source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Language%20Server%20Protocol
The Language Server Protocol (LSP) is an open, JSON-RPC-based protocol for use between source code editors or integrated development environments (IDEs) and servers that provide "language intelligence tools": programming language-specific features like code completion, syntax highlighting and marking of warnings and errors, as well as refactoring routines. The goal of the protocol is to allow programming language support to be implemented and distributed independently of any given editor or IDE. In the early 2020s LSP quickly became a "norm" for language intelligence tools providers. History LSP was originally developed for Microsoft Visual Studio Code and is now an open standard. On June 27, 2016, Microsoft announced a collaboration with Red Hat and Codenvy to standardize the protocol's specification. The protocol was originally supported and adopted by these three companies. Its specification is hosted and developed on GitHub. Background Modern IDEs provide programmers with sophisticated features like code completion, refactoring, navigating to a symbol's definition, syntax highlighting, and error and warning markers. For example, in a text-based programming language, a programmer might want to rename a method read. The programmer could either manually edit the respective source code files and change the appropriate occurrences of the old method name into the new name, or instead use an IDE's refactoring capabilities to make all the necessary changes automatically. To be able to support this style of refactoring, an IDE needs a sophisticated understanding of the programming language that the program's source is written in. A programming tool without such an understanding—for example, one that performs a naive search-and-replace instead—could introduce errors. When renaming a read method, for example, the tool should not replace the partial match in a variable that might be called readyState, nor should it replace the portion of a code comment containin
https://en.wikipedia.org/wiki/Instance%20selection
Instance selection (or dataset reduction, or dataset condensation) is an important data pre-processing step that can be applied in many machine learning (or data mining) tasks. Approaches for instance selection can be applied for reducing the original dataset to a manageable volume, leading to a reduction of the computational resources that are necessary for performing the learning process. Algorithms of instance selection can also be applied for removing noisy instances, before applying learning algorithms. This step can improve the accuracy in classification problems. Algorithm for instance selection should identify a subset of the total available data to achieve the original purpose of the data mining (or machine learning) application as if the whole data had been used. Considering this, the optimal outcome of IS would be the minimum data subset that can accomplish the same task with no performance loss, in comparison with the performance achieved when the task is performed using the whole available data. Therefore, every instance selection strategy should deal with a trade-off between the reduction rate of the dataset and the classification quality. Instance selection algorithms The literature provides several different algorithms for instance selection. They can be distinguished from each other according to several different criteria. Considering this, instance selection algorithms can be grouped in two main classes, according to what instances they select: algorithms that preserve the instances at the boundaries of classes and algorithms that preserve the internal instances of the classes. Within the category of algorithms that select instances at the boundaries it is possible to cite DROP3, ICF and LSBo. On the other hand, within the category of algorithms that select internal instances, it is possible to mention ENN and LSSm. In general, algorithm such as ENN and LSSm are used for removing harmful (noisy) instances from the dataset. They do not reduce th
https://en.wikipedia.org/wiki/Box-counting%20content
In mathematics, the box-counting content is an analog of Minkowski content. Definition Let be a bounded subset of -dimensional Euclidean space such that the box-counting dimension exists. The upper and lower box-counting contents of are defined by where is the maximum number of disjoint closed balls with centers and radii . If , then the common value, denoted , is called the box-counting content of . If , then is said to be box-counting measurable. Examples Let denote the unit interval. Note that the box-counting dimension and the Minkowski dimension coincide with a common value of 1; i.e. Now observe that , where denotes the integer part of . Hence is box-counting measurable with . By contrast, is Minkowski measurable with . See also Box counting References Fractals
https://en.wikipedia.org/wiki/Alpha%20Profiling
Alpha profiling is an application of machine learning to optimize the execution of large orders in financial markets by means of algorithmic trading. The purpose is to select an execution schedule that minimizes the expected implementation shortfall, or more generally, ensures compliance with a best execution mandate. Alpha profiling models learn statistically-significant patterns in the execution of orders from a particular trading strategy or portfolio manager and leverages these patterns to associate an optimal execution schedule to new orders. In this sense, it is an application of statistical arbitrage to best execution. For example, a portfolio manager specialized in value investing may have a behavioral bias to place orders to buy while an asset is still declining in value. In this case, a slow or back-loaded execution schedule would provide better execution results than an urgent one. But this same portfolio manager will occasionally place an order after the asset price has already begun to rise in which case it should best be handled with urgency; this example illustrates the fact that Alpha Profiling must combine public information such as market data with private information including as the identity of the portfolio manager and the size and origin of the order, to identify the optimal execution schedule. Market Impact Large block orders can generally not be executed immediately because there is no available counterparty with the same size. Instead, they must be sliced into smaller pieces which are sent to the market over time. Each slice has some impact on the price, so on average the realized price for a buy order will be higher than at the time of the decision, or less for a sell order. The implementation shortfall is the difference between the price at the time of the decision and the average expected price to be paid for executing the block, and is usually expressed in basis points as follows. Alpha Profile The alpha profile of an order is the ex
https://en.wikipedia.org/wiki/Bat%20flight
Bats are the only mammal capable of true flight. Bats use flight for capturing prey, breeding, avoiding predators, and long-distance migration. Bat wing morphology is often highly specialized to the needs of the species. Evolution Charles Darwin foresaw an issue with his theory of evolution by natural selection in the evolution of complex traits such as eyes or "the structure and habits of a bat." Indeed, the oldest bat fossils are very similar in wing morphology to the bats of today, despite living and dying 52.5 million years ago. Onychonycteris finneyi, the earliest known bat, already possessed powered flight. O. finneyi likely had an undulating flight style that alternated periods of fluttering with gliding. Evidence for this lies in the broad and short nature of O. finneyi wing morphology, which would have made it difficult to efficiently maneuver in the air or sustain flight. Additionally claws were seen on the ends of their forelimb digits (which have since disappeared in modern-day bats) giving evidence that O. finneyi was a skilled climber. The common ancestor of all bats is hypothesized to have been an arboreal quadruped of the northern hemisphere. This ancestor is predicted to have lived 64 million years ago at the border of the Cretaceous and Paleogene, based on molecular and paleontological data. There is a gap in the fossil record, and no transitional fossils exist from this quadrupedal ancestor to the appearance of the modern bat. It is unclear how long the transition from quadrupedalism to powered flight took. Based on a phylogenetic analysis of wing aerodynamics, the ancestral Chiropteran had wings with a low aspect ratio and rounded wingtips; this indicates it had slow but maneuverable and agile flight. After evolving powered flight, bats underwent massive adaptive radiation, becoming the second-most speciose mammal order, after rodents. A 2011 study hypothesized that, rather than having evolved from gliders, the ancestors of bats were flutter
https://en.wikipedia.org/wiki/BraSCII
BraSCII is an encoded repertoire of characters that was used in Brazil. It was used in the 1980s on several printers, in applications like , in video boards and it was the standard character set in the Brazilian line of MSX computers. This code page is known by Star printers as Code page 3847. History This character set was devised in 1986 by the Brazilian National Standards Organization (Associação Brasileira de Normas Técnicas (ABNT)) through the standard NBR-9614:1986 and later revised in 1991 in the standard NBR-9611:1991. The code is based on the ISO/IEC 4873 standards, and it was nicknamed "BraSCII" (Brazilian Standard Code for Information Interchange) in analogy to "American Standard Code for Information Interchange" (ASCII). While ASCII is a 7-bit code, BraSCII is an 8-bit code, where the characters from 160 to 255 were configured to support extended characters. It is nearly identical to ECMA-94 (1985) and ISO 8859-1 (1987) except that the characters × and ÷ are replaced by Œ and œ, as they still were in the Multinational Character Set (MCS, 1983) and Lotus International Character Set (LICS, 1985), whereas these code points were empty in the earliest versions of ECMA-94 (1985) and ISO 8859-1. However, it is completely identical for the first draft of ECMA-94 and ISO 8859-1. In some other devices, this character set is simply referred as "ABNT". This character set was different from the other Brazilian character set, ABICOMP. The goal of this character set was to eliminate the "Babel's Tower" of the existing coding systems for the Portuguese language (ISO IR-16, ISO IR-84, IBM 256, IBM 275, IBM 850, DEC Multinational, HP Roman-8, Mac OS Roman, etc.). In spite of that, this code set had troubles in imposing itself, mainly due to the pressure of big multinational corporations and finished by being less and less used because of the ubiquity of other character sets (ISO 8859-1 and later Unicode). Coverage Each character is encoded as a single eight-bit cod
https://en.wikipedia.org/wiki/Cloudbleed
Cloudbleed was a Cloudflare buffer overflow disclosed by Project Zero on February 17, 2017. Cloudflare's code disclosed the contents of memory that contained the private information of other customers, such as HTTP cookies, authentication tokens, HTTP POST bodies, and other sensitive data. As a result, data from Cloudflare customers was leaked to all other Cloudflare customers that had access to server memory. This occurred, according to numbers provided by Cloudflare at the time, more than 18,000,000 times before the problem was corrected. Some of the leaked data was cached by search engines. Discovery The discovery was reported by Google's Project Zero team. Tavis Ormandy posted the issue on his team's issue tracker and said that he informed Cloudflare of the problem on February 17. In his own proof-of-concept attack he got a Cloudflare server to return "private messages from major dating sites, full messages from a well-known chat service, online password manager data, frames from adult video sites, hotel bookings. We're talking full https requests, client IP addresses, full responses, cookies, passwords, keys, data, everything." Similarities to Heartbleed In its effects, Cloudbleed is comparable to the 2014 Heartbleed bug, in that it allowed unauthorized third parties to access data in the memory of programs running on web servers, including data which had been shielded while in transit by TLS. Cloudbleed also likely impacted as many users as Heartbleed since it affected a content delivery network serving nearly two million websites. Tavis Ormandy, first to discover the vulnerability, immediately drew a comparison to Heartbleed, saying "it took every ounce of strength not to call this issue 'cloudbleed'" in his report. Reactions Cloudflare On Thursday, February 23, 2017, Cloudflare wrote a post noting that:The bug was serious because the leaked memory could contain private information and because it had been cached by search engines. We have also not dis
https://en.wikipedia.org/wiki/Surf%20Office
Surf Office is a European-based facilitator of remote working retreats for companies. Founded in 2013 by Peter Fabor, the company has shared living and working spaces in Spain (Barcelona, Malaga and Gran Canaria) and Portugal (Lisbon and Madeira). References Telecommuting Freelance marketplace websites Online marketplaces of Spain
https://en.wikipedia.org/wiki/Tommy%20Gate
Tommy Gate is an American brand of hydraulic liftgate, or tail lift, manufactured by Woodbine Manufacturing Company. The company was formed in 1965 by Delbert "Bus" Brown and its production facility is located in Woodbine, Iowa. History Prior to founding Woodbine Manufacturing Company, Delbert Brown manufactured farming equipment as Brown Manufacturing Company. After inventing what was then one of the first trenching machines, Brown Manufacturing Company was sold to Omaha Steel Works. Three years later, Brown founded Woodbine Manufacturing Company and began the Tommy Gate brand. Expansion The Woodbine manufacturing facility was initially built in 1965 to occupy 70,000 square feet of production space. It expanded in 1980 to 90,000 and once again in 2000 when it grew to 140,000. The most recent expansion, completed in 2011, grew the plant to an overall 200,000 square feet (including 40,000 square feet of warehouse space). References External links Companies based in Iowa Manufacturing companies based in Iowa Logistics industry in the United States Mechanical engineering Hydraulics
https://en.wikipedia.org/wiki/Optional%20prisoner%27s%20dilemma
The Optional Prisoner's Dilemma (OPD) game models a situation of conflict involving two players in game theory. It can be seen as an extension of the standard prisoner's dilemma game, where players have the option to "reject the deal", that is, to abstain from playing the game. This type of game can be used as a model for a number of real world situations in which agents are afforded the third option of abstaining from a game interaction such as an election. Payoff matrix The structure of the Optional Prisoner's Dilemma can be generalized from the standard prisoner's dilemma game setting. In this way, suppose that the two players are represented by the colors, red and blue, and that each player chooses to "Cooperate", "Defect" or "Abstain". The payoff matrix for the game is shown below: If both players cooperate, they both receive the reward R for mutual cooperation. If both players defect, they both receive the punishment payoff P. If Blue defects while Red cooperates, then Blue receives the temptation payoff T, while Red receives the "sucker's" payoff, S. Similarly, if Blue cooperates while Red defects, then Blue receives the sucker's payoff S, while Red receives the temptation payoff T. If one or both players abstain, both receive the loner's payoff L. The following condition must hold for the payoffs: T > R > L > P > S References Non-cooperative games Dilemmas
https://en.wikipedia.org/wiki/Orthopole
In geometry, the orthopole of a system consisting of a triangle ABC and a line ℓ in the same plane is a point determined as follows. Let be the feet of perpendiculars dropped on ℓ from respectively. Let be the feet of perpendiculars dropped from to the sides opposite (respectively) or to those sides' extensions. Then the three lines are concurrent. The point at which they concur is the orthopole. Due to their many properties, orthopoles have been the subject of a large literature. Some key topics are determination of the lines having a given orthopole and orthopolar circles. Literature Orthopole=Ортополюс. In Russian References Points defined for a triangle
https://en.wikipedia.org/wiki/Resonant%20converter
A resonant converter is a type of electric power converter that contains a network of inductors and capacitors called a "resonant tank", tuned to resonate at a specific frequency. They find applications in electronics, in integrated circuits. There are multiple types of resonant converter: Series Resonant Converter Parallel Resonant Converter Class E Resonant Converter Class E Resonant Rectifier Zero Voltage Switching Resonant Converter Zero Current Switching Resonant Converter Two Quadrant ZVS Resonant Converter Resonant dc-link inverter See also Inverter Switched-mode power supply References Electrical engineering
https://en.wikipedia.org/wiki/FlowFET
A flowFET is a microfluidic component which allows the rate of flow of liquid in a microfluidic channel to be modulated by the electrical potential applied to it. In this way, it behaves as a microfluidic analogue to the field effect transistor, except that in the flowFET the flow of liquid takes the place of the flow of electric current. Indeed, the name of the flowFET is derived from the naming convention of electronic FETs (e.g. MOSFET, FINFET etc.). Mechanism of action A flowFET relies on the principle of electro-osmotic flow (EOF). In many liquid-solid interfaces, there is an electrical double layer that develops due to interactions between the two phases. In the case of a microfluidic channel, this results in a charged layer of liquid on the periphery of the fluid column which surrounds the bulk of the liquid. This electric double layer has an associated potential difference known as the zeta potential. When an appropriately-oriented electrical field is applied to this interfacial double layer (i.e. parallel to the channel and in the plane of the electric double layer), the charged liquid ions experience a motive Lorentz force. Since this layer sheaths the fluid column, and since this layer moves, the entire column of liquid will begin to move with a speed . The velocity of the fluid layer "diffuses" into the bulk of the channel from the periphery towards the centre due to viscous coupling. The speed is related to the strength of the electric field , the magnitude of the zeta potential , the permittivity and the viscosity of the fluid: In a FlowFET, the zeta potential between the channel walls and the fluid can be altered by applying an electrical field perpendicular to the channel walls. This has the effect of altering the motive force experienced by the mobile liquid atoms in the double layer. This change in the zeta-potential can be used to control both the magnitude and direction of the electro-osmotic flow in the microchannel. The controlling volt
https://en.wikipedia.org/wiki/Miedema%27s%20model
Miedema's model is a semi-empirical approach for estimating the heat of formation of solid or liquid metal alloys and compounds in the framework of thermodynamic calculations for metals and minerals. It was developed by the Dutch scientist Andries Rinse Miedema (15 November 1933 – 28 May 1992) while working at Philips Natuurkundig Laboratorium. It may provide or confirm basic enthalpy data needed for the calculation of phase diagrams of metals, via CALPHAD or ab initio quantum chemistry methods. History Miedema introduced his approach in several papers, beginning in 1973 in Philips Technical Review Magazine with "A simple model for alloys". Miedema described his motivation with "Reliable rules for the alloying behaviour of metals have long been sought. There is the qualitative rule that states that the greater the difference in the electronegativity of two metals, the greater the heat of formation - and hence the stability. Then there is the Hume-Rothery rule, which states that two metals that differ by more than 15% in their atomic radius will not form substitutional solid solutions. This rule can only be used reliably (90 % success) to predict poor solubility; it cannot predict good solubility. The author has proposed a simple atomic model, which is empirical like the other two rules, but nevertheless has a clear physical basis and predicts the alloying behaviour of transition metals accurately in 98 % of cases. The model is very suitable for graphical presentation of the data and is therefore easy to use in practice." Free web based applications include Entall and Miedema Calculator. The latter was reviewed and improved in 2016, with an extension of the method. The original Algol program was ported to Fortran. Informatics-guided classification of miscible and immiscible binary alloy systems Miedema's approach has been applied to the classification of miscible and immiscible systems of binary alloys. These are relevant in the design of multicomponent al
https://en.wikipedia.org/wiki/Application%20footprint
In computing, footprint of an application software (or application footprint) provides a sense of sizing of its various constituents, and hence, is a spatial measurement, in a given context, such as disk footprint, memory footprint (a.k.a. runtime footprint), network footprint, etc. In each case, footprint of an application excludes data that it may operate on, as part of storage or execution, but essentially includes programs (executable and libraries), configuration files, resources (binary or textual) and other context-specific components that may be considered as part of the software. Whereas disk footprint of an application refers to its storage size, runtime footprint translates to memory requirements at execution time. Network footprint, on the other hand, refers to the extent of control information that a network-based application references, again, excluding any data that it may require to transmit (download or upload) to carry its activities. For example, the network footprint of an application that fetches execution logs from a server does not include the sizes of logs it would have fetched in a typical session, but would include control messages that it would have sent and received. Distinguishing Disk Footprint Vs. Memory Footprint Often, disk footprint is confused with memory footprint, since both include certain overlapping areas, such program executable, libraries, etc. Though this is true to a certain extent, their individual makeup contain areas that are not relevant or clearly correspond to anything in the other category. For example, runtime footprint of an application would include stack space, which is typically meaningless in the storage footprint paradigm. On the other hand, configuration files read-in by an application, at start up, are usually closed off, but their in-memory representation (such as a property tree or linked list of key-value pairs) maintained for its entire life-time, and hence, do not really correspond, in terms of rel
https://en.wikipedia.org/wiki/Disk%20footprint
Disk footprint (or storage footprint) of a software application refers to its sizing information when it's in an inactive state, or in other words, when it's not executing but stored on a secondary media or downloaded over a network connection. It gives a sense of the size of an application, typically expressed in units of computer bytes (kilobytes, megabytes, etc.) that would be required to store the application on a media device or to be transmitted over a network. Due to organization of modern software applications, disk footprint may not be the best indicator of its actual execution time memory requirements - a tiny application that has huge memory requirements or loads a large number dynamically linked libraries, may not have comparable disk footprint vis-a-vis its runtime footprint. See also Computer data storage Disk storage References Software optimization
https://en.wikipedia.org/wiki/Star%20Wars%20Episode%20I%3A%20The%20Gungan%20Frontier
Star Wars: Episode I - The Gungan Frontier is a 1999 video game by Lucas Learning. Plot and gameplay In a game similar to SimLife, the player aims to create a new ecology for Gungan colonisers by using the sacred creature known as the Kresch to build a new home on the moon given to the player by Boss Nass. Critical reception Superkids wrote that the game would both challenge and delight aspiring ecologists and population biologists. Robn Kester of Inside Mac Gamers praised the game's unique style, while acknowledging its flaws. Allgame's Brad Cook thought the graphics were substandard. Awards and nominations |- | December, 1999 | Star Wars Episode I: The Gungan Frontier | Family Life: Best of the Year | |- | December, 1999 | Star Wars Episode I: The Gungan Frontier | Choosing Children's Software Magazine: Best Picks for the Holidays Award | |- | September, 1999 | Star Wars Episode I: The Gungan Frontier | Parent's Guide to Children's Media: Outstanding Achievement in Computer Programs | |- | September, 1999 | Star Wars Episode I: The Gungan Frontier | The National Association for Gifted Children: Parenting for High Potential1999 Holiday Educational Toy List | |- | September, 1999 | Star Wars Episode I: The Gungan Frontier | NewMedia INVISION '99: Gold in Education, Youth | |- | August, 1999 | Star Wars Episode I: The Gungan Frontier | Technology & Learning Magazine award | |} References 1999 video games Star Wars video games Classic Mac OS games Video games developed in the United States Windows games
https://en.wikipedia.org/wiki/PUBG%3A%20Battlegrounds
PUBG: Battlegrounds (previously known as PlayerUnknown's Battlegrounds) is a battle royale game developed by PUBG Studios and published by Krafton. The game, which was inspired by the Japanese film Battle Royale (2000), is based on previous mods created by Brendan "PlayerUnknown" Greene for other games, and expanded into a standalone game under Greene's creative direction. It is the first game in the PUBG Universe series. The game is played from either a third-person or first-person perspective. In the game, up to one hundred players parachute onto an island where they scavenge for weapons and equipment to kill other players while avoiding getting killed themselves. The available safe area of the game's map decreases in size over time, directing surviving players into an ever tightening space to force encounters. The last surviving player (or team) wins the round. It was first released for Windows via Steam's early access beta program in March 2017, with a full release in December 2017. The game was also released by Microsoft Studios for the Xbox One via its Xbox Game Preview program that same month, and officially released in September 2018. PUBG Mobile, a free-to-play mobile game version for Android and iOS, was released in 2018, in addition to a port for the PlayStation 4. A version for the Stadia streaming platform was released in April 2020, with Xbox Series X/S and PlayStation 5 versions being released in November 2020. The game has been free-to-play for all platforms since January 12, 2022. The game received positive reviews from critics, who found that while the game had some technical flaws, it presented new types of gameplay that could be easily approached by players of any skill level and was highly replayable. The game was credited with popularizing the battle royale genre, with a number of unofficial Chinese clones also being produced following its success. The game received several Game of the Year nominations and set seven Guinness World Records, a
https://en.wikipedia.org/wiki/White%20Space%20Internet
White Space Internet uses a part of the radio spectrum known as white spaces. The frequency range is created when there are gaps between the coverage areas of television channels. The spaces can provide broadband internet access that is similar to that of 4G mobile. Wilmington, North Carolina In a 2012 test of the technology, the city of Wilmington, North Carolina implemented technology utilizing the white space systems "to connect the city's infrastructure, allowing public officials to remotely turn lights on and off in parks, provide public wireless broadband to certain areas of the city, and monitor water levels." The initial tests of this internet showed that white space signals travel further and with less interference than Wi-Fi and Bluetooth. White space can help to alleviate some of the problems that are occurring with networks being over crowded. In 2013 the system was still in use. Carlson Wireless Technologies Carlson Wireless Technologies users are utilizing white space in order to access broadband internet. Carlson Wireless Technologies has been able to conduct research that has proven white space internet to cover around 10 kilometers in diameter, which covers 100 times further than WI-Fi. Also, white space is considered non-line-of-sight (NLOS). It differs from microwave links that need line-of-sight. The white space works with the lower-frequency UHF signals in order to connect between devices. NLOS allows white space to cover areas that have obstacles with limited issue. Wireless Reach White space technology has been suggested for several countries. Microsoft has white space databases, and is advancing white space technology to Jamaica, Namibia, Philippines, Tanzania, Taiwan, Colombia, United Kingdom, and the United States. Also, Google has decided to push white space technology to Cape Town, South Africa. An argument against white space Internet is that it uses a radio frequency range commonly used for television, and is not Super Wi-Fi
https://en.wikipedia.org/wiki/Henry%20Royce%20Institute
The Henry Royce Institute (often referred to as ‘Royce’) is the UK’s national institute for advanced materials research and innovation. Its vision is to identify challenges and to stimulate innovation in advanced materials research to support sustainable growth and development. Royce aims to be a "single front door" to the UK’s materials research community. Its stated mission is to “support world-recognised excellence in UK materials research, accelerating commercial exploitation of innovations, and delivering positive economic and societal impact for the UK.” Operating from its Hub at the University of Manchester, Royce is a partnership of eleven leading UK institutions. Royce operates as a hub and spoke collaboration between the University of Manchester (the hub), and the spokes of the founding Partners National Nuclear Laboratory, UK Atomic Energy Authority, Imperial College London, University of Cambridge, University of Leeds, University of Liverpool, University of Oxford and the University of Sheffield. Royce also has two Associate Partners, Cranfield University and the University of Strathclyde. Aims Royce aims to fulfil its mission by: Enabling national materials research foresighting, collaboration and strategy Providing access to the latest equipment facilities and capabilities Catalysing industrial collaboration and exploitation of materials research Fostering materials science skills development, innovation training, and outreach. History In 2014, Chancellor George Osborne announced the launch of the Henry Royce Institute for advanced materials science in his Autumn Statement in 2014. He pledged "a quarter of a billion" to support his proposals from June 2014 on creating a Northern Powerhouse. Royce was then established through a grant from the Engineering and Physical Sciences Research Council (EPSRC), which has been used to fund construction and refurbishment of buildings, equipment, and research and technical staff. Royce now coordinates over
https://en.wikipedia.org/wiki/254%20%28number%29
254 (two hundred [and] fifty-four) is the natural number following 253 and preceding 255. In mathematics It is a deficient number, since the sum of its divisors (excluding the same number) is 130 < 254. It is a semiprime number. Moreover, in American English, its name has a semiprime number of syllables. It is a square-free integer. It is a nontotient. It is a lazy caterer number. It is a congruent number. References Integers
https://en.wikipedia.org/wiki/%C4%8Cech%20complex
In algebraic topology and topological data analysis, the Čech complex is an abstract simplicial complex constructed from a point cloud in any metric space which is meant to capture topological information about the point cloud or the distribution it is drawn from. Given a finite point cloud X and an ε > 0, we construct the Čech complex as follows: Take the elements of X as the vertex set of . Then, for each , let if the set of ε-balls centered at points of σ has a nonempty intersection. In other words, the Čech complex is the nerve of the set of ε-balls centered at points of X. By the nerve lemma, the Čech complex is homotopy equivalent to the union of the balls, also known as the Offset Filtration. Relation to Vietoris–Rips complex The Čech complex is a subcomplex of the Vietoris–Rips complex. While the Čech complex is more computationally expensive than the Vietoris–Rips complex, since we must check for higher order intersections of the balls in the complex, the nerve theorem provides a guarantee that the Čech complex is homotopy equivalent to union of the balls in the complex. The Vietoris-Rips complex may not be. See also Vietoris–Rips complex Topological data analysis Čech cohomology Computational geometry Abstract simplicial complex Simplicial complex Simplicial homology References Algebraic topology
https://en.wikipedia.org/wiki/InfoTM
InfoTM is a Chinese technology company that was founded in 2008 as InfoTM Microelectronics Co., Ltd. Application processors References External links InfoTM company website ARM architecture Embedded microprocessors System on a chip Fabless semiconductor companies Semiconductor companies of China
https://en.wikipedia.org/wiki/Sealioning
Sealioning (also sea-lioning and sea lioning) is a type of trolling or harassment that consists of pursuing people with relentless requests for evidence, often tangential or previously addressed, while maintaining a pretense of civility and sincerity ("I'm just trying to have a debate"), and feigning ignorance of the subject matter. It may take the form of "incessant, bad-faith invitations to engage in debate", and has been likened to a denial-of-service attack targeted at human beings. The term originated with a 2014 strip of the webcomic Wondermark by David Malki, which The Independent called "the most apt description of Twitter you'll ever see". Description The sealioner feigns ignorance and politeness while making relentless demands for answers and evidence (while often ignoring or sidestepping any evidence the target has already presented), under the guise of "just trying to have a debate", so that when the target is eventually provoked into an angry response, the sealioner can act as the aggrieved party, and the target presented as closed-minded and unreasonable. It has been described as "incessant, bad-faith invitations to engage in debate". Sealioning can be performed by an individual or by a group acting in concert. An essay in the collection Perspectives on Harmful Speech Online, published by the Berkman Klein Center for Internet & Society at Harvard, noted: American academic philosopher Walter Sinnott-Armstrong discussed the term in his book Think Again: How to Reason and Argue, saying: Several other academics link or directly describe sealioning as a technique employed by internet trolls. In December 2020, the Merriam-Webster Online Dictionary listed the term as "Words We're Watching", being "words we are increasingly seeing in use but that have not yet met our criteria for entry": In 2021, Canadian magazine Maclean's praised the Merriam-Webster definition saying "This neologism on Merriam-Webster’s list of words to watch aptly describes the fr
https://en.wikipedia.org/wiki/Automated%20efficiency%20model
An automated efficiency model (AEM) is a mathematical model that estimates a real estate property’s efficiency (in terms of energy, commuting, etc) by using details specific to the property which are available publicly and/or housing characteristics which are aggregated over a given area such as a zip code. AEMs have some similarities to an automated valuation model (AVM) in terms of concept, advantages and disadvantages. AEMs calculate specific efficiencies such as location, water, energy or solar efficiency. The Council of Multiple Listing Services defines an AEM as, “any algorithm or scoring model that estimates the [efficiency] of a home without an on-site inspection. They are similar to Automated Valuation Models (AVMs), but are more reliant on public data such as square footage...and estimated energy usage.” Most AEMs calculate a property’s selected efficiency by analyzing available public information and may also apply proprietary data or formulas, and allow for a user such as a home owner to make additional inputs. Housing characteristics such as age of the home or square footage may be obtained by data providers such as those on this list of online real estate databases or a similar offerings. Estimates of energy usage may be available from published sources such as through the Residential Energy Consumption Survey by the Energy Information Administration. Examples of use By design, the AEM score output is provided as a preliminary comparison tool so the score of one property may be compared to other homes, against an average score for the area, etc. Primary users may vary from buyers and sellers to real estate agents and appraisers as they complete relevant comparisons. For example, REColorado, the multiple listing service covering the Denver metro area, presents a UtilityScore widget on homes for sale. Zillow publishes a Sun Number score on the home fact sheet so website visitors can compare the solar energy potential of prospective properties. Tru
https://en.wikipedia.org/wiki/Bickley%E2%80%93Naylor%20functions
In physics, engineering, and applied mathematics, the Bickley–Naylor functions are a sequence of special functions arising in formulas for thermal radiation intensities in hot enclosures. The solutions are often quite complicated unless the problem is essentially one-dimensional (such as the radiation field in a thin layer of gas between two parallel rectangular plates). These functions have practical applications in several engineering problems related to transport of thermal or neutron, radiation in systems with special symmetries (e.g. spherical or axial symmetry). W. G. Bickley was a British mathematician born in 1893. Definition The nth Bickley−Naylor function is defined by and it is classified as one of the generalized exponential integral functions. All of the functions for positive integer n are monotonously decreasing functions, because is a decreasing function and is a positive increasing function for . Properties The integral defining the function generally cannot be evaluated analytically, but can be approximated to a desired accuracy with Riemann sums or other methods, taking the limit as a → 0 in the interval of integration, [a, /2]. Alternative ways to define the function include the integral, integral forms the Bickley-Naylor function: where is the modified Bessel function of the zeroth order. Also by definition we have . Series expansions The series expansions of the first and second order Bickley functions are given by: where is the Euler constant and Recurrence relation The Bickley functions also satisfy the following recurrence relation: where . Asymptotic expansions The asymptotic expansions of Bickley functions are given as for Successive differentiation Differentiating with respect to x gives Successive differentiation yields The values of these functions for different values of the argument x were often listed in tables of special functions in the era when numerical calcu
https://en.wikipedia.org/wiki/Evolutionary%20rescue
Evolutionary rescue is a process by which a population—that would have gone extinct in the absence of evolution—persists due to natural selection acting on heritable variation. The term was first used in 1995 by Gomulkiewicz and Holt in the context of a sudden environmental change, but the process was studied long before in the context of continuous environmental change and, especially, drug resistance evolution. Theoretical framework After a sudden change in the environment, evolutionary rescue is predicted to create a U-shaped curve of population dynamics, as the original genotypes, which are unable to replace themselves, are replaced by genotypes that are able to increase in numbers. In a continuously changing environment, evolutionary rescue is predicted to appear as a stable lag of the mean trait value behind a moving environmental optimum, where the rate of evolution and rate of change in the environment are equal. The theory has been reviewed by Alexander et al in 2014 and continues to grow rapidly, adding both genetic and ecological complexity. Evolutionary rescue is distinct from demographic rescue, where a population is sustained by continuous migration from elsewhere, without the need for evolution. On the other hand, genetic rescue, where a population persists because of migration that reduces inbreeding depression, can be thought of a special case of evolutionary rescue (but see ). Empirical evidence Evolutionary rescue has been demonstrated in many different experimental evolution studies, such as yeast evolving to tolerate previously lethal salt concentrations. There are also a large number of examples of evolutionary rescue in the wild, in the forms of drug resistance, herbicide resistance, other types of pesticide resistance, and genetic rescue. References Evolutionary ecology Evolutionary biology
https://en.wikipedia.org/wiki/IPOP
IPOP (IP-Over-P2P) is an open-source user-centric software virtual network allowing end users to define and create their own virtual private networks (VPNs). IPOP virtual networks provide end-to-end tunneling of IP or Ethernet over “TinCan” links setup and managed through a control API to create various software-defined VPN overlays. History IPOP started as a research project at the University of Florida in 2006. In its first-generation design and implementation, IPOP was built atop structured P2P links managed by the C# Brunet library. In its first design, IPOP relied on Brunet’s structured P2P overlay network for peer-to-peer messaging, notifications, NAT traversal, and IP tunneling. The Brunet-based IPOP is still available as open-source code; however, IPOP’s architecture and implementation have evolved. Starting September 2013, the project has been funded by the National Science Foundation under the SI2 (Software Infrastructure for Sustained Innovation) program to enable it as open-source “scientific software element” for research in cloud computing. The second-generation design of IPOP incorporates standards (XMPP, STUN, TURN) and libraries (libjingle) that have evolved since the project’s beginning to create P2P tunnels – which we refer to as TinCan links. The current TinCan-based IPOP implementation is based on modules written in C/C++ that leverage libjingle to create TinCan links, and exposing a set of APIs to controller modules that manage the setup, creation and management of TinCan links. For enhanced modularity, the controller module runs as a separate process from the C/C++ module that implements TinCan links and communicate through a JSON-based RPC system; thus the controller can be written in other languages such as Python. See also OpenConnect, implements a TLS and DTLS-based VPN OpenSSH, which also implements a layer-2/3 "tun"-based VPN OpenVPN, SSL/TLS based user-space VPN Point-to-Point Tunneling Protocol (PPTP) Microsoft method for imp
https://en.wikipedia.org/wiki/DNADynamo
DNADynamo is a commercial DNA sequence analysis software package produced by Blue Tractor Software Ltd that runs on Microsoft Windows, Mac OS X and Linux It is used by molecular biologists to analyze DNA and Protein sequences. A free demo is available from the software developers website. Features DNADynamo is a general purpose DNA and Protein sequence analysis package that can carry out most of the functions required by a standard research molecular biology laboratory DNA and Protein Sequence viewing, editing and annotating Contig assembly and chromatogram editing including comparison to a reference sequence to identify mutations Global Sequence alignment with ClustalW and MUSCLE and editing. Select and drag Sequence alignment editing for hand made dna vs protein alignments Restriction site analysis - for viewing restriction cut sites in tables and on linear and circular maps. A Subcloning tool for the assembly of constructs using Restriction Sites or Gibson assembly, Agarose Gel simulation. Online Database searching - Search public databases at the NCBI such as Genbank and UniProt. Online BLAST searches. Protein analysis including estimation of Molecular Weight, Extinction Coefficient and pI. PCR Primer design, including an interface to Primer3 3D structure viewing via an interface to Jmol History DNADynamo has been developed since 2004 by BlueTractorSoftware Ltd, a software development company based in North Wales, UK References External links DNADynamo homepage Bioinformatics software Computational science
https://en.wikipedia.org/wiki/Asynchronous%20procedure%20call
Asynchronous procedure call is a unit of work in a computer. Usually a program works by executing a series of synchronous procedure calls on some thread. But if some data are not ready (for example, a program waits user to reply), then keeping thread in wait state is impractical, as a thread allocates considerable amount of memory for procedure stack, and this memory is not used. So such a procedure call is formed as an object with small amount of memory for input data, and this object is passed to the service which receive user inputs. When the user's reply is received, the service puts it in the object and passes that object to an execution service. Execution service consists of one or more dedicated worker threads and a queue for tasks. Each worker thread reads in a loop task queue and, when a task is retrieved, executes it. When there is no tasks, worker threads are waiting and so their memory is not used, but the number of worker threads is small enough (no sense to have more threads than there are processors on the machine). So life cycle of an asynchronous procedure call consists of 2 stages: passive stage, when it passively waits for input data, and active state, when that data is calculated in the same way as at usual procedure call. The object of the asynchronous procedure call can be reused for subsequent procedure calls with new data, received later. This allows to accumulate computed output data in that object, as it is usually done in objects, programmed with Object-oriented programming paradigm. Special care should be paid to avoid simultaneous execution of the same procedure call in order to keep computed data in consistent state. Such reusable asynchronous procedure is named Actor. Programming using Actors is described in Actor model and Dataflow programming. The difference is that Actor in the Actor model has exactly two ports: one port to receive input data, and another (hidden) port to provide serial handling of input messages, while Actor in D
https://en.wikipedia.org/wiki/Disc%20Jam
Disc Jam is a video game for the PlayStation 4, Microsoft Windows and Nintendo Switch. Developed and published by High Horse Entertainment, it was one of the PlayStation Plus free games for download for the month of March 2017. Gameplay The game combines elements of air hockey and tennis in a manner similar to the game Windjammers. However, while Windjammers is played from an overhead top-down perspective from the sidelines, Disc Jam is played from a behind the character, third-person perspective. The game feature 1 vs 1, and 2 vs 2 matches, allowing for up to four player multiplayer, either locally or online. Development and release The game was first announced in June 2016 as part of E3 2016. A demo was available to play in September 2016 at Minecon 2016. The game is being developed by High Horse Entertainment, a studio formed by two ex-Activision employees who had previously worked on developing entries in the Tony Hawk, Call of Duty, and Guitar Hero series of video games. The game received a limited beta release on February 17, 2017. On March 1, 2017, the game was announced by Sony as one of the monthly free PS Plus games for March 2017, being made available on March 7, making its release date and PS Plus availability the same date. Reception Pre-release The game's beta release was generally well received. Sammy Barker of Push Square felt that the game had the potential to be the next Rocket League in a review of the beta version, due to its smooth online gameplay and high level of player customization, though he conceded it would need more improvement with its control and presentation before it would be ready for mainstream audiences. Many other journalists favorably compared the game to Rocket League as well, noting how both titles aimed to add a sci-fi twist with emphasis on online multiplayer, to a traditional sport. Post-release Disc Jam received average reviews, with a score of 71/100 on Metacritic. References 2017 video games Fantasy sports video g
https://en.wikipedia.org/wiki/Mars%20habitability%20analogue%20environments%20on%20Earth
Mars habitability analogue environments on Earth are environments that share potentially relevant astrobiological conditions with Mars. These include sites that are analogues of potential subsurface habitats, and deep subsurface habitats. A few places on Earth, such as the hyper-arid core of the high Atacama Desert and the McMurdo Dry Valleys in Antarctica approach the dryness of current Mars surface conditions. In some parts of Antarctica, the only water available is in films of brine on salt / ice interfaces. There is life there, but it is rare, in low numbers, and often hidden below the surface of rocks (endoliths), making the life hard to detect. Indeed, these sites are used for testing sensitivity of future life detection instruments for Mars, furthering the study of astrobiology, for instance, as a location to test microbes for their ability to survive on Mars, and as a way to study how Earth life copes in conditions that resemble conditions on Mars. Other analogues duplicate some of the conditions that may occur in particular locations on Mars. These include ice caves, the icy fumaroles of Mount Erebus, hot springs, or the sulfur rich mineral deposits of the Rio Tinto region in Spain. Other analogues include regions of deep permafrost and high alpine regions with plants and microbes adapted to aridity, cold and UV radiation with similarities to Mars conditions. Precision of analogues Mars surface conditions are not reproduced anywhere on Earth, so Earth surface analogues for Mars are necessarily partial analogues. Laboratory simulations show that whenever multiple lethal factors are combined, the survival rates plummet quickly. There are no full-Mars simulations published yet that include all of the biocidal factors combined. Ionizing radiation. Curiosity rover measured levels on Mars similar to the interior of the International Space Station (ISS), which is far higher than surface Earth levels. Atmosphere. The Martian atmosphere is a near vacuum whil
https://en.wikipedia.org/wiki/Perturb-seq
Perturb-seq (also known as CRISP-seq and CROP-seq) refers to a high-throughput method of performing single cell RNA sequencing (scRNA-seq) on pooled genetic perturbation screens. Perturb-seq combines multiplexed CRISPR mediated gene inactivations with single cell RNA sequencing to assess comprehensive gene expression phenotypes for each perturbation. Inferring a gene’s function by applying genetic perturbations to knock down or knock out a gene and studying the resulting phenotype is known as reverse genetics. Perturb-seq is a reverse genetics approach that allows for the investigation of phenotypes at the level of the transcriptome, to elucidate gene functions in many cells, in a massively parallel fashion. The Perturb-seq protocol uses CRISPR technology to inactivate specific genes and DNA barcoding of each guide RNA to allow for all perturbations to be pooled together and later deconvoluted, with assignment of each phenotype to a specific guide RNA. Droplet-based microfluidics platforms (or other cell sorting and separating techniques) are used to isolate individual cells, and then scRNA-seq is performed to generate gene expression profiles for each cell. Upon completion of the protocol, bioinformatics analyses are conducted to associate each specific cell and perturbation with a transcriptomic profile that characterizes the consequences of inactivating each gene. History In the December 2016 issue of the Cell journal, two companion papers were published that each introduced and described this technique. A third paper describing a conceptually similar approach (termed CRISP-seq) was also published in the same issue. In October 2016, the CROP-seq method for single-cell CRISPR screening was presented in a preprint on bioRxiv and later published in the Nature Methods journal. While each paper shared the core principles of combining CRISPR mediated perturbation with scRNA-seq, their experimental, technological and analytical approaches differed in several aspects,
https://en.wikipedia.org/wiki/CRISPR-Display
CRISPR-Display (CRISP-Disp) is a modification of the CRISPR/Cas9 (Clustered regularly interspaced short palindromic repeats) system for genome editing. The CRISPR/Cas9 system uses a short guide RNA (sgRNA) sequence to direct a Streptococcus pyogenes Cas9 nuclease, acting as a programmable DNA binding protein, to cleave DNA at a site of interest. CRISPR-Display, in contrast, uses a nuclease deficient Cas9 (dCas9) and an engineered sgRNA with aptameric accessory RNA domains, ranging from 100bp to 5kb, outside of the normal complementary targeting sequence. The accessory RNA domains can be functional domains, such as long non-coding RNAs (lncRNAs), protein-binding motifs, or epitope tags for immunochemistry. This allows for investigation of the functionality of certain lncRNAs, and targeting of ribonucleoprotein (RNP) complexes to genomic loci. CRISPR-Display was first published in Nature Methods in July 2015, and developed by David M. Shechner, Ezgi Hacisuleyman, Scott T. Younger and John Rinn at Harvard University and Massachusetts Institute of Technology (MIT), USA. Background The CRISPR/Cas9 system is based on an adaptive immune system of prokaryotic organisms, and its use for genome editing was first proposed and developed in collaboration between Jennifer Doudna (University of California, Berkeley) and Emmanuelle Charpentier (Max Planck Institute for Infection Biology, Germany). The method, and its application in editing human cells, was published in Science on August 17, 2012. In January 2013, the Feng Zhang lab at the Broad Institute at MIT published another method in Science, having further optimized the sgRNA structure and expression for use in mammalian cells. By the beginning of 2014, almost 2500 studies mentioning CRISPR in their title has been published. Non-coding RNAs (ncRNAs) are RNA transcripts that are not translated into a protein product, but instead exert their function as RNA molecules. They are involved in a range of processes, like post-tr
https://en.wikipedia.org/wiki/Intake%20tower
An intake tower or outlet tower is a vertical tubular structure with one or more openings used for capturing water from reservoirs and conveying it further to a hydroelectric or water-treatment plant. Unlike spillways, intake towers are intended for the reservoir's regular operation, conveying clean, debris-free water for further use. Construction An intake tower is typically made from reinforced concrete, with foundations laid in the river or lake bed. It has at least one water-collecting opening at the top, and may have additional openings along its height, depending on the purpose: towers for hydroelectric plants typically have only one inlet, while those in water-processing plants have multiple draw-off inlets. Near the bottom of the tower, depending on the dam construction and plant location, a horizontal or slanted outlet conduit takes the water from the tower into the plant. The most convenient location for an intake tower is in the proximity of the processing plant. In artificial lakes, those are typically placed near the dam. Lake bed near the dam also provides sufficient water depth to ensure substantial supply to the towers throughout the year, thus the exposed towers can be regularly seen along the dams. When built near the shore, an intake tower is equipped with a service bridge, used to gain access for maintenance. Draw-off tower Draw-off towers are intake towers specialized for drinking water reservoirs. They have multiple openings at various depths, typically equipped with valves, allowing drawing water only from the level where it is of highest quality. References See also Culvert Fish screen Gatehouse (waterworks) Hydraulic engineering Hydraulic structures Dams
https://en.wikipedia.org/wiki/Nintendo%20Switch%20system%20software
The Nintendo Switch system software (also known by its codename Horizon) is an updatable firmware and operating system used by the Nintendo Switch video game console. It is based on a proprietary microkernel. The UI includes a HOME screen, consisting of the top bar, the screenshot viewer ("Album") Icons, and shortcuts to the Nintendo eShop, News, and Settings. Technology OS Nintendo has released only limited information about the Switch's internals to the public. However, computer security researchers, homebrew software developers, and the authors of emulators have all analyzed the operating system in great depth. Notable findings include that the Switch operating system is codenamed Horizon, that it is an evolution of the Nintendo 3DS system software, and that it implements a proprietary microkernel architecture. All drivers run in userspace, including the Nvidia driver which the security researchers described as "kind of similar to the Linux driver". The graphics driver features an undocumented thin API layer, called NVN, which is "kind of like Vulkan" but exposes most hardware features like OpenGL compatibility profile with Nvidia extensions. All userspace processes are sandboxed and use Address Space Layout Randomization (ASLR), a computer security technique involved in preventing exploitation of memory corruption vulnerabilities. Nintendo made efforts to design the system software to be as minimalist as possible, with the home menu's graphical assets using less than 200 kilobytes. This minimalism is meant to improve system performance and launch games faster. As early as July 2018, Nintendo has been trying to counter Switch homebrewing and piracy. Measures include an online ban, and on the hardware side, patching of the Tegra to prevent exploits. On 11 December 2018, Nintendo sued Mikel Euskaldunak for selling a Switch modification that can play pirated games. Since August 2019, the difficulty of homebrewing has gone up, as the new Mariko chip replaced th
https://en.wikipedia.org/wiki/Third-generation%20sequencing
Third-generation sequencing (also known as long-read sequencing) is a class of DNA sequencing methods currently under active development. Third generation sequencing technologies have the capability to produce substantially longer reads than second generation sequencing, also known as next-generation sequencing. Such an advantage has critical implications for both genome science and the study of biology in general. However, third generation sequencing data have much higher error rates than previous technologies, which can complicate downstream genome assembly and analysis of the resulting data. These technologies are undergoing active development and it is expected that there will be improvements to the high error rates. For applications that are more tolerant to error rates, such as structural variant calling, third generation sequencing has been found to outperform existing methods, even at a low depth of sequencing coverage. Current technologies Sequencing technologies with a different approach than second-generation platforms were first described as "third-generation" in 2008–2009. There are several companies currently at the heart of third generation sequencing technology development, namely, Pacific Biosciences, Oxford Nanopore Technology, Quantapore (CA-USA), and Stratos (WA-USA). These companies are taking fundamentally different approaches to sequencing single DNA molecules. PacBio developed the sequencing platform of single molecule real time sequencing (SMRT), based on the properties of zero-mode waveguides. Signals are in the form of fluorescent light emission from each nucleotide incorporated by a DNA polymerase bound to the bottom of the zL well. Oxford Nanopore’s technology involves passing a DNA molecule through a nanoscale pore structure and then measuring changes in electrical field surrounding the pore; while Quantapore has a different proprietary nanopore approach. Stratos Genomics spaces out the DNA bases with polymeric inserts, "Xpandome
https://en.wikipedia.org/wiki/Earliest%20known%20life%20forms
The earliest known life forms on Earth are believed to be fossilized microorganisms found in hydrothermal vent precipitates, considered to be about 3.42 billion years old. The earliest time for the origin of life on Earth is at least 3.77 billion years ago, possibly as early as 4.28 billion years ago — not long after the oceans formed 4.5 billion years ago, and after the formation of the Earth 4.54 billion years ago. The earliest direct evidence of life on Earth is from microfossils of microorganisms permineralized in 3.465-billion-year-old Australian Apex chert rocks, although the validity of these microfossils is debated. Biospheres Earth remains the only place in the universe known to harbor life. The origin of life on Earth was at least 3.77 billion years ago, possibly as early as 4.28 billion years ago. The Earth's biosphere extends down to at least below the surface, and up to at least into the atmosphere, and includes soil, hydrothermal vents, and rock. Further, the biosphere has been found to extend at least below the ice of Antarctica, and includes the deepest parts of the ocean, down to rocks kilometers below the sea floor. In July 2020, marine biologists reported that aerobic microorganisms (mainly), in "quasi-suspended animation", were found in organically-poor sediments, up to 101.5 million years old, below the seafloor in the South Pacific Gyre (SPG) ("the deadest spot in the ocean"), and could be the longest-living life forms ever found. Under certain test conditions, life forms have been observed to survive in the vacuum of outer space. More recently, in August 2020, bacteria were found to survive for three years in outer space, according to studies conducted on the International Space Station. In February 2023, findings of a "dark microbiome" of unfamiliar microorganisms in the Atacama Desert in Chile, a Mars-like region of planet Earth, were reported. The total mass of the biosphere has been estimated to be as much as 4 trillion tons of carb
https://en.wikipedia.org/wiki/Infanticide%20in%20primates
Infanticide in non-human primates occurs when an individual kills its own or another individual's dependent young. Five hypotheses have been proposed to explain infanticide in non-human primates: exploitation, resource competition, parental manipulation, sexual selection, and social pathology. Hypotheses for infanticide Exploitation Infanticide in non-human primates occurs as a result of exploitation when the individuals performing the infanticide directly benefit from consumption or use of their victim. The individual can become a resource: food (cannibalism); a protective buffer against aggression, or a prop to obtain maternal experience. The form of exploitation in non-human primates most attributable to adult females is when non-lactating females take an infant from its mother (allomothering) and forcibly retain it until starvation. This behavior is known as the "aunting to death" phenomenon; these non-lactating female primates gain mothering-like experience, yet lack the resources to feed the infant. This behaviour has been seen in captive bonobos, but not wild ones. It is not clear if it is a natural bonobo trait or the result of living in captivity. Male orangutans have not been directly observed practicing infanticide as a reproductive strategy, but recorded case of a male abducting an infant almost resulting in said infant dying from dehydration was observed. Additionally, a possible case of infanticide has been inferred, in which a mother orangutan had lost an infant and received a serious injury on her foot shortly after a new male had been introduced nearby. Although not directly observed, it is inferred this male attacked the female and killed her infant. Resource competition Resource competition results when there are too few resources in a particular area to support the existing population. In primates, resource competition is a prime motivator for infanticide. Infanticide motivated by resource competition can occur both outside of and within f
https://en.wikipedia.org/wiki/Colin%20Percival
Colin A. Percival (born 1980) is a Canadian computer scientist and computer security researcher. He completed his undergraduate education at Simon Fraser University and a doctorate at the University of Oxford. While at university he joined the FreeBSD project, and achieved some notoriety for discovering a security weakness in Intel's hyper-threading technology. Besides his work in delta compression and the introduction of memory-hard functions, he is also known for developing the Tarsnap online backup service, which became his full-time job. Education Percival began taking mathematics courses at Simon Fraser University (SFU) at age 13, as a student at Burnaby Central Secondary School. He graduated from Burnaby Central and officially enrolled at SFU in 1998. At SFU he studied number theory under Peter Borwein, and competed in the William Lowell Putnam Mathematical Competition, placing in the top 15 in 1998 and as a Putnam Fellow (in the top six) in 1999. From 1998 to 2000 he ran the PiHex project, organizing contributors from all over the world to help calculate specific bits of pi. Percival graduated from SFU in 2001 and was awarded a Commonwealth Scholarship to the University of Oxford. In Oxford, Percival set out to do research in distributed computing, building on his experience with PiHex. When a serious illness in 2003 interrupted this work for months, he turned his attention to the problem of building a software update system for the FreeBSD operating system. At the time, FreeBSD updates were distributed only as source code patches, making it difficult to keep systems updated. After a commenter on a mailing list suggested using xdelta to reduce the size of the files to be transferred, Percival began working on a more efficient delta compression algorithm. This new algorithm, called bsdiff, became the new focus of his doctoral research, and later a widely-used standard, and his freebsd-update became a part of FreeBSD. In 2004 he contributed portsnap, which u
https://en.wikipedia.org/wiki/SMiLE-Seq
Selective microfluidics-based ligand enrichment followed by sequencing (SMiLE-seq) is a technique developed for the rapid identification of DNA binding specificities and affinities of full length monomeric and dimeric transcription factors in a fast and semi-high-throughput fashion. SMiLE-seq works by loading in vitro transcribed and translated “bait” transcription factors into a microfluidic device in combination with DNA molecules. Bound transcription factor-DNA complexes are then isolated from the device, which is followed by sequencing and sequence data analysis to characterize binding motifs. Specialized software is used to determine the DNA binding properties of monomeric or dimeric transcription factors to help predict their in vivo DNA binding activity. SMiLE-seq combines three critical functions that make it unique from existing techniques: (1) The use of capillary pumps to optimize the loading of samples, (2) Trapping molecular interactions on the surface of the microfluidic device through immunocapture of target transcription factors, (3) Enabling the selection of DNA that is specifically bound to transcription factors from a pool of random DNA sequences. Background Elucidating the regulatory mechanisms used to govern essential cellular processes is one of science's most intensely studied branches. Cellular regulatory networks can be incredibly complex and often involve the coordination of multiple processes that begin with the modulation of gene expression. The binding of transcription factor molecules to DNA, either alone or in combination with other transcription factors, is used to control gene expression in response to both intra- and extracellular stimuli. Characterizing the binding mechanisms and specificities of transcription factors to specific regions of DNA – and identifying these transcription factors – is a fundamental component of the process of resolving cellular regulatory dynamics. Before the introduction of SMiLE-seq technology, C
https://en.wikipedia.org/wiki/RTL8710
The RTL8710 is a low-cost Wi-Fi chip with full TCP/IP stack and MCU (Micro Controller Unit) capability produced by Taiwanese manufacturer, Realtek. References Wireless networking hardware
https://en.wikipedia.org/wiki/Sougwen%20Chung
Sougwen Chung (鍾愫君) is a Chinese-born, Canadian-raised artist residing in London. Chung's artistic practices are based on performance, drawing, still image, sculpture, and installation. Chung's work investigates mark-made-by-machine and mark-made-by-hand for understanding the encounter of computers and humans. Early life Chung grew up in Toronto, Canada, and Hong Kong. Their father, an opera singer, made sure that his children had experience with musical instruments at a very young age, and Chung grew up playing violin and piano. Sougwen Chung moved to the United States as a teenager and received a Bachelor of Fine Arts from Indiana University before obtaining a Masters Diploma in Interactive Art from Hyper Island in Sweden. Career Chung's work has been shown at galleries and museums across the world, including EMMA (museum) in Espoo, Finland, MAMCO in Geneva, Switzerland, Vancouver Art Gallery in Canada, and Istanbul's Akbank Sanat. Chung has spoken globally at conferences including Tribeca Film Festival, New York; The Hospital Club, London; MUTEK Festival, Montreal & Mexico City; Sónar +D, Barcelona; The Art Directors Club, New York; Stockholm; SXSW, Austin; Tokyo; Internet Dargana, Barcelona: FITC; New York; OFFF, Barcelona; Gray Area Festival, San Francisco; and SIGGRAPH, Vancouver. Sougwen Chung's work has also been featured in multiple international press outlets including The New Yorker, Art F City, Artnet, Artsy, Dazed and Confused, The Creators Project, MASHABLE, EXIT Magazine, Engadget, Business Insider, Fast Company and USA Today. An example of their work is the 2017 "Drawing Operations Unit." It is an exploration into how machine learning might be applied to the drawing style of the artist's hand. The robotic arm's behavior is generated from neural nets trained on the artist's drawing gestures. In a sense, the robotic arm has learned from the visual style of the artist's previous drawings and outputs a machine interpretation during the human/robot dr
https://en.wikipedia.org/wiki/Social%20profiling
Social profiling is the process of constructing a social media user's profile using his or her social data. In general, profiling refers to the data science process of generating a person's profile with computerized algorithms and technology. There are various platforms for sharing this information with the proliferation of growing popular social networks, including but not limited to LinkedIn, Google+, Facebook and Twitter. Social profile and social data A person's social data refers to the personal data that they generate either online or offline (for more information, see social data revolution). A large amount of these data, including one's language, location and interest, is shared through social media and social network. Users join multiple social media platforms and their profiles across these platforms can be linked using different methods to obtain their interests, locations, content, and friend list. Altogether, this information can be used to construct a person's social profile. Meeting the user's satisfaction level for information collection is becoming more challenging. This is because of too much "noise" generated, which affects the process of information collection due to explosively increasing online data. Social profiling is an emerging approach to overcome the challenges faced in meeting user's demands by introducing the concept of personalized search while keeping in consideration user profiles generated using social network data. A study reviews and classifies research inferring users social profile attributes from social media data as individual and group profiling. The existing techniques along with utilized data sources, the limitations, and challenges were highlighted. The prominent approaches adopted include machine learning, ontology, and fuzzy logic. Social media data from Twitter and Facebook have been used by most of the studies to infer the social attributes of users. The literature showed that user social attributes, including age,
https://en.wikipedia.org/wiki/Plant%20arithmetic
Plant arithmetic is a form of plant cognition whereby plants appear to perform arithmetic operations – a form of number sense in plants. Arithmetic by species Venus flytrap The Venus flytrap can count to two and five in order to trap and then digest its prey. The Venus flytrap is a carnivorous plant that catches its prey with a trapping structure formed by the terminal portion of each of the plant's leaves, which is triggered by tiny hairs on their inner surfaces. When an insect or spider crawling along the leaves contacts a hair, the trap prepares to close, snapping shut only if a second contact occurs within approximately twenty seconds of the first strike. The requirement of redundant triggering in this mechanism serves as a safeguard against wasting energy by trapping objects with no nutritional value, and the plant will only begin digestion after five more stimuli to ensure it has caught a live bug worthy of consumption. The mechanism is so highly specialized that it can distinguish between living prey and non-prey stimuli, such as falling raindrops; two trigger hairs must be touched in succession within 20 seconds of each other or one hair touched twice in rapid succession, whereupon the lobes of the trap will snap shut, typically in about one-tenth of a second. Arabidopsis thaliana Arabidopsis thaliana in effect performs division to control starch use at night. Most plants accumulate starch by day, then metabolize it at a fixed rate during night time. However, if the onset of darkness is unusually early, Arabidopsis thaliana reduces its use of starch by an amount that effectively requires division. However, there are alternative explanations, such as feedback control by sensing the amount of soluble sugars left. As of 2015, open questions remain. See also References Arithmetic Arithmetic Cognitive science Ethology
https://en.wikipedia.org/wiki/Dynamic%20Roentgen%20stereophotogrammetry
Dynamic Roentgen stereophotogrammetry (also referred to as dynamic RSA) is a modern and sophisticated x-ray recording method, used to measure real-time 3D motions of prostheses and bones during motion with high accuracy. It is mostly used in orthopedic research settings and is an advancement of conventional RSA. Conventional static RSA is used to evaluate migration of prosthesis with respect to the bone in three dimensions as a function of time. Migration of the prosthesis are normal 12‐24 months after the surgery. Ongoing migration increase the risk of aseptic loosening with revision surgery as a consequence. The method has proven valuable in the evaluation of fixation for hip and knee arthroplasty, as early RSA evaluations have shown high predictive value for later aseptic component loosening. In contrast, Dynamic RSA makes it possible to accurately assess both micro movements in the fixation interface and kinematics of the prosthetic components in three dimensions, during active motions. References Prosthetics X-rays
https://en.wikipedia.org/wiki/Surface%20fairing
In mathematics, Surface fairing is an aspect of mesh smoothing. The goal of surface fairing is to compute shapes that are as smooth as possible. On an abstract level, mesh smoothing is concerned with the design and computation of smooth functions on a triangle mesh. Mesh fairing does not just slightly smooth the function in order to remove the high frequency noise. It also smooths the function as much as possible in order to obtain, e.g., an as-smooth-as-possible surface patch or an as-smooth-as-possible shape deformation. How to actually measure smoothness or fairness obviously depends on the application, but in general fair surfaces should follow the principle of simplest shape: the surface should be free of any unnecessary details or oscillations. This can be modeled by a suitable energy that penalizes unaesthetic behavior of the surface. A minimization of this fairness energy—subject to user-defined constraints—eventually yields the desired shape. Example applications include the construction of smooth blend surfaces and hole filling by smooth patches. References Geometry processing
https://en.wikipedia.org/wiki/Marine%20biogeochemical%20cycles
Marine biogeochemical cycles are biogeochemical cycles that occur within marine environments, that is, in the saltwater of seas or oceans or the brackish water of coastal estuaries. These biogeochemical cycles are the pathways chemical substances and elements move through within the marine environment. In addition, substances and elements can be imported into or exported from the marine environment. These imports and exports can occur as exchanges with the atmosphere above, the ocean floor below, or as runoff from the land. There are biogeochemical cycles for the elements calcium, carbon, hydrogen, mercury, nitrogen, oxygen, phosphorus, selenium, and sulfur; molecular cycles for water and silica; macroscopic cycles such as the rock cycle; as well as human-induced cycles for synthetic compounds such as polychlorinated biphenyl (PCB). In some cycles there are reservoirs where a substance can be stored for a long time. The cycling of these elements is interconnected. Marine organisms, and particularly marine microorganisms are crucial for the functioning of many of these cycles. The forces driving biogeochemical cycles include metabolic processes within organisms, geological processes involving the earth's mantle, as well as chemical reactions among the substances themselves, which is why these are called biogeochemical cycles. While chemical substances can be broken down and recombined, the chemical elements themselves can be neither created nor destroyed by these forces, so apart from some losses to and gains from outer space, elements are recycled or stored (sequestered) somewhere on or within the planet. Overview Energy flows directionally through ecosystems, entering as sunlight (or inorganic molecules for chemoautotrophs) and leaving as heat during the many transfers between trophic levels. However, the matter that makes up living organisms is conserved and recycled. The six most common elements associated with organic molecules—carbon, nitrogen, hydrogen, oxy
https://en.wikipedia.org/wiki/World-Information.Org
World-Information Institute (WII) is an independent cultural institution located in Vienna, Austria linking research and public discourse in the realms of innovation, digital culture technologies, and society. Its vast documentation and processing of digital media technologies sheds light on the future perspectives of global developments and involves complex and heterogeneous information resources. World-Information Institute forms part of an international network of partner institutions and experts in the fields of information and communication technologies and their social implications. WII's main fields of research are a politics of the commons (and, from this perspective: problems of intellectual property regimes), new forms of cultural production, politics of search and organization of knowledge, surveillance technologies, big data and visualization, cultural and media policies. A recent example of an activity to further develop cultural and media policies is “Netzpolitischer Konvent” (Convention of the Austrian civil society on net politics), in which a catalogue of demands was drafted and subsequently presented to the public. Projects WII's main projects include: World-Information.Org series of projects - launched Brussels 2000 World-Information.Org was launched as the main media project of the European Capital of Culture 2000 in Brussels. The social, cultural and political dimensions of the new information and communication technologies were discussed. The World-Information exhibition presented objects and research results on topics such as the history of modern communication technologies, the "big players" in the IT industry, financial networks or human rights. The program was completed by the "World-InfoCon" conference. Most resources are available on the world-information.org page. The first presentation was followed by a series of conferences and exhibitions in Vienna (Technisches Museum Wien, 2000), Amsterdam (Oude Kerk and De Balie Centre for Cul
https://en.wikipedia.org/wiki/Moving%20Earth
Moving Earth is a theoretical astroengineering concept that involves physically shifting Earth farther away from the Sun to protect the planet's biosphere from rising temperatures. These expected temperature increases derive from long-term impacts of the greenhouse effect combined with the Sun's nuclear fusion process and steadily increasing luminosity. The approach has been acknowledged by some planetary scientists, including some at Cornell University. Various mechanisms have been proposed to accomplish the move. The most plausible method involves redirecting asteroids or comets roughly about 100 km wide via gravity assists around Earth's orbit and towards Jupiter or Saturn and back. The aim of this redirection would be to gradually move Earth away from the Sun, keeping it within a continuously habitable zone. This scenario has many practical drawbacks: besides the fact that it spans timescales far longer than human history, it would also put life on Earth at risk as the repeated encounters could cause Earth to potentially lose its Moon, severely disrupting Earth's climate and rotation. Additionally, the encounters would require said asteroids or comets to pass close to Earth; a slight miscalculation could cause an impact between the asteroid or comet and Earth, potentially ending most life on the planet. See also Astronomical engineering Future of Earth Planetary engineering The Wandering EarthA film that uses this concept as its premise References Further reading Planetary engineering Survivalism
https://en.wikipedia.org/wiki/Socionature
Socionature is the idea that nature and humanity are one and the same and can be thought of or referenced as a single concept. An example of this perspective would be the difference in experience two cultures might have with a drought. One culture might view drought as a form of natural variability in the environment and store surplus food for these times. Another culture might be engaged in for profit farming and see the drought as a damaging natural crisis. The first culture would be an example of a socionature viewpoint. Definition and link to Marxist critique In the Encyclopedia of Geography, Christopher Bear explained:"Socionature is a concept that is used to argue that society and nature are inseparable and should not be analyzed in abstraction from each other. The concept is rooted in – but operates as a critique of – Marxist approaches such as historical materialism and post-structural approaches such as actor-network theory. Drawing on the former, it emphasizes temporality and processes of becoming, while its engagement with post-structural thought leads to a focus on ontological hybridity. At the heart of research on socionatures is an interest in processes of their production, and especially on the labour that is involved and the uneven power relationships that emerge." References Further reading For a Sociology of ‘Socionature’: Ontology and the Commodity-Based Approach https://onlinelibrary.wiley.com/doi/abs/10.1002/9781118786352.wbieg0212 Ecology
https://en.wikipedia.org/wiki/The%20Compatibility%20Gene
The Compatibility Gene is a 2013 book about the discovery of the mechanism of compatibility in the human immune system by the English professor of immunology, Daniel M. Davis. It describes the history of immunology with the discovery of the principle of graft rejection by Peter Medawar in the 1950s, and the way the body distinguishes self from not-self via natural killer cells. The compatibility mechanism contributes also to the success of pregnancy by helping the placenta to form, and may play a role in mate selection. Context Author Daniel M. Davis has a doctorate in physics from Strathclyde University. He was professor of molecular immunology at Imperial College London and director of research at the University of Manchester's collaborative centre for inflammation research. Davis is a recognised as an expert in the field by the Nature journal of immunology. Davis is a recognised expert for his research in the immune synapse, membrane nanotubes, and natural killer cells. Subject The book's context is the history of immunology, from the earliest questioning about why people become ill and why some may recover, to the 19th century pioneers who demonstrated that bacteria caused many diseases. In the 20th century where, slowly at first but at an accelerating pace, biologists started to build an understanding of the genetic basis of variation and natural selection, and alongside that, the foundations of scientific medicine, including immunology. As Steven Pinker observes, few stories of scientific endeavour have never been told. "This is one of them. Ostensibly about a set of genes that we all have and need, this book is really about the men and women who discovered them and worked out what they do. It’s about brilliant insights and lucky guesses; the glory of being proved right and the paralysing fear of getting it wrong; the passion for cures and the lust for Nobels. It’s a search for the essence of scientific greatness by a scientist who is headed that way hims
https://en.wikipedia.org/wiki/Bayesian%20program%20synthesis
In programming languages and machine learning, Bayesian program synthesis (BPS) is a program synthesis technique where Bayesian probabilistic programs automatically construct new Bayesian probabilistic programs. This approach stands in contrast to routine practice in probabilistic programming where human developers manually write new probabilistic programs. The framework Bayesian program synthesis (BPS) has been described as a framework related to and utilizing probabilistic programming. In BPS, probabilistic programs are generated that are themselves priors over a space of probabilistic programs. This strategy allows automatic synthesis of new programs via probabilistic inference and is achieved by the composition of modular component programs. The modularity in BPS allows inference to work on and test smaller probabilistic programs before being integrated into a larger model. This framework can be contrasted with the family of automated program synthesis fields, which include programming by example and programming by demonstration. The goal in such fields is to find the best program that satisfies some constraint. In traditional program synthesis, for instance, verification of logical constraints reduce the state space of possible programs, allowing more efficient search to find an optimal program. Bayesian program synthesis differs both in that the constraints are probabilistic and the output is itself a distribution over programs that can be further refined. Additionally, Bayesian program synthesis can be contrasted to the work on Bayesian program learning, where probabilistic program components are hand-written, pre-trained on data, and then hand assembled in order to recognize handwritten characters. See also Probabilistic programming language References External links Commentary on BPS by David Garrity: Artificial Intelligence to see Significant Progress in 2017 Probability Computer programming Probability interpretations Philosophy of mathemati
https://en.wikipedia.org/wiki/SystemSpecs
SystemSpecs is based in Lagos, Nigeria. History Systemspecs was founded in 1991 by John Obaro. It was then more like a business-to-business company selling software to organisations. SystemSpecs started as a 5-man partner agent and Value added reseller for SunSystems, an accounting package developed by Systems Union, UK, (now Infor). The indigenous company developed HumanManager, a payroll Human Resource Management and goal management software package. This was developed with object-oriented COBOL. Media reports indicate that it enjoyed wide market acceptability with over 200 organizations across Africa as at 2004. TheSOFTtribe of Ghana signed a partnership deal with SystemSpecs in 2006 to provide 'HumanManager' for the Ghanaian market. The agreement authorized TheSOFTtribe to become a Ghanaian partner of SystemSpecs for marketing, deployment and professional support of HumanManager. HumanManager went on to become "well established within the sub-regional ICT market." HumanManager was described by the Nigerian media as "Nigeria's most successful software yet" when SystemSpecs launched HumanManager 4.0 in December 2002. The solution passed "a world-class automated Quality Assurance test" in 2004. Infor FMS SunSystems and Infor PM are other SystemSpecs products. SystemSpecs recorded another major breakthrough in software development with the creation of the financial remittance software called Remita. Deelaa, a subsidiary of SystemSpecs was launched in 2022 as an e-ticketing and a marketplace for shopping, lifestyle, and travel. Deelaa e-commerce caters to both B2B and B2C sectors. The Treasury Single Account Controversy A Nigerian senator, Dino Melaye had claimed that the appointment of Remita, which he erroneously described as "an e-collection agent", was a violation of section 162 (1) of the Nigerian Constitution. He claimed that the constitution only recognised a banking institution to be the collector of government funds, and that Remita was not a bank. Th
https://en.wikipedia.org/wiki/Fluent%20%28mathematics%29
A fluent is a time-varying quantity or variable. The term was used by Isaac Newton in his early calculus to describe his form of a function. The concept was introduced by Newton in 1665 and detailed in his mathematical treatise, Method of Fluxions. Newton described any variable that changed its value as a fluent – for example, the velocity of a ball thrown in the air. The derivative of a fluent is known as a fluxion, the main focus of Newton's calculus. A fluent can be found from its corresponding fluxion through integration. See also Method of Fluxions History of calculus Leibniz–Newton calculus controversy Derivative Newton's notation Fluxion References Mathematical analysis Differential calculus History of calculus
https://en.wikipedia.org/wiki/ScienceAtHome
ScienceAtHome is a team of scientists, game developers, designers and visual artists based at Aarhus University, Denmark. ScienceAtHome does research on quantum physics, citizen science and gamification. ScienceAtHome also develops games that contribute to scientific research, and studies how humans interpret information to achieve results superior to some algorithmic approaches. Most ScienceAtHome games are casual games and require no formal scientific training. Over 150,000. people have contributed to ScienceAtHome citizen science projects by playing games. Research games are also part of a much larger movement of creating serious games that go beyond mere entertainment. The premise behind such games is that humans are better than computers at performing certain tasks, because of their intuition and superior visual processing. Video games are now being used to channel these abilities to solve problems in quantum physics. History The idea of computer players solving quantum problems came to Jacob Sherson's mind while he was doing research at Johannes Gutenberg University, Mainz, in the group of Prof. Immanuel Bloch. The first form of ScienceAtHome was announced in 2012 based on the idea that computer game players could solve quantum problems. It was then called CODER – "Pilot Center for Community-driven Research: Game Assisted Quantum Computing". CODER later grew and evolved into ScienceAtHome with the first game born in 2012 called Quantum Moves. ScienceAtHome is now part of the Center for Hybrid Intelligence situated at the Department of Management at Aarhus BSS. Publications Jacob Sherson gave a speech at TEDxAarhus 2016 called "How to become a quantum physicist in five minutes". Pinja Haikka, Postdoctoral Researcher in Theoretical Physics, also introduced ScienceAtHome at Women in Science event at Aarhus University, which was published on local television ITV OJ. ScienceAtHome has been featured in a number of journals such as PNAS and Physical Review Res
https://en.wikipedia.org/wiki/Vault%207
Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers (including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera), and the operating systems of most smartphones (including Apple's iOS and Google's Android), as well as other operating systems such as Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the C.I.A. The release of Vault 7 led the CIA to redefine WikiLeaks as a “non-state hostile intelligence service.” In July 2022 former CIA software engineer Joshua Schulte was convicted of leaking the documents to WikiLeaks. History During January and February 2017, the United States Justice Department was negotiating through Julian Assange's attorney Adam Waldman for immunity and safe passage for Assange to leave the Ecuadorian Embassy in London and to travel to the United States both to discuss risk minimization of future WikiLeaks releases including redactions and to testify that Russia was not the source for the WikiLeaks releases in 2016. In mid February 2017, Waldman, who was pro bono, asked Senator Mark Warner who was co-chairman of the United States Senate Intelligence Committee if he had any questions to ask Assange. Warner contacted FBI Director James Comey and told Waldman "stand down and end the negotiations with Assange," with which Waldman complied. However, David Laufman who was Waldman's counterpart with the Justice Department replied, "That's B.S. You're not standing down and neither am I." According to Ray McGovern on 28 March 2017, Waldman an
https://en.wikipedia.org/wiki/Planigon
In geometry, a planigon is a convex polygon that can fill the plane with only copies of itself (isotopic to the fundamental units of monohedral tessellations). In the Euclidean plane there are 3 regular planigons; equilateral triangle, squares, and regular hexagons; and 8 semiregular planigons; and 4 demiregular planigons which can tile the plane only with other planigons. All angles of a planigon are whole divisors of 360°. Tilings are made by edge-to-edge connections by perpendicular bisectors of the edges of the original uniform lattice, or centroids along common edges (they coincide). Tilings made from planigons can be seen as dual tilings to the regular, semiregular, and demiregular tilings of the plane by regular polygons. History In the 1987 book, Tilings and Patterns, Branko Grünbaum calls the vertex-uniform tilings Archimedean in parallel to the Archimedean solids. Their dual tilings are called Laves tilings in honor of crystallographer Fritz Laves. They're also called Shubnikov–Laves tilings after Shubnikov, Alekseĭ Vasilʹevich. John Conway calls the uniform duals Catalan tilings, in parallel to the Catalan solid polyhedra. The Laves tilings have vertices at the centers of the regular polygons, and edges connecting centers of regular polygons that share an edge. The tiles of the Laves tilings are called planigons. This includes the 3 regular tiles (triangle, square and hexagon) and 8 irregular ones. Each vertex has edges evenly spaced around it. Three dimensional analogues of the planigons are called stereohedrons. These tilings are listed by their face configuration, the number of faces at each vertex of a face. For example V4.8.8 (or V4.82) means isosceles triangle tiles with one corner with four triangles, and two corners containing eight triangles. Construction The Conway operation of dual interchanges faces and vertices. In Archimedean solids and k-uniform tilings alike, the new vertex coincides with the center of each regular face, or the centr
https://en.wikipedia.org/wiki/Head%20III
Head III is an oil painting by Francis Bacon, one of series of works made in 1949 for his first one-man exhibition at the Hanover Gallery, in London. As with the other six paintings in the series, it focuses on the disembodied head of male figure, who looks out with a penetrating gaze, but is fixed against an isolating, flat, nondescript background, while also enfolded by hazy horizontal foreground curtain-like folds which seems to function like a surrounding cage. Head III was first exhibited in November 1949 at the Hanover in a showing commissioned by one of the artist's early champions, Erica Brausen. The six head paintings were painted during a short period of time, when Bacon was under pressure to provide works for the Hanover exhibition. Of the series, Head I, Head II, and Head VI are today seen as artistically successful, with Head VI as ground breaking, and a direct precursor to Bacon's seminal 1950s many representations of Popes. Head III is important in the development in that it is the first of the series in which Bacon masters the effect of the horizontal folds, and the ambiguous facial expression of the subject nears that of his Diego Velázquez's Portrait of Innocent X; his primary source for these paintings. The painting is in a private collection, having been sold at auction at Sotheby's in 2013 for £10,442,500. Description The painting measures . Perhaps a portrait of Bacon's lover Eric Hall, the grisaille work depicts a bald man's head with pock-marked discolored off-white face, partially concealed by diaphanous curtains. The face has an enigmatic expression, with his cold eyes - emphasised by bright marks of zinc white - looking out through broken pince-nez spectacles. This is the first occasion when the motif of broken glasses appears in Bacon's work, inspired by the image of an injured nurse in the 1925 film Battleship Potemkin. The open-mouthed scream of the nurse in the film would also become a theme of Bacon's work, including Head VI,
https://en.wikipedia.org/wiki/Head%20V
Head V is a 1949 painting by Irish-born British artist Francis Bacon, one of series of works made in 1949 for his first one-man exhibition at the Hanover Gallery, in London. It measures and is held in a private collection. The painting is part of a series of six works from the late 1940s depicting heads. Like Head II, the work depicts a distorted head in a space in a space shrouded with vertical bands interpreted as curtains, with several safety pins in the curtains. Bacon's six Head paintings were first exhibited at the Hanover Gallery in 1949, alongside four other important early works by Bacon: Three Studies for Figures at the Base of a Crucifixion, Figure in a landscape, Study from the Human Body (also known as Study for Figure) and Study for Portrait (also known as Man in a Blue Box). It has been described as one of the most elusive images produced by Bacon and also as the most abstract or indistinct picture of the series. It has not been exhibited since 1958, and was owned by a private collector in Switzerland in 1964. References Sources Dawson, Barbara; Sylvester, David. Francis Bacon in Dublin. London: Thames & Hudson, 2000. Farr, Dennis; Peppiatt, Michael; Yard, Sally. Francis Bacon: A Retrospective. NY: Harry N Abrams, 1999. Peppiatt, Michael. Anatomy of an Enigma. London: Westview Press, 1996. Russell, John. Francis Bacon (World of Art). NY: Norton, 1971. External links Head V (1949), francis-bacon.com Head V, 1949, Artimage Wyndham Lewis and Francis Bacon, Jan Cox 1949 paintings Paintings by Francis Bacon Heads in the arts
https://en.wikipedia.org/wiki/OpenXR
OpenXR is an open-source, royalty-free standard for access to virtual reality and augmented reality platforms and devices. It is developed by a working group managed by the Khronos Group consortium. OpenXR was announced by the Khronos Group on February 27, 2017, during GDC 2017. A provisional version of the standard was released on March 18, 2019, to enable developers and implementers to provide feedback on it. On July 29, 2019, OpenXR 1.0 was released to the public by Khronos Group at SIGGRAPH 2019. Reviewers of the 0.90 provisional release considered that the aim of OpenXR was to "Solve AR/VR Fragmentation". Architecture The standard provides an API aimed for application developers targeting virtual reality or augmented reality hardware. This enables developers to build applications that will work across a wide variety of devices. The fundamental elements of this API are: XrSpace: a representation of the 3D space XrInstance: a representation of the OpenXR runtime System and XrSystemId: a representation of the devices, including the Virtual reality or Augmented reality devices and controllers XrActions: used to handle user inputs XrSession: represents the interaction session between the application and the user Implementations The Khronos Group maintains the list of OpenXR-conformant platforms and products. Currently conformant OpenXR platforms are: Microsoft HoloLens 2 and the Windows Mixed Reality headsets Meta's PC platform and its Quest line of devices, with full support OpenXR 1.0 added in July 2021 Collabora Monado Runtime for GNU/Linux, with the release of version 21.0.0 in February 2021 Valve SteamVR, since version 1.16 in February 2021 HTC VIVE Cosmos and VIVE Focus 3, part of HTC's VIVERSE ecosystem Qualcomm Snapdragon Spaces XR Developer Platform Preview and early development releases of OpenXR are available for the following platforms: Varjo PC platform, with a first release in July 2019 Game and rendering engine support Su
https://en.wikipedia.org/wiki/Initial%20coin%20offering
An initial coin offering (ICO) or initial currency offering is a type of funding using cryptocurrencies. It is often a form of crowdfunding, although a private ICO which does not seek public investment is also possible. In an ICO, a quantity of cryptocurrency is sold in the form of "tokens" ("coins") to speculators or investors, in exchange for legal tender or other (generally established and more stable) cryptocurrencies such as Bitcoin or Ether. The tokens are promoted as future functional units of currency if or when the ICO's funding goal is met and the project successfully launches. An ICO can be a source of capital for startup companies. ICOs can allow startups to avoid regulations that prevent them from seeking investment directly from the public, and intermediaries such as venture capitalists, banks, and stock exchanges, which may demand greater scrutiny and some percentage of future profits or joint ownership. ICOs may fall outside existing regulations, depending on the nature of the project, or be banned altogether in some jurisdictions, such as China and South Korea. Due to the lack of regulation and enforcement of securities law, ICOs have been the vehicle for scams and fraud. Fewer than half of all ICOs survive four months after the offering, while almost half of ICOs sold in 2017 failed by February 2018. Despite their record of failure and the falling prices of cryptocurrencies, a record $7 billion was raised via ICO from January–June 2018. History The first token sale (also known as an ICO) was held by Mastercoin in July 2013. Ethereum raised money with a token sale in 2014, raising around 31,000 BTC in July, equal to approximately $18.3 million at the time. ICOs and token sales became popular in 2017. There were at least 18 websites tracking ICOs before mid-year. In May, the ICO for a new web browser called Brave generated about $35 million in under 30 seconds. Messaging app developer Kik's September 2017 ICO raised nearly $100 million. At the s
https://en.wikipedia.org/wiki/Ormdl%20sphingolipid%20biosynthesis%20regulator%203
ORMDL sphingolipid biosynthesis regulator 3 is a protein that in humans is encoded by the ORMDL3 gene. This gene is associated with asthma in childhood. Transgenic mice which overexpress human ORMDL3 have increased levels of IgE. This correlated with increased numbers of macrophages, neutrophils, eosinophils, CD4+ and enhanced Th2 cytokine levels in the lung tissue. Localisation Mouse and human ORMDL3 gene encode 153 aa. ORMDL family consists of three members (ORMDL1-3) which are localised in the membrane of endoplasmic reticulum (ER). Human ORMDL1, ORMDL2 and ORMDL3 are localised in chromosomes 2q32, 12q13.2 a 17q21. Function ORMDL3 plays role in sphingolipid synthesis like negative regulators. It also has a role in regulation of Ca2+ levels in the endoplasmic reticulum. ER is very important for generation, signalisation, functioning and store of intracellular Ca2+. There are channels, which control the exit of Ca2+ from the ER into the cytoplasm and also pumps (sarco-endoplasmic reticulum Ca2+ ATPase (SERCA)) which return Ca2+ back to the ER. Dysregulation of Ca2+ has the key role in several pathological conditions like dysfunction of SERCA, asthma, and Alzheimer's. Clinical significance Mutations in ORMDL3 are associated with inflammatory disease like Crohn's disease, type 1 diabetes, and rheumatoid arthritis. References Further reading Immunology Inflammations Protein families
https://en.wikipedia.org/wiki/Vertical%20Offshore%20Reference%20Frames
Vertical Offshore Reference Frames (VORF) is a set of high resolution surface models, published and maintained by the UK Hydrographic Office, which together define a vertical datum for hydrographic surveying and charting in the United Kingdom and Ireland. Tidal surface models The following tidal and sea level surfaces are included: Chart Datum (CD) Lowest Astronomical Tide (LAT) Mean Sea Level (MSL) Mean Low Water Springs (MLWS) Mean High Water Springs (MHWS) Highest Astronomical Tide (HAT) Land datums including Ordnance Datums Newlyn, Belfast and Poolbeg The surfaces are modelled with respect to the terrestrial reference frame used for satellite navigation (GNSS) positioning, ETRS89. Thus VORF directly permits the use of high precision GNSS in hydrographic survey, and also allows the capability of transforming vertical data between the different datums. The UK Maritime & Coastguard Agency requires the use of VORF for tidal reductions as part of its civil hydrography programme. Files A main product of the VORF project was the gridded vertical correction files which deliver the capability to transfer heights and depths from one vertical reference system to another, "allowing the direct use of depth data from surveys which is referred to a WGS84 compatible datum rather than Chart Datum and thus enabling Hydrographic surveyors to survey without the need to measure tides". This is accomplished via a set of files, each file containing a grid of height corrections to apply to GNSS-derived heights to translate them to one of several VORF models. There is higher resolution in estuaries and inlets, but for most of the areas covered, there is a single height correction for each roughly 900 by 500 metre rectangle. VORF correction files are purchased from the same source as Admiralty charts. Format The Admiralty provides VORF data in the form of ".vrf" files, each of which contains data representing the separation between a given pair of datums. The filename in
https://en.wikipedia.org/wiki/Hazard%20elimination
Hazard elimination is a hazard control strategy based on completely removing a material or process causing a hazard. Elimination is the most effective of the five members of the hierarchy of hazard controls in protecting workers, and where possible should be implemented before all other control methods. Many jurisdictions require that an employer eliminate hazards if it is possible, before considering other types of hazard control. Elimination is most effective early in the design process, when it may be inexpensive and simple to implement. It is more difficult to implement for an existing process, when major changes in equipment and procedures may be required. Elimination can fail as a strategy if the hazardous process or material is reintroduced at a later stage in the design or production phases. The complete elimination of hazards is a major component to the philosophy of Prevention through Design, which promotes the practice of eliminating hazards at the earliest design stages of a project. Complete elimination of a hazard is often the most difficult control to achieve, but addressing it at the start of a project allows designers and planners to make large changes much more easily without the need to retrofit or redo work. Typical examples Removing the use of a hazardous chemical is an example of elimination. Some substances are difficult or impossible to eliminate because they have unique properties necessary to the process, but it may be possible to instead substitute less hazardous versions of the substance. Elimination also applies to equipment as well. For example, noisy equipment can be removed from a room used for other purposes, or an unnecessary blade can be removed from a machine. Prompt repair of damaged equipment eliminates hazards stemming from their malfunction. Elimination also applies to processes. For example, the risk of falls can be eliminated by eliminating the process of working in a high area, by using extending tools from the
https://en.wikipedia.org/wiki/Annulate%20lamella
Annulate lamella is one of the cell membrane classes, occurring as a set of parallel elements with double-walled membranes in the same plane/dimension, just as the nuclear envelope. These lamella have pore complexes which are identical to those of the nuclear envelope. It is arranged in a highly ordered structure with regular spacing between themselves. These lamella are characteristics of the oocytes, spermatocytes, some somatic and cancer cells. They are characteristic of actively growing cells, including many functions in genetic information transfer and storage. They are probably formed from the nuclear envelope. Similar membranes are found in both the cytoplasm and nucleoplasm. In the nucleoplasm, they are small, irregular, and short-lived. It has been established that in some conditions ribosomes are directly connected to the annulate lamellar membrane, supposing a role in the process of protein synthesis. See also Cell membranes Nuclear envelope References Cytogenetics Cell biology
https://en.wikipedia.org/wiki/Ou%20Xiaobai
Ou Xiaobai (; born ) is the Chinese designer of the mobile app iHomo, which connects homosexuals with someone of the opposite sex for the purpose of having a heterosexual marriage (). Biography Ou lived in Beijing with her long-term female partner. Due to increasing pressure from her family, she married a man in 2012. Her husband is also homosexual and has a long-term male partner. During the wedding, Ou's girlfriend acted as her bridesmaid. An advantage to her marriage is that Ou's mother is reassured Ou will be looked after when her mother dies. In addition, Ou's husband is no longer bothered by his colleagues to date women. The couple visit their parents as a married pair during festivals, but the rest of the time Ou lives with her girlfriend and her husband lives with his boyfriend. iHomo iHomo began as a service that Ou ran through social media to help homosexual friends experiencing parental and social pressure to meet others for marriages of convenience. Ou reportedly organised over 80 events and assisted in making 100 marriages of convenience. In December 2015, Ou released a beta version of an iHomo mobile application, designed to allow gay and lesbian users to find each other for marriages of convenience. Beyond matchmaking, the app was designed to provide information on LGBT cafes, shops and restaurants in China, where marriage between people of the same sex is not recognised. Criticisms Ou has pointed out that, for some people, a marriage of convenience can cause more problems than it solves, particularly if the individual's parents live in the same city. In addition, Chinese couples often face pressure from parents to have children soon after marriage. In the event that the couple of convenience has a child, by IVF or other methods, then the question of which couple raises the child and in which house becomes problematic. Awards 100 Women (BBC) - 2016. References Living people Chinese computer businesspeople Chinese activists Chinese women activis
https://en.wikipedia.org/wiki/United%20States%20Armed%20Forces%20nude%20photo%20scandal
In March 2017, a nude photo scandal in the United States Armed Forces was uncovered after it was reported by the Center for Investigative Reporting and The War Horse. In early reporting, it was believed that the scandal was contained to only the Marine Corps, but was subsequently revealed to involve the rest of the military. Incident In a closed Facebook group called "Marines United," which consisted of 30,000 active duty and retired members of the United States Armed Forces and British Royal Marines, hundreds of photos of female servicemembers from every branch of the military were distributed. The page included links to Dropbox and Google Drive with even more images. After the Facebook group was shut down, members of the original group were redirected to other groups. In a post on the original group page, a member wrote, "It would be hilarious if one of these FBI or (Naval Criminal Investigative Service) fucks found their wife on here." In one instance, a group called "Marines United 2" was created and had 3,000 members. In the MU2 group, a user identified as Garret Bailey wrote, "If you add the fuck that snitches… I will blast you on every goddamn page from here to fucking the sandbox and back. Understand this: I will not accept a request until I can see that the person has served. If they haven’t, DON’T FUCKING ADD THEM!!! If you see someone and know they are a fucking snitch, let an admin know. This shit should have never made it to the national fucking news." Investigation The Naval Criminal Investigative Service launched an investigation into the incident. Reactions US Department of Defense Jim Mattis, the Secretary of Defense, said, "The purported actions of civilian and military personnel on social media websites, including some associated with the Marines United group and possibly others, represent egregious violations of the fundamental values we uphold at the Department of Defense." Robert Neller, the Commandant of the Marine Corps, said, "For any
https://en.wikipedia.org/wiki/Cytosolic%20ciliogenesis
Cytosolic ciliogenesis, otherwise cytoplasmic ciliogenesis, is a type of ciliogenesis where the cilium axoneme is formed in the cytoplasm or becomes exposed to the cytoplasm. Cytosolic ciliogenesis is divided into three types: Primary cytosolic cilia are formed by exposing the axoneme of compartmentalized cilium (formed initially by compartmentalized ciliogenesis) to the cytoplasm. This type of cilia is found in the sperm of human and other mammals. Secondary cytosolic cilia are formed in parallels to the formation of the typical compartmentalized cilium. One end of the axoneme is exposed to the cytoplasm as the other end of the axoneme is formed as compartmentalized cilia. This type of cilia is found in insects. Tertiary cytosolic cilia are axonemes that form directly in the cytoplasm. This type of cilia is found in Plasmodium (the malaria parasite). History The term Cytosolic Ciliogenesis was coined in 2004 as part of a study that identified a large set of ciliogenesis genes. It was found that a subset of genes that are thought to be essential for compartmentalized cilia are not essential to form the sperm flagellum. Since the axoneme of this flagellum was exposed to the cytoplasm it was named Cytosolic Ciliogenesis. References Cell biology Organelles
https://en.wikipedia.org/wiki/Compartmentalized%20ciliogenesis
Compartmentalized ciliogenesis is the most common type of ciliogenesis where the cilium axoneme is formed separated from the cytoplasm by the ciliary membrane and a ciliary gate known as the transition zone. References Cell biology
https://en.wikipedia.org/wiki/Ferdinand%20Voegele
Ferdinand Voegele (born 12 February 1896 in Hollfeld, Kingdom of Bavaria; died after 1946) was a German philologist and linguistic cryptanalyst, before and during the time of World War II and who would eventually lead the cipher bureau of the Luftwaffe Signal Intelligence Service (German: Oberbefehlshaber der Luftwaffe). Life During World War I he served as a volunteer. Later he studied oriental languages at various German universities, finally specializing in Philology. Using his language skills, he started work in an export business. Eventually moving abroad for several years, but returned in the summer of 1935, when he was offered a position as an interpreter with the German Air Ministry. Military Work Between July and September 1935, he undertook training near Kladow, near Berlin in Morse Telegraphy (Wireless telegraphy), German cryptographic procedures and radio communications. In October 1935, he posted to a fixed intercept station of the Army at Stuttgart until January 1936. During his time there, he translated plain-language radio messages from French Army and Air Force. In addition, he was employed on evaluation and traffic analysis. Between March and April 1936, he was ordered to a two-month maneuver employed as an airborne radio operators with KG254 in Kitzingen. His grade during this time was Officer candidate. First Success From May to October 15 he succeeded in breaking the recipherment used in conjunction with a French 3 digit code, the basis of which had already been largely reconstructed. After the start of the Spanish Civil War he solved many 4-alphabetic Substitution ciphers. On 15 October, Voegele was transferred to a new Luftwaffe Intercept Station (Codename:W-15) (Stadelheim Transmitter) close to Munich, where he translated French, Italian and Yugoslavia intercepts. Chi-Stelle On 1 January 1937, he was assigned to the newly created cipher bureau (German: Chi-Stelle) within Referat K and made Chief of all cryptanalytic work (Cryptanalysis)
https://en.wikipedia.org/wiki/Synchro-Cin%C3%A9
The Synchro-Ciné was a device, invented by the French inventor Charles Delacommune in 1921, pioneer in the objective of synchronizing the projection of a film with the corresponding sounds. The sounds to be synchronized could be from the words of a narrator, the reading of a score by an orchestra conductor (or by a musician soloist), or shooting up devices with noises-effects;. But always by mechanical procedures, and with live sound by interpreters in the room (it was still a decade away for sound cinema). By assimilation, it was also known as Ciné-pupitre, its most popular and well-known device in many countries. But in reality, under the same name are called, over time, three different things: A) Firstly, the original synchronized reading desk, from 1921, the so-called ciné-pupitre, an isolated device for reading texts or music, for a single user (although this may be a soloist or an orchestra conductor who, since reading it, controls the complete template of instrumentalists) adjusted by an engine in synchronization with the projected images of the films. B) Soon after, in 1922-23, the synchro-ciné, expanding the connection possibilities of its central distributor, already became a complete synchronization system, in which the reading desk is only one of the many elements around the central element, the control band, circulating in the distributor gear, and which can automatically trigger various 'noise' devices (Ciné-bruiteurs) or 'noise-makers' (some designed by Delacommune himself and incorporated into the system in the patent), shoot piano players, gramophones, and various desks that are needed, up to a maximum of, it seems, 9 devices. The proof of the change of orientation in the machinery and final objectives is the fact that, although the reading desks remain a regular part of the system; however it is already perfectly possible to perform a performance without using at all (only with the capacity of the central distributor, and the connected noises de
https://en.wikipedia.org/wiki/Everipedia
Everipedia () is a defunct blockchain-based online encyclopedia. Everipedia was founded in 2014 and was officially launched in 2015, as a fork of Wikipedia. Larry Sanger (who co-founded Wikipedia) joined the company in 2017. In 2022, Everipedia was inactivated, becoming a static archive and redirecting to a new crypto-only encyclopedia, IQ.Wiki. The company was initially headquartered in Westwood, Los Angeles but has since relocated to Santa Monica, California. The site depicts itself as "The World's Largest Blockchain & Crypto Encyclopedia" and formerly as "everyone's encyclopedia". History Everipedia (2014–2022) Everipedia, a portmantaeu of "Everyone's Encyclopedia", began in December 2014 as a small project of Sam Kazemian and Theodor Forselius in Kazemian's college dormitory room at University of California, Los Angeles (UCLA). The encyclopedia launched in January 2015 as a fork of Wikipedia. Travis Moore joined the company as a co-founder in the winter of 2015 and Mahbod Moghadam joined as a co-founder in July 2015. The company raised capital and received funding from angel investors. In July 2015, the company got its first seed funding from Mucker Capital and raised close to $130,000 from 201 investors on Wefunder. In October 2015, George Beall was introduced to Everipedia at a presentation in California State University, San Bernardino. After selling his technology start-up Touch Tiles in January 2016, Beall joined the group of co-founders. In 2016, the site generated most of its revenue from advertisements. The company aims to generate income through ways apart from donations or banners. In January 2017, they had eight full-time workers including two developers. By February 2018, headcount had increased to 15 full-time workers. , they raised $700,000 from angel investors. It was announced on February 8, 2018, that the company raised $30 million in funding headed by Galaxy Digital's EOS.io Ecosystem Fund. In December 2017, Everipedia announced that co-
https://en.wikipedia.org/wiki/Ply%20%28layer%29
A ply is a layer of material which has been combined with other layers in order to provide strength. The number of layers is indicated by prefixing a number, for example 4-ply, indicating material composed of 4 layers. Etymology The word "ply" derives from the French verb plier, "to fold", from the Latin verb plico, from the ancient Greek verb πλέκω. Examples Yarn, where plying is a spinning technique to combine several fibres. Vehicle tires Plywood Toilet paper References Structural analysis Structural engineering
https://en.wikipedia.org/wiki/United%20Nations%20Declaration%20on%20Human%20Cloning
The United Nations Declaration on Human Cloning was a nonbinding statement against all forms of human cloning approved by a divided UN General Assembly. The vote came in March 2005, after four years of debate and an end to attempts for an international ban. In the 191-nation assembly, there were 84 votes in favor of a nonbinding statement, 34 against and 37 abstentions. Proposed by Honduras, the statement was largely supported by Roman Catholic countries and opposed by countries with active embryonic stem cell research programs. Many Islamic nations abstained. The UN Declaration on Human Cloning, as it is named, calls for all member states to adopt a ban on human cloning, which it says is "incompatible with human dignity and the protection of human life." The US, which has long pushed for a complete ban, voted in favor of the statement while traditional ally Britain, where therapeutic cloning is legal and regulated, voted against it. The statement should have no impact on countries that allow therapeutic cloning, such as Britain and South Korea, as it is not legally binding. "The foes of therapeutic cloning are trying to portray this as a victory for their ideology," Bernard Siegel, a Florida attorney who lobbies to defend therapeutic cloning, said in a Reuters report. "But this confusing declaration is an effort to mask their failure last November to impose a treaty on the world banning therapeutic cloning." References This article contains quotations from Wikisource, which is available under the Creative Commons Attribution 2.5 Generic (CC BY 2.5) license. External links Cloning United Nations documents United Nations reports United Nations resolutions
https://en.wikipedia.org/wiki/List%20of%20video%20games%20that%20support%20cross-platform%20play
Cross-platform play is the ability to allow different gaming platforms to share the same online servers in a game, allowing players to join regardless of the platform they own. Since the Dreamcast and PlayStation 2, there have been online video games that support cross-play. Listed here is an incomplete list of games that support cross-play with their consoles, computers, mobile, and handheld game consoles note when using. Games which currently support cross-platform play Discontinued See also Lists of video games References Cross-platform play Cross-platform play
https://en.wikipedia.org/wiki/Software%20testing%20tactics
This article discusses a set of tactics useful in software testing. It is intended as a comprehensive list of tactical approaches to Software Quality Assurance (more widely colloquially known as Quality Assurance (traditionally called by the acronym "QA") and general application of the test method (usually just called "testing" or sometimes "developer testing"). Installation testing An installation test assures that the system is installed correctly and working at actual customer's hardware. The box approach Software testing methods are traditionally divided into white- and black-box testing. These two approaches are used to describe the point of view that a test engineer takes when designing test cases. White-box testing White-box testing (also known as clear box testing, glass box testing, transparent box testing and structural testing, by seeing the source code) tests internal structures or workings of a program, as opposed to the functionality exposed to the end-user. In white-box testing an internal perspective of the system, as well as programming skills, are used to design test cases. The tester chooses inputs to exercise paths through the code and determine the appropriate outputs. This is analogous to testing nodes in a circuit, e.g. in-circuit testing (ICT). While white-box testing can be applied at the unit, integration and system levels of the software testing process, it is usually done at the unit level. It can test paths within a unit, paths between units during integration, and between subsystems during a system–level test. Though this method of test design can uncover many errors or problems, it might not detect unimplemented parts of the specification or missing requirements. Techniques used in white-box testing include: API testing – testing of the application using public and private APIs (application programming interfaces) Code coverage – creating tests to satisfy some criteria of code coverage (e.g., the test designer can create tes
https://en.wikipedia.org/wiki/Corticocortical%20coherence
Corticocortical coherence is referred to the synchrony in the neural activity of different cortical brain areas. The neural activities are picked up by electrophysiological recordings from the brain (e.g. EEG, MEG, ECoG, etc.). It is a method to study the brain's neural communication and function at rest or during functional tasks. History and basics Initial applications of spectral analysis for finding the relationship between the EEG recordings from different regions of scalp dates back to 1960's. Corticocortical coherence has since been extensively studied using EEG and MEG recording for potential diagnostic applications and beyond. The exact origins of corticocortical coherence are under active investigation. While the consensus suggests that the functional neural communication between distinct brain sources leads to synchronous activity in those regions (possibly connected by neural tracts, in either direct or indirect way), an alternative explanation emphasises on single focal oscillations that occur at single brain sources that eventually appear connected or synchronous in different scalp or brain source regions. Corticocortical coherence has been of special interest in delta, theta, alpha, beta and gamma frequency bands (commonly used for EEG studies). Methods, mathematics and statistics Cortico-cortical coherence is commonly studied using bipolar channels of EEG recordings, as well as unipolar channels of EEG or MEG signals; however, unipolar channels are usually used to estimate the brain sources and their connectivity, using electrical source imaging and connectivity analysis. A classic and commonly used approach to assess the synchrony between neural signals is to use Coherence. Statistical significance of coherence is found as function of number of data segments with assumption of the signals' normal distribution. Alternatively non-parametric techniques such as bootstrapping can be used. See also Intermuscular coherence Corticomuscular coher
https://en.wikipedia.org/wiki/GLAD-PCR%20assay
Glal hydrolysis and Ligation Adapter Dependent PCR assay (GLAD-PCR assay) is the novel method to determine R(5mC)GY sites produced in the course of de novo DNA methylation with DNMTЗA and DNMTЗB DNA methyltransferases. GLAD-PCR assay do not require bisulfite treatment of the DNA. Method was specially designed to determine methylation of RCGY site of interest in human and mammalian genomes in excess of corresponding unmethylated sites. This is a typical situation for DNA preparations from clinical samples of blood and tissues. GLAD-PCR assay is based on the new type of enzymes - site-specific methyl-directed DNA-endonucleases (MD DNA endonucleases). These enzymes are very similar to restriction enzymes in biochemical properties and cleave DNA completely, but act in opposite way: they cleave only methylated DNA and do not cleave unmethylated DNA at all. Mammalian DNA-methyltransferases DNMT1, DNMT3a and DNMT3b catalyze a reaction of DNA methylation. DNMT1 maintains DNA methylation pattern in vivo modifying a new strand after replication. DNMT3a and DNMT3b are responsible for DNA methylation de novo including abnormal hypermethylation in cancer cells. It is well known that hypermethylation of CpG-islands in regulatory regions of promoter and/or first exon in a variety of genes often occurs at early stages of sporadic carcinogenesis. This leads to downregulation of the genes expression in tumor cells, whereas in a healthy tissue the corresponding genes remain to be active. Thus, the detection of such epigenetic biomarkers is one of the most promising diagnostic and prognostic tools Study of DNMT3a and DNMT3b substrate specificity has shown that both enzymes predominantly recognize RCGY site and modify internal CG-dinucleotide to form 5’-R(5mC)GY-3’/3’-YG(5mC) R-5’ sequence. One of new enzymes GlaI recognizes and cleaves site R(5mC)GY. Due to this unique substrate specificity, GlaI is a convenient tool for identification of de novo methylated sites in the human and m
https://en.wikipedia.org/wiki/Price%20of%20anarchy%20in%20auctions
The Price of Anarchy (PoA) is a concept in game theory and mechanism design that measures how the social welfare of a system degrades due to selfish behavior of its agents. It has been studied extensively in various contexts, particularly in auctions. In an auction, there are one or more items and one or more agents with different valuations for the items. The items have to be divided among the agents. It is desired that the social welfare - the sum of values of all agents - be as high as possible. One approach to maximizing the social welfare is designing a truthful mechanism. In such a mechanism, each agent is incentivized to report his true valuations to the items. Then, the auctioneer can calculate and implement an allocation that maximizes the sum of values. An example to such a mechanism is the VCG auction. In practice, however, it is not always feasible to use truthful mechanisms. The VCG mechanism, for example, might be too complicated for the participants to understand, might take too long for the auctioneer to compute, and might have other disadvantages. In practice, non-truthful mechanisms are often used, and it is interesting to calculate how much social welfare is lost by this non-truthfulness. It is often assumed that, in a non-truthful auction, the participants play an equilibrium strategy, such as a Nash equilibrium. The price-of-anarchy of the auction is defined as the ratio between the optimal social welfare and the social welfare in the worst equilibrium: A related notion is the Price of Stability (PoS) which measures the ratio between the optimal social welfare and the social welfare in the best equilibrium: Obviously . When there is complete information (each agent knows the valuations of all other agents), the common equilibrium type is Nash equilibrium - either pure or mixed. When there is incomplete information, the common equilibrium type is Bayes-Nash equilibrium. In the latter case, it is common to speak of the Bayesian price of
https://en.wikipedia.org/wiki/Weed%20science
Weed science is a scientific discipline concerned with plants that may be considered weeds, their effects on human activities, and their management "a branch of applied ecology that attempts to modify the environment against natural evolutionary trends.". History Weeds have existed since humans began settled agriculture have existed since the advent of settled agriculture around 10,000 years ago it has been suggested that the most common characteristic of the ancestors of our presently dominant crop plants is their willingness—their tendency to be successful, to thrive, in disturbed habitats, mostly those around human dwellings. Farmers have likely always been aware of weeds in their crops, although the evidence for their awareness and concern is nearly all anecdotal. Unlike other agricultural sciences like entomology or plant pathology, the emergence of weed science is comparatively recent, occurring largely within the 20th century and coinciding with the development of herbicides. Weeds are controlled in much of the world by hand (roguing) or with crude hoes. The size of a farmer's holding and yield per unit area are limited by several things and paramount among them is the rapidity with which a family can weed its crops. More human labor may be expended to weed crops than on any other single human enterprise, and most of that labor is expended by women. Weed control in the Western world and other developed areas of the world is done by sophisticated machines and by substituting chemical energy (herbicides) for mechanical and human energy. There is a relationship between the way farmers control weeds and the ability of a nation to feed its people. Successful weed management is one of the essential ingredients to maintain and increase food production. In 1923, Clark and Fletcher suggested that the "annual losses due to the occurrence of pernicious weeds on farm land in Canada, although acknowledged in a general way, are far greater than is realized." They
https://en.wikipedia.org/wiki/Floristic%20diversity
Floristic diversity is variety in the genome of flowering plants, as well as variety at the species and ecosystem level. Floristic diversity covers how many varieties of plant species in a specific area there are. There are multiple factors that contribute to floristic diversity, including both biotic (living) and abiotic (not living) elements. Elements that alter floristic diversity include climate, weather, soil, and animals. Floristic diversity allows different regions to analyze the environment and the evolution of the area. The genome of plants can be different based on size, number of chromosomes, and order of gene. Analyzing genomes in plants helps scientists to determine differences and similarities within plant species. Etymology In the word floristic, "flora" means "flower" in Latin. Floristic is used to describe something relating plants or flowers. In the word diversity, the Latin root "diversus" means "various." Diversity is used to describe variety or a range of differences. Floristic diversity in Latin America One region in Latin America with one of the largest amount of floristic diversity in plants is the Andes Mountains Tropical Hotspot, known for being biodiverse and having one-sixth of the worlds plant species residing there. By having a wide variety in climate such as having multiple elevations, many types of ecosystems, and temperature differences, this mountain strip has the ability to host multiple types of plants. References External links Floristic diversity in a model system using experimental microcosms Biodiversity Flowers
https://en.wikipedia.org/wiki/William%20Schooling
Sir William Schooling (16 December 1860 – 18 February 1936) was a British expert on insurance and statistics. He was named a CBE in the 1918 Birthday Honours and a KBE in 1920 for his work with the War Savings Committee. Schooling was the editor of Bourne's Directory, a listing of British insurance companies, and the author of several books on insurance and on the history of the Hudson's Bay Company. With Mark Barr, he also did pioneering work on the mathematics of the golden ratio. References 1860 births 1936 deaths British statisticians Golden ratio
https://en.wikipedia.org/wiki/CodePen
CodePen is an online community for testing and showcasing user-created HTML, CSS and JavaScript code snippets. It functions as an online code editor and open-source learning environment, where developers can create code snippets, called "pens," and test them. It was founded in 2012 by full-stack developers Alex Vazquez and Tim Sabat and front-end designer Chris Coyier. Its employees work remotely, rarely all meeting together in person. CodePen is a large community for web designers and developers to showcase their coding skills, with an estimated 330,000 registered users and 14.16 million monthly visitors. References External links Computing websites Web development Software developer communities
https://en.wikipedia.org/wiki/Administrative%20controls
Administrative controls are training, procedure, policy, or shift designs that lessen the threat of a hazard to an individual. Administrative controls typically change the behavior of people (e.g., factory workers) rather than removing the actual hazard or providing personal protective equipment (PPE). Administrative controls are fourth in larger hierarchy of hazard controls, which ranks the effectiveness and efficiency of hazard controls. Administrative controls are more effective than PPE because they involve some manner of prior planning and avoidance, whereas PPE serves only as a final barrier between the hazard and worker. Administrative controls are second lowest because they require workers or employers to actively think or comply with regulations and do not offer permanent solutions to problems. Generally, administrative controls are cheaper to begin, but they may become more expensive over time as higher failure rates and the need for constant training or re-certification eclipse the initial investments of the three more desirable hazard controls in the hierarchy. The U.S. National Institute for Occupational Safety and Health recommends administrative controls when hazards cannot be removed or changed, and engineering controls are not practical. Some common examples of administrative controls include work practice controls such as prohibiting mouth pipetting and rotating worker shifts in coal mines to prevent hearing loss. Other examples include hours of service regulations for commercial vehicle operators, Safety signage for hazards, and regular maintenance of equipment. References Industrial hygiene Safety engineering Occupational safety and health
https://en.wikipedia.org/wiki/List%20of%20bitcoin%20forks
Bitcoin forks are defined variantly as changes in the protocol of the bitcoin network or as the situations that occur "when two or more blocks have the same block height". A fork influences the validity of the rules. Forks are typically conducted in order to add new features to a blockchain, to reverse the effects of hacking or catastrophic bugs. Forks require consensus to be resolved or else a permanent split emerges. Forks of the client software The following are forks of the software client for the bitcoin network: Bitcoin XT A fork initiated by Mike Hearn. The current reference implementation for bitcoin contains a computational bottleneck. The actual fork was preceded by Mike Hearn publishing a Bitcoin Improvement Proposal (BIP 64) on June 10, 2014, calling for the addition of "a small P2P protocol extension that performs UTXO lookups given a set of outpoints." On December 27, 2014 Hearn released version 0.10 of the forked client XT, with the BIP 64 changes. It achieved significant attention within the bitcoin community in mid-2015 amid a contentious debate among core developers over increasing the block size cap. On June 22, 2015, Gavin Andresen published BIP 101 calling for an increase in the maximum block size. The changes would activate a fork allowing eight MB blocks (doubling in size every two years) once 75% of a stretch of 1,000 mined blocks is achieved after the beginning of 2016. The new maximum transaction rate under XT would have been 24 transactions per second. On August 6, 2015 Andresen's BIP101 proposal was merged into the XT codebase. Bip 101 was reverted and the 2-MB block size bump of Bitcoin Classic was applied instead. The August 2015 release of XT received widespread media coverage. The Guardian wrote that "bitcoin is facing civil war". Wired wrote that "Bitcoin XT exposes the extremely social—extremely democratic—underpinnings of the open source idea, an approach that makes open source so much more powerful than technology controlle
https://en.wikipedia.org/wiki/Transcriptional%20amplification
In genetics, transcriptional amplification is the process in which the total amount of messenger RNA (mRNA) molecules from expressed genes is increased during disease, development, or in response to stimuli. In eukaryotic cells, the transcribing activity of RNA Polymerase II results in mRNA production. Transcriptional amplification is specifically defined as the increase in per-cell abundance of this set of expressed mRNAs. Transcriptional amplification is caused by changes in the amount or activity of transcription-regulating proteins. Mechanisms of transcriptional amplification Gene expression is regulated by numerous types of proteins that directly or indirectly influence transcription by RNA Polymerase II. As opposed to transcriptional activators or repressors that selectively activate or repress specific genes, amplifiers of transcription act globally on expressed genes. Several known regulators of transcriptional amplification have been characterized including the oncogene Myc, the Rett syndrome protein MECP2, and the BET bromodomain protein BRD4. In particular, the Myc protein amplifies transcription by binding to promoters and enhancers of active genes where it directly recruits the transcription elongation factor P-TEFb. Furthermore, the BRD4 protein is a regulator of Myc activity. Identifying and measuring transcriptional amplification Commonly used gene expression experiments interrogate the expression of one gene (qPCR) or many genes (microarray, RNA-Seq). These techniques generally measure relative mRNA levels and employ normalization methods that assume only a small number of genes show altered expression. In contrast, single cell or cell-count normalized absolute measurements of mRNA abundance are required to reveal transcriptional amplification. Additionally, global measurements of mRNA or total mRNA per cell can also uncover evidence for transcriptional amplification. Cells in which transcription has been amplified have additional hallmarks
https://en.wikipedia.org/wiki/Theta%20nigrum
The theta nigrum () or theta infelix () is a symbol of death in Greek and Latin epigraphy. Isidore of Seville notes the letter was appended after the name of a deceased soldier and finds of papyri containing military records have confirmed this use. Additionally it can be seen in the Gladiator Mosaic. The term theta nigrum was coined by Theodor Mommsen. It consists of a circle with a diagonal line. The theta signified Thanatos, the Greek deity of death. See also References External links Cultural aspects of death Symbols Epigraphy Greek letters
https://en.wikipedia.org/wiki/Hangprinter
Hangprinter is an open-source fused deposition modeling delta 3D printer notable for its unique frameless design. It was created by Torbjørn Ludvigsen. The Hangprinter uses relatively low cost parts and can be constructed for around US$250. The printer is part of the RepRap project, meaning many of the parts of the printer are able to be produced on the printer itself (partially self replicating). The design files for the printer are available on GitHub for download, modification and redistribution. Versions Version 0 The Hangprinter v0, also called the Slideprinter, is a 2D plotter. It was designed solely to test if a 3D version could realistically be created. Version 1 The Hangprinter v1 uses counter weights to stay elevated. Version 2 All parts of the Hangprinter Version 2 are contained within a single unit which uses cables to suspend the printer within a room, allowing it to create extremely large objects over 4 meters tall. Version 3 Version 3 of the Hangprinter has the motors and gears attached to the ceiling, making the carriage lighter. Version 4 Version 4 includes upgrades from version 3 including flex compensation, better calibration and automatic homing. Fused Particle Fabrication/Fused Granular Fabrication Hangprinters To enable 3D printers to economically use recycled plastic feedstocks to enable distributed recycling and additive manufacturing (DRAM) several types of fused granular fabrication (FGF)/fused particle fabrication (FPF) -based 3D printers have been designed and released with open source licenses. First, a large-scale printer was demonstrated with a GigabotX extruder based on the open source cable driven hangprinter concept. Then detailed plans using recyclebot auger techniques were released in HardwareX to build such a printer for under $1700. This approach would further reduce the cost of using hangprinters to make large scale products as the cost of recycled shredded plastic is ~$1–5/kg while filament is generally around $20/k
https://en.wikipedia.org/wiki/Video%20game%20preservation
Video game preservation is a form of preservation applied to the video game industry that includes, but is not limited to, digital preservation. Such preservation efforts include archiving development source code and art assets, digital copies of video games, emulation of video game hardware, maintenance and preservation of specialized video game hardware such as arcade games and video game consoles, and digitization of print video game magazines and books prior to the Digital Revolution. Importance of preservation Besides retaining the ability to play games from the past, preservation of video games enables research on the history of video games as well as ways for developers to look at older games to build ideas from. There is also interest in the preservation of cancelled video games that were known to be in development, as coupled with the reasons for cancellation, they can provide an understanding of the technical and creative aspects, or lack thereof, at the time of the game's development. Unlike some examples of other forms of media like books, art and photography, and film, which antedate the mid-20th century and which can be preserved in a variety of formats that are not prohibited by more-recent intellectual property (IP) laws, video games typically require specialized and/or proprietary computer hardware and software to read and execute game software. However, as technology advances, these older game systems become obsolete, no longer produced nor maintained to use for executing games. The media formats of the early days of computer gaming, relying on floppy discs and CD-ROMs, suffer from disc rot and degrade over time, making it difficult to recover information. Further, video games tend to rely on other resources like operating systems, network connectivity, and external servers outside control of users, and making sure these boundary aspects to a video game are preserved along with the game are also essential. B According to a 2023 study by the Vide
https://en.wikipedia.org/wiki/Nepal%20IGF
Nepal Internet Governance Forum is an initiative of the Internet Governance Forum with the overall concept of multistakeholderism and Internet for development and growth. The Nepal IGF declaration was signed on 21 February 2017 where a multistakeholder steering committee (MSG) has been formed for the commencement of the Nepal IGF in June 2017. Signatories of Nepal IGF Nepal IGF 2019 Program Committee Hempal Shrestha Eswari Sharma Jyotsana Maskey Sahajman Shrestha Shreedeep Rayamajhi Amrita Khakurel Ramkrishna Pariyar Prabesh Subedi Nepal IGf 2018 Program Committee Hempal Shrestha (Coordinator) Indivar Badal Jyotsana Maskey Sahajman Shrestha Shehnaj Banu Shiwa Karmacharya Shiva Kumar Pokhrel Shreedeep Rayamajhi Nepal IGF 2017 Program Committee Babu Ram Aryal Bikram Shrestha Binod Dhakal Dr. Sanjeev Pandey Kishor Panth Sarita Bhushal Sahajman Shrestha Shreedeep Rayamajhi Subhash Dhakal References External links Official website Shreedeep Rayamajhi speaking at one of the session of Nepal IGF2017 Proposal of Nepal IGF Internet Governance issues in Nepal – discussion hosted by Internet Society Nepal Internet governance organizations Internet Standards Organizations established in 2017
https://en.wikipedia.org/wiki/Switching%20Kalman%20filter
The switching Kalman filtering (SKF) method is a variant of the Kalman filter. In its generalised form, it is often attributed to Kevin P. Murphy, but related switching state-space models have been in use. Applications Applications of the switching Kalman filter include: Brain–computer interfaces and neural decoding, real-time decoding for continuous neural-prosthetic control, and sensorimotor learning in humans. It also has application in econometrics, signal processing, tracking, computer vision, etc. It is an alternative to the Kalman filter when the system's state has a discrete component. The additional error when using a Kalman filter instead of a Switching Kalman filter may be quantified in terms of the switching system's parameters. For example, when an industrial plant has "multiple discrete modes of behaviour, each of which having a linear (Gaussian) dynamics". Model There are several variants of SKF discussed in. Special case In the simpler case, switching state-space models are defined based on a switching variable which evolves independent of the hidden variable. The probabilistic model of such variant of SKF is as the following: [This section is badly written: It does not explain the notation used below.] The hidden variables include not only the continuous , but also a discrete *switch* (or switching) variable . The dynamics of the switch variable are defined by the term . The probability model of and can depend on . The switch variable can take its values from a set . This changes the joint distribution which is a separate multivariate Gaussian distribution in case of each value of . General case In more generalised variants, the switch variable affects the dynamics of , e.g. through . The filtering and smoothing procedure for general cases is discussed in. References Control theory Nonlinear filters Linear filters Signal estimation Stochastic differential equations Robot control Markov models
https://en.wikipedia.org/wiki/Hungarian%20Astronautical%20Society
Hungarian Astronautical Society abbreviated as MANT (Magyar Asztronautikai Társaság) is a non-profit organization focusing on educational and informative activities on space science, founded in 1986. The association considers itself a successor of the Astronautical Committee of the association called Scientific Lyceum (Hun. abbr.: TIT), founded in 1956; and the Central Astronautical Section of the Federation of Technological and Sciences Associations (Hun. abbr.: MTESZ). Members of the Society are space researchers, other professionals concerned in space related fields and others interested in the interdisciplinary and state-of-the-art uses of outer space. Hungarian Astronautical Society Aims Main aims of the Society are: to recruit people for space research and engineering; to use space research and applications to educate about STEM fields like physics, astronomy, biology, studies on (space and flight) medicine, flight technology, meteorology and about other fields related like (space) law, sociology, psychology; to develop the independent and team-working skills and creativity of students by organizing youth competitions, group competitions and summer space camps; to publicize space research and everyday applications of space not only in public events but also through media relations; to keep contact with Hungarian space researchers and engineers working abroad; to keep the memory of the great Hungarian pioneers of astronautics; to act for Hungary in the International Astronautical Federation (IAF) (member since 1959) and in the International Academy of Astronautics (IAA); representing Hungary at the annual International Astronautical Congress as the only participating Hungarian organization; to improve international connections which is even more important since Hungary has become a Member State of the European Space Agency (ESA). Regular events Main regular events of the Society: Hungarian Summer Space Camp (since 1994) Student Competition (sin
https://en.wikipedia.org/wiki/Smoothing%20problem%20%28stochastic%20processes%29
The smoothing problem (not to be confused with smoothing in statistics, image processing and other contexts) is the problem of estimating an unknown probability density function recursively over time using incremental incoming measurements. It is one of the main problems defined by Norbert Wiener. A smoother is an algorithm that implements a solution to this problem, typically based on recursive Bayesian estimation. The smoothing problem is closely related to the filtering problem, both of which are studied in Bayesian smoothing theory. A smoother is often a two-pass process, composed of forward and backward passes. Consider doing estimation (prediction/retrodiction) about an ongoing process (e.g. tracking a missile) based on incoming observations. When new observations arrive, estimations about past needs to be updated to have a smoother (more accurate) estimation of the whole estimated path until now (taking into account the newer observations). Without a backward pass (for retrodiction), the sequence of predictions in an online filtering algorithm does not look smooth. In other words, retrospectively, it is as if we are using future observations for improving estimation of a point in past, when those observations about future points become available. Note that time of estimation (which determines which observations are available) can be different to the time of the point that the prediction is about (that is subject to prediction/retrodiction). The observations about later times can be used to update and improved the estimations about earlier times. Doing so leads to smoother-looking estimations (retrodiction) about the whole path. Examples of smoothers Some variants include: Rauch–Tung–Striebel (RTS) smoother Gaussian smoothers (e.g., extended Kalman smoother or sigma-point smoothers) for non-linear state-space models. Particle smoothers The confusion in terms and the relation between Filtering and Smoothing problems The terms Smoothing and Filtering ar
https://en.wikipedia.org/wiki/Plain%20hunt
In method ringing, a branch of change ringing, the ringing pattern known as plain hunt is the simplest method of generating continuously changing sequences, and is a fundamental building-block of method ringing. Explanation Plain hunting consists of a linear undeviating course of a bell between the first and last places in the striking order, with two strikes in the first and last position to enable a turn-around. On eight bells this is shown in the accompanying diagram below, where all the bells are plain hunting. The bells are written out in their striking order, and each sequence is a "change": Thus each bell moves one position at each succeeding change, unless they reach the first or last position, when they remain there for two changes then proceed to the other end of the sequence. This simple rule can be extended to any number of bells, so that on 12 bells for instance, 24 unique changes can be obtained. Example – plain hunt on eight bells 1 2 3 4 5 6 7 8- start in rounds (rounds is the descending sequence of bells) 2 1 4 3 6 5 8 7 2 4 1 6 3 8 5 7 4 2 6 1 8 3 7 5 4 6 2 8 1 7 3 5 6 4 8 2 7 1 5 3 6 8 4 7 2 5 1 3 8 6 7 4 5 2 3 1 8 7 6 5 4 3 2 1 – reverse rounds 7 8 5 6 3 4 1 2 7 5 8 3 6 1 4 2 5 7 3 8 1 6 2 4 5 3 7 1 8 2 6 4 3 5 1 7 2 8 4 6 3 1 5 2 7 4 8 6 1 3 2 5 4 7 6 8 1 2 3 4 5 6 7 8 – finish in rounds Limitations Plain hunt is limited to a small number of possible different changes, which is numerically equal to twice the number of bells that are hunting. However, by introducing deviations from the plain hunt, by causing some of the bells to change their relationship to the others, change ringing "methods" were developed. These allow a large range of possible different changes to be rung; even to the extent of the full factorial sequence of changes. Used as a method building block The diagram on the right shows how plain hunt is used as a building-block in other ringing methods. Bell number 1 is always plain hunting (shown in bl
https://en.wikipedia.org/wiki/Outage%20probability
In Information theory, outage probability of a communication channel is the probability that a given information rate is not supported, because of variable channel capacity. Outage probability is defined as the probability that information rate is less than the required threshold information rate. It is the probability that an outage will occur within a specified time period. Slow-fading channel For example, the channel capacity for slow-fading channel is C = log2(1 + h2 SNR), where h is the fading coefficient and SNR is a signal to noise ratio without fading. As C is random, no constant rate is available. There may be a chance that information rate may go below to required threshold level. For slow fading channel, outage probability = P(C < r) = P(log2(1 + h2 SNR) < r), where r is the required threshold information rate. See also Shannon–Hartley theorem Fading channel References Information theory
https://en.wikipedia.org/wiki/UGV%20Interoperability%20Profile
UGV Interoperability Profile (UGV IOP), Robotics and Autonomous Systems – Ground IOP (RAS-G IOP) or simply IOP was originally an initiative started by the United States Department of Defense (DoD) to organize and maintain open architecture interoperability standards for Unmanned Ground Vehicles (UGV). A primary goal of this initiative is to leverage existing and emerging standards within the Unmanned Vehicle (UxV) community such as the Society of Automotive Engineers (SAE) AS-4 Joint Architecture for Unmanned Systems (JAUS) standard and the Army Unmanned Aircraft Systems (UAS) Project Office IOPs. The IOP was initially created by U.S. Army Robotic Systems Joint Project Office (RS JPO): and is currently maintained by the U.S. Army Project Manager Force Projection (PM FP). The plural form Interoperability Profiles (IOPs) typically refers to the set of documents, which comprise the IOP and its intended usage. The IOPs are approved for public release. The National Advanced Mobility Consortium (NAMC) makes the IOPs available at the https://namcgroups.org website for registered users. Basic Concepts From a system perspective, the IOP is defined to address interoperability at multiple levels within varying systems configurations, e.g.: OCU/UxV(s): Between Operator Control Units (OCU) and one or more Unmanned Vehicles (UxV(s)) Intra-OCU: Between and among OCU hardware and software elements. Intra-UxV: Between and among UxV subsystems, payloads and platforms. OCU/UxV/C2: Between OCUs, UxVs and external C2 systems to exchange command and control, battlespace and audio/video information. A key solution to this is the utilization of JAUS to establish a common message passing layer between the software components of the system. The IOP specifies rules for the use of standard JAUS messages as well as custom extensions to the standard message set. For the interoperability of hardware components, the IOP also includes the specification of hardware plugs and mounts. Vers
https://en.wikipedia.org/wiki/Samuelson%E2%80%93Berkowitz%20algorithm
In mathematics, the Samuelson–Berkowitz algorithm efficiently computes the characteristic polynomial of an matrix whose entries may be elements of any unital commutative ring. Unlike the Faddeev–LeVerrier algorithm, it performs no divisions, so may be applied to a wider range of algebraic structures. Description of the algorithm The Samuelson–Berkowitz algorithm applied to a matrix produces a vector whose entries are the coefficient of the characteristic polynomial of . It computes this coefficients vector recursively as the product of a Toeplitz matrix and the coefficients vector an principal submatrix. Let be an matrix partitioned so that The first principal submatrix of is the matrix . Associate with the Toeplitz matrix defined by if is , if is , and in general That is, all super diagonals of consist of zeros, the main diagonal consists of ones, the first subdiagonal consists of and the th subdiagonal consists of . The algorithm is then applied recursively to , producing the Toeplitz matrix times the characteristic polynomial of , etc. Finally, the characteristic polynomial of the matrix is simply . The Samuelson–Berkowitz algorithm then states that the vector defined by contains the coefficients of the characteristic polynomial of . Because each of the may be computed independently, the algorithm is highly parallelizable. References Linear algebra Polynomials Numerical linear algebra
https://en.wikipedia.org/wiki/Cheyenne%20%28supercomputer%29
The Cheyenne supercomputer at the NCAR-Wyoming Supercomputing Center (NWSC) in Cheyenne, Wyoming began operation as one of the world’s most powerful and energy-efficient computers. Ranked in November 2016 as the 20th most powerful computer in the world by Top500, the 5.34-petaflops system is capable of more than triple the amount of scientific computing performed by NCAR’s previous supercomputer, Yellowstone. It also is three times more energy efficient than Yellowstone, with a peak computation rate of more than 3 billion calculations per second for every watt of energy consumed. The National Science Foundation and the State of Wyoming through an appropriation to the University of Wyoming funded Cheyenne to provide the United States with a major new tool to advance understanding of the atmospheric and related Earth system sciences. High-performance computers such as Cheyenne allow researchers to run increasingly detailed models that simulate complex processes to estimate how they might unfold in the future. These predictions give resource managers and policy experts valuable information for planning ahead and mitigating risk. Cheyenne’s users advance the knowledge needed for saving lives, protecting property, and enabling U.S. businesses to better compete in the global marketplace. Scientists across the country will use Cheyenne to study phenomena ranging from weather and climate to wildfires, seismic activity, and airflows that generate power at wind farms. Their findings lay the groundwork for better protecting society from natural disasters, lead to more detailed projections of seasonal and longer-term weather and climate variability and change, and improve weather and water forecasts that are needed by economic sectors from agriculture and energy to transportation and tourism. The supercomputer’s name was chosen to honor the people of Cheyenne, Wyoming, who supported the installation of the NWSC and its computers there. The name also commemorates the 150th an
https://en.wikipedia.org/wiki/261%20%28number%29
261 (two hundred [and] sixty-one) is a natural number proceeded by the number 260 and followed by 262. It has the prime factorization 32·29. Mathematical properties There are six divisors of this number, the divisors being , , , , , and 261 itself. 261 is a deficient number, since 261 is nonagonal number, unique period in base 2, and the number of possible unfolded tesseract patterns. 261 is a lucky number, as well as an odious number, meaning it has an odd number of 1's in its binary expansion, which is (with 3 ones in it). References Integers