source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Near%20letter-quality%20printing
Near letter-quality (NLQ) printing is a process where dot matrix printers produce high-quality text by using multiple passes to produce higher dot density. The tradeoff for the improved print quality is reduced printing speed. Software can also be used to produce this effect. The term was coined in the 1980s to distinguish NLQ printing from true letter-quality printing, as produced by a printer based on traditional typewriter technology such as a daisy wheel, or by a laser printer. In 1985 The New York Times described the marketing of printers with the terms "near letter-quality, or N.L.Q." as "just a neat little bit of hype", but acknowledged that they "really show their stuff in the area of fonts, print enhancements and graphics". Technology overview Near letter-quality is a form of impact dot matrix printing. What The New York Times called "dot-matrix impact printing", was deemed almost good enough to be used in a business letter Reviews in the later 1980s ranged from "good but not great" to "endowed with a simulated typewriter-like quality". By using multiple passes of the carriage, and higher dot density, the printer could increase the effective resolution. For example, the Epson FX-86 could achieve a theoretical addressable dot-grid of 240 by 216 dots/inch using a print head with a vertical dot density of only 72 dots/inch, by making multiple passes of the print head for each line. For 240 by 144 dots/inch, the print head would make one pass, printing 240 by 72 dots/inch, then the printer would advance the paper by half of the vertical dot pitch (1/144 inch), then the print head would make a second pass. For 240 by 216 dots/inch, the print head would make three passes with smaller paper movement (1/3 vertical dot pitch, or 1/216 inch) between the passes. To cut hardware costs, some manufacturers merely used a double strike (doubly printing each line) to increase the printed text's boldness, resulting in bolder but still jagged text. In all cases, NLQ mod
https://en.wikipedia.org/wiki/Essential%20Biodiversity%20Variables
Essential Biodiversity Variables (EBVs) is a putative set of parameters intended to be the minimum set of broadly agreed upon necessary and sufficient biodiversity variables for at least national to global monitoring, researching, and forecasting of biodiversity. They are being developed by an interdisciplinary group of governmental and academic research partners. The initiative aims for a harmonised global biodiversity monitoring system. EBVs would be used to inform biodiversity change indicators, such as the CBD Biodiversity Indicators for the Aichi Targets. The concept is partly based on the earlier Essential Climate Variables. It can be generalised as the minimum set of variables for describing and predicting a system's state and dynamics. Areas with more developed EV lists include climate, ocean, and biodiversity. EBV Classes / Categories The current candidate EBVs occupy six classes of Essential Biodiversity Variable: genetic composition, species populations, species traits, community composition, ecosystem structure, and ecosystem function. Within each class are a few to several variables. Associated projects and organisations As of 2017, participants in the project consist of the GlobDiversity project (funded by the European Space Agency) under GEO BON (Group on Earth Observations Biodiversity Observation Network; a cooperative project of international universities), and the GLOBIS-B project (Global Infrastructures for Supporting Biodiversity Research; funded by the EU Horizon 2020 programme) Development The concept was first proposed in 2012 and developed in the following years. The GLOBIS-B global cooperation project, aimed to advance the challenge of practical implementation of EBVs by supporting interoperability and cooperation activities among diverse biodiversity infrastructures, started in 2015. The GlobDiversity project of GEO BON, led by the University of Zurich, started in 2017, focusing on specification and engineering of three RS-enabled
https://en.wikipedia.org/wiki/Max%20Noether%27s%20theorem%20on%20curves
In algebraic geometry, Max Noether's theorem on curves is a theorem about curves lying on algebraic surfaces, which are hypersurfaces in P3, or more generally complete intersections. It states that, for degree at least four for hypersurfaces, the generic such surface has no curve on it apart from the hyperplane section. In more modern language, the Picard group is infinite cyclic, other than for a short list of degrees. This is now often called the Noether-Lefschetz theorem. Algebraic geometry
https://en.wikipedia.org/wiki/Static%20synchronous%20series%20compensator
A static synchronous series compensator (SSSC) is a type of flexible AC transmission system which consists of a solid-state voltage source inverter coupled with a transformer that is connected in series with a transmission line. This device can inject an almost sinusoidal voltage in series with the line. This injected voltage could be considered as an inductive or capacitive reactance, which is connected in series with the transmission line. This feature can provide controllable voltage compensation. In addition, SSSC is able to reverse the power flow by injecting a sufficiently large series reactive compensating voltage. See also Active power filter Static synchronous compensator (STATCOM), a similar shunt-connected device Unified power flow controller, a combination of SSSC and STATCOM Dynamic voltage restoration References Electric power transmission Power engineering Power electronics
https://en.wikipedia.org/wiki/European%20Union%20food%20quality%20scandal
The European Union food quality scandal is a controversy claiming that certain food brands and items targeted at Central and Eastern European Union countries' markets are of lower quality than their exact equivalent produced for the Western European Union markets. European Commission President Jean-Claude Juncker acknowledged the issue in his State of the Union address pledging funding to help national food authorities test the inferior products and start to tackle the food inequality. In April 2018 EU Justice and Consumers Commissioner Věra Jourová stated that "“We will step up the fight against dual food quality. We have amended the Unfair Commercial Practice Directive to make it black and white that dual food quality is forbidden." References European Union consumer protection law Food industry Food safety in the European Union Food science Food technology
https://en.wikipedia.org/wiki/Polynomial%20mapping
In algebra, a polynomial map or polynomial mapping between vector spaces over an infinite field k is a polynomial in linear functionals with coefficients in k; i.e., it can be written as where the are linear functionals and the are vectors in W. For example, if , then a polynomial mapping can be expressed as where the are (scalar-valued) polynomial functions on V. (The abstract definition has an advantage that the map is manifestly free of a choice of basis.) When V, W are finite-dimensional vector spaces and are viewed as algebraic varieties, then a polynomial mapping is precisely a morphism of algebraic varieties. One fundamental outstanding question regarding polynomial mappings is the Jacobian conjecture, which concerns the sufficiency of a polynomial mapping to be invertible. See also Polynomial functor References Claudio Procesi (2007) Lie Groups: an approach through invariants and representation, Springer, . Algebra
https://en.wikipedia.org/wiki/Opetope
In category theory, a branch of mathematics, an opetope, a portmanteau of "operation" and "polytope", is a shape that captures higher-dimensional substitutions. It was introduced by John C. Baez and James Dolan so that they could define a weak n-category as a certain presheaf on the category of opetopes. See also higher-order operad References External links https://ncatlab.org/nlab/show/opetope Category theory
https://en.wikipedia.org/wiki/Globular%20set
In category theory, a branch of mathematics, a globular set is a higher-dimensional generalization of a directed graph. Precisely, it is a sequence of sets equipped with pairs of functions such that (Equivalently, it is a presheaf on the category of “globes”.) The letters "s", "t" stand for "source" and "target" and one imagines consists of directed edges at level n. A variant of the notion was used by Grothendieck to introduce the notion of an ∞-groupoid. Extending Grothendieck's work, gave a definition of a weak ∞-category in terms of globular sets. References Further reading Dimitri Ara. On the homotopy theory of Grothendieck ∞ -groupoids. J. Pure Appl. Algebra, 217(7):1237–1278, 2013, arXiv:1206.2941 . External links https://ncatlab.org/nlab/show/globular+set Category theory
https://en.wikipedia.org/wiki/VRChat
VRChat is an online virtual world platform created by Graham Gaylor and Jesse Joudrey and operated by VRChat, Inc. The platform allows users to interact with others with user-created 3D avatars and worlds. VRChat is designed primarily for use with virtual reality headsets, such as the Oculus Rift and Oculus Quest series, SteamVR headsets (such as HTC Vive), and Windows Mixed Reality, but is also usable without VR in a "desktop" mode designed for either a mouse and keyboard or gamepad. VRChat was first released as a Windows application for the Oculus Rift DK1 prototype on January 16, 2014, and was later released to the Steam early access program on February 1, 2017. Features VRChats gameplay is similar to that of games such as Second Life and Habbo Hotel. The game is made up of thousands of connected worlds, in which players can interact with each other through virtual avatars. Avatars and worlds are created and uploaded by their users using a software development kit for Unity released alongside the game. Player avatars are capable of supporting lip syncing, eye tracking, and blinking, in addition to mimicking head and hand motion. Trends and variations of avatars spread through the community like memes, and avatars themselves are often distributed for free, or sold through online marketplaces such as Booth. VRChat is also capable of running in "desktop mode" without a VR headset, which is controlled using either a mouse and keyboard or a gamepad. Some limitations exist in desktop mode, such as the inability to freely move an avatar's limbs, or perform interactions that require more than one hand. In 2020, VRChat introduced Udon, a visual programming language which uses a node graph system. While still considered alpha software, it became usable on publicly-accessible worlds beginning in April 2020. A third-party compiler, UdonSharp, was developed to allow world scripts to be written in C#. In 2022, support for the Open Sound Control (OSC) protocol was added fo
https://en.wikipedia.org/wiki/Berkeley%20SETI%20Research%20Center
The Berkeley SETI Research Center (BSRC) conducts experiments searching for optical and electromagnetic transmissions from intelligent extraterrestrial civilizations. The center is based at the University of California, Berkeley. The Berkeley SETI Research Center has several SETI searches operating at various wavelengths, from radio, through infrared, to visible light. These include SERENDIP, SEVENDIP, NIROSETI, Breakthrough Listen, and SETI@home. The research center is also involved in the development of new telescopes and instrumentation. The Berkeley SETI Research Center is independent of, but collaborates with, researchers at the SETI Institute. No unambiguous signals from extraterrestrial intelligence have been found. Breakthrough Listen The Berkeley SETI Research Center also hosts the Breakthrough Listen program, which is a ten-year initiative with $100 million funding begun in July 2015 to actively search for intelligent extraterrestrial communications in the universe, in a substantially expanded way, using resources that had not previously been extensively used for the purpose. It has been described as the most comprehensive search for alien communications to date. Announced in July 2015, the project is observing for thousands of hours every year on two major radio telescopes, the Green Bank Observatory in West Virginia, the Parkes Observatory in Australia, and the Automated Planet Finder telescope. SETI@home The center also created the SETI@home, an Internet-based public volunteer computing project employing the BOINC software platform, hosted by their Space Sciences Laboratory. Its purpose is to analyze radio data from radio telescopes for signs of extraterrestrial intelligence. SERENDIP The SERENDIP program takes advantage of ongoing "mainstream" radio telescope observations and analyzes deep space radio telescope data that it obtains while other astronomers are using the telescope. SERENDIP observations have been conducted at frequencies bet
https://en.wikipedia.org/wiki/NIROSETI
The NIROSETI (Near-InfraRed Optical Search for Extraterrestrial Intelligence) is an astronomical program to search for artificial signals in the optical (visible) and near infrared (NIR) wavebands of the electromagnetic spectrum. It is the first dedicated near-infrared SETI experiment. The instrument was created by a collaboration of scientists from the University of California, San Diego, Berkeley SETI Research Center at the University of California, Berkeley, University of Toronto, and the SETI Institute. It uses the Anna Nickel 1-m telescope at the Lick Observatory, situated on the summit of Mount Hamilton, east of San Jose, California, USA. The instrument was commissioned (saw its first light) on 15 March 2015 and has been operated for more than 150 nights, and is still operational today. Overview The NIROSETI project is based on the assumption that hypothetical communicative extraterrestrials may send out pulsed laser signals in the optical, as well as infrared spectrum. Near-infrared offers a possible way for signal transmission since there is a decrease in both interstellar extinction and Galactic background compared to optical wavelengths. The near-infrared bands remain largely unexplored because instruments capable of capturing short pulses of infrared light have only recently become available. The NIROSETI instrument makes use of the 1-meter optical Nickel telescope located at the Lick Observatory in California to search for near-infrared (laser) transmissions from extraterrestrial communication or technosignatures. This project was funded by the Bill and Susan Bloomfield Foundation and is based upon a predecessor called Lick Optical SETI instrument, conducted between 2001 and 2006. Professor Shelley Wright leads the team that built and operates the NIROSETI program. The NIROSETI instrument employs a new generation of near-infrared (900 to 1700 nm) detectors, cooled at -25 °C, that have a high speed response (>1 GHz) and gain comparable to photomultipl
https://en.wikipedia.org/wiki/EPUAP
Electronic Platform of Public Administration Services (ePUAP) is a Polish nationwide platform for communication of citizens with public administrations in a uniform and standardized way. Built as part of the ePUAP-WKP project (State Informatization Plan). Service providers are public administration units and public institutions (especially entities that perform tasks commissioned by the state). The platform provides service providers with technological infrastructure to provide services to citizens (recipients). Among the participants of ePUAP there are both central administration units and local governments, including municipal offices. Among the services offered by ePUAP is also Profil Zaufany (Trusted Profile), which enables electronic filing with legal effect without the need to use a qualified signature and SAML-based single sign-on mechanism, which enables the same ePUAP account to log on to websites of various service providers. The website www.epuap.gov.pl enables defining citizen and businesses service processes, creates channels of access to different systems of public administration and extends the package of public services provided electronically. Services available through the ePUAP platform may be accessed at the official website. Currently all administration services are available in Polish only. Overview It is described by the Polish government as "a coherent and systematic action program designed and developed to allow public institutions make their electronic services available to the public". The platform provides citizens, businesses and institutions with a number of services intended to ensure smooth and safe communication between: customer to administrations (C2A), business to administration (B2A), administration to administration (A2A). Main goals The main project objectives are to create a single, secure and electronic access channel to public services for citizens, businesses and public administration and also to reduce time and
https://en.wikipedia.org/wiki/Matroid%20parity%20problem
In combinatorial optimization, the matroid parity problem is a problem of finding the largest independent set of paired elements in a matroid. The problem was formulated by as a common generalization of graph matching and matroid intersection. It is also known as polymatroid matching, or the matchoid problem. Matroid parity can be solved in polynomial time for linear matroids. However, it is NP-hard for certain compactly-represented matroids, and requires more than a polynomial number of steps in the matroid oracle model. Applications of matroid parity algorithms include finding large planar subgraphs and finding graph embeddings of maximum genus. These algorithms can also be used to find connected dominating sets and feedback vertex sets in graphs of maximum degree three. Formulation A matroid can be defined from a finite set of elements and from a notion of what it means for subsets of elements to be independent, subject to the following constraints: Every subset of an independent set should be independent. If and are independent sets, with , then there exists an element such that is independent. Examples of matroids include the linear matroids (in which the elements are vectors in a vector space, with linear independence), the graphic matroids (in which the elements are edges in an undirected graph, independent when they contain no cycle), and the partition matroids (in which the elements belong to a family of disjoint sets, and are independent when they contain at most one element in each set). Graphic matroids and partition matroids are special cases of linear matroids. In the matroid parity problem, the input consists of a matroid together with a pairing on its elements, so that each element belongs to one pair. The goal is to find a subset of the pairs, as large as possible, so that the union of the pairs in the chosen subset is independent. Another seemingly more general variation, in which the allowable pairs form a graph rather than having only o
https://en.wikipedia.org/wiki/Cryptocurrency%20bubble
A cryptocurrency bubble is a phenomenon where the market increasingly considers the going price of cryptocurrency assets to be inflated against their hypothetical value. The history of cryptocurrency has been marked by several speculative bubbles. Some economists and prominent investors have expressed the view that the entire cryptocurrency market constitutes a speculative bubble. Adherents of this view include Berkshire Hathaway board member Warren Buffett and several laureates of the Nobel Memorial Prize in Economic Sciences, central bankers, and investors. History 2011 booms and crashes In February 2011, the price of bitcoin rose to , then fell to that April. This spike was encouraged by several Slashdot posts about it. In June 2011, bitcoin's price again rose, to . This came after attention from a Gawker article about the dark web market Silk Road. The price then fell to that November. 2013 boom and 2014–15 crash In November 2013, Bitcoin's price rose to . It then gradually declined, bottoming out at in January 2015. 2017 boom and 2018 crash The 2018 cryptocurrency crash (also known as the Bitcoin crash and the Great crypto crash) was the sell-off of most cryptocurrencies starting in January 2018. After an unprecedented boom in 2017, the price of Bitcoin fell by about 65% from 6 January to 6 February 2018. Subsequently, nearly all other cryptocurrencies followed Bitcoin's crash. By September 2018, cryptocurrencies collapsed 80% from their peak in January 2018, making the 2018 cryptocurrency crash worse than the dot-com bubble's 78% collapse. By 26 November, Bitcoin also fell by 80% from its peak, having lost almost one-third of its value in the previous week. A January 2018 article by CBS cautioned about possible fraud, citing the case of BitConnect, a British company which received a cease-and-desist order from the Texas State Securities Board. BitConnect had promised very high monthly returns but had not registered with state securities regulators
https://en.wikipedia.org/wiki/Solovay%E2%80%93Kitaev%20theorem
In quantum information and computation, the Solovay–Kitaev theorem says, roughly, that if a set of single-qubit quantum gates generates a dense subset of SU(2), then that set can be used to approximate any desired quantum gate with a relatively short sequence of gates. This theorem is considered one of the most significant results in the field of quantum computation and was first announced by Robert M. Solovay in 1995 and independently proven by Alexei Kitaev in 1997. Michael Nielsen and Christopher M. Dawson have noted its importance in the field. A consequence of this theorem is that a quantum circuit of constant-qubit gates can be approximated to error (in operator norm) by a quantum circuit of gates from a desired finite universal gate set. By comparison, just knowing that a gate set is universal only implies that constant-qubit gates can be approximated by a finite circuit from the gate set, with no bound on its length. So, the Solovay–Kitaev theorem shows that this approximation can be made surprisingly efficient, thereby justifying that quantum computers need only implement a finite number of gates to gain the full power of quantum computation. Statement Let be a finite set of elements in SU(2) containing its own inverses (so implies ) and such that the group they generate is dense in SU(2). Consider some . Then there is a constant such that for any , there is a sequence of gates from of length such that . That is, approximates to operator norm error. Quantitative bounds The constant can be made to be for any fixed . However, there exist particular gate sets for which we can take , which makes the length of the gate sequence tight up to a constant factor. Proof idea The proof of the Solovay–Kitaev theorem proceeds by recursively constructing a gate sequence giving increasingly good approximations to . Suppose we have an approximation such that . Our goal is to find a sequence of gates approximating to error, for . By concatenating thi
https://en.wikipedia.org/wiki/Plant%E2%80%93fungus%20horizontal%20gene%20transfer
Plant–fungus horizontal gene transfer is the movement of genetic material between individuals in the plant and fungus kingdoms. Horizontal gene transfer is universal in fungi, viruses, bacteria, and other eukaryotes. Horizontal gene transfer research often focuses on prokaryotes because of the abundant sequence data from diverse lineages, and because it is assumed not to play a significant role in eukaryotes. Most plant–fungus horizontal gene transfer events are ancient and rare, but they may have provided important gene functions leading to wider substrate use and habitat spread for plants and fungi. Since these events are rare and ancient, they have been difficult to detect and remain relatively unknown. Plant–fungus interactions could play a part in a multi-horizontal gene transfer pathway among many other organisms. Mechanisms Fungus–plant-mediated horizontal gene transfer can occur via phagotrophic mechanisms (mediated by phagotrophic eukaryotes) and nonphagotropic mechanisms. Nonphagotrophic mechanisms have been seen in the transmission of transposable elements, plastid-derived endosymbiotic gene transfer, prokaryote-derived gene transfer, Agrobacterium tumefaciens-mediated DNA transfer, cross-species hybridization events, and gene transfer between mitochondrial genes. Horizontal gene transfer could bypass eukaryotic barrier features like linear chromatin-based chromosomes, intron–exon gene structures, and the nuclear envelope. Horizontal gene transfer occurs between microorganisms sharing overlapping ecological niches and associations like parasitism or symbiosis. Ecological association can facilitate horizontal gene transfer in plants and fungi and is an unstudied factor in shared evolutionary histories. Most horizontal gene transfers from fungi into plants predate the rise of land plants. A greater genomic inventory of gene family and taxon sampling has been identified as a desirable prerequisite for identifying further plant–fungus events. Indicators
https://en.wikipedia.org/wiki/Capital%20and%20income%20breeding
Capital breeding and income breeding refer to the methods by which some organisms perform time breeding and use resources to finance their breeding. The former "describes the situation in which reproduction is financed using stored capital; [whereas the latter] [...] refers to the use of concurrent intake to pay for a reproductive attempt." Income breeders who are growing especially fast hold off the development of their offspring after a threshold is reached so they can produce more offspring, although this does not occur in slower growing income breeders. An organism can be both a capital and an income breeder; the parasitoid Eupelmus vuilletti, for example, is an income breeder in terms of sugars, but a capital breeder in terms of lipids. A different example of the interaction between capital and income breeding is found in Vipera aspis; although these snakes are capital breeders, they lay larger litters when food is abundant, which is a characteristic of income breeders. The dichotomy between income and capital breeders was introduced in 1980 by R. H. Drent and S. Daan to explain why birds usually laid their eggs later than the time that would maximize nestling survival for the population. Ectotherms are generally capital breeders, whereas endotherms rely on income breeding more often. This difference is likely due to the difference in maintenance costs, and thus in the energy that can be allocated to stores. Determinants of capital versus income breeding In organisms that breed multiple times and live in places where food availability and mortality change significantly on the basis of season, it is predicted that capital breeding will be more prevalent, as the time when the organism is not breeding but when conditions are still favourable will be dedicated to rebuilding stores, therefore allowing them to achieve higher rates of reproduction. Capital breeding also increases with size (at least in organisms with optimal storage and indeterminate growth), as t
https://en.wikipedia.org/wiki/Fire%E2%80%93vegetation%20feedbacks%20and%20alternative%20stable%20states
The relationships between fire, vegetation, and climate create what is known as a fire regime. Within a fire regime, fire ecologists study the relationship between diverse ecosystems and fire; not only how fire affects vegetation, but also how vegetation affects the behavior of fire. The study of neighboring vegetation types that may be highly flammable and less flammable has provided insight into how these vegetation types can exist side by side, and are maintained by the presence or absence of fire events. Ecologists have studied these boundaries between different vegetation types, such as a closed canopy forest and a grassland, and hypothesized about how climate and soil fertility create these boundaries in vegetation types. Research in the field of pyrogeography shows how fire also plays an important role in the maintenance of dominant vegetation types, and how different vegetation types with distinct relationships to fire can exist side by side in the same climate conditions. These relationships can be described in conceptual models called fire–vegetation feedbacks, and alternative stable states. Fire–vegetation feedbacks Vegetation can be understood as highly flammable (pyrophilic) and less flammable (pyrophobic). A fire–vegetation feedback describes the relationship between fire and the dominant vegetation type. An example of a highly flammable vegetation type is a grassland. Frequent fire will maintain grassland as the dominant vegetation in a positive feedback loop. This happens because frequent fire will kill trees trying to establish in the area, yet the intervals between each fire will allow for new grasses to establish, grow into fuel, and burn again. Therefore, frequent fire on a grassland area will maintain grass as the dominant vegetation and not permit the encroachment of trees. In contrast, fire will occur less frequently and less severely in closed canopy forests because the fuels are more dense, shaded, and therefore more humid thereby not ign
https://en.wikipedia.org/wiki/Szeged%20index
In chemical graph theory, the Szeged index is a topological index of a molecule, used in biochemistry. The Szeged index, introduced by Iván Gutman, generalizes the concept of the Wiener index introduced by Harry Wiener. The Szeged index of a connected graph G is defined as If e is an edge of G connecting vertices u and v, then we write e = uv or e = vu. For , let and be respectively the number of vertices of G lying closer to vertex u than to vertex v and the number of vertices of G lying closer to vertex v than to vertex u. Szeged index plays an important role in information theory. One way to measure a network structure is through the so-called topological indices. Szeged index has been shown to correlate well with numerous biological and physicochemical properties. Examples The Szeged index of Dendrimer Nanostar of the following figure can be calculated by References Mathematical chemistry Cheminformatics Graph invariants
https://en.wikipedia.org/wiki/Friend%20%28operating%20system%29
The Friend OS or the Friend Unifying Platform is a network based Meta Operating System – a technology that can be used implementing a graphical user interface delivered through a browser, with a back-end that behaves like an operating system. This operating system connects resources and end-user software together in a seamless user experience that can be accessed anywhere. Additionally, it can be customized and prepped for any security requirements and is the first open source cloud operating system that aims to unify web applications and deliver an ecosystem for them to be used across all devices. Friend OS offers users a device agnostic computing environment accessible via the Friend Workspace, an HTML5 and JavaScript based user interface where file management and applications can be run. The project was started in 2014 by Friend Software Labs and they delivered their first open source version on GitHub in June 2017. They announced a partnership with the Golem project in November 2017. Friend will integrate their operating system environment into Golem’s distributed computing platform. Overview Friend OS is a multi-user meta operating system. Based on the Friend Core kernel, it is designed to be a complete operating system which will evolve and adapt with information and communication technologies. It employs a Blockchain based database structure for security, and is developed with decentralised flows of information in mind. Friend OS is designed to fit the Liquid Computing workflow concept by using a desktop environment and applications that can be accessed via a web browser without the need for any additional plugins, meaning it can run on any device, from a smartphone, to a high end workstation. It also fits the Web 4.0 outline of being a middleware where the Internet functions like an operating system. Where Friend OS enables more intuitive forms of resource management, or can be used between devices more easily. The term Web 4.0 itself is used to indi
https://en.wikipedia.org/wiki/List%20of%20translation%20software
This is a list of notable translation software. Software List of PO file editors/translator (in no particular order): XEmacs (with po-mode): runs on Unices with X GNU Emacs (with po-mode): runs on Unices and Windows poEdit: Linux, Mac OS X, and Windows poEdit does support multiple plural forms since version 1.3.. OmegaT is another translation tool that can translate PO files. It is written in Java so it is available for multiple platforms (including Linux and Windows). It can be downloaded from SourceForge. GNU Gettext (Linux/Unix) used for the GNU Translation Project. Gettext also provides msgmerge that makes merging translations easy. Vim (Linux/Unix and Windows versions available) with PO ftplugin for easier editing of GNU gettext PO files. gtranslator for Linux Virtaal: Linux and Windows; for Mac OS X 10.5 and newer a Beta release Native support for Gettext PO translation as well as XLIFF and other formats. Simple interface with powerful machine translation, translation memory and terminology management features. GlobalSight Other tools Google Translator Toolkit References Material was copied from this source, which is available under a Creative Commons Attribution-ShareAlike 2.0 Generic (CC BY-SA 2.0) license. See also Computer-assisted translation Comparison of computer-assisted translation tools Machine translation Translation memory translation Software
https://en.wikipedia.org/wiki/List%20of%20tessellations
See also Uniform tiling Convex uniform honeycombs List of k-uniform tilings List of Euclidean uniform tilings Uniform tilings in hyperbolic plane Mathematics-related lists
https://en.wikipedia.org/wiki/3D%20selfie
A 3D selfie is a 3D-printed scale replica of a person or their face. These three-dimensional selfies are also known as 3D portraits, 3D figurines, 3D-printed figurines, mini-me figurines and miniature statues. In 2014 a first 3D printed bust of a President, Barack Obama, was made. 3D-digital-imaging specialists used handheld 3D scanners to create an accurate representation of the President. Description The capture of a subject as a 3D model can be accomplished in many ways. One of the methods, is called photogrammetry. Many systems use one or more digital cameras to take 2D pictures of the subject, under normal lighting, under projected light patterns, or a combination of these. Inexpensive systems use a single camera which is moved around the subject in 360° at various heights, over minutes, while the subject stays immobile. More elaborate systems have a vertical bar of cameras rotate around the subject, usually achieving a full scan in 10 seconds. Most expensive systems have an enclosed 3D photo booth with 50 to 100 cameras statically embedded in walls and the ceiling, firing all at once, eliminating differences in image capture caused by movements of the subject. A piece of software then reconstructs a 3D model of the subject from these pictures. One of the 3D photo booth, which creates life-like portraits, is called Veronica Chorographic Scanner. The scanner participated in the project of Royal Academy of Arts, where people could have themselves scanned. The scanner utilized 8 cameras taking 96 photographs of a person from each angle. Photogrammetry scanning is generally considered more life-like, than scanning with 3D scanners. Mobile based Photogrammetry apps such as Qlone can also be used for 3D capturing a person. Another method for capturing a 3D selfie uses dedicated 3D scanning equipment which may more accurately capture geometry and texture, but take longer to perform. Scanners may be handheld, tripod mounted or fitted to another system that wi
https://en.wikipedia.org/wiki/Lichens%20and%20nitrogen%20cycling
Some types of lichen are able to fix nitrogen from the atmosphere. This process relies on the presence of cyanobacteria as a partner species within the lichen. The ability to fix nitrogen enables lichen to live in nutrient-poor environments. Lichen can also extract nitrogen from the rocks on which they grow. Nitrogen fixation, and hence the abundance of lichen and their host plants, may be decreased by application of nitrogen-based agricultural fertilizer and by atmospheric pollution. The nitrogen cycle The nitrogen cycle is one of the Earth's biogeochemical cycles. It involves the conversion of nitrogen into different chemical forms. The main processes of the nitrogen cycle are the fixation, ammonification, nitrification, and denitrification. As one of the macronutrients, nitrogen plays an important role in plant growth. The nitrogen cycle is affected by environmental factors. For example, in the subarctic heath, increase in temperature can cause nitrogen fixation to increase or decrease based on season, while overall climate warming indirectly caused the vegetation change which in turn affected the nitrogen fixation process. Lichens Lichens are symbiotic organisms that play an important role in the biogeochemical cycle on Earth. The characteristics of lichens, such as strong resistance to factors such as desiccation, ability to grow and break down rocks allow lichen to grow in different types of environment including highly nitrogen limited area such as subarctic heath. While it does not occur often, formation of akinetes (type of cell formed by cyanobacteria which are resistant to cold and desiccation) was observed in nitrogen fixing lichen. Depending on its partner, lichens derive the carbon and nitrogen from algal and cyanobacteria photobionts (which fixes nitrogen from the air). Lichen fungi can fix nitrogen during the day and night, as long the dark period is not too long. Nitrogen-fixing and non-nitrogen-fixing lichens Both nitrogen-fixing lichens and
https://en.wikipedia.org/wiki/CAESAR%20%28spacecraft%29
CAESAR (Comet Astrobiology Exploration Sample Return) is a sample-return mission concept to comet 67P/Churyumov–Gerasimenko. The mission was proposed in 2017 to NASA's New Frontiers program mission 4, and on 20 December 2017 it was one of two finalists selected for further concept development. On 27 June 2019, the other finalist, the Dragonfly mission, was chosen instead. Had it been selected in June 2019, it would have launched between 2024 and 2025, with a capsule delivering a sample back to Earth in 2038. The Principal Investigator is Steve Squyres of Cornell University in Ithaca, New York. CAESAR would be managed by NASA's Goddard Space Flight Center in Greenbelt, Maryland. Curation of the returned sample would take place at NASA's Astromaterials Research and Exploration Science Directorate, based at Johnson Space Center in Houston, Texas. The CAESAR team chose comet 67P over other cometary targets in part because the data collected by the Rosetta mission, which studied the comet from 2014 to 2016, allows the spacecraft to be designed to the conditions there, increasing the mission's chance of success. The Rosetta mission also provides a vast geologic context for this mission's sample-return analysis. Overview The two New Frontiers program Mission 4 finalists, announced on 20 December 2017, were Dragonfly to Titan, and CAESAR. Comet 67P was previously explored by the European Space Agency's Rosetta probe and its lander Philae during 2014-2016 to determine its origin and history. Squyres explained that knowing the existing conditions at the comet allows them to design systems that would dramatically improve the chances for success. The CAESAR and Dragonfly missions received funding each through the end of 2018 to further develop and mature their concepts. NASA selected the Dragonfly mission on 27 June 2019 to build and launch in 2026. Background A comet sample-return mission was one of the goals in a list of options for a New Frontiers mission in both the
https://en.wikipedia.org/wiki/Twelve-Factor%20App%20methodology
The Twelve-Factor App methodology is a methodology for building software-as-a-service applications. These best practices are designed to enable applications to be built with portability and resilience when deployed to the web. History The methodology was drafted by developers at Heroku, a platform-as-a-service company, and was first presented by Adam Wiggins circa 2011. The Twelve Factors Criticism and adaptation A Nginx architect argued that the relevance of the Twelve-Factor app concept is somewhat specific to Heroku, while introducing their own (Nginx's) proposed architecture for microservices. The twelve factors are however cited as a baseline from which to adapt or extend. References External links 12factor Website The Twelve-Factor App epub book by Adam Wiggins Architectural pattern (computer science) Software delivery methods Cloud computing
https://en.wikipedia.org/wiki/Vitasti
A vitasti (, ) is an ancient Indian unit of length approximating to 21 centimeters. Etymology The Sanskrit word vitasti, meaning "span", is an ancient Indo-Iranian term. It is derived from the Proto-Indo-Iranian term *witasti- and is related to Avestan vītasti, Kurdish bist and Persian bidast, all meaning "span". Measurement According to the Vāstuśāstra, a vitasti is equal to 12 aṅgulas. It is defined as the long span between the extended thumb and the little finger or as the distance between the wrist and the fingertips. Equivalence to other units of length 8 Paramāṇu = 1 Rathadhūli (chariot-dust)8 Rathadhūli = 1 Vālāgra (hair-end)8 Vālāgra = 1 Likṣā (nit)8 Likṣā = 1 Yūkā (louse)8 Yūkā = 1 Yava (barley)8 Yava = 1 Aṅgula (finger)12 Aṅgula = 1 Vitasti (span) 2 Vitasti = 1 Kiṣku (cubit) References Units of measurement
https://en.wikipedia.org/wiki/Padmakar%E2%80%93Ivan%20index
In chemical graph theory, the Padmakar–Ivan (PI) index is a topological index of a molecule, used in biochemistry. The Padmakar–Ivan index is a generalization introduced by Padmakar V. Khadikar and Iván Gutman of the concept of the Wiener index, introduced by Harry Wiener. The Padmakar–Ivan index of a graph G is the sum over all edges uv of G of number of edges which are not equidistant from u and v. Let G be a graph and e = uv an edge of G. Here denotes the number of edges lying closer to the vertex u than the vertex v, and is the number of edges lying closer to the vertex v than the vertex u. The Padmakar–Ivan index of a graph G is defined as The PI index is very important in the study of quantitative structure–activity relationship for the classification models used in the chemical, biological sciences, engineering, and nanotechnology. Examples The PI index of Dendrimer Nanostar of the following figure can be calculated by References Mathematical chemistry Cheminformatics Graph invariants
https://en.wikipedia.org/wiki/Degg%27s%20Model
The Degg's Model shows that a natural disaster only occurs if a vulnerable population is exposed to a hazard. It was devised in 1992 by Dr. Martin Degg, Head of Geography at the University of Chester. It also depends on how far people are from the epicentre of an earthquake, volcano or any other natural tectonic disaster. References Hazard analysis
https://en.wikipedia.org/wiki/Net%20Neutrality%20Regulation%202015
The Net Neutrality Regulation 2015 (No 2015/2120) is a Regulation in EU law where article 3(3) lays down measures concerning open internet access. The regulation's text has been criticized as offering loopholes that can undermine the regulation's effectiveness. Some European Union member countries, such as Slovenia and the Netherlands, have stronger net neutrality laws. Regulation history The 2002 regulatory framework for electronic communications networks and services in the European Union consisted of five directives, which are referred to as "the Framework Directive and the Specific Directives": Access Directive (Directive 2002/19/EC) Authorization Directive (Directive 2002/20/EC) Framework Directive (Directive 2002/21/EC) Universal Service Directive (Directive 2002/22/EC) Directive on privacy and electronic communications (Directive 2002/58/EC) When the European Commission consulted on the updating of the Framework Directive and the Specific Directives in November 2007, it examined the possible need for legislation to mandate network neutrality, countering the potential damage, if any, caused by non-neutral broadband access. The European Commission stated that prioritisation "is generally considered to be beneficial for the market so long as users have choice to access the transmission capabilities and the services they want" and "consequently, the current EU rules allow operators to offer different services to different customers groups, but not allow those who are in a dominant position to discriminate in an anti-competitive manner between customers in similar circumstances". However, the European Commission highlighted that Europe's current legal framework cannot effectively prevent network operators from degrading their customers' services. Therefore, the European Commission proposed that it should be empowered to impose a minimum quality of services requirements. In addition, an obligation of transparency was proposed to limit network operators'
https://en.wikipedia.org/wiki/Noise%20blanker
In the design of radio receivers, a noise blanker is a circuit intended to reduce the effect of certain kinds of radio noise on a received signal. It is often used on broadcast shortwave receivers or communications receivers and some types of two-way radio transceivers. The noise blanker is only effective on impulse-type noise such as from lightning or from automotive ignition systems, and cannot improve performance on wideband continuous background noise, or interfering signals on the same frequency. In cases where there are strong signals on frequencies near to the desired frequency, a noise blanker circuit may be ineffective and may reduce the quality of the received signal. Implementation Typically this is a network in the intermediate frequency section of the receiver; when a pulse of noise passes through the IF amplifiers, it is usually of greater amplitude than the desired signal. The noise blanker circuit momentarily reduces the gain of the IF stage during the impulse. More complex noise blankers may use a secondary IF stage and have adjustable threshold and timing characteristics so as to reduce the noise passed through to the audio stages of the receiver. A noise blanker is best applied before any narrow-bandwidth filters in the signal path, so as not to introduce "ringing" and distortion in the filtered signal. Noise blankers are most useful with amplitude modulation or single sideband signals. Frequency modulation receivers generally include a signal limiter stage which tends to reject noise pulses. References Radio electronics Receiver (radio)
https://en.wikipedia.org/wiki/Mullvad
Mullvad is a commercial VPN service based in Sweden. Launched in March 2009, Mullvad operates using the WireGuard and OpenVPN protocols. It also supports ShadowSocks as a bridge protocol for censorship circumvention. History Mullvad was launched in March 2009 by Amagicom AB. Its name is Swedish for mole. Mullvad began supporting connections via the OpenVPN protocol in 2009. Mullvad was an early adopter and supporter of the WireGuard protocol, announcing the availability of the new VPN protocol in March 2017 and making a "generous donation" supporting WireGuard development between July and December 2017. In September 2018, the cybersecurity firm Cure53 performed a penetration test on Mullvad's macOS, Windows and Linux applications. Seven issues were found which were addressed by Mullvad. Cure53 tested only the applications and supporting functions. No assessment was made on the Mullvad server side and back end. In October 2019, Mullvad partnered with Mozilla. Mozilla's VPN service, Mozilla VPN, utilizes Mullvad's WireGuard servers. In April 2020, Mullvad partnered with Malwarebytes and provided WireGuard servers for their VPN service, Malwarebytes Privacy. In May 2022, Mullvad started officially accepting Monero. On 18 April 2023, Mullvad's head office in Gothenburg was visited by officers from the National Operations Department of the Swedish Police, who had a search warrant to seize computers containing customer data. Mullvad demonstrated that, in accordance with their policies, no such data existed on their systems. After consulting with the prosecutor, the officers left without seizing any equipment or obtaining customer information. Mullvad shared this information in a blog post two days later making the incident public knowledge and mentioning this was the first time their offices had been visited with a search warrant. In a letter sent to Mullvad 9 days after the search the Swedish Police stated they conducted the search at the request of Germany for a
https://en.wikipedia.org/wiki/Chandrasekhar%20polarization
Chandrasekhar Polarization is a partial polarization of emergent radiation at the limb of rapidly rotating early-type stars or binary star system with purely electron-scattering atmosphere, named after the Indian American astrophysicist Subrahmanyan Chandrasekhar, who first predicted its existence theoretically in 1946. Chandrasekhar published a series of 26 papers in The Astrophysical Journal titled On the Radiative Equilibrium of a Stellar Atmosphere from 1944 to 1948. In the 10th paper, he predicted that the purely electron stellar atmosphere emits a polarized light using Thomson law of scattering. The theory predicted that 11 percent polarization could be observed at maximum. But when this is applied to a spherical star, the net polarization effect was found to be zero, because of the spherical symmetry. But it took another 20 years to explain under what conditions this polarization can be observed. J. Patrick Harrington and George W. Collins, II showed that this symmetry is broken if we consider a rapidly rotating star (or a binary star system), in which the star is not exactly spherical, but slightly oblate due to extreme rotation (or tidal distortion in the case of binary system). The symmetry is also broken in eclipsing binary star system. Discovery Attempts made to predict this polarization effect were initially unsuccessful, but rather led to the prediction of interstellar polarization. In 1983, scientists found the first evidence of this polarization effect on the star Algol, an eclipsing binary-star system. The polarization on rapidly rotating star was not found until 2017 since it required a high-precision polarimeter. In September 2017, a team of scientists from Australia observed this polarization on the star Regulus, which rotates at 96.5 percent of its critical angular velocity for breakup. See also Polarization in astronomy References Polarization (waves) Astrophysics
https://en.wikipedia.org/wiki/Video%20Core%20Next
Video Core Next is AMD's brand for its dedicated video encoding and decoding hardware core. It is a family of hardware accelerator designs for encoding and decoding video, and is built into AMD's GPUs and APUs since AMD Raven Ridge, released January 2018. Background Video Core Next is AMD's successor to both the Unified Video Decoder and Video Coding Engine designs, which are hardware accelerators for video decoding and encoding, respectively. It can be used to decode, encode and transcode ("sync") video streams, for example, a DVD or Blu-ray Disc to a format appropriate to, for example, a smartphone. Unlike video encoding on a CPU or a general-purpose GPU, Video Core Next is a dedicated hardware core on the processor die. This application-specific integrated circuit (ASIC) allows for more power-efficient video processing. Support Video Core Next supports: MPEG-2 Decode, MPEG-4 Decode, VC-1 Decode, H.264/MPEG-4 AVC Encode/Decode, HEVC Encode/Decode, and VP9 Decode. VCN 2.0 is implemented with Navi products and the Renoir APU. The feature set remains the same as VCN 1.0. VCN 3.0 is implemented with Navi 2 products. See also Video hardware technologies Nvidia PureVideo - Nvidia GeForce 256's Motion Compensation High-Definition Video Processor Video Processing Engine Nvidia NVENC Nvidia NVDEC AMD Video Core Next - AMD Video Coding Engine - AMD Unified Video Decoder - AMD Video Shader - ATI Intel Quick Sync Video - Intel Clear Video - Intel Qualcomm Qualcomm Hexagon References Video acceleration AMD IP cores Video compression and decompression ASIC
https://en.wikipedia.org/wiki/Elementary%20comparison%20testing
Elementary comparison testing (ECT) is a white-box, control-flow, test-design methodology used in software development. The purpose of ECT is to enable detailed testing of complex software. Software code or pseudocode is tested to assess the proper handling of all decision outcomes. As with multiple-condition coverage and basis path testing, coverage of all independent and isolated conditions is accomplished through modified condition/decision coverage (MC/DC). Isolated conditions are aggregated into connected situations creating formal test cases. The independence of a condition is shown by changing the condition value in isolation. Each relevant condition value is covered by test cases. Test case A test case consists of a logical path through one or many decisions from start to end of a process. Contradictory situations are deduced from the test case matrix and excluded. The MC/DC approach isolates every condition, neglecting all possible subpath combinations and path coverage. where T is the number of test cases per decision and n the number of conditions. The decision consists of a combination of elementary conditions The transition function is defined as Given the transition the isolated test path consists of Test case graph A test case graph illustrates all the necessary independent paths (test cases) to cover all isolated conditions. Conditions are represented by nodes, and condition values (situations) by edges. An edge addresses all program situations. Each situation is connected to one preceding and successive condition. Test cases might overlap due to isolated conditions. Inductive proof of a number of condition paths The elementary comparison testing method can be used to determine the number of condition paths by inductive proof. There are possible condition value combinations When each condition is isolated, the number of required test cases per decision is: there are edges from parent nodes and edges to child nodes from . Each
https://en.wikipedia.org/wiki/Pillai%20sequence
The Pillai sequence is the sequence of integers that have a record number of terms in their greedy representations as sums of prime numbers (and one). It is named after Subbayya Sivasankaranarayana Pillai, who first defined it in 1930. It would follow from Goldbach's conjecture that every integer greater than one can be represented as a sum of at most three prime numbers. However, finding such a representation could involve solving instances of the subset sum problem, which is computationally difficult. Instead, Pillai considered the following simpler greedy algorithm for finding a representation of as a sum of primes: choose the first prime in the sum to be the largest prime that is at most , and then recursively construct the remaining sum recursively for . If this process reaches zero, it halts. And if it reaches one instead of zero, it must include one in the sum (even though it is not prime), and then halt. For instance, this algorithm represents 122 as 113 + 7 + 2, even though the shorter representations 61 + 61 or 109 + 13 are also possible. The th number in the Pillai sequence is the smallest number whose greedy representation as a sum of primes (and one) requires terms. These numbers are 0, 1, 4, 27, 1354, 401429925999155061, ... Each number in the sequence is the sum of the previous number with a prime number , the smallest prime whose following prime gap is larger than . For instance, the number 27 in the sequence is 4 + 23, where the first prime gap larger than 4 is the one between 23 and 29. Because the prime numbers become less dense as they become larger (as quantified by the prime number theorem), there is always a prime gap larger than any term in the Pillai sequence, so the sequence continues to an infinite number of terms. However, the terms in the sequence grow very rapidly. It has been estimated that expressing the next term in the sequence would require "hundreds of millions of digits". References Integer sequences Prime numbers
https://en.wikipedia.org/wiki/Synchronous%20detector
In electronics, a synchronous detector is a device that recovers information from a modulated signal by mixing the signal with a replica of the unmodulated carrier. This can be locally generated at the receiver using a phase-locked loop or other techniques. Synchronous detection preserves any phase information originally present in the modulating signal. With the exception of SECAM receivers, synchronous detection is a necessary component of any analog color television receiver, where it allows recovery of the phase information that conveys hue. Synchronous detectors are also found in some shortwave radio receivers used for audio signals, where they provide better performance on signals that may be affected by fading. See also Lock-in amplifier References Electronic engineering
https://en.wikipedia.org/wiki/Spiral%20optimization%20algorithm
In mathematics, the spiral optimization (SPO) algorithm is a metaheuristic inspired by spiral phenomena in nature. The first SPO algorithm was proposed for two-dimensional unconstrained optimization based on two-dimensional spiral models. This was extended to n-dimensional problems by generalizing the two-dimensional spiral model to an n-dimensional spiral model. There are effective settings for the SPO algorithm: the periodic descent direction setting and the convergence setting. Metaphor The motivation for focusing on spiral phenomena was due to the insight that the dynamics that generate logarithmic spirals share the diversification and intensification behavior. The diversification behavior can work for a global search (exploration) and the intensification behavior enables an intensive search around a current found good solution (exploitation). Algorithm The SPO algorithm is a multipoint search algorithm that has no objective function gradient, which uses multiple spiral models that can be described as deterministic dynamical systems. As search points follow logarithmic spiral trajectories towards the common center, defined as the current best point, better solutions can be found and the common center can be updated. The general SPO algorithm for a minimization problem under the maximum iteration (termination criterion) is as follows: 0) Set the number of search points and the maximum iteration number . 1) Place the initial search points and determine the center , ,and then set . 2) Decide the step rate by a rule. 3) Update the search points: 4) Update the center: where . 5) Set . If is satisfied then terminate and output . Otherwise, return to Step 2). Setting The search performance depends on setting the composite rotation matrix , the step rate , and the initial points . The following settings are new and effective. Setting 1 (Periodic Descent Direction Setting) This setting is an effective setting for high dimensional problems under
https://en.wikipedia.org/wiki/Journal%20of%20Commutative%20Algebra
The Journal of Commutative Algebra is a peer-reviewed academic journal of mathematical research that specializes in commutative algebra and closely related fields. It has been published by the Rocky Mountain Mathematics Consortium (RMMC) since its establishment in 2009. It is currently published four times per year. Historically, the Journal of Commutative Algebra filled a niche for the Rocky Mountain Mathematics Consortium when the Canadian Applied Mathematics Quarterly, formerly published by the RMMC, was acquired by the Applied Mathematics Institute of the University of Alberta. Founding editors Jim Coykendall (currently at Clemson University) and Hal Schenck (currently at Auburn University) began the journal with the goal of creating a top-tier journal in commutative algebra. Abstracting and indexing The journal is abstracted and indexed in Current Contents/Physical, Chemical & Earth Sciences, Science Citation Index Expanded, Scopus, MathSciNet, and zbMATH. References External links Academic journals established in 2009 Mathematics journals English-language journals Quarterly journals Delayed open access journals
https://en.wikipedia.org/wiki/Bangladesh%20Hydrocarbon%20Unit
The Bangladesh Hydrocarbon Unit is a government agency in the Ministry of Power, Energy and Mineral Resources responsible for providing the government of Bangladesh technical recommendation on the extraction of hydrocarbon resources and is located in Dhaka, Bangladesh. It carries out research on the gas and petroleum reserves of Bangladesh. History The Bangladesh Hydrocarbon Unit traces its origin to a project called Strengthening of the Hydrocarbon Unit in the Ministry of Energy and Mineral Resources in July 1999. The project was financed by the government of Norway. The unit signed an agreement with the Norwegian Petroleum Directorate of the Ministry of Petroleum and Energy for technical assistance. The project ended in December 2005. From April 2006 the government of Bangladesh started the second phrase of the project. The second phrase was financed by a Norwegian Government grant and it was administered by the Asian Development Bank. The government made the project a permanent bureau of the ministry on 28 May 2008. It was awarded by Asian Development Bank as one of the performing projects. References Government agencies of Bangladesh 1999 establishments in Bangladesh Organisations based in Dhaka Energy in Bangladesh Energy organizations
https://en.wikipedia.org/wiki/3-Methylhistidine
3-Methylhistidine (3-MH) is a post-translationally modified amino acid which is excreted in human urine. Urinary concentration of 3-methylhistidine is a biomarker for skeletal muscle protein breakdown in humans who have been subject to muscle injury. Urinary 3-methylhistidine concentrations are also elevated from consumption of soy-based products and meat, particularly chicken. Biochemistry 3-Methylhistidine is a metabolic product that is produced in the body via the enzymatic methylation of histidine during peptide bond synthesis and the methylation of actin and myosin. Detection in body fluids The normal concentration of 3-methylhistidine in the urine of healthy adult humans has been detected and quantified in a range of  micromoles per millimole (μmol/mmol) of creatinine, with most studies reporting the average urinary concentration between 15–20 μmol/mmol of creatinine. The average concentration of 3-methylhistidine in human blood plasma has been detected and quantified at 2.85 micromolar (μM) with a range of  μM. The average concentration of 3-methylhistidine in human cerebrospinal fluid (CSF) has been detected and quantified at 3.82 μM with a range of  μM. References Imidazoles Amino acid derivatives Biomarkers
https://en.wikipedia.org/wiki/Microsoft%20Messaging
Messaging (also known as Microsoft Messaging, and as of recently, Windows Operator Messages) is an instant messaging Universal Windows Platform app for Windows 8.0, Windows 10 and Windows 10 Mobile. The mobile version allows SMS, MMS and RCS messaging. The desktop version is restricted to showing SMS messages sent via Skype, and billing SMS message from an LTE operator. As of recently, the app was refocused into a SMS data plan app, where your mobile operator sends messages about your data plan, this is due to the functionality of the app switching to Skype. It was also partially renamed to Windows Operator Messages. External links Send a text message — Microsoft Support References Windows components Instant messaging
https://en.wikipedia.org/wiki/Stains-all
Stains-all is a carbocyanine dye, which stains anionic proteins, nucleic acids, anionic polysaccharides and other anionic molecules. Properties Stains-all is metachromatic and changes its color dependent on its contact to other molecules. The detection limit for phosphoproteins is below 1 ng after one hour of staining, for anionic polysaccharides between 10 and 500 ng. Highly anionic proteins are stained blue, proteoglycans purple and anionic proteins pink. RNA is stained blueish-purple with a detection limit of 90 ng and DNA is stained blue with a detection limit of 3 ng. Stains-all is light sensitive, therefore the staining is performed in the absence of light and photographed immediately. Staining of proteins can be improved by a subsequent silver stain. The analogue Ethyl-Stains-all has similar properties as stains all, with differences in solubility and staining properties. Applications Stains-all stains nucleic acids, anionic proteins, anionic polysaccharides such as alginate and pectinate, hyaluronic acid and dermatan sulfate, heparin, heparan sulfate and chondroitin sulfate. It is used in SDS-PAGE, agarose gel electrophoresis and histologic staining, e.g. staining of growth lines in bones. References Thiazole dyes Biochemistry methods Histology
https://en.wikipedia.org/wiki/Paraphrasing%20%28computational%20linguistics%29
Paraphrase or paraphrasing in computational linguistics is the natural language processing task of detecting and generating paraphrases. Applications of paraphrasing are varied including information retrieval, question answering, text summarization, and plagiarism detection. Paraphrasing is also useful in the evaluation of machine translation, as well as semantic parsing and generation of new samples to expand existing corpora. Paraphrase generation Multiple sequence alignment Barzilay and Lee proposed a method to generate paraphrases through the usage of monolingual parallel corpora, namely news articles covering the same event on the same day. Training consists of using multi-sequence alignment to generate sentence-level paraphrases from an unannotated corpus. This is done by finding recurring patterns in each individual corpus, i.e. " (injured/wounded) people, seriously" where are variables finding pairings between such patterns the represent paraphrases, i.e. " (injured/wounded) people, seriously" and " were (wounded/hurt) by , among them were in serious condition" This is achieved by first clustering similar sentences together using n-gram overlap. Recurring patterns are found within clusters by using multi-sequence alignment. Then the position of argument words is determined by finding areas of high variability within each cluster, aka between words shared by more than 50% of a cluster's sentences. Pairings between patterns are then found by comparing similar variable words between different corpora. Finally, new paraphrases can be generated by choosing a matching cluster for a source sentence, then substituting the source sentence's argument into any number of patterns in the cluster. Phrase-based Machine Translation Paraphrase can also be generated through the use of phrase-based translation as proposed by Bannard and Callison-Burch. The chief concept consists of aligning phrases in a pivot language to produce potential paraphrases in the origi
https://en.wikipedia.org/wiki/NiceHash
NiceHash is a global cryptocurrency hash power broker and cryptocurrency exchange with an open marketplace that connects sellers of hashing power (cryptominers) with buyers of hashing power using the sharing economy approach. The company provides software for cryptocurrency mining. The company was founded in 2014 by two Slovenian university students, Marko Kobal and Matjaž Škorjanc. The company is based in The British Virgin Islands and has offices in Maribor, Slovenia. NiceHash users are primarily video gamers who have powerful graphics cards (GPUs) suited to cryptocurrency mining. The company has over 2.5 million users in 190 countries worldwide as of November 2021. History NiceHash was founded in 2014, a former medical student turned computer programmer, and Marko Kobal. NiceHash's original founder Matjaž Škorjanc was allegedly one of the creators of malware called Mariposa botnet and served four years and ten months in a Slovenian prison. On June 5, 2019, US law enforcement reopened a case in the operations of the Mariposa (Butterfly Bot, BFBOT) malware gang. In 2019, The FBI moved forward with new charges and arrest warrants against four suspects, including Matjaž Škorjanc. Matjaž was detained in prison in Germany in 2019. Due to international law agreements on double jeopardy, he was released in 2020. Matjaž provided the original concept for the company, but is not involved in its operation, and the current CEO is Martin Škorjanc. On December 6, 2017, approximately 4,700 Bitcoins (US$64 million at the time of the hack) were stolen from NiceHash allegedly by a spear phishing attack. Due to the open and transparent nature of the blockchain, the security breach received an influx of attention as the stolen sum and movement of bitcoins were visible to anyone on the internet. On December 21, 2017, Marko Kobal resigned as the CEO of NiceHash. On that day, the company also re-opened their marketplace after the December 6th hack. NiceHash announced that they
https://en.wikipedia.org/wiki/Open%20vote%20network
In cryptography, the open vote network (or OV-net) is a secure multi-party computation protocol to compute the boolean-count function: namely, given a set of binary values 0/1 in the input, compute the total count of ones without revealing each individual value. This protocol was proposed by Feng Hao, Peter Ryan, and Piotr Zieliński in 2010. It extends Hao and Zieliński's anonymous veto network protocol by allowing each participant to count the number of veto votes (i.e., input one in a boolean-OR function) while preserving the anonymity of those who have voted. The protocol can be generalized to support a wider range of inputs beyond just the binary values 0 and 1. Description All participants agree on a group with a generator of prime order in which the discrete logarithm problem is hard. For example, a Schnorr group can be used. Assume there are participants. Unlike other secure multi-party computation protocols that typically require pairwise secret and authenticated channels between participants in addition to an authenticated public channel, OV-net only requires an authenticated public channel available to every participant. Such a channel may be realized by using digital signatures. The protocol runs in two rounds. Round 1: each participant selects a random value and publishes the ephemeral public key together with a zero-knowledge proof for the proof of the knowledge of the exponent . Such proofs may be realized by using Schnorr non-interactive zero-knowledge proofs as described in RFC 8235. After this round, each participant computes: Round 2: each participant publishes where is either 0 or 1, together with a 1-out-of-2 zero knowledge proof for the proof that is one of . Such 1-out-of-2 proofs may be realized by using Cramer, Gennaro, and Schoenmakers' zero-knowledge proof technique. After round 2, each participant computes . Note that all values vanish because . The exponent represents the count of ones. As it is usually a small number,
https://en.wikipedia.org/wiki/Rec%20Room%20%28video%20game%29
Rec Room is a virtual reality massively multiplayer online game with an integrated game creation system, initially released in 2016. It is available on Microsoft Windows, Xbox One, Xbox Series X and Series S, PlayStation 4, PlayStation 5, PSVR, Meta Quest, Pico, iOS, and Android. Gameplay A hub room (called the "Rec Center") is a recreational center (thus earning the game's title of Rec Room) with doors that lead to various games called Rec Room Originals and user-generated rooms that were featured by Rec Room. Rec Room can optionally be played on a virtual reality headset, specifically using SteamVR, virtual reality headsets by Meta, ByteDance, and PlayStation VR (PSVR2 is said to be supported soon). In virtual reality mode, the game uses full 3D motion via the motion capture system of a virtual reality headset and two handheld motion controllers, which are required to pick up and handle objects in the game world, including balls, weapons, construction tools, and other objects. Players can explore the space around them within the confines of their physical floor space while roaming further by using the controller buttons to teleport a short distance, with minimal to no virtual reality sickness. A “walking” mode enables players to move continuously rather than teleporting, although this poses a higher risk of motion sickness. When creating rooms, players can use the "Maker Pen", a tool resembling a hot glue gun, that can be used to draw shapes in 3D. Players can also code in Circuits, Rec Room's visual programming language. Players can pay for a monthly subscription called Rec Room Plus, which grants several features, including the ability to sell user-generated content. Subscribers can sell this content for tokens, Rec Room's in-game currency. Tokens can be exchanged for real-life money. Game modes Rec Room consists of separate built-in multiplayer games, known as Rec Room Originals. The games include first-person shooters (e.g., Paintball), a battle royale
https://en.wikipedia.org/wiki/Kernel%20page-table%20isolation
Kernel page-table isolation (KPTI or PTI, previously called KAISER) is a Linux kernel feature that mitigates the Meltdown security vulnerability (affecting mainly Intel's x86 CPUs) and improves kernel hardening against attempts to bypass kernel address space layout randomization (KASLR). It works by better isolating user space and kernel space memory. KPTI was merged into Linux kernel version 4.15, and backported to Linux kernels 4.14.11, 4.9.75, and 4.4.110. Windows and macOS released similar updates. KPTI does not address the related Spectre vulnerability. Background on KAISER The KPTI patches were based on KAISER (short for Kernel Address Isolation to have Side-channels Efficiently Removed), a technique conceived in 2016 and published in June 2017 back when Meltdown was not known yet. KAISER makes it harder to defeat KASLR, a 2014 mitigation for a much less severe issue. In 2014, the Linux kernel adopted kernel address space layout randomization (KASLR), which makes it more difficult to exploit other kernel vulnerabilities, which relies on kernel address mappings remaining hidden from user space. Despite prohibiting access to these kernel mappings, it turns out that there are several side-channel attacks in modern processors that can leak the location of this memory, making it possible to work around KASLR. KAISER addressed these problems in KASLR by eliminating some sources of address leakage. Whereas KASLR merely prevents address mappings from leaking, KAISER also prevents the data from leaking, thereby covering the Meltdown case. KPTI is based on KAISER. Without KPTI enabled, whenever executing user-space code (applications), Linux would also keep its entire kernel memory mapped in page tables, although protected from access. The advantage is that when the application makes a system call into the kernel or an interrupt is received, kernel page tables are always present, so most context switching-related overheads (TLB flush, page-table swapping, etc) can
https://en.wikipedia.org/wiki/NIST%20Post-Quantum%20Cryptography%20Standardization
Post-Quantum Cryptography Standardization is a program and competition by NIST to update their standards to include post-quantum cryptography. It was announced at PQCrypto 2016. 23 signature schemes and 59 encryption/KEM schemes were submitted by the initial submission deadline at the end of 2017 of which 69 total were deemed complete and proper and participated in the first round. Seven of these, of which 3 are signature schemes, have advanced to the third round, which was announced on July 22, 2020. Background Academic research on the potential impact of quantum computing dates back to at least 2001. A NIST published report from April 2016 cites experts that acknowledge the possibility of quantum technology to render the commonly used RSA algorithm insecure by 2030. As a result, a need to standardize quantum-secure cryptographic primitives was pursued. Since most symmetric primitives are relatively easy to modify in a way that makes them quantum resistant, efforts have focused on public-key cryptography, namely digital signatures and key encapsulation mechanisms. In December 2016 NIST initiated a standardization process by announcing a call for proposals. The competition is now in its third round out of expected four, where in each round some algorithms are discarded and others are studied more closely. NIST hopes to publish the standardization documents by 2024, but may speed up the process if major breakthroughs in quantum computing are made. It is currently undecided whether the future standards be published as FIPS or as NIST Special Publication (SP). Round one Under consideration were: (strikethrough means it had been withdrawn) Round one submissions published attacks Guess Again by Lorenz Panny RVB by Lorenz Panny RaCoSS by Daniel J. Bernstein, Andreas Hülsing, Tanja Lange and Lorenz Panny HK17 by Daniel J. Bernstein and Tanja Lange SRTPI by Bo-Yin Yang WalnutDSA by Ward Beullens and Simon R. Blackburn by Matvei Kotov, Anton Menshov and Alexa
https://en.wikipedia.org/wiki/Chaim%20Goodman-Strauss
Chaim Goodman-Strauss (born June 22, 1967 in Austin, Texas) is an American mathematician who works in convex geometry, especially aperiodic tiling. He is on the faculty of the University of Arkansas and currently serves as outreach mathematician for the National Museum of Mathematics. He is co-author with John H. Conway and Heidi Burgiel of The Symmetries of Things, a comprehensive book surveying the mathematical theory of patterns. Education and career Goodman-Strauss received both his B.S. (1988) and Ph.D. (1994) in mathematics from the University of Texas at Austin. His doctoral advisor was John Edwin Luecke. He joined the faculty at the University of Arkansas, Fayetteville (UA) in 1994 and served as departmental chair from 2008 to 2015. He held visiting positions at the National Autonomous University of Mexico and Princeton University. During 1995 he did research at The Geometry Center, a mathematics research and education center at the University of Minnesota, where he investigated aperiodic tilings of the plane. Goodman-Strauss has been fascinated by patterns and mathematical paradoxes for as long as he can remember. He attended a lecture about the mathematician Georg Cantor when he was 17 and says, "I was already doomed to be a mathematician, but that lecture sealed my fate." He became a mathematics writer and popularizer. From 2004 to 2012, in conjunction with KUAF 91.3 FM, the University of Arkansas NPR affiliate, he presented "The Math Factor," a podcast website dealing with recreational mathematics. He is an admirer of Martin Gardner and is on the advisory council of Gathering 4 Gardner, an organization that celebrates the legacy of the famed mathematics popularizer and Scientific American columnist, and is active in the associated Celebration of Mind events. In 2022 Goodman-Strauss was awarded the National Museum of Mathematics' Rosenthal Prize, which recognizes innovation and inspiration in math teaching. Aperiodic monotiles On Mar 20, 2023 Straus
https://en.wikipedia.org/wiki/Wheeler%20incremental%20inductance%20rule
The incremental inductance rule, attributed to Harold Alden Wheeler by Gupta and others is a formula used to compute skin effect resistance and internal inductance in parallel transmission lines when the frequency is high enough that the skin effect is fully developed. Wheeler's concept is that the internal inductance of a conductor is the difference between the computed external inductance and the external inductance computed with all the conductive surfaces receded by one half of the skin depth. Linternal = Lexternal(conductors receded) − Lexternal(conductors not receded). Skin effect resistance is assumed to be equal to the reactance of the internal inductance. Rskin = ωLinternal. Gupta gives a general equation with partial derivatives replacing the difference of inductance. where is taken to mean the differential change in inductance as surface m is receded in the nm direction. is the surface resistivity of surface m. magnetic permeability of conductive material at surface m. skin depth of conductive material at surface m. unit normal vector at surface m. Wadell and Gupta state that the thickness and corner radius of the conductors should be large with respect to the skin depth. Garg further states that the thickness of the conductors must be at least four times the skin depth. Garg states that the calculation is unchanged if the dielectric is taken to be air and that where the characteristic impedance and velocity of propagation = the speed of light. Paul, 2007, disputes the accuracy of at very high frequency for rectangular conductors such as stripline and microstrip due to a non-uniform distribution of current on the conductor. At very high frequency, the current crowds into the corners of the conductor. Example In the top figure, if is the inductance and is the characteristic impedance using the dimensions , and , and is the inductance and is the characteristic impedance using the dimensions , and then the internal induct
https://en.wikipedia.org/wiki/James%20F.%20Gibbons
James F. "Jim" Gibbons (born September 19, 1931) is an American professor and academic administrator. He is credited (together with William Shockley) with starting the semiconductor device fabrication laboratory at Stanford University that enabled the semiconductor industry and created Silicon Valley. Gibbons is also credited for inventing Tutored Video Instruction, which is widely used at Stanford University and its Stanford Instructional Television Network. The Tutored Video Instruction is used to educate engineers and non students who are in need via SERA Learning Technologies (which Gibbons founded). Gibbons was elected a member of the National Academy of Engineering in 1974 for leadership as a teacher, author, and researcher in semiconductor electronics. Early life James F. Gibbons was born in Leavenworth, Kansas on September 19, 1931, to Clifford and Mary Gibbons. His father was a guard at United States Penitentiary, Leavenworth, until Gibbons was about eight years old. At that time, his father was transferred to a minimum security prison in Texarkana, Texas. Gibbons spent his middle and high school years there, until he went off to college. Higher education Gibbons left Texas to pursue his undergraduate degree in electrical engineering at Northwestern University chosen due to receiving a partial scholarship from Northwestern, Northwestern's proximity to Chicago and the jazz music scene there (Gibbons played trombone and was also pondering a possible musical career), and also due to Northwestern's co-op requirement. Gibbons co-oped at Tungstal, where he worked on vacuum tubes being used in televisions. In 1953, after five years (due to the mandatory co-op), Gibbons finished his B.S. degree in Electrical Engineering at Northwestern University in 1953. He also earned a National Science Foundation fellowship from his efforts at Northwestern, which was able to be used at any school across the United States. After discussions with his Northwestern advisor
https://en.wikipedia.org/wiki/Yau%27s%20conjecture
In differential geometry, Yau's conjecture from 1982, is a mathematical conjecture which states that a closed Riemannian 3-manifold has an infinite number of smooth closed immersed minimal surfaces. It is named after Shing-Tung Yau. It was the first problem in the minimal submanifolds section in Yau's list of open problems. The conjecture has recently been claimed by Kei Irie, Fernando Codá Marques and André Neves in the generic case, and by Antoine Song in full generality. References Further reading (Problem 88) Conjectures Unsolved problems in geometry Differential geometry
https://en.wikipedia.org/wiki/BlackVPN
BlackVPN (stylized as blackVPN) was a VPN service offered by the Hong Kong-based company BlackVPN Limited. BlackVPN featured AES-256 encryption and DNS leak protection. The service offered apps or manual configurations for Windows, Mac, iOS, Android, Linux, and routers. The company also maintained a strict no-logging policy. History BlackVPN was founded in 2009. In March 2019, BlackVPN ran 31 remote servers in 20 locations and 18 countries, including Australia, Canada, Japan, United Kingdom and United States. Blackmail incident In April 2016, blackVPN claimed to have received blackmail from the Armada Collective hacker group. According to blackVPN, the group threatened to perform a DDoS attack against their VPN servers on April 25 if the ransom of 10.08 bitcoins was not paid. blackVPN also stated that two other VPN service providers had received the same e-mail on April 18 and that VPN service provider AirVPN had suffered a similar threat and attack on May 30. At that time, it was unclear whether the sender of the e-mails simply imitated the group or indeed was Armada Collective. On April 25, DDoS mitigation provider Cloudflare called out the threats as fake, stating that not a single attack was launched against a threatened organization. Reception In March 2016, the Dutch computer magazine Computer!Totaal (C!T) listed blackVPN as one of the nine best VPN services available. However, C!T noted the service's relatively high price and lack of own client as potential downsides. In July 2017, Engadget author Violet Blue mentioned blackVPN as one of the "names that come up as trusted" in the VPN service industry. TorrentFreak interviewed blackVPN in their annual comparison of VPN providers from 2011 until blackVPN discontinued. See also Comparison of virtual private network services References External links Official Website Yunjiguang VPN Virtual private network services
https://en.wikipedia.org/wiki/Sasaki%20%28company%29
Sasaki is a design firm specializing in Architecture, Interior Design, Urban Design, Space Planning, Landscape Architecture, Ecology, Civil Engineering, and Place Branding. The firm is headquartered in Boston, Massachusetts, but practices on an international scale, with offices in Shanghai, and Denver, Colorado, and clients and projects globally. History Sasaki was founded in 1953 by landscape architect Hideo Sasaki while he served as a professor and landscape architecture chair at the Harvard Graduate School of Design. Sasaki was founded upon collaborative, interdisciplinary design, unprecedented in design practice at the time, and an emphasis on the integration of land, buildings, people, and their contexts. Through the mid to late 1900s, Sasaki designed plazas (including Copley Square), corporate parks, college campuses, and master plans, among other projects. The firm includes a team of in house designers, software developers, and data analysts who support the practice. Today, Sasaki has over 300 employees across its diverse practice areas and between its two offices. The firm engages in a wide variety of project types, across its many disciplines. Milestones In 2000, in honor of the passing of the firm's founder, the family of Hideo Sasaki together with Sasaki and other financial supporters, established the Sasaki Foundation. The foundation, which is a separate entity from Sasaki, gives yearly grants, supporting community-led research at Sasaki. In 2012, Sasaki opened an office in Shanghai to support the firm's work in China and the larger Asia Pacific region. In 2018, Sasaki opened the Incubator, a coworking space designed by and located within the Sasaki campus, which houses the Sasaki Foundation as curator of programming. The 5,000 square-foot space is home to several like-minded non-profits, organizations, and individuals. In 2020, Sasaki established a new office in Denver, Colorado, marking the firm's third physical studio location. Opening an offi
https://en.wikipedia.org/wiki/Memory%20color%20effect
Memory color is the canonical hue of a type of object (e.g., sky, leaf, banana, or apple) that allistic human observers acquire through their experiences with instances of that type. For example, most allistic human observers know that an apple typically has a reddish hue; this knowledge about the canonical color which is represented in memory constitutes a memory color. The memory color effect is the phenomenon that memory colors directly modulate the appearance of the actual colors of objects. For example, normal allistic human trichromats, when presented with a gray banana, often perceive the gray banana as being yellow - the banana's memory color. In light of this, subjects typically adjust the color of the banana towards the color blue - the opponent color of yellow - when asked to adjust its surface to gray to cancel the subtle activation of banana's memory color. Subsequent empirical studies have also shown the memory color effect on man-made objects (e.g. smurfs, German mailboxes), the effect being especially pronounced for blue and yellow objects. To explain this, researchers have argued that because natural daylight shifts from short wavelengths of light (i.e., bluish hues) towards light of longer wavelengths (i.e., yellowish-orange hues) during the day, the memory colors for blue and yellow objects are recruited by the visual system to a higher degree to compensate for this fluctuation in illumination, thereby providing a stronger memory color effect. Form Identification Memory color plays a role when detecting an object. In a study where participants were given multiple objects, such as an apple, with two alternate forms for each, a crooked apple and a circular apple, researchers changed the colors of the alternate forms and asked if they could identify them. Most of the participants answered "unsure," suggesting that we use memory color when identifying an object. The research redefined memory color as a phenomenon when "a form's iden
https://en.wikipedia.org/wiki/IncludeOS
IncludeOS is a minimal, open source, unikernel operating system for cloud services and IoT. IncludeOS allows users to run C++ applications in the cloud without any operating system. IncludeOS adds operating system functionality to an application allowing oneself to create a 'virtual machine' for an application. IncludeOS applications boot in tens of milliseconds and require only a few megabytes of disk and memory. Architecture The minimalist architecture of IncludeOS means that it does not have any virtual memory space. In turn, therefore, there is no concept of system calls nor user space. References External links IncludeOS on GitHub IncludeOS blog Alfred Bratterud: Deconstructing the OS: The devil’s In the side effects, CppCon 2017 presentation C++ Weekly – Ep 31 – IncludeOS Computing platforms Free software operating systems Software using the Apache license Software companies of Norway Free software programmed in C++
https://en.wikipedia.org/wiki/Jean%20Ville
Jean Ville, also known under the names Jean-André Ville et André Ville, born 24 June 1910 in Marseille, died 22 January 1989 in Blois, was a French mathematician. He is known for having proved an extension of von Neumman's minimax theorem, as well as contributions in the fields of statistics and economics. He was one of the pioneers of the theory of martingales. Life Jean André Ville was the son of Jean Baptiste Ville (1871-1927) and Marie Vernet (1876-1955), both from families from Mosset in Pyrénées-Orientales. His first name was that of his godfather and uncle, Jean Ville, the second, that of his grandfather, André Vernet. André was the first name used in the family, but in his professional life, he used Jean. Bernard d'Orgeval, a classmate, writes in the directory of former students of the ENS 1992 "very discreet about his private life, discretion marked by the use of the first name Jean in his scientific and administrative career , while in the family he was André". He was a former student of the lycée Thiers of Marseille and the École normale supérieure (Promo 1929), of which he entered first. Ville's inequality is named for him, after he proved it in 1939. Publications Applications de la théorie des probabilités aux jeux de hasard, d'Émile Borel et Jean Ville (1938) References 1910 births 1989 deaths Scientists from Marseille 20th-century French mathematicians Game theorists École Normale Supérieure alumni
https://en.wikipedia.org/wiki/Modon%20%28fluid%20dynamics%29
Modons or dipole eddy pairs, are eddies that can carry water over distances of more than 1000 km in the ocean, in different directions than usual sea currents like Rossby waves, and much faster than other eddies. History The name modon was coined by M. E. Stern as a pun on the joint USA-USSR oceanographic research program POLYMODE. The modon is a dipole-vortex solution to the potential-vorticity equation that was theorized in order to explain anomalous atmospheric blocking events and eddy structures in rotating fluids, and the first solution was obtained by Stern in 1975. However, this solution was imperfect because it was not continuous at the modon boundary, so other scientists, such as Larichev and Reznik (1976), proposed other solutions that corrected that problem. Although modons were predicted theoretically in the 1970s, a pair of modons spinning in opposite directions was first identified traveling in 2017 over the Tasman Sea. The study of satellite images has allowed the identification of other modons, at least dating back to 1993, that hadn't been identified as such until then. The scientists that first discovered modons in the wild think that they can absorb small sea creatures and carry them at high speed over long ocean distances. They are also capable of affecting the transport of heat, carbon and nutrients over that area of the ocean. They move about ten times faster than a typical eddy, and can last for six months before being disengaged. Equatorial modon In 2019, Rostami and Zeitlin reported a discovery of steady, long-living, slowly eastward-moving large-scale coherent twin cyclones, so-called “equatorial modon,” by means of a moist-convective rotating shallow water model. Crudest barotropic features of MJO such as eastward propagation along the equator, slow phase speed, hydro-dynamical coherent structure, the convergent zone of moist-convection, are captured by Rostami and Zeitlin’s modon. Having an exact solution of streamlines for internal
https://en.wikipedia.org/wiki/Self-hosting%20%28compilers%29
In computer programming, self-hosting is the use of a program as part of the toolchain or operating system that produces new versions of that same program—for example, a compiler that can compile its own source code. Self-hosting software is commonplace on personal computers and larger systems. Other programs that are typically self-hosting include kernels, assemblers, command-line interpreters and revision control software. Operating systems An operating system is self-hosted when the toolchain to build the operating system runs on that same operating system. For example, Windows can be built on a computer running Windows. Before a system can become self-hosted, another system is needed to develop it until it reaches a stage where self-hosting is possible. When developing for a new computer or operating system, a system to run the development software is needed, but development software used to write and build the operating system is also necessary. This is called a bootstrapping problem or, more generically, a chicken or the egg dilemma. A solution to this problem is the cross compiler (or cross assembler when working with assembly language). A cross compiler allows source code on one platform to be compiled for a different machine or operating system, making it possible to create an operating system for a machine for which a self-hosting compiler does not yet exist. Once written, software can be deployed to the target system using means such as an EPROM, floppy diskette, flash memory (such as a USB thumb drive), or JTAG device. This is similar to the method used to write software for gaming consoles or for handheld devices like cellular phones or tablets, which do not host their own development tools. Once the system is mature enough to compile its own code, the cross-development dependency ends. At this point, an operating system is said to be self-hosted. Compilers Software development using compiler or interpreters can also be self hosted when the comp
https://en.wikipedia.org/wiki/Self-hosting%20%28web%20services%29
Self-hosting is the practice of running and maintaining a website or service using a private web server, instead of using a service outside of someone's own control. Self-hosting allows users to have more control over their data, privacy, and computing infrastructure, as well as potentially saving costs and improving skills. History The practice of self-hosting web services became more feasible with the development of cloud computing and virtualization technologies, which enabled users to run their own servers on remote hardware or virtual machines. The first public cloud service, Amazon Web Services (AWS), was launched in 2006, offering Simple Storage Service (S3) and Elastic Compute Cloud (EC2) as its initial products. Self-hosting web services became more popular with the rise of free software and open source software projects that provide alternatives to various web-based services and applications, such as file storage, password management, media streaming, home automation, and more. There is also a sizeable hobbyist community around self-hosting, made up of hobbyists, technology professionals and privacy conscious individuals. Benefits Some of the benefits of self-hosting are: The user has complete control over their data and can decide how and where it is hosted. The user can customize the site design and functionality according to their preferences and needs. The user can potentially save money by using a lower-cost hosting service or combining multiple services on one server. The user can improve their skills and knowledge by learning how to set up and manage their own server and services. The user can avoid relying on third-party providers that may have privacy issues, security breaches, outages, or changes in policies. Challenges Some of the challenges of self-hosting are: The user has to take responsibility for maintaining and updating their server and services, which may require technical skills and time. The user has to ensure that their serv
https://en.wikipedia.org/wiki/Johan%20Antony%20Barrau
Johan Antony Barrau (3 April 1873, Oisterwijk – 8 January 1953, Utrecht) was a Dutch mathematician, specializing in geometry. Barrau was educated at the Dutch Royal Naval College at Willemsoord and then at the University of Amsterdam. From 1891 to 1898, Barrau was an officer with the Royal Netherlands Navy, later with the Netherlands Marine Corps. However, he left the service and became a mathematics teacher at a Hogere Burgerschool in Dordrecht until 1900, then in Amsterdam. In 1907 he obtained his PhD at the University of Amsterdam under the supervision of Diederik Korteweg. From 1908 to 1913 Barrau was a mathematics professor at the Delft University of Technology. He was a professor of synthetic, analytical and descriptive differential geometry at the University of Groningen from 1913 to 1928. From 1928 until his retirement at age 70, he was a professor at Utrecht University. He received the military service medal consisting of the Expedition Cross with the Atjeh clasp and was named Knight of the Order of the Netherlands Lion. Barrau published a textbook on analytical geometry and various articles in national and international journals. He was an Invited Speaker of the ICM in 1920 at Strasbourg and in 1924 at Toronto. References 1873 births 1953 deaths 20th-century Dutch mathematicians Geometers University of Amsterdam alumni Academic staff of the University of Groningen Academic staff of Utrecht University Recipients of the Order of the Netherlands Lion People from Oisterwijk
https://en.wikipedia.org/wiki/OSTree
libostree (previously OSTree) is a system for versioning updates of Linux-based operating systems. It can be considered as "Git for operating system binaries". It operates in userspace, and will work on top of any Linux file system. At its core is a Git-like content-addressed object store with branches (or "refs") to track meaningful file system trees within the store. Features OSTree is closely inspired by Git. It operates on commits which refer to filesystem trees. To refer to different commits while maintaining a user-readable name, OSTree provides "references" (analogous to branches in Git), such asexampleos/buildmain/x86_64-runtime. Files provided by commits are by default immutable, done by mounting the filesystem itself as read-only. OSTree allows for two mutable directories for storing user data: /etc and /var. It provides a mechanism to allow filesystem trees to add configuration files to /etc while also allowing system administrators to edit those files in a persistent manner. OSTree provides bootloader management for hardware deployments. This enables atomic updates, as OSTree can create deployments and atomically insert them into the boot partition. It also allows for systemwide rollback by selecting old deployments during startup. Usage libostree is used by various Linux operating systems and tools: endless OS through eos-updater. Flatpak, used to store applications and runtimes and to provide deduplication. Fedora's immutable spins (Silverblue, Kinoite, and Sericea) through rpm-ostree Atomic Host The GNOME continuous project for continuous delivery of GNOME components. Torizon OS embedded Linux uses libostree with the Uptane Frameworks for OS Updates. References External links Computer libraries Linux software
https://en.wikipedia.org/wiki/Batterygate
Batterygate is a term used to describe deliberate processor slowdowns on Apple's iPhones, in order to prevent handsets with degraded batteries shutting down when under high load. Critics argued the slowdown amounted to planned obsolescence, however this may stem from the common misconception that all older iPhones were slowed down. Some have argued that introducing a feature to prevent handsets with degraded batteries from rebooting is in fact the opposite of planned obsolescence since a slower non-rebooting phone would be preferable to the alternative. Other criticism has come from the fact that the affected handsets were slowed down without explanation or other options provided to the user. Apple has since updated iOS to provide notifications and settings to allow users visibility of the throttling and even the ability to disable the throttling if the user prefers to have their phone reboot under high load. The controversy first emerged in late-2016, when it was reported that since a recent iOS update, some iPhone handsets had begun to experience unexpected shutdowns when their battery capacity reached 30%, caused by drops in the battery's terminal voltage below a threshold of around three volts required for operation of the device. History Upon the release of iOS 10.1.1 in late-2016, reports surfaced of battery usage issues with the update. There were also reports of device instability from some users on iPhone 6 and iPhone 6S models, including situations where the device would unexpectedly shut down once its battery capacity reached 30% (with one user having described the battery percentage as unexpectedly jumping down to 1% before doing so, but still appearing as 30% after the device was plugged in and rebooted). Apple confirmed in December 2016 that some iPhone 6S models manufactured in September and October 2015 had suffered from a battery manufacturing defect. The company stated that this defect was not a safety concern, but that it could diminish ca
https://en.wikipedia.org/wiki/ExpressVPN
ExpressVPN is a VPN service offered by the British Virgin Islands-registered company Express Technologies Ltd. The software is marketed as a privacy and security tool that encrypts users' web traffic and masks their IP addresses. As of September 2021, ExpressVPN is owned by Kape Technologies and reportedly has 4 million users. History ExpressVPN's parent company, Express VPN International Ltd, was founded in 2009 by Peter Burchhardt and Dan Pomerantz, two serial entrepreneurs who were also Wharton School alumni. The parent company does business as ExpressVPN. On January 25, 2016, ExpressVPN announced that it would soon roll out an upgraded CA certificate. Also in December, ExpressVPN released open source leak testing tools on GitHub. In July 2017, ExpressVPN announced in an open letter that Apple had removed all VPN apps from its App Store in China, a revelation that was later picked up by The New York Times and other outlets. In response to questions from U.S. Senators, Apple stated it had removed 674 VPN apps from the App Store in China in 2017 at the request of the Chinese government. In December, ExpressVPN came into the spotlight in relation to the investigation of the assassination of Russian ambassador to Turkey, Andrei Karlov. Turkish investigators seized an ExpressVPN server which they say was used to delete relevant information from the assassin's Gmail and Facebook accounts. Turkish authorities were unable to find any logs to aid their investigation, which the company said verified its claim that it did not store user activity or connection logs, adding; "while it's unfortunate that security tools like VPNs can be abused for illicit purposes, they are critical for our safety and the preservation of our right to privacy online. ExpressVPN is fundamentally opposed to any efforts to install 'backdoors' or attempts by governments to otherwise undermine such technologies." In December 2019, ExpressVPN became a founding member of the VPN Trust Initiative,
https://en.wikipedia.org/wiki/List%20of%20taxa%20with%20candidatus%20status
This is a list of taxa with Candidatus status. For taxa not covered by this list, see also: the GenBank taxonomy for "effective" names as published; the Candidatus Lists and LPSN for latinate names, some sanitized to match the Code. Phyla "Ca. Absconditabacteria" (previously Candidate phylum SR1) ABY1 aka OD1-ABY1, subgroup of OD1 ("Ca. Parcubacteria") Candidate phylum AC1 "Ca. Acetothermia" (previously Candidate phylum OP1) "Ca. Aerophobetes" (previously Candidate phylum CD12 or BHI80-139) "Ca. Aminicenantes" (previously Candidate phylum OP8) aquifer1 aquifer2 "Ca. Berkelbacteria" (previously Candidate phylum ACD58) BRC1 CAB-I "Ca. Calescamantes" (previously Candidate phylum EM19) Candidate phylum CPR2 Candidate phylum CPR3 Candidate phylum NC10 Candidate phylum OP2 Candidate phylum RF3 Candidate phylum SAM Candidate phylum SPAM Candidate phylum TG2 Candidate phylum VC2 Candidate phylum WS1 Candidate phylum WS2 Candidate phylum WS4 Candidate phylum WYO CKC4 "Ca. Cloacimonetes" (previously Candidate phylum WWE1) CPR1 "Ca. Dependentiae" (previously Candidate phylum TM6) EM 3 "Ca. Endomicrobia" Stingl et al. 2005 "Ca. Fermentibacteria" (Hyd24-12) "Ca. Fervidibacteria" (previously Candidate phylum OctSpa1-106) GAL08 GAL15 GN01 GN03 GN04 GN05 GN06 GN07 GN08 GN09 GN10 GN11 GN12 GN13 GN14 GN15 GOUTA4 "Ca. Gracilibacteria" (previously Candidate phylum GN02, BD1-5, or BD1-5 group) Guaymas1 "Ca. Hydrogenedentes" (previously Candidate phylum NKB19) JL-ETNP-Z39 "Ca. Katanobacteria" (previously Candidate phylum WWE3) Kazan-3B-09 KD3-62 kpj58rc KSA1 KSA2 KSB1 KSB2 KSB4 "Ca. Latescibacteria" (previously Candidate phylum WS3) LCP-89 LD1-PA38 "Ca. Marinamargulisbacteria" (previously Candidate division ZB3) "Ca. Marinimicrobia" (previously Marine Group A or Candidate phylum SAR406) "Ca. Melainabacteria" "Ca. Microgenomates" (previously Candidate phylum OP11) "Ca. Modulibacteria" (previously Candidate phylum K
https://en.wikipedia.org/wiki/FOCAL%20character%20set
In computing FOCAL character set refers to a group of 8-bit single byte character sets introduced by Hewlett-Packard since 1979. It was used in several RPN calculators supporting the FOCAL programming language, like the HP-41C/CV/CX as well as the later HP-42S, which was introduced in 1988 and produced up to 1995. As such, it is also used by SwissMicros' DM41/L, both introduced in 2015, and is implicitly supported by the DM42, introduced in 2017 (although the later calculator utilizes Free42, which is based on Unicode internally). Character set The character set is derived from ASCII, but with the control code range and some high bit characters replaced by various special characters. When Hewlett-Packard introduced the HP-42S in 1988, the FOCAL character set was revised to include more characters, including a number of characters already provided by the HP 82240A infrared thermo printer, which had been introduced in 1986, as part of its extended variant of the 1985 revision of the HP Roman-8 character set, although at completely different code points. There is no code point definition for the euro sign in this character set. Translation from HP-42S character set to the modified HP Roman-8 (supported by HP 82240A etc.) character set: See also Hewlett-Packard calculator character sets Notes References Further reading Character sets
https://en.wikipedia.org/wiki/Rangika%20Halwatura
Rangika Umesh Halwaura (born 4 February 1978) is a researcher, academic and inventor at the University of Moratuwa and currently the youngest professor in Civil Engineering Science in Sri Lanka. Early life and education Halwathura was born 4 February 1978 in Kalutara, Sri Lanka. He was raised in a family of four consisting of his parents and his younger brother, Shanaka Halwathura, a Sri Lanka Army officer. He attended Kalutara Vidyalaya. Halwathura graduated with first class honours from University of Moratuwa with a bachelor's of science in engineering. He later completed his doctorate degree in structural and building services engineering in 2008 from the same institution. Career As of 2017, Halwathura is recognized as the youngest professor of Civil Engineering in Sri Lanka. Personal life Halwatura married to doctor Charitha Poruthota in 2004. Together, they have two daughters, Pamoda and Ranoda. Honours In 2016, Halwatura received the Committee of Vice-Chancellors and Directors's (CVCD) Most Outstanding Young Researcher award. He also won the Sri Lanka 2016 Energy Globe Award. Halwatura was nominated by the National Academy of Sciences and subsequently won the 2017 The World Academy of Sciences Young Scientist Award. References Living people 1978 births Alumni of the University of Moratuwa People from Kalutara Sinhalese people Sri Lankan engineers
https://en.wikipedia.org/wiki/Jose%20Holguin-Veras
Jose Holguin-Veras is the William H. Hart Professor, Director of the Center for Infrastructure, Transportation, and the Environment, and Head of the Volvo Research and Educational Foundations (VREF) Center of Excellence on Sustainable Urban Freight Systems at the Rensselaer Polytechnic Institute. He is a graduate of the Universidad Autónoma de Santo Domingo, the Central University of Venezuela, and the University of Texas at Austin. In 2013, Holguin-Veras received the White House Champion of Change Award for his contributions to freight transportation and disaster response. In 2014, he was elected a fellow of the American Society of Civil Engineers. Holguin-Veras was the leader of the team behind the "New York City Off-Hour Deliveries" project, which in 2017 became a finalist in the Institute for Operations Research and Management Sciences Franz Edelman Award Competition. Dr. Holguin-Veras has been named an Edelman Fellow in the Class of 2017. He is a specialist in urban freight systems. References Living people Rensselaer Polytechnic Institute faculty Universidad Autónoma de Santo Domingo alumni Central University of Venezuela alumni University of Texas at Austin alumni Venezuelan civil engineers Fellows of the American Society of Civil Engineers Dominican Republic engineers White Dominicans Year of birth missing (living people)
https://en.wikipedia.org/wiki/Peter%20Lucas%20%28computer%20scientist%29
Peter Lucas (13 January 1935 in Vienna, Austria – 2 February 2015 in California, United States) was an Austrian computer scientist and university professor. Life Peter Lucas graduated in 1953 and then studied telecommunications at the Vienna University of Technology. He completed his studies in 1959 with a diploma thesis on the topic of programming electronic calculating machines. Then he was a member of Heinz Zemanek's group and was responsible for the system programming of Mailüfterl, the first fully transistorized computer in continental Europe. In 1961, he moved with the Mailüfterl Group from the Technical University to the IBM company, working at the IBM Laboratory Vienna, where he worked on the formal description of programming languages. Together with Hans Bekić, Kurt Walk, and Heinz Zemanek, he was responsible for the formal definition of the IBM programming language PL/I using the Vienna Definition Language (VDL), an important part of the formal method VDM. In addition, he worked together with Hans Bekić on a compiler for ALGOL 60. During this time, he gave lectures and lectures at the Vienna University of Technology and the Johannes Kepler University Linz, covering theoretical foundations of programming and the formal definition of programming languages. In 1978, he joined the Thomas J. Watson Research Center at Yorktown Heights, New York, United States, where he worked on experimental compiler projects. In 1979, he moved to IBM in San Jose, California, later the IBM Almaden Research Center. In 1988, he worked in John Backus' group on the definition and implementation of the functional programming language FL. In October 1993, he was appointed as a full professor in software technology at the Graz University of Technology, retiring to an emeritus position in July 2001. From 1994, he was chairman of Formal Methods Europe (FME) and corresponding member of the Austrian Academy of Sciences. Peter Lucas died on 2 February 2015 at the age of 80. Awards 19
https://en.wikipedia.org/wiki/BlueBorne%20%28security%20vulnerability%29
BlueBorne is a type of security vulnerability with Bluetooth implementations in Android, iOS, Linux and Windows. It affects many electronic devices such as laptops, smart cars, smartphones and wearable gadgets. One example is . The vulnerabilities were first reported by Armis, the asset intelligence cybersecurity company, on 12 September 2017. According to Armis, "The BlueBorne attack vector can potentially affect all devices with Bluetooth capabilities, estimated at over 8.2 billion devices today [2017]." History The BlueBorne security vulnerabilities were first reported by Armis, the asset intelligence cybersecurity company, on 12 September 2017. Technical Information The BlueBorne vulnerabilities are a set of 8 separate vulnerabilities. They can be broken down into groups based upon platform and type. There were vulnerabilities found in the Bluetooth code of the Android, iOS, Linux and Windows platforms: Linux kernel RCE vulnerability - CVE-2017-1000251 Linux Bluetooth stack (BlueZ) information Leak vulnerability - CVE-2017-1000250 Android information Leak vulnerability - CVE-2017-0785 Android RCE vulnerability #1 - CVE-2017-0781 Android RCE vulnerability #2 - CVE-2017-0782 The Bluetooth Pineapple in Android - Logical Flaw CVE-2017-0783 The Bluetooth Pineapple in Windows - Logical Flaw CVE-2017-8628 Apple Low Energy Audio Protocol RCE vulnerability - CVE-2017-14315 The vulnerabilities are a mixture of information leak vulnerabilities, remote code execution vulnerability or logical flaw vulnerabilities. The Apple iOS vulnerability was a remote code execution vulnerability due to the implementation of LEAP (Low Energy Audio Protocol). This vulnerability was only present in older versions of the Apple iOS. Impact In 2017, BlueBorne was estimated to potentially affect all of the 8.2 billion Bluetooth devices worldwide, although they clarify that 5.3 billion Bluetooth devices are at risk. Many devices are affected, including laptops, smart cars,
https://en.wikipedia.org/wiki/Monosiphonous%20algae
Monosiphonous algae are algae which consist of a single row of cells with, or without, cortication. See also Polysiphonous References Algae
https://en.wikipedia.org/wiki/Moored%20training%20ship
A moored training ship (MTS) is a United States Navy nuclear powered submarine that has been converted to a training ship for the Naval Nuclear Power Training Command's Nuclear Power Training Unit (NPTU) at Naval Support Activity Charleston in South Carolina. The NPTU is part of the Navy's Nuclear Power School at Goose Creek, S.C. The Navy uses decommissioned nuclear submarines and converts them to MTSs to train personnel in the operation and maintenance of submarines and their nuclear reactors. The first moored training ship was a fleet ballistic missile submarine, redesignated as (MTS-635) in 1989, followed a year later by , a ballistic missile submarine, redesignated as (MTS-626). Conversion of these two boats took place at the Charleston Naval Shipyard and modifications included special mooring arrangements with a mechanism to absorb power generated by the main propulsion shaft. The Navy added two more moored training ships to this facility, and , a pair of attack submarines. The conversions for these two took place at the Norfolk Naval Shipyard and they will then be taken to NSA Charleston. La Jolla became inactive in early 2015 and began the 32 month conversion to a training ship. Changes include having the hull cut into three sections, with the center section being recycled and the other two joined with three new sections, manufactured by Electric Boat, extending the overall length by 23 m (76 ft). The project was expected to be completed by the end of 2018. San Francisco arrived at Norfolk to begin her conversion in January 2018. With the addition of La Jolla and San Francisco, the Navy will retire Sam Rayburn and Daniel Webster. Sam Rayburn will be relocated to Norfolk Naval Shipyard in 2021, to remain there until the inactivation process begins, and Daniel Webster will also be inactivated at Norfolk, sometime later. Moored training ships See also United States Navy Nuclear Propulsion Nuclear marine propulsion United States naval reactors Li
https://en.wikipedia.org/wiki/Pimax
Pimax is a technology company specializing in virtual reality hardware products. Pimax Technology was founded in November 2015. In 2016 its first product, the Pimax 4K virtual reality headset, was released, becoming the first commercially available headset with a combined (left + right eye) resolution of 4K. That first product was recognized as the best VR product in Asia at CES 2016. In 2017, they ran a crowdfunding campaign on Kickstarter for the Pimax 8K headset, raising approximately $4.2 million, which held the Guinness World Record for the most successful crowdfunded VR project. On the 19th of December 2017, Pimax announced they had closed a $15 million series A funding round. On 8 January 2020, Pimax’s flagship headset the world’s first dual native 4K consumer VR headset Vision 8K X, featuring high resolution and ultra-wide field of view, 200°(D)/170°(H)/115°(V), was selected as Top Tech of CES: AR/VR by Digital Trends. On the 18th of October 2020, Pimax received $20M (USD) series B funding round, announced at World Conference on VR Industry (WCVRI) 2020. Products Pimax Technology Portfolio Pimax Technology LTD portfolio includes 15 patents, 6 trademarks and 9 software work certificates that represent the top level of the global VR industry. In addition to the team's technical precipitation in the field of virtual reality and augmented reality technology and algorithm research for more than 10 years, it has maintained the leading position of VR headset with the highest resolution in the world for a long time. Product comparison Kickstarter era Pimax 4K Released in 2016, the Pimax 4K was Pimax's first foray into the VR scene. It boasts a resolution of 1920×2160 per eye, for a combined total of 3840×2160 (thus the "4K" denomination though not full stereo 4K) running at a refresh rate of 60Hz. Pimax 8K The Pimax 8K is a virtual reality head-mounted display. It features two 4K displays, one for each eye, with an advertised field of view of 200 degrees
https://en.wikipedia.org/wiki/DataGravity
DataGravity Inc. was an American industry data management company, which produced security software. The company was founded in April 2012 by Paula Long and John Joseph. DataGravity announced its first products at VMworld in 2014. It won Best of Show, and New Technology awards for the event. It began shipping their first products in October 2014. The company focused on protection and security of the data stored on the array, and named this new type of storage as data-aware storage. It publicly changed its product strategy in February 2016 from data storage appliances to a software solution focused on behavioral data security. This product strategy change resulted in multiple rounds of layoffs. Fate Multiple reports use conflicting terminology about the final fate of the company. Some reports say HyTrust acquired DataGravity. Other reports, including a press release issued by HyTrust itself, say HyTrust acquired the assets of DataGravity after it was signed over to a liquidator. HyTrust told Fortune that founder and CEO Paula Long left DataGravity a few weeks before the transaction was announced, and that co-founder John Joseph left some time before that. According to some reports, DataGravity ceased day-to-day operations in June 2017, when it cancelled employee benefit plans and signed the company over to liquidator Barry Kallander of the Kallander Group. In one such report, correspondence from DataGravity President Barry Kallander states "The corporation was not sold - the assets of the company were....Unfortunately the common shares are worthless." Conversely, DataGravity CTO David Siles was quoted as saying the company "did not shut down", and that the transaction "wasn't a fire sale. We were acquired because we complete a vision, add value, have customers who love what we do. Together we will offer a very compelling offering to the marketplace solving very pressing needs for many enterprises." Approximately 20 former DataGravity employees joined HyTru
https://en.wikipedia.org/wiki/MacFarsi%20encoding
MacFarsi encoding is an obsolete encoding for Farsi/Persian, Urdu (and English) texts that was used in Apple Macintosh computers to texts. The encoding is identical to MacArabic encoding, except the numerals, which are the Persian/Urdu style, also known as "Extended" or "Eastern" Arabic-Indic numerals. See Arabic script in Unicode for more details. References See also MacArabic encoding Arabic script in Unicode Character sets Farsi Persian alphabets
https://en.wikipedia.org/wiki/EMUI
EMUI (formerly known as Emotion UI, and also known as MagicOS (formerly known as Magic UI on Honor smartphones since 2019)) is an Android-derived mobile operating system developed by Chinese technology company Huawei. It is used on the company's smartphones and tablet computers. Instead of Google Mobile Services, EMUI devices have used Huawei Mobile Services, such as the Huawei AppGallery, since 2020 due to United States sanctions imposed during the trade war against China. From Version 13 (2022), Huawei additionally bundled the HarmonyOS microkernel with the Android system; this microkernel for example handled identity security features such as the fingerprint authentication. History On 30 July 2012, Huawei introduced Emotion UI 1.0, based on Android 4.0. It features a voice assistant app (only in Chinese), customizable homescreens and theme-switching. The company rolled out installation files for the Ascend P1 through their website. The company claims that it is "probably the world's most emotional system". On 4 September 2014, the company announced EMUI 3.0, along with Ascend Mate 7 in the pre-IFA event in Berlin. The user interface was ever since called "EMUI" instead of "Emotion UI". In Mainland China, the release introduces the Huawei AppGallery application store; international markets continued to use Google Play. In late 2015, Huawei introduced EMUI 4.0, based on Android Marshmallow. In 2016, EMUI 5.0 was introduced, based on Android Nougat. In 2017, Huawei introduced EMUI 8.0, based on Android Oreo; beginning with this release, the version number would now be aligned with that of the Android version from which it was derived. Huawei unveiled EMUI 9.0, based on Android Pie, at IFA in 2018. Huawei stated a goal for the release to make EMUI more "simple", "enjoyable", and consistent; it included various usability tweaks, reorganized settings menus, dark mode, gesture navigation, and GPU Turbo 2.0. Beginning with EMUI 9.0.1, new Huawei devices ship with t
https://en.wikipedia.org/wiki/Integrated%20Electronics%20Piezo-Electric
The abbreviation IEPE stands for Integrated Electronics Piezo-Electric. It characterises a technical standard for piezoelectric sensors which contain built-in impedance conversion electronics. IEPE sensors are used to measure acceleration, force or pressure. Measurement microphones also apply the IEPE standard. Other proprietary names for the same principle are ICP, CCLD, IsoTron or DeltaTron. The electronics of the IEPE sensor (typically implemented as FET circuit) converts the high impedance signal of the piezoelectric material into a voltage signal with a low impedance of typically 100 Ω. A low impedance signal is advantageous because it can be transmitted across long cable lengths without a loss of signal quality. In addition, special low noise cables, which are otherwise required for use with piezoelectric sensors, are no longer necessary. The sensor circuit is supplied with constant current. A distinguishing feature of the IEPE principle is that the power supply and the sensor signal are transmitted via one shielded wire. Most IEPE sensors work at a constant current between 2 and 20 mA. A common value is 4 mA. The higher the constant current the longer the possible cable length. Cables of several hundred meters length can be used without a loss of signal quality. Supplying the IEPE sensor with constant current, results in a positive bias voltage, typically between 8 and 12 volts, at the output. The actual measuring signal of the sensor is added to this bias voltage. The supply or compliance voltage of the constant current source should be 24 to 30 V which is about two times the bias voltage. This ensures maximum amplitudes in positive and negative direction. A typical IEPE sensor supply with 4 mA constant current and 25 V compliance voltage has a power consumption of 100 mW. This can be a drawback in battery powered systems. For such applications low-power IEPE sensors exist which can be operated at only 0.1 mA constant current from a 12 V supply. This ma
https://en.wikipedia.org/wiki/Egocentric%20vision
Egocentric vision or first-person vision is a sub-field of computer vision that entails analyzing images and videos captured by a wearable camera, which is typically worn on the head or on the chest and naturally approximates the visual field of the camera wearer. Consequently, visual data capture the part of the scene on which the user focuses to carry out the task at hand and offer a valuable perspective to understand the user's activities and their context in a naturalistic setting. The wearable camera looking forwards is often supplemented with a camera looking inward at the user's eye and able to measure a user's eye gaze, which is useful to reveal attention and to better understand the user's activity and intentions. History The idea of using a wearable camera to gather visual data from a first-person perspective dates back to the 70s, when Steve Mann invented "Digital Eye Glass", a device that, when worn, causes the human eye itself to effectively become both an electronic camera and a television display. Subsequently, wearable cameras were used for health-related applications in the context of Humanistic Intelligence and Wearable AI. Egocentric vision is best done from the point-of-eye, but may also be done by way of a neck-worn camera when eyeglasses would be in-the-way. This neck-worn variant was popularized by way of the Microsoft SenseCam in 2006 for experimental health research works. The interest of the computer vision community into the egocentric paradigm has been arising slowly entering the 2010s and it is rapidly growing in recent years, boosted by both the impressive advances in the field of wearable technology and by the increasing number of potential applications. The prototypical first-person vision system described by Kanade and Hebert, in 2012 is composed by three basic components: a localization component able to estimate the surrounding, a recognition component able to identify object and people, and an activity recognition componen
https://en.wikipedia.org/wiki/Arctur-2
Arctur-2 is a supercomputer located in Slovenia which is used by scientists and industry professionals to run intensive workloads and computer simulations such as aerodynamics simulations and steel casting simulations. The Arctur-2 High Performance Computer (HPC) is located in Nova Gorica (Slovenia) and was put into operation in early 2017. Arctur-2 is a system built by Sugon and consists of 30 nodes, each with two Intel Xeon E5-2690v4 processors; 8 of these nodes are equipped with 4 Nvidia Tesla M60 GPUs each, and another 8 of them have big memory capacity of 1024GB per node. The supercomputer is managed by Arctur. References GPGPU supercomputers Supercomputing in Europe
https://en.wikipedia.org/wiki/Ernst-R%C3%BCdiger%20Olderog
Ernst-Rüdiger Olderog (born 4 June 1955) is a German computer scientist. He is a full professor at the University of Oldenburg in Oldenburg, northern Germany. He heads the Correct Systems Design (CSD) group whose research is focused on programming language theory. Their research goal is methods for the systematic development of correct software for parallel and distributed systems under real-time constraints. In 1994, Prof. Olderog was awarded the Leibnitz Prize of the German Research Foundation (DFG) for his work. He authored a number of scientific books and served as editor-in-chief of the journal Acta Informatica and as chairman of the IFIP Working Group 2.2 on Formal Description of Programming Concepts. His work in this Working Group was awarded the IFIP Silver Core in 1998. Biography Education and Academic Career Olderog comes from Bredenbek in Schleswig-Holstein, northern Germany, and studied computer science, mathematics and logic at the University of Kiel, where he received his doctorate in 1981 supervised by Prof. Hans Langmaack on Hoare-style characterization systems for ALGOL-like programming languages. After several research visits abroad (including the Programming Research Group at the University of Oxford and in Amsterdam, Edinburgh, Yorktown Heights and Saarbrücken), he habilitated also at Kiel University in 1989. Since 1989, Olderog has been based at the Department of Computer Science, University of Oldenburg. From 1995 to 2005, Prof. Olderog served as chairman of the IFIP Working Group 2.2 on Formal Description of Programming Concepts. He was editor-in-chief of the journal Acta Informatica and in 2012 became a member of the Academia Europaea. From 2012 to 2021 Olderog was Speaker of the Graduate School SCARE (I + II) and from 2017 to 2019 be was dean of the Faculty II. Awards and honors In 1994, Olderog, together with his colleague Manfred Broy, was awarded the Deutsche Forschungsgemeinschaft (DFG) Gottfried Wilhelm Leibniz Prize, worth thr
https://en.wikipedia.org/wiki/Testbed%20aircraft
A testbed aircraft is an aeroplane, helicopter or other kind of aircraft intended for flight research or testing the aircraft concepts or on-board equipment. These could be specially designed or modified from serial production aircraft. Use of testbed aircraft For example, in development of new aircraft engines, these are fitted to a testbed aircraft for flight testing, before certification. New instruments wiring and equipment, a fuel system and piping, structural alterations to the wings, and other adjustments are needed for this adaptation. The Folland Fo.108 (nicknamed the "Folland Frightful") was a dedicated engine testbed aircraft in service from 1940. The aircraft had a mid-fuselage cabin for test instrumentation and observers. Twelve were built and provided to British aero-engine companies. A large number of aircraft-testbeds have been produced and tested since 1941 in the USSR and Russia by the Gromov Flight Research Institute. AlliedSignal, Honeywell Aerospace, Pratt & Whitney, and other aerospace companies used Boeing jetliners as flying testbed aircraft. See also Index of aviation articles List of experimental aircraft List of aerospace flight test centres Development mule Iron bird (aviation) References Aerospace engineering Experimental aircraft Aviation industry Civil aviation Military aviation Aircraft operations History of aviation
https://en.wikipedia.org/wiki/Glutamate-sensitive%20fluorescent%20reporter
A genetically engineered fluorescent protein that changes its fluorescence when bound to the neurotransmitter glutamate. Glutamate-sensitive fluorescent reporters (iGluSnFR, colloquially pronounced 'glue sniffer') are used to monitor the activity of presynaptic terminals by fluorescence microscopy. GluSnFRs are a class of optogenetic sensors used in neuroscience research. In brain tissue, two-photon microscopy is typically used to monitor GluSnFR fluorescence. Design The widely used iGluSnFR consists of a circularly permuted enhanced green fluorescent protein (cpEGFP) fused to a glutamate binding protein (GluBP) from a bacterium. When GluBP binds a glutamate molecule, it changes its shape, pulling the EGFP barrel together, increasing fluorescence. A specific peptide segment (PDGFR) is included to bring the sensor to the outside of the cell membrane. In the more recent version by Aggarwal et al. (2022), researchers introduced iGluSnFR to two additional anchoring domains, a glycosylphostidylinositol (GPI) anchor, and a modified form of the cytosolic -cterminal domain of Stargazin with a PDZ ligand. History The first genetically encoded fluorescent glutamate sensors (FLIPE, GluSnFR and SuperGluSnFR) were constructed by attaching cyan-fluorescent protein (CFP) and yellow-fluorescent protein (YFP) to a bacterial glutamate binding protein (GluBP). Glutamate binding changed the distance between CFP and YFP, changing the efficiency of energy transfer (FRET) between the two fluorophores. A breakthrough in visualizing glutamate release was achieved with iGluSnFR, a single-fluorophore glutamate sensor based on EGFP producing a ~5‑fold increase in fluorescence. To measure synaptic transmission at high frequencies, novel iGluSnFR variants with accelerated kinetics have recently been developed. References Neuroscience Membrane proteins Fluorescent proteins Genetic engineering
https://en.wikipedia.org/wiki/Clearing%20denominators
In mathematics, the method of clearing denominators, also called clearing fractions, is a technique for simplifying an equation equating two expressions that each are a sum of rational expressions – which includes simple fractions. Example Consider the equation The smallest common multiple of the two denominators 6 and 15z is 30z, so one multiplies both sides by 30z: The result is an equation with no fractions. The simplified equation is not entirely equivalent to the original. For when we substitute and in the last equation, both sides simplify to 0, so we get , a mathematical truth. But the same substitution applied to the original equation results in , which is mathematically meaningless. Description Without loss of generality, we may assume that the right-hand side of the equation is 0, since an equation may equivalently be rewritten in the form . So let the equation have the form The first step is to determine a common denominator of these fractions – preferably the least common denominator, which is the least common multiple of the . This means that each is a factor of , so for some expression that is not a fraction. Then provided that does not assume the value 0 – in which case also equals 0. So we have now Provided that does not assume the value 0, the latter equation is equivalent with in which the denominators have vanished. As shown by the provisos, care has to be taken not to introduce zeros of – viewed as a function of the unknowns of the equation – as spurious solutions. Example 2 Consider the equation The least common denominator is . Following the method as described above results in Simplifying this further gives us the solution . It is easily checked that none of the zeros of – namely , , and – is a solution of the final equation, so no spurious solutions were introduced. References Elementary algebra Equations
https://en.wikipedia.org/wiki/Fluorenylmethyloxycarbonyl%20protecting%20group
The fluorenylmethoxycarbonyl protecting group (Fmoc) is a base-labile protecting group used in organic synthesis. Protection & Formation Fmoc carbamate is frequently used as a protecting group for amines, where the Fmoc group can be introduced by reacting the amine with fluorenylmethyloxycarbonyl chloride (Fmoc-Cl), e.g.: The other common method for introducing the Fmoc group is through 9-fluorenylmethylsuccinimidyl carbonate (Fmoc-OSu), which may itself be obtained by the reaction of Fmoc-Cl with the dicyclohexylammonium salt of N-hydroxysuccinimide. Reacting with 9-fluorenylmethyloxycarbonyl azide (itself made by reacting Fmoc-Cl with sodium azide) in sodium bicarbonate and aqueous dioxane is also a method to install Fmoc group. Because the fluorenyl group is highly fluorescent, certain UV-inactive compounds may be reacted to give the Fmoc derivatives, suitable for analysis by reversed phase HPLC. Analytical uses of Fmoc-Cl that do not use chromatography may be limited by the requirement that excess Fmoc-Cl be removed before an analysis of fluorescence. Cleavage & Deprotection The Fmoc group is rapidly removed by base. Piperidine is usually preferred for Fmoc group removal as it forms a stable adduct with the dibenzofulvene byproduct, preventing it from reacting with the substrate. Roles in SPPS The use of Fmoc as a temporary protecting group for amine at the N-terminus in SPPS is very widespread for Fmoc/tBu approach, because its removal with piperidine solution does not disturb the acid-labile linker between the peptide and the resin. A typical SPPS Fmoc deprotection is performed with a solution of 20% piperidine in N,N-dimethylformamide (DMF). Common deprotection cocktails for Fmoc during SPPS: 20% piperidine in DMF (Fmoc group has an approximate half life of 6 seconds in this solution) 5% piperazine, 1% DBU and 1% formic acid in DMF. This method avoids the use of strictly controlled piperidine. No side product was observed for a peptide with 9 residu
https://en.wikipedia.org/wiki/Compensation%20%28cytometry%29
In cytometry, compensation is a mathematical correction of a signal overlap between the channels of the emission spectra of different fluorochromes. The photons emitted by fluorochromes have different energies and wavelengths and as flow cytometers use photomultiplier tubes (PMT) in order to convert the photons into electrons, the detector can register the signal from more than one fluorochrome. This creates a signal overlap (spillover) which cannot be removed by the optical system and has to be corrected electronically. The compensation can be done through different flow cytometry software such as Flowjo, Flowlogic, Kaluza etc. The first data compensation was done in 1977 by Michael Loken et al. during a two colour experiment, where mouse splenocytes were stained with fluorescein and rhodamine. Spillover When one cell is marked by two or more fluorochromes, the added brightness of one fluorochrome to the other creates significant background noise and affects the strength of the signal. This is called a spillover. The physical overlap between the different emission spectra of fluorochromes can activate different receptors than the ones intended for the given wavelength. The ability to correct this stems from the fact, that the overlap is a linear function, so the measured signal can be averaged and thus corrected. This correction is called compensation. Compensation is necessary in order to be able to differentiate between populations of cells. This is done by measuring the spectral overlap of the different fluorochromes and using the measured values to create a matrix. The matrix is then inverted and gives the actual compensation values. The flow cytometer then uses these values to correct the overlap in each detector for each colour. References External links https://web.archive.org/web/20041205055418/http://cyto.mednet.ucla.edu/Protocols/flow.htm http://www.bioinformin.net/cytometry/compensation.php https://www.bdbiosciences.com/documents/Compensation_
https://en.wikipedia.org/wiki/Biological%20Magnetic%20Resonance%20Data%20Bank
The Biological Magnetic Resonance Data Bank (BioMagResBank or BMRB) is an open access repository of nuclear magnetic resonance (NMR) spectroscopic data from peptides, proteins, nucleic acids and other biologically relevant molecules. The database is operated by the University of Wisconsin–Madison and is supported by the National Library of Medicine. The BMRB is part of the Research Collaboratory for Structural Bioinformatics and, since 2006, it is a partner in the Worldwide Protein Data Bank (wwPDB). The repository accepts NMR spectral data from laboratories around the world and, once the data is validated, it is available online at the BMRB website. The database has also an ftp site, where data can be downloaded in the bulk. The BMRB has two mirror sites, one at the Protein Database Japan (PDBj) at Osaka University and one at the Magnetic Resonance Research Center (CERM) at the University of Florence in Italy. The site at Japan accepts and processes data depositions. Content NMR spectral values and derived information The bulk of the data deposited at the BMRB consists of over 11,900 entries containing 1H, 13C, 15N and 31P assigned chemical shifts and coupling constants of peptides, proteins and nucleic acids. Other derived data like residual dipolar couplings (RDC), relaxation parameters, NOE values, order parameters and hydrogen exchange rates are also available. The database contains also a smaller amount of NMR data from carbohydrates, cofactors and ligands. These data are crossreferenced to 3D structures in the PDB when available. The NMR data are provided in the NMR-STAR file format and a number of format conversion tools are available at the site to convert files from NMR-STAR to other formats. NMR restraints grid The NMR restraints grid contains NMR restraints data from over 2500 proteins and nucleic acids collected from PDB depositions. The grid is constructed as four subsets of data: The original NMR data: This subset contains data as found in depositi
https://en.wikipedia.org/wiki/List%20of%20codes%20used%20in%20the%20World%20Geographical%20Scheme%20for%20Recording%20Plant%20Distributions
The World Geographical Scheme for Recording Plant Distributions (WGSRPD) is a biogeographical system developed by the international Biodiversity Information Standards (TDWG) organization, formerly the International Working Group on Taxonomic Databases. The system provides clear definitions and codes for recording plant distributions at four scales or levels, from "botanical continents" down to parts of large countries. Current users of the system include the International Union for Conservation of Nature (IUCN), and the Germplasm Resources Information Network (GRIN). Plants of the World Online uses Kew's data sources, and hence also uses the WGSRPD for distributions. Codes The table is arranged in the systematic order used in the WGSRPD. The levels used in the scheme are: Nine botanical continents; the code consists of a single digit Regions – each botanical continent is divided into between two and ten sub-continental regions; a two-digit code is used for regions, in which the first digit is the continent Areas or "botanical countries" – most regions are subdivided into units, generally equating to a political country, but large countries may be split or outlying areas omitted; a three-letter code is used for areas "Basic recording units" – the lowest level is only used for very large "botanical countries", subdividing them into states, provinces or islands on purely political grounds; the full code is made up of a two-letter code appended to the corresponding area code See also Biogeography Phytochorion Phytogeography Wikipedia categories for flora distributions using the World Geographical Scheme for Recording Plant Distributions Flora categories with a WGSRPD code References External links Biogeography World Geographical Scheme for Recording Plant Distributions
https://en.wikipedia.org/wiki/Discount%20sticker
Discount stickers are a price markdown that are used to alert shoppers to goods which have been reduced in price, such as food approaching its sell-by date or inventory in discount clothing or outlet stores. Some stores, especially discount clothing stores, have been accused of using discount stickers to create the impression of price markdowns when there is none. In certain contexts, specific types of stickers have had additional meaning. For example, yellow stickers are used for this purpose by several British supermarket chains, including Asda, Sainsbury's, and Tesco. Post Brexit cost of living increases in the UK, have highlighted the importance of "yellow sticker shopping" as a way to deal with real price increases. Grocery markdowns Marking down food prices at grocery stores allows for the stores to better manage their stock, and ensure some return on value of the good. Especially for food that are perishable or has expiration dates, having an inventory management strategy that includes markdowns reduces food waste, simplifies inventory management and increases the likelihood of some profitability when satisfying a consumer need or demand for discounted prices. Improvements in the early 2000s to inventory management software has made applying discounts to perishable goods easier. When consumers understand this practice of creating discounts on foods after perishability dates, the discounts don't harm consumer perceptions of the brands marked down. In Australia Yellow stickers have been used in Australia, including at Woolworths supermarkets. In Japan Looking for yellow sticker-tagged items has been noted as a way to save money when shopping in Japan. One chain, Gyomu Super, has chosen to allow consumers to pick which items they place their sticker on, allowing customers to markdown up to 4 items. In the United Kingdom In the United Kingdom, the stickers have been in use since at least 1993 when a director of J Sainsbury supermarkets wrote to The T
https://en.wikipedia.org/wiki/R.%20Sankararamakrishnan
Ramasubbu Sankararamakrishnan is an Indian computational biologist, bioinformatician and a professor at the Department of Biological Sciences and Bioengineering of the Indian Institute of Technology, Kanpur. He is known for his computational studies on membrane protein function. The Department of Biotechnology of the Government of India awarded him the National Bioscience Award for Career Development, one of the highest Indian science awards, for his contributions to biosciences in 2008. Biography R. Sankararamakrishnan, who completed his early college education at the Madurai Kamaraj University in 1986, did his doctoral studies at the Indian Institute of Science and after obtaining a PhD in 1992, he moved to the UK where he did his post-doctoral research in computational biology at the University of Oxford. He had another stint of post-doctoral work at the University of Illinois, Urbana-Champaign and started his career in 1996 as an instructor (later assistant professor of research) at the Icahn School of Medicine at Mount Sinai. In April 2002, he returned to India to join the Indian Institute of Technology, Kanpur (IITK) as an assistant professor and serves as a professor at the Department of Biological Sciences and Bioengineering (BSBE). Subsequently, he founded the Bioinformatics and Biomolecular Simulation Laboratory at IITK where he hosts several research scholars. He also serves as a resource person for the Centre for Mathematical Biology of the Department of Science and Technology. Legacy Sankaramakrishnan's research is focused on mechanism of membrane protein function using computational approaches. He is known to have carried out research on aquaporin genes in plants, Asx turns, molecular dynamic simulations of protein-protein interactions, GPCR peptide hormones as well as nonAUG start codons and AUG codons. His studies have been documented by way of a number of articles and ResearchGate, an online repository of scientific articles has listed 98 of th
https://en.wikipedia.org/wiki/Data-driven%20control%20system
Data-driven control systems are a broad family of control systems, in which the identification of the process model and/or the design of the controller are based entirely on experimental data collected from the plant. In many control applications, trying to write a mathematical model of the plant is considered a hard task, requiring efforts and time to the process and control engineers. This problem is overcome by data-driven methods, which fit a system model to the experimental data collected, choosing it in a specific models class. The control engineer can then exploit this model to design a proper controller for the system. However, it is still difficult to find a simple yet reliable model for a physical system, that includes only those dynamics of the system that are of interest for the control specifications. The direct data-driven methods allow to tune a controller, belonging to a given class, without the need of an identified model of the system. In this way, one can also simply weight process dynamics of interest inside the control cost function, and exclude those dynamics that are out of interest. Overview The standard approach to control systems design is organized in two-steps: Model identification aims at estimating a nominal model of the system , where is the unit-delay operator (for discrete-time transfer functions representation) and is the vector of parameters of identified on a set of data. Then, validation consists in constructing the uncertainty set that contains the true system at a certain probability level. Controller design aims at finding a controller achieving closed-loop stability and meeting the required performance with . Typical objectives of system identification are to have as close as possible to , and to have as small as possible. However, from an identification for control perspective, what really matters is the performance achieved by the controller, not the intrinsic quality of the model. One way to deal with unce
https://en.wikipedia.org/wiki/HAMMER2
HAMMER2 is a successor to the HAMMER filesystem, redesigned from the ground up to support enhanced clustering. HAMMER2 supports online and batched deduplication, snapshots, directory entry indexing, multiple mountable filesystem roots, mountable snapshots, a low memory footprint, compression, encryption, zero-detection, data and metadata checksumming, and synchronization to other filesystems or nodes. It lacks support for extended file attributes (xattr). History The HAMMER2 file system was conceived by Matthew Dillon, who initially planned to bring it up to minimal working state by July 2012 and ship the final version in 2013. During Google Summer of Code 2013 Daniel Flores implemented compression in HAMMER2 using LZ4 and zlib algorithms. On June 4, 2014, DragonFly 3.8.0 was released featuring support for HAMMER2, although the file system was said to be not ready for use. On October 16, 2017, DragonFly 5.0 was released with bootable support for HAMMER2, though file-system status was marked as experimental. HAMMER2 had a long incubation and development period before it officially entered production in April 2018, as the recommended root filesystem in the Dragonfly BSD 5.2 release. Dillon continues to actively develop and maintain HAMMER2 as of June 2020. See also Comparison of file systems List of file systems ZFS Btrfs OpenZFS References External links DragonFly BSD Distributed file systems 2014 software
https://en.wikipedia.org/wiki/Electrofusion%20welding
Electrofusion welding is a form of resistive implant welding used to join pipes. A fitting with implanted metal coils is placed around two ends of pipes to be joined, and current is passed through the coils. Resistive heating of the coils melts small amounts of the pipe and fitting, and upon solidification, a joint is formed. It is most commonly used to join polyethylene (PE) and polypropylene (PP) pipes. Electrofusion welding is the most common welding technique for joining PE pipes. Because of the consistency of the electrofusion welding process in creating strong joints, it is commonly employed for the construction and repair of gas-carrying pipelines. The development of the joint strength is affected by several process parameters, and a consistent joining procedure is necessary for the creation of strong joints. Advantages and disadvantages Advantages of electrofusion welding: Simple process capable of producing consistent joints Process is entirely contained, reducing the risk of joint contamination Process allows repair without the need to remove pipes Disadvantages of electrofusion welding: A special sleeve is required, so it is more expensive than other pipe joining methods such as hot plate joining Implanted coils make recycling of parts more difficult Equipment Electrofusion welds are performed by attaching a controlled power supply to the electrofusion fitting. There are typically two modes of operation. Constant voltage Constant current Constant voltage is typically used for high pressure pipelines such as mains gas and water. Fittings are fitted with a barcode specified to an ISO standard. Typically fittings will be welded at 39.5v, but manufacturers can choose voltages in whole numbers from 8 to 48v. The welding time is specified on the label in seconds or minutes Accessories Electrofusion welding employs fittings that are placed around the joint to be welded. Metal coils are implanted into the fittings, and electric current is ru
https://en.wikipedia.org/wiki/Time%20synchronization%20in%20North%20America
Time synchronization in North America can be achieved with many different methods, some of which require only a telephone, while others require expensive, sensitive, and rare electronic equipment. In the United States, the United States Naval Observatory provides the standard of time, called UTC(USNO), for the United States military and the Global Positioning System, while the National Institute of Standards and Technology provides the standard of time for civil purposes in the United States, called UTC(NIST). ITU-R Standard Frequency and Time Signals A standard frequency and time signal service is a station that operates on or immediately adjacent to 2.5 MHz, 5 MHz, 10 MHz, 15 MHz, 20 MHz, and 25 MHz, as specified by Article 5 of the ITU Radio Regulations (edition 2012). The US service is provided by radio stations WWV (Colorado) and WWVH (Hawaii). The methods below provide either Coordinated Universal Time (UTC), which is defined by Recommendation ITU-R TF.460, or the official U.S. implementation of UTC, officially labeled UTC (NIST). Internet time sources Several different time synchronization protocols exist on the Internet, including: GPS time synchronization GPS receiver requirements Minimum: GPS receiver that works with user chosen software; this requires some combination of GPGGA, GPRMC, GPZDA, GPGSA, and GPGSV sentences. This provides accuracy of between 1 and 2 seconds, and includes most, but not all modern GPS receivers. Better: USB GPS receiver with the NMEA 0183 GPZDA sentence sent at least once a second. The developer of the Windows software NMEATime2 recommends GPS units with the U-blox 7 receiver, and this software uses a control loop to analyze the text of the GPS timing sentence, and claims to achieve 1 ms accuracy with the technique. Better yet: RS-232 GPS receiver with the NMEA 0183 GPZDA sentence sent at least once a second, plus a 1PPS signal on DCD (1 μs accuracy possible with a real RS-232 port not on the USB bus; 1 ms possible with
https://en.wikipedia.org/wiki/Marco%20Polo%20%28app%29
Marco Polo is a video messaging and video hosting service mobile app. The app was created in 2014 by Joya Communications. Joya Communications was founded by Vlada Bortnik and Michael Bortnik. The app markets itself as a video walkie talkie, allowing asynchronous video conversations without requiring the recipient(s) to be live. Notes Internet properties established in 2014 Android (operating system) software IOS software Video software Social networking services 2014 software Proprietary cross-platform software
https://en.wikipedia.org/wiki/MIR-2
MIR-2 () is the version of the MIR computer developed by the Institute of Cybernetics of the Academy of Sciences of Ukrainian SSR under the guidance of Victor Glushkov. It was first produced in 1969. Overview The speed of the MIR-2 machine is about 12,000 operations per second. The capacity of the random access memory (12-μs circulation cycle) is 8,000 13-bit symbols. The read-only memory has a capacity of about 1.6 million bits with a cycle of 4 μs, which is enough to store several tens of thousands of micro-commands. There is a buffer memory for output information with a volume of 4000 10-bit words. As external devices were used: input from punched tape, output to punched tape, electric typewriter Soemtron, magnetic card drive, vector graphic display with light pen. As the input language in the MIR-2 machine, a special high-level language Analitik was used, which developed the concepts of the MIR-1 built-in programming language and additionally allowed the formulation of tasks with analytic transformations of formulas, allowing analytical expressions for derivatives and integrals. References Soviet computer systems
https://en.wikipedia.org/wiki/Constructive%20development%20%28biology%29
In biology, constructive development refers to the hypothesis that organisms shape their own developmental trajectory by constantly responding to, and causing, changes in both their internal state and their external environment. Constructive development can be contrasted with programmed development, the hypothesis that organisms develop according to a genetic program or blueprint. The constructivist perspective is found in philosophy, most notably developmental systems theory, and in the biological and social sciences, including developmental psychobiology and key themes of the extended evolutionary synthesis. Constructive development may be important to evolution because it enables organisms to produce functional phenotypes in response to genetic or environmental perturbation, and thereby contributes to adaptation and diversification. Key themes of constructive development Responsiveness and flexibility At any point in time, an organism's development depends on both the current state of the organism and the state of the environment. The developmental system, including the genome and its epigenetic regulation, responds flexibly to internal and external inputs. One example is condition-dependent gene expression, but regulatory systems also rely on physical properties of cells and tissues and exploratory behavior among microtubular, neural, muscular and vascular systems. Multiple modes of inheritance Organisms inherit (i.e., receive from their predecessors) a diverse set of developmental resources, including DNA, epigenetic marks, organelles, enzymes, hormones, antibodies, transcription factors, symbionts, socially transmitted knowledge and environmental conditions modified by parents. Developmental environments are constructed In the course of development, organisms help shape their internal and external environment, and in this way, influence their own development. Organisms also construct developmental environments for their offspring through various forms of
https://en.wikipedia.org/wiki/Mariel%20V%C3%A1zquez
Mariel Vázquez (born ) is a Mexican mathematical biologist who specializes in the topology of DNA. She is a professor at the University of California, Davis, jointly affiliated with the departments of mathematics and of microbiology and molecular genetics. Education Vázquez received her Bachelor of Science in Mathematics from the National Autonomous University of Mexico in 1995. She received her Ph.D. in mathematics from Florida State University in 2000. Her dissertation was entitled Tangle Analysis of Site-specific Recombination: Gin and Xer Systems and her advisor was De Witt Sumners. Career Vázquez was a postdoctoral fellow at the University of California, Berkeley from 2000 to 2005, where she researched mathematical and biophysical models of DNA repair in human cells with Rainer Sachs as part of the mathematical radiobiology group. She was a faculty member in the mathematics department at San Francisco State University from 2005 to 2014. In 2014, she joined the faculty at the University of California, Davis as a CAMPOS scholar. Awards and honors In 2011, Vázquez received a National Science Foundation CAREER Award to research topological mechanisms of DNA unlinking. In 2012, she was the first San Francisco State University faculty member to receive the Presidential Early Career Award for Scientists and Engineers. She received a grant for computer analysis of DNA unknotting from the National Institutes of Health in 2013. In 2016, she was chosen for the Blackwell-Tapia prize, which is awarded every other year to a mathematician who has made significant research contributions in their field, and who has worked to address the problem of under-representation of minority groups in mathematics. She was selected for the inaugural class of Association for Women in Mathematics fellows in 2017. She was elected a Fellow of the American Mathematical Society in the 2020 class "for contributions in research and outreach at the interface of topology and molecular biology,
https://en.wikipedia.org/wiki/Ilijas%20Farah
Ilijas Farah (born February 18, 1966, in Sremska Mitrovica, Serbia) is a Canadian-Serbian mathematician and a professor of mathematics at York University in Toronto and at the Mathematical Institute of Serbian Academy of Sciences and Arts, Belgrade, Serbia. His research focuses on applications of logic to operator algebras. Career He received his BSc and MSc in 1988 and 1992 respectively from the Belgrade University and his PhD in 1997 from the University of Toronto. He is now a Research Chair in Logic and Operator Algebras at York University, Toronto. Before moving to York University he was an NSERC Postdoctoral Fellow, York University (1997–99), a Hill Assistant Professor at Rutgers University (1999–2000), and a professor at CUNY–Graduate center and College of Staten Island (2000–02). Awards, distinctions, and recognitions Sacks prize for the best doctorate in Mathematical Logic, 1997 Governor General's gold medal for one of the two best doctorates at the University of Toronto, 1998 The Canadian Association for Graduate Studies/University Microfilms International Distinguished Dissertation Award, for the best dissertation in engineering, medicine and the natural sciences in Canada, 1998. Dean's award for outstanding research, York University, 2006. Faculty Excellence in Research Award (Established Research Award), Faculty of Science, York University, 2017 Professor Farah was an invited speaker at the ICM, Seoul 2014, section on Logic and Foundations, where he presented his work on applications of logic to operator algebras. Sources External links Ilijas Farah: Krajnja proširenja modela, MSc thesis, Belgrade university 1992. Living people Canadian mathematicians Mathematical logicians Set theorists 1966 births
https://en.wikipedia.org/wiki/Cash%20App
Cash App (formerly Square Cash) is a mobile payment service available in the United States and the United Kingdom that allows users to transfer money to one another (for a 1.5% fee for immediate transfer) using a mobile phone app. In September 2021, the service reported 70 million annual transacting users and US$1.8 billion in gross profit. History Cash App was launched by Block, Inc. (formerly Square, Inc. at its launch) on October 15, 2013, under the name "Square Cash". In March 2015, Square introduced Square Cash for businesses. This allowed individuals, organizations, and business owners to create a unique username to send and receive money, known as a $cashtag. Since then, the $cashtag has become the most popular method for users to transfer money. In January 2018, Cash App added support for bitcoin trading. In October 2019, Cash App added support for stock trading to users in the United States. In November 2020, Square announced it was acquiring Credit Karma Tax, a free do-it-yourself tax-filing service, for $50 million and would make it a part of its Cash App unit. On November 3, 2021, Square opened Cash App to teenagers between 13 and 17. The app previously required its users to be at least 18 years old. Younger teens will need a parent or guardian to authorize their account and will not have access to cryptocurrency or stock trading until they turn 18. On April 4, 2023, Cash App founder Bob Lee was stabbed to death in San Francisco, California. Services Banking The service allows users to send, receive, and store money within the United States and United Kingdom, international transfers were not initially supported. Users can transfer money out of Cash App to a bank account in their country. The Cash Card is a customizable debit card that allows users to spend their money at various retailers and withdraw cash from an ATM. When signing up for the Cash Card, users can customize it by selecting a color, adding stamps, drawing on it, and even making