source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Contact%20graph | In the mathematical area of graph theory, a contact graph or tangency graph is a graph whose vertices are represented by geometric objects (e.g. curves, line segments, or polygons), and whose edges correspond to two objects touching (but not crossing) according to some specified notion. It is similar to the notion of an intersection graph but differs from it in restricting the ways that the underlying objects are allowed to intersect each other.
The circle packing theorem states that every planar graph can be represented as a contact graph of circles. The contact graphs of unit circles are called penny graphs. Representations as contact graphs of triangles, rectangles, squares, line segments, or circular arcs have also been studied.
References
Geometric graph theory
Graph families
Planar graphs |
https://en.wikipedia.org/wiki/Offensive%20programming | Offensive programming is a name used for the branch of defensive programming that expressly departs from defensive principles when dealing with errors resulting from software bugs. Although the name is a reaction to extreme interpretations of defensive programming, the two are not fundamentally in conflict. Rather, offensive programming adds an explicit priority of not tolerating errors in wrong places: the point where it departs from extreme interpretations of defensive programming is in preferring the presence of errors from within the program's line of defense to be blatantly obvious over the hypothetical safety benefit of tolerating them. This preference is also what justifies using assertions.
Distinguishing errors
The premise for offensive programming is to distinguish between expectable errors, coming from outside the program's line of defense, however improbable, versus preventable internal errors that shall not happen if all its software components behave as expected.
Contrasting examples:
Bug detection strategies
Offensive programming is concerned with failing, so to disprove the programmer's assumptions. Producing an error message may be a secondary goal.
Strategies:
No unnecessary checks: Trusting that other software components behave as specified, so to not paper over any unknown problem, is the basic principle. In particular, some errors may already be guaranteed to crash the program (depending on programming language or running environment), for example dereferencing a null pointer. As such, null pointer checks are unnecessary for the purpose of stopping the program (but can be used to print error messages).
Assertions – checks that can be disabled – are the preferred way to check things that should be unnecessary to check, such as design contracts between software components.
Remove fallback code (limp mode) and fallback data (default values): These can hide defects in the main implementation, or, from the user point of view, hide the fact t |
https://en.wikipedia.org/wiki/Tissue%20growth | Tissue growth is the process by which a tissue increases its size. In animals, tissue growth occurs during embryonic development, post-natal growth, and tissue regeneration. The fundamental cellular basis for tissue growth is the process of cell proliferation, which involves both cell growth and cell division occurring in parallel.
How cell proliferation is controlled during tissue growth to determine final tissue size is an open question in biology. Uncontrolled tissue growth is a cause of cancer.
Differential rates of cell proliferation within an organ can influence proportions, as can the orientation of cell divisions, and thus tissue growth contributes to shaping tissues along with other mechanisms of tissue morphogenesis.
Mechanisms of tissue growth control in animals
Mechanical control of tissue growth in animal skin
For some animal tissues, such as mammalian skin, it is clear that the growth of the skin is ultimately determined by the size of the body whose surface area the skin covers. This suggests that cell proliferation in skin stem cells within the basal layer is likely to be mechanically controlled to ensure that the skin covers the surface of the entire body. Growth of the body causes mechanical stretching of the skin, which is sensed by skin stem cells within the basal layer and consequently leads to both an increased rate of cell proliferation as well as promoting the planar orientation of stem cell divisions to produce new skin stem cells, rather than only producing differentiating supra-basal daughter cells.
Cell proliferation in skin stem cells within the basal layer can be driven by the mechanically-regulated YAP/TAZ family of transcriptional co-activators, which bind to TEAD-family DNA binding transcription factors in the nucleus to activate target gene expression and thereby drive cell proliferation.
For other animal tissues, such as the bones of the skeleton or the internal mammalian organs intestine, pancreas, kidney or brain, |
https://en.wikipedia.org/wiki/Gould%27s%20sequence | Gould's sequence is an integer sequence named after Henry W. Gould that counts how many odd numbers are in each row of Pascal's triangle. It consists only of powers of two, and begins:
1, 2, 2, 4, 2, 4, 4, 8, 2, 4, 4, 8, 4, 8, 8, 16, 2, 4, ...
For instance, the sixth number in the sequence is 4, because there are four odd numbers in the sixth row of Pascal's triangle (the four bold numbers in the sequence 1, 5, 10, 10, 5, 1).
Additional interpretations
The th value in the sequence (starting from ) gives the highest power of 2 that divides the central binomial coefficient , and it gives the numerator of (expressed as a fraction in lowest terms).
Gould's sequence also gives the number of live cells in the th generation of the Rule 90 cellular automaton starting from a single live cell.
It has a characteristic growing sawtooth shape that can be used to recognize physical processes that behave similarly to Rule 90.
Related sequences
The binary logarithms (exponents in the powers of two) of Gould's sequence themselves form an integer sequence,
0, 1, 1, 2, 1, 2, 2, 3, 1, 2, 2, 3, 2, 3, 3, 4, ...
in which the th value gives the number of nonzero bits in the binary representation of the number , sometimes written in mathematical notation as . Equivalently, the th value in Gould's sequence is
Taking the sequence of exponents modulo two gives the Thue–Morse sequence.
The partial sums of Gould's sequence,
0, 1, 3, 5, 9, 11, 15, 19, 27, 29, 33, 37, 45, ...
count all odd numbers in the first rows of Pascal's triangle. These numbers grow proportionally to ,
but with a constant of proportionality that oscillates between 0.812556... and 1, periodically as a function of .
Recursive construction and self-similarity
The first values in Gould's sequence may be constructed by recursively constructing the first values, and then concatenating the doubles of the first values. For instance, concatenating the first four values 1, 2, 2, 4 with their doubles 2, 4, 4, 8 produces |
https://en.wikipedia.org/wiki/Directory-based%20cache%20coherence | In computer engineering, directory-based cache coherence is a type of cache coherence mechanism, where directories are used to manage caches in place of bus snooping. Bus snooping methods scale poorly due to the use of broadcasting. These methods can be used to target both performance and scalability of directory systems.
Full bit vector format
In the full bit vector format, for each possible cache line in memory, a bit is used to track whether every individual processor has that line stored in its cache. The full bit vector format is the simplest structure to implement, but the least scalable. The SGI Origin 2000 uses a combination of full bit vector and coarse bit vector depending on the number of processors.
Each directory entry must have 1 bit stored per processor per cache line, along with bits for tracking the state of the directory. This leads to the total size required being (number of processors)×number of cache lines, having a storage overhead ratio of (number of processors)/(cache block size×8).
It can be observed that directory overhead scales linearly with the number of processors. While this may be fine for a small number of processors, when implemented in large systems the size requirements for the directory becomes excessive. For example, with a block size of 32 bytes and 1024 processors, the storage overhead ratio becomes 1024/(32×8) = 400%.
Coarse bit vector format
The coarse bit vector format has a similar structure to the full bit vector format, though rather than tracking one bit per processor for every cache line, the directory groups several processors into nodes, storing whether a cache line is stored in a node rather than a line. This improves size requirements at the expense of bus traffic saving (processors per node)×(total lines) bits of space. Thus the ratio overhead is the same, just replacing number of processors with number of processor groups. When a bus request is made for a cache line that one processor in the group has, th |
https://en.wikipedia.org/wiki/Steered-response%20power | Steered-response power (SRP) is a family of acoustic source localization algorithms that can be interpreted as a beamforming-based approach that searches for the candidate position or direction that maximizes the output of a steered delay-and-sum beamformer.
Steered-response power with phase transform (SRP-PHAT) is a variant using a "phase transform" to make it more robust in adverse acoustic environments.
Algorithm
Steered-response power
Consider a system of microphones, where each microphone is denoted by a subindex . The discrete-time output signal from a microphone is . The (unweighted) steered-response power (SRP) at a spatial point can be expressed as
where denotes the set of integer numbers and would be the time-lag due to the propagation from a source located at to the -th microphone.
The (weighted) SRP can be rewritten as
where denotes complex conjugation, represents the discrete-time Fourier transform of and is a weighting function in the frequency domain (later discussed). The term is the discrete time-difference of arrival (TDOA) of a signal emitted at position to microphones and , given by
where is the sampling frequency of the system, is the sound propagation speed, is the position of the -th microphone, is the 2-norm and denotes the rounding operator.
Generalized cross-correlation
The above SRP objective function can be expressed as a sum of generalized cross-correlations (GCCs) for the different microphone pairs at the time-lag corresponding to their TDOA
where the GCC for a microphone pair is defined as
The phase transform (PHAT) is an effective GCC weighting for time delay estimation in reverberant environments, that forces the GCC to consider only the phase information of the involved signals:
Estimation of source location
The SRP-PHAT algorithm consists in a grid-search procedure that evaluates the objective function on a grid of candidate source locations to estimate the spatial location of the sound source, |
https://en.wikipedia.org/wiki/Infonautics | Infonautics was an information services company, founded in 1992 by Marvin Weinberger, Lawrence Husick, and Josh Kopelman, and had its headquarters in Wayne, Pennsylvania, United States. It was a spin-out from Telebase, Inc., which retained a minority position in the company. The company's executives included Van Morris (CEO), Ram Mohan (COO/CTO), Frederica O'Brien (CFO), and Gerard Lewis (General Counsel). Israel J. Melman was also a co-founder, a mentor to Marvin Weinberger and served on the boards of both Telebase and Infonautics, where he was also Chairman of the Board.
History
In 1990, Telebase founder Weinberger and outside counsel Husick conceived of Homework Helper, a $10 per month unlimited research service having a large multimedia database and a natural language user interface. Working with Brewster Kahle, a protocol was developed to run on the Thinking Machines massively parallel computer system, but in late early 1991, Conquest Software demonstrated its semantic search engine and a change in direction ensued. Hardware support was provided by Tandem Computers. Early work on the multimedia database system yielded multiple US patents. In 1996, the company was listed on the NASDAQ stock exchange. It was delisted in 2001.
In 2001, Tucows acquired Infonautics through a business tactic called "reverse takeover". Initially, Infonautics purchased Tucows and then changed its own name to Tucows. On August 26, 2002, Tucows sold eLibrary and Encyclopedia.com to HighBeam Research.
The company created online services Homework Helper on Prodigy, Encyclopedia.com, Electric Library, and CompanySleuth.
The Philadelphia Inquirer noted the company was "one of the first Internet companies in the Philadelphia area"
References
Technology companies established in 1992
Business intelligence companies
1992 establishments in Pennsylvania
2001 disestablishments in Pennsylvania
Defunct companies based in Pennsylvania
Companies formerly listed on the Nasdaq
Tucows |
https://en.wikipedia.org/wiki/DOPIPE | DOPIPE parallelism is a method to perform loop-level parallelism by pipelining the statements in a loop. Pipelined parallelism may exist at different levels of abstraction like loops, functions and algorithmic stages. The extent of parallelism depends upon the programmers' ability to make best use of this concept. It also depends upon factors like identifying and separating the independent tasks and executing them parallelly.
Background
The main purpose of employing loop-level parallelism is to search and split sequential tasks of a program and convert them into parallel tasks without any prior information about the algorithm. Parts of data that are recurring and consume significant amount of execution time are good candidates for loop-level parallelism. Some common applications of loop-level parallelism are found in mathematical analysis that uses multiple-dimension matrices which are iterated in nested loops.
There are different kind of parallelization techniques which are used on the basis of data storage overhead, degree of parallelization and data dependencies. Some of the known techniques are: DOALL, DOACROSS and DOPIPE.
DOALL: This technique is used where we can parallelize each iteration of the loop without any interaction between the iterations. Hence, the overall run-time gets reduced from N * T (for a serial processor, where T is the execution time for each iteration) to only T (since all the N iterations are executed in parallel).
DOACROSS: This technique is used wherever there is a possibility for data dependencies. Hence, we parallelize tasks in such a manner that all the data independent tasks are executed in parallel, but the dependent ones are executed sequentially. There is a degree of synchronization used to sync the dependent tasks across parallel processors.
Description
DOPIPE is a pipelined parallelization technique that is used in programs where each element produced during each iteration is consumed in the later iteration. The followin |
https://en.wikipedia.org/wiki/Rumiyah%20%28magazine%29 | Rumiyah () was an online magazine used by the Islamic State (IS) for propaganda and recruitment. It was first published in September 2016 and was released in several languages, including English, French, German, Russian, Indonesian and Uyghur.
The magazine replaces Dabiq, Dar al-Islam and other magazines that were released until mid-2016. Analysts attributed the change of name partly to the imminent loss of the town of Dabiq to a Turkish-led military offensive, which occurred in October 2016.
The name Rumiyah (Rome) was a reference to a hadith in which Muhammed said that Muslims would conquer both Constantinople and Rome in that order.
Like Dabiq, each issue opens with a quote attributed to Abu Hamza al-Muhajir: "O muwahhidin, rejoice, for by Allah, we will not rest from our jihad except beneath the olive trees of Rumiyah (Rome)."
The first issue was released after the death of IS spokesman, Abu Mohammad al-Adnani, who was featured heavily in the magazine. In October 2016, Islamic State released the second edition of the magazine in which it justified attacks against non-Muslims, including detailed descriptions of how to carry out knife attacks on smaller groups of people.
In October 2016, Rumiyah advised followers to carry out stabbing attacks and argued that jihadists throughout Muslim history have "struck the necks of the kuffar" (unbelievers) in the name of Allah with "swords, severing limbs and piercing the fleshy meat of those who opposed Islam". The magazine advised its readers that knives are easy to obtain and to hide and that they make good, deadly weapons where Muslims might be regarded with suspicion.
Issues
See also
Dar al-Islam (magazine)
Konstantiniyye (magazine)
Dabiq (magazine)
References
Islamic State of Iraq and the Levant mass media
Arabic-language magazines
English-language magazines
Online magazines
Magazines established in 2016
Magazines published in Syria
Magazines disestablished in 2017
Defunct magazines published in Syria
Multiling |
https://en.wikipedia.org/wiki/Chat-Avenue | Chat Avenue is a web site that hosts chat rooms. A total of 20 chat rooms are available. Originally launched with DigiChat software based on Java, it was subsequently changed and built with 123 Flash Chat, an Adobe Flash-based software for in-browser chat rooms in October 2005. In 2018, new PHP software was added to the website due to browser restrictions and the upcoming end-of-life announcement by Flash. In 2021, new chat software was added enabling user support of a webcam. The chat rooms are administered by volunteer moderators and administrators.
Use of platform by law enforcement
Some chat rooms within the site, which target younger audiences, are known to be used by law enforcement to catch online predators.
On September 18, 2018, New Jersey Attorney General Gurbir Grewal announced the arrests of 24 alleged child predators in “Operation Open House,” a multi-agency undercover operation targeting men who allegedly were using social media in an attempt to lure underage girls and boys for sexual activity. Chat Avenue was among the social media and messaging apps named to have allegedly been used by the child predators.
In February 2021, Channel 4 released a television series documenting a specialist covert police unit tracking sexual predators online. Chat Avenue was one of the platforms used by the police officers and was featured abundantly in the first episode of the series.
See also
List of chat websites
Online chat
References
External links
Official Site
Online chat |
https://en.wikipedia.org/wiki/Size-asymmetric%20competition | Size-asymmetric competition refers to situations in which larger individuals exploit disproportionately greater amounts of resources when competing with smaller individuals. This type of competition is common among plants but also exists among animals. Size-asymmetric competition usually results from large individuals monopolizing the resource by "pre-emption". i.e. exploiting the resource before smaller individuals are able to obtain it. Size-asymmetric competition has major effects on population structure and diversity within ecological communities.
Definition of size asymmetry
Resource competition can vary from complete symmetric (all individuals receive the same amount of resources, irrespective of their size, known also as scramble competition) to perfectly size symmetric (all individuals exploit the same amount of resource per unit biomass) to absolutely size asymmetric (the largest individuals exploit all the available resource). The degree of size asymmetry can be described by the parameter θ in the following equation focusing on the partition of the resource r among n individuals of sizes Bj.
ri refers to the amount of resource consumed by individual i in the neighbourhood of j. When θ =1, competition is perfectly size symmetric, e.g. if a large individual is twice the size of its smaller competitor, the large individual will acquire twice the amount of that resource (i.e. both individuals will exploit the same amount of resource per biomass unit). When θ >1 competition is size-asymmetric, e.g. if large individual is twice the size of its smaller competitor and θ =2, the large individual will acquire four times the amount of that resource (i.e. the large individual will exploit twice the amount of resource per biomass unit). As θ increases, competition becomes more size-asymmetric and larger plants get larger amounts of resource per unit biomass compared with smaller plants.
Differences in size-asymmetry among resources in plant communities
Competit |
https://en.wikipedia.org/wiki/Ratio%20meter%20systems | A Ratiometer type temperature indicating system consists of a sensing element and a moving-coil indicator, which unlike the conventional type has two coils moving together in a permanent-magnet field of non-uniform strength. The coil arrangements and the methods of obtaining the non-uniform field depends on the manufacturer's design. The main application behind in this ratiometer system is to find the unknown resistance, namely Rx. This plays a major role in the aircraft industry, in finding cylinder head temperatures exposed to turbine exhaust gases. It can also be used to measure temperatures of systems such as engine oil and carburetor air.
Methods of obtaining non-uniform magnetic coil
Parallel coil
Parallel coil is a method of obtaining non-uniform coil in ratiometer systems in which the hairsprings are wounded parallelly in order to allow the signal to pass through it.
Cross coil
The coil is wound from 99.99% pure copper on a wood which was treated with many oxidizers and chemicals.
The benefits from using foil inductors comes in the form of less distortion and higher dynamic headroom, when used on crossovers for modern high performance speakers.
In these methods two parallel resistance arms are formed; one containing the coil and a fixed calibrating resistance R1, and the other containing a coil in series with a calibrating resistance R2 and the temperature-sensing element Rx. Both arms are supplied with direct current from the aircraft's main power source, but the coils are so wound that current flows through them in opposite directions.
As in any moving-coil indicator, rotation of the measuring element is produced by forces which are proportional to product of the current and field strength, and the direction of rotation depends on the direction of current relative to the magnetic field. In a ratio meter, therefore, it follows that the force produced by one coil will always tend to rotate the measuring element in the opposite direction to the force |
https://en.wikipedia.org/wiki/Five%20Great%20Kilns | The Five Great Kilns (), also known as Five Famous Kilns, is a generic term for ceramic kilns or wares (in Chinese 窯 yáo can mean either) which produced Chinese ceramics during the Song dynasty (960–1279) that were later held in particularly high esteem. The group were only so called by much later writers, and of the five, only two (Ru and Guan) seem to have produced wares directly ordered by the Imperial court, though all can be of very high quality. All were imitated later, often with considerable success.
All except Ding ware used celadon glazes, and in Western terms the celadon kilns are stoneware, as opposed to the Ding early porcelain. The celadons placed great emphasis on elegant forms and their ceramic glazes, and were otherwise lightly decorated, with no painting.
The five kilns produced respectively:
Ru ware (汝)
Jun ware (钧)
Guan ware (官)
Ding ware (定)
Ge ware (哥)
History of the term
Although the group and name is generally said in books to have been a coinage by Chinese writers from the Ming or Qing dynasties, a recent paper analysing the main Chinese scholars suggests the modern number and selection of "great kilns", as given here, in fact only dates back to the mid-20th century, with various numbers and other kilns often found in previous writings. In particular, the semi-mythical Chai ware, and Longquan celadon often feature in earlier groupings, and Jun ware is often omitted.
Notes
References
Rawson, Jessica (ed). The British Museum Book of Chinese Art, 2007 (2nd edn), British Museum Press,
Chinese pottery
China-related lists of superlatives
Kilns
Song dynasty |
https://en.wikipedia.org/wiki/Cohesity | Cohesity is an American privately held information technology company headquartered in San Jose, California with offices in India and Ireland. The company develops software that allows IT professionals to backup, manage and gain insights from their data across multiple systems or cloud providers. Their products also include anti-ransomware features, Disaster Recovery-as-a-Service, and SaaS management.
History
Cohesity was founded in June 2013 by Mohit Aron. Aron previously co-founded storage company Nutanix. While still in stealth mode, it closed a Series A funding round of $15M.
The company launched publicly in June 2015, introducing a platform designed to consolidate and manage secondary data. In October, Cohesity announced the public launch of its data management products, DataPlatform and DataProtect. As part of coming out of stealth mode, the company announced a Series B funding round of $55M, bringing its total at that point to $70M.
In February 2016, the company announced the second generation of DataPlatform and DataProtect. In June, the company launched its 3.0 products, expanding data protection to physical servers. Also by June, the company had raised $70 million in venture funding in two rounds with Google Ventures, Qualcomm Ventures, and Sequoia Capital.
On April 4, 2017, Cohesity announced a $90 million Series C funding round, led by GV, the venture capital arm of Google parent Alphabet Inc., and Sequoia Capital. In November 2017, Cohesity had 300 employees.
On June 11, 2018, the company announced a Series D funding round of $250 million led by SoftBank Vision Fund. In August, the company introduced a SaaS-based management console called Helios.
In February 2019, Cohesity launched their online MarketPlace to sell applications that run on its DataPlatform. In May, the company made its first acquisition by buying Imanis Data, a provider of NoSQL data protection software. In July, the company announced it would be recognizing revenue predominantly f |
https://en.wikipedia.org/wiki/Acquired%20neuroprotection | Acquired neuroprotection is a synaptic-activity-dependent form of adaptation in the nervous system that renders neurons more resistant to harmful conditions. The term was coined by Hilmar Bading. This use-dependent enhancement of cellular survival activity requires changes in gene expression triggered by neuronal activity and nuclear calcium signaling. In rodents, components of the neuroprotective gene program can reduce brain damage caused by seizure-like activity or by a stroke. In acute and chronic neurodegenerative diseases, gene regulatory events important for acquired neuroprotection are antagonized by extrasynaptic NMDA receptor signaling leading to increased vulnerability, loss of structural integrity, and bioenergetics dysfunction.
References
Neuroscience
Neurophysiology |
https://en.wikipedia.org/wiki/Nuclear%20calcium | The concentration of calcium in the cell nucleus can increase in response to signals from the environment. Nuclear calcium is an evolutionary conserved potent regulator of gene expression that allows cells to undergo long-lasting adaptive responses. The 'Nuclear Calcium Hypothesis’ by Hilmar Bading describes nuclear calcium in neurons as an important signaling end-point in synapse-to-nucleus communication that activates gene expression programs needed for persistent adaptations. In the nervous system, nuclear calcium is required for long-term memory formation, acquired neuroprotection, and the development of chronic inflammatory pain. In the heart, nuclear calcium is important for the development of cardiac hypertrophy. In the immune system, nuclear calcium is required for human T cell activation. Plants use nuclear calcium to control symbiosis signaling.
References
Neuroscience
Gene expression
Calcium |
https://en.wikipedia.org/wiki/Witt%20vector%20cohomology | In mathematics, Witt vector cohomology was an early p-adic cohomology theory for algebraic varieties introduced by . Serre constructed it by defining a sheaf of truncated Witt rings Wn over a variety V and then taking the inverse limit of the sheaf cohomology groups Hi(V, Wn) of these sheaves. Serre observed that though it gives cohomology groups over a field of characteristic 0, it cannot be a Weil cohomology theory because the cohomology groups vanish when i > dim(V). For Abelian varieties showed that one could obtain a reasonable first cohomology group by taking the direct sum of the Witt vector cohomology and the Tate module of the Picard variety.
References
Algebraic geometry
Cohomology theories |
https://en.wikipedia.org/wiki/Fork%20and%20pull%20model | Fork and pull model refers to a software development model mostly used on GitHub, where multiple developers working on an open, shared project make their own contributions by sharing a main repository and pushing changes after granted pull request by integrator users. Followed by the advent of distributed version control systems (DVCS), Git naturally enables the usage of a pull-based development model, in which developers can copy the project onto their own repository and then push their changes to the original repository, where the integrators will determine the validity of the pull request. Since its appearance, pull-based development has gained popularity within the open software development community. On GitHub, over 400,000 pull-requests emerged per month on average in 2015. It is also the model shared on most collaborative coding platforms, like Bitbucket, Gitorious, etc. More and more functionalities are added to facilitate pull-based model.
References
Version control
Git (software) |
https://en.wikipedia.org/wiki/Unnormalized%20form | In database normalization, unnormalized form (UNF), also known as an unnormalized relation or non-first normal form (N1NF or NF2), is a database data model (organization of data in a database) which does not meet any of the conditions of database normalization defined by the relational model. Database systems which support unnormalized data are sometimes called non-relational or NoSQL databases. In the relational model, unnormalized relations can be considered the starting point for a process of normalization.
It should not be confused with denormalization, where normalization is deliberately compromised for selected tables in a relational database.
History
In 1970, E. F. Codd proposed the relational data model, now widely accepted as the standard data model. At that time, office automation was the major use of data storage systems, which resulted in the proposal of many NF2 data models like the Schek model, Jaeschke models (non-recursive and recursive algebra), and the Nested Table Data (NTD) model. IBM organized the first international workshop exclusively on this topic in 1987 which was held in Darmstadt, Germany. Moreover, a lot of research has been done and journals have been published to address the shortcomings of the relational model. Since the turn of the century, NoSQL databases have become popular owing to the demands of Web 2.0.
Relational form
Normalization to first normal form requires the initial data to be viewed as relations. In database systems relations are represented as tables. The relation view implies some constraints on the tables:
No duplicate rows. In practice, this is ensured by defining one or more columns as primary keys.
Rows do not have an intrinsic order. While tables have to be stored and presented in some order, this is unstable and implementation dependent. If a specific ordering needs to be represented, it has to be in the form of data, e.g. a "number" column.
Columns have unique names within the same table.
Each column h |
https://en.wikipedia.org/wiki/Pine64 | Pine Store Limited, known by its trade name Pine64 (styled as PINE64), is a Hong Kong-based organization that designs, manufactures, and sells single-board computers, notebook computers, as well as smartwatch/smartphones. Its name was inspired by the mathematical constants pi and with a reference to 64-bit computing power.
History
Pine64 initially operated as Pine Microsystems Inc. (Fremont, California), founded by TL Lim, the inventor of the PopBox and Popcorn Hour series of media players sold under the Syabas and Cloud Media brands.
In 2015, Pine Microsystems offered its first product, the Pine A64, a single-board computer designed to compete with the popular Raspberry Pi in both power and price. The A64 was first funded through a Kickstarter crowdfunding drive in December 2015 which raised over US$1.7 million. The Kickstarter project was overshadowed by delays and shipping problems. The original Kickstarter page referred to Pine64 Inc. based in Delaware, but all devices for the Kickstarter campaign were manufactured and sold by Pine Microsystems Inc. based in Fremont, California.
In January 2020, Pine Microsystems Inc. was dissolved while Pine Store Limited was incorporated on December 5, 2019, in Hong Kong. As of late 2020, the standard form contract of pine64.com binds all orders to the laws of Malaysia, while the products are shipped from warehouses in Shenzhen, China and Hong Kong.
Devices
After the initial Kickstarter orders for the Pine A64 single-board computers, the company went on to make more devices.
Single-board computers
The original Pine A64 boards released in 2016 are powered by the Allwinner A64 system-on-chip. It features a 1.2 GHz Quad-Core ARM Cortex-A53 64-Bit Processor, an ARM Mali 400 MP2 graphics processor unit, one HDMI 1.4a port, one MicroSD slot, two USB 2.0 ports and a 100 Megabit Ethernet port. The A64 board has only 512 megabytes of RAM, the 1 GB and 2 GB versions are labeled "Pine A64+". While the 512 MB model only works w |
https://en.wikipedia.org/wiki/Proactive%20disclosure | Proactive disclosure is the act of releasing information before it is requested. In Canada, this refers to an environment where information is released routinely through electronic means with the exception of information that the government is required to protect due to privacy risks. This could refer to information regarding citizens' social insurance numbers or military operations.
Proactive disclosure differs from reactive disclosure, as reactive disclosure occurs when a request is made, while proactive disclosure occurs without the filing of the request. Proactive disclosure has also been referred to as stealing thunder, active disclosure in the United States and suo moto disclosure in Latin which means upon its own initiative.
History
The earliest way information was disclosed was seen in ancient Greece through criers or bellmen. Criers were hired in medieval times to walk the streets and call for attention, then read out important news such as royal proclamations or local bylaws. They would also play a role in passing the information across villages. This role changed when newspapers, radios, television and the internet became innovative parts of society.
Governments
Within the government, proactive disclosure is meant to inform citizens of information that allows them to hold the government accountable. Information that puts private or public good in harm's way is not disclosed. This term is used frequently when discussing open government, meaning information is easily available to the public and at a regular basis due to the benefit of technology on disseminating information.
Many consider proactive disclosure and the ability to have access to information as a way to watch over those in power within society. This is especially true for governments who collect a wide range of information, which citizens often use to hold the government accountable.
Transparency and proactive disclosure are often associated in terms of creating open government.
Canada |
https://en.wikipedia.org/wiki/Heptadecaphobia | Heptadecaphobia (Greek: , "seventeen" and , , "fear") or heptadekaphobia is the fear of the number 17. It is considered to be ill-fated in Italy and other countries of Greek and Latin origins, while the date Friday the 17th is considered especially unfortunate in Italy. The number is feared due to superstition, and is similar in nature to the fear of the number 13 in Anglo-Saxon countries.
History
In Ancient Greece, the number 17 was despised by followers of Pythagoras, as the number was between 16 and 18, which were perfect representations of 4×4 and 3×6 quadrilaterals, respectively.
In the Old Testament, it is written that the universal flood began on the 17th of the second month (Genesis, 7–11).
It has been suggested that the Romans found the number 17 disturbing because in Roman numerals XVII is an anagram of vixi, meaning "I have lived" (i.e. I am dead).
In La smorfia napoletana, a "dictionary" that associated certain vocabulary words to numbers to be played in the lottery, the number 17 is associated with ("misfortune").
Friday the 17th
In Italy, Friday the 17th is a date of misfortune, as it is a date of two negatives: Friday (from Good Friday, the day of Jesus' death) and the number 17.
Friday the 17th is similar to other unfortunate dates: for example, in Anglo-Saxon countries, this date is Friday the 13th, while in Spain, Greece, and South America, this date is Tuesday the 13th.
In mass media, the theme is portrayed in movies, such as The Virtuous Bigamist (Italian: Era di venerdì 17) and Shriek If You Know What I Did Last Friday the 13th (Italian: Shriek - Hai impegni per venerdì 17?), where in English the title refers to the number 13.)
See also
List of phobias, including Numerophobia
References
Phobias
Numerology
17 |
https://en.wikipedia.org/wiki/Medlar%20bodies | Medlar bodies, also known as sclerotic or muriform cells, are thick walled cells (5-12 microns) with multiple internal transverse septa or chambers that resemble copper pennies. When present in skin or subcutaneous tissue, the cells are indicative of chromoblastomycosis.
References
Mycology |
https://en.wikipedia.org/wiki/Contemporary%20Wayang%20Archive | The Contemporary Wayang Archive (CWA) is a digital archive of full length videos of new adaptations of Javanese Wayang Kulit (wayang kontemporer), with subtitles and notes. It is a project by the National University of Singapore.
References
External links
http://cwa-web.org
Wayang
Online archives
Javanese culture |
https://en.wikipedia.org/wiki/Microbial%20synergy | Microbial synergy is a phenomenon in which aerobic and anaerobic microbes support each other's growth and proliferation. In this process aerobes invade and destroy host tissues, reduce tissue oxygen concentration and redox potential, thus creating favorable conditions for anaerobic growth and proliferation. Anaerobes grow and produce short chain fatty acids such as butyric acid, propionic acid. These short chain fatty acids inhibit phagocytosis of aerobes. Thus aerobes grow, proliferate and destroy more tissues. Microbial synergy complicates and delays the healing of surgical and other chronic wounds or ulcers such as diabetic foot ulcers, venous ulcers, pressure ulcers etc. Microbial synergy also helps with eliminating oxygen redox. This allows the growth of organisms without the effects of oxygen reacting negatively. As a result, Microbial growth increases because other organisms can grow in the absence of Oxygen redox.
References
Rotstein, O. D., T. L. Pruett, and R. L. Simmons. "Mechanisms of Microbial Synergy in Polymicrobial Surgical Infections." Reviews of Infectious Diseases. U.S. National Library of Medicine, n.d. Web. 19 Apr. 2017.
Microbial growth and nutrition
Microbiology |
https://en.wikipedia.org/wiki/Arm%20and%20hammer | The arm and hammer is a symbol consisting of a muscular arm holding a hammer. Used in ancient times as a symbol of the god Vulcan, it came to be known as a symbol of industry, for example blacksmithing and gold-beating. It has been used as a symbol by many different kinds of organizations, including banks, local government, and socialist political parties.
It has been used in heraldry, appearing in the Coat of arms of Birmingham and Seal of Wisconsin.
The similarity to the name of the industrialist Armand Hammer is not a coincidence: he was named after the symbol, as his father Julius Hammer was a supporter of socialist causes, including the Socialist Labor Party of America, with its arm-and-hammer logo.
The Arm & Hammer brand is a registered trademark of Church & Dwight, an American manufacturer of household products. According to the company, the logo originally represented Vulcan. Armand Hammer made an offer to outright purchase this company having this brand with the similarity to his name, and while this offer was refused, he eventually acquired enough stock to have a controlling interest and join the board of directors. He remained an owner until his death in 1990.
An arm-and-hammer sign can be seen in Manette Street, Soho, symbolizing the trade of gold-beating carried on there in the nineteenth century. It is referred to by Charles Dickens in A Tale of Two Cities. As of 2016, the sign there is a replica, with the original being held in the Dickens Museum.
One of the oldest visualizations of arm and hammer can be found on Svetitskhoveli Cathedral. It was completed in 1029 by the medieval Georgian architect Arsukidze, although the site itself dates back to the early fourth century.
Gallery
See also
Hammer and pick
Hammer and sickle
Fist and rose
Armand Hammer
We Can Do It!
References
External links
Symbols
Heraldic charges
Symbols of communism
Visual motifs |
https://en.wikipedia.org/wiki/Whiteboard%20Pattern | Whiteboard Design Pattern is an OSGi service model, which influences the OSGi framework's service registry. Whiteboard pattern came into existence because of complicated and error prone nature of traditional model: The Listener Pattern (aka Observer Pattern).
OSGi service model is a collaboration model which supports service registry. The service registry allows applications or bundles to register services, which are simple Java interfaces to implement different functionalities. The dynamic nature of the service registry is useful to track the services that can show up or leave at any time. Whiteboard Pattern is created to support such OSGi service model, which was not supported by Listener Pattern.
Introduction
The Listener Pattern
The Listener Pattern is typically known as Observer Pattern. It is a Behavioral Pattern (aka Publish-Subscribe), which deals with dynamic changes in the state of different objects.
Listener Pattern follows a structure where an event listener is registered to event source. Now whenever an event source changes its state, all its event listeners get notified about the change through event object. In this pattern, everything is controlled by event source.
Implementation of Listener pattern is very complicated. Listener pattern supports many event listeners, so all listeners are registered to an event source. No event listener has access control over an event source, so for every service a new file is to be created. This creates an overhead of class file and affects the program running time and memory usage. Also, when an event listener is exiting, its registration is to be cancelled from the event source. Vice versa, when an event source is exiting, it makes sure that all its event listeners' references are removed. Here it is assumed that clean up is done automatically, but some embedded applications which are running continuously and are highly dynamic, this assumption cannot be verified and creates a significant issue.
Whiteboard P |
https://en.wikipedia.org/wiki/Photo-reflectance | Photo-reflectance is an optical technique for investigating the material and electronic properties of thin films. Photo-reflectance measures the change in reflectivity of a sample in response to the application of an amplitude modulated light beam. In general, a photo-reflectometer consists of an intensity modulated "pump" light beam used to modulate the reflectivity of the sample, a second "probe" light beam used to measure the reflectance of the sample, an optical system for directing the pump and probe beams to the sample, and for directing the reflected probe light onto a photodetector, and a signal processor to record the differential reflectance. The pump light is typically modulated at a known frequency so that a lock-in amplifier may be used to suppress unwanted noise, resulting in the ability to detect reflectance changes at the ppm level.
The utility of photo-reflectance for characterization of semiconductor samples has been recognized since the late 1960s. In particular,
conventional photo-reflectance is closely related to electroreflectance in that the sample's internal electric field is modulated by the photo-injection of electron-hole pairs. The electro-reflectance response is sharply peaked near semiconductor interband transitions, which accounts for its usefulness in semiconductor characterization. Photo-reflectance spectroscopy has been used to determine semiconductor bandstructures, internal electric fields, and other material properties such as crystallinity, composition, physical strain, and doping concentration.
Etymology
The name "photo-reflectance" or "photoreflectance" is shortened from the term "photo-modulated reflectance," which describes the use of an intensity modulated light beam to perturb the reflectance of a sample. The technique has also been referred to as "modulated photo-reflectance," "modulated optical reflectance," and "photo-modulated optical reflectance." It has been known at least since 1967.
Basic principles
Photo-ref |
https://en.wikipedia.org/wiki/Time%20Warp%20Edit%20Distance | Time Warp Edit Distance (TWED) is a measure of similarity (or dissimilarity) for discrete time series matching with time 'elasticity'. In comparison to other distance measures, (e.g. DTW (dynamic time warping) or LCS (longest common subsequence problem)), TWED is a metric. Its computational time complexity is , but can be drastically reduced in some specific situations by using a corridor to reduce the search space. Its memory space complexity can be reduced to . It was first proposed in 2009 by P.-F. Marteau.
Definition
whereas
Whereas the recursion
is initialized as:
with
Implementations
An implementation of the TWED algorithm in C with a Python wrapper is available at
TWED is also implemented into the Time Series Subsequence Search Python package (TSSEARCH for short) available at .
An R implementation of TWED has been integrated into the TraMineR, a R package for mining, describing and visualizing sequences of states or events, and more generally discrete sequence data.
Additionally, cuTWED is a CUDA- accelerated implementation of TWED which uses an improved algorithm due to G. Wright (2020). This method is linear in memory and massively parallelized. cuTWED is written in CUDA C/C++, comes with Python bindings, and also includes Python bindings for Marteau's reference C implementation.
Python
import numpy as np
def dlp(A, B, p=2):
cost = np.sum(np.power(np.abs(A - B), p))
return np.power(cost, 1 / p)
def twed(A, timeSA, B, timeSB, nu, _lambda):
# [distance, DP] = TWED( A, timeSA, B, timeSB, lambda, nu )
# Compute Time Warp Edit Distance (TWED) for given time series A and B
#
# A := Time series A (e.g. [ 10 2 30 4])
# timeSA := Time stamp of time series A (e.g. 1:4)
# B := Time series B
# timeSB := Time stamp of time series B
# lambda := Penalty for deletion operation
# nu := Elasticity parameter - nu >=0 needed for distance measure
# Reference :
# Marteau, P.; F. (2009). "Time W |
https://en.wikipedia.org/wiki/Design%20for%20inspection | Design for inspection (DFI) is an engineering principle that proposes that inspection methods and measurement instruments used to certify manufacturing conformity, should be considered early in the design of products. Production processes should be designed in such a way that features of the product are easy to inspect with readily available measurement instruments, and so that measurement uncertainty is considered in the tolerance that are applied. The concept can be applied in almost all engineering disciplines. DFI describes the process of designing or engineering a product in order to facilitate the measurement in order to reduce the overall costs of manufacturing and delivering products that satisfy customers.
The role of inspection in the manufacturing process is to ensure that the manufacturing process is producing components that meet the specification requirements. Inspection does not assure the quality of the product, only a robust and repeatable manufacturing process can achieve this. Therefore, inspection is often considered as an overhead although an extremely important one. Similar to design for manufacture (DFM) and design for assembly (DFA) (which seek to avoid designs which are difficult to make), the concept of DFI considers measurement capabilities at an early stage in the product development life cycle and uses knowledge of the fundamental principles of metrology to achieve cost reduction. If the inspection method and instruments are considered and selected at the design stage, the likelihood that a tolerance feature cannot be inspected or requires a specialised instrument is substantially reduced. High precision features require specialised manufacturing and metrology, these can have limited availability in the supply chain and therefore often have increased cost. The concept of DFI should complement and work in collaboration with DFM and DFA. There are three key areas when considering DFI, datum selection, tolerances and accessibility, plus ge |
https://en.wikipedia.org/wiki/Apache%20Parquet | Apache Parquet is a free and open-source column-oriented data storage format in the Apache Hadoop ecosystem. It is similar to RCFile and ORC, the other columnar-storage file formats in Hadoop, and is compatible with most of the data processing frameworks around Hadoop. It provides efficient data compression and encoding schemes with enhanced performance to handle complex data in bulk.
History
The open-source project to build Apache Parquet began as a joint effort between Twitter and Cloudera. Parquet was designed as an improvement on the Trevni columnar storage format created by Doug Cutting, the creator of Hadoop. The first version, Apache Parquet1.0, was released in July 2013. Since April 27, 2015, Apache Parquet has been a top-level Apache Software Foundation (ASF)-sponsored project.
Features
Apache Parquet is implemented using the record-shredding and assembly algorithm, which accommodates the complex data structures that can be used to store data. The values in each column are stored in contiguous memory locations, providing the following benefits:
Column-wise compression is efficient in storage space
Encoding and compression techniques specific to the type of data in each column can be used
Queries that fetch specific column values need not read the entire row, thus improving performance
Apache Parquet is implemented using the Apache Thrift framework, which increases its flexibility; it can work with a number of programming languages like C++, Java, Python, PHP, etc.
As of August 2015, Parquet supports the big-data-processing frameworks including Apache Hive, Apache Drill, Apache Impala, Apache Crunch, Apache Pig, Cascading, Presto and Apache Spark. It is one of external data formats used by pandas Python data manipulation and analysis library.
Compression and encoding
In Parquet, compression is performed column by column, which enables different encoding schemes to be used for text and integer data. This strategy also keeps the door open for newer a |
https://en.wikipedia.org/wiki/P8000 | The P8000 is a microcomputer system developed in 1987 by the VEB Elektro-Apparate-Werke Berlin-Treptow „Friedrich Ebert“ (EAW) in the German Democratic Republic (DDR, East Germany). It consisted of an 8-bit and a 16-bit microprocessor and a Winchester disk controller. It was intended as a universal programming and development system for multi-user/multi-task applications. The initial list price of the P8000 was 172,125 East German marks (around 86,000–172,000 DM).
There was also a budget version with only an 8-bit microprocessor.
The 8-bit microcomputer
The 8-bit version of P8000 was completely contained on a single 4-layer printed circuit board. The processor, with a clock frequency of 4 MHz, was based on the U880 microprocessor (near clone of Zilog Z80) and peripheral circuits along with the U8272 floppy-disk controller. Direct memory access was accomplished by U858 DMA controller chip..
The system featured a main memory of 64 KB dynamic RAM, an 8 K EPROM, and a 2 KB static RAM for boot code, system test routines and the system monitor. This extra memory could be moved or turned off in 4-KB-stages in the 64 K address space.
The 8-bit machine had four serial ports, designated tty0 to tty3. These interfaces could operate either as V.24 or IFSS (Interface sternförmig seriell–20 mA current loop) signals. In addition the computer had a parallel port which allowed the connection of an EPROM burner. Another internal 32-bit parallel interface was used for the coupling the 8-bit to a 16-bit microcomputer card. Data exchange was via two built-in 5.25" floppy drives. Two additional 5.25" or 8" floppy drives could be connected externally.
The 16-bit microcomputer
The 16-bit version of P8000 was divided into two functional units: the 16-bit processor card and up to four plug-in memory cards with sizes of 256 KB or 1 MB. The 16-bit processor was contained on a 6-layer PC board. The processor operated at a clock frequency of 4 MHz and was based on the U8001 (Zilog Z8001 |
https://en.wikipedia.org/wiki/Code%20page%20951 | Code page 951 is a code page number used for different purposes by IBM and Microsoft.
IBM uses the code page number 951 for their double-byte PC Data KS code, the double byte component of their code page 949, an encoding for the Korean language. See Code page 949 (IBM).
The code page number 951 was also used by Microsoft as part of a kludge for providing Hong Kong Supplementary Character Set (HKSCS-2001) support in Windows XP, in the file name of a replacement for code page 950 (Traditional Chinese) with Unicode mappings for some Extended User-defined Characters (EUDC) found in HKSCS. HKSCS characters without a Unicode mapping are assigned a Unicode Private Use Area (PUA) code point following previous practices. The IBM code page number for Big5 with HKSCS-2001 is 5471. See Hong Kong Supplementary Character Set § Microsoft Windows.
References
951
Encodings of Asian languages |
https://en.wikipedia.org/wiki/Glossary%20of%20prestressed%20concrete%20terms | This page is a glossary of Prestressed concrete terms.
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
Y
See also
Cable-stayed bridge
Cantilever bridge
Concrete
Concrete beam
Concrete slab
Construction
Glossary of engineering
Glossary of civil engineering
Glossary of structural engineering
Incremental launch method
Precast concrete
Prestressed concrete
Prestressed structure
Reinforced concrete
Segmental bridge
Prestressing Wedges
References
Building engineering
Civil engineering
Prestressed concrete construction
Structural engineering
Prestressed Concrete
Concrete
Wikipedia glossaries using description lists |
https://en.wikipedia.org/wiki/N%2CN-Dimethylphenethylamine | N,N-Dimethylphenethylamine (N,N-DMPEA) is a substituted phenethylamine that is used as a flavoring agent. It is an alkaloid that was first isolated from the orchid Eria jarensis. Its aroma is described as "sweet, fishy". It is mainly used in cereal, cheese, dairy products, fish, fruit and meat. It is also being used in pre-workout and bodybuilding supplements with claims of a stimulant effect.
There is also evidence suggesting that N,N-DMPEA acts as a TAAR1 agonist in humans, and as a 5-HT1A ligand in rats. Some less conclusive research also indicated that it had interaction with MAO-B, most likely as an enzyme substrate and not an inhibitor.
N,N-DMPEA is a positional isomer of methamphetamine. Instead of the methyl group attached to the alpha position of phenylethylamine, it's attached to the nitrogen group. Both substances have the chemical formula C10H15N.
Safety
N,N-DMPEA has been found to be safe for use as a flavoring agent by the Flavor and Extract Manufacturers Association (FEMA) Expert Panel and also by the Joint Expert Committee on Food Additives (JECFA)—a collaboration between the Food and Agricultural Organization of the United Nations (FAO) and the World Health Organization.
Legality
In the United States, N,N-DMPEA may be considered a Schedule II substance as a positional isomer of methamphetamine (C10H15N), due to the Schedule II definition of methamphetamine defined as "any quantity of methamphetamine, including its salts, isomers, and salts of isomers"
References
Phenethylamine alkaloids
Food additives |
https://en.wikipedia.org/wiki/Spreadability | In media studies and marketing, spreadability is the wide distribution and circulation of information on media platforms.
Spreadability contrasts with the "stickiness" of aggregating media in centralized places.
The original copy of the (textual, visual, audio) information does not need to be replicated perfectly in order to display the characteristics of spreadability, rather the original can be manipulated or maintained in its original form and still be a product of this process. Simply, this concept refers to the capability of media being spread.
Background
The first book which disseminated the concept of "spreadability" for media studies and marketing was Spreadable Media (2013) by media academics and industry experts Henry Jenkins, Sam Ford, and Joshua Green. This spreadability concept emerged in the development of a 2008 white paper, "If It Doesn't Spread, It's Dead: Creating Value in a Spreadable Marketplace" authored by Jenkins, Xiaochang Li, and Ana Domb Krauskopf, with assistance from Green.
The concept "refers to the potential – both technical and cultural – for audiences to share content for their own purposes, sometimes with the permission of rights holders, sometimes against their wishes". It is contextualised in the media landscape due to the strong connection with quick and easy sharing practices which have been enabled by media platforms. After Jenkins coined this term (in a rather optimistic context) many authors such as Christian Fuchs have interpreted this movement through a more pessimistic lens.
Spreadability is directly linked to "participatory culture" (a concept coined by Jenkins). Participatory culture is the backbone to spreadability as it depicts an image of people who are "shaping, sharing, reframing, and remixing media content". This culture is based on grass-root audience practices online. In other words, any user of a platform (that provides sharing possibilities) is emancipated as an individual who can informally, and instantan |
https://en.wikipedia.org/wiki/Defence%20in%20depth%20%28non-military%29 | A defence in depth uses multi-layered protections, similar to redundant protections, to create a reliable system despite any one layer's unreliability.
Examples
The term defence in depth is now used in many non-military contexts.
Fire prevention
A defence in depth strategy to fire prevention does not focus all the resources only on the prevention of a fire; instead, it also requires the deployment of fire alarms, extinguishers, evacuation plans, mobile rescue and fire-fighting equipment and even nationwide plans for deploying massive resources to a major blaze.
Defense-in-depth is incorporated into fire protection regulations for nuclear power plants. It requires preventing fires, detecting and extinguishing fires that do occur, and ensuring the capability to safely shutdown.
Engineering
Defence in depth may mean engineering which emphasizes redundancy – a system that keeps working when a component fails – over attempts to design components that will not fail in the first place. For example, an aircraft with four engines will be less likely to suffer total engine failure than a single-engined aircraft no matter how much effort goes into making the single engine reliable. Charles Perrow, author of Normal accidents, wrote that sometimes redundancies backfire and produce less, not more reliability. This may happen in three ways: First, redundant safety devices result in a more complex system, more prone to errors and accidents. Second, redundancy may lead to shirking of responsibility among workers. Third, redundancy may lead to increased production pressures, resulting in a system that operates at higher speeds, but less safely.
Nuclear
In nuclear engineering and nuclear safety, all safety activities, whether organizational, behavioural or equipment related, are subject to layers of overlapping provisions, so that if
a failure should occur it would be compensated for or corrected without causing harm to individuals or the public at large. Defence in depth consis |
https://en.wikipedia.org/wiki/Anatomical%20variation | An anatomical variation, anatomical variant, or anatomical variability is a presentation of body structure with morphological features different from those that are typically described in the majority of individuals. Anatomical variations are categorized into three types including morphometric (size or shape), consistency (present or absent), and spatial (proximal/distal or right/left).
Variations are seen as normal in the sense that they are found consistently among different individuals, are mostly without symptoms, and are termed anatomical variations rather than abnormalities.
Anatomical variations are mainly caused by genetics and may vary considerably between different populations. The rate of variation considerably differs between single organs, particularly in muscles. Knowledge of anatomical variations is important in order to distinguish them from pathological conditions.
A very early paper published in 1898, presented anatomic variations to have a wide range and significance, and before the use of X-ray technology, anatomic variations were mostly only found on cadaver studies. The use of imaging techniques have defined many such variations.
Some variations are found in different species such as polydactyly, having more than the usual number of digits.
Variants of structures
Muscles
Kopsch gave a detailed listing of muscle variations. These included the absence of muscles; muscles that were doubled; muscles that were divided into two or more parts; an increase or decrease in the origin or insertion of the muscle; and the joining to adjacent organs.
The palmaris longus muscle in the forearm is sometimes absent, as is the plantaris muscle in the leg.
The sternalis muscle is a variant that lies in front of the pectoralis major and may show up on a mammogram.
Bones
Usually there are five lumbar vertebrae but sometimes there are six, and sometimes there are four.
Joints
A discoid meniscus is a rare thickened lateral meniscus in the knee joint that ca |
https://en.wikipedia.org/wiki/HealthUnlocked | HealthUnlocked is a social networking service for health. The company uses health-specific artificial intelligence to support patients to better manage their own health, by recommending relevant and tailored health content, information and services to patients The site enables peer support for various health conditions and promotes patient empowerment by actively engaging people with their healthcare.
Communities
The social network hosts online communities within a dedicated health web platform. There are currently over 700 different health communities on the HealthUnlocked website, for a wide range of health and wellbeing conditions. After registering to use the site, users can create a user profile and join one or more of these online communities. Many of the online communities are run in partnership with health organizations, non-profit organization's (NPO) and charities worldwide, including Anxiety and Depression Association of America (ADAA), British Liver Trust, Endometriosis UK and The Multiple Sclerosis Association Of America. Each month over 4M people from across the world come to the platform, the majority of which are from the UK and US. HealthUnlocked is in the top 20 private health websites globally according to Alexa Internet. HealthUnlocked is also available through an app for iPhone
A study (2017) by University of Manchester concluded that use of the HealthUnlocked platform positively affects a person's Patient Activation Measure and research (University of Warwick, 2016) found use of platforms such as HealthUnlocked helps people to come together and cope with illnesses and diseases such as diabetes, cancer and mental health problems.
The network was identified as a technology that will change health and care by the Kings Fund, a tech startup that is on track to become one of Britain's next billion dollar companies, and won an award in the Axa PPP Health Tech & You Awards (2017) while being named as a truly standout, disruptive innovation.
Healt |
https://en.wikipedia.org/wiki/Mass-assignment%20protection | In the computing world, where software frameworks make life of developer easier, there are problems associated with it which the developer does not intend. Software frameworks use object-relational mapping (ORM) tool or active record pattern for converting data of different types and if the software framework does not have a strong mechanism to protect the fields of a class (the types of data), then it becomes easily exploitable by the attackers. These frameworks allow developers to bind parameters with HTTP and manipulate the data externally. The HTTP request that is generated carries the parameters that is used to create or manipulate objects in the application program.
The phrase mass assignment or overposting refers to assigning values to multiple attributes in a single go. It is a feature available in frameworks like Ruby on Rails that allows the modifications of multiple object attributes at once using modified URL. For example, @person = Person.new(params[:person]) #params contains multiple fields like name, email, isAdmin and contactThis Mass Assignment saves substantial amount of work for developers as they need not set each value individually.
Threats
In Mass Assignment, a malicious agent can attack and manipulate the data in various ways. It can send the tags which can make him assign various permissions which would otherwise be forbidden. For example, a database schema has a table "users" having field "admin" which specifies if corresponding user is admin or not. Malicious agent can easily send the value for this field to the server through HTTP request and mark himself as an admin. This is called Mass assignment vulnerability. It explores the security breaches that can be done using mass assignment.
GitHub got hacked in 2012 by exploiting mass assignment feature. Homakov who attacked the GitHub gained private access to Rails by replacing his SSH with SSH key of one of the members of Rails GitHub.
Protection
ASP.NET Core
In ASP.NET Core use the |
https://en.wikipedia.org/wiki/ProBiS | ProBiS is a computer software which allows prediction of binding sites and their corresponding ligands for a given protein structure. Initially ProBiS was developed as a ProBiS algorithm by Janez Konc and Dušanka Janežič in 2010 and is now available as ProBiS server, ProBiS CHARMMing server, ProBiS algorithm and ProBiS plugin. The name ProBiS originates from the purpose of the software itself, that is to predict for a given Protein structure Binding Sites and their corresponding ligands.
Description
ProBiS software started as ProBiS algorithm that detects structurally similar sites on protein surfaces by local surface structure alignment using a fast maximum clique algorithm. The ProBiS algorithm was followed by ProBiS server which provides access to the program ProBiS that detects protein binding sites based on local structural alignments. There are two ProBiS servers available, ProBiS server and ProBiS CHARMMing server. The latter connects ProBiS and CHARMMing servers into one functional unit that enables prediction of protein−ligand complexes and allows for their geometry optimization and interaction energy calculation. The ProBiS CHARMMing server with these additional functions can only be used at National Institutes of Health, USA. Otherwise it acts as a regular ProBiS server. Additionally a ProBiS PyMOL plugin and ProBiS UCSF Chimera plugin have been made. Both plugins are connected via the internet to a newly prepared database of pre-calculated binding site comparisons to allow fast prediction of binding sites in existing proteins from the Protein Data Bank. They enable viewing of predicted binding sites and ligands poses in three-dimensional graphics.
Protein building sites tools
Detect structurally similar binding sitesThis tool takes as an input a query protein or a binding site. The ProBiS algorithm structurally compares the query independently of sequence or fold with a database of non-redundant protein structures. The output of this tool are a 3D que |
https://en.wikipedia.org/wiki/Great%20Cocky%20Count | The Great Cocky Count is an annual census designed to provide accurate data about the number and distribution of black cockatoos. It is the largest single survey of black cockatoos in Western Australia.
The count is a citizen science survey and is conducted at sunset one night in autumn, usually in early April. It was first held in 2010 and has been conducted each year since apart from 2020 (cancelled due to Covid-19).
Over 700 registered volunteers participated each year at hundreds of locations between Geraldton and Esperance, Western Australia.
The 2019 count had over 700 volunteers surveying over 400 sites, with the endangered Carnaby's black cockatoo being the main focus of the count but the vulnerable Baudin's black cockatoo and forest red-tailed black cockatoo also being counted.
In 2016 a total of 426 roost sites were surveyed by approximately 700 volunteers. The results included:
16,392 white-tailed black cockatoos recorded at 100 occupied roosts.
1,907 forest red-tailed black cockatoos recorded at 66 occupied roosts
4,897 Carnaby's black cockatoos were found at a single roost site
It was estimated that 27% of the black cockatoos that inhabit the south west of Western Australia were counted in a single night.
The long-term results from the surveys, which have been conducted since 2010, have found that the Carnaby's black cockatoo population of the Perth-Peel coastal plain declined at a rate of roughly 4 per cent each year. There has been a reduction in flock size and fewer occupied roost sites around Perth, mostly as a result of increased urban sprawl and land clearing. 70% of the population are found in the Gnangara pine plantation, which is scheduled to be cleared by 2025. The reduction in numbers is mostly a result of clearing breeding grounds and reducing their range. Currently the birds are thought to be using all available habitat, which is barely enough to support the population.
References
Bird censuses
Environmental volunteering
Citizen sci |
https://en.wikipedia.org/wiki/ESP%20Easy | ESP Easy is a free and open source MCU firmware for the Internet of things (IoT). and originally developed by the LetsControlIt.com community (formerly known as ESP8266.nu community). It runs on ESP8266 Wi-Fi based MCU (microcontroller unit) platforms for IoT from Espressif Systems. The name "ESP Easy," by default, refers to the firmware rather than the hardware on which it runs. At a low level, the ESP Easy firmware works the same as the NodeMCU firmware and also provides a very simple operating system on the ESP8266. The main difference between ESP Easy firmware and NodeMCU firmware is that the former is designed as a high-level toolbox that just works out-of-the-box for a pre-defined set of sensors and actuators. Users simply hook up and read/control over simple web requests without having to write any code at all themselves, including firmware upgrades using OTA (Over The Air) updates.
The ESP Easy firmware can be used to turn ESP8266 modules into simple multifunction sensor and actuator devices for home automation platforms. Once the firmware is loaded on the hardware, configuration of ESP Easy is entirely web interface based. ESP Easy firmware is primarily used on ESP8266 modules/hardware as a wireless Wi-Fi sensor device with added sensors for temperature, humidity, barometric pressure, light intensity, etc. The ESP Easy firmware also offers some low-level actuator functions to control relays.
The firmware is built on the ESP8266 core for Arduino which in turn uses many open source projects. Getting started with ESP Easy takes a few basic steps. In most cases, ESP8266 modules come with AT or NodeMCU LUA firmware, and you need to replace the existing firmware with the ESP Easy firmware by flashing the hardware with a (available on Windows, macOS and Linux platforms) flash tool to use it.
Related projects
ESP8266 Arduino Core
As Arduino.cc began developing new MCU boards based on non-AVR processors like the ARM/SAM MCU used in the Arduino Due, they needed |
https://en.wikipedia.org/wiki/BillDesk | BillDesk is an Indian online payment gateway company based in Mumbai. The company provides an online payment platform for its clients which enables banking and merchant website transactions.
History
BillDesk was founded by Indian entrepreneurs M.N. Srinivasu, Ajay Kaushal and Karthik Ganapathy in 2000. The three previously worked at American accounting firm Arthur Andersen LLP.
In 2017, BillDesk launched the first Indian cryptocurrency exchange called Coinome.
Fundraising
In 2001, BillDesk received its first investment from SIDBI Venture Capital Ltd and Bank of Baroda.
In 2006, Clearstone Venture Partners and State Bank of India jointly invested $7.5 million in the company.
In 2012, US-based PE firm TA Associates made an undisclosed investment in BillDesk.
In 2015, BillDesk received an investment of US$200 million from General Atlantic and Temasek Holdings thereby giving the company a total valuation of USD 1 billion dollars. General Atlantic remains the largest shareholder in the company, with 35% ownership in the company.
In August 2021, PayU announced that it would acquire BillDesk for $4.7 billion in an all-cash deal, which would make it the largest fintech acquisition in India. However, the deal was terminated in October 2022.
Business
Billdesk is one of the few profitable fintech companies in India. As of 2015, the company is worth USD 1 billion. Sanjeev Krishan, leader (transaction services and private equity) at PwC India estimated that in the year 2015, 70% of India's online billing transactions were conducted through BillDesk.
BillDesk is a financially independent company and is monitored as a participant under the Payments and Settlements Systems Act, 2007 (Act 51 of 2007) that is regulated and supervised by the Reserve Bank of India.
See also
Infibeam Avenues
References
External links
Financial services companies established in 2000
Internet properties established in 2000
Online payments
Payment service providers
Mobile payments in |
https://en.wikipedia.org/wiki/Directed%20information | Directed information is an information theory measure that quantifies the information flow from the random string to the random string . The term directed information was coined by James Massey and is defined as
where is the conditional mutual information .
Directed information has applications to problems where causality plays an important role such as the capacity of channels with feedback, capacity of discrete memoryless networks, capacity of networks with in-block memory, gambling with causal side information, compression with causal side information, real-time control communication settings, and statistical physics.
Causal conditioning
The essence of directed information is causal conditioning. The probability of causally conditioned on is defined as
.
This is similar to the chain rule for conventional conditioning except one conditions on "past" and "present" symbols rather than all symbols . To include "past" symbols only, one can introduce a delay by prepending a constant symbol:
.
It is common to abuse notation by writing for this expression, although formally all strings should have the same number of symbols.
One may also condition on multiple strings: .
Causally conditioned entropy
The causally conditioned entropy is defined as:
Similarly, one may causally condition on multiple strings and write
.
Properties
A decomposition rule for causal conditioning is
.
This rule shows that any product of gives a joint distribution .
The causal conditioning probability is a probability vector, i.e.,
.
Directed Information can be written in terms of causal conditioning:
.
The relation generalizes to three strings: the directed information flowing from to causally conditioned on is
.
Conservation law of information
This law, established by James Massey and his son Peter Massey, gives intuition by relating directed information and mutual information. The law states that for any , the following equality holds:
Two alternative forms of this la |
https://en.wikipedia.org/wiki/Shadow%20stack | In computer security, a shadow stack is a mechanism for protecting a procedure's stored return address, such as from a stack buffer overflow. The shadow stack itself is a second, separate stack that "shadows" the program call stack. In the function prologue, a function stores its return address to both the call stack and the shadow stack. In the function epilogue, a function loads the return address from both the call stack and the shadow stack, and then compares them. If the two records of the return address differ, then an attack is detected; the typical course of action is simply to terminate the program or alert system administrators about a possible intrusion attempt. A shadow stack is similar to stack canaries in that both mechanisms aim to maintain the control-flow integrity of the protected program by detecting attacks that tamper the stored return address by an attacker during an exploitation attempt.
Shadow stacks can be implemented by recompiling programs with modified prologues and epilogues, by dynamic binary rewriting techniques to achieve the same effect, or with hardware support. Unlike the call stack, which also stores local program variables, passed arguments, spilled registers and other data, the shadow stack typically just stores a second copy of a function's return address.
Shadow stacks provide more protection for return addresses than stack canaries, which rely on the secrecy of the canary value and are vulnerable to non-contiguous write attacks. Shadow stacks themselves can be protected with guard pages or with information hiding, such that an attacker would also need to locate the shadow stack to overwrite a return address stored there.
Like stack canaries, shadow stacks do not protect stack data other than return addresses, and so offer incomplete protection against security vulnerabilities that result from memory safety errors.
In 2016, Intel announced upcoming hardware support for shadow stacks with their Control-flow Enforcement Tech |
https://en.wikipedia.org/wiki/Cold%20email | A cold email is an unsolicited e-mail that is sent to a receiver without prior contact. It could also be defined as the email equivalent of cold calling. Cold emailing is a subset of email marketing and differs from transactional and warm emailing.
Cold email is a personalized, one-to-one message targeted at a specific individual. Its aim is to get into a business conversation with that individual, rather than to promote a product or a service to the masses.
Cold email, according to its proponents, is not spam. Cold emailing is distinct from spam in that it aims to initiate a genuine conversation rather than deceive the recipient. However, if certain steps are not followed, it may be treated as spam by spam filters or reported by the recipients.
Email deliverability
Email deliverability is the percentage of emails that got successfully delivered to the primary inbox, instead of getting blocked or classified as spam.
Email deliverability is not the same as email delivery. Email delivery is the percentage of emails that got successfully delivered to the recipient's email address, regardless of whether it is the main inbox or any other folder, including spam.
Email deliverability is especially important for cold email senders because their goal is to have their email delivered to the recipients' main inbox.
Factors decreasing email deliverability
Low email deliverability may result from:
Bad domain reputation
A domain reputation is a sending reputation for a specific domain name. A domain may lose its reputation if the emails are being sent in large quantities at once and with too high frequency. The recipient's email server may consider such behavior as spamming and blocklist the domain used for sending emails.
A domain may be also blocklisted if spam filters detect spam words in the subject line or the email content or an attempt to use other spamming techniques.
A domain's age is an important factor in determining a domain's reputation. A new domain has a |
https://en.wikipedia.org/wiki/Latency%20oriented%20processor%20architecture | Latency oriented processor architecture is the microarchitecture of a microprocessor designed to serve a serial computing thread with a low latency. This is typical of most central processing units (CPU) being developed since the 1970s. These architectures, in general, aim to execute as many instructions as possible belonging to a single serial thread, in a given window of time; however, the time to execute a single instruction completely from fetch to retire stages may vary from a few cycles to even a few hundred cycles in some cases. Latency oriented processor architectures are the opposite of throughput-oriented processors which concern themselves more with the total throughput of the system, rather than the service latencies for all individual threads that they work on.
Flynn's taxonomy
Typically, latency oriented processor architectures execute a single task operating on a single data stream, and so they are SISD under Flynn's taxonomy. Latency oriented processor architectures might also include SIMD instruction set extensions such as Intel MMX and SSE; even though these extensions operate on large data sets, their primary goal is to reduce overall latency.
Implementation techniques
There are many architectural techniques employed to reduce the overall latency for a single computing task. These typically involve adding additional hardware in the pipeline to serve instructions as soon as they are fetched from memory or instruction cache. A notable characteristic of these architectures is that a significant area of the chip is used up in parts other than the Execution Units themselves. This is because the intent is to bring down the time required to complete a 'typical' task in a computing environment. A typical computing task is a serial set of instructions, where there is a high dependency on results produced by the previous instructions of the same task. Hence, it makes sense that the microprocessor will be spending its time doing many other tasks other tha |
https://en.wikipedia.org/wiki/CECPQ1 | In cryptography, CECPQ1 (combined elliptic-curve and post-quantum 1) is a post-quantum key-agreement protocol developed by Google as a limited experiment for use in Transport Layer Security (TLS) by web browsers. It was succeeded by CECPQ2.
Details
CECPQ1 was designed to test algorithms that can provide confidentiality even against an attacker who possesses a large quantum computer. It is a key-agreement algorithm for TLS that combines X25519 and NewHope, a ring learning with errors primitive. Even if NewHope were to turn out to be compromised, the parallel X25519 key-agreement ensures that CECPQ1 provides at least the security of existing connections.
It was available in Google Chrome 54 beta. In 2016, its experimental use in Chrome ended and it was planned to be disabled in a later Chrome update.
It was succeeded by CECPQ2.
See also
Elliptic-curve Diffie–Hellman (ECDH) – an anonymous key agreement protocol
References
Cryptographic protocols
Application layer protocols
Transport Layer Security |
https://en.wikipedia.org/wiki/Haplarithmisis | Haplarithmisis (Greek for haplotype numbering) is a conceptual process in Genetics that enables simultaneous haplotyping and copy-number profiling of DNA samples derived from cells. Haplarithmisis also reveals parental, segregation, and mechanistic origins of genomic anomalies. The resulting profiles of haplarithmisis are called parental haplarithms (i.e. paternal haplarithm and maternal haplarithm).
Clinical Applications
Haplarithmisis enabled a new form of preimplantation genetic diagnosis, by which segmental and full chromosome anomalies could not only be detected but also traced back to meiosis or mitosis.
Research Applications
In its first application in basic genome research, haplarithmisis led to discovery of parental genome segregation, a phenomenon that causes the segregation of entire parental genomes in distinct blastomere lineages causing cleavage-stage chimerism and mixoploidy.
References
Human genetics
Molecular biology techniques
Genomics
Translational medicine |
https://en.wikipedia.org/wiki/Exact%20completion | In category theory, a branch of mathematics, the exact completion constructs a Barr-exact category from any finitely complete category. It is used to form the effective topos and other realizability toposes.
Construction
Let C be a category with finite limits. Then the exact completion of C (denoted Cex) has for its objects pseudo-equivalence relations in C. A pseudo-equivalence relation is like an equivalence relation except that it need not be jointly monic. An object in Cex thus consists of two objects X0 and X1 and two parallel morphisms x0 and x1 from X1 to X0 such that there exist a reflexivity morphism r from X0 to X1 such that x0r = x1r = 1X0; a symmetry morphism s from X1 to itself such that x0s = x1 and x1s = x0; and a transitivity morphism t from X1 × x1, X0, x0 X1 to X1 such that x0t = x0p and x1t = x1q, where p and q are the two projections of the aforementioned pullback. A morphism from (X0, X1, x0, x1) to (Y0, Y1, y0, y1) in Cex is given by an equivalence class of morphisms f0 from X0 to Y0 such that there exists a morphism f1 from X1 to Y1 such that y0f1 = f0x0 and y1f1 = f0x1, with two such morphisms f0 and g0 being equivalent if there exists a morphism e from X0 to Y1 such that y0e = f0 and y1e = g0.
Examples
If the axiom of choice holds, then Setex is equivalent to Set.
More generally, let C be a small category with finite limits. Then the category of presheaves SetCop is equivalent to the exact completion of the coproduct completion of C.
The effective topos is the exact completion of the category of assemblies.
Properties
If C is an additive category, then Cex is an abelian category.
If C is cartesian closed or locally cartesian closed, then so is Cex.
References
External links
Category theory |
https://en.wikipedia.org/wiki/Credential%20stuffing | Credential stuffing is a type of cyberattack in which the attacker collects stolen account credentials, typically consisting of lists of usernames or email addresses and the corresponding passwords (often from a data breach), and then uses the credentials to gain unauthorized access to user accounts on other systems through large-scale automated login requests directed against a web application. Unlike credential cracking, credential stuffing attacks do not attempt to use brute force or guess any passwords – the attacker simply automates the logins for a large number (thousands to millions) of previously discovered credential pairs using standard web automation tools such as Selenium, cURL, PhantomJS or tools designed specifically for these types of attacks, such as Sentry MBA, SNIPR, STORM, Blackbullet and Openbullet.
Credential stuffing attacks are possible because many users reuse the same username/password combination across multiple sites, with one survey reporting that 81% of users have reused a password across two or more sites and 25% of users use the same passwords across a majority of their accounts. In 2017, the FTC issued an advisory suggesting specific actions companies needed to take against credential stuffing, such as insisting on secure passwords and guarding against attacks. According to former Google click fraud czar Shuman Ghosemajumder, credential stuffing attacks have up to a 2% login success rate, meaning that one million stolen credentials can take over 20,000 accounts. Wired Magazine described the best way to protect against credential stuffing is to use unique passwords on accounts, such as those generated automatically by a password manager, enable two-factor authentication, and to have companies detect and stop credential stuffing attacks.
Credential spills
A credential spill, alternatively referred to as a data breach or leak, arises when unauthorized individuals or groups illicitly obtain access to sensitive user credentials that or |
https://en.wikipedia.org/wiki/Haplarithm | Parental (paternal and maternal) haplarithms are the outputs of haplarithmisis process. For instance, paternal haplarithm represents chromosome specific profile illuminating paternal haplotype of that chromosome (including homologous recombination between the two paternal homologous chromosomes) and the amount of those haplotypes. Importantly, the haplarithm signatures allow tracing back the genomic aberration to meiosis and/or mitosis.
References
Genomics
Human genetics
Molecular biology techniques |
https://en.wikipedia.org/wiki/David%20Zuckerman%20%28computer%20scientist%29 | David Zuckerman is an American theoretical computer scientist whose work concerns randomness in computation. He is a professor of computer science at the University of Texas at Austin.
Biography
Zuckerman received an A.B. in mathematics from Harvard University in 1987, where he was a Putnam Fellow in 1986. He went on to earn a Ph.D. in computer science from the University of California at Berkeley in 1991 advised by Umesh Vazirani. He then worked as a postdoctoral fellow at the Massachusetts Institute of Technology and Hebrew University of Jerusalem before joining the University of Texas in 1994. Zuckerman was named a Fellow of the ACM in 2013, and a Simons Investigator in 2016.
Research
Most of Zuckerman's work concerns randomness in computation, and especially pseudorandomness. He has written over 80 papers on topics including randomness extractors, pseudorandom generators, coding theory, and cryptography. Zuckerman is best known for his work on randomness extractors. In 2015 Zuckerman and his student Eshan Chattopadhyay solved an important open problem in the area by giving the first explicit construction of two-source extractors. The resulting paper won a best-paper award at the 2016 ACM Symposium on Theory of Computing.
References
American computer scientists
University of Texas at Austin faculty
Theoretical computer scientists
Fellows of the Association for Computing Machinery
Living people
Harvard College alumni
Simons Investigator
UC Berkeley Graduate School of Education alumni
Year of birth missing (living people)
Putnam Fellows |
https://en.wikipedia.org/wiki/Nightcore | A nightcore (also known as sped-up song, sped-up version, sped-up remix, or, simply, sped-up) edit is a version of a music track that increases the pitch and speeds up its source material by approximately 35%. This gives an effect almost identical to playing a 33⅓-RPM vinyl record at 45 RPM. This 35% increase in RPM causes the note C4 to become slightly lower in pitch than the note F#4 (261.63 Hz becomes 353.19 Hz) which is an increase of approximately 5 and a half semitones.
The name is derived from the Norwegian musical duo "Nightcore", who released pitch-shifted versions of trance and Eurodance songs. Nightcore is also commonly associated and accompanied with anime, and otaku culture with many YouTube thumbnails of nightcore remixes containing anime characters and art.
During the early 2020s, nightcore, under the name "sped-up", became substantially popular thanks to TikTok, where many sped-up versions of older songs were watched millions of times. In turn, major recording labels saw sped-up versions of popular songs as a relatively cheap opportunity to popularize older songs. They either started releasing three versions (normal, sped-up, and slowed) of a track at the same time (for instance Steve Lacy's "Bad Habit") or started curating popular Spotify playlists for sped-up versions of hit singles released specifically on their label (such as Warner Music Group).
History
2000s: Origins
The term nightcore was first used in 2001 as the name for a school project by Norwegian DJ duo Thomas S. Nilsen and Steffen Ojala Søderholm, known by their stage names DJ TNT and DJ SOS respectively. The name Nightcore means "we are the core of the night, so you'll dance all night long", stated in its website named "Nightcore is Hardcore". The two were influenced by pitch-shifted vocals in German group Scooter's hardcore songs "Nessaja" and "Ramp! (The Logical Song)", stating in an interview that "There were so few of these kinds of artists, we thought that mixing music in our |
https://en.wikipedia.org/wiki/Mischa%20Dohler | Mischa Dohler is a Fellow of the Royal Academy of Engineering, Fellow of the Institute of Electrical and Electronics Engineers (IEEE) and Fellow of the Royal Society of Arts (RSA).
He was a Chair Professor of Wireless Communications at King's College London, where he worked on 6G and the Internet of Skills. He has been appointed to the Spectrum Advisory Board of Ofcom.
Career
He was a CTO at Worldsensing. He was a CTO at Sirius Insight.
References
External links
Faculty profile
Personal website
1975 births
Living people
Alumni of King's College London
Academics of King's College London
Electronics engineers |
https://en.wikipedia.org/wiki/Software%20monetization | Software monetization is a strategy employed by software companies and device vendors to maximize the profitability of their software. The software licensing component of this strategy enables software companies and device vendors to simultaneously protect their applications and embedded software from unauthorized copying, distribution, and use, and capture new revenue streams through creative pricing and packaging models. Whether a software application is hosted in the cloud, embedded in hardware, or installed on premises, software monetization solutions can help businesses extract the most value from their software. Another way to achieve software monetization is through paid advertising and the various compensation methods available to software publishers. Pay-per-install (PPI), for example, generates revenue by bundling third-party applications, also known as adware, with either freeware or shareware applications.
History
The exact origin of the term 'software monetization' is unknown, however, it has been in use in the information security industry since 2010. It was first used to articulate the value of licensing for cloud-hosted applications, but later came to encompass applications embedded in hardware and installed on premises. Today, software monetization broadly applies to software licensing, protection, and entitlement management solutions. In the digital advertising space, the term refers to solutions that increase revenue through installs, traffic, display ads, and search.
Key areas of software monetization
IP protection
Software constitutes a significant part of a software company or device vendor's intellectual property (IP) and, as such, may benefit from strong security, encryption, and digital rights management (DRM). Depending on a company's particular use case, they can choose to implement a hardware, software, or cloud-based licensing solution, or by open sourcing software and relying on donations and/or compensation for support, customizat |
https://en.wikipedia.org/wiki/List%20of%20forests%20and%20woodland%20in%20Lincolnshire | This is a list of forests and woodland in Lincolnshire, England.
Lincolnshire
Forests and woodlands of Lincolnshire |
https://en.wikipedia.org/wiki/MulteFire | MulteFire is an LTE-based technology that operates standalone in unlicensed and shared spectrum, including the global 5 GHz band. Based on 3GPP Release 13 and 14, MulteFire technology supports "listen-before-talk "for co-existence with Wi-Fi and other technologies operating in the same spectrum. It supports private LTE and neutral host deployment models. Target vertical markets include industrial IoT, enterprise, cable, and various other vertical markets.
The MulteFire Release 1.0 specification was developed by the MulteFire Alliance, an industry consortium promoting it. Release 1.0 was published to MulteFire Alliance members in January 2017 and was made publicly available in April 2017. The MulteFire Alliance is currently working on Release 1.1 which will add further optimizations for IoT and new spectrum bands.
The MulteFire Alliance grew to more than 40 members in 2018. Its board members include Boingo Wireless, CableLabs, Ericsson, Huawei, Intel, Nokia, Qualcomm and SoftBank Group.
See also
LTE in unlicensed spectrum
References
External links
https://www.qualcomm.com/invention/technologies/lte/multefire
https://networks.nokia.com/products/multefire
Internet of things
LTE (telecommunication)
Mobile technology
Network access
Wireless networking standards |
https://en.wikipedia.org/wiki/Critical%20brain%20hypothesis | In neuroscience, the critical brain hypothesis states that certain biological neuronal networks work near phase transitions. Experimental recordings from large groups of neurons have shown bursts of activity, so-called neuronal avalanches, with sizes that follow a power law distribution. These results, and subsequent replication on a number of settings, led to the hypothesis that the collective dynamics of large neuronal networks in the brain operates close to the critical point of a phase transition. According to this hypothesis, the activity of the brain would be continuously transitioning between two phases, one in which activity will rapidly reduce and die, and another where activity will build up and amplify over time. In criticality, the brain capacity for information processing is enhanced, so subcritical, critical and slightly supercritical branching process of thoughts could describe how human and animal minds function.
History
Discussion on the brain's criticality have been done since 1950, with the paper on the imitation game for a Turing test. In 1995, Herz and Hopfield noted that self-organized criticality (SOC) models for earthquakes were mathematically equivalent to networks of integrate-and-fire neurons, and speculated that perhaps SOC would occur in the brain. Simultaneously Stassinopoulos and Bak proposed a simple neural network model working at criticality which was expanded later by Chialvo and Bak. In 2003, the hypothesis found experimental support by Beggs and Plenz. The critical brain hypothesis is not a consensus among the scientific community. However, there exists more and more support for the hypothesis as more experimenters take to verifying the claims that it makes, particularly in vivo in rats with chronic electrophysiological recordings and mice with high-density electrophysiological recordings.
References
Brain
Biological hypotheses |
https://en.wikipedia.org/wiki/EXAPT | EXAPT (a portmanteau of "Extended Subset of APT") is a production-oriented programming language that allows users to generate NC programs with control information for machining tools and facilitates decision-making for production-related issues that may arise during various machining processes.
EXAPT was first developed to address industrial requirements. Through the years, the company created additional software solutions for the manufacturing industry. Today, EXAPT offers a suite of SAAS products and services for the manufacturing industry.
The tradename EXAPT is most commonly associated with the CAD/CAM-System, production data, and tool management Software of the German company EXAPT Systemtechnik GmbH based in Aachen, DE.
General
EXAPT is a modularly built programming system for all NC machining operations as
Drilling
Turning
Milling
Turn-Milling
Nibbling
Flame-, Laser-, Plasma- and Water jet cutting
Wire eroding
Operations with Industrial robots
Due to the modular structure the main product groups EXAPTcam and EXAPTpdo are gradually expandable and permit individual software solutions for the manufacturing industry used individually and also in compound with an existing IT environment.
Functionality
EXAPTcam meets the requirements for NC planning especially for the cutting operations as turning, drilling and milling up to 5-axis simultaneous machining. Thereby new process technologies, tool and machine concepts are constantly involved. In the NC programming data from different sources as 3D CAD models, drawings or tables can flow in. The possibilities of NC programming reaches from the language-oriented to the feature-oriented NC programming. The integrated EXAPT knowledge database and intelligent and scalable automatisms support the user. The EXAPT NC planning also covers the generation of production information as clamping and tool plans, presetting data or time calculations. The realistic simulation possibilities of NC planning and NC control |
https://en.wikipedia.org/wiki/Oracle%20Cloud | Oracle Cloud is a cloud computing service offered by Oracle Corporation providing servers, storage, network, applications and services through a global network of Oracle Corporation managed data centers. The company allows these services to be provisioned on demand over the Internet.
Oracle Cloud provides Infrastructure as a Service (IaaS), Platform as a Service (PaaS), Software as a Service (SaaS), and Data as a Service (DaaS). These services are used to build, deploy, integrate, and extend applications in the cloud. This platform supports numerous open standards (SQL, HTML5, REST, etc.), open-source applications (Kubernetes, Spark, Hadoop, Kafka, MySQL, Terraform, etc.), and a variety of programming languages, databases, tools, and frameworks including Oracle-specific, Open Source, and third-party software and systems.
Services
Infrastructure as a Service (IaaS) and Platform as a Service (PaaS)
Oracle's cloud infrastructure was made generally available (GA) on October 20, 2016 under the name "Oracle Bare Metal Cloud Services." Oracle Bare Metal Cloud Services was rebranded as Oracle Cloud Infrastructure in 2018 and dubbed Oracle's "Generation 2 Cloud" at Oracle OpenWorld 2018. Oracle Cloud Infrastructure offerings include the following services:
Compute: The company provides Virtual Machine Instances to provide different shapes (VM sizes) catering to different types of workloads and performance characteristics. They also provide on-demand Bare metal servers and Bare metal GPU servers, without a hypervisor. In 2016, Oracle Cloud Infrastructure launched with bare metal instances with Intel processors. These first bare metal instances offered were powered by Intel servers. In 2018, Oracle Cloud added bare metal instances powered by AMD processors, followed by Ampere Cloud-native processors in 2021. In 2021, Oracle also released its first VM-based compute instances based on Arm processors.
Storage: The platform provides block volumes, file storage, object storag |
https://en.wikipedia.org/wiki/Bolt%20%28network%20protocol%29 | The Bolt Protocol (Bolt) is a connection oriented network protocol used for client-server communication in database applications. It operates over a TCP connection or WebSocket.
Bolt is statement-oriented, allowing a client to send messages containing a statement consisting of a single string and a set of typed parameters. The server responds to each statement with a result message and an optional stream of result records.
History
The Bolt protocol was first introduced to the public in November 2015, during an interview conducted by Duncan Brown and published on DZone. The first release of software implementing the protocol occurred in December 2015, as part of a milestone release of Neo4j Server. In April 2016, Neo4j Server 3.0 was released and contained the first server implementation of the protocol, accompanied by a suite of Bolt client drivers. This release received attention from several mainstream media outlets.
Versioning
The protocol supports explicit versioning and version negotiation between the client and the server. There is only one published version of the protocol: version 1.
Protocol overview - version 1
Messaging
Bolt clients and servers both send data over the connection as a sequence of messages. Each message has a type (denoted by a "signature" byte) and may include additional data. The client drives the interaction, and each message sent by the client will cause one or more response messages to be sent by the server.
Client messages:
Server messages:
Message transfer encoding
Each message is encoded into a sequence of bytes. These bytes are transferred using a binary chunked encoding, where each chunk is preceded by an unsigned, big-endian 16-bit integer denoting the number of bytes that immediately follow. A length of 0 is used to denote the end of the message.
Failure handling
A client may send multiple messages to a server, without first waiting for a response. The server processes each message sequentially. However, as there m |
https://en.wikipedia.org/wiki/Daffodil%20Polytechnic%20Institute | Daffodil Polytechnic Institute is a private polytechnic Institute located in Dhaka, Bangladesh.The campus is located at Dhanmondi. Daffodil Polytechnic Institute which has been functioning since 2006 to develop professionals in different fields of education and training under Bangladesh Technical Education Board (BTEB). It is the first and only polytechnic institute of the country which has been awarded internationally. Daffodil Polytechnic is one of the top ranking polytechnics in Bangladesh.
https://dpi.ac
Departments
Currently there are eight departments:
Civil Department
Electrical Department
Computer Science Department
Textile Department
Apparel Manufacturing Department
Telecommunication Department
Architecture and Interior Design Department
Graphic Design
History
The polytechnic was established in 2006 with the approval of Bangladesh Technical Education Board and the Government of Bangladesh's Ministry of Education.
Campuses
The institute has multiple campuses within Dhaka. The main campus & the academic building 1 is located in Dhanmondi and the other campus is in Kalabagan with library and hostel facilities for both male and female students.
Academics
Departments
Computer Engineering Technology
Electrical Engineering Technology
Civil Engineering Technology
Architecture & Interior Design Technology
Textile Engineering Technology
Garments Design & Pattern Making Technology
Telecommunication Engineering Technology
Graphic Design Engineering Technology
Principals
Mohammad Nuruzzaman (31 July 2006 - 30 April 2013)
K M Hasan Ripon (1 May 2013 - 31 May 2016)
Wiz khalifa( 1 June 2016 - 30 April 2019)
K M Hasan Ripon (1 May 2019 – Present)
Online admission
The Polytechnic facilitates online admission for applicants from distant areas.
Clubs
Kolorob Cultural Club
Computer club
Language club
DPI Alumni Association
Blood donating club
Tourism club
International Activities
A gorup of Students from Daffodil Polytech Instit |
https://en.wikipedia.org/wiki/Geometric%20class%20field%20theory | In mathematics, geometric class field theory is an extension of class field theory to higher-dimensional geometrical objects: much the same way as class field theory describes the abelianization of the Galois group of a local or global field, geometric class field theory describes the abelianized fundamental group of higher dimensional schemes in terms of data related to algebraic cycles.
References
Class field theory
Algebraic geometry |
https://en.wikipedia.org/wiki/HFST | Helsinki Finite-State Technology (HFST) is a computer programming library and set of utilities for natural language processing with finite-state automata and finite-state transducers. It is free and open-source software, released under a mix of the GNU General Public License version 3 (GPLv3) and the Apache License.
Features
The library functions as an interchanging interface to multiple backends, such as OpenFST, foma and SFST. The utilities comprise various compilers, such as hfst-twolc (a compiler for morphological two-level rules), hfst-lexc (a compiler for lexicon definitions) and hfst-regexp2fst (a regular expression compiler). Functions from Xerox's proprietary scripting language xfst is duplicated in hfst-xfst, and the pattern matching utility pmatch in hfst-pmatch, which goes beyond the finite-state formalism in having recursive transition networks (RTNs).
The library and utilities are written in C++, with an interface to the library in Python and a utility for looking up results from transducers ported to Java and Python.
Transducers in HFST may incorporate weights depending on the backend. For performing FST operations, this is currently only possible via the OpenFST backend. HFST provides two native backends, one designed for fast lookup (hfst-optimized-lookup), the other for format interchange. Both of them can be weighted.
Uses
HFST has been used for writing various linguistic tools, such as spell-checkers, hyphenators, and morphologies. Morphological dictionaries written in other formalisms have also been converted to HFST's formats.
See also
Foma (software)
Notes
External links
https://github.com/hfst/hfst/wiki - A documentation wiki
References
Free software
Finite automata |
https://en.wikipedia.org/wiki/MX1%20Ltd | MX1 was a global media services provider founded in July 2016 from a merger between digital media services companies, RR Media and SES Platform Services, and a wholly owned subsidiary of global satellite owner and operator, SES.
In September 2019, MX1 was merged into the SES Video division and the MX1 brand dropped. Broadcast and streamed content management, playout, distribution, and monetisation services from both MX1 and SES Video are now provided under the SES name.
Before merger with SES, MX1 claimed to manage more than 5 million media assets and every day to distribute more than 3,600 TV channels, manage the playout of over 525 channels, distribute content to more than 120 subscription VOD platforms, and deliver over 8,400 hours of online video streaming and more than 620 hours of premium sports and live events.
Services
MX1 video and media services are provided through a single hybrid, cloud and on-premises solution, called MX1 360, which enables video and media solutions including content and metadata management, archiving, localisation solutions, channel playout, VOD, online video (OTT) and content distribution. Services provided by MX1 include:
Content aggregation
Acquisition of content via satellite, fibre or IP with satellite downlinking services (for encryption, re-encryption and re-muxing into different platforms), fibre reception from any location, and IP reception via the public Internet. Live sports, news and entertainment production (including in-studio, outside broadcasting, and SNG) with mobile live streaming and video contribution.
Content management
Digital mastering including scanning, conversion, restoration, quality control and localisation/versioning. Content archiving including secure, cloud and on-premises digital storage, and disaster recovery services. Metadata packaging and platform validation to enhance content discovery, searchability and cataloguing. Playout preparation and delivery to any format.
Channel origination and playo |
https://en.wikipedia.org/wiki/Thermal%20inductance | Thermal inductance refers to the phenomenon wherein a thermal change of an object surrounded by a fluid will induce a change in convection currents within that fluid, thus inducing a change in the kinetic energy of the fluid. It is considered the thermal analogue to electrical inductance in system equivalence modeling; its unit is the thermal henry.
Thus far, few studies have reported on the inductive phenomenon in the heat-transfer behaviour of a system. In 1946, Bosworth demonstrated that heat flow can have an inductive nature through experiments with a fluidic system. He claimed that the measured transient behaviour of the temperature change cannot be explained by merely the combination of the thermal resistance and the thermal capacitance. Bosworth later extended the experiments to study the thermal mutual inductance; however, he did not report on the thermal inductance in a heat-transfer system with the exception of a fluid flow.
Recent studies
In 2013, Ye et al. have a publication of "Thermal Transient Effect and Improved Junction Temperature Measurement Method in High Voltage Light-Emitting Diodes". In their experiments, a high voltage LED chip was directly attached on silicon substrate with thin thermal interface material (TIM). The temperature sensors were fabricated using standard silicon processing technologies which were calibrated ranging from 30 °C to 150 °C. The thickness of the chip and TIM were 153μm and 59μm, respectively. Thus the sensors were very close to the p-n junction. The silicon substrate was positioned and vacuumed on a cumbersome thermal plate with accurate temperature controller in an enclosure. The experimenters applied step-up/step-down currents and measured the characteristics between temperature and forward voltage after 100 ms. In this work, the ‘recovery time’ is defined as the interval from the start of power change to the time at which the temperature became again equal to the initial temperature value. The results show that |
https://en.wikipedia.org/wiki/Bet%20hedging%20%28biology%29 | Biological bet hedging occurs when organisms suffer decreased fitness in their typical conditions in exchange for increased fitness in stressful conditions. Biological bet hedging was originally proposed to explain the observation of a seed bank, or a reservoir of ungerminated seeds in the soil. For example, an annual plant's fitness is maximized for that year if all of its seeds germinate. However, if a drought occurs that kills germinated plants, but not ungerminated seeds, plants with seeds remaining in the seed bank will have a fitness advantage. Therefore, it can be advantageous for plants to "hedge their bets" in case of a drought by producing some seeds that germinate immediately and other seeds that lie dormant. Other examples of biological bet hedging include female multiple mating, foraging behavior in bumble bees, nutrient storage in rhizobia, and bacterial persistence in the presence of antibiotics.
Overview
Categories
There are three categories (strategies) of bet-hedging: "conservative" bet-hedging, "diversified" bet-hedging, and "adaptive coin flipping."
Conservative bet hedging
In conservative bet hedging, individuals lower their expected fitness in exchange for a lower variance in fitness. The idea of this strategy is for an organism to "always play it safe" by using the same successful low-risk strategy regardless of environmental conditions. An example of this would be an organism producing clutches with a constant egg size that may not be optimal for any environmental condition, but result in the lowest overall variance.
Diversified bet hedging
In contrast to conservative bet hedging, diversified bet hedging occurs when individuals lower their expected fitness in a given year while also increasing the variance of survival between offspring. This strategy uses the idea of not "putting all of your eggs in a basket." Individuals implementing this strategy actually invest in several different strategies at once, resulting in low variation in |
https://en.wikipedia.org/wiki/Lilliput%20effect | The Lilliput effect is a decrease in body size in animal species that have survived a major extinction. There are several hypotheses as to why these patterns appear in the fossil record, some of which are: the survival of small taxa, dwarfing of larger lineages, and the evolutionary miniaturization from larger ancestral stocks. The term was coined in 1993 by Adam Urbanek in his paper concerning the extinction of graptoloids and is derived from the island of Lilliput inhabited by a miniature race of people in Gulliver’s Travels. This size decrease may just be a temporary phenomenon restricted to the survival period of the extinction event. In 2019 Atkinson et al. coined the term the Brobdingnag effect to describe a related phenomenon operating in the opposite direction, whereby new species evolving after the Triassic-Jurassic mass extinction originated at small body sizes before undergoing a size increase. The term is also from Gulliver's Travels where Brobnignag is a land inhabited by a race of giants.
Significance
Trends in body size changes are seen throughout the fossil record in many organisms, and major changes (shrinking and dwarfing) in body size can significantly affect the morphology of the animal itself as well as how it interacts with the environment.
Since Urbanek's publication several researchers have described a decrease in body size in fauna post-extinction event, although not all use the term "Lilliput effect" when discussing this trend in body size decrease.
The Lilliput effect has been noted by several authors to have occurred after the Permian-Triassic mass extinction event. Early Triassic fauna, both marine and terrestrial, is notably smaller than those preceding and following in the geologic record.
Potential causes
Extinction of larger taxa
The extinction event may affect the larger-bodied organisms more severely, leaving smaller bodies taxa behind. As such, the smaller organisms which now make up the population will take time to grow into |
https://en.wikipedia.org/wiki/Nextcloud | Nextcloud is a suite of client-server software for creating and using file hosting services. Nextcloud provides functionality similar to Dropbox, Office 365 or Google Drive when used with integrated office suites Collabora Online or OnlyOffice. It can be hosted in the cloud or on-premises. It is scalable, from home office software based on the low cost Raspberry Pi, all the way through to full sized data centers that support millions of users. Translations in 60 languages exist for web interface and client applications.
Features
Nextcloud files are stored in conventional directory structures, accessible via WebDAV if necessary. A SQLite, MySQL or PostgreSQL database is required to provide additional functionality like permissions, shares, and comments.
Nextcloud can synchronize with local clients running Windows (Windows 8.1 and above), macOS (10.14 or later), Linux and FreeBSD. Nextcloud permits user and group administration locally or via different Backends like OpenID or LDAP. Content can be shared inside the system by defining granular read/write permissions between users and groups. Nextcloud users can create public URLs when sharing files.
Logging of file-related actions, as well as disallowing access based on file access rules is also available.
Security options like Multi-factor authentication using TOTP, WebAuthn, Oauth2, OpenID Connect, Brute-force protection exist.
Nextcloud has planned new features such as monitoring capabilities, full-text search and Kerberos authentication, as well as audio/video conferencing, expanded federation and smaller user interface improvements.
Integrations and devices
Multiple vendors and independent projects develop integrations and devices with Nextcloud focusing on different aspects like improved security or simplified administration.
NextcloudPi
Initially started to run Nextcloud on a RaspberryPi, NextcloudPi turned into a ready to use image for Virtual Machines, Raspberry Pi, Odroid HC1, Rock64 and other board |
https://en.wikipedia.org/wiki/Senior%20cat%20diet | A senior cat diet is generally considered to be a diet for cats that are mature (7–10 years old), senior (11–15 years old), or geriatric (over 15 years old). Nutritional considerations arise when choosing an appropriate diet for a healthy senior cat. Dietary management of many conditions becomes more important in senior cats because changes in their physiology and metabolism may alter how their system responds to medications and treatments.
Energy and macronutrient requirements
Diets should be managed for each individual cat to ensure that they maintain an ideal body and muscle condition. Unlike many other species, the energy requirements for cats do not decrease with age, but may even increase, therefore seniors require the same or more energy than adults.
Scientific studies have indicated that after 12 years of age, and again after 13 years of age, energy requirements for cats increase significantly.
Obesity is common in adult cats, but much less so in senior cats. Of all feline life stages it has been demonstrated that senior cats are the most often underweight.
Research has shown that fat and protein digestibility decrease with age in cats, causing seniors to have a higher dietary requirement for these macronutrients. The fat and protein sources need to be highly digestible to maximize energy capture from the food. This may help to explain the body condition differences between adult and senior cats given the consistency of food intake.
There is little research on the reasons for decreased fat and protein digestibility, however some speculations have been made based on age-related changes observed in other species. Decreased secretion of digestive enzymes may be related to decreased digestive function in humans and rats, however more research into this is required to explain this in cats. Vitamin B12 is important in methionine synthesis, DNA synthesis, and is a vital part of an enzyme important for metabolic pathways. Lower nutrient digestibility may be due |
https://en.wikipedia.org/wiki/Dhanusha%20%28unit%29 | Dhanusha is an ancient unit of measuring height used in Jain literature.
Modern units
One Dhanusha equals 3 meters.
References
Units of measurement |
https://en.wikipedia.org/wiki/Shitposting | In Internet culture, shitposting or trashposting is the act of using an online forum or social media page to post content that is satirical and of "aggressively, ironically, and trollishly poor quality". Shitposts are generally intentionally designed to derail discussions or cause the biggest reaction with the least effort. It may even sometimes be orchestrated as part of a co-ordinated flame war to render a website unusable by its regular visitors.
Definition and usages
Shitposting is a modern form of online provocation. The term itself appeared around the mid-2000s on image boards such as 4chan, but the concept is not new; the early 20th-century art movement Dadaism created art that was intentionally low-quality or offensive to provoke the art world. Writing for Polygon, Sam Greszes compared shitposting to Dadaism's "confusing, context-free pieces that, specifically because they were so absurd, were seen as revolutionary works both artistically and politically". Greszes writes that the goal of shitposting is "to make an audience so confused at the lack of content that they laugh or smile".
Professor Greg Barton, an expert on terrorism at Deakin University, said that racist shitposting is common across the internet and is a way for people to connect and gain attention. He said, "The thing about social media is that it's social. You want some feedback, you want people to like your stuff whether it's Instagram or Facebook. Shitposting is all about getting your profile up, getting a response and the more ironic and funny you can be the more you get."
In modern politics
The political uses of shitposting came to prominence during the 2016 United States presidential election. In May of that year, The Daily Dot wrote that a shitpost is "a deliberate provocation designed for maximum impact with minimum effort".
In September 2016 the pro-Trump group Nimble America received widespread media attention. The Daily Beast described the group as "dedicated to 'shitposting' and |
https://en.wikipedia.org/wiki/Endangered%20Languages%20Project | The Endangered Languages Project (ELP) is a worldwide collaboration between indigenous language organizations, linguists, institutions of higher education, and key industry partners to strengthen endangered languages. The foundation of the project is a website, which launched in June 2012.
History
The ELP was launched in June 2012 with the intention of being a "comprehensive, up-to-date source of information on the endangered languages of the world" according to the director of the Catalogue of Endangered Languages (ELCat), Lyle Campbell, a professor of linguistics in the Mānoa College of Languages, Linguistics and Literature. He expressed that the "... Catalogue is needed to support documentation and revitalization of endangered languages, to inform the public and scholars, to aid members of groups whose languages are in peril, and to call attention to the languages most critically in need of conservation.” For example, the organization classifies the Canadian Métis language Michif as critically endangered due to the declining number of its fluent speakers.
There were four founding partners who oversaw the website's development and launch:
First Peoples' Cultural Council
Eastern Michigan University
University of Hawaiʻi at Mānoa Department of Linguistics
Google.org, Google's philanthropic arm.
Project aim
The goals of the ELP are to foster exchange of information related to at-risk languages and accelerate endangered language research and documentation, to support communities engaged in protecting or revitalizing their languages. Users of the website play an active role in putting their languages online by submitting information or samples in the form of text, audio, links or video files. Once uploaded to the website, users can tag their submissions by resource category to ensure they are easily searchable. Current resource categories include:
Language Research and Linguistics
Language Revitalization
Language Materials
Language Education
Language Advocacy |
https://en.wikipedia.org/wiki/Bass%E2%80%93Quillen%20conjecture | In mathematics, the Bass–Quillen conjecture relates vector bundles over a regular Noetherian ring A and over the polynomial ring . The conjecture is named for Hyman Bass and Daniel Quillen, who formulated the conjecture.
Statement of the conjecture
The conjecture is a statement about finitely generated projective modules. Such modules are also referred to as vector bundles. For a ring A, the set of isomorphism classes of vector bundles over A of rank r is denoted by .
The conjecture asserts that for a regular Noetherian ring A the assignment
yields a bijection
Known cases
If A = k is a field, the Bass–Quillen conjecture asserts that any projective module over is free. This question was raised by Jean-Pierre Serre and was later proved by Quillen and Suslin, see Quillen–Suslin theorem.
More generally, the conjecture was shown by in the case that A is a smooth algebra over a field k. Further known cases are reviewed in .
Extensions
The set of isomorphism classes of vector bundles of rank r over A can also be identified with the nonabelian cohomology group
Positive results about the homotopy invariance of
of isotropic reductive groups G have been obtained by by means of A1 homotopy theory.
References
Commutative algebra
Algebraic K-theory
Algebraic geometry |
https://en.wikipedia.org/wiki/Derivative%20code | Derivative code or Chameleon code is source code which has been derived entirely from one or more other machine readable file formats. If recursive transcompiling is used in the development process, some code will survive all the way through the pipeline from beginning to end, and then back to the beginning again.
This code is, by definition, derivative code. The following procedure can be used to easily test if any source code is derivative code or not.
Delete the code in question
Build (or compile) the project
If the build process simply replaces the source code which has been deleted, it is (obviously) code which has been derived from something else and is therefore, by definition, derivative code.
If the build process fails, and a human needs to re-create the deleted code by hand, this is again, by definition, hand code.
The transcompilers and other tools which create derivative code, are usually themselves either in part, or entirely hand code.
References
Computer programming |
https://en.wikipedia.org/wiki/Cryptographic%20splitting | Cryptographic splitting, also known as cryptographic bit splitting or cryptographic data splitting, is a technique for securing data over a computer network. The technique involves encrypting data, splitting the encrypted data into smaller data units, distributing those smaller units to different storage locations, and then further encrypting the data at its new location. With this process, the data is protected from security breaches, because even if an intruder is able to retrieve and decrypt one data unit, the information would be useless unless it can be combined with decrypted data units from the other locations.
History
The technology was filed for patent consideration in June 2003, and the patent was granted in June 2008.
Technology
Cryptographic splitting utilizes a combination of different algorithms to provide the data protection. A block of data is first encrypted using the AES-256 government encryption standard. The encrypted bits are then split into different shares and then each share is hashed using the National Security Agency's SHA-256 algorithm.
Applications
One application of cryptographic splitting is to provide security for cloud computing. The encrypted data subsets can be stored on different clouds, with the information required to restore the data being held on a private cloud for additional security. Security vendor Security First Corp uses this technology for its Secure Parser Extended (SPx) product line.
In 2009, technology services company Unisys gave a presentation about using cryptographic splitting with storage area networks. By splitting the data into different parts of the storage area network, this technique provided data redundancy in addition to security.
Computer giant IBM has written about using the technology as part of its Cloud Data Encryption Services (ICDES).
The technology has also been written about in the context of more effectively using sensitive corporate information, by entrusting different individuals w |
https://en.wikipedia.org/wiki/Weakly%20chained%20diagonally%20dominant%20matrix | In mathematics, the weakly chained diagonally dominant matrices are a family of nonsingular matrices that include the strictly diagonally dominant matrices.
Definition
Preliminaries
We say row of a complex matrix is strictly diagonally dominant (SDD) if . We say is SDD if all of its rows are SDD. Weakly diagonally dominant (WDD) is defined with instead.
The directed graph associated with an complex matrix is given by the vertices and edges defined as follows: there exists an edge from if and only if .
Definition
A complex square matrix is said to be weakly chained diagonally dominant (WCDD) if
is WDD and
for each row that is not SDD, there exists a walk in the directed graph of ending at an SDD row .
Example
The matrix
is WCDD.
Properties
Nonsingularity
A WCDD matrix is nonsingular.
Proof:
Let be a WCDD matrix. Suppose there exists a nonzero in the null space of .
Without loss of generality, let be such that for all .
Since is WCDD, we may pick a walk ending at an SDD row .
Taking moduli on both sides of
and applying the triangle inequality yields
and hence row is not SDD.
Moreover, since is WDD, the above chain of inequalities holds with equality so that whenever .
Therefore, .
Repeating this argument with , , etc., we find that is not SDD, a contradiction.
Recalling that an irreducible matrix is one whose associated directed graph is strongly connected, a trivial corollary of the above is that an irreducibly diagonally dominant matrix (i.e., an irreducible WDD matrix with at least one SDD row) is nonsingular.
Relationship with nonsingular M-matrices
The following are equivalent:
is a nonsingular WDD M-matrix.
is a nonsingular WDD L-matrix;
is a WCDD L-matrix;
In fact, WCDD L-matrices were studied (by James H. Bramble and B. E. Hubbard) as early as 1964 in a journal article in which they appear under the alternate name of matrices of positive type.
Moreover, if is an WCDD L-matrix, we can bound its inverse as |
https://en.wikipedia.org/wiki/L-matrix | In mathematics, the class of L-matrices are those matrices whose off-diagonal entries are less than or equal to zero and whose diagonal entries are positive; that is, an L-matrix L satisfies
See also
Z-matrix—every L-matrix is a Z-matrix
Metzler matrix—the negation of any L-matrix is a Metzler matrix
References
Matrices |
https://en.wikipedia.org/wiki/Garbled%20circuit | Garbled circuit is a cryptographic protocol that enables two-party secure computation in which two mistrusting parties can jointly evaluate a function over their private inputs without the presence of a trusted third party. In the garbled circuit protocol, the function has to be described as a Boolean circuit.
The history of garbled circuits is complicated. The invention of garbled circuit was credited to Andrew Yao, as Yao introduced the idea in the oral presentation of a paper in FOCS'86. This was documented by Oded Goldreich in 2003. The first written document about this technique was by Goldreich, Micali, and
Wigderson in STOC'87. The term "garbled circuit" was first used by Beaver, Micali, and Rogaway in STOC'90. Yao's protocol solving Yao's Millionaires' Problem was the beginning example of secure computation, yet it is not directly related to garbled circuits.
Background
Oblivious transfer
In the garbled circuit protocol, we make use of oblivious transfer. In the oblivious transfer, a string is transferred between a sender and a receiver in the following way: a sender has two strings and . The receiver chooses and the sender sends with the oblivious transfer protocol such that
the receiver doesn't gain any information about the unsent string ,
the value of is not exposed to the sender.
Note that while the receiver doesn't know the values, in practice the receiver knows some information about what encodes so that the receiver is not blindly choosing . That is, if encodes a false value, encodes a true value and the receiver wants to get the encoded true value, the receiver chooses .
The oblivious transfer can be built using asymmetric cryptography like the RSA cryptosystem.
Definitions and notations
Operator is string concatenation. Operator is bit-wise XOR. k is a security parameter and the length of keys. It should be greater than 80 and is usually set at 128.
Garbled circuit protocol
The protocol consists of 6 steps as follows:
The und |
https://en.wikipedia.org/wiki/Overload%20%28video%20game%29 | Overload is a 3D first-person shooter video game developed and released by Revival Productions for Windows, macOS and Linux on May 31, 2018. A version for PlayStation 4 was released on October 16. It features six degrees of freedom movement in a 3D environment with zero gravity, allowing the player to move and rotate in any direction. The game is set primarily on the moons of Saturn, where facilities have sent out distress signals about the mining robots turning hostile.
The game, which has been described as a 'spiritual successor' to the video games Descent and Descent II, received generally favorable reviews on release.
Gameplay
The gameplay of the game is similar to the Descent series. The player is tasked with controlling a gunship in zero gravity inside a variety of mining facilities and cave areas, fighting hostile worker robots (called autonomous operators in the game) and finding possible survivors in cryostasis tubes. Every level has an objective to complete, with most levels carrying over the traditional goal of destroying the reactor powering the facility and escaping before the reactor meltdown destroys the entire facility. Levels may also feature alternative objectives, such as destroying every hostile robot in a level, destroying a boss or simply finding and reaching the exit.
The game in its core is a first-person shooter with a fully three-dimensional environment, but with six degrees of freedom movement in zero gravity, allowing the player to move and rotate in any direction, which demands spatial awareness skills from the players. The enemy robots share a similar movement model. To assist in navigating around the level, the player can call up a Holo-Guide, a holographic bot that can lead the player to a destination (similar to the Guide-Bot of Descent II), and a fully three-dimensionally rendered automap, based on a similar feature seen in Descent, showing the areas of the level that the player has already discovered or spotted. In order to pr |
https://en.wikipedia.org/wiki/Plankton%20net | A plankton net is equipment used for collecting samples of plankton in standing bodies of water. It consists of a towing line and bridles, nylon mesh net, and a cod end. Plankton nets are considered one of the oldest, simplest and least expensive methods of sampling plankton. The plankton net can be used for both vertical and horizontal sampling. It allows researchers to analyse plankton both quantitatively (cell density, cell colony or biomass) and qualitatively (e.g. Chlorophyll-a as a primary production of phytoplankton) in water samples from the environment.
Components
Towing line and bridle
The towing line and bridle is the upper part of a plankton net and used to hold it. The towing lines connected to the triangle bridles are made of nylon rope and can be adjust to a level suitable for the user.
Nylon mesh net
The nylon mesh net is the middle part of the plankton net and is used to filter the plankton in the water sample in accordance with the size of the mesh. In addition, its funnel shape makes it possible to effectively capture plankton of various sizes. There are various mesh sizes for nets, depending on the target microorganism to be collected and the condition of the water body. The narrower the mesh size, the smaller the plankton in the water sample. For example, in order to obtain small invertebrates measuring 50 to 1500 μm, a net mesh size between 25 and 50 μm diameter should be selected, which is sufficient to effectively filter only the target organism. However, in a eutrophic water condition, a plankton net with a mesh larger than 100 μm should be chosen to avoid clogging the net.
Cod end
The cod end is located in the lower part of the plankton net at the end of the funnel. It has a collecting cylinder and a valve for opening and closing it.
Use
One common method for collecting a plankton sample is to tow the net horizontally using a low-speed boat. Before collecting the plankton, the net should be rinsed with the sample water. The user |
https://en.wikipedia.org/wiki/BOD%20bottle | BOD Bottle or an incubation bottle is a main apparatus used for the Biological Oxygen Demand (BOD) test. During the five-day BOD or BOD5 test process, the BOD bottle is used for incubating diluted samples under the 20 °C or 68 °F of temperature.
Structure
The bottle is normally designed to have a special shoulder radius to push out all air from the inside of the bottle when a sample solution is being filled. According to Method 5210 in Standard Methods for the Examination of Water and Wastewater, the BOD bottle should include a ground-glass stopper and a flared mouth which form a water seal preventing the air from the outside of the bottle coming in. Method 5210 also recommends to use a paper, a foil or a plastic cup to cap over the mouth of the bottle reducing the evaporation during the incubation. Generally, the side of the BOD bottle is permanently screened with white writing area, and is printed with a specific number; both for the aid of the sample identification.
Stopper
There are two kinds of stopper: the Glass Pennyhead and the Glass Robotic stopper.
Sizes
There are many BOD bottle sizes. The dose of the mixture of the solution (nutrient, mineral and buffer solution) is related to the size of the bottle. For the Standard Methods 5210, the BOD bottle “having 60 mL or greater capacity (300-mL)” is mentioned as one of the apparatus for the BOD test. A 60 mL BOD bottle is available and listed as "often convenient" by EPA (Environmental Protection Agency) Method 405.1. However, EPA Method 405.1 was written in 1974 and is no longer an EPA-approved method per 40CFR Part 136.
Materials
Glass is a material being specified in the Standard Methods 5210 of the BOD5 test. The glass bottles are manufactured from Type 1 borosilicate glass.
A black BOD bottle
A black BOD bottle is coated with PVC plastic that blocks visible light. Black bottles are used in marine photosynthesis projects which needs to compare oxygen levels in light and dark conditions.
Disposable |
https://en.wikipedia.org/wiki/Inoculation%20needle | An inoculation needle is a laboratory equipment used in the field of microbiology to transfer and inoculate living microorganisms. It is one of the most commonly implicated biological laboratory tools and can be disposable or re-usable. A standard reusable inoculation needle is made from nichrome or platinum wire affixed to a metallic handle. A disposable inoculation needle is often made from plastic resin. The base of the needle is dulled, resulting in a blunted end.
Uses
Inoculation needles are primarily applied in microbiology for studying bacteria and fungi on semi-solid media. Biotechnology, cell biology and immunology may also utilize needle-oriented culture methods.
The application of inoculation needles focuses on the inoculation and isolation of very defined regions of the cultures and the requirements of least disturbance between two closely crowded microbial colonies. It can also be used in harpooning under a low magnification microscope.
Streaking on streak plates, fish tail inoculation of slant cultures and the inoculation of stab cultures can be done with the inoculation needle. Stab cultures specifically require the inoculation needle and is used to study cell motility, microbial oxygen requirements using Thioglycolate cultures, and the gelatin liquefaction of bacteria.
Operation
Sterilization
The inoculation needle is sterilized using the aseptic technique. An open flame from an incinerator, a bunsen burner, or an alcohol burner is used to flame along the tip and the length of the needle that is to be in contact with the inoculum (or the propagule). For ease of manipulation it is common practice to hold the needle with the dominant hand as if handling a pencil. The needle will be flamed at a downward angle through the flame's inner cone until it is red-hot. The downward angle will minimize the amount of microbial aerosols created.
Inoculation needles must be sterilized prior and following contact with microbial life forms to ensure no contam |
https://en.wikipedia.org/wiki/NATO%20Software%20Engineering%20Conferences | The NATO Software Engineering Conferences were held in 1968 and 1969. The conferences were attended by international experts on computer software who agreed on defining best practices for software grounded in the application of engineering. The result of the conferences were two reports, one for the 1968 conference and the other for the 1969 conference, that defined how software should be developed. The conferences played a major role in gaining general acceptance for the term software engineering.
References
History of software
Information technology organizations based in Europe
History of NATO
1968 conferences
1969 conferences
1968 software
1969 software |
https://en.wikipedia.org/wiki/Monotone%20matrix | A real square matrix is monotone (in the sense of Collatz) if for all real vectors , implies , where is the element-wise order on .
Properties
A monotone matrix is nonsingular.
Proof: Let be a monotone matrix and assume there exists with . Then, by monotonicity, and , and hence .
Let be a real square matrix. is monotone if and only if .
Proof: Suppose is monotone. Denote by the -th column of . Then, is the -th standard basis vector, and hence by monotonicity. For the reverse direction, suppose admits an inverse such that . Then, if , , and hence is monotone.
Examples
The matrix is monotone, with inverse .
In fact, this matrix is an M-matrix (i.e., a monotone L-matrix).
Note, however, that not all monotone matrices are M-matrices. An example is , whose inverse is .
See also
M-matrix
Weakly chained diagonally dominant matrix
References
Matrices |
https://en.wikipedia.org/wiki/Composr%20CMS | Composr CMS (or Composr) is a web application for creating websites. It is a combination of a Web content management system and Online community (Social Networking) software. Composr is licensed as free software and primarily written in the PHP programming language.
Composr is available on various web application distributions platforms, including Installatron, Softaculous, Web Platform Installer and Bitnami.
History
Composr was launched in 2004 as ocPortal.
ocPortal was featured on the CMS Report (a CMS editorial website) "Top 30 Web Applications" list.
ocPortal was developed up until version 9 and renamed to Composr CMS in 2016 alongside the new version 10 as a product and branding overhaul.
Features
The main features are for:
Content Management of website structure and pages
Content Management of custom content types ("Catalogues")
Galleries (Photos and Videos)
News and Blogging
Discussion Forums
Chat Rooms
Advertising management ("Banners")
Calendars
File management ("Downloads")
wikis ("Wiki+")
Quizzes
Newsletters
Community Points
Composr uses a number of built-in languages to build up web content and structure, mainly:
Comcode (for creating high-level web content, similar to BBCode)
Tempcode (a templating language)
Filtercode (for defining content filtering)
Selectcode (for defining content selection)
Composr is developed distinctly compared to most other Open Source CMSs, with the main distinctions being:
Composr is module-orientated, rather than node-orientated
Common software components are designed for maximum integration, rather than maximum choice
Composr is sponsored by a commercial software company, rather than being volunteer led
Some unique (or rare) features of Composr are:
Automatic banning of hackers (if hacking attempts are detected)
Core integration with spammer block lists
Integration with third-party forum software for user accounts and forums (although this is no longer a focus)
Automatic color scheme generat |
https://en.wikipedia.org/wiki/Hertwig%20rule | Hertwig's rule, or the long axis rule states that a cell divides along its long axis. Introduced by the German zoologist Oscar Hertwig in 1884, the rule emphasizes the cell shape as a default mechanism of spindle apparatus orientation. Hertwig's rule predicts cell division orientation, which is important for tissue architecture, cell fate and morphogenesis.
Discovery
Hertwig's experiments studied the orientation of frog egg divisions. The frog egg has a round shape and the first division occurs in a random orientation. Hertwig compressed the egg between two parallel plates. The compression forced the egg to change its shape from round to elongated. Hertwig noticed that elongated egg divides not randomly, but orthogonally to its long axis. The new daughter cells were formed along the longest axis of the cell. This observation thus became known as 'Hertwig's rule' or 'long axis rule'.
Confirmation and mechanism
Recent studies in animal and plant systems support the 'long axis rule'. The studied systems include the mouse embryo, Drosophila epithelium, Xenopus blastomeres (Strauss 2006), MDCK cell monolayers and plants (Gibson et al., 2011). The mechanism of the 'long axis rule' relies on interphase cell long axis sensing. However, during division many animal cell types undergo cell rounding, causing the long axis to disappear as the cell becomes round. It is at this rounding stage that the decision on the orientation of the cell division is made by the spindle apparatus. The spindle apparatus rotates in the round cell and after several minutes the spindle position is stabilised preferentially along the interphase cell long axis. The cell then divides along the spindle apparatus orientation. The first insights into how cells could remember their long axis came from studies on the Drosophila epithelium. The study indicated the participation of tricellular junctions (TCJs) in determining the spindle orientation. TCJs localized at the regions where three or more cells |
https://en.wikipedia.org/wiki/Road%20and%20Waterway%20Construction%20Service%20Corps | The Road and Waterway Construction Service Corps (, VVK) was during the years 1851–2010 a military administrative corps of reserve personnel in the Swedish Army, who was responsible for in the case of war provide the Swedish Armed Forces with specially trained personnel to maintain positions in the field of civil engineering.
History
The Road and Waterway Construction Service Corps was established in 1851 as a military corps that primarily catered to the Swedish government's need for engineers for the planning and management of the so-called public works. The corps sorted under the Ministry of Communications and had under the regulations issued on 22 December 1851 the purpose of assisting the National Swedish Road Board (Väg- och vattenbyggnadsstyrelsen) in its dealings with public works; the officers of the corps could during the case of war be commanded to the engineering service in the Swedish Army. Concerning discipline, subordination and liability rules, the corps was under the jurisdiction of martial law. The corps was first set up only by certain officers of the Swedish Navy Mechanical Corps, the Army and the Navy, which had been employed in public companies and therein acquired practical skills.
The training of corps officers occurred in 1846-78 at the Higher Artillery and Engineering Grammar School (Högre artilleri- och ingenjörläroverket) in Marieberg in Stockholm, but according to a royal letter on 12 June 1885 a special military course for aspirants to the corps was now organized. To gain entry to this course required among other things that one had completed their final examination from the Royal Institute of Technology's Department of Civil Engineering. By royal letter on 19 October 1894 and 6 April 1900, new regulations had been provided for the military training. The corps officers were listed in accordance with the Royal Proclamation on 9 February 1906 to the Army's surplus staff.
The regulations in 1922 for entry into the corps were; to have com |
https://en.wikipedia.org/wiki/Q-system%20%28genetics%29 | Q-system is a genetic tool that allows to express transgenes in a living organism. Originally the Q-system was developed for use in the vinegar fly Drosophila melanogaster, and was rapidly adapted for use in cultured mammalian cells, zebrafish, worms and mosquitoes. The Q-system utilizes genes from the qa cluster of the bread fungus Neurospora crassa, and consists of four components: the transcriptional activator (QF/QF2/QF2w), the enhancer QUAS, the repressor QS, and the chemical de-repressor quinic acid. Similarly to GAL4/UAS and LexA/LexAop, the Q-system is a binary expression system that allows to express reporters or effectors (e.g. fluorescent proteins, ion channels, toxins and other genes) in a defined subpopulation of cells with the purpose of visualising these cells or altering their function. In addition, GAL4/UAS, LexA/LexAop and the Q-system function independently of each other and can be used simultaneously to achieve a desired pattern of reporter expression, or to express several reporters in different subsets of cells.
Origin
The Q-system is based on two out of the seven genes of the qa gene cluster of the bread fungus Neurospora crassa. The genes of the qa cluster are responsible for the catabolism of quinic acid, which is used by the fungus as a carbon source in conditions of low glucose. The cluster contains a transcriptional activator qa-1F, a transcriptional repressor qa-1S, and five structural genes. The qa-1F binds to a specific DNA sequence, found upstream of the qa genes. The presence of quinic acid disrupts interaction between qa-1F and qa-1S, thus disinhibiting the transcriptional activity of qa-1F.
Genes qa-1F, qa-1S and the DNA binding sequence of qa-1F form the basis of the Q-system. The genes were renamed to simplify their use as follows: transcriptional activator qa-1F as QF, repressor qa-1S as QS, and the DNA binding sequence as QUAS. The quinic acid represents the fourth component of the Q-system.
The original transactivator QF ap |
https://en.wikipedia.org/wiki/Cell%20division%20orientation | Cell division orientation is the direction along which the new daughter cells are formed. Cell division orientation is important for morphogenesis, cell fate and tissue homeostasis. Abnormalities in the cell division orientation leads to the malformations during development and cancerous tissues. Factors that influence cell division orientation are cell shape, anisotropic localization of specific proteins and mechanical tensions.
Implication for morphogenesis
Cell division orientation is one of the mechanisms that shapes tissue during development and morphogenesis. Along with cell shape changes, cell rearrangements, apoptosis and growth, oriented cell division modifies the geometry and topology of live tissue in order to create new organs and shape the organisms. Reproducible patterns of oriented cell divisions were described during morphogenesis of Drosophila embryos, Arabidopsis thaliana embryos, Drosophila pupa, zebrafish embryos and mouse early embryos. Oriented cell divisions contribute to the tissue elongation and the release of mechanical stress. While in the first case oriented cell division acts as active contributor to the morphogenesis, the latter case is a passive response to the external mechanical tensions.
Implication for tissue homeostasis
In several tissues, such as columnar epithelium, the cells divide along the plane of the epithelium. Such divisions insert new formed cells in the epithelium layer. The disregulation of the orientation of cell divisions result in the creation of the cell out of epithelium and is observed at the initial stages of cancer.
Regulation
More than a century ago Oskar Hertwig proposed that the cell division orientation is determined by the shape of the cell (1884), known as Hertwig rule. In the epithelium the cells 'reads' its shape through the specific cell junction called tricellular junctions (TCJ). TCJ provide mechanical and geometrical clues for the spindle apparatus to ensure that cell divide along its long axi |
https://en.wikipedia.org/wiki/Hackmud | Hackmud is a massively multiplayer online video game and/or MUD that simulates 1990s hacker subculture through text-based adventure. Players use social engineering, scripting, and cracks in a text-based terminal to influence and control other players in the simulation. Reviewers wrote that the game's "campy hacking" mimics that of films like WarGames (1983) and Jurassic Park (1993).
References
External links
2016 video games
Indie games
Multiplayer and single-player video games
Linux games
MacOS games
Windows games
Massively multiplayer online games
Cooperative video games
Video games developed in the United States
Video games scored by Lena Raine
Hacker culture
Simulation video games
Hacking video games
Programming games |
https://en.wikipedia.org/wiki/Lira%20512 | Lira 512 (also known as Lira XT) was an IBM PC XT compatible computer made by the Yugoslav (now Serbian) company EI Niš in the late 1980s. It was first presented to the public in April 1988 at the “Kompjuter ‘88” computer show in Belgrade. Soon after that, Lira 512 was also presented in Yugoslav computer press.
What separates Lira 512 from most of the other XT compatibles is that keyboard is included just above in the same case (together with the 3.5’’ floppy drive), which made it similar in appearance to the original Atari ST or the Amiga 500. Lira has two display adapters (monochrome Hercules compatible and color CGA compatible), where the active video adapter is chosen by the back-panel switch. A 40W power adapter is also installed in the same case.
The main purpose of Lira 512 was to be used in computer classrooms.
Specifications
CPU: Intel 8088 running at 4.77 MHz or 10 MHz (turbo)
ROM: 8 KB Award BIOS, expandable to 32KB
RAM: 512 KB (expandable up to 640 KB)
Operating system: MS DOS 3.21
Secondary storage: 3.5’’ Panasonic floppy drive 720KB
Display: two display adapters (only one can be used at a time)
Hercules compatible adapter (monochrome 80x25 text or graphic 720x348)
CGA compatible adapter (color text 40x25, 80x25 or graphic 320x200, 640x200)
Sound: beeper
I/O ports: composite, RF and DE9 RGB video output, RS-232 (DB25 male + DE9 male connector reserved for the mouse), parallel port (DB25 female connector), external floppy connector, DA15 PC joystick female connector, light pen and expansion connector
Power supply 40W
Lira 512 gallery
Other Lira models
Lira XT Tower
Lira XT Tower was released about a year after the release of the original Lira 512, because it was realized that 512's compact case limits hardware expansion. To address this issue, especially to allow for the installation of the hard disk, the case was changed to a slimline tower.
Lira AT
About the same time with Lira XT Tower, the new Lira AT was released with similar loo |
https://en.wikipedia.org/wiki/MythBusters%3A%20The%20Search | MythBusters: The Search is a reality competition series that aired on the Science Channel. The series aimed to determine the hosts of a reboot of the Discovery Channel series MythBusters.
History
The original run of MythBusters concluded in 2016, after its original hosts Adam Savage and Jamie Hyneman confirmed in October 2015 that the then-upcoming season would be their 14th and final season. In late March 2016, it was revealed by Variety that Discovery Channel's sister network Science was planning a spin-off reality series, tentatively titled Search for the Next MythBusters, which would determine hosts for a revival of the series.
In September 2016, it was announced that Nerdist science editor Kyle Hill would host the series.
The revival, featuring the winners of The Search, premiered on Science in November 2017.
Show format
The series started with 10 contestants; in each episode, contestants compete in one team task (two or three teams competing) and one individual task. In each task, as in the original MythBusters series, the contestants are instructed to scientifically test the validity of a claim (with some tasks based on or expanding from myths covered by previous episodes of MythBusters). At the end of each episode, an MVP is declared, who is granted immunity from elimination. In most episodes, the worst-performing contestant was eliminated.
Contestants
– Winner
– Runner-up
– MVP
Series overview
References
External links
2010s American reality television series
2017 American television series debuts
2017 American television series endings
2017 Australian television series debuts
2017 Australian television series endings
American educational television series
American non-fiction television series
American television spin-offs
Australian educational television series
Australian non-fiction television series
Australian television spin-offs
English-language television shows
Science Channel original programming
Television series about urban legends
|
https://en.wikipedia.org/wiki/Real-time%20path%20planning | Real-Time Path Planning is a term used in robotics that consists of motion planning methods that can adapt to real time changes in the environment. This includes everything from primitive algorithms that stop a robot when it approaches an obstacle to more complex algorithms that continuously takes in information from the surroundings and creates a plan to avoid obstacles.
These methods are different from something like a Roomba robot vacuum as the Roomba may be able to adapt to dynamic obstacles but it does not have a set target. A better example would be Embark self-driving semi-trucks that have a set target location and can also adapt to changing environments.
The targets of path planning algorithms are not limited to locations alone. Path planning methods can also create plans for stationary robots to change their poses. An example of this can be seen in various robotic arms, where path planning allows the robotic system to change its pose without colliding with itself.
As a subset of motion planning, it is an important part of robotics as it allows robots to find the optimal path to a target. This ability to find an optimal path also plays an important role in other fields such as video games and gene sequencing.
Concepts
In order to create a path from a target point to a goal point there must be classifications about the various areas within the simulated environment. This allows a path to be created in a 2D or 3D space where the robot can avoid obstacles.
Work Space
The work space is an environment that contains the robot and various obstacles. This environment can be either 2-dimensional or 3-dimensional.
Configuration Space
The configuration of a robot is determined by its current position and pose. The configuration space is the set of all configurations of the robot. By containing all the possible configurations of the robot, it also represents all transformations that can be applied to the robot.
Within the configuration sets there are additiona |
https://en.wikipedia.org/wiki/Studio%20One%20%28software%29 | Studio One is a digital audio workstation (DAW) application, used to create, record, mix and master music and other audio, with functionality also available for video. Initially developed as a successor to the KRISTAL Audio Engine, it was acquired by PreSonus and first released in 2009 for macOS and Microsoft Windows. PreSonus and Studio One were then acquired by Fender in 2021.
In addition to the commercial editions of the software (known as Studio One Artist and Studio One Professional), PreSonus also distributes a free edition, with reduced functionality (known as Studio One Prime). The Professional edition is also available as part of the Studio One+ monthly subscription program.
History
Early development and release (2004–2011)
Studio One originally began development under the name K2, as a follow-up to the KRISTAL Audio Engine. Although development for this follow-up began in 2004, it transitioned in 2006 to a cooperation between PreSonus and KristalLabs Software Ltd., a start-up founded by former Steinberg employees Wolfgang Kundrus and Matthias Juwan. Kundrus was one of the developers for initial versions of Cubase, and established concepts for the first version of Nuendo. Juwan was the author of the original KRISTAL Audio Engine, wrote the specification for version 3 of the VST plug-in standard, and had also worked on multiple Steinberg products, including Cubase, Nuendo, and HALion.
KristalLabs then became part of PreSonus in 2009, and the former KristalLabs logo was used as the basis for the logo of Studio One.
The first version of Studio One was announced on 1 April 2009 at Musikmesse, and released on 27 September 2009. The final update for Studio One version 1 (v1.6.5) was released in July 2011.
Versions 2 & 3 (2011–2018)
Version 2 of Studio One was announced on 17 October 2011, and released on 31 October 2011 (alongside the 2.0.2 update). This release of the software introduced multiple enhancements, including integration with Celemony Melodyn |
https://en.wikipedia.org/wiki/%27Ilm%20al-huruf | ʿIlm al-Ḥurūf () or the science of letters, also called Islamic lettrism, is a process of Arabic numerology whereby numerical values assigned to Arabic letters are added up to provide total values for words in the Quran, similar to Hebrew gematria. Used to infer meanings and reveal secret or hidden messages.
ʿIlm al-Ḥurūf is composed of the two words ʿilm () meaning "knowledge", and ḥurūf (), the plural of the word ḥarf (), meaning "letters".
Table of letter values
See also
Gematria
Hurufism
Hurufiyya movement
Western Arabic numerals
Eastern Arabic numerals
Bibliography
Sciences occultes et Islam, Pierre Lory, Annick Regourd, Institut français de Damas, 1993, , .
Coran et talismans : textes et pratiques magiques en milieu musulman, Hommes et sociétés, Constant Hamès, KARTHALA Éditions, 2007, , .
René Guénon, Les Symboles de la Science Sacrée, Éditions Gallimard, Paris, "La Science des lettres", "Les Mystères de la lettre Nun", "La Montagne et la Caverne"
Michel Valsan, L’Islam et la fonction de René Guénon, Éditions de l’Œuvre, Paris, un symbole idéographique de l’Homme Universel, le Triangle de l’Androgyne et le monosyllabe Ôm'.
Ibn Arabi, Les Illuminations de La Mecque, Éditions Albin Michel, Paris, 1997, "La Science des lettres", translation and commentary by Denis Gril.
Charles André Gilis, Les sept étendards du califat'', Éditions Al-bouraq, Paris, 1993.
Arabic orthography
Numerology
Language and mysticism |
https://en.wikipedia.org/wiki/Medical%20device%20hijack | A medical device hijack (also called medjack) is a type of cyber attack. The weakness they target are the medical devices of a hospital. This was covered extensively in the press in 2015 and in 2016.
Medical device hijacking received additional attention in 2017. This was both a function of an increase in identified attacks globally and research released early in the year. These attacks endanger patients by allowing hackers to alter the functionality of critical devices such as implants, exposing a patient's medical history, and potentially granting access to the prescription infrastructure of many institutions for illicit activities. MEDJACK.3 seems to have additional sophistication and is designed to not reveal itself as it searches for older, more vulnerable operating systems only found embedded within medical devices. Further, it has the ability to hide from sandboxes and other defense tools until it is in a safe (non-) environment.
There was considerable discussion and debate on this topic at the RSA 2017 event during a special session on MEDJACK.3. Debate ensued between various medical device suppliers, hospital executives in the audience and some of the vendors over ownership of the financial responsibility to remediate the massive installed base of vulnerable medical device equipment. Further, notwithstanding this discussion, FDA guidance, while well intended, may not go far enough to remediate the problem. Mandatory legislation as part of new national cyber security policy may be required to address the threat of medical device hijacking, other sophisticated attacker tools that are used in hospitals, and the new variants of ransomware which seem targeted to hospitals.
Overview
In such a cyberattack the attacker places malware within the networks through a variety of methods (malware-laden website, targeted email, infected USB stick, socially engineered access, etc.) and then the malware propagates within the network. Most of the time existing cyber def |
https://en.wikipedia.org/wiki/Decodoku | Decodoku is set of online citizen science games, based on quantum error correction. The project is supported by the NCCR QSIT and the University of Basel, and allows the public to get involved with quantum error correction research.
The games present the clues left in a quantum computer when errors occur, and encourage the players to work out how best to correct them. These puzzles are presented in a manner similar to typical casual puzzle games, like 2048, Threes or Sudoku, with the scientific background explained via the project website and YouTube channel. Thus far three games have been released: Decodoku, Decodoku:Puzzles and Decodoku:Colors.
References
2016 video games
Android (operating system) games
Browser games
Citizen science
IOS games
Mobile games
Online games
Simulation video games
Video games developed in Switzerland |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.