source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Armbian | Armbian is a computing build framework that allows users to create system images with configurations for various single board computers (SBCs). Armbian's objective is to unify the experience across ARM single-board computers, while maintaining performance with hardware specific optimizations.
References
ARM Linux distributions
ARM operating systems
Debian-based distributions
Ubuntu derivatives
Free software culture and documents
Linux distributions |
https://en.wikipedia.org/wiki/Nicolet%201080 | The Nicolet 1080 computer was the successor of the Nicolet 1070/PDP-8 computer, released in 1971 by Nicolet Instrument Corporation, which operated between 1966 and 1992 in Madison, Wisconsin. As a part of a data processing mainframe, model 1080 allowed NMR spectrum analysis by the use of fast Fourier transform (FFT) algorithms. The processing of big amounts of data at a fast rate (it was possible to compute the FFT of 32000 points in just 100 seconds) was possible thanks to the uncommon 20-bit architecture, which was a significant performance advantage over other systems based on 8 and 16 bits architectures.
Technical specifications
Architecture
The computer was formed by dozens of integrated circuits containing simple logic gates (AND, NAND, OR, NOT, etc.), transistors, diodes, and passive electronic components like resistors, capacitors and coils. The analog-to-digital converter (ADC) had a sample rate of 100 kHz, allowing the measure of 50 kHz signals (see Nyquist frequency). Beside this, digitalized signals could be averaged "by hardware", which increased signal to noise ratio (SNR) improving processed data quality. Computer clock frequency was 2 MHz, and some complex functions like multiplication and division between 20 and 40 bits registers could be performed in one instruction cycle thanks to the complexity of the arithmetic module, in a similar way to the more recent ALUs. The standard instruction set could address a 1K page in direct mode. Program code outside the current page was reachable in indirect mode, using pointers. Program code used to process digitized data points always had to use pointers.
The 1080 computer did not have a stack. When executing a subroutine, the return address was stored in the first location of the subroutine.
Exotic Instructions
The NIC 1080 had an instruction called BITINV to reverse bits in the accumulator, swapping the most significant bit with the least significant and so on. There was also a special shift instruction |
https://en.wikipedia.org/wiki/Hesse%27s%20principle%20of%20transfer | In geometry, Hesse's principle of transfer () states that if the points of the projective line P1 are depicted by a rational normal curve in Pn, then the group of the projective transformations of Pn that preserve the curve is isomorphic to the group of the projective transformations of P1 (this is a generalization of the original Hesse's principle, in a form suggested by Wilhelm Franz Meyer). It was originally introduced by Otto Hesse in 1866, in a more restricted form. It influenced Felix Klein in the development of the Erlangen program. Since its original conception, it was generalized by many mathematicians, including Klein, Fano, and Cartan.
See also
Rational normal curve
Further reading
Hawkins, Thomas (1988). "Hesses's principle of transfer and the representation of lie algebras", Archive for History of Exact Sciences, 39(1), pp. 41–73.
References
Original reference
Hesse, L. O. (1866). "Ein Uebertragungsprinzip", Crelle's Journal.
Projective geometry
Invariant theory
Group theory
Symmetry
Birational geometry |
https://en.wikipedia.org/wiki/Batter%20board | Batter boards (or battre boards, Sometimes mispronounced as "battle boads") are temporary frames, set beyond the corners of a planned foundation at precise elevations. These batter boards are then used to hold layout lines (construction twine) to indicate the limits (edges and corners) of the foundation.
References
Construction |
https://en.wikipedia.org/wiki/Tommy%20Bonnesen | Tommy Bonnesen (27 March 1873 – 14 March 1935) was a Danish mathematician, known for Bonnesen's inequality.
Bonnesen studied at the University of Copenhagen, where in 1902 he received his Ph.D. (promotion) with thesis Analytiske studier over ikke-euklidisk geometri (Analytic studies of non-Euclidean geometry). He was the Professor for Descriptive Geometry at the Polytekniske Læreanstalt.
He did research on convex geometry and wrote a book on this subject with his student Werner Fenchel. Bonessen was an Invited Speaker at the ICM in 1924 in Toronto and in 1928 in Bologna.
With Harald Bohr he was for many years the co-editor-in-chief of the Matematisk Tidsskrift of the Danish Mathematical Society.
His younger daughter was the theatrical and cinematic star Beatrice Bonnesen (1906–1979). His elder daughter Merete Bonnesen (1901–1980) was a journalist employed by the newspaper Politiken.
Selected publications
Analytiske Studier over ikke-euklidisk Geometri, Kopenhagen 1902
with Werner Fenchel: Theorie der konvexen Körper, Springer 1934, English translation: Theory of convex bodies, Moscow (Idaho), BCS Associates 1987
Les Problèmes des Isopérimètres et des Isépiphanes, Paris, Gauthier-Villars 1929
Extréma liés, Kopenhagen 1931
Sources
Klaus Voss: Integralgeometrie für Stereologie und Bildrekonstruktion, Springer 2007, p.161
References
1873 births
1935 deaths
Geometers
20th-century Danish mathematicians
University of Copenhagen alumni
Academic staff of the Technical University of Denmark |
https://en.wikipedia.org/wiki/USBKill | USBKill is anti-forensic software distributed via GitHub, written in Python for the BSD, Linux, and OS X operating systems. It is designed to serve as a kill switch if the computer on which it is installed should fall under the control of individuals or entities against the desires of the owner. It is free software, available under the GNU General Public License.
The program's developer, who goes by the online name Hephaest0s, created it in response to the circumstances of the arrest of Silk Road founder Ross Ulbricht, during which U.S. federal agents were able to get access to incriminating evidence on his laptop without needing his cooperation by copying data from its flash drive after distracting him. It maintains a whitelist of devices allowed to connect to the computer's USB ports; if a device not on that whitelist connects, it can take actions ranging from merely returning to the lock screen to encrypting the hard drive, or wiping all data on the computer. However, it can also be used as part of a computer security regimen to prevent the surreptitious installation of malware or spyware or the clandestine duplication of files, according to its creator.
Background
When law enforcement agencies began making computer crime arrests in the 1990s, they would often ask judges for no knock search warrants, to deny their targets time to delete incriminating evidence from computers or storage media. In more extreme circumstances where it was likely that the targets could get advance notice of arriving police, judges would grant "power-off" warrants, allowing utilities to turn off the electricity to the location of the raid shortly beforehand, further forestalling any efforts to destroy evidence before it could be seized. These methods were effective against criminals who produced and distributed pirated software and movies, which was the primary large-scale computer crime of the era.
By the 2010s, the circumstances of computer crime had changed along with legitimate c |
https://en.wikipedia.org/wiki/Gomocup | Gomocup is a worldwide tournament of artificial intelligences (AI) playing Gomoku and Renju. The tournament has been played since 2000 and takes place every year. As of 2016, it is the most famous and largest Gomoku AI tournament in the world, with around 40 participants from about 10 countries.
Rules
Gomocup has been played in the freestyle Gomoku rule with the board size of 20 since it was started in 2000. In 2009, the standard Gomoku rule was added into Gomocup as a tournament, in which the board size is 15 and more than five in a row is not considered to be a win. In 2016, the Renju rule was also added into Gomocup, with a board size of 15 and forbidden moves for black. In particular, since there are a large number of participants in the freestyle Gomoku tournament, the freestyle Gomoku tournament is divided into several leagues, and the fast game tournament is introduced.
To get rid of the fact that there is a winning strategy for the player who plays first in Gomoku, balanced openings have been prepared by Gomoku experts since 2006. Games would be started from these balanced openings, and neither side would have a big advantage from the very beginning.
AI vs. Human Tournament
There were two AI vs. Human tournaments held in the Czech Republic in 2006 and 2011.
In 2006, the top 3 programs in Gomocup had a tournament with 3 of the top 10 players in Piškvorky online. There were 2 games between each pair of AI and human players. The result was one win, one draw and one loss for AIs, and the total score was 3:3.
In 2011, the tournament was between the top 4 programs in Gomocup and 4 players at the top of the Czech Gomoku rating list. Similar to the 1st tournament, there were 2 games between each pair of AI. This time there were 3 draws and 1 win for AIs, and the total score was 5:3.
Elo Rating
The Elo rating system for Gomocup was built in 2016 and calculated with all the historical tournament results ever since. The rating is calculated with the open-sour |
https://en.wikipedia.org/wiki/Tensor%20Processing%20Unit | Tensor Processing Unit (TPU) is an AI accelerator application-specific integrated circuit (ASIC) developed by Google for neural network machine learning, using Google's own TensorFlow software. Google began using TPUs internally in 2015, and in 2018 made them available for third party use, both as part of its cloud infrastructure and by offering a smaller version of the chip for sale.
Comparison to CPUs and GPUs
Compared to a graphics processing unit, TPUs are designed for a high volume of low precision computation (e.g. as little as 8-bit precision) with more input/output operations per joule, without hardware for rasterisation/texture mapping. The TPU ASICs are mounted in a heatsink assembly, which can fit in a hard drive slot within a data center rack, according to Norman Jouppi.
Different types of processors are suited for different types of machine learning models. TPUs are well suited for CNNs, while GPUs have benefits for some fully-connected neural networks, and CPUs can have advantages for RNNs.
History
The tensor processing unit was announced in May 2016 at Google I/O, when the company said that the TPU had already been used inside their data centers for over a year. The chip has been specifically designed for Google's TensorFlow framework, a symbolic math library which is used for machine learning applications such as neural networks. However, as of 2017 Google still used CPUs and GPUs for other types of machine learning. Other AI accelerator designs are appearing from other vendors also and are aimed at embedded and robotics markets.
Google's TPUs are proprietary. Some models are commercially available, and on February 12, 2018, The New York Times reported that Google "would allow other companies to buy access to those chips through its cloud-computing service." Google has said that they were used in the AlphaGo versus Lee Sedol series of man-machine Go games, as well as in the AlphaZero system, which produced Chess, Shogi and Go playing programs f |
https://en.wikipedia.org/wiki/Karlsruhe%20Accurate%20Arithmetic | Karlsruhe Accurate Arithmetic (KAA) or Karlsruhe Accurate Arithmetic Approach (KAAA), augments conventional floating-point arithmetic with good error behaviour with new operations to calculate scalar products with a single rounding error.
The foundations for KAA were developed at the University of Karlsruhe starting in the late 1960s.
See also
Ulrich W. Kulisch
References
Further reading
Computer arithmetic
Numerical analysis |
https://en.wikipedia.org/wiki/MyTuner%20Radio | myTuner Radio, or simply myTuner, is an Internet radio app directory/platform owned by AppGeneration – Software Technologies, Lda, a development company based in Porto, Portugal founded by Eduardo Carqueja in October 2010. myTuner Radio has over 50,000 radio stations and one million podcasts from all around the world (except in the UK where only UK stations are available). On June 7, 2017, AppGeneration announced that its service had over 30 million users and a database with radio stations of 200 countries. my Turner Radio platform is available for the web at mytuner-radio.com, for a suite of mobile apps: iOS, Google Play, Samsung, Huawei, Amazon, Windows Phone; for desktop devices: Web, Windows, and Mac, wearables: Apple Watch and Android Wearables, for connected devices like Apple TV, Samsung TVs, LG TVs, TV sets and set-top boxes with Android TV (Sony, Sharp, Philips, Mi Box, etc.), Amazon Fire TV, Roku TV and Chromecast, connected cars: Apple Carplay, Android Auto, Bosch mySPIN, Jaguar & Land Rover InControl Apps, and also on home appliances and smart speakers like Alexa and Sonos.
History
On April 27, 2012, myTuner Radio v1.0 was launched for iOS on the AppStore. This was the first version launched and the app was known as iTuner Radio app, owned by Digital Minds, a development company based in Coimbra, Portugal.
The Version 3 of the iOS app, brought a new and improved design and new features, such as the most popular podcasts in each country. It was launched on August 26, 2013.
During 2013, AppGeneration – Software Technologies, Lda acquired the software and started to change the brand's vision of a single app development to a multi-platform directory of Internet radio stations.
These changes were visible during 2014: in January it was launched for Android and in February it was rebranded as myTuner Radio and was launched to Mac OS X. During this year it was launched on several other platforms, including Windows Phone and Windows Desktop. The website my |
https://en.wikipedia.org/wiki/Triangulation%20%28surveying%29 | In surveying, triangulation is the process of determining the location of a point by measuring only angles to it from known points at either end of a fixed baseline by using trigonometry, rather than measuring distances to the point directly as in trilateration. The point can then be fixed as the third point of a triangle with one known side and two known angles.
Triangulation can also refer to the accurate surveying of systems of very large triangles, called triangulation networks. This followed from the work of Willebrord Snell in 1615–17, who showed how a point could be located from the angles subtended from three known points, but measured at the new unknown point rather than the previously fixed points, a problem called resectioning. Surveying error is minimized if a mesh of triangles at the largest appropriate scale is established first. Points inside the triangles can all then be accurately located with reference to it. Such triangulation methods were used for accurate large-scale land surveying until the rise of global navigation satellite systems in the 1980s.
Principle
Triangulation may be used to find the position of the ship when the positions of A and B are known. An observer at A measures the angle α, while the observer at B measures β.
The position of any vertex of a triangle can be calculated if the position of one side, and two angles, are known. The following formulae are strictly correct only for a flat surface. If the curvature of the Earth must be allowed for, then spherical trigonometry must be used.
Calculation
With being the distance between A and B gives:
Using the trigonometric identities tan α = sin α / cos α and sin(α + β) = sin α cos β + cos α sin β, this is equivalent to:
therefore:
From this, it is easy to determine the distance of the unknown point from either observation point, its north/south and east/west offsets from the observation point, and finally its full coordinates.
History
Triangulation today is used for |
https://en.wikipedia.org/wiki/Air-Cobot | Air-Cobot (Aircraft Inspection enhanced by smaRt & Collaborative rOBOT) is a French research and development project of a wheeled collaborative mobile robot able to inspect aircraft during maintenance operations. This multi-partner project involves research laboratories and industry. Research around this prototype was developed in three domains: autonomous navigation, human-robot collaboration and nondestructive testing.
Air-Cobot is presented as the first wheeled robot able to perform visual inspections of aircraft. Inspection robots using other types of sensors have been considered before, such as the European project Robair. Since the launch of the project, other solutions based on image processing began to be developed, such as EasyJet with a drone, the swarm of drones from Toulouse company Donecle and the Aircam project of the aerospace manufacturer Airbus.
Since the beginning of the project in 2013, the Air-Cobot robot is dedicated to inspect the lower parts of an aircraft. In the continuation of the project, there is the prospect of coupling with a drone to inspect an aircraft's upper parts. In October 2016, Airbus Group launched its research project on the hangar of the future in Singapore. The robots from the Air-Cobot and Aircam projects are included in it.
Project description
Objectives
Launched in January 2013, the project is part of the Interministerial Fund program of Aerospace Valley, a business cluster in southwestern France. With a budget of over one million euros, Air-Cobot aims to develop an innovative collaborative mobile robot, autonomous in its movements and able to perform the inspection of an aircraft with nondestructive testing sensors during preflight or during maintenance operations in a hangar. Testing has been performed at the premises of Airbus and Air France Industries.
Partners
The project leader is Akka Technologies. There are two academic partners; Akka Technologies and four other companies make up the five commercial partne |
https://en.wikipedia.org/wiki/Control-flow%20integrity | Control-flow integrity (CFI) is a general term for computer security techniques that prevent a wide variety of malware attacks from redirecting the flow of execution (the control flow) of a program.
Background
A computer program commonly changes its control flow to make decisions and use different parts of the code. Such transfers may be direct, in that the target address is written in the code itself, or indirect, in that the target address itself is a variable in memory or a CPU register. In a typical function call, the program performs a direct call, but returns to the caller function using the stack – an indirect backward-edge transfer. When a function pointer is called, such as from a virtual table, we say there is an indirect forward-edge transfer.
Attackers seek to inject code into a program to make use of its privileges or to extract data from its memory space. Before executable code was commonly made read-only, an attacker could arbitrarily change the code as it is run, targeting direct transfers or even do with no transfers at all. After W^X became widespread, an attacker wants to instead redirect execution to a separate, unprotected area containing the code to be run, making use of indirect transfers: one could overwrite the virtual table for a forward-edge attack or change the call stack for a backward-edge attack (return-oriented programming). CFI is designed to protect indirect transfers from going to unintended locations.
Techniques
Associated techniques include code-pointer separation (CPS), code-pointer integrity (CPI), stack canaries, shadow stacks, and vtable pointer verification.
Implementations
Related implementations are available in Clang (LLVM in general), Microsoft's Control Flow Guard and Return Flow Guard, Google's Indirect Function-Call Checks and Reuse Attack Protector (RAP).
LLVM/Clang
LLVM/Clang provides a "CFI" option that works in the forward edge by checking for errors in virtual tables and type casts. It depends on link-time |
https://en.wikipedia.org/wiki/Zettabox | Zettabox was a pan-European online cloud storage and team-sharing tool, created by co-founders James Kinsella and Robert McNeal. The company's operational headquarters was located in Prague, whilst the Sales and Marketing decisions are headed up in London.
At the time when Zettabox was founded, the total amount of worldwide data saved on networks had surpassed 1,000 Exabytes and entered a new era of sizing storage – Zettabytes (1 x 1021).
The company seems to be out of business.
EU Data Law Regulation
With the cloud team sharing and storage market heavily dominated by American-domiciled companies, such as Dropbox and Box.com, Zettabox was launched as the European alternative. The launch coincided with the news of the impending General Data Protection Regulation (part of the Digital Single Market strategy) which requires all companies doing business in Europe, to know where their data is stored and be able to communicate this information to their customers.
More recently, in 2018 and 2019, a series of privacy violations at Facebook and other social media companies has renewed calls for greater scrutiny of how the largest companies use and misuse users' data.
Zettabox has been described as being ‘an example of a genuinely European cloud storage solution’ in “The EU Data Protection Reform and Big Data Factsheet”. The European Commission cited Zettabox as the first major pan-European alternative to the US-based cloud storage products like Google Drive and Dropbox.
References
Cloud storage
Cloud computing providers |
https://en.wikipedia.org/wiki/Deflection%20yoke | A deflection yoke is a kind of magnetic lens, used in cathode ray tubes to scan the electron beam both vertically and horizontally over the whole screen.
In a CRT television, the electron beam is moved in a raster scan on the screen. By adjusting the strength of the beam current, the brightness of the light produced by the phosphor on the screen can be varied. The cathode ray tube allowed the development of all-electronic television.
Electromagnetic deflection yokes are also used in certain radar displays.
Magnetic compared to electrostatic deflection
Another way of deflecting an electron beam is to put two pairs of electrodes inside the CRT, after the electron gun structure. Electrostatic deflection is common in oscilloscope displays, because it is easier to drive deflection plates at high frequencies, compared to driving the large inductance of a deflection yoke. Compared with electrostatic deflection, magnetic deflection has fewer obstructions inside the tube and so allows for a larger-diameter electron beam, producing a brighter image. This is an advantage for a raster-scan display, which must cover the whole screen instead of one narrow trace as in an oscilloscope.
Additionally, magnetic deflection can be arranged to give a larger angle of deflection than electrostatic plates; this makes the CRT and resulting television receiver more compact. The angle of magnetic deflection, for a given deflection current, is inversely proportional to the square root of the CRT accelerating voltage, but in electrostatic deflection, the angle is inversely proportional to the accelerating voltage (for a particular value of deflection plate voltage). This has the practical effect that high accelerating voltages can be used without greatly increasing the power of the deflection amplifiers.
While a magnetic deflection yoke can be used to provide a random-access vector display image, the high inductance of the yoke windings requires powerful amplifiers that may be expensive |
https://en.wikipedia.org/wiki/IOS%2010 | iOS 10 is the tenth major release of the iOS mobile operating system developed by Apple Inc., being the successor to iOS 9. It was announced at the company's Worldwide Developers Conference on June 13, 2016, and was released on September 13, that year. It was succeeded by iOS 11 on September 19, 2017.
iOS 10 incorporates changes to 3D Touch and the lock screen. There are new features to some apps: Messages has additional emojis and third-party apps can extend functionality in iMessage, Maps has a redesigned interface and additional third-party functions, the Home app manages "HomeKit"-enabled accessories, Photos has algorithmic search and categorization of media known as "Memories," and Siri is compatible with third-party app-specific requests, such as starting workouts apps, sending IMs, using Lyft or Uber or to use payment functions. iOS 10 is the final version to support 32-bit devices and apps. In iOS 10.3, Apple introduced its new file system, APFS.
Reviews of iOS 10 were positive. Reviewers highlighted the significant updates to iMessage, Siri, Photos, 3D Touch, and the lock screen as welcome changes. The third-party extension support to iMessage meant it was "becoming a platform," although the user interface was criticized for being difficult to understand. Third-party integration in Siri was "great," although the voice assistant was criticized for not having become smarter than before. Reviewers were impressed with the image recognition technology in Photos, although noting it was still a "work in progress" with a higher error rate than the competition. 3D Touch "finally feels useful" and "works in almost every part of the OS." The lock screen was "far more customizable than before," and reviewers enjoyed that notification bubbles could be expanded to see more information without needing to unlock the phone.
A month after release, iOS 10 was installed on 54% of iOS devices, a "slightly slower migration" than for the release of iOS 9, speculated as being c |
https://en.wikipedia.org/wiki/Linear%20recurrence%20with%20constant%20coefficients | In mathematics (including combinatorics, linear algebra, and dynamical systems), a linear recurrence with constant coefficients (also known as a linear recurrence relation or linear difference equation) sets equal to 0 a polynomial that is linear in the various iterates of a variable—that is, in the values of the elements of a sequence. The polynomial's linearity means that each of its terms has degree 0 or 1. A linear recurrence denotes the evolution of some variable over time, with the current time period or discrete moment in time denoted as , one period earlier denoted as , one period later as , etc.
The solution of such an equation is a function of , and not of any iterate values, giving the value of the iterate at any time. To find the solution it is necessary to know the specific values (known as initial conditions) of of the iterates, and normally these are the iterates that are oldest. The equation or its variable is said to be stable if from any set of initial conditions the variable's limit as time goes to infinity exists; this limit is called the steady state.
Difference equations are used in a variety of contexts, such as in economics to model the evolution through time of variables such as gross domestic product, the inflation rate, the exchange rate, etc. They are used in modeling such time series because values of these variables are only measured at discrete intervals. In econometric applications, linear difference equations are modeled with stochastic terms in the form of autoregressive (AR) models and in models such as vector autoregression (VAR) and autoregressive moving average (ARMA) models that combine AR with other features.
Definitions
A linear recurrence with constant coefficients is an equation of the following form, written in terms of parameters and :
or equivalently as
The positive integer is called the order of the recurrence and denotes the longest time lag between iterates. The equation is called homogeneous if and nonhomo |
https://en.wikipedia.org/wiki/BLISS%20signature%20scheme | BLISS (short for Bimodal Lattice Signature Scheme) is a digital signature scheme proposed by Léo Ducas, Alain Durmus, Tancrède Lepoint and Vadim Lyubashevsky in their 2013 paper "Lattice Signature and Bimodal Gaussians".
In cryptography, a digital signature ensures that a message is authentically from a specific person who has the private key to create such a signature, and can be verified using the corresponding public key. Current signature schemes rely either on integer factorization, discrete logarithm or elliptic curve discrete logarithm problem, all of which can be effectively attacked by a quantum computer. BLISS on the other hand, is a post-quantum algorithm, and is meant to resist quantum computer attacks.
Compared to other post-quantum schemes, BLISS claims to offer better computational efficiency, smaller signature size, and higher security. A presentation once anticipated that BLISS would become a potential candidate for standardization, however it was not submitted to NIST.
Features
Lower Rejection Rate: As a Fiat-Shamir lattice signature scheme, BLISS improves upon previous ones by replacing uniform and discrete Gaussian sampling with bimodal samples, thereby reducing sampling rejection rate.
Memory-Efficient Gaussian Sampling: In the paper describing BLISS, the authors constructed a discrete Gaussian sampler of arbitrary standard deviation, from a sampler of a fixed standard deviation then rejecting samples based on pre-computed Bernoulli constants.
Signature Compression: As the coefficients of the signature polynomials are distributed according to discrete Gaussian, the final signature can be compressed using Huffman coding.
See also
Ring Learning with Errors
Ring Learning with Errors Signature
References
https://web.archive.org/web/20151006213007/http://bliss.di.ens.fr/
https://eprint.iacr.org/2013/383.pdf
http://csrc.nist.gov/groups/ST/post-quantum-2015/papers/session9-oneill-paper.pdf
External links
Post-quantum cryptography
Lattic |
https://en.wikipedia.org/wiki/MailEnable | MailEnable is a Windows-based, commercial email server distributed by MailEnable Pty. Ltd, an Australian-based software company which was established in 2002.
MailEnable's features include support for IMAP, POP3 and SMTP email protocols with SSL/TLS support, list server, anti-virus and anti-spam and webmail functionality. Administration functions can be performed using the Microsoft Management Console (MMC) or a web browser.
Groupware and collaboration functionality are provided by the use of MAPI, CalDAV, CardDAV, SyncML and Exchange ActiveSync protocols.
According to one survey in May 2016, MailEnable has the largest reported install base on the Windows platform, and ranked fourth all in the list of email servers visible on the internet behind exim, Postfix and Sendmail.
Product editions
There are four editions of MailEnable;
Standard (Free, fully functional, POP and SMTP server which also provides IMAP and webmail)
Professional (Content filtering and antivirus)
Enterprise (Collaboration/sharing, database and clustering)
Enterprise Premium (Mobile web administration and unlimited Outlook Client/MAPI connections)
Integration
Control panel support
MailEnable Standard Edition is installed by default with Plesk Control Panel.
Other supported control panel software includes Hosting Controller, Ensim and WebsitePanel.
Other
MailEnable integrates with the following content filtering providers;
MxScan - anti-spam and anti-virus filtering solution
MagicSpam - anti-spam solution
See also
List of mail server software
Message transfer agent
References
Email
Microsoft
Internet technology companies of Australia
Internet properties established in 2002
2002 establishments in Australia |
https://en.wikipedia.org/wiki/Material%20passport | A material passport is a digital document listing all the materials that are included in a product or construction during its life cycle in order to facilitate strategizing circularity decisions in supply chain management. Passports generally consists of a set of data describing defined characteristics of materials in products, which enables the identification of value for recovery, recycling and re-use. These passports have been adopted as a best practice for business process analysis and improvement in the widely applied supply chain operation reference (SCOR) by the association for supply chain management.
The core idea behind the concept is that a material passport will contribute to a more circular economy, in which materials are being recovered, recycled and/or re-used in an open-traded material market. The concept of the 'material passport’ is currently being developed by multiple parties in primarily European countries. Such a passport could make possible second-hand material markets or material banks in the future.
Similar types of passports for the circular economy are being developed by several parties under a variety of terminology. Other names for the material passport are:
Circularity passport
Cradle-to-cradle passport
Product passport
Closely related concepts, which share some of the life cycle registrations that passports also support, are the bill of materials, product life cycle management, digital twin, and ecolabels. The key difference in these concepts is that a passport provides an identity of a single identifiable object and acts as a certified interface to all life-cycle registrations a product is concerned with.
Significance
"According to United Nations estimates, construction accounts for some 50 percent of raw material consumption in Europe and 60 percent of waste."
Assuming that the earth is a closed system, this situation is objectively untenable. There is an urgent need to deal with raw materials in a more sophisticated manne |
https://en.wikipedia.org/wiki/Specialized%20pro-resolving%20mediators | Specialized pro-resolving mediators (SPM, also termed specialized proresolving mediators) are a large and growing class of cell signaling molecules formed in cells by the metabolism of polyunsaturated fatty acids (PUFA) by one or a combination of lipoxygenase, cyclooxygenase, and cytochrome P450 monooxygenase enzymes. Pre-clinical studies, primarily in animal models and human tissues, implicate SPM in orchestrating the resolution of inflammation. Prominent members include the resolvins and protectins.
SPM join the long list of other physiological agents which tend to limit inflammation (see ) including glucocorticoids, interleukin 10 (an anti-inflammatory cytokine), interleukin 1 receptor antagonist (an inhibitor of the action of pro-inflammatory cytokine, interleukin 1), annexin A1 (an inhibitor of formation of pro-inflammatory metabolites of polyunsaturated fatty acids, and the gaseous resolvins, carbon monoxide (see ), nitric oxide (see ), and hydrogen sulfide (see ).
The absolute as well as relative roles of the SPM along with other physiological anti-inflammatory agents in resolving human inflammatory responses remain to be defined precisely. However, studies suggest that synthetic SPM that are resistant to being metabolically inactivated hold promise of being clinically useful pharmacological tools for preventing and resolving a wide range of pathological inflammatory responses along with the tissue destruction and morbidity that these responses cause. Based on animal model studies, the inflammation-based diseases which may be treated by such metabolically resistant SPM analogs include not only pathological and tissue damaging responses to invading pathogens but also a wide array of pathological conditions in which inflammation is a contributing factor such as allergic inflammatory diseases (e.g. asthma, rhinitis), autoimmune diseases (e.g. rheumatoid arthritis, systemic lupus erythematosus), psoriasis, atherosclerosis disease leading to heart attacks and st |
https://en.wikipedia.org/wiki/Nasuni | Nasuni is a privately-held hybrid cloud storage company with headquarters in Boston, Massachusetts.
History
Nasuni was founded in 2008, and has raised approximately $169M, with the last funding a $25M investment in which all previous investors participated, including Goldman Sachs, Telstra Ventures, and Northbridge Venture Partners.
In the time since Nasuni requested a patent on UniFS in November 2013, the company has expanded its access to cloud storage infrastructure, as well as its on-premises edge appliance offerings, which provide local access to content stored in Nasuni-managed cloud storage.
On 14 July 2020, Nasuni Corp. collected $25 million in a new round of funding, plus an additional $15 million debt facility, and upgraded its cloud file storage platform to support remote workers.
In May 2022, Nasuni acquired the technology assets of DBM Cloud Systems in order to provide enhanced data migration and cloud portability features.
In June of 2022, Nasuni acquired Storage Made Easy, a file data management company, for an undisclosed sum.
Technology
The firm's storage software uses object storage, file caching appliances, and the company's proprietary UniFS global file system to offer a cloud solution that replaces traditional file servers and Network Attached Storage (NAS). Nasuni integrates with public cloud storage platforms, such as Google Cloud Storage, Amazon Web Services, and Microsoft Azure, and private cloud storage platforms such as IBM Cloud Object Storage and EMC Elastic Cloud Storage (ECS). Such storage platforms provide an object-based storage infrastructure, on top of which UniFS creates a complete versioned file system. The Nasuni platform stores customer data as a sequence of snapshots that include every version of every file. The firm has demonstrated the ability to store more than one billion objects in a single storage volume.
Nasuni Edge Appliances run in the public cloud or on-premises to provide shared access to cached copies of |
https://en.wikipedia.org/wiki/Base%20L%C3%A9onore | Base Léonore, or the Léonore database, is a French database that lists the records of the members of the National Order of the Legion of Honor. The database lists the records of those inducted into the Legion of Honor since its 1802 inception and who died before 1977.
, the database contained 390,000 records.
References
External links
Archives in France
History websites of France
Online databases
Recipients of the Legion of Honour |
https://en.wikipedia.org/wiki/Project%20Genoa%20II | Project Genoa II was a software project that originated with the United States Defense Advanced Research Projects Agency's Information Awareness Office and the successor to the Genoa program. Originally part of DARPA's wider Total Information Awareness project, it was later renamed Topsail and handed over to the Advanced Research and Development Activity for further development.
Program synopsis
Genoa II was scheduled to be a five-year-long program. It followed up on the research initiated by the first Genoa project. While Genoa primarily focused on intelligence analyses, Genoa II was aimed towards providing means with which computers, software agents, policy makers, and field operatives could collaborate. Eleven different contractors were involved in its development.
Mission
The official goals of Genoa II were to develop and deploy the following:
1. Cognitive aids that allow humans and machines to "think together" in real-time about complicated problems
2. Means to overcome the biases and limitations of the human cognitive system
3. "Cognitive amplifiers" that help teams of people rapidly and fully comprehend complicated and uncertain situations
4. The means to rapidly and seamlessly cut across – and complement – existing stove-piped hierarchical organizational structures by creating dynamic, adaptable, peer-to-peer collaborative networks
History
In 2002, Tom Armour, a veteran of the Genoa project, was selected by John Poindexter to be the director of the new Genoa II program, a component of Total Information Awareness (TIA) effort. It was commissioned under the cost of $54 million.
In late 2003 TIA was officially shut down by Congress due to unfavorable views from the public. Most of its research was salvaged and its components were transferred to other government agencies for development. Genoa II was renamed Topsail and handed over to the National Security Agency's Advanced Research and Development Activity division for further work. In October 2005, the |
https://en.wikipedia.org/wiki/Generating%20set%20of%20a%20module | In mathematics, a generating set Γ of a module M over a ring R is a subset of M such that the smallest submodule of M containing Γ is M itself (the smallest submodule containing a subset is the intersection of all submodules containing the set). The set Γ is then said to generate M. For example, the ring R is generated by the identity element 1 as a left R-module over itself. If there is a finite generating set, then a module is said to be finitely generated.
This applies to ideals, which are the submodules of the ring itself. In particular, a principal ideal is an ideal that has a generating set consisting of a single element.
Explicitly, if Γ is a generating set of a module M, then every element of M is a (finite) R-linear combination of some elements of Γ; i.e., for each x in M, there are r1, ..., rm in R and g1, ..., gm in Γ such that
Put in another way, there is a surjection
where we wrote rg for an element in the g-th component of the direct sum. (Coincidentally, since a generating set always exists, e.g. M itself, this shows that a module is a quotient of a free module, a useful fact.)
A generating set of a module is said to be minimal if no proper subset of the set generates the module. If R is a field, then a minimal generating set is the same thing as a basis. Unless the module is finitely generated, there may exist no minimal generating set.
The cardinality of a minimal generating set need not be an invariant of the module; Z is generated as a principal ideal by 1, but it is also generated by, say, a minimal generating set }. What is uniquely determined by a module is the infimum of the numbers of the generators of the module.
Let R be a local ring with maximal ideal m and residue field k and M finitely generated module. Then Nakayama's lemma says that M has a minimal generating set whose cardinality is . If M is flat, then this minimal generating set is linearly independent (so M is free). See also: Minimal resolution.
A more refined inform |
https://en.wikipedia.org/wiki/Fable%20Fortune | Fable Fortune was a free-to-play digital collectible card game set in the Fable universe. The game was released for Windows and Xbox One in February 2018, after an initial early access release. It was co-developed by Flaming Fowl Studios and Mediatonic. In late 2019, Flaming Fowl Studios announced their intent to cease work on further updates for the game, citing game's lacklustre performance on the market. The support for the game was finally discontinued on 4 March 2020.
Gameplay
Fable Fortune is a digital collectible card game.
Development and release
Development for the game began at Lionhead Studios 18 months prior to the studio's closure in April 2016. Microsoft offered the Fable license to Flaming Fowl Studios, an independent developer formed of former Lionhead staff to continue its development. Flaming Fowl turned to a Kickstarter crowdfunding campaign in May 2016, looking to raise £250,000 towards the game's development costs. The campaign failed its target and was cancelled in June. Flaming Fowl CEO Craig Oman cited difficulties in crowdfunding a free-to-play title, and the unfamiliar genre for the Fable universe as reasons for the failure. The game did however attract private funding, allowing its development to continue. The game was released as early access for Windows and Xbox One in July 2017, and was co-developed by Flaming Fowl Studios and Mediatonic. The game launched out of early access on 22 February 2018.
Reception
Fable Fortune received a mixed reception from critics.
References
2018 video games
Cooperative video games
Early access video games
Free-to-play video games
Digital collectible card games
Video games developed in the United Kingdom
Video games with cross-platform play
Windows games
Xbox One games
Xbox Play Anywhere games
Crowdfunding projects
Mediatonic games
Flaming Fowl Studios games |
https://en.wikipedia.org/wiki/MPEG%20Common%20Encryption | MPEG Common Encryption (abbreviated MPEG-CENC) refers to a set of two MPEG standards governing different container formats:
for ISOBMFF, Common encryption in ISO base media file format files (ISO/IEC 23001-7:2016)
for MPEG-TS, Common encryption of MPEG-2 transport streams (ISO/IEC 23001-9:2016)
The specifications are compatible, so that conversion between the encrypted formats can happen without re-encryption.
They define metadata, specific to each format, about which parts of the stream are encrypted and by which encryption scheme. Each encryption scheme may have different methods to retrieve the decryption key.
Availability of the Standards
The standards can be purchased from iso.org, on paper and in digital forms. As of July 2016, the prices were 118 Swiss franc (US$122) for the ISOBMFF version, and 58 Swiss franc (US$60) for the TS version. An included copyright notice prohibits redistribution without written permission, also on local area networks. Each page is watermarked with the purchaser's name and company.
References
External links
"cenc" Initialization Data Format – a rough description, specific to ISOBMFF, of the Clear Key encryption scheme, intended for use in Encrypted Media Extensions
MPEG
Digital rights management standards |
https://en.wikipedia.org/wiki/Interleukin-38 | Interleukin-38 (IL-38) is a member of the interleukin-1 (IL-1) family and the interleukin-36 (IL-36) subfamily. It is important for the inflammation and host defense. This cytokine is named IL-1F10 in humans and has similar three dimensional structure as IL-1 receptor antagonist (IL-1Ra). The organisation of IL-1F10 gene is conserved with other members of IL-1 family within chromosome 2q13. IL-38 is produced by mammalian cells may bind the IL-1 receptor type I. It is expressed in basal epithelia of skin, in proliferating B cells of the tonsil, in spleen and other tissues. This cytokine is playing important role in regulation of innate and adaptive immunity.
Discovery
IL-38 probably originated from a common ancestral gene - an ancient IL-1RN gene. This cytokine has 41% homology with IL-1Ra and 43% homology with IL-36Ra. IL-38 is expressed in skin, spleen, tonsil, thymus, heart, placenta and fetal liver. In tissues which do not play a special role in immune response, IL-38 is expressed in low quantity similar to other members of the IL-1 family. In disease setting, specially when the activation of inflammatory response is dysregulated, the expression of IL-38 is changed. For example, in case of spondylitis ankylopoetica, cardiovascular disease, rheumatoid arthritis or hidradenitis suppurativa.
Processing and signaling
According to consensus of cleaving site of IL-1 family, it is predicted that two amino acids (AA) should be removed to generate a processed 3-152AA IL-38 protein. The protease which cleaves IL-38 is still unknown as well as it is still not known which form of IL-38 is the natural variant present in the human body. It was reported that 20-152AA IL-38 form has increased biological activity.
IL-38 has non-characteristic dose-response curve and it binds to IL-36R (IL-1R6). This cytokine is blocking Candida-induced interleukin-17 (IL-17) response better in low concentration than in higher concentration even if induction of cytokine is not blocked. So it |
https://en.wikipedia.org/wiki/Bootstrap%20percolation | In statistical mechanics, bootstrap percolation is a percolation process in which a random initial configuration of active cells is selected from a lattice or other space, and then cells with few active neighbors are successively removed from the active set until the system stabilizes. The order in which this removal occurs makes no difference to the final stable state.
When the threshold of active neighbors needed for an active cell to survive is high enough (depending on the lattice), the only stable states are states with no active cells, or states in which every cluster of active cells is infinitely large. For instance, on the square lattice with the von Neumann neighborhood, there are finite clusters with at least two active neighbors per cluster cell, but when three or four active neighbors are required, any stable cluster must be infinite. With three active neighbors needed to stay active, an infinite cluster must stretch infinitely in three or four of the possible cardinal directions, and any finite holes it contains will necessarily be rectangular. In this case, the critical probability is 1, meaning that when the probability of each cell being active in the initial state is anything less than 1, then almost surely there is no infinite cluster. If the initial state is active everywhere except for an square, within which one cell in each row and column is inactive, then these single-cell voids will merge to form a void that covers the whole square if and only if the inactive cells have the pattern of a separable permutation. In any higher dimension, for any threshold, there is an analogous critical probability below which all cells almost surely become inactive and above which some clusters almost surely survive.
Bootstrap percolation can be interpreted as a cellular automaton, resembling Conway's Game of Life, in which live cells die when they have too few live neighbors. However, unlike Conway's Life, cells that have become dead never become alive again |
https://en.wikipedia.org/wiki/Iranian%20Parliament%20Commission%20on%20Energy | The Iranian Parliament Committee on Energy (), or Energy Committee is a standing committee of the Islamic Consultative Assembly of Representatives. The Parliament Committee on Energy has general Oil, gas, electricity, water and electric dams and power plants, nuclear power and renewable energy and it can recommend funding appropriations for various governmental agencies, programs, and activities, as defined by House rules. in the 11th parliament; Fereidon Hasanvand was president, Qasem Saedi first deputy and Ahmad Moradi second deputy.
See also
Specialized Commissions of the Parliament of Iran
Joint Commission of the Islamic Consultative Assembly
Special Commission of the Islamic Consultative Assembly
The history of the parliament in Iran
Internal Regulation Commission of the Islamic Consultative Assembly
References
Committees of the Iranian Parliament
Energy in Iran
Energy organizations |
https://en.wikipedia.org/wiki/List%20of%20biological%20development%20disorders |
References
Bibliography
Reece JB, Urry LA, Cain ML, Wasserman SA, Minorsky PV, Jackson RB. Campbell Biology (10th ed.). Addison Wesley Longman; 2014.
Lists of diseases
Disability-related lists
Biological nomenclature
Medical terminology
Lists of biology lists |
https://en.wikipedia.org/wiki/Warsaw%20rectifier | The Warsaw rectifier is a pulse-width modulation (PWM) rectifier, invented by Włodzimierz Koczara in 1992.
Features
The Warsaw Rectifier provides following features:
Unity power factor
Three-wire input, does not require connection to the neutral wire
Ohmic behaviour
Controlled output voltage
Simple control scheme
Low power losses
Unique features of the Warsaw Rectifier:
Short circuits do not cause current flow through switches
No cross short circuit of switches possible
Dead time not required
Topology
Warsaw Rectifier is a unidirectional, three-phase, three-switch two-level PWM rectifier. This topology uses three transistors and eighteen diodes. The bidirectional switches (made as four diodes and one transistor circuit) are connected in a delta topology. The rectifier output does not require a divided DC-link circuit as in the Vienna Rectifier topology.
See also
Vienna rectifier
References
Electronic circuits
Rectifiers |
https://en.wikipedia.org/wiki/Ptolemaic%20graph | In graph theory, a Ptolemaic graph is an undirected graph whose shortest path distances obey Ptolemy's inequality, which in turn was named after the Greek astronomer and mathematician Ptolemy. The Ptolemaic graphs are exactly the graphs that are both chordal and distance-hereditary; they include the block graphs and are a subclass of the perfect graphs.
Characterization
A graph is Ptolemaic if and only if it obeys any of the following equivalent conditions:
The shortest path distances obey Ptolemy's inequality: for every four vertices , , , and , the inequality holds. For instance, the gem graph (3-fan) in the illustration is not Ptolemaic, because in this graph , greater than .
For every two overlapping maximal cliques, the intersection of the two cliques is a separator that splits the differences of the two cliques. In the illustration of the gem graph, this is not true: cliques and are not separated by their intersection, , because there is an edge that connects the cliques but avoids the intersection.
Every -vertex cycle has at least diagonals.
The graph is both chordal (every cycle of length greater than three has a diagonal) and distance-hereditary (every connected induced subgraph has the same distances as the whole graph). The gem shown is chordal but not distance-hereditary: in the subgraph induced by , the distance from to is 3, greater than the distance between the same vertices in the whole graph. Because both chordal and distance-hereditary graphs are perfect graphs, so are the Ptolemaic graphs.
The graph is chordal and does not contain an induced gem, a graph formed by adding two non-crossing diagonals to a pentagon.
The graph is distance-hereditary and does not contain an induced 4-cycle.
The graph can be constructed from a single vertex by a sequence of operations that add a new degree-one (pendant) vertex, or duplicate (twin) an existing vertex, with the exception that a twin operation in which the new duplicate vertex is not adjacent to its |
https://en.wikipedia.org/wiki/Visual%20indexing%20theory | Visual indexing theory, also known as FINST theory, is a theory of early visual perception developed by Zenon Pylyshyn in the 1980s. It proposes a pre-attentive mechanism (a ‘FINST’) whose function is to individuate salient elements of a visual scene, and track their locations across space and time. Developed in response to what Pylyshyn viewed as limitations of prominent theories of visual perception at the time, visual indexing theory is supported by several lines of empirical evidence.
Overview
Fingers of instantiation
'FINST' abbreviates ‘FINgers of INSTantiation’. Pylyshyn describes visual indexing theory in terms of this analogy. Imagine, he proposes, placing your fingers on five separate objects in a scene. As those objects move about, your fingers stay in respective contact with each of them, allowing you to continually track their whereabouts and positions relative to one another. While you may not be able to discern in this way any detailed information about the items themselves, the presence of your fingers provides a reference via which you can access such information at any time, without having to relocate the objects within the scene. Furthermore, the objects' continuity over time is inherently maintained — you know the object referenced by your pinky finger at time t is the same object as that referenced by your pinky at t−1, regardless of any spatial transformations it has undergone, because your finger has remained in continuous contact with it.
Visual indexing theory holds that the visual perceptual system works in an analogous way. FINSTs behave like the fingers in the above scenario, pointing to and tracking the location of various objects in visual space. Like fingers, FINSTs are:
Plural. Multiple objects can be independently indexed and tracked by individual FINSTs simultaneously.
Adhesive. As indexed objects move around in the visual scene, their FINSTs move with them.
Opaque to the features of the objects they index. FINSTs reference |
https://en.wikipedia.org/wiki/Dead%20by%20Daylight | Dead by Daylight is an online asymmetric multiplayer survival horror game developed by Canadian studio Behaviour Interactive. It is a one-versus-four game in which one player takes on the role of a Killer and the other four play as Survivors; the Killer must impale each Survivor on sacrificial hooks to appease a malevolent force known as the Entity, while the Survivors have to avoid being caught and power up the exit gates by working together to fix five generators.
The game was released for Windows in 2016; PlayStation 4 and Xbox One in 2017; Switch in 2019; and Android, iOS, PlayStation 5, Stadia, and Xbox Series X/S in 2020. It became Steam Deck Verified in 2023. Swedish studio Starbreeze Studios published the game from 2016 through 2018, when Behaviour Interactive bought the publishing rights. Italian company 505 Games publishes the Nintendo Switch version, while Austrian company Deep Silver publishes physical copies for the PlayStation 5 and Xbox Series X/S versions. The game received mixed reviews upon release, though it was a commercial success and has since attracted more than 50 million players. A film adaptation is currently in development by Blumhouse Productions and Atomic Monster.
Gameplay
Dead by Daylight is an asymmetrical horror game where one player is the Killer and the other four are Survivors. Matches are referred to as trials. The Survivors' objective is to escape the trial by repairing five of seven generators scattered throughout it to power the two exit gates. The Killer must impale all Survivors on hooks before they escape, which will cause them to be sacrificed to a malevolent force known as the Entity. If only one Survivor remains, an open escape hatch appears at a random location on the map. If the Killer closes the hatch or an exit gate is opened, the "Endgame Collapse" begins and the Survivors must escape within two minutes, with the timer being extended if there are any incapacitated or hooked Survivors. When the timer ends, any re |
https://en.wikipedia.org/wiki/International%20Technical%20Development%20Center | The International Technical Development Center (ITDC, German Internationales Technisches Entwicklungszentrum ITEZ) is one of the engineering and design centers of Groupe PSA, and was the main engineering and design centre of General Motors in Europe, having been sold with the complete Opel/Vauxhall automobile business and the two brands Opel and Vauxhall to the Groupe PSA by August 1, 2017.
Structure
It is situated in Rüsselsheim am Main (Ruesselsheim) in the Frankfurt Rhine-Main of Hesse, Germany. It is situated next to the Opel Rüsselsheim Plant, separated only by the Mainbahn railway line. Next to it is the European Design Center, and also the Opel business administration.
Function
It is one of PSA's technical development and design centers in Europe, being formerly the main design centre for General Motors in Europe. It has been assigned the leading role as "Competence Center" in a number of areas, among them alternative fuels and adaptation for the US market. On April 4, 2018 PSA and Opel announced that a group in the ITEZ would lead the development of a special platform for Light Commercial Vehicles and lead future LCV development from conception to production.
References
External links
Opel plant Rüsselsheim
Buildings and structures in Hesse
Engineering research institutes
General Motors facilities
Research institutes in Germany
Rüsselsheim
Vauxhall Motors
Opel |
https://en.wikipedia.org/wiki/Brighton%20and%20Lewes%20Downs%20Biosphere%20Reserve | The Brighton and Lewes Downs Biosphere Reserve (established 2014) is a UNESCO Biosphere Reserve located in Sussex on the southeast coast of England near the city of Brighton and Hove. Forming a central unit of the hills of the South Downs National Park, it is centred on the Brighton chalk block that lies between the River Adur in the west and the River Ouse in the east. Chalk downland makes up the principal terrestrial landscape of the area, bounded at each end by the two river valleys. The coastline is dominated by high chalk cliffs in the east and urbanized plains in the west, running to the estuary of the River Adur at Shoreham-by-Sea.
Area
The reserve's surface area is . The core area is , surrounded by buffer zone(s) of and transition area(s) of .
Ecological characteristics
Brighton and Lewes Downs Biosphere Reserve is found within the temperate broadleaf forests biome of the Palearctic realm's British Island province and includes the following habitats: coastal chalk cliffs, sub-tidal chalk reef, freshwater wetland, shingle beaches, deciduous woodland, river estuaries and chalk grassland.
Three distinct but interrelated environments make up the biosphere reserve area; rural, coastal and marine, and urban. The rural environment contains lowland chalk grassland which is one of the richest wildlife habitats in the country and particularly important for its high botanical species diversity with up to 40-50 vascular plant species per square meter. It also supports the invertebrate communities, notably butterflies with 20 species having a substantial proportion of their breeding populations within this habitat. Characteristic species include: Phyteuma orbiculare, Wart-biter (Decticus verrucivorus), and Adonis blue butterfly (Lysandra bellargus). The coastal and marine environments are made up of a moderately exposed coast and inshore area of the English Channel with cliffs providing nesting niches for birds such as Northern fulmar (Fulmarus glacialis). The d |
https://en.wikipedia.org/wiki/Tripe%20Marketing%20Board | The Tripe Marketing Board is a UK based online publication which seeks to promote the consumption of tripe through the use of humour. The Los Angeles Times has described the group as an "internet and publishing phenomenon that may or may not be completely serious". It parodies defunct government organisations such as the milk and potato marketing boards.
History
The group came to prominence in 2012 when it managed to persuade a number of serious media outlets that it was a real entity. The Mirror interviewed a tripe seller in Blackburn about the attempt to improve the public perception of tripe. Reporters at The Times newspaper investigated the TMB a number of days later, concluding that it was a 'very funny spoof'.
The Lancashire Life website explained that the Tripe Marketing Board had been created by the authors of a humorous guide called Forgotten Lancashire and Parts of Cheshire and the Wirral by Dr Derek J Ripley, and had then been taken seriously by journalists.
It advocates the celebration of World Tripe Day on 24 October because in 1662 Samuel Pepys wrote on that day "So home and dined there with my wife upon a most excellent dish of tripes of my own directing."
See also
Dobrada (food)
Tripas
Tripas à moda do Porto
References
External links
Official website
Online publishing
Offal
Trade associations based in the United Kingdom
British comedy websites |
https://en.wikipedia.org/wiki/Chloridometer | A chloridometer is a measuring instrument used to determine the concentration of chloride ions (Cl–) in a solution. It uses a process known as coulometric titration or amperostatic coulometry, the accepted electrochemistry reference method to determine the concentration of chloride in biological fluids, including blood serum, blood plasma, urine, sweat, and cerebrospinal fluid. The coulometry process generates silver ions, which react with the chloride to form silver chloride (AgCl).
The first chloridometer was designed by a team led by Ernest Cotlove in 1958.
Other methods to determine chloride concentration include photometric titration and isotope dilution mass spectrometry.
Operation
An amperostat delivers a constant current of about 6—8 mA to the generator electrodes for the titration of the solution, and a digital timer is started. A second pair of silver electrodes are used as a detector to measure the conductance of the solution. The same constant current is known to titrate a given number of moles of a chloride standard solution in time . Titration of the assay solution will result in the generation of insoluble silver chloride until the chloride ions are consumed, after which time an increase in silver ions will be detected at the detector electrodes. This time, , is the titration time of the solution being measured. The concentration of chloride ions in this solution is then calculated as:
Although the absolute quantity of silver ions () required to react with the chloride ions can be determined using Faraday's laws of electrolysis, in practice calibration is required.
Silver ions are generated by oxidation at the anode when an electric potential is applied across the silver electrodes. This is the anodic reaction.
The silver ions enter the solution at a rate proportional to the electrical current. Because the current is constant, the rate of silver ion production is hence proportional to the time of current flow, and silver ions enter the solutio |
https://en.wikipedia.org/wiki/Phasor%20%28radio%20broadcasting%29 | A phasor is a network of capacitors and variable inductors used to adjust the relative amplitude and phase of the current being distributed to each tower in a directional array. A typical phasor has separate controls to adjust the phase of the current going to each tower, adjustable power divider controls, and a common point impedance matching network to adjust the system input impedance to 50 ohms with no reactance without disturbing the phase or amplitude of the tower currents.
References
Radio electronics |
https://en.wikipedia.org/wiki/True%20DC | True DC is a type of Switch Disconnect (Isolator) used in Solar Photovoltaic installations; in accordance with EN 60364-7-712. Pioneered by UK based IMO Precision Controls Ltd, and later adopted by other manufacturers such as Senton and ABB. The isolator design ensures a very fast break/make action by incorporating a user independent switching action. As the handle is moved, it interacts with a spring mechanism causing the contacts to "SNAP" over upon reaching a set point. This mechanism means that the disconnection of the load circuits and the suppression of the electrical arc, produced by a constant DC load, is normally extinguished in a maximum of 5 MS using the specific pole suppression chambers incorporated into the design.
Many alternative solutions, particularly those based upon an AC Switch Disconnect design which use bridge contacts, have been modified and rated for DC operation. These types of product have a switching speed that is directly linked to the operator speed, therefore slow operation of the handle results in slow contact separation of the contacts which can produce arcing times of 100 MS or more. Additionally in these switches, the contact surface is also the surface upon which electrical arcs tend to form; therefore any surface damage or shooting caused by arcing is likely to have a detrimental effect on the isolators contact resistance and its longevity.
TRUE DC Solar Isolators use a rotary knife contact mechanism so when the unit is operated, the handle movement gives a double make/break per contact set. As DC load switching creates electrical arcing, the design is such that this only occurs on the corners of the switching parts meaning that the main contact is made on an area where no arcing has occurred. The rotary contact mechanism methodology used in TRUE DC solar isolators means that when the isolator is operated, a self-cleaning action occurs on the arcing points and contact surfaces thereby producing good high-vibration resistant con |
https://en.wikipedia.org/wiki/Yurii%20Egorov | Yurii (or Yuri) Vladimirovich Egorov (Юрий Владимирович Егоров, born 14 July 1938 in Moscow, died October 2018 in Toulouse) was a Russian-Soviet mathematician who specialized in differential equations.
Biography
In 1960 he completed his undergraduate studies at the Mechanics and Mathematics Faculty of Moscow State University (MSU). In 1963 from MSU he received his Ph.D. with the thesis "Некоторые задачи теории оптимального управления в бесконечномерных пространствах" ("Some Problems of Optimal Control Theory in Infinite-Dimensional Spaces"). In 1970 from MSU he received his Russian doctorate of sciences (Doctor Nauk) with thesis: "О локальных свойствах псевдодифференциальных операторов главного типа" ("Local Properties of Pseudodifferential Operators of Principal Type"). He was employed at MSU from 1961 to 1992, and he was a full professor in the Department of Differential Equations of the Mechanics and Mathematics Faculty there from 1973 to 1992. Since 1992 he has been a professor of mathematics at Paul Sabatier University (Toulouse III).
Egorov's research deals with differential equations and applications in mathematical physics, spectral theory, and optimal control theory. In 1970 he was an Invited Speaker of the ICM in Nice.
Awards
1981 — Lomonosov Memorial Prize (established in 1944) — for his series of publications on "Субэллиптические операторы и их применения к исследованию краевых задач" (Subelliptic operators and their applications to the study of boundary value problems)
1988 — USSR State Prize (with several co-authors) — for their series of publications (1958–1985) on "Исследования краевых задач для дифференциальных операторов и их приложения в математической физике" (Research on boundary value problems and their applications in mathematical physics)
1998 — Petrovsky Award (jointly with V. A. Kondratiev) for their series of publications on "Исследование спектра эллиптических операторов" (The study of the spectra of elliptic operators)
Selected p |
https://en.wikipedia.org/wiki/IBM%20PS/55 | The or PS/55 is a personal computer series released from IBM Japan in 1987.
The PS/55 is the successor to IBM 5550 (Multistation 5550), but its architecture is based upon IBM PS/2. The first line-up of the series consisted of rebranded 5550 models except the Model 5570-S which was based on the PS/2 Model 80 (IBM 8580). Unlike the PS/2, most PS/2-based models have a 32-bit (80386 or 80486) CPU and Micro Channel (MCA) bus for the high-end business computing market. IBM Japan was hesitating to sell personal computers for consumers because the IBM JX failed. The AT bus model was released for home users in 1991.
Features
Display Adapter
The MCA video card called Display Adapter has a Japanese font containing nearly 7,000 glyphs stored in its ROM, which enables PS/2-based computers to display Japanese text without loading the font into memory. Similar to the IBM 5550, the display resolution in character mode is 1040×725 pixels (12×24 and 24×24 pixel Mincho font, 80×25 text) in 8 colors. The graphics mode is 1024×768 pixels in 16 colors. This is the same resolution as 8514/A and XGA/A, but not compatible.
The first Display Adapter was installed in the model 5570-S, also known as the first Micro Channel machine of PS/55. It had a compatibility problem with PS/2 applications. Since the model 5550-S released in 1988, the Display Adapter II that improved the PS/2 compatibility was introduced. In the boot sequence, the Display Adapter enables VGA on the motherboard, and it passes the video signal from the motherboard to adapter's VGA connector. When using Japanese DOS, VGA is disabled, and the Display Adapter switches its video selector from VGA to own video chip. In addition, it added the 256 color mode (1024×768 pixels in 256 colors chosen from 262,144 colors). The adapter has 1 MB of video RAM, and 256 KB of RAM for user-defined characters.
Most PS/2-based models have compatibility with the Display Adapter II. VGA and the following display modes are supported:
1040 |
https://en.wikipedia.org/wiki/GEOVIA | Dassault Systèmes GEOVIA is a set of geologic modeling and mining engineering software applications developed by the French engineering software company Dassault Systèmes. Formerly known as Gemcom, the company was founded in 1985 as a spin-off from by mining consultants SRK Consulting, with headquarters in Vancouver, British Columbia, Canada.
References
Geology software
Mining engineering |
https://en.wikipedia.org/wiki/Kit%20Parker | Kevin Kit Parker is a lieutenant colonel in the United States Army Reserve and the Tarr Family Professor of Bioengineering and Applied Physics at Harvard University. His research includes cardiac cell biology and tissue engineering, traumatic brain injury, and biological applications of micro- and nanotechnologies. Additional work in his laboratory has included fashion design, marine biology, and the application of counterinsurgency methods to countering transnational organized crime.
Early life and education
Parker attended Boston University's College of Engineering and graduated in 1989. He earned a Master of Science degree in 1993 and a doctoral degree in applied physics in 1998 from Vanderbilt University.
Military career
Parker is a paratrooper who has served in the United States Army since 1992. After the September 11 attacks, he served two tours of duty in Afghanistan.
In addition to his combat tours, Parker conducted two missions into Afghanistan as part of the Gray Team in 2011.
Civilian career
Initially, at Harvard the focus of his research was heart muscle cells. He turned to traumatic brain injury in 2005 after realizing that an Army friend of his, who had received injuries in an IED blast in Iraq in 2005, was suffering from an undiagnosed medical condition rather than a psychological problem.
Other research of Parker's includes designing camouflage using skin cells of cuttlefish and the use of a cotton candy machine to make dressings for wounds.
Parker served on the Defense Science Research Council for nearly a decade, the Defense Science Board Task Force on Autonomy, and has consulted to other US government agencies as well as the medical device and pharma industry.
In 2011, Parker headed Harvard's committee for reintroducing ROTC at the university.
In July 2016, it was announced that The Disease Biophysics Group at Harvard, led by Kit Parker, created a tissue-engineered soft-robotic ray that swims using wave-like fin motions, and turns acc |
https://en.wikipedia.org/wiki/AoS%20and%20SoA | In computing, an array of structures (AoS), structure of arrays (SoA) or array of structures of arrays (AoSoA) are contrasting ways to arrange a sequence of records in memory, with regard to interleaving, and are of interest in SIMD and SIMT programming.
Structure of arrays
Structure of arrays (SoA) is a layout separating elements of a record (or 'struct' in the C programming language) into one parallel array per field. The motivation is easier manipulation with packed SIMD instructions in most instruction set architectures, since a single SIMD register can load homogeneous data, possibly transferred by a wide internal datapath (e.g. 128-bit). If only a specific part of the record is needed, only those parts need to be iterated over, allowing more data to fit onto a single cache line. The downside is requiring more cache ways when traversing data, and inefficient indexed addressing.
For example, to store N points in 3D space using a structure of arrays:
struct pointlist3D {
float x[N];
float y[N];
float z[N];
};
struct pointlist3D points;
float get_point_x(int i) { return points.x[i]; }
Array of structures
Array of structures (AoS) is the opposite (and more conventional) layout, in which data for different fields is interleaved.
This is often more intuitive, and supported directly by most programming languages.
For example, to store N points in 3D space using an array of structures:
struct point3D {
float x;
float y;
float z;
};
struct point3D points[N];
float get_point_x(int i) { return points[i].x; }
Array of structures of arrays
Array of structures of arrays (AoSoA) or tiled array of structs is a hybrid approach between the previous layouts, in which data for different fields is interleaved using tiles or blocks with size equal to the SIMD vector size. This is often less intuitive, but can achieve the memory throughput of the SoA approach, while being more friendly to the cache locality and load port architectures of modern proce |
https://en.wikipedia.org/wiki/4D%20vector | In computer science, a 4D vector is a 4-component vector data type. Uses include homogeneous coordinates for 3-dimensional space in computer graphics, and red green blue alpha (RGBA) values for bitmap images with a color and alpha channel (as such they are widely used in computer graphics). They may also represent quaternions (useful for rotations) although the algebra they define is different.
Computer hardware support
Some microprocessors have hardware support for 4D vectors with instructions dealing with 4 lane single instruction, multiple data (SIMD) instructions, usually with a 128-bit data path and 32-bit floating point fields.
Specific instructions (e.g., 4 element dot product) may facilitate the use of one 128-bit register to represent a 4D vector. For example, in chronological order: Hitachi SH4, PowerPC VMX128 extension, and Intel x86 SSE4.
Some 4-element vector engines (e.g., the PS2 vector units) went further with the ability to broadcast components as multiply sources, and cross product support. Earlier generations of graphics processing unit (GPU) shader pipelines used very long instruction word (VLIW) instruction sets tailored for similar operations.
Software support
SIMD use for 4D vectors can be conveniently wrapped in a vector maths library (commonly implemented in C or C++)
commonly used in video game development, along with 4×4 matrix support. These are distinct from more general linear algebra libraries in other domains focussing on matrices of arbitrary size. Such libraries sometimes support 3D vectors padded to 4D or loading 3D data into 4D registers, with arithmetic mapped efficiently to SIMD operations by per platform intrinsic function implementations. There is choice between AOS and SOA approaches given the availability of 4 element registers, versus SIMD instructions that are usually tailored toward homogenous data.
Shading languages for graphics processing unit (GPU) programming usually have a 4D datatypes (along with 2D, 3D) w |
https://en.wikipedia.org/wiki/Holmes%20%28computer%29 | Holmes is a cognitive computing system developed by the Indian technology corporation Wipro and announced in 2016. Its name is a reference to IBM's Watson, and is a backronym for "Heuristics and Ontology-based Learning Machines and Experiential Systems".
Its uses include development of digital virtual agents, predictive systems, cognitive process automation, visual computing applications, knowledge virtualization, robotics and drones. The HOLMES platform Vision was created by Ramprasad K.R. (Rampi), he was the chief technologist for AI at Wipro.
References
External links
Natural language processing software
One-of-a-kind computers |
https://en.wikipedia.org/wiki/Spatiomap | A spatiomap is a document similar to a map, but based on an orthophoto. Often, some annotations are added to the orthophoto. Similar to normal maps, can display a north arrow, a scale bar and cartographical information like the used projection. Spatiomaps are useful when other reliable source are missing for a certain area and/or when a map must be produced in very short time (e.g. for disaster management). Spatiomaps are frequently used during disaster relief.
An image map or orthophotomap is a similar document, but is mostly regarded as an orthophotomosaic with some points, lines or polygon layers of a traditional map drawn over the orthophoto. An image map resembles a standard general purpose map but adds the use of an orthophotomosaic as a background.
References
Map types
Geodesy
Geography terminology |
https://en.wikipedia.org/wiki/Shadowsocks | Shadowsocks is a free and open-source encryption protocol project, widely used in China to circumvent Internet censorship. It was created in 2012 by a Chinese programmer named "clowwindy", and multiple implementations of the protocol have been made available since. Shadowsocks is not a proxy on its own, but (typically) is the client software to help connect to a third-party SOCKS5 proxy, which is similar to a Secure Shell (SSH) tunnel. Once connected, internet traffic can then be directed through the proxy. Unlike an SSH tunnel, shadowsocks can also proxy User Datagram Protocol (UDP) traffic.
Takedown
On 22 August 2015, "clowwindy" announced in a GitHub thread that they had been contacted by the police and could no longer maintain the project. The code of the project was subsequently branched with a removal notice. Three days later, on 25 August, another proxy application, GoAgent, also had its GitHub repository removed. The removal of the projects got media's attention, with news outlets speculating about the possible connection between the takedowns and a distributed-denial-of-service attack targeting GitHub that happened several days later. Danny O'Brien, from Electronic Frontier Foundation, published a statement on the matter.
Despite the takedown, collaborators of the project have continued the development of the project.
Server implementations
The original Python implementation can still be installed with Pip (package manager), but the contents of its GitHub repository have been removed. Other server implementations include one in Go, Rust, and C using the event loop library; C++ with a Qt GUI; and Perl. The Go and Perl implementations are not updated regularly and may have been abandoned.
Client implementations
All of the server implementations listed above also support operating in client mode. There are also client-only implementations available for Windows (shadowsocks-win), macOS (ShadowsocksX-NG), Android (shadowsocks-android), and iOS (Wingy). M |
https://en.wikipedia.org/wiki/Manitoba%20Internet%20Exchange | The Manitoba Internet Exchange Inc (MBIX) is an Internet exchange point situated in Winnipeg, Manitoba, Canada. It allows traffic between members to stay within the Canadian jurisdiction, optimizing the performance and economy of traffic flows, while limiting the potential for extra-legal surveillance.
MBIX is incorporated as a Manitoban tax-exempt non-profit corporation.
Technology
MBIX is running 4 switches.
a Cisco Nexus 93180-EX ethernet switch, supporting speeds of 1Gbit/s/10Gbit/s on fiber
a Cisco Nexus 93180-FX ethernet switch, supporting speeds of 1Gbit/s/10Gbit/s/25Gbit/s on fiber
2x Cisco Nexus 3064-PQ ethernet switch, supporting speeds of 1Gbit/s/10Gbit/s on fiber
MBIX provides NTP and an optional BGP route reflector for multilateral peering.
Both IPv4 and IPv6 peering are possible and both are encouraged at MBIX.
Services Available
MBIX offers several services under its own ASNs.
Route Servers: MBIX provides managed route servers giving a safe, hands-off way of establishing multilateral peering with all peers.
NTP Services: MBIX provides public NTP services under the hostname time.mbix.ca which round robins between time{1..3}.mbix.ca
Other services present at, but not directly provided by MBIX include:
DNS Roots: many Root, TLD and CCTLD DNS servers are available via MBIX.
Availability
MBIX is available in four data centers in Winnipeg:
Global Server Centre, Suite 570 – 167 Lombard Avenue
LES.NET YWG2, Suite 201 - 294 Portage Avenue
Manitoba Hydro Telecom Data Centre, 360 Portage Avenue
LES.NET YWG4, Suite 825 - 355 Portage Avenue
See also
List of Internet exchange points
References
External links
Official Website
Current Peers
Internet exchange points in Canada
Network access
2011 establishments in Manitoba |
https://en.wikipedia.org/wiki/Clean%20ring | In mathematics, a clean ring is a ring in which every element can be written as the sum of a unit and an idempotent. A ring is a local ring if and only if it is clean and has no idempotents other than 0 and 1. The endomorphism ring of a continuous module is a clean ring. Every clean ring is an exchange ring. A matrix ring over a clean ring is itself clean.
References
Ring theory |
https://en.wikipedia.org/wiki/Overheating%20%28electricity%29 | Overheating is a phenomenon of rising temperatures in an electrical circuit. Overheating causes damage to the circuit components and can cause fire, explosion, and injury. Damage caused by overheating is usually irreversible; the only way to repair it is to replace some components.
Causes
When overheating, the temperature of the part rises above the operating temperature. Overheating can take place:
if heat is produced in more than expected amount (such as in cases of short-circuits, or applying more voltage than rated), or
if heat dissipation is poor, so that normally produced waste heat does not drain away properly.
Overheating may be caused from any accidental fault of the circuit (such as short-circuit or spark-gap), or may be caused from a wrong design or manufacture (such as the lack of a proper heat dissipation system).
Due to accumulation of heat, the system reaches an equilibrium of heat accumulation vs. dissipation at a much higher temperature than expected.
Preventive measures
Use of circuit breaker or fuse
Circuit-breakers can be placed at portions of a circuit in series to the path of current it will affect. If more current than expected goes through the circuit-breaker, the circuit breaker "opens" the circuit and stops all current. A fuse is a common type of circuit breaker that involves direct effect of Joule-overheating. A fuse is always placed in series with the path of current it will affect. Fuses usually consist of a thin strand of wire of definite-material. When more that the rated current flows through the fuse, the wire melts and breaks the circuit.
Use of heat-dissipating systems
Many systems use ventilation holes or slits kept on the box of equipment to dissipate heat. Heat sinks are often attached to portions of the circuit that produce most heat or are vulnerable to heat. Fans are also often used. Some high-voltage instruments are kept immersed in oil. In some cases, to remove unwanted heat, a cooling system like air conditioning o |
https://en.wikipedia.org/wiki/Leaf%20expansion | Leaf expansion is a process by which plants make efficient use of the space around them by causing their leaves to enlarge, or wither. This process enables a plant to maximize its own biomass, whether it be due to increased surface area; which enables more sunlight to be absorbed by chloroplasts, driving the rate of photosynthesis upward, or it enables more stomata to be created on the leaf surface, allowing the plant to increase its carbon dioxide intake.
Mechanism
Initially, sensory organs, such as chloroplasts, the cambium, and roots, detect an external stimuli, such as light. The stimulus triggers biochemical events downstream that result in the expansion of tissue in the leaf. There are two processes found by which this occurs: osmotic regulation, which has a temporary effect that causes leaves to increase size, or wall extensibility, which gradually changes the leaf over time and permanently enlarges it.
Osmotic regulation
Red light hits leaves and depolarizes the plasma membrane of plant cells via photosensitive calcium and chloride ion channels. Chloride leaves the cells, while calcium enters. This depolarization causes an osmotic shift in ionic concentrations in the apoplast, which concurrently causes an increase in turgor pressure based on apoplastic solute potentials, forming an electrical gradient across the plasma membrane. The increase in turgor pressure causes the cells to expand, enabling the chloroplasts to shift to a different area, and the collective expansion of all the cells at once causes the leaf itself to become larger and more rigid. The movement of the chloroplasts enables light that was previously unobtainable to be reached and utilized.
Wall extensibility
Blue light hits a plant's leaves and causes the downstream activation of proton pumps. In turn, this results in a decrease of the cell wall's pH. The decrease, in conjunction with membrane-bound proteins called expansins, increases the plasticity of the apoplastic membrane. This plast |
https://en.wikipedia.org/wiki/Neoteny%20in%20humans | Neoteny in humans is the retention of juvenile traits well into adulthood. This trend is greatly amplified in humans especially when compared to non-human primates. Neotenic features of the head include the globular skull; thinness of skull bones; the reduction of the brow ridge; the large brain; the flattened and broadened face; the hairless face; hair on (top of) the head; larger eyes; ear shape; small nose; small teeth; and the small maxilla (upper jaw) and mandible (lower jaw).
Neoteny of the human body is indicated by glabrousness (hairless body). Neoteny of the genitals is marked by the absence of a baculum (penis bone); the presence of a hymen; and the forward-facing vagina. Neoteny in humans is further indicated by the limbs and body posture, with the limbs proportionately short compared to torso length; longer leg than arm length; the structure of the foot; and the upright stance.
Humans also retain a plasticity of behavior that is generally found among animals only in the young. The emphasis on learned, rather than inherited, behavior requires the human brain to remain receptive much longer. These neotenic changes may have disparate roots. Some may have been brought about by sexual selection in human evolution. In turn, they may have permitted the development of human capacities such as emotional communication. However, humans also have relatively large noses and long legs, both peramorphic (not neotenic) traits, though these peramorphic traits separating modern humans from extant chimpanzees were present in Homo erectus to an even higher degree than in Homo sapiens, which means general neoteny is valid for the H.erectus to H.sapiens transition (although there were perimorphic changes separating H.erectus from even earlier hominins such as most Australopithecus). Later research shows that some species of Australopithecus, including Australopithecus sediba, had the non-neotenic traits of H.erectus to at least the same extent which separate them from other |
https://en.wikipedia.org/wiki/Algorithm%20selection | Algorithm selection (sometimes also called per-instance algorithm selection or offline algorithm selection) is a meta-algorithmic technique to choose an algorithm from a portfolio on an instance-by-instance basis. It is motivated by the observation that on many practical problems, different algorithms have different performance characteristics. That is, while one algorithm performs well in some scenarios, it performs poorly in others and vice versa for another algorithm. If we can identify when to use which algorithm, we can optimize for each scenario and improve overall performance. This is what algorithm selection aims to do. The only prerequisite for applying algorithm selection techniques is that there exists (or that there can be constructed) a set of complementary algorithms.
Definition
Given a portfolio of algorithms , a set of instances and a cost metric , the algorithm selection problem consists of finding a mapping from instances to algorithms such that the cost across all instances is optimized.
Examples
Boolean satisfiability problem (and other hard combinatorial problems)
A well-known application of algorithm selection is the Boolean satisfiability problem. Here, the portfolio of algorithms is a set of (complementary) SAT solvers, the instances are Boolean formulas, the cost metric is for example average runtime or number of unsolved instances. So, the goal is to select a well-performing SAT solver for each individual instance. In the same way, algorithm selection can be applied to many other -hard problems (such as mixed integer programming, CSP, AI planning, TSP, MAXSAT, QBF and answer set programming). Competition-winning systems in SAT are SATzilla, 3S and CSHC
Machine learning
In machine learning, algorithm selection is better known as meta-learning. The portfolio of algorithms consists of machine learning algorithms (e.g., Random Forest, SVM, DNN), the instances are data sets and the cost metric is for example the error rate. So, the |
https://en.wikipedia.org/wiki/Principle%20of%20maximum%20caliber | The principle of maximum caliber (MaxCal) or maximum path entropy principle, suggested by E. T. Jaynes, can be considered as a generalization of the principle of maximum entropy. It postulates that the most unbiased probability distribution of paths is the one that maximizes their Shannon entropy. This entropy of paths is sometimes called the "caliber" of the system, and is given by the path integral
History
The principle of maximum caliber was proposed by Edwin T. Jaynes in 1980, in an article titled
The Minimum Entropy Production Principle in the context of deriving a principle for non-equilibrium statistical mechanics.
Mathematical formulation
The principle of maximum caliber can be considered as a generalization of the principle of maximum entropy defined over the paths space, the caliber is of the form
where for n-constraints
it is shown that the probability functional is
In the same way, for n dynamical constraints defined in the interval of the form
it is shown that the probability functional is
Maximum caliber and statistical mechanics
Following Jaynes' hypothesis, there exist publications in which the principle of maximum caliber appears to emerge as a result of the construction of a framework which describes a statistical representation of systems with many degrees of freedom.
Notes
Entropy and information
Bayesian statistics
maximum caliber
Probability assessment
maximum caliber |
https://en.wikipedia.org/wiki/ChristianMingle | Christian Mingle is an online dating service that caters to Christian singles. The service is one of a number of demographically focused online match-making websites operated by Spark Networks.
Because of the focus on relationships between Christian singles, Christian Mingle is considered a special-interest online personals site. Former CEO Adam Berger has referred to this type of service as "niche" dating.
History
Christian Mingle was launched in 2001 by Spark Networks. The site has over 16 million members.
In the 2013 Webby Awards, Christian Mingle was an honoree in the Religion & Spirituality category. The site also received the Editor's Top Pick - Christian Award from DatingSiteReviews.com in 2015.
In 2013, the company authorized the repurchase of $5 million of its outstanding common stock.
Christian Mingle launched its dating app in late 2014.
In July 2016, Christian Mingle began accommodating gay men and women as the result of a non-discrimination lawsuit. Previously, the site had only allowed users to choose either "man seeking woman" or "woman seeking man." The change removed this profile designation and allowed users the option to see either opposite-sex or same-sex matches.
Members
Christian Mingle members may choose whether to specify the Christian denomination to which they belong. Some of the available denomination options are: Anglican/Episcopalian, Apostolic, Baptist, Catholic, Lutheran, Methodist, Orthodox, Pentecostal, Presbyterian, Seventh-day Adventist, and Southern Baptist. Members can also choose options such as Interdenominational, Non-denominational or Not sure yet.
Members can also search the site for free, though a subscription is required to communicate with other members.
Film
Christian Mingle The Movie (a 2014 American faith-based romantic comedy film) stars Lacey Chabert as a woman who signs up to Christian Mingle in order to meet a man.
References
External links
Online dating services of the United States
Online dating |
https://en.wikipedia.org/wiki/Glossary%20of%20aerospace%20engineering | This glossary of aerospace engineering terms pertains specifically to aerospace engineering, its sub-disciplines, and related fields including aviation and aeronautics. For a broad overview of engineering, see glossary of engineering.
A
Above ground level – In aviation, atmospheric sciences and broadcasting, a height above ground level (AGL) is a height measured with respect to the underlying ground surface. This is as opposed to altitude/elevation above mean sea level (AMSL), or (in broadcast engineering) height above average terrain (HAAT). In other words, these expressions (AGL, AMSL, HAAT) indicate where the "zero level" or "reference altitude" is located.
Absolute humidity – describes the water content of air and is expressed in either grams per cubic meter or grams per kilogram.
Absolute value – In mathematics, the absolute value or modulus of a real number is the non-negative value of without regard to its sign. Namely, for a positive , for a negative (in which case is positive), and . For example, the absolute value of 3 is 3, and the absolute value of −3 is also 3. The absolute value of a number may be thought of as its distance from zero.
Acceleration – In physics, acceleration is the rate of change of velocity of an object with respect to time. An object's acceleration is the net result of any and all forces acting on the object, as described by Newton's Second Law. The SI unit for acceleration is metre per second squared Accelerations are vector quantities (they have magnitude and direction) and add according to the parallelogram law. As a vector, the calculated net force is equal to the product of the object's mass (a scalar quantity) and its acceleration.
Acquisition of signal – A pass, in spaceflight and satellite communications, is the period in which a satellite or other spacecraft is above the local horizon and available for radio communication with a particular ground station, satellite receiver, or relay satellite (or, in some cas |
https://en.wikipedia.org/wiki/OpenBoard | OpenBoard is a free and open-source interactive whiteboard software compatible with any projector and pointing device.
It was originally forked from Open-Sankoré in 2013 with the intention to focus on simplicity and stability. The license was upgraded from LGPL-2.0-only to GPL-3.0-only. Since version 1.3 it is using the more recent QT 5 framework instead of QT version 4.
History
OpenBoard is a fork of the project based on Open-Sankoré 2,0. Open-Sankoré itself is based on the Uniboard software originally developed at the University of Lausanne (UL), Switzerland. The software started to be developed in 2003 and was first used by the instructors of the UL in October 2003. The project was later spun off to a local startup company, Mnemis SA. It was subsequently sold to the French Public Interest Grouping for Digital Education in Africa (GIP ENA) which bought the intellectual property of the software in order to make it an open source project under the GNU Lesser General Public License (LGPL-2.0-only).
Notes
References
External links
Additional Openboard content (german)
Additional Openboard content (french)
Cross-platform free software
Software using the GPL license
Software forks |
https://en.wikipedia.org/wiki/Interleaving%20%28data%29 | In computing, interleaving of data refers to the interspersing of fields or channels of different meaning sequentially in memory, in processor registers, or in file formats. For example, for coordinate data,
x0 y0 z0 w0 x1 y1 z1 w1 x2 y2 z2 w2
x0 x1 x2 x3 y0 y1 y2 y3 z0 z1 z2 z3 w0 w1 w2 w3
the former is interleaved while the latter is not.
A processor may support permute instructions, or strided load and store instructions, for moving between interleaved and non-interleaved representations.
Interleaving has performance implications for cache coherency, ease of leveraging SIMD hardware, and leveraging a computer's addressing modes. (e.g. - interleaved data may require one address to be calculated, from which individual fields may then be accessed via immediate offsets; conversely if only one field is required by index, de-interleaved data may leverage scaled index addressing).
See also
AOS vs SOA
Data-oriented design
Locality of reference
Parallel arrays
Planar image format
Packed pixel format
References
Computer memory
Computer data storage |
https://en.wikipedia.org/wiki/Cache%20control%20instruction | In computing, a cache control instruction is a hint embedded in the instruction stream of a processor intended to improve the performance of hardware caches, using foreknowledge of the memory access pattern supplied by the programmer or compiler. They may reduce cache pollution, reduce bandwidth requirement, bypass latencies, by providing better control over the working set. Most cache control instructions do not affect the semantics of a program, although some can.
Examples
Several such instructions, with variants, are supported by several processor instruction set architectures, such as ARM, MIPS, PowerPC, and x86.
Prefetch
Also termed data cache block touch, the effect is to request loading the cache line associated with a given address. This is performed by the PREFETCH instruction in the x86 instruction set. Some variants bypass higher levels of the cache hierarchy, which is useful in a 'streaming' context for data that is traversed once, rather than held in the working set. The prefetch should occur sufficiently far ahead in time to mitigate the latency of memory access, for example in a loop traversing memory linearly. The GNU Compiler Collection intrinsic function __builtin_prefetch can be used to invoke this in the programming languages C or C++.
Instruction prefetch
A variant of prefetch for the instruction cache.
Data cache block allocate zero
This hint is used to prepare cache lines before overwriting the contents completely. In this example, the CPU needn't load anything from main memory. The semantic effect is equivalent to an aligned memset of a cache-line sized block to zero, but the operation is effectively free.
Data cache block invalidate
This hint is used to discard cache lines, without committing their contents to main memory. Care is needed since incorrect results are possible. Unlike other cache hints, the semantics of the program are significantly modified. This is used in conjunction with allocate zero for managing temporary data. |
https://en.wikipedia.org/wiki/Memory%20access%20pattern | In computing, a memory access pattern or IO access pattern is the pattern with which a system or program reads and writes memory on secondary storage. These patterns differ in the level of locality of reference and drastically affect cache performance, and also have implications for the approach to parallelism and distribution of workload in shared memory systems. Further, cache coherency issues can affect multiprocessor performance, which means that certain memory access patterns place a ceiling on parallelism (which manycore approaches seek to break).
Computer memory is usually described as "random access", but traversals by software will still exhibit patterns that can be exploited for efficiency. Various tools exist to help system designers and programmers understand, analyse and improve the memory access pattern, including VTune and Vectorization Advisor, including tools to address GPU memory access patterns
Memory access patterns also have implications for security, which motivates some to try and disguise a program's activity for privacy reasons.
Examples
Sequential
The simplest extreme is the sequential access pattern, where data is read, processed, and written out with straightforward incremented/decremented addressing. These access patterns are highly amenable to prefetching.
Strided
Strided or simple 2D, 3D access patterns (e.g., stepping through multi-dimensional arrays) are similarly easy to predict, and are found in implementations of linear algebra algorithms and image processing. Loop tiling is an effective approach. Some systems with DMA provided a strided mode for transferring data between subtile of larger 2D arrays and scratchpad memory.
Linear
A linear access pattern is closely related to "strided", where a memory address may be computed from a linear combination of some index. Stepping through indices sequentially with a linear pattern yields strided access. A linear access pattern for writes (with any access pattern for non-overlap |
https://en.wikipedia.org/wiki/Glossary%20of%20mechanical%20engineering | Most of the terms listed in Wikipedia glossaries are already defined and explained within Wikipedia itself. However, glossaries like this one are useful for looking up, comparing and reviewing large numbers of terms together. You can help enhance this page by adding new terms or writing definitions for existing ones.
This glossary of mechanical engineering terms pertains specifically to mechanical engineering and its sub-disciplines. For a broad overview of engineering, see glossary of engineering.
A
Abrasion – is the process of scuffing, scratching, wearing down, marring, or rubbing away. It can be intentionally imposed in a controlled process using an abrasive. Abrasion can be an undesirable effect of exposure to normal use or exposure to the elements.
Absolute zero – is the lowest possible temperature of a system, defined as zero kelvin or −273.15 °C. No experiment has yet measured a temperature of absolute zero.
Accelerated life testing – is the process of testing a product by subjecting it to conditions (stress, strain, temperatures, voltage, vibration rate, pressure etc.) in excess of its normal service parameters in an effort to uncover faults and potential modes of failure in a short amount of time. By analyzing the product's response to such tests, engineers can make predictions about the service life and maintenance intervals of a product.
Acceleration – In physics, acceleration is the rate of change of velocity of an object with respect to time. An object's acceleration is the net result of any and all forces acting on the object, as described by Newton's Second Law. The SI unit for acceleration is metre per second squared Accelerations are vector quantities (they have magnitude and direction) and add according to the parallelogram law. As a vector, the calculated net force is equal to the product of the object's mass (a scalar quantity) and its acceleration.
Accelerometer – is a device that measures proper acceleration. Proper acceleration, being |
https://en.wikipedia.org/wiki/Energy%20Conversion%20and%20Management | Energy Conversion and Management is a biweekly peer-reviewed scientific journal covering research on energy generation, utilization, conversion, storage, transmission, conservation, management, and sustainability that was established in 1979. It is published by Elsevier and the editor-in-chief is Moh'd Ahmad Al-Nimr (Jordan University of Science and Technology).
Abstracting and indexing
The journal is abstracted and indexed in Current Contents/Engineering, Computing & Technology, Science Citation Index Expanded, and Scopus. According to the Journal Citation Reports, the journal has a 2021 impact factor of 11.533.
References
External links
Elsevier academic journals
Academic journals established in 1979
English-language journals
Energy and fuel journals
Biweekly journals |
https://en.wikipedia.org/wiki/Data-oriented%20design | As a design paradigm, data-oriented-design focuses on optimal transformations of data and focuses on modelling programs as transforms. Transforms are abstractions of code that solely focus on the mapping of inputs to outputs. They do not distinguish between accessing inputs by parameter, pointer, reference, upvalue, and vice versa with writing outputs. This eliminates the concept of a Side-effect and focuses solely on how inputs transform into outputs, logically identical to functions in mathematics.
Strategies and patterns emerging from the notion of modelling via transforms often base themselves upon allowing assumptions about a program or subprogram's state. Examples such as Existential Processing and Hierarchical Level of Detail are all integral proponents of the core design principles.
As a programming paradigm, data-oriented programming (also commonly referred to as data-oriented design), is about implementing transforms into the native language, often with Procedural, Functional, and Array programming, though not limited from Object-oriented programming. To most optimally transform data between different states, the approach is to first focus on what transforms exist and discovering what they need to operate. Second is to optimize data layouts for these transforms, separating and sorting fields according to when they are needed, and to think about how data flows through the transform chains.
In the context of computing, data-oriented programming heavily benefits from program optimizations motivated by efficient usage of the CPU cache, often used in video game development. Proponents include Mike Acton, Scott Meyers, Jonathan Blow, and Andrew Kelley. The parallel array (or structure of arrays) is a commonly referenced example of one such cache-motivated data structure. It is contrasted with the array of structures typical of object-oriented designs, and eventually balanced to a structure of arrays of structures.
Computing motives
These methods became e |
https://en.wikipedia.org/wiki/FreeOTP | FreeOTP is a free and open-source software token that can be used for two-factor authentication. It provides implementations of HOTP and TOTP. Tokens can be added by scanning a QR code or by manually entering the token configuration. It is maintained by Red Hat under the Apache 2.0 license, and supports Android and iOS.
FreeOTP Plus (aka FreeOTP+) is a fork of FreeOTP with enhancements including exporting and importing settings.
See also
Google Authenticator
LinOTP
Security token
Comparison of TOTP applications
References
External links
Computer access control
Authentication methods
Password authentication
Red Hat software
Free software programmed in Java (programming language)
Free software programmed in Swift |
https://en.wikipedia.org/wiki/DU%20Ad%20Platform | DU Ad Platform is a mobile advertising platform developed by the Chinese web services company and search engine operator Baidu, Inc. Whereas the majority of Baidu's products and services are targeted at the domestic China market, DU Ad Platform's stated goal is to help developers in China and elsewhere increase their mobile profits in overseas countries.
It currently hosts over 800 million monthly active users across its inventory. It also surpassed 2,400 mobile developers worldwide, a 50% increase over its user base in 2016, with the number of third-party app users grew by more than 110%.
Method of operation
DU Ad Platform requires developers to integrate an SDK into their apps. After integration, developers can bid on advertisements, which will then be displayed on their app to drive monetization. This process is functionally equivalent to other ad platforms such as Facebook's Audience Network.
According to an announcement made by Baidu during the 2016 Open Mobile Summit conference in San Francisco, DU Ad Platform leverages a machine-learning technology called "Peak Selection Algorithm" to increase ad performance.
History
Baidu first announced the launch of DU Ad Platform during the Baidu World conference in Beijing, 2015. Later, the firm announced that it had extended support of the platform to advertisers and publishers in Brazil, Indonesia and India.
In July 2016, Baidu announced a revenue-boosting program for mobile developers called the "DU+ Plan". Under the plan, developers who carry out ad campaigns on DU Ad Platform will receive 100 percent of the revenues from those campaigns.
Figures
Multiple sources have stated that DU Ad Platform's reach extends to over 200 countries. This is likely due to the fact that the platform leverages user traffic from many of Baidu's international apps.
In September 2016, news outlet [null Zacks.com] reported that DU Ad Platform receives over 150 million daily ad requests in Brazil.
References
Online advertising se |
https://en.wikipedia.org/wiki/Time%20Slotted%20Channel%20Hopping | Time Slotted Channel Hopping or Time Synchronized Channel Hopping (TSCH) is a channel access method for shared-medium networks.
TSCH is used by Low-Power devices to communicate using a wireless link. It is designed for low-power and lossy networks (LLNs) and aims at providing a reliable Media access control layer.
TSCH can be seen as a combination of Time division multiple access and Frequency-division multiple access mechanisms as it uses diversity in time and frequency to provide reliability to the upper network layers.
The TSCH mode was introduced in 2012 as an amendment (IEEE 802.15.4e) to the Medium Access Control (MAC) portion of the IEEE 802.15.4 standard. The amendment was rolled into the IEEE 802.15.4 in 2015.
Description
Wireless communications are often referred as unreliable due to the unpredictability of the wireless medium. While wireless communications bring many advantages (e.g no wires maintenance, costs reduction ...), the lack of reliability slows down the adoption of wireless networks technologies.
TSCH aims at reducing the impact of the wireless medium unpredictability to enable the use of reliable low-power wireless networks. It is very good at saving the nodes' energy because each node shares a schedule, allowing it to know in advance when to turn on or off its radio.
The IEEE 802.15.4 standard uses different frequency bands, and each frequency band is separated in channels. In TSCH, communications are done using those different channels and at different times. However, this standard does not define how to build and maintain the communication schedule. Many works have been proposed to organize the schedule in a centralized or distributed way.
Channel Hopping
Let chOf be the channel offset, assigned to a given link. The channel offset, chOf, is translated to a frequency f (i.e. a real channel) using:
where ASN is the Absolute Slot Number, i.e. the total number of slots that elapsed since the network was deployed. The ASN is increment |
https://en.wikipedia.org/wiki/G%C3%BCnter%20Harder | Günter Harder (born 14 March 1938 in Ratzeburg) is a German mathematician, specializing in arithmetic geometry and number theory.
Education and career
Harder studied mathematics and physics in Hamburg und Göttingen. Simultaneously with the Staatsexamen in 1964 in Hamburg, he received his doctoral degree (Dr. rer. nat.) under Ernst Witt with a thesis Über die Galoiskohomologie der Tori. Two years later he completed his habilitation. After a one-year postdoc position at Princeton University and a position as an assistant professor at the University of Heidelberg, he became a professor ordinarius at the University of Bonn. With the exception of a six-year stay at the former Universität-Gesamthochschule Wuppertal, Harder remained at the University of Bonn until his retirement in 2003. From 1995 to 2006 he was one of the directors of the Max-Planck-Institut für Mathematik in Bonn.
His research deals with arithmetic geometry, automorphic forms, Shimura varieties, motives, and algebraic number theory. He made foundational contributions to the Waldspurger formula.
He was a visiting professor at Harvard University, Yale University, at Princeton's Institute for Advanced Study (IAS) (for the academic years 1966–1967, 1972–1973, 1986–1987, autumn of 1983, autumn of 2006), at the Institut des Hautes Études Scientifiques (I.H.É.S.) in Paris, at the Tata Institute of Fundamental Research in Mumbai, and at the Mathematical Sciences Research Institute (MSRI) at the University of California, Berkeley. He was an Invited Speaker at the ICM in 1970 in Nice with talk Semisimple group schemes over curves and automorphic functions and in 1990 in Kyōto with talk Eisenstein cohomology of arithmetic groups and its applications to number theory. In 1988 he was awarded the Leibniz Prize by the Deutsche Forschungsgemeinschaft. In 2004 Harder received, with Friedhelm Waldhausen, the von Staudt Prize.
For decades, Harder was known to German mathematicians as the Spiritus Rector for a mathemat |
https://en.wikipedia.org/wiki/Slip%20bond | A slip bond is a type of chemical noncovalent bond whose dissociation lifetime decreases with tensile force applied to the bond. This is the expected behaviour for chemical bonds, but exceptions, like catch bonds exist.
References
Chemical bonding
Biophysics
Cell adhesion |
https://en.wikipedia.org/wiki/State%20switching | State switching (a.k.a. phenotypic switching) is a fundamental physiological process in which a cell/organism undergoes spontaneous, and potentially reversible, transitions between different phenotypes. Thus, the ability to switch states/phenotypes (phenotypic plasticity) is a key feature of development and normal function of cells within most multicellular organisms that enables the cell to respond to various intrinsic and extrinsic cues and stimuli in a concerted fashion enabling them to ‘make’ appropriate cellular decisions. Although state switching is essential for normal functioning, the repertoire of phenotypes in a normal cell is albeit limited.
In contrast to normal cells, a striking characteristic of cancer cells is the remarkable degree of phenotypic plasticity they exhibit. For example, cancer cells undergo epithelial to mesenchymal transition (EMT) that plays important roles in their survival, proliferation, and development of resistance to therapeutic treatments, or switch to a phenotype that mimics stem cell-like features – the so-called Cancer Stem Cells (CSCs) or Tumour-initiating Cells. Unlike in the case of normal cells, state switching in cancer cells is widely believed to arise due to somatic mutations. However, there is growing concern that such a deterministic view of a phenomenon that is reversible is not entirely consistent with multiple lines of evidence which indicate that stochasticity may also play an important role in driving phenotypic plasticity.
Intrinsically Disordered Proteins (IDPs) and state switching
A hallmark of the factors implicated in phenotypic switching whether in cancer or in normal cells is that they are Intrinsically disordered proteins (IDPs). That is, they lack a rigid 3D-structure under physiological conditions at least in vitro and exist as conformational ensembles instead. However, many IDPs can transition from disorder to order upon interacting with a target or in response to post-translational modifications su |
https://en.wikipedia.org/wiki/Host%20switch | In parasitology and epidemiology, a host switch (or host shift) is an evolutionary change of the host specificity of a parasite or pathogen. For example, the human immunodeficiency virus used to infect and circulate in non-human primates in West-central Africa, but switched to humans in the early 20th century.
All symbiotic species, such as parasites, pathogens and mutualists, exhibit a certain degree of host specificity. This means that pathogens are highly adapted to infect a specific host - in terms of but not limited to receptor binding, countermeasures for host restriction factors and transmission methods. They occur in the body (or on the body surface) of a single host species or – more often – on a limited set of host species. In the latter case, the suitable host species tend to be taxonomically related, sharing similar morphology and physiology.
Speciation is the creation of a new and distinct species through evolution and so unique differences exist between all life on earth. It goes without saying that dogs and birds are very different classes of animals – for one, dogs have fur coats and birds have feathers and wings. We therefore know that their fundamental biological makeup is as different as their physical appearance, this ranges from their internal cellular mechanisms to their response to infection, and so species-specific pathogens must overcome multiple host range barriers in order for their new host to support their infection.
Types of host switching
Recent studies have proposed to discriminate between two different types of evolutionary change in host specificity.
According to this view, host switch can be a sudden and accidental colonization of a new host species by a few parasite individuals capable of establishing a new and viable population there. After a switch of this type, the new population is more-or-less isolated from the population on the donor host species. The new population does not affect the further fate of the conspecific pa |
https://en.wikipedia.org/wiki/Forza%20Horizon%203 | Forza Horizon 3 is a 2016 racing video game developed by Playground Games and published by Microsoft Studios for the Xbox One and Windows. It is the ninth instalment in the Forza series and the third instalment in the Forza Horizon sub-series. The game is set in a fictionalised Australia, where the player is the leader of the titular Horizon car festival and has to expand the festival by completing events to earn fans. Like previous Forza Horizon games, it features an open world environment where players can freely roam the map.
Forza Horizon 3 began development in 2014 after the release of Forza Horizon 2. Turn 10 Studios assisted with the game's development, as they did with other Forza Horizon games. Over the course of development, Playground Games tested different technological concepts for the game, while also trying to improve more features over the previous title. The Australian setting was chosen for its variety of regions, and a team was sent to Australia to conduct research for the game.
Forza Horizon 3 was released in September 2016. At release, critics praised the map design, graphics, and amount of content, while most criticism was directed towards the monotony of races. The game won and was nominated for multiple awards and sold over 2.5 million copies in 2017. Downloadable content had also been released periodically, including two expansion packs. The game was followed by Forza Horizon 4, released in 2018.
Gameplay
Forza Horizon 3 is a racing video game set in an open world environment based in a fictional representation of Australia. The gameplay world is about twice the size of Forza Horizon 2, and the game contains locales and regions based upon their real-life Australian counterparts. While previous Forza Horizon games have depicted the player as being one of the racers of the Horizon Festival, the player is now the director of the festival, and their role is to expand it throughout Australia by completing races, challenges, and stunts to ear |
https://en.wikipedia.org/wiki/Form%20factor%20%28design%29 | Form factor is a hardware design aspect that defines and prescribes the size, shape, and other physical specifications of components, particularly in electronics. A form factor may represent a broad class of similarly sized components, or it may prescribe a specific standard. It may also define an entire system, as in a computer form factor.
Evolution and standardization
As electronic hardware has become smaller following Moore's law and related patterns, ever-smaller form factors have become feasible. Specific technological advances, such as PCI Express, have had a significant design impact, though form factors have historically evolved slower than individual components. Standardization of form factors is vital for hardware compatibility between different manufacturers.
Trade-offs
Smaller form factors may offer more efficient use of limited space, greater flexibility in the placement of components within a larger assembly, reduced use of material, and greater ease of transportation and use. However, smaller form factors typically incur greater costs in the design, manufacturing, and maintenance phases of the engineering lifecycle, and do not allow the same expansion options as larger form factors. In particular, the design of smaller form-factor computers and network equipment must entail careful consideration of cooling. End-user maintenance and repair of small form-factor electronic devices such as mobile phones is often not possible, and may be discouraged by warranty voiding clauses; such devices require professional servicing—or simply replacement—when they fail.
Examples
Computer form factors comprise a number of specific industry standards for motherboards, specifying dimensions, power supplies, placement of mounting holes and ports, and other parameters. Other types of form factors for computers include:
Small form factor (SFF), a more loosely defined set of standards that may refer to both motherboards and computer cases. SFF devices include mini-towe |
https://en.wikipedia.org/wiki/Inclusive%20fitness%20in%20humans | Inclusive fitness in humans is the application of inclusive fitness theory to human social behaviour, relationships and cooperation.
Inclusive fitness theory (and the related kin selection theory) are general theories in evolutionary biology that propose a method to understand the evolution of social behaviours in organisms. While various ideas related to these theories have been influential in the study of the social behaviour of non-human organisms, their application to human behaviour has been debated.
Inclusive fitness theory is broadly understood to describe a statistical criterion by which social traits can evolve to become widespread in a population of organisms. However, beyond this some scientists have interpreted the theory to make predictions about how the expression of social behavior is mediated in both humans and other animals – typically that genetic relatedness determines the expression of social behaviour. Other biologists and anthropologists maintain that beyond its statistical evolutionary relevance the theory does not necessarily imply that genetic relatedness per se determines the expression of social behavior in organisms. Instead, the expression of social behavior may be mediated by correlated conditions, such as shared location, shared rearing environment, familiarity or other contextual cues which correlate with shared genetic relatedness, thus meeting the statistical evolutionary criteria without being deterministic. While the former position still attracts controversy, the latter position has a better empirical fit with anthropological data about human kinship practices, and is accepted by cultural anthropologists.
History
Applying evolutionary biology perspectives to humans and human society has often resulted in periods of controversy and debate, due to their apparent incompatibility with alternative perspectives about humanity. Examples of early controversies include the reactions to On the Origin of Species, and the Scopes Monkey T |
https://en.wikipedia.org/wiki/Gwent%3A%20The%20Witcher%20Card%20Game | Gwent: The Witcher Card Game is a free-to-play digital collectible card game developed and published by CD Projekt for Windows, PlayStation 4, and Xbox One in 2018, for iOS in 2019, for Android in 2020, and for macOS in 2021. The game is derived from the card game of the same name featured in Andrzej Sapkowski's The Witcher novels and playable in The Witcher 3: Wild Hunt video game. An expansion, titled Gwent: Rogue Mage, was released in 2022.
Gameplay
Gwent is a turn-based card game between two players that can last two to three rounds. Players play one card each turn from a hand of 10 cards, chosen from a deck of 25. Each deck belongs to one of six factions that offer different play styles. In contrast to The Witcher 3: Wild Hunt variation of Gwent, the Siege row is removed, leaving two rows where cards can be played: the Melee and Ranged rows.
The goal is to win two of three rounds by playing cards to gain points called "power" on the board. Each card has a certain power (which can be boosted or reduced), resulting in the player's points being the total of all of their cards. A player wins a round by having more points on board than their opponent. Each card can potentially have multiple special abilities, such as the ability to damage other units on deployment, boost other units' point value, spawn other units when given conditions are met, trigger an effect when destroyed, and lock another card's ability. Rounds end when either both players pass to the next round, or when both players run out of cards. The first to win two out of three rounds wins the game.
Each deck is built with a chosen faction combined with a unique leader ability. The deck will have a 150 Provision Limit plus the Provision the leader adds on. A minimum of 25 cards is required, with at least 13 of those being unit cards that are played on the field and have power (as opposed to special/artifact cards which are discarded upon use or remain on the field with no power). Each card has a Pro |
https://en.wikipedia.org/wiki/State%20of%20Decay%202 | State of Decay 2 is a survival video game developed by Undead Labs and published by Xbox Game Studios. The game is a followup to State of Decay and was released for Windows and Xbox One on May 22, 2018. Like its predecessor, players are tasked with building a community, managing resources and surviving against the horde of zombies.
State of Decay 2 received mixed reviews from critics, who praised its difficulty, musical score and combat, but criticized the technical issues and the lack of depth in the survival and management mechanics. The game had over 10 million players by August 2021. A sequel, State of Decay 3, is under development.
Gameplay
State of Decay 2 is a zombie survival game, with an emphasis on scavenging for items, in which gameplay is experienced from a third-person view. The game is set in an open world environment and features cooperative gameplay with up to three other players. The player can choose from several locations to build a base, then reinforce and improve it with various facilities like watchtowers, gardens, sleeping quarters, kitchens, workshops, medical bays, etc. to help keep survivors safe and healthy. Part of the game is balancing the use of resources: food, medicine, ammo, and construction materials. They can be obtained by scavenging or trading with NPCs. The player can interact with survivors outside of their group: trading with them, helping them or recruiting them. Only one survivor can be controlled at a time, though the player can ask an AI-controlled survivor to accompany them, and in certain missions, one or more AI-controlled survivors will accompany the player. Cooperative multiplayer is also available allowing to players to recruit a friend to temporarily join their game to assist them with objectives.
Each character has a fixed set of "traits" which give them advantages or flaws (such as tire out more easily, or can improve a certain skill faster). Except for the story-related characters, most characters can be assi |
https://en.wikipedia.org/wiki/Engineering%20controls | Engineering controls are strategies designed to protect workers from hazardous conditions by placing a barrier between the worker and the hazard or by removing a hazardous substance through air ventilation. Engineering controls involve a physical change to the workplace itself, rather than relying on workers' behavior or requiring workers to wear protective clothing.
Engineering controls is the third of five members of the hierarchy of hazard controls, which orders control strategies by their feasibility and effectiveness. Engineering controls are preferred over administrative controls and personal protective equipment (PPE) because they are designed to remove the hazard at the source, before it comes in contact with the worker. Well-designed engineering controls can be highly effective in protecting workers and will typically be independent of worker interactions to provide this high level of protection. The initial cost of engineering controls can be higher than the cost of administrative controls or PPE, but over the longer term, operating costs are frequently lower, and in some instances, can provide a cost savings in other areas of the process.
Elimination and substitution are usually considered to be separate levels of hazard controls, but in some schemes they are categorized as types of engineering control.
The U.S. National Institute for Occupational Safety and Health researches engineering control technologies, and provides information on their details and effectiveness in the NIOSH Engineering Controls Database.
Background
Controlling exposures to occupational hazards is considered the fundamental method of protecting workers. Traditionally, a hierarchy of controls has been used as a means of determining how to implement feasible and effective controls, which typically include elimination, substitution, engineering controls, administrative controls, and personal protective equipment. Methods earlier in the list are considered generally more effect |
https://en.wikipedia.org/wiki/Barefoot%20Networks | Barefoot Networks is a computer networking company headquartered in Santa Clara, California. The company designs and produces programmable network switch silicon, systems and software. The company was acquired by Intel in 2019.
Background
Barefoot Networks was founded in 2013. The company is backed by Andreessen Horowitz, Lightspeed Venture Partners and Sequoia Capital. The company's co-founders are Nick McKeown, Martin Izzard, Pat Bosshart, and Stefanos Sidiropoulos. Dan Lenoski joined in 2014 and was also given co-founder status. The company came out of stealth mode on June 14, 2016. The company also announced a third round led by Goldman Sachs, AT&T, Dell, and Google. Later in 2016, the company announced additional funding from Alibaba Group and Tencent. In 2017, Craig H. Barratt took over from Martin Izzard as CEO.
In June 2019, Intel announced it was acquiring Barefoot for an undisclosed price.
In January 2023, Intel stated that is has halted production on its networking chips.
Products
Barefoot Tofino
Barefoot Tofino is a P4-programmable switch chip that can run up to speeds of 6.5 Tbit/s.
Programmability
P4 is a programming language designed to allow programming of packet forwarding dataplanes.
Barefoot Deep Insight
Barefoot Deep Insight is a network monitoring system that provides full visibility into every packet in a network. Running on commodity servers, Barefoot Deep Insight interprets, analyzes and pinpoints a myriad of conditions that can impede packet flow, and does so in real time and at line-rate.
References
External links
P4 website
Information technology companies of the United States
Companies based in Palo Alto, California
Networking hardware companies
American companies established in 2013
Intel acquisitions
Defunct computer companies of the United States |
https://en.wikipedia.org/wiki/Jack%27d | Jack'd is a location-based chat and dating app catering to gay and bisexual men. It is available for Android, iPhone, and Windows phones. Jack'd was previously owned by Online Buddies, owner of Manhunt. In 2019, Perry Street Software, the parent company of Scruff, bought Jack’d for an undisclosed sum.
Controversies
On June 13, 2016, the Los Angeles Times reported that Omar Mateen was a Jack'd user for at least a year prior to the Orlando nightclub shooting in which he killed 49 people and wounded 53 others. Jack'd was not able to substantiate those claims.
On February 5, 2019, technology news outlet The Register reported a security flaw in the app in which users' private photos could be publicly viewed by anybody aware of the flaw. On February 7, 2019, Jack'd fixed the bug. On June 28, 2019, the Office of the Attorney General of New York announced that Online Buddies, Inc. will pay the state $240,000 to settle the privacy complaint and that the company would implement a "comprehensive security program" to prevent similar incidents in the future. In a statement, New York State Attorney General Letitia James said, “[Jack'd] put users’ sensitive information and private photos at risk of exposure and [Online Buddies] didn't do anything about it for a full year just so they could continue to make a profit.”
See also
Homosocialization
JOYclub
Timeline of online dating services
Tinder
References
2010 software
Android (operating system) software
Geosocial networking
Internet properties established in 2010
iOS software
LGBT social networking services
Mobile social software
Online dating applications
Online dating services
LGBT online dating services
Social networking services
Technology companies established in 2010 |
https://en.wikipedia.org/wiki/List%20of%20gig%20economy%20companies | The following is a list of gig economy companies. The list includes only companies that have been noted by sources as being former or current gig economy companies.
Background
The Congressional Research Service defines the "gig economy" as: the collection of markets that match providers to consumers on a gig (or job) basis in support of on-demand commerce. In the basic model, gig workers enter into formal agreements with on-demand companies to provide services to company's clients. Prospective clients request services through an Internet-based technological platform or smartphone application that allows them to search for providers or to specify jobs. Providers (gig workers) engaged by the on-demand company provide the requested service and are compensated for the jobs.
In 2019, Queensland University of Technology published a report stating 7% of Australians participate in the gig economy. 10% of the American workforce participated in the gig economy in 2018. According to a 2019 Bank of Canada report, 18% of Canadians worked in the gig economy for non-recreational reasons. Around 2018, 15% of China's workforce, representing over 110 million people, was involved in the gig economy. In 2019, the World Bank estimated that globally, fewer than 0.5% of people in the "active labor force" take part in the gig economy.
List of gig economy companies
Accommodation
Caregiving
Delivery
Grocery
Food
Education
Knowledge Work (Freelancing platforms)
Business and technical services
Creative services
Home services
Health services
Legal services
Retail
Transportation and parking
Notes
See also
Business model
Peer-to-peer
Sharing economy
Temporary work
Crowdsourcing
References
Footnotes
Bibliography
Further reading
Business models
Gig economy
Online companies |
https://en.wikipedia.org/wiki/Tree%20stack%20automaton | A tree stack automaton (plural: tree stack automata) is a formalism considered in automata theory. It is a finite state automaton with the additional ability to manipulate a tree-shaped stack. It is an automaton with storage whose storage roughly resembles the configurations of a thread automaton. A restricted class of tree stack automata recognises exactly the languages generated by multiple context-free grammars (or linear context-free rewriting systems).
Definition
Tree stack
For a finite and non-empty set , a tree stack over is a tuple where
is a partial function from strings of positive integers to the set } with prefix-closed domain (called tree),
(called bottom symbol) is not in and appears exactly at the root of , and
is an element of the domain of (called stack pointer).
The set of all tree stacks over is denoted by .
The set of predicates on , denoted by , contains the following unary predicates:
which is true for any tree stack over ,
which is true for tree stacks whose stack pointer points to the bottom symbol, and
which is true for some tree stack if ,
for every .
The set of instructions on , denoted by , contains the following partial functions:
which is the identity function on ,
which adds for a given tree stack a pair to the tree and sets the stack pointer to (i.e. it pushes to the -th child position) if is not yet in the domain of ,
which replaces the current stack pointer by (i.e. it moves the stack pointer to the -th child position) if is in the domain of ,
which removes the last symbol from the stack pointer (i.e. it moves the stack pointer to the parent position), and
which replaces the symbol currently under the stack pointer by ,
for every positive integer and every .
Tree stack automata
A tree stack automaton is a 6-tuple where
, , and are finite sets (whose elements are called states, stack symbols, and input symbols, respectively),
(the initial state),
(whose elements are called transiti |
https://en.wikipedia.org/wiki/Current%20sensing | In electrical engineering, current sensing is any one of several techniques used to measure electric current. The measurement of current ranges from picoamps to tens of thousands of amperes. The selection of a current sensing method depends on requirements such as magnitude, accuracy, bandwidth, robustness, cost, isolation or size. The current value may be directly displayed by an instrument, or converted to digital form for use by a monitoring or control system.
Current sensing techniques include shunt resistor, current transformers and Rogowski coils, magnetic-field based transducers and others.
Current sensor
A current sensor is a device that detects electric current in a wire and generates a signal proportional to that current. The generated signal could be analog voltage or current or a digital output. The generated signal can be then used to display the measured current in an ammeter, or can be stored for further analysis in a data acquisition system, or can be used for the purpose of control.
The sensed current and the output signal can be:
Alternating current input,
analog output, which duplicates the wave shape of the sensed current.
bipolar output, which duplicates the wave shape of the sensed current.
unipolar output, which is proportional to the average or RMS value of the sensed current.
Direct current input,
unipolar, with a unipolar output, which duplicates the wave shape of the sensed current
digital output, which switches when the sensed current exceeds a certain threshold
Requirements in current measurement
Current sensing technologies must fulfill various requirements, for various applications. Generally, the common requirements are:
High sensitivity
High accuracy and linearity
Wide bandwidth
DC and AC measurement
Low temperature drift
Interference rejection
IC packaging
Low power consumption
Low price
Techniques
The measurement of the electric current can be classified depending upon the underlying fundamental physical principles |
https://en.wikipedia.org/wiki/Facility%20location%20%28competitive%20game%29 | The competitive facility location game is a kind of competitive game in which service-providers select locations to place their facilities in order to maximize their profits. The game has the following components:
There are several consumers who need a certain service, e.g, electricity connection.
There are several producers that can supply this service, e.g, electricity companies.
Each producer can build its facility (e.g, a power station) in one of several locations.
For every pair of consumer (C) and location (L), there is a fixed cost of serving C from L (e.g, depending on the distance between the power station and the consumer's house). This cost is denoted Cost[C,L].
The game is a sequential game with three steps:
Each producer selects a location for placing its facility.
Each producer set a price for each user (price discrimination is allowed, since there is a different cost for serving different consumers).
Each consumer selects a facility to connect to.
Each consumer has a certain private value for accepting the service.
For each consumer-producer pair:
The gain of the consumer for connecting to the producer's facility is his value minus the price;
The gain of the producer is the price minus the cost of serving the consumer;
The social welfare of this pair is the sum of the gains, i.e, the consumer's value minus the service cost.
Equilibrium
We analyze the game using backward induction.
Step 3 is simple: each consumer just selects the cheapest facility.
Step 2 is also quite simple. Suppose a producer P has its facility in location L. Then, the price it takes from consumer C must be at least Cost[C,L]. Suppose the locations are ordered in increasing order of the cost, i.e, the locations are L1, L2, ... such that Cost[C,L1]<Cost[C,L2]<... Then, the producer whose facility in location L1 can always win the consumer by offering him the price Cost[C,L2]. This is because the producer whose facility is L2 cannot offer a lower price. Therefore, in |
https://en.wikipedia.org/wiki/Timeline%20of%20machine%20learning | This page is a timeline of machine learning. Major discoveries, achievements, milestones and other major events in machine learning are included.
Overview
Timeline
See also
History of artificial intelligence
Timeline of artificial intelligence
Timeline of machine translation
References
Citations
Works cited
Machine learning
Machine learning |
https://en.wikipedia.org/wiki/Open%20Music%20Initiative | The Open Music Initiative is an initiative led by the Berklee College of Music Institute for Creative Entrepreneurship (BerkleeICE) in collaboration with the MIT Media Lab and with support from a number of major music labels, streaming services, publishers, collection societies and nearly 60 other founding entities. The mission of Open Music Initiative is to promote and advance the creation of open source standards and innovation related to music to help assure proper compensation for all creators, performers and rights holders of music.
History
OMI was launched on June 13, 2016, by Berklee College of Music's Institute for Creative Entrepreneurship (ICE) in collaboration with the MIT Media Lab's Digital Currency Initiative. Founders include Berklee Institute for Creative Entrepreneurship and Sonicbids founder Panos Panay, technology entrepreneur Dan Harple, and designer and entrepreneur Michael Hendrix. The OMI working group includes researchers from University College London and the backing of major music labels such as Universal, Sony, and Warner, plus streaming services such as Spotify, Pandora Radio and YouTube.
OMI has stated that its goal is to establish a decentralized global platform using an open source framework to ensure that royalties will be directly administered to music rights holders, creators and artists. According to Panay, “We believe an open sourced platform around creative rights can yield an innovation dividend for creators and rights holders alike”.
The initiative is focused on driving the creation of digital methodologies for data collection, data reconciliation, and file formats. Operational, strategic, and technical guidance for OMI will be provided by design and consulting firm IDEO and Context Labs.
Technology
According to Harple, OMI is not a database or a standard, but instead "an open-source technical architecture core functional blocks and APIs that will allow developers and stakeholders to build their own systems and tools that |
https://en.wikipedia.org/wiki/Crossing%20number%20inequality | In the mathematics of graph drawing, the crossing number inequality or crossing lemma gives a lower bound on the minimum number of edge crossings in a plane drawing of a given graph, as a function of the number of edges and vertices of the graph. It states that, for graphs where the number of edges is sufficiently larger than the number of vertices, the crossing number is at least proportional to .
It has applications in VLSI design and combinatorial geometry,
and was discovered independently by Ajtai, Chvátal, Newborn, and Szemerédi
and by Leighton.
Statement and history
The crossing number inequality states that, for an undirected simple graph with vertices and edges such that , the crossing number obeys the inequality
The constant is the best known to date, and is due to Ackerman.
For earlier results with weaker constants see and .
The constant can be lowered to , but at the expense of replacing with the worse constant of .
It is important to distinguish between the crossing number and the pairwise crossing number . As noted by , the pairwise crossing number refers to the minimum number of pairs of edges that each determine one crossing, whereas the crossing number simply refers to the minimum number of crossings. (This distinction is necessary since some authors assume that in a proper drawing no two edges cross more than once.)
Applications
The motivation of Leighton in studying crossing numbers was for applications to VLSI design in theoretical computer science.
Later, realized that this inequality yielded very simple proofs of some important theorems in incidence geometry. For instance, the Szemerédi–Trotter theorem, an upper bound on the number of incidences that are possible between given numbers of points and lines in the plane,
follows by constructing a graph whose vertices are the points and whose edges are the segments of lines between incident points. If there were more incidences than the Szemerédi–Trotter bound, this graph would n |
https://en.wikipedia.org/wiki/Sensing%20floor | A sensing floor is a floor with embedded sensors.
Depending on their construction, these floors are either monobloc (e.g. structures made of a single frame, carpets).
or modular (e.g. tiled floors, floors made of stripes of sensors).
The first sensing floor prototypes were developed in the 1990s, mainly for human gait analysis.
Such floors are usually used as a source of sensing information for an ambient intelligence.
Depending on the type of sensors employed, sensing floors can measure load (pressure), proximity (to detect, track, and recognize humans), as well as the magnetic field (for detecting metallic objects like robots using magnetometers).
Sensing floors have a variety of usages:
Gait analysis for human identification and continuous health diagnosis (either in domestic or hospital environments)
Mapping of the environment for autonomous robots
Controller for interactive applications (as a MIDI music instrument, a games controller, dance movement analysis, etc.)
More than 30 distinct sensing floor prototypes have been developed between 1990 and 2015.
Notable examples of sensing floors have been developed by Oracle, MIT, and Inria.
As of 2015, few sensing floors are available as commercial products, mainly targeting healthcare facilities (e.g. the GAITRite surface pressure sensing floor, and the SensFloor).
Citations
Sensors
Robotics
User interface techniques
Security technology |
https://en.wikipedia.org/wiki/Point-of-sale%20malware | Point-of-sale malware (POS malware) is usually a type of malicious software (malware) that is used by cybercriminals to target point of sale (POS) and payment terminals with the intent to obtain credit card and debit card information, a card's track 1 or track 2 data and even the CVV code, by various man-in-the-middle attacks, that is the interception of the processing at the retail checkout point of sale system. The simplest, or most evasive, approach is RAM-scraping, accessing the system's memory and exporting the copied information via a remote access trojan (RAT) as this minimizes any software or hardware tampering, potentially leaving no footprints. POS attacks may also include the use of various bits of hardware: dongles, trojan card readers, (wireless) data transmitters and receivers. Being at the gateway of transactions, POS malware enables hackers to process and steal thousands, even millions, of transaction payment data, depending upon the target, the number of devices affected, and how long the attack goes undetected. This is done before or outside of the card information being (usually) encrypted and sent to the payment processor for authorization.
List of POS RAM scraper malware variants
Rdasrv
It was discovered in 2011, and installs itself into the Windows computer as a service called rdasrv.exe. It scans for track 1 and track 2 credit card data using Perl compatible regular expressions which includes the customer card holder's name, account number, expiry date, CVV code and other discretionary information. Once the information gets scraped it is stored into data.txt or currentblock.txt and sent to the hacker.
Alina
It was discovered in October 2012 and gets installed into the PC automatically. It gets embedded into the Auto It script and loads the malware into the memory. Then it scrapes credit card (CC) data from POS software.
VSkimmer
Vskimmer scrapes the information from the Windows system by detecting the card readers attached to the reade |
https://en.wikipedia.org/wiki/Nurse%20grafting | Nurse grafting is a method of plant propagation that is used for hard-to-root plant material. If a desirable selection cannot be grown from seed (because a seed-grown plant will be genetically different from the parent), it must be propagated asexually (cloned) in order to be genetically identical to the parent. Nurse grafting allows a scion to develop its own roots instead of being grafted to a rootstock.
Nurse seed grafting
A large-seeded woody species, e.g. the chestnut, retains the cotyledons inside the seed coat below ground while the radicle grows downward and the shoot appears aboveground. To make a nurse seed graft, a germinating seed is needed. A knife is used to cut an opening between the petioles of the cotyledons. The scion, taken from dormant wood of the previous season's growth, is cut to a wedge shape at the end and inserted into the cut between the cotyledons, so that the cambium surfaces of each can join. The grafted plant is then set in a rooting medium with the union about 1.5 inch below the surface.
This graft allows the scion to live on the seed's roots long enough to form adventitious roots of its own. This technique is used for camellias, avocados, and chestnuts.
Nurse root grafting
In this technique, a scion is grafted to a piece of root to keep it alive long enough for it to form its own roots. The graft union is planted below the surface of the growing medium, as with the nurse seed method. Once the scion has formed roots of its own, the rootstock can be removed, or it will die off, as will happen in situations when the scion and rootstock are not closely related.
This method works well with apple cultivars, cherries, plums, nectarines, and pears. It is also useful for propagating rare isolated plants that may be unique and should not be moved from the wild. Such a plant can be propagated by taking a small amount of material that will not harm the parent plant by its removal.
Nurse root grafting is the best method for propagating tree |
https://en.wikipedia.org/wiki/Low%20field%20magnetoresistance | Colossal magnetoresistance (CMR) is a property in many perovskite oxides. However, the requirement of large external magnetic field hinders the potential applications. On one hand, people were looking for the physical mechanisms for the CMR originality. On the other hand, people were trying to find alternative ways to further improve the CMR effect. Large magnetoresistance at relative low magnetic field had been reported in doped LaMnO3 polycrystal samples, rather than single crystal. The spin polarized tunneling and spin dependent scattering across large angle boundaries are responsible for the Low field magnetoresistance (LFMR).
In order to obtain LFMR in epitaxial thin films (single-crystal like materials), epitaxial strain has been used. Wang and Li reported an enhancement of the magnetoresistance in 5- to 15-nm-thick Pr0.67Sr0.33MO3 films using out-of-plane tensile strain. In a conventional strain engineering framework, epitaxial strain is only effective below the critical thickness, which is usually less than a few tens of nanometers. Tuning electron transport by epitaxial strain has only been achieved in ultrathin layers because of the relaxation of epitaxial strains in relatively thick films.
Vertically aligned heteroepitaxial nanoscaffolding films have been proposed to generate strain in thick films. A vertical lattice strain as large as 2% has been achieved in La0.7Sr0.3MnO3:MgO vertical nanocomposites. The magnetoresistance, magnetic anisotropy, and magnetization can be tuned by the vertical strain in films over few hundred nanometers thick.
References
Thin films |
https://en.wikipedia.org/wiki/Nvidia%20DGX | Nvidia DGX is a line of Nvidia-produced servers and workstations which specialize in using GPGPU to accelerate deep learning applications. The typical design of a DGX system is based upon a rackmount chassis with motherboard that carries high performance x86 server CPUs (Typically Intel Xeons, with the exception DGX A100 and DGX Station A100, which both utilize AMD EPYC CPUs). The main component of a DGX system is a set of 4 to 16 Nvidia Tesla GPU modules on an independent system board. DGX systems have large heatsinks and powerful fans to adequately cool thousands of watts of thermal output. The GPU modules are typically integrated into the system using a version of the SXM socket or by a PCIe x16 slot.
Models
Pascal - Volta
DGX-1
DGX-1 servers feature 8 GPUs based on the Pascal or Volta daughter cards with 128GB of total HBM2 memory, connected by an NVLink mesh network. The DGX-1 was announced on the 6th of April in 2016. All models are based on a dual socket configuration of Intel Xeon E5 CPUs, and are equipped with the following features.
512 GB of DDR4-2133
Dual 10Gb networking
4 x 1.92 TB SSDs
3200W of combined power supply capability
3U Rackmount Chassis
The product line is intended to bridge the gap between GPUs and AI accelerators in that the device has specific features specializing it for deep learning workloads.
The initial Pascal based DGX-1 delivered 170 teraflops of half precision processing, while the Volta-based upgrade increased this to 960 teraflops.
The DGX-1 was first available only with the Pascal based configuration, with the first generation SXM socket. The later revision of the DGX-1 offered support for first generation Volta cards via the SXM-2 socket. Nvidia offered upgrade kits that allowed users with a Pascal based DGX-1 to upgrade to a Volta based DGX-1.
The Pascal based DGX-1 has two variants, one with a 16 core Intel Xeon E5-2698 V3, and one with a 20 core E5-2698 V4. Pricing for the variant equipped with an E5-2698 V4 |
https://en.wikipedia.org/wiki/Chalo%20Chatu | Chalo Chatu translated as our world in the Zambian language is an English-language wiki-based free encyclopaedia project created by Jason Mulikita that is dedicated to documenting the Zambia and also try to preserve the history and pride of Zambia covering historical events and current events, notable public figures, companies, organizations, websites, national monuments and other notable key features of Zambia. The site uses MediaWiki software to maintain a user-created database of information. The site's content is under a Creative Commons license(CC BY-SA 3.0) which means that it is available free to the public, but cannot be used for commercial purposes and should not be modified by people who are not part of the community of the website. Chalo Chatu is a work-in-progress, with articles in various stages of completion.
History
The web site was opened on 1 June 2016 and has been active since then. The website was launched with the ".org" top-level domain denoting its non-commercial nature.
Funding & Nature of the project
Chalo Chatu Foundation is documenting an entire nation which no easy task according to the site itself. The main aim of the project is to document everything that has to-do with Zambia. The stated aim of the project is "preserving the History and Pride of Zambia ". Chalo Chatu is a non-profit so it gets fundings through the donations that people make. The organization that runs the project does not have its own equipment and is constantly relying on individual volunteers to use their own equipment, such as computers and cameras, to gather information.
References
External links
Website
Wikis
Open content projects
Creative Commons-licensed websites
Online encyclopedias
Internet properties established in 2016
MediaWiki websites
Zambian online encyclopedias
History of Zambia |
https://en.wikipedia.org/wiki/List%20of%20Apple%20operating%20systems | The following is a list of operating systems released by Apple Inc. As of 2023, there are six supported software platforms: iOS, iPadOS, watchOS, tvOS, macOS and visionOS.
Prior to the introduction of the Macintosh in early 1984, Apple had several operating systems for the Apple II series, Apple SOS for the Apple III series, and Lisa OS and MacWorks XL for the Apple Lisa series; those were introduced between 1977 and 1983.
The original operating system for the Macintosh was the classic Mac OS, which was introduced in early 1984 as System Software. In 1997, System Software was renamed to Mac OS.
In 1999, Mac OS X Server 1.0 was released, followed by Mac OS X 10.0, the first consumer release of the Mac OS X.
From the release of Mac OS X 10.0 until early 2007, Mac OS X was the only software platform. In early 2007, iPhone OS was introduced, increasing the number of software platforms by one, from one to two. In 2010, iPhone OS was renamed to iOS. In 2011, Mac OS X was renamed to OS X. In early 2015, the number of software platforms rose by one, from two to three, as watchOS was introduced. In late 2015, tvOS was introduced, increasing the number of software platforms again by one, from three to four. In 2016, OS X was renamed to macOS. In 2019, iPadOS was introduced as the derived version of iOS for iPad, increasing the number of software platforms again by one, from four to five. In 2020, macOS received an increment in its version, from 10 to 11. In 2023, the number of software platforms rose again by one, from five to six, as visionOS was introduced.
Apple computers
Apple II
Apple DOS is the first operating system for Apple computers.
Apple ProDOS
Apple GS/OS
Apple III
Apple SOS
Apple Lisa
Lisa OS
MacWorks XL
Macintosh computers
Classic Mac OS
System 1
System 2
System 3
System 4
System Software 5 – also marketed as System 5
System Software 6 – also marketed as System 6
System 7 – System 7.5.1 was the first to refer to itself as Mac OS, Mac |
https://en.wikipedia.org/wiki/EMC%20Elastic%20Cloud%20Storage | EMC Elastic Cloud Storage (ECS), formerly Project Nile, is an object storage software product marketed by EMC Corporation. It is marketed as software-defined storage that follows several principles of object storage, such as scalability, data resilience, and cost efficiency.
Applications
EMC Elastic Cloud Storage has a number of applications, including the Internet of things and financial services, where it was determined by Cohasset Associates Inc. to meet "the relevant storage requirements of SEC Rule 17a-4(f) and CFTC Rule 1.31(b)-(c)" when "Compliance is enabled for a Namespace and when properly configured and utilized to store and retain records in non-erasable and non-rewriteable format." Its use of object storage and flat namespace, according to the Edison Group, "allows for multiple types of data to be stored side by side. Regardless of the data, it is all viewed as object, their globally unique IDs, and metadata." This approach allows multiple data types from multiple sources to be stored alongside one another, including:
Large data sets: Financial, pharmaceutical, geospatial, biotech, and legal
Public data sets: Weather, government
Security, imagery, and social media: Images, videos, blogs
Revenue chain data: Sensors, devices, Internet of Things.
ECS was mentioned in a marketing vendor assessment for object storage in 2014.
References
Computer storage companies
Storage Area Network companies |
https://en.wikipedia.org/wiki/R%20bodies | R bodies (from refractile bodies, also R-bodies) are polymeric protein inclusions formed inside the cytoplasm of bacteria. Initially discovered in kappa particles, bacterial endosymbionts of the ciliate Paramecium, R bodies (and genes encoding them) have since been discovered in a variety of taxa.
Morphology, assembly, and extension
At neutral pH, type 51 R bodies resemble a coil of ribbon approximately 500 nm in diameter and approximately 400 nm deep. Encoded by a single operon containing four open reading frames, R bodies are formed from two small structural proteins, RebA and RebB. A third protein, RebC, is required for the covalent assembly of these two structural proteins into higher-molecular weight products, visualized as a ladder on an SDS-PAGE gel.
At low pH, Type 51 R bodies undergo a dramatic structural rearrangement. Much like a paper yo-yo, the ribbon extends (from the center) to form hollow tube with pointed ends that can reach up to 20μm in length.
Other types of R bodies from different bacterial species vary in their size, ribbon morphology, and triggers for extension.
Function
When kappa particles shed from a killer paramecium are ingested, R bodies extend within the acidic food vacuole of the predatory paramecium, distending and rupturing the membrane. This liberates the contents of the food vacuole into the cytoplasm of the paramecium. While feeding kappa particles to sensitive paramecium results in the death of paramecium, feeding purified R bodies or R bodies recombinantly expressed in E. coli is not toxic. Thus, R bodies are thought to function as a toxin delivery system.
R bodies are also capable of rupturing E. coli spheroplasts, demonstrating that they can rupture membranes in a foreign context, and they can be engineered to extend at a variety of different pH levels.
References
Cell biology
Cell anatomy
Protein complexes
Bacteriology
Biotechnology |
https://en.wikipedia.org/wiki/DiskSpd | DiskSpd is a free and open-source command-line tool for storage benchmarking on Microsoft Windows that generates a variety of requests against computer files, partitions or storage devices and presents collected statistics as text in the command-line interface or as an XML file.
Overview
The command supports physical and virtual storage including hard disk drive (HDD), solid state devices (SSD), and solid state hybrid drives (SSHD). It provides control over the testing methods, duration, threads, queues, IO and processor affinity, and reporting.
DiskSpd works on desktop versions of Windows 7, Windows 8, Windows 8.1, Windows 10, as well as Windows Server 2012, Windows 2012 R2, and Windows Server 2016.
It is licensed under MIT License and the source code is available on GitHub.
Example
Benchmark two drives (C: and E:) using a 100 MB test file, and run the test for a duration of 60 seconds (the default is 10).
C:\>diskspd -c100M -d60 c: e:
See also
Iometer
ProcDump
References
External links
TechNet DiskSpd: A Robust Storage Performance Tool
Using Microsoft DiskSpd to Test Your Storage Subsystem
Command-line software
Benchmarks (computing)
Free software programmed in C++
Microsoft free software
Software using the MIT license
Storage software
Utilities for Windows |
https://en.wikipedia.org/wiki/Human%20uses%20of%20plants | Human uses of plants include both practical uses, such as for food, clothing, and medicine, and symbolic uses, such as in art, mythology and literature. The reliable provision of food through agriculture is the basis of civilization. The study of plant uses by native peoples is ethnobotany, while economic botany focuses on modern cultivated plants. Plants are used in medicine, providing many drugs from the earliest times to the present, and as the feedstock for many industrial products including timber and paper as well as a wide range of chemicals. Plants give millions of people pleasure through gardening.
In art, mythology, religion, literature and film, plants play important roles, symbolising themes such as fertility, growth, purity, and rebirth. In architecture and the decorative arts, plants provide many themes, such as Islamic arabesques and the acanthus forms carved on to classical Corinthian order column capitals.
Context
Culture consists of the social behaviour and norms found in human societies and transmitted through social learning. Cultural universals in all human societies include expressive forms like art, music, dance, ritual, religion, and technologies like tool usage, cooking, shelter, and clothing. The concept of material culture covers physical expressions such as technology, architecture and art, whereas immaterial culture includes principles of social organization, mythology, philosophy, literature, and science. This article describes the many roles played by plants in human culture.
Practical uses
As food
Humans depend on plants for food, either directly or as feed for domestic animals. Agriculture deals with the production of food crops, and has played a key role in the history of world civilizations. Agriculture includes agronomy for arable crops, horticulture for vegetables and fruit, and forestry for timber. About 7,000 species of plant have been used for food, though most of today's food is derived from only 30 species. The major s |
https://en.wikipedia.org/wiki/Shelly%20Knotts | Shelly Knotts is a composer, performer and improvisor of live electronic, live coded and network music based in Newcastle upon Tyne, England. She performs internationally, often using Live coding techniques, and a range of styles including Noise, Drone and Algorave.
She often collaborates on performance, including a PRS for Music commission with Annie Mahtani, an audio/visual collaboration Sisesta Pealkiri with Alo Allik, uiaesk! with Holger Ballweg, Algobabez with Joanne Armitage, and as part of the Birmingham Laptop Ensemble. Her work often has a political dimension, using network music to explore social structures, and live coding to explore failure as an alternative to virtuosity, as well as exploring and encouraging diversity through workshops and hackathons. Knotts has also engaged with computer science in schools, through a Sonic Pi commission and BBC Live lesson.
Knotts is also active in event curation, including organising several Algorave events in Newcastle, three editions of the international Network Music Festival, chairing the Live Coding and Collaboration symposium in 2014, and chairing the artistic programme of the International Conference on Live coding in 2015. She was recognised as part of the Sound and Music New Voices cohort in 2014-2015, which aims to raise the profile for artists who exist outside of the support of commercial publishers or record companies, although she has been published by Leonardo Music Journal, ChordPunch, and Absenceofwax. In 2018 she completed a PhD in Live Computer Music at Durham University, supervised by Nick Collins and Peter Manning, with funding from the Department of Music and Hatfield College. She is currently a postdoctoral associate at the same institution.
References
External links
http://datamusician.net/ - official webpage
http://networkmusicfestival.org/ - Network Music Festival
Live coding
Living people
Algorave
Year of birth missing (living people)
Alumni of Hatfield College, Durham
Musicians fro |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.