source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/American%20Society%20of%20Botanical%20Artists
The American Society of Botanical Artists (ASBA) is the principal United States society for those who practice and appreciate contemporary botanical art. Since its founding by Diane Bouchier in 1994, ASBA has grown to nearly 2000 individual members in 39 countries and more than 40 institutional members from around the world. ASBA members include botanical artists at all levels from beginners to masters, instructors, collectors, curators, botanical gardens, museums, academic institutions, and libraries. Definition The Society defines "botanical art" as Having an aesthetic appeal, exhibiting the elements and principles of artistic design Made to intent of elicit an intellectual or emotional response To scale (actual size or scaled enlargement or reduction) Free of animals except those that are interdependent with the plant and depicted subordinated to the plant Free of backgrounds except for solid colors, textured substrates, or the natural habitat of the plant portrayed subordinate to the plant Journals ASBA publishes The Botanical Artist quarterly journal. Exhibitions and awards The ASBA organizes an Annual International Juried Exhibition in conjunction with the Horticultural Society of New York. At this annual exhibition, it awards the Diana Bouchier Artist Award for Excellence in Botanical Art, the James White Service Award for Dedication to Botanical Art, and the Botanical Illustrator Award for Excellence in Scientific Botanical Art. 2010 through 2014 - 13th, 14th, 15th, 16th, 17th International ASBA Botanical Art Exhibition at the Horticultural Society of New York 2015 through 2017 - 18th, 19th, 20th Annual International Exhibit at The New York Design Center Fall 2018 - 21st Annual International Exhibit at Wave Hill Fall 2019 - 22nd Annual International Exhibit at Marin Art & Garden Center, Ross, CA Fall 2020 - 23rd Annual International Exhibit at Wave Hill References External links Official site Arts organizations based in the United Stat
https://en.wikipedia.org/wiki/Facility%20location%20%28cooperative%20game%29
The cooperative facility location game is a cooperative game of cost sharing. The goal is to share the cost of opening new facilities between the clients enjoying these facilities. The game has the following components: There are several consumers who need a certain service, e.g, electricity connection. There are several locations where facilities (e.g. power-stations) can be built. For every pair of consumer (C) and location (L), there is a fixed cost of serving C from L (e.g, depending on the distance between the power station and the consumer's house). This cost is denoted Cost[C,L]. The cost of serving a group of consumers is lower than the sum of the cost of serving each consumer alone. EXAMPLE: There are two facilities, F1 which costs 2 and F2 which costs 2. There are three consumers, Alice Bob and Carl. Alice can be served only from F1, with cost 2. So the cost of serving her alone is 2+2=4. Bob can be served from F1 with cost 2 or from F2 with cost 1. So the cost of serving him alone is 2+1=3. Carl can be served only from F2, with cost 1. So the cost of serving him alone is 2+1=3. The cost of serving Alice and Bob is 2+2+2=6 (by building only F1). The cost of serving Bob and Carl is 2+1+1=4 (by building only F2). The cost of serving Alice and Carl is 2+2+2+1=7 (by building F1 and F2). The cost of serving all agents is 2+2+2+1+1=8. The most socially-desirable outcome of the game is that all agents are served. The cost of this outcome (8 in the above example) can be shared among the agents. A cost-allocation is good if no sub-group of agents can deviate and get a lower cost for itself (such cost-allocation is said to be in the core of the game). In the above example: The cost-vector (5,2,1) is not in the core, since Alice can deviate and get a cost of only 4. Similarly, the vector (3,3,2) is not in the core since Bob and Carl can deviate together and get a total cost of only 4. The cost-vectors (4,2,2) and (4,1,3) are in the core. A classic r
https://en.wikipedia.org/wiki/Sponge%20ground
Sponge grounds, also known as sponge aggregations, are intertidal to deep-sea habitats formed by large accumulations of sponges (glass sponges and/or demosponges), often dominated by a few massive species. Sponge grounds were already reported more than 150 years ago, but the habitat was first fully recognized, studied and described in detail around the Faroe Islands during the inter-Nordic BIOFAR 1 programme 1987–90. These were called Ostur (meaning "cheese" and referring to the appearance of the sponges) by the local fishermen and this name has to some extent entered the scientific literature. Sponge grounds were later found elsewhere in the Northeast Atlantic and in the Northwest Atlantic, as well as near Antarctica. They are now known from many other places worldwide and recognized as key marine habitats. Sponge grounds are important habitats supporting diverse ecosystems. During a study of outer shelf and upper slope sponge grounds at the Faroe Islands, 242 invertebrate species were found in the vicinity and 115 were associated with the sponges. In general, fish fauna associated with sponge grounds are poorly known, but include rockfish and gadiforms. Sponge grounds are threatened, especially by bottom trawling and other fishing gear, dredging, oil and gas exploration and undersea cables, but potentially also by deep sea mining, carbon dioxide sequestration, pollution and climate change. Prehistoric sponge grounds By studying spicules in sediments cores taken from sponge grounds on the slopes of the Flemish Cap and Grand Bank (off Newfoundland, Canada), scientists managed to detect the presence of sponges in the past. The oldest record for Geodiidae sponges in this region was found in a long core collected in the slope of the Grand Bank, where typical sterraster spicules were found in the top of a submarine landslide deposit older than 25 000 BP. Continuous presence of sponges was recorded on the southeastern region of the Flemish Cap as far as 130 000 BP. It
https://en.wikipedia.org/wiki/List%20of%20operator%20splitting%20topics
This is a list of operator splitting topics. General Alternating direction implicit method — finite difference method for parabolic, hyperbolic, and elliptic partial differential equations GRADELA — simple gradient elasticity model Matrix splitting — general method of splitting a matrix operator into a sum or difference of matrices Paul Tseng — resolved question on convergence of matrix splitting algorithms PISO algorithm — pressure-velocity calculation for Navier-Stokes equations Projection method (fluid dynamics) — computational fluid dynamics method Reactive transport modeling in porous media — modeling of chemical reactions and fluid flow through the Earth's crust Richard S. Varga — developed matrix splitting Strang splitting — specific numerical method for solving differential equations using operator splitting Numerical analysis Mathematics-related lists Outlines of mathematics and logic Outlines
https://en.wikipedia.org/wiki/Stefan%20Grigorievich%20Samko
Stefan Grigorievich Samko (; born March 28, 1941) is a mathematician active in the field of functional analysis, function spaces and operator theory. He is a retired professor of Mathematics at Algarve University and Rostov State University. Career Research activity S. Samko has more than 260 research papers spread throughout the areas of, Harmonic Analysis and Operator Theory in Variable Exponent Function Spaces; Function spaces; Potential type operators; Hypersingualr integrals and the method of approximative inverse operators; Fractional calculus of one and many variables; Integral equations of the first kind (including multi-dimensional ones). Teaching activity He was the adviser for 21 PhD students, from Russia and Portugal. The complete list is: Boris Rubin Vladimir Nogin Alexandre Skorikov Salaudin Umarkhadzhiev Alexandre Guinzbourg Hamzat Murdaev† Boris Vakulov Anatolii Chuvenkov Pavel Pavlov Galina Emgusheva Galina Kostetskaya Taus Khamidova Mahmadiar Yakhshiboev Esmira Alisultanova Anna Abramyan Zarema Mussalaeva Alexey Karapetyants Elena Urnysheva Alexandre Almeida Rogério Cardoso Humberto Rafeiro Bibliography References External links Stefan Samko's home page 1941 births Living people Scientists from Rostov-on-Don Soviet mathematicians 20th-century Portuguese mathematicians 20th-century Russian mathematicians 21st-century Russian mathematicians Steklov Institute of Mathematics alumni Mathematical analysts Academic staff of the University of Algarve Academic staff of Southern Federal University
https://en.wikipedia.org/wiki/Binary%20mass%20function
In astronomy, the binary mass function or simply mass function is a function that constrains the mass of the unseen component (typically a star or exoplanet) in a single-lined spectroscopic binary star or in a planetary system. It can be calculated from observable quantities only, namely the orbital period of the binary system, and the peak radial velocity of the observed star. The velocity of one binary component and the orbital period provide information on the separation and gravitational force between the two components, and hence on the masses of the components. Introduction The binary mass function follows from Kepler's third law when the radial velocity of one binary component is known. Kepler's third law describes the motion of two bodies orbiting a common center of mass. It relates the orbital period with the orbital separation between the two bodies, and the sum of their masses. For a given orbital separation, a higher total system mass implies higher orbital velocities. On the other hand, for a given system mass, a longer orbital period implies a larger separation and lower orbital velocities. Because the orbital period and orbital velocities in the binary system are related to the masses of the binary components, measuring these parameters provides some information about the masses of one or both components. However, the true orbital velocity is often unknown, because velocities in the plane of the sky are much more difficult to determine than velocities along the line of sight. Radial velocity is the velocity component of orbital velocity in the line of sight of the observer. Unlike true orbital velocity, radial velocity can be determined from Doppler spectroscopy of spectral lines in the light of a star, or from variations in the arrival times of pulses from a radio pulsar. A binary system is called a single-lined spectroscopic binary if the radial motion of only one of the two binary components can be measured. In this case, a lower limit on the
https://en.wikipedia.org/wiki/Wildlife%20radio%20telemetry
Wildlife radio telemetry is a tool used to track the movement and behavior of animals. This technique uses the transmission of radio signals to locate a transmitter attached to the animal of interest. It is often used to obtain location data on the animal's preferred habitat, home range, and to understand population dynamics. The different types of radio telemetry techniques include very high frequency (VHF) transmitters, global positioning system (GPS) tracking, and satellite tracking. Recent advances in technology have improved radio telemetry techniques by increasing the efficacy of data collection. However, studies involving radio telemetry should be reviewed in order to determine if newer techniques, such as collars that transmit the location to the operator via satellites, are actually required to accomplish the goals of the study. Transmitters The operator attaches a transmitter to an animal that gives off unique electromagnetic radio signals, which allows the animal to be located. Transmitters are available in a variety of forms and consist of an antenna, a power source, and the electronics required to produce a signal. Transmitters are chosen based on the behavior, size, and life history of the specific species being studied. In order to reduce the impact of the transmitter on the animal's behavior and quality of life, transmitters typically weigh no more than five percent of the animal's body weight. Unfortunately, the smaller the transmitter, the weaker and shorter-lived it is. Transmitters are often designed to fall off the animal at the conclusion of the study due to the unlikelihood of recapturing the tagged animals. Large animals require transmitters in the form of collars, which leave room for the animal to grow without falling off. Ear tag transmitters are commonly attached to the ear of large animals that have changing neck sizes. Lightweight, adhesive transmitters are glued to the backs of smaller animals, such as bats. Necklace packs are tran
https://en.wikipedia.org/wiki/OpenFog%20Consortium
The OpenFog Consortium (sometimes stylized as Open Fog Consortium) was a consortium of high tech industry companies and academic institutions across the world aimed at the standardization and promotion of fog computing in various capacities and fields. The consortium was founded by Cisco Systems, Intel, Microsoft, Princeton University, Dell, and ARM Holdings in 2015 and now has 57 members across the North America, Asia, and Europe, including Forbes 500 companies and noteworthy academic institutions. The OpenFog consortium merged with the Industrial Internet Consortium, now the Industry IoT Consortium, on January 31, 2019. History OpenFog was created on November 19, 2015, by ARM Holdings, Cisco Systems, Dell, Intel, Microsoft, and Princeton University. The idea for a consortium centered on the advancement and dissemination of fog computing was thought up by Helder Antunes, a Cisco executive with a history in IoT, Mung Chiang, then a Princeton University professor and now President of Purdue University, and Dr. Tao Zhang, a Cisco Distinguished Engineer and CIO for the IEEE Communications Society then and now a manager at the National Institute of Standards and Technologies (NIST). The project was executed from concept to launch by Armando Pereira at PVentures Group, a Silicon Valley-based high-tech consulting firm. OpenFog released its reference architecture for fog computing on 13 February 2017. The Fog World Congress 2017, with Dr. Tao Zhang as its General Chair, was hosted in October 2017 by OpenFog, in conjunction with the IEEE Communications Society, as the first congress devoted to fog computing. Administration The OpenFog Consortium is governed by its board of directors, which is chaired by Cisco Senior Director Helder Antunes. The board of directors is made up of 11 seats, each representing one of the following companies and institutions: ARM, AT&T, Cisco, Dell, Intel, Microsoft, Princeton University, IEEE, GE, ZTE and Shanghai Tech University. The c
https://en.wikipedia.org/wiki/Retention%20schedule
A retention schedule is a listing of organizational information types, or series of information in a manner which facilitates the understanding and application of the identified and approved retention period, and other information retention aspects. Purpose Retention schedules are an important aspect of records management. Many organizations are subject to rules and regulations (at the local, state or federal level) that govern for how long they are required to keep records before they can safely dispose of them. Holding onto records for longer than required can expose the organization to unnecessary liability, since such records are discoverable during lawsuits. Basic information Record/series title (name) Description of information within record/series Approved retention period Appropriate security requirements Appropriate destruction method Further items for schedule consideration Location of retention Date record type/series approved Responsible group/office/person(s) of record Remarks related to record/series Series number applied to a specific record/series See also Records management is the process of ensuring that in whatever form, records are maintained and managed economically, effectively and efficiently throughout their life cycle in the organization. Information governance is the protection of records from access by individuals that are not supposed to access the records. References External links ARMA – How do I build a Retention Schedule? Public records Records management Information management Information governance
https://en.wikipedia.org/wiki/ICtCp
ICTCP, ICtCp, or ITP is a color representation format specified in the Rec. ITU-R BT.2100 standard that is used as a part of the color image pipeline in video and digital photography systems for high dynamic range (HDR) and wide color gamut (WCG) imagery. It was developed by Dolby Laboratories from the IPT color space by Ebner and Fairchild. The format is derived from an associated RGB color space by a coordinate transformation that includes two matrix transformations and an intermediate nonlinear transfer function that is informally known as gamma pre-correction. The transformation produces three signals called I, CT, and CP. The ICTCP transformation can be used with RGB signals derived from either the perceptual quantizer (PQ) or hybrid log–gamma (HLG) nonlinearity functions, but is most commonly associated with the PQ function (which was also developed by Dolby). The I ("intensity") component is a luma component that represents the brightness of the video, and CT and CP are blue-yellow (named from tritanopia) and red-green (named from protanopia) chroma components. Ebner also used IPT as short for "Image Processing Transform". The ICTCP color representation scheme is conceptually related to the LMS color space, as the color transformation from RGB to ICTCP is defined by first converting RGB to LMS with a 3×3 matrix transformation, then applying the nonlinearity function, and then converting the nonlinear signals to ICTCP using another 3×3 matrix transformation. ICTCP was defined as YCC digital format with support for 4:4:4, 4:2:2 and 4:2:0 chroma subsampling in CTA-861-H (that means that in limited range 10 bit mode 0, 1, 2, 3, 1020, 1021, 1022, 1023 values are reserved). Derivation ICTCP is defined by Rec. 2100 as being derived from linear RGB as follows: Calculate LMS from BT.2100 RGB: Normalize the LMS by a non-linearity: If the PQ transfer function is used: If the HLG transfer function is used: Calculate ICTCP: for PQ: for HLG: All three above ment
https://en.wikipedia.org/wiki/ISO%2015489
ISO 15489 Information and documentation—Records management is an international standard for the management of business records, consisting of two (2) parts: Part 1: Concepts and principles and Part 2: Guidelines. ISO 15489 is the first standard devoted specifically to records management; providing an outline for comprehensive assessment of full and partial records management programs. Topics covered Metadata for records Records systems Policies Assigned responsibilities Monitoring of records Training supporting the effective management of records Recurrent analysis of business context Identification of records requirements Records controls Creation, capturing and managing of records Related standards The following standards have been developed by and are the direct responsibility of the ISO/TC 46/SC 11 Secretariat. ISO 13008:2012 – Information and documentation – Digital records conversion and migration process ISO/TR 13028:2010 – Information and documentation – Implementation guidelines for digitization of records ISO 15489-1:2016 – Information and documentation – Records management – Part 1: Concepts and principles ISO/TR 15489-2:2001 – Information and documentation – Records management – Part 2: Guidelines ISO 16175-1:2010 – Information and documentation – Principles and functional requirements for records in electronic office environments – Part 1: Overview and statement of principles ISO 16175-2:2011 – Information and documentation – Principles and functional requirements for records in electronic office environments – Part 2: Guidelines and functional requirements for digital records management systems ISO 16175-3:2010 – Information and documentation – Principles and functional requirements for records in electronic office environments – Part 3: Guidelines and functional requirements for records in business systems ISO/TR 17068:2012 – Information and documentation – Trusted third party repository for digital records ISO/TR 18128:2014 –
https://en.wikipedia.org/wiki/Eclipse%20Che
Eclipse Che is an open-source, Java-based developer workspace server and Online IDE (integrated development environment). It includes a multi-user remote development platform. The workspace server comes with a flexible RESTful webservice. It also contains a SDK for creating plug-ins for languages, frameworks or tools. Eclipse Che is an Eclipse Cloud Development (ECD) top-level project, allowing contributions from the user community. History Eclipse Che was first announced in October 2014. One of its main contributors, Codenvy, delivered the technological stack which Che is based on. The idea behind the cloud based IDE and its development came up in early 2009 by the eXo Platform. After three years of ongoing development the project raised $9 million and developed a stand-alone business called Codenvy. After announcing the Che project including intellectual property donation and participation in the Eclipse Cloud Development project the development of the Che project began. Codenvy itself is today a commercial product built on top of Eclipse Che. Today, there are many contributors besides Codenvy like IBM, Red Hat, Samsung, SAP, Microsoft, Intuit, eXo Platform, WSO2, and Serli, as well as numerous open source contributors from Brazil, Canada, China, France, India, Russia, Sri Lanka, Ukraine, and United States. Licensing Eclipse Che is released under the Eclipse Public License which is similar to the Common Public License. Name The name "Che" is based on the fact that most of the development is done in Cherkasy (Ukraine). Supported languages and frameworks By default, the following programming languages and frameworks are supported: Approach Che itself is a workspace server running on an application server. Che provides an integrated IDE which can be used via a browser. After the initial load the IDE provides a dynamic user interface including known components like wizards, editors, toolbars and many more. The user has the opportunity to create workspaces, proje
https://en.wikipedia.org/wiki/Human%20uses%20of%20birds
Human uses of birds have, for thousands of years, included both economic uses such as food, and symbolic uses such as art, music, and religion. In terms of economic uses, birds have been hunted for food since Palaeolithic times. They have been captured and bred as poultry to provide meat and eggs since at least the time of ancient Egypt. Some species have been used, too, to help locate or to catch food, as with cormorant fishing and the use of honeyguides. Feathers have long been used for bedding, as well as for quill pens and for fletching arrows. Today, many species face habitat loss and other threats caused by humans; bird conservation groups work to protect birds and to influence governments to do so. Birds have appeared in the mythologies and religions of many cultures since ancient Sumer. For example, the dove was the symbol of the ancient Mesopotamian goddess Inanna, the Canaanite mother goddess Asherah, and the Greek goddess Aphrodite. Athena, the Greek goddess of wisdom, had a little owl as her symbol, and, in ancient India, the peacock represented Mother Earth. Birds have often been seen as symbols, whether bringing bad luck and death, being sacred, or being used in heraldry. In terms of entertainment, raptors have been used in falconry, while cagebirds have been kept for their song. Other birds have been raised for the traditional sports of cockfighting and pigeon racing. Birdwatching, too, has grown to become a major leisure activity. Birds feature in a wide variety of art forms, including in painting, sculpture, poetry and prose, film and fashion. Birds also appear in music as well as traditional dance and ballet. In certain cases, such as the bird-and-flower painting of China, birds are central to an artistic genre. Context Culture consists of the social behaviour and norms found in human societies and transmitted through social learning. Cultural universals in all human societies include expressive forms like art, music, dance, ritual, religion,
https://en.wikipedia.org/wiki/BitTorious
BitTorious is a combination Open Source BitTorrent Tracker and web-based management portal released in 2014 by Preston Lee from the Biomedical Informatics Department at Arizona State University. The primary difference between BitTorious' integrated tracker and other available trackers is the addition of a role-based permissions model and feed-based organization system. The source code is written in AngularJS, Ruby on Rails and PostgreSQL, and may be run on Linux, Windows or OS X server environments. Major releases v3.0.0 BitTorious v3 is the current production release. Major differences include tracker support for "volunteer" clients, as well as corresponding configuration options in the web-based user interface. Its release coincides with an academic publication entitled "BitTorious volunteer: server-side extensions for centrally-managed volunteer storage in BitTorrent swarms" published November 4, 2015. v2.0.0 Release of 2.0.0 was a rewrite of a previously unpublished v1.0.0, and marked by the publication of a paper entitled "BitTorious: global controlled genomics data publication, research and archiving via BitTorrent extensions" in BMC Bioinformatics on October 7, 2014. Academics The design of BitTorious was initially intended to be used by private groups of collaborators needing to frequently exchange large data payloads, as is common in genomics, proteomics, and other data-intensive fields. The software's generic design, however, allows for usage in any domain. References External links https://github.com/preston/bittorious Free software BitTorrent tracker Servers (computing)
https://en.wikipedia.org/wiki/Von%20Baer%27s%20laws%20%28embryology%29
In developmental biology, von Baer's laws of embryology (or laws of development) are four rules proposed by Karl Ernst von Baer to explain the observed pattern of embryonic development in different species. von Baer formulated the laws in his book On the Developmental History of Animals (), published in 1828, while working at the University of Königsberg. He specifically intended to rebut Johann Friedrich Meckel's 1808 recapitulation theory. According to that theory, embryos pass through successive stages that represent the adult forms of less complex organisms in the course of development, and that ultimately reflects (the great chain of being). von Baer believed that such linear development is impossible. He posited that instead of linear progression, embryos started from one or a few basic forms that are similar in different animals, and then developed in a branching pattern into increasingly different organisms. Defending his ideas, he was also opposed to Charles Darwin's 1859 theory of common ancestry and descent with modification, and particularly to Ernst Haeckel's revised recapitulation theory with its slogan "ontogeny recapitulates phylogeny". Darwin was however broadly supportive of von Baer's view of the relationship between embryology and evolution. The laws Von Baer described his laws in his book Über Entwickelungsgeschichte der Thiere. Beobachtung und Reflexion published in 1828. They are a series of statements generally summarised into four points, as translated by Thomas Henry Huxley in his Scientific Memoirs: The more general characters of a large group appear earlier in the embryo than the more special characters. From the most general forms the less general are developed, and so on, until finally the most special arises. Every embryo of a given animal form, instead of passing through the other forms, rather becomes separated from them. The embryo of a higher form never resembles any other form, but only its embryo. Description Von Baer
https://en.wikipedia.org/wiki/Provirus%20silencing
Provirus silencing, or proviral silencing, is the repression of expression of proviral genes in cells. A provirus is a viral DNA that has been incorporated into the chromosome of a host cell, often by retroviruses such as HIV. Endogenous retroviruses are always in the provirus state in the host cell and replicate through reverse transcription. By integrating their genome into the host cell genome, they make use of the host cell's transcription and translation mechanisms to achieve their own propagation. This often leads to harmful impact on the host. However, in recent gene therapy techniques, retroviruses are often used to deliver desired genes instead of their own viral genome into the host genome. As such, we are interested in the host cell's mechanisms to silence such gene expressions to find out firstly, how the host cell manages provirus transcription to eliminate the deleterious effects of retroviruses; and secondly, how can we ensure stable and long term expression of retrovirus-mediated gene transfer. It has been found that the level transcription of integrated retroviruses depends on both genetic and chromatin remodeling at the site of integration. Mechanisms such as DNA methylation and histone modification seem to play important roles in the suppression provirus transcription, such that proviral activity can be finally silenced. References Genetic engineering Viral genes
https://en.wikipedia.org/wiki/Ehrlich%20ascites%20carcinoma
Ehrlich-Lettre ascites carcinoma (EAC) is also known as Ehrlich cell. It was originally established as an ascites tumor in mice. Ehrlich cell The tumor was cultured in vivo, which became known as the Ehrlich cell. After 1948 Ehrlich cultures spread around research institutes all over the world. The Ehrlich cell became popular because it could be expanded by in vivo passage. This made it useful for biochemical studies involving large amounts of tissues. It could also be maintained in vitro for more carefully controlled studies. Culture techniques in large-scale, mice passage is less attractive, due to the contamination of the tumor with multifarious host inflammatory cells. Properties EAC is referred to as undifferentiated carcinoma, and is originally hyper-diploid. The permeability to water is highest at the initiation of the S phase and progressively decreases to its lowest value just after mitosis. Activation heats for water permeability vary during the cell cycle, ranging from 9–14 kca/mole. References External links Cell biology
https://en.wikipedia.org/wiki/Walt%20Jung
Walter G Jung, commonly known as Walt Jung, is an American electronic engineer and author. He worked for Linear Technology and Analog Devices. He has written a number of books, the most popular of which is the IC Op Amp Cookbook, which has been in print since 1974. He was named a Fellow of the Audio Engineering Society in 1979 for his work on distortion in operational amplifiers. He also was named to Electronic Design’s Engineering Hall of Fame in 2002. He is highly regarded as a design engineer. Publications Op Amp Applications Handbook; 1st Ed; Newnes; 2005; . Audio IC Op-Amp Applications; 3rd Ed; Sams Publishing; 1987; . IC Op-Amp Cookbook; 3rd Ed; Prentice Hall; 1986; . IC Timer Cookbook; 2nd Ed; Sams Publishing; 1983; . IC Array Cookbook; 1st Ed; Hayden; 1980; . IC Converter Cookbook; 1st Ed; Sams Publishing; 1978; . Unique IC Op-Amp Applications; 1st Ed; Sams Publishing; 1975; . References External links Personal website Living people American electronics engineers American engineering writers Year of birth missing (living people)
https://en.wikipedia.org/wiki/Theory%20of%20mind%20in%20animals
Theory of mind in animals is an extension to non-human animals of the philosophical and psychological concept of theory of mind (ToM), sometimes known as mentalisation or mind-reading. It involves an inquiry into whether non-human animals have the ability to attribute mental states (such as intention, desires, pretending, knowledge) to themselves and others, including recognition that others have mental states that are different from their own. To investigate this issue experimentally, researchers place non-human animals in situations where their resulting behavior can be interpreted as supporting ToM or not. The existence of theory of mind in non-human animals is controversial. On the one hand, one hypothesis proposes that some non-human animals have complex cognitive processes which allow them to attribute mental states to other individuals, sometimes called "mind-reading" while another proposes that non-human animals lack these skills and depend on more simple learning processes such as associative learning; or in other words, they are simply behaviour-reading. Several studies have been designed specifically to test whether non-human animals possess theory of mind by using interspecific or intraspecific communication. Several taxa have been tested including primates, birds and canines. Positive results have been found; however, these are often qualified as showing only low-grade ToM, or rejected as not convincing by other researchers. History and development The term "theory of mind" was originally proposed by Premack and Woodruff in 1978. Early studies focused almost entirely on studying if chimpanzees could understand the knowledge of humans. This approach turned out not to be particularly fruitful and 20 years later, Heyes, reviewing all the extant data, observed that there had been "no substantial progress" in the subject area. A 2000 paper approached the issue differently by examining competitive foraging behaviour between primates of the same speci
https://en.wikipedia.org/wiki/Spacelords
Spacelords (previously known as Raiders of the Broken Planet) is an online free-to-play action-adventure video game developed and published by Spanish studio MercurySteam. It was released for Microsoft Windows, PlayStation 4 and Xbox One on September 22, 2017, and for PlayStation 5 and Xbox Series X/S in November 2020. Spacelords is an asymmetric online adventure game. There are gameplay elements which task the players to shoot and brawl and utilize strategy. A story mode, which will be released episodically, is also planned. Development Development for the game had already begun before the release of MercurySteam's previous game, Castlevania: Lords of Shadow 2. Dave Cox, the producer of the Castlevania franchise, revealed that some of the abandoned gameplay elements for Lords of Shadow 2, such as the combat mechanics, may be featured in the company's next game. In March 2016, Cox announced his partnership with MercurySteam and that the company was working on a new game with a sci-fi setting. Enric Alvarez, the head of MercurySteam, further described the project as one of the company's most "ambitious" titles. The game was teased by MercurySteam multiple times before it was officially announced in April 2016. MercurySteam is set to self-publish Raiders of the Broken Planet for PlayStation 4, Microsoft Windows and Xbox One on September 22, 2017. A beta test for the Windows version is set to be held before the game's official release. On July 21, 2018, MercurySteam have announced the new name for the game as Spacelords and planned to go with Free-2-Play by giving players access to all four campaigns (a total of 16 multi-stage missions) at once, accessible in any order they choose. There will also be a new progression system, allowing players to access the game's entire character roster. The game was also released for PlayStation 5 and Xbox Series X/S in November 2020 as a launch title for the consoles. References External links 2017 video games Action-adventur
https://en.wikipedia.org/wiki/Polycomb%20recruitment%20in%20X%20chromosome%20inactivation
X chromosome inactivation (XCI) is the phenomenon that has been selected during the evolution to balance X-linked gene dosage between XX females and XY males. Phases XCI is usually divided in two phases, the establishment phase when gene silencing is reversible, and maintenance phase when gene silencing becomes irreversible. During the establishment phase of X Chromosome Inactivation (XCI), Xist RNA, the master regulator of this process, is monoallelically upregulated and it spreads in cis along the future inactive X (Xi), relocates to the nuclear periphery. and recruits repressive chromatin-remodelling complexes Among these, Xist recruits proteins of the Polycomb repressive complexes. Whether Xist directly recruits Polycomb repressive complex 2 (PRC2) to the chromatin or this recruitment is the consequence of Xist-mediated changes on the chromatin has been object of intense debate. Mechanism Some studies showed that PRC2 components are not associated with Xist RNA or do not interact functionally. However another study has shown by means of mass spectrometry analysis, that two subunits of PRC2 may interact with Xist, although these proteins are also found in other complexes and are not unique components of the PRC2 complex. PRC2 binds the A-repeat (RepA) of Xist RNA directly and with very high affinity (dissociation constants of 10-100 nanomolar), supporting Xist-mediated recruitment of PRC2 to the X chromosome. However it is not clear whether such interactions occurs in vivo under physiological conditions. Failure to turn up PRC2 proteins in function screens may be due to cells not being able to survive or compete without PRC2 or incomplete screens. Two super resolution microscopy analyses have presented different views from each other. One showed that Xist and PRC2 are spatially separated, while another showed that Xist and PRC2 are tightly linked. It is possible that several mechanisms recruit PRC2 in parallel, including direct Xist-mediated recruitmen
https://en.wikipedia.org/wiki/List%20of%20.NET%20libraries%20and%20frameworks
This article contains a list of libraries that can be used in .NET languages. These languages require .NET Framework, Mono, or .NET, which provide a basis for software development, platform independence, language interoperability and extensive framework libraries. Standard Libraries (including the Base Class Library) are not included in this article. Preamble Apps created with .NET Framework or .NET run in a software environment known as the Common Language Runtime (CLR), an application virtual machine that provides services such as security, memory management, and exception handling. The framework includes a large class library called Framework Class Library (FCL). Thanks to the hosting virtual machine, different .NET CLI-compliant languages can operate on the same kind of data structures. Therefore, all CLI-compliant languages can use FCL and other .NET libraries that are written in one of the CLI compliant languages. When the source code of a CLI-compliant language is compiled, the compiler generates platform-independent code in the Common Intermediate Language (CIL, also referred to as bytecode), which is stored in CLI assemblies. When a .NET app runs, the just-in-time compiler (JIT) turns the CIL code into platform-specific machine code. To improve performance, .NET Framework also comes with the Native Image Generator (NGEN), which performs ahead-of-time compilation to machine code. This architecture provides language interoperability. Each language can use code written in other languages. Calls from one language to another are exactly the same as would be within a single programming language. If a library is written in one CLI language, it can be used in other CLI languages. Moreover, apps that consist only of pure .NET assemblies, can be transferred to any platform that contains an implementation of CLI and run on that platform. For example, apps written using .NET can run on Windows, macOS, and various versions of Linux. .NET apps or their libraries, h
https://en.wikipedia.org/wiki/Akihiko%20Matsui%20%28economist%29
is a Japanese economist. He is a professor at the University of Tokyo. Biography Matsui was born on August 28, 1962, in Tokyo, Japan. He is the nephew of Hideyuki Fujisawa who was a professional Go player. He received a B.A. from University of Tokyo in 1985 and a Ph.D. from Northwestern University in 1990. From 1990 to 1994, he taught at the University of Pennsylvania. From 1994 to 2001, he taught at the University of Tsukuba (joint appointment with University of Tokyo, 1998-2001). He then taught at the University of Tokyo. Published works Books Journal article Honors Ouchi Hyoe Prize (B.A. thesis), 1985 Fulbright Scholarship, 1987–1989 W.P. Carey Term Chair, University of Pennsylvania, 1990–1993 Nikkei Book Award, 2003 JSPS (Japan Society for the Promotion of Science) Prize, 2005 Japan Academy Medal, 2006 Nakahara Prize, 2007 Fellow, Econometric Society, 2008 References External links Aki Matsui's HP Faculty profile at University of Tokyo Akihiko Matsui - VCASI 1962 births Living people 20th-century Japanese economists 21st-century Japanese economists Game theorists University of Tokyo alumni Northwestern University alumni Academic staff of the University of Tokyo Academic staff of the University of Tsukuba University of Pennsylvania faculty Fellows of the Econometric Society Presidents of the Japanese Economic Association
https://en.wikipedia.org/wiki/My%20Cloud
The My Cloud product line comprises personal network-attached storage (NAS) devices and multi-purpose servers, designed and marketed by Western Digital Corporation (WD). My Cloud devices are available in storage capacities of 2 terabytes, 3 terabytes, 4 terabytes, and 8 terabytes, with a higher-end model offering up to 16 terabytes. Hardware My Cloud employs a Mindspeed Comcerto 2000 dual-core ARM Cortex-A9 Communication processor running at 650 MHz. The gigabit Ethernet port is powered by a Broadcom BCM54612E Gigabit Ethernet transceiver. Additional hardware components include 256 megabytes of Samsung K4B2G1646E DDR3 random access memory and 512 kilobytes of Winbound 25X40CL flash memory. The internal storage drive utilized is a WD Red 2 terabyte hard drive. Cooling for the My Cloud system relies on fanless air convection.. My Cloud OS and Dashboard The My Cloud OS, a proprietary operating system My Cloud OS (operating system), is pre-installed on all My Cloud devices and facilitates management of the NASs. It boasts a user-friendly graphical interface and offers customization options. Moreover, some users have identified that the operating system is based on Linux, sporting user-friendly graphical user interface and SSH accessibility. This operating system is proprietary, however, others have found the operating system to be Linux, with a graphical user interface, but also accessible. which comes pre-installed on all My Cloud devices. Compatibility and Applications My Cloud apps My Cloud is designed to be compatible with various platforms, including personal computers, Apple Macs, Android devices, and iOS devices. Western Digital Western Digital provides applications that enable seamless interaction with My Cloud devices. Incidents On March 26, 2023, Western Digital encountered a cyberattack that led to unauthorized access to company systems and data theft. As a precautionary measure, the company temporarily suspended some services, including My Cloud,
https://en.wikipedia.org/wiki/Dorkovo%20Museum
Dorkovo Museum in Dorkovo, Bulgaria, established in 2013 in a domed wooden structure, has a display of fossils collected from the Pliocene geological epoch of about five million years ago around the village of Dorkovo, a life-size model of a gomphothere, related to elephants, and a diorama. History During 1983 a team of paleontologists from Bulgaria and France carried out excavations in and around Dorkovo which unearthed fossils of 5-million-year-old prehistoric mammals of the Pliocene geological epoch. The study was supported by the National Museum of Natural History. The museum was created only 30 years later at the site by the National Museum of Natural History, artists and those associated with the excavations at Dorkovo to display the fossils, a gomphothere model and other animal sculptures, and a diorama based on the Pliocene animals and forest. Funding for the museum was provided under the regional development of the European Union (EU). The museum was inaugurated on 19 September 2013 by Rosen Plevneliev, President of Bulgaria. It is located from Sofia in the Rhodopi (village) of Dorkovo between Velingrad and the Batak Reservoir, in the Pazardzhik region. Features The museum, set amidst the forest, showcases of some of the fossil findings of the excavations, which revealed mostly gomphotheres (extinct elephant relatives). It is housed in a domed structure made of wood both on the inner and outer surfaces, which measures . Apart from the fossils collected from the field, the major attraction in the museum is model of a gomphothere of the species of Anancus arvernensis, which was made by the Simeon Stoilov Studio. It measures in height. The diorama on the interior wooden walls of the museum measures and was painted there by Velizar, the "painter-animalist" of the Field Museum, Chicago, and shows examples not only of proboscideans but also monkeys, Hipparion horses, and forests. References Museums in Bulgaria Paleontology in Bulgaria Evolutionary biolo
https://en.wikipedia.org/wiki/Tissue%20remodeling
Tissue remodeling is the reorganization or renovation of existing tissues. Tissue remodeling can be either physiological or pathological. The process can either change the characteristics of a tissue such as in blood vessel remodeling, or result in the dynamic equilibrium of a tissue such as in bone remodeling. Macrophages repair wounds and remodel tissue by producing extracellular matrix and proteases to modify that specific matrix. A myocardial infarction induces tissue remodeling of the heart in a three-phase process: inflammation, proliferation, and maturation. Inflammation is characterized by massive necrosis in the infarcted area. Inflammatory cells clear the dead cells. In the proliferation phase, inflammatory cells die by apoptosis, being replaced by myofibroblasts which produce large amounts of collagen. In the maturation phase, myofibroblast numbers are reduced by apoptosis, allowing for infiltration by endothelial cells (for blood vessels) and cardiomyocytes (heart tissue cells). Usually, however, much of the tissue remodeling is pathological, resulting in a large amount of fibrous tissue. By contrast, aerobic exercise can produce beneficial cardiac tissue remodeling in those suffering from left ventricular hypertrophy. Programmed cellular senescence contributes to beneficial tissue remodeling during embryonic development of the fetus. In a brain stroke the penumbra area surrounding the ischemic event initially undergoes a damaging remodeling, but later transitions to a tissue remodeling characterized by repair. Vascular remodeling refers to a compensatory change in blood vessel walls due to plaque growth. Vascular expansion is called positive remodeling, whereas vascular constriction is called negative remodeling. Tissue remodeling occurs in adipose tissue with increased body fat. In obese subjects, this remodeling is often pathological, characterized by excessive inflammation and fibrosis. See also Collagen hybridizing peptide, a molecular marker
https://en.wikipedia.org/wiki/Janus%20%28time-reversible%20computing%20programming%20language%29
Janus is a time-reversible programming language written at Caltech in 1982. The operational semantics of the language were formally specified, together with a program inverter and an invertible self-interpreter, in 2007 by Tetsuo Yokoyama and Robert Glück. A Janus inverter and interpreter is made freely available by the TOPPS research group at DIKU. Another Janus interpreter was implemented in Prolog in 2009. The below summarises the language presented in the 2007 paper. Janus is an imperative programming language with a global store (there is no stack or heap allocation). Janus is a reversible programming language, i.e. it supports deterministic forward and backward computation by local inversion. Syntax We specify the syntax of Janus using Backus–Naur form. A Janus program is a sequence of one or more variable declarations, followed by a sequence of one or more procedure declarations: <program> ::= <v-decl> <v-decls> <p-decl> <p-decls> <v-decls> ::= <v-decl> <v-decls> | "" <p-decls> ::= <p-decl> <p-decls> | "" Note, Janus as specified in the 2007 paper, allows zero or more variables, but a program that starts with an empty store, produces an empty store. A program that does nothing is trivially invertible, and not interesting in practice. A variable declaration defines either a variable or a one-dimensional array: <v-decl> ::= <v> | <v> "[" <c> "]" Note, variable declarations carry no type information. This is because all values (and all constants) in Janus are non-negative 32-bit integers, so all values are between 0 and 232 − 1 = 4294967295. Note however, that the Janus interpreter hosted by TOPPS uses regular two's complement 32-bit integers, so all values there are between −231 = −2147483648 and 231 − 1 = 2147483647. All variables are initialized to the value 0. There are no theoretical bounds to the sizes of arrays, but the said interpreter demands a size of at least 1. A procedure declaration consists of the keyword procedure, followed by a uniqu
https://en.wikipedia.org/wiki/Microfluidic%20cell%20culture
Microfluidic cell culture integrates knowledge from biology, biochemistry, engineering, and physics to develop devices and techniques for culturing, maintaining, analyzing, and experimenting with cells at the microscale. It merges microfluidics, a set of technologies used for the manipulation of small fluid volumes (μL, nL, pL) within artificially fabricated microsystems, and cell culture, which involves the maintenance and growth of cells in a controlled laboratory environment. Microfluidics has been used for cell biology studies as the dimensions of the microfluidic channels are well suited for the physical scale of cells (in the order of magnitude of 10 micrometers). For example, eukaryotic cells have linear dimensions between 10 and 100 μm which falls within the range of microfluidic dimensions. A key component of microfluidic cell culture is being able to mimic the cell microenvironment which includes soluble factors that regulate cell structure, function, behavior, and growth. Another important component for the devices is the ability to produce stable gradients that are present in vivo as these gradients play a significant role in understanding chemotactic, durotactic, and haptotactic effects on cells. Fabrication Some considerations for microfluidic devices relating to cell culture include: fabrication material (e.g., polydimethylsiloxane (PDMS), polystyrene) culture region geometry control system for delivering and removing media when needed using either passive methods (e.g., gravity-driven flow, capillary pumps, or Laplace pressure based ‘passive pumping’) or a flow-rate controlled device (i.e., perfusion system) Fabrication material is crucial as not all polymers are biocompatible, with some materials such as PDMS causing undesirable adsorption or absorption of small molecules. Additionally, uncured PDMS oligomers can leach into the cell culture media, which can harm the microenvironment. As an alternative to commonly used PDMS, there have been adv
https://en.wikipedia.org/wiki/QFabric
QFabric is a proprietary technology proposed by Juniper Networks. In contrary to open standards such as OpenFlow, QFabric is regarded as a vendor proprietary approach. Its goal is to simplify the traditional tree architecture of L2/L3 switches to a single tier any-to-any connectivity. Competing Technologies Competing technologies to QFabric include IEEE 802.1aq, MC-LAG, VXLAN, FabricPath, Virtual Cluster Switching (VCS), and the IETF TRILL standard. System Components QFabric System Components consists of: QFabric Nodes - fixed-configuration edge platforms that connect to networked data center devices QFabric Interconnect - a high-speed transport device that connects all QFabric Nodes in a full-mesh topology QFabric Director - which provides control and management services for the full QFabric System Performance Improvement For data center architecture, QFabric creates a single logical switch that connects the entire data center rather than tiers of multiple access aggregation and core switches. The reason why this can improve performance is that, instead of going through multiple tiers of switches in a traditional network, packets only get through the infrastructure in a single hop, so this can reduce the delay significantly. For example, a typical switch can handle 200 ports, while QFabric can scale up to 6000 ports with lossless 10Gbps speed. In a QFX3000-M QFabric System, which supports up to 768 10GbE ports, the average end-to-end latency can be as short as 3 microseconds. In QFX3000-G QFabric System, although it supports up to 6,144 10GbE ports, by connecting all nodes in a full-mesh topology, it can achieve an average port-to-port latency of 5 microseconds. Network topology References
https://en.wikipedia.org/wiki/Global%20Navigation%20Grid%20Code
The Global Navigation Grid Code (GNGC) is a Chinese-developed point reference system designed for global navigation. It is similar in design to national grid reference systems used throughout the world. GNGC was based upon the work of the GeoSOT team, headquartered in the Institute of Remote Sensing and GIS, Peking University. The concept for this system was proposed in 2015 in Bin Li's dissertation: Navigation Computing Model of Global Navigation Grid Code. GNGC allows easy calculation of space and spatial indexes and can be extended to the provide navigation mesh coding. Along with the Beidou navigation system, GNGC provides independent intellectual property rights, globally applicable standards and global navigation trellis code. History From 2009-2013 a research team (the Institute of Remote Sensing and GIS School of Earth and Space Science located at Peking University), in conjunction with Wuhan University, Information Engineering University, Chinese University of Science and Technology, National University of Defense Technology, completed the National 973 Project: "Global Spatial Information Subdivision Theory and Application Method". As a result of this effort, the team proposed a global subdivision grid frame: Geographic Coordinate Subdivision Grid With One Dimension Integer Coding on 2n Tree (GeoSOT). This work solved the three scientific problems with regards to spatial data organization: basic frame, location code and presentation model. This work resulted in 28 patent applications. The results of the project were published in a work entitled: Introduction to Spatial Information Subdivision. Design GeoSOT, is a grid system that originates from a center point on earth and climbs to another point at 50,000 km altitude. It subdivides the earth according to 32 levels into millions of grids 1 cm2 in size. The team proposed a complete area location coding system called "1+4 basic code, N serial extended codes". Above these codes, the global subdivision grid
https://en.wikipedia.org/wiki/Continuous%20module
In mathematics, a continuous module is a module M such that every submodule of M is essential in a direct summand and every submodule of M isomorphic to a direct summand is itself a direct summand. The endomorphism ring of a continuous module is a clean ring. References Module theory
https://en.wikipedia.org/wiki/Space%20geodesy
Space geodesy is geodesy by means of sources external to Earth, mainly artificial satellites (in satellite geodesy) but also quasars (in very-long-baseline interferometry, VLBI), visible stars (in stellar triangulation), and the retroreflectors on the Moon (in lunar laser ranging, LLR). See also Astronomical geodesy Geodesy Geodesy
https://en.wikipedia.org/wiki/BirdTrack
BirdTrack is an online citizen science website, operated by the British Trust for Ornithology (BTO) on behalf of a partnership of the BTO, the RSPB, BirdWatch Ireland, the Scottish Ornithologists' Club and the Welsh Ornithological Society (). It is also available though mobile apps. BirdTrack allows birdwatchers to record the names and numbers of birds seen in a specified location anywhere in the world. It acts as a log for those wishing to maintain lists of their own sightings, but also feeds data into various scientific surveys, is used for research and conservation purposes, and generates maps for public consumption. The maps are rendered using OpenStreetMap data. BirdTrack is part of WorldBirds, a global initiative to record bird sightings. In October 2014, data from BirdTrack was used as evidence in the conviction of a gamekeeper for illegally killing ten Common Buzzards and a Eurasian Sparrowhawk. References External links (web interface; login required) British science websites Citizen science Ornithology in the United Kingdom Ornithology in Ireland Ornithological atlases Online databases
https://en.wikipedia.org/wiki/Immunome
The immunome is the set of genes and proteins that constitute the immune system, excluding those that are widespread in other cell types, and not involved in the immune response itself. It is further defined as the set of peptides derived from the proteome that interact with the immune system. There are numerous ongoing efforts to characterize and sequence the immunomes of humans, mice, and elements of non-human primates. Typically, immunomes are studied using immunofluorescence microscopy to determine the presence and activity of immune-related enzymes and pathways. Practical applications for studying the immunome include vaccines, therapeutic proteins, and further treatment of other diseases. The study of the immunome falls under the field of immunomics. Etymology The word immunome is a portmanteau of the words "immune" and "chromosome." See omics for a further discussion. Efforts to characterize The exact size of the human immunome is currently unknown and has been a topic of study for decades. However, the amount of information it encodes is said to exceed the size of the human genome by several orders of magnitude due to, at least in part, somatic hypermutation and junctional diversity. There are several ongoing efforts to characterize the immunomes of humans and other species. One major effort, launched in 2016, is a collaborative project between The Human Vaccines Project, Vanderbilt University Medical Center, and Illumina, Inc. This project is entitled the Human Immunome Program and its goal is to decipher the complete collection of B and T immune cell receptors from the human population. Thousands of individuals will need to be studied in order to meet this goal, and they will need to represent different ages, genders, ethnicities, and geographical origins. Furthermore, people with diseases and people who have undergone vaccination will need to be studied as well. The results of the program will be shared as an open-sourced database. The sequencing proj
https://en.wikipedia.org/wiki/Matthew%20Yee-King
Matthew Yee-King is a British electronic musician, percussionist and researcher based in London, performing music as Yee-King. He is known for bringing an education in science and genetics into music, including his celebrated 2001 Drill 'n' bass release SuperUser released by Rephlex Records, his work with Finn Peters in making music from brainwaves, and his doctoral work on applying Artificial intelligence techniques to automatic synthesizer programming. "Goodnight Toby", a track from SuperUser, was listed in the top 100 greatest IDM tracks by FACT magazine. , he is a lecturer in the department of computing at Goldsmiths, University of London. References Living people Braindance musicians British electronic musicians Place of birth missing (living people) Year of birth missing (living people) British techno musicians Intelligent dance musicians Live coding Algorave
https://en.wikipedia.org/wiki/Fuhito%20Kojima
is a Japanese economist and a professor at the University of Tokyo. Career He received a B.A. from University of Tokyo in 2003 and a Ph.D. from Harvard University in 2008. Fellowships and awards 2008–2011, Fellow, VCASI. 2013–2015, Sloan Research Fellow. 2014–present, SIEPR Fellow. 2015–present, Economic Theory Fellow. 2016, Social Choice and Welfare Prize. 2021, Nakahara Prize Published works Papers References External links Fuhito Kojima - Sites - Google Faculty profile at Stanford University 1979 births Living people Japanese economists 21st-century American economists University of Tokyo alumni Harvard University alumni Columbia University faculty Stanford University Department of Economics faculty Game theorists Japanese expatriates in the United States Fellows of the Econometric Society
https://en.wikipedia.org/wiki/List%20of%20VoIP%20companies
This is a list of notable companies providing Voice over Internet Protocol (VoIP) services. References VoIP
https://en.wikipedia.org/wiki/Mathematical%20fiction
Mathematical fiction is a genre of creative fictional work in which mathematics and mathematicians play important roles. The form and the medium of the works are not important. The genre may include poems, short stories, novels or plays; comic books; films, videos, or audios. One of the earliest, and much studied, work of this genre is Flatland: A Romance of Many Dimensions, an 1884 satirical novella by the English schoolmaster Edwin Abbott Abbott. Mathematical fiction may have existed since ancient times, but it was recently rediscovered as a genre of literature; since then there has been a growing body of literature in this genre, and the genre has attracted a growing body of readers. For example, Abbot's Flatland spawned a sequel in the 21st century: a novel titled Flatterland, authored by Ian Stewart and published in 2001. A database of mathematical fiction Alex Kasman, a Professor of Mathematics at College of Charleston, who maintains a database of works that could possibly be included in this genre, has a broader definition for the genre: Any work "containing mathematics or mathematicians" has been treated as mathematical fiction. Accordingly, Gulliver's Travels by Jonathan Swift, War and Peace by Lev Tolstoy, Mrs. Warren's Profession by George Bernard Shaw, and several similar literary works appear in Kasman's database because these works contain references to mathematics or mathematicians, even though mathematics and mathematicians are not important in their plots. According to this broader approach, the oldest extant work of mathematical fiction is The Birds, a comedy by the Ancient Greek playwright Aristophanes performed in 414 BCE. Kasman's database has a list of more than one thousand items of diverse categories like literature, comic books and films. Some works of mathematical fiction The top ten results turned up by a search of the website of Mathematical Association of America using the keywords "mathematical fiction" contained references to the fol
https://en.wikipedia.org/wiki/Glossary%20of%20artificial%20intelligence
This glossary of artificial intelligence is a list of definitions of terms and concepts relevant to the study of artificial intelligence, its sub-disciplines, and related fields. Related glossaries include Glossary of computer science, Glossary of robotics, and Glossary of machine vision. A B C D E F G H I J K L M N O P Q R S T U V W See also Artificial intelligence References Works cited Notes Artificial intelligence Machine learning Artificial intelligence Wikipedia glossaries using description lists
https://en.wikipedia.org/wiki/EUREL
EUREL, the Convention of National Associations of Electrical Engineers of Europe, is a nonprofit organization headquartered in Brussels, Belgium, composed of 12 national members associations in 11 countries in greater Europe. EUREL was founded in Switzerland in 1972 as the Convention of National Societies of Electrical Engineers of Western Europe before it started its expansion to central Europe. Its objectives are to facilitate the exchange of information and to foster a wider dissemination of scientific, technical and related knowledge relevant to electrical engineering as well as standardization in the field of electrical engineering. In this way EUREL contributes to the advancement of scientific and technical knowledge for the benefit of the profession and the public it serves. EUREL also addresses the issues resulting from the current shortage of information and communications technology engineers (which is expected to reach an alarming level within the next years) by engaging with students and young professionals. The secretary general's office, in Brussels, helps EUREL members position their expertise and connection to the European institutions. It also creates a bridge in between its members' associations who can exchange information about best practices and be inspired by their peers. Governance (2022-2023) General secretariat: Fabienne Dezutter History and founding members The founding meeting of EUREL as the Convention of National Societies of Electrical Engineers in Europe took place on 24 November 1972 in Zurich. The representatives of 18 national electrotechnical societies from 15 countries of Western Europe met in the historic Zunfthaus zur Zimmerleuten. Fifteen of these societies joined to the convention during the meeting (see below). The aim with EUREL was to create an organisation that brings people together. Until then, more bilateral contacts should result to pan-European cooperation. Foundation Members: Young Engineers Panel The Youn
https://en.wikipedia.org/wiki/Advanced%20electronic%20signature
An advanced electronic signature (AES or AdES) is an electronic signature that has met the requirements set forth under EU Regulation No 910/2014 (eIDAS-regulation) on electronic identification and trust services for electronic transactions in the European Single Market. Description eIDAS created standards for the use of electronic signatures so that they could be used in a secure manner when conducting business online, such as an electronic fund transfer or official business across borders with EU Member States. The advanced electronic signature is one of the standards outlined in eIDAS. For an electronic signature to be considered as advanced, it must meet several requirements: The signatory can be uniquely identified and linked to the signature The signatory must have sole control of the signature creation data (typically a private key) that was used to create the electronic signature The signature must be capable of identifying if its accompanying data has been tampered with after the message was signed In the event that the accompanying data has been changed, the signature must be invalidated Advanced electronic signatures that are compliant with eIDAS may be technically implemented through the Ades Baseline Profiles that have been developed by the European Telecommunications Standards Institute (ETSI): XAdES, XML Advanced Electronic Signatures is a set of extensions to XML-DSig recommendation making it suitable for Advanced Electronic Signatures. PAdES, PDF Advanced Electronic Signatures is a set of restrictions and extensions to PDF and ISO 32000-1 making it suitable for Advanced Electronic Signature. CAdES, CMS Advanced Electronic Signatures is a set of extensions to Cryptographic Message Syntax (CMS) signed data making it suitable for advanced electronic signatures. ASiC Baseline Profile. ASiC (Associated Signature Containers) specifies the use of container structures to bind together one or more signed objects with either advanced electronic
https://en.wikipedia.org/wiki/EURIELEC
EURIELEC (European Association of Electrical Engineering Students) was a nonprofit pre-professional apolitical association for electrical engineering students that operated in Europe from 1964 to 1972. It incorporated member organizations from 13 European countries. Initially, EURIELEC’s official language of communication was French, but it was unofficially changed to English in 1968. EURIELEC is largely considered the predecessor of EESTEC, which was formed in the mid 80’s, about a decade later, in particular since the new organization was established with similar objectives in mind, and was joined by students from many of the electrical engineering programs that made up EURIELEC. History Early discussions Conversations about the need for an organization to promote professional and cultural exchange among electrical engineering students in Europe started between French and West German students in 1958. However, practical discussions kicked off only 5 years later, in 1963, when students from several European countries were invited to Paris and then to Munich for that purpose. The attendees decided to form an association to hold international student meetings and assist in obtaining internships. Despite the intentions, the founding of EURIELEC was deferred until late 1964, since the attendees felt that without registering a formal non-profit organization it would be difficult to raise funds and obtain the support of the industry. Founding of EURIELEC EURIELEC was founded in Berlin, on December 14, 1964, during a meeting attended by delegates from 18 different electrical engineering programs representing France, Germany, Italy, The Netherlands, Norway, Switzerland and Yugoslavia. During the meeting, Herman Van de Vijver from ETV Delft was elected as EURIELEC's first chairman, and the delegates from Delft took upon themselves to organize the congress of 1965. Annual congress The annual congresses included discussion and decision making regarding the organizati
https://en.wikipedia.org/wiki/Effective%20fragment%20potential%20method
The effective fragment potential (EFP) method is a computational approach designed to describe intermolecular interactions and environmental effects. It is a computationally inexpensive means to describe interactions in non-bonded systems. It was originally formulated to describe the solvent effects in complex chemical systems. But it has undergone vast improvements in the past two decades, and is currently used to represent intermolecular interactions (represented as rigid fragments), and in molecular dynamics (MD) simulations as well. References Models of computation Intermolecular forces
https://en.wikipedia.org/wiki/Homeboyz%20Interactive
Homeboyz Interactive (HBI) was a faith-based recruitment, training and job placement non-profit business in Milwaukee, Wisconsin, United States, founded by a Jesuit brother in 1996 to transform gang members into productive workers. History James Holub, a former Jesuit brother affiliated with Wheeling Jesuit University, asked gang members in South Milwaukee how they could be helped, to break the cycle of poverty and violence. The youth suggested that they be trained for work they found exciting. It must lead to jobs that paid at least the minimum wage, and computer skills seemed the most attractive. The non-profit Homeboyz Interactive was established to prepare professionals in web design, application development, and PC/network support. This non-profit outfit spawned the for-profit web design firm HBI Consulting, which provided trainees with work experience. It turned out more than 20 teachers yearly for computer and computer network programs for high schools and other clients as well as for computer service providers. Some graduates of the program continued their education, some founded their own business, and others continued working at HBI. The Economist described this effort as "turning thugs into programmers" on Milwaukee's South Side, which has proportionally twice as many murders as New York. Holub had "buried his 28th gang member" before he implemented the Homeboyz plan, with the understanding that "nothing stops a bullet like a job." The programs would pass through about 80 prospects a year who successfully completed training and provide them with a job while studying for their high school equivalency test, before they were asked to decide in which direction to go. Most accepted a job or went on to community college but about 25 entered the Homeboyz training for computer programmers. Of first 150 graduates of this program none lost their job; their average pay after two years was . Some preferred to return to full-time work at HBI. By 2002, a total
https://en.wikipedia.org/wiki/Vera%20Security
Vera is an enterprise data security and information rights management platform that provides encryption and tracks and controls digital information shared across users, devices, applications, and platforms. Vera gives developers access to its IRM-as-a-service (IRMaaS) platform via a REST API and downloadable software development kit. History Vera launched its product in April 2015. Within the first year of operations, Vera announced partnerships with Dropbox, Okta, and Centrify, as well as strategic integrations with Box, VMware, and Microsoft Office. Vera focuses its sales and marketing efforts on large enterprises in industries such as financial services, media & entertainment, manufacturing, and technology sectors. Awards Vera was nominated as a top 10 finalist for the Innovation Sandbox competition at RSA Conference 2016, and CRN Magazine named Vera one of the "10 Coolest Security Startups of 2015". Funding Vera is a privately funded company with $31 million in venture financing. The company announced a $14 million Series A round in November 2014, which included the hiring of Robin Daniels as CMO. In February 2016, Vera announced a $17 million Series B round, led by Sutter Hill Ventures, with participation from existing investors, Battery Ventures, Amplify Partners, and other private investors. In May 2016, Capital One Growth Ventures joined the company's Series B round of financing and founding CEO of Veritas Software, Mark Leslie, joined Vera's board of directors. Roger Lee (Battery Ventures) and Stefan Dyckerhoff (Sutter Hill Ventures) also serve on the company's board. Product architecture In March 2016, Vera announced its SDK, which allows developers to add encryption, tracking, policy enforcement, and access control to custom and legacy business applications. References Data security
https://en.wikipedia.org/wiki/Sahapedia
Sahapedia is a website which seeks to make the culture and history of India accessible to all. Sahapedia is a portmanteau of the word Saha and encyclopedia. Saha is Sanskrit for "together with". It uses a method of collaboration between scholars and lay people contributing content to the portal. Once lay people register they are able to contribute to the portal once approved by editors. The site seeks to take the middle path between scholarly contribution and the open contribution system seen on Wikipedia. It serves as a portal with content in the form of articles, videos, image galleries, interviews and events listing. History Sahapedia was founded in New Delhi in 2010. It was registered as a not-for-profit Society in June 2011 under the Societies Act of 1860 and has offices in New Delhi and Kochi. S. Ramadorai, who was the Former Vice Chairman, Tata Consultancy Services, and Chairman, National Skills Development Agency is the President and mentor of Sahapedia. Sudha Gopalakrishnan, who was the Founder Director of the National Mission for Manuscripts, Government of India and an UNESCO-empanelled expert on intangible cultural heritage is the Vice President and Executive Director of Sahapedia. Sahapedia's technology platform, which was launched on 23 April 2016. Work The core of Sahapedia is the encyclopedia that addresses ten domains: the areas covered come under the categories of Knowledge Traditions, Visual and Material Arts, Performing Arts, Literature and Languages, Practices and Rituals, Histories, Institutions, People, and Natural Environment. The research and editorial team identify subjects for the encyclopedia, visit libraries and consult experts to arrive at an outline for its treatment, write to scholars for articles or request them for interviews, go on field visits for documentation and compile links to online resources and suggestions for further reading. Sahapedia also works with affiliates who are experts in their field and can curate modules that
https://en.wikipedia.org/wiki/Thermopile%20laser%20sensor
Thermopile laser sensors (Fig 1) are used for measuring laser power from a few µW to several W (see section 2.4). The incoming radiation of the laser is converted into heat energy at the surface. This heat input produces a temperature gradient across the sensor. Making use of the thermoelectric effect a voltage is generated by this temperature gradient. Since the voltage is directly proportional to the incoming radiation, it can be directly related to the irradiation power (see section 2.1). Unlike photodiodes, thermopile sensors can be used for a broad spectrum of wavelengths ranging from UV to MIR (depending on the characteristics of the absorption coating at different wavelengths). Further, photodiodes are reverse biased and saturate for optical powers above a certain value (typically in mW), making thermopile sensors suitable for high power measurements. Pyroelectric sensor and calorimeter are commonly used for measuring the energy of laser pulses. Pyroelectric sensor can measure low to medium energies (mJ to J) and are prone to microphonic effects. Calorimeters are capable of measuring high energies (mJ to kJ) but have large response times. Working principle and structure As shown in Fig 2, a thermopile laser sensor consists of several thermocouples connected in series with one junction type (hot junction at temperature T1) being exposed to an absorption area and the other junction type (cold junction at temperature T2) being exposed to a heat sink. When a laser beam hits the surface of a thermopile sensor, the incident radiation is absorbed within the coating layer and transformed into heat. This heat then induces a temperature gradient across the sensor given as [K/m], where t is the thickness of the sensor. Due to the thermoelectric effect, the temperature difference causes an electrical voltage to build up within each thermocouple. This output voltage is directly proportional to the power of the incoming radiation. Since a large number of thermopi
https://en.wikipedia.org/wiki/Michihiro%20Kandori
is a Japanese economist. He is a professor at the University of Tokyo. Kandori is the President of the Game Theory Society, replacing Matthew O. Jackson in 2023. Career He received a B.A. from University of Tokyo in 1982 and a Ph.D. from Stanford University in 1989. His seminal papers about social norms (1992) and evolutionary game theory (1993) together have received 5,000 citations to date, according to Google Scholar. Kandori serves as the Vice Director of the University of Tokyo Market Design Center. Recognition 1999: Fellow, Econometric Society 2002: Japanese Economic Association-Nakahara Prize 2017: R. K. Cho Economics Prize 2017: Fellow, Game Theory Society Selected publications References External links Personal web page Faculty profile at University of Tokyo People - The University of Tokyo Market Design Center 1959 births Living people People from Sapporo 20th-century Japanese economists 21st-century Japanese economists Game theorists University of Tokyo alumni Stanford University alumni Fellows of the Econometric Society Academic staff of the University of Tokyo University of Pennsylvania faculty Princeton University faculty Presidents of the Japanese Economic Association
https://en.wikipedia.org/wiki/Timetree
A timetree is a phylogenetic tree scaled to time. It shows the evolutionary relationships of a group of organisms in a temporal framework. Therefore, if living organisms are represented, the branch length between the base of the tree and all leafs (e.g., species) is identical because the same time has elapsed, although extinct organisms can be shown in a timetree. As with a phylogenetic tree, timetrees can be drawn in different shapes: rectangular, circular, or even spiral. The only figure in Darwin's On the Origin of Species, one of the earliest printed evolutionary trees, is a hypothetical timetree. Because the fossil record has always been tightly linked to the geologic record, evolutionary trees of extinct organisms are typically illustrated as timetrees. History In the past, timetrees were sometimes called "chronograms," but that term has been criticized because it is imprecise, referring to any graph that shows time, and not indicating that evolutionary relationships are involved. The first use of the single word "timetree," in the context of an evolutionary tree scaled to time, was in 2001. References Evolutionary biology Phylogenetics Diagrams
https://en.wikipedia.org/wiki/GraphQL
GraphQL is an open-source data query and manipulation language for APIs and a query runtime engine. GraphQL enables declarative data fetching where a client can specify exactly what data it needs from an API. Instead of multiple endpoints that return separate data, a GraphQL server exposes a single endpoint and responds with precisely the data a client asked for. Because a GraphQL server can fetch from separate data sources and present the data in a unified graph, it isn't tied to any specific database or storage engine. History Facebook started GraphQL development in 2012 and released it as open source in 2015. In 2018, GraphQL was moved to the newly established GraphQL Foundation, hosted by the non-profit Linux Foundation. On 9 February 2018, the GraphQL Schema Definition Language (SDL) became part of the specification. Many popular public APIs adopted GraphQL as the default way to access them. These include public APIs of Facebook, Github, Yelp, Shopify and Google Directions API. Design GraphQL supports reading, writing (mutating), and subscribing to changes to data (realtime updates – commonly implemented using WebSockets). A GraphQL service is created by defining types with fields, then providing functions to resolve the data for each field. The types and fields make up what is known as the schema definition. The functions that retrieve and map the data are called resolvers. After being validated against the schema, a GraphQL query is executed by the server. The server returns a result that mirrors the shape of the original query, typically as JSON. Type system The root type of a GraphQL schema, by default, contains all of the fields that can be queried. Other types define the objects and fields that the GraphQL server can return. There are several base types, called scalars, to represent things like strings, numbers, and IDs. Fields are defined as nullable by default, and a trailing exclamation mark can be used to make a field non-nullable (req
https://en.wikipedia.org/wiki/Club%20Nokia
Club Nokia was a mobile internet digital distribution portal, similar to an App Store, operated by Nokia to provide special offers, paid-for ringtones, picture messages and game content directly to members. Following resistance from its mobile operator customers, Nokia partially closed the service and the brand became solely a consumer service and loyalty portal. History Club Nokia was originally launched in 1997 to provide detailed product information and support about Nokia products. In 1999 Club Nokia was developed into an integral multi-channel personalised service accessible by WAP, SMS or the World Wide Web, spawning a new industry for the provision of mobile content. Consumers could join Club Nokia after buying a new Nokia device. To download content, users were required to purchase credits obtained from authorised Nokia dealerships. Content included additional game levels for e.g. Space Impact. The picture messaging service was launched in Finland in December 1999. In 2000, Amazon partnered with Nokia to enable purchasing of books from Amazon's catalogue via Club Nokia with WAP enabled mobile phones. In August 2000, Nokia signed a deal with music publisher EMI to provide EMI-owned songs as ringtones, available from the Club Nokia website or by sending an SMS message. By November 2001, over 10 million consumers were subscribed to Club Nokia, and the enterprise was forecast to yield €1 billion in revenue by 2004. However, the EMI deal proved controversial as it placed Nokia in direct competition with the mobile operators' own branded portals, who relied on the booming ringtones market for revenue and were wary of Nokia gaining a mobile content monopoly through Club Nokia as Microsoft had done in computing software. Nokia argued customers used the carriers' mobile data to download content, but network operators remained resistant. As a result, Nokia announced in September 2004 that the service for selling ringtones would close down, never having become the c
https://en.wikipedia.org/wiki/Optomyography
Optomyography (OMG) was proposed in 2015 as a technique that could be used to monitor muscular activity. It is possible to use OMG for the same applications where Electromyography (EMG) and Mechanomyography (MMG) are used. However, OMG offers superior signal-to-noise ratio and improved robustness against the disturbing factors and limitations of EMG and MMG. The basic principle of OMG is to use active near-infra-red optical sensors to measure the variations in the measured signals that are reflected from the surface of the skin while activating the muscles below and around the skin spot where the photoelectric sensor is focusing to measure the signals reflected from this spot. Applications A glasses based optomyography device was patented for measuring facial expressions and emotional responses particularly for mental health monitoring . Generating proper control signals is the most important task to be able to control any kind of a prosthesis, computer game or any other system which contains a human-computer interaction unit or module. For this purpose, surface-Electromyographic (s-EMG) and Mechanomyographic (MMG) signals are measured during muscular activities and used, not only for monitoring and assessing these activities, but also to help in providing efficient rehabilitation treatment for patients with disabilities as well as in constructing and controlling sophisticated prostheses for various types of amputees and disabilities. However, while the existing s-EMG and MMG based systems have compelling benefits, many engineering challenges still remain unsolved, especially with regard to the sensory control system. References Biomedical engineering Biological engineering Signal processing
https://en.wikipedia.org/wiki/Short%20Weather%20Cipher
The Short Weather Cipher (, abbreviated WKS), also known as the weather short signal book, was a cipher, presented as a codebook, that was used by the radio telegraphists aboard U-boats of the German Navy (Kriegsmarine) during World War II. It was used to condense weather reports into a short 7-letter message, which was enciphered by using the naval Enigma and transmitted by radiomen to intercept stations on shore, where it was deciphered by Enigma and the 7-letter weather report was reconstructed. History During World War II, during various times, different versions of the cipher were in operation. The first issue carried the codename Weimar. It was replaced by the edition Eisenach on 20 January 1942. On 10 March 1943, the third edition of the weather key, bearing the codename Naumburg, entered into force. On May 9, 1941, during Operation Primrose, the operation to occupy Åndalsnes and create a diversion south of Trondheim in Norway as part of the Norwegian Campaign, an intact Naval Enigma (M3) cipher machine, a copy of the "Weimar" version of the short weather cipher and a copy of the short signal book ( or Kurzsignale for short) was recovered from the submarine U-110, that was captured in the North Atlantic east of Cape Farewell, Greenland. This enabled the cryptanalysts in Bletchley Park to break the encryption of the M3 and to decipher the German submarine radio messages. The Short Weather Cipher was critical in the cryptanalysis of the Naval Enigma M4 and yielded excellent cribs. On 30 October 1942, a copy of the Wetterkurzschlüssel, the short weather cipher, and of the short signal book, the Kurzsignale, were recovered as part of a daring raid on the U-boat U-559, when three Royal Navy sailors, Lieutenant Anthony Fasson, Able Seaman Colin Grazier and NAAFI canteen assistant Tommy Brown, then boarded the abandoned submarine, and recovered the documents after a 90-minute search. They reached the Government Code and Cypher at Bletchley Park after a three-wee
https://en.wikipedia.org/wiki/Muisca%20numerals
Muisca numerals were the numeric notation system used by the Muisca, one of the civilizations of the Americas before the Spanish conquest of the Muisca. Just like the Mayas, the Muisca had a vigesimal numerical system, based on multiples of twenty (Chibcha: gueta). The Muisca numerals were based on counting with fingers and toes. They had specific numbers from one to ten, yet for the numbers between eleven and nineteen they used "foot one" (11) to "foot nine" (19). The number 20 was the 'perfect' number for the Muisca which is visible in their calendar. To calculate higher numbers than 20 they used multiples of their 'perfect' number; gue-muyhica would be "20 times 4", so 80. To describe "50" they used "20 times 2 plus 10"; gue-bosa asaqui ubchihica, transcribed from guêboʒhas aſaqɣ hubchìhicâ. In their calendar, which was lunisolar, they only counted from one to ten and twenty. Each number had a special meaning, related to their deities and certain animals, especially the abundant toads. For the representation of their numbers they used digits inspired by their natural surroundings, especially toads; ata ("one") and aca ("nine") were both derived from the animals so abundant on the Bogotá savanna and other parts of the Altiplano Cundiboyacense where the Muisca lived in their confederation. The most important scholars who provided knowledge about the Muisca numerals were Bernardo de Lugo (1619), Pedro Simón (17th century), Alexander von Humboldt and José Domingo Duquesne (late 18th and 19th century) and Liborio Zerda. Numerals The Muisca used a vigesimal counting system and counted primarily with their fingers and secondarily with their toes. Their system went from 1 to 10 and for higher numerations they used the prefix quihicha or qhicha, which means "foot" in their Chibcha language Muysccubun. Eleven became thus "foot one", twelve: "foot two", etc. As in the other pre-Columbian civilizations, the number 20 was special. It was the total number of all body extre
https://en.wikipedia.org/wiki/Network%20Investigative%20Technique
Network Investigative Technique, or NIT, is a form of malware (or hacking) employed by the FBI since at least 2002. It is a drive-by download computer program designed to provide access to a computer. Controversies Its usage has raised both Fourth Amendment concerns and jurisdictional issues. The FBI has to date, despite a court order, declined to provide the complete code in a child sex abuse case involving the Tor anonymity network. On May 12, 2016 Mozilla filed an amicus curiae brief inasmuch as the FBI's exploit against the Mozilla Firefox web browsers potentially puts millions of users at risk. It asked that the exploit be told to them before it is told to the defendant, thus raising Fifth Amendment issues as well. Also, US District Judge Robert J. Bryan in Tacoma, Washington has ruled that while the defendant in United States v. Michaud has the right to review the code, the government also has the right to keep it secret (two other federal judges in related cases have ruled to suppress evidence found as a result of the NIT); On May 25, 2016, however, he ruled that "For the reasons stated orally on the record, evidence of the NIT., the search warrant issued based on the NIT., and the fruits of that warrant should be excluded and should not be offered in evidence at trial..." In March 2017 the American Civil Liberties Union, Electronic Frontier Foundation, and the National Association of Criminal Defense Lawyers released a 188-page guide to enable meaningful 4th Amendment analysis. In April a Minnesota judge ruled that the warrant was invalid from the moment it was signed, given that the FBI agent knew that it exceed the jurisdictional requirements of Rule 41. All evidence gathered after that warrant was served was hence the fruit of the poison tree. See also Computer and Internet Protocol Address Verifier Operation Pacifier Operation Torpedo References External links Playpen affidavit Ferrell warrant describing some aspects of NIT Mozilla amicus curia
https://en.wikipedia.org/wiki/Anaerobic%20membrane%20bioreactor
Anaerobic membrane bioreactor or AnMBR is the name of a technology utilized in wastewater treatment. It is a new technology in membrane filtration for biomass retention. AnMBR works by using a membrane bioreactor (MBR). The sewage is filtered and separated leaving the effluent and sludge apart. This sludge is treated anaerobically by mesophilic bacteria which release methane as a byproduct. The biogas can later be combusted to generate heat or electricity. AnMBR is considered to be a sustainable alternative for sewage treatment because the energy that can be generated by methane combustion can exceed the energy required for maintaining the process. References Water treatment Environmental engineering Sanitation Sewerage Bioreactors Membrane technology
https://en.wikipedia.org/wiki/Central%20Power%20Engineering%20Service
Formally constituted in , Central Power Engineering Service (CPES) is a Group-A & Group- B Central Engineering Services under the administrative control of Ministry of Power (MoP) in India. CPES is the only organized Service under Ministry of Power. It deals with Indian Power sector which is one of the most complex and diverse in the world owing to vast geography, terrains, climatic condition, natural resources available in India. Recruitment CPES officers are recruited for the Group-A & Group-B posts on the basis of Engineering Services Examination (ESE) conducted annually by Union Public Service Commission (UPSC). Total Sanctioned Cadres strength of the cadre is 541; with Group A strength of 432 and Gr B with 109. Training CPES Officers are provided training at Induction level at National Power Training Institute (NPTI) Faridabad for a period of minimum 34 weeks covering various modules on the subjects/ areas like Regulations, Thermal Power, Hydro Power, Transmission, Load dispatch, Renewable, Secretariat training on office procedures and Management training etc. On Job Training is also conducted at Thermal Power Stations, Hydro Power Stations, Sub Stations, Transmission lines, Load Dispatch Centres, Solar Power Parks, Wind Power Stations at various locations in the country. NPTI has been designated as Cadre Training Institute for CPES. Allocation of Wing/Division/Circle/other units to officers A candidate recommended by UPSC reports to Central Electricity Authority after his/her allocation to Central Power Engineering Service, to join at the post of Assistant Director/ Assistant Executive Engineer. CEA is an attached office of Ministry of Power and statutory body under the Electricity Act 2003. CEA formulates technical standards of Indian power sector. Ministry invariably seeks advice of CEA almost in all techno-economic matters. Further, some of the officers at various levels are posted at Ministry of Power (main), four Regional Power Survey Offices (RPSOs),
https://en.wikipedia.org/wiki/Central%20Electrical%20and%20Mechanical%20Engineering%20Service
The Central Electrical and Mechanical Engineering Service is a Central Civil Services Group-A Gazetted technical post of the Government of India. It comes under the Central Public Works Department, of the Ministry of Urban Development. References Indian Engineering Services
https://en.wikipedia.org/wiki/The%20DAO
The DAO was a digital decentralized autonomous organization and a form of investor-directed venture capital fund. After launching in April 2016 via a token sale, it became one of the largest crowdfunding campaigns in history, but it ceased activity after much of its funds were taken in a hack in June 2016. The DAO had an objective to provide a new decentralized business model for organizing both commercial and non-profit enterprises. It was instantiated on the Ethereum blockchain and had no conventional management structure or board of directors. The code of the DAO is open-source. In June 2016, users exploited a vulnerability in The DAO code to enable them to siphon off one-third of The DAO's funds to a subsidiary account. The Ethereum community controversially decided to hard-fork the Ethereum blockchain to restore approximately all funds to the original contract. This split the Ethereum blockchain into two branches, each with its own cryptocurrency, where the original unforked blockchain continued as Ethereum Classic. By September 2016, the value token of The DAO, known by the moniker DAO, was delisted from major cryptocurrency exchanges (such as Poloniex and Kraken). The DAO and had in effect become defunct. History The open source computer code behind the organization was written principally by Christoph Jentzsch, and released publicly on GitHub, where other contributors added to and modified the code. Simon Jentzsch, Christoph Jentzsch's brother, was also involved in the venture. The DAO was launched on 30 April 2016 with a website and a 28-day crowdsale to fund the organization. The token sale had raised more than by 10 May 2016, and more than -worth of Ether (ETH)—the digital value token of the Ethereum network—by 12 May, and over by 15 May 2016. On 17 May 2016, the largest investor in the DAO held less than 4% of all DAO tokens and the top 100 holders held just over 46% of all DAO tokens. The fund's Ether value was more than , from more than 11,0
https://en.wikipedia.org/wiki/Decentralized%20application
A decentralised application (DApp, dApp, Dapp, or dapp) is an application that can operate autonomously, typically through the use of smart contracts, that run on a decentralized computing, blockchain or other distributed ledger system. Like traditional applications, DApps provide some function or utility to its users. However, unlike traditional applications, DApps operate without human intervention and are not owned by any one entity, rather DApps distribute tokens that represent ownership. These tokens are distributed according to a programmed algorithm to the users of the system, diluting ownership and control of the DApp. Without any one entity controlling the system, the application is therefore decentralised. Decentralised applications have been popularised by distributed ledger technologies (DLT), such as the Ethereum or Cardano blockchain, on which DApps are built, amongst other public blockchains. DApps are divided into numerous categories: exchanges, businesses, gambling, games, finance, development, storage, wallet, governance, property, identity, media, social, security, energy, insurance, health, etc. Definition There are a series of criteria that must be met in order for an application to be considered a DApp. Traditional definitions of a decentralised application require a DApp to be open-source. That is, the application operates autonomously without a centralised entity in control of the majority of the application’s associated tokens. DApps also have a public, decentralised blockchain that is used by the application to keep a cryptographic record of data, including historical transactions. Although traditional DApps are typically open-source, DApps that are fully closed-source and partially closed-source have emerged as the cryptocurrency industry evolves. As of 2019, only 15.7% of DApps are fully open-source while 25% of DApps are closed source. In other words, the proportion of DApps with publicly available code is less than the proportion
https://en.wikipedia.org/wiki/Residence%20time
The residence time of a fluid parcel is the total time that the parcel has spent inside a control volume (e.g.: a chemical reactor, a lake, a human body). The residence time of a set of parcels is quantified in terms of the frequency distribution of the residence time in the set, which is known as residence time distribution (RTD), or in terms of its average, known as mean residence time. Residence time plays an important role in chemistry and especially in environmental science and pharmacology. Under the name lead time or waiting time it plays a central role respectively in supply chain management and queueing theory, where the material that flows is usually discrete instead of continuous. History The concept of residence time originated in models of chemical reactors. The first such model was an axial dispersion model by Irving Langmuir in 1908. This received little attention for 45 years; other models were developed such as the plug flow reactor model and the continuous stirred-tank reactor, and the concept of a washout function (representing the response to a sudden change in the input) was introduced. Then, in 1953, Peter Danckwerts resurrected the axial dispersion model and formulated the modern concept of residence time. Distributions The time that a particle of fluid has been in a control volume (e.g. a reservoir) is known as its age. In general, each particle has a different age. The frequency of occurrence of the age in the set of all the particles that are located inside the control volume at time is quantified by means of the (internal) age distribution . At the moment a particle leaves the control volume, its age is the total time that the particle has spent inside the control volume, which is known as its residence time. The frequency of occurrence of the age in the set of all the particles that are leaving the control volume at time is quantified by means of the residence time distribution, also known as exit age distribution . Both distr
https://en.wikipedia.org/wiki/Tide-Predicting%20Machine%20No.%202
Tide-Predicting Machine No. 2, also known as Old Brass Brains, was a special-purpose mechanical computer that uses gears, pulleys, chains, and other mechanical components to compute the height and time of high and low tides for specific locations. The machine can perform tide calculations much faster than a person could do with pencil and paper. The U.S. Coast and Geodetic Survey put the machine into operation in 1910. It was used until 1965, when it was replaced by an electronic computer. Early U.S. tide-prediction efforts Tides are the rise and fall of sea levels caused by the combined effects of gravitational forces exerted by the Moon, Sun, and rotation of the Earth. In 1867 the United States Coast Survey started printing annual tide tables to support safe and effective maritime, coastal, and defense activities. Before long, these tables showed the times and heights of high and low tides to the nearest minute and tenth of a foot, respectively. Tables were printed for a year at a time and distributed prior to the start of the year. The prediction of tides is very challenging as it depends on multiple factors–including the alignment of the Sun and Moon, the shape of the coastline, and near-shore bathymetry. Tide theories attempt to account for these factors but lead to complex calculations. Originally, calculations were performed by hand, which was very labor-intensive and error-prone. The burden became even larger when the United States Coast and Geodetic Survey (USCGS, the successor to the Coast Survey) started using the more accurate harmonic method for predictions of tides in 1884. To significantly reduce the work required to predict tides, in 1881 William Ferrel of the USCGS designed a tide-predicting machine. Fauth & Co. Instrument Makers built Tide-Predicting Machine No. 1 and delivered it in 1882. The Survey started using the machine routinely in 1883. History and mechanism In 1895 the USCGS grew concerned because Tide-Predicting Machine No. 1 had de
https://en.wikipedia.org/wiki/Cone%20%28algebraic%20geometry%29
In algebraic geometry, a cone is a generalization of a vector bundle. Specifically, given a scheme X, the relative Spec of a quasi-coherent graded OX-algebra R is called the cone or affine cone of R. Similarly, the relative Proj is called the projective cone of C or R. Note: The cone comes with the -action due to the grading of R; this action is a part of the data of a cone (whence the terminology). Examples If X = Spec k is a point and R is a homogeneous coordinate ring, then the affine cone of R is the (usual) affine cone over the projective variety corresponding to R. If for some ideal sheaf I, then is the normal cone to the closed scheme determined by I. If for some line bundle L, then is the total space of the dual of L. More generally, given a vector bundle (finite-rank locally free sheaf) E on X, if R=Sym(E*) is the symmetric algebra generated by the dual of E, then the cone is the total space of E, often written just as E, and the projective cone is the projective bundle of E, which is written as . Let be a coherent sheaf on a Deligne–Mumford stack X. Then let For any , since global Spec is a right adjoint to the direct image functor, we have: ; in particular, is a commutative group scheme over X. Let R be a graded -algebra such that and is coherent and locally generates R as -algebra. Then there is a closed immersion given by . Because of this, is called the abelian hull of the cone For example, if for some ideal sheaf I, then this embedding is the embedding of the normal cone into the normal bundle. Computations Consider the complete intersection ideal and let be the projective scheme defined by the ideal sheaf . Then, we have the isomorphism of -algebras is given by Properties If is a graded homomorphism of graded OX-algebras, then one gets an induced morphism between the cones: . If the homomorphism is surjective, then one gets closed immersions In particular, assuming R0 = OX, the construction applies to the projection (whi
https://en.wikipedia.org/wiki/ZertES
ZertES is a Swiss Federal law that regulates the conditions under which trust service providers may use certification services with electronic signatures. Additionally, this law provides a framework that outlines the provider’s obligations and rights as they apply to providing their certification services. Description ZertES was approved into law on December 19, 2003. The law promotes the use of secure services for electronic certification to facilitate the use of qualified electronic signatures. Under this law, the signatures would be equal to a handwritten signature. Switzerland’s ZertES law possesses a similar tiered structure and standards of legal value as the European Union’s eIDAS Regulation. ZertES provides several assurance levels; qualified electronic signatures is the highest level, equivalent to a handwritten signature. For many official documents, it is required that the electronic signatures used be at this qualified electronic signature level. Standards Under ZertES, an electronic signature refers to electronic data that is either attached to or associated to other electronic data, which serves as a means of authentication for that data. Currently, ZertES does not provide specifications on how electronic signatures should be technically implemented. Despite this limitation, the Swiss Federal Council has made international agreements to facilitate the international use of electronic signatures and allow for their legal recognition. Therefore, the council allows that electronic signatures that have been technically implemented as digital standards in eIDAS be accepted. The following standards are recognized by the Swiss Federal Council: XAdES PAdES CAdES Electronic transactions A , also known as an advanced electronic signature, must meet certain requirements in order to prove its authenticity, including: Establishing a unique link to its signatory The ability to identify its signatory or holder Having been created with software or equipmen
https://en.wikipedia.org/wiki/Cellosaurus
Cellosaurus is an online knowledge base on cell lines, which attempts to document all cell lines used in biomedical research. It is provided by the Swiss Institute of Bioinformatics (SIB). It is an ELIXIR Core Data Resource as well as an IRDiRC's Recognized Resource. It is the contributing resource for cell lines on the Resource Identification Portal. As of December 2022, it contains information for more than 144,000 cell lines. Its scope includes immortalised cell lines, naturally immortal cell lines (example: embryonic stem cells) and finite life cell lines when those are distributed and used widely. The Cellosaurus provides a wealth of manually curated information; for each cell line it lists a recommended name, synonyms and the species of origin. Other types of information include standardised disease terminology (for cancer or genetic disorder cell lines), the transformant used to immortalise a cell line, transfected or knocked-out genes, microsatellite instability, doubling time, gender and age of donor (patient or animal), important sequence variations, web links, publication references and cross-references to close to 100 different databases, ontologies, cell collections and other relevant resources. Since many cell lines used in research have been misidentified or contaminated, the Cellosaurus keeps track of problematic cell lines, including all those listed in the International Cell Line Authentication Committee (ICLAC) tables. For human as well as some dog cell lines, it provides short tandem repeat (STR) profile information. Since July 2018, cell lines in the Cellosaurus are represented as items in Wikidata. In March 2020, the Cellosaurus created a page containing cell line information relevant to SARS-CoV-2 in response to the COVID-19 pandemic. The Cellosaurus encyclopedia is widely recognized as an authoritative source for cell line information, providing unique identifiers and as source of curated information. References External links Cellosau
https://en.wikipedia.org/wiki/Segment%20routing
Segment routing, a form of computer networking, is a modern variant of source routing that is being developed within the SPRING and IPv6 working groups of the IETF. In a segment routed network, an ingress node may prepend a header to packets that contain a list of segments, which are instructions that are executed on subsequent nodes in the network. These instructions may be forwarding instructions, such as an instruction to forward a packet to a specific destination or interface. Segment routing works either on top of a MPLS network or on an IPv6 network. In an MPLS network, segments are encoded as MPLS labels. Under IPv6, a new header called a Segment Routing Header (SRH) is used. Segments in a SRH are encoded in a list of IPv6 addresses. See also Bang path Dynamic Source Routing Policy-based routing can also be used to route packets using their source addresses. Scalable Source Routing References External links The Segment Routing homepage The Linux implementation of IPv6 Segment Routing Routing algorithms
https://en.wikipedia.org/wiki/Selection%20principle
In mathematics, a selection principle is a rule asserting the possibility of obtaining mathematically significant objects by selecting elements from given sequences of sets. The theory of selection principles studies these principles and their relations to other mathematical properties. Selection principles mainly describe covering properties, measure- and category-theoretic properties, and local properties in topological spaces, especially function spaces. Often, the characterization of a mathematical property using a selection principle is a nontrivial task leading to new insights on the characterized property. The main selection principles In 1924, Karl Menger introduced the following basis property for metric spaces: Every basis of the topology contains a sequence of sets with vanishing diameters that covers the space. Soon thereafter, Witold Hurewicz observed that Menger's basis property is equivalent to the following selective property: for every sequence of open covers of the space, one can select finitely many open sets from each cover in the sequence, such that the family of all selected sets covers the space. Topological spaces having this covering property are called Menger spaces. Hurewicz's reformulation of Menger's property was the first important topological property described by a selection principle. Let and be classes of mathematical objects. In 1996, Marion Scheepers introduced the following selection hypotheses, capturing a large number of classic mathematical properties: : For every sequence of elements from the class , there are elements such that . : For every sequence of elements from the class , there are finite subsets such that . In the case where the classes and consist of covers of some ambient space, Scheepers also introduced the following selection principle. : For every sequence of elements from the class , none containing a finite subcover, there are finite subsets such that . Later, Boaz Tsaban id
https://en.wikipedia.org/wiki/Fulmer%20Research%20Institute
Fulmer Research Institute was founded in 1945 as a UK contract research and development organization specializing in materials technology and related areas of physics and chemistry. It was modelled on American contract research companies such as Battelle Memorial Institute and The Mellon Institute of Industrial Research. In 1965 it was acquired by The Institute of Physics and the Physical Society, a rare case of a contract research company being owned by a Learned Society. Through the 1970s and 80s Fulmer evolved. Its services in testing, consultancy and certification were greatly strengthened while academic research declined. It continued to make important developments and innovations for industry and government until in 1990 it was split up and sold to other R & D and testing organizations. A few of the landmark achievements during its forty five years were: The extraction of aluminium using sub-halide sublimation Aluminium-tin and aluminium-lead alloys for plain-bearings Chemical Vapour Deposition of metals and ceramics to produce coatings, tubes, crucibles etc. Fundamental research into aluminium copper alloys, leading to high strength formulations for the skin of high performance aircraft YQAF, a subsidiary company authorised to assess and accredit organisations to quality standards. Origins (1945 and 1946) Fulmer Research Institute was founded in 1945 by Col W C (Dev) Devereux and incorporated in 1946. He had been a pioneer in the use of light metal alloys in aero engines and, in the Second World War, he had an important role in the UK Ministry of Aircraft Production, organizing the assembly in Britain of American aircraft and reorganizing the repair of aircraft and aero-engines. After the war, in 1945, he set up a company called Almin Ltd (Associated Light Metal Industries) which brought together a group of companies mostly concerned with the production and processing of aluminium and magnesium alloys. He wanted Almin to have research facilitie
https://en.wikipedia.org/wiki/Predictive%20engineering%20analytics
Predictive engineering analytics (PEA) is a development approach for the manufacturing industry that helps with the design of complex products (for example, products that include smart systems). It concerns the introduction of new software tools, the integration between those, and a refinement of simulation and testing processes to improve collaboration between analysis teams that handle different applications. This is combined with intelligent reporting and data analytics. The objective is to let simulation drive the design, to predict product behavior rather than to react on issues which may arise, and to install a process that lets design continue after product delivery. Industry needs In a classic development approach, manufacturers deliver discrete product generations. Before bringing those to market, they use extensive verification and validation processes, usually by combining several simulation and testing technologies. But this approach has several shortcomings when looking at how products are evolving. Manufacturers in the automotive industry, the aerospace industry, the marine industry or any other mechanical industry all share similar challenges: they have to re-invent the way they design to be able to deliver what their customers want and buy today. Complex products that include smart systems Products include, besides the mechanics, ever more electronics, software and control systems. Those help to increase performance for several characteristics, such as safety, comfort, fuel economy and many more. Designing such products using a classic approach, is usually ineffective. A modern development process should be able to predict the behavior of the complete system for all functional requirements and including physical aspects from the very beginning of the design cycle. The use of new materials and manufacturing methods To achieve reduced costs or fuel economy, manufacturers need to continually consider adopting new materials and corresponding manufact
https://en.wikipedia.org/wiki/Dendroid%20%28malware%29
Dendroid is malware that affects Android OS and targets the mobile platform. It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300. Certain features were noted as being used in Dendroid, such as the ability to hide from emulators at the time. When first discovered in 2014 it was one of the most sophisticated Android remote administration tools known at that time. It was one of the first Trojan applications to get past Google's Bouncer and caused researchers to warn about it being easier to create Android malware due to it. It also seems to have followed in the footsteps of Zeus and SpyEye by having simple-to-use command and control panels. The code appeared to be leaked somewhere around 2014. It was noted that an apk binder was included in the leak, which provided a simple way to bind Dendroid to legitimate applications. It is capable of: Deleting call logs Opening web pages Dialing any number Recording calls SMS intercepting Uploading images and video Opening an application Performing denial-of-service attacks Changing the command and control server See also Botnet Mirai Shedun Zombie (computer science) Kill system References Android (operating system) malware Botnets Denial-of-service attacks Mobile malware
https://en.wikipedia.org/wiki/Investigations%20in%20Mathematics%20Learning
Investigations in Mathematics Learning is the official research journal of the Research Council for Mathematics Learning. RCML seeks to stimulate, generate, coordinate, and disseminate research efforts designed to understand and/or influence factors that affect mathematics learning. References Mathematics journals Mathematics education Mathematics education in the United States Mathematics education journals
https://en.wikipedia.org/wiki/Decapping
Decapping (decapsulation) or delidding of an integrated circuit is the process of removing the protective cover or integrated heat spreader (IHS) of an integrated circuit so that the contained die is revealed for visual inspection of the micro circuitry imprinted on the die. This process is typically done in order to debug a manufacturing problem with the chip, or possibly to copy information from the device, to check for counterfeit chips or to reverse engineer it. Companies such as TechInsights and ChipRebel decap, take die shots of, and reverse engineer chips for customers. Modern integrated circuits can be encapsulated in plastic, ceramic, or epoxy packages. Delidding may also be done in an effort to reduce the operating temperatures of an integrated circuit such as a processor, by replacing the thermal interface material (TIM) between the die and the IHS with a higher-quality TIM. With care, it's possible to decap a device and still leave it functional. Method Decapping is usually carried out by chemical etching of the covering, laser cutting, laser evaporation of the covering, plasma etching or mechanical removal of the cover using a milling machine, saw blade or by desoldering and cutting. The process can be either destructive or non-destructive of the internal die. Chemical etching usually involves subjecting the (if made of plastic) IC package to concentrated or fuming nitric acid, heated concentrated sulfuric acid, white fuming nitric acid or a mixture of the two for some time, possibly while applying heat externally with a hot plate or hot air gun, which dissolve the package while leaving the die intact. The acids are dangerous, so protective equipment such as appropriate gloves, full face respirator with appropriate acid cartridges, a lab coat and a fume hood are required. Laser decapping scans a high power laser beam across the plastic IC package to vaporize it, while avoiding the actual silicon die. In a common version of non-destructive, mechani
https://en.wikipedia.org/wiki/Corn%20wet-milling
Corn wet-milling is a process of breaking corn kernels into their component parts: corn oil, protein, corn starch, and fiber. It uses water and a series of steps to separate the parts to be used for various products. History The corn wet-milling industry has been a primary component of American manufacturing for more than 150 years. Corn refiners established the process of separating corn kernels into their component parts to produce a variety of value-added products. The four main component such as oil, protein, starch, and fiber are the primary product from the corn wet-milling process. The Associated Manufacturers of Products from Corn was formed in 1913 when the group of corn refining companies’ industry successfully grew. Description Corn wet-milling is a process where components of corn kernels are extracted to produce a highly purified product. Most of the products from this process are valuable and mainly required by the food industry. Through this process, every part of the corn is useful to produce the quality ingredients. The characteristics of this process are based on physical separation of components, mostly by weight and size. Water is needed as it is a wet process and it works as separation/carrier agents in washing steps. Therefore, this process can be considered as having high capital cost. The only chemical use in this process is aqueous sulfur dioxide solution, which is used in the steeping process. The corn is soaked in this solution to soften the kernel so that the oil in the germ will not contaminate other products and is easy to separate. Process steps Cleaning As per the standards of the U.S. Department of Agriculture, Grade 5 corn is usually used for wet-milling. Harvested corn has to be cleaned before it is milled. Dockage tester with appropriate sieve number is used to removes particles other than the required grain like cob pieces, foreign seeds, metal pieces, leaves, dirt and the percentage of dockage contained can be calculated. T
https://en.wikipedia.org/wiki/Pasta%20processing
Pasta processing is the process in which wheat semolina or flour is mixed with water and the dough is extruded to a specific shape, dried and packaged. Durum wheat semolina or flour, common farina or flour, or combination of both is mixed with water and eggs (for egg noodles) and other optional ingredients (like spinach, tomato, herbs, etc.). Usually 25–30 kg of water is added per 100 kg of semolina. The amounts are measured by computerized dispensers. The mixture is then kneaded by auger extruder equipped with mixing paddles and kneading blades to obtain a homogeneous mass, and after that is extruded through various shaped dies. Drying process begins immediately after the products are shaped to prevent deformation and sticking. The pastas are dried completely in drying chambers and stabilized, then ready for packaging. In modern factories, dry pasta is processed using automatic continuous lines. Mixing In this level wheat semolina and water are mixed by the ratio of 3 to 1. Water should be pure, with no off-flavor and suitable for drinking. Its temperature is about 35-45 °C to help speed up absorption. For egg noodles, eggs are added in the form of fresh eggs, frozen eggs, dry eggs, egg yolks or dry egg solids. If eggs are added to the mixture, the amount of water is modified. Adding egg improves the nutritional quality and richness of the pasta. Disodium phosphate is also added to reduce the cooking time. Mixing the semolina and water takes place in two stages. First, the ingredients are measured and added to a pre-mixer, and then they are transferred to a mixing chamber which finalizes the mixing process and produces a homogeneous mass. Measuring the raw material The exact amount of raw materials is very important. Semolina dosing is done by two methods: volumetric feed (measurement by volume), and gravimetric feed (measurement by weight). In volumetric feed, a specific volume of semolina is measured by variable speed screws or rotary air-lock valves. This m
https://en.wikipedia.org/wiki/HTTP/2%20Server%20Push
HTTP/2 Server Push is an optional feature of the HTTP/2 and HTTP/3 network protocols that allows servers to send resources to a client before the client requests them. Server Push is a performance technique aimed at reducing latency by loading resources preemptively, even before the client knows they will be needed. In practice, Server Push frequently results in wasted bandwidth because the server rarely knows which resources are already loaded by the client and transmits the same resource multiple times, resulting in slowdowns if the resources being pushed compete for bandwidth with resources which were actually requested. HTTP/2 Server Push is not a notification mechanism from server to client. Instead, pushed resources are used by the client when it may have otherwise produced a request to get the resource anyway. History On May 14, 2015, HTTP/2 was standardized by ratified as a Proposed Standard. The document includes section 8.2 entitled "Server Push" which introduced the concept to the protocol as an optional extension. Google Chrome 40 became the first browser supporting the final standardized HTTP/2 version, including the optional Server Push. In February 2018, Nginx 1.13.9 was released with optional support for HTTP/2 Server Push. In October 2022, Google announced intent to remove Server Push from Google Chrome citing the poor performance of the extension in practice. Chrome 106 became the first release disabling Server Push by default. Basic concept For example, in the case of a website with three resources: index.html, styles.css and script.js, when a user, through their browser, connects to Wikipedia webserver to get the home page, they automatically retrieve index.html. As the browser parses the HTML text in index.html, it finds instructions that will require styles.css and script.js. At that point, the browser will issue requests to get these other two files. To assemble the complete webpage, the browser will stack such requests as it gradually
https://en.wikipedia.org/wiki/Grassmann%20bundle
In algebraic geometry, the Grassmann d-plane bundle of a vector bundle E on an algebraic scheme X is a scheme over X: such that the fiber is the Grassmannian of the d-dimensional vector subspaces of . For example, is the projective bundle of E. In the other direction, a Grassmann bundle is a special case of a (partial) flag bundle. Concretely, the Grassmann bundle can be constructed as a Quot scheme. Like the usual Grassmannian, the Grassmann bundle comes with natural vector bundles on it; namely, there are universal or tautological subbundle S and universal quotient bundle Q that fit into . Specifically, if V is in the fiber p−1(x), then the fiber of S over V is V itself; thus, S has rank r = d = dim(V) and is the determinant line bundle. Now, by the universal property of a projective bundle, the injection corresponds to the morphism over X: , which is nothing but a family of Plücker embeddings. The relative tangent bundle TGd(E)/X of Gd(E) is given by which morally is given by the second fundamental form. In the case d = 1, it is given as follows: if V is a finite-dimensional vector space, then for each line in V passing through the origin (a point of ), there is the natural identification (see Chern class#Complex projective space for example): and the above is the family-version of this identification. (The general care is a generalization of this.) In the case d = 1, the early exact sequence tensored with the dual of S = O(-1) gives: , which is the relative version of the Euler sequence. References Algebraic geometry
https://en.wikipedia.org/wiki/Cellular%20dewetting
Cellular dewetting refers to the process of nucleation and enlargement of transendothelial cell macroaperture (TEM) tunnels in endothelial cells (Figure 1). This phenomenon is analogous to the nucleation and growth of dry patches in viscous liquids spreading on a non-wettable substrate (Figure 2). Cellular dewetting is triggered by several protein toxins from pathogenic bacteria, notably the EDIN-like factors from Staphylococcus aureus and from Clostridium botulinum, as well as edema toxin from Bacillus anthracis. TEMs form in response to the rupture of cytoskeleton physical connections through the cytoplasm due to inhibition of the RhoA/ROCK pathway or to induction of the flux of cyclic-AMP (cAMP) broad signaling molecule. Physics behind cellular dewetting The phenomenon of cellular dewetting can be interpreted by physical modeling (Figure 2). The driving force responsible for the spontaneous formation of TEM tunnels and their opening is the membrane tension that results from the spreading of cells due to actomyosin relaxation. Opposite to liquid dewetting, TEMs reach a maximum diameter, at which the driving force is balanced by a resisting force that develops along TEM edges (Figure 2). This resisting force is referred to as line tension and is uncharacterized at the molecular level. Physical parameters Driving forces pulling on a tunnel of radius R, as depicted in Figure 2. Here, pulling is due to the tensioning of the cell membrane (σ) that is partly counteracted by a line tension around the tunnel (T). In these conditions, the net driving force (FD) consists of two contributions: Dewetting proceeds if FD>0. Membrane tension (σ) depends on the tunnel radius R. A tunnel increase in size relaxes the membrane, inducing a decrease in membrane tension, as described by Helfrich’s law. Line tension (T) corresponds to the resisting force along the edge of the tunnel that opposes membrane tension and limits dewetting. This line tension can have physical and mol
https://en.wikipedia.org/wiki/Glottopedia
Glottopedia is a wiki devoted to linguistics. Glottopedia was created on 27 May 2007 as a merger of two earlier projects, WikiLingua at the University of Trier (created in 2005), and Linguipedia at the Max Planck Institute for Evolutionary Anthropology in Leipzig (created in 2006). Many or most of its topics are treated on two pages, in English and German respectively. The content is licensed under the Creative Commons Attribution-Share Alike 3.0 licence. It is implemented with the MediaWiki wiki engine, and limits editing to registered contributors with their real names. As of 2021, it has about 3,200 content pages by 356 registered users. Notes External links Glottopedia German online encyclopedias Online encyclopedias Encyclopedias of linguistics English-language encyclopedias German-language encyclopedias
https://en.wikipedia.org/wiki/Client%20hypervisor
In computing, a client hypervisor is a hypervisor that is designed for use on client computers such as laptops, desktops or workstations, rather than on a server. It is a technique of host virtualization which enables the parallel execution of multiple operating systems (or virtual machines) on shared hardware. These guest systems may be used for a wide variety of tasks normally performed by dedicated physical computer systems. Client hypervisors are included in cloud computing and IaaS (Infrastructure as a Service) designs. Some well-known client hypervisors are VMware Workstation, VirtualBox and VirtualPC. Client hypervisors are categorized in two types: Type 1 (Bare metal): this type of client hypervisor runs directly on the host machine's hardware and serves as the host operating system, providing hardware access to guests via its own drivers. Also, it create a layer above the layer for allocate system resources to all installed virtual machines. Type 2 (Virtualized): this type of client hypervisor operates inside the host operating system as a stand-alone application and invokes the master operating system for access to the physical computer's resources. References Virtualization software
https://en.wikipedia.org/wiki/Kalai%E2%80%93Smorodinsky%20bargaining%20solution
The Kalai–Smorodinsky (KS) bargaining solution is a solution to the Bargaining problem. It was suggested by Ehud Kalai and Meir Smorodinsky, as an alternative to Nash's bargaining solution suggested 25 years earlier. The main difference between the two solutions is that the Nash solution satisfies independence of irrelevant alternatives while the KS solution satisfies monotonicity. Setting A two-person bargain problem consists of a pair : A feasible agreements set . This is a closed convex subset of . Each element of represents a possible agreement between the players. The coordinates of an agreement are the utilities of the players if this agreement is implemented. The assumption that is convex makes sense, for example, when it is possible to combine agreements by randomization. A disagreement point , where and are the respective payoffs to player 1 and player 2 when the bargaining terminates without an agreement. It is assumed that the problem is nontrivial, i.e, the agreements in are better for both parties than the disagreement. A bargaining solution is a function that takes a bargaining problem and returns a point in its feasible agreements set, . Requirements from bargaining solutions The Nash and KS solutions both agree on the following three requirements: Pareto optimality is a necessary condition. For every bargaining problem, the returned agreement must be Pareto-efficient. Symmetry is also necessary. The names of the players should not matter: if player 1 and player 2 switch their utilities, then the agreement should be switched accordingly. Invariant to positive affine transformations also seems like a necessary condition: if the utility function of one or more players is transformed by a linear function, then the agreement should also be transformed by the same linear function. This makes sense if we assume that the utility functions are only representations of a preference relation, and do not have a real numeric meaning. In additio
https://en.wikipedia.org/wiki/Coala%20%28software%29
coala is a free and open-source language independent analysis toolkit, written in Python. The primary goal of coala is to make it easier for developers to create rules which a project's code should conform to. coala emphasizes on reusability and pluggability of analysis routines, and the principle of don't repeat yourself (DRY). On 6 May it was featured on SDTimes.com as GitHub Project of the Week. coala was also featured in the hackerpublicradio. On 9 May 2016, an article was published on Medium by Gitter regarding its community. Features Bears Bears in coala are the equivalent plugins or extensions which provide some analysis routines. Bears can be language dependent as well as language independent. The language dependent bears supported by the coala community provide analysis routines for more than 30 languages. Integrations Integrations with a few editors/IDEs have been supported. This includes: Atom Sublime Text 3 Vim gedit Emacs Eclipse There are also interfaces with different visualizations provided like the web interface, command-line, D-Bus, and JSON. Version History External links coala Official documentation References Free software programmed in Python Static program analysis tools Software using the GNU AGPL license Software quality
https://en.wikipedia.org/wiki/Dry%20milling%20and%20fractionation%20of%20grain
Dry milling of grain is mainly utilized to manufacture feedstock into consumer and industrial based products. This process is widely associated with the development of new bio-based associated by-products. The milling process separates the grain into four distinct physical components: the germ, flour, fine grits, and coarse grits. The separated materials are then reduced into food products utilized for human and animal consumption. It is estimated that 165 million bushels of corn are dry-milled per year. Currently, dry milling is mainly focused on corn-based products for human and animal consumption, or utilized during fuel ethanol production. The main objective of the dry-milling process is to separate the endosperm, which is mainly composed of starch, from the germ and pericarp fibers as much as possible. Features The dry milling process includes a number of unique features: Physical separation (size/density) based on mass No use of chemicals Maximizing surface area of solids for processing Resource pulping Minimal water use, if any (short tempering) Note: Water is not used as a separation agent Low capital cost Lower separation compared to wet milling Lower concentration of starch, protein, fiber, and oil relative to wet milling The most utilized grinding mills include pin, hammer, and disk mills, but many machines are utilized for more specific processes. To maintain a high starch extraction, the grains will go through a degermination process. This process removes the germ and fiber (pericarp) first, and the endosperm is recovered in several sizes: grits, cones, meal, and flow. It is important to note that the gluten protein matrix is not separated from the starch. Yields The table below is a compilation of particle size and yield of milled maize products. Uses Currently, products of dry milled corn products are used mostly in animal food, brewing and breakfast cereals industries. Grits/Cones Breakfast cereals Snack foods Pet foods Corn b
https://en.wikipedia.org/wiki/Continuous%20monitoring%20and%20adaptive%20control%20%28stormwater%20management%29
Continuous monitoring and adaptive control (CMAC) is a category of stormwater best management practice that allows for a wider range of operation of detention and retention ponds. CMAC systems typically consist of a water level sensor, an actuated valve, and an internet connection. Specific applications of CMAC include flood protection, water quality treatment, water reuse, and channel protection. See also Urban runoff References External links Chesapeake Bay Urban Stormwater Work Group Flood control Environmental engineering Stormwater management Water and the environment
https://en.wikipedia.org/wiki/Energy%20modeling
Energy modeling or energy system modeling is the process of building computer models of energy systems in order to analyze them. Such models often employ scenario analysis to investigate different assumptions about the technical and economic conditions at play. Outputs may include the system feasibility, greenhouse gas emissions, cumulative financial costs, natural resource use, and energy efficiency of the system under investigation. A wide range of techniques are employed, ranging from broadly economic to broadly engineering. Mathematical optimization is often used to determine the least-cost in some sense. Models can be international, regional, national, municipal, or stand-alone in scope. Governments maintain national energy models for energy policy development. Energy models are usually intended to contribute variously to system operations, engineering design, or energy policy development. This page concentrates on policy models. Individual building energy simulations are explicitly excluded, although they too are sometimes called energy models. IPCC-style integrated assessment models, which also contain a representation of the world energy system and are used to examine global transformation pathways through to 2050 or 2100 are not considered here in detail. Energy modeling has increased in importance as the need for climate change mitigation has grown in importance. The energy supply sector is the largest contributor to global greenhouse gas emissions. The IPCC reports that climate change mitigation will require a fundamental transformation of the energy supply system, including the substitution of unabated (not captured by CCS) fossil fuel conversion technologies by low-GHG alternatives. Model types A wide variety of model types are in use. This section attempts to categorize the key types and their usage. The divisions provided are not hard and fast and mixed-paradigm models exist. In addition, the results from more general models can be
https://en.wikipedia.org/wiki/Data%20re-identification
Data re-identification or de-anonymization is the practice of matching anonymous data (also known as de-identified data) with publicly available information, or auxiliary data, in order to discover the person the data belong to. This is a concern because companies with privacy policies, health care providers, and financial institutions may release the data they collect after the data has gone through the de-identification process. The de-identification process involves masking, generalizing or deleting both direct and indirect identifiers; the definition of this process is not universal. Information in the public domain, even seemingly anonymized, may thus be re-identified in combination with other pieces of available data and basic computer science techniques. The Protection of Human Subjects ('Common Rule'), a collection of multiple U.S. federal agencies and departments including the U.S. Department of Health and Human Services, speculate that re-identification is becoming gradually easier because of "big data"—the abundance and constant collection and analysis of information along the evolution of technologies and the advances of algorithms. However, others have claimed that de-identification is a safe and effective data liberation tool and do not view re-identification as a concern. More and more data are becoming publicly available over the Internet. These data are released after applying some anonymization techniques like removing personally identifiable information (PII) such as names, addresses and social security numbers to ensure the sources' privacy. This assurance of privacy allows the government to legally share limited data sets with third parties without requiring written permission. Such data has proved to be very valuable for researchers, particularly in health care. The risk of re-identification is significantly reduced with GDPR-compliant pseudonymization which requires that data cannot be attributed to a specific data subject without the use o
https://en.wikipedia.org/wiki/Clock%20Software
Clock Software is a private limited company developing software and hardware for the hospitality industry - property management system, restaurant point of sale, online booking engine, channel manager, self-service kiosk, mobile hotel app. Its headquarters is in London, UK. History Clock Software was incorporated in 1994 in Varna, Bulgaria, under the name Clock Ltd (Клок ООД). Initially, the company specialized in selling hardware and peripherals but soon switched its focus to the development of hotel software. In 1996, Clock launched their first property management system called ClockFront for Windows. At the time, a huge privatisation was going on as part of the transition of the country to democracy and market economy. All hotels previously owned by the state were changing ownership and needed new software to replace previous, often centralised, management systems. Clock Software offered their software to these newly privatised hotels. In 2006, Clock Software started to expand to countries outside Bulgaria and opened offices in Romania (2007) and Croatia (2008). The first markets where their products were adopted were Romania, Macedonia and Croatia. In 2010, Clock launched their effots into creating a hospitality software suite based on cloud technology. The new product consolidated separate applications into one cloud-based platform and switched from a data-focused to guest-centred software model. A new branch was registered in London, UK under the name of Clock Software Ltd. to take over the international development and the distribution of the cloud-based software products, while the Bulgarian branch remained in charge of software development and support. Clock Software launched their first cloud product, the free Internet reservation system InnHand, in 2012. In 2013, it launched the hotel management platform Clock PMS+. A year later InnHand was discontinued and the company focused entirely on the new system. In 2016, the company released its first hardwa
https://en.wikipedia.org/wiki/Named%20set%20theory
Named set theory is a branch of theoretical mathematics that studies the structures of names. The named set is a theoretical concept that generalizes the structure of a name described by Frege. Its generalization bridges the descriptivists theory of a name, and its triad structure (name, sensation and reference), with mathematical structures that define mathematical names using triplets. It deploys the former to view the latter at a higher abstract level that unifies a name and its relationship to a mathematical structure as a constructed reference. This enables all names in science and technology to be treated as named sets or as systems of named sets. Informally, named set theory is a generalization that studies collections of objects (may be, one object) connected to other objects (may be, to one object). The paradigmatic example of a named set is a collection of objects connected to its name. Mathematical examples of named sets are coordinate spaces (objects are points and coordinates are names of these points), vector fields on manifolds (objects are points of the manifold and vectors assigned to points are names of these points), binary relations between two sets (objects are elements of the first set and elements of the second set are names) and fiber bundles (objects form a topological space, names from another topological space and the connection is a continuous projection). The language of named set theory can be used in the definitions of all of these abstract objects. History In the 20th century, many generalizations of sets were invented, e.g., fuzzy sets (Zadeh, 1965), or rediscovered, e.g., multisets (Knuth, 1997). As a result, these generalizations created a unification problem in the foundation of mathematics. The concept of a named set was created as a solution to this problem. Its generalization of mathematical structures allowed for the unification of all known generalizations of sets. Later it was demonstrated that all basic mathematical
https://en.wikipedia.org/wiki/Domain-to-range%20ratio
The domain-to-range ratio (DRR) is a ratio which describes how the number of outputs corresponds to the number of inputs of a given logical function or software component. The domain-to-range ratio is a mathematical ratio of cardinality between the set of the function's possible inputs (the domain) and the set of possible outputs (the range). For a function defined on a domain, , and a range, , the domain-to-range ratio is given as:It can be used to measure the risk of missing potential errors when testing the range of outputs alone. Example Consider the function isEven() below, which checks the parity of an unsigned short number , any value between and , and yields a boolean value which corresponds to whether is even or odd. This solution takes advantage of the fact that integer division in programming typically rounds towards zero. bool isEven(unsigned short x) { return (x / 2) == ((x + 3)/2 - 1); }Because can be any value from to , the function's domain has a cardinality of . The function yields , if is even, or , if is odd. This is expressed as the range , which has a cardinality of . Therefore, the domain-to-range ratio of isEven() is given by:Here, the domain-to-range ratio indicates that this function would require a comparatively large number of tests to find errors. If a test program attempts every possible value of in order from to , the program would have to perform tests for each of the two possible outputs in order to find errors or edge cases. Because errors in functions with a high domain-to-range ratio are difficult to identify via manual testing or methods which reduce the number of tested inputs, such as orthogonal array testing or all-pairs testing, more computationally complex techniques may be used, such as fuzzing or static program analysis, to find errors. References Software metrics Software testing Set theory
https://en.wikipedia.org/wiki/Ultraviolet%20thermal%20processing
Ultraviolet thermal processing or UVTP is the name given to the process of using ultraviolet light to stabilize dielectric films used to insulate semiconductors. Description Semiconductor films need low dielectric constants (k-values) for optimal thermal conductivity, to ensure semiconductor scaling. Newer dielectric films used to insulate modern chips can be easily damaged, causing them to lose their insulating capacity. Specialized treatments applied with ultraviolet light improve chip performance. Tungsten halogen lamps are the sources used for traditional rapid thermal processing. References Electronics manufacturing Packaging (microfabrication) Semiconductor device fabrication Semiconductor packages Semiconductor technology
https://en.wikipedia.org/wiki/RAN%20translation
Repeat Associated Non-AUG translation, or RAN translation, is an irregular mode of mRNA translation that can occur in eukaryotic cells. Mechanism For the majority of eukaryotic messenger RNAs (mRNAs), translation initiates from a methionine-encoding AUG start codon following the molecular processes of 'cap-binding' and 'scanning' by ribosomal pre-initiation complexes (PICs). In rare exceptions, such as translation by viral IRES-containing mRNAs, 'cap-binding' and/or 'scanning' are not required for initiation, although AUG is still typically used as the first codon. RAN translation is an exception to the canonical rules as it uses variable start site selection and initiates from a non-AUG codon, but may still depend on 'cap-binding' and 'scanning'. Disease RAN translation produces a variety of dipeptide repeat proteins by translation of expanded hexanucleotide repeats present in an intron of the C9orf72 gene. The expansion of the hexanucleotide repeats and thus accumulation of dipeptide repeat proteins are thought to cause cellular toxicity that leads to neurodegeneration in ALS disease. See also Trinucleotide repeat disorder Eukaryotic translation C9orf72 References Protein biosynthesis Molecular biology Gene expression Protein complexes RNA-binding proteins Biochemistry RNA Proteins Neurodegenerative disorders
https://en.wikipedia.org/wiki/Cognitive%20ecology
Cognitive ecology is the study of cognitive phenomena within social and natural contexts. It is an integrative perspective drawing from aspects of ecological psychology, cognitive science, evolutionary ecology and anthropology. Notions of domain-specific modules in the brain and the cognitive biases they create are central to understanding the enacted nature of cognition within a cognitive ecological framework. This means that cognitive mechanisms not only shape the characteristics of thought, but they dictate the success of culturally transmitted ideas. Because culturally transmitted concepts can often inform ecological decision-making behaviors, group-level trends in cognition (i.e., culturally salient concepts) are hypothesized to address ecologically relevant challenges. Theoretical basis Cognitive ecology explores the interactive relationship between organism-environment interactions and its impact on cognitive phenomena. Human cognition in this framework is multimodal and viewed similarly to enactivist perspectives on cognitive processing. For cultural concepts, this emphasizes cognitive distribution across an ecosystem, which is predicated on models of the extended mind thesis. Ecological psychology While the multi-faceted nature of cognitive ecology is a consequence of its interdisciplinary history, it primarily derives from early work in ecological psychology. Paradigm shifts from behaviorist orientations of psychology to cognition, or the "cognitive revolution", gave rise to the ecological psychology approach, which distanced itself from mainstream cognitivist views by breaking down the common mind-environment dichotomy of psychological theory. One particularly influential progenitor of this work was ecological psychologist James Gibson, whose legacy is marked by his ideas on ecological and social affordances. These are the opportunistic features of environmental objects that can be exploited for human use, and are therefore particularly perceptible (
https://en.wikipedia.org/wiki/The%20Legend%20of%20Heroes%3A%20Trails%20at%20Sunrise
The Legend of Heroes: Trails at Sunrise, known in Japanese as is a 2016 role-playing gacha game developed by UserJoy Technology and published by Nihon Falcom. It is a spin-off of the Trails series, itself a part of The Legend of Heroes franchise, and was first released in Japan for browsers. Trails at Sunrise was later ported to Windows, PlayStation Vita, PlayStation 4, Android, iOS, and Nintendo Switch. The PlayStation and Switch versions of the game were discontinued in 2022. Gameplay Trails at Sunrise features a mix of role-playing and simulation elements. Some characters were voiced in Japanese. Haccan did the character artwork. The game features cel-shaded graphics with a battle system resembling the earlier Crossbell arc. Like in other Trails games, combat is turn-based, and the player can move their characters freely on the field of battle. Management of the player's airship also plays a major role in the game. Setting Trails at Sunrise revisits some locations seen in previous Trails games, such as Liberl and Crossbell, while introducing a new cast of characters. The two main protagonists are both bracers harking back to the original Trails in the Sky games. Additionally, Trails at Sunrise offers players the opportunity to build a party out of characters who appeared in previous Trails games. For example, as part of UserJoy's pre-release promotion campaign, users who pre-registered for a user ID and followed the game's Twitter account had Noel Seeker, who first appeared in Trails from Zero, added to their party as a bonus character. Players who pre-registered received further bonuses based on the total number of pre-registrations. Development Trails at Sunrise was announced in June 2014 as a project to commemorate the tenth anniversary of the Trails series. It was initially scheduled to begin service in 2015. UserJoy Technology opened a preview site for the game in July. Though UserJoy rose to fame mainly for MMORPGs such as Angel Love Online and The Leg
https://en.wikipedia.org/wiki/Siam%207X
The Siam 7x is an Android dual-screen smartphone which launched in December 2015 and was designed by Darius Allen. This phone was the first phone produced by CRBT Siam, and the first dual-screen phone to be marketed to American consumers. History Several manufacturers, including Samsung, LG and Kyocera had made attempts to create a dual-screen smartphone. However, they proved unsuccessful as their second screens were located within a difficult to access clam-shell design. The Siam 7x overcame this by placing the second screen on the outside, using a black and white E Ink Corporation screen to conserve power. A similar design was created by Yotaphone but its parent company targeted this phone to European, Asian and Middle Eastern markets. The Siam 7x was the first dual-screen phone designed for the North American market. The phone was available only with the Android operating system, and only as a GSM carrier phone. It allows users to insert two SIM cards simultaneously. The phone was designed in Dallas, and manufactured in Shenzhen, China. Hardware Processor: MTK6735A, Quad-Core Cortex A53 GPU: ARM MaliT760-MP3@450 MHz Hard-drive: 1664GB RAM: 2GB Operating System: Android 5.1 Screen Size: 5.0" 1280 x 720 HD IPS 2.5D Furthermore, the phone has a biometric ear print recognition system which employs the Descartes Bio-metric Helix system Reception The Siam 7x dual-screen smartphone was released to the public on November 27, 2015, (Black Friday). 10,000 of these phones were produced for its release date, targeting a relatively small sales volume. References External links Official page Android (operating system) devices Smartphones Mobile phones introduced in 2015 Electronic paper technology Dual screen phone
https://en.wikipedia.org/wiki/Intel%2082288
The Intel 82288 is a bus controller designed for Intel 80286. The chip is supplied in 20-pin DIP package. It replaces 8288 used with earlier processors. Intel second sourced this chipset to Fujitsu Limited around 1985. The 20-pin PLCC version was available in sampling for first quarter of 1986. External links www.datasheetarchive.com: 82288 Bus Controller for iAPX 286 Processors. References Intel chipsets IBM PC compatibles Input/output integrated circuits
https://en.wikipedia.org/wiki/Descendants%202
Descendants 2 is an American musical fantasy television film. It premiered as a Disney Channel Original Movie on July 21, 2017, and was simulcast on Disney-owned networks ABC, Disney XD, Freeform, Lifetime, and Lifetime Movies. It is the second installment in the Descendants franchise and the sequel to the 2015 film Descendants. The film stars Dove Cameron, Cameron Boyce, Sofia Carson, Booboo Stewart, Mitchell Hope, and China Anne McClain. A third film, Descendants 3, premiered on August 2, 2019. Plot Mal struggles with her new celebrity life as the girlfriend of King Ben, putting a spell on her hair making it blonde, and uncomfortably maintaining a princess-like personality. She confides her issues in her friends Evie, Carlos, and Jay, but they are content with their new lives in Auradon. Evie scolds Mal for relying on her mother's spell book to solve her issues. Carlos, wishing to ask Jane to the upcoming Cotillion dance, turns to Mal for help. Mal gives him a sweet that will make him speak the truth, but his dog, Dude, eats it, magically speaking the blunt truth in English. Ben eventually discovers Mal's reliance on magic, and she comes clean about her insecurities, causing a falling-out. Mal returns to the Isle of the Lost, now ruled by her former rival Uma, Ursula's daughter, along with Harry and Gil, the sons of Captain Hook and Gaston. Mal visits hairstylist Dizzy Tremaine, Drizella's daughter, who restores her signature purple hair. Harry learns of Mal's return and informs Uma. Ben, Evie, Jay, and Carlos learn of Mal's departure and sneak onto the Isle to find her, but Gil recognizes them. Ben confronts Mal, who rejects his feelings for both his sake and Auradon's. Ben leaves dejected, only to be captured by Uma. Mal and Uma arm wrestle for Ben and Fairy Godmother's wand, which Uma wins. Uma then orders Mal and her friends to retrieve the Fairy Godmother's wand in exchange for Ben's safe return. Carlos and Jay return to Auradon Prep, where they create a
https://en.wikipedia.org/wiki/Radek%20Maneuver
The Radek Maneuver is a scale-up-then-scale-down tactic used in the administration of web services, specifically those deployed under a cloud computing paradigm (by a provider e.g. Amazon Elastic Compute Cloud or Microsoft Azure). History Developed by Olivier "Radek" Dabrowski in the mid-2010s, the Radek Maneuver was originally conceived of in using and maintaining applications running on a PaaS system. Execution The Radek Maneuver consists of a series of steps, usually executed via the PaaS or web portal interface. The tactic should be used when a service is misbehaving or otherwise experiencing errors, and the suspected cause is the underlying cloud layer, rather than the application layer. This includes networking issues and other "bad box" problems. The steps are as follows: Identify the application or service which is misbehaving. Increase the compute resource (number of CPU cores, amount of ram) for the instance on which the application is running. This is also known as scaling up. Wait for the application to re-deploy and stabilize. Scale back down to the original instance size. Principle of action This scale-up-scale-down method is understood to shift the application to a different physical machine underlying the PaaS service or application virtual machine. While this layer of the cloud computing stack is generally out of the access of an application developer (instead in the hands of the cloud provider), the maneuver allows troubleshooting and dodging errors in that layer. References Cloud computing
https://en.wikipedia.org/wiki/Mac%20OS%20Celtic
Mac OS Celtic is a character encoding used by Mac OS to represent Welsh text (like ISO 8859-14), replacing 14 of the Mac OS Roman characters with Welsh characters. This character set was developed by Michael Everson and was used for the Irish localizations of Mac OS 6.0.8 and 7.1 and for the Welsh localization of Mac OS 7.1. Layout The table below shows the second half of the encoding, the first half (codes 0–127) being ASCII. Before Mac OS 8.5, the character 0xDB mapped to currency sign (¤), Unicode character U+00A4. Before Unicode 4.1, the character 0xF0 mapped to ♣ Unicode character U+2663. References Character sets Celtic Articles with unsupported PUA characters Celtic
https://en.wikipedia.org/wiki/LizardFS
LizardFS is an open source distributed file system that is POSIX-compliant and licensed under GPLv3. It was released in 2013 as fork of MooseFS. LizardFS is also offering a paid Technical Support (Standard, Enterprise and Enterprise Plus) with possibility of configurating and setting up the cluster and active cluster monitoring. LizardFS is a distributed, scalable and fault-tolerant file system. The file system is designed so that it is possible to add more disks and servers “on the fly”, without the need for any server reboots or shut-downs. Description LizardFS makes files secure by keeping all the data in multiple replicas spread over the available servers. This storage is presented to the end-user as a single logical namespace. It can also be used to build space-efficient storage because it is designed to run on commodity hardware. It has applications in multiple fields and is used by institutions in finance, telecommunications, medicine, education, post-production, game development, cloud hosting services, and others. Hardware LizardFS is fully hardware agnostic. Commodity hardware can be utilized for cost efficiency. The minimum requirements are two dedicated nodes with a number of disks, but to obtain a high available installation at least 3 nodes are needed. This will also enable the use of erasure coding. Architecture LizardFS keeps metadata (e.g. file names, modification timestamps, directory trees) and the data separately. Metadata are kept on metadata servers, while data is kept on chunkservers. A typical installation consists of: At least two metadata servers, which work in the master-slave mode for failure recovery. Their role is to manage the whole installation, so the active metadata server is often called the master server. The role of other metadata servers is to keep in sync with the active master server, so they are often called shadow master servers. Any shadow master server is ready to take the role of the master server at any time.
https://en.wikipedia.org/wiki/Podium%20%28company%29
Podium is a private technology company headquartered in Lehi, Utah that develops cloud-based software related to messaging, customer feedback, online reviews, selling products, and requesting payments. History Podium was founded in 2014 by Eric Rea and Dennis Steele, who developed a tool to help small businesses "build their online reputation" through online reviews. Podium was initially known as RepDrive before rebranding as Podium in 2015. In 2015, Podium moved from a spare bedroom to a new location above a Provo bike shop. In March 2020, Podium added payments technology to its product suite. In November 2021, Podium raised $201 million in Series D funding and was valued at $3 billion. Product Podium is a software-as-a-service platform designed to improve business online reputation. It helps users manage business interactions in one tool. Users can communicate reviews, texts, chats, and post payment directly within the app. Awards and recognition Podium was named one of the "Emerging Elite" by Mountain West Capital Network in 2016 and 2017. Podium's CEO Eric Rea was interviewed for "The Top" podcast in December 2016. Eric Rea was named one of the "highest rated CEOs" by Glassdoor in June 2017. Named the "No. 1 Startup to Watch" by Utah Valley Magazine in September 2017. Named Utah Business Medium Companies Best Companies to Work for in December 2017. Ranked 16th on Glassdoor's "Best Places to Work" list in 2018. Ranked 13th on the 2018 Inc. 5000. Listed on Forbes' 2018 and 2021 "Cloud 100". Recognized by Forbes as one of their "Next Billion-Dollar Startups" . Ranked as the ninth fastest growing technology company, public or private, by Deloitte in 2018 Named by Fast Company as one of the "World's Most Innovative Companies" in 2019 References External links Official Website American companies established in 2013 Y Combinator companies Software Collaborative software Web applications Companies based in Lehi, Utah
https://en.wikipedia.org/wiki/Supersymmetric%20WKB%20approximation
In physics, the supersymmetric WKB (SWKB) approximation is an extension of the WKB approximation that uses principles from supersymmetric quantum mechanics to provide estimations on energy eigenvalues in quantum-mechanical systems. Using the supersymmetric method, there are potentials that can be expressed in terms of a superpotential, , such that The SWKB approximation then writes the Born–Sommerfeld quantization condition from the WKB approximation in terms of . The SWKB approximation for unbroken supersymmetry, to first order in is given by where is the estimate of the energy of the -th excited state, and and are the classical turning points, given by The addition of the supersymmetric method provides several appealing qualities to this method. First, it is known that, by construction, the ground state energy will be exactly estimated. This is an improvement over the standard WKB approximation, which often has weaknesses at lower energies. Another property is that a class of potentials known as shape invariant potentials have their energy spectra estimated exactly by this first-order condition. See also Quantum mechanics Supersymmetric quantum mechanics Supersymmetry WKB approximation References Supersymmetry Quantum mechanics Theoretical physics Mathematical physics Approximations