source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Brawlhalla | Brawlhalla is a free-to-play fighting game developed by Blue Mammoth Games. It was originally released for macOS, PlayStation 4 and Windows in 2017, with ports for Nintendo Switch, Xbox One, Android and iOS released later. Full cross-play is supported across all platforms. The game was shown at PAX East in April 2014 and went into alpha later that month. An open beta became available in November 2014, followed by the game’s full release in October 2017. Launching with 34 characters, as of September 2023, the game features 60 playable characters called "Legends", each with their unique stats, loadout, and available cosmetic skins.
On March 5, 2018, Brawlhalla developer-publisher Blue Mammoth Games was acquired by the video game publisher Ubisoft. As a result of this, Ubisoft took over publishing duties and Rayman, alongside two other characters from the franchise, were added to the game on November 6, 2018. Brawlhalla was released for Nintendo Switch and Xbox One on the same day. On July 27, 2022, Ezio from Assassin's Creed became the second playable crossover character to come into the game, alongside one other character from the franchise.
On July 6, 2018, Ars Technica released an article detailing precise player counts for Steam games obtained through a leak as a result of a "hole" in its API. This leak showed Brawlhalla to be ranked 24th in player count on Steam with a total of 8,646,824 players, out of all games featuring the Steam Achievements system. The Android version has more than 10 million downloads. Ubisoft reported more than 20 million players by February 2019. In April 2022, Brawlhalla achieved 80 million players. As of May 2023, Brawlhalla has more than 100 million players.
Gameplay
In most of Brawlhallas game modes, the goal is to knock one's opponent into one of four areas outside of the visual boundaries of the map referred to as blastzones, similar to Super Smash Bros. This can be done either by forcing them into one of the blastzones with a |
https://en.wikipedia.org/wiki/Sider%20%28Automated%20Code%20Review%29 | Sider is an automated code review tool with GitHub. It's based on static code analysis and integrates with a number of open source static analysis tools. It checks style violations, code quality, security and dependencies and provides results as a comment on GitHub pull request.
Sider was developed by Tokyo-based startup Actcat and launched in April 2014. It released technical debt kanban feature for Ruby in August 2016.
Sider changed service and company names from SideCI to Sider in June 2018.
Sider's business was transferred from Sider Inc. to Sleeek Corporation on October 31, 2019.
Features
Easy setup process. Sider can be set up in 30 seconds.
Immediate feedback on Pull Requests. Sider automatically and immediately scans PRs for issues of style, complexity, duplication, and security. On using GitHub Pull Requests, it will point out any issues so that one can discuss and fix them before merging. Moreover, you do not have to change the flow of existing code review.
Get Slack notification. Sider can be officially connected to Slack, which leads you to get notifications for each of your private or public projects. It will tell you whether there is something in need of attention.
Sider is free for open source projects. It offers a limited free plan for private repositories.
Every GitHub user can get a 14-day trial without charge.
Supported languages
Ruby
PHP
JavaScript
TypeScript
CSS
Java
Kotlin
Go
Python
Swift
C/C++
C#
Shell Script
Dockerfile
Markdown
See also
Automated code review
Programming tools
Code review
List of tools for code review
Static Analysis
List of tools for static code analysis
Awards
Ruby biz Grand prix 2016 Special Prize
References
External links
Sider (official website)
Software review |
https://en.wikipedia.org/wiki/Ruled%20join | In algebraic geometry, given irreducible subvarieties V, W of a projective space Pn, the ruled join of V and W is the union of all lines from V to W in P2n+1, where V, W are embedded into P2n+1 so that the last (resp. first) n + 1 coordinates on V (resp. W) vanish. It is denoted by J(V, W). For example, if V and W are linear subspaces, then their join is the linear span of them, the smallest linear subcontaining them.
The join of several subvarieties is defined in a similar way.
See also
Secant variety
References
Algebraic geometry |
https://en.wikipedia.org/wiki/Video%20assistant%20referee | The video assistant referee (VAR) is a match official in association football who assists the referee by reviewing decisions using video footage and providing advice to the referee based on those reviews.
The assistant video assistant referee (AVAR) is match official appointed to assist the VAR in the video operation room. The responsibilities of the AVAR include watching the live action on the field while the VAR is undertaking a "check" or a "review", to keep a record of reviewable incidents, and to communicate the outcome of a review to broadcasters.
Following extensive trialling in a number of major competitions, VAR was formally written into the Laws of the Game by the International Football Association Board (IFAB) on March 3, 2018. Operating under the philosophy of "minimal interference, maximum benefit", the VAR system seeks to provide a way for "clear and obvious errors" and "serious missed incidents" to be corrected.
Procedure
There are four categories of decisions that can be reviewed.
Goal/no goal – attacking team commits an offence, ball out of play, ball entering goal, offside, handball, offences and encroachment during penalty kicks.
Penalty/no penalty – attacking team commits an offence, ball out of play, location of offence, incorrect awarding, offence not penalised.
Direct red card – denial of obvious goal-scoring opportunity, serious foul play, violent conduct/biting/spitting, using offensive/insulting/abusive language or gestures.
Mistaken identity in awarding a red or yellow card.
Check
The VAR and the AVARs automatically check every on-field referee decision falling under the four reviewable categories. The VAR may perform a "silent check," communicating to the referee that no mistake was made, while not causing any delay to the game. At other times, a VAR check may cause the game to be delayed while the VAR ascertains whether or not a possible mistake has occurred. The referee may delay the restart of play for this to occur, and indi |
https://en.wikipedia.org/wiki/Non-separable%20wavelet | Non-separable wavelets are multi-dimensional wavelets that are not directly implemented as tensor products of wavelets on some lower-dimensional space.
They have been studied since 1992.
They offer a few important advantages. Notably, using non-separable filters leads to more parameters in design, and consequently better filters.
The main difference, when compared to the one-dimensional wavelets, is that multi-dimensional sampling requires the use of lattices (e.g., the quincunx lattice).
The wavelet filters themselves can be separable or non-separable regardless of the sampling lattice.
Thus, in some cases, the non-separable wavelets can be implemented in a separable fashion.
Unlike separable wavelet, the non-separable wavelets are capable of detecting structures that are not only horizontal, vertical or diagonal (show less anisotropy).
Examples
Red-black wavelets
Contourlets
Shearlets
Directionlets
Steerable pyramids
Non-separable schemes for tensor-product wavelets
References
Wavelets
Multidimensional signal processing
Image processing |
https://en.wikipedia.org/wiki/Mailfence | Mailfence is a secure and encrypted email service that offers OpenPGP based end-to-end encryption and digital signatures. It was launched in November 2013 by ContactOffice Group, which has been operating an online collaboration suite for universities and other organizations since 1999.
History
Development
In the midst of 2013, the Mailfence project was started by the founders of ContactOffice. In March 2016, a beta version of end-to-end encryption and digital signatures for emails was released.
In January 2021, Mailfence released progressive web application for mobile devices.
Block in Russia
On 5 March 2020, Mailfence reported that their SMTP servers are blocked by Russian based email services. This was in response to their refusal to submit a Notice of Commencement of Collaboration with Roskomnadzor’s (the Federal Supervision Agency for Communications, Information Technology, and Mass Communication) of the Russian government. Mailfence did not respond to this request, citing obligation to provide information about users, violating its Terms and the federal Belgian laws.
Features
Mailfence provides secure email features, with other functions such as Calendar, Contacts, Documents and Collaboration. Encryption and Two-factor authentication are available in the free version of the product. Most other features are only available with paid subscriptions.
Email
The service supports POP/IMAP and Exchange ActiveSync as well as vanity domains with SPF, DKIM, DMARC and catch-all address support. Users can send both plain and rich text emails, organize messages in folders and/or categorize them with tags, take notes by setting comment on each message and create default message signatures for every sender address. Different identities can also be managed using aliases and filters for incoming emails.
Contacts
The contacts support (CSV, vCard, LDIF) import, (vCard, PDF) export and can be accessed using CardDAV. Users organize them with tags and can also create contac |
https://en.wikipedia.org/wiki/Wire%20%28software%29 | Wire is an encrypted communication and collaboration app created by Wire Swiss. It is available for iOS, Android, Windows, macOS, Linux, and web browsers such as Firefox. Wire offers a collaboration suite featuring messenger, voice calls, video calls, conference calls, file-sharing, and external collaboration – all protected by a secure end-to-end-encryption. Wire offers three solutions built on its security technology: Wire Pro – which offers Wire's collaboration feature for businesses, Wire Enterprise – includes Wire Pro capabilities with added features for large-scale or regulated organizations, and Wire Red – the on-demand crisis collaboration suite. They also offer Wire Personal, which is a secure messaging app for personal use.
History
Skype's co-founder Janus Friis helped create Wire and many Wire employees previously worked for Skype. Wire Swiss GmbH launched the Wire app on 3 December 2014. In August 2015, the company added group calling to their app. From its launch until March 2016, Wire's messages were only encrypted between the client and the company's server. In March 2016, the company added end-to-end encryption for its messaging traffic, as well as a video calling feature. Wire Swiss GmbH released the source code of the Wire client applications in July 2016. In 2018, Wire launched its collaboration solution featuring end-to-end encrypted chat, conferencing, video calls and file-sharing on desktop and mobile for businesses.
Features
Wire offers end-to-end encrypted messaging, file-sharing, video and voice calls, and guest rooms for external communication.
The app allows group calling with up to twenty-five participants and video conferences support up to 12 people. A stereo feature places participants in "virtual space" so that users can differentiate voice directionality. The application adapts to varying network conditions.
The application supports the exchange of animated GIFs up to 5MB through a media integration with Giphy. The iOS and Andr |
https://en.wikipedia.org/wiki/Harvey%20Cragon | Harvey G. Cragon (21 April 1929 – 7 September 2018) was an American engineer, who was the Ernest Cockrell, Jr. Centennial Chair Emeritus at the Cockrell School of Engineering, University of Texas at Austin.
Early career
In 1950, Cragon graduated with a Bachelor of Science degree in electrical engineering from Louisiana Tech University in Ruston, Louisiana. After graduating, he worked for Southern Bell Telephone Company in New Orleans for a year and then spent two years in the U.S. Army in a unit that tested infrared night vision devices in the Mojave Desert. In 1953, he joined the Hughes Aircraft Company in Los Angeles, where he worked on automated air defense systems. While at Hughes, he took courses at the University of California, Los Angeles. In 1957, he moved to Tennessee, where he worked as an engineer on the digital instrumentation of a wind tunnel at the United States Air Force (USAF) Arnold Engineering Development Center in Tullahoma with a UNIVAC 1102.
Texas Instruments
In 1959, Cragon joined Texas Instruments, Incorporated in Dallas, Texas, to work on applying digital technology to develop processors for a variety of applications, including seismic data analysis. In 1961, he built the first digital computer (and similar digital central processing units) for use on rockets. He led the development of the TI-870 signal processor in the mid-1960s, as well as the construction of a transistorized computer. In 1965 he started the TI Advanced Scientific Computer (ASC), one of the first vector supercomputers. Its main problem was the cooling of the processor, but it was solved well enough for the ASC to be used until 1985. In the 1970s, he led the development of the TMS320 signal processor, which came out in 1983. The TMS320 and subsequent digital signal processors were revolutionary and had a significant impact in the field.
University of Texas at Austin
After twenty-five years with Texas Instruments, Cragon left industry to teach in academia. As the Ern |
https://en.wikipedia.org/wiki/Nd%20game | A nd game (or nk game) is a generalization of the combinatorial game tic-tac-toe to higher dimensions. It is a game played on a nd hypercube with 2 players. If one player creates a line of length n of their symbol (X or O) they win the game. However, if all nd spaces are filled then the game is a draw. Tic-tac-toe is the game where n equals 3 and d equals 2 (3, 2). Qubic is the game. The or games are trivially won by the first player as there is only one space ( and ). A game with and cannot be won if both players are playing well as an opponent's piece will block the one-dimensional line.
Game theory
An nd game is a symmetric combinatorial game.
There are a total of winning lines in a nd game.
For any width n, at some dimension k (thanks to the Hales-Jewett theorem), there will always be a winning strategy for player X. There will never be a winning strategy for player O because of the Strategy-stealing argument since an nd game is symmetric.
See also
References
External links
Higher-Dimensional Tic-Tac-Toe from the PBS Infinite Series on YouTube
Tic-tac-toe
Unsolved problems in mathematics |
https://en.wikipedia.org/wiki/Tibovirus | Tibovirus is a term often used to describe viruses that are transmitted by tick vectors. The word tibovirus is an acronym (TIck-BOrne virus). This falls within the superorder arthropod thus tibovirus is classified under Arthropod Borne virus (Arborvirus). For a person to acquire infection the tick must bite and feed for a sufficient period of time. The tiboviruses that affect humans are limited to within 3 families: Flaviviridae, Reoviridae, and Bunyaviridae.
Taxonomy
Flaviviridae
Tick-borne meningoencephalitis virus
Disease: Tick-borne meningoencephalitis
Vector: deer tick (Ixodes scapularis), Ixodes ricinus (Europe), Ixodes persulcatus (Russia + Asia))
Region: Europe and Northern Asia
Reoviridae
Colorado tick fever virus
Disease: Colorado tick fever
Vector: Dermacentor andersoni
Region: US (West)
Bunyaviridae
Crimean-Congo hemorrhagic fever virus
Disease: Crimean-Congo hemorrhagic fever
Vector: Hyalomma marginatum, Rhipicephalus bursa
Region: Southern part of Asia, Northern Africa, Southern Europe
Heartland virus
Disease: Severe Febrile Illness
Vector: Lone Star Tick (Amblyomma americanum)
Region: Missouri and Tennessee, United States
References
Viruses |
https://en.wikipedia.org/wiki/National%20Privacy%20Commission | The National Privacy Commission, or NPC, is an independent body created under Republic Act No. 10173 or the Data Privacy Act of 2012, mandated to administer and implement the provisions of the Act, and to monitor and ensure compliance of the country with international standards set for data protection. It is attached to the Philippines' Department of Information and Communications Technology (DICT) for purposes of policy coordination, but remains independent in the performance of its functions. The Commission safeguards the fundamental human right of every individual to privacy, particularly Information privacy while ensuring the free flow of information for innovation, growth, and national development.
In order to fulfill its mandate, the commission is vested with a broad range of powers, from receiving complaints and instituting investigations on matters affecting personal data protection to compelling entities to abide by its orders in matters affecting data privacy. It also represents the Philippine Government internationally on data protection related issues. The Commission formulates and implements policies relating to the protection of personal data, including the relevant circulars and advisory guidelines, to assist organisations in understanding and complying with the Data Privacy Act. The commission also reviews organizational actions in relation to data protection rules and issue decisions or directions for compliance where necessary. It is mandated to work with relevant sector regulators in exercising its functions.
Beyond regulating data protection issues, the NPC also undertakes public and sector-specific educational and outreach activities to help organizations adopt good data protection practices and to help individuals to better understand how they may protect their own personal data from misuse.
History
The Data Privacy Act of 2012 is the first law in the Philippines which acknowledges the rights of Individuals over their Personal Data and Enfor |
https://en.wikipedia.org/wiki/Contraction%20morphism | In algebraic geometry, a contraction morphism is a surjective projective morphism between normal projective varieties (or projective schemes) such that or, equivalently, the geometric fibers are all connected (Zariski's connectedness theorem). It is also commonly called an algebraic fiber space, as it is an analog of a fiber space in algebraic topology.
By the Stein factorization, any surjective projective morphism is a contraction morphism followed by a finite morphism.
Examples include ruled surfaces and Mori fiber spaces.
Birational perspective
The following perspective is crucial in birational geometry (in particular in Mori's minimal model program).
Let X be a projective variety and the closure of the span of irreducible curves on X in = the real vector space of numerical equivalence classes of real 1-cycles on X. Given a face F of , the contraction morphism associated to F, if it exists, is a contraction morphism to some projective variety Y such that for each irreducible curve , is a point if and only if . The basic question is which face F gives rise to such a contraction morphism (cf. cone theorem).
See also
Castelnuovo's contraction theorem
Flip (mathematics)
References
Robert Lazarsfeld, Positivity in Algebraic Geometry I: Classical Setting (2004)
Algebraic geometry |
https://en.wikipedia.org/wiki/24-n-Propylcholestane | 24-n-Propylcholestane is a sterane biomarker molecule often found in marine source rocks. It is a C30 molecule, meaning that it is composed of thirty carbon atoms, and is one of the leading ways to distinguish a marine source rock from a terrigenous sample. It is composed of three six-carbon rings and one five-carbon ring, with two methyl groups and one eleven carbon side chain. 24-n-Propylcholestane has a molar mass of 414.76 g/mol.
24-n-Propylcholestane is a sterane, which are derived from sterols after being buried in the sediment. Sterols turn into steranes by saturating the sterol's double bond and removing the alcohol group. Steranes are fairly stable, and are often found in source rocks and crude oils.
24-n-Propylcholestane is derived from 24-n-propylcholesterol, which is made in the modern ocean by Chrysophyte algae. Because of its known modern creator, it is thought that traces of 24-n-propylcholestane in ancient sediments were likely produced by older algaes of the same order Chrysophyte. The marine algae is consumed by marine invertebrates, and so 24-n-propylcholesterols are also found in invertebrates, despite not being produced by them. Regardless of which organism is observed containing 24-n-propylcholesterols, the molecule originated from Chrysophyte algae.
The ratio of 24-n-propylcholestanes to 24-iso-propylcholestanes is used as an indicator for the presence of sponges.
Detection
In sediments, sterane biomarkers are found as a mixture of stereoisomers. It can be difficult to separate out a specific stereoisomer, as is necessary for the detection of solely 24-n-propylcholestane. Because of this, 24-n-propylcholestane can be fairly difficult to detect using gas chromatography-mass spectrum (GC-MS). It has a m/z of 414 and a secondary peak at 217, and can be easily confused for a different group of C30 molecules, 4ɑ-methylsteranes.
References
Biomarkers
Cholestanes |
https://en.wikipedia.org/wiki/E%20series%20of%20preferred%20numbers | The E series is a system of preferred numbers (also called preferred values) derived for use in electronic components. It consists of the E3, E6, E12, E24, E48, E96 and E192 series, where the number after the 'E' designates the quantity of logarithmic value "steps" per decade. Although it is theoretically possible to produce components of any value, in practice the need for inventory simplification has led the industry to settle on the E series for resistors, capacitors, inductors, and zener diodes. Other types of electrical components are either specified by the Renard series (for example fuses) or are defined in relevant product standards (for example IEC 60228 for wires).
History
During the Golden Age of Radio (1920s to 1950s), numerous companies manufactured AM radio receivers for consumer use. In the early years, many components were not standardized between radio manufacturers. The capacitance values of capacitors (previously called condensers) and resistance values of resistors were not standardized.
In 1924, the Radio Manufacturers Association (RMA) was formed in Chicago, Illinois by 50 radio manufacturers to license and share patents. Over time, this group created some of the earliest standards for electronics components. In 1936, the RMA adopted a preferred number system for the resistance values of fixed composition resistors. Over time, resistor manufacturers migrated from older values to the 1936 resistance value standard.
During World War II (1940s), American and British military production was a major influence for establishing common standards across many industries, especially in electronics, where it was essential to produce large quantities of standardized electronic parts for military wireless communication and Radar devices. Later, the mid-20th century baby boom and the invention of the transistor kicked off demand for consumer electronics goods during the 1950s. As transistor radio production migrated from United States towards Japan |
https://en.wikipedia.org/wiki/High-voltage%20interface%20relay | High voltage interface relays, a.k.a., interface relays: or coupling relays or insulating interfaces is a special class of electrical relays designed to provide informational and electrical compatibility between functional components isolated from each other and not allowing for a direct connection due to a high difference of potentials. A common design principle of these devices is a special galvanic isolation module between the input (control) and the output (switching) circuits of the relay. Interface relays are widely used in control and protection systems of high voltage (10-100 kV) electronic and electrophysical equipment and in high power installations.
Classification
Any electromagnetic relay has a certain level of isolation between the input and output circuits. However, in ordinary relays, this function is not prevalent and, hence, not considered in the existing system of relay classification. In interface relays, however, the property of galvanic isolation (decoupling) between the input and output circuits is significantly bolstered, and parameters of the galvanic isolation have an utmost importance from standpoint of the functions performed by this relay. On the other hand, the parameters associated with switching capacity are secondary and can significantly vary in interface relays with the same level of galvanic decoupling.
In this respect, categorization of interface relays into existing classes of ordinary relays is arguable. Rather, it seems more appropriate to categorize them as a separate class of electrical relays and classify according to characteristics of the galvanic decoupling unit
by insulation voltage level:
low level (to 10 kV)
medium level (10 to 100 kV)
high level (above 100 kV)
by construction of galvanic isolation module:
opto-electronic
electromagnetic (transformer)
pneumatic
radio frequency
ultrasonic
electrohydrolic
with mechanical transmission
by operational (execution) speed:
super fast (up to 100 μsec)
fast (100 |
https://en.wikipedia.org/wiki/List%20of%20selective%20estrogen%20receptor%20modulators | This is a list of selective estrogen receptor modulators (SERMs).
Approved
SERMs that have been approved for medical use include anordrin (+mifepristone (Zi Yun)), bazedoxifene (+conjugated estrogens (Duavee)), broparestrol (Acnestrol), clomifene (Clomid), cyclofenil (Sexovid), lasofoxifene (Fablyn), ormeloxifene (Centron, Novex, Novex-DS, Sevista), ospemifene (Osphena; deaminohydroxytoremifene), raloxifene (Evista), tamoxifen (Nolvadex), and toremifene (Fareston; 4-chlorotamoxifen).
Clinical trials
SERMs that are currently under development and in clinical trials include acolbifene, afimoxifene (4-hydroxytamoxifen; metabolite of tamoxifen), elacestrant, enclomifene ((E)-clomifene), endoxifen (4-hydroxy-N-desmethyltamoxifen; metabolite of tamoxifen), and zuclomifene ((Z)-clomifene).
Non-approved
SERMs that have not been approved for medical use include arzoxifene, brilanestrant, clomifenoxide (clomiphene N-oxide; metabolite of clomifene), droloxifene (3-hydroxytamoxifen), etacstil, fispemifene, GW-7604 (4-hydroxyetacstil; metabolite of etacstil), idoxifene (pyrrolidino-4-iodotamoxifen), levormeloxifene ((L)-ormeloxifene), miproxifene, nafoxidine, nitromifene (CI-628), NNC 45-0095, panomifene, pipendoxifene (ERA-923), trioxifene, and zindoxifene (D-16726).
Sivifene (A-007) was initially thought to be a SERM due to its structural similarity to tamoxifen but it was subsequently found not to bind to the estrogen receptor (ER). Tesmilifene (DPPE; YMB-1002, BMS-217380-01) is also structurally related to tamoxifen but similarly does not bind to the ER and is not a SERM.
Structure
SERMs can be variously classified structurally as triphenylethylenes (tamoxifen, clomifene, toremifene, droloxifene, idoxifene, ospemifene, fispemifene, afimoxifene, others), benzothiophenes (raloxifene, arzoxifene), indoles (bazedoxifene, zindoxifene, pipendoxifene), tetrahydronaphthalenes (lasofoxifene, nafoxidine), and benzopyrans (acolbifene, ormeloxifene, levormeloxifene).
References
S |
https://en.wikipedia.org/wiki/IBM%202395%20Processor%20Storage | The IBM 2395 Processor Storage is a memory storage unit that was a component of the IBM System/360 Model 91 and Model 95.
Despite the name, IBM 2395 Processor Storage was used for more Model 91s than for Model 95s; the Model 95 used thin-film memory for the first 1MB of memory, and only two Model 95 machines were produced.
Models
There were 2 models of the 2395: the Model 1 supplied 2 megabytes of memory, and the Model 2 had 4 MB.
Other use by IBM of 2395
iSeries 9406-820 (processor 2395)
IBM 95Y2395 - FC5022 2-PORT 16GB FC ADPT
References
Computer memory
2395 Processor Storage |
https://en.wikipedia.org/wiki/Nature-based%20solutions | Nature-based solutions (NBS) is the sustainable management and use of natural features and processes to tackle socio-environmental issues.
These issues include climate change (mitigation and adaptation), water security, water pollution, food security, human health, biodiversity loss, and disaster risk management. The European Commission's definition of NBS states that these solutions are "inspired and supported by nature, which are cost-effective, simultaneously provide environmental, social and economic benefits and help build resilience. Such solutions bring more, and more diverse, nature and natural features and processes into cities, landscapes, and seascapes, through locally adapted, resource-efficient and systemic interventions". In 2020, the EC definition was updated to further emphasise that "Nature-based solutions must benefit biodiversity and support the delivery of a range of ecosystem services." Through the use of NBS healthy, resilient, and diverse ecosystems (whether natural, managed, or newly created) can provide solutions for the benefit of both societies and overall biodiversity.
For instance, the restoration and/or protection of mangroves along coastlines utilizes a Nature-based solution to accomplish several goals. Mangroves moderate the impact of waves and wind on coastal settlements or cities and sequester CO2. They also provide nursery zones for marine life that can be the basis for sustaining fisheries on which local populations may depend. Additionally, mangrove forests can help to control coastal erosion resulting from sea level rise. Similarly, green roofs or walls are Nature-based solutions that can be implemented in cities to moderate the impact of high temperatures, capture storm water, abate pollution, and act as carbon sinks, while simultaneously enhancing biodiversity.
Conservation approaches and environmental management initiatives have been carried out for decades. More recently, progress has been made in better articulating the |
https://en.wikipedia.org/wiki/Monitoring%20as%20a%20service | Monitoring as a service (MaaS) is one of many cloud computing delivery models under anything as a service (XaaS). It is a framework that facilitates the deployment of monitoring functionalities for various other services and applications within the cloud. The most common application for MaaS is online state monitoring, which continuously tracks certain states of applications, networks, systems, instances or any element that may be deployable within the cloud.
References
Cloud computing
As a service |
https://en.wikipedia.org/wiki/Basis%20expansion%20time-frequency%20analysis | Linear expansions in a single basis, whether it is a Fourier series, wavelet, or any other basis, are not suitable enough. A Fourier basis provided a poor representation of functions well localized in time, and wavelet bases are not well adapted to represent functions whose Fourier transforms have a narrow high frequency support. In both cases, it is difficult to detect and identify the signal patterns from their expansion coefficients, because the information is diluted across the whole basis. Therefore, we must use large amounts of Fourier basis or Wavelets to represent whole signal with small approximation error. Some matching pursuit algorithms are proposed in reference papers to minimize approximation error when given the amount of basis.
Properties
For Fourier series
Some time-frequency analysis are also attempt to represent signal as the form below
when given the amount of basis M, minimize approximation error in mean-square sense
Examples
Three-parameter atoms
Since are not orthogonal, should be determined by a matching pursuit process.
Three parameters:
controls the central time.
controls the central frequency.
controls the scaling factor.
Four-parameter atoms (chirplet)
Four parameters:
controls the central time
controls the central frequency
controls the scaling factor
controls the chirp rate
Short-time Fourier transform of different basis
References
S. G. Mallat and Z. Zhang, “Matching pursuits with time-frequency dictionaries,” IEEE Trans. Signal Process., vol. 41, no. 12, pp. 3397–3415, Dec. 1993.
A. Bultan, “A four-parameter atomic decomposition of chirplets,” IEEE Trans. Signal Process., vol. 47, no. 3, pp. 731–745, Mar. 1999.
C. Capus, and K. Brown. "Short-time fractional Fourier methods for the time-frequency representation of chirp signals," J. Acoust. Soc. Am. vol. 113, issue 6, pp. 3253–3263, 2003.
Jian-Jiun Ding, Time frequency analysis and wavelet transform class note, Department of Electrical Engineering, |
https://en.wikipedia.org/wiki/Growth%20function | The growth function, also called the shatter coefficient or the shattering number, measures the richness of a set family. It is especially used in the context of statistical learning theory, where it measures the complexity of a hypothesis class.
The term 'growth function' was coined by Vapnik and Chervonenkis in their 1968 paper, where they also proved many of its properties.
It is a basic concept in machine learning.
Definitions
Set-family definition
Let be a set family (a set of sets) and a set. Their intersection is defined as the following set-family:
The intersection-size (also called the index) of with respect to is . If a set has elements then the index is at most . If the index is exactly 2m then the set is said to be shattered by , because contains all the subsets of , i.e.:
The growth function measures the size of as a function of . Formally:
Hypothesis-class definition
Equivalently, let be a hypothesis-class (a set of binary functions) and a set with elements. The restriction of to is the set of binary functions on that can be derived from :
The growth function measures the size of as a function of :
Examples
1. The domain is the real line .
The set-family contains all the half-lines (rays) from a given number to positive infinity, i.e., all sets of the form for some .
For any set of real numbers, the intersection contains sets: the empty set, the set containing the largest element of , the set containing the two largest elements of , and so on. Therefore: . The same is true whether contains open half-lines, closed half-lines, or both.
2. The domain is the segment .
The set-family contains all the open sets.
For any finite set of real numbers, the intersection contains all possible subsets of . There are such subsets, so .
3. The domain is the Euclidean space .
The set-family contains all the half-spaces of the form: , where is a fixed vector.
Then ,
where Comp is the number of components in a partitioning |
https://en.wikipedia.org/wiki/Conveyor%20bridge | A conveyor bridge is a piece of mining equipment used in strip mining for the removal of overburden and for dumping it on the inner spoil bank of the open-cut mine. It is used together with multibucket excavators, frequently bucket chain excavators, that remove the overburden which is moved to the bridge by connecting conveyors. Conveyor bridges are used in working horizontally layered deposits with soft overburden rock in areas where mean annual temperatures are above freezing. They are frequently used in lignite mining.
Setup
A conveyor bridge consists of girders resting on two or three supports mounted on rails, or sometimes on crawler tracks. The bridge is set across the pit and moves along the mining face at a few metres per minute. If it runs on rails, the tracks are shifted in accordance with the progress of the mining. The rock is moved from the excavator to the bridge by connecting conveyors. The dumping support of a conveyor bridge may rest on the soil of the seam or on a dumping mound specially poured and packed by the bridge itself, depending on the stability of the rock.
History and examples
The first conveyor bridge was built in Plessa lignite mine, Agnes according to plans of mine director Friedrich von Delius. It was scrapped in 1959 after exposure of clay beds made mining in the pit unsafe.
A large conveyor bridge with 200 m span and 50 m height, fed by a bucket-wheel excavator, was completed in 1930 in the Böhlen lignite mine. After it was toppled by a storm in 1937, a replacement went into service in 1939.
The conveyor bridge of Espenhain lignite mine with a total length of 545 m, which started operation in 1944, could remove an overburden of 45 m thickness.
Between 1969 and 1991, TAKRAF built five very large conveyor bridges of the type F60 of which four are still in operation in lignite mines in Lower Lusatia, and one has been preserved as a visitor attraction. These were constructed for removing overburden up to 60 m thick, are 502 m |
https://en.wikipedia.org/wiki/MPEG-A | MPEG-A is a group of standards for composing MPEG systems formally known as ISO/IEC 23000 - Multimedia Application Format, published since 2007.
MPEG-A consists of 20 parts, including:
MPEG-A Part 1: Purpose for multimedia application formats
MPEG-A Part 2: MPEG music player application format
MPEG-A Part 3: MPEG photo player application format
MPEG-A Part 4: Musical slide show application format
MPEG-A Part 5: Media streaming application format
MPEG-A Part 6: Professional archival application format
MPEG-A Part 7: Open access application format
MPEG-A Part 8: Portable video application format
MPEG-A Part 9: Digital Multimedia Broadcasting application format
MPEG-A Part 10: Surveillance application format
MPEG-A Part 11: Stereoscopic video application format
MPEG-A Part 12: Interactive music application format
MPEG-A Part 13: Augmented reality application format
MPEG-A Part 15: Multimedia preservation application format
MPEG-A Part 16: Publish/Subscribe Application Format
MPEG-A Part 17: Multiple sensorial media application format
MPEG-A Part 18: Media linking application format
MPEG-A Part 19: Common media application format (CMAF) for segmented media (MPEG CMAF), – a media application format for ABR (adaptive bitrate) media
See also
ISO/IEC JTC 1/SC 29
References
ISO/IEC standards
MPEG |
https://en.wikipedia.org/wiki/Bayesian%20model%20of%20computational%20anatomy | Computational anatomy (CA) is a discipline within medical imaging focusing on the study of anatomical shape and form at the visible or gross anatomical scale of morphology.
The field is broadly defined and includes foundations in anatomy, applied mathematics and pure mathematics, including medical imaging, neuroscience, physics, probability, and statistics. It focuses on the anatomical structures being imaged, rather than the medical imaging devices.
The central focus of the sub-field of computational anatomy within medical imaging is mapping information across anatomical coordinate systems most often dense information measured within a magnetic resonance image (MRI). The introduction of flows into CA, which are akin to the equations of motion used in fluid dynamics, exploit the notion that dense coordinates in image analysis follow the Lagrangian and Eulerian equations of motion. In models based on Lagrangian and Eulerian flows of diffeomorphisms, the constraint is associated to topological properties, such as open sets being preserved, coordinates not crossing implying uniqueness and existence of the inverse mapping, and connected sets remaining connected. The use of diffeomorphic methods grew quickly to dominate the field of mapping methods post Christensen's
original paper, with fast and symmetric methods becoming available.
The main statistical model
The central statistical model of Computational Anatomy in the context of medical imaging has been the source-channel model of Shannon theory; the source is the deformable template of images , the channel outputs are the imaging sensors with observables (see Figure). The importance of the source-channel model is that the variation in the anatomical configuration are modelled separated from the sensor variations of the Medical imagery. The Bayes theory dictates that the model is characterized by the prior on the source, on , and the conditional density on the observable
conditioned on .
In deformable tem |
https://en.wikipedia.org/wiki/Iberian%20Books | Iberian Books is a bibliographical research project set up to chart the development of printing in Spain, Portugal and the New World in the early-modern period. It offers a catalogue of what was known to have been printed, along with a survey of surviving copies and links to digital editions.<ref>Alexander S. Wilkinson, 'Exploring the Print World of Early-Modern Iberia', Bulletin of Spanish Studies (2012), 89 (4):491-506 and Alejandra Ulla Lorenzo, 'Iberian Book Project (1472-1650): sobre los usos del catálogo en el estudio del impreso científico antiguo'. Ciencias y traducción en el mundo hispánico. 3, Mantua, "Pliegos"</ref> It is funded by the Andrew W. Mellon Foundation. The records created are made available in an open-access database under a Creative Commons license.
Established in 2007 and based in the School of History at University College Dublin, as of December 2016 the project has made available data for the period from the beginning of printing in the Iberian Peninsula around 1472 to the middle of the seventeenth century. In late 2017, the project expects to publish the datasets for the second half of the seventeenth century. The datasets currently available online (1472-1650) hold information on 66,000 items, 339,000 copies, and 15,000 digital copies.
The project works in partnership with the Digital Library Group at University College Dublin and with the Universal Short Title Catalogue Project based at the University of St Andrews.
Project
Iberian Books is a bibliographical resource similar to the English Short Title Catalogue, helping to identify works by a given author or publisher, or on a given subject. In addition, it helps in identifying and mapping broader publishing trends. The datasets are published via a platform that facilitates the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) harvesting of metadata in OAI-compliant Dublin Core and Metadata Object Description Schema (MODS) formats. The datasets have also been inc |
https://en.wikipedia.org/wiki/I3C%20%28bus%29 | I3C is a specification to enable communication between computer chips by defining the electrical connection between the chips and signaling patterns to be used. Short for "Improved Inter Integrated Circuit", the standard defines the electrical connection between the chips to be a two wire, shared (multidrop), serial data bus, one wire (SCL) being used as a clock to define the sampling times, the other wire (SDA) being used as a data line whose voltage can be sampled. The standard defines a signalling protocol in which multiple chips can control communication and thereby act as the bus controller.
The I3C specification takes its name from, uses the same electrical connections as, and allows some backward compatibility with, the I²C bus, a de facto standard for inter-chip communication, widely used for low-speed peripherals and sensors in computer systems. The I3C standard is designed to retain some backward compatibility with the I²C system, notably allowing designs where existing I²C devices can be connected to an I3C bus but still have the bus able to switch to a higher data rate for communication at higher speeds between compliant I3C devices. The I3C standard thereby combines the advantage of the simple, two wire I²C architecture with the higher communication speeds common to more complicated buses such as the Serial Peripheral Interface (SPI).
The I3C standard was developed as a collaborative effort between electronics and computer related companies under auspices of the Mobile Industry Processor Interface Alliance (MIPI Alliance). The I3C standard was first released to the public at the end of 2017, although access requires the disclosure of private information. Google and Intel have backed I3C as a sensor interface standard for Internet of things (IoT) devices.
History
Goals of the MIPI Sensor Working Group effort were first announced in November 2014 at the MEMS Executive Congress in Scottsdale AZ.
Electronic design automation tool vendors including Caden |
https://en.wikipedia.org/wiki/Audiovisualogy | The etymological meaning of the word audiovisualogy is linked, on the one hand, with the term audiovisual, referring to the means jointly related to the view and the hearing and, on the other hand, to the suffix logy, that refers to logos, and that in Greek means treaty, knowledge. Therefore, audiovisualogy must be understood as a study of the audiovisual media that, due to its broad meaning, could be related to either the cinema, the television or any other art.
It is also feasible to understand it as the means and art that combine fixed projected images (slides or digital support) in its montage, accompanied by sounds of a different nature, therefore meaning a language different from the film, since it does not use the image in motion.
Although it was known in France as diaporama (slideshow) in 1950, its current name of audiovisual art is truly accepted in many fields, such as in some institutions in the United Kingdom, like photo clubs and others with a high artistic level, as the Royal Photography Society, among others.
From this perspective, it is also possible to develop a theory about the audiovisual art, thus defining it as the language that combines still images (pictures with sound), in a montage that by its condition is displayed as in the cinema, in a room designed for that purpose.
Historical background
The audiovisual art constitutes a means of expression which came before the cinema. In fact, projections of still images are really old. In 1660, Athanasius Kircher invented one of the first magic lanterns that worked as a real projector, which had a great diffusion afterwards.
Moreover, from another point of view, the prehistoric man could be considered as the first audiovisual spectator of humanity, who contemplated the static skies and the landscape in amazement, along with the sounds of nature coming from the animals and the storms. The cave paintings inside the caves ended up representing the first screen of the humanity in the dark inside of |
https://en.wikipedia.org/wiki/Microsoft%20Academic | Microsoft Academic was a free internet-based academic search engines for academic publications and literature, developed by Microsoft Research, shut down in 2022. At the same time, OpenAlex was launched and claimed to be a successor to Microsoft Academic.
History
Microsoft Academic gained prominence because it profiled authors, organizations, keywords, and journals and made the dataset available as open data, in contrast to Google Scholar. The search engine indexed over 260 million publications, 88 million of which are journal articles.
Preliminary reviews by bibliometricians suggested the new Microsoft Academic Search was a competitor to Google Scholar, Web of Science, and Scopus for academic research purposes as well as citation analysis. However, it was primarily used as a resource in the field of computer science since that was the most completely indexed information.
On May 4, 2021, Microsoft announced that the Microsoft Academic website and APIs would be retired on December 31, 2021.
Thanks to the open data license, the Microsoft Academic dataset was merged into OpenAlex. However, the underlying software was proprietary and had to be rewritten.
That Microsoft launched and soon after shut down both Microsoft Academic and its predecessor Microsoft Academic Search has been interpreted as a sign that Microsoft "had never intended to enter into the business of scholarly metadata. Instead, the tech giant has been using data on scholarly communication as testing ground for big data and artificial intelligence (AI) technologies".
Technology
The Academic Knowledge API offered information retrieval from the underlying database using REST endpoints for advanced research purposes. The search engine provided not only search results and access to sources but also citation information that include the number of sources, g-index, and h-index. Aside from academic publications, it was also used to find websites that contain state and local records. The technology uses |
https://en.wikipedia.org/wiki/Bondi%E2%80%93Metzner%E2%80%93Sachs%20group | In gravitational theory, the Bondi–Metzner–Sachs (BMS) group, or the Bondi–van der Burg–Metzner–Sachs group, is an asymptotic symmetry group of asymptotically flat, Lorentzian spacetimes at null (i.e., light-like) infinity. It was originally formulated in 1962 by Hermann Bondi, M. G. van der Burg, A. W. Metzner and Rainer K. Sachs in order to investigate the flow of energy at infinity due to propagating gravitational waves. Half a century later, this work of Bondi, van der Burg, Metzner, and Sachs is considered pioneering and seminal. In his autobiography, Bondi considered the 1962 work as his "best scientific work".
1962 work of Bondi, van der Burg, Metzner, and Sachs
To give some context for the general reader, the naive expectation for asymptotically flat spacetime symmetries, i.e., symmetries of spacetime seen by observers located far away from all sources of the gravitational field, might be to extend and reproduce the symmetries of flat spacetime of special relativity, viz., the Poincaré group, which is a ten-dimensional group of three Lorentz boosts, three rotations, and four spacetime translations.
Expectations aside, the first step in the work of Bondi, van der Burg, Metzner, and Sachs was to decide on some physically sensible boundary conditions to place on the gravitational field at light-like infinity to characterize what it means to say a metric is asymptotically flat, with no a priori assumptions made about the nature of the asymptotic symmetry group — not even the assumption that such a group exists. Then after artfully designing what they considered to be the most sensible boundary conditions, they investigated the nature of the resulting asymptotic symmetry transformations that leave invariant the form of the boundary conditions appropriate for asymptotically flat gravitational fields. What they found was that the asymptotic symmetry transformations actually do form a group and the structure of this group does not depend on the particular grav |
https://en.wikipedia.org/wiki/OMNeT%2B%2B | OMNeT++ (Objective Modular Network Testbed in C++) is a modular, component-based C++ simulation library and framework, primarily for building network simulators. OMNeT++ can be used for free for non-commercial simulations like at academic institutions and for teaching. OMNEST is an extended version of OMNeT++ for commercial use.
OMNeT++ itself is a simulation framework without models for network protocols like IP or HTTP. The main computer network simulation models are available in several external frameworks. The most commonly used one is INET which offers a variety of models for all kind of network protocols and technologies like for IPv6, BGP. INET also offers a set of mobility models to simulate the node movement in simulations. The INET models are licensed under the LGPL or GPL. NED (NEtwork Description) is the topology description language of OMNeT++.
To manage and reduce the time to carry out large-scale simulations, additional tools have been developed, for example, based on Python.
See also
MLDesigner
QualNet
NEST (software)
References
Computer networking
Computer network analysis
Simulation software
Telecommunications engineering |
https://en.wikipedia.org/wiki/N26 | N26 (known as Number 26 until July 2016) is a German neobank headquartered in Berlin, Germany. N26 was founded in 2013 in a Rocket Internet Incubator and currently operates in various member states of the Single Euro Payments Area (SEPA). It provides a free basic current account and a debit card, with overdraft and investment products and premium accounts available for a monthly fee.
History
The company was founded as a financial technology startup in 2013 by Valentin Stalf and Maximilian Tayenthal. According to Stalf, the name is derived from number of smaller cubes in a complete Rubik's Cube, since a 3x3x3 cube has 26 individual visible cubes (27 less, 1 hidden). In April 2015, N26 received €10 million in a series A round by Valar Ventures.
Initially, Number 26 started operations without holding a banking license; instead, it was provided an interface to a back end provided by Wirecard. In July 2016, it re-branded as N26 Bank, having received its own banking license from BaFin.
In June 2016 N26 notified several customers that their accounts were going to be terminated. The company cited as main reasons that some customers were making too many ATM withdrawals, while others were suspected of money laundering.
In November 2016, customers were asked to transfer their accounts to N26 Bank's infrastructure. As a result, they would have to get a new account IBAN number and accounts held by Wirecard would be terminated. During the transfer of its customer base to its own banking infrastructure, N26 customers reported various problems.
In December 2016, N26 announced that its basic current account would be available to 17 Eurozone countries.
In March 2018, N26 raised $160 million in a series C round by Chinese internet giant Tencent Holdings and Allianz X (Allianz). On the same date, N26 claimed to have a customer base of 850,000, aiming to have 5,000,000 customers by 2020.
In January 2019, N26 raised an additional $300 million in a series D round led by Insight V |
https://en.wikipedia.org/wiki/HiOS | HiOS (), is an Android-based operating system developed by Hong Kong mobile phone manufacturer Tecno Mobile, a subsidiary of Transsion Holdings, exclusively for their smartphones.
HiOS allows for a wide range of user customization without requiring rooting the mobile device. The operating system is also bundled with utility applications that allow users to free up memory, freeze applications, limit data accessibility to applications among others. HiOS comes with features like; Launcher, Private Safe, Split Screen and Lockscreen Notification.
History
In April 2016, Tecno Mobile released HiOS 1.0, based on Android 6.0 "Marshmallow", featuring a launcher and micro-intelligence. The HiOS was first launched on Tecno Boom J8. In March 2017, HiOS 2.0 was released based on Android 7.0 "Nougat", launching on Camon CX and L9 Plus. It also came with launcher, consisting of Hi Search, Hi Theme, Hi Manager and split screen.
In October 2017, HiOS 3.0 was also released based on Android 7.0 as seen in HiOS 2.0, but with improved user interfaces, launching on Phantom 8 and Camon CM. HiOS 3.0 also came with Boomplay Music and Phoenix Browser as primary browsers, it also came with T-Point, Micro Intelligence and Eye Care.
In November 2018, HiOS 4.1 was released based on Android 8.1 "Oreo", launching on Camon 11 and Camon 11 Pro, featuring ZeroScreen, one-hand mode and dual apps. The HiOS 4.1 also came with Gesture Navigation and Face ID.
In April 2019, HiOS 5.0 was released based on Android 9.0 "Pie", launching on Spark 3 and Phantom 9, featuring Smart Panel, AI Read Mode and Intelligent Voice Broadcast. In September 2019, HiOS 5.5 was also released based on Android 9.0 "Pie", launching on Camon 12 and Spark 4, featuring AR Virtual Canvas, Closed Eye Detection, Gesture Call Picker and Fingerprint Reset Password.
In February 2020, HiOS 6.0 was released based on Android 10, launching on Camon 15. The beta version of HiOS 6.0 was released to Tecno Spark 3 Pro on 1 December 2019, fe |
https://en.wikipedia.org/wiki/Newly%20Swissed | Newly Swissed is a digital entertainment magazine about Switzerland, first published in January 2010. It covers topics related to culture, design, events, oddities and tourism in Switzerland.
History
Newly Swissed was launched in 2010 by Dimitri Burkhard, a digital marketing expert. The magazine incorporated as Newly Swissed GmbH in 2015. At the time, it was the only online magazine about Switzerland written in English. Newly Swissed is frequently quoted by major publications on the subject of expat life in Switzerland.
In the early stages, observations about Swiss lifestyle and culture served as the main sources of content. Now, the magazine covers a range of topics in-depth, from architecture to oddities, and from tourism to advice on in Switzerland. The publication is primarily concerned with serving the international community in Switzerland, as well as the Swiss population living abroad. Much of the magazine’s success has historically been built on its journalistic coverage of Switzerland from the perspective of multiple writers.
The readership is primarily located in Switzerland, followed by the United States and the United Kingdom.
References
External links
Newly Swissed Online Magazine
2010 establishments in Switzerland
Magazines established in 2010
Swiss entertainment websites
Online magazines
English-language magazines
Magazines published in Switzerland
Entertainment magazines |
https://en.wikipedia.org/wiki/CI/CD | In software engineering, CI/CD or CICD is the combined practices of continuous integration (CI) and continuous delivery (CD) or, less often, continuous deployment. They are sometimes referred to collectively as continuous development or continuous software development.
Comparison
Continuous integration Frequent merging of several small changes into a main branch.
Continuous delivery When teams produce software in short cycles with high speed and frequency so that reliable software can be released at any time, and with a simple and repeatable deployment process when deciding to deploy.
Continuous deployment When new software functionality is rolled out completely automatically.
Motivation
CI/CD bridges the gaps between development and operation activities and teams by enforcing automation in building, testing and deployment of applications. CI/CD services compile the incremental code changes made by developers, then link and package them into software deliverables. Automated tests verify the software functionality, and automated deployment services deliver them to end users. The aim is to increase early defect discovery, increase productivity, and provide faster release cycles. The process contrasts with traditional methods where a collection of software updates were integrated into one large batch before deploying the newer version. Modern-day DevOps practices involve:
continuous development,
continuous testing,
continuous integration,
continuous deployment, and
continuous monitoring
of software applications throughout its development life cycle. The CI/CD practice, or CI/CD pipeline, forms the backbone of modern day DevOps operations.
See also
Continuous integration (CI)
Continuous delivery (CD)
Continuous deployment (CD)
References
External links
Software development |
https://en.wikipedia.org/wiki/LineageOS | LineageOS is an Android-based operating system for smartphones, tablet computers, and set-top boxes, with mostly free and open-source software. It is the successor to CyanogenMod, from which it was forked in December 2016, when Cyanogen Inc. announced it was discontinuing development and shut down the infrastructure behind the project. Since Cyanogen Inc. retained the rights to the Cyanogen name, the project rebranded its fork as LineageOS.
LineageOS was officially launched on 24 December 2016, with the source code available on both GitHub and GitLab. In March 2017, it reportedly had one million users with the OnePlus One being the most popular device.
History
CyanogenMod (often abbreviated "CM") was a popular open-source operating system for smartphones and tablet computers, based on the Android mobile platform. CyanogenMod users can opt-in to report their use of the firmware. In March 2015, Forbes indicated over 50 million people were running CyanogenMod on their phones.
In 2013, the founder, Stefanie Jane, obtained venture funding under the name Cyanogen Inc. to allow commercialization of the project. In her view, the company did not capitalize on the project's success and in 2016 she either left or was forced out as part of a corporate restructure which involved a change of CEO, closure of offices and projects, and cessation of services. The code itself, being both open source and popular, was forked under the new name LineageOS and efforts began to resume development as a community project.
CyanogenMod offered a number of features and options not available in the official firmware distributed by most mobile device vendors. Features supported by CyanogenMod included native theme support, FLAC audio codec support, a large Access Point Name list, Privacy Guard (per-application permission management application), support for tethering over common interfaces, CPU overclocking, root access, soft buttons and other "tablet tweaks," toggles in the notification pul |
https://en.wikipedia.org/wiki/Magic%20triangle%20%28mathematics%29 | A magic triangle is a magic arrangement of the integers from 1 to to triangular figure.
Perimeter magic triangle
A magic triangle or perimeter magic triangle is an arrangement of the integers from 1 to on the sides of a triangle with the same number of integers on each side, called the order of the triangle, so that the sum of integers on each side is a constant, the magic sum of the triangle. Unlike magic squares, there are different magic sums for magic triangles of the same order. Any magic triangle has a complementary triangle obtained by replacing each integer in the triangle with .
Examples
Order-3 magic triangles are the simplest (except for trivial magic triangles of order 1).
Other magic triangles
Other magic triangles use Triangular number or square number of vertices to form magic figure. Matthew Wright and his students in St. Olaf College developed magic triangles with square numbers. In their magic triangles, the sum of the k-th row and the (n-k+1)-th row is same for all k. Its one modification uses triangular numbers instead of square nubers. Another magic tringle form is magic triangles with triangluar numbers with different summation. In this magic triangles, the sum of the k-th row and the (n-k)-th row is same for all k.
Magic Triangles have also been discovered, such that when its elements are squared, we obtain another magic triangle.
See also
Magic hexagon
Antimagic square
Magic polygon
References
Magic shapes |
https://en.wikipedia.org/wiki/Board%20of%20Engineers%20Malaysia | The Board of Engineers Malaysia (, abbrev: BEM) is a statutory authority founded in 1972 representing the engineering profession in Malaysia. It has around 101,478 members as of 2016 who are either engineers or have a special interest in engineering in Malaysia. The institution aims to raise the prestige of the engineering as well as those involved in the field.
BEM is under the administration of the Ministry of Works (Malaysia) and established under the Registration of Engineers Act 1967. The institute is responsible for the maintenance of the registration of engineering Graduates and Professional Engineers. In addition, BEM also serves as the controller that determines conduct and ethics for those involved with engineering in Malaysia.
References
References
BEM official website
1972 establishments in Malaysia
Engineering organizations
Federal ministries, departments and agencies of Malaysia
Government agencies established in 1972
Ministry of Works (Malaysia)
Professional associations based in Malaysia
Professional titles and certifications
Engineering education
Accreditation organizations |
https://en.wikipedia.org/wiki/Methanogens%20in%20digestive%20tract%20of%20ruminants | Methanogens are a group of microorganisms that produce methane as a byproduct of their metabolism. They play an important role in the digestive system of ruminants. The digestive tract of ruminants contains four major parts: rumen, reticulum, omasum and abomasum. The food with saliva first passes to the rumen for breaking into smaller particles and then moves to the reticulum, where the food is broken into further smaller particles. Any indigestible particles are sent back to the rumen for rechewing. The majority of anaerobic microbes assisting the cellulose breakdown occupy the rumen and initiate the fermentation process. The animal absorbs the fatty acids, vitamins and nutrient content on passing the partially digested food from the rumen to the omasum. This decreases the pH level and initiates the release of enzymes for further breakdown of the food which later passes to the abomasum to absorb remaining nutrients before excretion. This process takes about 9–12 hours.
Some of the microbes in the ruminant digestive system are:
Fibrobacter (Bacteroides) succinogenes is a gram negative, cellulolytic and amylolytic methanogen that produces formates, acetates and succinates.
Ruminococcus albus is a cellulolytic, xylanolytic bacterium producing ethanol, hydrogen, carbon dioxide, formates and acetates.
Ruminococcus flavefaciens is a cellulolytic, xylanolytic bacteria producing formates, acetates, hydrogen and succinates.
Butyrivibrio fibrisolvens is a proteolytic, cellulolytic, xylanolytic microbe producing lactate, butyrate, ethanol, hydrogen, carbon dioxide, formates and acetates.
Streptococcus bovis is an amylolytic, major soluble sugar fermenter, proteolytic, microbe resulting in lactate, acetate and formate.
Ruminobacter (Bacteroides) amylophilus amylolytic, propionate, proteolytic, organism that forms, formates, acetates and succinates.
Prevotella (Bacteroides) ruminocola amylolytic, xylanolytic, propionate, proteolytic, microbe that creates, formates, acetates, |
https://en.wikipedia.org/wiki/Mitochondrial%20unfolded%20protein%20response | The mitochondrial unfolded protein response (UPRmt) is a cellular stress response related to the mitochondria. The UPRmt results from unfolded or misfolded proteins in mitochondria beyond the capacity of chaperone proteins to handle them. The UPRmt can occur either in the mitochondrial matrix or in the mitochondrial inner membrane. In the UPRmt, the mitochondrion will either upregulate chaperone proteins or invoke proteases to degrade proteins that fail to fold properly. UPRmt causes the sirtuin SIRT3 to activate antioxidant enzymes and mitophagy.
Mitochondrial electron transport chain mutations that extend the life span of Caenorhabditis elegans (nematode worms) also activate the UPRmt. Activation of the UPRmt in nematode worms by increasing NAD+ by supplementation with nicotinamide or nicotinamide riboside has been shown to extend lifespan. Nicotinamide riboside supplementation in mice has also been shown to activate the UPRmt.
Cellular unfolded protein responses
A majority of cellular proteins are translated and folded in the cytosol with the help of molecular chaperones. Just as proteins must be folded to function in the cytosol, proteins in organelles like the endoplasmic reticulum (ER) and mitochondria also must be folded to function. Consequently, specific cellular mechanisms exist that aim to detect cellular stress (causing misfolded/unfolded proteins to accumulate), transduce the signal to the nucleus, and mediate the restoration of protein homeostasis (proteostasis). In the cytosol, the heat shock response (HSR) manages the unfolded proteins through heat shock factor 1 (HSF1). HSF-1 is a transcription factor that, upon increases in unfolded cytosolic proteins, will trimerize and enter the nucleus to upregulate the expression of heat shock proteins (HSPs) that will act as protein folding chaperones.
In organelles like the ER and mitochondria, the responses is slightly more complex. Both UPR mechanisms are conceptually similar in that they are activated |
https://en.wikipedia.org/wiki/Mary%20Soper%20Pope%20Memorial%20Award | The Mary Soper Pope Memorial Award, informally known as the Mary Soper Pope Medal, was awarded by the Cranbrook Institute of Science of Detroit, Michigan, for notable achievement in plant sciences. It was inaugurated in 1946, and the last award was in 1970. The medal itself was designed by sculptor Marshall Fredericks.
Recipients
1946 Frans Verdoorn
1947 Charles C. Deam
1948 William Vogt
1949 Jens Christian Clausen, David D. Keck, and William Hiesey
1950 David D. Keck
1951 Martín Cárdenas
1952 Emma Lucy Braun
1954 Irving Widmer Bailey
1959 Kenneth Neatby
1962 Edmund H. Fulling
1964 Edgar T. Wherry
1966 Hally Jolivette Sax and Karl Sax
1969 Stanley A. Cain
1970 William Campbell Steere
See also
List of biology awards
References
External links
The Mary Soper Pope medal (obverse)
Plaster cast for the Mary Soper Pope medal (obverse)
Biology awards
Awards established in 1946
American awards |
https://en.wikipedia.org/wiki/Super%20Dungeon%20Bros | Super Dungeon Bros is a 2016 roguelike video game developed by React Games and published by Wired Productions. A multiplayer-focused title, the game was released worldwide in November 2016.
Gameplay
The game takes place in the fictional realm of Rökheim which comprises the worlds Cryptheim, Chillheim, and Bogheim, each of which is modeled after a different theme (underground, snow and jungle, respectively). Each location features a randomly generated layout that varies with every playthrough.
Super Dungeon Bros is a fast-paced, top-down action roguelike dungeon crawler,. Players select one of four characters and traverse a labyrinth, slaying enemies and collecting coins and spheres of the respective player color while completing an overall objective. Puzzles and light platforming are also encountered throughout the dungeon. Coins are used to purchase extra lives and other power-ups with a merchant that can be found in the dungeons. While coins and upgrades are reset once the player dies or complete 5 dungeons in a level, gems are maintained and can be used to buy cosmetic helmets and new weapons, each one varying in the amount of damage dealt and style of play (for instance, there are ranged and melee weapons). A "threat meter" tracks playtime in a dungeon, with a more powerful boss spawning the longer it takes a player to complete an area.
Each gameplay sessions the players start with a set number of lives, and once diminished the game is over. While in multiplayer, the lives pool is shared. Up to four people may take part at once, either locally or in online co-op. In multiplayer, the lives pool is shared. Alongside online leaderboards are daily and weekly dungeons, which are unique locations only playable during a certain time slot. Cross-platform online play is available between PlayStation 4 and Windows/Mac users as well as Xbox and Windows 10 players.
Release
After numerous delays, the game was released worldwide on November 1, 2016 for PlayStation 4, Xb |
https://en.wikipedia.org/wiki/Operation%20Torpedo | Operation Torpedo was a 2011 operation in which the Federal Bureau of Investigation (FBI) compromised three different hidden services hosting child pornography, which would then target anyone who happened to access them using a network investigative technique (NIT).
The operation started after Dutch law enforcement compromised a hidden service called Pedoboard, and found it was physically located at a Nebraska web hosting company. The ensuing FBI investigation found that an employee, Aaron McGrath, was operating two child pornography sites at his work and one at his home. After a year of surveillance, the FBI arrested McGrath and took control of his three sites (PedoBoard, PedoBook, TB2) for a two-week period starting in November 2012. During this time the websites were modified to serve up a NIT, which would attempt to unmask visitors by revealing their IP address, operating system and web browser.
The NIT was successful in revealing approximately 25 domestic users as well as numerous foreign users.
The NIT code was revealed as part of the case USA v Cottom et al. Researchers from University of Nebraska at Kearney and Dakota State University reviewed the NIT code and found that it was an Adobe Flash application that would ping a user's real IP address back to an FBI controlled server, rather than routing their traffic through the Tor network and protecting their identity. It used a technique from Metasploit's "decloaking engine" and only affected users who had not updated their Tor web browser. An investigation by The Daily Dot claimed that the NIT was created by former part-time employee of The Tor Project and Vidalia developer Matthew Edman and was internally known as "Cornhusker".
The U.S. Department of Justice noted in December 2015 that besides McGrath, 18 users in the United States had been convicted as a result of the operation. One user caught by the NIT had accessed the site for only nine minutes and had since wiped his computer, yet a month-later polic |
https://en.wikipedia.org/wiki/Joos%E2%80%93Weinberg%20equation | In relativistic quantum mechanics and quantum field theory, the Joos–Weinberg equation is a relativistic wave equation applicable to free particles of arbitrary spin , an integer for bosons () or half-integer for fermions (). The solutions to the equations are wavefunctions, mathematically in the form of multi-component spinor fields. The spin quantum number is usually denoted by in quantum mechanics, however in this context is more typical in the literature (see references).
It is named after Hans H. Joos and Steven Weinberg, found in the early 1960s.
Statement
Introducing a matrix;
symmetric in any two tensor indices, which generalizes the gamma matrices in the Dirac equation, the equation is
or
Lorentz group structure
For the JW equations the representation of the Lorentz group is
This representation has definite spin . It turns out that a spin particle in this representation satisfy field equations too. These equations are very much like the Dirac equations. It is suitable when the symmetries of charge conjugation, time reversal symmetry, and parity are good.
The representations and can each separately represent particles of spin . A state or quantum field in such a representation would satisfy no field equation except the Klein–Gordon equation.
Lorentz covariant tensor description of Weinberg–Joos states
The six-component spin-1 representation space,
can be labeled by a pair of anti-symmetric Lorentz indexes, , meaning that it transforms as an antisymmetric Lorentz tensor of second rank i.e.
The j-fold Kronecker product of
decomposes into a finite series of Lorentz-irreducible representation spaces according to
and necessarily contains a sector. This sector can instantly be identified by means of a momentum independent projector operator , designed on the basis of , one of the Casimir elements (invariants) of the Lie algebra of the Lorentz group, which are defined as,
where are constant matrices defining the elements of the Lorentz a |
https://en.wikipedia.org/wiki/Genetic%20privacy | Genetic privacy involves the concept of personal privacy concerning the storing, repurposing, provision to third parties, and displaying of information pertaining to one's genetic information. This concept also encompasses privacy regarding the ability to identify specific individuals by their genetic sequence, and the potential to gain information on specific characteristics about that person via portions of their genetic information, such as their propensity for specific diseases or their immediate or distant ancestry.
With the public release of genome sequence information of participants in large-scale research studies, questions regarding participant privacy have been raised. In some cases, it has been shown that it is possible to identify previously anonymous participants from large-scale genetic studies that released gene sequence information.
Genetic privacy concerns also arise in the context of criminal law because the government can sometimes overcome criminal suspects' genetic privacy interests and obtain their DNA sample. Due to the shared nature of genetic information between family members, this raises privacy concerns of relatives as well.
As concerns and issues of genetic privacy are raised, regulations and policies have been developed in the United States both at a federal and state level.
Significance of genetic information
In the majority of cases, an individual's genetic sequence is considered unique to that individual. One notable exception to this rule in humans is the case of identical twins, who have nearly identical genome sequences at birth. In the remainder of cases, one's genetic fingerprint is considered specific to a particular person and is regularly used in the identification of individuals in the case of establishing innocence or guilt in legal proceedings via DNA profiling. Specific gene variants one's genetic code, known as alleles, have been shown to have strong predictive effects in the occurrences of diseases, such as the BR |
https://en.wikipedia.org/wiki/XVA | An X-Value Adjustment (XVA, xVA) is an umbrella term referring to a number of different “valuation adjustments” that banks must make when assessing the value of derivative contracts that they have entered into. The purpose of these is twofold: primarily to hedge for possible losses due to other parties' failures to pay amounts due on the derivative contracts; but also to determine (and hedge) the amount of capital required under the bank capital adequacy rules. XVA has led to the creation of specialized desks in many banking institutions to manage XVA exposures.
Context
Historically, (OTC) derivative pricing has relied on the Black–Scholes risk neutral pricing framework which assumes that funding is available at the risk free rate and that traders can perfectly replicate derivatives so as to fully hedge.
This, in turn, assumes that derivatives can be traded without taking on credit risk. During the financial crisis of 2008 many financial institutions failed, leaving their counterparts with claims on derivative contracts that were paid only in part. Therefore it became clear that counterparty credit risk must also be considered in derivatives valuation, and the risk neutral value is to be adjusted correspondingly.
Valuation adjustments
When a derivative's exposure is collateralized, the "fair-value" is computed as before, but using the overnight index swap (OIS) curve for discounting. The OIS is chosen here as it reflects the rate for overnight secured lending between banks, and is thus considered a good indicator of the interbank credit markets. When the exposure is not collateralized then a credit valuation adjustment, or CVA, is subtracted from this value (the logic: an institution insists on paying less for the option, knowing that the counterparty may default on its unrealized gain); this CVA is the discounted risk-neutral expectation value of the loss expected due to the counterparty not paying in accordance with the contractual terms. This is typical |
https://en.wikipedia.org/wiki/Fractal%20expressionism | Fractal expressionism is used to distinguish fractal art generated directly by artists from fractal art generated using mathematics and/or computers. Fractals are patterns that repeat at increasingly fine scales and are prevalent in natural scenery (examples include clouds, rivers, and mountains). Fractal expressionism implies a direct expression of nature's patterns in an art work.
Jackson Pollock's poured paintings
The initial studies of fractal expressionism focused on the poured paintings by Jackson Pollock (1912-1956), whose work has traditionally been associated with the abstract expressionist movement. Pollock's patterns had previously been referred to as “natural” and “organic”, inviting speculation by John Briggs in 1992 that Pollock's work featured fractals. In 1997, Taylor built a pendulum device called the Pollockizer which painted fractal patterns bearing a similarity to Pollock's work. Computer analysis of Pollock's work published by Taylor et al. in a 1999 Nature article found that Pollock's painted patterns have characteristics that match those displayed by nature's fractals. This analysis supported clues that Pollock's patterns are fractal and reflect "the fingerprint of nature".
Taylor noted several similarities between Pollock's painting style and the processes used by nature to construct its landscapes. For instance, he cites Pollock's propensity to revisit paintings that he had not adjusted in several weeks as being comparable to cyclic processes in nature, such as the seasons or the tides. Furthermore, Taylor observed several visual similarities between the patterns produced by nature and those produced by Pollock as he painted. He points out that Pollock abandoned the use of a traditional frame for his paintings, preferring instead to roll out his canvas on the floor; this, Taylor asserts, is more compatible with how nature works than traditional painting techniques because the patterns in nature's scenery are not artificially bounded.
|
https://en.wikipedia.org/wiki/List%20of%20Chi%20Epsilon%20chapters | Chi Epsilon is a national collegiate civil engineering honor society in the United States.
Following is a list of Chi Epsilon chapters. Chapters are designated by the school at which they are located and a number indicating charter order.
Notes
References
Civil engineering organizations
Engineering honor societies
Lists of chapters of United States student societies by society
Professional fraternities and sororities in the United States |
https://en.wikipedia.org/wiki/Air%20stripline | Air stripline is a form of electrical planar transmission line whereby a conductor in the form of a thin metal strip is suspended between two ground planes. The idea is to make the dielectric essentially air. Mechanical support of the line may be a thin substrate, periodical insulated supports, or the device connectors and other electrical items.
Air stripline is most commonly used at microwave frequencies, especially in the C band. Its advantage over standard stripline and other planar technologies is that its air dielectric avoids dielectric loss. Many useful circuits can be constructed with air stripline and it is also easier to achieve strong coupling between components in this technology than with other planar formats. It was invented by Robert M. Barrett in the 1950s.
Structure
Air stripline is a form of stripline using air as the dielectric material between the central conductor and the ground planes. Using air as the dielectric has the advantage that it avoids the transmission losses usually associated with dielectric materials.
There are two basic ways that air stripline is constructed. In dielectric supported stripline, also called suspended stripline or suspended substrate, the strip conductor is deposited on a thin solid dielectric substrate, sometimes on both sides and connected together to form a single conductor. This substrate is then clamped in place between the walls supporting the two ground planes. In this method the strip can be manufactured by printed circuit techniques making it cheap and leading to the further advantage that other components can be printed on the dielectric in the same operation. The purpose of the solid dielectric is mechanical support for the conductor, but it is made as thin as possible to minimise its electrical effect. The flimsy nature of the substrate means that it can easily be distorted. Because of this, the design needs to take account of thermal stability issues. High end designs may use a crystal |
https://en.wikipedia.org/wiki/6174 | The number 6174 is known as Kaprekar's constant after the Indian mathematician D. R. Kaprekar. This number is renowned for the following rule:
Take any four-digit number, using at least two different digits (leading zeros are allowed).
Arrange the digits in descending and then in ascending order to get two four-digit numbers, adding leading zeros if necessary.
Subtract the smaller number from the bigger number.
Go back to step 2 and repeat.
The above process, known as Kaprekar's routine, will always reach its fixed point, 6174, in at most 7 iterations. Once 6174 is reached, the process will continue yielding 7641 – 1467 = 6174. For example, choose 1459:
9541 – 1459 = 8082
8820 – 0288 = 8532
8532 – 2358 = 6174
7641 – 1467 = 6174
The only four-digit numbers for which Kaprekar's routine does not reach 6174 are repdigits such as 1111, which give the result 0000 after a single iteration. All other four-digit numbers eventually reach 6174 if leading zeros are used to keep the number of digits at 4. For numbers with three identical numbers and a fourth number that is one number higher or lower (such as 2111), it is essential to treat 3-digit numbers with a leading zero; for example: 2111 – 1112 = 0999; 9990 – 999 = 8991; 9981 – 1899 = 8082; 8820 – 288 = 8532; 8532 – 2358 = 6174.
Other "Kaprekar's constants"
There can be analogous fixed points for digit lengths other than four; for instance, if we use 3-digit numbers, then most sequences (i.e., other than repdigits such as 111) will terminate in the value 495 in at most 6 iterations. Sometimes these numbers (495, 6174, and their counterparts in other digit lengths or in bases other than 10) are called "Kaprekar constants".
Other properties
6174 is a 7-smooth number, i.e. none of its prime factors are greater than 7.
6174 can be written as the sum of the first three degrees of 18:
18 + 18 + 18 = 5832 + 324 + 18 = 6174, and coincidentally, 6 + 1 + 7 + 4 = 18.
The sum of squares of the prime factors of 6174 is a |
https://en.wikipedia.org/wiki/List%20of%20electric%20aircraft | This is a list of electric aircraft, whose primary flight power is electrical.
! Type !! Country !! Class !! Power !! Role !! Date !! Status !! Notes
|-
| ACS-Itaipu Sora-E || Brazil || Propeller || Battery || Experimental || 2015 || Prototype ||
|-
| AgustaWestland Project Zero || Italy || UAV || Battery || Experimental || 2011 || Prototype || First large-scale all-electric tilt-rotor.
|-
| Air Energy AE-1 Silent || Germany || Motor glider || Battery || || 1998 || Production ||
|-
| Airbus A³ Vahana || United States || Propeller || Battery || Experimental || 2018 || Prototype ||
|-
| Airbus E-Fan || France || Propeller || Battery || Trainer || 2014 || Cancelled || Co-developed with Aero Composite Saintonge.
|-
| Alisport Silent Club || Italy || Motor glider || Battery || || || Production || First production electric aircraft.
|-
| Ampaire Electric EEL || United States || Propeller || Hybrid || || 2019 || Testing ||
|-
| APEV Demoichelle || France || Propeller || Battery || Experimental || 2010 || Prototype ||
|-
| APEV Pouchelec || France || Propeller || Battery || || 2009 || Prototype || Development of the Pouchel Light.
|-
| AstroFlight Sunrise || United States || UAV || Solar || Experimental || 1975 || Prototype || First solar-powered flight. Sunrise II flew in 1975.
|-
| AutoGyro eCavalon || Germany || Rotorcraft || Battery || Experimental || 2013 || Prototype ||
|-
| Baykar Cezeri || Turkey || eVTOL || Battery || Transport || 2020 || Project || Flown unmanned.
|-
| Beta AVA || United States || Propeller || Battery || Transport || 2019 || Prototype || Testing and preparing serial production.
|-
| Boeing Fuel Cell Demonstrator (FCD) || United States || Motor glider || Fuel cell || Experimental || 2008 || Prototype || Modified Diamond HK-36 Super Dimona.
|-
| Bye Aerospace eFlyer 2 || United States || Propeller || Battery || || 2016 || Project ||
|-
| Bye Aerospace eFlyer 4 || United States || Propeller || Battery || || 2018 || Project ||
|-
| Cessn |
https://en.wikipedia.org/wiki/Security%20level | In cryptography, security level is a measure of the strength that a cryptographic primitive — such as a cipher or hash function — achieves. Security level is usually expressed as a number of "bits of security" (also security strength), where n-bit security means that the attacker would have to perform 2n operations to break it, but other methods have been proposed that more closely model the costs for an attacker. This allows for convenient comparison between algorithms and is useful when combining multiple primitives in a hybrid cryptosystem, so there is no clear weakest link. For example, AES-128 (key size 128 bits) is designed to offer a 128-bit security level, which is considered roughly equivalent to a RSA using 3072-bit key.
In this context, security claim or target security level is the security level that a primitive was initially designed to achieve, although "security level" is also sometimes used in those contexts. When attacks are found that have lower cost than the security claim, the primitive is considered broken.
In symmetric cryptography
Symmetric algorithms usually have a strictly defined security claim. For symmetric ciphers, it is typically equal to the key size of the cipher — equivalent to the complexity of a brute-force attack. Cryptographic hash functions with output size of n bits usually have a collision resistance security level n/2 and a preimage resistance level n. This is because the general birthday attack can always find collisions in 2n/2 steps. For example, SHA-256 offers 128-bit collision resistance and 256-bit preimage resistance.
However, there are some exceptions to this. The Phelix and Helix are 256-bit ciphers offering a 128-bit security level. The SHAKE variants of SHA-3 are also different: for a 256-bit output size, SHAKE-128 provides 128-bit security level for both collision and preimage resistance.
In asymmetric cryptography
The design of most asymmetric algorithms (i.e. public-key cryptography) relies on neat math |
https://en.wikipedia.org/wiki/BHIM | BHIM (Bharat Interface for Money) is an Indian mobile payment app developed by the National Payments Corporation of India (NPCI), based on the Unified Payments Interface (UPI). Launched on 30 December 2016, it is intended to facilitate e-payments directly through banks and encourage cashless transactions. It was named after Dr Bhimrao Ambedkar.
The application supports all Indian banks which use UPI, which is built over the Immediate Payment Service (IMPS) infrastructure and allows the user to instantly transfer money between 170 member banks of any two parties. It can be used on all mobile devices.
Operation
BHIM allows users to send or receive money to or from UPI payment addresses, or to non-UPI based accounts (by scanning a QR code with account number and IFS code or MMID code).
Unlike mobile wallets (Paytm, MobiKwik, M-Pesa, Airtel Money, etc.) which hold money, the BHIM app is only a mechanism which transfers money between different bank accounts. Transactions on BHIM are nearly instantaneous and can be done at any time, including weekends and bank holidays.
BHIM now also allows users to send or receive digital payments through Aadhaar authentication.
On-device wallet
On September 20, RBI governor Shaktikanta Das officially launched on-device wallet called UPI Lite at Global Fintech Fest 2022. As per NPCI, some of the early use cases involve FASTag recharges, insurance payments, and EMI collections offline. Canara Bank, HDFC Bank, Indian Bank, Kotak Mahindra Bank, Punjab National Bank, State Bank of India, Union Bank of India and Utkarsh Small Finance Bank enabled UPI Lite feature on BHIM.
Transaction fees and limits
Currently, there is no charge for transactions from ₹1 to ₹100,000. Some banks might, however, levy a fee for UPI or IMPS transfers.
In 2017 Indian banks have proposed transaction charges on UPI transactions, but there is no information on whether transactions through BHIM will also be charged.
Language support
the app supports 20 langua |
https://en.wikipedia.org/wiki/List%20of%20nonlinear%20partial%20differential%20equations | See also Nonlinear partial differential equation, List of partial differential equation topics and List of nonlinear ordinary differential equations.
A–F
{|class="wikitable" style="background: white; color: black; text-align: left"
|-style="background: #eee"
!Name
!Dim
!Equation
!Applications
|-
|Bateman-Burgers equation
|1+1
|
|Fluid mechanics
|-
|Benjamin–Bona–Mahony
|1+1
|
|Fluid mechanics
|-
|Benjamin–Ono
|1+1
|
| internal waves in deep water
|-
|Boomeron
|1+1
|
|Solitons
|-
|Boltzmann equation
|1+6
|
|Statistical mechanics
|-
|Born–Infeld
|1+1
|
| Electrodynamics
|-
|Boussinesq
| 1+1
|
|Fluid mechanics
|-
|Boussinesq type equation
| 1+1
|
|Fluid mechanics
|-
|Buckmaster
|1+1
|
|Thin viscous fluid sheet flow
|-
|Cahn–Hilliard equation
|Any
|
|Phase separation
|-
|Calabi flow
|Any
|
|Calabi–Yau manifolds
|-
| Camassa–Holm
|1+1
|
|Peakons
|-
|Carleman
|1+1
|
|
|-
||Cauchy momentum
|any
|
|Momentum transport
|-
| Chafee–Infante equation
|
|
|
|-
|Clairaut equation
|any
|
|Differential geometry
|-
|Clarke's equation
|1+1
|
|Combustion
|-
|Complex Monge–Ampère
|Any
| lower order terms
|Calabi conjecture
|-
|Constant astigmatism
|1+1
|
|Differential geometry
|-
|Davey–Stewartson
|1+2
|
|Finite depth waves
|-
|Degasperis–Procesi
|1+1
|
|Peakons
|-
|Dispersive long wave
|1+1
|,
|
|-
|Drinfeld–Sokolov–Wilson
|1+1
|
|
|-
|Dym equation
|1+1
|
|Solitons
|-
|Eckhaus equation
|1+1
|
|Integrable systems
|-
|Eikonal equation
|any
|
|optics
|-
|Einstein field equations
| Any
|
|General relativity
|-
|Ernst equation
|2
|
|
|-
| Estevez–Mansfield–Clarkson equation
|
|
|
|-
|Euler equations
|1+3
|
|non-viscous fluids
|-
|Fisher's equation
|1+1
|
|Gene propagation
|-
|FitzHugh–Nagumo model
|1+1
|
|Biological neuron model
|-
|Föppl–von Kármán equations
|
|
|Solid Mechanics
|}
G–K
{|class="wikitable" style="background: white; color: black; text-align: left"
|-style="background: #eee"
!Name
!Dim
!Equation
!Applications
|-
|G equation
|1+3
|
| turbulent combustion
|-
|G |
https://en.wikipedia.org/wiki/NDMC%20Supercomputer | NDMC Supercomputer (Russian: НЦУО СуперкомпЬютер) is a military supercomputer with a speed of 16 petaflops. It is located in Moscow, Russia. The storage capacity is 236 petabytes. The supercomputer is designed to predict the development of armed conflicts and is able to analyze the situation and draw conclusions based on the information about past military conflicts. The database of the supercomputer contains data on the major armed conflicts of modernity for the efficient analysis of future threats.
See also
TOP500
References
Supercomputers
Petascale computers |
https://en.wikipedia.org/wiki/List%20of%20protein%20subcellular%20localization%20prediction%20tools | This list of protein subcellular localisation prediction tools includes software, databases, and web services that are used for protein subcellular localization prediction.
Some tools are included that are commonly used to infer location through predicted structural properties, such as signal peptide or transmembrane helices, and these tools output predictions of these features rather than specific locations. These software related to protein structure prediction may also appear in lists of protein structure prediction software.
Tools
Descriptions sourced from the entry in the https://bio.tools/ registry (used under CC-BY license) are indicated by link
References
Protein methods
Cell biology
Computational science
Protein
Protein targeting |
https://en.wikipedia.org/wiki/Carry-I | The Carry-I was a book-size workstation produced by Flytech Technology of Taiwan, circa 1991. It was available in multiple configurations; ranging from Intel 8088 based XT-compatible models, to a high end model powered by a 16 MHz 386SX and featuring an 80MB hard drive. It was also available as a diskless node powered by either an 8088 or an 80286. The system was bundled with DR DOS 5.0.
In Australia the system was sold by the company Hypec Technology Pty. Ltd.
References
External links
Period marketing literature:
FT-8100 and FT-8200 Series (Carry-I 8088 and 80286)
Carry-I 9000 series
Rétro Scan: Flytech Carry-I (1991)
Vintage company video about the Carry-I computer family:
Video presentation (in Polish) of Carry-I 8088, booting to DOS 3.3 and running Pac-Girl (1:52:02 - 1:56:21):
Diskless workstations |
https://en.wikipedia.org/wiki/Lagg%20%28landform%29 | A lagg, also called a moat, is the very wet zone on the perimeter of peatland or a bog where water from the adjacent upland collects and flows slowly around the main peat mass.
Description
A lagg is an area of wetland, especially at the edge of raised bogs, in which water collects. It is often markedly different from the terrain either side and may consist of a morass of shrubs and murky water.
In addition to water gathered from surrounding uplands, the lagg also picks up water flowing down from the domed centre of a raised bog through small channels - soaks or water tracks - to the steeply sloping shoulder or rand of the bog. At the foot of the rand, the water collects and meets the water of the surrounding area on the boundary between the peat soil and mineral soil.
References
Literature
Johnson, Charles W. Bogs of the Northeast. London: University Press of New England, 1985. .
Bogs
Ecosystems |
https://en.wikipedia.org/wiki/Apache%20LDAP%20API | Apache LDAP API is an open source project of the Apache Software Foundation and a subproject of the Apache Directory. It's a replacement for outdated Java/LDAP libraries like (jLdap, Mozilla LDAP SDK and JNDI) and works with any LDAP server.
History
The Apache Directory project was started using the JNDI library, but many of its LDAP structures had to be developed in-house because the JNDI library was ineffective for interacting with an LDAP server. It wasn't convenient for the project team to use JNDI which indicated to them it wouldn't be easy for typical users either. Eventually, all of the necessary LDAP data structures (_Attribute_, _Entry_, _DN_, ...) were re-implemented by the project team.
At some point it became necessary to communicate with other LDAP servers without using the JNDI library, so a new _LdapConnection_ class was developed. This was the first step toward a full Java API specifically designed for LDAP usage on the Java platform.
After starting this effort (back in 2007), some people from Sun (Microsystems), who was working on the OpenDS project, contacted the Apache Directory project team to gauge interest in helping create a new version of JNDI. ([Resurrecting The Java LDAP Centric API](https://web.archive.org/web/20170102082918/https://blogs.oracle.com/treydrake/entry/resurrecting_the_java_ldap_centric). Unfortunately, the effort stalled, as the need for JNDI2 was no longer a priority for Sun. Nevertheless the Apache Directory team continued with the work but the pace was slow.
Collaboration with Sun renewed after the OpenDS project team's presentation at LdapCon in 2009 ([Towards a common LDAP API for the Java Platform](http://www.symas.com/ldapcon2009/papers/poitou1.shtml)). The story repeated itself once again after Oracle bought Sun in 2010, and its project team disbanded.
Despite these fits and starts, a consensus was reached about the need for a new LDAP API and what it should be capable of doing. An agreement that these key fe |
https://en.wikipedia.org/wiki/Plexciton | Plexcitons are polaritonic modes that result from coherently coupled plasmons and excitons. Plexcitons aid direct energy flows in exciton energy transfer (EET). Plexcitons travel for 20 μm, similar to the width of a human hair.
History
Plasmons are a quantity of collective electron oscillations. Excitons are excited electrons bound to the hole produced by their excitation.
Molecular crystal excitons were combined with the collective excitations within metals to create plexcitons. This allowed EET to reach distances of around 20,000 nanometers, an enormous increase over the some 10 nanometers possible previously. However, the transfer direction was uncontrolled.
Topological insulators (TI) act as insulators below their surface, but have conductive surfaces, constraining electrons to move only along that surface. Even materials with moderately flawed surfaces do not impede current flow. Topological plexcitons make use of the properties of TIs to achieve similar control over the direction of current flow.
Plexcitons were found to emerge from an organic molecular layer (excitons) and a metallic film (plasmons). Dirac cones appeared in the plexcitons' two-dimensional band-structure. An external magnetic field created a gap between the cones when the system was interfaced to a magneto-optical layer. The resulting energy gap became populated with topologically protected one-way modes, which traveled only at the system interface.
Potential applications
Plexcitons potentially offer an appealing platform for exploring exotic matter phases and for controlling nanoscale energy flows.
References
External links
Quasiparticles
Plasmonics |
https://en.wikipedia.org/wiki/Ecoleasing | Ecoleasing is a system in which goods (mainly from the technical cycle, i.e. appliances, ...) are rented to a client for a certain period of time after which he returns the goods so the company that made it can recycle the materials.
Terminology
The term ecoleasing has been used by William McDonough and Michael Braungart in their book Cradle_to_Cradle: Remaking the Way We Make Things. It is used to distinct itself from regular leasing in that:
the operation is similar to regular purchasing of goods, so not requiring a contract to be made up as with leasing
it is done with appliances and other products used for the household, rather than with land or very expensive products (cars, ...)
the period of time the product is rented would be about the same as the lifespan of the product, so it can only be rented once before it is taken back by the company to recover the materials (and to create another product with it)
Examples
An example of ecoleasing is a lease of a TV set. In this case, a consumer signs a contract with the TV manufacturer. According to the contract, the consumer has a right to use the TV for e.g. 15,000 hours. After this period he returns the TV to the company, which then recycles it. Ecoleasing is usually done with appliances and other relatively cheap household products. It is hardly ever used for land, real estate, and expensive products.
Advantages
Since materials are reclaimed, fewer or no materials end up in landfills, or require other forms of waste disposal. As such, it is quite environmental.
Materials are recovered by which the company can make new products, so the material costs for this new product are much lower for the company.
Since new products can be made at a lower expense, the sale price of these products can also be comparatively lower than similar products made by the competition (if they use a system of purchasing the goods)
References
See also
Car leasing: use in circular economy
Industrial ecology
Environmental design |
https://en.wikipedia.org/wiki/Major%20immunogene%20complex | The Major immunogene complex (MIC) is a gene sequence containing loci coding for antigens on lymphocyte surface (Ia) histocompatibility (H) antigens, products of immune responses, and components system proteins.
The genes that code for immunoglobulins are assorted independently of the MIC, but the plasma cells which produce immunoglobulins are under the control of products of the MIC.
See also
Major histocompatibility complex
Immune system
References
Immunology |
https://en.wikipedia.org/wiki/Benjamin%20Tee | Tee Chee Keong Benjamin is a Singaporean scientist. He helped to co-develop the electronic skin technology when he was a PhD student in Stanford University. In 2015, he was chosen as one of TR35 list (MIT Technology Review's global 35 Innovators Under 35) for his work on e-skin. The only Singaporean on the 2015 TR35 list, e-skins could potentially make prosthetic limbs as sensitive as human ones and enable intuitive human machine interactions. In 2019, he co-developed an underwater self-healing transparent material that could be useful in marine environments.
Career
Tee is currently associate professor (tenured) at the National University of Singapore's Department of Material Science and Engineering. He was the President's assistant professor between 2017 and 2021. He is also an adjunct scientist at the Agency for Science, Technology and Research's Institute of Materials Research and Engineering (A*STAR's IMRE) .
Education
BS (Summa cum laude) Electrical Engineering, University of Michigan-Ann Arbor, 2006
MS Electrical Engineering, Stanford University, 2007
PhD Electrical Engineering, Stanford University, 2014
Awards
2005 Undergraduate Outstanding Research Award
2010 TSMC Outstanding Student Research Gold Award
2010 TSMC Outstanding Student Research Academy
2013 MRS Graduate Student Gold Award
2014 Singapore-Stanford Biodesign Global Innovation Fellow
2015 One of 10 finalists TR35 APAC list
2015 One of 35 Innovators Under 35 TR35 list by MIT Technology Review
2016 Singapore Young Scientist Award
2019 World Economic Forum Young Scientist
Selected publications
A transparent, self-healing and high-κ dielectric for low-field-emission stretchable optoelectronics, YJ Tan, H. Godaba, G. Chen, STM Tan, GX Wan, G. Li, PM Lee, Y. Cai, S. Li, R. F. Shepherd, J. S Ho, B. C-K. Tee*, Nature Materials, (2020).
A neuro-inspired artificial peripheral nervous system for scalable electronic skins, WW Lee, YJ Tan, H Yao, S Li, HH See, M Hon, B Xiong, K Ng, J Ho, B. C-K. |
https://en.wikipedia.org/wiki/2018%20Pro%20Bowl | The 2018 Pro Bowl was the National Football League's all-star game for the 2017 season, which was played at Camping World Stadium in Orlando, Florida on January 28, 2018. For the first time since 2009, the game started during afternoon hours instead of primetime hours for U.S. Mainland viewers with a 3 p.m. ET start. It marked the second year the game was played in Orlando. It was televised nationally by ESPN and simulcasted on ABC. The roster was announced on December 19 on NFL Network. The AFC team won the game 24–23, the second straight year the Pro Bowl was won by the AFC.
Background
Host selection process
Under a three-year deal that began in 2017, the Pro Bowl will once again be hosted by Camping World Stadium in Orlando.
Side events
The Pro Bowl Skills Challenge was held on January 25 at the Walt Disney World Resort and its ESPN Wide World of Sports Complex.
Game format
Rule changes
The game format was the same as for 2017, highlighted by:
Forty-four players were assigned to each team, up from 43 in 2016 (a regular game-day active roster has 46).
The two-minute warning that was given in the first and third quarters (in addition to the second and fourth quarters) in previous years was eliminated, and the ball did not change hands after the first and third quarters.
The coin toss determined which team was awarded possession first. There were no kickoffs; the ball was placed on the 25-yard line at the start of each half and after scoring plays.
Defenses were now permitted to play cover two and press coverage. Prior to 2014, only man coverage was allowed, except for goal line situations.
A 38-second/25-second play clock was used instead of the usual 40-second/25-second clock, and up from 35-second/25-second clock in 2016.
Replay reviews will be allowed; previously there was replay in the Pro Bowl only when new equipment tests were being conducted.
There are no intentional grounding rules.
Only defensive ends and tackles may rush on passing plays, but those |
https://en.wikipedia.org/wiki/Plant-based%20digital%20data%20storage | Plant-based digital data storage is a futuristic view that proposes storing digital data in plants and seeds. The first practical implication showed the possibility of using plants as storage media for digital data. New approaches for data archiving are required due to the constant increase in digital data production and the lack of a capacitive, low maintenance storage medium.
Initial experiments
With the help of two biotechnologists, they encoded a basic computer program in Python Programming language into Nicotiana benthamiana.
They first encoded a “Hello World” computer program into a DNA code, synthesized it and cloned this coded DNA into a plasmid-vector to be used further for transformation into Nicotiana benthamiana plants. The encoded program was reconstructed from the resulting seedlings with 100% accuracy by showing “Hello World” on the computer screen.
Their approach demonstrated that artificially encoded data can be stored and multiplied within plants without affecting their vigor and fertility. It also takes a step forward from storing data into a naked DNA molecule.
It is inherent in progeny and authentically reproducible while the reduced metabolism of the seeds provides an additional protection for encoded DNA archives.
That was the first practical implication of utilizing a multi-cellular, eukaryotic organism for storing digital data in the world. It goes beyond plant genome manipulations for biotechnological research and plant breeding. It takes the advantage of multi-cellular organisms and serves to propagate the encoded information in daughter cells. The host organism is able to grow and multiply with the embedded information, and every cell of the organism contains a copy of the encoded information; therefore, it avoids the costs of synthetic production of multiple copies of the same encoded information. Moreover, in contrast to naked DNA, which can be affected by unfavorable environmental conditions like excessive temperature, in desiccat |
https://en.wikipedia.org/wiki/Federal%20Council%20of%20Engineering%20and%20Agronomy | The Federal Council of Engineering and Agronomy (Confea) is a Brazilian federal public authority instituted by Decree 23,569 of December 11, 1933, promulgated by the then President of the Republic, Getúlio Vargas.
Currently, Confea is governed by Law 5,194, dated December 24, 1966, is based in Brasilia, and has about one million registered professionals in its Information System (SIC).
Its mission is to act efficiently and effectively as the supreme body of verification, inspection and improvement of the exercise and professional activities of engineers, agronomists, geologists, geographers, meteorologists, technicians and technologists, always oriented towards the defense of citizenship and the promotion of sustainable development.
The Confea watches over the social and human interests of the whole society, always with respect for the citizen and care for the environment. The Federal Council also has as its values integrity, ethics, excellence and transparency.
In addition to the president, the Confea is organized as follows: plenary - composed of 18 advisers; standing committees; Evaluation and Articulation Committee; and board of directors. Its purposes and powers are set forth in Resolution No. 1,015, of June 30, 2006, Council Regulation.
History
The Confea officially came out with that name on December 11, 1933, through Decree No. 23,569, promulgated by the then president of the Republic, Getúlio Vargas, and considered landmark in the history of professional and technical regulation in Brazil.
In its current conception, the Federal Council of Engineering and Agronomy is governed by Law 5,194 of 1966, and also represents geographers, geologists, meteorologists, technologists of these modalities, industrial and agricultural technicians and their specializations, in a total of hundreds of professional titles.
The Confea watches over the social and human interests of the whole society and, based on this, regulates and supervises the professional exercise of those |
https://en.wikipedia.org/wiki/Projector%20camera%20systems | Projector-camera systems (pro-cam), also called camera-projector systems, augment a local surface with a projected captured image of a remote surface, creating a shared workspace for remote collaboration and communication. Projector-camera systems may also be used for artistic and entertainment purposes. A pro-cam system consists of a vertical screen for implementing interpersonal space where front-facing videos are displayed, and a horizontal projected screen on the tabletop for implementing shared workspace where downward facing videos are overlapped. An automatically pre-warped image is sent to the projector to ensure that the horizontal screen appears undistorted.
Examples
Pro-cam systems create a shared workspace between users with overlapping video technique which was invented by the researcher John Tang in Xerox PARC, 1991.
Digital Desk and Double Digital Desk was the first prototypes of pro-cam systems developed by Xerox Research Center Europe.
ShareTable was the first prototype which is deployed in the field and tested with real users created by Lana Yarosh et al. at 2009.
Microsoft Research has introduced the IllumiShare system which was an application of pro-cam systems at 2012.
HP Inc. created a consumer pro-cam product named Sprout and released to market at the end of 2014.
References
Projectors |
https://en.wikipedia.org/wiki/List%20of%20types%20of%20sets | Sets can be classified according to the properties they have.
Relative to set theory
Empty set
Finite set, Infinite set
Countable set, Uncountable set
Power set
Relative to a topology
Closed set
Open set
Clopen set
Fσ set
Gδ set
Compact set
Relatively compact set
Regular open set, regular closed set
Connected set
Perfect set
Meagre set
Nowhere dense set
Relative to a metric
Bounded set
Totally bounded set
Relative to measurability
Borel set
Baire set
Measurable set, Non-measurable set
Universally measurable set
Relative to a measure
Negligible set
Null set
Haar null set
In a linear space
Convex set
Balanced set, Absolutely convex set
Relative to the real/complex numbers
Fractal set
Ways of defining sets/Relation to descriptive set theory
Recursive set
Recursively enumerable set
Arithmetical set
Diophantine set
Hyperarithmetical set
Analytical set
Analytic set, Coanalytic set
Suslin set
Projective set
Inhabited set
More general objects still called sets
Multiset
icarus set
See also
Basic concepts in set theory
Sets
Set theory |
https://en.wikipedia.org/wiki/CSIRO%20Oceans%20and%20Atmosphere | CSIRO Oceans and Atmosphere (O&A) (2014–2022) was one of the then 8 Business Units (formerly: Flagships) of the Commonwealth Scientific and Industrial Research Organisation (CSIRO), Australia's largest government-supported science research agency. In December 2022 it was merged with CSIRO Land and Water to form a single, larger Business Unit called simply, "CSIRO Environment".
History
The CSIRO Oceans and Atmosphere (O&A) Business Unit was formed in 2014 as one of the then 10 "Flagship" operational units of the Commonwealth Scientific and Industrial Research Organisation (CSIRO) as part of a major organisational restructure; from 2015 onwards the term "Flagship" was officially dropped. This Business Unit was formed essentially as a synthesis of the pre-existing CSIRO Division of Marine and Atmospheric Research (CMAR), representing the scientific capability, and the previously established Wealth from Oceans (WfO) Flagship, which was the route via which much of the relevant Australian government research funding was directed. In 2016, its Director was Dr. Ken Lee, previously WfO Flagship Director; in 2017 its Director was Dr. Tony Worby, previously with the Antarctic Climate and Ecosystems Cooperative Research Centre (ACE CRC); and for the period 2021–2022 its final Director was Dr. Dan Metcalfe. The O&A Business Unit employed between 350 and 400 staff who were/are located at its various laboratories including Hobart (Tasmania), Aspendale (Victoria), Dutton Park (Queensland), Black Mountain (Canberra) and Floreat Park (Western Australia). For 2016 it was quoted as operating with an annual budget of $108M Australian Dollars with its research organised into the following programs: Climate Science Centre; Coastal Development and Management; Earth System Assessment; Engineering and Technology; Marine Resources and Industries; and Ocean and Climate Dynamics. Certain previous CMAR activities, notably those involving the operation of the Marine National Facility (research v |
https://en.wikipedia.org/wiki/Brune%20test | The Brune test (named after the South African mathematician Otto Brune) is used to check the permissibility of the combination of two or more two-port networks (or quadripoles) in electrical circuit analysis. The test determines whether the network still meets the port condition after the two-ports have been combined. The test is a sufficient, but not necessary, test.
Series-series connection
To check if two two-port networks can be connected in a series-series configuration, first of all just the input ports are connected in series, a voltage is applied to the input and the open-circuit voltage is measured/calculated between the output terminals to be connected. If there is a voltage drop, the two-port networks cannot be combined in series. The same test is repeated from the output side of the two-port networks (series connection of the output ports, application of a voltage to the output, measurement/calculation of the open-circuit voltage between the input terminals to be connected). Only if there is no voltage drop in both cases, a combination of the two-ports networks is permissible.
examples
The first example fails the series-series test because the through path between the lower terminals of 2-port #1 short-circuit part of the circuitry in 2-port #2. The second example passes the series-series test. The 2-ports are the same as in the first example, but 2-port #2 has been flipped or equivalently the choice of terminals to be placed in series has changed. The result is that the through path between the lower terminals of 2-port #1 simply provide a parallel path to the through path between the upper terminals of 2-port #2. The third example is the same as the first example, except that it passes the Brune test because ideal isolating transformers have been placed at the right side terminals which break the through paths.
Parallel-parallel connection
To check if two two-port networks can be connected in a parallel-parallel configuration, first of all |
https://en.wikipedia.org/wiki/Algorithmic%20transparency | Algorithmic transparency is the principle that the factors that influence the decisions made by algorithms should be visible, or transparent, to the people who use, regulate, and are affected by systems that employ those algorithms. Although the phrase was coined in 2016 by Nicholas Diakopoulos and Michael Koliska about the role of algorithms in deciding the content of digital journalism services, the underlying principle dates back to the 1970s and the rise of automated systems for scoring consumer credit.
The phrases "algorithmic transparency" and "algorithmic accountability" are sometimes used interchangeably – especially since they were coined by the same people – but they have subtly different meanings. Specifically, "algorithmic transparency" states that the inputs to the algorithm and the algorithm's use itself must be known, but they need not be fair. "Algorithmic accountability" implies that the organizations that use algorithms must be accountable for the decisions made by those algorithms, even though the decisions are being made by a machine, and not by a human being.
Current research around algorithmic transparency interested in both societal effects of accessing remote services running algorithms., as well as mathematical and computer science approaches that can be used to achieve algorithmic transparency In the United States, the Federal Trade Commission's Bureau of Consumer Protection studies how algorithms are used by consumers by conducting its own research on algorithmic transparency and by funding external research. In the European Union, the data protection laws that came into effect in May 2018 include a "right to explanation" of decisions made by algorithms, though it is unclear what this means. Furthermore, the European Union founded The European Center for Algoritmic Transparency (ECAC).
See also
Black box
Explainable AI
Regulation of algorithms
Reverse engineering
Right to explanation
Algorithmic accountability
References
Accou |
https://en.wikipedia.org/wiki/Bisnorhopane | Bisnorhopanes (BNH) are a group of demethylated hopanes found in oil shales across the globe and can be used for understanding depositional conditions of the source rock. The most common member, 28,30-bisnorhopane, can be found in high concentrations in petroleum source rocks, most notably the Monterey Shale, as well as in oil and tar samples. 28,30-Bisnorhopane was first identified in samples from the Monterey Shale Formation in 1985. It occurs in abundance throughout the formation and appears in stratigraphically analogous locations along the California coast. Since its identification and analysis, 28,30-bisnorhopane has been discovered in oil shales around the globe, including lacustrine and offshore deposits of Brazil, silicified shales of the Eocene in Gabon, the Kimmeridge Clay Formation in the North Sea, and in Western Australian oil shales.
Chemistry
28,30-bisnorhopane exists in three epimers: 17α,18α21β(H), 17β,18α,21α(H), and 17β,18α,21β(H). During GC-MS, the three epimers coelute at the same time and are nearly indistinguishable. However, mass spectral fragmentation of the 28,30-bisnorhopane is predominantly characterized by m/z 191, 177, and 163. The ratios of 163/191 fragments can be used to distinguish the epimers, where the βαβ orientation has the highest, m/z 163/191 ratio. Further, the D/E ring ratios can be used to create a hierarchy of epimer maturity. From this, it is believed that the ααβ epimer is the first-formed, diagenetically, supported also by its percent dominance in younger shales. 28,30-bisnorhopane is created independently from kerogen, instead derived from bitumen, unbound as free oil-hydrocarbons. As such, as oil generation increases with source maturation, the concentration of 28,30-bisnorhopane decreases. Bisnorhopane may not be a reliable diagnostic for oil maturity due to microbial biodegradation.
Nomenclature
Norhopanes are a family of demethylated hopanes, identical to the methylated hopane structure, minus indicated desmet |
https://en.wikipedia.org/wiki/Base%20change%20theorems | In mathematics, the base change theorems relate the direct image and the inverse image of sheaves. More precisely, they are about the base change map, given by the following natural transformation of sheaves:
where
is a Cartesian square of topological spaces and is a sheaf on X.
Such theorems exist in different branches of geometry: for (essentially arbitrary) topological spaces and proper maps f, in algebraic geometry for (quasi-)coherent sheaves and f proper or g flat, similarly in analytic geometry, but also for étale sheaves for f proper or g smooth.
Introduction
A simple base change phenomenon arises in commutative algebra when A is a commutative ring and B and A' are two A-algebras. Let . In this situation, given a B-module M, there is an isomorphism (of A' -modules):
Here the subscript indicates the forgetful functor, i.e., is M, but regarded as an A-module.
Indeed, such an isomorphism is obtained by observing
Thus, the two operations, namely forgetful functors and tensor products commute in the sense of the above isomorphism.
The base change theorems discussed below are statements of a similar kind.
Definition of the base change map
The base change theorems presented below all assert that (for different types of sheaves, and under various assumptions on the maps involved), that the following base change map
is an isomorphism, where
are continuous maps between topological spaces that form a Cartesian square and is a sheaf on X. Here denotes the higher direct image of under f, i.e., the derived functor of the direct image (also known as pushforward) functor .
This map exists without any assumptions on the maps f and g. It is constructed as follows: since is left adjoint to , there is a natural map (called unit map)
and so
The Grothendieck spectral sequence then gives the first map and the last map (they are edge maps) in:
Combining this with the above yields
Using the adjointness of and finally yields the desired map.
The above-mentio |
https://en.wikipedia.org/wiki/SolForge | SolForge was a free-to-play digital collectible card game by Stone Blade Entertainment. The design team included Magic: The Gathering designer Richard Garfield and Pro Tour hall of famer Brian Kibler. The game was released in May 2016 following three years in early access. In January 2017, Stone Blade announced that the game would be shutting down that month, however, an agreement was later reached with two executives from Grinding Gear Games, but not the studio directly, keeping the game online.
The game's servers were still online in 2018, however, updates to the official client ceased so the fan community developed an unofficial client to address bugs and add features called ReForged (formerly KUSC). It had an Android and iOS version that could play matches with players using the official client. In December 2018, it was announced that Stone Blade had asked for the unofficial client to be shut down, and in January 2019 both the official server and the unofficial client were discontinued.
The official client is still available on Steam as of October 2019, however has been removed from mobile stores.
Development
SolForge was part funded through a Kickstarter crowdfunding campaign, raising $429,715 towards its development in September 2012. According to Stone Blade CEO Justin Gary, the game ended up costing over five times this amount to develop.
Gameplay
SolForge is a competitive two-player turn-based strategy game. Each player begins with a deck of cards and 120 health points, they must play these cards and reduce the opponent's health zero to win the game. Players can play two cards per turn, each card may be played in one of five lanes. Cards deal damage to the opponent's card in its respective lane. If there is no opponent card in the lane, the damage is dealt directly to the opponent. Once a card is played, it is replaced by a more powerful variant of the card (upgrade) up to a maximum level. Other copies of that card in the player's deck are not affec |
https://en.wikipedia.org/wiki/Nimatron | The Nimatron was an electro-mechanical machine that played Nim. It was first exhibited in April–October 1940 by the Westinghouse Electric Corporation at the 1939-1940 New York World's Fair to entertain fair-goers. Conceived of some months prior by Edward Condon and built by Gerald L. Tawney and Willard A. Derr, the device was a non-programmable digital computer composed of electro-mechanical relays which could respond to players' choices in the game in a dozen different patterns. The machine, which weighed over a metric ton, displayed four lines of seven light bulbs both in front of the player and on four sides of an overhead cube. Players alternated turns with the machine in removing one or more lights from one of the rows until the lights were all extinguished. The calculations were purposely delayed to give the illusion that the machine was considering moves, and winners received a token.
The reception of the machine during the fair was positive, with around 100,000 games of Nim played. After the fair it was moved to the Buhl Planetarium and Institute of Popular Science Building in Pittsburgh. Despite this success, Condon considered the Nimatron a failure, because he had designed and intended it to be solely a piece of entertainment for fair-goers, but within years of the exhibition programmable digital computers began to be produced around the world by other companies and groups that used some of the same principles around storing digital information. The Nimatron is considered one of the first electro-mechanical games and a precursor to computer games, but its direct impact on digital computers and computer games is minimal. It may, however, have inspired the Nimrod computer, which was demonstrated at the 1951 Festival of Britain playing Nim using banks of lightbulbs like the Nimatron eleven years prior.
Development
The 1939 New York World's Fair was held in April—October 1939 and April—October of 1940, featuring exhibits from countries and companies worldwi |
https://en.wikipedia.org/wiki/Urschel%20Laboratories | Urschel Laboratories Inc. is a global retailer of food-processing machinery, based in Chesterton, Indiana. The company was founded by William Urschel in 1910, after he invented a gooseberry snipper. The company's headquarters were located on South Napoleon Street in Valparaiso, Indiana, from 1910 until 1957, when a new plant was constructed on Calumet Avenue, also in Valparaiso. The company moved to a new facility in nearby Chesterton in 2015.
History
1907-1930s
In 1907, William Emmett Urschel began experimental work on a gooseberry stemmer. Urschel received his first patent for the Gooseberry Snipper in 1908. In 1910, Urschel founded the Urschel Gooseberry Snipper Factory, a small two-story wooden shop at 158 South Napoleon in Valparaiso, Indiana, located next to his residence and in an area populated with gooseberry farmers. Urschel later invented a machine that provides chocolate coating on ice cream to make an Eskimo Pie.
In 1922, Urschel had invented and began selling the bean snipper, which increased the amount of beans canned each year, rising from approximately two million cases of canned beans in 1922 to more than six million cases in 1928. Beginning in 1923, Urschel's company began development of a mechanical green bean harvester, with backing from the Scott Viner company in Columbus, Ohio. William Urschel is the first known man to attempt to build such a machine. In 1925, Urschel began working on a red beet harvester and topper.
By 1929, the company had been renamed Urschel Laboratories. In August of that year, the company sent a mechanical green bean harvester to the Fremont Canning Company in Fremont, Michigan. At the time, green beans were only picked by hand. The harvesting machine, which was capable of picking 90 to 95 percent of beans in a given area, was driven by a self-contained gasoline motor, and was estimated to save approximately $500 per day by replacing human labor. Canning companies viewed the machine favorably as there was a lack of w |
https://en.wikipedia.org/wiki/SiFive | SiFive, Inc. is a fabless semiconductor company and provider of commercial RISC-V processor IP and silicon chips based on the RISC-V instruction set architecture (ISA). SiFive's products include cores, SoCs, IPs, and development boards.
SiFive is one of the first companies to produce a chip that implements the RISC-V ISA.
History
SiFive was founded in 2015 by Krste Asanović, Yunsup Lee, and Andrew Waterman, three researchers from the University of California Berkeley. On November 29, 2016, SiFive released the Freedom Everywhere 310 SoC and the HiFive development board, making SiFive the first company to produce a chip that implements the RISC-V ISA, although universities have produced earlier RISC-V processors.
In August 2017, SiFive hired Naveed Sherwani as CEO. In October, SiFive did a limited release of its U54-MC, reportedly the world's first RISC-V based 64-bit quad-core CPU to support fully featured operating systems like Linux.
In June 2018, SiFive acquired Open-Silicon for an undisclosed amount and retained their design capabilities for specialized chips, also called application-specific integrated circuits, or ASICs.
In February 2018, SiFive released the HiFive Unleashed, a development board containing a 64-bit SoC with four U54 cores.
In September 2020, the company announced Patrick Little as the new CEO.
In October 2020, SiFive released the HiFive Unmatched, a Mini-ITX development board with four U74-MC cores, one S7 core, 8GB DDR4 RAM, four USB 3.2 Gen1 ports, one PCI Express x16 slot, one PCIe Gen3 x4, one microSD card slot, and a Gigabit Ethernet. In April 2021, the company also taped out its first system-on-chip on TSMC's N5 process technology, making it the first RISC-V-based device to be made using a 5 nm node.
In June 2021, Canonical announced its Ubuntu operating system supports the HiFive Unmatched and HiFive Unleashed, and the Barcelona Supercomputing Center collaborated with Codeplay Software and SiFive to implement support for the RIS |
https://en.wikipedia.org/wiki/Bacterial%20phylodynamics | Bacterial phylodynamics is the study of immunology, epidemiology, and phylogenetics of bacterial pathogens to better understand the evolutionary role of these pathogens. Phylodynamic analysis includes analyzing genetic diversity, natural selection, and population dynamics of infectious disease pathogen phylogenies during pandemics and studying intra-host evolution of viruses. Phylodynamics combines the study of phylogenetic analysis, ecological, and evolutionary processes to better understand of the mechanisms that drive spatiotemporal incidence and phylogenetic patterns of bacterial pathogens. Bacterial phylodynamics uses genome-wide single-nucleotide polymorphisms (SNP) in order to better understand the evolutionary mechanism of bacterial pathogens. Many phylodynamic studies have been performed on viruses, specifically RNA viruses (see Viral phylodynamics) which have high mutation rates. The field of bacterial phylodynamics has increased substantially due to the advancement of next-generation sequencing and the amount of data available.
Methods
Novel hypothesis (study design)
Studies can be designed to observe intra-host or inter-host interactions. Bacterial phylodynamic studies usually focus on inter-host interactions with samples from many different hosts in a specific geographical location or several different geographical locations. The most important part of a study design is how to organize the sampling strategy. For example, the number of sampled time points, the sampling interval, and the number of sequences per time point are crucial to phylodynamic analysis. Sampling bias causes problems when looking at a diverse taxological samples. For example, sampling from a limited geographical location may impact effective population size.
Generating data
Experimental settings
Sequencing of the genome or genomic regions and what sequencing technique to use is an important experimental setting to phylodynamic analysis. Whole genome sequencing is oft |
https://en.wikipedia.org/wiki/In%20re%20Roslin%20Institute%20%28Edinburgh%29 | In re Roslin Institute (Edinburgh), 750 F.3d 1333 (Fed. Cir. 2014), is a 2014 decision of the United States Court of Appeals for the Federal Circuit rejecting a patent for a cloned sheep known as "Dolly the Sheep"— the first mammal ever cloned from an adult somatic cell.
Background
Dolly was cloned in 1996 by Ian Wilmut, Keith Campbell and colleagues at the Roslin Institute, part of the University of Edinburgh Scotland. The cloning method Campbell and Wilmut used to create Dolly constituted a breakthrough in scientific discovery. Known as somatic cell nuclear transfer, this process involves removing the nucleus of a regular body cell and implanting that nucleus into an egg cell that has had its cell nucleus removed. A nucleus is the organelle that holds a cell's genetic material (its DNA). Campbell and Wilmut found that if the donor, somatic cell is arrested in the stage of the cell cycle where it is dormant and non-replicating (the quiescent phase) prior to nuclear transfer, the resulting fused cell will develop into an embryo. The resulting cloned animal is an exact genetic replica of the adult mammal from which the somatic cell nucleus was taken.
The patent application claims the cloned animal. Claim 155 is representative:
155. A live-born clone of a pre-existing, non-embryonic, donor mammal, wherein the mammal is selected from cattle, sheep, pigs, and goats.
The US Patent and Trademark Office (USPTO) rejected the claims as patent ineligible under 35 U.S.C. § 101 "because it constituted a natural phenomenon that did not possess 'markedly different characteristics than any found in nature.' " A patent on the method was allowed, but it is not involved in this case.
Ruling by Federal Circuit
The Federal Circuit unanimously affirmed the PTO rejection of the claims in opinion by Judge Timothy Dyk joined by Judges Kimberly Ann Moore and Evan Wallach.
It is "clear that naturally occurring organisms are not patentable." The patent in Chakrabarty claimed a gene |
https://en.wikipedia.org/wiki/Modulation%20doping | Modulation doping is a technique for fabricating semiconductors such that the free charge carriers are spatially separated from the donors. Because this eliminates scattering from the donors, modulation-doped semiconductors have very high carrier mobilities.
History
Modulation doping was conceived in Bell Labs in 1977 following a conversation between Horst Störmer and Ray Dingle, and implemented shortly afterwards by Arthur Gossard. In 1977, Störmer and Dan Tsui used a modulation-doped wafer to discover the fractional quantum Hall effect.
Implementation
Modulation-doped semiconductor crystals are commonly grown by epitaxy to allow successive layers of different semiconductor species to be deposited. One common structure uses a layer of AlGaAs deposited over GaAs, with Si n-type donors in the AlGaAs.
Applications
Field effect transistors
Modulation-doped transistors can reach high electrical mobilities and therefore fast operation. A modulation-doped field-effect transistor is known as a MODFET.
Low-temperature electronics
One advantage of modulation doping is that the charge carriers cannot become trapped on the donors even at the lowest temperatures. For this reason, modulation-doped heterostructures allow electronics operating at cryogenic temperatures.
Quantum computing
Modulation-doped two-dimensional electron gases can be gated to create quantum dots. Electrons trapped in these dots can then be operated as quantum bits.
References
Semiconductor device fabrication |
https://en.wikipedia.org/wiki/Normalized%20Difference%20Red%20Edge%20Index | The normalized difference red edge index (NDRE) is a metric that can be used to analyse whether images obtained from multi-spectral image sensors contain healthy vegetation or not. It is similar to Normalized Difference Vegetation Index (NDVI) but uses the ratio of Near-Infrared and the edge of Red as follows:
The red edge is the part of the spectrum centred around 715 nm.
References
External links
Chlorophyll Absorption
Spectral Reflectance Changes Associated with Autumn Senescence of Aesculus hippocastanum L. and Acer platanoides L. Leaves. Spectral Features and Relation to Chlorophyll Estimation
Satellite meteorology
Remote sensing
Biogeography |
https://en.wikipedia.org/wiki/Numerical%20algebraic%20geometry | Numerical algebraic geometry is a field of computational mathematics, particularly computational algebraic geometry, which uses methods from numerical analysis to study and manipulate the solutions of systems of polynomial equations.
Homotopy continuation
The primary computational method used in numerical algebraic geometry is homotopy continuation, in which a homotopy is formed between two polynomial systems, and the isolated solutions (points) of one are continued to the other. This is a specialization of the more general method of numerical continuation.
Let represent the variables of the system. By abuse of notation, and to facilitate the spectrum of ambient spaces over which one can solve system, we do not use vector notation for . Similarly for the polynomial systems and .
Current canonical notation calls the start system , and the target system, i.e., the system to solve, . A very common homotopy, the straight-line homotopy, between and is
In the above homotopy, one starts the path variable at and continues toward . Another common choice is to run from to . In principle, the choice is completely arbitrary. In practice, regarding endgame methods for computing singular solutions using homotopy continuation, the target time being can significantly ease analysis, so this perspective is here taken.
Regardless of the choice of start and target times, the ought to be formulated such that , and .
One has a choice in , including
Roots of unity
Total degree
Polyhedral
Multi-homogeneous
and beyond these, specific start systems that closely mirror the structure of may be formed for particular systems. The choice of start system impacts the computational time it takes to solve , in that those that are easy to formulate (such as total degree) tend to have higher numbers of paths to track, and those that take significant effort (such as the polyhedral method) are much sharper. There is currently no good way to predict which will lead to the qui |
https://en.wikipedia.org/wiki/Crossover%20value | In genetics, the crossover value is the linked frequency of chromosomal crossover between two gene loci (markers). For a fixed set of genetic and environmental conditions, recombination in a particular region of a linkage structure (chromosome) tends to be constant and the same is then true for the crossover value which is used in the production of genetic maps.
Origin in cell biology
Crossover implies the exchange of chromosomal segments between non-sister chromatids, in meiosis during the production of gametes. The effect is to assort the alleles on parental chromosomes, so that the gametes carry recombinations of genes different from either parent. This has the overall effect of increasing the variety of phenotypes present in a population.
The process of non-sister chromatid exchanges, including the crossover value, can be observed directly in stained cells, and indirectly by the presence or absence of genetic markers on the chromosomes. The visible crossovers are called chiasmata.
The large-scale effect of crossover is to spread genetic variations within a population, as well as genetic basis for the selection of the most adaptable phenotypes. The crossover value depends on the mutual distance of the genetic loci observed. The crossover value is equal to the recombination value or fraction when the distance between the markers in question is short.
See also
Chromosomal crossover
Genetic recombination
References
Classical genetics
Cellular processes
Cytogenetics |
https://en.wikipedia.org/wiki/Necessity%20of%20identity | In modal logic, the necessity of identity is the thesis that for every object x and object y, if x and y are the same object, it is necessary that x and y are the same object. The thesis is best known for its association with Saul Kripke, who published it in 1971, although it was first derived by the logician Ruth Barcan Marcus in 1947, and later, in simplified form, by W. V. O. Quine in 1953.
Kripke's derivation
The derivation in Kripke's 'Identity and Necessity' is in three steps:
(1) .
(2) .
(3)
The first premise is simply postulated: every object is identical to itself. The second is an application of the principle of substitutivity: if a = b, then a has all the properties b has, thus from Fa, infer Fb, where F is . The third follows by elementary predicate logic.
Rigid designation
In the later Naming and Necessity, Kripke suggested that the principle could be derived directly, assuming what he called rigid designation. A term is a rigid designator when it designates the same object in every possible world in which that object exists. When a name's referent is fixed by the original act of naming, it becomes a rigid designator. Some examples of rigid designators include proper names (i.e. ‘Richard Nixon’), natural kind terms ( i.e. ‘gold’ or ‘H2O’) and some descriptions.
Proper names are typically rigid designators, but definite descriptions are typically not. So we can speak of "Richard Nixon" referring to the same person in all possible worlds, but the description "the man who won the 1968 election" could refer to many different people. According to Kripke, the proper name "Richard Nixon" can only be used rigidly, but the description "the man who won the 1968 election" can be used non-rigidly. Kripke argues, that if names are rigid designators, then identity must be necessary, because the names ‘a’ and ‘b’ will be rigid designators of an object x if a is identical to b, and so in every possible world, ‘a’ and ‘b’ will both refer to this same object x, |
https://en.wikipedia.org/wiki/Gametangiogamy | Gametangiogamy is the fusion or copulation of whole gametangia in certain members of the phyla Zygomycota and Ascomycota. The copulated union of multinuclear cells is followed after a more or less long period dikaryophase, by a pairwise fusion (karyogamy) of sexually different nuclei.
In this case, karyogamy takes place simultaneously between the nuclei of many pairs of nuclei, not as in gametogamy between two gametic nuclei (polyfertilization).
See also
Gametogamy
Karyogamy
Fertilization
References
Sexual reproduction
Mycology |
https://en.wikipedia.org/wiki/Neuroscience%20of%20aging | The neuroscience of aging is the study of the changes in the nervous system that occur with ageing. Aging is associated with many changes in the central nervous system, such as mild atrophy of the cortex that is considered non-pathological. Aging is also associated with many neurological and neurodegenerative disease such as amyotrophic lateral sclerosis, dementia, mild cognitive impairment, Parkinson's disease, and Creutzfeldt–Jakob disease.
Normal structural and neural changes
Neurogenesis occurs very little in adults, only occurring in the hypothalamus and striatum to a small extent in a process called adult neurogenesis. The volume of the brain actually decrease roughly 5% per decade after forty. It is currently unclear why brain volume decreases with age, however, a few causes may include: cell death, decreased cell volume, and changes in synaptic structure. The changes in brain volume is heterogenous across regions with prefrontal cortex receiving the most significant reduction in volume followed in order by the striatum, the temporal lobe, cerebellar vermis, cerebellar hemispheres, and the hippocampus. However, one review found that the amygdala and ventromedial prefrontal cortex remained relatively free of atrophy, which is consistent with the finding of emotional stability occurring with non-pathological aging. Enlargement of the ventricles, sulci and fissures are also common in non-pathological aging.
Changes may also be associated with neuroplasticity, synaptic functionality and voltage gated calcium channels. Increased magnitude of hyperpolarization, possibly a result of dysfunctional calcium regulation, leads to decreased firing rate of neurons and decreased plasticity. This effect is particularly pronounced in the hippocampus of aged animals, and may be an important contributor to age-associated memory deficits. The hyperpolarization of a neuron can be divided into three stages: the fast, medium and slow hyperpolarization. In aged neurons, |
https://en.wikipedia.org/wiki/Siraegi | Siraegi () is a Korean ingredient prepared by drying the leaves and stems of a radish or, less commonly, of a napa cabbage.
Siraegi dishes
Siraegi-jijimi – a type of jijimi that is made by first cutting soaked siraegi into bite-size pieces, then seasoning it with doenjang (soybean paste), perilla oil, Cheongyang chili, and minced garlic, and finally stewing it in a broth made from dried Alaska pollock head, kelp, and anchovy in tteumul water (the water left from washing rice).
Siraegij-doenjang-jigae – a type of doenjang-jjigae (soybean paste stew) made by cutting soaked siraegi into bite-size pieces, massaging it with the mixture of doenjang (soybean paste), chili powder and minced garlic, and boiling it with scallions, red chili, shiitake mushrooms, and cubed tofu in anchovy broth.
Siraegi-namul – a type of namul, made by boiling siraegi, slicing it in bite-size pieces, seasoning it with soup soy sauce, sesame oil, and minced garlic, and finally stir-frying it with chopped scallions. It is served with toasted sesame seeds sprinkled on top. It is one of the Boreum-namul (full moon namul) eaten on the day of Daeboreum (the first full moon of the year).
Gallery
See also
Ugeoji
References
Food ingredients
Korean cuisine |
https://en.wikipedia.org/wiki/Mathematicism | Mathematicism is 'the effort to employ the formal structure and rigorous method of mathematics as a model for the conduct of philosophy'. or else it is the epistemological view that reality is fundamentally mathematical. The term has been applied to a number of philosophers, including Pythagoras and René Descartes although the term is not used by themselves.
The role of mathematics in Western philosophy has grown and expanded from Pythagoras onwards. It is clear that numbers held a particular importance for the Pythagorean school, although it was the later work of Plato that attracts the label of mathematicism from modern philosophers. Furthermore it is René Descartes who provides the first mathematical epistemology which he describes as a mathesis universalis, and which is also referred to as mathematicism.
Pythagoras
Although we don't have writings of Pythagoras himself, good evidence that he pioneered the concept of mathematicism is given by Plato, and summed up in the quotation often attributed to him that "everything is mathematics". Aristotle says of the Pythagorean school:
Further evidence for the views of Pythagoras and his school, although fragmentary and sometimes contradictory, comes from Alexander Polyhistor. Alexander tells us that central doctrines of the Pythagorieans were the harmony of numbers and the ideal that the mathematical world has primacy over, or can account for the existence of, the physical world.
According to Aristotle, the Pythagoreans used mathematics for solely mystical reasons, devoid of practical application. They believed that all things were made of numbers. The number one (the monad) represented the origin of all things and other numbers similarly had symbolic representations. Nevertheless modern scholars debate whether this numerology was taught by Pythagoras himself or whether it was original to the later philosopher of the Pythagorean school, Philolaus of Croton.
Walter Burkert argues in his study Lore and Science |
https://en.wikipedia.org/wiki/Gametogamy | Gametogamy is sexual fusion – copulation or fertlization – of two single-celled gametes of different sex and the union of their gamete nuclei (and corresponding extranuclear structures) giving the zygote nucleus, as well as whole zygotic content.
According to its morphology, size and other properties, most forms of gametogamy are as follows:
Isogamy (Ancient Greek ισο - iso= "equal + γάμος gámos = "marriage") – in cell biology – is a type of sexual reproduction that includes gametes of similar morphological similar shape and size, with difference in general only in genome content and gene expression in one or more mating-type regions. Both gametes look alike, and they cannot be classified as "male" or "female." Actually, organisms characterized as isogametic have different mating types, most commonly noted as "+" and "−" strains, although in some species there are more than two mating types (designated by numbers or letters). Izogamic fertilization includes two gametes fusion, when different mating types form a zygote.
Heterogamy (Ancient Greek ἕτερος heteros = "other, another" + γάμος gámos = "marriage") – in cell biology – is a synonym of anisogamy, involving differently sized male and female gametes produced by different sexes or mating types in a species.
Apogamy (Ancient Greek αρο - apo = from, of + γάμος gámos) – in botany – is defined as a replacement of normal sexual reproduction by asexual propagation, without fertilization. The fruits can be developed without fertilization. In this case, embryo occurs without fertilization or without the presence of pollen. A special form of apogamia is when the embryo develops klijavo seed. It is the phenomenon called parthenogenesis. So, fruits contain seeds, which although not fertilized, maintaining viability. In this case the embryo or germ arises from unfertilized oocyte. This phenomenon is widespread example in nuts.
From such seeds develop plants whose features are identical properties |
https://en.wikipedia.org/wiki/FreeCodeCamp | freeCodeCamp (also referred to as Free Code Camp) is a non-profit organization that consists of an interactive learning web platform, an online community forum, chat rooms, online publications and local organizations that intend to make learning software development accessible to anyone. Beginning with tutorials that introduce students to HTML, CSS and JavaScript, students progress to project assignments that they complete either alone or in pairs. Upon completion of all project tasks, students are partnered with other nonprofits to build web applications, giving the students practical development experience.
History
freeCodeCamp was launched in October 2014 and incorporated as Free Code Camp, Inc. The founder, Quincy Larson, is a software developer who took up programming after graduate school and created freeCodeCamp as a way to streamline a student's progress from beginner to being job-ready.
In a 2015 podcast interview, he summarized his motivation for creating freeCodeCamp as follows: freeCodeCamp is my effort to correct the extremely inefficient and circuitous way I learned to code. I'm committing my career and the rest of my life towards making this process as efficient and painless as possible. [...] All those things that made learning to code a nightmare to me are things that we are trying to fix with freeCodeCamp.
The original curriculum focused on MongoDB, Express.js, AngularJS, and Node.js and was estimated to take 800 hours to complete. Many of the lessons were links to free material on other platforms, such as Codecademy, Stanford, or Code School. The course was broken up into “Waypoints” (quick, interactive tutorials), “Bonfires” (algorithm challenges), “Ziplines” (front-end projects), and “Basejumps” (full-stack projects). Completing the front-end and full-stack projects awarded the student with respective certificates.
The curriculum was updated in January 2016 to rely less on outside material, remove the unconventional section names, and switch |
https://en.wikipedia.org/wiki/Glagolitic%20numerals | Glagolitic numerals are a numeral system derived from the Glagolitic script, generally agreed to have been created in the 9th century by Saint Cyril. They are similar to Cyrillic numerals, except that numeric values are assigned according to the native alphabetic order of the Glagolitic alphabet. Use of Glagolitic script and numerals declined through the Middle Ages and by the 17th century Glagolitic was used almost only in religious writings. It is unclear if the use of Glagolitic numerals persisted as long as the use of Glagolitic script.
General description
The system is a decimal alphabetic numeral system, with values assigned in alphabetical order, so = 1, = 2, and so forth. Glyphs for the ones, tens, and hundreds values are combined additively to form numbers, for example, is 500 + 80 + 3 or 583. Numbers are written from left to right, highest value at the left. As with Cyrillic numerals, between 11 and 19 the ordinary sign order is reversed, so the numbers 11 through 19 are typically written with the ones digit before the glyph for 10; for example is 6 + 10, making 16, this reflects the Slavic lexical numerals for the teens.
For numbers greater than 999, there is conflicting evidence. As the earliest version of the Glagolitic alphabet had 36 characters, there are indications of the use of Glagolitic letters for 1000 through 9000, although the validity of 3000 and greater is questioned. There is also evidence of the use of a thousands sign, similar to the lower-left keraia in Greek numerals or the Cyrillic thousands sign to mark numbers greater than 999.
To distinguish numbers from text, numerals are typically set apart with dots or a mark is placed over the numbers. For example, the Missale Romanum Glagolitice printed in 1483, uses both dots around and a titlo over letters in places to indicate a number, as does the Vinodol statute.
Example:
() – 1280
Table of values
As noted earlier, the letters associated with number values greater than 999 ar |
https://en.wikipedia.org/wiki/Fangcheng%20%28mathematics%29 | Fangcheng (sometimes written as fang-cheng or fang cheng) () is the title of the eighth chapter of the Chinese mathematical classic Jiuzhang suanshu (The Nine Chapters on the Mathematical Art) composed by several generations of scholars who flourished during the period from the 10th to the 2nd century BC. This text is one of the earliest surviving mathematical texts from China. Several historians of Chinese mathematics have observed that the term fangcheng is not easy to translate exactly. However, as a first approximation it has been translated as "rectangular arrays" or "square arrays". The term is also used to refer to a particular procedure for solving a certain class of problems discussed in Chapter 8 of The Nine Chapters book.
The procedure referred to by the term fangcheng and explained in the eighth chapter of The Nine Chapters, is essentially a procedure to find the solution of systems of n equations in n unknowns and is equivalent to certain similar procedures in modern linear algebra. The earliest recorded fangcheng procedure is similar to what we now call Gaussian elimination.
The fangcheng procedure was popular in ancient China and was transmitted to Japan. It is possible that this procedure was transmitted to Europe also and served as precursors of the modern theory of matrices, Gaussian elimination, and determinants. It is well known that there was not much work on linear algebra in Greece or Europe prior to Gottfried Leibniz's studies of elimination and determinants, beginning in 1678. Moreover, Leibniz was a Sinophile and was interested in the translations of such Chinese texts as were available to him.
On the meaning of fangcheng
There is no ambiguity in the meaning of the first character fang. It means "rectangle" or "square." But different interpretations are given to the second character cheng:
The earliest extant commentary, by Liu Hui, dated 263 CE defines cheng as "measures," citing the non-mathematical term kecheng, which means "coll |
https://en.wikipedia.org/wiki/General%20sense%20%28anatomy%29 | In medicine and anatomy, the general senses are the senses which are perceived due to receptors scattered throughout the body such as touch, temperature, and hunger, rather than tied to a specific structure, as the special senses vision or hearing are. Often, the general senses are associated with a specific drive; that is, the sensation will cause a change in behavior meant to reduce the sensation.
References
Senses
Anatomy |
https://en.wikipedia.org/wiki/Audio%20injection | Audio injection is the exploitation of digital assistants such as Amazon Echo, Google Home or Apple SIRI by unwanted instructions from a third party. These services lack authentication when reacting to user commands, making it possible for attackers to issue activation words and commands and trigger the execution of desired actions. Injection results include fraud, burglary, data espionage and takeover of connected systems.
Approach
Most digital assistants require an activation word to trigger the complete recording and audio analysis of spoken commands (e.g. "OK Google"). These commands, spoken in natural language, will be processed and executed. The activation word itself is different for each manufacturer, most often connected to product’s name. It is not possible for the product's owner to customize this activation word, meaning that all models react to the same word.
Processed language is not analyzed in regards to voice and recognition or authorization of individual users. As a result, all users which are in the audible range of a device have the same authorizations to trigger and execute actions. Depending on functionality, these actions can range from simple actions like music playback or controlling lights, to security critical or sensitive actions such as opening gates, executing or ordering chargeable transactions or reading out private information.
Audio injection attacks can be performed remotely. If the access into the audible area of a digital assistant is restricted, it can be attacked by increasing the distance of transmission. Either this can be reached by overcoming existent acoustic barriers (e.g. via vending opening or a momentary opened window) or via unusual loud playback via amplifiers and loudspeakers. With such an approach it is possible to control digital assistants from other rooms, floors or outside of a building.
Digital assistants do not distinguish whether voice commands are directly spoken or reproduced by a loudspeaker system. |
https://en.wikipedia.org/wiki/Hurewicz%20space | In mathematics, a Hurewicz space is a topological space that satisfies a certain basic selection principle that generalizes σ-compactness. A Hurewicz space is a space in which for every sequence of open covers of the space there are finite sets such that every point of the space belongs to all but finitely many sets .
History
In 1926, Witold Hurewicz introduced the above property of topological spaces that is formally stronger than the Menger property. He didn't know whether Menger's conjecture is true, and whether his property is strictly stronger than the Menger property, but he conjectured that in the class of metric spaces his property is equivalent to -compactness.
Hurewicz's conjecture
Hurewicz conjectured that in ZFC every Hurewicz metric space is σ-compact. Just, Miller, Scheepers, and Szeptycki proved that Hurewicz's conjecture is false, by showing that there is, in ZFC, a set of real numbers that is Menger but not σ-compact. Their proof was dichotomic, and the set witnessing the failure of the conjecture heavily depends on whether a certain (undecidable) axiom holds or not.
Bartoszyński and Shelah (see also Tsaban's solution based on their work ) gave a uniform ZFC example of a Hurewicz subset of the real line that is not σ-compact.
Hurewicz's problem
Hurewicz asked whether in ZFC his property is strictly stronger than the Menger property. In 2002, Chaber and Pol in unpublished note, using dichotomy proof, showed that there is a Hurewicz subset of the real line that is not Menger. In 2008, Tsaban and Zdomskyy gave a uniform example of a Hurewicz subset of the real line that is Menger but not Hurewicz.
Characterizations
Combinatorial characterization
For subsets of the real line, the Hurewicz property can be characterized using continuous functions into the Baire space . For functions , write if for all but finitely many natural numbers . A subset of is bounded if there is a function such that for all functions . A subset of is unbounded |
https://en.wikipedia.org/wiki/Rothberger%20space | In mathematics, a Rothberger space is a topological space that satisfies a certain a basic selection principle. A Rothberger space is a space in which for every sequence of open covers of the space there are sets such that the family covers the space.
History
In 1938, Fritz Rothberger introduced his property known as .
Characterizations
Combinatorial characterization
For subsets of the real line, the Rothberger property can be characterized using continuous functions into the Baire space . A subset of is guessable if there is a function such that the sets are infinite for all functions . A subset of the real line is Rothberger iff every continuous image of that space into the Baire space is guessable. In particular, every subset of the real line of cardinality less than is Rothberger.
Topological game characterization
Let be a topological space. The Rothberger game played on is a game with two players Alice and Bob.
1st round: Alice chooses an open cover of . Bob chooses a set .
2nd round: Alice chooses an open cover of . Bob chooses a set .
etc.
If the family is a cover of the space , then Bob wins the game . Otherwise, Alice wins.
A player has a winning strategy if he knows how to play in order to win the game (formally, a winning strategy is a function).
A topological space is Rothberger iff Alice has no winning strategy in the game played on this space.
Let be a metric space. Bob has a winning strategy in the game played on the space iff the space is countable.
Properties
Every countable topological space is Rothberger
Every Luzin set is Rothberger
Every Rothberger subset of the real line has strong measure zero.
In the Laver model for the consistency of the Borel conjecture every Rothberger subset of the real line is countable
References
Properties of topological spaces
Topology |
https://en.wikipedia.org/wiki/Phylogenetic%20inference%20using%20transcriptomic%20data | In molecular phylogenetics, relationships among individuals are determined using character traits, such as DNA, RNA or protein, which may be obtained using a variety of sequencing technologies. High-throughput next-generation sequencing has become a popular technique in transcriptomics, which represent a snapshot of gene expression. In eukaryotes, making phylogenetic inferences using RNA is complicated by alternative splicing, which produces multiple transcripts from a single gene. As such, a variety of approaches may be used to improve phylogenetic inference using transcriptomic data obtained from RNA-Seq and processed using computational phylogenetics.
Sequence acquisition
There have been several transcriptomics technologies used to gather sequence information on transcriptomes. However the most widely used is RNA-Seq.
RNA-Seq
RNA reads may be obtained using a variety of RNA-seq methods.
Public databases
There are a number of public databases that contain freely available RNA-Seq data.
Assembly
Sequence assembly
RNA-Seq data may be directly assembled into transcripts using sequence assembly.
Two main categories of sequence assembly are often distinguished:
de novo transcriptome assembly - especially important when a reference genome is not available for a given species.
Genome-guided assembly (sometimes mapping or reference-guided assembly) - is capable of using a pre-existing reference to guide the assembly of transcripts
Both methods attempt to generate biologically representative isoform-level constructs from RNA-seq data and generally attempt to associate isoforms with a gene-level construct. However, proper identification of gene-level constructs may be complicated by recent duplications, paralogs, alternative splicing or gene fusions. These complications may also cause downstream issues during ortholog inference. When selecting or generating sequence data, it is also vital to consider the tissue type, developmental stage and environmental conditions |
https://en.wikipedia.org/wiki/Tumble%20flap | A tumble flap is a flap housed in the intake area of many modern automotive gasoline engines to produce a swirl at right-angles to the cylinder axis. This swirling motion improves the air-fuel mixture and enhances power and torque, while at the same time lowering fuel consumption and decreasing emissions. The flaps can be actuated with pneumatic or electric power. Furthermore, the position of the flap can be controlled continuously with a feedback controller or just kept either fully closed or open. Use of a tumble flap improves the lean burn ability of a spark-ignition engine.
Operation
The set point of the tumble flap is adjusted by an electrical or vacuum-activated servo mechanism which is under the control of the engine management system. Tumble flaps are open or closed depending on engine operating states (related to engine speed and load), engine temperatures, combustion modes (characterized by air-fuel ratio), catalytic converter heating or cold start active or inactive etc.
In gasoline direct injection, stratified charge mode is used for light-load running conditions, at constant or reducing road speeds, where no acceleration is required. In this charge mode, the air-fuel mixture is concentrated around the spark plug by means of the specifically produced air flow and a special geometry of the piston, while pure air is placed near the cylinder walls. Tumble flaps are used to realize this stratified charge. The flaps remain closed during the stratified charge mode. A switchable tumble system is normally used to direct a targeted air flow. The so-called "tumble plate" divides the air inlet channel into an upper and lower half. An upstream flap allows air flow either only over the upper part or over the entire cross-section.
At higher engine speeds and torques, the tumble flap is opened to achieve a better degree of filling. During this homogeneous mode of combustion, the engine functions like a conventional fuel injection engine, but with higher efficiency |
https://en.wikipedia.org/wiki/D-space | In mathematics, a topological space is a D-space if for any family of open sets such that for all points , there is a closed discrete subset of the space such that .
History
The notion of D-spaces was introduced by Eric Karel van Douwen and E.A. Michael. It first appeared in a 1979 paper by van Douwen and Washek Frantisek Pfeffer in the Pacific Journal of Mathematics. Whether every Lindelöf and regular topological space is a D-space is known as the D-space problem. This problem is among twenty of the most important problems of set theoretic topology.
Properties
Every Menger space is a D-space.
A subspace of a topological linearly ordered space is a D-space iff it is a paracompact space.
References
Properties of topological spaces
Topology |
https://en.wikipedia.org/wiki/SAFE%20Building%20System | Also known as the SAFE Foundation System, developed by architect and inventor Greg Henderson and his team at Arx Pax Labs, Inc., is a way to build in flood zones and coastal areas. It is designed to float buildings, roadways, and utilities in a few feet of water. The self-adjusting floating environment draws from existing technologies used to float concrete bridges and runways such as Washington's SR 520 and Japan's Mega-Float. It also absorbs the shock of earthquakes, allowing buildings and their related communities to remain stable. Arx Pax is working with Republic of Kiribati and Pacific Rising to solve for sustainable development challenges associated with rising sea levels.
Arx Pax, the company involved in this technology has proposed building a “floating village” project in north San Jose's Alviso hamlet, deploying a group of pontoons beneath the buildings to protect the development from floods and earthquakes.
Originally developed for earthquakes as an alternative to Base Isolation the floating foundation decouples the structure from the earth with a simple patented method consisting of three parts. According to the patent, "Three part foundation systems can include a containment vessel, which constrains a buffer medium to an area above the containment vessel, and a construction platform. A building can be built on the construction platform. In a particular embodiment, during operation, the construction platform and structures built on the construction platform can float on the buffer medium. In an earthquake, a construction platform floating on a buffer medium may experience greatly reduced shear forces. In a flood, a construction platform floating on a buffer medium can be configured to rise as water levels rise to limit flood damage."
References
See also
Sustainable development
Evergreen Point Floating Bridge
Very large floating structure
Emerging technologies |
https://en.wikipedia.org/wiki/HackMIT | HackMIT is an annual student-run hackathon held in the fall at the Massachusetts Institute of Technology.
History
HackMIT
The first HackMIT had around 150 attendees and took place in February 2013 at the Stata Center as part of MIT's Techfair, a technology fair and corporate expo for MIT students. The event was open to college students of the Northeastern United States and had Techfair and Palantir as its title sponsors.
HackMIT 2013
HackMIT was also held in the September of 2013 with 1000 attendees. The event featured Tom Lehman of Genius (formerly Rap Genius) as a keynote speaker and Sequoia Capital as the event's title sponsor.
HackMIT 2014
In October, HackMIT 2014 invited 1000 undergraduates as well as Adora Cheung, then-CEO of Homejoy, and Alexis Ohanian, co-founder of Reddit, as keynotes. Highlighted sponsors of HackMIT 2014 were Amadeus, Google, and Uber.
HackMIT 2015
HackMIT 2015's theme was experimentation, and teams built projects ranging from an Apple Watch air guitar to computer vision analysis tools for security camera footage. Keynote speakers this year included Liz Fosslien, author of webcomic Out of the Office, and Jack Conte, musician and co-founder of Patreon.
HackMIT 2016
The 2016 event focused on inclusivity and featured a random lottery admissions process combined with selected application reading. Keynote speakers included Sanjit Biswas, co-founder of Samsara and Meraki, Inc., and Dina Katabi, MIT professor and director of the MIT Center for Wireless Networks and Mobile Computing.
HackMIT 2017
HackMIT was held in September 2017, and over 1200 hackers came together from all around the world. Keynote speakers included Steve Huffman, co-founder and CEO of Reddit and Kyle Vogt, Founder and CEO of Cruise Automation.
Projects
Over the years, HackMIT has seen a wide variety of hacks, ranging from new web and mobile app concepts to novel hardware/software interfaces to machine learning and computer vision projects. In particular, HackMIT empha |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.