics. It is published by Elsevier and the editor-in-chief is Endre Boros (Rutgers University). The journal was split off from another Elsevier journal, Discrete Mathematics, in 1979, with that journal's founder Peter Ladislaw Hammer as its founding editor-in-chief.
Abstracting and indexing
The journal is abstracted and indexing in:
According to the Journal Citation Reports, the journal has a 2020 impact factor of 1.139.
References
External links
Combinatorics journals
Academic journals established in 1979
English-language journals
Elsevier academic journals |
https://en.wikipedia.org/wiki/Split-intein%20circular%20ligation%20of%20peptides%20and%20proteins | Split-intein circular ligation of peptides and proteins (SICLOPPS) is a biotechnology technique that permits the creation of cyclic peptides. These peptides are produced by ribosomal protein synthesis, followed by an intein-like event that splices the protein into a loop. By contrast with the nonribosomal peptide synthetases that produces some cyclic peptides like gramicidin S, SICLOPPS offers the advantage that the peptides' structure can be encoded by DNA in a simple manner according to the genetic code, but for this reason it imposes limitations on the types of amino acids incorporated that are comparable to those that apply to ordinary proteins. As implemented there is also some constraint on the peptide sequence of the cyclic sequence; for example, libraries may use the sequence SGXX..XXPL to increase the efficiency of circularization of the peptide. SICLOPPS is frequently used with a library of randomized DNA sequence that permits the simultaneous production and screening of large numbers of constructs at once, followed by the recovery of the DNA sequences responsible for the activity of the clone of interest.
A number of natural antimicrobial peptides are cyclic, and the products of SICLOPPS are "increasingly viewed as ideal backbones for modulation of protein-protein interactions." Circular peptides tend to be resistant to protease activity, and may be suitable for use as orally administered drugs. Once a cyclic peptide is identified with a biological activity of interest, it may also be possible to identify the target of the peptide (a gene that encodes a protein with which it interacts) by functional complementation, facilitating a better understanding of its mechanism of action.
See also
combinatorial chemistry
exon shuffling - note that although introns are conceptually analogous to inteins, they apply to a different molecule (RNA) and are processed by RNA splicing at a different time and location within the cell.
References
Biotechnology |
https://en.wikipedia.org/wiki/Parareal | Parareal is a parallel algorithm from numerical analysis and used for the solution of initial value problems.
It was introduced in 2001 by Lions, Maday and Turinici. Since then, it has become one of the most widely studied parallel-in-time integration methods.
Parallel-in-time integration methods
In contrast to e.g. Runge-Kutta or multi-step methods, some of the computations in Parareal can be performed in parallel and Parareal is therefore one example of a parallel-in-time integration method. While historically most efforts to parallelize the numerical solution of partial differential equations focussed on the spatial discretization, in view of the challenges from exascale computing, parallel methods for temporal discretization have been identified as a possible way to increase concurrency in numerical software.
Because Parareal computes the numerical solution for multiple time steps in parallel, it is categorized as a parallel across the steps method.
This is in contrast to approaches using parallelism across the method like parallel Runge-Kutta or extrapolation methods, where independent stages can be computed in parallel or parallel across the system methods like waveform relaxation.
History
Parareal can be derived as both a multigrid method in time method or as multiple shooting along the time axis.
Both ideas, multigrid in time as well as adopting multiple shooting for time integration, go back to the 1980s and 1990s.
Parareal is a widely studied method and has been used and modified for a range of different applications.
Ideas to parallelize the solution of initial value problems go back even further: the first paper proposing a parallel-in-time integration method appeared in 1964.
Algorithm
The Problem
The goal is to solve an initial value problem of the form
The right hand side is assumed to be a smooth (possibly nonlinear) function. It can also correspond to the spatial discretization of a partial differential equation in a method of lines appro |
https://en.wikipedia.org/wiki/Sri%20Lanka%20Software%20Testing%20Board | The Sri Lanka Software Testing Board (SLSTB) is a software testing qualifications board that represents Sri Lankan interests internationally as the national board for Sri Lanka within the International Software Testing Qualifications Board (ISTQB) and promotes the broad profession of software testing.
History
The SLSTB was formed in August, 2009 and was approved by the ISTQB General Assembly in October, 2009. The Board consists of testing experts from a wide range of organizations: the IT industry, consultancies, training providers and other professional and scientific/academic communities who volunteer their time to the achievement of organization's goals in terms of nurturing, promoting and supporting the software testing profession in Sri Lanka and help fellow software testing professionals to earn globally accepted qualifications as a practical means to excel in the software testing field.
Activities
As a member of the ISTQB, SLSTB provides the leadership and regulates the accreditation process and certification regulations for the Sri Lankan software industry; through promoting the development of a common body of understanding and knowledge about testing in alignment with professional Software Quality Assurance international qualification ISTQB Certified Tester. The certification is based on rigorous, internationally developed syllabi, with a hierarchy of qualifications and guidelines for accreditation and examination to enable individuals and organizations to achieve the highest levels of proficiency in software quality.
See also
International Software Testing Qualifications Board
References
Information technology organizations based in Asia
Software testing
Non-profit organisations based in Sri Lanka
Information technology in Sri Lanka |
https://en.wikipedia.org/wiki/Journal%20of%20Integer%20Sequences | The Journal of Integer Sequences is a peer-reviewed open-access academic journal in mathematics, specializing in research papers about integer sequences.
It was founded in 1998 by Neil Sloane. Sloane had previously published two books on integer sequences, and in 1996 he founded the On-Line Encyclopedia of Integer Sequences (OEIS). Needing an outlet for research papers concerning the sequences he was collecting in the OEIS, he founded the journal. Since 2002 the journal has been hosted by the David R. Cheriton School of Computer Science at the University of Waterloo, with Waterloo professor Jeffrey Shallit as its editor-in-chief. There are no page charges for authors, and all papers are free to all readers. The journal publishes approximately 50–75 papers annually.
In most years from 1999 to 2014, SCImago Journal Rank has ranked the Journal of Integer Sequences as a third-quartile journal in discrete mathematics and combinatorics. It is indexed by Mathematical Reviews and Zentralblatt MATH.
References
External links
Mathematics journals
Open access journals
Academic journals established in 1998
English-language journals
Irregular journals |
https://en.wikipedia.org/wiki/Liquid%E2%80%93liquid%20critical%20point | A liquid–liquid critical point (or LLCP) is the endpoint of a liquid–liquid phase transition line (LLPT); it is a critical point where two types of local structures coexist at the exact ratio of unity. This hypothesis was first developed by Peter Poole, Francesco Sciortino, Uli Essmann and H. Eugene Stanley in Boston to obtain a quantitative understanding of the huge number of anomalies present in water.
Near a liquid–liquid critical point, there is always a competition between two alternative local structures. For instance, in supercooled water, two types of local structures have been predicted: a low-density local configuration (LD) and a high-density local configuration (HD), so above the critical pressure, the liquid is composed by a majority of HD local structure, while below the critical pressure a higher fraction of LD local configurations is present. The ratio between HD and LD configurations is determined according to the thermodynamic equilibrium of the system, which is often governed by external variables such as pressure and temperature.
The liquid–liquid critical point theory can be applied to several liquids that possess the tetrahedral symmetry. The study of liquid–liquid critical points is an active research area with hundreds of articles having been published, though only a few of these investigations have been experimental since most modern probing techniques are not fast and/or sensitive enough to study them.
References
Critical phenomena
Phase transitions
Ice |
https://en.wikipedia.org/wiki/Cyber%20threat%20intelligence | Cyber threat intelligence (CTI) is knowledge, skills and experience-based information concerning the occurrence and assessment of both cyber and physical threats and threat actors that is intended to help mitigate potential attacks and harmful events occurring in cyberspace. Cyber threat intelligence sources include open source intelligence, social media intelligence, human Intelligence, technical intelligence, device log files, forensically acquired data or intelligence from the internet traffic and data derived for the deep and dark web.
In recent years, threat intelligence has become a crucial part of companies' cyber security strategy since it allows companies to be more proactive in their approach and determine which threats represent the greatest risks to a business. This puts companies on a more proactive front - actively trying to find their vulnerabilities and prevents hacks before they happen. This method is gaining importance in recent years since, as IBM estimates, the most common method companies are hack is via threat exploitation (47% of all attacks).
Threat vulnerabilities have risen in recent years also due to the COVID-19 pandemic and more people working from home - which makes companies' data more vulnerable. Due to the growing threats on one hand, and the growing sophistication needed for threat intelligence, many companies have opted in recent years to outsource their threat intelligence activities to a managed security provider (MSSP).
Process - intelligence cycle
The process of developing cyber threat intelligence is a circular and continuous process, known as the intelligence cycle, which is composed of five phases, carried out by intelligence teams to provide to leadership relevant and convenient intelligence to reduce danger and uncertainty.
The five phases are: 1) planning and direction; 2) collection; 3) processing; 4) analysis; 5) dissemination.
In planning and directing, the customer of the intelligence product requests intellige |
https://en.wikipedia.org/wiki/Unikernel | A unikernel is a computer program statically linked with the operating system code on which it depends. Unikernels are built with a specialized compiler that identifies the operating system services that a program uses and links it with one or more library operating systems that provide them. Such a program requires no separate operating system and can run instead as the guest of a hypervisor.
The unikernel architecture builds on concepts developed by Exokernel and Nemesis in the late 1990s.
Design
In a library operating system, protection boundaries are pushed to the lowest hardware layers, resulting in:
a set of libraries that implement mechanisms such as those needed to drive hardware or talk network protocols;
a set of policies that enforce access control and isolation in the application layer.
The library OS architecture has several advantages and disadvantages compared with conventional OS designs. One of the advantages is that since there is only a single address space, there is no need for repeated privilege transitions to move data between user space and kernel space. Therefore, a library OS can provide improved performance by allowing direct access to hardware without having to transition between user mode and kernel mode (on a traditional kernel this transition consists of a single TRAP instruction and is not the same as a context switch). Performance gains may be realised by elimination of the need to copy data between user space and kernel space, although this is also possible with Zero-copy device drivers in traditional operating systems.
A disadvantage is that because there is no separation, trying to run multiple applications side by side in a library OS, but with strong resource isolation, can become complex. In addition, device drivers are required for the specific hardware the library OS runs on. Since hardware is rapidly changing this creates the burden of regularly rewriting drivers to remain up to date.
OS virtualization can overcome |
https://en.wikipedia.org/wiki/Detailed%20engineering | Detailed engineering are studies which creates a full definition of every aspect of a project development. It includes all the studies to be performed before project construction starts. Detail engineering studies are a key component for every project development across mining, infrastructure, energy, pharmaceuticals, chemicals, and oil and gas sectors.
Detailed engineering is a service which is delivered for example by global engineering companies such as Worley, Morimatsu Industry, Outotec, Hatch, Amec Foster Wheeler, M3 Engineering, Ausenco, SNC-Lavalin, Techint, and Jacobs oEngineering.
Detailed engineering follows Front End Engineering Design (FEED) and Basic Engineering previous steps on the engineering process for a project development, it contains in detail diagrams and drawings for construction, civil works, instrumentation, control system, electrical facilities, management of suppliers, schedule of activities, costs, procurement of equipment, economic evaluation and also environmental impacts before starting of construction of a project.
Detailed engineering is used for different stages and purposes in project development worldwide, whether it is a water treatment plant at OceanaGold Didipo gold-copper mine in the Philippines, a processing plant at Hochschild Mining Inmaculada silver mine in Peru, a molybdenum flotation plant at KGHM Sierra Gorda copper project in Chile, detailed engineering is a key component for every project development.
References
Construction and extraction occupations
Engineering disciplines
Civil engineering
Building engineering |
https://en.wikipedia.org/wiki/Exposed.su | Exposed.su was a website run by Russian hackers focused on the listing of personal information of celebrities, and other high-profile figures. Among the high-profile victims include Michelle Obama, Donald Trump, Arnold Schwarzenegger, Kim Kardashian, Joe Biden, Hillary Clinton, Beyonce and Robert Mueller. The "doxed" documents, which are hosted on the website, include Social Security numbers, credit histories, loan documents and mortgage information of the individuals.
The credit history information appears to have been obtained through the hacking of 3 US credit history databases, Equifax, Experian and TransUnion, by the hacker CosmoTheGod.
In April 2013 Brian Krebs linked his swatting incident to the coverage of this site.
In 2017, a teenager named Eric Taylor, also known by his hacker handle CosmoTheGod, was sentenced to 36 months by United States District Court for the District of Columbia on charges of cybercrime with regards to a conspiracy that resulted in the disclosure of personal information of Trump, John Brennan, Obama, among others on the website. Previously in 2016, a New Yorker named Mir Islam was also arrested by the federal agents for posting CIA director John Brennan's confidential information to Exposed.su and "swatting" 50 people including Michelle Obama and Robert Mueller.
The site was shut down in March 2013 before jumping to other domains and has since been mirrored on a Tor hidden service.
References
Defunct Tor hidden services
Dark web
Hacking in the 2010s
Internet privacy
Celebrity |
https://en.wikipedia.org/wiki/Luebering%E2%80%93Rapoport%20pathway | In biochemistry, the Luebering–Rapoport pathway (also called the Luebering–Rapoport shunt) is a metabolic pathway in mature erythrocytes involving the formation of 2,3-bisphosphoglycerate (2,3-BPG), which regulates oxygen release from hemoglobin and delivery to tissues. 2,3-BPG, the reaction product of the Luebering–Rapoport pathway was first described and isolated in 1925 by the Austrian biochemist Samuel Mitja Rapoport and his technical assistant Jane Luebering.
Through the Luebering–Rapoport pathway bisphosphoglycerate mutase catalyzes the transfer of a phosphoryl group from C1 to C2 of 1,3-BPG, giving 2,3-BPG. 2,3-bisphosphoglycerate, the most concentrated organophosphate in the erythrocyte, forms 3-PG by the action of bisphosphoglycerate phosphatase. The concentration of 2,3-BPG varies proportionately with the pH, since it is inhibitory to catalytic action of bisphosphoglyceromutase.
References
External links
UniProt: Bisphosphoglycerate mutase - Homo sapiens (Human) UniProt-Information about bisphosphoglycerate mutase
A live model of the effect of changing 2,3-bisphosphoglycerate on the oxyhaemoglobin saturation curve
Organophosphates
Respiratory physiology
Physiology
Biochemistry |
https://en.wikipedia.org/wiki/Culture.pl | Culture.pl is a large web portal devoted to Polish culture. It was founded by the Adam Mickiewicz Institute in March 2001. Written in Polish, English and Russian, the site promotes the work of Polish artists around the world and is a popular information database on all artistic aspects of Polish culture. Its ISSN number is 1734-0624.
Structure
As well as acting as a database and magazine on Polish culture, the site promotes cultural events organised by its parent organisation the Adam Mickiewicz Institute. According to its website, as of 2015 Culture.pl has around 38,000 articles (8,000 of which are in English) shared across categories including Music, Visual Arts, Film, Theatre, Dance, Language & Literature, Comics, Heritage, Architecture, Photography, and Design. While a large part of the site is on Polish artists and their works, there is also information on around 700 cultural institutions such as museums, galleries, philharmonic halls, theatres and art schools. Many articles are written in English and specifically aimed at international audiences.
The portal was founded in March 2001. The project was initially conceived and designed by Andrzej Lubomirski, who also acted as editor-in-chief until 2008. Subsequent editors-in-chief included Monika Rencławowicz (2008–2009), Elżbieta Sawicka (2009–2012) and Weronika Kostyrko (2012–2016). The site went on to expand its offering with multimedia guides and podcasts.
In June 2016, Culture.pl released four multimedia guides developed with Bright Media called A Foreigner's Guide to Polish Culture, covering the fields of cinema, electronic music and photography, as well as the Polish alphabet.
In August 2017, Culture.pl's English section released their first podcast, called Stories From The Eastern West. The podcast is advertised as 'little-known histories from Central and Eastern Europe that changed our world'. In August 2019, the team released a mini-series called The Final Curtain about the collapse of the Eastern |
https://en.wikipedia.org/wiki/Faultless%20disagreement | A faultless disagreement is a disagreement when Party A states that P is true, while Party B states that non-P is true, and neither party is at fault. Disagreements of this kind may arise in areas of evaluative discourse, such as aesthetics, justification of beliefs or moral values, etc. A representative example is that John says Paris is more interesting than Rome, while Bob claims Rome is more interesting than Paris. Furthermore, in the case of a faultless disagreement, it is possible that if any party gives up their claim, there will be no improvement in the position of any of them.
Within the framework of formal logic it is impossible that both P and not-P are true, and it was attempted to justify faultless disagreements within the framework of relativism of the Truth, Max Kölbel and Sven Rosenkranz present arguments to the point that genuine faultless disagreements are impossible. However, defenses of faultless disagreement, and of alethic relativism more generally, continue to be made by critics of formal logic as it is currently constructed.
References
Concepts in the philosophy of language
Logical truth
Semantics
Formal semantics (natural language)
Concepts in logic |
https://en.wikipedia.org/wiki/Build%20UK | Build UK is a representative organisation in the UK construction industry. It was formed by the 2015 merger of the UK Contractors Group (UKCG) and the National Specialist Contractors Council (NSCC). Combining clients, main contractors, trade associations, and other organisations, it claims to represent over 40% of UK construction.
History
Build UK was launched on 1 September 2015, following the merger of the UKCG and the NSCC (announced the previous June). Its members include industry clients, main contractors, trade associations representing over 11,500 specialist contractors, and other organisations committed to industry collaboration. It claims to represent over 40% of UK construction.
Its initial action plan had five key areas: the image of construction, industry's skills needs, effective pre-qualification, health and safety performance, and fair payment practices.
Following Carillion's January 2018 liquidation, Build UK set out an agenda to reform the construction industry's commercial model, potentially eliminating unfair contract terms, late payment and retentions.
In 2022, Build UK was awarded the 'Royal Charter Award for Excellence in Construction' by the Worshipful Company of Constructors for the leadership role it played during the COVID-19 pandemic in the United Kingdom.
UKCG
Established in January 2009, the UKCG succeeded the Major Contractors Group and the National Contractors Federation which had until that point represented the views of the leading UK contractors. The UKCG represented over 30 contractors operating in the UK. Between them (c. 2015), UKCG members accounted for £33 billion of construction turnover - a third of UK construction total output.
It was one of two organisations which represented the views of contractors on the Strategic Forum for Construction, along with the Construction Alliance. UKCG also worked closely with the Confederation of British Industry (CBI) Construction Council.
NSCC
The National Specialist Contractors' Cou |
https://en.wikipedia.org/wiki/JuMP | JuMP is an algebraic modeling language and a collection of supporting packages for mathematical optimization embedded in the Julia programming language. JuMP is used by companies, government agencies, academic institutions, software projects, and individuals to formulate and submit optimization problems to thirdparty solvers. JuMP has been specifically applied to problems in the field of operations research.
Features
JuMP is a Julia package and domain-specific language that provides an API and syntax for declaring and solving optimization problems. Specialized syntax for declaring decision variables, adding constraints, and setting objective functions is facilitated by Julia's syntactic macros and metaprogramming features. JuMP supports linear programming, mixed integer programming, semidefinite programming, conic optimization, nonlinear programming, and other classes of optimization problems. JuMP provides access to over 30 solvers, including state-of-the-art commercial and open-source solvers.
History
JuMP was first developed by Miles Lubin, Iain Dunning, and Joey Huchette while they were students at the Massachusetts Institute of Technology. Today, JuMP's core developers are Miles Lubin, Benoît Legat, Joaquim Dias Garcia, Joey Huchette, and Oscar Dowson. Miles Lubin additionally holds the title of BDFL. JuMP is a sponsored project of NumFOCUS.
Recognition
JuMP and its authors have been acknowledged by the 2015 COIN-OR Cup, the 2016 INFORMS Computing Society Prize, and the Mathematical Optimization Society's 2021 BealeOrchardHays Prize.
See also
HiGHS optimization solver
List of free and open-source optimization solvers
Mathematical optimization
PuLP a similar project for Python
Pyomo Python packages for formulating optimization problems
References
External links
JuMP documentation
JuMP repository
Computational science
Computer programming
Mathematical modeling
Mathematical optimization |
https://en.wikipedia.org/wiki/LINE1 | LINE1 (also L1 and LINE-1) is a family of related class I transposable elements in the DNA of some organisms, classified with the long interspersed nuclear elements (LINEs). L1 transposons comprise approximately 17% of the human genome. These active L1s can interrupt the genome through insertions, deletions, rearrangements, and copy number variations. L1 activity has contributed to the instability and evolution of genomes and is tightly regulated in the germline by DNA methylation, histone modifications, and piRNA. L1s can further impact genome variation through mispairing and unequal crossing over during meiosis due to its repetitive DNA sequences.
L1 gene products are also required by many non-autonomous Alu and SVA SINE retrotransposons. Mutations induced by L1 and its non-autonomous counterparts have been found to cause a variety of heritable and somatic diseases.
In 2011, human L1 was reportedly discovered in the genome of the gonorrhea bacteria, evidently having arrived there by horizontal gene transfer.
Structure
A typical L1 element is approximately 6,000 base pairs (bp) long and consists of two non-overlapping open reading frames (ORFs) which are flanked by untranslated regions (UTRs) and target site duplications. In humans, ORF2 is thought to be translated by an unconventional termination/reinitiation mechanism, while mouse L1s contain an internal ribosome entry site (IRES) upstream of each ORF.
5' UTR
The 5' UTRs of mouse L1s contain a variable number of GC-rich tandemly repeated monomers of around 200 bp, followed by a short non-monomeric region. Human 5’ UTRs are ~900 bp in length and do not contain repeated motifs. All families of human L1s harbor in their most 5’ extremity a binding motif for the transcription factor YY1. Younger families also have two binding sites for SOX-family transcription factors, and both YY1 and SOX sites were shown to be required for human L1 transcription initiation and activation. Both mouse and human 5’ UTRs also con |
https://en.wikipedia.org/wiki/Summer%20School%20Marktoberdorf | The International Summer School Marktoberdorf is an annual two-week summer school for international computer science and mathematics postgraduate students and other young researchers, held annually since 1970 in Marktoberdorf, near Munich in southern Germany. Students are accommodated in the boarding house of a local high school, Gymnasium Marktoberdorf. Proceedings are published when appropriate.
Status
This is a summer school for theoretical computer science researchers, with some directors/co-directors who are Turing Award winners (the nearest equivalent to the Nobel Prize in computer science).
The summer school is supported as an Advanced Study Institute of the NATO Science for Peace and Security Program. It is administered by the Faculty of Informatics at the Technical University of Munich.
Directors
Past academic directors and co-directors include:
Manfred Broy
Robert Lee Constable
Javier Esparza
Orna Grumberg
David Harel
Tony Hoare*
Orna Kupferman
Tobias Nipkow
Doron Peled
Amir Pnueli*
Alexander Pretschner
Peter Müller
Shmuel Sagiv
Helmut Schwichtenberg
Helmut Seidl
Stanley S. Wainer
* Turing Award winners.
References
External links
1970 establishments in Germany
Recurring events established in 1970
August events
Marktoberdorf
Computer science conferences
Computer science education
Theoretical computer science
Annual events in Germany
Events in West Germany
NATO
Technical University of Munich
Education in Bavaria |
https://en.wikipedia.org/wiki/Edible%20packaging | Edible packaging refers to packaging which is edible and biodegradable.
Edible food packaging
Several manufacturers are developing or producing food packaging that is edible. One example is made based on the seaweed, Eucheuma cottonii.
Traditional water containers
About 50 billion single-use plastic water bottles made of polyethylene terephthalate (PET) are produced in the United States each year, and most are discarded. According to the National Association for PET Container Resources, the recycling rate for PET has held steady at 31% since 2013.
Polyesters like PET can be broken down through hydrolytic degradation: the ester linkage is cut by a water molecule. The reaction proceeds differently in acidic or alkaline conditions, but works best at temperatures between 200 - 300 °C. Under environmental conditions the process is undetectably slow.
PET is considered to be essentially non-biodegradable, with plastic bottles estimated to take as long as 450 years to decompose. Because of this, other packaging materials are being sought.
Calcium alginate gel
Alginates are the natural product of brown algae and have been used extensively in wound dressing, drug delivery and tissue engineering, as well as food applications. Sodium alginate is an unbranched copolymer of 1,4-linked-β-d-mannuronate (M) and α-l-guluronate (G) sugars.
Sodium alginate (NaAlg) coagulates when exposed to calcium chloride (CaCl2) and forms calcium alginate (CaAlg2) and sodium chloride (NaCl), according to the following reaction:
2NaAlg + CaCl2 → CaAlg2 + 2NaCl
Safety and biodegradability
The biocompatibility of alginate gels has been studied extensively and their safety for consumption is well established. As natural polysaccharides resistant to breakdown by human digestive enzymes, alginates are classified as dietary fiber. Although undigested if eaten, an alginate capsule will gradually decompose as the calcium diffuses out of the gel matrix in the reverse of the reaction above.
CaAl |
https://en.wikipedia.org/wiki/Integer%20set%20library | isl (integer set library) is a portable C library for manipulating sets and relations of integer points bounded by linear constraints.
The following operations are supported:
intersection, union, set difference
emptiness check
convex hull
(integer) affine hull
integer projection
computing the lexicographic minimum using parametric integer programming
coalescing
parametric vertex enumeration
It also includes an ILP solver based on generalized basis reduction, transitive closures on maps (which may encode infinite graphs), dependence analysis and bounds on piecewise step-polynomials.
All computations are performed in exact integer arithmetic using GMP or imath.
Many program analysis techniques are based on integer set manipulations. The integers typically represent iterations of a loop nest or elements of an array.
isl uses parametric integer programming to obtain an explicit representation in terms of integer divisions.
It is used as backend polyhedral library in the GCC Graphite framework
and in the LLVM Polly framework
for loop optimizations.
See also
Frameworks supporting the polyhedral model
Integer programming
References
External links
Official ISL web site
ISL source repository
Integer sets and relations: from high-level modeling to low-level implementation (Sven Verdoolaege)
Computer arithmetic
C (programming language) libraries
Numerical libraries
Free software programmed in C
Software using the MIT license |
https://en.wikipedia.org/wiki/St-planar%20graph | In graph theory, an st-planar graph is a bipolar orientation of a plane graph for which both the source and the sink of the orientation are on the outer face of the graph. That is, it is a directed graph drawn without crossings in the plane, in such a way that there are no directed cycles in the graph, exactly one graph vertex has no incoming edges, exactly one graph vertex has no outgoing edges, and these two special vertices both lie on the outer face of the graph.
Within the drawing, each face of the graph must have the same structure: there is one vertex that acts as the source of the face, one vertex that acts as the sink of the face, and all edges within the face are directed along two paths from the source to the sink. If one draws an additional edge from the sink of an st-planar graph back to the source, through the outer face, and then constructs the dual graph (oriented each dual edge clockwise with respect to its primal edge) then the result is again an st-planar graph, augmented with an extra edge in the same way.
Order theory
These graphs are closely related to partially ordered sets and lattices. The Hasse diagram of a partially ordered set is a directed acyclic graph whose vertices are the set elements, with an edge from x to y for each pair x, y of elements for which x ≤ y in the partial order but for which there does not exist z with x ≤ y ≤ z.
A partially ordered set forms a complete lattice if and only if every subset of elements has a unique greatest lower bound and a unique least upper bound, and the order dimension of a partially ordered set is the least number of total orders on the same set of elements whose intersection is the given partial order.
If the vertices of an st-planar graph are partially ordered by reachability, then this ordering always forms a two-dimensional complete lattice, whose Hasse diagram is the transitive reduction of the given graph. Conversely, the Hasse diagram of every two-dimensional complete lattice is always an |
https://en.wikipedia.org/wiki/Dato%20Capital | Dato Capital is an online database of business information about companies and directors registered in the United Kingdom, Gibraltar, Spain, Panama, Cayman Islands, Luxembourg and British Virgin Islands.
The website publishes basic company and director information but complete reports are priced. The amount of available information about a company varies depending on the country of incorporation, ranging from financial data (UK companies) to just company name and type (Cayman Islands and BVI). Basic information about directors includes approximate figures of the number and location of the companies involved and an extract of the appointment list. Not all the countries have director data.
The parent company who owns the database and website is Netamo Systems SL, incorporated in Spain.
The company received attention in October 2014 when it published lists of deleted director profile links under the Right to be forgotten directive.
History
According to the parent company, it was incorporated in 2001; started working in business applications in 2003, and website was launched in 2007. The first proof of datocapital.com existence dates to December 2008, and it shows a Spanish version with only Spanish companies. Domain was registered in September 2006. The first press mention of UK companies was in March 2014, and Gibraltar and Panama appear in another interview of March 2015. Latter countries were introduced during 2015.
Business Model
The company acts an information reseller, collecting data from public sources such as gazettes and official corporate registries; and private sources such as banks and credit agencies. Some of the data is published in the company website with an advertising model, and the rest of the data is sold in a paid content model. There is no registration available.
Controversy with data aggregators
The role of data aggregators has been criticized since 1995 with privacy, and data accuracy as main concerns.
Most negative views against data |
https://en.wikipedia.org/wiki/Water%20usage%20effectiveness | Water Usage Effectiveness (WUE) is a sustainability metric created by The Green Grid in 2011 to attempt to measure the amount of water used by datacenters to cool their IT assets.
To calculate simple WUE, a data center manager divides the annual site water usage in liters by the IT equipment energy usage in kilowatt hours (Kwh). Water usage includes water used for cooling, regulating humidity and producing electricity on-site. More complex WUE calculations are available from The Green Grid website.
References
Benchmarks (computing)
Water conservation |
https://en.wikipedia.org/wiki/Indexed%20category | In category theory, a branch of mathematics, a C-indexed category is a pseudofunctor from Cop to Cat, where Cat is a 2-category of categories. Any indexed category has an associated Grothendieck construction, which gives rise to a fibred category.
References
Category theory |
https://en.wikipedia.org/wiki/Bulk%20personal%20datasets | "Bulk personal datasets" is the UK government's euphemism for datasets containing personally identifiable information on a large number of individuals, as part of mass surveillance in the United Kingdom and on citizens around the world.
The term was first used publicly in March 2015 by the Intelligence and Security Committee of Parliament, and is subject to significant controversy.
Other UK Government departments have programmes utilising bulk personal datasets, one of which is the care.data programme in the Department of Health and National Health Service. In health, bulk personal datasets are created as a by-product of providing direct care.
Controversy
The judicial body which oversees the intelligence services in the United Kingdom, the Investigatory Powers Tribunal, ruled that the legislative framework in the United Kingdom does not permit mass surveillance and that while GCHQ collects and analyses data in bulk, it does not practice mass surveillance. A special report published by the Intelligence and Security Committee of Parliament also came to this view, although it found past shortcomings in oversight and said the legal framework should be simplified to improve transparency. This view is supported by independent reports from the Interception of Communications Commissioner. However, notable campaign groups and broadsheet newspapers continue to express strong views to the contrary, while others have criticised these viewpoints in turn.
References
Mass surveillance
Privacy
Personal life
Data security |
https://en.wikipedia.org/wiki/Leo%20Fitz | Leopold James "Leo" Fitz is a fictional character that originated in the Marvel Cinematic Universe before appearing in Marvel Comics. The character, created by Joss Whedon, Jed Whedon and Maurissa Tancharoen, first appeared in the pilot episode of Agents of S.H.I.E.L.D. in September 2013, and has continually been portrayed by Iain De Caestecker.
In the series, Fitz is one of S.H.I.E.L.D.'s top scientific minds. His scientific knowledge is vast, and as an engineer and inventor he has developed many of S.H.I.E.L.D.'s staple devices and gadgets. Many of his storylines involve his relationship with his best friend, and later wife, Jemma Simmons, who are collectively known as Fitzsimmons. Over the course of the series, Fitz suffers multiple traumas and becomes aware of a darker and more ruthless side to his character. His darker alter ego is commonly known as The Doctor.
Fictional character biography
In season one, Leo Fitz is brought on to S.H.I.E.L.D. agent Phil Coulson's team as an engineering and weapons technology specialist. He has a close bond with fellow agent Jemma Simmons, whom he met at the S.H.I.E.L.D. academy, with both being its Science and Technology division's youngest graduates. Near the end of the season, Fitz and Simmons lock themselves inside a medical unit for safety from rogue agent Grant Ward, who ejects the unit into the ocean. While trapped, Fitz professes his feelings for Simmons before sacrificing himself to save her. They are rescued by Nick Fury, but Fitz sustains damage to his temporal lobe as a result of oxygen deprivation and is left comatose.
In season two, Fitz initially struggles with technology and speech as a result of Ward's actions, but over time becomes a full member of the team again. Near the end of the season Fitz arranges for a date with Simmons when the Kree weapon called "Monolith", which is in S.H.I.E.L.D. custody, breaks free of containment and absorbs Simmons into itself.
In season three, Fitz acquires an ancient Hebr |
https://en.wikipedia.org/wiki/.tor | .tor is a pseudo-top-level domain host suffix implemented by the OnioNS project, which aims to add DNS infrastructure to the Tor network enabling the selection of meaningful and globally-unique domain name for hidden services, which users can then reference from the Tor Browser.
The project aims to address the major usability issue that has been with Tor hidden services since their introduction in 2002.
Beta release of the server, client and domain name reservation tool (so called hidden service) software parts and their supporting common library were announced in the Tor developers mailing list in August 2015.
According to the description on the projects gitsite "OnioNS is a distributed, privacy-enhanced, metadata-free, and highly usable DNS for Tor hidden services"
The system is powered by the Tor network, relies on a distributed database, and provides anonymity to both operators and users.
See also
OnioNS
.onion
References
.tor
Pseudo-top-level domains |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.