source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Urethrovaginal%20fistula | A urethrovaginal fistula is an abnormal passageway that may occur the urethra and the vagina. It is a sub-set of vaginal fistulas. It results in urinary incontinence as urine continually leaves the vagina. It can occur as an obstetrical complication, catheter insertion injury or a surgical injury.
It is also called a urethral fistula and may be referred to as UVF. They are quite rare. In the developed world, they are typically due to injuries due to medical activity.
References
Noninflammatory disorders of female genital tract
Fistulas
Vaginal diseases
Human female reproductive system
Anatomy
Gynaecology |
https://en.wikipedia.org/wiki/List%20of%20organisms%20named%20after%20the%20Harry%20Potter%20series | Newly created taxonomic names in biological nomenclature often reflect the discoverer's interests or honour those the discoverer holds in esteem. This is a list of real organisms with scientific names chosen to reference the fictional Harry Potter series by J.K. Rowling.
Named after wizards
Named after magical creatures
Named after spells, objects, and locations
See also
List of unusual biological names
List of organisms named after works of fiction
List of organisms named after famous people
References
Harry Potter
organisms
Taxonomic lists |
https://en.wikipedia.org/wiki/Abstract%20economy | In theoretical economics, an abstract economy (also called a generalized N-person game) is a model that generalizes both the standard model of an exchange economy in microeconomics, and the standard model of a game in game theory. An equilibrium in an abstract economy generalizes both a Walrasian equilibrium in microeconomics, and a Nash equilibrium in game-theory.
The concept was introduced by Gérard Debreu in 1952. He named it generalized N-person game, and proved the existence of equilibrium in this game. Later, Debreu and Kenneth Arrow (who renamed the concept to abstract economy) used this existence result to prove the existence of a Walrasian equilibrium (aka competitive equilibrium) in the Arrow–Debreu model. Later, Shafer and Sonnenschein extended both theorems to irrational agents - agents with non-transitive and non-complete preferences.
Abstract economy with utility functions
The general case
Definition
In the model of Debreu, an abstract economy contains a finite number N of agents. For each agent , there is:
A choice-set (a subset of some Euclidean space ). This represents the global set of choices that the agent can make.
We define the cartesian product of all choice sets as: .
An action-correspondence . This represents the set of possible actions the agent can take, given the choices of the other agents.
A utility function: , representing the utility that the agent receives from each combination of choices.
The goal of each agent is to choose an action that maximizes his utility.
Equilibrium
An equilibrium in an abstract economy is a vector of choices, , such that, for each agent , the action maximizes the function subject to the constraint :Equivalently, for each agent , there is no action such that: The following conditions are sufficient for the existence of equilibrium:
Each choice-set is compact, non-empty and convex.
Each action-correspondence is continuous, and its values are non-empty and convex.
Each utility function |
https://en.wikipedia.org/wiki/Nodal%20decomposition | In category theory, an abstract mathematical discipline, a nodal decomposition of a morphism is a representation of as a product , where is a strong epimorphism, a bimorphism, and a strong monomorphism.
Uniqueness and notations
If it exists, the nodal decomposition is unique up to an isomorphism in the following sense: for any two nodal decompositions and there exist isomorphisms and such that
This property justifies some special notations for the elements of the nodal decomposition:
– here and are called the nodal coimage of , and the nodal image of , and the nodal reduced part of .
In these notations the nodal decomposition takes the form
Connection with the basic decomposition in pre-abelian categories
In a pre-abelian category each morphism has a standard decomposition
,
called the basic decomposition (here , , and are respectively the image, the coimage and the reduced part of the morphism ).
If a morphism in a pre-abelian category has a nodal decomposition, then there exist morphisms and which (being not necessarily isomorphisms) connect the nodal decomposition with the basic decomposition by the following identities:
Categories with nodal decomposition
A category is called a category with nodal decomposition if each morphism has a nodal decomposition in . This property plays an important role in constructing envelopes and refinements in .
In an abelian category the basic decomposition
is always nodal. As a corollary, all abelian categories have nodal decomposition.
If a pre-abelian category is linearly complete, well-powered in strong monomorphisms and co-well-powered in strong epimorphisms, then has nodal decomposition.
More generally, suppose a category is linearly complete, well-powered in strong monomorphisms, co-well-powered in strong epimorphisms, and in addition strong epimorphisms discern monomorphisms in , and, dually, strong monomorphisms discern epimorphisms in , then has nodal decom |
https://en.wikipedia.org/wiki/John%20Powell%20%28physicist%29 | John Alfred Powell FRSE FIEE FRSA (1923–1996) was a 20th-century British physicist and company director. His most important creation was the EMI body scanner.
Life
Powell was born on 4 November 1923 in Islip near Oxford, the son of Algernon Powell and his wife Constance Elsie Honour. From the tiny primary school he won a scholarship to be educated at Bicester County School in Oxfordshire.
In the Second World War he joined as an apprentice in the Royal Air Force based at RAF Halton in 1939, but was invalided out in 1941. He found a place assisting at Clarendon Laboratory at Oxford, and (taking several night-classes to improve his qualifications) then won a place at Oxford University studying physics. Gaining an honours degree (MA) he then returned to Clarendon Laboratories, where he gained a doctorate (PhD). In 1952 he received a postdoctorate research fellowship taking him to Ottawa in Canada.
In 1954 he returned to Britain working on semi-conductor research at Marconi Research Laboratories in Chelmsford. In 1957 he moved to Texas Instruments in Bedford as senior product engineer, devising a way to create cheap germanium crystals. This brought him rapid promotion, rising to assistant managing director for Northern Europe and in 1968 became vice president. This was based in Dallas, Texas. He determined to return to Britain, albeit to a lower position. After a search for a suitable position he became group technical director for EMI. His work here critically led to the development of the EMI brain scanner, which represented a major advancement in being able to view the brain. He persuaded EMI to create a new company to develop this product, EMI Medical Industries, which created a turnover of £100 million per annum. The company went on to create a body scanner and to dominate the world medical scanning market. His services made him an Honorary Fellow of the British Institute of Radiology.
In 1972 he additionally took on a role at Nuclear Enterprises Ltd as director |
https://en.wikipedia.org/wiki/AMD%20Platform%20Security%20Processor | The AMD Platform Security Processor (PSP), officially known as AMD Secure Technology, is a trusted execution environment subsystem incorporated since about 2013 into AMD microprocessors. According to an AMD developer's guide, the subsystem is "responsible for creating, monitoring and maintaining the security environment" and "its functions include managing the boot process, initializing various security related mechanisms, and monitoring the system for any suspicious activity or events and implementing an appropriate response". Critics worry it can be used as a backdoor and is a security concern. AMD has denied requests to open source the code that runs on the PSP.
Details
The PSP itself represents an ARM core (ARM Cortex A5) with the TrustZone extension which is inserted into the main CPU die as a coprocessor. The PSP contains on-chip firmware which is responsible for verifying the SPI ROM and loading off-chip firmware from it. In 2019, a Berlin-based security group discovered the off-chip firmware in ordinary UEFI image files (the code that boots up the operating system), which meant that it could be easily analyzed. By using a few hand-written Python-based tools, they found that the off-chip firmware from the SPI ROM contained an application resembling an entire micro operating system. Investigation of a Lenovo ThinkPad A285 notebook's motherboard flash chip (stores UEFI firmware) revealed that the PSP core itself (as a device) is run before the main CPU and that its firmware bootstrapping process starts just before basic UEFI gets loaded. They discovered that the firmware is run inside in the same system's memory space that user's applications do with unrestricted access to it (including MMIO) raising concerns over data safety. Because PSP is the chip that decides whenever the x86 cores will run or not, it is used to implement hardware downcoring, specific cores on the system can be made permanently inaccessible during manufacturing. The PSP also provides a ran |
https://en.wikipedia.org/wiki/American%20polyconic%20projection | The American polyconic map projection is a map projection used for maps of the United States and regions of the United States beginning early in the 19th century. It belongs to the polyconic projection class, which consists of map projections whose parallels are non-concentric circular arcs except for the equator, which is straight. Often the American polyconic is simply called the polyconic projection.
The American polyconic projection was probably invented by Ferdinand Rudolph Hassler around 1825. It was commonly used by many map-making agencies of the United States from the time of its proposal until the middle of the 20th century. It is not used much these days, having been replaced by conformal projections in the State Plane Coordinate System.
Description
The American polyconic projection can be thought of as "rolling" a cone tangent to the Earth at all parallels of latitude. This generalizes the concept of a conic projection, which uses a single cone to project the globe onto. By using this continuously varying cone, each parallel becomes a circular arc having true scale, contrasting with a conic projection, which can only have one or two parallels at true scale. The scale is also true on the central meridian of the projection.
The projection is defined by:
where λ is the longitude of the point to be projected; φ is the latitude of the point to be projected; λ is the longitude of the central meridian, and φ is the latitude chosen to be the origin at λ. To avoid division by zero, the formulas above are extended so that if φ = 0 then x = λ − λ and y = −φ.
See also
List of map projections
References
External links
Table of examples and properties of all common projections, from radicalcartography.net
An interactive Java Applet to study the metric deformations of the Polyconic Projection.
Map projections |
https://en.wikipedia.org/wiki/Electronic%20seal | An electronic seal is a piece of data attached to an electronic document or other data, which ensures data origin and integrity.
The term is used in the EU Regulation No 910/2014 (eIDAS Regulation) for electronic transactions within the internal European market.
Description
Conceptually similar to electronic signatures and usually technically realized as digital signatures, electronic seals serve as evidence that an electronic document was issued by a specific legal entity. For this purpose, an electronic seal must be linked to the data sealed with it in such a way that any subsequent change in the data is detectable and also in such a way that a fake seal cannot be created without access to the data (usually a private key) used for creation of the digital seal. This is usually achieved through use of a qualified digital certificate that is involved in creation of a digital seal. The unique private key used in the creation of the digital seal ensures non-repudiation: the entity that created the digital seal cannot later deny that it created the seal for that document. If the document is modified after its digital seal was created, the digital seal is not valid for the modified document. This can be checked by anyone with access of the public key corresponding to the private key used in the creation of the digital seal, ensuring the integrity of the sealed document.
Besides authenticating the document issued by the legal entity, e-Seals can also be used to authenticate any digital asset of the legal person, such as software code or servers. The important difference between a digital signature and an electronic seal is that the latter is usually created by a legal person while digital signatures are created by a natural person. For the creation of a digital signature, action of the person signing a document or data is required. In contrast, the creation of the digital seals can be incorporated in automated processes executed in a digital environment.
Qualified el |
https://en.wikipedia.org/wiki/Chris%20Elliott%20%28food%20scientist%29 | Christopher Elliott is a professor of food safety and microbiology at Queen's University Belfast and founder of the university's Institute for Global Food Security. He led the independent review of the UK food system after the 2013 horse meat scandal.
Early life and education
Christopher Trevor Elliott grew up in Northern Ireland, initially in Belfast and then moved with his family to his grandparents’ farm where he enjoyed working and gained experience with farm animals. He left school at 16 with few qualifications. He got a job as a cleaner at a government research institute that encouraged staff to improve their knowledge. After several years of part-time and evening study he was able to enroll for a degree in medical biological sciences at Ulster University. He later gained a PhD for his work on developing tests for the illegal use of growth promoting drugs in farm animals, and implementing a monitoring programme.
Career
Elliott initially worked in a government institute that undertook research into animal health and behaviour. Starting at a very low level, he was promoted into roles involving virology and later veterinary testing. He reached the position of Principle Scientific Officer when he was 35. His doctoral work on testing and monitoring for the illegal use of clenbuterol as a growth promotor in animal husbandry developed into a system that was used worldwide. In around 2000, he moved to Queen's University Belfast to develop a food and agricultural science department. By 2013 he had persuaded the university to form an Institute of Global Food Security, the first with this name in the British Isles, and became its first director.
After the 2008 Irish pork crisis, where dioxin contamination of pig meat led to an international product recall, he led the Food Fortress project, at the request of the animal feed industry, to evaluate future risks and develop testing and monitoring so that it would not be repeated. This developed into a sampling programme o |
https://en.wikipedia.org/wiki/Self-propulsion | Self-propulsion is the autonomous displacement of nano-, micro- and macroscopic natural and artificial objects, containing their own means of motion. Self-propulsion is driven mainly by interfacial phenomena. Various mechanisms of self-propelling have been introduced and investigated, which exploited phoretic effects, gradient surfaces, breaking the wetting symmetry of a droplet on a surface, the Leidenfrost effect, the self-generated hydrodynamic and chemical fields originating from the geometrical confinements, and soluto- and thermo-capillary Marangoni flows. Self-propelled system demonstrate a potential as micro-fluidics devices and micro-mixers. Self-propelled liquid marbles have been demonstrated.
See also
Self propelled particles
References
Mechanical engineering
Surface science |
https://en.wikipedia.org/wiki/Airdrop%20%28cryptocurrency%29 | An airdrop is an unsolicited distribution of a cryptocurrency token or coin, usually for free, to numerous wallet addresses. Airdrops are often associated with the launch of a new cryptocurrency or a DeFi protocol, primarily as a way of gaining attention and new followers, resulting in a larger user base and a wider disbursement of coins. Airdrops have been a more important part of ICOs since crypto entrepreneurs have started doing private sales instead of public offerings to raise initial capital. One example of this is by the company Omise, which gave away five percent of its OmiseGO cryptocurrency to Ethereum holders in September 2017.
Airdrops aim to take advantage of the network effect by engaging existing holders of a particular blockchain-based currency, such as Bitcoin or Ethereum in their currency or project.
In the United States, the practice has raised policy issues about tax liability and whether they amount to income or capital gains.
References
Cryptocurrencies
Financial technology |
https://en.wikipedia.org/wiki/Breath-figure%20self-assembly | Breath-figure self-assembly is the self-assembly process of formation of honeycomb micro-scaled polymer patterns by the condensation of water droplets. "Breath-figure" refers to the fog that forms when water vapor contacts a cold surface. In the modern era systematic study of the process of breath-figures water condensation was carried out by Aitken and Rayleigh, among others. Half a century later the interest to the breath-figure formation was revived in a view of study of atmospheric processes, and in particular the extended study of a dew formation which turned out to be a complicated physical process. The experimental and theoretical study of dew formation has been carried out by Beysens. Thermodynamic and kinetic aspects of dew formation, which are crucial for understanding of formation of breath-figures inspired polymer patterns will be addressed further in detail.
Breakthrough in the application of the breath-figures patterns was achieved in 1994–1995 when Widawski, François and Pitois reported manufacturing of polymer films with a self‐organized, micro-scaled, honeycomb morphology using the breath-figures condensation process. The reported process was based on the rapidly evaporated polymer solutions exerted to humidity. The introduction into experimental techniques involved in manufacturing of micropatterned surfaces is supplied in reference 1; image representing typical breath-figures-inspired honeycomb pattern is shown in Figure 1.
The main physical processes involved in the process are: 1) evaporation of the polymer solution; 2) nucleation of water droplets; 3) condensation of water droplets; 4) growth of droplets; 5) evaporation of water; 6) solidification of polymer giving rise to the eventual micro-porous pattern. This experimental technique allows obtaining well-ordered, hierarchical, honeycomb surface patterns. A variety of experimental techniques were successfully exploited for the formation of breath-figures self-assembly induced patterns inclu |
https://en.wikipedia.org/wiki/List%20of%20personal%20finance%20software | Personal finance software can be used to track spending, create budgets, and plan for future expenses. Some software differs by feature support, software code and development transparency, mobile app features, import methods, Monetization model, privacy and data storage practices.
Risks
The use of expense tracking, budgeting, and other personal finance software carries some risk, most notably is due to the disclosure of a username, password, or other account credentials used to automatically synchronize banking information with an expense tracking application. Another significant area of risk is due to sensitive personal information that is stored anytime data is digitized. This risk may be compounded based on the security the software vendor has implemented as well as the availability of the data and where specifically it is stored (online or a local application). An often overlooked form of risk is due to the monetization model and privacy practices of the vendor or software provider, whether the application is "free" or fee based. Open source software is one way of potentially minimizing the risks of privacy and monetization related risks of data exposure.
The following is a list of personal financial management software. The first section is devoted to free and open-source software, and the second is for proprietary software.
Free and open-source personal financial management software
Proprietary personal financial management vendors and software
{| class="wikitable"
|+
!Name
!Spending Tracking
!Budgeting
!Investment Tracking
!Third-Party Bill Paying
!Operating Systems
!Mobile Support
!Software Type
!Direct Cost
!Other Monetization Models
!Description
|-
|Banktivity
|Yes
|Yes
|Yes
|Yes
|macOS
|iOS
|Stand alone
|Yearly Fee
|
|Personal finance software for Mac OS.
|-
|Mint
|Yes
|Yes
|Yes
|No
|Any
|iOS, Android
|Web-Based
|Free
|Financial product referrals
|
|-
|Moneydance
|Yes
|
|Yes
|
|Any (JVM based)
|
|Stand alone
|
|
|
|-
|Moneyspire
|
|
|
|
|
|
|
|
|
|
|
https://en.wikipedia.org/wiki/Rectangular%20polyconic%20projection | The rectangular polyconic projection is a map projection was first mentioned in 1853 by the U.S. Coast Survey, where it was developed and used for portions of the U.S. exceeding about one square degree. It belongs to the polyconic projection class, which consists of map projections whose parallels are non-concentric circular arcs except for the equator, which is straight. Sometimes the rectangular polyconic is called the War Office projection due to its use by the British War Office for topographic maps. It is not used much these days, with practically all military grid systems having moved onto conformal projection systems, typically modeled on the transverse Mercator projection.
Description
The rectangular polyconic has one specifiable latitude (along with the latitude of opposite sign) along which scale is correct. The scale is also true on the central meridian of the projection. Meridians are spaced such that they meet the parallels at right angles in equatorial aspect; this trait accounts for the name rectangular.
The projection is defined by:
where:
λ is the longitude of the point to be projected;
φ is the latitude of the point to be projected;
λ is the longitude of the central meridian,
φ is the latitude chosen to be the origin along λ;
φ is the latitude whose parallel is chosen to have correct scale.
To avoid division by zero, the formulas above are extended so that if φ = 0 then x = 2A and y = −φ. If φ= 0 then A = ½(λ − λ).
See also
List of map projections
American polyconic projection
References
External links
Mapthematics page describing the rectangular polyconic projection.
Map projections |
https://en.wikipedia.org/wiki/Arithmetic%20billiards | In recreational mathematics, arithmetic billiards provide a geometrical method to determine the least common multiple and the greatest common divisor of two natural numbers by making use of reflections inside a rectangle whose sides are the two given numbers. This is an easy example of trajectory analysis of dynamical billiards.
Arithmetic billiards have been discussed as mathematical puzzles by Hugo Steinhaus and Martin Gardner, and are known to mathematics teachers under the name 'Paper Pool'.
They have been used as a source of questions in mathematical circles.
The arithmetic billiard path
Consider a rectangle with integer sides, and construct a path inside this rectangle as follows:
start in a corner, and move along the straight line which makes a 45° angle with the sides;
every time that the path hits a side, reflect it with the same angle (the path makes either a left or a right 90° turn);
eventually (i.e. after a finite number of reflections) the path hits a corner and there it stops.
If one side length divides the other, the path is a zigzag consisting of one or more segments.
Else, the path has self-intersections and consists of segments of various lengths in two orthogonal directions.
In general, the path is the intersection of the rectangle with a grid of squares (oriented at 45° w.r.t. the rectangle sides).
Arithmetical features of the path
Call and the side lengths of the rectangle, and divide this into unit squares. The least common multiple is the number of unit squares crossed by the arithmetic billiard path or, equivalently, the length of the path divided by . In particular, the path goes through each unit square if and only if and are coprime.
Suppose that none of the two side lengths divides the other. Then the first segment of the arithmetic billiard path contains the point of self-intersection which is closest to the starting point. The greatest common divisor is the number of unit squares crossed by the first segment of th |
https://en.wikipedia.org/wiki/Testing%20of%20advanced%20thermoplastic%20composite%20welds | Welding of advanced thermoplastic composites is a beneficial method of joining these materials compared to mechanical fastening and adhesive bonding. Mechanical fastening requires intense labor, and creates stress concentrations, while adhesive bonding requires extensive surface preparation, and long curing cycles. Welding these materials is a cost-effective method of joining concerning preparation and execution, and these materials retain their properties upon cooling, so no post processing is necessary. These materials are widely used in the aerospace industry to reduce weight of a part while keeping strength.
For many industries there are codes and standards that need to be followed when being implemented into service. The quality of the welds made on these materials are important in ensuring people receive safe products. There are not codes made specifically for the welding of advanced thermoplastic composite welds, so the codes for adhesive bonding of plastics and metals are slightly altered, and used in order to properly test these materials. Even though the joining method is different these materials have mechanical requirements they need to meet.
Weld testing and analysis
There are several mechanical properties that need to be tested to ensure the quality of welds. The testing methods talked about in this article will be referenced from the ASTM adhesive bonding standards. The properties needed to be tested are shear strength, fracture toughness, and fatigue properties. Optical microscopy is also often done to look for weld defects.
Testing for shear strength
According to ASTM D1002 The specimens tested will be configured as lap joints. They will need to be sectioned in a way that they can fit in the grips used for the tensile testing. The length of the overlap for the lap joint is determined by the thickness of the material, the yield point of the metal, and the value that is 50% of the estimated average shear strength in an adhesive bond, but for the |
https://en.wikipedia.org/wiki/Kyropoulos%20method | The Kyropoulos method, KY method, or Kyropoulos technique, is a method of bulk crystal growth used to obtain single crystals.
The largest application of the Kyropoulos method is to grow large boules of single crystal sapphire used to produce substrates for the manufacture gallium nitride-based LEDs, and as a durable optical material.
History
The method is named for , who proposed the technique in 1926 as a method to grow brittle alkali halide and alkali earth metal crystals for precision optics. The method was a response to the limited boule sizes attainable by the Czochralski and Verneuil methods at the time.
The Kyropoulos method was applied to sapphire crystal growth in the 1970s in the Soviet Union.
The method
The feedstock is melted in a crucible. (For sapphire crystal growth, the feedstock is high-purity aluminum oxide—only a few parts per million of impurities—which is then heated above 2100 °C in a tungsten or molybdenum crucible.) A precisely oriented seed crystal is dipped into the molten material. The seed crystal is slowly pulled upwards and may be rotated simultaneously. By precisely controlling the temperature gradients, rate of pulling and rate of temperature decrease, it is possible to produce a large, single-crystal, roughly cylindrical ingot from the melt.
In contrast with the Czochralski method, the Kyropoulos technique crystallizes the entire feedstock volume into the boule. The size and aspect ratio of the crucible is close to that of the final crystal, and the crystal grows downward into the crucible, rather than being pulled up and out of the crucible as in the Czochralski method. The upward pulling of the seed is at a much slower rate than the downward growth of the crystal, and serves primarily to shape the meniscus of the solid-liquid interface via surface tension.
The growth rate is controlled by slowly decreasing the temperature of the furnace until the entire melt has solidified. Hanging the seed from a weight sensor can pr |
https://en.wikipedia.org/wiki/Central%20American%20Pacific%20Islands | The Central American Pacific Islands is a biogeographical area used in the World Geographical Scheme for Recording Plant Distributions. It has the Level 3 code "CPI". It consists of a number of islands off the western coast of Central America in the Pacific Ocean: Clipperton Island, Cocos Island and Malpelo Island.
Clipperton Island is the most north-westerly, lying off Nicaragua and Costa Rica. Politically it belongs to France. Cocos Island and Malpelo Island lie south of Panama, although Cocos Island belongs to Costa Rica and Malpelo Island to Colombia.
See also
References
Biogeography
Geography of Central America
Natural history of Central America |
https://en.wikipedia.org/wiki/Cultural%20keystone%20species | A cultural keystone species is one which is of exceptional significance to a particular culture or a people. Such species can be identified by their prevalence in language, cultural practices (e.g. ceremonies), traditions, diet, medicines, material items, and histories of a community. These species influence social systems and culture and are a key feature of a community's identity.
The concept was first proposed by Gary Nabhan and John Carr in 1994 and later described by Sergio Cristancho and Joanne Vining in 2000 and by ethnobotanist Ann Garibaldi and ethnobiologist Nancy Turner in 2004. It is a "metaphorical parallel" to the ecological keystone species concept, and may be useful for biodiversity conservation and ecological restoration.
Definitions
The exact definition of cultural keystone species remains under debate and is considered to be more abstract than the related ecological concept. Garibaldi and Turner emphasize that the cultural keystone species concept is not an extension of ecological keystone species, but rather a parallel concept that bridges social and physical sciences, as well as indigenous knowledge and western knowledge, to offer a more holistic approach. Other researchers debate whether or not cultural keystone species are different from economically important species. Additionally, it is argued that the concept will be reduced to a biological term if it only focuses on specific species, but this may be solved by considering cultural keystone species as a "complex" that develops based on the ways that the species is used and its impacts on cultural practices over time, through conscious social practices, decision-making processes, and changes to societal needs and practices.
Garibaldi and Turner outline six elements that should be considered when identifying a cultural keystone species:
The magnitude and variety of ways the species is used
The species' influence on language
The species' role in cultural practices (e.g. traditional prac |
https://en.wikipedia.org/wiki/81Dojo | 81Dojo (Japanese: hachi-jū-ichi dōjō, hachi-jū-ichi or hachi-ichi) is a non-profit internet shogi server and internet forum. While the site is based in Japan, there is an additional English language version of the website, making it possible to play against non-Japanese players. All features are available for free.
The site has been sponsored by the Japan Shogi Association since 2013.
Anyone can play anonymously, although players may register an account on the site to play rated games. As of 11 January 2020, the number of registered users was around 100,000. There are players in 90 different countries, though most are from Japan.
Alongside efforts to popularize the game outside of Japan, the site also offers traditional post-game analysis features. Some of the most popular features include sharing of the board after a match, the ability to rewind the game to identify and make changes, and illustration of the best strategic moves on the board.
81Dojo has associated official smart phone apps for Apple and Android operating systems.
History
81Dojo was created by Tomohide Kawasaki (Japanese:川崎智秀), whose online alias is HIDETCHI.
References
External links
Comparison with 81 Dojo Rating · Elo score scales of computer shogi engines, 81Dojo, and Shogi Club 24 (将棋倶楽部24)
Internet shogi servers
Online video game services |
https://en.wikipedia.org/wiki/Polynomial%20functor%20%28type%20theory%29 | In type theory, a polynomial functor (or container functor) is a kind of endofunctor of a category of types that is intimately related to the concept of inductive and coinductive types. Specifically, all W-types (resp. M-types) are (isomorphic to) initial algebras (resp. final coalgebras) of such functors.
Polynomial functors have been studied in the more general setting of a pretopos with Σ-types; this article deals only with the applications of this concept inside the category of types of a Martin-Löf style type theory.
Definition
Let be a universe of types, let : , and let : → be a family of types indexed by . The pair (, ) is sometimes called a signature or a container. The polynomial functor associated to the container (, ) is defined as follows:
Any functor naturally isomorphic to is called a container functor. The action of on functions is defined by
Note that this assignment is not only truly functorial in extensional type theories (see #Properties).
Properties
In intensional type theories, such functions are not truly functors, because the universe type is not strictly a category (the field of homotopy type theory is dedicated to exploring how the universe type behaves more like a higher category). However, it is functorial up to propositional equalities, that is, the following identity types are inhabited:
for any functions and and any type , where is the identity function on the type .
Inline citations
References
External links
An extensive collection of Notes on Polynomial Functors
Type theory |
https://en.wikipedia.org/wiki/SAMV%20%28algorithm%29 | SAMV (iterative sparse asymptotic minimum variance) is a parameter-free superresolution algorithm for the linear inverse problem in spectral estimation, direction-of-arrival (DOA) estimation and tomographic reconstruction with applications in signal processing, medical imaging and remote sensing. The name was coined in 2013 to emphasize its basis on the asymptotically minimum variance (AMV) criterion. It is a powerful tool for the recovery of both the amplitude and frequency characteristics of multiple highly correlated sources in challenging environments (e.g., limited number of snapshots and low signal-to-noise ratio). Applications include synthetic-aperture radar, computed tomography scan, and magnetic resonance imaging (MRI).
Definition
The formulation of the SAMV algorithm is given as an inverse problem in the context of DOA estimation. Suppose an -element uniform linear array (ULA) receive narrow band signals emitted from sources located at locations , respectively. The sensors in the ULA accumulates snapshots over a specific time. The dimensional snapshot vectors are
where is the steering matrix, contains the source waveforms, and is the noise term. Assume that , where is the Dirac delta and it equals to 1 only if and 0 otherwise. Also assume that and are independent, and that , where . Let be a vector containing the unknown signal powers and noise variance, .
The covariance matrix of that contains all information about is
This covariance matrix can be traditionally estimated by the sample covariance matrix where . After applying the vectorization operator to the matrix , the obtained vector is linearly related to the unknown parameter as
,
where , , , , and let
where
is the Kronecker product.
SAMV algorithm
To estimate the parameter from the statistic , we develop a series of iterative SAMV approaches based on the asymptotically minimum variance criterion. From, the covariance matrix of an arbitrary consistent estimator o |
https://en.wikipedia.org/wiki/Fast%20and%20Secure%20Protocol | The Fast Adaptive and Secure Protocol (FASP) is a proprietary data transfer protocol. FASP is a network-optimized network protocol created by Michelle C. Munson and Serban Simu, productized by Aspera, and now owned by IBM subsequent to its acquisition of Aspera. The associated client/server software packages are also commonly called Aspera. The technology is patented under US Patent #8085781, Bulk Data Transfer, #20090063698, Method and system for aggregate bandwidth control. and others.
Built upon the connectionless UDP protocol, FASP does not expect any feedback on every packet sent, and yet provides fully reliable data transfer over best effort IP networks. Only the packets marked as really lost must be requested again by the recipient. As a result, it does not suffer as much loss of throughput as TCP does on networks with high latency or high packet loss and avoids the overhead of naive "UDP data blaster" protocols. The protocol innovates upon naive "data blaster" protocols through an optimal control-theoretic retransmission algorithm and implementation that achieves maximum goodput and avoids redundant retransmission of data. Its control model is designed to fill the available bandwidth of the end-to-end path over which the transfer occurs with only "good" and needed data.
Large organizations like the European Nucleotide Archive, the US National Institutes of Health National Center for Biotechnology Information and others use the protocol. The technology was recognized with many awards including an Engineering Emmy from the Academy of Film and Television.
Security
FASP has built-in security mechanisms that do not affect the transmission speed. The encryption algorithms used are based exclusively on open standards. Some product implementation use secure key exchange and authentication such as SSH.
The data is optionally encrypted or decrypted immediately before sending and receiving with the AES-128. To counteract attacks by monitoring the encrypted info |
https://en.wikipedia.org/wiki/Ghana%20Institution%20of%20Engineers | The Ghana Institution of Engineers (GhIE) is the professional body responsible for licensing practicing engineers in Ghana. It was founded in 1968 to succeed the Ghana Group of Professional Engineers. The Institution derives its authority from the Engineering Council Act 2011, Act 819 and the Professional Bodies Registration Decree NRCD143 of 1973. It regulates the activities of engineers and engineering firms in Ghana. It also sets standards in engineering sector of Ghana and organises professional exams for engineers.
Mission
As part of its mission, the GhIE aims to:
Be leaders in the development of science, engineering and technology at all levels of society.
Share knowledge and instill in the membership professionalism and ethical practice
Establish structures to ensure good corporate image of the institution at all times.
Membership
Membership categories include Fellows, Members, Associates, Graduate Members, Affiliates and Technicians.
References
Merged content from Ghana Institutite of Engineers. See Talk:Ghana Institutite of Engineers
Professional associations based in Ghana
Engineering societies
Engineering organizations |
https://en.wikipedia.org/wiki/Hardware-based%20encryption | Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically, this is implemented as part of the processor's instruction set. For example, the AES encryption algorithm (a modern cipher) can be implemented using the AES instruction set on the ubiquitous x86 architecture. Such instructions also exist on the ARM architecture. However, more unusual systems exist where the cryptography module is separate from the central processor, instead being implemented as a coprocessor, in particular a secure cryptoprocessor or cryptographic accelerator, of which an example is the IBM 4758, or its successor, the IBM 4764. Hardware implementations can be faster and less prone to exploitation than traditional software implementations, and furthermore can be protected against tampering.
History
Prior to the use of computer hardware, cryptography could be performed through various mechanical or electro-mechanical means. An early example is the Scytale used by the Spartans. The Enigma machine was an electro-mechanical system cipher machine notably used by the Germans in World War II. After World War II, purely electronic systems were developed. In 1987 the ABYSS (A Basic Yorktown Security System) project was initiated. The aim of this project was to protect against software piracy. However, the application of computers to cryptography in general dates back to the 1940s and Bletchley Park, where the Colossus computer was used to break the encryption used by German High Command during World War II. The use of computers to encrypt, however, came later. In particular, until the development of the integrated circuit, of which the first was produced in 1960, computers were impractical for encryption, since, in comparison to the portable form factor of the Enigma machine, computers of the era took the space of an entire building. It was only with the development of the microcomputer that computer encr |
https://en.wikipedia.org/wiki/Debasisa%20Mohanty | Debasisa Mohanty (born 30 November 1966) is an Indian computational biologist, bioinformatician and a staff scientists at the National Institute of Immunology, India. Known for his studies on structure and function prediction of proteins, genome analysis and computer simulation of biomolecular systems, Mohanty is an elected fellow of all the three major Indian science academies namely the Indian Academy of Sciences, the Indian National Science Academy and the National Academy of Sciences, India. The Department of Biotechnology of the Government of India awarded him the National Bioscience Award for Career Development, one of the highest Indian science awards, for his contributions to biosciences, in 2009.
Biography
Born on 30 November 1966, Debasisa Mohanty earned a post graduate degree (MSc) in physics from the Indian Institute of Technology, Kanpur in 1988 and did his doctoral studies at the Molecular Biophysics Unit of the Indian Institute of Science to secure a PhD in computational biophysics in 1994. Subsequently, he completed his post-doctoral work, first the Hebrew University of Jerusalem and, later, at the Scripps Research Institute. On his return to India, he joined the National Institute of Immunology, India (NII) where he serves as a Grade VII staff scientist and hosts a number of research scholars at his laboratory. He currently hold director position at NII. At NII, he also supervises the activities of RiPPMiner, (Bioinformatics Resource for Deciphering Chemical Structures of RiPPs) and the Bioinformatics Centre.
Mohanty resides at the NII Campus, along Aruna Asaf Ali Marg in New Delhi.
Legacy
Mohanty's research focus is in the fields of computational biology and bioinformatics and he is known to have developed computational methods for predicting the substrate specificity of proteins as well as identified biosynthetic pathways. His work has assisted in widening the understanding of the function of putative proteins in genomes and the protein int |
https://en.wikipedia.org/wiki/Professorship%20of%20Mathematical%20Finance | The position of Professor of Mathematical Finance in the Mathematical Institute of the University of Oxford was established in 2002.
It is one of the six Statutory professorships in Mathematics at Oxford.
From 2005 to 2015, the position was designated as 'Nomura Chair of Mathematical Finance' and endowed by Nomura.
The post is associated with a professorial fellowship at St. Hugh's College, Oxford.
List of Professors of Mathematical Finance
The holders of the Chair have been:
XunYu Zhou, 2008-2016.
Rama Cont, 2018-
References
See also
List of professorships at the University of Oxford
Mathematics education in the United Kingdom
Mathematics
Professorships in mathematics
Lists of people associated with the University of Oxford
Statutory Professors of the University of Oxford |
https://en.wikipedia.org/wiki/Type%20theory%20with%20records | Type theory with records is a formal semantics representation framework, using records to express type theory types. It has been used in natural language processing, principally computational semantics and dialogue systems.
Syntax
A record type is a set of fields. A field is a pair consisting of a label and a type. Within a record type, field labels are unique. The witness of a record type is a record. A record is a similar set of fields, but fields contain objects instead of types. The object in each field must be of the type declared in the corresponding field in the record type.
Basic type:
Object:
Ptype:
Object:
where and are individuals (type ), is proof that is a boy, etc.
References
Type theory
Semantics |
https://en.wikipedia.org/wiki/TAPPS2 | TAPPS2 (Technische Alternative Planungs- und Programmier-System) is a tool used for developing the program logic for the universal, heating and solar thermal controllers by Austrian manufacturer Technische Alternative. Its primary usecase is defining the exact reaction of the controller to a certain event. Other than its predecessor, TAPPS, which could only be used to program controllers of type UVR1611, TAPPS2 is mainly used to program the UVR16x2 and RSM610 controllers, as well as several extension modules.
Development
Development in TAPPS2 is done on a vector-based drawing surface using components that can be placed via drag and drop. The components, which can be separated into inputs, functions and outputs are then being connected according to their individual features. Available components vary according to the current solar thermal control unit.
External links
Website of Technische Alternative
TAPPS2 Manual
References
Solar thermal energy
Programming tools |
https://en.wikipedia.org/wiki/Everysight | Everysight Ltd. is an Israeli technology company established in 2014 as a spinoff of Elbit Systems. Everysight develops smartglasses based on augmented reality technology for the civilian market. The company's main product is Raptor smartglasses.
History
Early years
Everysight's first generation projection system was developed in 2004. This version was a small micro-HUD, which used a staged beam combiner integrated within a panel window device located in front of the user's eye. This allowed the user to view the surroundings while looking at real-time information, projected from the combiners, and perceived as an augmented reality graphic layer floating in front of the user. An eMagin OLED display component enabled users to view the projected information even in full sunlight.
The display system was connected by cable to a Sony U subnotebook running Windows XP, which interfaced wirelessly with a variety of ANT+ sensors while running custom software designed for cycling and skiing.
2006–2007 – 2nd generation
The team developed the second generation of smartglasses based on the free space principle, with an off-axis non-forming exit pupil, whereby the glasses' lenses themselves are used as a beam combiner in such a way that the projected light can return to the user's eye. Other than the lens itself, there is no additional element in front of the eye, preventing sight obstruction and increasing eye safety. Additionally, the lenses featured a spherical structure delivering built-in correction for optical distortions. The optical solution combined the use of a mini OLED display with significantly low power consumption. The optical solution proved to perform with extremely high efficiency while enabling a high-contrast display that remained visible even in full sunlight. The model was powered by a specially adapted, PDA-like computer running Windows CE, which was connected to the glasses by cable and ran various software apps. The computer included a wireless int |
https://en.wikipedia.org/wiki/BGPsec | Border Gateway Protocol Security (BGPsec) is a security extension of the Border Gateway Protocol defined in RFC 8205, published in September 2017. BGPsec provides to receivers of valid BGPsec UPDATE messages cryptographic verification of the routes they advertise. BGPsec replaces the BGP AS_PATH attribute with a new BGPsec_Path attribute.
BGPsec RFCs
- BGPsec Protocol Specification
- BGPsec Considerations for Autonomous System (AS) Migration
- BGPsec Operational Considerations
- BGPsec Algorithms, Key Formats, and Signature Formats
- A Profile for BGPsec Router Certificates, Certificate Revocation Lists, and Certification Requests
See also
Autonomous system (Internet)
Border Gateway Protocol
References
Routing protocols
Cryptographic protocols |
https://en.wikipedia.org/wiki/Regular%20distribution%20%28economics%29 | Regularity, sometimes called Myerson's regularity, is a property of probability distributions used in auction theory and revenue management. Examples of distributions that satisfy this condition include Gaussian, uniform, and exponential; some power law distributions also satisfy regularity.
Distributions that satisfy the regularity condition are often referred to as "regular distributions".
Definitions
Two equivalent definitions of regularity appear in the literature.
Both are defined for continuous distributions, although analogs for discrete distributions have also been considered.
Concavity of revenue in quantile space
Consider a seller auctioning a single item to a buyer with random value . For any price set by the seller, the buyer will buy the item if . The seller's expected revenue is . We define the revenue function as follows:
is the expected revenue the seller would obtain by choosing such that .
In other words, is the revenue that can be obtained by selling the item with (ex-ante) probability .
Finally, we say that a distribution is regular if is a concave function.
Monotone virtual valuation
For a cumulative distribution function and corresponding probability density function , the virtual valuation of the agent is defined as
The valuation distribution is said to be regular if is a monotone non-decreasing function.
Applications
Myerson's auction
An important special case considered by is the problem of a seller auctioning a single item to one or more buyers whose valuations for the item are drawn from independent distributions.
Myerson showed that the problem of the seller truthfully maximizing her profit is equivalent to maximizing the "virtual social welfare", i.e. the expected virtual valuation of the bidder who receives the item.
When the bidders valuations distributions are regular, the virtual valuations are monotone in the real valuations, which implies that the transformation to virtual valuations is incentive compati |
https://en.wikipedia.org/wiki/Browser%20isolation | Browser isolation is a cybersecurity model which aims to physically isolate an internet user's browsing activity (and the associated cyber risks) away from their local networks and infrastructure. Browser isolation technologies approach this model in different ways, but they all seek to achieve the same goal, effective isolation of the web browser and a user's browsing activity as a method of securing web browsers from browser-based security exploits, as well as web-borne threats such as ransomware and other malware. When a browser isolation technology is delivered to its customers as a cloud hosted service, this is known as remote browser isolation (RBI), a model which enables organizations to deploy a browser isolation solution to their users without managing the associated server infrastructure. There are also client side approaches to browser isolation, based on client-side hypervisors, which do not depend on servers in order to isolate their users browsing activity and the associated risks, instead the activity is virtually isolated on the local host machine. Client-side solutions break the security through physical isolation model, but they do allow the user to avoid the server overhead costs associated with remote browser isolation solutions.
Mechanism
Browser isolation typically leverages virtualization or containerization technology to isolate the users web browsing activity away from the endpoint device - significantly reducing the attack surface for rogue links and files. Browser isolation is a way to isolate web browsing hosts and other high-risk behaviors away from mission-critical data and infrastructure. Browser isolation is a process to physically isolate a user's browsing activity away from local networks and infrastructure, isolating malware and browser based cyber-attacks in the process while still granting full access.
Market
In 2017, the American research group Gartner identified remote browser (browser isolation) as one of the top technologi |
https://en.wikipedia.org/wiki/Burkard%20Polster | Burkard Polster (born 26 February 1965 in Würzburg) is a German mathematician who runs and presents the Mathologer channel on YouTube. He is a professor of mathematics at Monash University in Melbourne, Australia.
Education and career
Polster earned a doctorate from the University of Erlangen–Nuremberg in 1993 under the supervision of Karl Strambach. Other universities that Polster has been affiliated with, before joining Monash University in 2000, include the University of Würzburg, University at Albany, University of Kiel, University of California, Berkeley, University of Canterbury, and University of Adelaide.
Polster's research involves topics in geometry, recreational mathematics, and the mathematics of everyday life, including how to tie shoelaces or stabilize a wobbly table.
Books
Polster is the author of multiple books including:
Included in the four-book compilation Scientia: Mathematics, Physics, Chemistry, Biology, and Astronomy for All (2011) and translated into German as Sciencia: Mathematik, Physik, Chemie, Biologie und Astronomie für alle verständlich (Librero, 2014, in German).
References
External links
Mathologer, Polster's YouTube site
Maths Masters, Burkard Polster and Marty Ross
Australian mathematicians
20th-century German mathematicians
Recreational mathematicians
University of Erlangen-Nuremberg alumni
Academic staff of Monash University
Living people
Science-related YouTube channels
1965 births
Mathematics popularizers
21st-century German mathematicians
English-language YouTube channels |
https://en.wikipedia.org/wiki/Verge3D | Verge3D is a real-time renderer and a toolkit used for creating interactive 3D experiences running on websites.
Overview
Verge3D enables users to convert content from 3D modelling tools (Blender, 3ds Max, and Maya are currently supported) to view in a web browser. Verge3D was created by the same core group of software engineers that previously created the Blend4Web framework.
Features
Verge3D uses WebGL for rendering. It incorporates components of the Three.js library and exposes its API to application developers.
Puzzles
Application functionality can be added via JavaScript, either by writing code directly or by using Puzzles, Verge3D’s visual programming environment based on Google Blockly. Puzzles is aimed primarily at non-programmers allowing quick creation of interactive scenarios in a drag-and-drop fashion.
App Manager and web publishing
App Manager is a lightweight web-based tool for creating, managing and publishing Verge3D projects, running on top of the local development server. Verge3D Network service integrated in the App Manager allows for publishing Verge3D applications via Amazon S3 and EC2 cloud services.
PBR
For purposes of authoring materials, a glTF 2.0-compliant physically based rendering pipeline is offered alongside the standard shader-based approach. PBR textures can be authored using external texturing software such as Substance Painter for which Verge3D offers the corresponding export preset. Besides the glTF 2.0 model, Verge3D supports physical materials of 3ds Max and Maya (with Autodesk Arnold as reference), and Blender's real-time Eevee materials.
glTF and DCC software integration
Verge3D integrates directly with Blender, 3ds Max, and Maya, enabling users to create 3D geometry, materials, and animations inside the software, then export them in the JSON-based glTF format. The Sneak Peek feature allows for exporting and viewing scenes from the DCC tool environment.
Facebook 3D posts
For Facebook publishing, Verge3D offers a spe |
https://en.wikipedia.org/wiki/7%20Billion%20Humans | 7 Billion Humans is a puzzle video game by American developer Tomorrow Corporation. It was released on August 23, 2018 for Microsoft Windows, macOS, Linux, and the Nintendo Switch on October 25, 2018. The game was later released for Android on July 25, 2021. Designed as a sequel to Human Resource Machine, players solve puzzles through by moving multiple data cubes with human workers, using an in-game programming language.
Gameplay
Similar to Human Resource Machine, players are tasked with over 60 programming puzzles, typically involving the movement of numerical data cubes by human workers. For example, a task might ask the player to program the humans to sort the numbers on data cubes in order. The programming language is similar to assembly language, allowing for simple loops, logic, memory storage and calculations. As with its predecessor, the code can be edited in a textual form by copying-and-pasting.
The same program is used to control all humans simultaneously, while allowing each human to follow its individual logic through the project based on their current state, such as moving left or right based on comparing the value of the data cube they are holding. The humans will run through the program until either the program solution is met, or all the humans reach the end of the program and the problem solution is not met, in which case the player must rework the program. The player is able to step through the program and select any individual human to watch their progress through the program for debugging purposes.
Once a player achieves a working solution for a given problem, the game will then simulate 25 additional cases where random factors (such as values of data cubes) change, which might cause a program to fail and require the player to account for that. Otherwise, the player is then ranked on the number of program steps they have, and the number of seconds (cycles) it takes for the program to complete, measured against average marks determined by To |
https://en.wikipedia.org/wiki/Zhong%20Zhong%20and%20Hua%20Hua | Zhong Zhong (, born 27 November 2017) and Hua Hua (, born 5 December 2017) are a pair of identical crab-eating macaques (also referred to as cynomolgus monkeys) that were created through somatic cell nuclear transfer (SCNT), the same cloning technique that produced Dolly the sheep in 1996. They are the first cloned primates produced by this technique. Unlike previous attempts to clone monkeys, the donated nuclei came from fetal cells, not embryonic cells. The primates were born from two independent surrogate pregnancies at the Institute of Neuroscience of the Chinese Academy of Sciences in Shanghai.
Background
Since scientists produced the first cloned mammal Dolly the sheep in 1996 using the somatic cell nuclear transfer (SCNT) technique, 23 mammalian species have been successfully cloned, including cattle, cats, dogs, horses and rats. Using this technique for primates had never been successful and no pregnancy had lasted more than 80 days. The main difficulty was likely the proper programming of the transferred nuclei to support the growth of the embryo. Tetra (born October 1999), a female rhesus macaque, was created by a team led by Gerald Schatten of the Oregon National Primate Research Center using a different technique, called "embryo splitting". She is the first "cloned" primate by artificial twinning, which is a much less complex procedure than the DNA transfer used for the creation of Zhong Zhong and Hua Hua.
In January 2019, scientists in China reported the creation of five identical cloned gene-edited monkeys, using the same cloning technique that was used with Zhong Zhong and Hua Hua, and the same gene-editing CRISPR-Cas9 technique allegedly used by He Jiankui in creating the first ever gene-modified human babies Lulu and Nana. The monkey clones were made in order to study several medical diseases.
Process
Zhong Zhong and Hua Hua were produced by scientists from the Institute of Neuroscience of the Chinese Academy of Sciences in Shanghai, led by Q |
https://en.wikipedia.org/wiki/History%20of%20speciation | The scientific study of speciation — how species evolve to become new species — began around the time of Charles Darwin in the middle of the 19th century. Many naturalists at the time recognized the relationship between biogeography (the way species are distributed) and the evolution of species. The 20th century saw the growth of the field of speciation, with major contributors such as Ernst Mayr researching and documenting species' geographic patterns and relationships. The field grew in prominence with the modern evolutionary synthesis in the early part of that century. Since then, research on speciation has expanded immensely.
The language of speciation has grown more complex. Debate over classification schemes on the mechanisms of speciation and reproductive isolation continue. The 21st century has seen a resurgence in the study of speciation, with new techniques such as molecular phylogenetics and systematics. Speciation has largely been divided into discrete modes that correspond to rates of gene flow between two incipient populations. Current research has driven the development of alternative schemes and the discovery of new processes of speciation.
Early history
Charles Darwin introduced the idea that species could evolve and split into separate lineages, referring to it as specification in his 1859 book On the Origin of Species. It was not until 1906 that the modern term speciation was coined by the biologist Orator F. Cook. Darwin, in his 1859 publication, focused primarily on the changes that can occur within a species, and less on how species may divide into two. It is almost universally accepted that Darwin's book did not directly address its title. Darwin instead saw speciation as occurring by species entering new ecological niches.
Darwin's views
Controversy exists as to whether Charles Darwin recognized a true geographical-based model of speciation in his publication On the Origin of Species. In chapter 11, "Geographical Distribution", Darwin d |
https://en.wikipedia.org/wiki/Variable%20refresh%20rate | Variable refresh rate (VRR) refers to a dynamic display that can continuously and seamlessly change its refresh rate without user input. A display supporting a variable refresh rate usually supports a specific range of refresh rates (e.g. 30 Hertz through 144 Hertz). This is called the variable refresh rate range (VRR range). The refresh rate can continuously vary seamlessly anywhere within this range.
Purpose
On displays with a fixed refresh rate, a frame can only be shown on the screen at specific intervals, evenly spaced apart. If a new frame is not ready when that interval arrives, then the old frame is held on screen until the next interval (stutter) or a mixture of the old frame and the completed part of the new frame is shown (tearing). Conversely, if the frame is ready before the interval arrives, then it won't be shown until that interval arrives.
Variable refresh rates eliminate these issues by matching the refresh rates of a display to be in sync with the frame rate from a video input, making the display motion more smooth. Although VRR is strongly associated with video games due to such content having unpredictable, discontinuous frame rates and thus most maximally benefit from the technology, VRR is also useful as well even for media whose frame rate is fixed and known in advance, such as movies and video, by being able to automatically match the refresh rate to the various frame rates used as industry standard (24, 30, and 60 FPS), again eliminating screen tearing. In this regard, VRR can save power by not needlessly refreshing the display when no new frame is being pushed out; furthering this, VRR also has use in power management, by temporarily lowering the refresh rate of a display during instances when there is little movement on the screen to save power.
History
Vector displays had a variable refresh rate on their cathode-ray tube (CRT), depending on the number of vectors on the screen, since more vectors took more time to draw on their scr |
https://en.wikipedia.org/wiki/Runtime%20application%20self-protection | Runtime application self-protection (RASP) is a security technology that uses runtime instrumentation to detect and block computer attacks by taking advantage of information from inside the running software. The technology differs from perimeter-based protections such as firewalls, that can only detect and block attacks by using network information without contextual awareness. RASP technology is said to improve the security of software by monitoring its inputs, and blocking those that could allow attacks, while protecting the runtime environment from unwanted changes and tampering. RASP-protected applications rely less on external devices like firewalls to provide runtime security protection. When a threat is detected RASP can prevent exploitation and possibly take other actions, including terminating a user's session, shutting the application down, alerting security personnel and sending a warning to the user. RASP aims to close the gap left by application security testing and network perimeter controls, neither of which have enough insight into real-time data and event flows to either prevent vulnerabilities slipping through the review process or block new threats that were unforeseen during development.
Implementation
RASP can be integrated as a framework or module that runs in conjunction with a program's codes, libraries and system calls. The technology can also be implemented as a virtualization. RASP is similar to interactive application security testing (IAST), the key difference is that IAST is focused on identifying vulnerabilities within the applications and RASPs are focused protecting against cybersecurity attacks that may take advantages of those vulnerabilities or other attack vectors.
Deployment options
RASP solutions can be deployed in two different ways: monitor or protection mode. In monitor mode, the RASP solution reports on web application attacks but does not block any attack. In protection mode, the RASP solution reports and blocks web a |
https://en.wikipedia.org/wiki/Sheaf%20on%20an%20algebraic%20stack | In algebraic geometry, a quasi-coherent sheaf on an algebraic stack is a generalization of a quasi-coherent sheaf on a scheme. The most concrete description is that it is a data that consists of, for each a scheme S in the base category and in , a quasi-coherent sheaf on S together with maps implementing the compatibility conditions among 's.
For a Deligne–Mumford stack, there is a simpler description in terms of a presentation : a quasi-coherent sheaf on is one obtained by descending a quasi-coherent sheaf on U. A quasi-coherent sheaf on a Deligne–Mumford stack generalizes an orbibundle (in a sense).
Constructible sheaves (e.g., as ℓ-adic sheaves) can also be defined on an algebraic stack and they appear as coefficients of cohomology of a stack.
Definition
The following definition is
Let be a category fibered in groupoids over the category of schemes of finite type over a field with the structure functor p. Then a quasi-coherent sheaf on is the data consisting of:
for each object , a quasi-coherent sheaf on the scheme ,
for each morphism in and in the base category, an isomorphism
satisfying the cocycle condition: for each pair ,
equals .
(cf. equivariant sheaf.)
Examples
The Hodge bundle on the moduli stack of algebraic curves of fixed genus.
ℓ-adic formalism
The ℓ-adic formalism (theory of ℓ-adic sheaves) extends to algebraic stacks.
See also
Hopf algebroid - encodes the data of quasi-coherent sheaves on a prestack presentable as a groupoid internal to affine schemes (or projective schemes using graded Hopf algebroids)
Notes
References
Editorial note: This paper corrects a mistake in Laumon and Moret-Bailly's Champs algébriques.
External links
https://mathoverflow.net/questions/69035/the-category-of-l-adic-sheaves
http://math.stanford.edu/~conrad/Weil2seminar/Notes/L16.pdf Adic Formalism, Part 2 Brian Lawrence March 1, 2017
Sheaf theory
Algebraic geometry |
https://en.wikipedia.org/wiki/Cryptocurrency%20and%20crime | Cryptocurrency and crime describes notable examples of cybercrime related to theft (or the otherwise illegal acquisition) of cryptocurrencies and some of the methods or security vulnerabilities commonly exploited. Cryptojacking is a form of cybercrime specific to cryptocurrencies that has been used on websites to hijack a victim's resources and use them for hashing and mining cryptocurrency.
According to blockchain analysis company Chainalysis, 0.15% of known cryptocurrency transactions conducted in 2021 were involved in illicit activities like cybercrime, money laundering and terrorism financing, representing a total of $14 billion.
Background
There are various types of cryptocurrency wallets available, with different layers of security, including devices, software for different operating systems or browsers, and offline wallets.
Novel exploits unique to blockchain transactions exist, aiming to generate unintended outcomes for those involved in a transaction. One of the more well known issues that opens the possibility for exploits on Bitcoin is the transaction malleability problem.
The Immunefi Crypto Losses 2022 Report lists industry losses from frauds and hacking as a combined total of for the year, and at for 2021.
Notable thefts
In 2018, around US$1.7 billion in cryptocurrency was lost to scams, theft and fraud. In the first quarter of 2019, the amount of such losses rose to US$1.2 billion. 2022 was a record year for cryptocurrency theft, according to Chainalysis, with stolen worldwide during 125 system hacks, including stolen by "North Korea-linked hackers".
Exchanges
Notable cryptocurrency exchange compromises resulting in the loss of cryptocurrencies include:
Between 2011 and 2014, worth of bitcoin were stolen from Mt. Gox.
In 2016, were stolen through exploiting Bitfinex's exchange wallet, users were refunded.
On December 7, 2017, Slovenian cryptocurrency exchange NiceHash reported that hackers had stolen over $70 million using a hijac |
https://en.wikipedia.org/wiki/Shaping%20processes%20in%20crystal%20growth | Shaping processes in crystal growth are a collection of techniques for growing bulk crystals of a defined shape from a melt, usually by constraining the shape of the liquid meniscus by means of a mechanical shaper. Crystals are commonly grown as fibers, solid cylinders, hollow cylinders (or tubes), and sheets (or plates). More complex shapes such as tubes with a complex cross section, and domes have also been produced. Using a shaping process can produce a near net shape crystal and reduce the manufacturing cost for crystals which are composed of very expensive or difficult to machine materials.
List of shaping processes
Horizontal Ribbon Growth (HRG, 1959)
Edge-defined Film-fed Growth (EFG, 1960)
Low Angle Silicon Sheet (LASS, 1981)
Micro-pulling-down (µ-PD)
Stepanov technique
String ribbon
Edge-defined film-fed growth
Edge-defined film-fed growth or EFG was developed for sapphire growth in the late 1960s by Harold LaBelle and A. Mlavsky at Tyco Industries.
A shaper (also referred to as a die) having dimensions approximately equal to the crystal to be grown rests above the surface of the melt which is contained in a crucible. Capillary action feeds liquid material to a slit at the center of the shaper. When a seed crystal is touched to the liquid film and raised upwards, a single crystal forms at the interface between the solid seed and the liquid film. By continuing to pull the seed upwards, the crystal expands as a liquid film forms between the crystal and the top surface of the shaper. When the film reaches the edges of the shaper, the final crystal shape matches that of the shaper.
The exact dimensions of the crystal will deviate from the dimensions of the shaper because every material has a characteristic growth angle, the angle formed at the triple interface between the solid crystal, liquid film, and the atmosphere. Because of the growth angle, varying the height of the meniscus (i.e. the thickness of the liquid film) will change the dimensions of t |
https://en.wikipedia.org/wiki/CubeSail%20%28UltraSail%29 | CubeSail is a low-cost spacecraft propulsion demonstration mission using two identical 1.5U CubeSat satellites to deploy a long, solar sail ribbon between them. This mission is a first in a series of increasingly complex demonstrations leading up to a full-scale UltraSail heliogyro by the University of Illinois and CU Aerospace.
Background: Heliogyro
UltraSail is a proposed type of robotic spacecraft that uses radiation pressure exerted by sunlight for propulsion. It builds upon the "heliogyro" concept by Richard H. MacNeal, published in 1971, and consists of multiple rotating blades attached to a central hub.
The Heliogyro spacecraft's attitude (orientation), and therefore thrust direction, would be controlled by changing the cyclic and collective blade pitch similar to a helicopter.
Although the Heliogyro design has no mass advantage over a square sail, it remains attractive because the method of deploying large sail blades is simpler than a strut-based design. Blade stiffness is achieved by spinning the spacecraft (centrifugal force) with its rotational axis generally pointing at the Sun.
CubeSail spacecraft
Overview
The University of Illinois together with CU Aerospace designed this mission to demonstrate deployment and to measure the thrust on a 7.7 cm × 250 m membrane (about 20 m2) made of aluminized mylar. The membrane is deployed between two 1.5U CubeSats that separate from each other in low Earth orbit. It is intended as a first step towards the development of the larger solar sail concept called UltraSail.
Re-orientation of the CubeSats will cause the sail to undergo aerodynamic drag in the upper atmosphere for its disposal.
Selection
The spacecraft was selected in 2012 by NASA to be launched as part of the ELaNa program.
Launch
CubeSail was launched on an Electron launch vehicle on 16 December 2018 from New Zealand.
While "satellite beacons at the correct frequency were observed post-launch once on 18 Dec. 2018", there was not "sufficient s |
https://en.wikipedia.org/wiki/WolfSSH | wolfSSH is a small, portable, embedded SSH library targeted for use by embedded systems developers. It is an open-source implementation of SSH written in the C language. It includes SSH client libraries and an SSH server implementation. It allows for password and public key authentication.
Platforms
wolfSSH is currently available for Win32/64, Linux, macOS, Solaris, Threadx, VxWorks, FreeBSD, NetBSD, OpenBSD, embedded Linux, WinCE, Haiku, OpenWrt, iPhone (iOS), Android, Wii and GameCube through DevKitPro support, QNX, MontaVista, TRON variants (TRON/ITRON/µITRON), NonStop OS, OpenCL, Micrium's MicroC/OS-II, FreeRTOS, SafeRTOS, Freescale MQX, Nucleus, TinyOS, TI-RTOS, HP-UX, uTasker, embOS, PIC32, PikeOS, and Green Hills INTEGRITY.
Protocols
The wolfSSH SSH library implements the SSHv2 protocol for both client and server. It also includes support for the Secure copy and SSH File Transfer protocols.
Algorithms
wolfSSH uses the cryptographic services provided by wolfCrypt. wolfCrypt Provides RSA, ECC, Diffie–Hellman, AES (CBC, GCM), Random Number Generation, Large Integer support, and base 16/64 encoding/decoding.
Key exchange
diffie-hellman-group1-sha1
diffie-hellman-group14-sha1
diffie-hellman-group-exchange-sha256
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
Public key
ssh-rsa
ecdsa-sha2-nistp256
ecdsa-sha2-nistp384
ecdsa-sha2-nistp521
Integrity
hmac-sha1
hmac-sha1-96
hmac-sha2-256
Encryption
aes128-cbc
aes128-gcm (OpenSSH compatible)
Licensing
wolfSSH is open source and dual licensed under both the GNU GPL-3.0-or-later and commercial licensing.
See also
Secure Shell
OpenSSH
DropBear
Comparison of SSH clients
Comparison of SSH servers
Comparison of cryptography libraries
References
External links
wolfSSH Homepage
C (programming language) libraries
Cryptographic software
Secure Shell |
https://en.wikipedia.org/wiki/Binary%20tiling | In geometry, the binary tiling (sometimes called the Böröczky tiling) is a tiling of the hyperbolic plane, resembling a quadtree over the Poincaré half-plane model of the hyperbolic plane. It was first studied mathematically in 1974 by . However, a closely related tiling was used earlier in a 1957 print by M. C. Escher.
Tiles
In one version of the tiling, the tiles are shapes bounded by three congruent horocyclic segments (two of which are part of the same horocycle), and two line segments. All tiles are congruent. In the Poincaré half-plane model, the horocyclic segments are modeled as horizontal line segments (parallel to the boundary of the half-plane) and the line segments are modeled as vertical line segments (perpendicular to the boundary of the half-plane), giving each tile the overall shape in the model of a square or rectangle. However, in the hyperbolic plane, these tiles have five sides rather than four, and are not hyperbolic polygons, because their horocyclic edges are not straight. In the half-plane model, In this model, the hyperbolic length of a horizontal horocyclic segment is its Euclidean length in the model, divided by its Euclidean distance from the half-plane boundary. Therefore, in order to make the two horocyclic segments on the lower horizontal edge of each tile each have equal length to the single horocyclic segment on the top edge of the tile, it should be placed with its top edge twice as far from the half-plane boundary as its bottom.
An alternative and combinatorially equivalent version of the tiling places its vertices at the same points, but connects them by hyperbolic line segments instead of horocyclic segments, so that each tile becomes a hyperbolic convex pentagon. In this form of the tiling, the tiles do not appear as rectangles in the halfplane model, and the horocycles formed by horizontal sequences of edges are replaced by apeirogons.
Enumeration and aperiodicity
There are uncountably many different tilings of the hyperboli |
https://en.wikipedia.org/wiki/Q%20multiplier | In electronics, a Q multiplier is a circuit added to a radio receiver to improve its selectivity and sensitivity. It is a regenerative amplifier adjusted to provide positive feedback within the receiver. This has the effect of narrowing the receiver's bandwidth, as if the Q factor of its tuned circuits had been increased. The Q multiplier was a common accessory in shortwave receivers of the vacuum tube era as either a factory installation or an add-on device. In use, the Q multiplier had to be adjusted to a point just short of oscillation to provide maximum sensitivity and rejection of interfering signals.
A Q multiplier could also be adjusted to act as a notch filter, useful for reducing the interfering effect of signals on frequencies near to the desired signal. In some receiver designs, the Q multiplier was made to also serve as a beat frequency oscillator by adjusting it to oscillate. This could be used for reception of single sideband or Morse radiotelegraphy, but in that case the circuit no longer provided improved selectivity.
The principle of regeneration applied to radio receivers was developed by Edwin Armstrong, who patented a regenerative receiver in 1914. At least one console-model broadcast superheterodyne receiver used positive feedback to improve selectivity in a 1926 design. Q-multipliers were common on shortwave general-coverage and communications receivers of the 1950s. With the advent of crystal and ceramic intermediate frequency filters, the Q-multiplier was no longer popular.
See also
Q meter
References
Radio electronics |
https://en.wikipedia.org/wiki/Jean%20A.%20Larson | Jean Ann Larson is an American mathematician. She is a set theorist, a historian of mathematical logic, and a professor at the University of Florida.
She was the first woman to earn a doctorate in mathematics from Dartmouth College, and is known for her research in infinitary combinatorics and the theory of linear spaces.
Career
Larson was raised in the San Francisco Bay Area, and graduated from the University of California, Berkeley in 1968 with a bachelor's degree in mathematics and a minor in English.
As an undergraduate, she had planned to go into teaching, but a mentor at Berkeley, logician John W. Addison Jr., recognized her talent for mathematics and encouraged her to go on to graduate study.
She earned her Ph.D. under the supervision of James Earl Baumgartner at Dartmouth College in 1972, becoming the first woman to obtain a mathematics PhD there.
Larson became an E. R. Hedrick Assistant Professor at the University of California, Los Angeles from 1972 to 1974.
She has been affiliated with the University of Florida since 1974, where she was promoted to full professor in 1987 and served as Associate Chair for Graduate Studies from 1993 to 1996.
In 2002 Larson became chair of the faculty senate at the University of Florida. She credits her Quaker religious practice for making her a good listener and a "consensus builder", two qualities she sees as important in campus leadership.
Research
Much of Larson's research is in infinitary combinatorics, studying versions of Ramsey's theorem for infinite sets.
Her doctoral dissertation, On Some Arrow Relations, was in this subject.
She has been called a "prominent figure in the field of partition relations", particularly for her "expertise in relations for countable ordinals".
Five of her publications are with Paul Erdős, who became her most frequent collaborator.
Erdős, another prominent combinatorialist, visited Larson and others at the University of Florida for two weeks per year every year from 1973 to 1996.
In t |
https://en.wikipedia.org/wiki/NordVPN | NordVPN is a VPN service provided by company Nordsec Ltd with applications for Microsoft Windows, macOS, Linux, Android, iOS, and Android TV. Manual setup is available for wireless routers, NAS devices, and other platforms.
NordVPN is developed by Nord Security (Nordsec Ltd), a company that creates cybersecurity software and was initially supported by the Lithuanian startup accelerator and business incubator Tesonet. NordVPN operates under the jurisdiction of Panama, as the country has no mandatory data retention laws and does not participate in the Five Eyes or Fourteen Eyes intelligence sharing alliances. Its offices are located in Lithuania, the United Kingdom, Panama and the Netherlands. NordVPN has released their Linux client under the terms of the GPLv3 only.
History
NordVPN was established in 2012 by a group of childhood friends which included Tomas Okmanas. Late in May 2016, it presented an Android app, followed by an iOS app in June the same year. In October 2017, it launched a browser extension for Google Chrome. In June 2018, the service launched an application for Android TV. As of June 2021, NordVPN was operating 5,600 servers in 59 countries.
In March 2019, it was reported that NordVPN received a directive from Russian authorities to join a state-sponsored registry of banned websites, which would prevent Russian NordVPN users from circumventing state censorship. NordVPN was reportedly given one month to comply, or face blocking by Russian authorities. The provider declined to comply with the request and shut down its Russian servers on April 1. As a result, NordVPN still operates in Russia, but its Russian users have no access to local servers.
In September 2019, NordVPN announced NordVPN Teams, a VPN solution aimed at small and medium businesses, remote teams and freelancers, who need secure access to work resources. Two years later, NordVPN Teams rebranded as NordLayer and moved towards SASE business solutions. The press sources quoted the marke |
https://en.wikipedia.org/wiki/Market-Adjusted%20Performance%20Indicator | The Market-Adjusted Performance Indicator (MAPI) measures the performance of a company’s management using a relative performance indicator designed to capture management performance as holistically as possible by covering both short-term success and long-term impact. The MAPI is an important element for targeted corporate governance.
Bengt Holmström, with his economic research and his findings, for which he was awarded the Nobel Prize for Economics in 2016, laid the theoretical foundation for the application of a relative performance indicator. It states that top management should be incentivised with a long-term relative performance indicator for its variable compensation.
In the context of a research project of the University of Zurich under the direction of Ernst Fehr, the MAPI was developed and implemented with the consultancy firm Fehr Advice & Partners. To do this, a listed company’s total shareholder return (TSR) is compared with the TSR of a customised, relevant peer group. This way external market shocks, for which the management should be neither rewarded nor penalised, can be excluded. The difference between the TSR of the company and that of its peer group provides insights into the actual performance of the CEO and top management. This makes management performance transparent.
Ernst Fehr and Adriano B. Lucatelli calculated the MAPI for all the firms in the Swiss Performance Index. The compensation model of the Liechtensteinische Landesbank is mainly based on the concept of the MAPI.
References
Business intelligence
Business terms
Corporate governance
Financial ratios
Metrics
Organizational performance management |
https://en.wikipedia.org/wiki/Equihash | Equihash is a memory-hard Proof-of-work algorithm introduced by the University of Luxembourg's Interdisciplinary Centre for Security, Reliability and Trust (SnT) at the 2016 Network and Distributed System Security Symposium. The algorithm is based on a generalization of the Birthday problem which finds colliding hash values. It has severe time-space trade-offs but concedes vulnerability to unforeseen parallel optimizations. It was designed such that parallel implementations are bottle-necked by memory bandwidth in an attempt to worsen the cost-performance trade-offs of designing custom ASIC implementations. ASIC resistance in Equihash is based on the assumption that commercially-sold hardware already has quite high memory bandwidth, so improvements made by custom hardware may not be worth the development cost.
General
Equihash was proposed by Alex Biryukov and Dmitry Khovratovich as part of the University of Luxembourg research group CryptoLUX. It was introduced at the Network and Distributed System Security Symposium 2016 in San Diego. Notable blockchain-based projects such as ZCash, BitcoinZ, Horizen, Aion, Hush, and Pirate Chain have integrated Equihash for reasons such as security, privacy, and ASIC miner resistance.
The manufacturer Bitmain has succeeded in optimizing the processing of Zcash's Equihash-200,9 with an ASIC.
Specification
Equihash has three parameters – , , and – which determine the algorithm's time and memory requirements. The time complexity is proportional to while the memory complexity is proportional to . The algorithm is often implemented with (using an alternative method of controlling the effective difficulty).
The problem in Equihash is to find distinct, -bit values to satisfy such that has leading zeros, where is a chosen hash function. In addition, there are "algorithm binding conditions" which are intended to reduce the risk of other algorithms developed to solve the underlying birthday problem being applicable. A memory-l |
https://en.wikipedia.org/wiki/Ashish%20Arora | Ashish Arora is an Indian structural biologist and a senior scientist at Central Drug Research Institute. He did his postgraduate studies at Rajasthan University and post-doctoral work at the Max Planck Institute for Biophysical Chemistry, Goettingen, and University of Virginia, Charlottesville, VA, before joining the Central Drug Research Institute in 2002. He is known for his studies on Protein NMR Spectroscopy and the pathogenesis of diseases such as tuberculosis and visceral leishmaniasis, commonly known as Kala Azar and has delivered invited speeches at various seminars. The Department of Biotechnology of the Government of India awarded him the National Bioscience Award for Career Development, one of the highest Indian science awards, for his contributions to biosciences, in 2011. He is also a recipient of the 2010 Prof. B. K. Bachhawat Memorial Young Scientist Award of the National Academy of Sciences, India.
Selected bibliography
References
N-BIOS Prize recipients
Indian scientific authors
Living people
Indian medical researchers
Scientists from Lucknow
Year of birth missing (living people)
University of Louisville alumni
Indian biochemists
Structural biology |
https://en.wikipedia.org/wiki/ISO-IR-111 | ISO-IR-111 or KOI8-E is an 8-bit character set. It is a multinational extension of KOI-8 for Belarusian, Macedonian, Serbian, and Ukrainian (except Ґґ which is added to KOI8-F). The name "ISO-IR-111" refers to its registration number in the ISO-IR registry, and denotes it as a set usable with ISO/IEC 2022.
It was defined by the first (1986) edition of ECMA-113, which is the Ecma International standard corresponding to , and as such also corresponds to a 1987 draft version of ISO-8859-5. The published editions of instead correspond to subsequent editions of ECMA-113, which defines a different encoding.
Naming confusion
ISO-IR-111, the 1985 edition of ECMA-113 (also called "ECMA-Cyrillic" or "KOI8-E"), was based on the 1974 edition of GOST 19768 (i.e. KOI-8). In 1987 ECMA-113 was redesigned. These newer editions of ECMA-113 are equivalent to ISO-8859-5, and do not follow the KOI layout. This confusion has led to a common misconception that ISO-8859-5 was defined in or based on GOST 19768-74.
Possibly as another consequence of this, erroneously lists a different codepage under the names "ISO-IR-111" and "ECMA-Cyrillic", resembling ISO-8859-5 with re-ordered rows, and partially compatible with Windows-1251. Due to concerns that existing implementations might use the RFC 1345 definition for those two labels, it was proposed that the IANA additionally recognise as a label for ECMA-113:1985 content, and the IANA presently lists that label as an alias.
Character set
The following table shows the ISO-IR-111 encoding. Each character is shown with its equivalent Unicode code point.
Extended and modified versions
A modified version named KOI8 Unified or KOI8-F was used in software produced by Fingertip Software, adding the Ґ in its KOI8-U location (replacing the soft hyphen and displacing the universal currency sign), and adding some graphical characters in the C1 control codes area, mainly from KOI8-R and Windows-1251.
Incorrect RFC 1345 code page
erroneously lists |
https://en.wikipedia.org/wiki/Khatib%20and%20Alami | Khatib & Alami (K&A) ( Arabic : خطيب وعلمي ) is multidisciplinary urban and regional planning, architectural and engineering consulting company. It has been ranked 40 on ENR 2017 Top 225 International Design.
History
K&A was established in Feb. 1964 by founders ( Prof. Mounir Khatib and Dr. Zuheir Alami ).
By 1980 K&A expanded to operate services in Saudi Arabia, U.A.E, Bahrain and Oman.
In 2017, Dr Najib Khatib was elected Chairman of the Board of Directors, Under the leadership of Dr Khatib, K&A marked several milestones in 2020, including an extension on its largest PMO project in KSA and extension of contracts with Aramco and KSA’s Ministry of Housing.
Awards
Al Habtoor City, UAE - "ENR Global Best Project - Residential/Hospitality"
Khatib & Alami (K&A) was appointed "Construction and Engineering Heavyweight Consultancy of the Year" at the KSA Awards 2019 Design Week at Okku, Riyadh on 30 September 2019.
References
Engineering consulting firms
Architecture in Lebanon
Privately held companies
Consulting firms established in 1964 |
https://en.wikipedia.org/wiki/Plug-in%20electric%20vehicles%20in%20Europe | The adoption of plug-in electric vehicles in Europe is actively supported by the European Union and several national, provincial, and local governments in Europe. A variety of policies have been established to provide direct financial support to consumers and manufacturers; non-monetary incentives; subsidies for the deployment of charging infrastructure; and long term regulations with specific targets. In particular, the EU regulation that set the mandatory targets for average fleet emissions for new cars has been effective in contributing to the successful uptake of plug-in cars in recent years
Europe had about 5.6 million plug-in electric passenger cars and light commercial vehicles on the road at the end of 2021. The European stock of plug-in cars is the world's second largest after China, accounting for about 32% of the global stock in 2021.
Europe also has the world's second largest light commercial electric vehicle stock, 33% of the global fleet in 2020, , France listed as the European country with the largest stock of light-duty all-electric utility vans, with about 62,000 units, followed by Germany (29,500), and the UK (almost 15,000).
The plug-in passenger car segment had a market share of 1.3% of new car registrations in 2016, rose to 3.6% in 2019, and achieved 11.4% in 2020. Despite the segment's rapid growth, , only 1% of all passenger cars on European roads were plug-in electric.
, Germany led cumulative sales in Europe with 1.38 million plug-in cars registered since 2010, followed by France (786,274), the UK (~745,000), Norway (647,000), and the Netherlands (390,454). Norway has the highest market penetration per capita in the world, also has achieved the world's largest plug-in segment market share of new car sales, 86.2% in 2020, and 22% of all passenger cars on Norwegian roads were plug-ins by the end of 2021. Germany has been the top selling European country market in terms of annual volume since 2019.
In 2020, and despite the strong declin |
https://en.wikipedia.org/wiki/ISO%207010 | ISO 7010 is an International Organization for Standardization technical standard for graphical hazard symbols on hazard and safety signs, including those indicating emergency exits. It uses colours and principles set out in ISO 3864 for these symbols, and is intended to provide "safety information that relies as little as possible on the use of words to achieve understanding."
The standard was published in October 2003, splitting off from ISO 3864:1984, which set out design standards and colors of safety signage and merging ISO 6309:1987, Fire protection - Safety signs to create a unique and distinct standard for safety symbols.
, the latest version is ISO 7010:2019, with 7 published amendments. This revision canceled and replaced ISO 20712-1:2008, incorporating the water safety signs and beach safety flags specified in it.
Shape and colour
ISO 7010 specifies five combinations of shape and colour to distinguish between the type of information presented.
List
ISO registers and lists recommended pictograms, which it calls "safety signs", on its website, ISO.org. The ISO standard provides a registered number for pictograms that have officially been made part of the ISO 7010 standard. Corresponding with the categories above, in ISO parlance, "E" numbers refer to Emergency (signs showing a safe condition), "F" numbers refer to Fire protection, "P" numbers refer to Prohibited actions, "M" numbers refer to Mandatory actions, and "W" numbers refer to Warnings of hazards.
According to the related ISO 3864-1 standard, if a symbol does not exist for a situation, the recommended solution is to use the relevant 'general' symbol (M001, P001, W001), along with a supplemental text message.
Safe condition
Crescent variant
ISO 7010 states on all symbols with a first aid cross, that it "may be replaced with another element appropriate to cultural requirements". In countries with a Muslim-majority population, an appropriate symbol is the crescent.
Fire protection
Mandator |
https://en.wikipedia.org/wiki/Blocknots | Blocknots were random sequences of numbers contained in a book and organized by numbered rows and columns and were used as additives in the reciphering of Soviet Union codes, during World War II. The Blocknot consisted of fifty sheets of 5-figure random additive, 100 additive groups to a sheet. No sheet was used more than once, thus the blocknots were in effect a form of one-time pad. The Soviet Unions highest grade ciphers that were used in the East, were the 5-figure codebook enciphered with the Blocknot book, and were generally considered unbreakable.
Technical Description
Blocknots were distributed centrally from an office in Moscow. Every Blocknot contained 5-figure groups in a number of sheets, for the enciphering of 5-figure messages. The encipherment was effected by applying additives taken from the pad, of which 50-100 5-figure groups appeared. Each pad had a 5-figure number and each sheet had a 2-figure number running consecutively. There were 5 different types of Blocknots, in two different categories
The Individual in which each table of random numbers was used only once.
The General in which each page of the Blocknot was valid for one day. The security of the additive sequence rested on the choice of different starting points for each message. In 5-figure messages, the blocknot was one of the first 10 Groups in the message. Its position changed at long intervals, but was always easy to re-identify. The Russians differentiated between three types of blocks:
The 3-block, DRIERBLOCK. I-block for Individual Block: 50 pages, additive read off in one direction only. The messages could be used and read only between 2 wireless telegraphy stations on one net.
The 6-block, SECHSERBLOCK. Z-block for Circular Block: 30 pages, additive read off in either direction. The messages could be used and read, between all W/T stations in a net.
The 2-block, ZWEIERBLOCK. OS-block. Used only in traffic from lower to higher formations.
Two other types were used, in lowe |
https://en.wikipedia.org/wiki/Vladimir%20Alekseev%20%28mathematician%29 | Vladimir Mikhailovich Alekseev (Владимир Михайлович Алексеев, sometimes transliterated as "Alexeyev" or "Alexeev", 17 June 1932, Bykovo, Ramensky District, Moscow Oblast – 1 December 1980) was a Russian mathematician who specialized in celestial mechanics and dynamical systems.
He attended secondary school in Moscow at one of the special schools of mathematics affiliated with Moscow State University and participated in several mathematical olympiads. From 1950 he studied at the Faculty of Mathematics and Mechanics at the Moscow State University, where he worked as a student of Andrei Kolmogorov on the asymptotic behavior in the three-body problem of celestial mechanics. Already as an undergraduate, Alekseev proved significant new results on quasi-random motion associated with the three-body problem. This was the subject of his dissertation for the Russian candidate degree (Ph.D.) and then his dissertation in 1969 for the Russian doctorate (higher doctoral degree). From 1957 he taught at Moscow State University.
In 1970 Alekseev was an Invited Speaker with talk Sur l´allure finale du mouvement dans le problème de trois corps at the ICM in Nice.
Over a 20-year period, he conducted 3 ongoing seminars: with Yakov Sinai on dynamical systeme, with V. A. Egorov on celestial mechanics, and with M. Zelikin and V. M. Tikhomirov on variational problems and optimal control.
Selected publications
Symbolic dynamics (Russian), Kiev 1976
with V. M. Tikhomirov, S. Fomin: Optimal Control, New York: Consultants Bureau 1987 (trans. from the Russian by V. M. Volosov)
"A theorem on an integral inequality and some of its applications" by V. M. Alekseev in Thirteen papers on dynamical systems by V. M. Alekseev & 14 other authors, American Mathematical Society 1981
with E. M. Galeev, V. M. Tikhomirov: Recueil de problèmes d'optimisation (French), Moscow, MIR 1987
References
External links
Mathnet.ru
20th-century Russian mathematicians
Dynamical systems theorists
Moscow State Unive |
https://en.wikipedia.org/wiki/Rudolf%20Bailovic | Rudolf Bailovic (born 1885 in Sarajevo) was a Serbo-Croatian interpreter and cryptographer, of Austrian descent, who was head of the Balkan Referat of General der Nachrichtenaufklärung during World War II. Bailovic held the civil service rank of civil servant () and was promoted to senior civil servant or Oberregierungsrat in 1944. Bailovic was considered an anti-Nazi, who held anti-Nazi views, and refused to wear German decorations, when in uniform. Bailovic was also a Turkish interpreter and spent significant time in evaluation, providing intelligence.
Military career
Bailovic was a colonel in the Austro-Hungarian Army, who served as an officer in Trieste and was director of the Austrian cipher bureau during World War I. He was considered a middle ranking official of the Austrian cipher section, by Fenner, before and during World War II. During the Anschluss, Bailovic refused to surrender the keys of his department to the Nazis when Austria was subsumed. Subsequently, he was relegated to a minor position in the Austrian civil service. General Erich Fellgiebel and Fritz Thiele, recognising his potential, ordered Wilhelm Fenner to Vienna, to bring Bailovic, along with seven of his colleagues back to Germany, to be employed as cryptanalysts and evaluators. In the final tally, only 4 people came back with Bailovic, that included Joseph Seifert, the then current director of the Austrian cipher bureau. Upon their landing in Germany, a Forschungsamt official met the party at the airport where the Forschungsamt (abbr. FA) official offered money to Bailovic to work for them, which Fenner found disturbing.
Bailovic initially worked for the FA, which was the Luftwaffe's chief Hermann Göring private cipher bureau, specifically for the Nazi Party. Bailovic worked at the FA unit for several months, when he left unexpectedly and was known to be employed by Inspectorate 7/VI by Autumn 1941, when he ran the Balkan desk. During this period, the results from solving both codes a |
https://en.wikipedia.org/wiki/Cryogenic%20electron%20microscopy | Cryogenic electron microscopy (cryo-EM) is a cryomicroscopy technique applied on samples cooled to cryogenic temperatures. For biological specimens, the structure is preserved by embedding in an environment of vitreous ice. An aqueous sample solution is applied to a grid-mesh and plunge-frozen in liquid ethane or a mixture of liquid ethane and propane. While development of the technique began in the 1970s, recent advances in detector technology and software algorithms have allowed for the determination of biomolecular structures at near-atomic resolution. This has attracted wide attention to the approach as an alternative to X-ray crystallography or NMR spectroscopy for macromolecular structure determination without the need for crystallization.
In 2017, the Nobel Prize in Chemistry was awarded to Jacques Dubochet, Joachim Frank, and Richard Henderson "for developing cryo-electron microscopy for the high-resolution structure determination of biomolecules in solution." Nature Methods also named cryo-EM as the "Method of the Year" in 2015.
History
Early development
In the 1960s, the use of transmission electron microscopy for structure determination methods was limited because of the radiation damage due to high energy electron beams. Scientists hypothesized that examining specimens at low temperatures would reduce beam-induced radiation damage. Both liquid helium (−269 °C or 4 K or −452.2 °F) and liquid nitrogen (−195.79 °C or 77 K or −320 °F) were considered as cryogens. In 1980, Erwin Knapek and Jacques Dubochet published comments on beam damage at cryogenic temperatures sharing observations that:
Thin crystals mounted on carbon film were found to be from 30 to 300 times more beam-resistant at 4 K than at room temperature... Most of our results can be explained by assuming that cryoprotection in the region of 4 K is strongly dependent on the temperature.
However, these results were not reproducible and amendments were published in Nature just two years later |
https://en.wikipedia.org/wiki/2019%20Pro%20Bowl | The 2019 Pro Bowl was the National Football League's all-star game for the 2018 NFL season, played on January 27, 2019, at Camping World Stadium in Orlando, Florida. It was televised nationally by ESPN and its sister networks.
Game format
The 2019 game featured the same format as the previous five editions. For the sixth straight year, the Pro Bowl differed from standard NFL game rules and format in that there were no kickoffs and every quarter had a two-minute warning. Also, the play clock was only 35 seconds, and the game clock ran after pass incompletions, except with less than two minutes left in either half (or overtime, had it been necessary).
As with the previous Pro Bowl, a modified limited-contact form was used, and play was called dead as soon as a player was surrounded and likely to be tackled.
Summary
Box score
Scoring summary
Source:
Game statistics
AFC Rosters
The following players were selected to represent the AFC:
Offense
Defense
Special teams
Notes:
Players must have accepted their invitations as alternates to be listed; those who declined are not considered Pro Bowlers.
bold player who participated in game
signifies the player has been selected as a captain
Replacement player selection due to injury or vacancy
Injured/suspended player; selected but did not participate
Replacement starter; selected as reserve
Selected but did not play because his team advanced to Super Bowl LIII (see Pro Bowl "Player Selection" section)
Selected but chose not to participate
NFC rosters
The following players were selected to represent the NFC:
Offense
Defense
Special teams
Notes:
Players must have accepted their invitations as alternates to be listed; those who declined are not considered Pro Bowlers.
bold player who participated in game
signifies the player has been selected as a captain
Replacement Player selection due to injury or vacancy
Injured/suspended player; selected but did not participate
Replacement starter; selected as reserve
Selec |
https://en.wikipedia.org/wiki/Bundle%20of%20principal%20parts | In algebraic geometry, given a line bundle L on a smooth variety X, the bundle of n-th order principal parts of L is a vector bundle of rank that, roughly, parametrizes n-th order Taylor expansions of sections of L.
Precisely, let I be the ideal sheaf defining the diagonal embedding and the restrictions of projections to . Then the bundle of n-th order principal parts is
Then and there is a natural exact sequence of vector bundles
where is the sheaf of differential one-forms on X.
See also
Linear system of divisors (bundles of principal parts can be used to study the oscillating behaviors of a linear system.)
Jet (mathematics) (a closely related notion)
References
Appendix II of Exp II of
Algebraic geometry |
https://en.wikipedia.org/wiki/Spindle%20%28vehicle%29 | SPINDLE (Sub-glacial Polar Ice Navigation, Descent, and Lake Exploration) is a 2-stage autonomous vehicle system consisting of a robotic ice-penetrating carrier vehicle (cryobot) and an autonomous submersible HAUV (hovering autonomous underwater vehicle).
The cryobot is designed to descend through an ice body into a sub-surface ocean and deploy the HAUV submersible to conduct long range reconnaissance, life search, and sample collection. The HAUV submersible will return to, and auto-dock with, the cryobot at the conclusion of the mission for subsequent data uplink and sample return to the surface.
The SPINDLE designed is targeted at sub-glacial lakes such as Lake Vostok and South Pole Lake in Antarctica. SPINDLE would develop the technologies for a Flagship-class mission to either the shallow lakes of Jupiter's moon Europa, the sub-surface ocean of Ganymede, or the geyser sources on both Europa and Enceladus. The project is funded by NASA and is being designed at Stone Aerospace under the supervision of Principal Investigator Bill Stone.
Development
In 2011, NASA awarded Stone Aerospace $4 million to fund Phase 2 of project VALKYRIE (Very-Deep Autonomous Laser-Powered Kilowatt-Class Yo-Yoing Robotic Ice Explorer). This project created an autonomous cryobot capable of melting through vast amounts of ice. The power source on the surface uses optic fiber to conduct a high-energy laser beam to produce hot water jets that melt the ice ahead. Some beam energy is converted to electricity via photovoltaic cells to power on-board electronics and jet pumps. Phase 2 of project VALKYRIE consisted of testing a scaled-down version of the cryobot in Matanuska Glacier, Alaska in 2015.
Stone Aerospace is now looking at designs integrating a scaled-down version of the HAUV submersible called ARTEMIS ( long, ) with VALKYRIE-type technology to produce SPINDLE. This goal is a full-scale cryobot which can melt its way to an Antarctic subglacial lake —Lake Vostok— to collect samples, |
https://en.wikipedia.org/wiki/Research%20software%20engineering | Research software engineering is the use of software engineering practices in research applications. The term was proposed in a research paper in 2010 in response to an empirical survey on tools used for software development in research projects. It started to be used in United Kingdom in 2012, when it was needed to define the type of software development needed in research. This focuses on reproducibility, reusability, and accuracy of data analysis and applications created for research.
Support
Various type of associations and organisations have been created around this role to support the creation of posts in universities and research institutes. In 2014 a Research Software Engineer Association was created in UK, which attracted 160 members in the first three months. Other countries like the Netherlands, Germany, and the USA followed creating similar communities and there are similar efforts being pursued in Asia, Australia, Canada, New Zealand, the Nordic countries, and Belgium. In January 2021 the International Council of RSE Associations was introduced.
UK counts almost 30 universities and institutes with groups that provide access to software expertise to different areas of research. Additionally, the Engineering and Physical Sciences Research Council created a Research Software Engineer fellowship to promote this role and help the creation of RSE groups across UK, with calls in 2015, 2017, and 2020.
The world first RSE conference took place in UK in September 2016, it was repeated in 2017, 2018 and 2019, and is planned again for 2020. In 2019 the first national RSE conferences in Germany and the Netherlands were held, next editions were planned for 2020 and then cancelled.
The SORSE (A Series of Online Research Software Events) community was established in late‑2020 in response to the COVID-19 pandemic and ran its first online event on 2September 2020.
See also
Open Energy Modelling Initiative — relevant here because the bulk of the development occur |
https://en.wikipedia.org/wiki/Zettabyte%20Era | The Zettabyte Era or Zettabyte Zone is a period of human and computer science history that started in the mid-2010s. The precise starting date depends on whether it is defined as when the global IP traffic first exceeded one zettabyte, which happened in 2016, or when the amount of digital data in the world first exceeded a zettabyte, which happened in 2012. A zettabyte is a multiple of the unit byte that measures digital storage, and it is equivalent to 1,000,000,000,000,000,000,000 (1021) bytes.
According to Cisco Systems, an American multinational technology conglomerate, the global IP traffic achieved an estimated 1.2 zettabytes (an average of 96 exabytes (EB) per month) in 2016. Global IP traffic refers to all digital data that passes over an IP network which includes, but is not limited to, the public Internet. The largest contributing factor to the growth of IP traffic comes from video traffic (including online streaming services like Netflix and YouTube).
The Zettabyte Era can also be understood as an age of growth of all forms of digital data that exist in the world which includes the public Internet, but also all other forms of digital data such as stored data from security cameras or voice data from cell-phone calls. Taking into account this second definition of the Zettabyte Era, it was estimated that in 2012 upwards of 1 zettabyte of data existed in the world and that by 2020 there would be more than 40 zettabytes of data in the world at large.
The Zettabyte Era translates to difficulties for data centers to keep up with the explosion of data consumption, creation and replication. In 2015, 2% of total global power was taken up by the Internet and all its components, so energy efficiency with regards to data centers has become a central problem in the Zettabyte Era.
IDC forecasts that the amount of data generated each year will grow to 103 zettabytes by 2023 and 175 zettabytes by 2025. It further estimates that a total of 22 zettabytes of digital stor |
https://en.wikipedia.org/wiki/Algorithms%20of%20Oppression | Algorithms of Oppression: How Search Engines Reinforce Racism is a 2018 book by Safiya Umoja Noble in the fields of information science, machine learning, and human-computer interaction.
Background
Noble earned an undergraduate degree in sociology from California State University, Fresno in the 1990s, then worked in advertising and marketing for fifteen years before going to the University of Illinois Urbana-Champaign for a Master of Library and Information Science degree in the early 2000s. The book's first inspiration came in 2011, when Noble Googled the phrase "black girls" and saw results for pornography on the first page. Noble's doctoral thesis, completed in 2012, was titled "Searching for Black girls: Old traditions in new media." At this time, Noble thought of the title "Algorithms of Oppression" for the eventual book. By this time, changes to Google's algorithm had changed the most common results for a search of "black girls," though the underlying biases remain influential. Noble became an assistant professor at University of California, Los Angeles in 2014. In 2017, she published an article on racist and sexist bias in search engines in The Chronicle of Higher Education. The book was published on February 20, 2018.
Overview
Algorithms of Oppression is a text based on over six years of academic research on Google search algorithms, examining search results from 2009 to 2015. The book addresses the relationship between search engines and discriminatory biases. Noble argues that search algorithms are racist and perpetuate societal problems because they reflect the negative biases that exist in society and the people who create them. Noble dismantles the idea that search engines are inherently neutral by explaining how algorithms in search engines privilege whiteness by depicting positive cues when key words like “white” are searched as opposed to “asian,” “hispanic,” or “Black.” Her main example surrounds the search results of "Black girls" versus "whi |
https://en.wikipedia.org/wiki/Royal%20Mint%20Gold | Royal Mint Gold was a digital gold currency and a cryptocurrency backed by gold reserves in the UK Royal Mint. The Royal Mint began testing blockchain transactions in April 2017. The first test transaction was in August 2017. The rollout was originally scheduled to occur by the end of 2017. US-based CME Group (Chicago Mercantile Exchange) was tentatively set to administer the trading. At the time, The Daily Telegraph said it "appears somewhat similar to an exchange-traded fund such as ETF Securities Physical Gold".
The project collapsed in 2018, when CME pulled out and the UK Royal Mint was hesitant to find a new partner.
Implementation
The blockchain used is the Prova open-source distributed ledger. A proof-of-stake algorithm demonstrates ownership of the physical gold. BitGo provided blockchain code.
Backing gold
The Royal Mint stated that "All gold is held within the highly secure storage facilities in The Royal Mint's vault and The Royal Mint acts solely as sub-custodian and has no claim on the gold" and that gold delivery would be possible, with additional fabrication fees for amounts less than a London Good Delivery bar (400 oz, worth about US$400,000 on January 31, 2018).
Cancellation
Around October 25, 2018, the UK Government cancelled the Mint's plans to issue cryptocurrency, after a change in management at CME led the group to pull out and left the UK Royal Mint without a trading venue.
References
Further reading
External links
Cryptocurrency projects
Digital gold currencies
CME Group |
https://en.wikipedia.org/wiki/J-CODE | J-CODE, an acronym for Joint Criminal Opioid Darknet Enforcement, is an FBI operation announced by U.S. Attorney General Jeff Sessions on January 29, 2018, in Pittsburgh, Pennsylvania which targets illegal opioid distribution on the Darknet. Given the integrity and robustness of the hidden services of the Tor anonymity network, however, sting operations, the seizure of servers, the tracking of postal deliveries, and in general the exploitation of failures of operational security are expected to be standard operating procedure.
References
Federal Bureau of Investigation operations
Opioids
Tor (anonymity network)
Task forces |
https://en.wikipedia.org/wiki/Bornyl%20acetate | Bornyl acetate is a chemical compound. Its molecular formula is C12H20O2 and its molecular weight is 196.29 g/mol. It is the acetate ester of borneol. It is used as a food additive, flavouring agent, and odour agent.
It is a component of the essential oil from pine needles (from the family Pinaceae) and primarily responsible for its odor.
References
Acetate esters
Terpenes and terpenoids
Food additives |
https://en.wikipedia.org/wiki/Durai%20Sundar | Durai Sundar is an Indian computational biologist, bioinformatician and the current Head of the Department of Biochemical Engineering and Biotechnology at the Indian Institute of Technology, Delhi. He is known for his studies in the fields of genome editing tool designing, biological studies of natural drugs and metabolic engineering as well as for his participation in the Indo-Japanese collaborative research initiatives on anti-cancer drug development and is a life member of the National Academy of Sciences, India.
The Department of Biotechnology of the Government of India awarded him the National Bioscience Award for Career Development, one of the highest Indian science awards, for his contributions to biosciences, in 2012.
Biography
Durai Sundar, born in the south Indian state of Pondicherry, did his undergraduate and post-graduate studies as well as his doctoral studies at Pondicherry University and completed his post-doctoral work at Johns Hopkins University. Subsequently, he joined the Indian Institute of Technology, Delhi (IITD) as a member of faculty where he is an associate professor, holding the Dupont Young Professor chair. At IITD, he chairs Tryst, IIT Delhi and serves as an associate faculty at the School of Interdisciplinary Research and the Value Education Centre (NRCVEE). He also coordinates the Bioinformatics Centre, a project funded by the Department of Biotechnology and DaiLab, a collaborative biomedical initiative between IIT Delhi and the National Institute of Advanced Industrial Science and Technology (AIST, Japan).
Professional profile
Sundar is known to have carried out research in the fields of genome editing tool designing, biological studies of natural drugs and metabolic engineering. When DaiLab was established at IIT Delhi, he became the coordinator of the initiative. He was a part of the team which studied the anti-cancer properties of Withania somnifera, commonly known as Ashwagandha, and the team identified Withanolide, Withafe |
https://en.wikipedia.org/wiki/Evolution%20of%20seed%20size | The first seeded plants emerged in the late Devonian 370 million years ago. Selection pressures shaping seed size stem from physical and biological sources including drought, predation, seedling-seedling competition, optimal dormancy depth, and dispersal.
History
Since the evolution of the first seeded plants ~370 million years ago, the largest change in seed size was found to be at the divergence of gymnosperms and angiosperms ~325 million years ago, but overall, the divergence of seed size appears to take place relatively consistently through evolutionary time. Seed mass has been found to be phylogenetically conservative with most differences in mean seed mass within types of seed dispersal (dispersal modes) being phylogenetic. This type of information gives us clues about how seed size evolved. Dating fossilized seeds of various sizes and comparing them with the presence of possible animal dispersers and the environmental conditions of the time is another technique used to study the evolution of seed size. Environmental conditions appear to have had a larger influence on the evolution of seed size compared to the presence of animal dispersers. One example of seed size evolving to environmental conditions is thought to have been abundant, closed forest vegetation selecting for larger seed sizes during the Eocene epoch. A general increase or decrease in seed size through time has not been found, but instead a fluctuation in seed size following the environmental conditions of the Maastrichtian, Paleocene, Eocene, Oligocene, Miocene, and Pliocene epochs. Today we also see a pattern with seed size distribution and global environmental conditions where the largest mean seed size is found in tropical forests and a steep decrease in seed size takes places globally as vegetation type changes to non-forest.
Mechanism
Modern seed sizes range from 0.0001 mg in orchid seeds to in double coconuts. Larger seeds have larger quantities of metabolic reserves in their embryo an |
https://en.wikipedia.org/wiki/SafeInCloud | SafeInCloud is a proprietary password manager to securely store passwords and other credentials offline and in the cloud. It is similar to Enpass which has the same functionality.
Features
One master password
Everything is encrypted locally
Cloud synchronization to Google Drive, Dropbox, OneDrive and WebDAV
Cross browser and platform support
Strong password generation
Password encryption
AutoFill Passwords with the help of browser extensions
Portable access
See also
Comparison of password managers
References
External links
Software that uses Qt
Password managers
Cross-platform software
IOS software
Android (operating system) software
Universal Windows Platform apps
MacOS software |
https://en.wikipedia.org/wiki/Vaginal%20support%20structures | The vaginal support structures are those muscles, bones, ligaments, tendons, membranes and fascia, of the pelvic floor that maintain the position of the vagina within the pelvic cavity and allow the normal functioning of the vagina and other reproductive structures in the female. Defects or injuries to these support structures in the pelvic floor leads to pelvic organ prolapse. Anatomical and congenital variations of vaginal support structures can predispose a woman to further dysfunction and prolapse later in life. The urethra is part of the anterior wall of the vagina and damage to the support structures there can lead to incontinence and urinary retention.
Pelvic bones
The support for the vagina is provided by muscles, membranes, tendons and ligaments. These structures are attached to the hip bones. These bones are the pubis, ilium and ischium. The interior surface of these pelvic bones and their projections and contours are used as attachment sites for the fascia, muscles, tendons and ligaments that support the vagina. These bones are then fuse and attach to the sacrum behind the vagina and anteriorly at the pubic symphysis. Supporting ligaments include the sacrospinous and sacrotuberous ligaments. The sacrospinous ligament is unusual in that it is thin and triangular.
Pelvic diaphragm
The muscular pelvic diaphragm is composed of the bilateral levator ani and coccygeus muscles and these attach to the inner pelvic surface. The iliococcygeus and pubococcygeus make up the levator ani muscle. The muscles pass behind the rectum. The levator ani surrounds the opening which the urethra, rectum and vagina pass. The pubococcygeus muscle is subdivided into the pubourethralis, pubovaginal muscle and the puborectalis muscle. The names describe the attachments of the muscles to the urethra, vagina, anus, and rectum. The names are also called the pubourethralis, pubovaginalis, puboanalis, and puborectalis muscles and sometimes the pubovisceralis since it attaches to the vi |
https://en.wikipedia.org/wiki/Royole | Royole Corporation is a manufacturer of flexible displays and sensors that can be used in a range of human-machine interface products, including foldable smartphones and other smart devices.
History
Royole was founded by Stanford engineering graduates, including current Founder Bill Liu, in 2012.
The company, backed by investors including IDG Capital, AMTD Group and Knight Capital, produces fully flexible displays in volume from its 4.5-million-square-feet quasi-G6 mass production campus in Shenzhen, China.
Royole has offices in Fremont, California, Hong Kong and Shenzhen.
Towards the end of 2020, Royole filed to go public on Shanghai's STAR Market, but withdraw their application shortly after when shareholder structure issues emerged.
Milestones
Royole produced the world's thinnest full-color flexible displays and flexible sensors (2014), the world's first foldable 3D mobile theater (2015), the world's first curved car dashboard based on flexible electronics (2016), the first smart writing pad, RoWrite, based on flexible sensors (2017), the volume production of Royole's quasi-G6 mass production campus for fully flexible displays (2018), and the world's first commercial foldable smartphone, FlexPai™, with a fully flexible display (2018).
In May 2019, Royole partnered with Louis Vuitton to launch the “Canvas of the Future” line of handbags that featured built-in flexible displays. The bags were unveiled at Louis Vuitton's Cruise 2020 runway show in New York City.
In December 2018, Airbus China Innovation Centre (ACCIC) announced a partnership with Royole to explore applications of flexible displays and sensors in aircraft development with an aim to improve cabin safety and increase energy conservation.
Awards
Royole has received international industry awards, including in the Red Dot Awards and International Design Awards, for its technological innovations and fast growth. Royole was named a 2018 VIP Award winner by TWICE Magazine.
Controversies
In December |
https://en.wikipedia.org/wiki/Snake%20Projection | The Snake Projection is a continuous map projection typically used as the planar coordinate system for realizing low distortion throughout long linear engineering projects.
Details
The Snake Projection was originally developed by University College London and Network Rail to provide a continuous low distortion projection for the West Coast Mainline infrastructure works. The parameters defining each Snake Projection are tailored for the specific project; the most typical use is with large-scale linear engineering projects such as rail infrastructure, however the projection is equally applicable to any application requiring a low distortion grid along a linear route (for example pipelines and roads). The name of the projection is derived from the sinuous snake-like nature of the projects it may be designed for. Typical map projection distance distortion characteristics of a Snake Projection are minimal over the whole route within approximately 20 kilometres of the centre line.
The principal advantage of the projection is that, for the corridor defining the design space, distances measured on the ground have a nearly one to one relationship with distances in coordinate space (i.e. no scale factor need be applied to convert between distances in grid and distances on the ground). The length of the applicable corridor is variable on a project basis, however when required the projection can extend over several hundreds of kilometres to achieve grid distortion of less than 20 parts per million along the route. The main disadvantage is that away from the design corridor the distortion of the projection is not controlled.
The Snake Projection is suited for engineering purposes due to its low distortion characteristics. An example of its differentiation from mapping grids is the 60m increase in length of the London to Birmingham section of the HS2 rail line, purely due to the more accurate grid representation compared to the length when using the national mapping |
https://en.wikipedia.org/wiki/Laser%20chemical%20vapor%20deposition | Laser chemical vapor deposition (LCVD) is a chemical process used to produce high purity, high performance films, fibers, and mechanical hardware (MEMS). It is a form of chemical vapor deposition in which a laser beam is used to locally heat the semiconductor substrate, causing the vapor deposition chemical reaction to proceed faster at that site. The process is used in the semiconductor industry for spot coating, the MEMS industry for 3-D printing of hardware such as springs and heating elements,2,6,7,9 and the composites industry for boron and ceramic fibers. As with conventional CVD, one or more gas phase precursors are thermally decomposed, and the resulting chemical species 1) deposit on a surface, or 2) react, form the desired compound, and then deposit on a surface, or a combination of (1) and (2).
References
Semiconductor device fabrication
Thin film deposition |
https://en.wikipedia.org/wiki/Trigger%20zone | In neuroscience and neurology, a trigger zone is an area in the body, or of a cell, in which a specific type of stimulation triggers a specific type of response.
The term was first used in this context around 1914 by Hugh T. Patrick, who was writing about trigeminal neuralgia, a condition in which pain fibers in the trigeminal nerve become hypersensitive. In people with trigeminal neuralgia, even a light touch to some part of the body—often a tooth or a part of the face—can give rise to an extended period of excruciating pain. Patrick referred to the sensitive part of the body as the "dolorogenic zone", and used the term "trigger zone" as a simpler equivalent. Through the 1920s and 1930s the term came into steadily wider use, but almost always in the context of neuralgia.
Starting in the late 1930s, other types of stimulation and other types of responses were characterized as having the properties of a trigger zone. In 1940, for example, Morison and Dempsey observed that a small area of the cerebral cortex could be triggered when electrical stimulation would evoke widespread activity in other parts of the cerebral cortex. In 1944 Paul Wilcox described triggering of epileptic seizure by electrical stimulation of another area of the cerebral cortex.
The chemoreceptor trigger zone is within the area postrema of the medulla oblongata in which many types of chemical stimulation can provoke nausea and vomiting. This area was first identified and named in 1951 by Herbert L. Borison and Kenneth R. Brizzee.
Parts of cells, rather than parts of the body, can also behave as trigger zones. The axon hillock of a neuron possesses the highest density of voltage-gated Na+ channels, and is therefore the region where it is easiest for the action potential threshold to be reached.
References
Neurophysiology
Electrophysiology
Voltage-gated ion channels
Medulla oblongata
Cellular neuroscience
Cellular processes
Membrane biology |
https://en.wikipedia.org/wiki/Vaginal%20epithelium | The vaginal epithelium is the inner lining of the vagina consisting of multiple layers of (squamous) cells. The basal membrane provides the support for the first layer of the epithelium-the basal layer. The intermediate layers lie upon the basal layer, and the superficial layer is the outermost layer of the epithelium. Anatomists have described the epithelium as consisting of as many as 40 distinct layers. The mucus found on the epithelium is secreted by the cervix and uterus. The rugae of the epithelium create an involuted surface and result in a large surface area that covers 360 cm2. This large surface area allows the trans-epithelial absorption of some medications via the vaginal route.
In the course of the reproductive cycle, the vaginal epithelium is subject to normal, cyclic changes, that are influenced by estrogen: with increasing circulating levels of the hormone, there is proliferation of epithelial cells along with an increase in the number of cell layers. As cells proliferate and mature, they undergo partial cornification. Although hormone induced changes occur in the other tissues and organs of the female reproductive system, the vaginal epithelium is more sensitive and its structure is an indicator of estrogen levels. Some Langerhans cells and melanocytes are also present in the epithelium. The epithelium of the ectocervix is contiguous with that of the vagina, possessing the same properties and function. The vaginal epithelium is divided into layers of cells, including the basal cells, the parabasal cells, the superficial squamous flat cells, and the intermediate cells. The superficial cells exfoliate continuously, and basal cells replace the superficial cells that die and slough off from the stratum corneum. Under the stratus corneum is the stratum granulosum and stratum spinosum. The cells of the vaginal epithelium retain a usually high level of glycogen compared to other epithelial tissue in the body. The surface patterns on the cells themselve |
https://en.wikipedia.org/wiki/DirtyTooth | DirtyTooth is a generic term for a feature in the Bluetooth profiles of an iPhone that may be exploited if the device is using an iOS version below 11.2. Android devices are not affected.
History
The first hack was reported on March 5, 2017, and was officially presented to the public at the RootedCon conference in August 2017 in Madrid, Spain and later at the ToorCon in San Diego. A research paper was published in 2017 using DirtyTooth with a real bluetooth speaker. In BlackHat Europe 2017 another demonstration was carried out, this time with a Raspberry Pi.
Overview
DirtyTooth is based on the way how Bluetooth notifies the user when it changes the profile. Some operating systems ask the user to accept the profile change but others like iOS, do not warn the user, changing automatically from one profile to another. Depending on the Bluetooth profile, it can provide different access levels to the services and the information located in the device. The DirtyTooth hack works impersonating the A2DP profile so that a user's iOS device connects, changing to a PBAP profile after pairing without having to enter a PIN if the device has Bluetooth version 2.1 or higher.
Affected hardware
The hack affected every iPhone from the 3G to the X, given that the smartphones were running any operating system below iOS version 11.2.
Impact
The data obtained exploiting the DirtyTooth hack may include personal and technical information about the user and the device.
Mitigation
This hack is resolved by updating the iPhone to iOS version 11.2 or higher.
References
External links
Exploit Database
DirtyTooth for Raspberry Pi
Bluetooth
IOS malware
Computer security exploits |
https://en.wikipedia.org/wiki/Refinement%20%28category%20theory%29 | In category theory and related fields of mathematics, a refinement is a construction that generalizes the operations of "interior enrichment", like bornologification or saturation of a locally convex space. A dual construction is called envelope.
Definition
Suppose is a category, an object in , and and two classes of morphisms in . The definition of a refinement of in the class by means of the class consists of two steps.
A morphism in is called an enrichment of the object in the class of morphisms by means of the class of morphisms , if , and for any morphism from the class there exists a unique morphism in such that .
An enrichment of the object in the class of morphisms by means of the class of morphisms is called a refinement of in by means of , if for any other enrichment (of in by means of ) there is a unique morphism in such that . The object is also called a refinement of in by means of .
Notations:
In a special case when is a class of all morphisms whose ranges belong to a given class of objects in it is convenient to replace with in the notations (and in the terms):
Similarly, if is a class of all morphisms whose ranges belong to a given class of objects in it is convenient to replace with in the notations (and in the terms):
For example, one can speak about a refinement of in the class of objects by means of the class of objects :
Examples
The bornologification of a locally convex space is a refinement of in the category of locally convex spaces by means of the subcategory of normed spaces:
The saturation of a pseudocomplete locally convex space is a refinement in the category of locally convex spaces by means of the subcategory of the Smith spaces:
See also
Envelope
Notes
References
Category theory
Duality theories
Functional analysis |
https://en.wikipedia.org/wiki/Neutral%20Point%20Clamped | Neutral point clamped (NPC) inverters are widely used topology of multilevel inverters in high-power applications. This kind of inverters are able to be used for up to several megawatts applications. See links for more information.
See also
Active power filter
Synchronverter
References
Power electronics |
https://en.wikipedia.org/wiki/Algebraic%20Combinatorics%20%28journal%29 | Algebraic Combinatorics is a peer-reviewed diamond open access mathematical journal specializing in the field of algebraic combinatorics. Established in 2018, the journal is published by the Centre Mersenne.
History
The journal was established in 2018, when the editorial board of the Springer Science+Business Media Journal of Algebraic Combinatorics resigned to protest the publisher's high prices and limited accessibility. The board criticized Springer for "double-dipping", that is, charging large subscription fees to libraries in addition to high fees for authors who wished to make their publications open access.
Operations
Algebraic Combinatorics operates on a diamond open access model, in which publication costs are underwritten by voluntary contributions from universities, foundations, and other organizations. Authors do not pay submission fees or article processing charges. All content is published under a Creative Commons license.
The journal's editors-in-chief are Akihiro Munemasa (Tohoku University), Satoshi Murai (Waseda University), Hendrik Van Maldeghem (Ghent University), Brendon Rhoades (University of California, San Diego), and David Speyer (University of Michigan).
Abstracting and indexing
The journal is abstracted and indexed in the Directory of Open Access Journals, Scopus, Mathematical Reviews, and Zentralblatt Math.
See also
Glossa
References
External links
Academic journals established in 2018
Combinatorics journals
5 times per year journals
Open access journals
Creative Commons-licensed journals |
https://en.wikipedia.org/wiki/General%20der%20Nachrichtenaufkl%C3%A4rung%20Training%20Referat | General der Nachrichtenaufklärung Training Referat was the training organization within the General der Nachrichtenaufklärung (GDNA), the military signals intelligence agency of the Wehrmacht, before and during World War II. Until 1942, the work of the Training Referat was not fully exploited and only a small beginners course was in progress.
Training operations
During World War II, the Oberkommando der Wehrmacht suffered from an acute shortage of cryptanalyst personnel, and it was found that the practice of pushing forward groups of cryptanalysts to key areas behind the front, did not of itself provide adequate signals intelligence, particularly as the front lines were getting further away from Berlin.
As a result, Commanders of forward intercept units were allowed to create their own cryptanalysts teams. Two difficulties were encountered in this connection; firstly, a lack of technical knowledge, and secondly the entry into the cryptographic service of personal who were untrustworthy from the security point of view. In two cases in KONA 2 in Smolensk personnel were unearthed who were guilty of espionage. As a result of this a security vetting for all security, translators and cryptanalysis personnel was introduced.
Once the forward cryptanalysis units had been set up, and eventually became the Long Range Intelligence Company (NAZ), they were attached to various Close Range Intelligence Company (NAK) which coordinated intelligence and forwarded the raw flow of intercepts into the Signal Intelligence Evaluation Centre (NAAS). It was agreed to allot the NAZ units investigation of forward lines of communication traffic which could be solved in the field. In 7/VI remained, however, responsible for all army cryptanalysis work and concentrated on the most difficult and unsolved procedures.
As a personnel establishment for these forward cryptanalysis units, it was found necessary to have two or three linguists and one to three mathematicians. Such personnel were tra |
https://en.wikipedia.org/wiki/DKOI | DKOI (, "Binary Code for Information Processing") is an EBCDIC encoding for Russian Cyrillic. It is a Telegraphy-based encoding used in ES EVM mainframes. It has been defined by several standards: GOST 19768-74 / ST SEV 358-76, ST SEV 358-88 / GOST 19768-93, CSN 36 9103.
DKOI K1
In DKOI K1 (ДКОИ К1), each Cyrillic letter is given its own code point. Characters are shown with their equivalent Unicode codes. The dollar sign may be placed in code point 0x5B; in that case the currency sign is in code point 0xE1.
DKOI K2
In DKOI K2 (ДКОИ К2), some Cyrillic letters (А, В, Е, К, М, Н, О, Р, С, Т, Х, а, е, о, р, с, у, х) are merged with visually identical Latin letters (A, B, E, K, M, H, O, P, C, T, X, a, e, o, p, c, y, x). Code points 0x5F and 0xA1 are negation and overline instead of and . The dollar sign may be placed in code point 0x5B; in that case the currency sign is in code point 0xE1.
Code page 880
IBM code page 880 is mostly a superset of DKOI K1, adding support for Cyrillic letters not used in Russian but used in Serbian Cyrillic, Macedonian Cyrillic, Belarusian Cyrillic or Soviet-era Ukrainian Cyrillic (i.e. including the Ukrainian Ye but not the Ukrainian Ge). 0x6A is a continuous vertical bar (like in code page 38), rather than a broken vertical bar (like in code pages 37 and 500), and 0x5B is always a dollar sign rather than a universal currency sign. This matches the character repertoire of KOI8-E.
Code page 1025
Code page 1025 is almost identical to code page 880, but the universal currency sign (¤) is replaced with a section sign (§), thus matching the character repertoire of ISO 8859-5.
Code page 410
Code page 410 differs from code pages 880 and 1025 by lacking braces, backtick and tilde, including exponents of 2 and 3 and the numeric space, and including both the section sign and the universal currency sign in different locations to code pages 880 and 1025.
Footnotes
References
Character sets
EBCDIC code pages |
https://en.wikipedia.org/wiki/Medullary%20thymic%20epithelial%20cells | Medullary thymic epithelial cells (mTECs) represent a unique stromal cell population of the thymus which plays an essential role in the establishment of central tolerance. Therefore, mTECs rank among cells relevant for the development of functional mammal immune system.
T cell precursors rise in bone marrow and migrate through the bloodstream to the thymus for further development. During their maturation in the thymus, they undergo a process called V(D)J recombination which conducts the development of T cell receptors (TCRs). The mechanism of this stochastic process enables on one hand the generation of vast repertoire of TCRs, however, on the other hand causes also origin of so called "autoreactive T cells" which recognize self antigens via their TCRs. Autoreactive T cells must be eliminated from the body or skewed into the T Regulatory cells (TRegs) lineage to prevent manifestations of autoimmunity. mTECs possess the ability to deal with these autoreactive clones via mediation of the processes of central tolerance, namely clonal deletion or T regulatory cells selection, respectively.
N.B.: All the below cited references utilized mouse as a model organism.
Self-antigens generation and presentation
In 1989, two scientific groups came up with the hypothesis that the thymus expresses genes which are in the periphery, strictly expressed by specific tissues (e.g.: Insulin produced by β cells of the pancreas) to subsequently present these so-called "tissue restricted antigens" (TRAs) from almost all parts of the body to developing T cells in order to test which TCRs recognize self-tissues and can be therefore harmful to the body. It was found, after more than a decade, that this phenomenon is managed specifically by mTECs in the thymus and was named Promiscuous gene expression (PGE).
Autoimmune regulator
Aire is a protein called autoimmune regulator (Aire) which is also specifically expressed by mTECs. and its expression is completely dependent on NF- kappa B si |
https://en.wikipedia.org/wiki/TCMTB | (Benzothiazol-2-ylthio)methyl thiocyanate (TCMTB) is a chemical compound classified as a benzothiazole.
Properties
TCMTB is an oily, flammable, red to brown liquid with a pungent odor that is very slightly soluble in water. It decomposes on heating producing hydrogen cyanide, sulfur oxides, and nitrogen oxides. The degradation products are 2-mercaptobenzothiazole (2-MBT) and 2-benzothiazolesulfonic acid.
Uses
TCMTB is used as wideband microbicide, paint fungicide, and paint gallicide. The active substance approved in 1980 in the United States. It is used, for example, in leather preservation, for the protection of paper products, in wood preservatives, and against germs in industrial water.
In the US, TCMTB is used as a fungicide for seed dressing in cereals, safflower, cotton and sugar beet.
It is also used when dealing with fungal problems when extracting hydrocarbons via fracking.
Approval
TCMTB is not an authorized plant protection product in the European Union.
In Germany, Austria and Switzerland, no plant protection products containing this active substance are authorized.
TCMTB contributes to health problems in tannery workers as it is a potential carcinogen, and is a hepatotoxin. It is also a skin sensitizer, and may cause contact dermatitis in those exposed to the poisonous compound. Hence, it is mainly used in developing countries.
References
Benzothiazoles
Thioethers
Thiocyanates
Biocides
Fungicides |
https://en.wikipedia.org/wiki/Webduino | The BPI Bit (also referred to as BPI:bit, stylised as webduino:bit) is an ESP32 with Xtensa 32bit LX6 single/dual-core processor based embedded system
The board is and has an ESP32 module with Xtensa 32bit LX6 single/dual-core processor, with a capacity of up to 600DMIPS, with a built-in 448KB ROM and 520 KB SRAM accelerometer and magnetometer sensors, 2.4G WiFi, Bluetooth and USB connectivity, a display consisting of 25 light-emitting diodes, two programmable buttons, and can be powered by either USB or an external battery pack. The device inputs and outputs are through five ring connectors that are part of the 23-pin edge connector.
BPI:bit provides a wide range of onboard resources, supports photosensitive sensor, digital triaxial sensor, digital compass, temperature sensor interface. Webduino:bit have 25 intelligent control LED light source that the control circuit and RGB chip are integrated in a package of 5050 components. Cascading port transmission signal by single line. Each pixel of the three primary color can achieve 256 brightness display, completed 16777216 color full color display, and scan frequency not less than 400 Hz/s.
BPI:bit use MPU9250 on board, MPU-9250 is a multi-chip module (MCM) consisting of two dies integrated into a single QFN package. One die houses the 3-Axis gyroscope and the 3-Axis accelerometer. The other die houses the AK8963 3-Axis magnetometer from Asahi Kasei Microdevices Corporation. Hence, the MPU-9250 is a 9-axis MotionTracking device that combines a 3-axis gyroscope, 3-axis accelerometer, 3-axis magnetometer and a Digital Motion Processor™ (DMP) all in a small 3x3x1mm package available as a pin-compatible upgrade from the MPU-6515. With its dedicated I2C sensor bus, the MPU-9250directly provides complete 9-axis MotionFusion™ output. The MPU-9250 MotionTracking device, with its 9-axis integration, on-chip MotionFusion™, and runtime calibration firmware, enables manufacturers to eliminate the costly and complex selection, |
https://en.wikipedia.org/wiki/Antigen%20transfer%20in%20the%20thymus | Antigen transfer in the thymus is the transmission of self-antigens between thymic antigen-presenting cells which contributes to the establishment of T cell central tolerance.
Thymus represents an origin of T cell development and its responsibility is to select functional but also safe T cells which will not attack self tissues. Self-harmful T cells, further referred to as autoreactive T cells, originate in the thymus because of the stochastic process called V(D)J recombination which conducts the generation of T cell receptors (TCRs) and enables their limitless variability. Two processes of central tolerance take place in thymic medulla, namely clonal deletion (recessive tolerance) and T Regulatory cells selection (dominant tolerance) which force autoreactive T cells to apoptosis or skew them into suppressor T regulatory cells (TRegs), respectively, in order to protect body against manifestations of autoimmunity.
These processes are mediated especially by unique subset of stromal cells called Medullary thymic epithelial cells (mTECs) via presentation of Tissue restricted antigens (TRAs) that represent self tissues from almost all parts of the body.
mTECs
mTECs are not only capable to present TRAs as efficient APCs. They are also potent in production of these TRAs via unique process called promiscuous gene expression (PGE) and might serve as their reservoir.
Drawbacks of antigen presentation
mTECs as APCs reveal some drawbacks on population level. Their numbers in thymic medulla reach only 100,000 per 2-week-old thymus. Furthermore, average lifespan of mTECs does not exceed 2–3 days, probably due to only known PGE activator Autoimmune regulator (Aire), which requires for its proper function generation of DNA double strand breaks. And last but not least, each TRA is expressed only by 1-3% of mTEC population. These facts decrease the chance of efficient recessive or dominant tolerance.
Relevance of antigen transfer
Unidirectional spreading of mTEC-derived TRAs |
https://en.wikipedia.org/wiki/Katalin%20Vesztergombi | Katalin L. Vesztergombi (born July 17, 1948) is a Hungarian mathematician known for her contributions to graph theory and discrete geometry. A student of Vera T. Sós and a co-author of Paul Erdős, she is an emeritus associate professor at Eötvös Loránd University and a member of the Hungarian Academy of Sciences.
Education
As a high-school student in the 1960s, Vesztergombi became part of a special class for gifted mathematics students at Fazekas Mihály Gimnázium with her future collaborators László Lovász, József Pelikán, and others. She completed her Ph.D. in 1987 at Eötvös Loránd University. Her dissertation, Distribution of Distances in Finite Point Sets, is connected to the Erdős distinct distances problem and was supervised by Vera Sós.
Contributions
Vesztergombi's research contributions include works on permutations, graph coloring and graph products,
combinatorial discrepancy theory, distance problems in discrete geometry, geometric graph theory,
the rectilinear crossing number of the complete graph, and graphons.
With László Lovász and József Pelikán, she is the author of the textbook Discrete Mathematics: Elementary and Beyond.
Personal
Vesztergombi is married to László Lovász, with whom she is also a frequent research collaborator.
Selected publications
Books
Research articles
References
Living people
20th-century Hungarian mathematicians
21st-century Hungarian mathematicians
Women mathematicians
Graph theorists
Geometers
Academic staff of Eötvös Loránd University
Members of the Hungarian Academy of Sciences
1948 births |
https://en.wikipedia.org/wiki/Volatility%20tax | The volatility tax is a mathematical finance term, formalized by hedge fund manager Mark Spitznagel, describing the effect of large investment losses (or volatility) on compound returns. It has also been called volatility drag, volatility decay or variance drain. This is not literally a tax in the sense of a levy imposed by a government, but the mathematical difference between geometric averages compared to arithmetic averages. This difference resembles a tax due to the mathematics which impose a lower compound return when returns vary over time, compared to a simple sum of returns. This diminishment of returns is in increasing proportion to volatility, such that volatility itself appears to be the basis of a progressive tax. Conversely, fixed-return investments (which have no return volatility) appear to be "volatility tax free".
Overview
As Spitznagel wrote:
Quantitatively, the volatility tax is the difference between the arithmetic and geometric average (or “ensemble average” and “time average”) returns of an asset or portfolio. It thus represents the degree of “non-ergodicity” of the geometric average.
Standard quantitative finance assumes that a portfolio’s net asset value changes follow a geometric Brownian motion (and thus are log-normally distributed) with arithmetic average return (or “drift”) , standard deviation (or “volatility”) , and geometric average return
So the geometric average return is the difference between the arithmetic average return and a function of volatility. This function of volatility
represents the volatility tax. (Though this formula is under the assumption of log-normality, the volatility tax provides an accurate approximation for most return distributions. The precise formula is a function of the central moments of the return distribution.)
The mathematics behind the volatility tax is such that a very large portfolio loss has a disproportionate impact on the volatility tax that it pays and, as Spitznagel wrote, this is why t |
https://en.wikipedia.org/wiki/Networked%20flying%20platform | Networked flying platforms (NFPs) are unmanned flying platforms of various types including unmanned aerial vehicles (UAVs), drones, tethered balloon and high-altitude/medium-altitude/low-altitude platforms
(HAPs/MAPs/LAPs) carrying RF/mmWave/FSO payload (transceivers) along with an extended battery life capabilities, and are floating or moving in the air at a quasi-stationary positions with the ability to move horizontally and vertically to offer 5G and beyond 5G (B5G) cellular networks and network support services.
Deployment configurations
There are following two possible NFPs deployment configurations:
Deployment configuration 1: NFPs are expected to complement the conventional cellular networks to further enhance the wireless capacity, expand the coverage and improve the network reliability for temporary events, where there is a high density of mobile users or small cells in a limited/hard to reach area or in a remote region where infrastructure is not available and expensive to deploy, e.g., sports events and concert gatherings
Deployment configuration 2: NFPs can be deployed for unexpected scenarios, such as in emergency situations to support disaster relief activities and to enable communications when conventional cellular networks are either damaged or congested. In addition, owing to their mobility, NFPs are expected to deploy quickly and efficiently to support cellular networks, enhance network quality of service (QoS) and improve network resilience under emergency scenarios
NFPs can be manually (non-autonomously) controlled but mainly designed for autonomous pre-determined flights. NFPs can either operate in a single NFP mode where NFPs do not cooperate with other NFPs in the network, if exists or a swarm of NFPs where multiple interconnected NFPs cooperate, collaborate and perform the network mission autonomously with one of the NFPs designated as mother-NFP
References
External links
BT Drone flights to connect Isle of Lewis with mainland
Qual |
https://en.wikipedia.org/wiki/Malacidin | Malacidins are a class of chemicals made by bacteria found in soil that can kill Gram-positive bacteria. Their activity appears to be dependent on calcium. The discovery of malacidins was published in 2018.
The malacidin family were discovered using a new method of soil microbiome screening that does not require cell culturing. This allowed researchers to identify genetic components necessary to produce the chemical. Malacidin A was shown to kill Staphylococcus aureus and other Gram-positive bacteria.
At the time of publication it was not certain if the discovery would lead to any new antibiotic drugs, because large investments of time and money are required to determine whether any drug is safe and effective.
Chemical structure
Malacidins are macrocycle lipopeptides. The 2018 paper described two chemicals in the malacidin family, differing only by a methylene at their lipid tails. Their peptide cores include four non-proteinogenic amino acids. The name "malacidin" is derived from the abbreviation of metagenomic acidic lipopeptide antibiotic and the suffix -cidin.
Mechanism of action
Malacidins appear to take on their active conformation after they bind to calcium; the calcium-bound molecule then appears to bind to lipid II, a bacterial cell wall precursor molecule, leading to destruction of the cell wall and death of the bacteria. Therefore, they would be a new member of the class of calcium-dependent antibiotics. The discovery of malacidins supported the view that the calcium-dependent antibiotics are a larger class than previously thought.
History
Malacidins were discovered by researchers at Rockefeller University, led by Brad Hover and Sean Brady. The group had been looking into antibiotics related to daptomycin and their calcium-dependent nature, but determined that it would be impractical to culture variations in lab conditions. Instead, the team used a genetics approach that was more scalable. They focused on searching for novel biosynthetic gene cl |
https://en.wikipedia.org/wiki/DiRAC | Distributed Research using Advanced Computing (DiRAC) is an integrated supercomputing facility used for research in particle physics, astronomy and cosmology in the United Kingdom. DiRAC makes use of multi-core processors and provides a variety of computer architectures for use by the research community.
Development
Initially DiRAC was funded with an investment of £12 million from the Government of the United Kingdom's Large Facilities Capital Fund combined with funds from the Science and Technology Facilities Council (STFC) and a consortium of universities in the UK. In 2012, the DiRAC facility was upgraded with a further £15 million of UK government capital to create DiRAC II which had five installations.
DiRAC-3 was launched in 2021, with three services offered at four sites:
Data intensive service, jointly hosted by the universities of Cambridge (part share in the 'Cumulus' HPC platform) and Leicester (Data Intensive 3 and Data Intensive 2.5x supercomputers)
Memory intensive service, hosted by Durham University at the Institute for Computational Cosmology (Memory Intensive 3 (COSMA8) and Memory Intensive 2.5 (COSMA7) supercomputers
Extreme scaling service, hosted by the University of Edinburgh (Extreme Scaling 'Tursa' supercomputer)
Paul Dirac
DiRAC is a backronym which honours the theoretical physicist and Nobel laureate Paul Dirac.
References
College and university associations and consortia in the United Kingdom
Information technology organisations based in the United Kingdom
Science and Technology Facilities Council
Supercomputers |
https://en.wikipedia.org/wiki/Audio%20interface | An audio interface is a piece of computer hardware that allows the input and output of audio signals to and from a host computer or recording device.
Audio interfaces are closely related to computer sound cards, but whereas sound cards are optimized for audio playback an audio interface is primarily intended to provide low-latency analog-to-digital and digital format conversion for professional audio applications.
Audio interfaces may include microphone preamps, as well as analog line inputs, DI inputs, and ADAT or S/PDIF digital inputs. Outputs are analog line, headphones and digital. They're typically available as external units, either as desktop devices or in a 19-inch rackmount format. Audio interfaces range from two channels in and out, to over 30.
History
Standalone audio interfaces grew from the proprietary hard disk recording market of the 1980s and 1990s, but advances in processor power and hard drive speed meant that, by the mid-1990s, standard home computers were capable of recording multi-channel audio at 16-bit, 44khz compact disc standard.
Early systems such as Digidesign's Sound Tools (1989) and Session 8 (1993) and the Ensoniq PARIS (1998) consisted of an external unit that connected to the host computer with a ISA or SCSI card, but from the late 1990s onwards it became practical to use standard computer interfaces such as FireWire, USB, and eventually Thunderbolt instead.
Versus mixers
Although there is a degree of functional overlap, audio interfaces are differentiated from audio mixers in that they are intended to pass multi-channel audio directly to a host digital audio workstation, whereas mixers generally sum their inputs into a simple two-channel stereo pair. Audio interfaces are therefore often simple rackmount boxes, without faders, although as of 2020 some digital mixers provide multi-channel audio passthrough.
Manufacturers
Apogee Electronics
Arturia
Avid, optimised for Pro Tools
Behringer
Focusrite
M-Audio
MOTU
Nat |
https://en.wikipedia.org/wiki/Datex%20II | Datex II or Datex2 is a data exchange standard for exchanging traffic information between traffic management centres, traffic service providers, traffic operators and media partners. It contains for example traffic incidents, current road works and other special traffic-related events. These data is presented in XML-format and is modeled with UML.
The standard is developed by the technical body Intelligent transport systems (CEN/TC 278) of the European Committee for Standardization.
The standard contains 12 parts:
Context and framework
Location referencing
Situation publication
Variable Message Sign (VMS) Publications
Measured and Elaborated Data Publications
Parking Publications
Common data elements
Traffic management publications and extensions dedicated to the urban environment
Traffic signal management publications dedicated to the urban environment
Energy infrastructure
Publication of machine interpretable traffic regulations
Facility related publications
References
External links
Official Datex II website
Datex II example messages
Datex on openstreetmap
EN standards
Intelligent transportation systems |
https://en.wikipedia.org/wiki/RecargaPay | RecargaPay is a Brazilian fintech company that provides online money services. It was founded in 2010 by Rodrigo Teijeiro, Alvaro Teijeiro, and Gustavo Victorica. The company has over 300 employees based mainly in São Paulo, Buenos Aires, Argentina, and Miami, USA.
History
The company was founded in 2010 by brothers Rodrigo and Álvaro Teijeiro, currently CEO and CTO respectively, and Gustavo Victorica, current COO.
Recarga.com operated in Latin America and in the United States under the ownership of Fnbox, a technology holding company that manages various online businesses. By August 2012, the company had processed transactions in six countries for 110,000 customers across more than twenty mobile carriers.
In 2013, Fnbox began a process of dismemberment to focus exclusively on the mobile recharge business. Consequently, Recarga.com became RecargaPay, and diversified its product offering.
In February 2018 RecargaPay had raised $63 million in venture capital from a group of investors including IFC, TheVentureCity, DN Capital, Fabrice Grinda, Martin Varsavsky.
RecargaPay is considered the largest mobile payments and digital financial services ecosystem in Brazil. In September 2018 RecargaPay launched its first physical product: a prepaid card.
Services
RecargaPay allows payments through credit card, debit card, Livelo points, PIX, or its wallet which can be loaded via boleto, deposit, or bank transfer. In the free plan, payments up to 500 reais have no extra charges, and in the Prime+ plan, it's up to 2,000 reais a month.
Some merchants resell RecargaPay's services to attract customers, using phone recharges and bill payments for incentives.
Cell phone recharges
RecargaPay supports multiple carriers: Claro, TIM, Vivo, Oi, Correios, Sercomtel, Algar, and Surf Telecom. It offers scheduled recharges, and an Offline Recharge option for those without credits.
Transport card recharge
The service covers transportation cards from various cities, such as Bilhete Único |
https://en.wikipedia.org/wiki/Vaginal%20rugae | Vaginal rugae are structures of the vagina that are transverse ridges formed out of the supporting tissues and vaginal epithelium in females. Some conditions can cause the disappearance of vaginal rugae and are usually associated with childbirth and prolapse of pelvic structures. The rugae contribute to the resiliency and elasticity of the vagina and its ability to distend and return to its previous state. These structures not only allow expansions and an increase in surface area of the vaginal epithelium, they provide the space necessary for the vaginal microbiota. The shape and structure of the rugae are supported and maintained by the lamina propria of the vagina and the anterior and posterior rugae.
The anterior and posterior columnae rugae are transverse vaginal support structures between which the transverse rugae exist. The cross section of the vagina normally forms a shape that resembles the letter 'H' due to these structures.
Vaginal rugae disappear in older women and those with an estrogen deficiency. The rugae can disappear with anterior vaginal wall prolapse which can occur when supports to the portion located between the vagina and bladder are damaged and the bladder bulges into the vaginal lumen. Vaginal self-examination includes visualizing the presence of vaginal rugae. Anatomists identified rugae of the vagina as early as 1824.
Development
The appearance and presence of vaginal rugae change over the life span of females and are associated with hormonal cycles, estrogens, childbirth, puberty and menopause. During gynecological examination of prepubescent girls, rugae can be visualized. The vaginal rugae change after menopause. In some older women the rugae are present but become flattened and difficult to see. In others, the rugae tend to disappear.
Clinical considerations
Other structures can be present on the vaginal wall though most of the time these can be differentiated from rugae. Vaginal cysts can be small protrusions into the vagina th |
https://en.wikipedia.org/wiki/Innate%20immune%20defect | An innate immune defect is a defect in the innate immune response that blunts the response to infection. These defects may occur in monocytes, neutrophils, natural killer cells, basophils, mast cells or complement proteins.
Types
Toll-like Receptor (TLR) immunodeficiencies
Several TLR immunodeficiencies have been described in which cellular proteins that should transmit the message from the TLRs to the nucleus are abnormal. These signaling defects result in a failure of cytokines to be produced in response to bacterial infection. Disorders of this type include MyD88 deficiency, IRAK-4 deficiency other UNC93B deficiency and TLR3 mutations.
MyD88 deficiency
Myeloid differentiation primary response gene 88 deficiency (MyD88) is a disorder of the innate immune system. It belongs to rare primary immunodeficiency characterized by an increased susceptibility to certain types of bacterial infections. Patients suffer from abnormally frequent and severe infections by a subset of bacteria known as pyogenic bacteria such as Staphylococcus aureus, Streptococcus pneumoniae and Pseudomonas aeruginosa. However, affected individuals have normal resistance to other common bacteria, virusesfungi, and parasites. MYD88 deficiency is caused by mutations in the MYD88 gene and is inherited in an autosomal recessive manner. MYD88 gene provides instructions for making a protein that plays an important role in stimulating the immune system to respond to bacterial infection. The MyD88 protein is part of a signaling pathway that is involved in early recognition of pathogens and the initiation of inflammation to fight infection. This signaling pathway is part of the innate immune response. Most people with this condition have their first bacterial infection before age 2, and the infections can be life-threatening in infancy and childhood. Infections become less frequent by about age 10.
IRAK4 deficiency
Interleukin-1 receptor-associated kinase deficiency is an inherited disorder of |
https://en.wikipedia.org/wiki/Group-scheme%20action | In algebraic geometry, an action of a group scheme is a generalization of a group action to a group scheme. Precisely, given a group S-scheme G, a left action of G on an S-scheme X is an S-morphism
such that
(associativity) , where is the group law,
(unitality) , where is the identity section of G.
A right action of G on X is defined analogously. A scheme equipped with a left or right action of a group scheme G is called a G-scheme. An equivariant morphism between G-schemes is a morphism of schemes that intertwines the respective G-actions.
More generally, one can also consider (at least some special case of) an action of a group functor: viewing G as a functor, an action is given as a natural transformation satisfying the conditions analogous to the above. Alternatively, some authors study group action in the language of a groupoid; a group-scheme action is then an example of a groupoid scheme.
Constructs
The usual constructs for a group action such as orbits generalize to a group-scheme action. Let be a given group-scheme action as above.
Given a T-valued point , the orbit map is given as .
The orbit of x is the image of the orbit map .
The stabilizer of x is the fiber over of the map
Problem of constructing a quotient
Unlike a set-theoretic group action, there is no straightforward way to construct a quotient for a group-scheme action. One exception is the case when the action is free, the case of a principal fiber bundle.
There are several approaches to overcome this difficulty:
Level structure - Perhaps the oldest, the approach replaces an object to classify by an object together with a level structure
Geometric invariant theory - throw away bad orbits and then take a quotient. The drawback is that there is no canonical way to introduce the notion of "bad orbits"; the notion depends on a choice of linearization. See also: categorical quotient, GIT quotient.
Borel construction - this is an approach essentially from algebraic topology; this appro |
https://en.wikipedia.org/wiki/Genode | Genode is a free and open-source software operating system (OS) framework consisting of a microkernel abstraction layer and a set of user space components. The framework is notable as one of the few open-source operating systems not derived from a proprietary OS, such as Unix. The characteristic design philosophy is that a small trusted computing base is of primary concern in a security-oriented OS.
Genode can be used as a basis for a desktop computer or tablet OS or as a virtual machine monitor for guest operating systems. The framework has been used as a trusted component of secure virtualization systems for both x86 and ARM.
The small codebase of Genode makes it a flexible alternative to more complex Unix-derived operating systems. For this reason the framework has been used as a base system for research in such fields as virtualization, inter-process communication, IP stack isolation, monitoring, and software development.
History
Genode was first conceived as the Bastei OS Architecture research report at the Technical University of Dresden (TU Dresden). The focus of the report was to determine the practicality of a component-based OS using capability-based security. This report was motivated in part by research into L4 microhypervisors conducted during the same time. Following the success of an early prototype, the authors of the report founded the company Genode Labs to develop Bastei as the Genode OS Framework.
Releases
The project is developed publicly as an open source project released under the terms of the GNU Affero General Public License with a commercial entity offering alternative licensing. Releases are scheduled at three-month intervals to make changes to the system application binary interface (ABI), application programming interface (API), and issue documentation. The OS framework is available in source code form and following the 18.02 release a general purpose derivative named Sculpt is provided with on-target binary deployment.
Architectura |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.