source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Staatsarchiv%20Ludwigsburg | The Staatsarchiv Ludwigsburg (Ludwigsburg State Archives), located in Ludwigsburg, Germany, is a public institutional repository for roughly 680 state authorities within the District of Stuttgart, Germany.
Holdings
The historical holdings come from the North Württemberg (de) area. Notable holdings, unveiled through the process of denazification, include documents related to the Holocaust (more than 500,000).
The archives also house the files of the Police Headquarters Stuttgart (de), the decorative folders and role books of the Staatstheater Stuttgart and all birth records of the Landesfrauenklinik Stuttgart (Stuttgart Women's State Hospital); the documents of the Teutonic Order, official books of the convent Ellwangen and documents of Ulm, Esslingen am Neckar, Heilbronn, and other former free imperial cities. The collections also include personnel files of the Deutsche Reichsbahn (the German National Railway) and the Deutsche Bundesbahn (the German Federal Railway) from the Reichsbahndirektion/Bundesbahndirektion Stuttgart (de) (Federal Railway Directorate).
Facilities
The Ludwigsburg State Archives relocated, in 1995, from a castle to the Arsenal Barracks and Armory located in the center of Ludwigsburg.
The Arsenal Barracks (Arsenalkaserne) houses the public areas – including a reading room, an auditorium, an exhibition room, library, and an administration office
The Armory (Zeughaus) houses the stacks, which comprise more than of archives
Both buildings were mechanically and structurally re-purposed to meet the safekeeping requirements of modern archives. The buildings are connected by an underground corridor, through which a transport system delivers documents to researchers in the reading room.
Governmental oversight
As part of the Baden-Württemberg administrative reorganization of 2005, Staatsarchiv Ludwigsburg has been a department of the newly created Landesarchiv Baden-Württemberg (de) (Baden-Württemberg State Archives), which was inaugurated |
https://en.wikipedia.org/wiki/Algebraic%20representation | In mathematics, an algebraic representation of a group G on a k-algebra A is a linear representation such that, for each g in G, is an algebra automorphism. Equipped with such a representation, the algebra A is then called a G-algebra.
For example, if V is a linear representation of a group G, then the representation put on the tensor algebra is an algebraic representation of G.
If A is a commutative G-algebra, then is an affine G-scheme.
See also
Algebraic character
References
Claudio Procesi (2007) Lie Groups: an approach through invariants and representation, Springer, .
Lie groups
Representation theory |
https://en.wikipedia.org/wiki/Floristic%20Quality%20Assessment | Floristic Quality Assessment (FQA) is a tool used to assess an area's ecological integrity based on its plant species composition. Floristic Quality Assessment was originally developed in order to assess the likelihood that impacts to an area "would be irreversible or irretrievable...to make standard comparisons among various open land areas, to set conservation priorities, and to monitor site management or restoration efforts." The concept was developed by Gerould Wilhelm in the 1970s in a report on the natural lands of Kane County, Illinois. In 1979 Wilhelm and Floyd Swink codified this "scoring system"
for the 22-county Chicago Region.
Coefficient of conservatism
Each plant species in a region is assigned a coefficient of conservatism, also known as a C-value, ranging between 0 and 10. A plant species with a higher score (e.g. 10) has a lower tolerance to environmental degradation such as overgrazing or development and therefore is naturally restricted to undisturbed, remnant habitats. Non-native plants are either assigned a C-value of 0 or are excluded from assessments. In the Chicago Region, 84% of the native plant species have a C-value of 4 or greater. Plants with a C-value of 4 or greater rarely naturally move from a remnant area to surrounding degraded land. For example, the federally endangered Dalea foliosa has a C-value of 10.
C-values are assigned within specific ecological and geographic regions by botanical experts familiar with the species' autecology within the respective regions. , there were more than 50 different FQA databases ranging from the Gulf Coastal Plain to western Washington, though most databases represented regions in the eastern and central United States and Canada.
The mean C-value () is calculated based on an inventory of plants. An area with a native mean C-value of 3.5 or higher likely has "sufficient floristic quality to be of at least marginal natural area quality." Remnant natural areas with mean C-values of 4.0 or great |
https://en.wikipedia.org/wiki/Boris%20Korenblum | Boris Isaac Korenblum (Борис Исаакович Коренблюм, 12 August 1923, Odessa, now Ukraine – 15 December 2011, Slingerlands, New York) was a Soviet-Israeli-American mathematician, specializing in mathematical analysis.
Boris Korenblum was a child prodigy in music, languages, and mathematics. He started as a violinist at the famous School of Stolyarsky in Odessa. After he won a young mathematicians competition, the family was given an apartment in Kiev, an extraordinary event. Boris was given a mentor, a local mathematics professor, who would peremptorily supervise his course of self study. To the great chagrin of his mother, Boris decided against pursuing a music career. In June 1941, when the war began, he volunteered, not yet having reached the draft age, for the Soviet Army. Because of his fluency in German, he served in a reconnaissance unit. Some of his tasks was going to the enemy lines to capture a prisoner for interrogation. He was also the one to interpret to his commanding officers when a prisoner was taken. Once, refusing to beat a prisoner who was talking already, he quarrelled with the superior officer, and was punished by being sent to a penal battalion. There, he served with, and made fast wartime friends with, some rough characters, many of whom were discharged from penal colonies "to wash with their blood the offences against the Motherland." He later told his family that this experience, together with the inevitable maturing during a bloody war, made a man out of a soft city boy with a doting Jewish mother. After some time, the need for competent interpreters saw him return to his unit, where he served with distinction to the end of the war. His awards, including an Order of the Red Banner, were taken from him when he emigrated to Israel in November 1973.
Coming home from the war, he passed all the exams for the undergraduate degree in mathematics in a few of months, and was admitted for graduate study at the Institute of Mathematics of the National |
https://en.wikipedia.org/wiki/Software%20Product%20Line%20Conference | The Software Product Line Conference SPLC is an international conference which is held annually.
The conference was started based on previous conferences, a Software Product Line Conference organised by Software Engineering Institute in the US and Product Family Engineering Workshops.
Today the SPLC is established as knowledge exchange for existing and new software product lines within different industries such as automotive, avionics, medicine which share the same targets such as reducing development cost, increasing quality and at the same time to maintain flexibility.
Previous conferences were held in Denver, Bilbao, San Diego, Siena, Boston, Rennes, Baltimore, Kyoto, Limerick, San Francisco, Jeju Island, Munich, Salvador, Tokyo, Florence, Nashville, Beijing, and Sevilla.
The following companies have been elected in the Hall of Fame for their achievement in software product line engineering: Boeing, Robert Bosch GmbH, CelsiusTech, Cummins, Danfoss, Ericsson, FISCAN, General Motors, Hewlett Packard, HomeAway, Lockheed Martin, LSI Logic, Lucent, Market Maker, Nokia, Philips, Salion, Siemens, Toshiba, U.S. Army Live Training Transformation, and U.S. Naval Research Laboratory.
Since 2016 an award for the most influential paper has been established. 2016 Don Batory was awarded, 2017 the award was given to Krzysztof Czarnecki, Ulrich Eisenecker of the University of Leipzig.
References
Software industry
Computer science conferences |
https://en.wikipedia.org/wiki/Young%20Woman%20Engineer%20of%20the%20Year%20Award | The Young Woman Engineer of the Year Awards are presented at the Institution of Engineering and Technology, London, England. Part of the IET Achievement Medals collection, the award was launched in 1978, and was originally known as the Girl Technician of the Year, until renamed in 1988. The award was first sponsored by the Caroline Haslett Memorial Trust, which was formed in 1945. It is now funded and sponsored by the Institution of Engineering and Technology and Women's Engineering Society. Awarded to young female engineering apprentices in the UK.
Recipients of the Young Woman Engineer of the Year Awards
2020 Ella Podmore
2019 Ying Wan Loh
2018 Sophie Harker
2017 Ozak Esu
2016 Jenni Sidey
2015 Orla Murphy
2014 Naomi Mitchison
2013 Abbie Hutty
2012 Yewande Akinola
2011 Charlotte Joyce
2010 Arlene McConnell
Related awards
The Mary George Memorial Prize for Apprentices
Mary George CBE was the Director and Secretary of the Electrical Association for Women. The prize is given annually to a young woman apprentice.
The winners so far have included:
2019 Samantha Magowan
2018 Shajida Akthar
2017 Jamie D’Ath
2016 Gemma Dalziel
2015 Emma Goulding
2014 Jessica Bestwick
2013 Sara Underwood
2012 Jessica Jones
2011 Laurie-Ann Smith
Women’s Engineering Society Prize
The Women's Engineering Society Prize is awarded to a young woman engineer who demonstrates exceptional talent within engineering alongside a commitment to improving diversity within engineering.
The winners so far have included:
2022 Eneni Bambara-Abban
2021 Eftychia Koursari
2020 Shrouk El-Attar
2019 Dr. Claire Lucas, Associate Professor of Systems and Information Engineering at the University of Warwick
2018 Lorna Bennet
2017 Larissa Suzuki
2016 Bethan Murray
2015 Helen Cavill
2014 Lucy Ackland
2013 Yasmin Ali
2012 Charlotte Tingley
2011 Kelly Walker
2009 Farah Azirar
2008 Bijal Thakore
2007 Mamta Singhal
2006 Maire McLoone
2005 Rachael Johnson
2004 Claire Woolaghanwo |
https://en.wikipedia.org/wiki/Eugene%20L.%20Grant | Eugene Lodewick Grant (February 15, 1897 – July 9, 1996), was an American civil engineer and educator. He graduated with a BS from the University of Wisconsin in 1917. He started teaching in 1920 at Montana State University and then in 1930 at the School of Engineering, Stanford University where he taught until 1962. He is known for his work in Engineering Economics with his textbook first published in 1930. Grant was the intellectual heir of work performed by John Charles Lounsbury Fish who published Engineering Economics: First Principles in 1923, providing the critical bridge between Grant and the pioneering effort of Arthur M. Wellington in his engineering economics work of the 1870s.
Grant was awarded many academic and professional honors such as an honorary doctorate in civil engineering at Montana State University; Fellow of the American Statistical Association, American Society for Quality(ASQ) and the American Association for the Advancement of Science as well as membership in the National Academy of Engineering in 1987. He was part of the effort to found the American Society for Quality which awarded Grant its top award, the Shewhart Medal in 1952. In 1967, ASQ created the E.L. Grant Award which is granted annually to the individual who has been deemed to have demonstrated outstanding leadership in the areas of educational programs in quality. Joseph Juran said that Grant was a "quiet doer who didn't receive enough credit for what he did" and did much to advance the field of quality to what it was in the middle of the 20th century.
Early life and career
Eugene Lodewick Grant was born on February 15, 1897, in Chicago, Illinois, to Bertrand Eugene and Eva May (Lodewick). In 1923, he married Mildred Brooks Livingston and they had one child, Nancy Livingston. He attended University of Wisconsin and graduated in 1917 with a Bachelor of Science in civil engineering. Grant saw wartime service in the United States Navy and then later served in the Geological Sur |
https://en.wikipedia.org/wiki/Alan%20Hywel%20Jones | Alan Hywel Jones, usually Hywel Jones professionally, is a British materials scientist, working on ceramic composites and body armour, tribology, metals, including sustainable use of precious metals and rare-earth elements, and decorative alloys, wear-resistant coatings, materials analysis and ballistics, and friction-stir methods (welding and processing). He has appeared on radio and television to discuss some of his areas of interest.
Early life
Jones was born in Wales in 1970, and attended school in Ebbw Vale, about north of Cardiff.
Education and career
Academic career
Jones studied at the University of Warwick from 1988 to 1997, receiving a BSc in Physics (1991), an MSc in Materials Characterisation (1993), and a PhD titled Synthesis and Tribology of Sialon / TiB2 Ceramic Composite (1997). He then secured a post as a post-doctoral research fellow and worked over three years on an EU-funded project on ultra-hard composites for tribological applications.
Jones moved to a post at Sheffield Hallam University's Materials and Engineering Research Institute (MERI) in 2000, and continues to work there. He became a senior consultant in 2004, then a senior research fellow, and is now a principal research fellow. He coordinates the consultancy activities of the institute, and has been involved in several hundred projects.
Jones worked from 2008 to 2012 on UK Ministry of Defence-funded research into novel light-weight ceramic composite materials for personal armour, which in turn extended into armour-piercing ammunition, as well as kiln surfaces and high-wear industrial fittings.
His roles have also included membership in the Education and Skills Working Group of Materials UK, which produced a report on a 20-year strategy for UK materials science, the "What's in my stuff" public outreach and education campaign around recycling, and work as an expert witness in civil and criminal cases.
Recognition
Jones was a joint recipient of the Venture Prize of the Worshipf |
https://en.wikipedia.org/wiki/Floating-point%20error%20mitigation | Floating-point error mitigation is the minimization of errors caused by the fact that real numbers cannot, in general, be accurately represented in a fixed space. By definition, floating-point error cannot be eliminated, and, at best, can only be managed.
Huberto M. Sierra noted in his 1956 patent "Floating Decimal Point Arithmetic Control Means for Calculator":
The Z1, developed by Konrad Zuse in 1936, was the first computer with floating-point arithmetic and was thus susceptible to floating-point error. Early computers, however, with operation times measured in milliseconds, were incapable of solving large, complex problems and thus were seldom plagued with floating-point error. Today, however, with supercomputer system performance measured in petaflops, floating-point error is a major concern for computational problem solvers.
The following sections describe the strengths and weaknesses of various means of mitigating floating-point error.
Numerical error analysis
Though not the primary focus of numerical analysis, numerical error analysis exists for the analysis and minimization of floating-point rounding error.
Monte Carlo arithmetic
Error analysis by Monte Carlo arithmetic is accomplished by repeatedly injecting small errors into an algorithm's data values and determining the relative effect on the results.
Extension of precision
Extension of precision is the use of larger representations of real values than the one initially considered. The IEEE 754 standard defines precision as the number of digits available to represent real numbers. A programming language can include single precision (32 bits), double precision (64 bits), and quadruple precision (128 bits). While extension of precision makes the effects of error less likely or less important, the true accuracy of the results are still unknown.
Variable length arithmetic
Variable length arithmetic represents numbers as a string of digits of variable length limited only by the memory available. V |
https://en.wikipedia.org/wiki/Product%20of%20exponentials%20formula | The product of exponentials (POE) method is a robotics convention for mapping the links of a spatial kinematic chain. It is an alternative to Denavit–Hartenberg parameterization. While the latter method uses the minimal number of parameters to represent joint motions, the former method has a number of advantages: uniform treatment of prismatic and revolute joints, definition of only two reference frames, and an easy geometric interpretation from the use of screw axes for each joint.
The POE method was introduced by Roger W. Brockett in 1984.
Method
The following method is used to determine the product of exponentials for a kinematic chain, with the goal of parameterizing an affine transformation matrix between the base and tool frames in terms of the joint angles
Define "zero configuration"
The first step is to select a "zero configuration" where all the joint angles are defined as being zero. The 4x4 matrix describes the transformation from the base frame to the tool frame in this configuration. It is an affine transform consisting of the 3x3 rotation matrix R and the 1x3 translation vector p. The matrix is augmented to create a 4x4 square matrix.
Calculate matrix exponential for each joint
The following steps should be followed for each of N joints to produce an affine transform for each.
Define the origin and axis of action
For each joint of the kinematic chain, an origin point q and an axis of action are selected for the zero configuration, using the coordinate frame of the base. In the case of a prismatic joint, the axis of action v is the vector along which the joint extends; in the case of a revolute joint, the axis of action ω the vector normal to the rotation.
Find twist for each joint
A 1x6 twist vector is composed to describe the movement of each joint.
For a revolute joint,
For a prismatic joint,
The resulting twist has two 1x3 vector components: Linear motion along an axis () and rotational motion along the same axis (ω).
Calculate rotation m |
https://en.wikipedia.org/wiki/Memory%20protection%20unit | A memory protection unit (MPU), is a computer hardware unit that provides memory protection. It is usually implemented as part of the central processing unit (CPU). MPU is a trimmed down version of memory management unit (MMU) providing only memory protection support. It is usually implemented in low power processors that require only memory protection and do not need the full-fledged feature of a memory management unit like virtual memory management.
Overview
The MPU allows the privileged software to define memory regions and assign memory access permission and memory attributes to each of them. Depending on the implementation of the processor, the number of supported memory regions will vary. The MPU on ARMv8-M processors supports up to 16 regions. The memory attributes define the ordering and merging behaviors of these regions, as well as caching and buffering attributes. Cache attributes can be used by internal caches, if available, and can be exported for use by system caches.
MPU monitors transactions, including instruction fetches and data accesses from the processor, which can trigger a fault exception when an access violation is detected. The main purpose of memory protection is to prevent a process from accessing memory that has not been allocated to it. This prevents a bug or malware within a process from affecting other processes, or the operating system itself.
See also
Memory management unit
Memory protection
References
Central processing unit
Digital circuits
Memory management |
https://en.wikipedia.org/wiki/Subfield%20of%20an%20algebra | In algebra, a subfield of an algebra A over a field F is an F-subalgebra that is also a field. A maximal subfield is a subfield that is not contained in a strictly larger subfield of A.
If A is a finite-dimensional central simple algebra, then a subfield E of A is called a strictly maximal subfield if .
References
Richard S. Pierce. Associative algebras. Graduate texts in mathematics, Vol. 88, Springer-Verlag, 1982,
Algebra |
https://en.wikipedia.org/wiki/Acyl-protein%20thioesterase | Acyl-protein thioesterases are enzymes that cleave off lipid modifications on proteins, located on the sulfur atom of cysteine residues linked via a thioester bond. Acyl-protein thioesterases are part of the α/β hydrolase superfamily of proteins and have a conserved catalytic triad. For that reason, acyl-protein thioesterases are also able to hydrolyze oxygen-linked ester bonds.
Function
Acyl-protein thioesterases are involved in the depalmitoylation of proteins, meaning they cleave off palmitoyl modifications on proteins' cysteine residues. Cellular targets include trimeric G-alpha proteins, ion channels and GAP-43. Moreover, human acyl-protein thioesterases 1 and 2 have been identified as major components in controlling the palmitoylation cycle of the oncogene Ras. Depalmitoylation of Ras by acyl-protein thioesterases potentially reduces Ras' affinity to endomembranes, allowing it to be palmitoylated again at the Golgi apparatus and to be directed to the plasma membrane. Acyl-protein thioesterases, therefore, are thought to correct potential mislocalization of Ras.
Known enzymes
Currently fully validated human acyl-protein thioesterases are APT1 and APT2 which share 66% sequence homology.
Additionally there are a handful of putative acyl-protein thioesterases reported, including the ABHD17 enzyme family. In the lysosome, PPT1 of the palmitoyl protein thioesterase family has similar enzymatic activity as acyl-protein thioesterases.
Structure
Acyl-protein thioesterases feature 3 major structural components that determine protein function and substrate processing: 1. A conserved, classical catalytic triad to break ester and thioester bonds; 2. A long hydrophobic substrate tunnel to accommodate the palmitoyl moiety, as identified in the crystal structures of human acyl-protein thioesterase 1, human acyl-protein thioesterase 2 and Zea mays acyl-protein thioesterase 2; 3. A lid-loop that covers the catalytic site, is highly flexible and is a main factor determin |
https://en.wikipedia.org/wiki/Deepfake | Deepfakes (portmanteau of "deep learning" and "fake") are synthetic media that have been digitally manipulated to replace one person's likeness convincingly with that of another. Deepfakes are the manipulation of facial appearance through deep generative methods. While the act of creating fake content is not new, deepfakes leverage powerful techniques from machine learning and artificial intelligence to manipulate or generate visual and audio content that can more easily deceive. The main machine learning methods used to create deepfakes are based on deep learning and involve training generative neural network architectures, such as autoencoders, or generative adversarial networks (GANs). In turn the field of image forensics develops techniques to detect manipulated images.
Deepfakes have garnered widespread attention for their potential use in creating child sexual abuse material, celebrity pornographic videos, revenge porn, fake news, hoaxes, bullying, and financial fraud.
The spreading of disinformation and hate speech through deepfakes has a potential to undermine core functions and norms of democratic systems by interfering with people's ability to participate in decisions that affect them, determine collective agendas and express political will through informed decision-making.
This has elicited responses from both industry and government to detect and limit their use.
From traditional entertainment to gaming, deepfake technology has evolved to be increasingly convincing and available to the public, allowing the disruption of the entertainment and media industries.
History
Photo manipulation was developed in the 19th century and soon applied to motion pictures. Technology steadily improved during the 20th century, and more quickly with the advent of digital video.
Deepfake technology has been developed by researchers at academic institutions beginning in the 1990s, and later by amateurs in online communities. More recently the methods have been adopted b |
https://en.wikipedia.org/wiki/Neural%20architecture%20search | Neural architecture search (NAS) is a technique for automating the design of artificial neural networks (ANN), a widely used model in the field of machine learning. NAS has been used to design networks that are on par or outperform hand-designed architectures. Methods for NAS can be categorized according to the search space, search strategy and performance estimation strategy used:
The search space defines the type(s) of ANN that can be designed and optimized.
The search strategy defines the approach used to explore the search space.
The performance estimation strategy evaluates the performance of a possible ANN from its design (without constructing and training it).
NAS is closely related to hyperparameter optimization and meta-learning and is a subfield of automated machine learning (AutoML).
Reinforcement learning
Reinforcement learning (RL) can underpin a NAS search strategy. Barret Zoph and Quoc Viet Le applied NAS with RL targeting the CIFAR-10 dataset and achieved a network architecture that rivals the best manually-designed architecture for accuracy, with an error rate of 3.65, 0.09 percent better and 1.05x faster than a related hand-designed model. On the Penn Treebank dataset, that model composed a recurrent cell that outperforms LSTM, reaching a test set perplexity of 62.4, or 3.6 perplexity better than the prior leading system. On the PTB character language modeling task it achieved bits per character of 1.214.
Learning a model architecture directly on a large dataset can be a lengthy process. NASNet addressed this issue by transferring a building block designed for a small dataset to a larger dataset. The design was constrained to use two types of convolutional cells to return feature maps that serve two main functions when convoluting an input feature map: normal cells that return maps of the same extent (height and width) and reduction cells in which the returned feature map height and width is reduced by a factor of two. For the reduction cell |
https://en.wikipedia.org/wiki/Erd%C5%91s%20Lectures | Erdős Lectures in Discrete Mathematics and Theoretical Computer Science is a distinguished lecture series at Hebrew University of Jerusalem named after mathematician Paul Erdős. It is bringing an outstanding mathematician or computer scientist to Israel every year in the Spring. The subject of the lectures is Discrete Mathematics and Theoretical Computer Science.
The first lecture series took place in 1998.
List of Erdős Lecturers
1998: Alexander Razborov (Steklov Institute, Russia), Jeff Kahn (Rutgers University, U.S.)
1999: Richard Stanley (MIT, U.S.), Johan Håstad (Royal Institute of Technology, Sweden)
2001: Joel Spencer (NYU, U.S.)
2002: Madhu Sudan (NYU, U.S.)
2003: Maria Chudnovsky (Princeton University, U.S.)
2004: Imre Bárány (Alfréd Rényi Mathematical Institute, Hungary)
2005: János Pach (NYU, U.S.), Endre Szemerédi (Alfréd Rényi Institute of Mathematics, Hungary)
2006: József Beck (Princeton University, U.S.)
2007: Van H. Vu (Rutgers University, U.S.)
2008: Henry Cohn (Microsoft Research, U.S.)
2010: Éva Tardos (Cornell University, U.S.)
2011: Günter M. Ziegler (Freie Universität Berlin, Germany)
2012: Luca Trevisan (Stanford University, U.S.)
2013: Michael Saks (Rutgers University, U.S.)
2014: Daniel Spielman (Yale University, U.S.)
2015: Subhash Khot (NYU, U.S.)
2016: June Huh (IAS & Princeton University, U.S.)
2017: József Solymosi (UBC, Canada)
2018: Igor Pak (UCLA, U.S.)
2022: Shachar Lovett (UCSD, U.S.)
See also
List of things named after Paul Erdős
References
Annual events in Israel
Discrete mathematics
Hebrew University of Jerusalem
University and college lecture series
1998 establishments in Israel
Recurring events established in 1998
Theoretical computer science
Computer science education
Mathematics education |
https://en.wikipedia.org/wiki/Elacatinus%20colini | Elacatinus colini, the Belize sponge goby, is a species of goby native to the Western Central Atlantic Ocean, near Belize and Honduras.
Etymology
Its specific name honours Patrick L. Colin, of the Coral Reef Research Foundation, Palau, who made a comparative study of the genus Elacatinus for his doctoral thesis.
Appearance
Elacatinus colini was originally thought to be a color variant of E. xanthiprora from Florida but was recently classified as its own species due to the presence of a bright white, not yellow, stripe along its body. E. colini are typically around 3 cm in length (3.2 cm SL for males, 3.4 cm SL for females), and can be easily identified by the white strip running from its anterior to posterior end. On the E. colini's head, the lateral stripe is relatively small – about the same width as its pupil. However, on its body, the lateral stripe widens to about the same width as its eye.
E. colini typically have 8 dorsal spines, 10-12 dorsal soft rays, 1 anal spine, 10–11 anal soft rays, and 17-19 pectoral rays. They lack scales and are covered with a thick adherent mucus. The bodies of E. colini are bluish-greenish gray above their lateral stripe, with the dorsal part of their head, iris, and lips exhibiting a bright yellow color and the ventral part of their body being white. Their fins are a translucent gray color.
Habitat
Elacatinus colini live in marine systems in symbiotic relationships with various species of sponges, using them as shelter. They have been found to live in Carrie Bow Cay in Belize and Utila Island in Honduras. They live in shallow sponge, between deep but it is possible that they live deeper as well. E. colini inhabit tropical areas, 17ºN - 16ºN, 88ºW - 89ºW. According to Tassell, E. colini can occupy an area of about 11,184 km2.
Population
Elacatinus colini were seemingly abundant in their local environment of Belize and Honduras, however, there is little data or research on their population trends.
Diet
In a study performed |
https://en.wikipedia.org/wiki/Lead%20magnesium%20niobate | Lead magnesium niobate is a relaxor ferroelectric. It has been used to make piezoelectric microcantilever sensors.
References
Niobates
Magnesium compounds
Lead compounds
Piezoelectric materials |
https://en.wikipedia.org/wiki/ONAP | ONAP (Open Network Automation Platform), is an open-source, orchestration and automation framework. It is hosted by The Linux Foundation.
History
On February 23, 2017, ONAP was announced as a result of a merger of the OpenECOMP and Open-Orchestrator (Open-O) projects. The goal of the project is to develop a widely used platform for orchestrating and automating physical and virtual network elements, with full lifecycle management.
ONAP was formed as a merger of OpenECOMP, the open source version of AT&T's ECOMP project, and the Open-Orchestrator project, a project begun under the aegis of the Linux Foundation with China Mobile, Huawei and ZTE as lead contributors. The merger brought together both sets of source code and their developer communities, who then elaborated a common architecture for the new project.
The first release of the combined ONAP architecture, code named "Amsterdam", was announced on November 20, 2017. The next release ("Beijing") was released on June 12, 2018.
As of January, 2018, ONAP became a project within the LF Networking Fund, which consolidated membership across multiple projects into a common governance structure. Most ONAP members became members of the new LF Networking fund.
Overview
ONAP provides a platform for real-time, policy-driven orchestration and automation of physical and virtual network functions that will enable software, network, IT and cloud providers and developers to rapidly automate new services and support complete lifecycle management.
ONAP incorporates or collaborates with other open-source projects, including OpenDaylight, FD.io, OPNFV and others.
Contributing organizations include AT&T, Samsung, Nokia, Ericsson, Orange, Huawei, Intel, IBM and more.
Architecture
References
External links
Computer networking
Linux Foundation projects |
https://en.wikipedia.org/wiki/KFUPM%20mathematics%20olympiad | KFUPM mathematics olympiad is a national mathematics olympiad for secondary school students in Saudi Arabia organized by King Fahd University of Petroleum and Minerals (KFUPM). The competition started in 2006 in one center in Eastern Province then gradually the number of centers increased in the following years to include seven centers over the kingdom (Dhahran, Riyadh, Jeddah, Al-Qasim, Abha, Madina, Al-Hasa).
In its fifth and sixth edition, the competition managed to involve first and second secondary school students in addition to the third secondary grade students and introduced a center for female students in the Eastern Province. In 2015, it launched two new female centers in Riyadh and Jeddah.
Eligibility
According to the official website of the competition, the applicant has to:
be a Saudi student or a non-Saudi student who is studying in a school in Saudi Arabia.
be a secondary school student (in the 10th, 11th or 12th grade).
have got at least 95% or (A, A+, A*) in mathematics in the previous academic year (or previous semester).
Winners
Many of the Saudi winners of KFUPM Olympiad were selected later on to represent Saudi Arabia in the International Mathematics Olympiad (IMO). This table lists the winners in ten editions of the competition. KFUPM often offers the winners admission after secondary school graduation.
External links
Official website
References
Mathematics competitions
Education in Saudi Arabia |
https://en.wikipedia.org/wiki/Schl%C3%B6milch%27s%20series | Schlömilch's series is a Fourier series type expansion of twice continuously differentiable function in the interval in terms of the Bessel function of the first kind, named after the German mathematician Oskar Schlömilch, who derived the series in 1857. The real-valued function has the following expansion:
where
Examples
Some examples of Schlömilch's series are the following:
Null functions in the interval can be expressed by Schlömilch's Series, , which cannot be obtained by Fourier Series. This is particularly interesting because the null function is represented by a series expansion in which not all the coefficients are zero. The series converges only when ; the series oscillates at and diverges at . This theorem is generalized so that when and and also when and . These properties were identified by Niels Nielsen.
If are the cylindrical polar coordinates, then the series is a solution of Laplace equation for .
See also
Kapteyn series
References
Series expansions |
https://en.wikipedia.org/wiki/Highly%20powerful%20number | In elementary number theory, a highly powerful number is a positive integer that satisfies a property introduced by the Indo-Canadian mathematician Mathukumalli V. Subbarao. The set of highly powerful numbers is a proper subset of the set of powerful numbers.
Define prodex(1) = 1. Let be a positive integer, such that , where are distinct primes in increasing order and is a positive integer for . Define . The positive integer is defined to be a highly powerful number if and only if, for every positive integer implies that
The first 25 highly powerful numbers are: 1, 4, 8, 16, 32, 64, 128, 144, 216, 288, 432, 864, 1296, 1728, 2592, 3456, 5184, 7776, 10368, 15552, 20736, 31104, 41472, 62208, 86400.
References
Integer sequences |
https://en.wikipedia.org/wiki/Entropy%20network | Entropy networks have been investigated in many research areas, on the assumption that entropy can be measured in a network. The embodiment of the network is often physical or informational. An entropy network is composed of entropy containers which are often called nodes, elements, features, or regions and entropy transfer occurs between containers. The transfer of entropy in networks was characterized by Schreiber in his transfer entropy.
Physical basis
A discrete physical basis for entropy networks can be found in the observation, and discussions of discrete observations appear briefly in the work of Prokopenko, Lizier & Price. More complete discussions of observations were offered by Leo Szilárd and Léon Brillouin.
Structures and motifs
Network motifs have been proposed to be scale independent. Networks have been classified by total entropy. The entropy content of graphs has been considered throughout fields of math and computer science.
Design of entropy networks and in depth investigation has been publicized by Wissner-Gross and Freer who have proposed a time entropy relation (where entropy is maximized of a lifespan) through which predictions of the emergence of complexity can be shown.
Domains of study
The role of entropy networks in formation of structures is critical in engineering and its physical implications determine chirality, organize biological molecules, and quantify the topologies of condensed matter (mass) networks.
References
Entropy |
https://en.wikipedia.org/wiki/Trusona | Trusona is an American company based in Scottsdale, Arizona, that specializes in identity theft protection and created a personal authentication technology for the FBI.
Trusona's founder and CEO is Ori Eisen. According to Eisen, “All of the companies we work with are Fortune 500 companies or government agencies”.
Trusona secured a $10 million round of financing with support from Microsoft Ventures Microsoft Ventures and the existing investor Kleiner Perkins Caufield & Byers. This funding was aimed at rethinking traditional password security.
On May 11, 2017, Trusona announced its support for password-less entry on Salesforce.com, marking a significant step in enhancing digital security.
References
External links
Identity theft
Fraud
Companies based in Arizona
Password authentication
Identity documents of the United States
Security |
https://en.wikipedia.org/wiki/List%20of%20vaginal%20tumors | Vaginal tumors are neoplasms (tumors) found in the vagina. They can be benign or malignant. A neoplasm is an abnormal growth of tissue that usually forms a tissue mass.
Vaginal neoplasms may be solid, cystic or of mixed type.
Vaginal cancers arise from vaginal tissue, with vaginal sarcomas develop from bone, cartilage, fat, muscle, blood vessels or other connective or supportive tissue. Tumors in the vagina may also be metastases (malignant tissue that has spread to the vagina from other parts of the body).
Cancer that has spread from the colon, bladder, and stomach is far more common than cancer that originates in the vagina itself. Some benign tumors may later progress to become malignant tumors, such as vaginal cancers.
Some neoplastic growths of the vagina are sufficiently rare as to be only described in case studies.
Signs and symptoms may include a feeling of pressure, painful intercourse or bleeding. Most vaginal tumors are located during a pelvic exam. Ultrasonography, CT and MRI imaging is used to establish the location and presence or absence of fluid in a tumor. Biopsy provides a more definitive diagnosis.
Vaginal tumors
{| class="wikitable sortable"
|+
!Vaginal tumors
!Benign
!Synonyms and notes
!References
|-
|Yolk sac tumor
|no
|Endodermal sinus tumor
|
|-
|Peripheral primitive neuroectodermal tumor
|no
|Ewing's sarcoma
|
|-
|Vaginal melanoma
|no
|Melanocytic tumor
|
|-
|Blue nevus
|yes
|Melanocytic tumor, blue mole, nevus bleu,
melancytic nevus
|
|-
|Carcinosarcoma
|no
|Malignant Mullerian Mixed tumors;
metaplastic carcinoma
|
|-
|Sarcoma botryoides
|no
|botryoid sarcoma, botryoid rhabdomyosarcoma;
subtype of embryonal rhabdomyosarcoma
|
|-
|Leimyosarcoma
|no
|localized tumor of leukemic cells
|
|-
|Endometrioid stromal sarcoma
|no
|endometrial stromal sarcoma
|
|-
|Undifferentiated vaginal sarcoma
|
|
|
|-
|Leiomyoma
|yes
|fibromyoma
|
|-
|Genital rhabdomyoma
|
|
|
|-
|Deep angiomyoxoma
|
|
|
|-
|Spindle cell nodule
|
|Vaginal Solitary Fibr |
https://en.wikipedia.org/wiki/2-Methylbutanoic%20acid | 2-Methylbutanoic acid, also known as 2-methylbutyric acid is a branched-chain alkyl carboxylic acid with the chemical formula CH3CH2CH(CH3)CO2H, classified as a short-chain fatty acid. It exists in two enantiomeric forms, (R)- and (S)-2-methylbutanoic acid. (R)-2-methylbutanoic acid occurs naturally in cocoa beans and (S)-2-methylbutanoic occurs in many fruits such as apples and apricots, as well as in the scent of the orchid Luisia curtisii.
History
2-Methylbutanoic acid is a minor constituent of Angelica archangelica and the perennial flowering plant valerian (Valeriana officinalis), where it co-occurs with valeric acid and isovaleric acid. The dried root of this plant has been used medicinally since antiquity. The chemical identity of all three compounds was first investigated in the 19th century by oxidation of the components of fusel alcohol, which includes the five-carbon amyl alcohols. Among the products isolated was a compound which gave a (+) rotation in polarised light, indicating it to be the (2S) isomer.
Preparation
Racemic 2-methylbutanoic acid can readily be prepared by a Grignard reaction using 2-chlorobutane and carbon dioxide.
It was the target of the first enantioselective synthesis in 1904 when the German chemist W. Marckwald heated ethyl(methyl)malonic acid with the chiral base brucine and obtained an optically active product mixture. Either enantiomer of 2-methylbutanoic acid can now be obtained by asymmetric hydrogenation of tiglic acid using a ruthenium-BINAP catalyst.
Reactions
The compound and its enantiomers react as typical carboxylic acids: they can form amide, ester, anhydride, and chloride derivatives. The acid chloride is commonly used as the intermediate to obtain the others.
Uses
Racemic 2-methylbutanoic acid is a slightly volatile, colorless liquid with a pungent cheesy odor. The smell differs significantly between the two enantiomeric forms. (S)-2-Methylbutyric acid has a pleasantly sweet, fruity odor while (R)-2-methylbu |
https://en.wikipedia.org/wiki/Dittert%20conjecture | The Dittert conjecture, or Dittert–Hajek conjecture, is a mathematical hypothesis (in combinatorics) concerning the maximum achieved by a particular function of matrices with real, nonnegative entries satisfying a summation condition. The conjecture is due to Eric Dittert and (independently) Bruce Hajek.
Let be a square matrix of order with nonnegative entries and with . Its permanent is defined as , where the sum extends over all elements of the symmetric group.
The Dittert conjecture asserts that the function defined by is (uniquely) maximized when , where is defined to be the square matrix of order with all entries equal to 1.
References
Conjectures
Combinatorics
Inequalities |
https://en.wikipedia.org/wiki/Internal%20Security%20Assessor | Internal Security Assessor (ISA) is a designation given by the PCI Security Standards Council to eligible internal security audit professionals working for a qualifying organization. The intent of this qualification is for these individuals to receive PCI DSS training so that their qualifying organization has a better understanding of PCI DSS and how it impacts their company. Becoming an ISA can improve the relationship with Qualified Security Assessors and support the consistent and proper application of PCI DSS measures and controls within the organization. The PCI SSC's public website can be used to verify ISA employees.
An ISA is also able to perform self-assessments for their organization as long as they are not a Level 1 merchant
ISA training is only available for merchants and processors. Organizations are required to have an internal audit department and cannot be affiliated with a Qualified Security Assessor or Automated Scanning Vendor (ASV) company in any way.
Certificate Renewal
The ISA certification must be renewed annually. The ISA certification is company specific. If the certified individual leaves the company that sponsored them, the certification is no longer valid The good news is you are no longer required to complete the onsite training. Requalifying ISA Training currently costs $1,095. This includes training modules and the exam. Once an individual successfully completes the exam they will receive their renewed Certificate of Qualification.
References
External links
PCI Security Standards Council
Computer security organizations
Information privacy
all
Standards |
https://en.wikipedia.org/wiki/George%20Roger%20Sell | George Roger Sell (February 7, 1937 – May 29, 2015) was an American mathematician, specializing in differential equations, dynamical systems, and applications to fluid dynamics, climate modeling, control systems, and other subjects.
Biography
Sell was born in Milwaukee, Wisconsin. He received in 1957 his bachelor's degree and in 1958 his M.Sc. from Marquette University and in 1962 his Ph.D. from the University of Michigan with thesis under the direction of Wilfred Kaplan and Lamberto Cesari. The mathematics department there awarded him the Sumner B. Myers Prize for the year's best doctoral dissertation submitted to the department. As a graduate student, Sell held a recurring summer job at the AC Spark Plug Division of AC Delco, working on the guidance system for Titan rockets. He was a Benjamin Peirce instructor from 1962 to 1964 at Harvard University. He was from 1964 to 1968 an assistant professor, from 1968 to 1973 an associate, and from 1973 until retirement a full professor at the University of Minnesota. From 1982 to 1987 Sell was the associate director of the Institute for Mathematics and its Applications. From 1984 to 1994 he was the director of the Army High Performance Computing Research Center at the University of Minnesota campus. He was a visiting professor on sabbatical at various institutions, including the University of Southern California and the University of Florence, where he worked with Roberto Conti. Sell was the author or coauthor of more than 120 publication in refereed journals.
In 1983 he was an Invited Speaker at the ICM in Warsaw. In 1988 he was the founding editor-in-chief of the Journal of Dynamics and Differential Equations. In 1990 Leningrad State University awarded him an honorary doctorate, who was the fifth foreigner given that particular distinction. In July 2002 Spain's University of Valladolid sponsored a conference in his honor at Medina del Campo. In 2012 he was elected a Fellow of the American Mathematical Society.
Upon hi |
https://en.wikipedia.org/wiki/Rudin%27s%20conjecture | Rudin's conjecture is a mathematical hypothesis (in additive combinatorics and elementary number theory) concerning an upper bound for the number of squares in finite arithmetic progressions. The conjecture, which has applications in the theory of trigonometric series, was first stated by Walter Rudin in his 1960 paper Trigonometric series with gaps.
For positive integers define the expression to be the number of perfect squares in the arithmetic progression , for , and define to be the maximum of the set . The conjecture asserts (in big O notation) that and in its stronger form that, if , .
References
Combinatorics
Conjectures |
https://en.wikipedia.org/wiki/Brennan%20conjecture | The Brennan conjecture is a mathematical hypothesis (in complex analysis) for estimating (under specified conditions) the integral powers of the moduli of the derivatives of conformal maps into the open unit disk. The conjecture was formulated by James E. Brennan in 1978.
Let be a simply connected open subset of with at least two boundary points in the extended complex plane. Let be a conformal map of onto the open unit disk. The Brennan conjecture states that
whenever . Brennan proved the result when for some constant . Bertilsson proved in 1999 that the result holds when , but the full result remains open.
References
Conjectures
Unsolved problems in mathematics |
https://en.wikipedia.org/wiki/Tiziana%20Margaria | Tiziana Margaria (born 1964) is a computer scientist and software engineer whose research topics include formal methods and model-driven engineering. Educated in Italy, she has worked in Italy, Germany, Sweden, and Ireland, and currently works in Ireland as Chair of Software Systems in the University of Limerick's Department of Computer Science and Information Systems.
Biography
Tiziana was born in 1964. After high school at the Liceo Scientifico Gino Segrè in Turin, Margaria studied for a laurea in electronic engineering at the Polytechnic University of Turin, which she completed in 1988. She completed her Ph.D. there in 1993, with the dissertation Verifica formale della correttezza del progetto di sistemi digitali.
Meanwhile she held a teaching position at the University of Udine from 1988 to 1991, and was a visiting researcher at RWTH Aachen University from 1991 to 1993. From 1993 to 1998 she was a postdoctoral researcher at the University of Passau, working there with Christian Lengauer. She became founding co-editor-in-chief of the International Journal on Software Tools for Technology Transfer in 1997. She continued to work as a researcher at the Technical University of Dortmund from 1998 to 2004, also working as a visting professor in Sweden at Uppsala University from 1999 to 2000.
In 2004 she obtained a permanent faculty position, as professor of service engineering for distributed systems at the University of Göttingen. She moved to the University of Potsdam in 2006, as Chair of Service and Software Engineering. In 2015 she moved again, to the University of Limerick and Lero, the Science Foundation Ireland Research Centre for Software in Limerick, where she is Chair of Software Systems.
In July 2023 she became elected as incoming new president of the University of Lübeck, Luebeck, Germany.)
Work
Margaria is a Fellow and the current Vice President of the Irish Computer Society and a Fellow of the Society for Design and Process Science.
She is member of |
https://en.wikipedia.org/wiki/Volumetric%20capture | Volumetric capture or volumetric video is a technique that captures a three-dimensional space, such as a location or performance. This type of volumography acquires data that can be viewed on flat screens as well as using 3D displays and VR goggles. Consumer-facing formats are numerous and the required motion capture techniques lean on computer graphics, photogrammetry, and other computation-based methods. The viewer generally experiences the result in a real-time engine and has direct input in exploring the generated volume.
History
Recording talent without the limitation of a flat screen has been depicted in science-fiction for a long time. Holograms and 3D real-world visuals have featured prominently in Star Wars, Blade Runner, and many other science-fiction productions over the years. Through the growing advancements in the fields of computer graphics, optics, and data processing, this fiction has slowly evolved into a reality. Volumetric video is the logical next step after stereoscopic movies and 360° videos in that it combines the visual quality of photography with the immersion and interactivity of spatialized content and could prove to be the most important development in the recording of human performance since the creation of contemporary cinema.
Computer graphics and VFX
Creating 3D models from video, photography, and other ways of measuring the world has always been an important topic in computer graphics. The ultimate goal is to imitate reality in minute detail while giving creatives the power to build worlds atop this foundation to match their vision. Traditionally, artists create these worlds using modeling and rendering techniques developed over decades since the birth of computer graphics. Visual effects in movies and video games paved the way for advances in photogrammetry, scanning devices, and the computational backend to handle the data received from these new intensive methods. Generally, these advances have come as a result of creating m |
https://en.wikipedia.org/wiki/Android%20Go | Android Go, officially Android (Go edition), is a stripped-down version of the Android operating system, designed for low-end and ultra-budget smartphones (but is also used by some tablets). However, it is intended for smartphones with 2 or less GB of RAM and was first made available for Android Oreo. This mode has platform optimizations designed to reduce mobile data usage (including enabling Data Saver mode by default), and a special suite of Google Mobile Services designed to be less resource and bandwidth-intensive. Google Play Services package was also modularized to reduce its memory footprint. The Google Play Store will highlight lighter apps suited for these devices.
The operating system's interface differs from that of mainline Android, with the quick-settings panel giving greater prominence to information regarding the battery, mobile-data limit, and available storage; the recent apps menu using a modified layout and being limited to four apps (in order to reduce RAM consumption), and an application programming interface (API) for allowing mobile carriers to implement data-tracking and top-ups within the Android settings menu. Some system services are disabled such as Notification access and Picture-in-picture mode to improve performance.
Most devices running Android Go use Google's "stock" Android GUI, although there are several manufacturers that still use customized GUI.
Versions
Android Go was made available to OEMs for Android 8.1, and later, for Android Pie.
See also
Comparison of Android Go products
Android One, a version of Android originally designed for entry-level and budget devices
References
External links
Android (operating system)
Smartphone operating systems
Tablet computers
ARM operating systems |
https://en.wikipedia.org/wiki/Separating%20equilibrium | In signaling games, a separating equilibrium is a type of perfect Bayesian equilibrium where agents with different characteristics choose different actions.
See also
Signaling games
Pooling equilibrium
Cheap talk
References
Game theory equilibrium concepts |
https://en.wikipedia.org/wiki/CISBOT | CISBOT (cast-iron sealing robot) is a cast iron pipe-repair robot that seals the joints in natural gas pipelines from the inside, thus extending their use for up to fifty years without unearthing the joints.
Background
Many cast-iron pipes installed over a century ago have joints of jute sealed with lead that deteriorate over time and are often the causes of cast-iron pipe failure. Jute was an effective joint sealant when the pipes carried coal-based town gas, but natural gas, used since the 1950s in New York and the 1970s in the UK, dries out the jute. A fifty-year life expectancy of the new seal has been proven in studies by Cornell University.
Description
CISBOT is in diameter, is long, weighs , and is deployed with a truck containing the control unit, which is attached to the robot with a tether for the power, communication, and control cables, as well as sealant tubing. It is capable of repairing pipe.
CISBOT is introduced into a pipeline through a hole and can repair the joints with an anaerobic sealant for a distance of while the pipe is still in operation. External repair without the robot would require the arranging of temporary gas supply to customers through tanks, purging the pipeline of gas, then digging up each joint, usually every , repairing the joint, and re-covering the pipeline. The cost of internal robotic repair is approximately 25% of manual resealing and 10% of total pipeline replacement.
The robot was developed by ULC Robotics of Hauppauge, New York with cooperation from Con Edison and National Grid and costs approximately $1 million. ULC announced the robot in 2015; however it has been in use since at least 2010 and by mid-2012 had sealed over 5000 joints.
CISBOT has been used in the United States in Manhattan, Brooklyn, Staten Island, Rhode Island, and Boston. In Europe, it has been used in London and Glasgow by SGN.
Operation
A flange is first attached to the pipe, through which CISBOT drills an access hole. It then rolls into |
https://en.wikipedia.org/wiki/Phytosanitary%20irradiation | Phytosanitary irradiation is a treatment that uses ionizing radiation on commodities, such as fruits and vegetables to inactivate pests, such as insects. This method is used for international food trade as a means to prevent spread of non-native organisms. It is used as an alternative to conventional techniques, which includes heat treatment, cold treatment, pesticide sprays, high pressure treatment, cleaning, waxing or chemical fumigation. It is often used on spices, grains, and non-food items. It inhibits the species reproduction cycle by destroying nuclear material primarily, whereas other methods are measured by species mortality. Each country has different effective approved dosages, although most follow guidelines established by the IPPC which has issued guidelines referred to as the International Standards for Phytosanitary Measures (ISPM). The most commonly used dose is 400 Gy (as a broad spectrum, generic treatment) based on USDA-APHIS guidelines.
History
The foundations of ionizing radiation was first discovered in 1895 by Wilhelm Röntgen through discovery of x-rays. In the following year, Henri Becquerel discovered natural radioactivity, another form of ionizing radiation. Soon after the discovery of ionizing radiation, therapeutic use and bactericide treatments were proposed. Research in the early 1900s demonstrated that X-rays can destroy and hinder the development of the egg, larval and adult stages of cigar beetles. Application of irradiation as a disinfestation procedure for fruit flies was suggested in 1930, however, it was only in 1986 that irradiation up to 1kGy was approved by the FDA as a method to disinfest arthropods in food. Before approval in the United States, Hawaii petitioned for permission of irradiation on papayas in 1972. The FDA finally approved the use of 1 kGy for use on arthropods in fruits and vegetables in 1986. In that same year, the first case of commercial phytosanitary irradiation occurred with Puerto Rican mangoes import |
https://en.wikipedia.org/wiki/Facebook%203D%20Posts | Facebook 3D Posts was a feature on the social networking website Facebook. It was first enabled on October 11, 2017 by introducing a new native 3D media type in Facebook News Feed. Initially the users could only post 3D objects from Oculus Medium and marker drawings from Spaces directly to Facebook as fully interactive 3D objects. The feature was available for desktops and mobile phones that support the underlying WebGL API.
On February 20, 2018 Facebook added support for the industry-standard glTF 2.0 file format for Facebook 3D posts. This allowed artists and creators to share 3D content on Facebook from a variety of sources. To make 3D Posts glTF 2.0 compliant, the support for textures, lighting, and physically based rendering techniques was implemented. 3D posts also supported unlit workflows for photogrammetry and stylized art.
Facebook has since disallowed users from sharing 3D objects.
Creating 3D Posts
There were four ways to get a 3D asset to appear in a Facebook Post:
Drag and drop an asset into Facebook's Post composer and publish it.
Share a link to a web page that has Facebook Open Graph Sharing metadata tags.
Share a local asset on an Android device using Android's native Sharing action.
Create a 3D Post programmatically with the 3D Posts API.
Tools for authoring content
GLB files (binary form of glTF) were required to be loaded in Facebook 3D posts. These files could be obtained by converting from other files formats such as FBX or non-binary glTF. GLB files could also be directly exported from a variety of 3D editors, such as Blender, Vectary, Autodesk 3ds Max (using Verge3D exporter), Autodesk Maya, Modo, Microsoft Paint 3D, Substance Painter and others.
References
Facebook
Social software
Software features
Computer-related introductions in 2017 |
https://en.wikipedia.org/wiki/Naver%20Pay | Naver Pay (Hangul: 네이버 페이) is a mobile payment service launched by Naver Corporation. It is Naver's second mobile payment service after Line Pay, which was launched by Naver's Japanese subsidiary, Line Corporation in 2014.
Service
Naver Pay was launched on June 25, 2015 with support for 14 banks and 3 credit card companies as well as 53,000 member stores. The service allows both mobile payment services through the app and online checkout for online shopping similar to PayPal.
References
External links
Official website
Naver Corporation
Mobile payments in South Korea
Online payments |
https://en.wikipedia.org/wiki/Blockchain%20game | Video games that include elements that use blockchain technologies, including cryptocurrencies and non-fungible tokens (NFTs), allow players to buy, sell, or trade in-game items with other players. The game publisher takes a fee from each transaction as a form of monetization. A subset of these games are also known as play-to-earn games because they include systems that allow players to earn cryptocurrency through gameplay. Blockchain games have existed since 2017, gaining more widespread attention from the video game industry in 2021. Several AAA publishers have expressed intent to include this technology in the future. Players, developers, and game companies have criticized the use of blockchain technology in video games for being exploitative, environmentally unsustainable, and unnecessary.
Concept
Blockchain technology, such as cryptocurrencies and NFTs, provides potential monetization routes for video games. Many live-service games offer in-game customization options, such as character skins or other in-game items, which the players can earn and trade with other players using in-game currency. Some games also allow for trading of virtual items using real-world currency, but this may be illegal in some countries where video games are seen as akin to gambling. This has led to gray market issues such as skin gambling, and so publishers typically have shied away from allowing players to earn real-world funds from games. Blockchain games typically allow players to trade in-game items for cryptocurrency, which can then be exchanged for money, which may sidestep some problems associated with gray markets due to blockchain's traceability.
History
The first known game to use blockchain technologies was CryptoKitties, launched by Axiom Zen in November 2017 for personal computers. A player would purchase NFTs with Ethereum cryptocurrency, each NFT consisting of a virtual pet that the player could breed with others to create offspring with combined traits as new NFTs. |
https://en.wikipedia.org/wiki/T%20App%20Folio | T App Folio is an integrated app for government to citizen provided by Government of Telangana in India. The service, as a part of Mee Seva 2.0, an integrated app that provides services like Mee Seva services, RTA services, fee payments and bill payment services etc. It is available in Telugu and English.
History
It was launched on 28 February 2018 by IT minister of Telangana, K. T. Rama Rao.
Services
Around 150 services including the most used services like MeeSeva, RTA services, fee payments and bill payments.
Other informational services like location services like MeeSeva centers, Ration shops, Hy-Fi hotspots are available on the app.
Platform
The platform supports single sign on feature for using multiple services in on go. It is now extended to mobile platform under M-Governance. T app folio is an app with 180 services from various departments bundled into one single app, similar to Government of India’s, UMANG.
References
Government of Telangana
Electronic funds transfer
Mobile payments
Online payments
Payment systems
E-government in India |
https://en.wikipedia.org/wiki/Sara%20Negri | Sara Negri (born January 21, 1967) is a mathematical logician who studies proof theory.
She is Italian, worked in Finland for several years, where she was a professor of theoretical philosophy in the University of Helsinki, and currently holds a position as professor of mathematical logic at the University of Genoa.
Education and career
Negri was born in Padua, and studied at the University of Padua. She earned a master's degree there in 1991 and a Ph.D. in 1996, both in mathematics. Her dissertation, Dalla Topologia Formale all'Analisi, was supervised by Giovanni Sambin.
She went to Helsinki as a docent in 1998, and became a full professor there in 2015. She has also taken several visiting positions, including a Humboldt Fellowship in 2004–2005 at the Ludwig Maximilian University of Munich. She became full professor of mathematical logic at the University of Genoa, in Italy, in 2019.
Recognition
Negri was elected to the Academia Europaea in 2018.
Books
Negri is the co-author, with Jan von Plato, of two books:
Structural Proof Theory (Cambridge University Press, 2001)
Proof Analysis: A Contribution to Hilbert's Last Problem (Cambridge University Press, 2011)
References
External links
1967 births
Living people
Italian mathematicians
Italian philosophers
Finnish mathematicians
Finnish philosophers
Women mathematicians
Italian women philosophers
Mathematical logicians
Women logicians
University of Padua alumni
Academic staff of the University of Helsinki
Italian expatriates in Finland
Members of Academia Europaea |
https://en.wikipedia.org/wiki/Karen%20Yeats | Karen Amanda Yeats (born 1980) is a Canadian mathematician and mathematical physicist whose research connects combinatorics to quantum field theory. She holds the Canada Research Chair in Combinatorics in Quantum Field Theory at the University of Waterloo.
Biography
Yeats is from Halifax, Nova Scotia. As an undergraduate at the University of Waterloo, she won an honourable mention for the 2003 Morgan Prize for her research in number theory, the theory of Lie groups, and non-standard models of arithmetic. She graduated in 2003, and went to Boston University for graduate school, where she completed her Ph.D. in 2008. Her dissertation, Growth Estimates for Dyson-Schwinger Equations, was supervised by Dirk Kreimer. In 2016 she was awarded a Humboldt Fellowship to visit Kreimer at the Humboldt University of Berlin.
Yeats is the author of the books Rearranging Dyson–Schwinger Equations (Memoirs of the American Mathematical Society, 2011)
and A Combinatorial Perspective on Quantum Field Theory (Springer, 2017).
References
External links
Home page
1980 births
Living people
Canadian mathematicians
Canadian physicists
Women mathematicians
Canadian women physicists
Combinatorialists
Quantum physicists
University of Waterloo alumni
Boston University alumni
Academic staff of the University of Waterloo |
https://en.wikipedia.org/wiki/Xiaohongshu | Xiaohongshu () is a social media and e-commerce platform. It has been described as "China's answer to Instagram", and as such, is sometimes referred to as "Chinese Instagram".
, Xiaohongshu had over 300 million registered users and the number of monthly active users is over 85 million. 70% of its users are reportedly born after 1990, and nearly 70% of them are female. The app allows users and influencers to post, discover and share product reviews, most frequently related to beauty and health. Travel bloggers are also known to regularly post content regarding tourism and leisure destinations on the platform. Xiaohongshu also operates RED Mall, which sells international products to Chinese users.
In the Xiaohongshu community, the users could share their lives through vlogs, shopping experiences and creative content through photos, text, videos, live streaming etc.
The users could be the bloggers on Xiaohongshu. Their content could be beauty, fashion, food, travel, entertainment, fitness, parenting and more. The platform’s social features of Xiaohongshu is to discover new brands, products and ideas. Xiaohongshu also includes an in-app shopping interface for users to browse, search and purchase products.
Xiaohongshu's headquarters are in Huangpu District, Shanghai.
According to publicly available information, the number of daily active users (DAU) of Xiaohongshu grew from 20 million to 40 million in 2021. Monthly active users also doubled to exceed 200 million in the same period. That is to say, from its inception to the monthly activity of more than 100 million, Xiaohongshu used seven years, while from 100 million monthly activity to 200 million monthly activity, it only took one year.
History
Xiaohongshu was founded by Miranda Qu and Charlwin Mao in 2013, as an online tour guide for Chinese shoppers, providing a platform for users to review products and to share their shopping experiences with the community. In October 2014, the founders started focusing on |
https://en.wikipedia.org/wiki/Biodiversity%20hypothesis%20of%20health | According to the biodiversity hypothesis, reduced contact of people with natural environment and biodiversity may adversely affect the human commensal microbiota and its immunomodulatory capacity. The hypothesis is based on the observation that two dominant socio-ecological trends – the loss of biodiversity and increasing incidence of inflammatory diseases – are interconnected.
Urbanization and fragmentation of habitats increasingly lead to loss of connection between human and natural environment. Furthermore, immunological non-communicable diseases have become increasingly common in recent decades especially in urbanized communities.
The microbes of natural environment influence human health
Many immunological inflammatory diseases, such as allergies, diabetes and inflammatory bowel diseases, have become increasingly common in countries of high standard of living and high level of hygiene. One reason is presumably that along with degradation and fragmentation of habitats and urbanization, people encounter less microbes of natural environment. Here, microbes of natural environment are referred as all microbes, especially those which are not pathogens nor parasites (parasites still have essential role in regulation of immune response).
According to the core message of the biodiversity hypothesis, it is essential to the development of our immune system that we are sufficiently exposed to diverse natural environments and especially to the microbes in them. The microbes in our surroundings influence our own microbiota which is further connected to our immune system. Furthermore, immunological disorders are the main cause of inflammatory diseases. In a sense, microbes train developing immune system to identify actual threats from harmless allergens, but there is not yet full consensus of the mechanism. During biological evolution, we have in a way outsourced many of the functions of our body to our microbiota. Microbiota trains immune system throughout the life: organ |
https://en.wikipedia.org/wiki/Unspent%20transaction%20output | In cryptocurrencies, an unspent transaction output (UTXO) is a distinctive element in a subset of digital currency models. A UTXO represents a certain amount of cryptocurrency that has been authorized by a sender and is available to be spent by a recipient. The utilization of UTXOs in transaction processes is a key feature of many cryptocurrencies, but it primarily characterizes those implementing the UTXO model.
UTXOs employ public key cryptography to ascertain and transfer ownership. More specifically, the recipient's public key is formatted into the UTXO, thereby limiting the capability to spend the UTXO to the account that can demonstrate ownership of the corresponding private key. A valid digital signature associated with the public key must be included for the UTXO to be spent.
UTXOs constitute a chain of ownership depicted as a series of digital signatures dating back to the coin's inception, regardless of whether the coin was minted via mining, staking, or another procedure determined by the cryptocurrency protocol.
Prominent examples of cryptocurrencies adopting the UTXO model include Bitcoin and Cardano. Cardano utilizes an extended version of the UTXO model known as EUTXO.
Comparison: UTXO Model vs. Account Model
Cryptocurrencies that utilize the UTXO model function differently compared to those using the account model. In the UTXO model, individual units of cryptocurrency, termed as unspent transaction outputs (UTXOs), are transferred between users, analogous to the exchange of physical cash. This model impacts how transactions and ownership are recorded and verified within the blockchain network.
In the UTXO model, each unit of currency is treated as a discrete object. The history of a UTXO is documented only within the blocks where it is transferred. To ascertain the total balance of an account, one must scan each block to find the latest UTXOs linked to that account. While all nodes within a blockchain network must consent on the block history, |
https://en.wikipedia.org/wiki/Sigma%20%28operations%20research%29 | Sigma (Science in General Management) was a limited company established by Henry Novy, Stafford Beer and Roger Eddison in 1961. It sold operational research OR in the United Kingdom and overseas. Beer was responsible for the cybernetic models of organisation and corporate planning which were the firm's specially. Eddison was the Operations Director.
The consultancy arose following discussions between the Société d’Économie et de Mathématiques Appliquées (SEMA) and Martech Consultants Limited. Novy, who ran Maretch, was given the job of selecting the people to run the company, inviting several OR practitioners to come to Paris for an interview. After he selected Beer, Beer only agreed if Eddison would also join him. This was arranged and the company was launched with a reception at the Connaught Hotel in October 1961.
Over the next five years Sigma developed into a substantial organisation providing services to several leading companies across the UK as well as for six government departments. It also took on contracts in the United States and several developing countries. Amongst the diverse areas it worked in were energy, for the Gas Council, transportation, for British Rail and the Port of London Authority, shipbuilding, for the Geddes Committee, education for Yugoslavia, tourism, for Israel, nationalised industry in South America, and distribution for a variety of industrial firms.
Sigma, Martech, and Proplan were amalgamated to form what afterwards became the Metra Consulting Group in the United Kingdom.
References
Operations research |
https://en.wikipedia.org/wiki/Anti-protist | Anti-protist or antiprotistal refers to an anti-parasitic and anti-infective agent which is active against protists. Unfortunately due to the long ingrained usage of the term antiprotozoal, the two terms are confused, when in fact protists are a supercategory. Therefore, there are protists that are not protozoans. Beyond "animal-like" (heterotrophic, including parasitic) protozoans, protists also include the "plant-like" (autotrophic) protophyta and the "fungi-like" saprophytic molds. In current biology, the concept of a "protist" and its three subdivisions has been replaced.
See also
Amebicide
References
External links
Biocides |
https://en.wikipedia.org/wiki/Scaleway | Scaleway (previously Online SAS or Online.net) is a French Cloud computing and web hosting company, founded by Xavier Niel in 1999 and a majority owned subsidiary of the Iliad group.
The company provides physical dedicated servers and cloud computing architectures through Scaleway Dedibox and Scaleway Elements brands,
domain registration services through the BookMyName brand, and colocation services in its datacenters through the brand Scaleway Datacenters.
The company is the second player in France with over Tb/s of Internet traffic.
History
In 1999, Online started its activities in web hosting and domain name registration services
In August 2002, the domain name registrar BookMyName has been bought by Iliad from the concurrent LDCom.
In May 2006, rental of dedicated servers through the Dedibox brand was launched.
In December 2008, Iliad bought Alice ADSL: They also took over construction and operation of Datacenters, launched in 1999 by ISDnet, bought by Cable & Wireless in January 2000 acquired by Tiscali France in June 2003 and finally renamed as Iliad Datacenter.
In April 2010, Online merges with Dedibox, another subsidiary of Iliad, bringing together different hosting activities under a single brand.
In 2012, the company has opened its third datacenter of 11800 m² in Vitry-sur-Seine after 11 months of construction works. The site received the first Tier-III certification in France by Uptime Institute in January 2014.
Since 2012, the company publishes in real time the PUE of its datacenters on pue.online.net, in an effort of transparency.
In 2013, Online launched labs.online.net in preview. An infrastructure as a service offer, based on dedicated hardware and without virtualization, based on ARM CPUs. The hardware is made in a factory near Laval in France.
In April 2015 the service left its beta status and has been renamed as Scaleway. As the popularity of the platform grows, Online added servers with x86_64 based CPUs in March 2016.
Repeat softwa |
https://en.wikipedia.org/wiki/RNA-targeting%20small%20molecule%20drugs | RNA-targeting small molecules represent a class of small molecules, organic compounds with traditional drug properties (e.g., Lipinski's rule of five) that can bind to RNA secondary or tertiary structures and alter translation patterns, localization, and degradation.
Origins
Recent discoveries implicating RNA in the pathogenesis of several forms of cancer and neuromuscular diseases have created a paradigm shift in drug discovery. This work combined with advances in structural characterization techniques such as NMR spectroscopy and X-ray crystallography together with computational modeling, has pushed forward the realization that RNA is a dynamic yet viable drug target. Traditionally, RNA was thought to be a mediator between DNA sequence-encoded instructions and functional protein. However, recent reports have shown that there are a large number of non-coding RNAs (ncRNAs) that are not translated into protein. Whereas 85% of the human genome is transcribed into RNA only 3% of the transcripts code for functional protein. Although, ncRNAs do affect gene expression levels by a variety of mechanisms. Further, RNA can adopt discrete secondary or tertiary structures which play a pivotal role in many biological processes and disease pathology. For these reasons, RNA is being recognized as an attractive drug target for small molecules.
The earliest attempts to target RNA led to the discovery that aminoglycosides could bind to human RNA. In an early report, Noller discovered that several classes of antibiotics (streptomycin, tetracycline, spectinomycin, edeine, hygromycin, and the neomycins) could "protect" nucleotides in 16S ribosomal RNA by binding to this RNA. Subsequent studies by Schroeder and Green began to plant the seed that RNA could be targeted. Schroeder uncovered that aminoglycosides could inhibit protein synthesis by interacting with the ribosome through interactions with the 3’ end of the 16S RNA of E. coli taking advantage of RNA conformational changes. Gre |
https://en.wikipedia.org/wiki/Quantitative%20InfraRed%20Thermography%20Journal | Quantitative InfraRed Thermography Journal is a peer-reviewed scientific journal published by Taylor & Francis. It was founded in 2004 by the QIRT committee, with a strong connection to the QIRT conference. According to the Journal Citation Reports, the journal has a 2016 impact factor of 1.062.
Topics covered
Quantitative InfraRed Thermography Journal covers all aspects of Thermography, with topics ranging from instrumentation, theoretical and experimental practices, data reduction and image processing related to infrared thermography.
Article categories
The journal publishes articles in the following categories:
Original research articles
Research reviews
Abstracting and indexing
The journal is abstracted and indexed in:
Science Citation Index
Scopus
References
External links
Journal Homepage
QIRT Website
Academic journals established in 2004
English-language journals
Engineering journals
Taylor & Francis academic journals
Biannual journals |
https://en.wikipedia.org/wiki/Mi-Pay | Mi-Pay is a contactless NFC-based mobile payment system that supports credit, debit and public transportation cards in China. The service was launched by Xiaomi in partnership with UnionPay.
In December 2018 Xiaomi launched Mi Pay in India with partnership with ICICI Bank. Apart from sending and receiving money, one can pay utility bills and mobile and broadband recharges.
On 28 October, 2022, the company suddenly decided wound up their financial services in India, including mi pay and mi credit and decided to focus only on their core strength.
Xiaomi Pay
Xiaomi Pay is the NFC cashless payment service supported by Xiaomi wearable products is listed below with the applicable banks. The availability of NFC may vary by country and region. Please see below for a list of countries or regions and banks that support cashless payments for each Xiaomi wearable product. Supported devices: Xiaomi Watch S1 Pro, Xiaomi Smart Band 7 NFC and Xiaomi Smart Band 6 NFC.
Supported countries
Xiaomi Pay can be used with cards issued in 34 countries and territories worldwide.
See also
Apple Pay
Samsung Pay
References
Payment service providers
Online payments
Mobile payments in China |
https://en.wikipedia.org/wiki/Application%20permissions | Permissions are a means of controlling and regulating access to specific system- and device-level functions by software. Typically, types of permissions cover functions that may have privacy implications, such as the ability to access a device's hardware features (including the camera and microphone), and personal data (such as device storage, the contacts list, and the user's present geographical location). Permissions are typically declared in an application's manifest, and certain permissions must be specifically granted at runtime by the user—who may revoke the permission at any time.
Permission systems are common on mobile operating systems, where permissions needed by specific apps must be disclosed via the platform's app store.
Mobile devices
On mobile operating systems for smartphones and tablets, typical types of permissions regulate:
Access to storage and personal information, such as contacts, calendar appointments, etc.
Location tracking.
Access to the device's internal camera and/or microphone.
Access to biometric sensors, including fingerprint readers and other health sensors..
Internet access.
Access to communications interfaces (including their hardware identifiers and signal strength where applicable, and requests to enable them), such as Bluetooth, Wi-Fi, Near-field communication (NFC), and others.
Making and receiving phone calls.
Sending and reading text messages
The ability to perform in-app purchases.
The ability to "overlay" themselves within other apps.
Installing, deleting and otherwise managing applications.
Authentication tokens (i.e. OAuth ones) of web services stored in system storage for sharing between apps.
Prior to Android 6.0 "Marshmallow", permissions were automatically granted to apps at runtime, and they were presented upon installation in Google Play Store. Since Marshmallow, certain permissions now require the app to request permission at runtime by the user. These permissions may also be revoked at any time via |
https://en.wikipedia.org/wiki/Snow%20%28app%29 | Snow (stylized in all caps) is an image messaging and multimedia mobile application created by Camp Mobile, a subsidiary of South Korean internet search giant Naver Corporation. It features virtual stickers using augmented reality and photographic filters. Pictures and messages sent through Snow are only accessible for a short time.
Background
Snow was launched September 2015 by Camp Mobile. The company collaborated with different Korean artists such as BTS and Twice to launch selfie stickers.
In 2016, the app spun off into its own company, named as Snow Corp.
In 2018, Snow Corp raised $50M from SoftBank and Sequoia China. It is reported that it plans to use the investment to develop its augmented reality and facial recognition technologies.
Features
Snow allows users to take pictures or videos (of a maximum duration of 5 minutes) and choose from 1,300 stickers and 50 filters. They can also send them as messages that destroy themselves in 48 hours. Videos could also be saved as GIF files. According to Business Insider, the app functions as a clone of Snapchat.
References
External links
Official website
SNOW Corp. website
Naver Corporation
Instant messaging
Image-sharing websites
South Korean social networking websites
Android (operating system) software
IOS software |
https://en.wikipedia.org/wiki/Moral%20enhancement | Moral enhancement (abbreviated ME), also called moral bioenhancement (abbreviated MBE), is the use of biomedical technology to morally improve individuals. MBE is a growing topic in neuroethics, a field developing the ethics of neuroscience as well as the neuroscience of ethics. After Thomas Douglas introduced the concept of MBE in 2008, its merits have been widely debated in academic bioethics literature. Since then, Ingmar Persson and Julian Savulescu have been among the most vocal MBE supporters. Much of the debate over MBE has focused on Persson and Savulescu's 2012 book in support of it, Unfit for the Future? The Need for Moral Enhancement.
Different kinds of moral enhancement
Moral enhancement in general is sometimes distinguished from MBE specifically, such that ME includes any means of moral improvement while MBE only involves biomedical interventions. Some also distinguish invasive from non-invasive, intended from resultant, treatment-focused from enhancement-focused, capability-improving from behavior-improving, and passive from active ME interventions. Vojin Rakić has distinguished involuntary (such as for the unborn) from compulsory and voluntary MBE, claiming that compulsory MBE is not justifiable and proposing that "a combination of [voluntary MBE] and [involuntary MBE] might be the best option humans have to become better". Parker Crutchfield has argued in favor of covert and compulsory use of ME upon unsuspecting populations. Other thinkers have argued in favor of a partial or limited form of MBE such as 'indirect enhancement' or 'moral supplementation' while rejecting more comprehensive forms of MBE as undesirable or unachievable.
Arguments in favour
The simplest argument for MBE is definitional: improving moral character is morally good, so all else being equal, any biomedical treatment that actually improves moral character does moral good.
Douglas originally suggested MBE as a counter-example to what he calls the "bioconservative thesis," wh |
https://en.wikipedia.org/wiki/European%20Flavour%20Association | European Flavour Association (EFFA) is a non-profit European-level trade association of the flavor industry, based in Brussels, Belgium. Founded in 1961, the organisation originally focused on both flavours and fragrances, but has focused solely on flavours since 2006. Its members include 12 national (covering approximately 300 SME's) and 10 direct member companies.
Purpose
EFFA helps to promote and coordinate Europe's flavour industry, which accounts for approximately one-third of the global market and includes more than 300 businesses employing 10,000 skilled workers. In addition, EFFA helps to coordinate regulatory positions within the industry and information about flavourings for the general public.
EFFA welcomed the European Commission (EC) Regulation on Flavourings and has published a Guidance Document on the EC Regulation on Flavourings that is available at its public website: http://effa.eu/library/guidance-documents
History
The association was founded in 1961. It was originally called the "Bureau de Liaison des Syndicats Européens des Produits Aromatiques". Thirty years later, this name was officially changed to the European Flavour and Fragrance Association (EFFA). EFFA is based in Brussels, Belgium.
In 2009, changes in how the flavour and fragrance industries were regulated led to EFFA to divide into two organisations. After that date, EFFA focused solely on the flavour industry, while the International Fragrance Organisation - Europe (IFRA) assumed responsibility for the fragrance industry in Europe.
On 20 June 2017, EFFA hosted the "FlavourDay" in Brussels to bring together food and flavouring industry experts. Additional FlavourDays were held later that year in Copenhagen, London and Paris, and continues in 2018, starting with Istanbul. The FlavourDay campaign was shortlisted by the 2018 Transform Awards for "Best implementation of a brand development project across multiple markets" and by the 2018 European Association Awards for "Best Associati |
https://en.wikipedia.org/wiki/Vaginitis%20emphysematosa | The term Vaginitis emphysematosa is related to Women's Reproductive Health and coined by Zweifel in 1877. The cases of Vaginitis emphysematosa are rare. The most important thing is that women never consult with the doctors for particularly Vaginitis emphysematosa but when they visit a doctor for some other reproductive health issue, they diagnose with the Vaginitis emphysematosa fortunately. Vaginitis emphysematosa is not common and Gynaecologists rarely know about it. Basically, this is characterised by gas-filled cysts in the mucosa of the vagina. Vaginitis emphysematosa is usually a self limited cystic disorder of the vagina. It is a very rare condition and has not much specific features to arouse clinical suspicion.
The term ''Vaginitis emphysematosa'' has 'vaginitis' in it but it has been observed that inflammation is generally mild and absent. This is characterised by gas-filled cysts in the vaginal wall and does not imply life-threatening infection.
Symptoms and signs
Vaginitis emphysematosa occurs primarily in pregnant women, but there are some cases of non-pregnant women too. It is a rare, benign vaginal cyst identified in 173 cases. Women that have been affected were 42 to 65 years old. The cysts appear grouped but defined from one another, smooth, and can be as large as 2 cm. Symptoms included: vaginal discharge, itching, sensation of pressure, appearance of nodules, and sometimes a "popping sound".
Causes
The cause is unknown. Histological examination showed the cysts contained pink hyaline-like material, foreign body-type giant cells in the cyst's wall, with chronic inflammatory cell fluid. The gas-filled cysts are identified with CT imaging. The gas contained in the cysts has been analysed and consists of nitrogen, oxygen, argon, carbon dioxide, and sulphur dioxide. Treatment may not be required and no complications follow the resolution of the cysts. It may be associated with immunosuppression, trichomonas, or Haemophilus vaginalis infection. Va |
https://en.wikipedia.org/wiki/%CE%91-Galactosylceramide | α-Galactosylceramide (α-GalCer, KRN7000) is a synthetic glycolipid derived from structure-activity relationship studies of galactosylceramides isolated from the marine sponge Agelas mauritianus. α-GalCer is a strong immunostimulant and shows potent anti-tumour activity in many in vivo models.
Immunostimulatory properties
α-GalCer is a potent activator of iNKT cells, and a model CD1d antigen. The invariant T cell receptor of the iNKT cell is able to bind the CD1d:glycolipid complex leading to iNKT cell activation in both mice and humans.
Adjuvant activity
In combination with a peptide antigen, α-GalCer is able to stimulate a strong immune response against the epitope. The CD1d:glycolipid:TCR interaction activates the iNKT cell which can then activate the dendritic cell. This causes the release of a range of cytokines and licenses the dendritic cell to activate a peptide-specific T cell response. This adjuvant acts through this cellular interaction, rather than through classic pattern recognition receptor pathways.
References
Immunology
Lipids |
https://en.wikipedia.org/wiki/BioSimGrid | BioSimGrid was a project to make data sets from computer simulations in the field of modelling biological systems, particularly biomolecular structures, more accessible to researchers. The project began in 2004 and halted by 2009.
In 2004 designers presented the concept of the project as a "protein data bank extended in time". Other developers presented a web portal for accessing data in the project. Other designers described the project as efficient.
A review in 2006 described how BioSimGrid was a model project for making data from research more open.
BioSimGrid contributors accepted a grant from the National Institutes of Health in 2007.
References
External links
biosimgrid.org is now defunct and
file archive at SourceForge
Digital libraries
Online databases
Bioinformatics |
https://en.wikipedia.org/wiki/Homoplasy | Homoplasy, in biology and phylogenetics, is the term used to describe a feature that has been gained or lost independently in separate lineages over the course of evolution. This is different from homology, which is the term used to characterize the similarity of features that can be parsimoniously explained by common ancestry. Homoplasy can arise from both similar selection pressures acting on adapting species, and the effects of genetic drift.
Most often, homoplasy is viewed as a similarity in morphological characters. However, homoplasy may also appear in other character types, such as similarity in the genetic sequence, life cycle types or even behavioral traits.
Etymology
The term homoplasy was first used by Ray Lankester in 1870. The corresponding adjective is either homoplasic or homoplastic.
It is derived from the two Ancient Greek words (), meaning "similar, alike, the same", and (), meaning "to shape, to mold".
Parallelism and convergence
Parallel and convergent evolution lead to homoplasy when different species independently evolve or gain apparently identical features, which are different from the feature inferred to have been present in their common ancestor. When the similar features are caused by an equivalent developmental mechanism, the process is referred to as parallel evolution. The process is called convergent evolution when the similarity arises from different developmental mechanisms. These types of homoplasy may occur when different lineages live in comparable ecological niches that require similar adaptations for an increase in fitness. An interesting example is that of the marsupial moles (Notoryctidae), golden moles (Chrysochloridae) and northern moles (Talpidae). These are mammals from different geographical regions and lineages, and have all independently evolved very similar burrowing characteristics (such as cone-shaped heads and flat frontal claws) to live in a subterranean ecological niche.
Reversion
In contrast, reversal ( |
https://en.wikipedia.org/wiki/Journal%20of%20Bioscience%20and%20Bioengineering | The Journal of Bioscience and Bioengineering is a monthly peer-reviewed scientific journal. The editor-in-chief is Noriho Kamiya (Kyushu University). It is published by The Society for Biotechnology, Japan and distributed outside Japan by Elsevier. It was founded in 1923 as a Japanese-language journal and took its current title in 1999.
Abstracting and indexing
The journal is abstracted and indexed in:
According to the Journal Citation Reports, the journal has a 2017 impact factor of 2.0.15.
References
External links
Official Journal of Bioscience and Bioengineering website
Elsevier academic journals.com: Journal's details
Biotechnology journals
Biological engineering
Biology education
English-language journals
Monthly journals
Publications established in 1923
1923 establishments in Japan
Elsevier academic journals |
https://en.wikipedia.org/wiki/Evidence%20for%20speciation%20by%20reinforcement | Reinforcement is a process within speciation where natural selection increases the reproductive isolation between two populations of species by reducing the production of hybrids. Evidence for speciation by reinforcement has been gathered since the 1990s, and along with data from comparative studies and laboratory experiments, has overcome many of the objections to the theory. Differences in behavior or biology that inhibit formation of hybrid zygotes are termed prezygotic isolation. Reinforcement can be shown to be occurring (or to have occurred in the past) by measuring the strength of prezygotic isolation in a sympatric population in comparison to an allopatric population of the same species. Comparative studies of this allow for determining large-scale patterns in nature across various taxa. Mating patterns in hybrid zones can also be used to detect reinforcement. Reproductive character displacement is seen as a result of reinforcement, so many of the cases in nature express this pattern in sympatry. Reinforcement's prevalence is unknown, but the patterns of reproductive character displacement are found across numerous taxa (vertebrates, invertebrates, plants, and fungi), and is considered to be a common occurrence in nature. Studies of reinforcement in nature often prove difficult, as alternative explanations for the detected patterns can be asserted. Nevertheless, empirical evidence exists for reinforcement occurring across various taxa and its role in precipitating speciation is conclusive.
Evidence from nature
Amphibians
The two frog species Litoria ewingi and L. verreauxii live in southern Australia with their two ranges overlapping. The species have very similar calls in allopatry, but express clinal variation in sympatry, with notable distinctness in calls that generate female preference discrimination. The zone of overlap sometimes forms hybrids and is thought to originate by secondary contact of once fully allopatric populations.
Allopatric populat |
https://en.wikipedia.org/wiki/Zariski%27s%20finiteness%20theorem | In algebra, Zariski's finiteness theorem gives a positive answer to Hilbert's 14th problem for the polynomial ring in two variables, as a special case. Precisely, it states:
Given a normal domain A, finitely generated as an algebra over a field k, if L is a subfield of the field of fractions of A containing k such that , then the k-subalgebra is finitely generated.
References
Hilbert's problems
Invariant theory
Commutative algebra |
https://en.wikipedia.org/wiki/Election%20security | Election cybersecurity or election security refers to the protection of elections and voting infrastructure from cyberattack or cyber threat – including the tampering with or infiltration of voting machines and equipment, election office networks and practices, and voter registration databases.
Cyber threats or attacks to elections or voting infrastructure could be carried out by insiders within a voting jurisdiction, or by a variety of other actors ranging from nefarious nation-states, to organized cyber criminals to lone-wolf hackers. Motives may range from a desire to influence the election outcome, to discrediting democratic processes, to creating public distrust or even political upheaval.
Legislation and policy best practices
A variety of experts and interest groups have emerged to address voting infrastructure vulnerabilities and to support democracies in their security efforts. From these efforts have come a general set of policy ideas for election security, including:
Transition from black-box proprietary voting systems to transparent open-source voting systems
Implement universal use of paper ballots, marked by hand and read by optical scanner, ensuring a voter-verified paper audit trail (VVPAT).
Pass voter machine certification requirements that, for example, phase out touch-screen voting machines – especially the most vulnerable direct-recording electronic (DRE) devices and follow recommendations like those by the US Election Assistance Commission.
Verify voting results by requiring election officials to conduct risk-limiting audits, a statistical post-election audit before certification of final results.
Ballot accounting and reconciliation to ensure all ballots are accounted for
Give voters an opportunity to fix any mistakes that would otherwise get their ballots thrown out
Ban electronic voting
Secure all voting infrastructure from databases to equipment using cyber hygiene tools such as the CIS “20 Critical Security Controls” or NIST's Cy |
https://en.wikipedia.org/wiki/Headstarting | Headstarting is a conservation technique for endangered species, in which young animals are raised artificially and subsequently released into the wild. The technique allows a greater proportion of the young to reach independence, without predation or loss to other natural causes.
For endangered birds and reptiles, eggs are collected from the wild are hatched using an incubator. For mammals such as Hawaiian monk seals, the young are removed from their mothers after weaning.
The technique was trialled on land-based mammals for the first time in Australia. In the three years prior to May 2021, young bridled nail-tail wallabies were placed in a fenced-off area of area within Avocet Nature Refuge in Queensland. The population, safe from their main predator, feral cats, more than doubled over this period.
References
External links
Video of Spoon-billed sandpiper chicks at WWT Slimbridge. The Guardian, July 2012.
Conservation biology |
https://en.wikipedia.org/wiki/Abundance%20conjecture | In algebraic geometry, the abundance conjecture is a conjecture in
birational geometry, more precisely in the minimal model program,
stating that for every projective variety with Kawamata log terminal singularities over a field if the canonical bundle is nef, then is semi-ample.
Important cases of the abundance conjecture have been proven by Caucher Birkar.
References
Algebraic geometry
Birational geometry
Unsolved problems in geometry |
https://en.wikipedia.org/wiki/Cable%20bacteria | Cable bacteria are filamentous bacteria that conduct electricity across distances over 1 cm in sediment and groundwater aquifers. Cable bacteria allow for long-distance electron transport, which connects electron donors to electron acceptors, connecting previously separated oxidation and reduction reactions. Cable bacteria couple the reduction of oxygen or nitrate at the sediment's surface to the oxidation of sulfide in the deeper, anoxic, sediment layers.
Discovery
Long-distance electrical conductance in sediment was first observed in 2010 as a spatial separation of sulfide oxidation and oxygen reduction in marine sediment that was interrupted and re-established at a rate faster than could be explained by chemical diffusion. It was later found that this electrical conductance could be observed across a non-conductive layer of glass microspheres, where the only possible conductive structures were filamentous bacteria belonging to the family Desulfobulbaceae. The conductivity of single, live filaments was later demonstrated by observing the oxidation state of cytochromes using Raman microscopy. The same phenomenon was later observed in freshwater sediments and groundwater aquifers. Within a 15 cm thick top layer of sediment, cable bacteria densities providing total length of up to 2 km per square centimeter of surface have been observed.
Morphology
Cable bacteria filaments are 0.4—1.7 µm in diameter and up to 15 mm long. Filaments consist of rod-shaped cells with an average length of 3 µm. Filaments are long strings composed of cells stacked together, and can be as long as 30-70mm. Some filaments are composed of upwards of 10,000 cells. Each cell has between 15 and 54 ridges, and ridges span the entire length of the filament. These ridges are hypothesized to contain the cells' conductive structures.
Junctions
Cells in a filament are connected by junctions. The diameter of junctions between cells in the filament varies from being smaller than the cell diameter, th |
https://en.wikipedia.org/wiki/Fiber-optic%20display | A fiber-optic display is a light-emitting display that uses fiber optics to display images or text. Fiber-optic displays can either be static or dynamic, with the typical lighting source being halogen light bulbs.
Static fiber optic displays
Static fiber optic displays have been commonly used for some types of traffic signals. One common use for static fiber optic displays are lane control lights, which display either a green downward-pointing arrow or a red X to indicate the open/closed status of road lanes.
Dynamic fiber optic displays
Dynamic fiber optic displays typically display alphanumeric text, and utilize electromechanical shutters to open or close the ends of the fiber strands to display an alphanumeric pixel. These type of displays were commonly used as variable-message signs on highways. Compared to eggcrate displays, dynamic fiber optic displays offered lower energy consumption due to requiring fewer bulbs, and offered improved nighttime legibility. For daytime legibility, they were sometimes combined with flip-disc displays to be reflective in daylight and emissive at night.
Display technology |
https://en.wikipedia.org/wiki/GKM%20variety | In algebraic geometry, a GKM variety is a complex algebraic variety equipped with a torus action that meets certain conditions. The concept was introduced by Mark Goresky, Robert Kottwitz, and Robert MacPherson in 1998. The torus action of a GKM variety must be skeletal: both the set of fixed points of the action, and the number of one-dimensional orbits of the action, must be finite. In addition, the action must be equivariantly formal, a condition that can be phrased in terms of the torus' rational cohomology.
See also
equivariant cohomology
References
Algebraic geometry |
https://en.wikipedia.org/wiki/World%20History%20Encyclopedia | World History Encyclopedia (formerly Ancient History Encyclopedia) is a nonprofit educational company created in 2009 by Jan van der Crabben. The organization publishes and maintains articles, images, videos, podcasts, and interactive educational tools related to history. All users may contribute content to the site, although submissions are reviewed by an editorial team before publication. In 2021, the organization was renamed from the Ancient History Encyclopedia to World History Encyclopedia to reflect its broadened scope, covering world history from all time periods, as opposed to just ancient history. Original articles are written in English and later translated into other languages, mainly French and Spanish.
Organization history
The Ancient History Encyclopedia was founded in 2009 by van der Crabben with the stated goal of improving history education worldwide by creating a freely accessible and reliable history source. The nonprofit organization is based in Godalming, United Kingdom and Montreal, Canada, although it has no office and its team is globally distributed.
The site had an emphasis on ancient history when it was founded, but it later shifted to cover the Medieval and early Modern periods as well. In 2021, the organization renamed itself World History Encyclopedia to reflect this change.
Reception
The website has received praise by educational organizations and has been recommended by the School Library Journal, the Internet Scout Research Group at the University of Wisconsin–Madison, MERLOT, and the European Commission's Open Education Europa initiative. In 2016, it won the .eu Web Award for education from the organization EURid.
References
External links
British online encyclopedias
Education companies of the United Kingdom
Educational technology non-profits
History websites of the United Kingdom
Horsham
Internet properties established in 2009
Online encyclopedias
Online nonprofit organizations
Open educational resources
Organizations es |
https://en.wikipedia.org/wiki/Tom%20Clancy%27s%20The%20Division%202 | Tom Clancy's The Division 2 is an online-only action role-playing video game developed by Massive Entertainment and published by Ubisoft. The sequel to Tom Clancy's The Division (2016), it is set in a near-future Washington, D.C., in the aftermath of a genetically engineered virus known as "Green Poison" being released, and follows an agent of the Strategic Homeland Division as they try to rebuild the city. The game was released for PlayStation 4, Windows, and Xbox One on March 15, 2019.
It received generally favorable reviews from critics, with most noting it as an improvement over the first installment for its setting, gameplay, visuals, combat and soundtrack, though the endgame content polarised critics. Like its predecessor, it was a commercial success, selling over 10 million copies worldwide despite not meeting expectations at launch.
A spinoff, Tom Clancy's The Division Heartland, is in development.
Gameplay
Played from a third-person perspective, The Division 2 is a cover-based third-person shooter with up to four players being able to complete missions together. The game takes place in Washington, D.C., seven months after its predecessor, in which a civil war between survivors and villainous bands of marauders breaks out. In the beginning of the game, players create their own Division agent by customizing the character's gender and appearance. In the game, players are equipped with different firearms, including assault rifles, sniper rifles and submachine guns, and explosives like grenades to defeat enemies. These weapons are classified into different tiers and rarity. High-quality guns are difficult to obtain, but they have better weapon stats and "talents" that further help boost players' performance. The weapon stats include the following 7 domains: Damage, Rounds Per Minute, Magazine Size, Accuracy, Stability, Reload Time, and Damage Drop Off. These weapons can be further customized with different attachments like firearm optics, iron sights and ba |
https://en.wikipedia.org/wiki/Intermediate%20moisture%20food | Intermediate moisture foods (IMF) are shelf-stable products that have water activities of 0.6-0.84, with a moisture content ranging from 15% - 40% and are edible without rehydration. These food products are below the minimum water activity for most bacteria (0.90), but are susceptible to yeast and mold growth. Historically, ancient civilizations would produce IMF using methods such as sun drying, roasting over fire and adding salt to preserve food for winter months or when preparing for travel. Currently, this form of processing is achieved by using one of four methods: partial drying, osmotic drying using a humectant, dry infusion and by formulation. A variety of products are classified as IMF, such as dried fruits, sugar added commodities, marshmallows, and pie fillings.
Shelf-life and safety
The purpose of IMF foods is to achieve a water activity that the food can be stored safely without refrigeration. However, the food is not sterile. Staphylococcus aureus is a microorganism of concern as it can grow and produce specific enterotoxins in water activities of 0.83-0.86 under aerobic conditions. Because of this, proper handling, storage, hygiene and good manufacturing practices are necessary to prevent Staphylococcus aureus. Molds of Aspergillis and Penicillium species can grow and produce harmful mycotoxins at water activity 0.77-0.85. Salmonella and Bacillus cereus are the primary pathogens of concern with low-moisture foods and IMFs. Most illnesses associated with low-moisture foods or IMFs have been caused by Salmonella spp. To reduce the risk of bacterial growth, products are treated with a combination of low pH, addition of sugar, salt and preservatives, and a thermal process that can eliminate pathogens and extend shelf-life. In the case of yeasts and molds, chemical preservatives such as sorbates and propionates are used to inhibit their growth.
Processing
Partial drying
To achieve 0.6-0.84 water activity in food products, partial drying is employ |
https://en.wikipedia.org/wiki/Optical%20properties | The optical properties of a material define how it interacts with light. The optical properties of matter are studied in optical physics (a subfield of optics) and applied in materials science. The optical properties of matter include:
Refractive index
Dispersion
Transmittance and Transmission coefficient
Absorption
Scattering
Turbidity
Reflectance and Reflectivity (reflection coefficient)
Albedo
Perceived color
Fluorescence
Phosphorescence
Photoluminescence
Optical bistability
Dichroism
Birefringence
Optical activity
Photosensitivity
A basic distinction is between isotropic materials, which exhibit the same properties regardless of the direction of the light, and anisotropic ones, which exhibit different properties when light passes through them in different directions.
The optical properties of matter can lead to a variety of interesting optical phenomena.
Properties of specific materials
Optical properties of water and ice
Optical properties of carbon nanotubes
Crystal optics
Literature
Optics
Materials science |
https://en.wikipedia.org/wiki/Cinnamyl%20acetate | Cinnamyl acetate (3-phenylprop-2-enyl acetate) is a chemical compound of the cinnamyl ester family, in which the variable R group is substituted by a methyl group. As a result of the non-aromatic carbon-carbon double bond, cinnamyl acetate can exist in a Z and an E configuration:
Cinnamyl acetate naturally occurs in fresh bark of cinnamon (Cinnamomum zeylanicum Blume and other Cinnamomum species), with concentrations of 2,800–51,000 ppm.
Cinnamyl acetate is used as a flavour ester in for example bread and animal feed and has a sweet floral-fruity fragrance. Moreover, it is used in several cosmetics, some toiletries but also in non-cosmetic products, for example detergents.
Legislation and control
Cinnamyl acetate, used in fragrances and as flavour ingredient, has been discussed by several institutions. In 1965, the compound was annotated as 'Generally Recognized as Safe as a flavor ingredient’ by the Flavor and Extract Manufacturers" Association (FEMA). The association determined the average maximum use levels in several products that were considered to be safe:
The European Parliament registered cinnamyl acetate as both a flavouring substance and a cosmetic compound in 1996. The Joint (FAO/WHO) Expert Committee on Food Additives (JECFA) described in 2000 that “the substance does not present a safety concern at current levels of intake when used as a flavouring agent”. In 2009, the EFSA Panel on Food Contact Materials, Enzyme, Flavourings and Processing Aids (CEF) concluded that cinnamyl acetate does not give rise to safety concerns when used as flavour ingredient in food. Cinnamyl acetate is also permitted by the U.S. Food & Drug administration for use as flavouring agent in food if the minimum quantity needed for its effect is used.
Production and intake
Estimates of the average annual production and daily intake of cinnamyl acetate as flavouring agent are reported by the WHO. According to this report, the annual volume of production in Europe is 1498 kg, |
https://en.wikipedia.org/wiki/Walter%20Lewis%20Baily%20Jr. | Walter Lewis Baily Jr. (July 5, 1930, in Waynesburg, Pennsylvania – January 15, 2013, in Northbrook, Illinois) was an American mathematician.
Baily's research focused on areas of algebraic groups, modular forms and number-theoretical applications of automorphic forms. One of his significant works was with Armand Borel, now known as the Baily–Borel compactification, which is a compactification of a quotient of a Hermitian symmetric space by an arithmetic group (that is, a linear algebraic group over the rational numbers). Baily and Borel built on the work of Ichirō Satake and others.
Baily became a Putnam Fellow in 1952. He studied at the Massachusetts Institute of Technology (MIT), receiving a Bachelor of Science in Mathematics in 1952. After that, he attended Princeton University, receiving a Masters in 1953 and a Ph.D. in Mathematics in 1955 under the direction of his thesis advisor Kunihiko Kodaira (On the Quotient of a Complex Analytic Manifold by a Discontinuous Group of Complex Analytic Self-Homomorphisms). Subsequently, he was an instructor at Princeton and then MIT. In 1957 he worked as a mathematician at Bell Laboratories. In 1957, he was appointed Assistant Professor and subsequently promoted to Professor in 1963 at the University of Chicago. He became a Professor Emeritus at the University of Chicago in 2005.
He was a member of the American Mathematical Society and the Mathematical Society of Japan. He often visited the University of Tokyo as a guest of Shokichi Iyanaga and Kunihiko Kodaira, spoke fluent Japanese and in Tokyo, 1963 married Yaeko Iseki, with whom he had a son. He owned an apartment in Tokyo for many years, where he spent his summers. In addition, he often visited Moscow and Saint Petersburg and spoke fluent Russian.
He was awarded an Alfred P. Sloan Fellowship in 1958. In 1962, he was an invited speaker at the International Congress of Mathematicians held in Stockholm (On the moduli of Abelian varieties with multiplications from an o |
https://en.wikipedia.org/wiki/Vapour-phase-mediated%20antimicrobial%20activity | The vapour-phase-mediated antimicrobial activity (VMAA) is the inhibitory or cidal antimicrobial activity of a molecule in a liquid culture, following its initial evaporation and migration via the vapour-phase Two new in vitro assays i.e. the vapour-phase-mediated patch assay and the vapour-phase-mediated susceptibility assay were developed to detect and quantify the VMAA. Both assays belong to the newest class of vaporisation assays i.e. the broth microdilution derived vaporisation assays. In contrast, most other vaporisation assays belong to the class of agar disk diffusion derived vaporisation assays and quantify the antimicrobial activity of the vapour-phase itself. Both classes of vaporisation assays are useful and measure different aspects of the antimicrobial capacity of molecules.
Applications
Possible applications for volatiles like volatile organic compounds with VMAA are: maintaining hygiene in hospitals, treating post-harvest contamination, protecting crops against pathogens and pests, and treating infections of the digestive, vaginal or respiratory tract.
References
Biochemistry |
https://en.wikipedia.org/wiki/Erd%C5%91s%E2%80%93Tenenbaum%E2%80%93Ford%20constant | The Erdős–Tenenbaum–Ford constant is a mathematical constant that appears in number theory. Named after mathematicians Paul Erdős, Gérald Tenenbaum, and Kevin Ford, it is defined as
where is the natural logarithm.
Following up on earlier work by Tenenbaum, Ford used this constant in analyzing the number of integers that are at most and that have a divisor in the range .
Multiplication table problem
For each positive integer , let be the number of distinct integers in an multiplication table. In 1960, Erdős studied the asymptotic behavior of and proved that
as .
References
External links
Decimal digits of the Erdős–Tenenbaum–Ford constant on the OEIS
Mathematical constants
Number theory |
https://en.wikipedia.org/wiki/Synaptic%20stabilization | Synaptic stabilization is crucial in the developing and adult nervous systems and is considered a result of the late phase of long-term potentiation (LTP). The mechanism involves strengthening and maintaining active synapses through increased expression of cytoskeletal and extracellular matrix elements and postsynaptic scaffold proteins, while pruning less active ones. For example, cell adhesion molecules (CAMs) play a large role in synaptic maintenance and stabilization. Gerald Edelman discovered CAMs and studied their function during development, which showed CAMs are required for cell migration and the formation of the entire nervous system. In the adult nervous system, CAMs play an integral role in synaptic plasticity relating to learning and memory.
Types of CAMs
SynCAMs
Synaptic cell adhesion molecules (CAMs) play a crucial role in axon pathfinding and synaptic establishment between neurons during neurodevelopment and are integral members in many synaptic processes including the correct alignment of pre- and post-synaptic signal transduction pathways, vesicular recycling in regards to endocytosis and exocytosis, integration of postsynaptic receptors and anchoring to the cytoskeleton to ensure stability of synaptic components
SynCAM’s (also known as Cadm or nectin-like molecules) are a specific type of synaptic CAM found in vertebrates that promotes growth and stabilization of excitatory (not inhibitory) synapses. SynCAM’s are localized primarily in the brain at both pre- and postsynaptic sites and their structures consist of intracellular FERM and PDZ binding domains, a single transmembrane domain, and three extracellular Ig-domains. During neurodevelopment, SynCAMs such as SynCAM1 act as “contact sensors” of axonal growth cones accumulating rapidly when axo-dendritic connections are made and helping to form a stable adhesion complex.
synCAM1 along with neuroligin are the two CAM’s known to be sufficient to initiate the formation of presynaptic terminal |
https://en.wikipedia.org/wiki/Disease%20X | Disease X is a placeholder name that was adopted by the World Health Organization (WHO) in February 2018 on their shortlist of blueprint priority diseases to represent a hypothetical, unknown pathogen that could cause a future epidemic. The WHO adopted the placeholder name to ensure that their planning was sufficiently flexible to adapt to an unknown pathogen (e.g., broader vaccines and manufacturing facilities). Director of the US National Institute of Allergy and Infectious Diseases Anthony Fauci stated that the concept of Disease X would encourage WHO projects to focus their research efforts on entire classes of viruses (e.g., flaviviruses), instead of just individual strains (e.g., zika virus), thus improving WHO capability to respond to unforeseen strains. In 2020, experts, including some of the WHO's own expert advisors, speculated that COVID-19, caused by the SARS-CoV-2 virus strain, met the requirements to be the first Disease X.
Rationale
In May 2015, in pandemic preparations prior to the COVID-19 pandemic, the WHO was asked by member organizations to create an "R&D Blueprint for Action to Prevent Epidemics" to generate ideas that would reduce the time lag between the identification of viral outbreaks and the approval of vaccines/treatments, to stop the outbreaks from turning into a "public health emergency". The focus was to be on the most serious emerging infectious diseases (EIDs) for which few preventive options were available. A group of global experts, the "R&D Blueprint Scientific Advisory Group", was assembled by the WHO to draft a shortlist of less than ten "blueprint priority diseases".
Since 2015, the shortlist of less than 10 EIDs has been updated annually and has consistently included widely known names such as Ebola, Zika and SARS (e.g., cause of large-scale infections), and more geographically specific names such as Lassa fever, Marburg virus, Rift Valley fever, and Nipah virus.
In February 2018, after the "2018 R&D Blueprint" meeting in |
https://en.wikipedia.org/wiki/Business%20machine | Business machine is a somewhat obsolete term for a machine that assists in the clerical activities common in business companies. Examples include:
Tabulating machine
Accounting machine
Adding machine
Typewriter
Computer
Photocopier
See also
International Business Machines, better known as IBM
References
John Strider Coleman, The Business Machine: With Mention of William Seward Burroughs, Joseph Boyer, and Others, Since 1880, Literary Licensing, LLC, 2013 .
James W. Cortada, Before the Computer: IBM, NCR, Burroughs, and Remington Rand and the Industry They Created, 1865-1956, Princeton University Press, 2015 .
Programmable calculators
Early computers
Mechanical calculators |
https://en.wikipedia.org/wiki/Fortnite%20Battle%20Royale | Fortnite Battle Royale is a free-to-play battle royale video game developed and published by Epic Games. It is a companion game to Fortnite: Save the World, a cooperative survival game with construction elements. It was initially released in early access on September 26, 2017, for macOS, PlayStation 4, Windows, and Xbox One, followed by ports for iOS, Nintendo Switch, and Android. The following year, Epic dropped the early access label for the game on June 29, 2020. Versions for the Xbox Series X/S and PlayStation 5 were released as launch titles in late 2020.
The concept of the game is similar to previous games of the genre: 100 players skydive onto an island and scavenge for gear to defend themselves from other players. Players can fight alone, or with up to four other players. As the match progresses, the playable area within the island gradually constricts, giving the players less and less room to work with; outside this safe zone is "the Storm", which inflicts damage on those caught inside it, with the amount of damage growing as the Storm itself does. The last player or team alive wins the match. The main distinction from others in the genre is the game's construction elements, letting players build walls, obstacles, and other structures from collected resources to take cover from incoming fire or give one a strategic view advantage. Battle Royale uses a seasonal approach with battle passes to introduce new character customization content in the game, as well as limited-time events, some of which correspond with changes to the game map. Since its initial release, several other game modes have been introduced, including "Battle Lab" and "Party Royale".
The idea for Battle Royale arose following the release of PlayerUnknown's Battlegrounds in 2017, a similar battle royale game that was highly successful but noted for its technical flaws. Originally released as part of the early access version of Save the World, Epic later transitioned the game to a free-to-pla |
https://en.wikipedia.org/wiki/Paperity | Paperity is a multidisciplinary aggregator of open access journals and papers. It was launched in October 2014 with 160,000 articles.
As of December 2020, Paperity includes 7.2 million articles from 15,300 journals, covering all academic disciplines: mathematical sciences, life sciences, medicine, social sciences, humanities, arts. Paperity provides full-text search, RSS feeds and a mobile application to access the literature. All articles are available in full text without fees.
Paperity shares the aggregated metadata with other academic services such as OCLC.
References
External links
Official website
Bibliographic databases and indexes
Full-text scholarly online databases
Aggregation-based digital libraries
Polish digital libraries
Scholarly search services
Open access projects
Open-access archives
Online databases |
https://en.wikipedia.org/wiki/List%20of%20Atari%20Jaguar%20homebrew%20games | This is a list of titles for the Atari Jaguar and its CD add-on developed and released by independent developers and publishers. Many of the games present here have been released long after the end of the console's official life span in 1996, with the last officially licensed title released in 1998. Consequently, these homebrew games are not endorsed or licensed by Atari. After the properties of Atari Corporation were bought out by Hasbro Interactive in 1998, the rights and patents to the Jaguar were released into the public domain in 1999, declaring the console an open platform and opening the doors for homebrew development. Thanks to this, a few developers and publishers such as AtariAge, B&C Computervisions, Piko Interactive, Songbird Productions and Video61 continue to release previously unfinished games from the Jaguar's past life cycle, as well as new titles, to satisfy the system's cult following as of date.
Homebrew games for the Atari Jaguar are released in either cartridge, CD or both formats to satisfy system owners. Titles released in the CD format are either glass mastered, or burned on regular CD-Rs however, since the add-on was released in very limited quantities, most homebrew developers publish their works either online on forums or on cartridge via independent publishers. Many of the cartridge releases are styled as retail Jaguar titles from the era. As both systems do not enforce regional locking all titles are region free but some titles, such as Gorf Classic and the initial release of Black Out! do not work correctly on PAL systems. Some of the earliest CD releases were not encrypted, requiring either B&C's Jaguar CD Bypass Cartridge or Reboot's Jagtopia (Freeboot) program burned into a CD in order to run unencrypted CD games, however Curt Vendel of Atari Museum released the binaries and encryption keys for both cartridge and CD formats, making it possible to run games without the need for development hardware. The first homebrew title program |
https://en.wikipedia.org/wiki/TikTok | TikTok, whose mainland Chinese counterpart is Douyin (), is a short-form video hosting service owned by ByteDance. It hosts user-submitted videos, which can range in duration from 3 seconds to 10 minutes.
Since their launches, TikTok and Douyin have gained global popularity. In October 2020, TikTok surpassed 2 billion mobile downloads worldwide. Morning Consult named TikTok the third-fastest growing infotech brand of 2020, after Zoom and Peacock. Cloudflare ranked TikTok the most popular website of 2021, surpassing Google.
Corporate structure
ByteDance, based in Beijing, and its subsidiary TikTok Ltd, based in both Singapore and Los Angeles, were incorporated in the Cayman Islands. ByteDance is owned by its founders and Chinese investors (20%), other global investors (60%), and employees (20%). TikTok Ltd owns four entities that are based respectively in the United States, Australia (which also runs the New Zealand business), United Kingdom (also owns subsidiaries in the European Union), and Singapore (owns operations in Southeast Asia and India).
In April 2021, a state-owned enterprise owned by the Cyberspace Administration of China and China Media Group, the China Internet Investment Fund, purchased a 1% stake in ByteDance's main Chinese entity. The Economist, Reuters, and Financial Times have described the Chinese government's stake as a golden share investment.
Douyin
Douyin was launched by ByteDance in September 2016, originally under the name A.me, before rebranding to Douyin () in December 2016. Douyin was developed in 200 days and within a year had 100 million users, with more than one billion videos viewed every day.
While TikTok and Douyin share a similar user interface, the platforms operate separately. Douyin includes an in-video search feature that can search by people's faces for more videos of them, along with other features such as buying, booking hotels, and making geo-tagged reviews.
History
Evolution
ByteDance planned on Douyin expanding |
https://en.wikipedia.org/wiki/Conversational%20commerce | Conversational commerce is e-commerce done via various means of conversation (live support on e-commerce Web sites, online chat using messaging apps, chatbots on messaging apps or websites, voice assistants) and using technology such as: speech recognition, speaker recognition (voice biometrics), natural language processing and artificial intelligence.
Development
WeChat in China
During this time, in China, e-commerce via WeChat – at its core a messaging app, but also letting merchants display their goods in mobile Web pages and via social feeds – grew strongly. By 2013 e-commerce in China had overtaken that of the U.S.
Facebook Messenger
In 2016, Facebook announced its Facebook Messenger chatbot platform, heralding the arrival of conversational commerce via the most widely used messaging app in the world outside China. More than 34,000 businesses had opened shop on Messenger by August 2017.
Early cited examples of conversational commerce chatbots on Facebook Messenger include 1-800-FLOWERS with an IBM Watson artificial intelligence-powered chatbot/assistant, and Mexican airline Aeroméxico, whose chat platform running on Yalochat lets customers search, book, track, or check in for flights; ask any question, using A.I. and NLP to provide answers; or pull the chatbot into a group chat.
Apple Business Chat
In June 2017, Apple announced its Apple Business Chat product, allowing consumers and businesses to message each other via the Messages app.
WhatsApp
In September 2017 WhatsApp announced the pilot of its new Enterprise solution, the first time large companies would be able to attend to large groups of customers in an approved WhatsApp solution, after WhatsApp banned earlier unofficial solutions. Companies who piloted the solution included airlines Aeromexico, KLM, Latin American online travel agency Despegar and online retailer Linio.
Enterprise solutions for WhatsApp have been available since 2015 from a variety of third-party vendors, and though unofficial |
https://en.wikipedia.org/wiki/Georg%20Weizs%C3%A4cker | Georg Heinrich von Weizsäcker (born October 10, 1973) is a German economist and currently the Professor for Microeconomic Theory and Applications at the Humboldt University of Berlin. His research interests include microeconomics, experimental economics, financial decision making, game theory and decision theory. In 2017, Weizsäcker's contributions to a better understanding of expectations formation and decisions under uncertainty were awarded the Gossen Prize.
Biography
Georg Weizsäcker earned a diploma in economics from the Humboldt University of Berlin in 1999, followed by a M.A. and a Ph.D. in business economics from Harvard University in 2004. After his graduation, Weizsäcker worked first as a lecturer, reader and later professor at the London School of Economics (2004–10) and University College London (2010–13). Since 2012, he has worked as professor at Humbold University. In Berlin, he is also engaged in the Graduate Center of the DIW Berlin, whose dean he has been since 2017. In terms of professional service, Weizsäcker performs editorial duties for the journal Games and Economic Behavior and Experimental Economics and has done so for the Review of Economic Studies, Economic Journal and Management Science in the past.
Georg Weizsäcker's partner is fellow economist Dorothea Kübler, with whom he has two children.
Research
Georg Weizsäcker's research focuses on behavioral and experimental economics. Among the key findings of his research are that
Private information on signals fails to cascade among individuals due to the limited depths of individuals' chains of reasoning (with Dorothea Kübler).
Individuals' actions in normal-form games systematically diverge from their stated beliefs, which reveal greater strategic depth (with Miguel Costa-Gomes).
In an experiment, 89% of individuals are found to evaluate decisions separately instead of jointly ("narrow bracketing"), in line with preferences predicted by prospect theory (with Matthew Rabin).
In soci |
https://en.wikipedia.org/wiki/Cryptographic%20multilinear%20map | A cryptographic -multilinear map is a kind of multilinear map, that is, a function such that for any integers and elements , , and which in addition is efficiently computable and satisfies some security properties. It has several applications on cryptography, as key exchange protocols, identity-based encryption, and broadcast encryption. There exist constructions of cryptographic 2-multilinear maps, known as bilinear maps, however, the problem of constructing such multilinear maps for seems much more difficult and the security of the proposed candidates is still unclear.
Definition
For n = 2
In this case, multilinear maps are mostly known as bilinear maps or pairings, and they are usually defined as follows: Let be two additive cyclic groups of prime order , and another cyclic group of order written multiplicatively. A pairing is a map: , which satisfies the following properties:
Bilinearity
Non-degeneracy If and are generators of and , respectively, then is a generator of .
Computability There exists an efficient algorithm to compute .
In addition, for security purposes, the discrete logarithm problem is required to be hard in both and .
General case (for any n)
We say that a map is a -multilinear map if it satisfies the following properties:
All (for ) and are groups of same order;
if and , then ;
the map is non-degenerate in the sense that if are generators of , respectively, then is a generator of
There exists an efficient algorithm to compute .
In addition, for security purposes, the discrete logarithm problem is required to be hard in .
Candidates
All the candidates multilinear maps are actually slightly generalizations of multilinear maps known as graded-encoding systems, since they allow the map to be applied partially: instead of being applied in all the values at once, which would produce a value in the target set , it is possible to apply to some values, which generates values in intermediate target sets. For e |
https://en.wikipedia.org/wiki/Fairfield%20Experiment | The Fairfield experiment was an experiment in industrial relations carried out at the Fairfield Shipbuilding and Engineering Company, Glasgow, during the 1960s. The experiment was initiated by Sir Iain Maxwell Stewart, industrialist, chairman of Thermotank Ltd, and signatory to the Marlow Declaration of the early 1960s, and supported by George Brown, the First Secretary in Harold Wilson's cabinet, in 1966. The company was facing closure, and Brown agreed to provide £1 million (£13,135,456.90 in 2021 terms) to enable the Trade Unions, the management, and the shareholders to try out new ways of industrial management.
The Bowler and the Bunnet
The Bowler and the Bunnet was a film directed by Sean Connery and written by Cliff Hanley about the Fairfield Experiment.
References
Operations research
Govan
Shipbuilding
Industry in Scotland |
https://en.wikipedia.org/wiki/FT32 | FT32 is a 32-bit RISC instruction set architecture designed by FTDI and used in their FT90 series microcontrollers.
References
32-bit microprocessors |
https://en.wikipedia.org/wiki/NEC%20SX-Aurora%20TSUBASA | The NEC SX-Aurora TSUBASA is a vector processor of the NEC SX architecture family. Unlike previous SX supercomputers, the SX-Aurora TSUBASA is provided as a PCIe card, termed by NEC as a "Vector Engine" (VE). Eight VE cards can be inserted into a vector host (VH) which is typically a x86-64 server running the Linux operating system. The product has been announced in a press release on 25 October 2017 and NEC has started selling it in February 2018. The product succeeds the SX-ACE.
Hardware
SX-Aurora TSUBASA is a successor to the NEC SX series and SUPER-UX, which are vector computer systems upon which the Earth Simulator supercomputer is based. Its hardware consists of x86 Linux hosts with vector engines (VEs) connected via PCI express (PCIe) interconnect.
High memory bandwidth (0.75–1.2 TB/s), comes from eight cores and six HBM2 memory modules on a silicon interposer implemented in the form-factor of a PCIe card. Operating system functionality for the VE is offloaded to the VH and handled mainly by user space daemons running the VEOS.
Depending on the clock frequency (1.4 or 1.6 GHz), each VE CPU has eight cores and a peak performance of 2.15 or 2.45 TFLOPS in double precision. The processor has the world's first implementation of six HBM2 modules on a Silicon interposer with a total of 24 or 48GB of high bandwidth memory. It is integrated in the form-factor of a standard full length, full height, double width PCIe card that is hosted by an x86_64 server, the Vector Host (VH). The server can host up to eight VEs, clusters VHs can scale to arbitrary number of nodes.
Product releases
Version 2 Vector Engine
Version 1 Vector Engine
The version 1.0 of the Vector Engine was produced in 16 nm FinFET process (from TSMC) and released in three SKUs (subsequent versions add an E at the end):
Functional units
Each of the eight SX-Aurora cores has 64 logical vector registers. These have 256 x 64 Bits length implemented as a mix of pipeline and 32-fold parallel SIMD u |
https://en.wikipedia.org/wiki/Weyl%20sequence | In mathematics, a Weyl sequence is a sequence from the equidistribution theorem proven by Hermann Weyl:
The sequence of all multiples of an irrational α,
0, α, 2α, 3α, 4α, ...
is equidistributed modulo 1.
In other words, the sequence of the fractional parts of each term will be uniformly distributed in the interval [0, 1).
In computing
In computing, an integer version of this sequence is often used to generate a discrete uniform distribution rather than a continuous one. Instead of using an irrational number, which cannot be calculated on a digital computer, the ratio of two integers is used in its place. An integer k is chosen, relatively prime to an integer modulus m. In the common case that m is a power of 2, this amounts to requiring that k is odd.
The sequence of all multiples of such an integer k,
0, k, 2k, 3k, 4k, …
is equidistributed modulo m.
That is, the sequence of the remainders of each term when divided by m will be uniformly distributed in the interval [0, m).
The term appears to originate with George Marsaglia’s paper "Xorshift RNGs".
The following C code generates what Marsaglia calls a "Weyl sequence":
d += 362437;
In this case, the odd integer is 362437, and the results are computed modulo because d is a 32-bit quantity. The results are equidistributed modulo 232.
See also
List of things named after Hermann Weyl
References
Mathematical series |
https://en.wikipedia.org/wiki/Dispersive%20flies%20optimisation | Dispersive flies optimisation (DFO) is a bare-bones swarm intelligence algorithm which is inspired by the swarming behaviour of flies hovering over food sources. DFO is a simple optimiser which works by iteratively trying to improve a candidate solution with regard to a numerical measure that is calculated by a fitness function. Each member of the population, a fly or an agent, holds a candidate solution whose suitability can be evaluated by their fitness value. Optimisation problems are often formulated as either minimisation or maximisation problems.
DFO was introduced with the intention of analysing a simplified swarm intelligence algorithm with the fewest tunable parameters and components. In the first work on DFO, this algorithm was compared against a few other existing swarm intelligence techniques using error, efficiency and diversity measures. It is shown that despite the simplicity of the algorithm, which only uses agents’ position vectors at time t to generate the position vectors for time t + 1, it exhibits a competitive performance. Since its inception, DFO has been used in a variety of applications including medical imaging and image analysis as well as data mining and machine learning.
Algorithm
DFO bears many similarities with other existing continuous, population-based optimisers (e.g. particle swarm optimization and differential evolution). In that, the swarming behaviour of the individuals consists of two tightly connected mechanisms, one is the formation of the swarm and the other is its breaking or weakening. DFO works by facilitating the information exchange between the members of the population (the swarming flies). Each fly represents a position in a d-dimensional search space: , and the fitness of each fly is calculated by the fitness function , which takes into account the flies' d dimensions: .
The pseudocode below represents one iteration of the algorithm:
for i = 1 : N flies
end for i
= arg min
for i = 1 : N and
|
https://en.wikipedia.org/wiki/Bookouture | Bookouture is a British digital publishing company. It was founded in 2012 by Oliver Rhodes, a former marketing controller for Harlequin/Mills & Boon. Bookouture is notable for growing its e-book sales dramatically, and for having several of its publications sell substantial numbers.
Bookouture made its first big successes in 2015, when it sold 2.5 million books, including Silent Scream by Angela Marsons, a crime novel featuring detective Kim Stone, and the thriller Secrets of The Last Nazi by Iain King. These were followed in 2016 by Robert Bryndza's The Girl in the Ice, its first book to sell a million copies. In 2017, it was acquired by Hachette, and in 2019 it sold 9 million books more than half of them in the United States.
In 2020, Bookouture launched the imprint Thread Books, with an initial group of five non-fiction books.
Bestselling authors
Angela Marsons
Lisa Regan
K.L. Slater
Kerry Fisher
Robert Bryndza
Kathryn Croft
Patricia Gibney
Shalini Boland
Suzanne Goldring
Jenny Hale
References
Publishing companies established in 2012
Small press publishing companies
Publishing companies
Online publishing |
https://en.wikipedia.org/wiki/List%20of%20human%20transcription%20factors | This list of manually curated human transcription factors is taken from Lambert, Jolma, Campitelli et al.
It was assembled by manual curation.
More detailed information is found in the manuscript and the web site accompanying the paper (Human Transcription Factors)
List of human transcription factors (1639)
References
Transcription factors
Biology-related lists |
https://en.wikipedia.org/wiki/Stephens%27%20constant | Stephens' constant expresses the density of certain subsets of the prime numbers. Let and be two multiplicatively independent integers, that is, except when both and equal zero. Consider the set of prime numbers such that evenly divides for some power . The density of the set relative to the set of all primes is a rational multiple of
Stephens' constant is closely related to the Artin constant that arises in the study of primitive roots.
See also
Euler product
Twin prime constant
References
Algebraic number theory
Infinite products |
https://en.wikipedia.org/wiki/Saphenofemoral%20junction | The sapheno-femoral junction (SFJ) is located at the saphenous opening within the groin and formed by the meeting of the great saphenous vein (GSV), common femoral vein and the superficial inguinal veins (confluens venosus subinguinalis). It is one of the distinctive points where a superficial vein meets a deep vein and at which incompetent valves may occur.
Structure
The SFJ can be located in the groin crease, or in a 3 × 3 cm region situated up to 4 cm to the side and up to 3cm below to the pubic tubercle. It is nearer to the pubic tubercle in younger and thinner subjects.
The GSV has two valves near the SFJ. One is a terminal valve about 1-2mm from the opening into the femoral vein and the other is about 2cm away.
References
Angiology
Anatomy
Veins |
https://en.wikipedia.org/wiki/Safety%20sign | Safety signs are a type of sign designed to warn of hazards, indicate mandatory actions or required use of Personal protective equipment, prohibit actions or objects, identify the location of firefighting or safety equipment, or marking of exit routes.
In addition to being encountered in industrial facilities; safety signs are also found in public places and communities, at electrical pylons and Electrical substations, cliffs, beaches, bodies of water, on motorized equipment, such as lawn mowers, and areas closed for construction or demolition.
History
In the United States
Early signs and ASA Z35.1
One of the earliest attempts to standardize safety signage in the United States was the
1914 Universal Safety Standards. The signs were fairly simple in nature, consisting of an illuminated board with "DANGER" in white letters on a red field. An arrow was added to draw attention to the danger if it was less obvious. Signs indicating exits, first aid kits consisted of a green board, with white letters. The goal with signs was to inform briefly.
The next major standards to follow were ASA Z35.1 in 1941, which later revised in 1967 and 1968.
The Occupational Safety and Health Administration devised their requirements from ASA Z35.1-1968 in the development of their rules, OSHA §1910.145 for the usage of safety signage
ANSI Z535
In the 1980s, American National Standards Institute formed a committee to update the Z53 and Z35 standards. In 1991, ANSI Z535 was introduced, which was intended to modernize signage through increased use of symbols, the introduction of a new header, 'Warning' and requiring that wording not just state the hazard, but also the possible harm the hazard could inflict and how to avoid the hazard. Until 2013, OSHA regulations technically required usage of signage prescribed in OSHA §1910.145, based on the standard ASA Z35.1-1968. Regulation changes and clarification of the law now allow usage of signs complying with either OSHA §1910.145 or ANSI Z535 |
https://en.wikipedia.org/wiki/Engineering%20%28journal%29 | Engineering is peer-reviewed open access academic journal of engineering launched in 2015 by the Chinese Academy of Engineering. It is published by Higher Education Press in China, while it is published by Elsevier internationally. The journal is edited by Raj Reddy (Carnegie Mellon University) and Ji Zhou (Chinese Academy of Engineering). The journal is indexed by Scopus and Science Citation Index Expanded.
References
External links
Engineering journals
Academic journals established in 2015 |
https://en.wikipedia.org/wiki/Silicone%20impregnated%20refractory%20ceramic%20ablator | Silicone Impregnated Refractory Ceramic Ablator, or SIRCA, is a lightweight ceramic ablative material, often used in thermal protection systems to protect parts of launch vehicles and spacecraft from very high temperature heat sources.
SIRCA was used for ceramic substrates on both the Viking spacecraft and the Space Shuttle, and was also used on the aeroshells for Mars Pathfinder and the Mars Exploration Rovers. It was developed at NASA Ames Research Center in the 1980s and 1990s.
Description
SIRCA typically has a density between and can handle a heat flux of up to
and is easily machined to custom shapes.
References
Spaceflight technology |
https://en.wikipedia.org/wiki/Georg%20N%C3%B6ldeke | Georg Nöldeke (born November 19, 1964) is an economist and currently serves as Professor of Economics at the University of Basel. His research interests focuses on microeconomic theory, game theory, and social evolution. In 2007, Georg Nöldeke's contributions to economics of information - in particular on the communication within financial markets - as well as to game theory and contract theory were awarded the Gossen Prize by the German Economic Association.
Biography
After having spent his undergraduate studies at the University of Bonn and at the University of California, Berkeley, Georg Nöldeke earned a diploma in economics from the University of Bonn in 1988. In 1992, after graduate studies at the University of Bonn and at the London School of Economics, he further earned a Ph.D. from the former while simultaneously working there as a teaching and research assistant (1989–92). Following his studies, he became an assistant professor of economics at Princeton University (1992–94) before returning to Bonn in 1994, where he took up the position of an associate professor. Three years later, Nöldeke moved to the University of Basel, where he was made professor of economics (1997–99) and directed the university's graduate studies in economics, before taking up the same position at the University of Bonn two years later (1999-2006). During his tenure at Bonn, he also served as co-director of graduate studies, chairman of the Department of Economics, and Dean of the Faculty of Law and Economics. Finally, having returned to Switzerland, he has been a professor of economics at the University of Basel since 2006. However, Nöldeke has also held in parallel many visiting appointments, e.g. at Yale University, Yale-NUS College, University of Toulouse, University of Zurich, University of Munich, and Tel Aviv University.
At the University of Basel, Georg Nöldeke is the founder of the Bernoulli Network for the Behavioral Sciences. He also is affiliated with the German Econom |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.