source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/XDedic | xDedic was a Ukrainian-language crime forum, RDP shop and marketplace.
History
Founded some time in 2014, it was revealed in June 2016 Kaspersky Lab report as being a major hub in the trade of compromised servers. As of May 2016, 70,624 servers were offered for sale. Following this report, the site shut down only to quickly re-emerge on the Tor dark web.
Services
The compromised servers were focused on the areas of online gambling, ecommerce, banks and payment processors, online dating, advertising networks, ISP services, email service providers, web browser and instant messenger services. Various crimeware products were for sale.
The site featured a partner portal for the secure and verified listing of compromised data and standardised backdoor to be used.
Shut down
In January 2019, American and Belgian authorities working with Europol, Eurojust and Ukraine shut down xDedic, raiding sites and seizing the domain.
As of January 2020 the FBI are asking victims of machine take overs to come forward. In November 2022, a Moldovan site administrator was extradited from the Canary Islands, Spain to the United States.
References
Hacker groups
Crime forums
Cybercrime
Dark web
Tor onion services |
https://en.wikipedia.org/wiki/Sunway%20TaihuLight | The Sunway TaihuLight ( Shénwēi·tàihú zhī guāng) is a Chinese supercomputer which, , is ranked fourth in the TOP500 list, with a LINPACK benchmark rating of 93 petaflops. The name is translated as divine power, the light of Taihu Lake. This is nearly three times as fast as the previous Tianhe-2, which ran at 34 petaflops. , it is ranked as the 16th most energy-efficient supercomputer in the Green500, with an efficiency of 6.1 GFlops/watt. It was designed by the National Research Center of Parallel Computer Engineering & Technology (NRCPC) and is located at the National Supercomputing Center in Wuxi in the city of Wuxi, in Jiangsu province, China.
The Sunway TaihuLight was the world's fastest supercomputer for two years, from June 2016 to June 2018, according to the TOP500 lists. The record was surpassed in June 2018 by IBM's Summit.
Architecture
The Sunway TaihuLight uses a total of 40,960 Chinese-designed SW26010 manycore 64-bit RISC processors based on the Sunway architecture. Each processor chip contains 256 processing cores, and an additional four auxiliary cores for system management (also RISC cores, just more fully featured) for a total of 10,649,600 CPU cores across the entire system.
The processing cores feature 64 KB of scratchpad memory for data (and 16 KB for instructions) and communicate via a network on a chip, instead of having a traditional cache hierarchy.
Software
The system runs on its own operating system, Sunway RaiseOS 2.0.5, which is based on Linux. The system has its own customized implementation of OpenACC 2.0 to aid the parallelization of code.
Future development
China's first exascale supercomputer was scheduled to enter service by 2020 according to the head of the school of computing at the National University of Defense Technology (NUDT). According to the national plan for the next generation of high performance computers, the country would have develop an exascale computer during the 13th Five-Year-Plan period (2016–2020). The g |
https://en.wikipedia.org/wiki/Swing%20equation | A power system consists of a number of synchronous machines operating synchronously under all operating conditions. Under normal operating conditions, the relative position of the rotor axis and the resultant magnetic field axis is fixed. The angle between the two is known as the power angle, torque angle, or rotor angle. During any disturbance, the rotor decelerates or accelerates with respect to the synchronously rotating air gap magnetomotive force, creating relative motion. The equation describing the relative motion is known as the swing equation, which is a non-linear second order differential equation that describes the swing of the rotor of synchronous machine. The power exchange between the mechanical rotor and the electrical grid due to the rotor swing (acceleration and deceleration) is called Inertial response.
Derivation
A synchronous generator is driven by a prime mover. The equation governing the rotor motion is given by:
N-m
Where:
is the total moment of inertia of the rotor mass in kg-m2
is the angular position of the rotor with respect to a stationary axis in (rad)
is time in seconds (s)
is the mechanical torque supplied by the prime mover in N-m
is the electrical torque output of the alternator in N-m
is the net accelerating torque, in N-m
Neglecting losses, the difference between the mechanical and electrical torque gives the net accelerating torque Ta. In the steady state, the electrical torque is equal to the mechanical torque and hence the accelerating power is zero. During this period the rotor moves at synchronous speed ωs in rad/s. The electric torque Te corresponds to the net air-gap power in the machine and thus accounts for the total output power of the generator plus I2R losses in the armature winding.
The angular position θ is measured with a stationary reference frame. Representing it with respect to the synchronously rotating frame gives:
where, δm is the angular position in rad with respect to the synchronously rotati |
https://en.wikipedia.org/wiki/Sunway%20BlueLight | The Sunway BlueLight () is a Chinese massively parallel supercomputer. It is the first publicly announced PFLOPS supercomputer using Sunway processors solely developed by the People's Republic of China.
It ranked #2 in the 2011 China HPC Top100, #14 on the November 2011 TOP500 list, and #39 on the November 2011 Green500 List. The machine was installed at National Supercomputing Jǐnán Center () in September 2011 and was developed by National Parallel Computer Engineering Technology Research Center () and supported by Technology Department () 863 project. The water-cooled 9-rack system has 8704 ShenWei SW1600 processors (For the Top100 run 8575 CPUs were used, at 975 MHz each) organized as 34 super nodes (each consisting of 256 compute nodes), 150 TB main memory, 2 PB external storage, peak performance of 1.07016 PFLOPS, sustained performance of 795.9 TFLOPS, LINPACK efficiency 74.37%, and total power consumption 1074 kW.
The Sunway BlueLight is ranked 103rd (ranked highest at 14th when it appeared on the list in November 2011; then 65th in the November 2014)
See also
Sunway TaihuLight
Top500
References
2011 in technology
Supercomputers
Supercomputing in China |
https://en.wikipedia.org/wiki/Roofline%20model | The Roofline model is an intuitive visual performance model used to provide performance estimates of a given compute kernel or application running on multi-core, many-core, or accelerator processor architectures, by showing inherent hardware limitations, and potential benefit and priority of optimizations. By combining locality, bandwidth, and different parallelization paradigms into a single performance figure, the model can be an effective alternative to assess the quality of attained performance instead of using simple percent-of-peak estimates, as it provides insights on both the implementation and inherent performance limitations.
The most basic Roofline model can be visualized by plotting floating-point performance as a function of machine peak performance, machine peak bandwidth, and arithmetic intensity. The resultant curve is effectively a performance bound under which kernel or application performance exists, and includes two platform-specific performance ceilings: a ceiling derived from the memory bandwidth and one derived from the processor's peak performance (see figure on the right).
Related terms and performance metrics
Work
The work denotes the number of operations performed by a given kernel or application. This metric may refer to any type of operation, from number of array points updated, to number of integer operations, to number of floating point operations (FLOPs), and the choice of one or another is driven by convenience. In the majority of the cases however, is expressed as FLOPs.
Note that the work is a property of the given kernel or application and thus depend just partially on the platform characteristics.
Memory traffic
The memory traffic denotes the number of bytes of memory transfers incurred during the execution of the kernel or application. In contrast to , is heavily dependent on the properties of the chosen platform, such as for instance the structure of the cache hierarchy.
Arithmetic intensity
The arithmetic intensi |
https://en.wikipedia.org/wiki/Arithmetic%20Fuchsian%20group | Arithmetic Fuchsian groups are a special class of Fuchsian groups constructed using orders in quaternion algebras. They are particular instances of arithmetic groups. The prototypical example of an arithmetic Fuchsian group is the modular group . They, and the hyperbolic surface associated to their action on the hyperbolic plane often exhibit particularly regular behaviour among Fuchsian groups and hyperbolic surfaces.
Definition and examples
Quaternion algebras
A quaternion algebra over a field is a four-dimensional central simple -algebra. A quaternion algebra has a basis where and .
A quaternion algebra is said to be split over if it is isomorphic as an -algebra to the algebra of matrices .
If is an embedding of into a field we shall denote by the algebra obtained by extending scalars from to where we view as a subfield of via .
Arithmetic Fuchsian groups
A subgroup of is said to be derived from a quaternion algebra if it can be obtained through the following construction. Let be a totally real number field and a quaternion algebra over satisfying the following conditions. First there is a unique embedding such that is split over ; we denote by an isomorphism of -algebras. We also ask that for all other embeddings the algebra is not split (this is equivalent to its being isomorphic to the Hamilton quaternions). Next we need an order in . Let be the group of elements in of reduced norm 1 and let be its image in via . Then the image of is a subgroup of (since the reduced norm of a matrix algebra is just the determinant) and we can consider the Fuchsian group which is its image in .
The main fact about these groups is that they are discrete subgroups and they have finite covolume for the Haar measure on Moreover, the construction above yields a cocompact subgroup if and only if the algebra is not split over . The discreteness is a rather immediate consequence of the fact that is only split at one real embedding. The finitene |
https://en.wikipedia.org/wiki/Access%20control%20expression | An access control expression with respect to a computer file system is a list of Boolean expressions attached to a file object. An access control expression specifies a Boolean formula that defines which users or system processes are granted access to objects, as well as what operations are allowed on given objects. Each entry in a typical access control expression specifies an operation and an expression and an operation. For instance, if a file object has an access control expression that contains (read=(g:system OR u:Alice), write=(g:system AND !u:Bob))), this would give any member of the group or the user named Alice permission to read the file but would allow only members of the group to write the file, except for the user named Bob.
Conventional access control lists can be viewed as a subset of access control expressions in which the only combining operation allowed is OR.
Implementations
Few systems implement access control expressions. The MapR file system is one such system.
Move Toward Filesystem Access Control Expressions
Early Unix and Unix-like systems pioneered flexible permission schemes based on user and group membership. Initially, users could only belong to a single group, but this constraint was relaxed to allow membership in multiple groups. With an unlimited number of groups, arbitrarily complex permission schemes could be implemented, but only at the cost of exponentially many groups.
In order to allow more expressivity in the specification of filesystem permissions, a number of competing access control list implementations were developed for Microsoft Windows and Unix and Unix-like systems Linux. Access control lists were a substantial improvement over simple user and group permissions, but still could not easily express some common requirements (such as banning a single user from a group). Access control expressions were developed in response to such needs.
Comparison to access control lists
The permission expressions supported by acc |
https://en.wikipedia.org/wiki/MapR%20FS | The MapR File System (MapR FS) is a clustered file system that supports both very
large-scale and high-performance uses. MapR FS supports a variety of interfaces including
conventional read/write file access via NFS and a FUSE interface, as well as via the HDFS interface used by
many systems such as Apache Hadoop and Apache Spark. In addition to file-oriented access,
MapR FS supports access to tables and message streams using the Apache HBase and Apache Kafka APIs, as well as via a document database interface.
First released in 2010, MapR FS is now typically described as the MapR Converged Data Platform due
to the addition of tabular and messaging interfaces. The same core technology is, however, used to
implement all of these forms of persistent data storage and all of the interfaces are ultimately
supported by the same server processes. To distinguish the different capabilities of the overall
data platform, the term MapR FS is used more specifically to refer to the file-oriented interfaces,
MapR DB or MapR JSON DB is used to refer to the tabular interfaces and MapR Streams is used to
describe the message streaming capabilities.
MapR FS is a cluster filesystem that provides uniform access from files to other objects
such as tables used as universal namespace accessible from any client of the system. Access control
is also provided for files, tables and streams used as access control expressions, which is an
extension of the more common (and limited) access control list that allow permissions from
composed lists of allowed users or groups, but boolean instead allow combinations of
user id and groups.
History
MapR FS was developed in 2009 by MapR Technologies to extend the capabilities of
Apache Hadoop by providing a more performant and stable platform. The design of MapR FS is
influenced by various other systems such as the Andrew File System (AFS). The concept of
volumes in AFS has some strong similarity from the point of the view of users, although the
imple |
https://en.wikipedia.org/wiki/Alina%20%28malware%29 | Alina is a Point of Sale Malware or POS RAM Scraper that is used by cybercriminals to scrape credit card and debit card information from the point of sale system. It first started to scrape information in late 2012. It resembles JackPOS Malware.
Process of Alina POS RAM Scraper
Once executed, it gets installed on the user's computer and checks for updates. If an update is found, it removes the existing Alina code and installs the latest version. Then, for new installations, it adds the file path to an AutoStart runkey to maintain persistence. Finally, it adds java.exe to the %APPDATA% directory and executes it using the parameter alina=<path_to_executable> for new installations or, update=<orig_exe>;<new_exe> for upgrades.
Alina inspects the user's processes with the help of Windows API calls:
CreateToolhelp32Snapshot() takes a snapshot of all running processes
Process32First()/Process32Next() retrieve the track 1 and track 2 information in the process memory
Alina maintains a blacklist of processes, if there is no process information in the blacklist it uses OpenProcess() to read and process the contents in the memory dump. Once the data is scraped Alina sends it to C&C servers using an HTTP POST command that is hardcoded in binary.
See also
Point-of-sale malware
Cyber security standards
List of cyber attack threat trends
References
Carding (fraud)
Cyberwarfare
Windows trojans |
https://en.wikipedia.org/wiki/Solar-assisted%20heat%20pump | A solar-assisted heat pump (SAHP) is a machine that represents the integration of a heat pump and thermal solar panels in a single integrated system. Typically these two technologies are used separately (or only placing them in parallel) to produce hot water. In this system the solar thermal panel performs the function of the low temperature heat source and the heat produced is used to feed the heat pump's evaporator. The goal of this system is to get high COP and then produce energy in a more efficient and less expensive way.
It is possible to use any type of solar thermal panel (sheet and tubes, roll-bond, heat pipe, thermal plates) or hybrid (mono/polycrystalline, thin film) in combination with the heat pump. The use of a hybrid panel is preferable because it allows covering a part of the electricity demand of the heat pump and reduce the power consumption and consequently the variable costs of the system.
Optimization
The operating conditions' optimization of this system is the main problem, because there are two opposing trends of the performance of the two sub-systems: by way of example, decreasing the evaporation temperature of the working fluid increases the thermal efficiency of the solar panel but decreases the performance of the heat pump, and consequently the COP. The target for the optimization is normally the minimization of the electrical consumption of the heat pump, or primary energy required by an auxiliary boiler which supplies the load not covered by renewable source.
Configurations
There are two possible configurations of this system, which are distinguished by the presence or not of an intermediate fluid that transports the heat from the panel to the heat pump. Machines called indirect-
expansion mainly use water as a heat transfer fluid, mixed with an antifreeze fluid (usually glycol) to avoid ice formation phenomena during winter period. The machines called direct-expansion place the refrigerant fluid directly inside the hydraulic circui |
https://en.wikipedia.org/wiki/BMJ%20Best%20Practice | BMJ Best Practice is an online decision-support tool for use at the point of care. It was created in 2009 by The BMJ.
Development
The BMJ launched Best Practice in 2009.
Product
In a 2016 article published in the Journal of Medical Internet Research, BMJ Best Practice received maximum scores for strength of volume, editorial quality, and evidence-based methodology.
Access
The BMJ offers both personal and institutional subscriptions to the tool. Only institutional subscriptions are available to purchase in the United States and Canada. All institutional subscriptions include onsite and remote access as well as access to the mobile app for iOS and Android devices. It is also included in the Clinical Information Access Portal of the New South Wales Ministry of Health.
See also
UpToDate
DynaMed
References
Evidence-based medicine
British medical websites
Medical databases
Online databases |
https://en.wikipedia.org/wiki/Timeline%20of%20speech%20and%20voice%20recognition | This is a timeline of speech and voice recognition, a technology which enables the recognition and translation of spoken language into text.
Overview
Full timeline
See also
Speech recognition
List of speech recognition software
References
Speech recognition
Speech and voice recognition |
https://en.wikipedia.org/wiki/Business%20delegate%20pattern | Business delegate is a Java EE design pattern.
This pattern is directed towards reducing the coupling in between business services and the connected presentation tier, and to hide the implementation details of services (including lookup and accessibility of EJB architecture). Business delegates acts as an adaptor to invoke business objects from the presentation tier.
Structure
Requests to access underlying business services are sent from clients, and lookup services are used by business delegates to locate the business service components.
Components
Basic components are Business delegate, Lookup service and business service.
Business delegate
Control and protection are provided through business delegate which can have two types of constructures, without ID and with ID, where ID is a string version of the reference to a remote object such as EJBHome or EJBObject.
Lookup service
Business service is located by lookup service which is used by the business delegate. The implementation details of business service lookup is encapsulated by lookup service.
Business service
This a business-tier component, such as an enterprise bean or a JMS component, which provides the required service to the client.
Consequences
Some consequences are as follows:
More flexibility and maintainability as intermediate business delegate layer decouples the business layer from the presentation layer.
Business delegate exposes a uniform API to the presentation tier to access business logic.
Concerns
Following concerns can be considered:
Maintenance due to the extra layer that increases the number of classes in the application.
Business delegate should take care of the changes of the remote business object interfaces, and these types of changes are rare.
Sample code
A sample code for a Professional Services Application (PSA), where a Web-tier client needs to access a session bean that implements the session facade pattern, is provided below.
Resource Delegate:
public class ResourceD |
https://en.wikipedia.org/wiki/DroidKungFu | DroidKungFu is a malware that affects Android OS. It primarily targets users in China. The first evidence of this malware was found in the Android Market in March 2011.
History
DroidKungFu was discovered by US-based researchers Yajin Zhou and Xuxian Jiang. The two discovered this malware while working at North Carolina State University. It targets the Android 2.2 platform and allows hackers to access and control devices. DroidKungFu malware can collect some user data through backdoor hacking.
Process of DroidKungFu malware
DroidkungFu encrypts two different root exploits: a udev exploit and a "RageAgainsTheCage" exploit, to break android security. Once executed, it decrypts the exploits and communicates with a remote server without user knowledge.
Function
Silent mobile device rooting
Unlocks all system files and functions
Installs itself without any user interaction
Data collected
IMEI number
Phone model
Android OS version
Network operator
Network type
Information stored in the Phone & SD Card memory
See also
Botnet
Command and control (malware)
Denial-of-service attack
File binder
Shedun
Trojan horse
Zombie (computer science)
Zeus (malware)
References
Android (operating system) malware
Denial-of-service attacks
Mobile malware |
https://en.wikipedia.org/wiki/N-Butyl%20lactate | n-Butyl lactate is an industrial chemical and food additive.
Uses
In an industrial context, n-butyl lactate is used as a solvent and as a chemical feedstock. It is used as a dairy-related flavoring agent.
Metabolism
It is metabolized to lactic acid, which is in turn metabolized to n-butanol, n-butyraldehyde, and n-butyric acid.
Safety
n-Butyl lactate reacts with strong acids, strong bases, and oxidizers. It is also flammable. Exposure to dangerous amounts can occur through inhalation, ingestion, skin contact, or eye contact and causes irritation of the affected area, drowsiness, headache, central nervous system depression, nausea, and vomiting. It is approved as a food additive by the US Food and Drug Administration.
References
Lactate esters
Food additives
Butyl compounds |
https://en.wikipedia.org/wiki/VELCT | Velocity Energy-efficient and Link-aware Cluster-Tree (VELCT) is a cluster and tree-based topology management protocol for mobile wireless sensor networks (MWSNs).
See also
DCN
DCT
CIDT
References
Topology
Wireless networking |
https://en.wikipedia.org/wiki/Human%20uses%20of%20mammals | Human uses of mammals include both practical uses, such as for food, sport, and transport, and symbolic uses, such as in art and mythology. Mammals have played a crucial role in creating and sustaining human culture. Domestication of mammals was instrumental in the Neolithic development of agriculture and of civilisation, causing farming to replace hunting and gathering around the world, and cities to replace scattered communities.
Mammals provide dairy products and much of the meat eaten by the human population, whether farmed or hunted. They also yielded leather and wool for clothing and equipment. Until the arrival of mechanised transport, domesticated mammals provided a large part of the power used for work and transport. They serve as models in biological research, such as in genetics, and in drug testing.
Mammals are the most popular of pets, with tens of millions of dogs, cats and other animals including rabbits and mice kept by families around the world. Mammals such as horses and deer are among the earliest subjects of art, being found in the Upper Paleolithic cave paintings such as at Lascaux. Major artists such as Albrecht Dürer, George Stubbs and Edwin Landseer are known for their portraits of animals. Animals further play a wide variety of roles in literature, film, mythology, and religion.
A major way that people relate to mammals (and some other animals) is by anthropomorphising them, ascribing human emotions and goals to them. This has been deprecated when it occurs in science, though more recently zoologists have taken a more lenient view of it.
Context
Culture consists of the social behaviour and norms found in human societies and transmitted through social learning. Cultural universals in all human societies include expressive forms like art, music, dance, ritual, religion, and technologies like tool usage, cooking, shelter, and clothing. The concept of material culture covers physical expressions such as technology, architecture and art, whe |
https://en.wikipedia.org/wiki/Loop%20perforation | Loop perforation is an approximate computing technique that allows to regularly skip some iterations of a loop.
It relies on one parameter: the perforation rate. The perforation rate can be interpreted as the number of iteration to skip each time or the number of iterations to perform before skipping one.
Variants of loop perforation include those that skip iterations deterministically at regular intervals, those that skip iterations at the beginning or the end of the loop, and those that skip a random sample of iterations. The compiler may select the perforation variant at the compile-time, or include instrumentation that allows the runtime system to adaptively adjust the perforation strategy and perforation rate to satisfy the end-to-end accuracy goal.
Loop perforation techniques were first developed by MIT senior researchers Martin C. Rinard and Stelios Sidiroglou.
Code examples
The examples that follows provide the result of loop perforation applied on this C-like source code
for (int i = 0; i < N; i++) {
// do things
}
Skip n iterations each time
for (int i = 0; i < N; i++) {
// do things
i = i + skip_factor;
}
Skip one iteration after n
int count = 0;
for (int i = 0; i < N; i++) {
if (count == skip_factor) {
count = 0;
} else {
// do things
count++;
}
}
See also
Approximate computing
Task skipping
Memoization
Software optimization |
https://en.wikipedia.org/wiki/Trust%20service%20provider | A trust service provider (TSP) is a person or legal entity providing and preserving digital certificates to create and validate electronic signatures and to authenticate their signatories as well as websites in general. Trust service providers are qualified certificate authorities required in the European Union and in Switzerland in the context of regulated electronic signing procedures.
History
The term trust service provider was coined by the European Parliament and the European Council as important and relevant authority providing non-repudiation to a regulated electronic signing procedure. It was first brought up in the Electronic Signatures Directive 1999/93/EC and was initially named certification-service provider. The directive was repealed by the eIDAS Regulation which became official on July 1, 2016. A regulation is a binding legislative act that requires all EU member states to follow.
Description
The trust service provider has the responsibility to assure the integrity of electronic identification for signatories and services through strong mechanisms for authentication, electronic signatures and digital certificates. eIDAS defines the standards for how trust service providers are to perform their services of authentication and non-repudiation. The regulation provides guidance to EU member states on how trust service providers shall be regulated and recognized.
A trust service is defined as an electronic service that entails one of three possible actions. First it may concern the creation, the verification or the validation of electronic signatures, as well as time stamps or seals, electronically registered delivery services and certifications that are required with these services. The second action entails the creation, the verification as well as the validation of certificates that are used to authenticate websites. The third action is the preservation of these electronic signatures, the seals or the related certificates.
To be elevated to the level |
https://en.wikipedia.org/wiki/Task%20skipping | Task skipping is an approximate computing technique that allows to skip code blocks according to a specific boolean condition to be checked at run-time.
This technique is usually applied on the most computational-intensive section of the code.
It relies on the fact that a tuple of values sequentially computed are going to be useful only if the whole tuple meet certain conditions. Knowing that a value of the tuple invalides or probably will invalidate the whole tuple, it is possible to avoid the computation of the rest of the tuple.
Code example
The example that follows provides the result of task skipping applied on this C-like source code
for (int i = 0; i < N; i++) {
value_1 = compute_1(i);
value_2 = compute_2(i);
}
Skipping a task
for (int i = 0; i < N; i++) {
value_1 = compute_1(i);
if (value_1 >= fixed_threshold) {
value_2 = compute_2(i);
}
}
See also
Loop perforation
Memoization
Software optimization |
https://en.wikipedia.org/wiki/Invasion%20percolation | Invasion percolation is a mathematical model of realistic fluid distributions for slow immiscible fluid invasion in porous media, in percolation theory.
It "explicitly takes into account the transport process taking place". A wetting fluid such as water takes over from a non-wetting fluid such as oil, and capillary forces are taken into account. It was introduced by Wilkinson and Willemsen (1983).
References
Percolation theory
Fluid dynamics |
https://en.wikipedia.org/wiki/Anatoly%20Styopin | Anatoly Mikhailovich Styopin ( (may be transliterated as Stepin), 20 July 1940 – 7 November 2020) was a Soviet-Russian mathematician, specializing in dynamical systems and ergodic theory.
Education and career
Stepin was born in Moscow on 20 July 1940. In 1965 he graduated from the Mechanics and Mathematics Faculty of Moscow State University. There he received in 1968 his Ph.D. under Felix Berezin with thesis "Применение метода аппроксимации динамических систем периодическими в спектральной теории" (Application of the method of approximation of dynamical systems by periodic spectral theory) and in 1986 his Russian doctorate (Doctor Nauk) with thesis "Спектральные и метрические свойства динамических систем и групп преобразований" (Spectral and metric properties of dynamical systems and groups of transformations). In 1970 he was an Invited Speaker at the ICM in Nice. In 1993 he was awarded the academic title of Professor in Mathematics. Since 1993, he has taught at the department of the theory of functions and functional analysis of the Mechanics and Mathematics Faculty of Moscow State University. In 2009 he was awarded the title of Honorary Professor of Moscow State University. His doctoral students include Rostislav Grigorchuk and Yiangdong Ye.
On 7 November 2020, Stepin died at the age of 80.
Awards
Kolmogorov Prize (together with Boris Markovich Gurevich and Valery lustinovich Oseledets) for 2009 — for their series of works ergodic theory and related topics
Award of the Moscow Mathematical Society
References
External links
1940 births
2020 deaths
Soviet mathematicians
Russian mathematicians
Dynamical systems theorists
Mathematical analysts
Moscow State University alumni
Academic staff of Moscow State University |
https://en.wikipedia.org/wiki/Visual%20workplace | The visual workplace is a continuous improvement paradigm that is closely related to lean manufacturing, the Toyota Production System (TPS), and operational excellence yet offers its own comprehensive methodology that aims for significant financial and cultural improvement gains. Introduced by Gwendolyn Galsworth in her 1997 book Visual Systems, this system integrates and codifies the many iterations of visuality in the world of continuous improvement.
Brief history of visual information sharing
Visual communication rests on the natural inclination of humans to use pictures, graphics, and other images to quickly and simply convey meaning and understand information. For instance, look at the practices and applications that civil engineers have developed to handle complex human interaction on our roads and highways, as well as the entire field of wayfinding in public spaces.
The same logic eventually migrated into the workplace, notably in post-war Japan, and most saliently at Toyoda Motors where visual applications (visual devices) became a commonplace element in the Toyota Production System (TPS). Other leading companies in Japan, such as Canon and Okidata, adopted many of the same practices. However, while visibility was clearly a part of Japan's success solution, it was only noticed—or cited in the literature—as a generalized principle and not a codified system or a framework of thinking. For example, Robert W. Hall, in his 1983 book, Zero Inventories, states: "Establishing visibility of all forms of production problems is very important. ... The entire idea is instant communication."
Specifically, Japan's JIT (just-in-time) manufacturing approach had an easy-to-understand visual interface: andon (stacked lights), kanban (pick-up tickets for control material quantity), color-coding (to make the match between items), scheduling boards for daily production, easy-to-read labels on shelving, and lines on the floor to trace out locations.
Japanese master practitio |
https://en.wikipedia.org/wiki/Remote%20SIM%20provisioning | Remote SIM provisioning is a specification realized by GSMA that allows consumers to remotely activate the subscriber identity module (SIM) embedded in a portable device such as a smart phone, smart watch, fitness band or tablet computer. The specification was originally part of the GSMA's work on eSIM and it is important to note that remote SIM provisioning is just one of the aspects that this eSIM specification includes. The other aspects being that the SIM is now structured into "domains" that separate the operator profile from the security and application "domains". In practise "eSIM upgrade" in the form of a normal SIM card is possible (using the Android 9 eSIM APIs) or eSIM can be included into an SOC. The requirement of GSMA certification is that personalisation packet is decoded inside the chip and so there is no way to dump Ki, OPc and 5G keys. Another important aspect is that the eSIM is owned by the enterprise, and this means that the enterprise now has full control of the security and applications in the eSIM, and which operators profiles are to be used.
Background to the specification
In the background of the technology looked to address the following issues:
The development of non-removable SIM technology - a new generation of SIM-cards like MFF which are soldered into the device.
The appearance and support by mobile operators of the concept of ABC (always best connected) – the opportunity get quality connections from any mobile operator at any point in time.
The explosive growth of the Internet of Things (IoT) - according to Gartner about 8.4 billion connections in 2017 (up 31% from 2016).
The cost and effort required to swap a SIM in a device that has been deployed in the field.
Origin
The GSM Association (GSMA) which brings together about 800 operators and 250 mobile ecosystem companies became the first to come up with the Consumer Remote SIM Provisioning initiative. The beginning of creation the technology was announced in the summer 2014 |
https://en.wikipedia.org/wiki/Intel%208257 | The Intel 8257 is a direct memory access (DMA) controller, a part of the MCS 85 microprocessor family. The chip is supplied in 40-pin DIP package.
External links
Intel: 8257/8257-5 Programmable DMA Controller (PDF; 2,2 MB).
NEC Electronics (Europe) GmbH, 1982 Catalog, p. 665–674 (μPD8257; μPD8257C-5).
Intel chipsets
Input/output integrated circuits |
https://en.wikipedia.org/wiki/Intel%208289 | The Intel 8289 is a Bus arbiter designed for Intel 8086/8087/8088/8089. The chip is supplied in 20-pin DIP package. The 8086 (and 8088) operate in maximum mode, so they are configured primarily for multiprocessor operation or for working with coprocessors. Necessary control signals are generated by the 8289. This version was available for US$44.80 in quantities of 100.
References
External links
Jim Nadir: Designing 8086, 8088, 8089 Multiprocessing System With The 8289 Bus Arbiter, Application Note (AP-51), März 1979, Intel Corporation.
Bus-Arbiter
Intel chipsets
Input/output integrated circuits |
https://en.wikipedia.org/wiki/Aeronautics%20Research%20Mission%20Directorate | The Aeronautics Research Mission Directorate (ARMD) is one of five mission directorates within NASA, the other four being the Exploration Systems Development Mission Directorate, the Space Operations Mission Directorate, the Science Mission Directorate, and the Space Technology Mission Directorate. The ARMD is responsible for NASA's aeronautical research, which benefits the commercial, military, and general aviation sectors. The current NASA associate administrator heading ARMD is Robert A. Pearce who has held the position since 2019.
ARMD is involved in the creation of the Next Generation Air Transportation System (NextGen).
A 2014 audit by the NASA Office of Inspector General reported that ARMD "solicits input from industry, academia, and other Federal agencies regarding research needs and...uses this information to develop its research plans", and concluded that the directorate supported "advancement of the nation's civil aeronautics research and technology objectives consistent with the National Plan" established in 2006.
ARMD performs its aeronautics research at four NASA facilities: Ames Research Center and Armstrong Flight Research Center in California, Glenn Research Center in Ohio, and Langley Research Center in Virginia.
Funding
According to a 2012 report by the National Academies of Sciences, Engineering, and Medicine, NASA's aeronautics budget declined from over $1 billion in 2000 to $570 million in 2010, while shrinking from approximately seven percent of NASA's total budget in 2000 to around three percent in 2010. Its staffing decreased by approximately four percent between 2006 and 2010. The result was the elimination of much flight research, hindering the advance of technologies and causing some research projects to collapse. In addition, the ambition of flight research projects decreased with respect to technical complexity, risk, and benefit to the nation. This decreased ambition was attributed to a risk-averse culture within NASA's aeronautics |
https://en.wikipedia.org/wiki/FastPOS | FastPOS is a variant of POS malware discovered by Trend Micro researchers. The new POS malware foregrounds on how speed the credit card data is stolen and sent back to the hackers.
History
Researchers at Trend Micro have named the new malware variant as TSPY_FASTPOS.SMZTDA. The malware is used by hackers to target small and mid-sized businesses (SMBs) in many countries like France, Taiwan, Japan, Brazil, Hong Kong and United States.
Operation
Unlike other POS malware, FastPOS does not store the information locally to send it to the cyber thieves periodically. The variant POS malware executes the attack on the target through infected websites or through Virtual Network Computing (VNC) or via file sharing service. The stolen data is instantly transferred to the Control and Command Server that is hardcoded by the hacker. The POS malware consists of two components– a keylogger and a RAM scraper. The logged keystrokes are stored in memory and transmitted to the attacker when the Enter key is pressed and are not stored in a file of the infected system. The stolen data can be user credentials, payment information which depends on the business procedures. The RAM scraper is devised to steal only credit card data. The memory scraper is designed to verify the service code of the credit card to help remove out cards that demands PINS.
See also
Point-of-sale malware
Cyber security standards
List of cyber attack threat trends
References
Windows trojans
Cyberwarfare
Carding (fraud) |
https://en.wikipedia.org/wiki/Placental%20microbiome | The placental microbiome is the nonpathogenic, commensal bacteria claimed to be present in a healthy human placenta and is distinct from bacteria that cause infection and preterm birth in chorioamnionitis. Until recently, the healthy placenta was considered to be a sterile organ but now genera and species have been identified that reside in the basal layer.
It should be stressed that the evidence for a placental microbiome is controversial. Most studies supporting the existence of a placental microbiome lack the appropriate experimental controls, and it has been found that contamination is most likely responsible for reports of a placental microbiome.
The placental microbiome more closely resembles that of the oral microbiome than either the vaginal or rectal microbiome.
Bacterial species and genera
Culturable and non-culturable bacterial species in the placenta obtained following normal term pregnancy have been identified.
In a healthy placental microbiome, the diversity of the species and genera is extensive. A change in the composition of the microbiota in the placenta is associated with excess gestational weight gain, and pre-term birth.
The placental microbiota varies between low birth weight infants and those infants with normal birth weights.
While bacteria are often found in the amniotic fluid of failed pregnancies, they are also found in particulate matter that is found in about 1% of healthy pregnancies.
In non-human animals, part of the microbiome is passed onto offspring even before the offspring are born. Bacteriologists assume that the same probably holds true for humans.
Research
The fact that germ free animals can be routinely generated by sterile cesarean section provides strong experimental evidence for the sterile womb hypothesis.
Future research may find that the microbiota of the female reproductive tract may be related to pregnancy, conception, and birth. Animal studies have been used to investigate the relationship between oral micr |
https://en.wikipedia.org/wiki/Media.net | 1-media.net is a contextual advertising network. On August 21, 2016, Miteno Communication Technology (also known as Shuzhi.AI), a Chinese consortium acquired Media.net for US$900 million. The deal is said to be the third largest ad tech acquisition ever.
By revenue, Media.net is the second-largest contextual advertising network in the world. It is also one of the top 5 largest ad tech companies worldwide by market cap. The company has over 1300 employees across North America, Asia and Europe. It has its HQ in New York and its global HQ in Dubai.
History
Media.net was founded by Divyank Turakhia.
References
External links
Official website
Online advertising
Online advertising services and affiliate networks
Contextual advertising
Advertising tools
Companies based in Dubai
Companies with year of establishment missing |
https://en.wikipedia.org/wiki/Prusa%20i3 | The Prusa i3 is a family of fused deposition modeling 3D printers, manufactured by Czech company Prusa Research under the trademarked name Original Prusa i3. Part of the RepRap project, Prusa i3 printers were called the most used 3D printer in the world in 2016. The first Prusa i3 was designed by Josef Průša in 2012, and was released as a commercial kit product in 2015. The latest model (Prusa MK4 on sale as of March 2023) is available in both kit and factory assembled versions. The Prusa i3's comparable low cost and ease of construction and modification made it popular in education and with hobbyists and professionals, with the Prusa i3 model MK2 printer receiving several awards in 2016.
The i3 series is released under an open source license, so many other companies and individuals have made variants of the printer.
Models
RepRap Mendel
First conceived in 2009, RepRap Mendel 3D printers were designed to be assembled from 3D printed parts and commonly available off-the-shelf components (referred to as "vitamins," as they cannot be produced by the printer itself). These parts include threaded rods, leadscrews, smooth rods and bearings, screws, nuts, stepper motors, control circuit boards, and a "hot end" to melt and place thermoplastic materials. A Cartesian mechanism permits placement of material anywhere in a cubic volume; this design has continued throughout development of the i3 series. The flat "print bed" (the surface on which parts are printed) is movable in one axis (Y), while two horizontal and two vertical rods permit tool motion in two axes, designated X and Z.
Prusa Mendel
Josef Průša, a core developer of the RepRap project who had previously developed a PCB heated "print bed", adapted and simplified the RepRap Mendel design, reducing the time to print 3D plastic parts from 20 to 10 hours, and including 3D printed bushings in place of regular bearings. First announced in September 2010, the printer was dubbed Prusa Mendel by Průša himself. According |
https://en.wikipedia.org/wiki/Uterine%20microbiome | The uterine microbiome is the commensal, nonpathogenic, bacteria, viruses, yeasts/fungi present in a healthy uterus, amniotic fluid and endometrium and the specific environment which they inhabit. It has been only recently confirmed that the uterus and its tissues are not sterile. Due to improved 16S rRNA gene sequencing techniques, detection of bacteria that are present in low numbers is possible.
Using this procedure that allows the detection of bacteria that cannot be cultured outside the body, studies of microbiota present in the uterus are expected to increase.
Uterine microbiome and fertility
Evidence shows that the presence of uterine bacterial 16S rRNA gene amplification is not the result of sampling or analysis error and deserves to be acknowledged. Concept of the sterile endometrium, and the uterine compartment in general, is outdated; although the true core uterine microbiome still needs to be assessed, and may vary across cultural and regional divides. Functional studies are needed to elucidate the physiological importance of the microbiome in fertility. The challenge of studying reproductive immunology and the microbiota involved is that research on all of the different aspects is still in its infancy; the microbiome, immunity, and endocrinology in pregnancy need to be studied both locally and temporally with placental and fetal development to obtain a more comprehensive overview.
Characteristics
Bacteria, viruses and one genus of yeasts are a normal part of the uterus before and during pregnancy. The uterus has been found to possess its own characteristic microbiome that differs significantly from the vaginal microbiome, consisting primarily of lactobacillus species, and at far fewer numbers. In addition, the immune system is able to differentiate between those bacteria normally found in the uterus and those that are pathogenic. Hormonal changes have an effect on the microbiota of the uterus.
Taxa
Commensals
The organisms listed below have bee |
https://en.wikipedia.org/wiki/Profit%20extraction%20mechanism | In mechanism design and auction theory, a profit extraction mechanism (also called profit extractor or revenue extractor) is a truthful mechanism whose goal is to win a pre-specified amount of profit, if it is possible.
Profit extraction in a digital goods auction
Consider a digital goods auction in which a movie producer wants to decide on a price in which to sell copies of his movie. A possible approach is for the producer to decide on a certain revenue, R, that he wants to make. Then, the R-profit-extractor works in the following way:
Ask each agent how much he is willing to pay for the movie.
For each integer , let be the number of agents willing to pay at least . Note that is weakly increasing with .
If there exists such that , then find the largest such (which must be equal to ), sell the movie to these agents, and charge each such agent a price of .
If no such exists, then the auction is canceled and there are no winners.
This is a truthful mechanism. Proof: Since the agents have single-parametric utility functions, truthfulness is equivalent to monotonicity. The profit extractor is monotonic because:
If a winning agent increases his bid, then weakly increases and the agent is still one of the highest bidders, so he still wins.
A winning agent pays , which is exactly the threshold price - the price under which the bid stops being a winner.
Estimating the maximum revenue
The main challenge in using an auction based on a profit-extractor is to choose the best value for the parameter . Ideally, we would like to be the maximum revenue that can be extracted from the market. However, we do not know this maximum revenue in advance. We can try to estimate it using one of the following ways:
1. Random sampling:
randomly partition the bidders to two groups, such that each bidder has a chance of 1/2 to go to each group. Let R1 be the maximum revenue in group 1 and R2 the maximum revenue in group 2. Run R1-profit-extractor in group 2, and R2-profit- |
https://en.wikipedia.org/wiki/Privacy%20Impact%20Assessment | A Privacy Impact Assessment (PIA) is a process which assists organizations in identifying and managing the privacy risks arising from new projects, initiatives, systems, processes, strategies, policies, business relationships etc. It benefits various stakeholders, including the organization itself and the customers, in many ways. In the United States and Europe, policies have been issued to mandate and standardize privacy impact assessments.
Overview
A Privacy Impact Assessment is a type of impact assessment conducted by an organization (typically, a government agency or corporation with access to a large amount of sensitive, private data about individuals in or flowing through its system). The organization reviews its own processes to determine how these processes affect or might compromise the privacy of the individuals whose data it holds, collects, or processes. PIAs have been conducted by various sub-agencies of the U.S. Department of Homeland Security (DHS), and methods to conduct them have been standardized.
A PIA is typically designed to accomplish three main goals:
Ensure conformance with applicable legal, regulatory, and policy requirements for privacy.
Identify and evaluate the risks of privacy breaches or other incidents and effects.
Identify appropriate privacy controls to mitigate unacceptable risks.
A privacy impact report seeks to identify and record the essential components of any proposed system containing significant amounts of personal information and to establish how the privacy risks associated with that system can be managed. A PIA will sometimes go beyond an assessment of a "system" and consider critical "downstream" effects on people who are affected in some way by the proposal.
Purpose
Since PIA concerns an organization's ability to keep private information safe, the PIA should be completed whenever said organization is in possession of the personal information on its employees, clients, customers and business contacts etc. Althou |
https://en.wikipedia.org/wiki/Sanctus%20%28species%29 | The species name sanctus (Latin for "sacred") occurs in several binomial names in the taxonomy of life. Examples include:
Confuciusornis sanctus, a prehistoric primitive bird
Rubus ulmifolius subsp. sanctus, or holy bramble
Todiramphus sanctus, the sacred kingfisher
Tarachodes sanctus, a species of praying mantis
Broad-concept articles
Taxonomy (biology)
Taxonomic lists |
https://en.wikipedia.org/wiki/Ikee | Ikee was a worm that spread by Secure Shell connections between jailbroken iPhones. It was discovered in 2009 and changed wallpapers to a photo of Rick Astley. The code from Ikee was later used to make a more malicious iPhone malware, called Duh.
History
iPhone owners of Australia reported that smart phones had been infected by a worm that changed their iPhone wallpaper to Rick Astley, a 1980s pop singer. It affected smartphones if the owner did not change their default password after installation of SSH. Once the Ikee worm infected, it would find other iPhones on the mobile network which were vulnerable and infect them as well. The worm wouldn't affect users who hadn't jailbroken or installed SSH on their iPhone. The worm does nothing more than changing the infected user's lock screen wallpaper. The source code of the ikee worm says it was written by Ikex.
Two weeks after the release of Ikee, a malicious worm dubbed "Duh", built off the code of Ikee, was discovered. it acted as a Botnet, communicating with a command and control center. it also attempted to steal banking data from ING Direct.
See also
Brain Test
Dendroid (Malware)
Computer virus
File binder
Individual mobility
Malware
Trojan horse (computing)
Worm (computing)
Mobile operating system
References
IOS malware
Computer worms
Software distribution
Privilege escalation exploits
Online advertising
Privacy |
https://en.wikipedia.org/wiki/Human%20uses%20of%20reptiles | Human uses of reptiles have for centuries included both symbolic and practical interactions.
Symbolic uses of reptiles include accounts in mythology, religion, and folklore as well as pictorial symbols such as medicine's serpent-entwined caduceus. Myths of creatures with snake-like or reptilian attributes are found around the world, from Chinese and European dragons to the Woolunga of Australia. Classical myths told of the nine-headed Lernaean Hydra, the Gorgon sisters including the snake-haired Medusa, and the snake-legged Titans. Crocodiles appear in the religions of Ancient Egypt, in Hinduism, and in Aztec and other Latin American cultures.
Practical uses of reptiles include the manufacture of snake antivenom and the farming of crocodiles, principally for leather but also for meat. Reptiles still pose a threat to human populations, as snakes kill some tens of thousands each year, while crocodiles attack and kill hundreds of people per year in Southeast Asia and Africa. However, people keep some reptiles such as iguanas, turtles, and the docile corn snake as pets.
Soon after their discovery in the nineteenth century, dinosaurs were represented to the public as the large-scale sculptures of the Crystal Palace Dinosaurs, while in the twentieth century they became important elements in the popular imagination, thought of as maladapted and obsolete failures, but also as fantastic and terrifying creatures in monster movies. In folklore, crocodiles were thought to weep to lure their prey, or in sorrow for their prey, a tale told in the classical era, and repeated by Sir John Mandeville and William Shakespeare. Negative attitudes to reptiles, especially snakes, have led to widespread persecution, contributing to the challenge of conserving reptiles in the face of the effects of human activity such as habitat loss and pollution.
Context
Culture consists of the social behaviour and norms found in human societies and transmitted through social learning. Cultural univer |
https://en.wikipedia.org/wiki/Comparison%20of%20computer-assisted%20translation%20tools | A number of computer-assisted translation software and websites exists for various platforms and access types. According to a 2006 survey undertaken by Imperial College of 874 translation professionals from 54 countries, primary tool usage was reported as follows: Trados (35%), Wordfast (17%), Déjà Vu (16%), SDL Trados 2006 (15%), SDLX (4%), (3%), OmegaT (3%), others (7%).
The list below includes only some of the existing available software and website platforms.
See also
Machine translation
Comparison of machine translation applications
References
Language software
Translation
Computer-assisted translation |
https://en.wikipedia.org/wiki/Glossary%20of%20electrical%20and%20electronics%20engineering | This glossary of electrical and electronics engineering is a list of definitions of terms and concepts related specifically to electrical engineering and electronics engineering. For terms related to engineering in general, see Glossary of engineering.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
See also
Glossary of engineering
Glossary of civil engineering
Glossary of mechanical engineering
Glossary of structural engineering
References
Electrical-engineering-related lists
Electronic engineering
electrical and electronics engineering
Electrical and electronics engineering
Wikipedia glossaries using description lists |
https://en.wikipedia.org/wiki/Animal%20epithet | An animal epithet is a name used to label a person or group, by association with some perceived quality of an animal. Epithets may be formulated as similes, explicitly comparing people with the named animal, as in "he is as sly as a fox", or as metaphors, directly naming people as animals, as in "he is a [sly] fox". Animal epithets may be pejorative, of negative character, or positive, indicating praise.
Animal similes and metaphors have been used since classical times, for example by Homer and Virgil, to heighten effects in literature, and to sum up complex concepts concisely.
Surnames that name animals are found in different countries. They may be metonymic, naming a person's profession, generally in the Middle Ages; toponymic, naming the place where a person lived; or nicknames, comparing the person favourably or otherwise with the named animal.
History
In the cultures of ancient Greece and ancient Rome, animal stereotypes grew until by the time of Virgil, animal epithets could be applied to anything from an abstract concept like love or fear, to a whole civilisation. An author could use an animal's name to emphasise a theme or to provide an overview of a complex epic tale. For example, Homer uses animal similes in the Iliad and the Odyssey, where the lion symbolises qualities such as bravery. This leads up to the lion simile at the end of the Odyssey, where in Book 22 Odysseus kills all Penelope's suitors. In the Iliad, Homer compares the Trojans to stridulating grasshoppers, which the classicist Gordon Lindsay Campbell believes to imply that they make a lot of noise but are weaker and less determined than they think. In the Aeneid, Book 4, Virgil compares the world of Dido, queen of Carthage, with a colony of ants. Campbell argues that Dido's people are hardworking, strong, unfailingly loyal, organised, and self-regulating: just the sort of world that the hero Aeneas would like to create. But, Campbell argues, the simile also suggests that Carthage's civil |
https://en.wikipedia.org/wiki/P-384 | P-384 is the elliptic curve currently specified in Commercial National Security Algorithm Suite for the ECDSA and ECDH algorithms. It is a 384-bit curve over a finite field of prime order approximately . Its binary representation has 384 bits, with a simple pattern. The curve is given by the equation , where is given by a certain 384-bit number. The curve has order less than the field size. The bit-length of a key is considered to be that of the order of the curve, which is also 384 bits.
Notes
External links
FIPS 186-4 standards where the curve is defined
Commercial National Security Algorithm (CNSA) Suite Factsheet
Cryptography standards
Elliptic curves |
https://en.wikipedia.org/wiki/First%20law%20of%20thermodynamics%20%28fluid%20mechanics%29 | In physics, the first law of thermodynamics is an expression of the conservation of total energy of a system. The increase of the energy of a system is equal to the sum of work done on the system and the heat added to that system:
where
is the total energy of a system.
is the work done on it.
is the heat added to that system.
In fluid mechanics, the first law of thermodynamics takes the following form:
where
is the Cauchy stress tensor.
is the flow velocity.
and is the heat flux vector.
Because it expresses conservation of total energy, this is sometimes referred to as the energy balance equation of continuous media. The first law is used to derive the non-conservation form of the Navier–Stokes equations.
Note
Where
is the pressure
is the identity matrix
is the deviatoric stress tensor
That is, pulling is positive stress and pushing is negative stress.
Compressible fluid
For a compressible fluid the left hand side of equation becomes:
because in general
Integral form
That is, the change in the internal energy of the substance within a volume is the negative of the amount carried out of the volume by the flow of material across the boundary plus the work done compressing the material on the boundary minus the flow of heat out through the boundary. More generally, it is possible to incorporate source terms.
Alternative representation
where is specific enthalpy, is dissipation function and is temperature. And where
i.e. internal energy per unit volume equals mass density times the sum of: proper energy per unit mass, kinetic energy per unit mass, and gravitational potential energy per unit mass.
i.e. change in heat per unit volume (negative divergence of heat flow) equals the divergence of heat conductivity times the gradient of the temperature.
i.e. divergence of work done against stress equals flow of material times divergence of stress plus stress times divergence of material flow.
i.e. stress times divergence of mat |
https://en.wikipedia.org/wiki/Chemical%20Probes%20Portal | The Chemical Probes Portal is an open, online resource whose purpose is to identify and make available high quality chemical probes for use in biological research and drug discovery. While chemical probes can be valuable tools to elucidate signal transduction pathways and to validate new drug targets, many of the probes that are in use are not selective and therefore can give very misleading results.
The Portal recommends chemical probes based on ratings provided by its Scientific Advisory Board (SAB), a group of experts in the fields of chemical biology, medicinal chemistry, and pharmacology, who (1) determine which are the best chemical probes available and (2) establish guidelines for using them.
History
After years of publishing best practice guidelines for the selection and use of chemical probes, many in the field agreed that publications were insufficient to disseminate this type of information. In July 2015, these experts, led by the Structural Genomics Consortium (SGC), collaborated to publish an overview of the misuse of chemical probes and the impact that misuse has on the reliability of research. A prototype website was launched by the SGC in conjunction with the publication.
This publication and the portal were launched at the same time the biomedical research community was becoming aware of problems in the reproducibility of much of the scientific literature. According to an economic impact study, $28 billion per year is spent on irreproducible biomedical research in the US alone. The most common reasons that studies prove irreproducible include problems with the selection of reagents and reference materials (36%), study design (28%), data analysis and reporting (25%), and laboratory protocols (11%). Errors in the selection and application of chemical probes can contribute to waste in each of these categories. Given the context and the need, the prototype portal was largely well received by the scientific community, although it was noted that the p |
https://en.wikipedia.org/wiki/Map%20graph | In graph theory, a branch of mathematics, a map graph is an undirected graph formed as the intersection graph of finitely many simply connected and internally disjoint regions of the Euclidean plane. The map graphs include the planar graphs, but are more general. Any number of regions can meet at a common corner (as in the Four Corners of the United States, where four states meet), and when they do the map graph will contain a clique connecting the corresponding vertices, unlike planar graphs in which the largest cliques have only four vertices. Another example of a map graph is the king's graph, a map graph of the squares of the chessboard connecting pairs of squares between which the chess king can move.
Combinatorial representation
Map graphs can be represented combinatorially as the "half-squares of planar bipartite graphs". That is, let be a planar bipartite graph, with bipartition . The square of is another graph on the same vertex set, in which two vertices are adjacent in the square when they are at most two steps apart in . The half-square or bipartite half is the induced subgraph of one side of the bipartition (say ) in the square graph: its vertex set is and it has an edge between each two vertices in that are two steps apart in . The half-square is a map graph. It can be represented geometrically by finding a planar embedding of , and expanding each vertex of and its adjacent edges into a star-shaped region, so that these regions touch at the vertices of . Conversely, every map graph can be represented as a half-square in this way.
Computational complexity
In 1998, Mikkel Thorup claimed that map graphs can be recognized in polynomial time. However, the high exponent of the algorithm that he sketched makes it impractical, and Thorup has not published the details of his method and its proof.
The maximum independent set problem has a polynomial-time approximation scheme for map graphs, and the chromatic number can be approximated to within a factor |
https://en.wikipedia.org/wiki/GingerMaster | GingerMaster is malware that affects Android operating system version 2.3. It was first detected in August 2011.
History
GingerMaster is Android malware that contains a root exploit packaged within an infected app. GingerMaster's Root exploit is the "KillingInTheNameOfGingerBreakzegRush"
Process
GinegerMaster acts to be a normal application on the users phone, and once the application is launched on an Android device, it acquires root privileges through GingerBreak on the device and then accesses sensitive data. Once GingerMaster has root access it will try to install a root shell for future malicious use.
Function
GingerMaster steals data such as:
SIM card number
Phone number
IMEI number
IMSI number
Screen resolution
Native time
See also
Brain Test
Dendroid (Malware)
Computer virus
File binder
Individual mobility
Malware
Trojan horse (computing)
Worm (computing)
Mobile operating system
References
Software distribution
Android (operating system) malware
Privilege escalation exploits
Online advertising
Mobile security
Privacy |
https://en.wikipedia.org/wiki/Human%20interactions%20with%20microbes | Human interactions with microbes include both practical and symbolic uses of microbes, and negative interactions in the form of human, domestic animal, and crop diseases.
Practical use of microbes began in ancient times with fermentation in food processing; bread, beer and wine have been produced by yeasts from the dawn of civilisation, such as in ancient Egypt. More recently, microbes have been used in activities from biological warfare to the production of chemicals by fermentation, as industrial chemists discover how to manufacture a widening variety of organic chemicals including enzymes and bioactive molecules such as hormones and competitive inhibitors for use as medicines. Fermentation is used, too, to produce substitutes for fossil fuels in forms such as ethanol and methane; fuels may also be produced by algae. Anaerobic microorganisms are important in sewage treatment. In scientific research, yeasts and the bacterium Escherichia coli serve as model organisms especially in genetics and related fields.
On the symbolic side, an early poem about brewing is the Sumerian "Hymn to Ninkasi", from 1800 BC. In the Middle Ages, Giovanni Boccaccio's The Decameron and Geoffrey Chaucer's The Canterbury Tales: addressed people's fear of deadly contagion and the moral decline that could result. Novelists have exploited the apocalyptic possibilities of pandemics from Mary Shelley's 1826 The Last Man and Jack London's 1912 The Scarlet Plague onwards. Hilaire Belloc wrote a humorous poem to "The Microbe" in 1912. Dramatic plagues and mass infection have formed the story lines of many Hollywood films, starting with Nosferatu in 1922. In 1971, The Andromeda Strain told the tale of an extraterrestrial microbe threatening life on Earth. Microbiologists since Alexander Fleming have used coloured or fluorescing colonies of bacteria to create miniature artworks.
Microorganisms such as bacteria and viruses are important as pathogens, causing disease to humans, crop plants, and dom |
https://en.wikipedia.org/wiki/List%20of%20antimicrobial%20peptides%20in%20the%20female%20reproductive%20tract | Antimicrobial peptides are short peptides that possess antimicrobial properties. The female reproductive tract and its tissues produce antimicrobial peptides as part of the immune response. These peptides are able to fight pathogens and at the same time allow the maintenance of the microbiota that are part of the reproductive system in women.
Defensins
alpha-Defensins
beta-Defensins
theta-defensins
Cathelicidins
LL-37
Whey acid proteins
SLPI
Elafin
HE-4
Lysozyme
S100 proteins
Calpotectin
Psoriasin (S100A7)
C-type lectins
SP-A
SP-D
Iron metabolism proteins
Lactoferrin
Kinocidins
CCL20/Mip-3-alpha
External links
Defensins Database, Singapore
Innate ( Nonspecific ) Immunity at Western Kentucky University
References
Immunology
Immune system
Peripheral membrane proteins
Medical lists |
https://en.wikipedia.org/wiki/Balance%20of%20plant | Balance of plant (BOP) is a term generally used in the context of power engineering to refer to all the supporting components and auxiliary systems of a power plant needed to deliver the energy, other than the generating unit itself. These may include transformers, inverters, switching and control equipment, protection equipment, power conditioners, supporting structures etc., depending on the type of plant.
See also
Balance of system
References
Electric power systems components |
https://en.wikipedia.org/wiki/Bitfinex | Bitfinex is a cryptocurrency exchange owned and operated by iFinex Inc, and is registered in the British Virgin Islands. Bitfinex was founded in 2012. It was originally a peer-to-peer Bitcoin exchange, and later added support for other cryptocurrencies.
Bitfinex was one of the first professional platforms built for cryptocurrency trading. It offers high-volume trading and both spot and derivatives products, including exchange trading, margin trading, margin funding (P2P lending), over-the-counter markets, and derivatives trading.
History
2012: Early history
Bitfinex was founded in December 2012 as a peer-to-peer Bitcoin exchange offering digital asset trading services to users worldwide. Bitfinex initially started as a P2P margin lending platform for Bitcoin and later added support for more cryptocurrencies. It was one of the first professional platforms built for cryptocurrency trading.
Raphael Nicolle, an IT technician from Paris, launched Bitfinex following a previous project called Bitcoinica. He continued to work as a developer for the platform until the beginning of 2017.
Bitfinex was designed to offer high-volume trading and both spot and derivatives products, including exchange trading, margin trading, margin funding (P2P lending), over-the-counter markets, and derivatives trading.
2015–2016: New partnership and security breach
In 2015, Bitfinex partnered with Palo Alto company BitGo to offer highly-secured "wallets" that allow people to store their digital currencies online. BitGo has insurance against Bitcoin theft.
In May 2015, the exchange was hacked, which resulted in the loss of 1,500 Bitcoins or about $400,000 USD of their customers' assets.
In June 2016, the U.S. Commodity Futures Trading Commission ordered Bitfinex to pay a $75,000 fine for offering illegal off-exchanged financed commodity transactions. The order also found that Bitfinex violated the Commodity Exchange Act by not registering as a Futures Commission Merchant.
2016 hack
In |
https://en.wikipedia.org/wiki/SD-WAN | A software-defined wide area network (SD-WAN) is a wide area network that uses software-defined networking technology, such as communicating over the Internet using overlay tunnels which are encrypted when destined for internal organization locations.
If standard tunnel setup and configuration messages are supported by all of the network hardware vendors, SD-WAN simplifies the management and operation of a WAN by decoupling the networking hardware from its control mechanism. This concept is similar to how software-defined networking implements virtualization technology to improve data center management and operation. In practice, proprietary protocols are used to set up and manage an SD-WAN, meaning there is no decoupling of the hardware and its control mechanism.
A key application of SD-WAN is to allow companies to build higher-performance WANs using lower-cost and commercially available Internet access, enabling businesses to partially or wholly replace more expensive private WAN connection technologies such as MPLS.
When SD-WAN traffic is carried over the Internet, there are no end-to-end performance guarantees. Carrier MPLS VPN WAN services are not carried as Internet traffic, but rather over carefully-controlled carrier capacity, and do come with an end-to-end performance guarantee.
History
WANs were very important for the development of networking technologies in general and were for a long time one of the most important application of networks both for military and enterprise applications. The ability to communicate data over large distances was one of the main driving factors for the development of data communications technologies, as it made it possible to overcome the distance limitations, as well as shortening the time necessary to exchange messages with other parties.
Legacy WAN technologies allowed communication over circuits connecting two or more endpoints. Earlier technologies supported point-to-point communication over a slow speed circuit, us |
https://en.wikipedia.org/wiki/PunkeyPOS%20Malware | PunkeyPOS is a new type of Point of Sale Malware which was discovered by PandaLabs in 2016. This new Point of Sale Malware infects the Point of Sale(POS) Systems with two types of malware applications - keylogger and RAM Scraper. PunkeyPOS gets installed into the computer automatically without the knowledge of the user, in a similar manner as other POS malware.
Process of Punkey malware
The keylogger captures and records the keystrokes made at the POS terminals in the retail stores. It captures data only related to credit cards. The RAM Scraper reads the memory of the system processes in the POS terminals. The information in the magnetic strips on the cards gets stored in the POS terminal/ device memory and this stolen information is then encrypted and forwarded to the cybercriminal's Control and Command Server (C&C).
Data breach report
It has been reported by PandaLabs that about 200 retail stores that use POS systems have been infected with this new variant of PunkeyPOS malware.
See also
Point-of-sale malware
Cyber security standards
List of cyber attack threat trends
References
Theft
Windows trojans
Cyberwarfare
Carding (fraud) |
https://en.wikipedia.org/wiki/Sansui%20AU-11000 | The Sansui AU-11000 is a home audio integrated amplifier built by Japanese audio electronics manufacturer Sansui during the mid 1970s. The amplifier is known across the audiophile community for its high-output power and low Total harmonic distortion (THD).
The AU-11000 has an output power of 110 watts-per-channel, and was one of the earliest home audio amplifiers to use multiple transistors per channel using a "Push-Pull" method to add more amplification power. The AU-11000 uses independent circuitry in the amplification process, in such a way that, each individual channel has its own circuits. This means everything from the power supply to the bias control board all have 2 identical and independent circuits per channel to separate the 2 stereo channels. This also minimizes the Total Harmonic Distortion within the amplifier down to 0.08%.
The AU-11000 has its own power protection built into the amplifier. When the power switch is turned to the "ON" position, the power light comes on as green for a second, and turns red for a few seconds until the power protection circuitry has confirmed it is safe to power-up. Once it has finished, the power light turns and remains green until the amplifier is turned off. The AU-11000 also has its own block diagram printed on the upper-front casing.
Sansui designed the AU-11000 with the input, output and speaker terminals on the sides of the unit. The rear of the unit has the power cord and outlets only.
The AU-11000 has features such as a logarithmic volume control, a 3-position level-set muting, a -20db mute switch, 3-position high & low filters, 3-Band Linear Bass/Midrange/Treble controls, 3 optional frequency settings for Bass & Treble controls, 3-position Tone Selection, A & B Speakers, Tape Input/Output control, 5-position mono-stereo selector switch, Tuner input, 2 Auxiliary inputs, 2 phono inputs, 2 rear 'always on' power outlets and 1 switched power outlet that is controlled by the units main power switch. There is an X |
https://en.wikipedia.org/wiki/P-curvature | In algebraic geometry, -curvature is an invariant of a connection on a coherent sheaf for schemes of characteristic . It is a construction similar to a usual curvature, but only exists in finite characteristic.
Definition
Suppose X/S is a smooth morphism of schemes of finite characteristic , E a vector bundle on X, and a connection on E. The -curvature of is a map defined by
for any derivation D of over S. Here we use that the pth power of a derivation is still a derivation over schemes of characteristic .
By the definition -curvature measures the failure of the map to be a homomorphism of restricted Lie algebras, just like the usual curvature in differential geometry measures how far this map is from being a homomorphism of Lie algebras.
See also
Grothendieck–Katz p-curvature conjecture
Restricted Lie algebra
References
Katz, N., "Nilpotent connections and the monodromy theorem", IHES Publ. Math. 39 (1970) 175–232.
Ogus, A., "Higgs cohomology, -curvature, and the Cartier isomorphism", Compositio Mathematica, 140.1 (Jan 2004): 145–164.
Connection (mathematics)
Algebraic geometry |
https://en.wikipedia.org/wiki/Individual%20quick%20freezing | Individual quick freezing, usually abbreviated IQF, is a descriptive term for freezing methods used in the food processing industry. The food is in individual pieces, and is frozen quickly. Products commonly frozen with IQF technologies are typically smaller pieces of food, and can include berries, fruits and vegetables both diced or sliced, seafood such as shrimp and small fish, meat, poultry, pasta, cheese and grains. Products that have been subjected to IQF are referred to as individually quick frozen.
Benefits
One of the main advantages of this method of preparing frozen food is that the freezing process takes only a few minutes. The exact time depends on the type of IQF freezer and the product. The short freezing prevents formation of large ice crystals in the product's cells, which destroys the membrane structures at the molecular level. This makes the product keep its shape, colour, smell and taste after defrost, to a far greater extent.
Another advantage of IQF technology is its ability to separate units of the products during freezing, which produces a higher quality product compared to block freezing. This is important for food sustainability, as the consumer can defrost and use the exact quantity needed.
A growing demand in IQF products is registered at global level due to the higher quality of these products and to the benefit of having separately frozen pieces. IQF is also a common pre-treatment for freeze-drying food because both processes preserve the size, taste and cell structure of the food better than methods such as traditional block freezing or air drying.
Methods
There is a range of IQF technologies, but the main concept is to transport the product into the freezer with the help of a processing line belt or infeed shaker. Inside the freezer, the product travels through the freezing zone and exits the other side. Product transport inside the freezer uses different technologies. Some freezers use transport belts similar to a conveyor belt |
https://en.wikipedia.org/wiki/Plague%20of%20664 | The plague of 664 was an epidemic that affected Britain and Ireland in 664 AD, during the first recorded plague pandemic. It was the first recorded epidemic in English history, and coincided with a solar eclipse. It was considered by later sources as "The Yellow Plague of 664" and said to have lasted for twenty or twenty-five years, causing widespread mortality, social disruption and abandonment of religious faith. The disease responsible was probably Plague – part of the First Plague Pandemic – or else smallpox.
According to the Irish Annals of Tigernach, the plague was preceded by a solar eclipse on 1 May 664 (the path of the total eclipse on 1 May 664 started in the Pacific, crossed the Gulf of Mexico, swept along the eastern coast of North America crossed Ireland and Scotland and continued on into Central Europe). Bede also mentioned the eclipse but wrongly placed it on 3 May. The Irish sources claimed that there was also an earthquake in Britain and that the plague reached Ireland first at Mag Nitha, among the Fothairt in Leinster. Bede claimed that the plague first was in the south of Britain and then spread to the north.
Bede wrote:
According to Adomnan of Iona, a contemporary Irish abbot and saint, the plague affected everywhere in the British Isles except for a large area in modern Scotland. Adomnan considered the plague a divine punishment for sins, and he believed that the Picts and Irish who lived in northern Great Britain were spared from the plague due to the intercession of Saint Columba who had founded monasteries among them. Adomnan personally walked among victims of the plague and claimed that neither he nor his companions became sick.
References
See also
First plague pandemic
Plague of Mohill, first recorded Irish plague
First plague pandemic
664
7th century in England
7th century in Ireland
Ailments of unknown cause
Plague deaths
7th-century disasters
1st-millennium health disasters |
https://en.wikipedia.org/wiki/Linx%20S.A. | Linx S.A. is a Brazilian management software company and the largest software house in retail management systems in Latin America. According to the American technology consulting firm IDC, Linx retains 40.2% of the retail management software in Brazil. In 2007, Linx was listed for the 3rd time in the Valor 1000 annual report, which lists the 1000 biggest Brazilian companies. In August 2020, payment processor StoneCo merged with Linx's operations in a deal worth $1.1 billion.
History
Linx was founded in 1985 by São Paulo native, Nércio Fernandes. At age 22, Nércio dropped out of college, leaving his studies in Civil Engineering to invest in his own business in the micro-computing field. He and his partners gave the company its first name: Microserv Comércio & Consultoria Ltda.
A few years after its inauguration, the company was serving small businesses in the regions of Brás and Bom Retiro in São Paulo, when MicroMalhas was created – a software geared towards fashion retail. In 1990, the software was renamed Linx, and later became Linx ERP – the group's flagship software, geared towards different retail segments.
Linx Logística, a unit specialized in internal logistics, was created in 2000. With a more complex structure, and with the parallel operation of Linx Sistemas, Linx Logística and Linx Telecom – created to focus on the outsourcing of connectivity and telecommunication options for retail – the creation of a holding company was necessary in order to unify the business units. In 2004, LMI S.A. emerged, and later was renamed Linx S.A.
In 2009, Linx received the contribution of BNDESPar to accomplish acquisitions with the objective of expanding the group's operations.
With the group's expansion, a business division called Linx Prevenção de Perdas was created to minimize losses related to materials, opportunities, time and capital in several of its clients’ market verticals.
Linx relocated in 2011 to a 10-story commercial building in the city of São Paulo. Als |
https://en.wikipedia.org/wiki/Planar%20Riemann%20surface | In mathematics, a planar Riemann surface (or schlichtartig Riemann surface) is a Riemann surface sharing the topological properties of a connected open subset of the Riemann sphere. They are characterized by the topological property that the complement of every closed Jordan curve in the Riemann surface has two connected components. An equivalent characterization is the differential geometric property that every closed differential 1-form of compact support is exact. Every simply connected Riemann surface is planar. The class of planar Riemann surfaces was studied by Koebe who proved in 1910, as a generalization of the uniformization theorem, that every such surface is conformally equivalent to either the Riemann sphere or the complex plane with slits parallel to the real axis removed.
Elementary properties
A closed 1-form ω is exact if and only if ∫γ ω = 0 for every closed Jordan curve γ.
This follows from the Poincaré lemma for 1-forms and the fact that ∫δ df = f(δ(b)) – f(δ(a)) for a path δ parametrized by [a, b] and f a smooth function defined on an open neighbourhood of δ([a, b]). This formula for ∫δ df extends by continuity to continuous paths, and hence vanishes for a closed path. Conversely if ∫γ ω = 0 for every closed Jordan curve γ, then a function f(z) can be defined on X by fixing a point w and taking any piecewise smooth path δ from w to z and set f(z) = ∫δ ω. The assumption implies that f is independent of the path. To check that df = ω, it suffices to check this locally. Fix z0 and take a path δ1 from w to z0. Near z0 the Poincaré lemma implies ω = dg for some smooth function g defined in a neighbourhood of z0. If δ2 is a path from z0 to z, then f(z) = ∫δ1 ω + ∫δ2 ω = ∫δ1 ω + g(z) − g(z0), so f differs from g by a constant near z0. Hence df = dg = ω near z0.
A closed Jordan curve γ on a Riemann surface separates the surface into two disjoint connected regions if and only if ∫γ ω = 0 for every closed 1-form ω of compact support.
If the closed Jo |
https://en.wikipedia.org/wiki/Oligotyping%20%28sequencing%29 | Oligotyping is the process of correcting DNA sequence measured during the process of DNA sequencing based on frequency data of related sequences across related samples.
History
DNA sequences were originally read from sequencing gels by eye. With the advent of computerized base callers, humans no longer 'called' the bases and instead 'corrected' the called bases. The bases were called by the software using the relative intensity of each putative basepair signal and the local spacing of the signals.
With the advent of high throughput sequencing, the volume of sequence to be corrected exceeded human capacity for sequence correction.
Use
Multiple applications require single-base pair accuracy across populations of closely related sequences. An example is amplicon sequencing to assess the relative contribution of DNA from diverse organisms to a sample.
The requirement for single basepair accuracy led to the development of methods which drew on frequency data distributed across several samples to identify variant sequences which shared the same frequency profile and were thus likely errors from the same original sequence. The ability to use higher-order statistics to correct sequences is an important element in decreasing the burden of error in DNA sequence datasets.
See also
DNA sequencing theory
DNA sequencer
Oligotyping (taxonomy)
References
External links
[[b:Next Generation Sequencing (NGS)|Next Generation Sequencing (NGS)]] — a wikibook on next generation sequencing''.
Omictools.com: Didactic directory for DNA sequencing analysis (free)
DNA sequencing
Molecular biology techniques |
https://en.wikipedia.org/wiki/Oligotyping%20%28taxonomy%29 | Oligotyping is a diagnostic or molecular biological method for classification of organisms by short intervals of primary DNA sequence.
Oligotyping 'systems' are sets of recognized target sequences which identify the members of the categories within the classification. The classification may be for the purpose of primary biological taxonomy, or for a functional classification.
Classifying bacteria
Oligotyping has been used for classifying bacteria, identifying bacterial antibiotic resistance genes, identifying genetic factors in human infectious disease, and performing histocompatibility tests for human blood or bone marrow donors/recipients .
See also
Oligotyping (sequencing)
References
DNA sequencing
Molecular biology techniques
Taxonomy (biology)
Bacterial taxonomy
1998 in biotechnology |
https://en.wikipedia.org/wiki/Glossary%20of%20civil%20engineering | This glossary of civil engineering terms is a list of definitions of terms and concepts pertaining specifically to civil engineering, its sub-disciplines, and related fields. For a more general overview of concepts within engineering as a whole, see Glossary of engineering.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
Y
Z
See also
Glossary of engineering
Glossary of mechanical engineering
Glossary of structural engineering
Glossary of prestressed concrete terms
Glossary of architecture
Glossary of physics
National Council of Examiners for Engineering and Surveying
Fundamentals of Engineering Examination
Principles and Practice of Engineering Examination
Graduate Aptitude Test in Engineering
References
civil engineering
Civil engineering
Civil engineering
Wikipedia glossaries using description lists |
https://en.wikipedia.org/wiki/Glossary%20of%20structural%20engineering | This glossary of structural engineering terms pertains specifically to structural engineering and its sub-disciplines. Please see glossary of engineering for a broad overview of the major concepts of engineering.
Most of the terms listed in glossaries are already defined and explained within itself. However, glossaries like this one are useful for looking up, comparing and reviewing large numbers of terms together. You can help enhance this page by adding new terms or writing definitions for existing ones.
A
Abutment – refers to the substructure at the ends of a bridge span or dam whereon the structure's superstructure rests or contacts.
Acre – is a unit of land area used in the imperial and US customary systems. It is traditionally defined as the area of one chain by one furlong (66 by 660 feet), which is exactly equal to 10 square chains, of a square mile, or 43,560 square feet, and approximately 4,047 m2, or about 40% of a hectare.
Acrow prop – or BS prop is a piece of construction equipment. It is a telescopic tubular steel prop, used as a temporary support. A jackscrew is similar but not as long and not telescopic. Outside the UK an Acrow prop may be known as a jack post, adjustable post, telescoping prop or ... post, screw jack, adjustable steel column, adjustable steel prop or ... post, adjustable metal prop or ... post, as well as an adjustable shoring post or shore post.
Adhesion – is the tendency of dissimilar particles or surfaces to cling to one another (cohesion refers to the tendency of similar or identical particles/surfaces to cling to one another). The forces that cause adhesion and cohesion can be divided into several types. The intermolecular forces responsible for the function of various kinds of stickers and sticky tape fall into the categories of chemical adhesion, dispersive adhesion, and diffusive adhesion. In addition to the cumulative magnitudes of these intermolecular forces, there are also certain emergent mechanical effects.
|
https://en.wikipedia.org/wiki/Harvard%20biphase | Harvard biphase is a magnetic run length code for encoding magnetic tape. It is one of the formats employed in forming the digital bits of logic one and logic zero, along with non-return-to-zero (NRZ) and bipolar-return-to-zero (RZ) formats. Each bit in the Harvard biphase format undergoes change at its trailing edge and this transpires either from high to zero or zero to high independently of its value.
FDR
Harvard biphase has previously been used for digital flight data recorder (FDR) where 12-bit words per second are recorded onto magnetic tape using Harvard biphase code. The data are encoded in frames and each of these contains a snapshot of the avionics system in the aircraft. For Harvard biphase, a phase transition in the middle of the bit cell indicates that the bit is 1. No transaction indicates that the bit is 0. There is also a phase transition at the start of each bit cell. The ARINC 573 serves as a standard for FDRs that feature continuous data stream encoded in Harvard biphase.
See also
ARINC 573
References
Computer storage tape media
History of computing hardware
Magnetic devices
Storage media
Tape recording |
https://en.wikipedia.org/wiki/Virtuozzo%20%28company%29 | Virtuozzo is a software company that develops virtualization and cloud management software for cloud computing providers, managed services providers and internet hosting service providers. The company’s software enables service providers to offer Infrastructure as a service, Container-as-a-Service, Platform as a service, Kubernetes-as-a-Service, WordPress-as-a-Service and other solutions.
History
The company was founded as SWsoft in 1997 as a privately-held server automation and virtualization company. In 2000, the company released the first commercially available operating system-level virtualization container technology. In 2003, SWsoft acquired the makers of Confixx and Plesk web hosting products: Plesk Server Administration (PSA) control panel and Confixx Professional hosting software. Virtuozzo was the core enabling technology behind SWsoft's HSP Complete solution. In 2004, SWsoft acquired Parallels, Inc.
In 2005, the company open-sourced its operating system-level virtualization technology as OpenVZ. In 2007, SWsoft announced that it had changed its name to Parallels and would distribute its products under the Parallels name.
In December 2015, Virtuozzo was spun out from Parallels to become a standalone company. In May 2016, Virtuozzo announced its intention to join the Open Container Initiative.
In July 2021, Virtuozzo acquired OnApp. In October of that year, the company acquired Jelastic.
List of products
Virtuozzo Hybrid Infrastructure is an OpenStack-based cloud management platform that enables service providers to sell public cloud, private cloud, hybrid cloud, Kubernetes-as-a-Service, Storage as a Service, Backup-as-a-Service, Disaster Recovery-as-a-Service and Desktop-as-a-Service.
Virtuozzo Hybrid Server enables service providers to sell Virtual Private Servers, shared web hosting, container hosting and Storage as a Service.
Virtuozzo Application Platform enables service providers to sell Platform as a Service with integrated DevOps tools
Vir |
https://en.wikipedia.org/wiki/Vue.js | Vue.js (commonly referred to as Vue; pronounced "view") is an open-source model–view–viewmodel front end JavaScript library for building user interfaces and single-page applications. It was created by Evan You, and is maintained by him and the rest of the active core team members.
Overview
Vue.js features an incrementally adaptable architecture that focuses on declarative rendering and component composition. The core library is focused on the view layer only. Advanced features required for complex applications such as routing, state management and build tooling are offered via officially maintained supporting libraries and packages.
Vue.js allows for extending HTML with HTML attributes called directives. The directives offer functionality to HTML applications, and come as either built-in or user defined directives.
History
Vue was created by Evan You after working for Google using AngularJS in several projects. He later summed up his thought process: "I figured, what if I could just extract the part that I really liked about Angular and build something really lightweight." The first source code commit to the project was dated July 2013, and Vue was first publicly announced the following February, in 2014.
Version names are often derived from manga and anime.
Versions
When a new major is released ie v3.y.z, the last minor ie 2.x.y will become a LTS release for 18 months (bug fixes and security patches) and for the following 18 months will be in maintenance mode (security patches only).
Features
Components
Vue components extend basic HTML elements to encapsulate reusable code. At a high level, components are custom elements to which the Vue's compiler attaches behavior. In Vue, a component is essentially a Vue instance with pre-defined options.
The code snippet below contains an example of a Vue component. The component presents a button and prints the number of times the button is clicked:
Templates
Vue uses an HTML-based template syntax that allows bin |
https://en.wikipedia.org/wiki/Decomposition%20theorem%20of%20Beilinson%2C%20Bernstein%20and%20Deligne | In mathematics, especially algebraic geometry, the decomposition theorem of Beilinson, Bernstein and Deligne or BBD decomposition theorem is a set of results concerning the cohomology of algebraic varieties. It was originally conjectured by Gelfand and MacPherson.
Statement
Decomposition for smooth proper maps
The first case of the decomposition theorem arises via the hard Lefschetz theorem which gives isomorphisms, for a smooth proper map of relative dimension d between two projective varieties
Here is the fundamental class of a hyperplane section, is the direct image (pushforward) and is the n-th derived functor of the direct image. This derived functor measures the n-th cohomologies of , for .
In fact, the particular case when Y is a point, amounts to the isomorphism
This hard Lefschetz isomorphism induces canonical isomorphisms
Moreover, the sheaves appearing in this decomposition are local systems, i.e., locally free sheaves of Q-vector spaces, which are moreover semisimple, i.e., a direct sum of local systems without nontrivial local subsystems.
Decomposition for proper maps
The decomposition theorem generalizes this fact to the case of a proper, but not necessarily smooth map between varieties. In a nutshell, the results above remain true when the notion of local systems is replaced by perverse sheaves.
The hard Lefschetz theorem above takes the following form: there is an isomorphism in the derived category of sheaves on Y:
where is the total derived functor of and is the i-th truncation with respect to the perverse t-structure.
Moreover, there is an isomorphism
where the summands are semi-simple perverse-sheaves, meaning they are direct sums of push-forwards of intersection cohomology sheaves.
If X is not smooth, then the above results remain true when is replaced by the intersection cohomology complex .
Proofs
The decomposition theorem was first proved by Beilinson, Bernstein, and Deligne. Their proof is based on the usage of weights |
https://en.wikipedia.org/wiki/Epistasis | Epistasis is a phenomenon in genetics in which the effect of a gene mutation is dependent on the presence or absence of mutations in one or more other genes, respectively termed modifier genes. In other words, the effect of the mutation is dependent on the genetic background in which it appears. Epistatic mutations therefore have different effects on their own than when they occur together. Originally, the term epistasis specifically meant that the effect of a gene variant is masked by that of a different gene.
The concept of epistasis originated in genetics in 1907 but is now used in biochemistry, computational biology and evolutionary biology. The phenomenon arises due to interactions, either between genes (such as mutations also being needed in regulators of gene expression) or within them (multiple mutations being needed before the gene loses function), leading to non-linear effects. Epistasis has a great influence on the shape of evolutionary landscapes, which leads to profound consequences for evolution and for the evolvability of phenotypic traits.
History
Understanding of epistasis has changed considerably through the history of genetics and so too has the use of the term. The term was first used by William Bateson and his collaborators Florence Durham and Muriel Wheldale Onslow. In early models of natural selection devised in the early 20th century, each gene was considered to make its own characteristic contribution to fitness, against an average background of other genes. Some introductory courses still teach population genetics this way. Because of the way that the science of population genetics was developed, evolutionary geneticists have tended to think of epistasis as the exception. However, in general, the expression of any one allele depends in a complicated way on many other alleles.
In classical genetics, if genes A and B are mutated, and each mutation by itself produces a unique phenotype but the two mutations together show the same phenotype |
https://en.wikipedia.org/wiki/Comparison%20gallery%20of%20image%20scaling%20algorithms | This gallery shows the results of numerous image scaling algorithms.
Scaling methods
An image size can be changed in several ways. Consider resizing a 160x160 pixel photo to the following 40x40 pixel thumbnail and then scaling the thumbnail to a 160x160 pixel image. Also consider doubling the size of the following image containing text.
References
Image processing
Image galleries
Image scaling algorithms |
https://en.wikipedia.org/wiki/Prior-independent%20mechanism | A Prior-independent mechanism (PIM) is a mechanism in which the designer knows that the agents' valuations are drawn from some probability distribution, but does not know the distribution.
A typical application is a seller who wants to sell some items to potential buyers. The seller wants to price the items in a way that will maximize his profit. The optimal prices depend on the amount that each buyer is willing to pay for each item. The seller does not know these values, but he assumes that the values are random variables with some unknown probability distribution.
A PIM usually involves a random sampling process. The seller samples some valuations from the unknown distribution, and based on the samples, constructs an auction that yields approximately-optimal profits. The major research question in PIM design is: what is the sample complexity of the mechanism? I.e, how many agents it needs to sample in order to attain a reasonable approximation of the optimal welfare?
Single-item auctions
The results in imply several bounds on the sample-complexity of revenue-maximization of single-item auctions:
For a -approximation of the optimal expected revenue, the sample-complexity is - a single sample suffices. This is true even when the bidders are not i.i.d.
For a -approximation of the optimal expected revenue, when the bidders are i.i.d OR when there is an unlimited supply of items (digital goods), the sample-complexity is when the agents' distributions have monotone hazard rate, and when the agents' distributions are regular but do not have monotone-hazard-rate.
The situation becomes more complicated when the agents are not i.i.d (each agent's value is drawn from a different regular distribution) and the goods have limited supply. When the agents come from different distributions, the sample complexity of -approximation of the optimal expected revenue in single-item auctions is:
at most - using a variant of the empirical Myerson auction.
at least (for mon |
https://en.wikipedia.org/wiki/Tripod%20%28foundation%29 | The tripod is a type of foundation for offshore wind turbines. The tripod is generally more expensive than other types of foundation. However, for large turbines and higher water depth, the cost disadvantage might be compensated when durability is also taken into account.
History
Start of the offshore wind industry
The exploration of offshore wind energy started with the introduction of monopile foundations for wind turbines in a range from 1 up to 3MW in water depth of about 10 to 20m during the 1990s.
Germany has been facing water depths up to 40m, when it joined this new field of renewable energy. At the same time the 5MW turbine class appeared. One representative of this new turbine generation was the Multibrid M5000 with a rotor diameter of 116m, later 135m under the labels Areva and Adwen.
The first prototype of this machine was erected in Bremerhaven in 2004 onshore. Already in this stage Bremerhaven had supported the development on behalf of BIS Bremerhavener Gesellschaft für Investitionsförderung und Stadtentwicklung mbH.
Development of the tripod foundation
Since the new century, there has been a search for a feasible foundation for the upcoming large turbines and greater water depths, in light of the available geotechnical assessment methods, fabrication processes, pile driving equipment and logistic and installation equipment.
One result was the Tripod foundation. The first design was drawn by OWT – Offshore Wind Technology in Leer (Germany) in 2005. The Tripod was integrally designed with the tower from this early beginning. The three-legged structure reaches from the sea bed up to typically 20m above the sea water level, keeping the bolted flange on top safely apart from the crest of the waves. This section allows to be outfitted onshore with all functionalities needed in terms of boat landing, cable guiding and last but not least corrosion protection systems. The central column is designed as an open system allowing an unrestricted water exchange |
https://en.wikipedia.org/wiki/Blue%20team%20%28computer%20security%29 | A blue team is a group of individuals who perform an analysis of information systems to ensure security, identify security flaws, verify the effectiveness of each security measure, and to make certain all security measures will continue to be effective after implementation.
History
As part of the United States computer security defense initiative, red teams were developed to exploit other malicious entities that would do them harm. As a result, blue teams were developed to design defensive measures against such red team activities.
Incident response
If an incident does occur within the organization, the blue team will perform the following six steps to handle the situation:
Preparation
Identification
Containment
Eradication
Recovery
Lessons learned
Operating system hardening
In preparation for a computer security incident, the blue team will perform hardening techniques on all operating systems throughout the organization.
Perimeter defense
The blue team must always be mindful of the network perimeter, including traffic flow, packet filtering, proxy firewalls, and intrusion detection systems.
Tools
Blue teams employ a wide range of tools allowing them to detect an attack, collect forensic data, perform data analysis and make changes to threat future attacks and mitigate threats. The tools include:
Log management and analysis
AlienVault
FortiSIEM (a.k.a. AccelOps)
Graylog
InTrust
LogRhythm
Microsoft Sentinel
NetWitness
Qradar (IBM)
Rapid7
SIEMonster
SolarWinds
Splunk
Security information and event management (SIEM) technology
SIEM software supports threat detection and security incident response by performing real-time data collection and analysis of security events. This type of software also uses data sources outside of the network including indicators of compromise (IoC) threat intelligence.
See also
List of digital forensics tools
Vulnerability management
White hat (computer security)
Red team
References
Computer security |
https://en.wikipedia.org/wiki/SSHFP%20record | A Secure Shell fingerprint record (abbreviated as SSHFP record) is a type of resource record in the Domain Name System (DNS) which identifies SSH keys that are associated with a host name. The acquisition of an SSHFP record needs to be secured with a mechanism such as DNSSEC for a chain of trust to be established.
Structure
The name of the object to which the resource record belongs (optional)
Time to live (in seconds). Validity of Resource Records (optional)
Protocol group to which the resource record belongs (optional)
Algorithm (0: reserved; 1: RSA; 2: DSA, 3: ECDSA; 4: Ed25519 6:Ed448;)
Algorithm used to hash the public key (0: reserved; 1: SHA-1; 2: SHA-256)
Hexadecimal representation of the hash result, as text
Example
In this example, the host with the domain name host.example.com uses a Ed25519 key with the SHA-256 fingerprint 123456789abcdef67890123456789abcdef67890. This output would be produced by a ssh-keygen -r host.example.com. command on the target server by reading the existing default SSH host key (Ed25519).
With the OpenSSH suite, the ssh-keyscan utility can be used to determine the fingerprint of a host's key; using the -D will print out the SSHFP record directly.
See also
List of DNS record types
References
Internet Standards
Internet protocols
DNS record types
Key management
Secure Shell |
https://en.wikipedia.org/wiki/Outline%20of%20physiology | The following outline is provided as an overview of and topical guide to physiology:
Physiology – scientific study of the normal function in living systems. A branch of biology, its focus is in how organisms, organ systems, organs, cells, and biomolecules carry out the chemical or physical functions that exist in a living system.
What type of thing is physiology?
Physiology can be described as all of the following:
An academic discipline
A branch of science
A branch of biology
Branches of physiology
By approach
Applied physiology
Clinical physiology
Exercise physiology
Nutrition physiology
Comparative physiology
Mathematical physiology
Yoga physiology
By organism
Animal physiology
Mammal physiology
Human physiology
Fish physiology
Insect physiology
Plant physiology
By process
Developmental physiology
Ecophysiology
Evolutionary physiology
By subsystem
Cardiovascular physiology
Renal physiology
Defense physiology
Gastrointestinal physiology
Musculoskeletal physiology
Neurophysiology
Respiratory physiology
History of physiology
History of physiology
General physiology concepts
Physiology organizations
American Physiological Society
International Union of Physiological Sciences
Physiology publications
American Journal of Physiology
Experimental Physiology
Journal of Applied Physiology
Persons influential in physiology
List of Nobel laureates in Physiology or Medicine
List of physiologists
See also
Outline of biology
References
External links
The Physiological Society
physiologyINFO.org public information site sponsored by The American Physiological Society
Physiology
Physiology |
https://en.wikipedia.org/wiki/Physics%20and%20Chemistry%20of%20Glasses | Physics and Chemistry of Glasses: European Journal of Glass Science and Technology Part B is a bimonthly peer-reviewed scientific journal published by the Society of Glass Technology. It was established in 2006, from the merger of the Society of Glass Technology's journal Physics and Chemistry of Glasses and the Deutsche Glastechnische Gesellschaft's journal Glass Science and Technology.
Abstracting and indexing
The journal is abstracted and indexed in the Science Citation Index, Current Contents/Physical, Chemical & Earth Sciences, Current Contents/Engineering, Computing & Technology, and Scopus. According to the Journal Citation Reports, the journal has a 2015 impact factor of 0.630.
References
External links
Materials science journals
English-language journals
Bimonthly journals
Academic journals established in 2006
Glass engineering and science |
https://en.wikipedia.org/wiki/Rec.%202100 | ITU-R Recommendation BT.2100, more commonly known by the abbreviations Rec. 2100 or BT.2100, introduced high-dynamic-range television (HDR-TV) by recommending the use of the perceptual quantizer (PQ) or hybrid log–gamma (HLG) transfer functions instead of the traditional "gamma" previously used for SDR-TV.
It defines various aspects of HDR-TV such as display resolution (HDTV and UHDTV), frame rate, chroma subsampling, bit depth, color space, color primaries, white point, and transfer function. It was posted on the International Telecommunication Union (ITU) website on July 4, 2016. Rec. 2100 uses a wide color gamut (WCG) which is the same as Rec. 2020's.
Technical details
Transfer functions
Rec. 2100 defines two sets of HDR transfer functions which are perceptual quantization (PQ) and hybrid log-gamma (HLG). HLG is supported in Rec. 2100 with a nominal peak luminance of 1,000 cd/m2 and a system gamma value that can be adjusted depending on background luminance. For a reference viewing environment the peak luminance of display should be 1000 cd/m2 or more for small area highlights and the black level should be 0.005 cd/m2 or less. The surround light should be 5 cd/m2 and be neutral grey at standard illuminant D65. Avoid light falling on the screen.
Within each set, the documented transfer functions include an:
electro-optical transfer function (EOTF) which maps the non-linear signal value into display light
opto-optical transfer function (OOTF) which maps relative scene linear light to display linear light
opto-electronic transfer function (OETF) which maps relative scene linear light into the non-linear signal value
System colorimetry
Rec. 2100 uses the same color primaries as Rec. 2020 which is a Wide Color Gamut.
Resolution
Rec. 2100 specifies three resolutions of 1920 × 1080 ("Full HD"), 3840 × 2160 ("4K UHD"), and 7680 × 4320 ("8K UHD"). These resolutions have an aspect ratio of 16:9 and use square pixels.
Frame rate
Rec. 2100 specifies the following |
https://en.wikipedia.org/wiki/DeepCwind%20Consortium | The DeepCwind Consortium was a national consortium of universities, nonprofits, utilities, and industry leaders. The mission of the consortium was to establish the State of Maine as a national leader in floating offshore wind technology. Much of the consortium's work and resulting research was funded by the U.S. Department of Energy, the National Science Foundations, and others.
The efforts of the DeepCwind Consortium culminated in the University of Maine patent-pending VolturnUS, a floating concrete hull technology can support wind turbines in water depths of 45 meters or more, and has the potential to significantly reduce the cost of offshore wind.
Overview
The DeepCwind Consortium was initially funded in 2009 as part of the American Recovery and Reinvestment Act (ARRA) through the U.S. Department of Energy. The University of Maine received $7.1 million to found the consortium and design and deploy floating offshore turbine prototypes. As part of this funding, the research plan included: "optimization of designs for floating platforms by evaluating options for using more durable, lighter, hybrid composite materials, manufacturability, and deployment logistics."
Floating deepwater wind farms placed ten or more nautical miles (nmi) offshore can play a critical role in reaching the Department of Energy's 20% windpower goal by 2030. Deepwater offshore wind is the dominant U.S. ocean energy resource, representing a potential of nearly 3,100 TW-h/year. It also:
Overcomes viewshed issues that have delayed or prevented some nearshore projects.
Places energy generation closer to major U.S. population centers.
Allows access to a more powerful Class 6 and 7 wind resource.
Reduces over time wind energy costs by reducing transmission costs from remote land sites and by simplifying deployment and maintenance logistics.
With these qualities in mind, Maine planned to construct a 5 GW, $20 billion network of floating offshore wind farms to contribute to the northeast U.S |
https://en.wikipedia.org/wiki/Wanda%20Szmielew | Wanda Szmielew née Montlak (5 April 1918 – 27 August 1976) was a Polish mathematical logician who first proved the decidability of the first-order theory of abelian groups.
Life
Wanda Montlak was born on 5 April 1918 in Warsaw. She completed high school in 1935 and married, taking the name Szmielew. In the same year she entered the University of Warsaw, where she studied logic under Adolf Lindenbaum, Jan Łukasiewicz, Kazimierz Kuratowski, and Alfred Tarski. Her research at this time included work on the axiom of choice, but it was interrupted by the 1939 Invasion of Poland.
Szmielew became a surveyor during World War II, during which time she continued her research on her own, developing a decision procedure based on quantifier elimination for the theory of abelian groups. She also taught for the Polish underground. After the liberation of Poland, Szmielew took a position at the University of Łódź, which was founded in May 1945. In 1947, she published her paper on the axiom of choice, earned a master's degree from the University of Warsaw, and moved to Warsaw as a senior assistant.
In 1949 and 1950, Szmielew visited the University of California, Berkeley, where Tarski had found a permanent position after being exiled from Poland for the war. She
lived in the home of Tarski and his wife as Tarski's mistress, leaving her husband behind in Poland, and completed a Ph.D. at Berkeley in 1950 under Tarski's supervision, with her dissertation consisting of her work on abelian groups. For the 1955 journal publication of these results, Tarski convinced Szmielew to rephrase her work in terms of his theory of arithmetical functions, a decision that caused this work to be described by Solomon Feferman as "unreadable". Later work by re-proved Szmielew's result using more standard model-theoretic techniques.
Returning to Warsaw as an assistant professor, her interests shifted to the foundations of geometry. With Karol Borsuk, she published a text on the subject in 1955 (tran |
https://en.wikipedia.org/wiki/PDP-12 | The PDP-12 (Programmed Data Processor) was created by Digital Equipment Corporation (DEC) in 1969 and was marketed specifically for science and engineering. It was the third in the LINC family and its main uses were for applications in chemistry, applied psychology, patient monitoring and industrial testing. It is the combination of the LINC computer and the PDP-8 and can run programs for either computer. It features a single central processor with two distinct operating modes, each with its own instruction set that allows it to run both computers' programs. PDP-12 Basic System weighed about .
Because it is the combination of two different computers it is very versatile. It can be a laboratory-oriented machine with several facilities for I/O, auxiliary storage, and control and sensing for external equipment or a general purpose computer with a flexible I/O capability that can support multiple peripheral devices. The basic package came with dual LINCtape drives, a scope display and I/O ports for interfacing with external laboratory equipment and peripherals. In addition to a display-based OS other software packages were included for data acquisition and display, Fourier analysis and mass spectrometry.
Operating systems
Although an OS/8 variant named OS/12 was the predominant PDP-12 operating system, there were two prior ones:
LAP6-DIAL (Display Interactive Assembly Language)
DIAL-MS (Mass Storage; this is an 8K version of LAP6-DIAL)
Production and training
Less than a year after its introduction the PDP-12 already had over 400 orders placed and in total 725 units were manufactured before being discontinued in 1972.
Since it was used as laboratory equipment DEC offered a two-week "hands-on" programming course with the purchase of the computer. Classes were held at the main plant in Maynard, Massachusetts or in Palo Alto, California in the US, and also available in Reading in the United Kingdom, Cologne in Germany or Paris, France.
See also
LINC
LINC-8
Refere |
https://en.wikipedia.org/wiki/Pers%20Z%20S | The Pers Z S was the signals intelligence agency of the German Foreign Office () before and during World War II. It consisted of two cryptologic sections. Pers Z S was the cryptanalytic section which was called Special Service of Z Branch of the Foreign Office Personnel Department (). Its mission was the solution of foreign diplomatic codes and ciphers. The other section, which was the Cryptography Section was called Personal Z Cipher Service of the Federal Foreign Office () (abbr. Pers Z Chi). The latter section was responsible for compilation, distribution and security of Foreign Office codes and ciphers. Both were colloquially known as Pers Z S. Though similar in nature and operation to the OKW/Chi cipher bureau, it was a civilian operation as opposed to the military operation at OKW/Chi and focused primarily on diplomatic communications. According to TICOM interrogators it evinced an extraordinary degree of competence, primarily driven by a consistency of development not found in any other German signals bureau of the period. Pers Z S/Chi was the symbol and the code name of the Chiffrierdienst, i.e. the Cryptanalysis Department of Pers Z S. Although little is known about the organization, in the final analysis, Pers Z S labored at diplomatic cryptanalysis for a regime for which there were no diplomatic solutions.
Short name
The abbreviation of "Chi" for the Chiffrierabteilung is, contrary to what one might expect, not the Greek letter Chi, nor anything to do with the chi test, a common cryptographic test used as part of deciphering an enciphered message, and invented by Solomon Kullback, but only to the first three letters of the word Chiffrierabteilung (English: cipher department).
History
Little was known about Pers Z S before April 1945, when the first section was captured. TICOM (Target Intelligence Committee), the United States effort to capture German intelligence assets after the war, found that captured documents provided little information on the ex |
https://en.wikipedia.org/wiki/MultigrainMalware | A new sophisticated point-of-sale or memory-scraping malware called "Multigrain" was discovered on April 17, 2016 by the FireEye Inc. security company. Multigrain malware comes under the family of NewposThings Malware. This malware is similar to the NewposThings, FrameworkPOS and BernhardPOS malware which were known previously as notorious malware.
Process of Multigrain malware
Multigrain uses the Luhn algorithm to validate the credit and debit card details. This POS malware then infects the computer and blocks Hypertext Transfer Protocol (http) and file transfer protocol (ftp) traffic which monitors the data exfiltration. It exfiltrates the scraped information of credit and debit card via Domain Name Server (DNS). Then it sends the collected payment card information to a 'command and control server' server.
Targets one POS platform
Multigrain targets specifically the Windows point of sale system, which has a multi.exe executable file. If Multigrain gets into a POS system that does not have multi.exe then it deletes itself without leaving any trace.
See also
Point-of-sale malware
Cyber electronic warfare
List of cyber attack threat trends
Malware
Cyber security standards
References
Cyberwarfare
Windows trojans
Carding (fraud) |
https://en.wikipedia.org/wiki/SX000i | SX000i - International guide for the use of the S-Series of Integrated Logistics Support (ILS) specifications, is a specification developed jointly by a multinational team from the Aerospace and Defence Industries Association of Europe (ASD) and Aerospace Industries Association (AIA). SX000i is part of the S-Series of ILS specifications.
SX000i provides information, guidance and instructions to ensure compatibility and the commonality of Integrated Logistics Support (ILS) processes among the S-Series suite of ILS specifications jointly developed by both associations.
By defining common logistics processes to be used across all S-Series ILS specifications and the interactions of the current S-Series ILS specifications with the logistics processes, the SX000i forms the basis for sharing and exchanging data securely through the life of products and services, not only within the support domain, but also with other domains such as Engineering. The SX000i also provides governance for the maintenance of current S-Series ILS specifications and the development of new S-Series ILS specifications.
SX000i builds on existing standards and specifications so as to provide a unified view of sometimes contradictory ILS specifications and publications. A reference and mapping of SX000i to these documents has been provided in Chapter 6.
Purpose of the guide
SX000i provides a guide for the use of the S-series ILS specifications by ILS managers and practitioners, as well as for the management and future development of the specifications by the ILS specification Council and ILS specification Steering Committees (SC) and Working Groups (WG).
SX000i:
explains the vision and objectives for the suite of S-Series ILS specifications
provides a framework that documents the global ILS process and interactions
explains how the ASD/AIA S-Series ILS specifications interface with other standardization domains including program management, global supply chain management, engineering, manufac |
https://en.wikipedia.org/wiki/Virtual%20valuation | In auction theory, particularly Bayesian-optimal mechanism design, a virtual valuation of an agent is a function that measures the surplus that can be extracted from that agent.
A typical application is a seller who wants to sell an item to a potential buyer and wants to decide on the optimal price. The optimal price depends on the valuation of the buyer to the item, . The seller does not know exactly, but he assumes that is a random variable, with some cumulative distribution function and probability distribution function .
The virtual valuation of the agent is defined as:
Applications
A key theorem of Myerson says that:
The expected profit of any truthful mechanism is equal to its expected virtual surplus.
In the case of a single buyer, this implies that the price should be determined according to the equation:
This guarantees that the buyer will buy the item, if and only if his virtual-valuation is weakly-positive, so the seller will have a weakly-positive expected profit.
This exactly equals the optimal sale price – the price that maximizes the expected value of the seller's profit, given the distribution of valuations:
Virtual valuations can be used to construct Bayesian-optimal mechanisms also when there are multiple buyers, or different item-types.
Examples
1. The buyer's valuation has a continuous uniform distribution in . So:
, so the optimal single-item price is 1/2.
2. The buyer's valuation has a normal distribution with mean 0 and standard deviation 1. is monotonically increasing, and crosses the x-axis in about 0.75, so this is the optimal price. The crossing point moves right when the standard deviation is larger.
Regularity
A probability distribution function is called regular if its virtual-valuation function is weakly-increasing. Regularity is important because it implies that the virtual-surplus can be maximized by a truthful mechanism.
A sufficient condition for regularity is monotone hazard rate, which means that the f |
https://en.wikipedia.org/wiki/Electronics%20and%20semiconductor%20manufacturing%20industry%20in%20India | The Indian electronics industry saw growth in the early years of the 21st century, encouraged both by government policies and incentives and by international investment. Its key and most resource-intensive segment, the semiconductor industry, was benefitted from domestic demand growing briskly. Semiconductors were required by a large number of industries, including telecommunications, information technology, industrial machinery and automation, medical electronics, automobile, engineering, power and solar photovoltaic, defence and aerospace, consumer electronics, and appliances. As of 2015, however, the skill gap in the Indian industry threatened progress, with 65 to 70 percent of the market relying on imports.
Electronics industry
Statistics and trends
Market-size
India's electronics market, one of the largest in the world in terms of consumption, has grown to USD 400 billion by 2020 from USD 69.6 billion in 2012. It was largely led by an up-surge in demand, growing at a projected compound annual growth rate of close to 25% over the period.
In 2013-14, 65% of demand for electronic products was met through imports. According to a Frost & Sullivan-IESA data analysis, five high priority product categories together account for 60% of the overall electronic consumption. In descending order, these are mobile phones (38.85%), flat panel display television (7.91%), notebooks (5.54%) and desktops (4.39%).
India's appliance and the consumer electronics market, which was worth USD 9.7 billion in 2014, is predicted to grow at a compound annual rate of 13.4%, and reach USD 20.6 billion by 2020. Within consumer electronics segment, set-top boxes are seen as the fastest growing category, with Y-o-Y growth predicted to be 28.8% between 2014-2020, followed by the television category at 20%, refrigerators at 10%, washing machines at 8-9% and air-conditioners at around 6-7%.
In 2013, demand for IT electronics in India was estimated to be valued at around USD 13 billion.
The m |
https://en.wikipedia.org/wiki/List%20of%20genetic%20engineering%20software | This article provides a list of genetic engineering software.
Cloud-based freemium software
Varstation NGS variants processing and analysis tool
BaseSpace Variant Interpreter by Illumina
Closed-source software
BlueTractorSoftware DNADynamo
Agilent Technologies RFLP Decoder Software, Fish Species
Applied Biosystems GeneMapper
Joint BioEnergy Institute j5
CLC bio CLC DNA Workbench Software
CLC bio CLC Free Workbench Software
CLC bio CLC Sequence Viewer
CLC bio Protein Workbench Software
DNASTAR Lasergene
Geneious
LabVantage Solutions Inc. LabVantage Sapphire
LabVantage Solutions Inc. LV LIMS
SnapGene
The GeneRecommender
Open-source software
Autodesk Genetic Constructor (suspended)
BIOFAB Clotho BIOFAB Edition
BIOFAB BIOFAB Studio
EGF Codons and EGF CUBA (Collection of Useful Biological Apps) by the Edinburgh Genome Foundry
Integrative Genomics Viewer (part of Google Genomics)
Mengqvist's DNApy
See also
Geppetto (3D engine); an open-source 3D engine for genetic engineering-related functions;also used in the OpenWorm project
Software
E
Genetic |
https://en.wikipedia.org/wiki/Acid%20egg | The terms acid egg and montejus (or monte-jus) are sometimes used interchangeably to refer to a device with no moving parts formerly used instead of a pump in order to transfer difficult liquids. The principle is that a strong vessel containing the liquid is pressurized with gas or steam, forcing the liquid into a pipe (usually vertical upwards) thereby causing flow. When the liquid has been transferred, the pressure is released and more liquid is put in via gravity. It is thus cyclic in operation. The same principle has been used to lift water and called an air displacement pump or intermittent gas-lift pump, and has been applied to pumping oil up from the formation.
Its use has largely been superseded by modern pumps, but it is still used sometimes for special tasks.
Acid Egg
This was specifically devised to deal with the highly corrosive sulfuric acid, but was extended to other corrosive substances. It was traditionally made of ceramic (to be corrosion resistant) and spherical in shape (to withstand the pressure) thus giving its name.
A cylindrical version (with hemispherical ends) was described by Swindin, being 3 feet in diameter and 6 feet long, holding 40 cubic feet of acid.
In principle, the vessel is part filled with liquid, which is then expelled by pumping in compressed air. The liquid outlet is via a pipe from the top going down almost to the bottom of the vessel. When the acid egg is emptied, connections to the compressor and the delivery pipe are closed by valves, the air pressure is vented and the vessel refilled with acid. The cycle can then start again.
Montejus
A French invention used in sugar production to move the partially processed sugar liquid up a pipe to the next stage of purification. Hence the name “monte-jus” or “raise juice”. Unlike the acid egg, it traditionally consists of a vertical cylindrical vessel made of steel, with a pipe from the bottom turned upwards, and it is pressurized by steam.
References
Pumps
Chemical equipmen |
https://en.wikipedia.org/wiki/Directorate%20General%20of%20Mines%20Safety | The Directorate General of Mines Safety is an agency of the India which administers the provisions of the government of India Mines Act, 1952 and, the Rules and Regulations framed there under. As per Constitution of India, occupational safety, welfare and health of workers employed in mines (coal, metalliferous and oil-mines) are the concern of the Central Government, under the Union Ministry of Labour & Employment.
The directorate carries out the mandates of the Mine Act at all mining and mineral processing operations in the India, regardless of size, number of employees, commodity mined, or method of extraction.
The organization has its headquarters at Dhanbad (Jharkhand) and is headed by Director-General of Mines Safety.
Mission
Their mission is of continuous improvement of ‘safety and health standards, practices and performances’ in mines and oil-fields of India.
They implement ‘pro-active safety and health strategies’, and continuously improve their processes. They ensure ‘effective use of resources’ and behavioral change in its personnel.
Safety, health, and welfare legislation
The directorate administers the following acts and regulations:
The Mines Act, 1952
Coal Mines Regulations, 1957
The Metalliferous Mines Regulations, 1961
Oil Mines Regulations-1984
Mines Rules, 1955
Mines Vocational Training Rules, 1966
The Mines Rescue Rules, 1985
Mines Creche Rules, 1966
Electricity Act, 2003
Central Electricity Authority( Measures Relating to Safety and Electric Supply) Regulations, 2010
Allied Legislations
Factories Act, 1948, India- Chapter III & IV
Manufacture, storage & import of Hazardous Chemicals Rules, 1989
Under Environmental (Protection) Act, 1986
Land Acquisition (Mines) Act, 1895
The Coal Mines (Conservation & Development ) Act, 1974
See also
Gas testing examination
Mine Safety and Health Administration
References
Mining law and governance
Mine safety
Occupational safety and health organizations
Safety engineering organi |
https://en.wikipedia.org/wiki/Differential%20forms%20on%20a%20Riemann%20surface | In mathematics, differential forms on a Riemann surface are an important special case of the general theory of differential forms on smooth manifolds, distinguished by the fact that the conformal structure on the Riemann surface intrinsically defines a Hodge star operator on 1-forms (or differentials) without specifying a Riemannian metric. This allows the use of Hilbert space techniques for studying function theory on the Riemann surface and in particular for the construction of harmonic and holomorphic differentials with prescribed singularities. These methods were first used by in his variational approach to the Dirichlet principle, making rigorous the arguments proposed by Riemann. Later found a direct approach using his method of orthogonal projection, a precursor of the modern theory of elliptic differential operators and Sobolev spaces. These techniques were originally applied to prove the uniformization theorem and its generalization to planar Riemann surfaces. Later they supplied the analytic foundations for the harmonic integrals of . This article covers general results on differential forms on a Riemann surface that do not rely on any choice of Riemannian structure.
Hodge star on 1-forms
On a Riemann surface the Hodge star is defined on 1-forms by the local formula
It is well-defined because it is invariant under holomorphic changes of coordinate.
Indeed, if is holomorphic as a function of ,
then by the Cauchy–Riemann equations and . In the new coordinates
so that
proving the claimed invariance.
Note that for 1-forms and
In particular if then
Note that in standard coordinates
Recall also that
so that
The decomposition is independent of the choice of local coordinate. The 1-forms with only a component are called (1,0) forms; those with only a component are called (0,1) forms. The operators and are called the Dolbeault operators.
It follows that
The Dolbeault operators can similarly be defined on 1-forms and as zero on 2-forms. |
https://en.wikipedia.org/wiki/S-Series%20of%20ILS%20specifications | The S-Series of ILS specifications is a common denominator for a set of specifications associated to different integrated logistics support aspects. Originally developed by AECMA (French acronym for the Association Européenne des Constructeurs de Matériel Aeronautique, later ASD), the S-Series suite of ILS specifications is managed currently jointly by multinational teams from the Aerospace and Defence Industries Association of Europe (ASD) and Aerospace Industries Association (AIA) reporting to the AIA/ASD ILS Council. The ILS Council established the term S-Series (of) ILS specifications as the common denominator for all its specifications, and this term was consolidated with the publication of SX000i.
List of S-Series ILS specifications
The specifications encompassing the S-Series of ILS specifications are as follows:
SX000i - International guide for the use of the S-Series of Integrated Product Support (IPS) specifications
S1000D - International specification for technical publications using a common source database
S2000M - International specification for material management
S3000L - International specification for Logistics Support Analysis (LSA)
S4000P - International specification for developing and continuously improving preventive maintenance
S5000F - International specification for in-service data feedback
S6000T - International specification for training analysis and design
SX001G - Glossary for the S-Series of IPS specifications
SX002D - Common data model for the S-Series IPS specifications
SX003X - Interoperability matrix for the S-Series IPS specifications
SX004G - Unified Modeling Language (UML) model readers guidance
SX005G - S-Series ILS specifications XML schema implementation guidance
S1000X - Input data specification for S1000D
S2000X - Input data specification for S2000M
S3000X - Input data specification for S3000L
S4000X - Input data specification for S4000P
S6000X - Input data specification for S6000T
Specificat |
https://en.wikipedia.org/wiki/DONE | The Data-based Online Nonlinear Extremumseeker (DONE) algorithm is a black-box optimization algorithm.
DONE models the unknown cost function and attempts to find an optimum of the underlying function.
The DONE algorithm is suitable for optimizing costly and noisy functions and does not require derivatives.
An advantage of DONE over similar algorithms, such as Bayesian optimization, is that the computational cost per iteration is independent of the number of function evaluations.
Methods
The DONE algorithm was first proposed by Hans Verstraete and Sander Wahls. The algorithm fits a surrogate model based on random Fourier features and then uses a well-known L-BFGS algorithm to find an optimum of the surrogate model.
Applications
DONE was first demonstrated for maximizing the signal in optical coherence tomography measurements, but has since then been applied to various other applications. For example, it was used to help extending the field of view in light sheet fluorescence microscopy.
References
Algorithms |
https://en.wikipedia.org/wiki/S4000P | S4000P - International specification for developing and continuously improving preventive maintenance is a specification developed jointly by a multinational team from the Aerospace and Defence Industries Association of Europe (ASD) and Aerospace Industries Association (AIA). S4000P is part of the S-Series of ILS specifications and is integrated in the global ILS process defined by SX000i - International guide for the use of the S-Series of Integrated Logistics Support (ILS) specifications.
The main purpose of this specification is to assist all parties, including regulatory authorities, involved in the analysis process developing and releasing initial PMTR and intervals for new products prior entry into service. S4000P analysis methodologies remain applicable for later optimizations/modifications of the product design and/or of product structure and/or of product zones. Once developed, authorized and packaged into interval clusters in a product OMP, the S4000P In-Service Maintenance Optimization (ISMO) process enables continuously improving product maintenance during its in-service phase.
Every development or improvement of a preventive maintenance task requirement for a product supports at least one of the following aspects:
ensure/maintain product safety, including safety/emergency systems and/or emergency equipment
avoid any conflict with law and/or significant impact on environmental integrity (ecological damage) during product mission/operation and/or maintenance
optimize mission/operational capability/availability of the Product
optimize product economy (Life Cycle Costs = LCC)
Rationale for S4000P
For a new product or for a new product variant, the maintainability of the intended product design must be assessed by maintainability specialists providing engineering support. Accumulated in-service experience with other products must also be taken into account.
In parallel to the product design process, Preventive Maintenance Task Requirements (PMTR) wit |
https://en.wikipedia.org/wiki/Wilhelm%20Fenner | Wilhelm Fenner (* 14 April 1891 in Saint Petersburg † after 1946) was a German cryptanalyst, before and during the time of World War II in the OKW/Chi, the Cipher Department of the High Command of the Wehrmacht, working within the main cryptanalysis group, and entrusted with deciphering enemy message traffic (Cryptography). Wilhelm Fenner was considered an excellent organizer, an anti-Nazi, an anti-Bolshevik and a confirmed Protestant and was known by colleagues as someone who was keen to continue working in cryptology after World War II. To quote military historian David Alvarez:
Wilhelm Fenner was the central figure in the evolution of the German Cipher Bureau between 1922 and 1939, and a major personality in the history of German communications intelligence in the interwar period. Under his direction, the Cipher Bureau evolved into a highly professional communications intelligence service, which scored impressive cryptanalytic successes against the diplomatic and military systems of many countries.
Personal life
Wilhelm was born on 14 April 1891 in Saint Petersburg. He was the sixth of seven children of Heinrich Gottlieb Fenner and Charlotte Georgine Fenner, born Michaelsen. His father was the chief editor of the St. Petersburgische Zeitung, a German language daily newspaper published in Saint Petersburg, then the capital of the Russian Empire. The sixth of seven children, he was home schooled for two years before he attended the Evangelical Lutheran Anne School in St. Petersburg from 1899, and completed his final examination with distinction in May 1909. In the autumn of 1910 he matriculated at the Royal Institute of Technology in Berlin (TH) in Berlin-Charlottenburg and studied construction engineering, chemistry and metallurgy. In the summer of 1914, he passed his final examination.
Wilhelm Fenner was married on 11 January 1922 to Elise Sophie Katharine von Blanckensee, a daughter of the former Prussian Major General Peter von Blanckensee. They had two ch |
https://en.wikipedia.org/wiki/Middle%20East%20Materials%20Project | Founded in 1987, the Middle East Materials Project (MEMP) works to provide digital and microform copies of rare, hard-to-obtain, and expensive research materials related to Middle Eastern Studies. The main goal is to obtain delicate and deteriorating documents in order to digitally record and preserve them, so that researchers may find materials not common to other research libraries. MEMP is coordinated through the Center for Research Libraries in cooperation with the Middle East Librarians Association (MELA). Members participate in cooperative cataloging of materials that require specialized linguistic and cultural knowledge. MEMP's coverage includes Arab countries, Israel, Turkey, Iran, as well as other areas with related materials that do not have a functioning materials project.
MEMP's collection includes over 100 newspaper titles in Arabic, Turkish, and English, a large number of Sudanese and Turkish papers, microfilms of documents about the Middle East from the Library of Congress, and microfilms from the Cosro Chaqeri Collection of Iranian Left-wing Materials. MEMP has also worked with Fawzy W. Khoury and Michelle Bates to compile the "Middle East in Microform: a Union List of Middle Eastern Microforms in North American Libraries" (University of Washington Libraries, 1992), a revised and expanded version of "National Union Catalog of Middle Eastern Microforms" (University of Washington Libraries, 1989).
Notes
Middle Eastern studies
Online archives
Libraries established in 1987 |
https://en.wikipedia.org/wiki/Digitizing%20AAR%20Archive | The Archives at the American Academy in Rome (AAR) are digitized archaeological and photographic collections assisting in the preservation and conservation of the cultural heritage of Rome.
Background and history
The rich cultural heritage of Rome compelled a group of American architects and artists led by architectural mogul Charles F. McKim to establish the American Academy in the city of Rome, Italy. Established in 1894, the American Academy in Rome is a research and arts institute and a member of the Council of American Overseas Research Centers.
The Academy promotes intellectual and artistic freedom, interdisciplinary exchange and innovation amongst scholars and artists at the institution and around the world. The School of Fine Arts, the first of the Academy's two main schools, exposes its fellows to literature, historic preservation and conservation, architecture, musical composition and the visual arts. Its counterpart, the School of Classical Studies, immerses scholars in Rome’s exquisite history and culture both modern and ancient, mainly in the fields of archaeology and the humanities.
The United States Congress under President Roosevelt passed bills in 1905, marking the Academy as a national institution.
Archaeological archives
As an institution of the arts and classics, fellows at the Academy practice the study of archaeology. The American Academy in Rome has consolidated documents pertaining to archaeological excavations performed at the ancient colony of Cosa and the ancient Roman headquarters, the Regia. Some of these documents were digitized to preserve and disseminate their contents.
The ancient Latin colony of Cosa was located in southwestern Tuscany in Italy. The Regia was an ancient building that served initially as a royal palace to the kings of Rome and was subsequently occupied by the Pontifex Maximus, most notably Julius Caesar.
The Cosa archaeology archives are a collection of documents pertaining to the excavations performed at th |
https://en.wikipedia.org/wiki/Elder%20financial%20abuse | Elder financial abuse is a type of elder abuse in which misappropriation of financial resources or abusive use of financial control, in the context of a relationship where there is an expectation of trust, causes harm to an older person.
The Older Americans Act of 2006 defines elder financial abuse, or financial exploitation, as “the fraudulent or otherwise illegal, unauthorized, or improper act or process of an individual, including a caregiver or fiduciary, that uses the resources of an older individual for monetary or personal benefit, profit, or gain, or that results in depriving an older individual of rightful access to, or use of, benefits, resources, belongings, or assets.”
Types
By family or caregivers
Family members and informal or paid caregivers have special access to seniors and thus are often in a position to inflict financial abuse through deception, coercion, misrepresentation, undue influence, or theft. Common abusive practices include:
Money or property is used without the senior's permission or taken from them, for example removal from their home and then use of the home by the abuser, or depositing income such as pension or benefit checks
The senior's signature is forged or identity is misappropriated for financial transactions
The senior is coerced or influenced to sign over deeds or wills, or caused to execute legal documents they do not understand
The abuser fraudulently obtains a power of attorney or guardianship
Money is borrowed from the senior and never repaid
Family members engaged in financial abuse of the elderly may include spouses, siblings, children, grandchildren or other relatives. They may engage in the activity because they feel justified, for instance, they are taking what they might later inherit or have a sense of "entitlement" due to a negative personal relationship with the older person, or that it is somehow the price of a promise of lifelong care. Or they may take money or property to prevent other family members |
https://en.wikipedia.org/wiki/Hannah%20Fry | Hannah Fry (born February 1984) is a British mathematician, author, and radio and television presenter. She is Professor in the Mathematics of Cities at the UCL Centre for Advanced Spatial Analysis. She studies the patterns of human behaviour, such as interpersonal relationships and dating, and how mathematics can apply to them. Fry delivered the 2019 Royal Institution Christmas Lectures.
Early life and education
Fry, the middle of three daughters, is of mixed English and Irish heritage; her father is an English factory worker, and her mother, a stay-at-home mum, from Ireland. One summer, when she was about 11, her mother made her solve one page of problems in a mathematics textbook each day of the summer holiday, and this put her ahead of the other students in the next school year. She attended Presdales School in Ware, Hertfordshire, England, where a teacher inspired her to study mathematics. She subsequently graduated from University College London (UCL). In 2011, she submitted a thesis based on the Navier–Stokes equations, and was awarded a PhD from the department of Mathematics by UCL.
Career
Academia
Fry was appointed as a lecturer at University College London in 2012. At the UCL Centre for Advanced Spatial Analysis, following a number of years as a senior lecturer and then associate professor, she was appointed professor in the Mathematics of Cities, in 2021.
TED and YouTube
For a year, Fry decided to say "yes" to everything, which led to her trying stand-up comedy, a TED Talk (invited by the German neuroscientist Alina Strasser), and television work.
On 30 March 2014, Fry gave a TED talk at TEDxBinghamtonUniversity titled The Mathematics of Love, which has attracted over 5.2 million views. Her book The Mathematics of Love: Patterns, Proofs, and the Search for the Ultimate Equation – in which she applies statistical and data-scientific models to dating, sex and marriage – was published by Simon and Schuster under the TED Books imprint in February 201 |
https://en.wikipedia.org/wiki/Curve%20complex | In mathematics, the curve complex is a simplicial complex C(S) associated to a finite-type surface S, which encodes the combinatorics of simple closed curves on S. The curve complex turned out to be a fundamental tool in the study of the geometry of the Teichmüller space, of mapping class groups and of Kleinian groups. It was introduced by W.J.Harvey in 1978.
Curve complexes
Definition
Let be a finite type connected oriented surface. More specifically, let be a connected oriented surface of genus with boundary components and punctures.
The curve complex is the simplicial complex defined as follows:
The vertices are the free homotopy classes of essential (neither homotopically trivial nor peripheral) simple closed curves on ;
If represent distinct vertices of , they span a simplex if and only if they can be homotoped to be pairwise disjoint.
Examples
For surfaces of small complexity (essentially the torus, punctured torus, and four-holed sphere), with the definition above the curve complex has infinitely many connected components. One can give an alternate and more useful definition by joining vertices if the corresponding curves have minimal intersection number. With this alternate definition, the resulting complex is isomorphic to the Farey graph.
Geometry of the curve complex
Basic properties
If is a compact surface of genus with boundary components the dimension of is equal to . In what follows, we will assume that . The complex of curves is never locally finite (i.e. every vertex has infinitely many neighbors). A result of Harer asserts that is in fact homotopically equivalent to a wedge sum of spheres.
Intersection numbers and distance on C(S)
The combinatorial distance on the 1-skeleton of is related to the intersection number between simple closed curves on a surface, which is the smallest number of intersections of two curves in the isotopy classes. For example
for any two nondisjoint simple closed curves . One can compare |
https://en.wikipedia.org/wiki/Thurston%20norm | In mathematics, the Thurston norm is a function on the second homology group of an oriented 3-manifold introduced by William Thurston, which measures in a natural way the topological complexity of homology classes represented by surfaces.
Definition
Let be a differentiable manifold and . Then can be represented by a smooth embedding , where is a (not necessarily connected) surface that is compact and without boundary. The Thurston norm of is then defined to be
,
where the minimum is taken over all embedded surfaces (the being the connected components) representing as above, and is the absolute value of the Euler characteristic for surfaces which are not spheres (and 0 for spheres).
This function satisfies the following properties:
for ;
for .
These properties imply that extends to a function on which can then be extended by continuity to a seminorm on . By Poincaré duality, one can define the Thurston norm on .
When is compact with boundary, the Thurston norm is defined in a similar manner on the relative homology group and its Poincaré dual .
It follows from further work of David Gabai that one can also define the Thurston norm using only immersed surfaces. This implies that the Thurston norm is also equal to half the Gromov norm on homology.
Topological applications
The Thurston norm was introduced in view of its applications to fiberings and foliations of 3-manifolds.
The unit ball of the Thurston norm of a 3-manifold is a polytope with integer vertices. It can be used to describe the structure of the set of fiberings of over the circle: if can be written as the mapping torus of a diffeomorphism of a surface then the embedding represents a class in a top-dimensional (or open) face of : moreover all other integer points on the same face are also fibers in such a fibration.
Embedded surfaces which minimise the Thurston norm in their homology class are exactly the closed leaves of foliations of .
Notes
References
Topology
3-man |
https://en.wikipedia.org/wiki/Human%20uses%20of%20animals | Human uses of animals (non-human species) include both practical uses, such as the production of food and clothing, and symbolic uses, such as in art, literature, mythology, and religion. All of these are elements of culture, broadly understood. Animals used in these ways include fish, crustaceans, insects, molluscs, mammals and birds.
Economically, animals provide meat, whether farmed or hunted, and until the arrival of mechanised transport, terrestrial mammals provided a large part of the power used for work and transport. Animals serve as models in biological research, such as in genetics, and in drug testing.
Many species are kept as pets, the most popular being mammals, especially dogs and cats. These are often anthropomorphised.
Animals such as horses and deer are among the earliest subjects of art, being found in the Upper Paleolithic cave paintings such as at Lascaux. Major artists such as Albrecht Dürer, George Stubbs and Edwin Landseer are known for their portraits of animals. Animals further play a wide variety of roles in literature, film, mythology, and religion.
Context
Culture consists of the social behaviour and norms found in human societies and transmitted through social learning. Cultural universals in all human societies include expressive forms like art, music, dance, ritual, religion, and technologies like tool usage, cooking, shelter, and clothing. The concept of material culture covers physical expressions such as technology, architecture and art, whereas immaterial culture includes principles of social organization, mythology, philosophy, literature, and science.
Anthropology has traditionally studied the roles of non-human animals in human culture in two opposed ways: as physical resources that humans used; and as symbols or concepts through totemism and animism. More recently, anthropologists have also seen other animals as participants in human social interactions.
This article describes the roles played by other animals in human c |
https://en.wikipedia.org/wiki/Locky | Locky is ransomware malware released in 2016. It is delivered by email (that is allegedly an invoice requiring payment) with an attached Microsoft Word document that contains malicious macros. When the user opens the document, it appears to be full of gibberish, and includes the phrase "Enable macro if data encoding is incorrect," a social engineering technique. If the user does enable macros, they save and run a binary file that downloads the actual encryption Trojan, which will encrypt all files that match particular extensions. Filenames are converted to a unique 16 letter and number combination. Initially, only the .locky file extension was used for these encrypted files. Subsequently, other file extensions have been used, including .zepto, .odin, .aesir, .thor, and .zzzzz. After encryption, a message (displayed on the user's desktop) instructs them to download the Tor browser and visit a specific criminal-operated Web site for further information.
The website contains instructions that demand a ransom payment between 0.5 and 1 bitcoin (as of November 2017, one bitcoin varies in value between $9,000 and $10,000 via a bitcoin exchange). Since the criminals possess the private key and the remote servers are controlled by them, the victims are motivated to pay to decrypt their files. Cryptocurrencies are very difficult to trace and are highly portable.
Operation
The most commonly reported mechanism of infection involves receiving an email with a Microsoft Word document attachment that contains the code. The document is gibberish, and prompts the user to enable macros to view the document. Enabling macros and opening the document launch the Locky virus.
Once the virus is launched, it loads into the memory of the users system, encrypts documents as hash.locky files, installs .bmp and .txt files, and can encrypt network files that the user has access to.
This has been a different route than most ransomware since it uses macros and attachments to spread rather tha |
https://en.wikipedia.org/wiki/Proximal%20operator | In mathematical optimization, the proximal operator is an operator associated with a proper, lower semi-continuous convex function from a Hilbert space
to , and is defined by:
For any function in this class, the minimizer of the right-hand side above is unique, hence making the proximal operator well-defined. The proximal operator is used in proximal gradient methods, which is frequently used in optimization algorithms associated with non-differentiable optimization problems such as total variation denoising.
Properties
The of a proper, lower semi-continuous convex function enjoys several useful properties for optimization.
Fixed points of are minimizers of : .
Global convergence to a minimizer is defined as follows: If , then for any initial point , the recursion yields convergence as . This convergence may be weak if is infinite dimensional.
The proximal operator can be seen as a generalization of the projection operator. Indeed, in the specific case where is the 0- indicator function of a nonempty, closed, convex set we have that
showing that the proximity operator is indeed a generalisation of the projection operator.
A function is firmly non-expansive if .
The proximal operator of a function is related to the gradient of the Moreau envelope of a function by the following identity: .
The proximity operator of is characterized by inclusion , where is the subdifferential of , given by
In particular, If is differentiable then the above equation reduces to .
Notes
References
See also
Proximal gradient method
External links
The Proximity Operator repository: a collection of proximity operators implemented in Matlab and Python.
ProximalOperators.jl: a Julia package implementing proximal operators.
ODL: a Python library for inverse problems that utilizes proximal operators.
Mathematical optimization |
https://en.wikipedia.org/wiki/ZOTAC | ZOTAC is a computer hardware manufacturer founded and based in Hong Kong. The company specializes in producing video cards (GPUs), mini PCs, solid-state drives, motherboards, gaming computers and other computer accessories. All its products are manufactured in the PC Partner factories in Dongguan City, China.
Aside from its international headquarters in Hong Kong, it also has four offices overseas in Japan, South Korea, the United States, and Germany.
History
ZOTAC was established in 2006 under the umbrella company of PC Partner. Its name was derived from the words "zone" and "tact". A year later, ZOTAC created its first ever video card, the ZOTAC GeForce 7300 GT.
In 2008, ZOTAC became the first hardware company to ship video cards with a factory overclock. In 2015, ZOTAC created a Steam Machine called the NEN. It featured a Nvidia GeForce 960 and an Intel Core i5-6400T Processor.
In 2016, The MAGNUS EN980 debuted at Computex Taipei. It was the first ever Mini PC that was considered "VR ready" by Nvidia, and it featured an Nvidia GTX 980 and an i5 Processor. Also launched is the smallest Mini PC line-up, P Series, and ZOTAC VR GO.
In 2017, Zotac released their GTX 1000 series line including their 1080, 1070, 1060, and also their miniseries including the GeForce GTX 1080 Ti Mini. They also introduced their new brand now known as 'Zotac Gaming'. The first product launched under it was the MEK Gaming PC, which was a Mini ITX desktop. In addition to the MEK Gaming PC and graphic cards, Zotac also released an external enclosure that supported Thunderbolt 3 and could host a graphic card up to nine inches long.
In 2018, Zotac announced their GeForce 20 series graphics cards including the GeForce RTX 2080 Ti, GeForce RTX 2080 series, and the GeForce RTX 2070 Series. In addition to graphic cards, Zotac also released their new line of ZBOX mini PCs in Q2 2018.
GeForce Series
Zotac's GeForce series includes their slightly modified stock graphic cards and their own Amp! |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.