source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Advanced%20automation%20functions | In automation production technology the actions performed by an automated process are executed by a program of instructions which is run during a work cycle. To execute work cycle programs, an automated system should be available to execute these advanced functions.
Safety monitoring
If there is a need for workers in an automated system, a safety monitoring is required for the occupational safety and health of the workers. In a safety monitoring various steps can take place including a complete stop of the system, sounding an alarm or reducing the operating speed. Usually, limiting switches are sensors like temperature probes, heat and smoke detectors or pressure sensitive floor pads.
Maintenance and repair diagnostics
There are three modes of operations which are used in a cycle of maintenance and repair diagnostics: status monitoring, failure diagnostics and recommendation of the repair procedure. In the status monitoring mode, the current system status is displayed. The failure diagnostics mode takes place when a failure occurs. The system will then suggest an adequate repair procedure to a team of experts.
Error detection and recovery
The error detection mode is a step to determine if and when a failure occurs in automated system. The possible errors can be divided into three categories. random errors, systematic errors and aberrations. While in the error recovery mode, remedy actions take place for all detected errors.
References
Boucher, T.O., Computer Automation in Manufacturing, Chapman & Hall, London, 1996
& |
https://en.wikipedia.org/wiki/Eco-Sensitive%20Zone | Eco-Sensitive Zones (ESZs) or Ecologically Fragile Areas (EFAs) are areas in India notified by the Ministry of Environment, Forests and Climate Change (MoEFCC), Government of India around Protected Areas, National Parks and Wildlife Sanctuaries. The purpose of declaring ESZs is to create some kind of "shock absorbers" to the protected areas by regulating and managing the activities around such areas. They also act as a transition zone from areas of high protection to areas involving lesser protection. As per the National Wildlife Action Plan (2002-2016), issued by the Union Ministry of Environment, Forest and Climate Change, land within 10 km of the boundaries of national parks and wildlife sanctuaries are to be notified as eco-fragile zones or Eco-sensitive Zones.
Authority
ESZs are regulated by central government through the Min. of Environment, Forests and Climate change (MoEFCC). The Ministry came out with new guidelines for the regulation of such areas in 2011.
Statutory backing
The Environment (Protection) Act, 1986 does not mention the word "Eco-Sensitive Zones". However, Section 3(2)(v) of the Act, says that Central Government can restrict areas in which any industries, operations or processes or class of industries, operations or processes shall not be carried out or shall be carried out subject to certain safeguards. Besides Rule 5(1) of the Environment (Protection) Rules, 1986 states that central government can prohibit or restrict the location of industries and carrying on certain operations or processes on the basis of considerations like the biological diversity of an area, maximum allowable limits of concentration of pollutants for an area, environmentally compatible land use, and proximity to protected areas. The above two clauses have been effectively used by the government to declare ESZs or EFAs.
The same criteria have been used by the government to declare No Development Zones. Time to time, the Ministry of Environment, Forests and Climate C |
https://en.wikipedia.org/wiki/Game%20Theory%20Society | The Game Theory Society (GTS) is a society for the promotion of research, teaching and application of game theory. It was founded in 1999 by Ehud Kalai and Robert Aumann and is registered in the Netherlands.
Activities
The GTS hosts a congress every four years. The previous meetings were in Bilbao (2000), Marseille (2004), Evanston, Illinois (2008), Istanbul (2012) and Maastricht (2016).
The society is associated with two journals:
Games and Economic Behavior
International Journal of Game Theory
The society honors individuals by selecting them for the following named lectures:
The Shapley Lecture is delivered by a distinguished young game theorist under the age of 40.
The Morgenstern Lecture is delivered by an individual who has made important contributions in game theory with significant economic content.
The von Neumann Lecture is delivered by an individual who has made important developments in game theory that are of significant mathematical interest.
In addition, the society awards the Kalai Prize to a person (or persons) who have published a significant paper at the interface of game theory and computer science.
References
External links
1999 establishments in the Netherlands
Educational organisations based in the Netherlands
Mathematical societies
Organizations established in 1999
Economics societies
Organizations related to game theory |
https://en.wikipedia.org/wiki/Solenocyte | In biology, solenocytes are elongated, flagellated cells commonly found in lower invertebrates, such as flatworms (phylum Platyhelminthes), as well as in chordates (sub-phylum Cephalochordata) and several other animal species. In terms of function, solenocytes play a significant role in the excretory systems of their host organism(s). For example, the lancelets, also referred to as amphioxus (genus Branchiostoma), utilize solenocytic protonephridia to perform excretion. In addition to excretion, these cells contribute to ion regulation and osmoregulation. With this in mind, solenocytes form subtypes of protonephridium and are often compared to another specialized excretory cell type, i.e., flame cells. Solenocytes have flagella, while flame cells are generally ciliated.
Cellular structure and configuration
Solenocytes are mesoderm-derived and morphologically diverse cells containing a cytoplasmic cap or enclosed cell body with a nucleus residing in its core. A long tubule is attached to the cell body, and within its intracellular lumen lies either one or two long flagella. The continuously moving vibratile flagella extend from a protein structure, referred to as the basal body, found at the base of the flagellar structure. Extending through the length of the tubule, the flagella are able to protrude into the protonephridium lumen rather designedly (see Figure 1).
The tubule wall structure is composed of thin, pillar-like rods perforated by tiny openings. These pore spaces are likely the site of interstitial fluid filtration.
A nephridium contains approximately 500 solenocytes, each of which is roughly 50 microns in length (this measure includes the nucleated cell body and tubule). The excretory organ of Amphioxus (genus Branchiostoma) belcheri contains clusters of solenocytes (the majority of which are situated along the ligamentum denticulatum coelomic surface). These clusters are composed at patterned intervals, generating groups amongst the renal tubules of |
https://en.wikipedia.org/wiki/Empathy%20map | An empathy map is a widely-used visualization tool within the field of user experience design and human–computer interaction practice. In relation to empathetic design, the primary purpose of an empathy map is to bridge the understanding of the end user. Within context of its application, this tool is used to build a shared understanding of the user's needs and provide context to a user-centered solution.
Structure
The traditional empathy map begins with four categories: says, thinks, does, and feels. At the center of the map, a user or persona is displayed to remind practitioners and stakeholders what type of individual this research is centered around. Each category of the empathy map represents a snapshot of the user's thoughts and feelings without any chronological order.
Says category contains what the user says out loud during research or testing. Ideally, each point is written down as close to the user's original words as possible.
Thinks category contains what the user is thinking. While content may overlap with the Says category, Thinks category exists to capture thoughts users may not want to share willing due to social factors, such as self-consciousness or politeness.
Does category contains the user's action and behaviors. This contains what the user is physically doing and captures what actions users are taking.
Feels category contains the user's emotional state in context with their experience. This typically contains information or phrases as to how they feel about the experience.
However, as time evolved, the empathy map has been updated to provide more context and information architecture within the industry.
Empathy maps could vary in forms, but they have common core elements. Other than the four traditional categories mentioned above, empathy map could also include other categories. Here are two other categories commonly used:
See category contains information users observed through eyes. It could be what users see in the marketplace |
https://en.wikipedia.org/wiki/Room-temperature%20densification%20method | The room-temperature densification method was developed for Li2MoO4 ceramics and is based on the water-solubility of Li2MoO4. It can be used for the fabrication of Li2MoO4 ceramics instead of conventional thermal sintering. The method utilizes a small amount of aqueous phase formed by moistening the Li2MoO4 powder. The densification occurs during sample pressing as the solution incorporates the pores between the powder particles and recrystallizes. The contact points of the particles provide a high pressure zone, where solubility is increased, whereas the pores act as a suitable place for the precipitation of the solution. Any residual water is removed by post-processing typically at 120 °C. The method is suitable also for Li2MoO4 composite ceramics with up to 30 volume-% of filler material, enabling the optimization of the dielectric properties.
References
Ceramic engineering
Ceramic materials
Materials science |
https://en.wikipedia.org/wiki/Smart%20ring | A smart ring is a compact wearable electronic device that combines mobile technology with features for convenient on-the-go use. These devices, typically designed to fit on a finger like a traditional ring, offer functionalities like mobile payments, access control, gesture control, and activity tracking. Smart rings can connect to smartphones or other devices, and some can operate independently, communicating with cloud-based systems or performing standalone tasks. While lacking traditional displays, they respond to contextual cues, such as proximity to payment terminals or specific gestures.
In 2013, the British company McLear, co-founded by John McLear, Chris Leach, and Joe Prencipe, introduced the first commercially available smart ring. Today, a multitude of companies produce smart rings for various use cases, expanding the options available to consumers.
Use
A prominent feature of smart rings is their ability to function as near-field communication devices, providing an alternative to carrying traditional items such as credit cards, door keys, car keys, and potentially even ID cards or driver's licenses. Additionally, these rings can connect to smartphones, serving as notification devices for incoming calls, text messages, emails, and other alerts. They can also act as gesture-based controllers, enabling users to perform various actions with simple hand motions. Furthermore, smart rings offer the capability to track health-related metrics, including steps taken, distance travelled, sleep patterns, heart rate, and calorie consumption.
Security
Secure access control such as for company entry and exit, home access, cars, and electronic devices was the first use of smart rings. Smart rings change the status quo for secure access control by increasing ease of use, decreasing physical security flaws such as by ease of losing the device, and by adding two-factor authentication mechanisms including biometrics and key code entry.
Payments and ticketing
Smart rin |
https://en.wikipedia.org/wiki/Buridan%20formula | In quantified modal logic, the Buridan formula and the converse Buridan formula (more accurately, schemata rather than formulas) (i) syntactically state principles of interchange between quantifiers and modalities; (ii) semantically state a relation between domains of possible worlds. The formulas are named in honor of the medieval philosopher Jean Buridan by analogy with the Barcan formula and the converse Barcan formula introduced as axioms by Ruth Barcan Marcus.
The Buridan formula
The Buridan formula is:
.
In English, the schema reads: If possibly everything is F, then everything is possibly F. It is equivalent in a classical modal logic (but not necessarily in other formulations of modal logic) to
.
The converse Buridan formula
The converse Buridan formula is:
.
Buridan's logic
In medieval scholasticism, nominalists held that universals exist only subsequent to particular things or pragmatic circumstances, while realists followed Plato in asserting that universals exist independently of, and superior to, particular things.
References
See page 190.
Modal logic |
https://en.wikipedia.org/wiki/Chain%20scission | Chain scission is a term used in polymer chemistry describing the degradation of a polymer main chain. It is often caused by thermal stress (heat) or ionizing radiation (e.g. light, UV radiation or gamma radiation), often involving oxygen. During chain cleavage, the polymer chain is broken at a random point in the backbone to form two - mostly still highly molecular - fragments.
Depolymerization, on the other hand, is the elimination of low molecular weight substances (monomers, dimers and suchlike) from a polymer.
References
Chemical reactions
Biochemistry |
https://en.wikipedia.org/wiki/C%C3%A9u%20%28programming%20language%29 | Céu is "Structured Synchronous Reactive Programming"
According to its web page, Céu supports synchronous concurrency with shared memory and deterministic execution and has a small memory footprint.
References
Sources
Programming languages |
https://en.wikipedia.org/wiki/X2%20transceiver | The X2 transceiver format is a 10 gigabit per second modular fiber optic interface intended for use in routers, switches and optical transport platforms. It is an early generation 10 gigabit interface related to the similar XENPAK and XPAK formats. X2 may be used with 10 gigabit ethernet or OC-192/STM-64 speed SDH/SONET equipment.
X2 modules are smaller and consume less power than first generation XENPAK modules, but larger and consume more energy than the newer XFP transceiver standard and SFP+ standards.
As of 2016 this format is relatively uncommon and has been replaced by 10Gbit/s SFP+ in most new equipment.
References
Computer hardware |
https://en.wikipedia.org/wiki/Access%20level | In computer science and computer programming, access level denotes the set of permissions or restrictions provided to a data type. Reducing access level is an effective method for limiting failure modes, reducing debugging time, and simplifying overall system complexity. It restricts variable modification to only the methods defined within the interface to the class. Thus, it is incorporated into many fundamental software design patterns. In general, a given object cannot be created, read, updated or deleted by any function without having a sufficient access level.
The two most common access levels are public and private, which denote, respectively; permission across the entire program scope, or permission only within the corresponding class. A third, protected, extends permissions to all subclasses of the corresponding class. Access levels modifiers are commonly used in Java as well as C#, which further provides the internal level. In C++, the only difference between a struct and a class is the default access level, which is private for classes and public for structs.
To illustrate the benefit: consider a public variable which can be accessed from any part of a program. If an error occurs, the culprit could be within any portion of the program, including various sub-dependencies. In a large code base, this leads to thousands of potential sources. Alternatively, consider a private variable. Due to access restrictions, all modifications to its value must occur via functions defined within the class. Therefore, the error is structurally contained within the class. There is often only a single source file for each class, which means debugging only requires evaluation of a single file. With sufficient modularity and minimal access level, large code bases can avoid many challenges associated with complexity.
Example: Bank Balance Class
Retrieved from Java Coffee Break Q&A
public class bank_balance
{
public String owner;
private int balance;
public bank_b |
https://en.wikipedia.org/wiki/Fibonacci%20nim | Fibonacci nim is a mathematical subtraction game, a variant of the game of nim. Players alternate removing coins from a pile, on each move taking at most twice as many coins as the previous move, and winning by taking the last coin. The Fibonacci numbers feature heavily in its analysis; in particular, the first player can win if and only if the starting number of coins is not a Fibonacci number. A complete strategy is known for best play in games with a single pile of counters, but not for variants of the game with multiple piles.
Rules and history
Fibonacci nim is played by two players, who alternate removing coins or other counters from a pile. On the first move, a player is not allowed to take all of the coins, and on each subsequent move, the number of coins removed can be any number that is at most twice the previous move. According to the normal play convention, the player who takes the last coin wins.
The game was first described by Michael J. Whinihan in 1963, crediting its invention to Oregon State University mathematician Robert E. Gaskell. It is called Fibonacci nim because the Fibonacci numbers feature heavily in its analysis.
This game should be distinguished from a different game, also called Fibonacci nim, in which players may remove any Fibonacci number of coins on each move.
Strategy
The strategy for best play in Fibonacci nim involves thinking of the current number of coins as a sum of Fibonacci numbers. There are many ways of representing numbers as sums of Fibonacci numbers, but only one representation that uses each Fibonacci number at most once, and avoids consecutive pairs of Fibonacci numbers; this unique representation is known as its Zeckendorf representation. For instance, the Zeckendorf representation of 10 is 8 + 2; although 10 can also be represented as sums of Fibonacci numbers in other ways, such as 5 + 5 or 5 + 3 + 2, those other ways do not meet the condition of only using each Fibonacci number once and avoiding consecutive pa |
https://en.wikipedia.org/wiki/Cable%20locator | A cable locator or cable avoidance tool (CAT) is an instrument used for detecting the presence and approximate location of buried services in advance of undertaking excavation works. It aims to avoid accidents while excavating. A number of types of detecting technology can be employed by such instruments, including use of magnetic fields, radio frequencies, signal generation, metal detectors, ground-penetrating radar and RFID.
Description
Underground cables are one of the things that enable telecommunication and power transmission. They are especially beneficial to densely populated areas, particularly those locations where overhead cable posts are unavailable or are not ideal.
Locating underground cables—as well as other underground facilities—is an integral pre-excavation process mandated by laws and guided by a number of industry standards. During excavations, underground cables become at risk of getting damaged. In fact, utility strikes are a common occurrence on construction sites, resulting in compromised worker and public safety, repair costs, and work delay, among others.
Based on the 2018 Damage Information Reporting Tool (DIRT) Report of the Common Ground Alliance (CGA), some of the most common root causes of utility strikes include failure to call 811 before digging, improper excavation practices, and inaccurate marking of underground facilities.
Furthermore, the CGA also noted that locator errors are one of the common causes of strike incidents. This emphasizes the need for understanding how cable locators work as well as how different cable types can be most accurately detected.
Detection Methods
Different cable locators employ different methods to function. The two known methods, Passive Utility Detection locating naturally present or naturally produced signals known as a passive signal. The other is to locate a signal that is applied AKA an Active signal , are called the Passive Utility Detection and Active Utility Detection.
It’s important |
https://en.wikipedia.org/wiki/Carry-less%20product | The carry-less product of two binary numbers
is the result of carry-less multiplication of these numbers.
This operation conceptually works like long multiplication
except for the fact that the carry
is discarded instead of applied to the more significant position.
It can be used to model operations over finite fields,
in particular multiplication of polynomials from GF(2)[X],
the polynomial ring over GF(2).
The operation is also known as an XOR multiplication, as carry-discarding addition is equivalent to an exclusive or.
Definition
Given two numbers and ,
with denoting the bits of these numbers.
Then the carry-less product of these two numbers is defined to be
, with each bit computed
as the exclusive or of products of bits from the input numbers as follows:
Example
Consider a = 101000102 and b = 100101102,
with all numbers given in binary.
Then the carry-less multiplication of these is essentially what one would get
from performing a long multiplication but ignoring the carries.
1 0 1 0 0 0 1 0 = a
---------------|---|-------|--
1 0 0 1 0 1 1 0|0 0 0 0 0 0 0
1 0 0 1 0 1 1 0|0 0 0 0 0
1 0 0 1 0 1 1 0|0
------------------------------
1 0 1 1 0 0 0 1 1 1 0 1 1 0 0
^ ^
So the carry-less product of a and b would be c = 1011000111011002.
For every bit set in the number a, the number b is shifted to the left
as many bits as indicated by the position of the bit in a.
All these shifted versions are then combined using an exclusive or,
instead of the regular addition which would be used for regular long multiplication.
This can be seen in the columns indicated by ^, where regular addition
would cause a carry to the column to the left, which does not happen here.
Multiplication of polynomials
The carry-less product can also be seen as a multiplication of polynomials
over the field GF(2).
This is because the exclusive or corresponds to the addition in this field.
In the example above, th |
https://en.wikipedia.org/wiki/Czech%20Hiking%20Markers%20System | The Czech Hiking Markers Standard is an international system of hiking markers for tourist trails, used in more countries than any competing standard. The signs and markers can be used in both wilderness and cities. They are internationally well understandable as they grow from the same tradition in other Central European countries. Similar signs are in use in Austria, Germany, Poland and Switzerland.
Basic hiking markers
The trail usually starts with arrow signs with names of destinations and number of kilometres marked. Each trail is then colour marked by simple markers and arrows painted between white lines (for better visibility) on fixed objects along the trail (trees, rocks, utility posts or walls) in a colour given to a specific trail. The paint is chosen so that it does not impact on the surrounding environment.
Basic implementation of the system requires only a color paint and a brush (plus a cardboard cut matrix for even size of the signs), with which an entire country can be marked.
Nevertheless, many other also very modern features can be added using GPS and mobile phone applications.
Additional features
The basic system of trails with markers painted along the trail can be complemented by other features. These additional features are not necessary for the basic functioning of the system though.
Information boards along the trail, giving information about the trail and its difficulty, nature protection, monuments, animals and trees along the trail. Logos of the supervising institution can be shown.
Printed maps with coloured lines showing the trails.
GPS information on each trail, board or sign
Mobile phone application with a map and site descriptions (electronic tourist guide) contains additional information about the trail difficulty, slope inclination, gives the opportunity of hike planning and features that would not be possible on the signs etc.
Usage and extent
This method of trail blazing has a wide international usage in most of |
https://en.wikipedia.org/wiki/Czech%20Tourist%20Club | Czech Tourist Club (, KČT), known also as Czech Hiking Club was created in 1888. With over 40,000 members, it is a large organisation responsible for maintaining the dense Czech Hiking Markers System.
References
Hiking governing bodies
Outdoor recreation
Signage
Trails
Tourism in the Czech Republic
Clubs and societies in the Czech Republic
1888 establishments in Austria-Hungary |
https://en.wikipedia.org/wiki/IFRS%2017 | IFRS 17 is an International Financial Reporting Standard that was issued by the International Accounting Standards Board in May 2017. It will replace IFRS 4 on accounting for insurance contracts and has an effective date of 1 January 2023. The original effective date was meant to be 1 January 2021. In November 2018 the International Accounting Standards Board proposed to delay the effective date by one year to 1 January 2022. In March 2020, the International Accounting Standards Board further deferred the effective date to 1 January 2023.
List of insurance contracts to which IFRS 17 applies:
Insurance and reinsurance contracts issued by an insurer;
Reinsurance contracts held by an insurer;
Investment contracts with discretionary participation features (DPF) issued by an insurer, provided the insurer also issues insurance contracts.
Under the IFRS 17 general model, insurance contract liabilities will be calculated as the expected present value of future insurance cash flows with a provision for non-financial risk. The discount rate will reflect current time value of money adjusted for financial risk. If the risk-adjusted expected present value of future cash flows would produce a gain at the time a contract is recognized, the model would also require a "contractual service margin" to offset the day 1 gain. The contractual service margin would be released to insurance revenue over the life of the contract. There would also be a new income statement presentation for insurance contracts, including a conceptual definition of revenue, and additional disclosure requirements.
For short-duration insurance contracts, insurers are permitted to use a simplified method, aka. Premium Allocation Approach ('PAA'). Under this simplified method, insurance liability is similar to premium unearned (less insurance acquisition cash flows).
Some insurance contracts include participation features where the entity shares the performance of underlying items with policyholders i |
https://en.wikipedia.org/wiki/Biometric%20tokenization | Biometric tokenization is the process of substituting a stored biometric template with a non-sensitive equivalent, called a token, that lacks extrinsic or exploitable meaning or value. The process combines the biometrics with public-key cryptography to enable the use of a stored biometric template (e.g., fingerprint image on a mobile or desktop device) for secure or strong authentication to applications or other systems without presenting the template in its original, replicable form.
Biometric tokenization in particular builds upon the longstanding practice of tokenization for sequestering secrets in this manner by having the secret, such as user credentials like usernames and passwords or other Personally Identifiable Information (PII), be represented by a substitute key in the public sphere.
The technology is most closely associated with authentication to online applications such as those running on desktop computers, mobile devices, and Internet of Things (IoT) nodes. Specific use cases include secure login, payments, physical access, management of smart, connected products such as connected homes and connected cars, as well as adding a biometric component to two-factor authentication and multi-factor authentication.
Origins
With the September 9, 2014 launch of its Apple Pay service, Cupertino, Calif.-based Apple, Inc. initiated the conversation surrounding use biometricsupported tokenization of payment data for point of sale retail transactions. Apple Pay tokenizes mobile users’ virtualized bank card data in order to wirelessly transmit a payment, represented as a token, to participating retailers that support Apple Pay (e.g. through partnerships and supported hardware). Apple Pay leverages its proprietary Touch ID fingerprint scanner on its proprietary iPhone line with, aside from cryptography, the added security of its Apple A7 system on a chip that includes a Secure Enclave hardware feature that stores and protects the data from the Touch ID fingerprint |
https://en.wikipedia.org/wiki/Notakto | Notakto is a tic-tac-toe variant, also known as neutral or impartial tic-tac-toe. The game is a combination of the games tic-tac-toe and Nim, played across one or several boards with both of the players playing the same piece (an "X" or cross). The game ends when all the boards contain a three-in-a-row of Xs, at which point the player to have made the last move loses the game. However, in this game, unlike tic-tac-toe, there will always be a player who wins any game of Notakto.
Notakto is an impartial game, where the allowable moves depend only on the state of the game and not on which player is taking their turn. When played across multiple boards it is a disjunctive game. The game is attributed to professor and backgammon player Bob Koca, who is said to have invented the game in 2010, when his five-year-old nephew suggested playing a game of tic-tac-toe with both players as "X".
Play
Notakto is played on a finite number of empty three-by-three boards. Then, each player takes turns placing an X on the board(s) in a vacant space (a space not occupied by an X already on the board). If a board has a three-in-a-row, the board is dead and it cannot be played on any more. When one player makes a three-in-a-row and there are no more boards to play on, that player loses.
Optimal strategy
The optimal strategy for a single-board game of Notakto allows the first player to force a win. It is for the first player to play the center and then play a knight's move (two squares vertically and one square horizontally, or vice versa) away from the opponent's play. This strategy works because it makes a boot-like structure, which is called the boot trap. From the boot trap position the first player will be able to force a win.
With two boards, the second player should on their first move play in the center square of the empty board (the one with no Xs in it). Then, the second player sacrifices one of the boards (by making a three-in-a-row) if it is possible. Now, the game is a |
https://en.wikipedia.org/wiki/24-Isopropylcholestane | 24-isopropyl cholestane is an organic molecule produced by specific sponges, protists and marine algae. The identification of this molecule at high abundances in Neoproterozoic rocks has been interpreted to reflect the presence of multicellular life prior to the rapid diversification and radiation of life during the Cambrian explosion. In this transitional period at the start of the Phanerozoic, single-celled organisms evolved to produce many of the evolutionary lineages present on Earth today. Interpreting 24-isopropyl cholestane in ancient rocks as indicating the presence of sponges before this rapid diversification event alters the traditional understanding of the evolution of multicellular life and the coupling of biology to changes in end-Neoproterozoic climate. However, there are several arguments against causally linking 24-isopropyl cholestane to sponges based on considerations of marine algae and the potential alteration of organic molecules over geologic time. In particular the discovery of 24-isopropyl cholestane in rhizarian protists implies that this biomarker cannot be used on its own to trace sponges. Interpreting the presence of 24-isopropyl cholestane in the context of changingglobal biogeochemical cycles at the Proterozoic-Phanerozoic transition remains an area of active research.
24-isopropyl cholestane
Chemical argument for Precambrian sponges
24-isopropyl cholestane (figure 1, left) is a C30 sterane with chemical formula C30H54 and molecular mass 414.76 g/mol. The molecule has a cholestane skeleton with an isopropyl moiety at C24 and is the geologically stable form of 24-isopropyl cholesterol. A related and important molecule is 24-n-propyl cholestane (figure 1, right), also with the cholestane skeleton, but with an n-propyl moiety at C24.
24-isopropyl cholestane is produced copiously by a particular group of sponges in the class Demospongiae within the phylum Porifera. Like other molecular fossils, the presence of 24-isopropyl cholestane in |
https://en.wikipedia.org/wiki/VolturnUS | The VolturnUS is a floating concrete structure that supports a wind turbine, designed by University of Maine Advanced Structures and Composites Center and deployed by DeepCwind Consortium in 2013. The VolturnUS can support wind turbines in water depths of or more.
The DeepCwind Consortium and its partners deployed a 1:8 scale VolturnUS in 2013. Efforts are now underway by Maine Aqua Ventus 1, GP, LLC, to deploy to full-scale VolturnUS structures off the coast of Monhegan Island, Maine, in the UMaine Deepwater Offshore Wind Test Site. This demonstration project, known as New England Aqua Ventus I, is planned to deploy two 6 MW wind turbines by 2020.
The University of Maine announced in September 2017 that its VolturnUS design became the first floating offshore wind turbine to meet American Bureau of Shipping requirements for floating offshore wind turbines, demonstrating the feasibility of the VolturnUS concept.
The design review was conducted against the American Bureau of Shipping (ABS) Guide for Building and Classing Floating Offshore Wind Turbine Installations.
History
North America’s first floating grid-connected wind turbine was lowered into the Penobscot River in Maine on 31 May 2013 by the University of Maine Advanced Structures and Composites Center and its partners.
The VolturnUS 1:8 was towed down the Penobscot River where it was deployed for 18 months in Castine, ME, along with a UMaine-developed floating LiDAR.
The prototype employs a 20 kW Renewegy VP-20 wind turbine with a rotor.
It is tall - that is 1:8 the scale of a 6-megawatt (MW), rotor diameter design. The VolturnUS design utilizes a concrete semi-submersible floating hull and a composite materials tower designed to reduce both capital and operation & maintenance costs, and to allow local manufacturing throughout the US and the world. The VolturnUS technology is the culmination of collaborative research and development conducted by the University of Maine-led DeepCwind Consortium.
Du |
https://en.wikipedia.org/wiki/Mediation-driven%20attachment%20model | In the scale-free network theory (mathematical theory of networks or graph theory), a mediation-driven attachment (MDA) model appears to embody a preferential attachment rule tacitly rather than explicitly. According to MDA rule, a new node first picks a node from the existing network at random and connect itself not with that but with one of the neighbors also picked at random.
Barabasi and Albert in 1999 noted through their seminal paper noted that (i) most natural and man-made networks are not static, rather they grow with time and (ii) new nodes do not connect with an already connected one randomly rather preferentially with respect to their degrees. The later mechanism is called preferential attachment (PA) rule which embodies the rich get richer phenomena in economics. In their first model, known as the Barabási–Albert model, Barabási and Albert (BA model) choose
where, is the probability that the new node picks a node from the labelled nodes of the existing network. It directly embodies the rich get richer mechanism.
Recently, Hassan et al. proposed a mediation-driven attachment model which appears to embody the PA rule but not directly rather in disguise. In the MDA model, an incoming node choose an existing node to connect by first picking one of the existing nodes at random which is regarded as mediator. The new node then connect with one of the neighbors of the mediator which is also picked at random. Now the question is: What is the probability that an already existing node is finally picked to connect it with the new node? Say, the node has degree and hence it has neighbors. Consider that the neighbors of are labeled which have degrees respectively. One can reach the node from each of these nodes with probabilities inverse of their respective degrees, and each of the nodes are likely to be picked at random with probability . Thus the probability of the MDA model is:
It can be re-written as
where the factor is the inverse of |
https://en.wikipedia.org/wiki/Siae%20Microelettronica | Siae Microelettronica is an Italian multinational corporation and a global supplier of telecom network equipment. It provides wireless backhaul and fronthaul solutions that comprise microwave and millimeter wave radio systems, along with fiber optics transmission systems provided by its subsidiary SM Optics.
The company is headquartered in Milan, Italy, with 26 regional offices around the globe.
Corporate history
1952–1970s: Origins and initial growth
Edoardo Mascetti, after graduating in 1949 in Electrical Engineering at the Polytechnic University of Milan and working as electronic designer for Siemens, founded his company and named it SIAE, acronym for Società Italiana Apparecchiature Elettroniche The company manufactured measurement systems such as electro-mechanical testers, analog oscilloscopes, telephone system analyzers and signal generators.
A 431A-model oscilloscope by SIAE was also part of the synthesizer in the Studio di fonologia musicale di Radio Milano (RAI) until its dismissal in 1983 and is currently on permanent display with the original study equipment at the Musical Instrument museum hosted at the Castello Sforzesco, Milan.
A few years after founding SIAE, Edoardo Mascetti co-founded in 1958 Microelettronica S.p.A., a company whose business was the design of telecommunication equipment for radio and landline systems and which was initially located in a basement in Milan. In 1963, the two complementary companies were merged into Siae Microelettronica S.p.A. and the headquarters was moved to the nearby town of Cologno Monzese, where a larger area was available to accommodate the new offices and manufacturing plant.
The new company counted less than 50 employees and focused its business on telecommunication systems, which were rising thanks to the capillary diffusion of telephone systems in Italy. Analog multiplexing systems for telephone providers constituted the company's principal product; nonetheless, in 1963, the company began an active co |
https://en.wikipedia.org/wiki/AI%20Bridging%20Cloud%20Infrastructure | AI Bridging Cloud Infrastructure (ABCI) is a planned supercomputer being built at the University of Tokyo for use in artificial intelligence, machine learning, and deep learning. It is being built by Japan's National Institute of Advanced Industrial Science and Technology. ABCI is expected to be completed in first quarter 2018 with a planned performance of 130 petaFLOPS. Power consumption is targeting 3 megawatts, and a planned power usage effectiveness of 1.1. If performance meets expectations, ABCI would be the second most powerful supercomputer built, surpassing the current leader Sunway TaihuLight's 93 petaflops. But still behind the Summit (supercomputer).
History
In November 2014 it was announced that a 160 petaFLOPS system will be built for ( – ), with construction to begin in 2017.
In October 2017 Fujitsu got the contract to build a 37 petaFLOPS system for .
Design
The design of the ABCI is to be focused on low precision floating point, big data, and artificial intelligence applications; rather than Linpack performance.
Projects
The ABCI is planned to be available to Japanese corporations, small businesses, and researchers; reducing their dependence on foreign cloud computing providers such as Microsoft and Google.
References
Fujitsu supercomputers
GPGPU supercomputers
Petascale computers
Supercomputing in Japan
University of Tokyo
X86 supercomputers |
https://en.wikipedia.org/wiki/Associativity-based%20routing | Associativity-based routing (commonly known as ABR) is a mobile routing protocol invented for wireless ad hoc networks, also known as mobile ad hoc networks (MANETs) and wireless mesh networks. ABR was invented in 1993, filed for a U.S. patent in 1996, and granted the patent in 1999. ABR was invented by Chai Keong Toh while doing his Ph.D. at Cambridge University.
Route discovery phase
ABR has three phases. The first phase is the route discovery phase. When a user initiates to transmit data, the protocol will intercept the request and broadcast a search packet over the wireless interfaces. As the search packet propagates node to node, node identity and stability information are appended to the packet. When the packet eventually reaches the destination node, it would have received all the information describing the path from source to destination. When that happens, the destination then chooses the best route (because there may be more than one path from the source to the destination) and sends a REPLY back to the source node, over the chosen path.
Note that when the packet transits backwards from destination to the source, each intermediate node will update their routing table, signifying that it will now know how to route when it receives data from the upstream node. When the source node receives the REPLY, the route is successfully discovered and established. This process is done in real-time and only takes a few milli-seconds.
Route reconstruction phase
ABR establishes routes that are long-lived or associativity-stable, thus most routes established will seldom experience link breaks; however, if one or more links are broken, their ABR will immediately invoke the RRC – route reconstruction phase. The RRC basically repairs the broken link by having the upstream node (which senses the link break) perform a localized route repair. The localized route repair is performed by carrying out a localized broadcast query that searches for an alternative long-lived parti |
https://en.wikipedia.org/wiki/Lotus%20Multi-Byte%20Character%20Set | The Lotus Multi-Byte Character Set (LMBCS) is a proprietary multi-byte character encoding originally conceived in 1988 at Lotus Development Corporation with input from Bob Balaban and others. Created around the same time and addressing some of the same problems, LMBCS could be viewed as parallel development and possible alternative to Unicode. For maximum compatibility, later issues of LMBCS incorporate UTF-16 as a subset.
Commercially, LMBCS was first introduced as the default character set of Lotus 1-2-3 Release 3 for DOS in March 1989 and Lotus 1-2-3/G Release 1 for OS/2 in 1990 replacing the 8-bit Lotus International Character Set (LICS) and ASCII used in earlier DOS-only versions of Lotus 1-2-3 and Symphony. LMBCS is also used in IBM/Lotus SmartSuite, Notes and Domino, as well as in a number of third-party products.
LMBCS encodes the characters required for languages using the Latin, Arabic, Hebrew, Greek and Cyrillic scripts, the Thai, Chinese, Japanese and Korean writing systems, and technical symbols.
Encodings
Technically, LMBCS is a lead-byte encoding where code point 00hex as well as code points 20hex (32) to 7Fhex (127) are identical to ASCII (as well as to LICS).
Code point 00hex is always treated as NUL character to ensure maximum code compatibility with existing software libraries dealing with null-terminated strings in many programming languages such as C. This applies even to the UTF-16be codes, where code words with the form xx00hex are mapped to private-use codes with the form F6xxhex during encoding in order to avoid the use of NUL bytes, and to escaped control characters, where 20hex is added to the C0 (but not C1) control characters following the 0Fhex lead byte.
Code points 01hex to 1Fhex, which serve as control codes in ASCII, are used as lead bytes to switch the definition of code points above 7Fhex between several code groups (similar to code pages) and at the same time determine either a single- or multi-byte nature for the correspon |
https://en.wikipedia.org/wiki/SwellRT | SwellRT was a free and open-source backend-as-a-service and API focused to ease development of apps featuring real-time collaboration. It supported the building of mobile and web apps, and aims to facilitate interoperability and federation.
History
Origins
SwellRT has its origins in the work done within the GRASIA research team at the Universidad Complutense de Madrid, as part of the EU-funded project P2Pvalue (2013–2016), in a team led by Samer Hassan. In 2014, the developer Pablo Ojanguren took the lead in forking Apache Wave, dropping several components, re-engineering it, and building a "Wave API" to build applications on top. In 2015, such Wave API became a standalone product named SwellRT.
Impact on Apache Wave project
In 2016, several discussions took place within the Apache Wave community, aiming to tackle the stagnation and crisis state of the project. The Apache Software Foundation mentor of Apache Wave, Upayavira, was concerned on the project stagnation, but framed SwellRT as Wave's potential savior:Once more Wave is on the brink of retirement. However, this time, an offer has been made of code from SwellRT, which is a fork of Wave itself, and a concall has been scheduled for interested parties to discuss whether it is a go-er. It is my (limited) understanding that many of the complexity issues in the Wave code that have prevented community development have been resolved in SwellRT. Eventually, Wave was approved to continue within Apache incubator program, and a copy of SwellRT codebase was placed in the Apache Wave repository in order to grant the Wave community access to it. In this regard, Intellectual Property of SwellRT was transferred to the Apache Foundation in 2017.
Recognition
In both 2016 and 2017, SwellRT participated in the Google Summer of Code as part of the set of projects from the Berkman Klein Center for Internet and Society at Harvard University. In both years, the contributions were highly relevant. In 2016, SwellRT replaced its |
https://en.wikipedia.org/wiki/Crackling%20noise | Crackling noise arises when a system is subject to an external force and it responds via events that appear very similar at many different scales. In a classical system there are usually two states, on and off. However, sometimes a state can exist in between. There are three main categories this noise can be sorted into: the first is popping where events at very similar magnitude occur continuously and randomly, e.g. popcorn; the second is snapping where there is little change in the system until a critical threshold is surpassed, at which point the whole system flips from one state to another, e.g. snapping a pencil; the third is crackling which is a combination of popping and snapping, where there are some small and some large events with a relation law predicting their occurrences, referred to as universality. Crackling can be observed in many natural phenomena, e.g. crumpling paper, candy wrappers (or other elastic sheets), fire, occurrences of earthquakes and the magnetisation of ferromagnetic material.
Cracking noise contrasts with snapping noise and popping noise. Snapping noise is one large yielding event, while popping noise is a constant level of similar-sized, small yielding events. Crackling is between these. It occurs when connection strengths between components of the system is at a critical level, such that there are many yielding events with sizes spanned across several orders of magnitude.
Some of these systems are reversible, such as demagnetisation (by heating a magnet to its Curie temperature), while others are irreversible, such as an avalanche (where the snow can only move down a mountain), but many systems have a positive bias causing it to eventually move from one state to another, such as gravity or another external force.
Theory
Barkhausen noise
Research into the study of small perturbations within a large domains began in the late 1910s when Heinrich Barkhausen investigated how the domains, or dipoles, within a ferromagnetic material |
https://en.wikipedia.org/wiki/Simon%20Cherry | Simon R. Cherry is a biomedical engineer, and is currently a Distinguished Professor at University of California, Davis, and a published author.
In 2016, Cherry was elected as a member to the National Academy of Engineering for "development of nuclear emission imaging and magnetic resonance technologies for medical science".
References
External links
Living people
American biomedical engineers
University of California, Davis faculty
21st-century American scientists
Fellows of the Biomedical Engineering Society
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Eisengarn | Eisengarn, meaning "iron yarn" in English, is a light-reflecting, strong, waxed-cotton thread. It was invented and manufactured in Germany in the mid-19th century, but is now best known for its use in cloth woven for the tubular-steel chairs designed by Marcel Breuer while he was a teacher at the Bauhaus design school.
The yarn is also known as Glanzgarn ('gloss' or 'glazed' yarn).
Manufacture
Despite the name, there is no iron in Eisengarn. The name refers to its strength and metallic shine. It is made by soaking cotton threads in a starch and paraffin wax solution. The threads are dried and then stretched and polished by steel rollers and brushes. The end result of the process is a lustrous, tear-resistant yarn which is extremely hardwearing.
History
The Eisengarn manufacturing process was invented in the mid-19th century in a factory in Barmen, now part of the city of Wuppertal, east of the river Rhine.
It was used as a sewing thread and for making lace, shoe laces, hat strings, ribbons, lining materials and in the cable industry.
The manufacture of the yarn gave a considerable boost to the textile industry of Barmen and the surrounding region. By 1875, the Wuppertal company Barthels & Feldhoff employed more than 300 people in Eisengarn production.
In 1927 the weaver and textile designer Margaretha Reichardt (1907–1984), then a student at the Bauhaus design school, experimented and improved the quality of the thread and developed cloth and strapping material made from Eisengarn for use on Marcel Breuer's tubular steel chairs, such as the Wassily Chair.
Light-weight tubular steel seating was also used in aircraft seating in the 1930s and Reichardt's improved version of Eisengarn was used as a covering for the seats.
A more prosaic use for the strong Eisengarn was, and still is, for making colourful string shopping bags, which were popular in the former East Germany, and are now an Ostalgie item. When the bag is not in use, the nature of the Eisengarn |
https://en.wikipedia.org/wiki/Graded-symmetric%20algebra | In algebra, given a commutative ring R, the graded-symmetric algebra of a graded R-module M is the quotient of the tensor algebra of M by the ideal I generated by elements of the form:
when |x | is odd
for homogeneous elements x, y in M of degree |x |, |y |. By construction, a graded-symmetric algebra is graded-commutative; i.e., and is universal for this.
In spite of the name, the notion is a common generalization of a symmetric algebra and an exterior algebra: indeed, if V is a (non-graded) R-module, then the graded-symmetric algebra of V with trivial grading is the usual symmetric algebra of V. Similarly, the graded-symmetric algebra of the graded module with V in degree one and zero elsewhere is the exterior algebra of V.
References
David Eisenbud, Commutative Algebra. With a view toward algebraic geometry, Graduate Texts in Mathematics, vol 150, Springer-Verlag, New York, 1995.
External links
Ring theory |
https://en.wikipedia.org/wiki/Graded-commutative%20ring | In algebra, a graded-commutative ring (also called a skew-commutative ring) is a graded ring that is commutative in the graded sense; that is, homogeneous elements x, y satisfy
where |x | and |y | denote the degrees of x and y.
A commutative (non-graded) ring, with trivial grading, is a basic example. For example, an exterior algebra is generally not a commutative ring but is a graded-commutative ring.
A cup product on cohomology satisfies the skew-commutative relation; hence, a cohomology ring is graded-commutative. In fact, many examples of graded-commutative rings come from algebraic topology and homological algebra.
References
David Eisenbud, Commutative Algebra. With a view toward algebraic geometry, Graduate Texts in Mathematics, vol 150, Springer-Verlag, New York, 1995.
See also
DG algebra
graded-symmetric algebra
alternating algebra
supercommutative algebra
Abstract algebra |
https://en.wikipedia.org/wiki/Code%20Words | Code Words is an online publication about computer programming produced by the Recurse Center retreat community. It began publishing in December 2014, and has a quarterly schedule.
The journal features original work by participants at the center, including visiting “residents” and alumni. It is intended to “share the joyful approach to programming and learning that typifies” the community, and to be “accessible and useful to both new and seasoned programmers.”
Topics commonly treated include the inner workings of programming tools such as Git; Computer Science concepts such as propositional logic, data types, and random forests; and treatments of diverse problems encountered in actual programming.
The supervising editor is Rachel Honor Vincent, with individual articles co-edited by members of the community. Contributions are licensed under the Creative Commons CC BY-NC-SA 4.0 license.
References
External links
Official website
List of issues
Academic publishing
Computer programming
Electronic publishing |
https://en.wikipedia.org/wiki/Endogenosymbiosis | Endogenosymbiosis is an evolutionary process, proposed by the evolutionary and environmental biologist Roberto Cazzolla Gatti, in which "gene carriers" (viruses, retroviruses and bacteriophages) and symbiotic prokaryotic cells (bacteria or archaea) could share parts or all of their genomes in an endogenous symbiotic relationship with their hosts.
Context
The related process of symbiogenesis or endosymbiosis was proposed by Lynn Margulis in 1967. She argued that the internal symbiosis of bacteria-like organisms had formed organelles like chloroplasts and mitochondria. She proposed that this had created the eukaryotes, and thus driven the expansion of life on Earth. She had argued that this process of symbiotic collaboration had run alongside the classical Darwinian cycle of mutation, natural selection and adaptation.
Genetic symbiosis from parasites
Roberto Cazzolla Gatti, Ph.D., associate professor at Tomsk State University (Russia), argued in his hypothesis that "the main likely cause of the evolution of sexual reproduction, the parasitism, also represents the origin of biodiversity".
In other terms, this theory suggests that sexual reproduction acts as a conservative system against the inclusion of new genetic variations into cells' DNA (supported by the DNA repair systems) and, instead, the evolution of species can take place only when this preservative system fails to contrast the inclusion, within the host genome, of hexogen parts of DNA (and RNA) coming from obliged "parasitic" elements (viruses and phages) that establish a symbiosis with their hosts.
"As two parallel evolutionary lines – Cazzolla Gatti wrote in his original paper – sexual reproduction seems to preserve what the endogenosymbiosis moves to diversify. Following the former process, the species can adapt slowly and indefinitely to the external factors, adjusting themselves, but not 'creating' novelty. The latter process, instead, leads to the speciation due to sudden changes in genes sequen |
https://en.wikipedia.org/wiki/Plant%20LED%20incubator | A plant LED incubator is a chamber which can automatically control the environment of the plant. It can control the temperature, moisture, and especially light regime of the plant based on light emitting diodes (LEDs). LEDs have efficient electric lighting with desired wavelengths (Red+Blue) which support greenhouse production in a minimum time and with high quality and quantity. As LEDs are cool it helps plants to be placed as close as possible to light sources without overheating or scorching. This saves space for intense cultivation. It could provide the opportunity of greenhouse-produced fruits and vegetable to be available for the market more quickly and less expensively due to the effect of LED lighting on earliness, compactness and quality of products .
Incandescent and fluorescent lamps currently available for lighting greenhouse, phytotrones and plant incubators emit color bands that may cause unwanted stem elongation and low quality in plant species, are electrically inefficient, short-lived, and particularly not eco-friendly for having hazardous waste disposal issues.
On the other side, high-pressure sodium (HPS) discharge lamps have been well established in the greenhouses for their sufficient light intensities which support transplants and seedlings growth and development. Unfortunately, they have also many drawbacks. They are intensely hot and scorch nearby plant tissues, consume high electrical energy and as fluorescent lamps do not emit the exact required light wavelengths for optimum plant growth
Scientific experiments
A large number of plant species have been assessed in greenhouse trials to make sure plants have higher quality in biomass and biochemical ingredients even higher or comparable with field conditions. Plant performance of mint, basil, lentil, lettuce, cabbage, parsley, carrot and… were measured by assessing health and vigor of plants and success in promoting growth. Promoting in profuse flowering of select ornamentals including prim |
https://en.wikipedia.org/wiki/Islamic%20Association%20of%20Engineers%20of%20Iran | Islamic Association of Engineers of Iran () is an Iranian political party of engineers affiliated with the Council for Coordinating the Reforms Front.
Party leaders
References
Reformist political groups in Iran
1991 establishments in Iran
Political parties established in 1991
Engineering organizations |
https://en.wikipedia.org/wiki/Islamic%20Association%20of%20Engineers | The Islamic Association of Engineers () is a civic and professional association in Iran founded in 1957.
The organization is a platform for Islamic modernist activists and a forum for debating key issues among them. It holds regular meetings, lectures and research and turns them into books.
Mehdi Bazargan and Ezzatollah Sahabi were among its founders. Alongside Islamic Association of Students, the organization was active against outreach of Marxist ideology before Iranian Revolution and was one of the professional bodies that served as a platform for religious activism, playing an important role in shaping the Islamic ideology of the revolution. Ali Shariati was among occasional lecturers at the organization. A number of leading members in the association held government portfolios during Interim Government of Iran.
References
1957 establishments in Iran
Islamic political organizations
Engineering societies
Islamic organisations based in Iran
Professional associations based in Iran
Organizations established in 1957
Freedom Movement of Iran |
https://en.wikipedia.org/wiki/Turn%20restriction%20routing | A routing algorithm decides the path followed by a packet from the source to destination routers in a network. An important aspect to be considered while designing a routing algorithm is avoiding a deadlock. Turn restriction routing is a routing algorithm for mesh-family of topologies which avoids deadlocks by restricting the types of turns that are allowed in the algorithm while determining the route from source node to destination node in a network.
Reason for deadlock
A deadlock (shown in fig 1) is a situation in which no further transportation of packets can take place due to the saturation of network resources like buffers or links. The main reason for a deadlock is the cyclic acquisition of channels in the network. For example, consider there are four channels in a network. Four packets have filled up the input buffers of these four channels and needs to be forwarded to the next channel. Now assume that the output buffers of all these channels are also filled with packets that need to be transmitted to the next channel. If these four channels form a cycle, it is impossible to transmit packets any further because the output buffers and input buffers of all channels are already full. This is known as cyclic acquisition of channels and this results in a deadlock.
Solution to deadlock
Deadlocks can either be detected, broken or avoided from happening altogether. Detecting and breaking deadlocks in the network is expensive in terms of latency and resources. So an easy and inexpensive solution is to avoid deadlocks by choosing routing techniques that prevent cyclic acquisition of channels.
Logic behind turn restriction routing
Logic behind turn restriction routing derives from a key observation. A cyclic acquisition of channels can take place only if all the four possible clockwise (or anti-clockwise) turns have occurred. This means deadlocks can be avoided by prohibiting at least one of the clockwise turns and one of the anti-clockwise turns. All the clockwis |
https://en.wikipedia.org/wiki/Hypercube%20internetwork%20topology | In computer networking, hypercube networks are a type of network topology used to connect multiple processors with memory modules and accurately route data. Hypercube networks consist of nodes, which form the vertices of squares to create an internetwork connection. A hypercube is basically a multidimensional mesh network with two nodes in each dimension. Due to similarity, such topologies are usually grouped into a -ary -dimensional mesh topology family, where represents the number of dimensions and represents the number of nodes in each dimension.
Topology
Hypercube interconnection network is formed by connecting N nodes that can be expressed as a power of 2. This means if the network has N nodes it can be expressed as :
where m is the number of bits that are required to label the nodes in the network. So, if there are 4 nodes in the network, 2 bits are needed to represent all the nodes in the network. The network is constructed by connecting the nodes that just differ by one bit in their binary representation. This is commonly referred to as Binary labelling. A 3D hypercube internetwork would be a cube with 8 nodes and 12 edges. A 4D hypercube network can be created by duplicating two 3D networks, and adding a most significant bit. The new added bit should be ‘0’ for one 3D hypercube and ‘1’ for the other 3D hypercube. The corners of the respective one-bit changed MSBs are connected to create the higher hypercube network. This method can be used to construct any m-bit represented hypercube with (m-1)-bit represented hypercube.
E-Cube Routing
Routing method for a hypercube network is referred to as E-Cube routing. The distance between two nodes in the network can be given by Hamming weight of (number of ones in) the XOR-operation between their respective binary labels.
The distance between Node 1 (represented as ‘01’) and Node 2 (represented as ‘10’) in the network given by:
E-Cube routing is a static routing method that employs XY-routing algorithm. Thi |
https://en.wikipedia.org/wiki/Butterfly%20network | A butterfly network is a technique to link multiple computers into a high-speed network. This form of multistage interconnection network topology can be used to connect different nodes in a multiprocessor system. The interconnect network for a shared memory multiprocessor system must have low latency and high bandwidth unlike other network systems, like local area networks (LANs) or internet for three reasons:
Messages are relatively short as most messages are coherence protocol requests and responses without data.
Messages are generated frequently because each read-miss or write-miss generates messages to every node in the system to ensure coherence. Read/write misses occur when the requested data is not in the processor's cache and must be fetched either from memory or from another processor's cache.
Messages are generated frequently, therefore rendering it difficult for the processors to hide the communication delay.
Components
The major components of an interconnect network are:
Processor nodes, which consist of one or more processors along with their caches, memories and communication assist.
Switching nodes (Router), which connect communication assist of different processor nodes in a system. In multistage topologies, higher level switching nodes connect to lower level switching nodes as shown in figure 1, where switching nodes in rank 0 connect to processor nodes directly while switching nodes in rank 1 connect to switching nodes in rank 0.
Links, which are physical wires between two switching nodes. They can be uni-directional or bi-directional.
These multistage networks have lower cost than a cross bar, but obtain lower contention than a bus. The ratio of switching nodes to processor nodes is greater than one in a butterfly network. Such topology, where the ratio of switching nodes to processor nodes is greater than one, is called an indirect topology.
The network derives its name from connections between nodes in two adjacent |
https://en.wikipedia.org/wiki/Niche%20%28video%20game%29 | Niche: A Genetics Survival Game is a simulation video game developed and published by Stray Fawn Studio. It entered early access for Microsoft Windows, Mac OS, and Linux-based systems in September 2016 after a successful Kickstarter crowd-funding campaign and was released in September 2017. Its main aim is to breed certain traits or genes into a group of canine or feline creatures to make the pack genetically perfect for its environment.
Gameplay
The game starts off with the player choosing story mode, a quick how-to tutorial or sandbox mode, where the player chooses their animals and terrain for their tribes and environment and a short cut-scene of a tribe of nichelings living on an island. A large bird takes a child niche and tries to fly off with him but he falls onto a random island. This starts off the game by playing as a nicheling named Adam and the tutorial level. Game play and turns are organized into "days" which gives each animal a few actions of play each day.
Niche's game mechanics were inspired by population genetics and effectively provide what is considered a fairly realistic genetic gaming experience. Animals can perish due to illness, injury, and even old age, so learning what will help them thrive with consideration to their living environment is key to not only building a solid tribe, but winning the game as well. Niche simulates over 100 genes, houses 4 different biomes with each having their very own predators, plants, and prey. Within the 100 available genes, there are characteristic options which a player can choose in order to realistically develop their own animal species, some of which detail physical characteristics, disease immunity, fertility, and overall dexterity. There are additional genetic options available as the gamer unlocks and utilizes new environments and events in-game.
Development
Niche was crowdfunded on Kickstarter. It was inspired by Creatures, Spore, and Don't Starve. It entered early access in 2016. Stray Fawn di |
https://en.wikipedia.org/wiki/Lviv%20in%20Polish | Lviv in Polish (, ) is a series of guidebooks by Kseniya Borodin and Ivanna Honak, devoted to Polish ghost signs in the city of Lviv, Ukraine. It explores the history of the city through a variety of different types of publicly accessible signs and inscriptions, illustrated with over 300 original photographs. The series was originally written in Ukrainian and has been translated into Polish.
Lviv () was part of Polish territory until 1946, when it was ceded to Ukrainian SSR of the Soviet Union in the aftermath of the Second World War. The vast majority of its Polish population was expelled from the city in post-war population transfers.
There are six books in the series, including:
House Names and Other Inscriptions analyses over two hundred domestic inscriptions, including the names of houses and villas, signatures of architects and sculptors, pre-Soviet house numbers and plaques ().
Everyday Urban Life depicts ghost signs surviving on former schools, banks, factories, shops, hotels and other institutions ().
Seals of Quality covers manufacturer's marks from producers of tiles, marble, stained glass windows, cast iron fences and manhole covers ().
References
• Krzysztof Wojciechowski Co warto wiedzieć o książce „Lwów po polsku. Imię domu oraz inne napisy” cz. 1 // http://kresowiacy.com/2013/05/co-warto-wiedziec-o-ksiazce-lwow-po-polsku-imie-domu-oraz-inne-napisy/
• Agnieszka Biedrzycka Borodin K., Honak I. Imię domu oraz inne napisy : Przewodnik. – Lwów; Drohobycz : Koło, 2012. – 96 ss.; Borodin K., Honak I. Miejskie życie na co dzień : Przewodnik. – Lwów; Drohobycz : Koło, 2013. – 128 ss. // Krakowskie pismo kresowe. – R. 7 (2015). – S. 143–155.
History of Lviv
Signage
Books about Ukraine |
https://en.wikipedia.org/wiki/Hundred%20Fowls%20Problem | The Hundred Fowls Problem is a problem first discussed in the fifth century CE Chinese mathematics text Zhang Qiujian suanjing (The Mathematical Classic of Zhang Qiujian), a book of mathematical problems written by Zhang Qiujian. It is one of the best known examples of indeterminate problems in the early history of mathematics. The problem appears as the final problem in Zhang Qiujian suanjing (Problem 38 in Chapter 3). However, the problem and its variants have appeared in the medieval mathematical literature of India, Europe and the Arab world.
The name "Hundred Fowls Problem" is due to the Belgian historian Louis van Hee.
Problem statement
The Hundred Fowls Problem as presented in Zhang Qiujian suanjing can be translated as follows:
"Now one cock is worth 5 qian, one hen 3 qian and 3 chicks 1 qian. It is required to buy 100 fowls with 100 qian. In each case, find the number of cocks, hens and chicks bought."
Mathematical formulation
Let x be the number of cocks, y be the number of hens, and z be the number of chicks, then the problem is to find x, y and z satisfying the following equations:
x + y +z = 100
5x + 3y + z/3 = 100
Obviously, only non-negative integer values are acceptable. Expressing y and z in terms of x we get
y = 25 − (7/4)x
z = 75 + (3/4)x
Since x, y and z all must be integers, the expression for y suggests that x must be a multiple of 4. Hence the general solution of the system of equations can be expressed using an integer parameter t as follows:
x = 4t
y = 25 − 7t
z = 75 + 3t
Since y should be a non-negative integer, the only possible values of t are 0, 1, 2 and 3. So the complete set of solutions is given by
(x,y,z) = (0,25,75), (4,18,78), (8,11,81), (12,4,84).
of which the last three have been given in Zhang Qiujian suanjing. However, no general method for solving such problems has been indicated, leading to a suspicion of whether the solutions have been obtained by trial and error.
The Hundred Fowls Problem found in |
https://en.wikipedia.org/wiki/List%20of%20signalling%20pathways | In cell biology, there are a multitude of signalling pathways. Cell signalling is part of the molecular biology system that controls and coordinates the actions of cells.
Akt/PKB signalling pathway
AMPK signalling pathway
cAMP-dependent pathway
Eph/ephrin signalling pathway
Hedgehog signalling pathway
Hippo signalling pathway
Insulin signal transduction pathway
JAK-STAT signalling pathway
MAPK/ERK signalling pathway
mTOR signalling pathway
Nodal signalling pathway
Notch signalling pathway
PI3K/AKT/mTOR signalling pathway
TGF beta signalling pathway
TLR signalling pathway
VEGF signalling pathway
Wnt signalling pathway
References
Cell signaling
Signalling pathways |
https://en.wikipedia.org/wiki/Loading%20control | A loading control is a protein used as a control in a Western blotting experiment. Typically, loading controls are proteins with high and ubiquitous expression, such as beta-actin or GADPH. They are used to make sure that the protein has been loaded equally across all wells.
References
Molecular biology |
https://en.wikipedia.org/wiki/Lotus%20International%20Character%20Set | The Lotus International Character Set (LICS) is a proprietary single-byte character encoding introduced in 1985 by Lotus Development Corporation. It is based on the 1983 DEC Multinational Character Set (MCS) for VT220 terminals. As such, LICS is also similar to two other descendants of MCS, the ECMA-94 character set of 1985 and the ISO 8859-1 (Latin-1) character set of 1987.
LICS was first introduced as the character set of Lotus 1-2-3 Release 2 for DOS in 1985. It is also utilized by 2.01, 2.2, 2.3 and 2.4 as well as by Symphony. It was also utilized in a number of third-party spreadsheet products emulating the file format. LICS was superseded by the Lotus Multi-Byte Character Set (LMBCS) introduced by Lotus 1-2-3 Release 3 in 1989.
Character set
Codepoints 20hex (32) to 7Fhex (127) are identical to ASCII (as well as to LMBCS). For some characters the table also lists dedicated Lotus 1-2-3 compose key sequences to ease character input beyond the Alt Numpad input method.
See also
Lotus Multi-Byte Character Set (LMBCS)
DEC Multinational Character Set (MCS)
BraSCII
References
Further reading
(May help retrieving info on LICS.)
Lotus 1-2-3 Release 2.x User Guide Appendix A. (NB. Reportedly contains info on LICS.)
The file LICS.EAT ("Extended ASCII Table") in Lotus 1-2-3 Release 2.x for DOS reportedly contains detailed info on LICS.
The Lotus Symphony 1.2 and Notes 2.1 Character Translation File (CTF) LICS850.CTF and the Notes 3.0 Country Language Services (CLS) file L_LICS.CLS contain LICS character translation information.
(NB. Temporarily left here for quick reference, but contains somewhat confused info.)
https://sourceforge.net/p/libwps/code/ci/master/tree/src/lib/libwps_tools_win.cpp (Contains a LICS to Unicode conversion routine, which, however, is buggy)
Computer-related introductions in 1985
Character encoding
Character sets
Lotus Software software |
https://en.wikipedia.org/wiki/Mantou%20kiln | The mantou kiln () or horseshoe-shaped kiln was the most common type of pottery kiln in north China, in historical periods when the dragon kiln dominated south China; both seem to have emerged in the Warring States period of approximately 475 to 221 BC. It is named (in both English and Chinese) after the Chinese mantou bun or roll, whose shape it (very approximately) resembles; the ground plan resembles a horseshoe. The kilns are roughly round, with a low dome covering the central firing area, and are generally only 2 to 3 metres across inside. However it is capable of reaching very high temperatures, up to about 1370°C. There is a door or bricked-up opening at the front for loading and unloading, and one or two short chimneys at the rear.
They are one type of "cross-draught" kilns, where the flames travel more or less horizontally, rather than up from or down to the floor. The kilns were normally made of brick; sometimes most of the structure was dug out below the loess soil, with only the dome and chimney protruding above ground. In either case the interior was normally lined with a refractory fireclay. In some cases, especially in later periods, the fire box was approached by a tunnel. Initially the kilns were fired with wood, but during the Northern Song period (960–1127) there was a general switch to coal, easily found in north China, which required a smaller fire box, but the introduction of saggars to protect the pieces from gritty coal ash. This changed the reducing quality of the atmosphere during firing, which affected the colours of various wares, wood giving a reducing atmosphere and coal an oxidizing one. A firing might take as long as two weeks, including the cooling time.
The details of the design could be very variable. A temporary "bag wall" might be built at the front of the kiln, once loaded, to protect the wares from the direct flames, and enclose the fire. The back interior wall might be straight, giving a semi-circular shape to the chamber. V |
https://en.wikipedia.org/wiki/Pseudoenzyme | Pseudoenzymes are variants of enzymes (usually proteins) that are catalytically-deficient (usually inactive), meaning that they perform little or no enzyme catalysis. They are believed to be represented in all major enzyme families in the kingdoms of life, where they have important signaling and metabolic functions, many of which are only now coming to light. Pseudoenzymes are becoming increasingly important to analyse, especially as the bioinformatic analysis of genomes reveals their ubiquity. Their important regulatory and sometimes disease-associated functions in metabolic and signalling pathways are also shedding new light on the non-catalytic functions of active enzymes, of moonlighting proteins, the re-purposing of proteins in distinct cellular roles (Protein moonlighting). They are also suggesting new ways to target and interpret cellular signalling mechanisms using small molecules and drugs. The most intensively analyzed, and certainly the best understood pseudoenzymes in terms of cellular signalling functions are probably the pseudokinases, the pseudoproteases and the pseudophosphatases. Recently, the pseudo-deubiquitylases have also begun to gain prominence.
Structures and roles
The difference between enzymatically active and inactive homologues has been noted (and in some cases, understood when comparing catalytically active and inactive proteins residing in recognisable families) for some time at the sequence level, and some pseudoenzymes have also been referred to as 'prozymes' when they were analysed in protozoan parasites. The best studied pseudoenzymes reside amongst various key signalling superfamilies of enzymes, such as the proteases, the protein kinases, protein phosphatases and ubiquitin modifying enzymes. The role of pseudoenzymes as "pseudo scaffolds" has also been recognised and pseudoenzymes are now beginning to be more thoroughly studied in terms of their biology and function, in large part because they are also interesting potential tar |
https://en.wikipedia.org/wiki/Diamond%20battery | Diamond battery is the name of a nuclear battery concept proposed by the University of Bristol Cabot Institute during its annual lecture held on 25 November 2016 at the Wills Memorial Building. This battery is proposed to run on the radioactivity of waste graphite blocks (previously used as neutron moderator material in graphite-moderated reactors) and would generate small amounts of electricity for thousands of years.
The battery is a betavoltaic cell using carbon-14 (14C) in the form of diamond-like carbon (DLC) as the beta radiation source, and additional normal-carbon DLC to make the necessary semiconductor junction and encapsulate the carbon-14.
Prototypes
Currently, no known prototype uses 14C as its source. There are, however, some prototypes that use nickel-63 (63Ni) as their source with diamond non-electrolytes/semiconductors for energy conversion, which are seen as a stepping stone to a possible 14C diamond battery prototype.
University of Bristol prototype
In 2016, researchers from the University of Bristol claimed to have constructed one of those 63Ni prototypes.
From their FAQ, the estimated power of a small C-14 cell is 15 J/day for thousands of years. (For reference, a AA battery of the same size has about 10 kJ total, which is equivalent to 15 J/day for just 2 years.) They note it is not possible to directly replace a AA battery with this technology, because a AA battery can produce bursts of much higher power as well. Instead, the diamond battery is aimed at applications where a low discharge rate over a long period of time is required, such as space exploration, medical devices, seabed communications, microelectronics, etc.
Moscow Institute of Physics and Technology prototype
In 2018, researchers from the Moscow Institute of Physics and Technology (MIPT), the Technological Institute for Superhard and Novel Carbon Materials (TISNCM), and the National University of Science and Technology (MISIS) announced a prototype using 2-micron thick la |
https://en.wikipedia.org/wiki/Twisted%20sheaf | In mathematics, a twisted sheaf is a variant of a coherent sheaf. Precisely, it is specified by: an open covering in the étale topology Ui, coherent sheaves Fi over Ui, a Čech 2-cocycle θ for on the covering Ui as well as the isomorphisms
satisfying
,
The notion of twisted sheaves was introduced by Jean Giraud. The above definition due to Căldăraru is down-to-earth but is equivalent to a more sophisticated definition in terms of gerbe; see § 2.1.3 of .
See also
Reflexive sheaf
Torsion sheaf
References
Geometry |
https://en.wikipedia.org/wiki/Crocetane | Crocetane, or 2,6,11,15-tetramethylhexadecane, is an isoprenoid hydrocarbon compound. Unlike its isomer phytane, crocetane has a tail-to-tail linked isoprenoid skeleton. Crocetane has been detected in modern sediments and geological records as a biomarker, often associated with anaerobic methane oxidation.
Research
Crocetane was first studied in the late 1920s and early 1930s for the structural identification of crocetin, which is its polyunsaturated diacid analogue. The infrared spectrum was reported in 1950, the mass spectrum was described in 1968 and the 1H and 13C NMR spectra was obtained in 1990s.
In 1994, Liangqiao Bian first reported strong 13C depletion in crocetane from anoxic sediments in the Kattegat. Such low 13C content is thought to originate from microbes harvesting biogenic methane, which is always 13C depleted, as a carbon source. Years later several groups made similar observations in either modern or ancient sediments near methane seeps. Crocetane was found in environments with anaerobic methane oxidizing consortium, composed of methanotrophic archea and sulfate-reducing bacteria. These work makes crocetane the first biomarker of anaerobic methanotrophy.
In 2009, Ercin Maslen and her colleagues detected crocetane in highly-mature Devonian sediments and crude oils of the Western Canada Sedimentary Basin. They propose that natural product precursor for this crocetane is green sulfur bacteria derived isorenieratene and palaerernieratene, which means that crocetane can also be related to photic zone euxinia in highly matured samples.
Analysis
Due to structural similarities, crocetane often co-elutes with phytane and is hard to identify. People have been using specialized gas chromatographic methods to achieve partial separation. For example, Volker Thiel and his colleagues used a 25-m squalene capillary column with hydrogen as a carrier gas.
For the same reason mass spectra of crocetane and phytane are very similar except for that crocetane does |
https://en.wikipedia.org/wiki/Dinosterane | Dinosterane is a steroidal alkane, also known as 4α,23,24-trimethylcholestane. It is used in geochemistry as a biomarker, interpreted as an indication of dinoflagellate presence due to its derivative dinosterol high occurrence in extant dinoflagellate species and its rarity in other taxa, although it has been shown to be produced by a single species of marine diatom as well.
History of use as a biomarker
A 1984 study was conducted which established the dinoflagellate origin for dinosterane based on distributions of modern dinoflagellates and dinosterane abundance in sediment.
In 1993, dinosteranes were discovered in a section of the Bristol Trough that was dated to the Rhaetian Age. Due to the co-deposition of these dinosteranes with dinoflagellate cysts and comparison of microfossil abundance with hydrocarbon abundance, the dinosterane was associated with marine dinoflagellates. This was the first stratigraphic evidence for Mesozoic dinoflagellates.
In 1998, dinosteranes were found in high relative abundance in samples from the Lükati Formation, which were collected from the Kopli quarry in Estonia. This evidence was used to place the origin of dinoflagellates as early as the Early Cambrian, much earlier than the Bristol Trough studies had been able to.
Characterisation
Dinosterane's mass spectrum shows a highly increased abundance of the m/z = 98 ion compared to 24-ethyl-4α-methylcholestane, which is likely due to preferential cleavage of the C-22,23 bond.
References
Hydrocarbons
Cholestanes
Biomarkers |
https://en.wikipedia.org/wiki/Epibrassicasterol | Epibrassicasterol (also called crinosterol) is a type of cholesterol most commonly found in marine invertebrates. Epibrassicasterol is a 28 carbon cholesterol with an alpha oriented methyl group at carbon 24. It is often mixed isomerically with the more common beta-isomer, brassicasterol. Epibrassicasterol can be used as a biomarker to identify the presence of marine life in an environment and can be dated based on the location of fossilized remains in various rock structures.
Early Findings
Studies in the late 1980s and 1990s focused on identifying multiple organic biomarkers commonly produced by marine life. Both epibrassicasterol and brassicasterol were found to be present in algae and mollusks. However, because many mollusks eat algae and mollusks often produce extra alkyl side chains on organic molecules that they create, it is believed that epibrassicasterol and brassicasterol originally come only from algae. The occurrence of both of these isomers simultaneously can indicate a high algal presence in the local environment.
References
Biomarkers
Sterols |
https://en.wikipedia.org/wiki/11%CE%B2-Hydroxyandrostenedione | 11β-Hydroxyandrostenedione (11β-OHA4), also known as 11β-hydroxyandrost-4-ene-3,17-dione, is an endogenous, naturally occurring steroid and androgen prohormone that is produced primarily, if not exclusively, in the adrenal glands. It is closely related to adrenosterone (11-ketoandrostenedione; 11-KA4), 11-ketotestosterone (11-KT), and 11-ketodihydrotestosterone (11-KDHT), which are also produced in the adrenal glands.
It can be used as a biomarker for guiding primary aldosteronism subtyping in adrenal vein sampling where blood samples are taken from both adrenal glands to compare the amount of hormone made by each gland.
See also
4-Androstenedione
References
Androgens and anabolic steroids
Androstanes
Biomarkers
Hormones of the suprarenal cortex
Ketones
Secondary alcohols
Sex hormones
Steroid hormones |
https://en.wikipedia.org/wiki/Okenane | Okenane, the diagenetic end product of okenone, is a biomarker for Chromatiaceae, the purple sulfur bacteria. These anoxygenic phototrophs use light for energy and sulfide as their electron donor and sulfur source. Discovery of okenane in marine sediments implies a past euxinic environment, where water columns were anoxic and sulfidic. This is potentially tremendously important for reconstructing past oceanic conditions, but so far okenane has only been identified in one Paleoproterozoic (1.6 billion years old) rock sample from Northern Australia.
Background
Okenone is a carotenoid, a class of pigments ubiquitous across photosynthetic organisms. These conjugated molecules act as accessories in the light harvesting complex. Over 600 carotenoids are known, each with a variety of functional groups that alter their absorption spectrum. Okenone appears to be best adapted to the yellow-green transition (520 nm) of the visible spectrum, capturing light below marine plankton in the ocean. This depth varies based on the community structure of the water column. A survey of microbial blooms found Chromatiaceae anywhere between 1.5m and 24m depth, but more than 75% occurred above 12 meters. Further planktonic sulfur bacteria occupy other niches: green sulfur bacteria, the Chlorobiaceae, that produce the carotenoid chlorobactene were found in greatest abundance above 6m while green sulfur bacteria that produce isorenieratene were predominantly identified above 17m. Finding any of these carotenoids in ancient rocks could constrain the depth of the oxic to anoxic transition as well as confine past ecology. Okenane and chlorobactane discovered in Australian Paleoproterozoic samples allowed conclusions of a temporarily shallow anoxic transition, likely between 12 and 25m.
Okenone is synthesized in 12 species of Chromatiaceae, spanning eight genera. Other purple sulfur bacteria have acyclic carotenoid pigments like lycopene and rhodopin. However, geochemists largely study okenone |
https://en.wikipedia.org/wiki/Unity%20Systems | Unity Systems was a home automation company that was based in Redwood City, California and was formed in 1983. In 1985, Unity Systems released the Unity Home Manager which was one of the earliest home automation systems as well as one of the most successful systems. It featured a green monochrome touchscreen display with options such as temperature settings, floor plans, lighting control, the sprinkler system, HVAC control, security and general maintenance settings. The Unity Home Manager was sold by a dealer network which consisted of small, and dedicated companies, with around 90 dealers across the United States at a point in time. Unity systems closed its doors in 1999.
See also
Home automation for the elderly and disabled
Internet of Things
List of home automation software and hardware
List of home automation topics
List of network buses
Smart device
Web of Things
References
Home automation companies
Building engineering organizations |
https://en.wikipedia.org/wiki/Line%20of%20Contact%20%28Nagorno-Karabakh%29 | The Line of Contact (, shp’man gits, ) was the front line which separated Armenian forces (the Nagorno-Karabakh Defense Army and the Armenian Armed Forces) and the Azerbaijan Armed Forces from the end of the First Nagorno-Karabakh war until the 2020 Nagorno-Karabakh ceasefire agreement.
It was formed in the aftermath of the May 1994 ceasefire that ended the First Nagorno-Karabakh War (1988–94). During its existence, the mountain range of Murovdag (Mrav) was the northern part of the line of contact and essentially served as a natural border between the two forces. The length of the line of contact was between and until 2020.
For the first time since the 1994 ceasefire, the front line slightly shifted during the 2016 Nagorno-Karabakh conflict, when Azerbaijan recaptured some hectares of territory. The Line of Contact effectively dissolved during the 2020 Nagorno-Karabakh war, after Azerbaijan made significant military gains against the internationally unrecognised Republic of Artsakh including capturing parts of the original Nagorno-Karabakh Autonomous Oblast. Armenian forces later withdrew from almost the entirety of Karabkh territories that it remained in control of as part of the 2020 ceasefire agreement, officially ending the existence of the Line of Contact. A new line of contact exists between the remaining Artsakhi zone in the former Autonomous Oblast controlled by Russian Armed Forces peacekeepers and the recaptured Azerbaijani territories.
Terminology
The term "Line of Contact" was widely used in official documents and statements, including by the OSCE Minsk Group.
Some Armenian analysts, including Ara Papian encouraged the Armenian side to avoid the term "line of contact", instead calling it a "state border" between Artsakh and Azerbaijan. Independent journalist and author Tatul Hakobyan writes of it as a state border of Azerbaijan and Artsakh and notes that it is called the "line of contact" in international lexicon.
In Azerbaijan, the "line of conta |
https://en.wikipedia.org/wiki/Swarm%20robotic%20platforms | Swarm robotic platforms apply swarm robotics in multi-robot collaboration. They take inspiration from nature (e.g. collective problem solving mechanisms seen in nature such as honey bee aggregation). The main goal is to control a large number of robots (with limited sensing/processing ability) to accomplish a common task/problem. Hardware limitation and cost of robot platforms limit current research in swarm robotics to mostly performed by simulation software (e.g. Stage, ARGoS). On the other hand, simulation of swarm scenarios that needs large numbers of agents is extremely complex and often inaccurate due to poor modelling of external conditions and limitation of computation.
Comparison of platforms
Several mobile robot platforms have previously been developed to study swarm applications.
References
Network software comparisons
Robotics lists |
https://en.wikipedia.org/wiki/WebTorrent | WebTorrent is a peer-to-peer (P2P) streaming torrent client written in JavaScript, from the same author, Feross Aboukhadijeh, of YouTube Instant, and the team at WebTorrent and on GitHub, for use in web browsers, as well as a WebTorrent Desktop stand alone version able to bridge WebTorrent and BitTorrent serverless networks.
History
Before creating WebTorrent, the developers first created PeerCDN, a peer-to-peer content delivery network which was bought by Yahoo! in 2013.
The idea behind WebTorrent is to make a BitTorrent-like protocol that works on the web browser, maintaining as much compatibility with BitTorrent as possible. Any web browser should be able to connect to a peer-to-peer swarm, fetch content, verify that it is correct, and display it to the user – all as much as possible without centralized servers relying on a network entirely of people's browsers. WebTorrent uses the same protocol as BitTorrent but uses a different transport layer. WebTorrent primarily relies on WebRTC connections, while BitTorrent uses TCP connections and UDP datagrams directly.
WebTorrent Desktop
The WebTorrent Desktop bridges the two networks of WebRTC-based WebTorrent and TCP/UDP-based BitTorrent simultaneously. The BitTorrent client Vuze (formerly Azureus) less gracefully but adequately functionally incorporated WebTorrent adding simultaneous network bridging to their software. The developers used Electron that makes desktop apps using JavaScript with access to all the APIs from Chrome and Node.
Functionality
Online video is the core focus as that is where WebTorrent is most useful. It is less suited for smaller files or data sets but is ideal for larger files.
File availability, as with BitTorrents, is dependent on torrent seeding. If only a few users are sharing a file, then an HTTP server that provides webseeding would be the fallback. There is no sharing without webseeding. However, this could have some positive implications. Rather than using a middleman upl |
https://en.wikipedia.org/wiki/Chris%20Tomic | Chris Tomic (born 1978) is a German computer scientist, inventor, entrepreneur and a reality TV personality. He has featured in several television shows, mostly on the German news channel N-TV Television.
Life
After his studies in Germany at the Heinrich-Heine-Universität Düsseldorf, he started developing technologies for the internet and mobile industry in Düsseldorf with the company Novadoc GmbH until 2001.
Tomic created the UCP protocol and set the standard for the worldwide first delivery of binary messages to mobile handsets such as operator-logos and monophonic ringtones in 1998. As executive director of the company Novadoc GmbH he focused his research and development on secure mobile payments and micropayments over SMS (Mobile Payments). In 2001 he became the CTO of the company MonsterMob LTD in the UK.
Development of the company Monstermob LTD
In 2003 MonsterMob LTD was floated on the London Stock Exchange with an opening market capitalisation of £32m. Spanish internet firm LaNetro Zed bought up a majority 53% stake in the business.
The agreement will mean LaNetro Zed and MonsterMob LTD will together become the world's largest company in the Mobile Value-Added Services (MVAS) market in terms of revenue. The enlarged company is now operating in 31 countries around the world employing 1,200 staff.
Filmography
References
External links
Website of Chris Tomic
1978 births
Living people
Engineers from Krefeld
German billionaires
21st-century German inventors
German computer scientists
Computer hardware engineers
Computer designers
Programming language designers
Cellular automatists
German television personalities
Mass media people from North Rhine-Westphalia |
https://en.wikipedia.org/wiki/Quadratic%20knapsack%20problem | The quadratic knapsack problem (QKP), first introduced in 19th century, is an extension of knapsack problem that allows for quadratic terms in the objective function: Given a set of items, each with a weight, a value, and an extra profit that can be earned if two items are selected, determine the number of items to include in a collection without exceeding capacity of the knapsack, so as to maximize the overall profit. Usually, quadratic knapsack problems come with a restriction on the number of copies of each kind of item: either 0, or 1. This special type of QKP forms the 0-1 quadratic knapsack problem, which was first discussed by Gallo et al.
The 0-1 quadratic knapsack problem is a variation of knapsack problems, combining the features of unbounded knapsack problem, 0-1 knapsack problem and quadratic knapsack problem.
Definition
Specifically, the 0–1 quadratic knapsack problem has the following form:
Here the binary variable xi represents whether item i is included in the knapsack, is the profit earned by selecting item i and is the profit achieved if both item i and j are added.
Informally, the problem is to maximize the sum of the values of the items in the knapsack so that the sum of the weights is less than or equal to the knapsack's capacity.
Application
As one might expect, QKP has a wide range of applications including telecommunication, transportation network, computer science and economics. In fact, Witzgall first discussed QKP when selecting sites for satellite stations in order to maximize the global traffic with respect to a budget constraint. Similar model applies to problems like considering the location of airports, railway stations, or freight handling terminals. Applications of QKP in the field of computer science is more common after the early days: compiler design problem, clique problem, very large scale integration (VLSI) design. Additionally, pricing problems appear to be an application of QKP as described by Johnson et al.
Comp |
https://en.wikipedia.org/wiki/Decima%20%28game%20engine%29 | Decima is a proprietary game engine made by Guerrilla Games and released in November 2013, that includes tools and features like artificial intelligence and game physics. It is compatible with 4K resolution and high-dynamic-range imaging, used for games on PlayStation 4, PlayStation 5, Microsoft Windows, macOS and iOS.
History
The first game the engine was used for was Killzone: Shadow Fall. In June 2015, Guerrilla Games announced that Horizon: Zero Dawn was using the engine for development. In August 2015, Until Dawn was announced to be using the engine along with Havok physics. In December 2015, Until Dawn: Rush of Blood used the engine along with PlayStation VR. In June 2016, Hideo Kojima announced preparation for Kojima Productions' independent game Death Stranding, inspecting two engine candidates, of which the latter had been used to create the first teaser that was unveiled at the Electronic Entertainment Expo 2016 conference. After receiving the Industry Icon award at The Game Awards 2016, Kojima premiered a trailer for the game with the engine's logo. At PlayStation Experience, Kojima had announced that he had partnered with Guerrilla Games, using the engine for development on Death Stranding.
According to executive producer Angie Smets, Decima was originally known simply as "the engine" by Guerrilla employees, as there were initially no plans to publicly offer this technology to game developers outside of the company. However, the newly forged partnership with Kojima Productions meant that Guerrilla suddenly had to give the engine a name for marketing purposes; they chose to name it after Dejima, the Japanese island where a Dutch Empire trading post appeared in the 17th century and once symbolized the strong trade relations between Japan and the Netherlands.
Guerrilla's most recent title, Horizon Forbidden West, used an updated version of the engine. The game was released for PlayStation 4 and PlayStation 5 on February 18, 2022.
Features
During Play |
https://en.wikipedia.org/wiki/Abbreviations.com | Abbreviations.com is an online abbreviations dictionary whose domain was first registered on 2001. The company was founded by Yigal Ben Efraim as part of STANDS4 LLC, which also operates Lyrics.com, Grammar.com and Symbols.com among other reference related websites.
As of 2016 the website includes nearly a million definitions that are classified by a large variety of categories from computing and the Web to governmental, military, medicine and more. The database is being built by contributing editors, who can sign up on the website and help expanding it by submitting new entries for inclusion. The website also offers its content to be freely used by third-parties through its open APIs.
Reception
Reference Reviews wrote a review for the site in 2013, stating that it "certainly has its place among the librarians' quick reference websites" but that " the authoritativeness of the site entries is not completely evident. There are no external references available to verify entry reliability. While I would recommend this site to all librarians, it would certainly be a cautionary recommendation." Choice was also critical of the site, writing that "Unfortunately it falls short compared to other online and print sources" and noted that the site had errors, which they attributed to the site seeming to allow user-generated content.
Awards and recognition
In 2005 the website has been selected as one of the "101 Best Web Sites for Writers" by the American magazine Writer's Digest.
In 2010 the Abbreviations.com website has been selected as one of the "Best Free Reference Web Sites" by the ALA's Reference and User Services Association.
In 2015 the website's parent company STANDS4 has won the Red Herring Top 100 Europe award.
References
External links
Review at GeekTime
Review at KillerStartups
Online dictionaries |
https://en.wikipedia.org/wiki/Erd%C5%91s%E2%80%93Ulam%20problem | In mathematics, the Erdős–Ulam problem asks whether the plane contains a dense set of points whose Euclidean distances are all rational numbers. It is named after Paul Erdős and Stanislaw Ulam.
Large point sets with rational distances
The Erdős–Anning theorem states that a set of points with integer distances must either be finite or lie on a single line. However, there are other infinite sets of points with rational distances. For instance, on the unit circle, let S be the set of points
where is restricted to values that cause to be a rational number. For each such point, both and are themselves both rational, and if and define two points in S, then their distance is the rational number
More generally, a circle with radius contains a dense set of points at rational distances to each other if and only if is rational. However, these sets are only dense on their circle, not dense on the whole plane.
History and partial results
In 1946, Stanislaw Ulam asked whether there exists a set of points at rational distances from each other that forms a dense subset of the Euclidean plane. While the answer to this question is still open, József Solymosi and Frank de Zeeuw showed that the only irreducible algebraic curves that contain infinitely many points at rational distances are lines and circles. Terence Tao and Jafar Shaffaf independently observed that, if the Bombieri–Lang conjecture is true, the same methods would show that there is no infinite dense set of points at rational distances in the plane. Using different methods, Hector Pasten proved that the abc conjecture also implies a negative solution to the Erdős–Ulam problem.
Consequences
If the Erdős–Ulam problem has a positive solution, it would provide a counterexample to the Bombieri–Lang conjecture and to the abc conjecture. It would also solve Harborth's conjecture, on the existence of drawings of planar graphs in which all distances are integers. If a dense rational-distance set exists, any straigh |
https://en.wikipedia.org/wiki/Open%20Problems%20in%20Mathematics | Open Problems in Mathematics is a book, edited by John Forbes Nash Jr. and Michael Th. Rassias, published in 2016 by Springer (). The book consists of seventeen expository articles, written by outstanding researchers, on some of the central open problems in the field of mathematics. The book also features an Introduction on John Nash: Theorems and Ideas, by Mikhail Leonidovich Gromov. According to the editors’ Preface, each article is devoted to one open problem or a “constellation of related problems”.
Choice of problems
Nash and Rassias write in the preface of the book that the open problems presented “were chosen for a variety of reasons. Some were chosen for their undoubtable importance and applicability, others because they constitute intriguing curiosities which remain unexplained mysteries on the basis of current knowledge and techniques, and some for more emotional reasons. Additionally, the attribute of a problem having a somewhat vintage flavor was also influential” in their decision process.
Table of contents
Preface, by John F. Nash Jr. and Michael Th. Rassias
A Farewell to “A Beautiful Mind and a Beautiful Person”, by Michael Th. Rassias
Introduction, John Nash: Theorems and Ideas, by Mikhail Leonidovich Gromov
P =? NP, by Scott Aaronson
From Quantum Systems to L-Functions: Pair Correlation Statistics and Beyond, by Owen Barrett, Frank W. K. Firk, Steven J. Miller, and Caroline Turnage-Butterbaugh
The Generalized Fermat Equation, by Michael Bennett, Preda Mihăilescu, and Samir Siksek
The Conjecture of Birch and Swinnerton-Dyer, by John H. Coates
An Essay on the Riemann Hypothesis, by Alain Connes
Navier–Stokes Equations: A Quick Reminder and a Few Remarks, by Peter Constantin
Plateau’s Problem, by Jenny Harrison and Harrison Pugh
The Unknotting Problem, by Louis Kauffman
How Can Cooperative Game Theory Be Made More Relevant to Economics?: An Open Problem, by Eric Maskin
The Erdős–Szekeres Problem, by Walter Morris and Valeriu S |
https://en.wikipedia.org/wiki/Phyllocladane | Phyllocladane is a tricyclic diterpane which is generally found in gymnosperm resins. It has a formula of C20H34 and a molecular weight of 274.4840. As a biomarker, it can be used to learn about the gymnosperm input into a hydrocarbon deposit, and about the age of the deposit in general. It indicates a terrogenous origin of the source rock. Diterpanes, such as Phyllocladane are found in source rocks as early as the middle and late Devonian periods, which indicates any rock containing them must be no more than approximately 360 Ma. Phyllocladane is commonly found in lignite, and like other resinites derived from gymnosperms, is naturally enriched in 13C. This enrichment is a result of the enzymatic pathways used to synthesize the compound.
The compound can be identified by GC-MS. A peak of m/z 123 is indicative of tricyclic diterpenoids in general, and phyllocladane in particular is further characterized by strong peaks at m/z 231 and m/z 189. Presence of phyllocladane and its relative abundance to other tricyclic diterpanes can be used to differentiate between various oil fields.
References
Diterpenes
Biomarkers
Tetracyclic compounds |
https://en.wikipedia.org/wiki/Negative%20testing | Negative testing is a method of testing an application or system that ensures that the plot of the application is according to the requirements and can handle the unwanted input and user behavior. Invalid data is inserted to compare the output against the given input. Negative testing is also known as failure testing or error path testing. When performing negative testing exceptions are expected. This shows that the application is able to handle improper user behavior. Users input values that do not work in the system to test its ability to handle incorrect values or system failure.
Purpose
The purpose of negative testing is to prevent the application from crashing and it also helps improve the quality of an application by detecting defects.
Negative testing helps you to improve the testing coverage of the application.
Negative testing makes the application more stable and reliable.
Negative testing together with positive testing allows users to test the application with any valid (or invalid) input data.
Benefits of negative testing
Negative testing is done to check that the product deals properly with the circumstance for which it is not programmed. The fundamental aim of this testing is to check how bad data is taken care of by the systems, and appropriate errors are shown to the client when bad data is entered. Both positive and negative testing play an important role. Positive testing ensures that the application does what it is implied for and performs each function as expected. Negative testing is opposite of positive testing. Negative testing discovers diverse approaches to make the application crash and handle the crash effortlessly.
Example
If there is a text box that can only take numeric values but the user tries to type a letter, the correct behavior would be to display a message such as "(Incorrect data) Please enter a number."
If the user is to fill the name field and there are ground rules that the name text is mandatory to fill, but that |
https://en.wikipedia.org/wiki/Symphiles | Symphiles are insects or other organisms which live as welcome guests in the nest of a social insect (such as the ant, myrmecophily, or termite, termitophily) by which they are fed and guarded. The relationship between the symphile and host may be symbiotic, inquiline or parasitic.
Symphile taxa
This is a selection of taxa exhibiting symphilia, not a complete list.
Fibularhizoctonia
Fibularhizoctonia, sometimes referred to as cuckoo fungus due to their adaptation to mimic termite eggs, employ chemical and morphological mimicry to benefit from the defense termites provide their brood. If termite workers are present to care for a brood which contains cuckoo fungus, the sclerotia, or "termite balls", are unlikely to germinate and their presence will increase the survival rate of the termite eggs. When worker termites were experimentally removed from brood that contained slerotia, the fungus germinated by exploiting the termite eggs. This means the termitophilic relationship between termites and Fibularhizoctonia can be parasitic or mutualistic.
Phengaris arion
The large blue butterfly, Phengaris arion (formerly Maculinea arion), exhibits a unique parasitic relationship with a single species of red ant, Myrmica sabuleti.
Psithyrus
Cuckoo bumblebees, members of the subgenus Psithyrus in the genus Bombus, are obligate brood parasites; they must use colonies of true bumblebees to rear their young. A Psithyrus female will kill or subdue the host colony's queen and then use pheromones and/or physical attacks to force the host colony to feed her and raise her brood.
Staphylinidae
Many species of Staphylinidae (commonly known as “Rove Beetles”) have developed complex interspecies relationships with ants. Ant associations range from near free-living species which prey only on ants, to obligate inquilines of ants, which exhibit extreme morphological and chemical adaptations to the harsh environments of ant nests. Some species are fully integrated into the host colony, and a |
https://en.wikipedia.org/wiki/Coisogenic%20strain | Coisogenic strains are one type of inbred strain that differs by a mutation at a single locus and all of the other loci are identical. There are numerous ways to create an inbred strain and each of these strains are unique. Genetically engineered mice can be considered a coisogenic strain if the only difference between the engineered mouse and a wild-type mouse is a specific locus. Coisogenic strains can be used to investigate the function of a certain genetic locus.
Coisogenic strains can be induced chemically or through radiation however, other types of alterations within the genome may also occur. Coisogenic strains may also occur through a spontaneous mutation that occurs in an inbred strain. To create a coisogenic strain through breeding, a mouse with the specific mutation on a locus is mated to an inbred strain (e.g., C57BL/6J) mouse.
The offspring of the mutated mouse with the inbred strain has a 50% chance of carrying the mutation. From this, the offspring with the mutation can be mated to a heterozygous carrier which then creates offspring with 75% of the genetic background. This backcrossing is then continued until more than 99% is genetic background and the mutated locus is inherited. However, if the specific mutation cannot be passed on, heterozygous animals should be used to breed with the original inbred strain. Full-sib mating are used to maintain coisogenic strains if the specific gene locus is homozygous. However, a regular backcrossing of these coisogenic strains with their standard parental strain is preferred in order to avoid subline divergence.
References
Model organisms
Laboratory mice
Laboratory rats
Animal breeding |
https://en.wikipedia.org/wiki/Documentation%20testing | Documentation testing is part of the non-functional testing of a product. It may be a type of black-box testing that ensures that documentation about how to use the system matches with what the system does, providing proof that system changes and improvements have been documented.
Description
Documentation testing includes the plans, results, and testing of a system or system component. It includes test case specifications, test plans, test procedures, test reports, and test logs. It is about the testing of all the documents stating, defining, explaining, and reporting or validating requirements, procedures followed, and results. Documentation testing starts with the beginning of the very first software process to be the most cost-effective. Documentation testing includes checking the spelling and grammar to review any ambiguity or inconsistency between what functionality it performs and what it is supposed to do.
Product documentation is a critical part of the final product. Poor documentation can affect the product or company's reputation.
Documentation is about the testing of all the documents created prior, and after the testing of software. Any delay in the testing of the document will increase the cost. Some common artifacts about software development and testing can be specified as test cases, test plans, requirements, and traceability matrices.
Key areas
Four key areas for testing a document include instructions, examples, messages, and samples. Instructions will be needed to step by step execute the test scenarios for looking errors or their omission. Further examples can be provided to elaborate the GUI components, syntax, commands, and interfaces to show executed outputs or pinpoints. Inconsistencies also needed to be taken care of with errors as they can confuse the users, and these ambiguities will cause much damage if the user of the system will be a novice user. Examples will be needed in case of any problem that occurs to the user, particularly n |
https://en.wikipedia.org/wiki/Autogamy | Autogamy, or self-fertilization, refers to the fusion of two gametes that come from one individual. Autogamy is predominantly observed in the form of self-pollination, a reproductive mechanism employed by many flowering plants. However, species of protists have also been observed using autogamy as a means of reproduction. Flowering plants engage in autogamy regularly, while the protists that engage in autogamy only do so in stressful environments.
Occurrence
Protists
Paramecium aurelia
Paramecium aurelia is the most commonly studied protozoan for autogamy. Similar to other unicellular organisms, Paramecium aurelia typically reproduce asexually via binary fission or sexually via cross-fertilization. However, studies have shown that when put under nutritional stress, Paramecium aurelia will undergo meiosis and subsequent fusion of gametic-like nuclei. This process, defined as hemixis, a chromosomal rearrangement process, takes place in a number of steps. First, the two micronuclei of P. aurelia enlarge and divide two times to form eight nuclei. Some of these daughter nuclei will continue to divide to create potential future gametic nuclei. Of these potential gametic nuclei, one will divide two more times. Of the four daughter nuclei arising from this step, two of them become anlagen, or cells that will form part of the new organism. The other two daughter nuclei become the gametic micronuclei that will undergo autogamous self-fertilization. These nuclear divisions are observed mainly when the P. aurelia is put under nutritional stress. Research shows that P. aurelia undergo autogamy synchronously with other individuals of the same species.
Clonal aging and rejuvenation
In Paramecium tetraurelia, vitality declines over the course of successive asexual cell divisions by binary fission. Clonal aging is associated with a dramatic increase in DNA damage. When paramecia that have experienced clonal aging undergo meiosis, either during conjugation or automixis, the old |
https://en.wikipedia.org/wiki/Sexual%20selection%20in%20fungi | Sexual selection has been observed in fungi as a part of their reproduction, although they also often reproduce asexually. In the basidiomycetes, the sex ratio is biased towards males, implying sexual selection there. Male–male competition to fertilize occurs in fungi including yeasts. Pheromone signaling is used by female gametes and by conidia, implying male choice in these cases. Female–female competition may also occur, indicated by the much faster evolution of female-biased genes in fungi.
Fungal sexual selection requirements
Most fungi can produce asexually and sexually. Currently, sexual selection has been studied to occur more predominantly in the Ascomycota and Basidiomycota phyla. Although different sexes are not present within fungi, sexual selection can act due to the presence of different sex roles as well as different mating types as most fungi are hermaphroditic. Sex roles can be distinguished in sexually producing filamentous fungi. For example, sexually producing ascomycetes can produce anisogamous gametes. The larger immobile gametes act as female gametes, while the smaller, motile gametes act as male gametes. Increased difference in the operational sex ratio (OSR) due to asymmetry between the sex roles leads to the production of more male gametes. In addition, variation within gamete quality which could affect offspring viability or fitness can also lead to differences in female/male gamete ratios.
In addition, sexual selection can occur within fungi if there is a limiting number of a certain type of gamete. The limiting gamete is typically the female gamete as they tend to be more costly to produce and invest more, energetically, in the zygote.
Most fungi have a haploid-diploid life cycle. Sexual selection is much more crucial in the diploid phase as the product of the phase immediately undergoes meiosis and can no longer be fertilized again.
Sexual selection in mushroom fungi
Mushroom-forming fungi within the phylum Basidiomycota produce se |
https://en.wikipedia.org/wiki/AsteroidOS | AsteroidOS is an open source operating system designed for smartwatches. It is available as a firmware replacement for some Android Wear devices. The motto for the AsteroidOS project is "Free your wrist."
Wareable.com reviewed version 1.0 and gave it 3.5 out of 5 stars.
Software Architecture
AsteroidOS is built like an embedded Linux distribution with OpenEmbedded. It works on top of the Linux kernel and the systemd service manager. AsteroidOS also includes various mobile Linux middlewares originally developed for Mer and Nemo Mobile such as lipstick and MCE.
The user interface is completely written with the Qt5 framework. Applications are coded in QML with graphic components coming from Qt Quick and QML-Asteroid. An SDK with a cross-compilation toolchain integrated to Qt Creator can be generated from OpenEmbedded for easier development.
Asteroid-launcher is a Wayland compositor and customizable home screen managing applications, watchfaces, notifications and quick settings. Asteroid-launcher runs on top of the libhybris compatibility layer to make use of Bionic GPU drivers.
AsteroidOS offers Bluetooth Low Energy synchronization capabilities with the asteroid-btsyncd daemon running on top of BlueZ5. A reference client named AsteroidOS Sync is available for Android users. There is also a Companion App for Sailfish OS(Starship) and one for Ubuntu Touch(Telescope), but it has not yet been updated to the current release of Ubuntu Touch. An app for Linux-based smartphones like the Librem 5 distributed by Purism is also in the making(Buran), but cannot be used due to a currently still unfixed bug in QT5.
Shipped Applications
As of the 1.1 nightly release, the following applications are shipped and pre-installed by default in AsteroidOS:
Agenda: Provides simple event scheduling capabilities
Alarm Clock: Makes the watch vibrate at a specific time of day
Calculator: Allows basic calculations
Compass: A functional Compass app (only preinstalled on devices with sup |
https://en.wikipedia.org/wiki/CyberPowerPC | CyberPowerPC, also known as CyberPower, is an American personal computer retailer. It specializes in building and selling a wide range of (custom-built) gaming computers.
Business
CyberPowerPC was founded and incorporated on February 17, 1998, in the City of Industry, California.
In 2003, the company was listed as the fastest growing privately owned business in the Los Angeles area by the Los Angeles Business Journal.
From 2011 to 2016, CyberPowerPC has been consistently ranked within the top 150 largest privately owned companies headquartered in Los Angeles County by the Los Angeles Business Journal.
Products
CyberPowerPC produces and sells PCs primarily for use in computer gaming. Their products feature third-party components prepared into the complete ready-to break
packages. CyberPowerPC offers the option to users to choose their custom components for building PC.
Desktop PCs
With the advent of VR gaming in 2014, CyberPowerPC, with support from Oculus VR, released the most inexpensive computer capable of running the Oculus Rift virtual reality system, according to Oculus CEO Brendan Iribe. Later, CyberPowerPC became notable for developing a PC build for the express purpose of streaming video games.
All desktops released by the company are built to user specifications with several pre-selected builds available. In general, these computers are not given a model name (contrary to laptops) due to the variable nature of each design. CyberPowerPC, however, offers many exclusive series, such as Elgato Stream Machine or Luxe, that range anywhere from one to eight thousand US Dollars.
Laptops
CyberPowerPC laptops fall under the 'Tracer' series. As of 2023, all CyberPowerPC laptops use Intel Core and AMD Ryzen CPUs and Nvidia GeForce GPUs.
Models as of August 2023:
Low Tier
Tracer VII Gaming I16G (100, 200, 300, 400)
Mid Tier
Tracer VII Edge I17E LC (100, 200)
Tracer V Edge Pro I15X 550
High Tier
Tracer VII Gaming I16G LC (100, 200)
Tracer VI Gaming I17G |
https://en.wikipedia.org/wiki/Thyristor%20power%20controller | Thyristor power controllers (SCR power controllers) control power or voltage supplied to a load. Typical applications are generally found where power needs to be varied and ultimately converted into thermal energy. For example, the controllers are used in industrial furnace construction and in plastic processing.
How it works
Thyristor power controllers are operated with an alternating voltage in single-phase or three-phase. They are controlled by a controller and vary the activation time of the mains voltage for the load.
Where the operating conditions allow, the operation is recommended. Here, whole mains voltage shafts are switched to the load or blocked. For example, a controller requires 60% output (via a signal, which corresponds to 0-100%). The thyristor power controller switches 60% of the solid waves to the load while blocking 40%. The operating mode is to be regarded as unproblematic. Only in the case of a too weakly designed network, it is possible for illuminating installations which are connected to the same network to have undesired luminance fluctuations (flicker effect).
Some operating conditions require switching in each half-wave and thus very fast operation. Examples are control sections with very fast behavior or a required current limitation with low element resistance in the cold state. In this operating mode, the controller changes the phase angle α of the thyristor ignition timing. A half wave corresponds to 180 ° el. (electrical degree). The actuator can adjust the phase angle of 0 ° el. (maximum power) up to 180 ° el. (no power). In a 50 Hz mains the controller switches every 20 ms and shows very fast behavior. As a result of the voltage flanks during switch-on, disadvantages such as EMC interference potential or control voltage output also result in ohmic loads. This situation must be counteracted by means of line filters or the corresponding plant size with compensating systems.
Underlying control
The controllers change their on-of |
https://en.wikipedia.org/wiki/Top%2050%20Influential%20Women%20in%20Engineering | In 2016 the Women's Engineering Society (WES), in collaboration with the Daily Telegraph, produced an inaugural list of the United Kingdom's Top 50 Influential Women in Engineering, which was published on National Women in Engineering Day on 23 June 2016. The event was so successful it became an annual celebration. The list was instigated by Dawn Bonfield MBE, then Chief Executive of the Women's Engineering Society. In 2019, WES ended its collaboration with the Daily Telegraph and started a new collaboration with The Guardian newspaper.
Since 2016 a new theme has been used each year to showcase the variety of roles within the engineering industry and champion even more women engineers. The themes have been as follows:
2023: Safety and Security
2022: Inventors and Innovators
2021: Engineering Heroes
2020: Sustainability
2019: Apprentices and Former Apprentices
2018: Returners and Transferrers
2017: Most Influential Women in Engineering Under 35
2016: Most Influential Women in Engineering
2016 Winners: Most Influential Women in Engineering
The judging panel was chaired by Dawn Bonfield MBE, and included Leon Krill from the Daily Telegraph, Allan Cook CBE, chairman of Atkins, Professor John Perkins, author of the Engineering Skills Survey from the University of Manchester, Fiona Tatton, editor of Womanthology and Michelle Richmond, director of membership and professional development at the Institution of Engineering and Technology.
Roma Agrawal CEng, MIStructE, MIET, FRICS structural engineer, associate director, AECOM
Professor Helen Atkinson CBE, FREng head of Department of Engineering, University of Leicester
Danella Bagnall chief product engineer, Jaguar Land Rover
Faye Banks FIET, FCMI, FinstLm, CEng, Cmgr head of operations North East, National Grid
Alison Baptiste CEng, FICE, BEng, MSc, MCIWEM director of strategy and investment, Flood and Coastal Risk Management, Environment Agency
Jayne Bryant FREng, CEng, FIET, FWES engineering d |
https://en.wikipedia.org/wiki/Surface%20tension%20biomimetics | Surface tension is one of the areas of interest in biomimetics research. Surface tension forces will only begin to dominate gravitational forces below length scales on the order of the fluid's capillary length, which for water is about 2 millimeters. Because of this scaling, biomimetic devices that utilize surface tension will generally be very small, however there are many ways in which such devices could be used.
Applications
Coatings
A lotus leaf is well known for its ability to repel water and self-clean. Yuan and his colleagues fabricated a negative mold of alotus leaf from polydimethylsiloxane (PDMS) to capture the tiny hierarchical structures integral for the leaf's ability to repel water, known as the lotus effect. The lotus leaf's surface was then replicated by allowing a copper sheet to flow into the negative mold with the assistance of ferric chloride and pressure. The result was a lotus leaf-like surface inherent on the copper sheet. Static water contact angle measurements of the biomimetic surface were taken to be 132° after etching the copper and 153° after a stearic acid surface treatment to mimic the lotus leaf's waxy coating. A surface that mimics the lotus leaf could have numerous applications by providing water repellent outdoor gear.
Various species of floating fern are able to sustain a liquid-solid barrier of air between the fern and the surrounding water when they are submerged. Like the lotus leaf, floating fern species have tiny hierarchical structures that prevent water from wetting the plant surface. Mayser and Barthlott demonstrated this ability by submerging different species of the floating fern salvinia in water inside a pressure vessel to study how the air barrier between the leaf and surrounding water react to changes in pressure that would be similar to those experienced by the hull of a ship. Much other research is ongoing using these hierarchical structures in coatings on ship hulls to reduce viscous drag effects.
Biomedi |
https://en.wikipedia.org/wiki/Arched-hill%20symbol | The Arched-hill symbol is a symbol on ancient Coinage of India. There are some variations to the number of the hills depicted, or the symbol surmounting the hill, such as a crescent or a star.
It is thought that the three-arched hill symbol was initiated during the Maurya Empire (3rd–2nd century BCE). Later, in coins from Taxila dated from 220 BCE, the three-arched symbol appears regularly, and from 185 BCE is regularly associated with the animal figures of the elephant and the lion. In contrast, the Nandipada is generally associated with the zebu bull. On coins of the Shunga period, the three-arched hill can appear among a multitude of other symbols, such as the Nandipada, the tree-in-railing, the elephant, or the empty cross.
The symbol is generally considered a representation of a Buddhist Chaitya. It has also been argued that it was the imperial symbol of the Mauryas. The symbol however, appears in many post-Mauryan contexts as seen with the coins of Taxila and the Shungas.
Gallery
See also
Post-Mauryan coinage of Gandhara
References
Symbols
Coins of India |
https://en.wikipedia.org/wiki/Syria%E2%80%93Turkey%20barrier | The Syria–Turkey barrier is a border wall and fence under construction along the Syria–Turkey border built in an attempt at preventing illegal crossings and smuggling from Syria into Turkey.
The barrier on the Syrian border is the third longest wall in the world after the Great Wall of China and the American-Mexico border wall.
Background
According to Turkish officials the border wall was built in an attempt to increase border security, combat smuggling and reduce illegal border crossings due to the Syrian civil war.
History
Ankara had launched the construction project in 2015 to increase border security.
The 828 km (515-mile) wall is being built by TOKI, Turkey's state-owned construction enterprise, and will comprise Turkey's entire border with Syria. It will be made of seven-tonne concrete blocks topped with razor wire and stand high and wide; it will include 120 border towers in critical locations and a security road with regular military patrols. With construction having begun in 2014, 781 km of the border wall has been completed as of December 2017. In June 2018, the wall was proclaimed to be finished with a length of 764-kilometer (475-mile) out of the 911 km Syrian-Turkish border. In 2017, The Syrian government accused Turkey of building a separation wall, referring to this barrier.
Specifics
The physical specifics are such as :
base element: 2m wide, 7-tons mobile concrete blocks
height : 3m concrete + 1m razor wire
length : 764 km
sealed along : Hatay, Kilis, Gaziantep, Mardin, Şırnak, Şanlıurfa, as of June 2018,
The border security includes :
the modular concrete walls
security patrol routes with regular military patrols
security towers, manned and unmanned
passenger tracks.
Electronic devices are used, such as :
close-up surveillance systems
thermal cameras
land surveillance radar
remote-controlled weapons systems
command-and-control centers
line-length imaging systems
seismic sensors
acoustic sensors.
The advanced technol |
https://en.wikipedia.org/wiki/Singularity%20%28systems%20theory%29 |
Characteristics
The attributes of singularities include the following in various degrees, according to context:
Instability: because singularities tend to produce effects out of proportion to the size of initial causes.
System relatedness: the effects of a singularity are characteristic of the system.
Uniqueness: The nature of a singularity does not arise from the scale of the cause, so much as of its qualitative nature.
Irreversibility: Events at a singularity commonly are irreversible; one cannot un-crack a glass with the same force that cracked it.
Subjectivity: In phenomenology rather than physical science, awareness is dependent on human perception.
Randomness: Some classes of singularities are seen as random because the causes or their effects are unknown or nonexistent (e.g., in QM or coin-flipping).
Complexity: Occurrence of singularities often arises from the complexity of the system in its relation to its environment.
Interaction: Singularities often arise when unexpected interactions occur between two systems.
In dynamical systems
In recent times, chaos theory has attracted a great deal of work, but deterministic chaos is just a special case of a singularity in which a small cause produces a large observable effect as a result of nonlinear dynamic behavior. In contrast the singularities raised by Maxwell, such as a loose rock at a singular point on a slope, show a linear dynamic behavior as Poincaré demonstrated.
Singularities are a common staple of chaos theory, catastrophe theory, and bifurcation theory.
In social systems
In social systems, deterministic chaos is infrequent, because the elements of the system include individuals whose values, awareness, will, foresight, and fallibility, affect the dynamic behavior of the system. However, this does not completely exclude any notional possibility of deterministic chaos in social systems. In fact some authorities argue an increase in the development of nonlinear dynamics and instabilities |
https://en.wikipedia.org/wiki/Steve%20Schneider%20%28computer%20scientist%29 | Steve Schneider FBCS, CITP is an English computer scientist and Professor of Security. He is Director of the Surrey Centre for Cyber Security and Associate Dean (Research and Enterprise) at the University of Surrey.
Biography
Steve Schneider studied at Oxford University, joining the Oxford University Computing Laboratory (now the Oxford University Department of Computer Science) to study for a Doctorate on CSP, which was awarded in 1989, supervised by Mike Reed. He joined Royal Holloway, University of London as a lecturer in 1994, becoming a senior lecturer in 1999 and a professor in 2002. He moved to the University of Surrey in 2004, and was head of the Department of Computer Science from 2004 until 2010.
Schneider is an expert in formal methods, including Communicating Sequential Processes (CSP) and the B-Method, and computer security.
Selected books
References
External links
Steve Schneider's University of Surrey home page
Year of birth missing (living people)
Living people
Alumni of the University of Oxford
Members of the Department of Computer Science, University of Oxford
Academics of Royal Holloway, University of London
Academics of the University of Surrey
English computer scientists
Formal methods people
Computer science writers
British textbook writers
Fellows of the British Computer Society
Computer security academics |
https://en.wikipedia.org/wiki/BlackNurse | The BlackNurse attack is a form of denial of service attack based on ICMP flooding. The attack is special because a modest bandwidth of 20Mbit/s can be effective for disrupting a victim's network.
The attack consists of sending ICMP Destination Unreachable packets to a destination. This works because these packets caused the destination to consume resources at a relatively high rate relative to the traffic.
Discovery
The attack was first discovered by researchers Lenny Hansson and Kenneth Bjerregard Jørgensen at the Security Operations Center of the Danish Telecom operator TDC. The researchers' goal is to protect customers on that telecom network from DDoS attacks and other cyber threats.
The team noted in their release about the attack:
The BlackNurse attack attracted our attention, because in our anti-DDoS solution we experienced that even though traffic speed and packets per second were very low, this attack could keep our customers' operations down. This even applied to customers with large internet uplinks and large enterprise firewalls in place. We had expected that professional firewall equipment would be able to handle the attack.
DOS attacks
Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled.
Commonly, such an attack is done in a distributed manner, where many clients will send requests to a given server. The sum of all the client's traffic is often enough to overwhelm the destination and cause the service to go offline or become unavailable.
Attack
In the case of the BlackNurse attack, instead of flooding a remote system's internet traffic with superfluous traffic, the attack takes advantage of an imbalance between the resources required to send traffic and the resources required to process it.
Namely, the BlackNurse attacks uses ICMP with Type 3 Code 3 packets.
This is a packet that |
https://en.wikipedia.org/wiki/Parallel%20multidimensional%20digital%20signal%20processing | Parallel multidimensional digital signal processing (mD-DSP) is defined as the application of parallel programming and multiprocessing to digital signal processing techniques to process digital signals that have more than a single dimension. The use of mD-DSP is fundamental to many application areas such as digital image and video processing, medical imaging, geophysical signal analysis, sonar, radar, lidar, array processing, computer vision, computational photography, and augmented and virtual reality. However, as the number of dimensions of a signal increases the computational complexity to operate on the signal increases rapidly. This relationship between the number of dimensions and the amount of complexity, related to both time and space, as studied in the field of algorithm analysis, is analogues to the concept of the curse of dimensionality. This large complexity generally results in an extremely long execution run-time of a given mD-DSP application rendering its usage to become impractical for many applications; especially for real-time applications. This long run-time is the primary motivation of applying parallel algorithmic techniques to mD-DSP problems.
Motivation, problem statement, and basic concepts
Due to the end of frequency scaling of processors, which is largely attributed to the effect of Dennard scaling around the year 2005, a common trend of processor manufacturers was to continue to exploit Moore's law by increasing the number of processors on a single chip, which are termed multi-core processors as opposed to uniprocessors.
mD-DSP algorithms exhibit a large amount of complexity, as described in the previous section, which makes efficient implementation difficult in regard to run-time and power consumption. This article primarily addresses basic parallel concepts used to alleviate run-time of common mD-DSP applications. The concept of parallel computing can be applied to mD-DSP applications to exploit the fact that if a problem can be e |
https://en.wikipedia.org/wiki/Deterministic%20rendezvous%20problem | The deterministic rendezvous problem is a problem in computer science and robotics that involves two or more robots or players that must find each other by following a predetermined set of instructions. The goal is for the robots to meet at a specific location, or rendezvous point, without knowing the location of the other robot or robots.
In the deterministic rendezvous problem, each robot follows the same set of instructions, but each robot is assigned a unique label or identifier to differentiate them from each other [2]. This unique label is used to break the symmetry of the problem, as it allows the robots to distinguish themselves from each other and to follow the instructions in a specific order [3].
The deterministic rendezvous problem is typically solved by the robots acting synchronously, meaning that they all follow the instructions at the same time [4]. However, there are also non-synchronous versions of the problem, where the robots may act at different times or may have different internal clocks [5].
The deterministic rendezvous problem has applications in a wide range of fields, including robotics, distributed systems, and computer networks [6]. It is often used as a benchmark for evaluating the performance of algorithms and protocols for rendezvous and coordination in these fields [7].
Overview
In the synchronous version of the deterministic rendezvous problem, both robots are initially placed at arbitrary nodes in a finite, connected, undirected graph. The size and structure of the graph is unknown to the robots.
The information known by a robot is as follows:
T, the number of time steps since it has been activated
d, the degree of the node currently occupied by the robot
L, the label of the robot (typically taking the form of a bit string)
To solve the deterministic rendezvous problem, both robots must be given a sequence of deterministic instructions which allow the robots to use their known information to find each other. The robots are co |
https://en.wikipedia.org/wiki/Gender%20reveal%20party | A gender reveal party is a party held during pregnancy to reveal the baby's sex to the expectant parents' family and friends, and sometimes to the parents themselves. Prenatal sex discernment technology furnishes the necessary information. The practice originated in the United States during the late 2000s.
It is distinct from, but sometimes combined with, a baby shower, where the primary activity is giving expecting parents gifts for their future child. The gender reveal party often involves gender stereotypes such as pink and blue denoting girls and boys, respectively.
The practice is controversial and has been criticized for the use of elaborate and dangerous special effects, which have directly contributed to multiple deaths, injuries and large-scale forest fires, namely the 2017 Sawmill Fire and the 2020 El Dorado Fire. The practice has also been criticized for reinforcing gender stereotypes and the gender binary.
History and development
The gender reveal party developed in the late 2000s. An early example was recorded in the 2008 posts of then-pregnant Jenna Karvunidis on her ChicagoNow blog High Gloss and Sauce announcing the sex of her fetus via cake; she had previously had several miscarriages and wished to celebrate that her pregnancy had developed to the point that the sex of the fetus could be determined. YouTube videos can be found as early as 2008 and 2009, becoming significant around 2011, after which the trend continued to grow through the 2010s.
In 2019, Karvunidis observed an increase in extreme reveal events over the preceding five years, with parents "burning down forests and exploding cars, bringing alligators into the mix". She expressed regret at having helped start the trend, learning how the LGBT and intersex communities feel, and finally revealing the daughter they announced back in 2008 to be a gender-nonconforming individual who wears suits while still identifying as female. After the 2020 El Dorado Fire was started by a malfunctionin |
https://en.wikipedia.org/wiki/History%20of%20mechanical%20engineering | Mechanical engineering is a discipline centered around the concept of using force multipliers, moving components, and machines. It utilizes knowledge of mathematics, physics, materials sciences, and engineering technologies. It is one of the oldest and broadest of the engineering disciplines.
Dawn of civilization to early middle ages
Engineering arose in early civilization as a general discipline for the creation of large scale structures such as irrigation, architecture, and military projects. Advances in food production through irrigation allowed a portion of the population to become specialists in Ancient Babylon.
All six of the classic simple machines were known in the ancient Near East. The wedge and the inclined plane (ramp) were known since prehistoric times. The wheel, along with the wheel and axle mechanism, was invented in Mesopotamia (modern Iraq) during the 5th millennium BC. The lever mechanism first appeared around 5,000 years ago in the Near East, where it was used in a simple balance scale, and to move large objects in ancient Egyptian technology. The lever was also used in the shadoof water-lifting device, the first crane machine, which appeared in Mesopotamia circa 3000 BC, and then in ancient Egyptian technology circa 2000 BC. The earliest evidence of pulleys date back to Mesopotamia in the early 2nd millennium BC, and ancient Egypt during the Twelfth Dynasty (1991-1802 BC). The screw, the last of the simple machines to be invented, first appeared in Mesopotamia during the Neo-Assyrian period (911-609) BC. The Egyptian pyramids were built using three of the six simple machines, the inclined plane, the wedge, and the lever, to create structures like the Great Pyramid of Giza.
The Assyrians were notable in their use of metallurgy and incorporation of iron weapons. Many of their advancements were in military equipment. They were not the first to develop them, but did make advancements on the wheel and the chariot. They made use of pivot-able axl |
https://en.wikipedia.org/wiki/List%20of%20search%20engine%20software | Presented below is a list of search engine software.
Commercial
Free
See also
Search appliance
Bilingual search engine
Content discovery platform
Document retrieval
Incremental search
Web crawler
search engine |
https://en.wikipedia.org/wiki/Self-organization%20in%20cybernetics | Self-organization, a process where some form of overall order arises out of the local interactions between parts of an initially disordered system, was discovered in cybernetics by William Ross Ashby in 1947. It states that any deterministic dynamic system automatically evolves towards a state of equilibrium that can be described in terms of an attractor in a basin of surrounding states. Once there, the further evolution of the system is constrained to remain in the attractor. This constraint implies a form of mutual dependency or coordination between its constituent components or subsystems. In Ashby's terms, each subsystem has adapted to the environment formed by all other subsystems.
The cybernetician Heinz von Foerster formulated the principle of "order from noise" in 1960. It notes that self-organization is facilitated by random perturbations ("noise") that let the system explore a variety of states in its state space. This increases the chance that the system will arrive into the basin of a "strong" or "deep" attractor, from which it then quickly enters the attractor itself. The biophysicist Henri Atlan developed such a concept by proposing the principle of "complexity from noise" () first in the 1972 book L'organisation biologique et la théorie de l'information and then in the 1979 book Entre le cristal et la fumée. The thermodynamicist Ilya Prigogine formulated a similar principle as "order through fluctuations" or "order out of chaos". It is applied in the method of simulated annealing for problem solving and machine learning.
Wiener regarded the automatic serial identification of a black box and its subsequent reproduction (copying) as sufficient to meet the condition of self-organization. The importance of phase locking or the "attraction of frequencies", as he called it, is discussed in the 2nd edition of his "Cybernetics". Drexler sees self-replication (copying) as a key step in nano and universal assembly. In later work he seeks to lessen this constr |
https://en.wikipedia.org/wiki/XPIC | XPIC, or cross-polarization interference cancelling technology, is an algorithm to suppress mutual interference between two received streams in a Polarization-division multiplexing communication system.
The cross-polarization interference canceller (known as XPIC) is a signal processing technique implemented on the demodulated received signals at the baseband level. It is typically necessary in Polarization Division Multiplexing systems: the data sources to be transmitted are coded and mapped into QAM modulating symbols at the system's symbol rate and upconverted to a carrier frequency, generating two radio streams radiated by a single dual-polarized antenna (see feed pattern of Parabolic antenna). A corresponding dual-polarized antenna is located at the remote site and connected to two receivers, which downconvert the radio streams into baseband signals (BB H, BB V).
This multiplexing/demultiplexing technique is based on the expected discrimination between the two orthogonal polarizations (XPD):
an ideal, infinite XPD of the whole system guarantees that each signal at the receivers contains only the signal generated by the corresponding transmitter (plus any thermal noise);
any real, finite, level of XPD instead manifests itself as a partial recombination between the two signals, so that the receivers observe an interference due to the cross-polarization leakage. Some of the factors causing such cross-polarization interference are listed in Polarization-Division Multiplexing.
As a practical consequence, at the receiving site the two streams are received with a residual mutual interference. In many practical cases, especially for high-level M-QAM modulations, the communication system cannot tolerate the experienced levels of cross-polarization interference and an improved suppression is necessary. The two received polarizations at the antenna outputs, normally linear horizontal H and vertical V, are routed each to a receiver whose baseband output is further p |
https://en.wikipedia.org/wiki/AMD%20Instinct | AMD Instinct is AMD's brand of professional GPUs. It replaced AMD's FirePro S brand in 2016. Compared to the Radeon brand of mainstream consumer/gamer products, the Instinct product line is intended to accelerate deep learning, artificial neural network, and high-performance computing/GPGPU applications.
The Radeon Instinct product line directly competes with Nvidia's Ampere and Intel Xeon Phi and incoming Intel Xe lines of machine learning and GPGPU cards.
Before MI100 introduction in November 2020, the Instinct family was known as AMD Radeon Instinct, AMD dropped the Radeon brand from its name.
Supercomputers based on (AMD CPUs and) AMD Instinct GPUs now take the lead on the Green500 supercomputer list with over 50% lead over any other, and top the first 4 spots, including the second, which is the current fastest in the world on the TOP500 list, Frontier.
Products
The three initial Radeon Instinct products were announced on December 12, 2016, and released on June 20, 2017, with each based on a different architecture.
MI6
The MI6 is a passively cooled, Polaris 10 based card with 16 GB of GDDR5 memory and with a <150 W TDP. At 5.7 TFLOPS (FP16 and FP32), the MI6 is expected to be used primarily for inference, rather than neural network training. The MI6 has a peak double precision (FP64) compute performance of 358 GFLOPS.
MI8
The MI8 is a Fiji based card, analogous to the R9 Nano, and expected to have a <175W TDP. The MI8 has 4 GB of High Bandwidth Memory. At 8.2 TFLOPS (FP16 and FP32), the MI8 is marked toward inference. The MI8 has a peak (FP64) double precision compute performance 512 GFLOPS.
MI25
The MI25 is a Vega based card, utilizing HBM2 memory. The MI25 performance is expected to be 12.3 TFLOPS using FP32 numbers. In contrast to the MI6 and MI8, the MI25 is able to increase performance when using lower precision numbers, and accordingly is expected to reach 24.6 TFLOPS when using FP16 numbers. The MI25 is rated at <300W TDP with passive cooling. |
https://en.wikipedia.org/wiki/86Box | 86Box is an IBM PC emulator for Windows, Linux and Mac based on PCem that specializes in running old operating systems and software that are designed for IBM PC compatibles. Originally forked from PCem, it later added support for other IBM PC compatible computers as well.
Features
Hardware
The main goal of 86Box is to emulate various IBM PC compatible systems/motherboards from 1981 until 1999, which includes almost all IBM PC models (including the IBM PS/1 model 2121 and the IBM PS/2 model 2011) and supports IBM PC compatible systems/motherboards.
86Box is capable of emulating Intel processors (and its respective clones, including AMD, IDT and Cyrix) from Intel 8088 through the Pentium Tillamook MMX/Mobile MMX processors and Pentium Pro/Pentium II processors from 1997 until 1999. A recompiler is mandatory for P5 Pentium and Cyrix processors and optional for i486 processors and IDT WinChip processors.
86Box can emulate different graphic modes, this includes text mode, Hercules, CGA (including some composite modes and the 160 × 100 × 16 tweaked modes), Tandy, EGA, VGA (including Mode X and other tweaks), VESA, as well as various video APIs such as DirectX and 3Dfx's Glide. 86Box can also emulate various video cards such as the ATI Mach64 GX and the S3 Trio32/64/Virge series. Voodoo cards are also emulated and added support for Voodoo 1/2/3 and various optimizations. A separate recompiler has been added for Voodoo emulation, making it faster to emulate the Voodoo graphics card.
86Box also emulates some sound cards, such as the AdLib, Sound Blaster (including the Game Blaster), Sound Blaster Pro, Sound Blaster 16, Sound Blaster AWE32, Gravis UltraSound, Innovation SSI-2001, Aztech Sound Galaxy Pro 16, Windows Sound System, Ensoniq AudioPCI 64V/ES1371, and Sound Blaster PCI 128.
Operating system support
Similar to Virtual PC, Bochs and QEMU, it emulates almost all versions of Microsoft Windows until Windows 7 (including Service Pack 1); MS-DOS, FreeDOS and CP/M-8 |
https://en.wikipedia.org/wiki/Prefrontal%20synthesis | Prefrontal synthesis (PFS, also known as mental synthesis) is the conscious purposeful process of synthesizing novel mental images. PFS is neurologically different from the other types of imagination, such as simple memory recall and dreaming. Unlike dreaming, which is spontaneous and not controlled by the prefrontal cortex (PFC), PFS is controlled by and completely dependent on the intact lateral prefrontal cortex. Unlike simple memory recall that involves activation of a single neuronal ensemble (NE) encoded at some point in the past, PFS involves active combination of two or more object-encoding neuronal ensembles (objectNE). The mechanism of PFS is hypothesized to involve synchronization of several independent objectNEs. When objectNEs fire out-of-sync, the objects are perceived one at a time. However, once those objectNEs are time-shifted by the lateral PFC to fire in-phase with each other, they are consciously experienced as one unified object or scene.
History of the term
The earliest reference to mental synthesis is found in the doctoral dissertation of S. J. Rowton written in 1864. Paraphrasing Cicero’s description of nature that can only be unified in someone’s mind, S. J. Rowton writes: "... there cannot be one thing unless by a mental synthesis of many things or parts ..."
In the 20th century the term mental synthesis was often used in psychology to describe the experiments of combinatorial nature. In a common experimental setup, subjects are instructed to mentally assemble the verbally described shapes in various ways. For example, the shapes may have been the capital letters ‘J’ and ‘D’, and the subject would then be asked to combine them into as many objects as possible, with size being flexible. A suitable answer in this example would be: an umbrella. The performance in this task is then quantified by counting the number of legitimate patterns that participants construct using the presented shapes.
As the neurobiological study of imagination adva |
https://en.wikipedia.org/wiki/LibreELEC | LibreELEC (short for Libre Embedded Linux Entertainment Center) is a non-profit fork of OpenELEC as an open source software appliance, a Linux-based Just enough operating system for the Kodi media player. This fork of OpenELEC announced in March 2016 as a split from the OpenELEC team after "creative differences", taking most of its active developers at the time to join the new LibreELEC project.
This is a conservative fork of the OpenELEC project with a stronger focus on pre-release testing and post-release change management.
History
Because of the end of Python 2 support in 2020, LibreElec version 10 with Kodi 19 switches to Python 3. Therefore, addons created for prior versions with python 2 need to be updated by developers for Kodi 19 because python code is not backward compatible.
References
External links
ARM operating systems
Embedded Linux distributions
Free media players
Linux distributions used in appliances
Linux-based devices
Linux distributions
Just enough operating systems |
https://en.wikipedia.org/wiki/Link%20Labs | Link Labs is an American company based in Annapolis, Maryland, that develops computer network technology for business and industrial customers. Link Labs technologies are marketed for Internet of things (IoT) applications and devices.
History
The company was founded in 2014 by Brian Ray and 3 engineers from the Johns Hopkins Applied Physics Laboratory.
In August 2015, it announced a venture capital investment of $5.7 million. The investment round was led by TCP and joined by the Maryland Venture Fund, Blu Venture, Inflection Point Partners, and others.
Products
Symphony Link is a low power, wide-area wireless network (LPWAN) that allows for monitoring and two-way communication with sensor devices. According to Link Labs, Symphony Link can support up to 250,000 endpoints on each gateway, and ranges up to 7 miles. Additionally, Symphony Link supports upgrading firmware over the air and allows for sending and receiving compressed bidirectional message acknowledgements.
AirFinder is a product division of Link Labs and a real-time location system (RTLS). It utilizes open-source iBeacon and Bluetooth Low Energy (BLE) technology to track assets and individuals. According to Link Labs, AirFinder is used to improve efficiencies through location tracking in healthcare organizations, manufacturing plants, and transport hubs.
Marketing
In August 2015, Link Labs partnered with Stream Technologies, allowing customers a more robust subscription, billing, and data management platform.
In June 2016, the Stanley Mechanical Solutions unit division of Stanley Black & Decker unveiled its Shelter system, an IoT-enabled school safety system. Link Labs worked in partnership with Stanley Mechanical to create a technological solution with extended battery life, quick response time, and long-range signal capability.
In October 2016, M2M Spectrum Networks announced plans to purchase up to 10,000 base stations.
In November 2016, Link Labs announced via press release that it is devel |
https://en.wikipedia.org/wiki/EarSketch | EarSketch is a free educational programming environment. Its core purpose is to teach coding in two widely used languages, Python and JavaScript, through music composing and remixing. This learning environment was developed first at Georgia Institute of Technology, (from 2011) under Prof. Jason Freeman (School of Music) and Prof. Brian Magerko (School of Literature, Media, and Communication).
EarSketch is web-based, which means users can access it with their web-browsers, and with no installation. No account is required to create projects or view existing projects.
EarSketch comprises different elements: a curriculum, a digital audio workstation (or DAW), a code editor, console, and a sound browser. EarSketch's sound library was created by Young Guru, Jay Z's sound engineer, and famous sound designer Richard Devine.
Purpose
EarSketch has two main goals: to make computer science more engaging for students, and to diversify the population of students interested in computer science.
Engagement in computer science at school
The US has a shortage of computer science students, not only because not all schools are offering CS classes, but also because students do not enroll in such classes. A study published in 2009 states: "The percentage of U.S. high school students taking STEM courses has increased over the last 20 years across all STEM disciplines except computer science where it dropped from 25% to 19%". Considering this, and the fact that all fields of the economy incorporate computing in their operations, EarSketch proposes to motivate students to enroll in CS classes and to pursue CS studies in higher education.
EarSketch attempts to reach this goal by adding a musical side to coding. This strategy is a STEAMs approach to education that integrates arts into STEM teaching. A study conducted at Georgia Tech showed statistically significant results in this domain: students who study with EarSketch have been shown to make progress both in content knowledge and at |
https://en.wikipedia.org/wiki/Maker%20education | Maker education (a term coined by Dale Dougherty in 2013) closely associated with STEM learning, is an approach to problem-based and project-based learning that relies upon hands-on, often collaborative, learning experiences as a method for solving authentic problems. People who participate in making often call themselves "makers" of the maker movement and develop their projects in makerspaces, or development studios which emphasize prototyping and the repurposing of found objects in service of creating new inventions or innovations. Culturally, makerspaces, both inside and outside of schools, are associated with collaboration and the free flow of ideas. In schools, maker education stresses the importance of learner-driven experience, interdisciplinary learning, peer-to-peer teaching, iteration, and the notion of "failing forward", or the idea that mistake-based learning is crucial to the learning process and eventual success of a project.
Influences
Maker education is an offshoot of the maker movement, which Time magazine described as "the umbrella term for independent innovators, designers and tinkerers. A convergence of computer hackers and traditional artisans, the niche is established enough to have its own magazine, Make, as well as hands-on Maker Faires that are catnip for DIYers who used to toil in solitude". Dale Dougherty, founder of the Maker Faire and Make magazine, stated in his 2011 TED Talk that "We are all makers. We are born makers. We don't just live, but we make." In the same TED Talk, Dougherty also called for making to be embraced in education, as students are the new generation of makers. Another central contributor to the maker movement, Chris Anderson, who was once the editor-in-chief of Wired magazine and is now the CEO of 3D Robotics, wrote a manifesto of the maker movement in 2012, called "Makers". His third book, Makers: The New Industrial Revolution (2012), emphasizes the role that making has to play in the renaissance of American manu |
https://en.wikipedia.org/wiki/Scheme-theoretic%20intersection | In algebraic geometry, the scheme-theoretic intersection of closed subschemes X, Y of a scheme W is , the fiber product of the closed immersions . It is denoted by .
Locally, W is given as for some ring R and X, Y as for some ideals I, J. Thus, locally, the intersection is given as
Here, we used (for this identity, see tensor product of modules#Examples.)
Example: Let be a projective variety with the homogeneous coordinate ring S/I, where S is a polynomial ring. If is a hypersurface defined by some homogeneous polynomial f in S, then
If f is linear (deg = 1), it is called a hyperplane section. See also: Bertini's theorem.
Now, a scheme-theoretic intersection may not be a correct intersection, say, from the point of view of intersection theory. For example, let = the affine 4-space and X, Y closed subschemes defined by the ideals and . Since X is the union of two planes, each intersecting with Y at the origin with multiplicity one, by the linearity of intersection multiplicity, we expect X and Y intersect at the origin with multiplicity two. On the other hand, one sees the scheme-theoretic intersection consists of the origin with multiplicity three. That is, a scheme-theoretic multiplicity of an intersection may differ from an intersection-theoretic multiplicity, the latter given by Serre's Tor formula. Solving this disparity is one of the starting points for derived algebraic geometry, which aims to introduce the notion of derived intersection.
Proper intersection
Let X be a regular scheme and V, W closed integral subschemes. Then an irreducible component P of is called proper if the inequality (due to Serre):
is an equality. The intersection is proper if every irreducible component of it is proper (in particular, the empty intersection is considered proper.) Two algebraic cycles are said to intersect properly if the varieties in the cycles intersect properly.
For example, two divisors (codimension-one cycles) on a smooth variety intersect pro |
https://en.wikipedia.org/wiki/Formal%20holomorphic%20function | In algebraic geometry, a formal holomorphic function along a subvariety V of an algebraic variety W is an algebraic analog of a holomorphic function defined in a neighborhood of V. They are sometimes just called holomorphic functions when no confusion can arise. They were introduced by .
The theory of formal holomorphic functions has largely been replaced by the theory of formal schemes which generalizes it: a formal holomorphic function on a variety is essentially just a section of the structure sheaf of a related formal scheme.
Definition
If V is an affine subvariety of the affine variety W defined by an ideal I of the coordinate ring R of W, then a formal holomorphic function along V is just an element of the completion of R at the ideal I.
In general holomorphic functions along a subvariety V of W are defined by gluing together holomorphic functions on affine subvarieties.
References
Algebraic geometry |
https://en.wikipedia.org/wiki/Everglades%20Nutrient%20Removal%20Project | The Everglades Nutrient Removal Project (ENRP) was a demonstration-scale wetland project proposed by the Everglades Forever Act. Functioning as a prototype for the much larger scale Everglades Construction Project, the ENRP was designed to model the process of using Stormwater treatment areas (STAs) to remove nutrients, especially phosphorus, from agricultural runoff entering the Everglades.
Description
Changes in the biotic integrity of the Everglades ecosystem has been largely attributed to the introduction of nutrient-rich runoff from the Everglades Agricultural Area. In 1994, The Everglades Forever Act authorized a 40,000-acre construction project (the Everglades Construction Program) that would use STAs as a way to clean water headed for Everglades National Park of nutrients that would throw the fragile ecosystem out of balance. Never before had a project of that size been managed and so the ENRP was created as an opportunity to gain perspective in the construction and operation of wetlands for nutrient removal. It was designed using 3,815 acres of land as opposed to the 40,000+ acres proposed for the final project. Its primary goal was to reduce the levels of phosphorus entering Water Conservation Area 1 (WCA-1) and to offer critical data and insight into the design and operation of the much larger scale project to come.
Management
The South Florida Water Management District (SFWMD) conducted construction, research and monitoring of the project. This required building structural elements like levees and pump stations and also establishing vegetation. Particular emergent plants such as cattails were employed for their ability to uptake phosphorus out of the water as a means of short term removal, as well as absorbing nutrients into dead plant matter and soil particles for long term removal.
Information gained from the experiment allowed for SFWMD to both anticipate potential problems and ensure that optimized phosphorus retention results could be achieved b |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.