source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Luca%20Perregrini
Luca Perregrini from the University of Pavia, Italy was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2016 for contributions to numerical techniques for electromagnetic modeling. References Fellow Members of the IEEE Living people Year of birth missing (living people) Microwave engineers Academic staff of the University of Pavia Italian electrical engineers Place of birth missing (living people)
https://en.wikipedia.org/wiki/Sun%20Sumei%20%28engineer%29
Sun Sumei is an electrical engineer from the Institute for Infocomm Research in Singapore. She was named a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2016 for her work in the design and standardization of wireless communication systems. References Fellow Members of the IEEE Singaporean engineers Living people Year of birth missing (living people) Place of birth missing (living people)
https://en.wikipedia.org/wiki/Installer%20%28programming%20language%29
Installer is a scripting language developed by Sylvan Technical Arts and published by Commodore International for AmigaOS, first released for version 2.1 in 1992. Its grammar is based on the LISP programming language. A compatible re-implementation named InstallerLG is actively developed as of October 2018. Example from the developer guide: (makedir "T:fred" (prompt "I will now create the directory \"T:Fred\"") (help @makedir-help) (infos) (confirm) ) The InstallerGen tool can be used as an alternative for writing scripts by hand. References External links Amiga Technologies V43.3 Installer development package InstallerLG alternative MUI alternative Amiga APIs Amiga development software AmigaOS Scripting languages CBM software Free installation software Installation software
https://en.wikipedia.org/wiki/Coral%20reefs%20of%20the%20Virgin%20Islands
One of the marine ecosystems found in the Virgin Islands are the coral reefs. These coral reefs can be located between the islands of St. Croix, St. Thomas, and St. John. These coral reefs have an area of 297.9 km2, along with other marine habitats that are in between. The way these coral reefs grow are by coral larvae swimming freely and attaching themselves to hard surfaces around the islands and start to develop a skeleton on the outside of their skin to protect themselves from predators but also allow a new place for other coral larvae to attach to and grow on. These corals can form into three different structures; fringing reefs, which are reefs that are close to the shore, barrier reefs, which are reefs that are alongside the shore and is separated by deep water, and an atoll reef which is a coral reef that circles a lagoon or body of water. Distribution As stated, the coral reefs such as fringing reefs, deep reefs, patch reefs and spur and groove formation are distributed over three islands in the Virgin Islands which are St. Croix (Salt River Bay National Historical Park and Ecological Preserve, Buck Island Reef National Monument), St. Thomas, and St. John (Virgin Islands Coral Reef National Monument). The coral reefs found offshore of St. Thomas and St. John are distributed patchily around the islands. Additionally, a developed barrier reef system surrounds St. Croix along its eastern and southern shores. Ecology The coral reefs as well as hard-bottom habitat accounts for 297.9 km2. The coral reefs are home to diverse species. There are over 40 species of scleractinian corals and three species of Millepora. Live scleractinian species are found throughout the Virgin Islands, but mainly around Buck Island, St. Croix and St. John. More specifically based on a survey from 2001-2006, listed are a total of 215 fishes from St. John and 202 from St. Croix. Four species of sea turtles are found within the Virgin Islands. The coral reefs are impacted by freshwa
https://en.wikipedia.org/wiki/NetScaler
NetScaler is a line of networking products owned by Cloud Software Group. The products consist of NetScaler, an application delivery controller (ADC), NetScaler AppFirewall, an application firewall, NetScaler Unified Gateway, NetScaler Application Delivery Management (ADM), and NetScaler SD-WAN, which provides software-defined wide-area networking management. NetScaler was initially developed in 1997 by Michel K Susai and acquired by Citrix Systems in 2005. Citrix consolidated all of its networking products under the NetScaler brand in 2016. On September 30, 2022, when Citrix was taken private as part of the merger with TIBCO Software, NetScaler was formed as a business unit under the Cloud Software Group. Overview The NetScaler line of products are the networking business unit for Cloud Software Group It includes NetScaler ADCs, NetScaler Unified Gateway, NetScaler AppFirewall, NetScaler Intelligent Traffic Management, and NetScaler Application Delivery Manager. The products can work in conjunction with other Cloud Software Group offerings, including its Citrix and Xen line of products. NetScaler is integrated with OpenStack as part of Cloud Software Group's sponsorship of the OpenStack Foundation. NetScaler offers a cloud native solution leveraging the advanced traffic management, observability, and comprehensive security of the NetScaler Platform as part of Cloud Software Group's contribution to the Cloud Native Computing Foundation (CNCF). Products NetScaler is Cloud Software Group’s core networking product. It is an application delivery controller (ADC), a tool that improves the delivery speed and quality of applications to an end user. The product is aimed at business customers and it performs tasks such as traffic optimization, L4-L7 load balancing, and web app acceleration while maintaining data security. NetScaler monitors server health and allocates network and application traffic to additional servers for efficient use of resources. It also performs
https://en.wikipedia.org/wiki/Adaptive%20type
Adaptive type – in evolutionary biology – is any population or taxon which have the potential for a particular or total occupation of given free of underutilized home habitats or position in the general economy of nature. In evolutionary sense, the emergence of new adaptive type is usually a result of adaptive radiation certain groups of organisms in which they arise categories that can effectively exploit temporary, or new conditions of the environment. Such evolutive units with its distinctive – morphological and anatomical, physiological and other characteristics, i.e. genetic and adjustments (feature) have a predisposition for an occupation certain home habitats or position in the general nature economy. Simply, the adaptive type is one group organisms whose general biological properties represent a key to open the entrance to the observed adaptive zone in the observed natural ecological complex. Adaptive types are spatially and temporally specific. Since the frames of general biological properties these types of substantially genetic are defined between, in effect the emergence of new adaptive types of the corresponding change in population genetic structure and eternal contradiction between the need for optimal adapted well the conditions of living environment, while maintaining genetic variation for survival in a possible new circumstances. For example, the specific place in the economy of nature existed millions of years before the appearance of human type. However, just when the process of evolution of primates (order Primates) reached a level that is able to occupy that position, it is open, and then (in leaving world) an unprecedented acceleration increasingly spreading. Culture, in the broadest sense, is a key adaptation of adaptive type type of Homo sapiens the occupation of existing adaptive zone through work, also in the broadest sense of the term. References See also Adaptive zone Adaptation Progressive evolution Speciation Evolutionary bi
https://en.wikipedia.org/wiki/Olmec%20Head%2C%20Number%208
Olmec Head, Number 8 is a tall outdoor colossal head sculpture on the east side of the north entrance to the Field Museum of Natural History in Chicago, Illinois, that was created by Mexican sculptor Ignacio Pérez Solano (b. 1931) and installed in 2000. It is one of several reproductions of San Lorenzo Colossal Head 8, which is currently located at the Museum of Anthropology in Xalapa, Veracruz. See also List of public art in Chicago Olmec colossal heads Olmec Head Replica, Salt Lake City References External Links Listing on the Chicago Park District website 2000 establishments in Illinois Outdoor sculptures in Chicago Stone sculptures in the United States Heads in the arts
https://en.wikipedia.org/wiki/Krste%20Asanovi%C4%87
Krste Asanović from the University of California, Berkeley has written and co-authored many academic papers concerning computer architecture. , he is chairman of the Board of the RISC-V Foundation. Asanović was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2014 for contributions to computer architecture. He was elected as an ACM Fellow in 2018 for "contributions to computer architecture, including the open RISC-V instruction set and Agile hardware". Asanović received a PhD in computer science from Berkeley in 1998 under John Wawrzynek. In 2015, along with RISC-V researchers he co-founded SiFive, a fabless semiconductor company and provider of commercial RISC-V processor IP, where he serves as its chief architect. References External links Home Page, University of California, Berkeley Fellow Members of the IEEE Fellows of the Association for Computing Machinery Living people UC Berkeley College of Engineering alumni Computer designers Year of birth missing (living people) Serbian engineers Serbian computer scientists American electrical engineers
https://en.wikipedia.org/wiki/Chuah%20Hean%20Teik
Chuah Hean Teik PSM, DSPN () is a Malaysian eminent scholar, researcher, academic and industry leader. He has been the President and CEO of Universiti Tunku Abdul Rahman (UTAR), Malaysia from April 2008 until September 2019. He is currently the President of the Federation of Engineering Institutions of Asia and the Pacific (FEIAP) and strongly advocates mutual recognition of engineering degrees in Asia and the Pacific region by promoting the FEIAP Engineering Education guidelines. He was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2014 for leadership in engineering education. He is also a Consultant Professor to Northwestern Polytechnical University since 2018 and University Advisor for University of Sanya since 2020. Honours : Commander of the Order of Loyalty to the Crown of Malaysia (PSM) - Tan Sri (2019) : Officer of the Order of the Defender of State (DSPN) - Dato' Other Awards Balai Ikhtisas Malaysia (BIM) Lifetime Achievement Award History On 10 April 2008, Universiti Tunku Abdul Rahman (UTAR) Council Chairman Ling Liong Sik has appointed him as its new president cum CEO to succeed Ng Lay Swee from 1 April 2008 onwards. References External links Official UTAR Page of Chuah Hean Teik Living people People from Penang Malaysian people of Hokkien descent Malaysian people of Chinese descent Commanders of the Order of Loyalty to the Crown of Malaysia Malaysian electrical engineers Fellow Members of the IEEE University of Malaya alumni 1961 births
https://en.wikipedia.org/wiki/Minh%20Do
Minh N. Do (born 1974) is a Professor in the Department of Electrical and Computer Engineering of the University of Illinois at Urbana–Champaign in Urbana, Illinois. He also holds positions at the Coordinated Science Laboratory, the Beckman Institute for Advanced Science and Technology, the Advanced Digital Sciences Center, and the Department of Bioengineering. Education and career Do was born in Thanh Hóa, Vietnam. In the 1990s, he immigrated to Australia and attended the University of Canberra there, graduating with a Bachelor of Engineering degree in Computer Engineering in 1997. He then flew to Switzerland, where in 2001, he got his Doctor of Science degree in Communication Systems from the École Polytechnique Fédérale de Lausanne. Recognitions In 1991, Do was a silver medallist of the International Mathematical Olympiad and in 1997 he was awarded a University Medal from the University of Canberra. He was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2014 for contributions to image representation and computational imaging. References External links 1974 births Living people Vietnamese engineers University of Canberra alumni École Polytechnique Fédérale de Lausanne alumni University of Illinois Urbana-Champaign faculty Fellow Members of the IEEE International Mathematical Olympiad participants People from Thanh Hóa province 21st-century American engineers Place of birth missing (living people)
https://en.wikipedia.org/wiki/Online%20credentials%20for%20learning
Online credentials for learning are digital credentials that are offered in place of traditional paper credentials for a skill or educational achievement. They are directly linked to the accelerated development of internet communication technologies, the development of digital badges, electronic passports and massive open online courses (MOOCs). History Online credentials have their origin in the concept of open educational resources (OER), which was invented during the Forum on Open Courseware for Higher Education in Developing Countries held in 2002 at UNESCO. Over the next decade the OER concept gained significant traction, and this was confirmed by the World Open Educational Resources (OER) Congress organized by UNESCO in 2012. One of the outcomes of the congress was to encourage the open licensing of educational materials produced with public funds. Creative Commons licensing provides the necessary standardization for copyright permissions, with a strong emphasis on the shift towards sharing and open licensing. Digital credentials ecosystem The digital credentials ecosystem is made up of a combination of traditional (better established) systems and flexible and dynamic (less regulated and new) systems. The challenge for the recognition of learning is that the pace of development, and also the point of departure, of these two aspects is different. The system is made up of seven interrelated sectors and groups of stakeholders, anchored to specific functions in the digital credentials environment. Use. These are the users of credentials, notably learners, who are placed at the centre of the system. Providers and employers can also be users. Provide. Referring to education and training institutions and the emerging variety of for-profit and non-profit digital platforms, such as Coursera, FutureLearn, Credley, Verifdiploma and Mozilla. Award. Awarding bodies in the traditional sense are institutions and professional bodies. Employers, MOOCs, and in some i
https://en.wikipedia.org/wiki/Center%20for%20Advancing%20Electronics%20Dresden
The Center for Advancing Electronics Dresden (cfaed) of the Technische Universität Dresden is part of the Excellence Initiative of German universities. The cluster of excellence for microelectronics is funded from 2012 to 2017 by the German Research Community (DFG) and unites about 60 Investigators and their teams from 11 institutions to act jointly towards reaching the Cluster's ambitious aims. The coordinator is Prof. Dr.-Ing. Gerhard Fettweis, Chair of Mobile Communication Systems. The cluster brings together the teams from two universities and several research institutes in Saxony: Technische Universität Dresden, Technische Universität Chemnitz, Helmholtz-Zentrum Dresden-Rossendorf (HZDR), Leibniz Institute for Polymer Research Dresden e.V. (IPF), Leibniz Institute for Solid State and Materials Research Dresden (IFW), Max Planck Institute of Molecular Cell Biology and Genetics (MPI-CBG), Max Planck Institute for the Physics of Complex Systems (MPI-PKS), Nanoelectronics Materials Laboratory gGmbH (NaMLab), Fraunhofer Institute for Electronic Nano Systems (Fraunhofer ENAS), Fraunhofer Institute of Ceramic Technologies and Systems (Fraunhofer IKTS) and Kurt Schwabe Institute for Measuring and Sensor Technology Meinsberg e.V. (KSI). About 300 scientists from more than 20 different countries are working in nine research paths to investigate completely new technologies for electronic information processing which overcome the limits of today's predominant CMOS technology. Position and institutional building One of the scientific buildings, as well as the organizational headquarters, of the cfaed is situated in Dresden-Plauen, Würzburger Straße 46. In May 2015, construction works for the new cfaed building commenced at the campus of TU Dresden. The building is due for completion in late 2017 and it will host new laboratories, seminar rooms, and offices. History The initial proposal for cfaed as a Cluster of Excellence was submitted to the DFG in August 2011. On July
https://en.wikipedia.org/wiki/Evolutionary%20Theory%20%28journal%29
Evolutionary theory was a peer-reviewed scientific journal covering all aspects of evolutionary biology. It was established in 1973 and published until 2003 by the University of Chicago. The founding editor-in-chief was Leigh Van Valen, later joined by Melissa Stoller. References English-language journals Academic journals established in 1973 Evolutionary biology Publications disestablished in 2003
https://en.wikipedia.org/wiki/Combinatorial%20mirror%20symmetry
A purely combinatorial approach to mirror symmetry was suggested by Victor Batyrev using the polar duality for -dimensional convex polyhedra. The most famous examples of the polar duality provide Platonic solids: e.g., the cube is dual to octahedron, the dodecahedron is dual to icosahedron. There is a natural bijection between the -dimensional faces of a -dimensional convex polyhedron and -dimensional faces of the dual polyhedron and one has . In Batyrev's combinatorial approach to mirror symmetry the polar duality is applied to special -dimensional convex lattice polytopes which are called reflexive polytopes. It was observed by Victor Batyrev and Duco van Straten that the method of Philip Candelas et al. for computing the number of rational curves on Calabi–Yau quintic 3-folds can be applied to arbitrary Calabi–Yau complete intersections using the generalized -hypergeometric functions introduced by Israel Gelfand, Michail Kapranov and Andrei Zelevinsky (see also the talk of Alexander Varchenko), where is the set of lattice points in a reflexive polytope . The combinatorial mirror duality for Calabi–Yau hypersurfaces in toric varieties has been generalized by Lev Borisov in the case of Calabi–Yau complete intersections in Gorenstein toric Fano varieties. Using the notions of dual cone and polar cone one can consider the polar duality for reflexive polytopes as a special case of the duality for convex Gorenstein cones and of the duality for Gorenstein polytopes. For any fixed natural number there exists only a finite number of -dimensional reflexive polytopes up to a -isomorphism. The number is known only for : , , , The combinatorial classification of -dimensional reflexive simplices up to a -isomorphism is closely related to the enumeration of all solutions of the diophantine equation . The classification of 4-dimensional reflexive polytopes up to a -isomorphism is important for constructing many topologically different 3-dimensional C
https://en.wikipedia.org/wiki/Moshe%20Tennenholtz
Moshe Tennenholtz is an Israeli computer scientist and professor with the faculty of Industrial Engineering and Management at the Technion – Israel Institute of Technology, where he holds the Sondheimer Technion Academic Chair. Biography Tennenholtz received his B.Sc. in mathematics from Tel Aviv University in 1986, and his M.Sc. and Ph.D. in 1987 and 1991 respectively from the Department of Applied Mathematics and Computer Science in the Weizmann Institute. From 1991 to 1993 he worked in the Robotics Laboratory at Stanford University, after which he joined the faculty at the Technion in Haifa. He returned to Stanford briefly as a visiting professor from 1999 to 2002 before returning to the Technion. In 2008 he started working at Microsoft Research and in 2011 he founded the basic research group at the Microsoft Israel R&D center. He has served as editor-in-chief of the Journal of Artificial Intelligence Research, associate editor of Games and Economic Behavior, the international journal of Autonomous Agents and Multi-Agent Systems, served on the editorial board of the Journal of Machine Learning Research, and served on the editorial board of AI Magazine. He served as program chair of the ACM Electronic Commerce conference and of the TARK conference. Recognition He is an AAAI Fellow, an ACM fellow, and a fellow of the Society for the Advancement of Economic Theory. He is a winner of the Allen Newell award and of the John McCarthy award for pioneering contributions to the interplay between artificial intelligence and game theory. He also received the ACM SIGART Autonomous Agents Research Award for 2012. He was elected as an ACM Fellow in 2019 "for contributions to AI and algorithmic game theory". References Living people Fellows of the Association for the Advancement of Artificial Intelligence Fellows of the Association for Computing Machinery Game theorists Academic staff of Technion – Israel Institute of Technology Tel Aviv University alumni Weizmann Institute
https://en.wikipedia.org/wiki/Global%20Payments
Global Payments Inc. is an American multinational financial technology company that provides payment technology and services to merchants, issuers and consumers. In June 2021, the company was named to the Fortune 500. The company processes payments made through credit cards, debit cards, and digital and contactless payments. History Global Payments was founded in 1996 and spun off from National Data Corporation, its former parent company, in 2001. Global Payments has been an independent, publicly-traded company on the New York Stock Exchange having the ticker symbol “GPN” since its spin off. In 2009, it paid $75 million for United Card Service, Russia's leading credit card processing company. In 2011, Global Payments's United Card Service bought Alfa-Bank's credit card processing unit. In October 2012, it acquired the smaller Accelerated Payment Technologies for $413 million. In October 2014, it purchased Australian payment processing company Ezidebit for $305 million. In January 2015, it bought Payment Processing (also known as PayPros), a California company, for $420 million. In March 2015 Global Payments bought Realex Payments, an Irish-based payments gateway services company, for €115 million. On April 25, 2016, Global Payments completed the acquisition of Heartland Payment Systems for $4.3 billion. Both Global Payments and its subsidiary Heartland Payment Systems were among the leading credit card processing companies in 2016, according to Business Insider. Its headquarters moved from Sandy Springs, Georgia to Atlanta, Georgia in 2016. In 2017, Global Payments initiated acquiring divisions of Active Networks. In 2018, Global Payments completed the acquisition of AdvancedMD. In 2018, Global Payments completed the acquisition of Sentral Education. On May 28, 2019, Global Payments announced a $21.5 billion merger with TSYS. The merger is expected to trigger a Federal Trade Commission investigation. However, no such investigation occurred. In August 2022, Gl
https://en.wikipedia.org/wiki/IEEE%20Journal%20of%20Oceanic%20Engineering
The IEEE Journal of Oceanic Engineering is a journal published by the Institute of Electrical and Electronics Engineers. The journal's editor in chief is Associate Professor Mandar Chitre, of the National University of Singapore. According to the Journal Citation Reports, the journal has a 2022 impact factor of 4.2. References External links Engineering journals IEEE academic journals Marine engineering
https://en.wikipedia.org/wiki/Stephanie%20van%20Willigenburg
Stephanie van Willigenburg is a professor of mathematics at the University of British Columbia whose research is in the field of algebraic combinatorics and concerns quasisymmetric functions. Together with James Haglund, Kurt Luoto and Sarah Mason, she introduced the quasisymmetric Schur functions, which form a basis for quasisymmetric functions. Education Van Willigenburg earned her Ph.D. in 1997 at the University of St. Andrews under the joint supervision of Edmund F. Robertson and Michael D. Atkinson, with a thesis titled The Descent Algebras of Coxeter Groups. Recognition Van Willigenburg was awarded the Krieger–Nelson Prize in 2017 by the Canadian Mathematical Society. She was named to the 2023 class of Fellows of the American Mathematical Society, "for contributions to algebraic combinatorics, mentorship and exposition, and inclusive community building". Selected publications References External links Year of birth missing (living people) Living people Academic staff of the University of British Columbia Canadian women mathematicians 20th-century Canadian mathematicians 21st-century Canadian mathematicians Combinatorialists 20th-century women mathematicians 21st-century women mathematicians 20th-century Canadian women scientists Fellows of the American Mathematical Society Alumni of the University of St Andrews
https://en.wikipedia.org/wiki/Leinster%20group
In mathematics, a Leinster group is a finite group whose order equals the sum of the orders of its proper normal subgroups. The Leinster groups are named after Tom Leinster, a mathematician at the University of Edinburgh, who wrote about them in a paper written in 1996 but not published until 2001. He called them "perfect groups" and later "immaculate groups", but they were renamed as the Leinster groups by because "perfect group" already had a different meaning (a group that equals its commutator subgroup). Leinster groups give a group-theoretic way of analyzing the perfect numbers and of approaching the still-unsolved problem of the existence of odd perfect numbers. For a cyclic group, the orders of the subgroups are just the divisors of the order of the group, so a cyclic group is a Leinster group if and only if its order is a perfect number. More strongly, as Leinster proved, an abelian group is a Leinster group if and only if it is a cyclic group whose order is a perfect number. Moreover Leinster showed that dihedral Leinster groups are in one-to-one correspondence with odd perfect numbers, so the existence of odd perfect numbers is equivalent to the existence of dihedral Leinster groups. Examples The cyclic groups whose order is a perfect number are Leinster groups. It is possible for a non-abelian Leinster group to have odd order; an example of order 355433039577 was constructed by François Brunault. Other examples of non-abelian Leinster groups include certain groups of the form , where is an alternating group and is a cyclic group. For instance, the groups , , and are Leinster groups. The same examples can also be constructed with symmetric groups, i.e., groups of the form , such as . The possible orders of Leinster groups form the integer sequence 6, 12, 28, 30, 56, 360, 364, 380, 496, 760, 792, 900, 992, 1224, ... It is unknown whether there are infinitely many Leinster groups. Properties There are no Leinster groups that are symmetric or
https://en.wikipedia.org/wiki/Mohan%20Kankanhalli
Mohan Kankanhalli from the National University of Singapore was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2014 for contributions to multimedia content processing and security. References External links Official Website Fellow Members of the IEEE Living people Year of birth missing (living people) Place of birth missing (living people)
https://en.wikipedia.org/wiki/Sam%20Kwong
Sam Kwong from the City University of Hong Kong was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2014 for contributions to optimization techniques in cybernetics and video coding. References Fellow Members of the IEEE Living people Year of birth missing (living people) Academic staff of the City University of Hong Kong Place of birth missing (living people)
https://en.wikipedia.org/wiki/Kwyro%20Lee
Kwyro Lee is an electrical engineer at the Korea Advanced Institute of Science and Technology in Daejeon, South Korea. Lee was named a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2014 for his management and R&D efforts in semiconductor technology. References Fellow Members of the IEEE Living people Academic staff of KAIST Year of birth missing (living people) Place of birth missing (living people)
https://en.wikipedia.org/wiki/Byoungho%20Lee
Byoungho Lee (1964 – 7 November 2022) was a South Korean scientist best known for his work on three-dimensional displays and nanophotonics. From 1994 until his death, he was on the faculty of the School of Electrical and Computer Engineering of Seoul National University. He and his research group published more than 400 peer-reviewed international journal papers, more than 700 international conference papers, and more than 20 books and book chapters. His accumulated citations are over 23,000 and his h-index is 75. At the time of his death, he was the dean of the Engineering College of Seoul National University. Biography and career Lee received his B.S. (1987), M.S. (1989) from EE, Seoul National University, and Ph.D. degree (1993) from EECS, University of California at Berkeley. In September 1994, he joined the School of Electrical and Computer Engineering, Seoul National University as faculty. He was a committee member of OSA, SPIE and IEEE and a fellow of Society for Information Display,. He has served as a Director-at-Large of OSA, Chair of the Member and Education Services Council of OSA, and was serving as the Chair of the Fabrication, Design and Instrumentation Technical Division of OSA. He also served as President of the Korean Information Display Society and as President of the Optical Society of Korea. He served as the General Chair of Applied Optics and Photonics China, and Chair of Steering Committee of CLEO Pacific Rim. He was on editorial board of Light: Science & Applications (NPG), Advances in Optics and Photonics (OSA), and Optica (OSA), which are among the most distinguished journals in optics and photonics. He has received several distinguished academic awards such as Jinbojang Presidential Science Badge of Korea (Apr. 2016), the Academic Award of Seoul National University (Nov. 2013), and the Scientist of the Month Award of Korea (Sep. 2009). Research interests Later research interests of Byoungho Lee and his group at Seoul National Universi
https://en.wikipedia.org/wiki/Haizhou%20Li
Haizhou Li is a professor at the National University of Singapore, Singapore. He was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2014 for leadership in multilingual speaker and language recognition. He was the Editor-in-Chief of IEEE/ACM Transactions on Audio, Speech and Language Processing from 2015 to 2018. He received the President's Technology Award Singapore in 2013. References Fellow Members of the IEEE Living people Year of birth missing (living people) Place of birth missing (living people) Academic staff of the National University of Singapore
https://en.wikipedia.org/wiki/Kay%20Tan
Kay Tan from the National University of Singapore, Singapore was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2014 for contributions to evolutionary multiobjective optimization. References Fellow Members of the IEEE Academic staff of the National University of Singapore Living people Year of birth missing (living people) Place of birth missing (living people)
https://en.wikipedia.org/wiki/ScreenLimit
ScreenLimit was a time based content-control software for parents to control the time their children spend on devices. Working Children can do assigned tasks like homework to earn more time. Multiple people can use the same or more devices in combination with their own time. They will get a warning when time runs out. When time runs out icons or the desktop will disappear and the ScreenLimit timer page will appear. Multiple schedules can be made like weekend/schoolday/vacation. An example of a schedule could be: Block at 22:00 (regardless of unspent time); Add 60 minutes (a day) at 00:01; UnBlock at 07:00. Parents can see realtime who is using what device. Parents can also manually (un)block a child. With one account multiple children and devices can be managed by multiple parents. History ScreenLimit was first released in November 2016. ScreenLimit was closed on 22 January 2019. Reviews PC Advisor Full Review Educational App Store Teacher's Review See also Comparison of content-control software and providers References External links ScreenLimit - Official Website Content-control software Internet safety Cross-platform software iOS software Android (operating system) software Windows software
https://en.wikipedia.org/wiki/Retronasal%20smell
Retronasal smell, retronasal olfaction, is the ability to perceive flavor dimensions of foods and drinks. Retronasal smell is a sensory modality that produces flavor. It is best described as a combination of traditional smell (orthonasal smell) and taste modalities. Retronasal smell creates flavor from smell molecules in foods or drinks shunting up through the nasal passages as one is chewing. When people use the term "smell", they are usually referring to "orthonasal smell", or the perception of smell molecules that enter directly through the nose and up the nasal passages. Retronasal smell is critical for experiencing the flavor of foods and drinks. Flavor should be contrasted with taste, which refers to five specific dimensions: (1) sweet, (2) salty, (3) bitter, (4) sour, and (5) umami. Perceiving anything beyond these five dimensions, such as distinguishing the flavor of an apple from a pear for example, requires the sense of retronasal smell. History Evolutionarily, smell has long been presumed to be a less-important sense for humans, especially compared to vision. Vision appears to dominate human stimuli perception, but researchers now argue that smell cues are highly informative to humans despite being less obviously so. Before his death in 1826, French gastronome Brillat-Savarin published his book, The Physiology of Taste; Or, Meditations on Transcendental Gastronomy: Theoretical, Historical, and Practical Work, in which he makes the first mention of the importance of smell in the “combined sense” of taste. He defines taste in terms of the five taste dimensions in addition to flavor created with the nasal apparatus. Avery Gilbert, in his book The Nose Knows, reviews the work of Henry T. Finck, an American philosopher from the late 1800s who published a groundbreaking essay titled “The Gastronomic Value of Odours.” Flink called flavor a “second way of smelling,” and much subsequent scientific investigation in the early 1900s focused on attempting to break
https://en.wikipedia.org/wiki/Geometric%20process
In probability, statistics and related fields, the geometric process is a counting process, introduced by Lam in 1988. It is defined as The geometric process. Given a sequence of non-negative random variables :, if they are independent and the cdf of is given by for , where is a positive constant, then is called a geometric process (GP). The GP has been widely applied in reliability engineering Below are some of its extensions. The α- series process. Given a sequence of non-negative random variables:, if they are independent and the cdf of is given by for , where is a positive constant, then is called an α- series process. The threshold geometric process. A stochastic process is said to be a threshold geometric process (threshold GP), if there exists real numbers and integers such that for each , forms a renewal process. The doubly geometric process. Given a sequence of non-negative random variables :, if they are independent and the cdf of is given by for , where is a positive constant and is a function of and the parameters in are estimable, and for natural number , then is called a doubly geometric process (DGP). The semi-geometric process. Given a sequence of non-negative random variables , if and the marginal distribution of is given by , where is a positive constant, then is called a semi-geometric process The double ratio geometric process. Given a sequence of non-negative random variables , if they are independent and the cdf of is given by for , where and are positive parameters (or ratios) and . We call the stochastic process the double-ratio geometric process (DRGP). References Point processes Markov processes
https://en.wikipedia.org/wiki/Fusion%20category
In mathematics, a fusion category is a category that is rigid, semisimple, -linear, monoidal and has only finitely many isomorphism classes of simple objects, such that the monoidal unit is simple. If the ground field is algebraically closed, then the latter is equivalent to by Schur's lemma. Examples Representation Category of a finite group Reconstruction Under Tannaka–Krein duality, every fusion category arises as the representations of a weak Hopf algebra. References Category theory
https://en.wikipedia.org/wiki/Crypto-shredding
Crypto-shredding is the practice of 'deleting' data by deliberately deleting or overwriting the encryption keys. This requires that the data have been encrypted. Data may be considered to exist in three states: data at rest, data in transit and data in use. General data security principles, such as in the CIA triad of confidentiality, integrity, and availability, require that all three states must be adequately protected. Deleting data at rest on storage media such as backup tapes, data stored in the cloud, computers, phones, or multi-function printers can present challenges when confidentiality of information is of concern. When encryption is in place, data disposal is more secure. Motivations for use There are various reasons for using crypto-shredding, including when the data is contained in defective or out-of date systems, there is no further use for the data, the circumstances are such that there are no [longer] legal rights to use or retain the data, and other similar motivations. Legal obligations may also come from regulations such as the right to be forgotten, the General Data Protection Regulation, and others. Data security is largely influenced by confidentiality and privacy concerns. Use In some cases all data storage is encrypted, such as encrypting entire harddisks, computer files, or databases. Alternatively only specific data may be encrypted, such as passport numbers, social security numbers, bank account numbers, person names, or record in a databases. Additionally, data in one system may be encrypted with separate keys when that same data is contained in multiple systems. When specific pieces of data are encrypted (possibly with different keys) it allows for more specific data shredding. There is no need to have access to the data (like an encrypted backup tape), only the encryption keys need to be shredded. Example iOS devices and Macintosh computers with an Apple T2 or Apple silicon chip use crypto-shredding when performing the "Erase all
https://en.wikipedia.org/wiki/Integration%20Driven%20Development
Integration Driven Development (IDD) is an incremental approach to systems development where the contents of the increments are determined by the integration plan, rather than the opposite. The increments can be seen as defined system capability changes - "Deltas" (Taxén et al., 2011). The advantages compared to other incremental development models ( such as RUP and Scrum) still apply, such as short design cycles, early testing and managing late requirement changes, however IDD adds pull to the concept and also has the advantage of optimizing the contents of each increment to allow early integration and testing. Pull from integration and testing Pull, in this context, means that information is requested from the user when needed (or is planned to be integrated and tested), as opposed to delivered when it happens to be ready. Development planning has to adjust to the optimal order of integration. System implementation is driven by what is going to be integrated and tested. System design, in turn is driven by the planned implementation and requirements by the planned system design steps. By doing so, artifacts will be delivered just-in-time, thus enabling fast feedback. Advantages and Limitations IDD is not used instead of other incremental models, but rather as an enhancement that will make those models more efficient. One obstacle when using IDD is to create the integration plan – the definition of what to develop and integrate at a given time. One way that has proven successful is to use System Anatomies for original planning and Integration Anatomies for re-planning and follow-up. Since all planning will require time and resources IDD may be considered unnecessary for development with low complexity of the system and organization (i.e., small teams developing small systems). Further reading Lilliesköld, J., Taxén, L., Karlsson, M., & Klasson, M. (2005). Managing complex development projects – using the system anatomy. In Proceedings Portland Internation
https://en.wikipedia.org/wiki/Pseudo-response%20regulator
Pseudo-response regulator (PRR) refers to a group of genes that regulate the circadian oscillator in plants. There are four primary PRR proteins (PRR9, PRR7, PRR5 and TOC1/PRR1) that perform the majority of interactions with other proteins within the circadian oscillator, and another (PRR3) that has limited function. These genes are all paralogs of each other, and all repress the transcription of Circadian Clock Associated 1 (CCA1) and Late Elongated Hypocotyl (LHY) at various times throughout the day. The expression of PRR9, PRR7, PRR5 and TOC1/PRR1 peak around morning, mid-day, afternoon and evening, respectively. As a group, these genes are one part of the three-part repressilator system that governs the biological clock in plants. Discovery Multiple labs identified the PRR genes as parts of the circadian clock in the 1990s. In 2000, Akinori Matsushika, Seiya Makino, Masaya Kojima, and Takeshi Mizuno were the first to understand PRR genes as pseudo-response repressor genes rather than as response regulator (ARR) genes. The factor that distinguishes PRR from ARR genes is the lack of a phospho-accepting aspartate site that characterizes ARR proteins. Though their research that discovered PRR genes was primarily hailed during the early 2000s as informing the scientific community about the function of TOC1 (named APRR1 by the Mizuno lab), an additional pseudo-response regulator in the Arabidopsis thaliana biological clock, the information about PRR genes that Matsushika and his team found deepened scientific understanding of circadian clocks in plants and led other researchers to hypothesize about the purpose of the PRR genes. Though current research has identified TOC1, PRR3, PRR5, PRR7, and PRR9 as of importance to the A. thaliana circadian clock mechanism, Matsushika et al. first categorized PRR genes into two subgroups (APRR1 and APRR2, the A stands for Arabidopsis) due to two differing amino acid structures. The negative feedback loops including PRR genes, pro
https://en.wikipedia.org/wiki/Lalit%20Kumar%20Goel
Lalit Kumar Goel (born 1960) is a Professor of Electrical Engineering at the Nanyang Technological University, Singapore. He was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2013 for contributions to the development and application of reliability techniques in electric power systems. Education and career Goel was born in New Delhi, India. He got his BTech degree in electrical engineering from the National Institute of Technology in Warangal, India in 1983. He then immigrated to Canada, where he attended University of Saskatchewan, Canada from which he got his M.Sc. and Ph.D. degrees in the same field in 1988 and 1991 respectively. From 2005 to 2008, Goel served as the Head of the Division of Power Engineering and from July 2008 to June 2012 was Dean of Admissions & Financial Aid. He was appointed director of the Undergraduate Education in the President's Office, and served as such from 2013 to 2015. References 1960 births Living people Indian electrical engineers National Institutes of Technology alumni University of Saskatchewan alumni Academic staff of Nanyang Technological University Fellow Members of the IEEE Academics from New Delhi
https://en.wikipedia.org/wiki/Leonid%20Grcev
Leonid Grcev (born 28 April 1951 in Skopje, FNR Yugoslavia) is an electrical engineer at Sts. Cyril and Methodius University in Skopje, North Macedonia. Grcev was named a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2013 for his contributions to transient electromagnetic modeling of grounding systems. References Fellow Members of the IEEE Living people Macedonian engineers 1951 births
https://en.wikipedia.org/wiki/Dan%20Mircea%20Ionel
Dan Mircea Ionel is Professor of electrical engineer, the L. Stanley Pigman Chair in Power, and the Director of the SPARK Laboratory and of the PEIK Institute at the University of Kentucky, Lexington, KY. Professor Ionel's research includes the electric machines, wind turbines, power system, applications of power electronics, smart buildings. By the number of citations, he is among the world top 2% highly cited researchers. Education and career Professor Dan M. Ionel received the M.Eng. and Ph.D. degrees in electrical engineering from the Politehnica University of Bucharest, Romania. His doctoral program included a Leverhulme Visiting Fellowship at the University of Bath, England. He was a Postdoctoral Researcher with the SPEED Laboratory, University of Glasgow, Scotland. He previously worked in industry, most recently as Chief Engineer for Regal Rexnord Corporation, and, before that, as the Chief Scientist for Vestas Wind Turbines. Concurrently, Dr. Ionel was also a Visiting and Research Professor at the University of Wisconsin and Marquette University in Milwaukee, WI. He contributed to technological developments with long lasting industrial impact, including US’ most successful range of PM motor drives and one of the world’s most powerful wind turbines, and holds more than thirty patents, including a medal winner at the Geneva Invention Fair. Dr. Ionel co-authored three books and published more than two hundred papers, including five winners of IEEE Best Paper Awards. He received the CG Veinott Award, the highest distinction for electromechanical energy conversion from the IEEE Power and Energy Society. His research has been supported by NSF, DOE, NIST, NASA, and directly by leading industrial companies and utilities. He taught and advised student research on subjects of sustainable and renewable energy technologies, electric machines and power electronic drives, electromagnetic devices, electric power systems, smart grids and buildings. Dr. Ionel is an IE
https://en.wikipedia.org/wiki/Frank%20Chongwoo%20Park
Frank Chongwoo Park from Seoul National University, Seoul, South Korea was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2013 for contributions to geometric methods in robot mechanics. References Fellow Members of the IEEE Living people Year of birth missing (living people) Place of birth missing (living people) Academic staff of Seoul National University
https://en.wikipedia.org/wiki/Matthew%20N.O.%20Sadiku
Matthew Nojimu Olanipekun Sadiku from the Prairie View A&M University, Cypress, TX was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2013 "for contributions to computational electromagnetics and engineering education". He is a co-author of the textbook Fundamental of Electric Circuits with Charles K. Alexander. References Fellow Members of the IEEE Living people Year of birth missing (living people) 21st-century African-American academics 21st-century American academics Nigerian emigrants to the United States African-American engineers Prairie View A&M University people Microwave engineers American electrical engineers Nigerian electrical engineers Electrical engineering academics
https://en.wikipedia.org/wiki/Pseudokinase
Pseudokinases are catalytically-deficient pseudoenzyme variants of protein kinases that are represented in all kinomes across the kingdoms of life. Pseudokinases have both physiological (signal transduction) and pathophysiological functions. History The phrase pseudokinase was first coined in 2002. They were subsequently sub-classified into different 'classes'. Several pseudokinase-containing families are found in the human kinome, including the Tribbles pseudokinases, which are at the interface between kinase and ubiquitin E3 ligase signalling. The human pseudokinases (and their pseudophosphatase cousins) are implicated in a wide variety of diseases, which has made them potential drug targets and antitargets). Pseudokinases are made up of an evolutionary mixture of eukaryotic protein kinase (ePK) and non ePK-related pseudoenzyme proteins (e.g., FAM20A, which binds ATP and is pseudokinase due to a conserved glutamate to glutamine swap in the alpha-C helix. FAM20A is implicated in periodontal disease, and serves to control the catalytic activity of FAM20C, an important physiological casein kinase that controls phosphorylation of proteins in the Golgi apparatus that are destined for secretion, such as the milk protein casein. A comprehensive evolutionary analysis confirms that pseudokinases group into multiple subfamilies, and these are found in the annotated kinome of organisms across the kingdoms of life, including prokaryotes, archaea and all eukaryotic lineages with an annotated proteome; this data is searchable in ProKino (http://vulcan.cs.uga.edu/prokino/about/browser). See also Kinase Pseudoenzyme Phosphatome Protein phosphatase References Further reading External links Biochemistry Cell signaling Cancer
https://en.wikipedia.org/wiki/GOV.UK%20Verify
GOV.UK Verify was an identity assurance system developed by the British Government Digital Service (GDS) which was in operation between May 2016 and April 2023. The system was intended to provide a single trusted login across all British government digital services, verifying the user's identity in 15 minutes. It allowed users to choose one of several companies to verify their identity to a standard level of assurance before accessing 22 central government online services. History The Cabinet Office started work on the system in 2011, when it was known as the Identity Assurance Programme (IDAP). A private beta phase began in February 2014, moving into public beta on 14 October 2014. The system was declared live on 24 May 2016. In June 2018, it was announced that the responsibility for digital ID policy had moved from GDS to the Department for Digital, Culture, Media & Sport. Responsibility for development and rollout of GOV.UK Verify remained with GDS. Certified companies Third-party companies were responsible for carrying out identity verification within the scheme. The first five companies – known as identity providers (IdPs) – that signed up to provide the service through a tender issued by the Department for Work & Pensions were the Post Office, Verizon, Experian, Digidentity and Mydex CIC. After a further tender issued by the Cabinet Office in 2014, Barclays, GB Group, Morpho and Royal Mail became certified companies. While Mydex CIC participated in the original tender process, it did not go on to become a certified GOV.UK identity provider. In 2016 Verizon was temporarily and then permanently removed from the list of certified providers. In October 2018, GDS announced that five of the seven identity providers – Barclays, Digidentity, Experian, Post Office and SecureIdentity – had signed contracts for a further 18 months. Users of Citizensafe from GB Group and Royal Mail's identity service would be able to continue using their GOV.UK Verify identity for t
https://en.wikipedia.org/wiki/Visual%20information%20fidelity
Visual information fidelity (VIF) is a full reference image quality assessment index based on natural scene statistics and the notion of image information extracted by the human visual system. It was developed by Hamid R Sheikh and Alan Bovik at the Laboratory for Image and Video Engineering (LIVE) at the University of Texas at Austin in 2006. It is deployed in the core of the Netflix VMAF video quality monitoring system, which controls the picture quality of all encoded videos streamed by Netflix. Model overview Images and videos of the three-dimensional visual environments come from a common class: the class of natural scenes. Natural scenes from a tiny subspace in the space of all possible signals, and researchers have developed sophisticated models to characterize these statistics. Most real-world distortion processes disturb these statistics and make the image or video signals unnatural. The VIF index employs natural scene statistical (NSS) models in conjunction with a distortion (channel) model to quantify the information shared between the test and the reference images. Further, the VIF index is based on the hypothesis that this shared information is an aspect of fidelity that relates well with visual quality. In contrast to prior approaches based on human visual system (HVS) error-sensitivity and measurement of structure, this statistical approach used in an information-theoretic setting, yields a full reference (FR) quality assessment (QA) method that does not rely on any HVS or viewing geometry parameter, nor any constants requiring optimization, and yet is competitive with state of the art QA methods. Specifically, the reference image is modeled as being the output of a stochastic `natural' source that passes through the HVS channel and is processed later by the brain. The information content of the reference image is quantified as being the mutual information between the input and output of the HVS channel. This is the information that the brain coul
https://en.wikipedia.org/wiki/Pregnancy%20in%20art
Pregnancy in art covers any artistic work that portrays pregnancy. In art, as in life, it is often unclear whether an actual state of pregnancy is intended to be shown. A common visual indication is the gesture of the woman placing a protective open hand on her abdomen. Historically, married women were at some stage of pregnancy for much of their life until menopause, but the depiction of this in art is relatively uncommon, and generally restricted to some specific contexts. This probably persists even in contemporary culture; despite several recent artworks depicting heavily pregnant women, one writer was "astonished at the shortage of visual images ... of pregnant women in public visual culture". A research study conducted by Pierre Bourdieu in 1963 found that the great majority of 693 French subjects thought that a photo of a pregnant woman could not, by definition, be beautiful. There are two subjects often depicted in Western narrative art, or history painting, where pregnancy is an important part of the story. These are the unhappy scene usually called Diana and Callisto, showing the moment of discovery of Callisto's forbidden pregnancy, and the biblical scene of the Visitation. Gradually, portraits of pregnant women began to appear, with a particular fashion for "pregnancy portraits" in elite portraiture of the years around 1600. As well as being a subject for depiction in art, pregnant women were also consumers of art, with some special types of work developed for them, including Madonna del Parto images of Mary. Traditional and ancient cultures Images of pregnant women, especially small figurines, were made in traditional cultures in many places and periods, though it is rarely one of the most common types of image. These include ceramic figures from some Pre-Columbian cultures, and a few figures from most of the ancient Mediterranean cultures. Many of these seem to be connected with fertility. Identifying whether such figures are actually meant to
https://en.wikipedia.org/wiki/List%20of%20broadcast%20video%20formats
This list of broadcast formats is a review of the most popular formats used to broadcast video information over cable television, satellite television, the Internet, and other means. Video broadcasting was popularized by the advent of the television during the middle of the twentieth century. Recently, Internet streaming has almost surpassed television as the top video broadcast platform. Below is a list of broadcast video formats. 24p is a progressive scan format and is now widely adopted by those planning on transferring a video signal to film. Film and video makers use 24p even if they are not going to transfer their productions to film, simply because of the on-screen "look" of the (low) frame rate, which matches native film. When transferred to NTSC television, the rate is effectively slowed to 23.976 FPS (24×1000÷1001 to be exact), and when transferred to PAL or SECAM it is sped up to 25 FPS. 35 mm movie cameras use a standard exposure rate of 24 FPS, though many cameras offer rates of 23.976 FPS for NTSC television and 25 FPS for PAL/SECAM. The 24 FPS rate became the de facto standard for sound motion pictures in the mid-1920s. Practically all hand-drawn animation is designed to be played at 24 FPS. Actually hand-drawing 24 unique frames per second ("1's") is costly. Even in big budget films, usually hand-drawn animation is done shooting on "2's" (one hand-drawn frame is shown twice, so only 12 unique frames per second) and some animation is even drawn on "4's" (one hand-drawn frame is shown four times, so only six unique frames per second). 25p is a progressive format and runs 25 progressive frames per second. This frame rate derives from the PAL television standard of 50i (or 50 interlaced fields per second). Film and television companies use this rate in 50 Hz regions for direct compatibility with television field and frame rates. Conversion for 60 Hz countries is enabled by doing 2:2:3:2:3 pulldown. This is similar to 2:3 pulldown, and the result
https://en.wikipedia.org/wiki/Kuramoto%E2%80%93Sivashinsky%20equation
In mathematics, the Kuramoto–Sivashinsky equation (also called the KS equation or flame equation) is a fourth-order nonlinear partial differential equation. It is named after Yoshiki Kuramoto and Gregory Sivashinsky, who derived the equation in the late 1970s to model the diffusive–thermal instabilities in a laminar flame front. The equation was independelty derived by G. M. Homsy and A. A. Nepomnyashchii in 1974, in connection with the stability of liquid film on an inclined plane and by R. E. LaQuey et. al. in 1975 in connection with trapped-ion instability. The Kuramoto–Sivashinsky equation is known for its chaotic behavior. Definition The 1d version of the Kuramoto–Sivashinsky equation is An alternate form is obtained by differentiating with respect to and substituting . This is the form used in fluid dynamics applications. The Kuramoto–Sivashinsky equation can also be generalized to higher dimensions. In spatially periodic domains, one possibility is where is the Laplace operator, and is the biharmonic operator. Properties The Cauchy problem for the 1d Kuramoto–Sivashinsky equation is well-posed in the sense of Hadamard—that is, for given initial data , there exists a unique solution that depends continuously on the initial data. The 1d Kuramoto–Sivashinsky equation possesses Galilean invariance—that is, if is a solution, then so is , where is an arbitrary constant. Physically, since is a velocity, this change of variable describes a transformation into a frame that is moving with constant relative velocity . On a periodic domain, the equation also has a reflection symmetry: if is a solution, then is also a solution. Solutions Solutions of the Kuramoto–Sivashinsky equation possess rich dynamical characteristics. Considered on a periodic domain , the dynamics undergoes a series of bifurcations as the domain size is increased, culminating in the onset of chaotic behavior. Depending on the value of , solutions may include equilibria, relative equ
https://en.wikipedia.org/wiki/Conformon
From a biological standpoint, the goal-directed molecular motions inside living cells are carried out by biopolymers acting like molecular machines (e.g. myosin, RNA/DNA polymerase, ion pumps, etc.). These molecular machines are driven by conformons, that is sequence-specific mechanical strains generated by free energy released in chemical reactions or stress induced destabilisations in supercoiled biopolymer chains. Therefore, conformons can be defined as packets of conformational energy generated from substrate binding or chemical reactions and confined within biopolymers. On the other hand, from a physics standpoint, the conformon is a localization of elastic and electronic energy which may propagate in space with or without dissipation. The mechanism which involves dissipationless propagation is a form of molecular superconductivity. On quantum mechanical level both elastic/vibrational and electronic energy can be quantised, therefore the conformon carries a fixed portion of energy. This has led to the definition of quantum of conformation (shape). References Biophysics
https://en.wikipedia.org/wiki/CANpie
CANpie (CAN Programming Interface Environment) is an open source project and pursues the objective of creating and establishing an open and standardized software API for access to the CAN bus. The project was established in 2001 by MicroControl and is licensed under Apache License version 2.0. The current version of the CANpie API covers both classical CAN frames as well as ISO CAN FD frames. The API is designed for embedded control applications as well as for PC interface boards: embedded microcontrollers are programmed in C, a C++ API is provided for OS independent access to interface boards. The API provides ISO/OSI Layer-2 (Data Link Layer) functionality. It is not the intention of CANpie to incorporate higher layer functionality (e.g. CANopen, SAE J1939). Driver principle The CANpie API supports the concept of hardware message buffers (mailboxes) with a total limit of 255 buffers. A message buffer has a unique direction (receive or transmit). As an option it is possible to connect a FIFO with arbitrary size to a message buffer for both transfer directions. The total number of CAN channels is limited to 255, the API provides a method to gather information about the features of each CAN hardware channel. This is especially important for an application designer who wants to write the code only once. The CAN frame time-stamping (specified by CiA 603, CAN Frame time-stamping – Requirements for network time management) is supported with a resolution of 1 nano-second. Usage The following code snippet shows the initialisation of a microcontroller. #include "cp_core.h" // CANpie core functions void MyCanInit(void) { CpPort_ts tsCanPortT; // logical CAN port //--------------------------------------------------- // setup the CAN controller / open a physical CAN // port // memset(&tsCanPortT, 0, sizeof(CpPort_ts)); CpCoreDriverInit(eCP_CHANNEL_1, &tsCanPortT, 0); //--------------------------------------------------- // setup 500 kBit/s
https://en.wikipedia.org/wiki/Ira%20Gessel
Ira Martin Gessel (born 9 April 1951 in Philadelphia, Pennsylvania) is an American mathematician, known for his work in combinatorics. He is a long-time faculty member at Brandeis University and resides in Arlington, Massachusetts. Education and career Gessel studied at Harvard University graduating magna cum laude in 1973. There, he became a Putnam Fellow in 1972, alongside Arthur Rubin and David Vogan. He received his Ph.D. at MIT and was the first student of Richard P. Stanley. He was then a postdoctoral fellow at the IBM Watson Research Center and MIT. He then joined Brandeis University faculty in 1984. He was promoted to Professor of Mathematics and Computer Science in 1990, became a chair in 1996–98, and Professor Emeritus in 2015. Gessel is a prolific contributor to enumerative and algebraic combinatorics. He is credited with the invention of quasisymmetric functions in 1984 and foundational work on the Lagrange inversion theorem. As of 2017, Gessel was an advisor of 27 Ph.D. students. Gessel was elected a Fellow of the American Mathematical Society in the inaugural class of 2012. Since 2015, he is an Associate Editor of the Digital Library of Mathematical Functions. Gessel's lattice path conjecture Gessel has made significant contributions to an area in combinatorics known as lattice walks, which usually take place on the integer lattice, and are sometimes confined to the upper right quadrant. An excursion is a lattice walk which starts at the origin and returns to the origin. A lattice excursion in the upper right quadrant with four possible steps, up, down, northeast, and southwest, is now known as a Gessel excursion. By 2001 Gessel had noted empirically, and conjectured, that the number of Gessel excursions with 2n steps admit a simple hypergeometric closed form. This closed form counting function equation became known as Gessel's lattice path conjecture. A computer aided proof of Gessel's conjecture by Manuel Kauers, Christoph Koutschan, and
https://en.wikipedia.org/wiki/Center%20%28ring%20theory%29
In algebra, the center of a ring R is the subring consisting of the elements x such that for all elements y in R. It is a commutative ring and is denoted as Z(R); 'Z' stands for the German word Zentrum, meaning "center". If R is a ring, then R is an associative algebra over its center. Conversely, if R is an associative algebra over a commutative subring S, then S is a subring of the center of R, and if S happens to be the center of R, then the algebra R is called a central algebra. Examples The center of a commutative ring R is R itself. The center of a skew-field is a field. The center of the (full) matrix ring with entries in a commutative ring R consists of R-scalar multiples of the identity matrix. Let F be a field extension of a field k, and R an algebra over k. Then . The center of the universal enveloping algebra of a Lie algebra plays an important role in the representation theory of Lie algebras. For example, a Casimir element is an element of such a center that is used to analyze Lie algebra representations. See also: Harish-Chandra isomorphism. The center of a simple algebra is a field. See also Center of a group Central simple algebra Morita equivalence Notes References Ring theory
https://en.wikipedia.org/wiki/The%20Vital%20Question
The Vital Question is a book by the English biochemist Nick Lane about the way the evolution and origin of life on Earth was constrained by the provision of energy. The book was well received by critics; The New York Times, for example, found it "seductive and often convincing" though the reviewer considered much of it speculative beyond the evidence provided. The Guardian wrote that the book presented hard evidence and tightly interlocking theory on a question once thought inaccessible to science, the origin of life. New Scientist found the book's arguments powerful and persuasive with many testable ideas; that it was not easy to read was compensated by the "incredible, epic story" that it told. The Telegraph wrote that the book succeeded brilliantly as science writing, expanding the reader's horizons with a gripping narrative. Context Early theories of the origin of life included spontaneous generation from non-living matter and panspermia, the arrival of life on earth from other bodies in space. The question of how life originated became urgent when Charles Darwin's 1859 On the Origin of Species became widely accepted by biologists. The evolution of new species by splitting off from older ones implied that all life forms were derived from a few such forms, perhaps only one, as Darwin had suggested at the end of his book. Darwin suggested that life could have originated in some "warm little pond" containing a suitable mixture of chemical compounds. The question has continued to be debated into the 21st century. Nick Lane is a biochemist at University College London; he researches "evolutionary biochemistry and bioenergetics, focusing on the origin of life and the evolution of complex cells." He has become known as a science writer, having written four books about evolutionary biochemistry. Book Synopsis In the book, Lane discusses what he considers to be a major gap in biology: why life operates the way that it does, and how it began. In his view as a bio
https://en.wikipedia.org/wiki/Machine%20learning%20control
Machine learning control (MLC) is a subfield of machine learning, intelligent control and control theory which solves optimal control problems with methods of machine learning. Key applications are complex nonlinear systems for which linear control theory methods are not applicable. Types of problems and tasks Four types of problems are commonly encountered. Control parameter identification: MLC translates to a parameter identification if the structure of the control law is given but the parameters are unknown. One example is the genetic algorithm for optimizing coefficients of a PID controller or discrete-time optimal control. Control design as regression problem of the first kind: MLC approximates a general nonlinear mapping from sensor signals to actuation commands, if the sensor signals and the optimal actuation command are known for every state. One example is the computation of sensor feedback from a known full state feedback. A neural network is commonly used technique for this task. Control design as regression problem of the second kind: MLC may also identify arbitrary nonlinear control laws which minimize the cost function of the plant. In this case, neither a model, nor the control law structure, nor the optimizing actuation command needs to be known. The optimization is only based on the control performance (cost function) as measured in the plant. Genetic programming is a powerful regression technique for this purpose. Reinforcement learning control: The control law may be continually updated over measured performance changes (rewards) using reinforcement learning. MLC comprises, for instance, neural network control, genetic algorithm based control, genetic programming control, reinforcement learning control, and has methodological overlaps with other data-driven control, like artificial intelligence and robot control. Applications MLC has been successfully applied to many nonlinear control problems, exploring unknown and often unexpected
https://en.wikipedia.org/wiki/Naehyuck%20Chang
Naehyuck Chang is a Professor of electrical engineering at KAIST, Seoul, Korea. Chang obtained his BS, MS, and PhD degrees from the Department of Control and Instrumentation at Seoul National University, of which he later became faculty member and later served as Vice Dean of its College of Engineering. In 2012, Chang was elected as chair of a Special Interest Group within the Association for Computing Machinery. Chang was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2012 for contributions to system-level power characterization, including thermal management and in 2015 he was named an ACM Fellow by the Association for Computing Machinery. References External links 20th-century births Living people South Korean engineers Seoul National University alumni Academic staff of Seoul National University Academic staff of KAIST Fellow Members of the IEEE Fellows of the Association for Computing Machinery Year of birth missing (living people) Place of birth missing (living people)
https://en.wikipedia.org/wiki/David%20Bruce%20Davidson
David Bruce Davidson (born 1961) is a London-born South African electrical engineer at Curtin University, Perth, Western Australia whose work started in the field of Computational Electromagnetics focussed on the underlying theory and engineering applications of, in particular, finite element methods. In 2012 he was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) for contributions to computational electromagnetics. He currently leads the engineering team at the Curtin Institute of Radio Astronomy, part of the International Centre for Radio Astronomy Research (ICRAR). His current research interests include computational electromagnetics and engineering electromagnetics for radio astronomy. Life and career Davidson was born in 1961 in London. He obtained a B.Eng (cum laude) (1982), B.Eng (Hons) (cum laude) (1983) and M.Eng (cum laude) (1986) at the University of Pretoria. After completing his military conscription in the SANDF he worked at the CSIR in Pretoria, focusing mainly on defence electronics. In 1988 he was appointed senior lecturer at the Department of Electrical and Electronic Engineering at the University of Stellenbosch. He received his PhD from Stellenbosch University in 1991 with a thesis on parallel processing for computational electromagnetics. In 1992 he was appointed associate professor and from 1996, professor. During his first sabbatical (January - July 1993) he was a visiting scholar at the University of Arizona, Tucson and worked with Richard Ziolkowski on computational electromagnetics techniques for applications in optics. During his second sabbatical (January - July 1997) he was visitingfellow commoner at Trinity College, Cambridge and worked with Ronald Ferrari. He also worked with the electricity utilisation group at the engineering department of Cambridge University, under Ricky Metaxas. The group worked on finite element methods for radio-frequency problems in electromagnetics. He visited the Delft Univer
https://en.wikipedia.org/wiki/Host-based%20intrusion%20detection%20system%20comparison
Comparison of host-based intrusion detection system components and systems. Free and open-source software As per the Unix philosophy a good HIDS is composed of multiple packages each focusing on a specific aspect. Proprietary software References External links Debian security manual Arch security wiki CentOS security wiki Ubuntu security wiki Intrusion detection systems
https://en.wikipedia.org/wiki/Biodiversity%20of%20Albania
For a small country, Albania is characterised by a considerable wealth of terrestrial and marine ecosystems and habitats with contrasting floral, faunal, and fungal species, defined in an area of 28,748 square kilometres. Most of the country is predominantly of Mediterranean character, comprehending the country's center and south, while the alpine affinity is more visible in the northeast. Apart the diversity of topography and climate, the direct proximity of Albania to the Mediterranean Sea and the significant location within the European continent have created favorable conditions for appearance of a vast array of flora and fauna and funga with an immense quality, which, however, led the country to be recognised as an important biodiversity hotspot in the continent. The number of globally threatened faunal species in Albania is high with an integral part of more than 181 species, ranking seventh in the Mediterranean Basin. Albania is predominantly mountainous and hilly with the rapid landscape change from marine to alpine within a limited distance. Only one-third consists of lowlands that sprawls across the west of the country facing the Mediterranean Sea with a coastline length of about . The mountain chains consequently cross the length of the country from the north to the south featuring the Albanian Alps in the north, the Sharr Mountains in the northeast, the Skanderbeg Mountains in the center, the Korab Mountains in the east, the Pindus Mountains in the southeast and the Ceraunian Mountains in the southwest stretching alongside the Albanian Riviera. The hydrographic network of Albania is composed of lakes, rivers, wetlands, seas and groundwaters. There are about 250 lakes of different origins, including tectonic, glacial and fluvial lakes. Among the most important is the lake of Shkodër, the largest lake in Southern Europe, followed by Ohrid, which is considered one of the most ancient lakes in the world. The rivers also have a valuable effect on the local
https://en.wikipedia.org/wiki/K-synchronized%20sequence
In mathematics and theoretical computer science, a k-synchronized sequence is an infinite sequence of terms s(n) characterized by a finite automaton taking as input two strings m and n, each expressed in some fixed base k, and accepting if m = s(n). The class of k-synchronized sequences lies between the classes of k-automatic sequences and k-regular sequences. Definitions As relations Let Σ be an alphabet of k symbols where k ≥ 2, and let [n]k denote the base-k representation of some number n. Given r ≥ 2, a subset R of is k-synchronized if the relation {([n1]k, ..., [nr]k)} is a right-synchronized rational relation over Σ∗ × ... × Σ∗, where (n1, ..., nr) R. Language-theoretic Let n ≥ 0 be a natural number and let f: be a map, where both n and f(n) are expressed in base k. The sequence f(n) is k-synchronized if the language of pairs is regular. History The class of k-synchronized sequences was introduced by Carpi and Maggi. Example Subword complexity Given a k-automatic sequence s(n) and an infinite string S = s(1)s(2)..., let ρS(n) denote the subword complexity of S; that is, the number of distinct subwords of length n in S. Goč, Schaeffer, and Shallit demonstrated that there exists a finite automaton accepting the language This automaton guesses the endpoints of every contiguous block of symbols in S and verifies that each subword of length n starting within a given block is novel while all other subwords are not. It then verifies that m is the sum of the sizes of the blocks. Since the pair (n, m)k is accepted by this automaton, the subword complexity function of the k-automatic sequence s(n) is k-synchronized. Properties k-synchronized sequences exhibit a number of interesting properties. A non-exhaustive list of these properties is presented below. Every k-synchronized sequence is k-regular. Every k-automatic sequence is k-synchronized. To be precise, a sequence s(n) is k-automatic if and only if s(n) is k-synchronized and s(n) takes on finitely many
https://en.wikipedia.org/wiki/Autonomous%20things
Autonomous things, abbreviated AuT, or the Internet of autonomous things, abbreviated as IoAT, is an emerging term for the technological developments that are expected to bring computers into the physical environment as autonomous entities without human direction, freely moving and interacting with humans and other objects. Self-navigating drones are the first AuT technology in (limited) deployment. It is expected that the first mass-deployment of AuT technologies will be the autonomous car, generally expected to be available around 2020. Other currently expected AuT technologies include home robotics (e.g., machines that provide care for the elderly, infirm or young), and military robots (air, land or sea autonomous machines with information-collection or target-attack capabilities). AuT technologies share many common traits, which justify the common notation. They are all based on recent breakthroughs in the domains of (deep) machine learning and artificial intelligence. They all require extensive and prompt regulatory developments to specify the requirements from them and to license and manage their deployment (see the further reading below). And they all require unprecedented levels of safety (e.g., automobile safety) and security, to overcome concerns about the potential negative impact of the new technology. As an example, the autonomous car both addresses the main existing safety issues and creates new issues. It is expected to be much safer than existing vehicles, by eliminating the single most dangerous elementthe driver. The US's National Highway Traffic Safety Administration estimates 94 percent of US accidents were the result of human error and poor decision-making, including speeding and impaired driving, and the Center for Internet and Society at Stanford Law School claims that "Some ninety percent of motor vehicle crashes are caused at least in part by human error". So while safety standards like the ISO 26262 specify the required safety, there is
https://en.wikipedia.org/wiki/Radeon%20500%20series
The Radeon 500 series is a series of graphics processors developed by AMD. These cards are based on the fourth iteration of the Graphics Core Next architecture, featuring GPUs based on Polaris 30, Polaris 20, Polaris 11, and Polaris 12 chips. Thus the RX 500 series uses the same microarchitecture and instruction set as its predecessor, while making use of improvements in the manufacturing process to enable higher clock rates. Third-generation GCN chips are produced on a 28 nm CMOS process. Polaris (fourth-generation GCN) chips (except for Polaris 30) are produced on a 14 nm FinFET process, developed by Samsung Electronics and licensed to GlobalFoundries. Polaris 30 chips are produced on a 12 nm FinFET process, developed by Samsung and GlobalFoundries. Chipset table Supported display standards are: DisplayPort 1.4 HBR, HDMI 2.0b, HDR10 color. Dual-Link DVI-D and DVI-I at resolutions up to 4096×2304 are also supported, despite ports not being present on the reference cards. VGA-Ports at resolutions up to 2048x1536 are also supported, despite ports not being present on the reference cards, though VGA ports are mostly found on cards sold in Eastern Asia exclusively. Desktop and laptop See also AMD Radeon Pro AMD FireStream List of AMD graphics processing units References AMD graphics cards Computer-related introductions in 2017 Graphics processing units Graphics cards
https://en.wikipedia.org/wiki/Solar%20coverage%20rate
The solar coverage rate is the percentage of an amount of energy that is provided by the sun. This may be in reference to a solar thermal installation or a photovoltaic installation, i.e. a calculation of solar heat, electricity or total energy produced. The observation period is typically one year. As a general rule, higher values represent improved energy efficiency and improved environmental outcomes. General The solar coverage rate is used for need-based planning of solar installations and is a measure of the energetic (non-)dependence on energy sources other than the sun. Differentiation between solar coverage rate for buildings for: water heating, room heating, required overall heating, electricity generation, required total energy. This value depends on the size of the storage unit (hot water tank or storage battery), the size of the harvesting surface (sun collection surface or surface area of photovoltaic modules), and on the amount of energy required. In addition to the total yield, there is another dimension that is important for assessing the effectiveness of a solar facility. This is the total energy loss and storage loss suffered by the facility. Cost effectiveness The solar coverage rate cannot be used as the only measure of the cost effectiveness or quality of a facility. Other conditions must be taken into account. Among other factors, the value depends on the size of the facility, the location and orientation of the collectors, the size of storage available and the amount of energy required. A solar coverage rate of 100% would mean that the system's entire energy requirement can be covered by solar energy. For a solar thermal facility in Europe, this would mean that the entire heat requirement could be covered, even on a cold winter's day. On summer days, however, this same facility would produce a very large surplus that could not be used. The facility would have to be heavily over-dimensioned for the summer and could not necessarily be
https://en.wikipedia.org/wiki/Jagath%20Chandana%20Rajapakse
Jagath Chandana Rajapakse from the Nanyang Technological University was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2012 for contributions to computational techniques for magnetic resonance imaging. References Fellow Members of the IEEE Living people Year of birth missing (living people) Place of birth missing (living people)
https://en.wikipedia.org/wiki/Wonjong%20Rhee
Wonjong Rhee is an electrical engineer at ASSIA, Inc. in San Francisco, California. He was named a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2012 for his work on dynamic spectrum management systems. References External links 20th-century births Living people Academic staff of Seoul National University Fellow Members of the IEEE Year of birth missing (living people) Place of birth missing (living people)
https://en.wikipedia.org/wiki/Mark%20Jeffrey%20Rosker
Mark Jeffrey Rosker is a physicist at the Defense Advanced Research Projects Agency (DARPA) in Arlington, Virginia. He was named a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2012 for his work on microwave and millimeter-wave phased arrays, gallium nitride semiconductors, and terahertz electronics. References Fellow Members of the IEEE Living people 21st-century American engineers Semiconductor physicists Year of birth missing (living people) American electrical engineers
https://en.wikipedia.org/wiki/Fluorescence%20polarization%20immunoassay
Fluorescence polarization immunoassay (FPIA) is a class of in vitro biochemical test used for rapid detection of antibody or antigen in sample. FPIA is a competitive homogenous assay, that consists of a simple prepare and read method, without the requirement of separation or washing steps. The basis of the assay is fluorescence anisotropy, also known as fluorescence polarization. If a fluorescent molecule is stationary and exposed to plane-polarized light, it will become excited and consequently emit radiation back to the polarized-plane. However, if the excited fluorescent molecule is in motion (rotational or translational) during the fluorescent lifetime, it will emit light in a different direction than the excitation plane. The fluorescent lifetime is the amount of time between the absorption moment and the fluorescent emission moment. Typically, the rate at which a molecule rotates is indicative of its size. When a fluorescent-labelled molecule (tracer) binds to another molecule the rotational motion will change, resulting in an altered intensity of plane-polarized light, which results in altered fluorescence polarization. Fluorescence polarization immunoassays employ a fluorophore bound antigen that when bound to the antibody of interest, will increase fluorescence polarization. The change in polarization is proportional to the amount of antigen in sample, and is measured by a fluorescence polarization analyzer. History Fluorescence polarization was first observed by F. Weigert in 1920. He experimented with solutions of fluorescein, eosin, and other dyes at various temperatures and viscosities. Observing that polarization increased with viscosity of the solvent and the size of the dye molecule, but decreased with an increase in temperature, he deduced that polarization increased with a decrease in mobility of the emitting species. From 1925 to 1926 Francis Perrin detailed a quantitative theory for fluorescence polarization in multiple significant publicatio
https://en.wikipedia.org/wiki/Alpha%20and%20beta%20male
Alpha male and beta male, or simply put alpha and beta, are pseudoscientific terms for men derived from the designation for alpha and beta animals in ethology. They may also be used with other genders, such as women, or additionally use other letters of the Greek alphabet (such as omega). The popularization of these terms to describe humans has been widely criticized by scientists. Both terms have been frequently used in internet memes. The term beta is used as a pejorative self-identifier among members of the manosphere, particularly incels, who do not believe they are assertive or traditionally masculine, and feel overlooked by women. It is also used to negatively describe other men who are not deemed to be assertive, particularly with women. History The terms were used almost solely in animal ethology prior to the 1990s, particularly in regard to mating privileges with females, ability to hold territory, and hierarchy in terms of food consumption within their herd or flock. In animal ethology, beta refers to an animal who is subordinate to a higher-ranking members in the social hierarchy, thus having to wait to eat and having fewer or negligible opportunities for copulation. In the 1982 book of Chimpanzee Politics: Power and Sex Among Apes, primatologist and ethologist Frans de Waal suggested that his observations of a chimpanzee colony could possibly be applied to human interactions. Some commentary on the book, including in the Chicago Tribune, discussed its parallels to human power hierarchies. In the early 1990s, some media outlets began to use the term alpha to refer to humans, specifically to "manly" men who excelled in business. Journalist Jesse Singal, writing in New York magazine, attributes the popular awareness of the terms to a 1999 Time magazine article, which described an opinion held by Naomi Wolf, who was at the time an advisor to then-presidential candidate Al Gore: "Wolf has argued internally that Gore is a 'Beta male' who needs to take on th
https://en.wikipedia.org/wiki/PR1ME%20Mathematics%20Teaching%20Programme
PR1ME Mathematics teaching programme (PR1ME) is created for the primary or elementary grades and was first introduced in 2014 by Scholastic. It is adopted by schools in multiple countries such as Philippines, Australia, New Zealand and Mexico. PR1ME is a programme based on the Mathematics teaching and learning practices of Singapore, Hong Kong and Republic of Korea, which have consistently performed strongly in international mathematics studies such as the Trends in International Mathematics and Science Study (TIMSS) and Organisation for Economic Co-operation and Development's Programme for International Student Assessment (PISA). This programme was developed in collaboration with the Ministry of Education (MOE), Singapore and is adapted from the Primary Mathematics Project developed by MOE. Aim of programme The main aim of PR1ME is to nurture young learners and help them build strong mathematical foundation skills. It is based on the five practices listed in the pentagon, which is the framework for mathematics instruction developed by the MOE with problem solving at its core. Problem solving is central: Developing problem solving skills should address both the process and the method of solving problems. Development of metacognition and mathematical thinking skills: Thinking mathematically is a conscious habit and should be developed through consistent use in many contexts. Concrete-Pictorial-Abstract Approach: Develops deep conceptual understanding through making meaningful connections between principles and symbols through concrete activities and visual representation, ensuring deep and long-lasting conceptual understanding. Process of learning mathematics: Learning to mastery involves a focus on concept development and understanding mathematical relationships, and learning to inquire, communicate, reason, conceptualize, formulate and solve mathematical problems, appreciate the beauty of mathematics and apply mathematics in different contexts. Consistent formati
https://en.wikipedia.org/wiki/Jian%20Xin%20Xu
Jian Xin Xu () was a Chinese-born Singaporean professor at the National University of Singapore (NUS) Department of Electrical and Computer Engineering. His research interests included robotics, learning theory, and control theory. Xu received his bachelor's degree in electrical engineering from Zhejiang University in 1982, and then moved to Japan where he completed his master's (1986) and Ph.D. (1989) at the University of Tokyo in the same field. Following that, he worked for Hitachi Research Laboratories for a year, and was then a visiting research fellow at the University of Ohio and a visiting scholar at Yale University, before joining the NUS faculty in 1991. He was named Fellow of the Institute of Electrical and Electronics Engineers (IEEE) in 2012 "for contributions to motion control systems". Professor Xu passed away at the age of 61 on February 7, 2018 after fighting a serious illness for over seven years. References 20th-century births Living people Fellow Members of the IEEE University of Tokyo alumni Zhejiang University alumni Academic staff of the National University of Singapore Year of birth missing (living people) Place of birth missing (living people)
https://en.wikipedia.org/wiki/Probabilistic%20signature%20scheme
Probabilistic Signature Scheme (PSS) is a cryptographic signature scheme designed by Mihir Bellare and Phillip Rogaway. RSA-PSS is an adaptation of their work and is standardized as part of PKCS#1 v2.1. In general, RSA-PSS should be used as a replacement for RSA-PKCS#1 v1.5. Design PSS was specifically developed to allow modern methods of security analysis to prove that its security directly relates to that of the RSA problem. There is no such proof for the traditional PKCS#1 v1.5 scheme. Implementations OpenSSL wolfSSL GnuTLS References External links Raising the standard for RSA signatures: RSA-PSS RFC 4056: Use of the RSASSA-PSS Signature Algorithm in Cryptographic Message Syntax (CMS) RFC 5756: Updates for RSAES-OAEP and RSASSA-PSS Algorithm Parameters RFC 8017: PKCS #1: RSA Cryptography Specifications Version 2.2 Cryptography Digital signature schemes
https://en.wikipedia.org/wiki/Kayako
Kayako is a customer service software company based in London, United Kingdom. Kayako builds customer service and help desk software which businesses use to talk to and support their customers. Kayako was founded in 2001 in Jalandhar, India and has since relocated its headquarters in London, United Kingdom. In addition to its London location, the company has offices in Gurgaon, India, and Singapore. The company now serves 50,000 customers in over 100 countries, including Peugeot, De Beers, NASA, and the American Motorcyclist Association. Kayako was cited as a direct competitor in Zendesk's (another help desk software company listed on the New York Stock Exchange) S-1 IPO filing with the Securities Exchange Commission. History Kayako was established in 2001 by Varun Shoor, who formed the company and its first office in his hometown of Jalandhar, India after dropping out of college. Shoor learned to program when he was 13 years old, and started work on Kayako at the age of 17. Kayako is bootstrapped and has not taken any external investment, which is rare for a Software as a Service (SaaS) startup. However, in 2014, Kayako was reported to be in talks with Helion Venture Partners to raise investment. Viber website compromise In July 2013, Viber's online help desk, hosted by Kayako, was hacked and defaced by the Syrian Electronic Army. Viber determined that the compromise was related to a compromise of an individual's account password, and not a security vulnerability in the Kayako application itself. ESW Capital acquisition On 14 February 2018, Kayako announced that it had been acquired by ESW Capital, a private equity firm based in Austin, Texas that owns Trilogy (company) to "further invest in creating a unified support experience centered around an integrated chat platform". References External links Bug and issue tracking software Help desk Business software companies Customer relationship management software companies Customer relationship manageme
https://en.wikipedia.org/wiki/Nuclear%20island%20basemat
The nuclear island basemat is a cast-in-place reinforced concrete foundation, about 6-foot-thick which serves to support the nuclear island structures. Nuclear island structures consist of the reactor containment building (RCB), the shield building and auxiliary building (turbine building, control building and other). For ease of construction the basemat is built on a mudmat, which is made of lean concrete that rests upon the load-bearing soil. The nuclear island basemat's most important role is compliance with earthquake response, requiring that nuclear plants, to be designed so that, if an earthquake occurs strong enough to trigger a safe-shutdown, the nuclear island structures should continue to function within the applicable stress limits. The required functions of the nuclear island structures must be assured during and after the earthquake vibratory ground motion. References External links SC Wall Piers and Basemat Connections: Numerical Investigation of Behavior and Design Investigation of stress reduction effect on structures due to basemat uplift using energy concept IAEA Nuclear Energy Series ~ Construction Technologies for Nuclear Power Plants (No. NP-T-2.5) by International Atomic Energy Agency Earthquake and seismic risk mitigation Earthquake engineering Shallow foundations Nuclear safety and security
https://en.wikipedia.org/wiki/History%20of%20email
The history of email entails an evolving set of technologies and standards that culminated in the email systems in use today. Computer-based messaging between users of the same system became possible following the advent of time-sharing in the early 1960s, with a notable implementation by MIT's CTSS project in 1965. Informal methods of using shared files to pass messages were soon expanded into the first mail systems. Most developers of early mainframes and minicomputers developed similar, but generally incompatible, mail applications. Over time, a complex web of gateways and routing systems linked many of them. Some systems also supported a form of instant messaging, where sender and receiver needed to be online simultaneously. In 1971 the first ARPANET network mail was sent, introducing the now-familiar address syntax with the '@' symbol designating the user's system address. Over a series of RFCs, conventions were refined for sending mail messages over the File Transfer Protocol. Several other email networks developed in the 1970s and expanded subsequently. Proprietary electronic mail systems began to emerge in the 1970s and early 1980s. IBM developed a primitive in-house solution for office automation over the period 1970–1972, and replaced it with OFS (Office System), providing mail transfer between individuals, in 1974. This system developed into IBM Profs, which was available on request to customers before being released commercially in 1981. CompuServe began offering electronic mail designed for intraoffice memos in 1978. The development team for the Xerox Star began using electronic mail in the late 1970s. Development work on DEC's ALL-IN-1 system began in 1977 and was released in 1982. Hewlett-Packard launched HPMAIL (later HP DeskManager) in 1982, which became the world's largest selling email system. The Simple Mail Transfer Protocol (SMTP) protocol was implemented on the ARPANET in 1983. LAN email systems emerged in the mid-1980s. For a time in the
https://en.wikipedia.org/wiki/Google%20URL%20Shortener
Google URL Shortener, also known as goo.gl, was a URL shortening service owned by Google. It was launched in December 2009, initially used for Google Toolbar and Feedburner. The company launched a separate website, goo.gl, in September 2010. Google has replaced the service internally with Firebase Dynamic Links which is now used to shorten links for Google Maps and Google Workspace products. The user could access a list of URLs that had been shortened in the past after logging in to their Google Account. Real-time analytics data, including traffic over time, top referrers, and visitor profiles was recorded. For security, Google added automatic spam system detection based on the same type of filtering technology used in Gmail. The service has not been accepting new users since April 13, 2018 and Google discontinued the service for existing users on March 30, 2019. Links previously created still redirect to their previous destination. It was succeeded by Firebase Dynamic Links, but existing links did not become Dynamic Links automatically. References URL Shortener URL Shortener URL-shortening services Internet properties established in 2009 Internet properties disestablished in 2019 Defunct American websites
https://en.wikipedia.org/wiki/Age-related%20mobility%20disability
Age-related mobility disability is a self-reported inability to walk due to impairments, limited mobility, dexterity or stamina. It has been found mostly in older adults with decreased strength in lower extremities. History According to the National Research Council, the population of older adults is expected to increase in the United States by 2030 due to the aging population of the baby boomer generation; this will increase the population of mobility disabled individuals in the community. This raises the importance of being able to predict disability due to inability to walk at an early stage, which will eventually decrease health care costs. Aging cause a decrease in physical strength and in lower extremities which ultimately leads to decrease in functional mobility, in turn leading to disability which is shown to be common in women due to differences in distribution of resources and opportunities. The early detection of mobility disabilities will help clinicians and patients in determining the early management of the conditions which could be associated with the future disability. Mobility disabilities are not restricted to older and hospitalized individuals; such disabilities have been reported in young and non-hospitalized individuals as well due to decreased functional mobility. The increase in the rate of disability causes loss of functional independence and increases the risk of future chronic diseases. Definition Mobility is defined as the ability to move around, and mobility disability occurs when a person has problems with activities such as walking, standing up, or balancing. The use of a mobility aid device such as a mobility scooter, wheelchair, crutches or a walker can help with community ambulation. Another term that is coined to define mobility disabilities based on performance is "performance based mobility disability". It is the inability to increase your walking speed more than 0.4 m/s. An individual who is unable to walk at >0.4 m/s is co
https://en.wikipedia.org/wiki/MIPS%20architecture%20processors
Since 1985, many processors implementing some version of the MIPS architecture have been designed and used widely. MIPS microprocessors The first MIPS microprocessor, the R2000, was announced in 1985. It added multiple-cycle multiply and divide instructions in a somewhat independent on-chip unit. New instructions were added to retrieve the results from this unit back to the processor register file; these result-retrieving instructions were interlocked. The R2000 could be booted either big-endian or little-endian. It had thirty-one 32-bit general purpose registers, but no status register (condition code register (CCR), the designers considered it a potential bottleneck), a feature it shares with the AMD 29000, the DEC Alpha, and RISC-V. Unlike other registers, the program counter is not directly accessible. The R2000 also had support for up to four co-processors, one of which was built into the main central processing unit (CPU) and handled exceptions, traps and memory management, while the other three were left for other uses. One of these could be filled by the optional R2010 floating-point unit (FPU), which had thirty-two 32-bit registers that could be used as sixteen 64-bit registers for double-precision. The R3000 succeeded the R2000 in 1988, adding 32 KB (soon raised to 64 KB) caches for instructions and data, and support for shared-memory multiprocessing in the form of a cache coherence protocol. While there were flaws in the R3000s multiprocessing support, it was successfully used in several successful multiprocessor computers. The R3000 also included a built-in memory management unit (MMU), a common feature on CPUs of the era. The R3000, like the R2000, could be paired with a R3010 FPU. The R3000 was the first successful MIPS design in the market, and eventually over one million were made. A faster version of the R3000 running up to 40 MHz, the R3000A delivered a performance of 32 million instructions per second (MIPS), or VAX Unit of Performance (VUPs)
https://en.wikipedia.org/wiki/Endless%20runway
An endless runway is an aircraft runway which loops around to form a shape such as a circle. There were experiments with this concept in the 1960s and it is now being researched at the Nederlands Lucht- en Ruimtevaartcentrumthe national aerospace laboratory of the Netherlands. History With the birth of aviation, the thought of taking a car to the office became old-style and soon people started to invent ways to take the airplane to the office. In an article in "Popular Science" from 1919, a circular runway was designed on top of some skyscrapers in New York, where one of the buildings would serve the purpose of aircraft parking. A design was made for a circular runway on the roof of Kings Cross railway station in London. In the 1960s, the idea was taken up by a marine officer, who actually performed a number of take-offs and landings with aircraft at a circular track designed for testing cars. This work stimulated a large number of patents with runways shaped as circles or ovals and often straight tracks attached to it for taking off and landing. In the 2010s, the idea was studied by a European consortium led by an engineer at the Royal Netherlands Aerospace Centre. Their plans for a pilot included a smaller circular runway for delivery drones. Safety issues Increased runway width. Instrument Landing System can be used for the straight approach but will require modification or a new system to cope with the curving runway. Water will run off the banked runway better than at present. Use of residual heat from car parks and offices could be used to heat the runway to reduce ice. References External links Video link of proposed runway Airport engineering
https://en.wikipedia.org/wiki/Geochore
Geochores (Greek gé "the earth" and chora "area") are relatively large landscape areas with similar – but owing to their size not fully uniform – characteristics. They therefore consist of a tapestry of smaller landscape units, which can be hierarchically grouped: Physiotopes or geotopes form the base unit (tope from the Greek, τόπος, "place"). These are objects whose features are assessed as homogenous and which cannot sensibly be subdivided into smaller landscapes. Their area depends on the distribution pattern of their features and on the purpose or aim of the classification, but in general they are between 0.1 and 5 hectares in area. Nanogeochores or nanochores are the simplest level of physiotopes. Example: Ameisenberg near Oybin is part of the Oybin Rock Region (microgeochore) Microgeochores are small scale landscape units with an average area of 12 km2. In terms of biotopes or woodland or agricultural land which is managed in a certain way, they form a tapestry of nanogeochores. They cover areas which are similar mainly in terms of their geological origins, rocks, topographical elevation or relief energy. They are a good example of the how geological and topographical history affects the resulting landscape structure. Example: Hochwald Ridge and Oybin Rock Region Mesogeochores are simply formations and groups of microgeochores. Their association is based on similarities of climate, topography such as mountains, valleys and hills or associated features from the Pleistocene (ice age). They are oriented towards the management and relative size of the microgeochores of which they comprise. Example: Zittau Mountains or Zittau Basin Macrogeochores or major landscapes - as natural region major units - are simply groupings of mesogeochores, whose cohesiveness is based e.g. on geological foundations, on climatic conditions or vegetation (e. g. hpnV). They are "regional" in size. Example: Lusatian Mountains or Upper Lusatian Highlands. Literature Haase, G.
https://en.wikipedia.org/wiki/Institution%20of%20Metallurgists
The Institution of Metallurgists was a British professional association for metallurgists, largely involved in the iron and steel industry. History It was founded in 1945. The inaugural meeting was held on 28 November 1945; the organization was formed by the Iron and Steel Institute and the Institute of Metals. The International Iron and Steel Institute was formed in 1967, which is now the World Steel Association. by the late 1960s the Institution had around 10,000 metallurgists. It was involved in the formation of the Association of Professional Scientists and Technologists (APST) in 1971, which was formed as a result of the Industrial Relations Act 1971. Education In September 1965, Ordinary National Certificates in science were introduced, in consultation with the Institution, the Royal Institute of Chemistry, the Institute of Physics, the Physical Society, the Institute of Biology, and the Mathematical Association. In January 1969, these same set of institutions set up the Council of Science and Technology Institutes (CSTI), which ended up as the Science Council in 2003. Royal Charter It was given a Royal Charter in 1975. In 1977 it became the sixteenth constituent of the •Council of Engineering Institutions, which became the Engineering Council in 1981. Merger It merged with the Metals Society to become Institute of Metals on 1 January 1985. Structure In the 1960s it was headquartered at 17 Belgrave Square in the City of Westminster. In the 1970s it moved to Northway House on the A1000 (High Road) in north London. Registrar-Secretaries Arthur Merriman 1946-57 Terry Marsden 1976-81 Presidents Source: The Institute of Materials, Minerals and Mining See also Institution of Mining and Metallurgy Institute of Metallurgical Technicians References 1945 establishments in the United Kingdom 1984 disestablishments in the United Kingdom Defunct professional associations based in the United Kingdom Metallurgical organizations Organisations based in the Cit
https://en.wikipedia.org/wiki/Pui-Kuen%20Yeung
Pui-Kuen Yeung (P.K. Yeung) is an engineer and academic. Education Yeung earned his Bachelor of Science in mechanical engineering followed by a Master of Philosophy in 1984, both from the University of Hong Kong. He then went on to do his PhD at Cornell University under Stephen B. Pope. His work culminated with the publication of his thesis titled "A Study of Lagrangian Statistics in Stationary Isotropic Turbulence Using Direct Numerical Simulations" in 1989. Career Yeung joined the faculty of the Georgia Institute of Technology in 1992. In 2006, he was elected a fellow of the American Physical Society "[f]or or insightful contributions to the understanding and modeling of similarity scaling in turbulence and the mixing of passive scalars, especially the study of Lagrangian statistics and dispersion in turbulence through high-resolution simulations addressing Reynolds number and Schmidt number dependencies." References Fellows of the American Physical Society Georgia Tech faculty Living people Year of birth missing (living people) Hong Kong expatriates in the United States Hong Kong engineers Cornell University alumni
https://en.wikipedia.org/wiki/Zen%2B
Zen+ is the codename for a computer processor microarchitecture by AMD. It is the successor to the first gen Zen microarchitecture, and was first released in April 2018, powering the second generation of Ryzen processors, known as Ryzen 2000 for mainstream desktop systems, Threadripper 2000 for high-end desktop setups and Ryzen 3000G (instead of 2000G) for accelerated processing units (APUs). Features Zen+ uses GlobalFoundries' 12 nm fabrication process, an optimization of the 14 nm process used for Zen, with only minor design rule changes. This means that the die sizes between Zen and Zen+ are identical as AMD chose to use the new smaller transistors to increase the amount of empty space, or "dark silicon", between the various features on the die. This was done to improve power efficiency & reduce thermal density to allow for higher clock speeds, rather than design an entirely new floorplan for a physically smaller die (which would have been significantly more work and thus more expensive). These process optimizations allowed 12 nm Zen+ to clock about +250 MHz (≈6%) higher, or to lower power consumption when at the same frequency by 10%, when compared to their prior 14 nm Zen products. Although conversely at the microarchitecture level, Zen+ had only minor revisions versus Zen. Known changes to the microarchitecture include improved clock speed regulation in response to workload ("Precision Boost 2"), reduced cache and memory latencies (some significantly so), increased cache bandwidth, and finally improved IMC performance allowing for better DDR4 memory support (officially JEDEC rated to support up to 2933 MHz compared to just 2666 MHz on the prior Zen core). Zen+ also supports improvements in the per-core clocking features, based on core utilization and CPU temperatures. These changes to the core utilization, temperature, and power algorithms are branded as "Precision Boost 2" and "XFR2" ("eXtended Frequency Range 2"), evolutions of the first-generation techno
https://en.wikipedia.org/wiki/Code%20Shikara
Code Shikara is a computer worm, related to the Dorkbot family, that attacks through social engineering. Timeline In 2011, the Code was first identified by the Danish cyber security company CSIS. The AV-company Sophos reported in November 2011 that this threat mainly spreads itself through malicious links through the social network Facebook. In 2013, Bitdefender Labs caught and blocked the worm, which is capable of spying on users' browsing activities, meanwhile stealing their personal online/offline information and/or credentials, commonly known as cybercrime. The infection was originally flagged by the online backup service MediaFire, who detected that the worm was being distributed camouflaged as an image file. Despite the misleading extension, MediaFire successfully identified the malicious image as an .exe-file. The malicious Shikara Code poses as a .jpeg image, but is indeed an executable file. As an IRC bot, the malware is simply integrated by the attackers from a control and command server. Besides stealing usernames and passwords, the bot herder may also order additional malware downloads. MediaFire had then taken steps to address incorrect and misleading file extensions in an update, which identified and displayed a short description by identifying specific file types. To help users for this specific threat, the file sharing service also blocked files with double extensions, such as .jpg.exe, .png.exe, or .bmp.exe. Just like usual malware, the Backdoor.IRCBot.Dorkbot can update itself once installed on the victim's computer or other related devices. The biggest risk is that someone's Facebook contacts may have had their account already compromised (due to sloppy password security, or granting access to a rogue application) and that the account user has been allured by clicking on a link seemingly posted by one of their friends. Although the links pretend to point to an image, the truth is that a malicious screensaver is hidden behind an icon of two b
https://en.wikipedia.org/wiki/Phylosymbiosis
In the field of microbiome research, a group of species is said to show a phylosymbiotic signal if the degree of similarity between the species' microbiomes recapitulates to a significant extent their evolutionary history. In other words, a phylosymbiotic signal among a group of species is evident if their microbiome similarity dendrogram could prove to have significant similarities with their host's phylogenic tree. For the analysis of the phylosymbiotic signal to be reliable, environmental differences that could shape the host microbiome should be either eliminated or accounted for. One plausible mechanistic explanation for such phenomena could be, for example, a result of host immune genes that rapidly evolve in a continuous arms race with members of its microbiome. In animals Across the animal kingdom there are many notable examples of phylosymbiosis. For instance, in non-human primates it was found that host evolutionary history had a substantially greater influence on the gut microbiome than either host dietary niche or geographic location. It was speculated that changes in gut physiology within the evolutionary history of non-human primates was the primary reason. This finding was particularly interesting as it contradicted previous research which reported that dietary niche was a strong factor in determining the gut microbiome of mammals. Plants Phylosymbiosis has been reported in several plant groups including Malus and Poaceae. In the former case, Malus species, including wild and domesticated cultivars, harbored endophytic communities that corresponded to their phylogenetic relationship. See also Microbial ecology Microbiome References Phylogenetics Evolution Metagenomics
https://en.wikipedia.org/wiki/Amazon%20Lex
Amazon Lex is a service for building conversational interfaces into any application using voice and text. It powers the Amazon Alexa virtual assistant. In April 2017, the platform was released to the developer community, and suggested that it could be used for conversational interfaces (chatbots or otherwise) including Web, mobile apps, robots, toys, drones, and more. Amazon already had launched Alexa Voice Services, which developers can use to integrate Alexa into their own devices, like smart speakers, alarm clocks, etc.; however, Lex will not require that end users interact with the Alexa assistant per se, but rather any type of assistant or interface. As of February 2018, users can now define a response for Amazon Lex chatbots directly from the AWS management console. References External links Natural language processing software Amazon (company) Software developer communities
https://en.wikipedia.org/wiki/WeChat%20Pay
WeChat Pay (), officially referred to as Weixin Pay in China, is a mobile payment and digital wallet service by WeChat based in China that allows users to make mobile payments and online transactions. As of March 2016, WeChat Pay had over 300 million users. WeChat Pay's main competitor in China and the market leader in online payments is Alibaba Group's Alipay. Alibaba company founder Jack Ma considered the red envelope feature to be a "Pearl Harbor moment", as it began to erode Alipay's historic dominance in the online payments industry in China, especially in peer-to-peer money transfer. The success prompted Alibaba to launch its own version of virtual red envelopes in its competing Laiwang service. Other competitors, Baidu Wallet and Sina Weibo, also launched similar features. WeChat Pay statistics - WeChat Pay reached 1.133 billion active users in 2023. Service Users who have provided their bank account information can utilize the app for various financial transactions such as paying bills, making purchases, transferring money to other users, and even conducting in-store payments if the stores support WeChat payment. These services are offered by verified third-party entities called "official accounts," which create mini-programs or "apps within the app" to provide specific functionalities. Users can link their Chinese bank accounts to enable seamless transactions through the Visa, MasterCard and JCB. WeChat Pay () is a digital wallet service incorporated into WeChat, which allows users to perform mobile payments and send money between contacts. Now, WeChat Pay has six different payment products: Quick Payment, QR Code Payment, Mini Program Payment, Official Account Payment, In-APP Payment, and Web Payment. Although users receive immediate notification of the transaction, the WeChat Pay system is not an instant payment instrument, because the funds transfer between counterparts is not immediate. The settlement time depends on the payment method chosen by th
https://en.wikipedia.org/wiki/Evolutionary%20models%20of%20food%20sharing
Evolutionary biologists have developed various theoretical models to explain the evolution of food-sharing behavior—"[d]efined as the unresisted transfer of food" from one food-motivated individual to another—among humans and other animals. Models of food-sharing are based upon general evolutionary theory. When applied to human behavior, these models are considered a branch of human behavioral ecology. Researchers have developed several types of food-sharing models, involving phenomena such as kin selection, reciprocal altruism, tolerated theft, group cooperation, and costly signaling. Kin-selection and reciprocal-altruism models of food-sharing are based upon evolutionary concepts of kin selection and altruism. Since the theoretical basis of these models involves reproductive fitness, one underlying assumption of these models is that greater resource-accumulation increases reproductive fitness. Food-sharing has been theorized as an important development in early human evolution. Kin selection models W. D. Hamilton was among the first to propose an explanation for natural selection of altruistic behaviors among related individuals. According to his model, natural selection will favor altruistic behavior towards kin when the benefit (as a contributing factor to reproductive fitness) towards the recipient (scaled based upon Wright's coefficient of genetic relatedness between donor and recipient) outweighs the cost of giving. In other words, kin selection implies that food will be given when there is a great benefit to the recipient with low cost to the donor. An example of this would be sharing food among kin during a period of surplus. The implications of kin-selection is that natural selection will also favor the development of ways of determining kin from non-kin and close kin from distant kin. When Hamilton's rule is applied to food-sharing behavior, a simple expectation of the model is that close kin should receive food shares either more frequently or in lar
https://en.wikipedia.org/wiki/S%C4%81dhan%C4%81%20%28journal%29
Sādhanā – Academy Proceedings in Engineering Sciences, is a monthly peer-reviewed scientific journal published by Springer Science+Business Media on behalf of the Indian Academy of Sciences. It was established in 1978 and covers all branches of engineering and applied science. Abstracting and indexing The journal is abstracted and indexed in several databases including: Science Citation Index Scopus SPIRES Inspec Zentralblatt MATH Chemical Abstracts Service According to the Journal Citation Reports, the journal had a 2015 impact factor of 0.769. See also Pramana References External links Engineering journals English-language journals Monthly journals Academic journals established in 1978 Springer Science+Business Media academic journals
https://en.wikipedia.org/wiki/IOS%2011
iOS 11 is the eleventh major release of the iOS mobile operating system developed by Apple Inc., being the successor to iOS 10. It was announced at the company's Worldwide Developers Conference on June 5, 2017, and released on September 19, 2017. It was succeeded by iOS 12 on September 17, 2018. Overview iOS 11 was introduced at the Apple Worldwide Developers Conference keynote address on June 5, 2017. The first developer beta version was released after the keynote presentation, with the first public beta released on June 26, 2017. iOS 11 was officially released by Apple on September 19, 2017. It brought many changes to iOS. Some major highlights were: The lock screen and Notification Center were combined, allowing all notifications to be displayed directly on the lock screen. The control center was completely redesigned, combining all pages into a single unified page. It also brought the ability to rearrange the position of the controls, some of which could be used with 3D Touch for quick access to additional options. The App Store received its first major design overhaul since iOS 7 to focus on editorial content and daily highlights. A "Files" file manager app allowed access to files stored locally on-device and in iCloud and other cloud services. With this addition, users could also for the first time save files downloaded using Safari right on their iPhone without any third-party apps. Siri was updated to translate between languages and use a privacy-minded "on-device learning" technique to better understand a user's interests and offer suggestions. The camera introduced new settings for improved portrait-mode photos and utilized new encoding technologies to reduce file sizes on newer devices. In a later release of iOS 11, Messages was integrated with iCloud to better synchronize messages across iOS and macOS devices. A previous point release also added support for person-to-person Apple Pay payments. It introduced the ability to record the screen,
https://en.wikipedia.org/wiki/Vladislav%20Horohorin
Vladislav Anatolievich Horohorin, (), alias BadB, is a former hacker and international credit card trafficker who was convicted of wire fraud and served a seven-year prison sentence. Early life Horohorin was born on September 29, 1982, and grew up in Donetsk, Ukraine, emigrating in 1999 to Israel with his mother, where he served in the Israeli Defence Forces. Investigation According to the undercover investigation led by the United States Secret Service, Horohorin was one of the founders of CarderPlanet, one of several websites taken down in 2004, as part of the Secret Service's Operation Firewall investigation. The web sites were operated by cyber criminal organizations to traffic counterfeit credit cards, and false identification information and documents. These websites not only shared information on how to commit fraud, but also provided a forum through which to purchase fraud-related information and tools. "The network created by the founders of CarderPlanet, including Vladislav Horohorin, remains one of the most sophisticated organizations of online financial criminals in the world," said Michael Merritt, Assistant Director for Investigations. "This network has been repeatedly linked to nearly every major intrusion of financial information reported to the international law enforcement community. This arrest illustrates the significance of the Secret Service's commitment to traversing the globe in pursuit of online criminals." Horohorin promoted his illegal activities by creating video cartoons ridiculing American card holders. Separately, in 2013, Horohorin was named co-conspirator in an indictment, but was not subsequently charged, in a criminal case in District of New Jersey 09-626 (JBS), in which other Russian individuals were charged with successfully hacking Nasdaq, 7-Eleven, Carefour, JCPenney, Heartland Payment Systems, Dow Jones, Jetblue and 23 more corporations. This breach was called the "Largest known data breach conspiracy ever prosecuted" b
https://en.wikipedia.org/wiki/Cloud-based%20quantum%20computing
Cloud-based quantum computing is the invocation of quantum emulators, simulators or processors through the cloud. Increasingly, cloud services are being looked on as the method for providing access to quantum processing. Quantum computers achieve their massive computing power by initiating quantum physics into processing power and when users are allowed access to these quantum-powered computers through the internet it is known as quantum computing within the cloud. In 2016, IBM connected a small quantum computer to the cloud and it allows for simple programs to be built and executed on the cloud. In early 2017, researchers from Rigetti Computing demonstrated the first programmable cloud access using the . Many people from academic researchers and professors to schoolkids, have already built programs that run many different quantum algorithms using the program tools. Some consumers hoped to use the fast computing to model financial markets or to build more advanced AI systems. These use methods allow people outside a professional lab or institution to experience and learn more about such a phenomenal technology. Application Cloud based quantum computing is used in several contexts: In teaching, teachers can use cloud-based quantum computing to help their students better understand quantum mechanics, as well as implement and test quantum algorithms. In research, scientists can use cloud-based quantum resources to test quantum information theories, perform experiments, compare architectures, amongst other things. In games, developers can use cloud-based quantum resources can create quantum games to introduce people to quantum concepts. In digital transformation where terabytes of big data available to process and forecast valuable future outcomes. Used in cloud based quantum app development to build customized applications for small businesses. Existing platforms qBraid Lab by qBraid is a cloud-based platform for quantum computing. It provides software tool
https://en.wikipedia.org/wiki/Injection%20of%20vinylite%20and%20corrosion
Injection of vinylite and corrosion is an anatomical technique used to visualize branching and pathways of the circulatory system. It consists of filling the circulatory system of the piece with vinyl acetate and its use of corrosion technique for the removal of the superposed matter, that is, the organic matter. The technique of vinylite followed by corrosion, besides having low cost, provides a long period of conservation, satisfying the need of undergraduate students as the study of anatomy. The technique of filling by vinilite is considered an angiotechnical, which consists of the study of blood vessels. This is used to mark the circulatory system (arterial and venous) with the use of pre-pigmented vinyl acetate to fill the vessels of the part to be studied in order to be able to visualize the ducts and duly filled systems. For corrosion or semi-corrosion, hydrochloric acid is the most viable substance used to obtain templates for the vascularization of organs or parts. Gallery References Anatomy Anatomical preservation
https://en.wikipedia.org/wiki/Proof%20of%20secure%20erasure
In computer security, proof of secure erasure (PoSE) or proof of erasure is a remote attestation protocol, by which an embedded device proves to a verifying party, that it has just erased (overwritten) all its writable memory. The purpose is to make sure that no malware remains in the device. After that typically a new software is installed into the device. Overview The verifying party may be called the verifier, the device being erased the prover. The verifier must know the device's writable memory size from a trusted source and the device must not be allowed to communicate with other parties during execution of the protocol, which proceeds as follows. The verifier constructs a computational problem, which cannot be solved (in reasonable time or at all) using less than the specified amount of memory, and sends it to the device. The device responds with the solution and the verifier checks its correctness. Protocol constructions Naive approach In the simplest implementation the verifier sends a random message as large as the device's memory to the device, which is expected to store it. After the device has received the complete message, it is required to send it back. Security of this approach is obvious, but it includes transfer of a huge amount of data (twice the size of the device's memory). This can be halved if the device responds with just a hash of the message. To prevent the device from computing it on the fly without actually storing the message, the hash function is parametrized by a random value sent to the device after the message. Communication-efficient constructions Avoiding the huge data transfer requires a suitable (as stated in Overview) computational problem, whose description is short. Dziembowski et al. achieve this by constructing what they call an (m − δ, ε)-uncomputable hash function, which can be computed in quadratic time using memory of size m, but with memory of size m − δ it can be computed with at most a negligible probability ε
https://en.wikipedia.org/wiki/Action%20potential%20pulse
An action potential pulse is a mathematically and experimentally correct Synchronized Oscillating Lipid Pulse coupled with an Action Potential. This is a continuation of Hodgkin Huxley's work in 1952 with the inclusion of accurately modelling ion channel proteins, including their dynamics and speed of activation. The action potential pulse is a model of the speed an action potential that is dynamically dependent upon the position and number of ion channels, and the shape and make up of the axon. The action potential pulse model takes into account entropy and the conduction speed of the action potential along an axon. It is an addition to the Hodgkin Huxley model. Investigation into the membranes of axons have shown that the spaces in between the channels are sufficiently large, such that cable theory cannot apply to them, because it depends upon the capacitance potential of a membrane to be transferred almost instantly to other areas of the membrane surface. In electrical circuits this can happen because of the special properties of electrons, which are negatively charged, whereas in membrane biophysics potential is defined by positively charged ions instead. These ions are usually Na1+ or Ca2+, which move slowly by diffusion and have limited ionic radii in which they can affect adjacent ion channels. It is mathematically impossible for these positive ions to move from one channel to the next, in the time required by the action potential flow model, due to instigated depolarization. Furthermore entropy measurements have long demonstrated that an action potential's flow starts with a large increase in entropy followed by a steadily decreasing state, which does not match the Hodgkin Huxley theory. In addition a soliton pulse is known to flow at the same rate and follow the action potential. From measurements of the speed of an action potential, hyperpolarization must have a further component of which the 'soliton' mechanical pulse is the only candidate. The resulti
https://en.wikipedia.org/wiki/Actions%20on%20Google
Actions on Google is a development platform for the Google Assistant. It allows the third-party development of "actions"—applets for the Google Assistant that provide extended functionality. Interface The actions platform supports "direct" actions, as well as "conversational" actions for more complex applications. More advanced developers are able to develop directly against the API, and a SDK for Node.js is also available. As of April 2017 there were more than 175 Actions for Google Assistant, including ones from Uber, The Motley Fool, NPR One, NBC News, and Domino's Pizza. The availability was further extended beyond the Google Home space into Android and iOS. References External links Official Website Web development software Natural language processing software Software developer communities Google software
https://en.wikipedia.org/wiki/Total%20operating%20characteristic
The total operating characteristic (TOC) is a statistical method to compare a Boolean variable versus a rank variable. TOC can measure the ability of an index variable to diagnose either presence or absence of a characteristic. The diagnosis of presence or absence depends on whether the value of the index is above a threshold. TOC considers multiple possible thresholds. Each threshold generates a two-by-two contingency table, which contains four entries: hits, misses, false alarms, and correct rejections. The receiver operating characteristic (ROC) also characterizes diagnostic ability, although ROC reveals less information than the TOC. For each threshold, ROC reveals two ratios, hits/(hits + misses) and false alarms/(false alarms + correct rejections), while TOC shows the total information in the contingency table for each threshold. The TOC method reveals all of the information that the ROC method provides, plus additional important information that ROC does not reveal, i.e. the size of every entry in the contingency table for each threshold. TOC also provides the popular area under the curve (AUC) of the ROC. TOC is applicable to measure diagnostic ability in many fields including but not limited to: land change science, medical imaging, weather forecasting, remote sensing, and materials testing. Basic concept The procedure to construct the TOC curve compares the Boolean variable to the index variable by diagnosing each observation as either presence or absence, depending on how the index relates to various thresholds. If an observation's index is greater than or equal to a threshold, then the observation is diagnosed as presence, otherwise the observation is diagnosed as absence. The contingency table that results from the comparison between the Boolean variable and the diagnosis for a single threshold has four central entries. The four central entries are hits (H), misses (M), false alarms (F), and correct rejections (C). The total number of observatio
https://en.wikipedia.org/wiki/Optomechatronics
In engineering, optomechatronics is a field that investigates the integration of optical components and technology into mechatronic systems. The optical components in these systems are used as sensors to measure mechanical quantities such as surface structure and orientation. Optical sensors are used in a feedback loop as part of control systems for mechatronic devices. Optomechatronics has applications in areas such as adaptive optics, vehicular automation, optofluidics, optical tweezers and thin-film technology. References External links International Society for Optomechatronics International Journal of Optomechatronics Electromechanical engineering Optical metrology
https://en.wikipedia.org/wiki/InspectIT
inspectIT is an open-source application performance management (APM) tool, which enables the diagnosis, analysis and monitoring of Java applications. inspectIT is developed by NovaTec Consulting GmbH, an IT consulting company from Stuttgart (Germany), but it has been made open-source in August 2015. Functionality inspectIT follows a "user-transaction-centered” approach, whereby the focus is on the analysis of concrete user requests. For each request against a system which is supervised by inspectIT, a detailed call tree, named invocation sequence, is constructed. The invocation sequences contain the exact execution times of all invocations of instrumented methods. Using this information, user requests can be analyzed and root causes of potential problems can be discovered. Also included in the invocation sequences are all requests against databases which can be used to detect and solve problems in the database access layer or certain queries. Since version 1.8.1, inspectIT offers functionality for real user monitoring that records user interaction with, for example, a website or web-based application. Architecture The architecture of inspectIT consists of three main components: inspectIT Agent — it is integrated into the system which should be supervised, collects diagnostic information of the integrated measuring points and sends the gathered data to the central inspectIT Server. The agent is designed to introduce as little as possible overhead into the target system, in terms of CPU and memory usage. inspectIT Server (also called centralized measurement repository (CMR)) — it receives, processes and stores the diagnostic information sent by the inspectIT agents and provides it to the inspectIT user interface. inspectIT User Interface - it is an Eclipse RPC based application and enables the analysis of the diagnostic information provided by the inspectIT Server. Functioning During the Java class loading process of the JVM, a Java-based agent is integrated
https://en.wikipedia.org/wiki/FinalCode
FinalCode, Inc. is a multi-national software company that provides data-centric security and information rights management (IRM) to help enterprises mitigate data leakage and meet compliance requirements. FinalCode allows users to securely collaborate and share files using any communication channel, including existing Enterprise Content Management (ECM), Cloud Storage and collaboration applications. FinalCode is privately held and headquartered in San Jose, California, with additional offices in Singapore, Japan, Australia and United Kingdom. History FinalCode, Inc was founded in 2014. As part of an international expansion FinalCode opened a regional headquarters in Singapore in May 2016. In September 2016 an additional regional headquarter was opened in London, UK, to cover the EMEA region. FinalCode also has additional offices and presence in Japan and Australia. Features FinalCode provides AES-256 encryption, granular permission sets, corporate and user policy templates, file lifecycle activity analytics, dynamic policy modification, and the ability to remotely delete files after they have been shared. Patented Technology FinalCode's patented CryptoEase technology adds a layer of file protection that remains persistent whether the file circulates internally or outside an organization. Offering a comprehensive file-based Information Rights Management (IRM) that allows organizations and file owner retains comprehensive file control and auditing capability with the means recipients and usage permissions or delete files remotely. Industry Standards FinalCode achieved Federal Information Processing Standards (FIPS) certification for FinalCode Crypto Module and FinalCode Crypto Module for Mobile. FinalCode is also Suite-B compliant. These standards are integrated into the current FinalCode solution. Awards and recognition In 2017, FinalCode was named "Hot Product" at RSA Conference 2017. In 2016, FinalCode earned Ovum "on the radar" award. Gartner desig
https://en.wikipedia.org/wiki/Amino%20acid%20replacement
Amino acid replacement is a change from one amino acid to a different amino acid in a protein due to point mutation in the corresponding DNA sequence. It is caused by nonsynonymous missense mutation which changes the codon sequence to code other amino acid instead of the original. Conservative and radical replacements Not all amino acid replacements have the same effect on function or structure of protein. The magnitude of this process may vary depending on how similar or dissimilar the replaced amino acids are, as well as on their position in the sequence or the structure. Similarity between amino acids can be calculated based on substitution matrices, physico-chemical distance, or simple properties such as amino acid size or charge (see also amino acid chemical properties). Usually amino acids are thus classified into two types: Conservative replacement - an amino acid is exchanged into another that has similar properties. This type of replacement is expected to rarely result in dysfunction in the corresponding protein . Radical replacement - an amino acid is exchanged into another with different properties. This can lead to changes in protein structure or function, which can cause potentially lead to changes in phenotype, sometimes pathogenic. A well known example in humans is sickle cell anemia, due to a mutation in beta globin where at position 6 glutamic acid (negatively charged) is exchanged with valine (not charged). Physicochemical distances Physicochemical distance is a measure that assesses the difference between replaced amino acids. The value of distance is based on properties of amino acids. There are 134 physicochemical properties that can be used to estimate similarity between amino acids. Each physicochemical distance is based on different composition of properties. Grantham's distance Grantham's distance depends on three properties: composition, polarity and molecular volume. Distance difference D for each pair of amino acid i and j is c
https://en.wikipedia.org/wiki/AmigaTeX
The computer program AmigaTeX is a port of Knuth's typesetting program TeX, and was originally written in WEB and translated to C by Tomas Rokicki. This translation was necessary because of the lack of a suitable Pascal compiler for the Amiga computer. Features AmigaTeX has several features not available in standard TeX: ARexx port for example with CygnusEd Preview Interchange File Format graphics integration See also LuaTeX XeTeX References External links Review A Brief History of LaTeX. Demo version TeX Amiga software
https://en.wikipedia.org/wiki/Klavs%20F.%20Jensen
Klavs Flemming Jensen (born August 5, 1952) is a chemical engineer who is currently the Warren K. Lewis Professor at the Massachusetts Institute of Technology (MIT). Jensen was elected a member of the National Academy of Engineering in 2002 for fundamental contributions to multi-scale chemical reaction engineering with important applications in microelectronic materials processing and microreactor technology. From 2007 to July 2015 he was the Head of the Department of Chemical Engineering at MIT. Education and career Jensen received his chemical engineering education from the Technical University of Denmark (M.Sc., 1976) and University of Wisconsin–Madison (PhD, 1980). Jensen's PhD advisor was W. Harmon Ray. In 1980, Jensen became assistant professor of chemical engineering and materials science at the University of Minnesota, before being promoted to associate professor in 1984 and full professor in 1988. In 1989, he moved to the Massachusetts Institute of Technology. At the Massachusetts Institute of Technology, Professor Jensen has been the Joeseph R. Mares Career Development Chair in Chemical Engineering (1989–1994), the Lammot du Pont Professor of Chemical Engineering (1996–2007), and the Warren K. Lewis Professor of Chemical Engineering (2007– present). Klavs served as Head of the MIT Department of Chemical Engineering from 2007–2015. In 2015, Professor Jensen became the founding Chair of the scientific journal Reaction Chemistry and Engineering by the Royal Society of Chemistry focused on bridging the gap between chemistry and chemical engineering. Research Jensen's research revolves around reaction and separation techniques for on-demand multistep synthesis, methods for automated synthesis, and microsystems biological discovery and manipulation. He is considered one of the pioneers of flow chemistry. Jensen, Armon Sharei and Robert S. Langer were the founders of SQZ Biotech. The trio, together with Andrea Adamo, developed the cell squeezing meth
https://en.wikipedia.org/wiki/Institute%20of%20Food%20and%20Radiation%20Biology
Institute of Food and Radiation Biology (IFRB) is a government research institute that studies food preservation methods through irradiation. The institute is part of the Bangladesh Atomic Energy Commission. History The institute was established on 1974 as the Irradiation and Pest Control Research Institute. In 1979 the institute was moved to Atomic Energy Research Establishment and renamed Institute of Food and Radiation Biology. The institute has an irradiation facility that offers its services at subsidized rate to Bangladeshi companies. The institute has a cobalt-60 gamma irradiator that is operated by the Gamma Source Division. References Government agencies of Bangladesh Research institutes in Bangladesh 1974 establishments in Bangladesh Organisations based in Savar Food preservation
https://en.wikipedia.org/wiki/Salted%20squid
Salted squid is squid or cuttlefish cured with dry salt and thus preserved for later consumption. Drying or salting, either with dry salt or with brine is a widely available method of seafood preservation. Salted squid is often mistaken with dried shredded squid, which is specifically shredded and seasoned dried squid. The salted squid production method is similar to salted fish and often considered as a specific variant of salted fish. Salted squid commonly found in coastal Asian countries, especially Indonesia, Malaysia, Thailand, Vietnam, Taiwan, Hong Kong, Southern China, South Korea and Japan. Method The squid meat is washed with dilute brine or seawater, to wash off contaminants on the surface. Draining is followed with salting. The salting process can be done in wet method — by soaking squids in brine solution, or in dry salting — by sprinkling salt upon squids. The process is followed by sun drying. In East Asian countries, such as Japan and China, dried salted squid are usually gutted and flattened prior to sun drying. In Indonesia however, dried salted squid are usually not gutted and remain in its cylindric form. In cuisine In Indonesia, dried salted squid is one of popular processed seafood available in traditional markets. Usually salted dried squid are washed and fried, either deep fried or stir fried, and consumed as a side dish with steamed rice. Stir fried cuttlefish might be cooked in green sambal chili paste. See also Brining Cantonese salted fish Cured fish Ojingeo-jeot Squid as food Notes Food preservation Salted foods Squid dishes
https://en.wikipedia.org/wiki/Cell-based%20models
Cell-based models are mathematical models that represent biological cells as discrete entities. Within the field of computational biology they are often simply called agent-based models of which they are a specific application and they are used for simulating the biomechanics of multicellular structures such as tissues. to study the influence of these behaviors on how tissues are organised in time and space. Their main advantage is the easy integration of cell level processes such as cell division, intracellular processes and single-cell variability within a cell population. Continuum-based models (PDE-based) models have also been developed – in particular, for cardiomyocytes and neurons. These represent the cells through explicit geometries and take into account spatial distributions of both intracellular and extracellular processes. They capture, depending on the research question and areas, ranges from a few to many thousand cells. In particular, the framework for electrophysiological models of cardiac cells is well-developed and made highly efficient using high-performance computing. Model types Cell-based models can be divided into on- and off-lattice models. On-lattice On-lattice models such as cellular automata or cellular potts restrict the spatial arrangement of the cells to a fixed grid. The mechanical interactions are then carried out according to literature-based rules (cellular automata) or by minimizing the total energy of the system (cellular potts), resulting in cells being displaced from one grid point to another. Off-lattice Off-lattice models allow for continuous movement of cells in space and evolve the system in time according to force laws governing the mechanical interactions between the individual cells. Examples of off-lattice models are center-based models, vertex-based models, models based on the immersed boundary method and the subcellular element method. They differ mainly in the level of detail with which they represent the cel
https://en.wikipedia.org/wiki/Chassis%20management%20controller
A chassis management controller (CMC) is an embedded system management hardware and software solution to manage multiple servers, networking, and storage. A CMC can provide a secure browser-based interface that enables an IT system administrator to take inventory, perform configuration and monitoring tasks, remotely power on/off blade servers, and enable alerts for events on servers or components in the blade chassis. It has its own microprocessor and memory and is powered by the modular chassis it is plugged into. The inventory of hardware components is built-in and a CMC has a dedicated internal network. The blade enclosure, which can hold multiple blade servers, provides power, cooling, various interconnects, and additional systems management capabilities. Unlike a tower or rack server, a blade server cannot run by itself; it requires a compatible blade enclosure. References Embedded systems