source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Correspondence%20%28algebraic%20geometry%29 | In algebraic geometry, a correspondence between algebraic varieties V and W is a subset R of V×W, that is closed in the Zariski topology. In set theory, a subset of a Cartesian product of two sets is called a binary relation or correspondence; thus, a correspondence here is a relation that is defined by algebraic equations. There are some important examples, even when V and W are algebraic curves: for example the Hecke operators of modular form theory may be considered as correspondences of modular curves.
However, the definition of a correspondence in algebraic geometry is not completely standard. For instance, Fulton, in his book on intersection theory, uses the definition above. In literature, however, a correspondence from a variety X to a variety Y is often taken to be a subset Z of X×Y such that Z is finite and surjective over each component of X. Note the asymmetry in this latter definition; which talks about a correspondence from X to Y rather than a correspondence between X and Y. The typical example of the latter kind of correspondence is the graph of a function f:X→Y. Correspondences also play an important role in the construction of motives (cf. presheaf with transfers).
See also
Adequate equivalence relation
References
Algebraic geometry |
https://en.wikipedia.org/wiki/Range%20offset | In geology, range offset is the time difference between the last fossil occurrence of a taxon and the actual disappearance of this taxon. Range offset can be used as a measure of biostratigraphic precision and determines among others how much information about extinctions can be derived from fossil occurrences.
Definition
The range offset of a taxon is defined as
the time span between the moment in which the highest stratigraphic occurrence of said taxon was deposited and the moment in which the taxon disappeared from the locality or area and/or
the time span between the moment the taxon appears for the first time in the locality or area and the moment in which the lowest stratigraphic occurrence of said taxon was deposited.
Effects of sequence stratigraphy
Range offset is strongly affected by sequence stratigraphy. Simulations show that range offset changes by up to three orders of magnitude dependent on the position in the systems tracts.
References
Biostratigraphy
Paleobiology
Sequence stratigraphy |
https://en.wikipedia.org/wiki/Data%20management%20platform | A data management platform (DMP) is a software platform used for collecting and managing data. They allow businesses to identify audience segments, which can be used to target specific users and contexts in online advertising campaigns. DMPs may use big data and artificial intelligence algorithms to process and analyze large data sets about users from various sources. Some advantages of using DMPs include data organization, increased insight on audiences and markets, and effective advertisement budgeting. On the other hand, DMPs often have to deal with privacy concerns due to the integration of third-party software with private data. This technology is continuously being developed by global entities such as Nielsen and Oracle.
More generally, the term data platform can refer to any software platform used for collecting and managing data. It is an integrated solution which as of the 2010s can combine functionalities of for example a data lake, data warehouse or data hub for business intelligence purposes. However, this article discusses the use such technology platforms used for collecting and managing data for digital marketing purposes specifically.
Characteristics
Purpose
A DMP is any kind of software that manages the gathering, storage, and organization of data so that useful information can be leveraged from it by marketers, publishers, and other businesses. The data stored may include customer information, demographics, and mobile identifiers or cookie IDs, which the DMP will analyze to allow businesses to create targeting segments for advertisements. DMPs can help brands learn more about their customer segments to inform acquisitions strategies and increase their sales. They also allow businesses to gauge the effectiveness of their advertising campaigns.
History
First and second generation programming languages
During the 1950s, data management became a problem for companies as computers were not quick with computations and needed a great amount of labo |
https://en.wikipedia.org/wiki/Crystallographic%20disorder | In X-ray crystallography, crystallographic disorder describes the cocrystallization of more than one rotamer, conformer, or isomer where the center of mass of each form is identical or unresolvable. As a consequence of disorder, the crystallographic solution is the sum of the various forms. In many cases, the components of the disorder are equally abundant, and, in other cases, the weighting coefficients for each component differ. Disorder can entail a pair or several components, and usually arises when the forms are nearly equal in energy and the crystal lattice is sufficiently spacious to accommodate the various components.
References
Crystallography
Materials science
Protein structure
Protein methods
Protein imaging
Synchrotron-related techniques |
https://en.wikipedia.org/wiki/WebAuthn | Web Authentication (WebAuthn) is a web standard published by the World Wide Web Consortium (W3C). WebAuthn is a core component of the FIDO2 Project under the guidance of the FIDO Alliance. The goal of the project is to standardize an interface for authenticating users to web-based applications and services using public-key cryptography.
On the client side, support for WebAuthn can be implemented in a variety of ways. The underlying cryptographic operations are performed by an authenticator, which is an abstract functional model that is mostly agnostic with respect to how the key material is managed. This makes it possible to implement support for WebAuthn purely in software, making use of a processor's trusted execution environment or a Trusted Platform Module (TPM). Sensitive cryptographic operations can also be offloaded to a roaming hardware authenticator that can in turn be accessed via USB, Bluetooth Low Energy, or near-field communications (NFC). A roaming hardware authenticator conforms to the FIDO Client to Authenticator Protocol (CTAP), making WebAuthn effectively backward compatible with the FIDO Universal 2nd Factor (U2F) standard.
Similar to legacy U2F, Web Authentication is resilient to verifier impersonation; that is, it is resistant to phishing attacks, but unlike U2F, WebAuthn does not require a traditional password. Moreover, a roaming hardware authenticator is resistant to malware since the private key material is at no time accessible to software running on the host machine.
The WebAuthn Level 1 and 2 standards were published as W3C Recommendations on 4 March 2019 and 8 April 2021 respectively. A Level 3 specification is currently a First Public Working Draft (FPWD).
Background
FIDO2 is the successor to FIDO Universal 2nd Factor (U2F). Whereas U2F only supports multi-factor mode, having been designed to strengthen existing username/password-based login flows, FIDO2 adds support for single-factor mode. In single-factor mode, the authenticator |
https://en.wikipedia.org/wiki/Paraheliotropism | Paraheliotropism refers to the phenomenon in which plants orient their leaves parallel to incoming rays of light, usually as a means of minimizing excess light absorption. Excess light absorption can cause a variety of physiological problems for plants, including overheating, dehydration, loss of turgor, photoinhibition, photo-oxidation, and photorespiration, so paraheliotropism can be viewed as an advantageous behavior in high light environments. Not all plants exhibit this behavior, but it has developed in multiple lineages (e.g., both Styrax camporum and Phaseolus vulgaris exhibit paraheliotropic movement).
Physiological basis
While all mechanistic aspects of this behavior have yet to be elucidated (e.g., evidence indicates differential gene expression is involved, but the specifics have yet to be determined), many of the physiological aspects of paraheliotropic movement, at least in Phaseolus vulgaris (the common bean), are well understood. In this plant, daily leaf movements are influenced by two main factors: an endogenous circadian oscillator and light-induced signals. Physically, the movement is carried out by turgor-dependent changes in the volume of cortical parenchyma cells (called motor cells) in a turgor-sensitive part of the plant called the pulvinus, located at the juncture of the leaf base and the petiole. The cumulative effect of volume-changes in these motor cells manifests itself on the tissue/organ level as a swelling or shrinking of one or both sides of the pulvinus, which results in the reorientation of the adjacent leaf. Potassium and chloride have been shown to be the major osmolytes involved in the process, and plasma membrane-located proton pumps and ion transporters have been shown to play a critical role in creating osmotic potential. The hormones IAA and ABA are also involved in the process and play antagonistic roles, with IAA inducing pulvinar swelling and ABA inducing pulvinar shrinking. Blue light has also been shown to induce rapi |
https://en.wikipedia.org/wiki/Credential%20Management | Credential Management, also referred to as a Credential Management System (CMS), is an established form of software that is used for issuing and managing credentials as part of public key infrastructure (PKI).
CMS software is used by governments and enterprises issuing strong two-factor authentication (2FA) to employees and citizens. The CMS integrates with the components of PKI to provide one joined-up solution for IT departments to issue and manage credentials to a wide selection of devices, including smart cards, USB keys, smartphones, laptops and desktop computers.
Credential Management is also a proposed application programming interface (API) under development by the World Wide Web Consortium for standardizing aspects of how password managers used by web user agents (web browsers and other applications) create, store, use, and modify username and password combinations for logins, in addition to the management of "federated" credentials (such as single sign-on tokens) by user agents. The API is being developed by the W3C's Web Application Security Working Group, and has been in Working Draft status since April 2016. It is a Recommendation-track proposal, expected to become an accepted standard, but may undergo significant changes before that occurs. The Credential Management API has already been extended by the WebAuthn (Web Authentication) proposal, which reached Candidate Recommendation status in April 2018 and adds the ability to handle public-key authentication.
It is common for modern web browsers to be able store and automatically enter usernames and passwords for website logins, though they have often used suboptimal heuristics for guessing which form fields and data are supposed to be filled/stored, resulting in inconsistent and sometimes faulty behavior. Browsers can also have trouble filling in login forms for federated identities, such as when a user connecting to a website uses an account for a third-party web service (like Facebook, Google, or |
https://en.wikipedia.org/wiki/Proton%20VPN | Proton VPN is a VPN service operated by the Swiss company Proton AG, the company behind the email service Proton Mail. According to its official website, Proton VPN and Proton Mail share the same management team, offices, and technical resources, and are operated from Proton's headquarters in Plan-les-Ouates, Switzerland.
Features
As of 16 May 2023, Proton VPN has a total of 2,914 servers, sited in 67 different nations.
Although ProtonVPN owns and operates a portion of their servers, the bulk majority are owned and operated by ASNs such as M247 and Datacamp Limited. Its service is available for Windows, MacOS, Linux, Android, and iOS, ChromeOS and also has a command-line tool for Linux and can be implemented using the IPSEC protocol. Proton VPN can also be installed on a Wireless Router.
Proton VPN utilizes OpenVPN (UDP/TCP), IKEv2, and WireGuard protocols with AES-256 encryption. On October 11, 2022, Proton VPN released their Stealth Protocol, designed to disguise VPN traffic as HTTPS traffic.
Proton VPN has a no-logs policy that has been independently audited by Securitum, a European security auditing company.
In January 2020, Proton VPN released its source code on all platforms and had SEC Consult conduct an independent security audit.
Reception
In a January 2023 review by TechRadar, Proton VPN received 4 1/2 out of 5 stars.
A May 2023 PC Magazine review gave Proton VPN a 5 star rating. Proton VPN was awarded their Editor's Choice Award in 2022.
See also
Comparison of virtual private network services
Internet privacy
Encryption
Secure communication
References
Internet privacy
Virtual private network services
Free and open-source Android software |
https://en.wikipedia.org/wiki/William%20Webster%20%28chemical%20engineer%29 | William Webster (1855-1910) was an English chemical engineer credited with developments in gas detection, sewage treatment and medical use of x-rays. A gifted artist and musician, Webster also helped found the Blackheath Concert Halls and the adjacent Conservatoire in Blackheath in south-east London during the 1890s.
Career
Webster was the son of William Webster, a successful building contractor who grew wealthy from constructing major civil engineering and building projects in London. The family lived from 1869 in Wyberton House in Lee Terrace, Blackheath.
The younger William Webster trained as a chemical engineer. A fellow of the Chemical Society, he patented a system to detect hydrogenous gases in mines in 1876, and later developed a system for the electrolytic purification of sewage (patent application filed on 22 December 1887; US patent awarded on 19 February 1889), trialled in 1888 at the Crossness Southern Outfall works which had been built by his father's firm in the 1860s.
Webster was also a pioneer in x-ray research and a founder member of the Röntgen Society (since 1927 part of the British Institute of Radiology), assisting surgeon Thomas Moore in producing radiographs in 1896, after which Moore set up an x-ray unit at the Miller General Hospital in Greenwich High Road. Webster is also believed to be the first person to experience radiation 'sunburn', suffered on his right hand. He wrote a letter on the subject of x-ray photography published in the journal Nature in 1897.
Webster was an accomplished violinist, singer, and artist - his paintings were exhibited in the Summer Exhibition at the Royal Academy. In 1881 local residents formed the Blackheath Conservatoire of Music, and Webster founded the company which funded the building of a concert hall, today Blackheath Halls, and its neighbouring schools for art and music, the Blackheath Conservatoire. The Conservatoire of Music opened in 1896 and the School of Art in 1897.
References
Chemical engine |
https://en.wikipedia.org/wiki/Tropical%20cryptography | In tropical analysis, tropical cryptography refers to the study of a class of cryptographic protocols built upon tropical algebras. In many cases, tropical cryptographic schemes have arisen from adapting classical (non-tropical) schemes to instead rely on tropical algebras. The case for the use of tropical algebras in cryptography rests on at least two key features of tropical mathematics: in the tropical world, there is no classical multiplication (a computationally expensive operation), and the problem of solving systems of tropical polynomial equations has been shown to be NP-hard.
Basic Definitions
The key mathematical object at the heart of tropical cryptography is the tropical semiring (also known as the min-plus algebra), or a generalization thereof. The operations are defined as follows for :
It is easily verified that with as the additive identity, these binary operations on form a semiring.
References
Cryptography
Tropical geometry |
https://en.wikipedia.org/wiki/Laura%20Taalman | Laura Anne Taalman, also known as mathgrrl, is an American mathematician known for her work on the mathematics of Sudoku and for her mathematical 3D printing models. Her mathematical research concerns knot theory and singular algebraic geometry; she is a professor of mathematics at James Madison University.
Life
Taalman earned a bachelor's degree in mathematics from the University of Chicago in 1994. She completed her Ph.D. at Duke University in 2000; her dissertation, Monomial Generators for the Nash Sheaf of a Complete Resolution, was supervised by William L. Pardon. On finishing her doctorate, she joined the James Madison faculty; she has also worked as the mathematician-in-residence at the National Museum of Mathematics in 2014–2015.
3d printing
In 2013–2014, after becoming head of the 3d printing lab at James Madison University, Taalman set out on a project of printing one 3d model per day. Her models have included subjects from mathematics including knots, fractals, and snap-together polyhedra.
Books
With Peter Kohn, Taalman is the author of a textbook Calculus. She is also the author of a different text, Calculus I with Integrated Precalculus.
With Jason Rosenhouse (also a mathematics professor at James Madison University) she is the author of Taking Sudoku Seriously: The Mathematics Behind the World’s Most Popular Pencil Puzzle. She has also written a series of Sudoku puzzle books with Philip Riley.
Awards and honors
Taalman won the Trevor Evans Award of the Mathematical Association of America in 2003 for her work with Eugénie Hunsicker on the mathematics of modular architecture.
In 2005, Taalman won the Henry L. Alder Award for Distinguished
Teaching by a Beginning College or
University Mathematics Faculty Member, given by the Mathematical Association of America.
Her book Taking Sudoku Seriously was the 2012 winner of the PROSE Awards in the popular science and popular mathematics category.
References
External links
Home page
Year of birth missi |
https://en.wikipedia.org/wiki/Prospects%20Course%20Exchange | Prospects Course Exchange is a system that manages XCRI-CAP feeds, enabling course data from higher education providers to be visible through Prospects' postgraduate course search.
It is run and operated by Graduate Prospects.
Prospects Course Check is a free course validation checker also provided by the service.
See also
XCRI
References
External links
Official site
Official site
Debugging
Education in Manchester
Educational charities based in the United Kingdom
Graduate recruitment
Higher education organisations based in the United Kingdom
Information technology organisations based in the United Kingdom
Organisations based in Manchester
Postgraduate education |
https://en.wikipedia.org/wiki/Polysiphonous | Polysiphonous describes an algal branch with axial cells each surrounded by cells of the same length as the axial cells.
See also
Monosiphonous algae
References
Algae
Seaweeds |
https://en.wikipedia.org/wiki/Binomial%20process | A binomial process is a special point process in probability theory.
Definition
Let be a probability distribution and be a fixed natural number. Let be i.i.d. random variables with distribution , so for all .
Then the binomial process based on n and P is the random measure
where
Properties
Name
The name of a binomial process is derived from the fact that for all measurable sets the random variable follows a binomial distribution with parameters and :
Laplace-transform
The Laplace transform of a binomial process is given by
for all positive measurable functions .
Intensity measure
The intensity measure of a binomial process is given by
Generalizations
A generalization of binomial processes are mixed binomial processes. In these point processes, the number of points is not deterministic like it is with binomial processes, but is determined by a random variable . Therefore mixed binomial processes conditioned on are binomial process based on and .
Literature
Point processes |
https://en.wikipedia.org/wiki/2800%20Polar%20Way | 2800 Polar Way is a cold storage facility located in Richland, Washington, United States, where it dominates the northern landscape. It is both the largest refrigerated warehouse and the largest automated freezer on Earth.
Holliday Fenoglio Fowler (HFF) financed the build-to-suit refrigerated warehouse for tenant Preferred Freezer Services. The project broke ground on May 12, 2014, and opened in late July 2015.
In 2016, HHF sold the property to Lexington Realty Trust, an S&P 600 REIT company. In 2019, Lineage Logistics acquired Preferred Freezer, and continues to operate the facility.
Capacity
The warehouse has an area of —of which is refrigerated—and a volume of . The facility is capable of storing about of frozen food. 2800 Polar Way is the largest refrigerated building on earth by usable volume.
In 2019, the company purchased an additional lot to expand facilities by one third.
References
External links
Lineage Logistics website
Richland, Washington
Food preservation
Cool warehouses
Warehouses in the United States |
https://en.wikipedia.org/wiki/Elephant%20Butte%20Irrigation%20District | The Elephant Butte Irrigation District is a historic district in New Mexico and Texas which was listed on the National Register of Historic Places in 1997. The listing included three contributing buildings and 214 contributing structures, in Doña Ana County, New Mexico, Sierra County, New Mexico and El Paso County, Texas.
It preserves portions of the Rio Grande Project, a U.S. Bureau of Reclamation project which distributes water of the upper Rio Grande River.
It is in the area of Las Cruces, New Mexico. The district runs roughly along U.S. Route 85 between its junction with New Mexico State Road 90 and the El Paso, Texas city limits.
See also
Farm and Ranch Heritage Museum, Las Cruces.
References
Irrigation districts
Irrigation projects
Buildings and structures completed in 1906
National Register of Historic Places in Doña Ana County, New Mexico
National Register of Historic Places in Sierra County, New Mexico
National Register of Historic Places in El Paso County, Texas
1906 establishments in the United States |
https://en.wikipedia.org/wiki/Wide-area%20motion%20imagery | Wide-area motion imagery (WAMI) is an approach to surveillance, reconnaissance, and intelligence-gathering that employs specialized software and a powerful camera system—usually airborne, and for extended periods of time—to detect and track hundreds of people and vehicles moving out in the open, over a city-sized area, kilometers in diameter. For this reason, WAMI is sometimes referred to as wide-area persistent surveillance (WAPS) or wide-area airborne surveillance (WAAS).
A WAMI sensor images the entirety of its coverage area in real time. It also records and archives that imagery in a database for real-time and forensic analysis. WAMI operators can use this live and recorded imagery to spot activity otherwise missed by standard video cameras with narrower fields of view, analyze these activities in context, distinguish threats from normal patterns of behavior, and perform the work of a larger force.
Military and security personnel are the typical users of WAMI, employing the technology for such missions as force protection, base security, route reconnaissance, border security, counter-terrorism, and event security. However, WAMI systems can also be used for disaster response, traffic pattern analysis, wildlife protection, and law enforcement.
Capabilities and enabling technologies
The typical WAMI sensor produces imagery at an update rate of 1 Hz or faster from one or more multiple megapixel cameras. The system then seamlessly stitches together the collected images and applies algorithms to geo-register them, ensuring that the sensor picture represents ground truth.
As far as resolution goes, WAMI systems usually have a 0.5 meter ground sample distance (GSD)—enough to detect and track moving targets throughout the scene. Should a user need to take a closer look at a subject, the WAMI system can cue other available sensors, such as hi-res full-motion video cameras, to make the identification.
Users can select different video streams pulled from the WAMI syste |
https://en.wikipedia.org/wiki/High-voltage%20transformer%20fire%20barriers | High-voltage transformer fire barriers, also known as transformer firewalls, transformer ballistic firewalls, or transformer blast walls, are outdoor countermeasures against a fire or exposion involving a single transformer from damaging adjacent transformers. These barriers compartmentalize transformer fires and explosions involving combustible transformer oil.
High-voltage transformer fire barriers are typically located in electrical substations, but may also be attached to buildings, such as valve halls or manufacturing plants with large electrical distribution systems, such as pulp and paper mills. Outdoor transformer fire barriers that are attached at least on one side to a building are referred to as wing walls.
Voluntary recommendations by NFPA 850
The primary North American document that deals with outdoor high-voltage transformer fire barriers is NFPA 850. NFPA 850 outlines that outdoor oil-insulated transformers should be separated from adjacent structures and from each other by firewalls, spatial separation, or other approved means for the purpose of limiting the damage and potential spread of fire from a transformer failure.
Automatic fire suppression systems
Instead of a passive barrier, fire protection water spray systems are sometimes used to cool a transformer to prevent damage if exposed to radiation heat transfer from a fire involving oil released from another transformer that has failed.
Transformer Fast Depressurization Systems (FDS)
Mechanical systems designed to quickly depressurize the transformer oil tank after the occurrence of an electrical fault can minimize the chance that a transformer tank will rupture given a minor fault, but are not effective on major internal faults.
Alternatives to mineral-based transformer oil
Transformer oil is available in with sufficiently low combustibility that a fire will not continue after an internal electrical fault. These fluids include those approved by FM Global. FM Data Sheet 5-4 indicates diff |
https://en.wikipedia.org/wiki/Simple%20point%20process | A simple point process is a special type of point process in probability theory. In simple point processes, every point is assigned the weight one.
Definition
Let be a locally compact second countable Hausdorff space and let be its Borel -algebra. A point process , interpreted as random measure on , is called a simple point process if it can be written as
for an index set and random elements which are almost everywhere pairwise distinct. Here denotes the Dirac measure on the point .
Examples
Simple point processes include many important classes of point processes such as Poisson processes, Cox processes and binomial processes.
Uniqueness
If is a generating ring of then a simple point process is uniquely determined by its values on the sets . This means that two simple point processes and have the same distributions iff
Literature
Point processes |
https://en.wikipedia.org/wiki/Internal%20working%20model%20of%20attachment | Internal working model of attachment is a psychological approach that attempts to describe the development of mental representations, specifically the worthiness of the self and expectations of others' reactions to the self. This model is a result of interactions with primary caregivers which become internalized, and is therefore an automatic process. John Bowlby implemented this model in his attachment theory in order to explain how infants act in accordance with these mental representations. It is an important aspect of general attachment theory.
Such internal working models guide future behavior as they generate expectations of how attachment figures will respond to one's behavior. For example, a parent rejecting the child's need for care conveys that close relationships should be avoided in general, resulting in maladaptive attachment styles.
Influences
The most influential figure for the idea of the internal working model of attachment is Bowlby, who laid the groundwork for the concept in the 1960s. He was inspired by both psychoanalysis, especially object relations theory, and more recent research into ethology, evolution and information-processing.
In psychoanalytic theory, there has been the idea of an inner or representational world (proposed by Freud) as well as the internalization of relationships (Fairbairn, Winnicott). According to Freud first schemata evolve out of experiences regarding need fulfilment via the attachment figure. He argued that the resulting mental representation is an internal copy of the external world made up from memories, and thinking serves the role of experimental action. Fairbairn and Winnicott proposed that these early patterns of relationships become internalized and govern future relationships.
However, the ethological-evolutionary aspects of the theory received more attention. Bowlby was interested in separation distress, and bonding in animals. He noticed that many infant behaviours are organized around the goal of mai |
https://en.wikipedia.org/wiki/NB-Fi | NB-Fi Protocol is an open LPWAN protocol, which operates in unlicensed ISM radio band. Using the NB-Fi Protocol in devices allows data transmission range of up to 10 km in dense urban conditions, and up to 30 km in rural areas with up to 10 years on battery power.
NB-Fi Protocol is developed by WAVIoT.
Technology
NB-Fi Protocol employs a Narrow Band technology that enables communication using the Industrial, Scientific and Medical ISM radio band (and in other parts of sub-GHz license-free spectrum as well).
NB-Fi devices could be manufactured using widespread electronic components which could easily be manufactured or purchased in every particular country. WAVIoT has developed an NB-Fi transceiver that encapsulates the NB-Fi protocol at a physical layer.
The NB-Fi transceiver supports 430–500 MHz and 860–925 MHz frequency bands at 50 to 25,600 bit/s data rates.
The network is based on one-hop star topology and requires a SDR-technology base stations to operate. The signal can also be used to easily cover large areas and to reach underground objects.
Implementation
NB-Fi Protocol stack is currently implemented on:
STM32L0x/STM32L4x Series microcontrollers (manufacturer: STMicroelectronics) with NB-Fi transceiver (manufacturer: WAVIoT) or AX5043 transceiver (manufacturer: ON Semiconductor);
AX8052F143 with AX8052 MCU and AX5043 RF transceiver (manufacturer: ON Semiconductor).
References
Wireless networking |
https://en.wikipedia.org/wiki/Plant%20genome%20assembly | A plant genome assembly represents the complete genomic sequence of a plant species, which is assembled into chromosomes and other organelles by using DNA (deoxyribonucleic acid) fragments that are obtained from different types of sequencing technology.
Structure
The genome of plants can vary in their structure and complexity from small genomes like green algae (15 Mbp). to very large and complex genomes that have typically much higher ploidy, higher rates of heterozygosity and repetitive elements than species from other kingdoms. One of the most complex plant genome assemblies available is that of loblolly pine (22 Gbp). Due to their complexity, the plants’ genome sequences can't be assembled back into chromosomes using only short reads provided by next-generation- sequencing technologies (NGS), and therefore most plant genome assemblies available that used NGS alone are highly fragmented, contain large numbers of contigs, and genome regions are not finished. Highly repetitive sequences, often larger than 10kbp, are the main challenge in plants. Most of the chromosomal sequences are produced by the activity of mobile genetic elements (MGEs) in the plant genomes. MGEs are divided into two classes: class I or retrotransposons, and class II or DNA transposons. In plants, long- terminal repeat (LTR) retrotransposons are predominant and constitute from 15% to 90% of the genome. Polyploidy is another challenge in assembling a plant genome, and it is estimated that ~80% of plants are polyploids.
Assemblies
The first complete plant genome assembly, that of Arabidopsis thaliana, was finished in 2000, being the third multicellular eukaryotic genome published after C. elegans and D. melanogaster. Arabidopsis, unlike other plants’ genomes (e.g. Malus) has convenient traits, such as a small nuclear genome (135Mbp) and a short generation time (8 weeks from seed to seed). The genome has five chromosomes reflecting approximately 4% of the human genome size. The genome was sequ |
https://en.wikipedia.org/wiki/Sylvie%20Corteel | Sylvie Corteel is a French mathematician at the Centre national de la recherche scientifique and Paris Diderot University and the University of California, Berkeley, who was an editor-in-chief of the Journal of Combinatorial Theory, Series A. Her research concerns the enumerative combinatorics and algebraic combinatorics of permutations, tableaux, and partitions.
Education and career
After earning an engineering degree in 1996 from the University of Technology of Compiègne, Corteel worked with Carla Savage at North Carolina State University, where she earned a master's degree in 1997. She completed her Ph.D. in 2000 at the University of Paris-Sud under the supervision of Dominique Gouyou-Beauchamps, and earned a habilitation in 2010 at Paris Diderot University.
She worked as a maitresse de conférences and then as a CNRS chargée de recherche at the Versailles Saint-Quentin-en-Yvelines University from 2000 to 2005, also doing postdoctoral studies at the Université du Québec à Montréal in 2001. From 2005 to 2009 she was associated with the University of Paris-Sud, and in 2009 she moved to Paris Diderot, where in 2010 she became a director of research. Since 2017 she has been a Visiting Miller Professor at the University of California, Berkeley. She was named MSRI Simons Professor for 2017-2018.
Along with colleagues O. Mandelshtam and L. Williams, in 2018 Corteel developed a new characterization of both symmetric and nonsymmetric Macdonald polynomials using the combinatorial exclusion process.
Selected publications
References
External links
Home page
Year of birth missing (living people)
Living people
French mathematicians
Women mathematicians
North Carolina State University alumni
Combinatorialists |
https://en.wikipedia.org/wiki/Rclone | Rclone is an open source, multi threaded, command line computer program to manage or migrate content on cloud and other high latency storage. Its capabilities include sync, transfer, crypt, cache, union, compress and mount. The rclone website lists supported backends including S3 and Google Drive.
Descriptions of rclone often carry the strapline Rclone syncs your files to cloud storage. Those prior to 2020 include the alternative Rsync for Cloud Storage.
Rclone is well known for its rclone sync and rclone mount commands. It provides further management functions analogous to those ordinarily used for files on local disks, but which tolerate some intermittent and unreliable service. Rclone is commonly used with media servers such as Plex, Emby or Jellyfin to stream content direct from consumer file storage services.
Official Ubuntu, Debian, Fedora, Gentoo, Arch, Brew, Chocolatey, and other package managers include rclone.
Rclone may also refer to an R library used to analyse individual and population genetics of partially clonal species.
History
Nick Craig-Wood was inspired by rsync. Concerns about the noise and power costs arising from home computer servers prompted him to embrace cloud storage and he began developing rclone as open source software in 2012 under the name swiftsync.
Rclone was promoted to stable version 1.00 in July 2014.
In May 2017, Amazon Drive barred new users of rclone and other upload utilities, citing security concerns. Amazon Drive had been advertised as offering unlimited storage for £55 per year. Amazon's AWS S3 service continues to support new rclone users.
The original rclone logo was updated in September 2018.
In March 2020, Nick Craig-Wood resigned from Memset Ltd, a cloud hosting company he founded, to focus on open source software.
Amazon's AWS April 2020 public sector blog explained how the Fred Hutch Cancer Research Center were using rclone in their Motuz tool to migrate very large biomedical research datasets in and out o |
https://en.wikipedia.org/wiki/This%20Is%20My%20Earth | This is My Earth (TiME) is a non-profit organization dedicated to preserving biodiversity by using crowdsourcing to purchase lands in biodiversity hotspots.
TiME was established in 2015 by Prof. Uri Shanas of the University of Haifa at Oranim, who continues to act as TiME's CEO. The organization is advised by an international team of scientists and environmental activists.
TiME functions as a democracy in which every member, regardless of the amount of their donation, has an equal vote to determine which of the scientifically vetted conservation projects proposed each year is allocated the annual crowdfunded grant.
The organization's goal is to preserve biodiversity hotspots and to curb the Sixth Extinction, which is mainly caused by human activity.
History
TiME was founded in 2015 by Professor Uri Shanas, who was soon thereafter joined by Professor Alon Tal of Tel Aviv University to co-lead the organization. Both are noted scholars and environmental activists. TiME capitalized on the rise in popularity of crowdfunding and the increasing internet access worldwide to found an organization in which even small donors can take an active role to protect biodiversity. TiME raised US$35,515 on Indiegogo by August 13, 2015; 819 people from over 40 countries donated. This initial seed money was used to
establish a basic organizational infrastructure, register as a non-profit, expand the Scientific Advisory Committee, set up an active Facebook page, and build a website. In its first year, TiME had over one thousand members.
Over its first seven years, with the support of its generous members, This is My Earth successfully purchased eight plots of land in biodiversity hotspots for conservation. Its first land purchase, in 2016, was in the El Toro forest, Peru, which lies at the heart of the Tropical Andes Biodiversity Hotspot.
TiME transferred it to Mr. Isidoro Lozano, a community member of Yambrasbamba Campesino Community in La Esperanza, who works in conjunction wit |
https://en.wikipedia.org/wiki/Stablecoin | A stablecoin is a type of cryptocurrency where the value of the digital asset is supposed to be pegged to a reference asset, which is either fiat money, exchange-traded commodities (such as precious metals or industrial metals), or another cryptocurrency.
In theory, 1:1 backing by a reference asset could make a stablecoin value track the value of the peg and not be subject to the radical changes in value common in the market for many digital assets. In practice, however, stablecoin issuers have yet to be proven to maintain adequate reserves to support a stable value and there have been a number of failures with investors losing the entirety of the (fiat currency) value of their holdings.
Background
Stablecoins have several purported purposes. They can be used for payments and are more likely to retain value than highly volatile cryptocurrencies. In practice, many stablecoins have failed to retain their "stable" value.
Stablecoins are typically non-interest bearing and therefore do not provide interest returns to the holder.
Reserve-backed stablecoins
Reserve-backed stablecoins are digital assets that are stabilized by other assets. Furthermore, such coins, assuming they are managed in good faith and have a mechanism for redeeming the asset(s) backing them, are unlikely to drop below the value of the underlying physical asset, due to arbitrage. However, in practice, few, if any, stablecoins meet these assumptions.
Backed stablecoins are subject to the same volatility and risk associated with the backing asset. If the backed stablecoin is backed in a decentralized manner, they are relatively safe from predation, but if there is a central vault, it may be robbed or suffer loss of confidence.
Fiat-backed
The value of stablecoins of this type is based on the value of the backing currency, which is held by a third party–regulated financial entity. Fiat-backed stablecoins can be traded on exchanges and are redeemable from the issuer. The stability of the stablecoin |
https://en.wikipedia.org/wiki/Dell%20Inspiron%20All-in-One | This is a list of Dell Inspiron All-in-One computers.
Ones
List of Dell Inspiron Ones
Insprion One 19
Inspiron One 19 Touch
Inspiron One 2020
Inspiron One 2205
Inspiron One 2305
Inspiron One 2310
Inspiron One 2320
Inspiron One 2330
Comparison of Dell Inspiron Ones
3000 Series
Inspiron 20 3000 All-in-One Desktop (3043)
Inspiron 20 3000 All-in-One (3052)
Inspiron 20 3000 All-in-One (3059)
Inspiron 20 3000 All-in-One (3064). Features 7th Generation Intel Core i3-7100U processor, 4GB of memory, a 1TB 5400rpm hard drive and Intel HD Graphics 620 with shared graphics memory.
Inspiron 24 3000 All-in-One (3459)
Inspiron 24 3000 All-in-One (AMD) (3455)
5000 Series
Inspiron 24 5000 All-in-One (5459)
7000 Series
Inspiron 23 7000 All-in-One Touch Screen Desktop (2350)
Inspiron 24 7000 All-in-One (7459)
References
Dell products
All-in-one desktop computers |
https://en.wikipedia.org/wiki/Katalon%20Studio | Katalon Platform is an automation testing software tool developed by Katalon, Inc. The software is built on top of the open-source automation frameworks Selenium, Appium with a specialized IDE interface for web, API, mobile and desktop application testing. Its initial release for internal use was in January 2015. Its first public release was in September 2016. In 2018, the software acquired 9% of market penetration for UI test automation, according to The State of Testing 2018 Report by SmartBear.
Katalon is recognized as a March 2019 and March 2020 Gartner Peer Insights Customers’ Choice for Software Test Automation.
Platform
Katalon Platform provides a dual interchangeable interface for creating test cases: a manual view for the less technical users and a script view gearing toward experienced testers to author automation tests with syntax highlight and intelligent code completion.
Katalon Platform follows the Page Object Model pattern. GUI elements on web, mobile, and desktop apps can be captured using the recording utility and stored into the Object Repository, which is accessible and reusable across different test cases.
Test cases can be structured using test suites with environment variables. Test execution can be parameterized and parallelized using profiles.
Remote execution in Katalon Platform can be triggered by CI systems via Docker container or command line interface (CLI).
From version 7.4.0, users are able to execute test cases from Selenium projects, along with the previous migration from TestNG and JUnit to Katalon Platform.
In version 7.8, users can save team effort while debugging with smart troubleshooting approaches offered via highlight features: Time Capsule, Browser-based Video Recorder, Self-healing and Test Failure Snapshots.
Provided in the latest version 8.4.0 is the native integration with Azure DevOps (ADO) which enables users to easily map test cases in Azure DevOps to automated test cases in Katalon Platform. Additionally, th |
https://en.wikipedia.org/wiki/List%20of%20electronic%20Floras | This list of electronic Floras is arranged by country within continent. An electronic Flora is an online resource which provides descriptions of the associated plants, often also providing identification keys, or partial identification keys, to the plants described. Some Floras point to the literature associated with the plants of the region (flora Malesiana), others seek to show the plants of a region using images (flora of India), others give an inventory of the region's plants (flora of Pakistan).
Countries with sites listing both flora and fauna have also been included, since the sites provide a useful resource for those seeking to use a Flora.
World (families/genera)
Wattles Worldwide Wattle.
Pl@ntNet – plant database, species identifications, observations, photograph, citizen science project
Africa
Base de données des plantes d'Afrique. CJB Conservatoire et Jardin botaniques de la Ville de Genève.
Botswana
Flora of Botswana
Egypt
Common Plants of Western Desert of Egypt
Eswatini
Eswatini's Flora Database Eswatini National Trust Commission
Malawi
Flora of Malawi
Morocco
Flore du Maroc (only Pteridophytes, Gymnosperms and families from Acanthaceae to Asteraceae)
Plant biodiversity of South-Western Morocco
Mozambique
Flora of Mozambique
Namibia
Flora of Caprivi (Namibia)
South Africa
PlantZAfrica.com: Plants of South Africa
Zambia
Flora of Zambia
Zimbabwe
Flora of Zimbabwe
Asia
China
Flora of China
Moss Flora of China
Cyprus
Flora of Cyprus
India
eflora of India
E-Flora of Kerala
Iran
Flora of Iran
Israel
Wild Flowers of Israel
Flora of Israel and adjacent area
Japan
Database of Japanese Flora
Nepal
Annotated checklist of the flowering plants of Nepal
Pakistan
Flora of Pakistan
Europe
France
INPN Inventaire National du Patrimoine Naturel (France and overseas territories - fauna and flora)
Greece
Cretan Flora
Greek Flora
Vascular Plants Checklist of Greece (checklist, photo and distribution atlas)
Italy
Acta Plantarum - Flora |
https://en.wikipedia.org/wiki/SIM%20swap%20scam | A SIM swap scam (also known as port-out scam, SIM splitting, simjacking, and SIM swapping) is a type of account takeover fraud that generally targets a weakness in two-factor authentication and two-step verification in which the second factor or step is a text message (SMS) or call placed to a mobile telephone.
Method
The fraud exploits a mobile phone service provider's ability to seamlessly port a phone number to a device containing a different subscriber identity module (SIM). This mobile number portability feature is normally used when a phone is lost or stolen, or a customer is switching service to a new phone.
The scam begins with a fraudster gathering personal details about the victim, either by use of phishing emails, by buying them from organised criminals, or by directly socially engineering the victim.
Armed with these details, the fraudster contacts the victim's mobile telephone provider. The fraudster uses social engineering techniques to convince the telephone company to port the victim's phone number to the fraudster's SIM. This is done, for example, by impersonating the victim using personal details to appear authentic and claiming that they have lost their phone. In some countries, notably India and Nigeria, the fraudster will have to convince the victim to approve the SIM swap by pressing 1.
In many cases, SIM numbers are changed directly by telecom company employees bribed by criminals.
Once this happens, the victim's phone will lose connection to the network, and the fraudster will receive all the SMS and voice calls intended for the victim. This allows the fraudster to intercept any one-time passwords sent via text or telephone calls sent to the victim and thus allows them to circumvent many two-factor authentication methods of accounts (be it their bank accounts, social media accounts, etc.) that rely on text messages or telephone calls. Since so many services allow password resets with only access to a recovery phone number, the scam all |
https://en.wikipedia.org/wiki/IPVanish | IPVanish VPN (also known as IPVanish) is a US-based VPN service owned by Ziff Davis.
History
IPVanish was founded in 2012 by Mudhook Media Inc, an independent subsidiary of Highwinds Network Group in Orlando, Florida.
In 2017, Highwinds Network Group was acquired by CDN company StackPath which included IPVanish as part of the acquisition.
In 2019, IPVanish was acquired by J2 Global with their NetProtect business.
Cooperation with Homeland Security
According to a June 2018 article by TorrentFreak, court documents showed that IPVanish handed over personal information about a customer to the Department of Homeland Security (HSI) in 2016. The customer was suspected of sharing child pornography on an IRC network. The information, which allowed HSI to identify the customer, consisted of the customer's name, his email address, details of his VPN subscription, his real IP address (Comcast) "as well as dates and times [he] connected to, and disconnected from, the IRC network.” The logging of the customer's IP address and connection timestamps to the IRC service contradicts IPVanish's privacy policy, which states that "[IPVanish] will never log any traffic or usage of our VPN."
In 2017, IPVanish and its parent company were acquired by StackPath, and its founder and CEO, Lance Crosby, claims that "at the time of the acquisition, [...] no logs existed, no logging systems existed and no previous/current/future intent to save logs existed."
Uses
IPVanish funnels the internet traffic of its users through remote servers, obscuring the user's IP address and encrypting data transmitted through the connection. Users can simultaneously connect an unlimited number of devices.
Like other VPN services, IPVanish also has the ability to bypass internet censorship in most countries. By selecting a server in a region outside of their physical position, VPN users can easily access online content which was not available in their location, or play games that are regionally-restricted |
https://en.wikipedia.org/wiki/Linux%20Malware%20Detect | Linux Malware Detect, abbreviated as LMD or maldet, is a software package that looks for malware on Linux systems and reports on it.
Details
To protect Linux systems against vulnerabilities, various software packages are available, such as rootkit detectors such as Rootkit Hunter and chkrootkit, and auditing systems like lynis. Malware detection software such as LMD and ClamAV improve the security of systems by scanning them based on the signatures of thousands of instances of known malware.
For malware signatures, LMD uses various sources such as the signatures database of ClamAV and the Malware Hash Registry of Team Cymru. Besides such third party signature databases, it also maintains its own database of signatures.
If a ClamAV scanner engine is already available on a system, LMD will use this for its scanner engine. This will normally give better performance than its built-in scanner engine.
LMD can quarantine malware, and it can clean software that contains malicious code.
The executable command of LMD is maldet. Typical command invocations are maldet -d, to check for later versions; maldet -u, to check for malware signature updates; and maldet -a, to scan the file system of the server on which LMD resides. Checking for malware signature updates is typically done in an automated manner. Besides periodic scans, real-time monitoring is also supported with the --monitor command-line argument. LMD can monitor users, paths and files in such a way.
Linux Malware Detect is one of the objectives for the LPI 303 certification.
References
External links
R-fx Networks project page of LMD
Linux
Antivirus software for Linux
Free security software |
https://en.wikipedia.org/wiki/Beverton%20Medal | The Beverton Medal is a prestigious. international fish biology and/or fisheries science prize awarded annually. It is awarded to a distinguished scientist for a lifelong contribution to all aspects of the study of fish biology and/or fisheries science, with a focus on ground-breaking research. The medal was established as the highest award of the Fisheries Society of the British Isles (FSBI) to recognize distinction in the field of fish biology and fisheries science, to raise the profile of the discipline and of the Society in the wider scientific community. Medals are awarded to individuals who have made an outstanding contribution to fish biology and/or fisheries.
The Beverton Medal is traditionally awarded in July at the Fisheries Society of the British Isles annual international conference.
The first medal was awarded to Ray Beverton. In his honour, the medal is now known as the Beverton Medal. In 2017, to mark the 50th anniversary of the Fisheries Society of the British Isles (FSBI) the medal was awarded to Ray's collaborator Sidney Holt, having together written the book On the Dynamics of Exploited Fish Populations in 1957
Medallists
Source: FSBI
2021 - Daniel Pauly
2020 - Beth Fulton
2019 - Neil B. Metcalfe
2018 - Gary Carvahlo
2017 - Sidney Holt
2016 - Lennart Persson
2015 - Ian Cowx
2014 - Alexander (Sandy) Scot
2013 - Felicity Huntingford
2012 - Charles Tyler
2011 - Imantes (Monty) Priede
2010 - Tony Farrell
2009 - Peter Maitland
2008 - Paul J.B. Hart
2007 - Richard Mann (M.B.E.)
2006 - Anne Magurran
2005 - J.P. Sumpter
2004 - A. Ferguson
2003 - Tony J. Pitcher
2002 - J.E. Thorpe
2001 - H. Bern
2000 - Rosemary Lowe-McConnell
1999 - J.M. Elliott
1998 - J.H.S. Blaxter
1997 - E. Houde
1996 - E.D. Le Cren
1995 - Ray Beverton
See also
List of biology awards
References
Biology awards
Fisheries science
British science and technology awards
Awards established in 1995 |
https://en.wikipedia.org/wiki/Vertifolia%20effect | The Vertifolia effect is a well documented phenomenon in the fields of plant breeding and plant pathology. It is characterized by the erosion of a crop’s horizontal resistance to disease during a breeding cycle due to the presence of strong vertical resistance, characterized by the presence of R genes. This effect was observed in late blight of potato. This phenomenon was first described by J.E. Van der Plank in his 1963 book Plant Disease: Epidemics and Control. Van der Plank observed that under artificial selection the potato variety Vertifolia had stronger vertical resistance to the potato late blight pathogen, Phytophthora infestans, as measured by the presence of specific R genes. However, when the pathogen overcame these R genes Vertifolia exhibited a greater loss of horizontal resistance than varieties with fewer R genes and lower vertical resistance. This effect suggests that when a pathogen evolves an avirulence gene to counteract a variety’s R gene, that variety will be more susceptible to the pathogen than other varieties.
The Vertifolia effect has important implications for the breeding of disease resistant crops. To avoid it plant breeders may opt to cross in R genes or insert transgenes at the end of the breeding cycle to maintain levels of horizontal resistance during early rounds of selection. It is also suggests that breeders should focus on enhancing horizontal resistance to avoid potential catastrophic crop losses. Though the effect is a frequently observed phenomenon among plant breeders and plant pathologists, it is difficult to document and there are situations where it does not hold true.
References
Phytopathology
Pathology |
https://en.wikipedia.org/wiki/Opcode%20table | An opcode table (also called an opcode matrix) is a visual representation of all opcodes in an instruction set. It is arranged such that each axis of the table represents an upper or lower nibble, which combined form the full byte of the opcode. Additional opcode tables can exist for additional instructions created using an opcode prefix.
Table values
The structure and arrangement of an opcode table appears as follows:
Each cell from 00-FF contains information about the operation such as the equivalent assembly instruction corresponding to the opcode, parameters, and CPU cycle counts.
External links
Game Boy LR35902 opcode table
Z80 opcode table
Intel x86 opcode table
6502/6510/8500/8502 opcode table
Machine code |
https://en.wikipedia.org/wiki/Leftist%20grammar | In formal language theory, a leftist grammar is a formal grammar on which certain restrictions are made on the left and right sides of the grammar's productions. Only two types of productions are allowed, namely those of the form (insertion rules) and (deletion rules). Here, and are terminal symbols. This type of grammar was motivated by accessibility problems in the field computer security.
Computational properties
The membership problem for leftist grammars is decidable.
See also
Unrestricted grammar
String rewriting
References
Formal languages |
https://en.wikipedia.org/wiki/Viscous%20damping | In continuum mechanics, viscous damping is a formulation of the damping phenomena, in which the source of damping force is modeled as a function of the volume, shape, and velocity of an object traversing through a real fluid with viscosity.
Typical examples of viscous damping in mechanical systems include:
Fluid films between surfaces
Fluid flow around a piston in a cylinder
Fluid flow through an orifice
Fluid flow within a journal bearing
Viscous damping also refers to damping devices. Most often they damp motion by providing a force or torque opposing motion proportional to the velocity. This may be affected by fluid flow or motion of magnetic structures. The intended effect is to improve the damping ratio.
Shock absorbers in cars
Seismic retrofitting with viscous dampers
Tuned mass dampers in tall buildings
Deployment actuators in spacecraft
Single-degree-of-freedom system
In a single-degree-of-freedom system, viscous damping model relates force to velocity as shown below:
Where is the viscous damping coefficient with SI units of . This model adequately describes the damping force on a body that is moving at a moderate speed through a fluid. It is also the most common modeling choice for damping.
See also
Hysteresis
Coulomb damping
References
Mechanical vibrations
Fluid mechanics
Control theory |
https://en.wikipedia.org/wiki/Modeshape | In applied mathematics, mode shapes are a manifestation of eigenvectors which describe the relative displacement of two or more elements in a mechanical system or wave front.
A mode shape is a deflection pattern related to a particular natural frequency and represents the relative displacement of all parts of a structure for that particular mode.
See also
Normal mode
Harmonic oscillator
References
Linear algebra
Vectors (mathematics and physics) |
https://en.wikipedia.org/wiki/Storm%20Water%20Solutions | Storm Water Solutions (SWS) magazine, a supplement of Roads & Bridges and Water & Wastes Digest, is a magazine that was created by Scranton Gillette Communications, Inc. in 2005.
SWS reaches than 70,000 industry professionals across print and digital publication.
Article content
The magazine provides industry news, as well as information on industry technologies and case studies. Subscribers include engineers, contractors, government officials and other professionals who seek timely information regarding storm water management, green infrastructure, wetland restoration, watershed planning, combined sewer overflows, erosion control, hydroseeding and more.
Awards
SWS was a 2017 ASBPE (American Society of Business Publication Editors) Awards of Excellence Upper Midwest Regional Bronze Winner for e-Newsletter General Excellence. SWS annually presents Top Project Awards to noteworthy projects in the storm water and erosion control industries.
References
External links
Storm Water Solutions website
Water & Wastes Digest website
Roads & Bridges website
Scranton Gillette Communications, Inc. - Website
American Society of Business Publication Editors website
Engineering journals |
https://en.wikipedia.org/wiki/Bruno%20Murari | Bruno Murari is an Italian inventor. During his career he has patented about 200 inventions in the field of circuit design, power technologies and MEMS (Micro Electro Mechanical Systems) devices. He is the only Italian to have received the Elmer A. Sperry Award., which is awarded to those who have distinguished themselves with proven engineering contributions to advance the field of transport. He was defined "legendary analog engineer" and "father" of the BCD technology
Early years
Murari grew up in Venice, on the island of San Giorgio and, after earning a diploma in electrical engineering, in 1955 at the Technical Institute "A. Pacinotti" in Mestre, he began working for Edison Volta, for which he designed substations and power lines in Val Camonica.
In 1961 he was hired at the Somiren (Nuclear Energy Radioactive Minerals Society) of San Donato Milanese, a small company of the Agip Nuclear group. After work, he attended evening classes at the Aurelio Beltrami Radiotechnical Institute and obtained an electronic expert's diploma two years later.
STMicroelectronics
In November 1961 Murari transferred to SGS (General semiconductor company) of Agrate Brianza, today STMicroelectronics, a startup founded by Adriano Olivetti and Virgilio Floriani, founder of Telettra, first at the Applications Laboratory and then in the linear integrated circuits design group. Thanks to the partnership with the semiconductor company Fairchild Semiconductor, he began collaborating with Bob Widlar, one of the pioneers of integrated circuit design.
At the end of the 1960s he developed the first audio amplifier integrated circuit for TVs and portable radios. Then he adapted the technology for integrated circuits, initially developed in the consumer electronics field, to the automotive market, obtaining the first voltage regulator with metal casing for automotive alternators, made with the STMicroelectronics bipolar process.
In 1972 he took on responsibility for the design of linear integra |
https://en.wikipedia.org/wiki/Gordonia%20sp.%20nov.%20Q8 | Gordonia sp. nov. Q8 is a bacterium in the phylum of Actinomycetota. It was discovered in 2017 as one of eighteen new species isolated from the Jiangsu Wei5 oilfield in East China with the potential for bioremediation. Strain Q8 is rod-shaped and gram-positive with dimensions 1.0–4.0 μm × 0.5–1.2 μm and an optimal growth temperature of 40 °C. Phylogenetically, it is most closely related to Gordonia paraffinivorans and Gordonia alkaliphila, both of which are known bioremediators. Q8 was assigned as a novel species based on a <70% ratio of DNA homology with other Gordonia bacteria.
Bioremediation is the process by which polluted soil, water, and other natural materials are treated to encourage growth of microorganisms which can degrade contaminants. It is generally considered more cost-effective and sustainable as compared to other methods of ecosystem restoration. Q8 was chosen for study as a bioremediator due to its ability to grow on media which includes the polycyclic aromatic hydrocarbons (PAHs) naphthalene and pyrene. PAHs are the products of incomplete combustion of fossil fuels and are considered toxic and carcinogenic, in particular to aquatic organisms. Sixteen PAHs are listed as priority pollutants by the U.S. Environmental Protection Agency because of their association with cancer in aquatic animals and increased mutagenicity of sediments.
PAH-degrading microorganisms are commonly found in polluted areas such as oil wells, where they utilize PAHs as their sole carbon and energy source. The study with Q8 demonstrated that the bacterium could degrade nearly all naphthalene and pyrene with 1–2 weeks, indicating that Q8 can grow in the presence of and rapidly degrade PAHs. Q8 can also significantly reduce the viscosity of oil, making it more soluble in water and easier to utilize by other bacteria in a process known as petroleum bioremediation. Other Gordonia have been used to remove boat lubricants from water using a similar mechanism. The process of PAH de |
https://en.wikipedia.org/wiki/Flourish%20of%20approval | A flourish of approval or krul ("curl") is a mostly Dutch symbol used for grading schoolwork or to show that one has seen and agreed with a paragraph. The krul first appeared in the early 19th century together with the rising bureaucracy in the Netherlands. The symbol is rarely used outside of the Netherlands apart from the Dutch Caribbean islands and former Dutch colonies such as Indonesia, South Africa, Suriname.
Despite its wide usage throughout the country and its former colonies, as of March 2020 there is no Unicode symbol for it. Similar to a dele it may be substituted with the German penny symbol, ₰.
See also
References
Symbols
Education in the Netherlands |
https://en.wikipedia.org/wiki/Data%20Protection%20Act%202018 | The Data Protection Act 2018 (c. 12) is a United Kingdom Act of Parliament which updates data protection laws in the UK. It is a national law which complements the European Union's General Data Protection Regulation (GDPR) and replaces the Data Protection Act 1998.
Background
The Data Protection Bill was introduced to the House of Lords by Lord Ashton, Parliamentary Under-Secretary of State at the Department for Digital, Culture, Media and Sport on 13 September 2017.
The Data Protection Act 2018 received royal assent on 23 May 2018. The Act came into effect on 25 May 2018. It was amended on 1 January 2021 by regulations under the European Union (Withdrawal) Act 2018, to reflect the UK's status outside the EU. It replaces the Data Protection Act 1998.
The Act applies the data protection standards set out in the GDPR and, where the GDPR allows EU member states to make different choices for its implementation in their country, defines those choices for the UK.
Contents
The Act has seven parts. These are outlined in Section 1:
This Act makes provision about the processing of personal data.
Most processing of personal data is subject to GDPR.
Part 2 supplements the GDPR (see Chapter 2) and applies a broadly equivalent regime to certain types of processing to which the GDPR does not apply (see Chapter 3).
Part 3 makes provision about the processing of personal data by competent authorities for law enforcement purposes and implements the Law Enforcement Directive.
Part 4 makes provision about the processing of personal data by the intelligence services.
Part 5 makes provision about the Information Commissioner.
Part 6 makes provision about the enforcement of the data protection legislation.
Part 7 makes supplementary provision, including provision about the application of this Act to the Crown and to Parliament.
The Act introduces new offences that include knowingly or recklessly obtaining or disclosing personal data without the consent-giving of the data c |
https://en.wikipedia.org/wiki/%2B%20h.c. | + h.c. is an abbreviation for "plus the H ermitian c onjugate"; it means is that there are additional terms which are the Hermitian conjugates of all of the preceding terms, and is a convenient shorthand to omit half the terms actually present.
Context and use
The notation convention "+ h.c." is common in quantum mechanics in the context of writing out formulas for Lagrangians and Hamiltonians, which conventionally are both required to be Hermitian operators.
The expression
means
The mathematics of quantum mechanics is based on complex numbers, whereas almost all observations (measurements) are only real numbers. Adding its own conjugate to an operator guarantees that the combination is Hermitian, which in turn guarantees that the combined operator's eigenvalues will be real numbers, suitable for predicting values of observations / measurements.
Dagger and asterisk notation
In the expressions above, is used as the symbol for the Hermitian conjugate (also called the conjugate transpose) of , defined as applying both the complex conjugate and the transpose transformations to the operator , in any order.
The dagger () is an old notation in mathematics, but is still widespread in quantum-mechanics. In mathematics (particularly linear algebra) the Hermitian conjugate of is commonly written as , but in quantum mechanics the asterisk () notation is sometimes used for the complex conjugate only, and not the combined conjugate transpose (Hermitian conjugate).
References
Hamiltonian mechanics
Quantum mechanics
Lagrangian mechanics
Abbreviations
Operator theory |
https://en.wikipedia.org/wiki/Bfloat16%20floating-point%20format | The bfloat16 (brain floating point) floating-point format is a computer number format occupying 16 bits in computer memory; it represents a wide dynamic range of numeric values by using a floating radix point. This format is a shortened (16-bit) version of the 32-bit IEEE 754 single-precision floating-point format (binary32) with the intent of accelerating machine learning and near-sensor computing. It preserves the approximate dynamic range of 32-bit floating-point numbers by retaining 8 exponent bits, but supports only an 8-bit precision rather than the 24-bit significand of the binary32 format. More so than single-precision 32-bit floating-point numbers, bfloat16 numbers are unsuitable for integer calculations, but this is not their intended use. Bfloat16 is used to reduce the storage requirements and increase the calculation speed of machine learning algorithms.
The bfloat16 format was developed by Google Brain, an artificial intelligence research group at Google. It is utilized in many CPUs, GPUs, and AI processors, such as Intel Xeon processors (AVX-512 BF16 extensions), Intel Data Center GPU, Intel Nervana NNP-L1000, Intel FPGAs, AMD Zen, AMD Instinct, NVIDIA GPUs, Google Cloud TPUs, AWS Inferentia, AWS Trainium, ARMv8.6-A, and Apple's M2 and therefore A15 chips and later. Many libraries support bfloat16, such as CUDA, Intel oneAPI Math Kernel Library, AMD ROCm, AMD Optimizing CPU Libraries, PyTorch, and TensorFlow. On these platforms, bfloat16 may also be used in mixed-precision arithmetic, where bfloat16 numbers may be operated on and expanded to wider data types.
bfloat16 floating-point format
bfloat16 has the following format:
Sign bit: 1 bit
Exponent width: 8 bits
Significand precision: 8 bits (7 explicitly stored, with an implicit leading bit), as opposed to 24 bits in a classical single-precision floating-point format
The bfloat16 format, being a shortened IEEE 754 single-precision 32-bit float, allows for fast conversion to and from an IEEE 75 |
https://en.wikipedia.org/wiki/Algorithms%20and%20Combinatorics | Algorithms and Combinatorics () is a book series in mathematics, and particularly in combinatorics and the design and analysis of algorithms. It is published by Springer Science+Business Media, and was founded in 1987.
Books
, the books published in this series include:
The Simplex Method: A Probabilistic Analysis (Karl Heinz Borgwardt, 1987, vol. 1)
Geometric Algorithms and Combinatorial Optimization (Martin Grötschel, László Lovász, and Alexander Schrijver, 1988, vol. 2; 2nd ed., 1993)
Systems Analysis by Graphs and Matroids (Kazuo Murota, 1987, vol. 3)
Greedoids (Bernhard Korte, László Lovász, and Rainer Schrader, 1991, vol. 4)
Mathematics of Ramsey Theory (Jaroslav Nešetřil and Vojtěch Rödl, eds., 1990, vol. 5)
Matroid Theory and its Applications in Electric Network Theory and in Statics (Andras Recszki, 1989, vol. 6)
Irregularities of Partitions: Papers from the meeting held in Fertőd, July 7–11, 1986 (Gábor Halász and Vera T. Sós, eds., 1989, vol. 8)
Paths, Flows, and VLSI-Layout: Papers from the meeting held at the University of Bonn, Bonn, June 20–July 1, 1988 (Bernhard Korte, László Lovász, Hans Jürgen Prömel, and Alexander Schrijver, eds., 1990, vol. 9)
New Trends in Discrete and Computational Geometry (János Pach, ed., 1993, vol. 10)
Discrete Images, Objects, and Functions in (Klaus Voss, 1993, vol. 11)
Linear Optimization and Extensions (Manfred Padberg, 1999, vol. 12)
The Mathematics of Paul Erdös I (Ronald Graham and Jaroslav Nešetřil, eds., 1997, vol. 13)
The Mathematics of Paul Erdös II (Ronald Graham and Jaroslav Nešetřil, eds., 1997, vol. 14)
Geometry of Cuts and Metrics (Michel Deza and Monique Laurent, 1997, vol. 15)
Probabilistic Methods for Algorithmic Discrete Mathematics (M. Habib, C. McDiarmid, J. Ramirez-Alfonsin, and B. Reed, 1998, vol. 16)
Modern Cryptography, Probabilistic Proofs and Pseudorandomness (Oded Goldreich, 1999, vol. 17)
Geometric Discrepancy: An Illustrated Guide (Jiří Matoušek, 1999, vol. 18)
Applied Finite Group Actions ( |
https://en.wikipedia.org/wiki/Women%20Who%20Weld | Women Who Weld is a nonprofit organization based in Detroit, Michigan. Women Who Weld teaches women how to weld and find employment in the welding industry through intensive and introductory welding training programs, including Week-Long Intensive Welding Training Classes and Single-Day Introductory Workshops.
Information
Women Who Weld was founded by Samantha Farrugia, who learned how to weld while attending the University of Michigan for her master's degree in the Taubman College of
Architecture and Urban Planning.
The organization has been featured in The Atlantic, Architectural Digest, the Detroit Free Press, the Record-Eagle, InStyle Magazine, and more.
References
External links
Wire Drawing Dies
Welding organizations
Organizations based in Detroit
2013 establishments in the United States |
https://en.wikipedia.org/wiki/Hall%20circles | Hall circles (also known as M-circles and N-circles) are a graphical tool in control theory used to obtain values of a closed-loop transfer function from the Nyquist plot (or the Nichols plot) of the associated open-loop transfer function. Hall circles have been introduced in control theory by Albert C. Hall in his thesis.
Construction
Consider a closed-loop linear control system with open-loop transfer function given by transfer function and with a unit gain in the feedback loop. The closed-loop transfer function is given by .
To check the stability of T(s), it is possible to use the Nyquist stability criterion with the Nyquist plot of the open-loop transfer function G(s). Note, however, that only the Nyquist plot of G(s) does not give the actual values of T(s). To get this information from the G(s)-plane, Hall proposed to construct the locus of points in the G(s)-plane such that T(s) has constant magnitude and the also the locus of points in the G(s)-plane such that T(s) has constant phase angle.
Given a positive real value M representing a fixed magnitude, and denoting G(s) by z, the points satisfying are given by the points z in the G(s)-plane such that the ratio of the distance between z and 0 and the distance between z and -1 is equal to M. The points z satisfying this locus condition are circles of Apollonius, and this locus is known in the context of control systems as M-circles.
Given a positive real value N representing a phase angle, the points satisfying are given by the points z in the G(s)-plane such that the angle between -1 and z and the angle between 0 and z is constant. In other words, the angle opposed to the line segment between -1 and 0 must be constant. This implies that the points z satisfying this locus condition are arcs of circles, and this locus is known in the context of control systems as N-circles.
Usage
To use the Hall circles, a plot of M and N circles is done over the Nyquist plot of the open-loop transfer function. The poi |
https://en.wikipedia.org/wiki/RIPAC%20%28microprocessor%29 | RIPAC was a VLSI single-chip microprocessor designed for automatic recognition of the connected speech, one of the first of this use.
The project of the microprocessor RIPAC started in 1984. RIPAC was aimed to provide efficient real-time speech recognition services to the italian telephone system provided by SIP. The microprocessor was presented in September 1986 at The Hague (Netherlands) at EUSPICO conference. It was composed of 70.000 transistors and structured as Harvard architecture.
The name RIPAC is the acronym for "Riconoscimento del PArlato Connesso", that means "Recognition of the connected speech" in Italian. The microprocessor was designed by the Italian companies CSELT and ELSAG and was produced by SGS: a combination of Hidden Markov Model and Dynamic Time Warping algorithms was used for processing speech signals. It was able to do real-time speech recognition of Italian and many languages with a good affordability. The chip, issued by U.S. Patent No. 4,907,278, worked at first run.
References
Bibliography
R. Cecinati, A. Ciaramella, L. Licciardi, M. Paolini, R. Tasso, & G. Venuti (1990). U.S. Patent No. 4,907,278. Washington, DC: U.S. Patent and Trademark Office.
Application-specific integrated circuits
Digital signal processors
Speech recognition
Speech recognition hardware |
https://en.wikipedia.org/wiki/Pseudomonas%20teessidea | Pseudomonas teessidea is a species of Pseudomonas bacteria which was first discovered in the North of England. The specific epithet teessidea was given by a microbiologist at Teesside University. This bacterium has unique properties developed in response to the contaminated soil from which it comes. It produces rhamnolipids, which are biosurfactants which detoxify oil and chemicals contaminants in the ground. Surfactants work by reducing surface tension between two liquids or a liquid and a solid.
Pseudomonas teessidea has been isolated from Ekoln, lake Mälaren, in Sweden.
References
Pseudomonadales
Psychrophiles
Gram-negative bacteria
Undescribed species |
https://en.wikipedia.org/wiki/Aissa%20Wade | Aissa Wade is a Professor of Mathematics at Pennsylvania State University. She was the President of the African Institute for Mathematical Sciences centre in Senegal (from 2016 to 2018).
Early life and education
Wade was born in Dakar, Senegal. She studied mathematics at Cheikh Anta Diop University and graduated in 1993. She had to leave Senegal to earn a Ph.D. as there were no opportunities in Africa. Wade earned her Ph.D. at the University of Montpellier in 1996. Her thesis, "Normalisation formelle de structures de Poisson", considered symplectic geometry. Her doctoral advisor was Jean Paul Dufour.
Career
Wade became a postdoctoral researcher at the Abdus Salam International Centre for Theoretical Physics, where she worked on conformal Dirac structures. She held visiting faculty positions at University of North Carolina at Chapel Hill, African University of Science and Technology and Paul Sabatier University. Wade joined Pennsylvania State University and was appointed full professor in 2016.
She served as a managing editor of The African Diaspora Journal of Mathematics. She is editor of Afrika Mathematika. She is on the scientific committee of the NextEinstein forum, an initiative to connect science, society and policy in Africa. As the President of the African Institute for Mathematical Sciences, Wade was the first woman to hold this role. She has been awarded funding from the National Science Foundation to support the Senegal Workshop on Geometric Structures. She has been involved with American Association for the Advancement of Science activities to enhance African STEM research, including the provision of evidence-based metrics, case studies and policy recommendations. In 2017 Wade was named a fellow of the African Academy of Sciences.
Wade's accomplishments earned her recognition by Mathematically Gifted & Black, where she was featured as a Black History Month 2020 Honoree.
References
1967 births
Living people
Senegalese mathematicians
Fellows of th |
https://en.wikipedia.org/wiki/Aimee%20Johnson | Aimee Sue Anastasia Johnson is an American mathematician who works in dynamical systems. She is a professor of mathematics at Swarthmore College, the winner of the George Pólya Award, and the co-author of the book Discovering Discrete Dynamical Systems.
Johnson graduated from the University of California, Berkeley in 1984.
She completed her Ph.D. in 1990 at the University of Maryland, College Park; her dissertation, Measures on the Circle Invariant for a Nonlacunary Subsemigroup of the Integers, was supervised by Daniel Rudolph.
In dynamical systems, Johnson is known for her work on a conjecture of Hillel Furstenberg on the classification of invariant measures for the action of two independent modular multiplication operations on an interval.
In 1998, Johnson and Kathleen Madden won the George Pólya Award for their joint paper on aperiodic tiling, "Putting the Pieces Together: Understanding Robinson's Nonperiodic Tilings". In 2017, Madden, Johnson, and their co-author Ayşe Şahin published the textbook Discovering Discrete Dynamical Systems through the Mathematical Association of America.
With Joseph Auslander and Cesar E. Silva she is also the co-editor of Ergodic Theory, Dynamical Systems, and the Continuing Influence of John C. Oxtoby (Contemporary Mathematics 678, American Mathematical Society, 2016).
References
Year of birth missing (living people)
Living people
20th-century American mathematicians
21st-century American mathematicians
American women mathematicians
Dynamical systems theorists
University of California, Berkeley alumni
University of Maryland, College Park alumni
Swarthmore College faculty
20th-century women mathematicians
21st-century women mathematicians
20th-century American women
21st-century American women |
https://en.wikipedia.org/wiki/Kathleen%20Madden | Kathleen Marie Madden is an American mathematician who works in dynamical systems. She was the dean of the School of Natural Sciences, Mathematics, and Engineering at California State University, Bakersfield. She won the George Pólya Award and is the co-author of the book Discovering Discrete Dynamical Systems.
Education and career
Madden did her undergraduate studies at the University of Colorado. She then spent two years with the Peace Corps teaching mathematics in Cameroon before returning to the US for graduate study.
She completed her Ph.D. in 1994 at the University of Maryland, College Park; her dissertation, On the Existence and Consequences of Exotic Cocycles, was supervised by Nelson G. Markley.
Before joining California State University, Bakersfield as associate dean in 2015,
she was a faculty member in the mathematics department at Lafayette College
and then at Drew University, where she also served as chair of the department and associate dean. At California State University, Bakersfield, she was appointed interim dean in 2016 and permanent dean in 2017. She served in this position until 2021, at which time she retired to a part-time position in the faculty.
Books and recognition
In 1998, Madden and Aimee Johnson won the George Pólya Award for their joint paper on aperiodic tiling, "Putting the Pieces Together: Understanding Robinson's Nonperiodic Tilings". In 2017, Madden, Johnson, and their co-author Ayşe Şahin published the textbook Discovering Discrete Dynamical Systems through the Mathematical Association of America.
References
Year of birth missing (living people)
Living people
20th-century American mathematicians
21st-century American mathematicians
American women mathematicians
Dynamical systems theorists
University of Colorado alumni
University of Maryland, College Park alumni
Lafayette College faculty
Drew University faculty
California State University, Bakersfield faculty
20th-century women mathematicians
21st-century women mathematicia |
https://en.wikipedia.org/wiki/Ay%C5%9Fe%20%C5%9Eahin | Ayşe Arzu Şahin is a Turkish-American mathematician who works in dynamical systems. She was appointed the Dean of the College of Science and Mathematics at Wright State University in June 2020, and is a co-author of two textbooks on calculus and dynamical systems.
Education and career
Şahin graduated from Mount Holyoke College in 1988. She completed her Ph.D. in 1994 at the University of Maryland, College Park. Her dissertation, Tiling Representations of Actions and -Equivalence in Two Dimensions, was supervised by Daniel Rudolph.
She joined the mathematics faculty at North Dakota State University, where she worked from 1994 until 2001, when she moved to DePaul University. At DePaul, she became a full professor in 2010, and co-directed a master's program in Middle School Mathematics. She moved again to Wright State as Chair of the Department of Mathematics and Statistics at Wright State in 2015.
Books
In 2017, with Kathleen Madden and Aimee Johnson, Şahin published the textbook Discovering Discrete Dynamical Systems through the Mathematical Association of America. She is also a co-author of Calculus: Single and Multivariable (7th ed., Wiley, 2016), a text whose many other co-authors include Deborah Hughes Hallett, William G. McCallum, and Andrew M. Gleason.
References
Year of birth missing (living people)
Living people
20th-century American mathematicians
21st-century American mathematicians
American women mathematicians
Turkish mathematicians
American people of Turkish descent
Dynamical systems theorists
Mount Holyoke College alumni
University of Maryland, College Park alumni
North Dakota State University faculty
DePaul University faculty
Wright State University faculty
20th-century women mathematicians
21st-century women mathematicians
20th-century American women
21st-century American women |
https://en.wikipedia.org/wiki/Veselin%20Jevrosimovi%C4%87 | Veselin Jevrosimovic (; ) is the owner and chairman of IT company Comtrade, headquartered in Belgrade. He is also the president of the Athletics Association of Serbia
Background
Veselin Jevrosimović was born in Belgrade, Serbia, in 1965, he grew up in a middle-class family, in the Belgrade municipality and neighbourhood of Voždovac. He has an older brother Veljko. He earned a place in the national athletics team and later became the national University league pole vault champion. As part of the Düsseldorf Athletics Club he spent time in Germany, later in the United States. Jevrosimović would later advance his education with an IT engineering degree from the Information Technology School in Belgrade.
Career
In 1986 Jevrosimovic became the co-owner of an IT equipment distribution company in Germany. Keeping his connections in the U.S., he started a computer distribution business there, which led to him becoming a partner in CHS Electronics later in the 90s. Parallel to businesses in Germany and the U.S. he founded Comtrade Group in Serbia in 1991, a company that would become one of the largest IT organizations in Southeast Europe. In 1996, CHS Electronics, at which Mr. Jevrosimović was a partner, had become the no.2 computer equipment distribution company in the world, with a turnover of 12.5 billion dollars. Later that year Veselin sold his shares in the company and returned to Serbia to focus on the development of Comtrade's business.
Favouring a regional expansion strategy, Mr. Jevrosimović opened a company in Bosnia and Herzegovina in 1997, and proceeded to expand the network into Montenegro, Macedonia, Croatia and Albania. In 2008 he led the acquisition of the largest Slovenian software company, Hermes Softlab. This purchase was a confirmation of Comtrade's evolution to software engineering and development, which began in 2000, when Jevrosimović founded Spinnaker, a system integration company that later changed its name to Comtrade System Integration. The soft |
https://en.wikipedia.org/wiki/This%20Book%20Needs%20No%20Title | This Book Needs No Title: A Budget of Living Paradoxes is a 1980 collection of essays about logic, paradoxes, and philosophy, by Raymond Smullyan. It was first published by Prentice-Hall.
In 2023, it was reissued by What Is the Name of This Press, with a new foreword by Donald Knuth.
Reception
Kirkus Reviews called it "funny" and "provocative", commending Smullyan's descriptions of Zen and noting that the book could appeal to both children and adults, but conceded that Smullyan's work may be an "acquired taste".
The Washington Post has described "This Book Needs No Title" as "tantalizing", while Michael Dirda has declared that (along with Smullyan's earlier "What is the Name of this Book") it has "the cleverest of all titles", positing that Smullyan may have been inspired by Denis Diderot's "Ceci n'est pas un conte".
References
Logic books
1980 non-fiction books
Prentice Hall books
Essay collections |
https://en.wikipedia.org/wiki/Nextome | Nextome is an Italian company that does indoor positioning and navigation using iBeacons, which are Bluetooth Low Energy devices specified by Apple Inc. Nextome created a GPS-like experience with true position and turn-by-turn navigation that is supported by most phones operating on either Android or iOS. The features are provided through a software package (SDK) that improves user experience while connecting the online and offline worlds. The technology is patented in Europe, Singapore and US. Nextome works using phone sensors (Bluetooth, accelerometer and gyroscope). It catches the signals of the beacons in the environment and applies physical models and artificial intelligence algorithms to locate the phone. Calculation is performed on the phone, so Nextome has no need for a server infrastructure or a continuous internet connection.
History
Nextome was founded in December 2013 by Vincenzo Dentamaro, Domenico Colucci, Giangiuseppe Tateo and Marco Bicocchi Pichi. The software was developed for seven months before launching. The technology was validated by Microsoft. In May 2017, Nextome was accepted into the MassChallenge Ventures accelerator program based in Lausanne.
References
External links
2014 software
Android (operating system) software
IOS software
Indoor positioning system |
https://en.wikipedia.org/wiki/Mar%C3%ADa%20Manzano | María Gracia Manzano Arjona (born 1950) is a Spanish philosopher specializing in mathematical logic and model theory.
Manzano earned her Ph.D. in 1977 from the University of Barcelona. Her dissertation, Sistemas generales de la lógica de segundo orden [General systems of second-order logic], was supervised by Jesús Mosterín. She is a professor of logic and the philosophy of science at the University of Salamanca.
She is the author of several books on logic and model theory:
Teoría de modelos (Alianza, 1990). Translated as Model Theory (Ruy de Queiroz, trans., Oxford Logic Guides 37, Oxford University Press, 1999)
Extensions of First Order Logic (Cambridge Tracts in Theoretical Computer Science 19, Cambridge University Press, 1996)
Lógica para principiantes [Logic for beginners] (in Spanish, with Antonia Huertas, Alianza, 2004)
References
External links
Home page
1950 births
Living people
21st-century Spanish mathematicians
Spanish women mathematicians
Mathematical logicians
Women logicians
University of Barcelona alumni
Academic staff of the University of Salamanca
20th-century Spanish mathematicians
21st-century Spanish philosophers
Spanish women philosophers
20th-century Spanish philosophers
Philosophers of mathematics |
https://en.wikipedia.org/wiki/Bodenstein%20number | The Bodenstein number (abbreviated Bo, named after Max Bodenstein) is a dimensionless parameter in chemical reaction engineering, which describes the ratio of the amount of substance introduced by convection to that introduced by diffusion. Hence, it characterises the backmixing in a system and allows statements whether and how much volume elements or substances within a chemical reactor mix due to the prevalent currents. It is defined as the ratio of the convection current to the dispersion current. The Bodenstein number is an element of the dispersion model of residence times and is therefore also called the dimensionless dispersion coefficient.
Mathematically, two idealized extreme cases exist for the Bodenstein number. These, however, cannot be fully reached in practice:
corresponds to full backmixing, which is the ideal state to be reached in a continuous stirred-tank reactor.
corresponds to no backmixing, but a continuous through flow as in an ideal flow channel.
Control of the flow velocity within a reactor allows to adjust the Bodenstein number to a pre-calculated desired value, so that the desired degree of backmixing of the substances in the reactor can be reached.
Determination of the Bodenstein number
The Bodenstein number is calculated according to
where
: flow velocity
: length of the reactor
: axial dispersion coefficient
It can also be determined experimentally from the distribution of the residence times. Assuming an open system:
holds, where
: dimensionless variance
: variance of the mean residence time
: hydrodynamic residence time
References
Dimensionless numbers of chemistry
Dimensionless numbers of fluid mechanics
Chemical engineering |
https://en.wikipedia.org/wiki/Frondose | Frondosity (from Latin frondōsus meaning 'leafy') is the property of an organism that normally flourishes with fronds or leaf-like structures.
Many frondose organisms are thalloid and lack the organization of tissues into organs, with the exception of ferns.
Frondosity is significant mainly for distinguishing particular types of macroscopic algae, and in paleobotany and paleontology, by analyzing features present in fossil biota.
Frondose macroalgae are relevant to the ecology of many marine and coastal ecosystems. Large frondose algae play an important role in the creation and functioning of healthy ecosystems from kelp forests to similar habitats. Yet, in coral reefs, frondose seaweed can be recognized as harmful due to the link between excessive blooms and coastal eutrophication.
Ediacaran biota
The fossil record from the Ediacaran Period is sparse, as more easily fossilized hard-shelled animals had yet to evolve. Most fossils of the time are only faint impressions, and the shapes of fronds are one of the few identifying traits available.
Frondose fossils are the longest studied of any Ediacaran remains, but, despite this, their affinities and biology are amongst the most controversial, ranging from animal to protist to plant or stem fungi.
The oldest members of the Ediacaran biota include discoid (disk-shaped) and frondose forms. Discoidal fossils had been classified as cnidarian medusae before being redefined as holdfasts of frondose organisms, that is, the roots or stalks that held them to the sea bed.
Rangeomorphs consist of branching "frond" elements, each a few centimeters long, each of which is itself composed of many smaller branching tubes held up by a semi-rigid organic skeleton. This self-similar structure proceeds over four levels of fractality, and could have been formed using fairly simple developmental patterns. Rangeomorphs were radially symmetrical and likely sessile.
Bryozoans
Bryozoans, marine invertebrates, grow in colonial stru |
https://en.wikipedia.org/wiki/Advanced%20Propulsion%20Centre | The Advanced Propulsion Centre (APC) is a non-profit organisation that facilitates funding to UK-based research and development projects developing net-zero emission technologies. It is headquartered at the University of Warwick in Coventry, England.
The APC manages a £1 billion investment fund, which is jointly supplied by the automotive industry – via the Automotive Council – and the UK government through the Department for Business and Trade (DBT) and managed by Innovate UK.
History
The APC was founded in 2013 as a joint venture between the automotive industry and UK government to "research, develop and commercialise technologies for vehicles of the future". Both government and the automotive industry committed to investing £500 million each, totalling £1 billion over a ten year period. The creation of the APC was part of the coalition government's automotive industrial strategy.
In January 2014, Gerhard Schmidt was appointed as Chair and Tony Pixton as Chief Executive. It announced its first round of funding in April 2014, awarding £28.8 million funding to projects worth £133 million, led by Cummins, Ford, GKN and JCB.
The Advanced Propulsion Centre was officially opened by Vince Cable in November 2014.
Ian Constance was appointed Chief Executive in September 2015. In the 2015 Autumn Statement, the Chancellor, George Osborne, announced that an additional £225 million budget for automotive research and development would be facilitated by the APC.
Funding competitions
The Advanced Propulsion Centre awards funding to consortia of organizations including vehicle manufacturers, tier 1 automotive suppliers, SMEs and academic institutions, which are developing low carbon powertrain technology.
Spokes
The Advanced Propulsion Centre operates a 'hub and spoke' model, where the 'hub' is its headquarters at the University of Warwick, and the 'spokes' are universities across the UK with specialisms in particular areas of net-zero emission vehicle technology.
Spok |
https://en.wikipedia.org/wiki/2017%20Equifax%20data%20breach | The Equifax data breach occurred between May and July 2017 at the American credit bureau Equifax. Private records of 147.9 million Americans along with 15.2 million British citizens and about 19,000 Canadian citizens were compromised in the breach, making it one of the largest cybercrimes related to identity theft. In a settlement with the United States Federal Trade Commission, Equifax offered affected users settlement funds and free credit monitoring.
In February 2020, the United States government indicted members of China's People's Liberation Army for hacking into Equifax and plundering sensitive data as part of a massive heist that also included stealing trade secrets, though the Chinese Communist Party denied these claims.
Data breach
A key security patch for Apache Struts was released on March 7, 2017 after a security exploit was found and all users of the framework were urged to update immediately. Security experts found an unknown hacking group trying to find websites that had failed to update Struts as early as March 10, 2017 as to find a system to exploit.
As determined through postmortem analysis, the breach at Equifax started on May 12, 2017 when Equifax had yet to update its credit dispute website with the new version of Struts. The hackers used the exploit to gain access to internal servers on Equifax' corporate network. The information first pulled by the hackers included internal credentials for Equifax employees, which then allowed the hackers to search the credit monitoring databases under the guise of an authorized user. Using encryption to further mask their searches, the hackers performed more than 9000 scans of the databases, extracted information into small temporary archives that were then transferred off the Equifax servers to avoid detection and removed the temporary archives once complete. The activities went on for 76 days until July 29, 2017 when Equifax discovered the breach and subsequently, by July 30, 2017, shut off the exploit. |
https://en.wikipedia.org/wiki/John%20Couleur | John Francis Couleur (July 7 1925, Chicago – August 25 2007, Scottsdale, Arizona) was an American computer engineer and executive. He was the recipient of over 40 patents.
Early life
During World War II, Couleur enrolled in the V-12 Navy College Training Program.
He graduated summa cum laude from Southern Methodist University in Houston, Texas in 1946. During the Korean War, he served as a lieutenant in the United States Air Force.
Career
Couleur joined the General Electric Company. In 1953, at GE's Heavy Military Electronics Department (HMED) in Syracuse, New York, he served as lead architect on the development of the MISTRAM tracking system for the Atlas Missile.
Later at GE, he was responsible for the development of the GE-635 computer system. At the request of MIT Project MAC, Couleur and Ted Glaser designed the modifications to turn the 635 system into what became the GE-645 for the Multics Operating System in 1972.
References
1925 births
2007 deaths
Computer architects
General Electric employees
Southern Methodist University alumni |
https://en.wikipedia.org/wiki/Bacterial%20evolution | Bacterial evolution may refer to the biological evolution of bacteria as studied in:
Bacterial taxonomy
List of Bacteria genera
List of bacterial orders
List of Archaea genera
List of Prokaryotic names with Standing in Nomenclature
Bacterial phylodynamics
Bacterial phyla
Branching order of bacterial phyla (Woese, 1987)
Branching order of bacterial phyla (Gupta, 2001)
Branching order of bacterial phyla (Cavalier-Smith, 2002)
Branching order of bacterial phyla (Rappe and Giovanoni, 2003)
Branching order of bacterial phyla (Ciccarelli et al., 2006)
Branching order of bacterial phyla (Battistuzzi et al., 2004)
'The All-Species Living Tree' Project
Branching order of bacterial phyla (Genome Taxonomy Database, 2018)
Bacteria
Biological evolution |
https://en.wikipedia.org/wiki/Source%20code%20editors%20for%20Erlang | Erlang is an open source programming language. Multiple development environments (including IDEs and source code editors with plug-ins adding IDE features) have support for Erlang.
Integrated Development Environments (IDEs)
Syntax, parsing, code-assist
Goto, searching
Code generation
Build, debug, run
References
Integrated development environments |
https://en.wikipedia.org/wiki/VSCII | VSCII (Vietnamese Standard Code for Information Interchange), also known as TCVN 5712, ISO-IR-180, .VN, ABC or simply the TCVN encodings, is a set of three closely related Vietnamese national standard character encodings for using the Vietnamese language with computers, developed by the TCVN Technical Committee on Information Technology (TCVN/TC1) and first adopted in 1993 (as TCVN 5712:1993).
It should not be confused with the similarly-named unofficial VISCII encoding, which was sometimes used by overseas Vietnamese speakers. VISCII was also intended to stand for Vietnamese Standard Code for Information Interchange, but is not related to VSCII.
VSCII (TCVN) was used extensively in the north of Vietnam, while VNI was popular in the south. Unicode and the Windows-1258 code page are now used for virtually all Vietnamese computer data, but legacy files or archived messages may need conversion.
Encodings
All three forms of VSCII keep the 95 printable characters of ASCII unmodified.
VSCII-3, also known as TCVN 5712-3, VN3 or simply TCVN3, includes the fewest assignments. It is an extended ASCII, because it keeps all 128 codes of ASCII unmodified. It does not reassign any of the C0 and C1 control codes. Compared to ASCII, it adds 75 characters:
67 lowercase characters, allowing full lowercase support.
7 uppercase characters, allowing uppercase support for the 29 base letters without tone marks.
The non-breaking space.
Tone marks on uppercase vowels is accomplished in TCVN3 by switching to an all-capital font.
VSCII-2, also known as TCVN 5712-2 and VN2, is a superset of VSCII-3. It is an extended ASCII, because it keeps all 128 codes of ASCII unmodified. It does not reassign any of the C0 and C1 control codes, making it conformant with ISO 2022 as a 96-set. Compared to VSCII-3, it adds (for a total of 96 non-ASCII characters):
16 more uppercase characters with pre-composed tone marks (for a total of 23 non-ASCII uppercase characters)
5 combining diacritics for |
https://en.wikipedia.org/wiki/NOTCH2NL | Notch homolog 2 N-terminal-like is a family of proteins that in humans consists of 3 proteins (NOTCH2NLA, NOTCH2NLB, and NOTCH2NLC) and is encoded by NOTCH2NL gene. It appears to play a key role in the development of the prefrontal cortex, a part of the brain.
NOTCH2NL increases the number of cortical stem cells, which while delaying the generation of neurons ultimately leads to a greater number of neurons and larger brains. NOTCH2NL copy number loss and gain is associated with various neurological disorders, and they showed that loss of NOTCH2NL in cortical organoids leads to the organoids being smaller, while resulting in premature differentiation of cortical stem cells into neurons. The role of NOTCH2NL in the development of the human brain together with the evolutionary history of NOTCH2NL genes, suggests that the emergence of NOTCH2NL genes may have contributed to the increase in size of the human neocortex which tripled over the last two million years.
References
Population genetics
Phylogenetics |
https://en.wikipedia.org/wiki/Trancitor | The trancitor as the combined word of a "transfer-capacitor" is to be considered as another active-device category besides the transistor as a "transfer-resistor". As observed in the table shown, four kinds of active devices are theoretically deduced. Among them, trancitors are missing to be the third and fourth kinds, whereas transistors, such as bipolar junction transistor (BJT) and field-effect transistor (FET), were already invented as the first and second kinds, respectively. Unlike the transistor switching the current at its output (i.e., current source), the trancitor transfers its input to the voltage output (i.e., voltage source), so an inverse relationship with each other.
History
The term, trancitor, and its concept were first conceived by Sungsik Lee, a professor at the Department of Electronics Engineering, Pusan National University, South Korea, through his article, entitled A Missing Active Device — Trancitor for a New Paradigm of Electronics, in arXiv uploaded on 30 April 2018, and published on 23 August 2018 in IEEE Access. And the supplementary video was also publicised. This story was first featured by the MIT Technology Review on 23 May 2018, entitled Another "Missing" Component could Revolutionize Electronics. Since then, it has been distributed and discussed by many other internet media and communities.
See also
Electrical element
Memristor
References
External links
Professor Sungsik Lee's homepage
Electrical components
Semiconductor devices
Non-invented electrical components |
https://en.wikipedia.org/wiki/Espruino | Espruino is an open-source JavaScript interpreter for single board microcontrollers. It is designed for devices with small amounts of RAM (as low as 8kB).
Overview
Espruino was created by Gordon Williams in 2012 as an attempt to make microcontroller development truly multiplatform. Though initially not open-source, the Espruino firmware was offered as a free download for STM32 microcontrollers. It was made open-source in 2013 after a successful Kickstarter campaign for a development board running the software. Since the original Espruino board, there have been a number of new official development boards including the small USB thumb-drive-sized Espruino Pico, the Wifi-equipped Espruino WiFi, the Puck.js with built-in Bluetooth and the Pixl.js with a built-in LC display and Arduino shield compatibility. In addition to the official boards, Espruino runs on approximately 40 other types of development boards including the ESP8266.
There is a large body of reference material for Espruino including over 100 tutorials as well as the book Making Things Smart which contains a selection of hardware projects that can be created with Espruino-based microcontrollers.
To achieve maximal memory efficiency, Espruino executes code from source directly inside the parser, without the use of an Abstract Syntax Tree or intermediate bytecode.
Hardware
The first official development board was the Original Espruino. Later boards are available in a variety of form factors. The Original Espruino was followed by the Espruino Pico, Espruino WiFi, Puck.js and Pixl.js. A breakout board featuring the MDBT42Q Bluetooth LE module, the same used in the Puck.js and Pixl.js, is also available.
Software
Espruino programs are written using JavaScript. The Espruino IDE is available as a web-based app, a Google Chrome App and as a native Windows application. Alternative methods of programming Espruino boards include using terminal programs such as PuTTY on Windows.
License
All of Espruino is |
https://en.wikipedia.org/wiki/Contracted%20Bianchi%20identities | In general relativity and tensor calculus, the contracted Bianchi identities are:
where is the Ricci tensor, the scalar curvature, and indicates covariant differentiation.
These identities are named after Luigi Bianchi, although they had been already derived by Aurel Voss in 1880. In the Einstein field equations, the contracted Bianchi identity ensures consistency with the vanishing divergence of the matter stress–energy tensor.
Proof
Start with the Bianchi identity
Contract both sides of the above equation with a pair of metric tensors:
The first term on the left contracts to yield a Ricci scalar, while the third term contracts to yield a mixed Ricci tensor,
The last two terms are the same (changing dummy index n to m) and can be combined into a single term which shall be moved to the right,
which is the same as
Swapping the index labels l and m on the left side yields
See also
Bianchi identities
Einstein tensor
Einstein field equations
General theory of relativity
Ricci calculus
Tensor calculus
Riemann curvature tensor
Notes
References
Concepts in physics
Tensors
General relativity |
https://en.wikipedia.org/wiki/Proteinase%20inhibitors%20in%20plants | In plant biology, proteinase inhibitors are a family of small proteins that serve an integral role in the plant’s defense mechanisms against herbivory from insects or microorganisms that may compromise the integrity of the plant.
Functionality
The proteinase inhibitors work to disrupt the enzymatic ability of the digestive or microbial enzymes that are present in the stomach of the attacker resulting in the inability to properly digest the plant material. This causes an interference of proper growth and discourages further wounding of the plant by the attacker. Studies have also recently revealed that some proteinase inhibitors also provide defense for the plant through the possession of antimicrobial properties providing for the inhibition of pathogen growth.
Wounding
While proteinase inhibitors are present in plants naturally, production of these proteins for defense is often induced by either wounding of the plant or by chemical signaling through molecules such as methyl jasmonate. Both wounding of the plant as well as signaling molecules result in the formation of jasmonic acid, which then induces the gene expression of proteinase inhibitors. Many other signal cascades as well as the translocation of signal molecules through the phloem and xylem of the plant are also necessary for the production of these inhibitors.
Once the proteinase inhibitor has been ingested by the insect, it presents itself as a normal substrate for the digestive enzymes binding to the active site on the enzyme. This binding of the inhibitor to the proteinase creates a new complex that is very unlikely to dissociate. Once bound, the active site can no longer be accessed by any other substrate and the enzyme can no longer digest the amino acids of the plant. Without proper digestion, the insect is unable to grow, and may starve if it chooses to remain at the wounded plant. Similar inhibition of growth can be seen in pathogens that interact with these inhibitors.
Tomato experiment
In ord |
https://en.wikipedia.org/wiki/List%20of%20bicycle%20registers | This is a list of national and international bicycle registers intended to counter bike theft. Registers can either be operated by public bodies or private companies. Some registers are peer-to-peer based. Some local police departments also offer to register bicycles. Bike registers can be used to check if a bike is reported as stolen and prove ownership after a stolen bike has been recovered.
Africa
South Africa
National Bicycle Registry of South Africa, a non-profit register with free registration.
Asia
Japan
In Japan it is mandatory to register every bicycle with the police as an anti-theft measure.
Europe
Belgium
mybike.brussels, operated by the Brussels-Capital Region
Bulgaria
VELOregister.BG, a commercial register.
Denmark
Danish bicycle VIN-system, the unique VIN number of a bicycle can be looked up in the "Politi" smartphone application to see if a bicycle is reported as stolen.
Germany
Bike-ID bicycle registry, Bike-ID UG, a commercial register.
EIN - a different approach, which does not need registration, but does create a code for the owner, which can be decoded by the police.
Great Britain
BikeRegister - The National Cycle Database, operated by Selectamark Security Systems.
Bike Shepherd (formerly Bike Revolution), based in London, United Kingdom (and California, U.S.). As of June 2018 currently inactive.
Stolen Bikes in the UK, UK Peer-based bike register.
Immobilise, a free UK National Property Register for bicycles and more.
Hungary
BikeSafe.hu - paid service recommended and used by national police. Bike registration provides an ownership certificate for verified purchases - similar to car documents.
Norway
Bikemember, a commercial FG-approved register.
Falck og Securmark Sykkelregister, a commercial FG-approved register.
Sykkelreg.no, a free peer-to-peer based register.
Romania
RegistruldeBiciclete.ro, free bicycle register.
Sweden
Cykelregister.se, free bicycle register
Belgium
Gevondenfietsen, free bicycle register, found bike w |
https://en.wikipedia.org/wiki/Simon%20problems | In mathematics, the Simon problems (or Simon's problems) are a series of fifteen questions posed in the year 2000 by Barry Simon, an American mathematical physicist. Inspired by other collections of mathematical problems and open conjectures, such as the famous list by David Hilbert, the Simon problems concern quantum operators. Eight of the problems pertain to anomalous spectral behavior of Schrödinger operators, and five concern operators that incorporate the Coulomb potential.
In 2014, Artur Avila won a Fields Medal for work including the solution of three Simon problems. Among these was the problem of proving that the set of energy levels of one particular abstract quantum system was in fact the Cantor set, a challenge known as the "Ten Martini Problem" after the reward that Mark Kac offered for solving it.
The 2000 list was a refinement of a similar set of problems that Simon had posed in 1984.
Context
Background definitions for the "Coulomb energies" problems ( nonrelativistic particles (electrons) in with spin and an infinitely heavy nucleus with charge and Coulombian mutual interaction):
is the space of functions on which are antisymmetric under exchange of the spin and space coordinates. Equivalently, the subspace of which is antisymmetric under exchange of the factors.
The Hamiltonian is . Here is the coordinate of the -th particle, is the Laplacian with respect to the coordinate . Even if the Hamiltonian does not explictly depend on the state of the spin sector, the presence of spin has an effect due to the antisymmetry condition on the total wavefunction.
We define , that is, the ground state energy of the system.
We define to be the smallest value of such that for all positive integers ; it is known that such a number always exists and is always between and , inclusive.
The 1984 list
Simon listed the following problems in 1984:
In 2000, Simon claimed that five of the problems he listed had been solved.
The 2000 list
The |
https://en.wikipedia.org/wiki/Great%20Kite | The Great Kite () was a wooden machine designed by Leonardo da Vinci. Leonardo realized it between the end of the 15th Century and the beginning of the 16th Century. Drawings of parts and components of this machine can be found in the Codex on the flight of birds, which however lacks the overall description of the machine itself. Some drawings within the same codex suggest that it was created in similarity with flapping flight. However, this was hardly possible to perform given the available technologies, thus Leonardo developed a machine for mainly a gliding flight. The machine is named after the animal from which Leonardo took inspiration to realize the flying machine, the Kite.
See also
List of works by Leonardo da Vinci
Science and inventions of Leonardo da Vinci
Note
Leonardo da Vinci projects |
https://en.wikipedia.org/wiki/IOS%2012 | iOS 12 is the twelfth major release of the iOS mobile operating system developed by Apple Inc. Aesthetically similar to its predecessor, iOS 11, it focuses more on performance than on new features, quality improvements and security updates. Announced at the company's Worldwide Developers Conference on June 4, 2018, iOS 12 was released to the public on September 17, 2018. It was succeeded for the iPhone and iPod Touch by iOS 13 on September 19, 2019 and for the iPad by iPadOS 13 on September 24, 2019. Security updates for iOS 12 continued for five years following the release of iOS 13 and iPadOS 13 for devices unable to run the newer versions. The last update, 12.5.7, was released on January 23, 2023.
Overview
iOS 12 was introduced by Craig Federighi at the Apple Worldwide Developers Conference keynote address on June 4, 2018. The first developer beta version was released after the keynote presentation, with the first public beta released on June 25, 2018. The initial release of version 12.0 was on September 17, 2018.
System features
Performance
Performance optimizations were made in order to speed up common tasks across all supported iOS devices. Tests done by Apple on an iPhone 6 Plus showed apps launching 40% faster, the system keyboard activating 50% faster, and the camera opening 70% faster compared to iOS 11.
Screen Time
Screen Time is a new feature in iOS 12 that records the amount of time a user spent on the device. The feature also displays the amount of time the user used particular apps, the amount of time the user used particular categories of apps (such as games), and the number of notifications the user received.
Screen Time also provides blocking features to limit usage of apps (with time limits) or set other restrictions such as on purchases or explicit content. It replaces Restrictions in the iOS Settings app, but can also be used by adults to limit their own usage. These features can be used with or without a passcode. Without setting a passc |
https://en.wikipedia.org/wiki/List%20of%20search%20appliance%20vendors | A search appliance is a type of computer which is attached to a corporate network for the purpose of indexing the content shared across that network in a way that is similar to a web search engine. It may be made accessible through a public web interface or restricted to users of that network. A search appliance is usually made up of: a gathering component, a standardizing component, a data storage area, a search component, a user interface component, and a management interface component.
Vendors of search appliances
Fabasoft
Google
InfoLibrarian Search Appliance™
Maxxcat
Searchdaimon
Thunderstone
Former/defunct vendors of search appliances
Black Tulip Systems
Google Search Appliance
Index Engines
Munax
Perfect Search Appliance
References
External links
7 Enterprise Search Appliances That Can Save the Day
Computer hardware
Information retrieval systems
Internet search
Computing-related lists |
https://en.wikipedia.org/wiki/National%20Initiative%20for%20Cybersecurity%20Education | The National Initiative for Cybersecurity Education (NICE) is a partnership between government, academia, and the private sector focused supporting the country's ability to address current and future cybersecurity education and workforce challenges through standards and best practices. NICE is led by the National Institute of Standards and Technology (NIST) in the U.S. Department of Commerce.
History
The Comprehensive National Cybersecurity Initiative (CNCI), established by President George W. Bush in January 2008, included over twelve Initiatives, one of which, Initiative 8, was aimed at making the Federal cybersecurity workforce better prepared to handle cybersecurity challenges.
In May 2009, the Cyberspace Policy Review, directed by President Barack Obama, elevated the CNCI Initiative 8, which had initially been focused on improving the Federal cybersecurity workforce's ability to perform cybersecurity work. The scope was expanded beyond the Federal workforce to include the private sector workforce, truly making it a national charge.
In March 2010, the Obama administration declassified limited material regarding the CNCI, making Initiative 8 public: Initiative #8. Expand cyber education. While billions of dollars are being spent on new technologies to secure the U.S. Government in cyberspace, it is the people with the right knowledge, skills, and abilities to implement those technologies who will determine success. However there are not enough cybersecurity experts within the Federal Government or private sector to implement the CNCI, nor is there an adequately established Federal cybersecurity career field. Existing cybersecurity training and personnel development programs, while good, are limited in focus and lack unity of effort. In order to effectively ensure our continued technical advantage and future cybersecurity, we must develop a technologically-skilled and cyber-savvy workforce and an effective pipeline of future employees. It will take a national |
https://en.wikipedia.org/wiki/Contact-dependent%20growth%20inhibition | Contact-dependent growth inhibition (CDI) is a phenomenon where a bacterial cell may deliver a polymorphic toxin molecule into neighbouring bacterial cells upon direct cell-cell contact, causing growth arrest or cell death.
Discovery
CDI is now a blanket term to describe interbacterial competition that relies on direct cell-cell contact in bacteria. However, the phenomenon was first discovered in 2005 in the isolate EC93 of Escherichia coli found in rat intestine, and, in this case, was mediated by a Type V secretion system. This isolate dominated the rat's gut flora and appeared to be particularly good at outcompeting lab strains of E. coli when grown in co-culture. The novel part of this discovery was the fact that the inhibitory effects of the isolated E. coli appeared to require direct cell-cell contact. Before CDI was discovered in this isolate, the only systems known to mediate direct interbacterial competition by intoxication were toxins secreted into the extracellular space. Thus, these did not require cell-cell contact. A second system that could mediate CDI was discovered in 2006 in the pathogenic bacterium Vibrio cholerae, the cause of the gastro-intestinal disease cholera, and the opportunistic pathogen Pseudomonas aerugenosa. This system was much different that the Type V secretion system identified in E. coli, and thus formed a new class of CDI: the Type VI Secretion System.
Types of CDI
Type IV
The Type IV Secretion System (T4SS) is found in many species of Gram-negative and Gram-positive bacteria as well as in archea and are typically associated with conjugation or delivery of virulence proteins to eukaryotic cells. Some species of plant pathogen Xanthomonas, however, possess a particular T4SS capable of mediating CDI by delivering a peptidoglycan hydrolase. This effector kills targets that do not have the cognate immunity protein similar to other CDI systems.
Type V
The first CDI system to be discovered was a Type V secretion system, encoded |
https://en.wikipedia.org/wiki/Amazon%20Elastic%20File%20System | Amazon Elastic File System (Amazon EFS) is a cloud storage service provided by Amazon Web Services (AWS) designed to provide scalable, elastic, concurrent with some restrictions, and encrypted file storage for use with both AWS cloud services and on-premises resources. Amazon EFS is built to be able to grow and shrink automatically as files are added and removed. Amazon EFS supports Network File System (NFS) versions 4.0 and 4.1 (NFSv4) protocol, and control access to files through Portable Operating System Interface (POSIX) permissions.
Use cases
According to Amazon, use cases for this file system service typically include content repositories, development environments, web server farms, home directories and big data applications.
Data consistency
Amazon EFS provides open-after-close consistency semantics that applications expect from NFS.
Availability
Amazon EFS is available in all the public AWS regions at least since December 2019.
See also
GlusterFS
Red Hat Storage Server
References
External links
Amazon Elastic File System
Elastic File System
Cloud infrastructure
Cloud platforms
Distributed data storage
Cloud storage
Distributed file systems |
https://en.wikipedia.org/wiki/Value%20of%20Earth | The value of Earth, i.e. the net worth of our planet, is a debated concept both in terms of the definition of value, as well as the scope of "Earth". Since most of the planet's substance is not available as a resource, "earth" has been equated with the sum of all ecosystem services as evaluated in ecosystem valuation or full-cost accounting.
The price on the services that the world's ecosystems provide to humans has been estimated in 1997 to be $33 trillion per annum, with a confidence interval of from $16 trillion to $54 trillion. Compared with the combined gross national product (GNP) of all the countries at about the same time ($18 trillion) ecosystems would appear to be providing 1.8 times as much economic value as people are creating. The result details have been questioned, in particular the GNP, which is believed to be closer to $28 trillion (which makes ecosystem services only 1.2 times as precious), while the basic approach was readily acknowledged. The World Bank gives the total gross domestic product (GDP) in 1997 as $31.435, which would about equal the biosystem value.
Criticisms were addressed in a later publication, which gave an estimate of $125 trillion/yr for ecosystem services in 2011, which would make them twice as valuable as the GDP, with a yearly loss of 4.3–20.2 trillion/yr.
The BBC has published a website that lists various types of resources on various scales together with their current estimated values from different sources, among them BBC Earth, and Tony Juniper in collaboration with The United Nations Environment Programme World Conservation Monitoring Centre (UNEP-WCMC).
See also
Gross world product
Willingness to pay
Earth Economics
Ecological values of mangroves
Natural capital
Total economic value
References
Ecosystems
Economic indicators |
https://en.wikipedia.org/wiki/Printed%20electronic%20circuit | A printed electronic circuit (PEC) was an ancestor of the hybrid integrated circuit (IC). PECs were common in tube (valve) equipment from the 1940s through the 1970s.
Brands
Couplate was the Centralab trademark, whilst Sprague called them BulPlates. Aerovox used the generic PEC.
Difference from hybrid integrated circuits
PECs contained only resistors and capacitors arranged in circuits to simplify construction of tube equipment. Also, their voltage ratings were suitable for tubes. Later, hybrid ICs contained transistors, and often monolithic integrated circuits. Their voltage ratings were suitable for the transistors they contained.
References
Electronic circuits |
https://en.wikipedia.org/wiki/Game%20Off | Game Off is an annual game jam celebrating open source created by Lee Reilly in 2012 and sponsored by GitHub. Participants are given the entire month of November to build a game based on a theme–individually or as a team. Inspired by the Global Game Jam, it encourages collaborative game development and promotes the use and sharing of open source software.
Intellectual property and licensing
The use of open source code and freely availably assets is encouraged, but it is not a strict requirement. Participants are required to share the code in a public GitHub repository, but the creators own the intellectual property and may license the code however they like. E.g. the overall winner of Game Off V was Daemon vs. Demon, a game built with the open source Godot game engine, with the source licensed under the MIT license and some assets made available under CC-BY-NC 4.0 licenses.
Past Themes
Competition Structure
Game Off I and II required participants to "fork" an empty GitHub source code repository. Many other game jams and hackathons have adopted this approach e.g. Netflix's Cloud Prize, and Canonical's Juju Charm Championship.
Game Off III required participants to choose an existing open source game jam entry to fork it as a starting point.
Game Off IV allowed participants to start with a new repository.
Game Off V was hosted on itch.io, and was recognized the 2nd most popular game jam by number participants and 5th most popular by number of submissions in their yearly review.
Game Off VI was also hosted on itch.io. Overall winner was the game Singularity. There were 329 successful submissions.
References
External links
Game Off website
Programming contests
Game jams |
https://en.wikipedia.org/wiki/Radiation%20efficiency | In antenna theory, radiation efficiency is a measure of how well a radio antenna converts the radio-frequency power accepted at its terminals into radiated power. Likewise, in a receiving antenna it describes the proportion of the radio wave's power intercepted by the antenna which is actually delivered as an electrical signal. It is not to be confused with antenna efficiency, which applies to aperture antennas such as a parabolic reflector or phased array, or antenna/aperture illumination efficiency, which relates the maximum directivity of an antenna/aperture to its standard directivity.
Definition
Radiation efficiency is defined as "The ratio of the total power radiated by an antenna to the net power accepted by the antenna from the connected transmitter." It is sometimes expressed as a percentage (less than 100), and is frequency dependent. It can also be described in decibels. The gain of an antenna is the directivity multiplied by the radiation efficiency. Thus, we have
where is the gain of the antenna in a specified direction, is the radiation efficiency, and is the directivity of the antenna in the specified direction.
For wire antennas which have a defined radiation resistance the radiation efficiency is the ratio of the radiation resistance to the total resistance of the antenna including ground loss (see below) and conductor resistance. In practical cases the resistive loss in any tuning and/or matching network is often included, although network loss is strictly not a property of the antenna.
For other types of antenna the radiation efficiency is less easy to calculate and is usually determined by measurements.
Radiation efficiency of an antenna or antenna array having several ports
In the case of an antenna or antenna array having multiple ports, the radiation efficiency depends on the excitation. More precisely, the radiation efficiency depends on the relative phases and the relative amplitudes of the signals applied to the different ports |
https://en.wikipedia.org/wiki/IEEE%20Fourier%20Award%20for%20Signal%20Processing | The IEEE Fourier Award for Signal Processing is a Technical Field Award that is given by the Institute of Electrical and Electronics Engineers. This award is presented for contributions in the field of signal processing.
The award is named after Joseph Fourier, a French mathematician and physicist who is noted for the representation of periodic signals as linear superpositions of sine-wave basis functions known as the Fourier series, and applications of the Fourier Series to the analysis of vibration and heat transfer. The Fourier transform, which is widely used throughout electrical engineering and in particular signal processing, image processing, and communication theory, is also named in his honor.
The IEEE Fourier Award for Signal Processing may be presented to an individual or team of up to three people.
Recipients of the IEEE Fourier Award for Signal Processing receive a bronze medal, certificate, and honorarium. The Fourier Award is presented annually at the IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP) in the Spring.
Recipients
2024: Stéphane Mallat
2023: Rabab Ward
2022: Ali H. Sayed
2021: K.J. Ray Liu
2020: Alfred O. Hero III
2019: Alan Conrad Bovik
2018: Peter Stoica
2017: Russell Mersereau
2016: Bede Liu
2015: Georgios B. Giannakis
See also
List of engineering awards
References
External links
IEEE Fourier Award for Signal Processing web page
List of Recipients of IEEE Fourier Award for Signal Processing
IEEE awards
Awards established in 2015 |
https://en.wikipedia.org/wiki/Outline%20of%20Gottfried%20Wilhelm%20Leibniz | The following outline is provided as an overview of and topical guide to Gottfried Wilhelm Leibniz:
Gottfried Wilhelm (von) Leibniz (1 July 1646 [O.S. 21 June] – 14 November 1716); German polymath, philosopher logician, mathematician. Developed differential and integral calculus at about the same time and independently of Isaac Newton. Leibniz earned his keep as a lawyer, diplomat, librarian, and genealogist for the House of Hanover, and contributed to diverse areas. His impact continues to reverberate, especially his original contributions in logic and binary representations.
Achievements and contributions
Devices
Leibniz calculator
Logic
Alphabet of human thought
Calculus ratiocinator
Mathematics
Calculus
General Leibniz rule
Leibniz formula for
Leibniz integral rule
Philosophy
Best of all possible worlds
Characteristica universalis
Identity of indiscernibles
Pre-established harmony
Principle of sufficient reason
Physics
Personal life
Leibniz's political views
Leibniz's religious views
Family
Major works by Leibniz
De Arte Combinatoria
Discourse on Metaphysics, (text at wikisource)
Monadology, (text at wikisource)
New Essays on Human Understanding
Nova Methodus pro Maximis et Minimis
Protogaea
Théodicée
Manuscript archives and translations of Leibniz's works
Leibniz Archive (Hannover) at the Leibniz Research Center - Hannover
Leibniz Archive (Potsdam) at the Brandenburg Academy of Humanities and Sciences
Leibniz Archive (Munster), Leibniz-Forschungsstelle Münster digital edition
Leibniz Archive (Berlin), digital edition
Donald Rutherford's translations at UCSD
Lloyd Strickland's translations at leibniz-translations.com
Journals focused on Leibniz studies
The Leibniz Review
Studia Leibnitiana
Organizations named after Leibniz
Leibniz Association
Leibniz College, affiliated with the University of Tübingen
Leibniz Institute of European History
Leibniz Institute for Polymer Research
Leibniz Society of Nor |
https://en.wikipedia.org/wiki/JSON%20Web%20Encryption | JSON Web Encryption (JWE) is an IETF standard providing a standardised syntax for the exchange of encrypted data, based on JSON and Base64. It is defined by . Along with JSON Web Signature (JWS), it is one of the two possible formats of a JWT (JSON Web Token). JWE forms part of the JavaScript Object Signing and Encryption (JOSE) suite of protocols.
Vulnerabilities
In March 2017, a serious flaw was discovered in many popular implementations of JWE, the invalid curve attack.
One implementation of an early (pre-finalised) version of JWE also suffered from Bleichenbacher’s attack.
References
JSON
Internet Standards
Cryptographic protocols |
https://en.wikipedia.org/wiki/Compact%20object%20%28mathematics%29 | In mathematics, compact objects, also referred to as finitely presented objects, or objects of finite presentation, are objects in a category satisfying a certain finiteness condition.
Definition
An object X in a category C which admits all filtered colimits (also known as direct limits) is called compact if the functor
commutes with filtered colimits, i.e., if the natural map
is a bijection for any filtered system of objects in C. Since elements in the filtered colimit at the left are represented by maps , for some i, the surjectivity of the above map amounts to requiring that a map factors over some .
The terminology is motivated by an example arising from topology mentioned below. Several authors also use a terminology which is more closely related to algebraic categories: use the terminology finitely presented object instead of compact object. call these the objects of finite presentation.
Compactness in ∞-categories
The same definition also applies if C is an ∞-category, provided that the above set of morphisms gets replaced by the mapping space in C (and the filtered colimits are understood in the ∞-categorical sense, sometimes also referred to as filtered homotopy colimits).
Compactness in triangulated categories
For a triangulated category C which admits all coproducts, defines an object to be compact if
commutes with coproducts. The relation of this notion and the above is as follows: suppose C arises as the homotopy category of a stable ∞-category admitting all filtered colimits. (This condition is widely satisfied, but not automatic.) Then an object in C is compact in Neeman's sense if and only if it is compact in the ∞-categorical sense. The reason is that in a stable ∞-category, always commutes with finite colimits since these are limits. Then, one uses a presentation of filtered colimits as a coequalizer (which is a finite colimit) of an infinite coproduct.
Examples
The compact objects in the category of sets are precisely the finite s |
https://en.wikipedia.org/wiki/Unseen%20species%20problem | The unseen species problem is commonly referred to in ecology and deals with the estimation of the number of species represented in an ecosystem that were not observed by samples. It more specifically relates to how many new species would be discovered if more samples were taken in an ecosystem. The study of the unseen species problem was started in the early 1940s by Alexander Steven Corbet. He spent 2 years in British Malaya trapping butterflies and was curious how many new species he would discover if he spent another 2 years trapping. Many different estimation methods have been developed to determine how many new species would be discovered given more samples. The unseen species problem also applies more broadly, as the estimators can be used to estimate any new elements of a set not previously found in samples. An example of this is determining how many words William Shakespeare knew based on all of his written works.
The unseen species problem can be broken down mathematically as follows: If independent samples are taken, , and then if more independent samples were taken, the number of unseen species that will be discovered by the additional samples is given by
with being the second set of samples.
History
In the early 1940s Alexander Steven Corbet spent 2 years in British Malaya trapping butterflies. He kept track of how many species he observed, and how many members of each species were captured. For example, there were 74 different species of which he captured only 2 individual butterflies.
When Corbet returned to the United Kingdom, he approached biostatistician Ronald Fisher and asked how many new species of butterflies he could expect to catch if he went trapping for another two years; in essence, Corbet was asking how many species he observed zero times.
Fisher responded with a simple estimation: for an additional 2 years of trapping, Corbet could expect to capture 75 new species. He did this using a simple summation (data provided by Orlitsky |
https://en.wikipedia.org/wiki/The%20Economic%20Writings%20of%20Sir%20William%20Petty | The Economic Writings of Sir William Petty is a book with texts, written by William Petty (1623-1687), and published in 1899 by Charles Henry Hull (1864-1936), in two volumes. The Economic Writings were published together with an introduction about the life and work of William Petty, and did also contain Natural and Political Observations upon the Bills of Mortality, by John Graunt.
This edition of the economic texts of William Petty, the scientist, who is often been called the founder of political economy, is used as a reference work ever since its publication.
Apart from the extensive collection of written publications by William Petty (and John Graunt), the general introduction to the life and work of Petty and Graunt, and the short introductions to the separate texts, it also contained the first extensive bibliography of the writings of Petty and Graunt.
Bibliographical information
in 2 vols. (411 + 412 pgs.)
The book has been reprinted several times, for instance in 1963/4, in 1986 and in the "Collected Works" of 1997.
Volume 1
Vol. 1 contains:
'Introduction' (by Charles Henry Hull), ca. 80 pgs.)
A Treatise of Taxes and Contributions (first published London, 1662).
Verbum Sapienti (A word to the wise) (written 1665, first published London, 1691 as a supplement of The Political Anatomy of Ireland).
The Political Anatomy of Ireland (written 1672, first published London, 1691).
Political Arithmetic (written 1672-6, first published London, 1690).
Volume 2
Vol. 2 of The Economic Writings of Sir William Petty contains:
Natural and Political Observations upon the Bills of Mortality. By Capt. John Graunt. The text given is after the fifth edition (London, 1676).
Sir William Petty's Quantulumcunque concerning Money. (written 1682, published London, 1695). (Quantulumcunque = ‘something, be it ever so small’)
Another Essay in Political Arithmetick concerning the Growth of the City of London. (written 1682, published London, 1683).
Observations upon th |
https://en.wikipedia.org/wiki/Halo%20Infinite | Halo Infinite is a 2021 first-person shooter game developed by 343 Industries and published by Xbox Game Studios. It is the sixth mainline entry in the Halo series, following Halo 5: Guardians (2015).
The campaign follows the human supersoldier Master Chief and his fight against the enemy Banished on the Forerunner ringworld Zeta Halo, also known as Installation 07. Unlike previous installments in the series, the multiplayer portion of the game is free-to-play.
The game was intended to release as a launch title for the Xbox Series X/S, but was delayed in August 2020 after Infinite'''s gameplay reveal in July 2020 drew negative feedback from both critics and Halo fans. Following an open beta release of the multiplayer component on November 15, 2021, coinciding with the franchise's 20th anniversary, the campaign was released for Windows, Xbox One, and Xbox Series X/S on December 8, 2021. Halo Infinite received mostly favorable reviews from critics, with some deeming the game a return to form for the series. Praise was directed towards its visuals, gameplay, open world design, soundtrack, and story.
GameplayHalo Infinite is a first-person shooter. In the game's story mode, players assume the role of player character Master Chief, as he wages a war against the Banished, an alien faction. Players traverse the open world Zeta Halo, fighting the Banished with a mixture of vehicles and weapons. Players also have access to special equipment, such as the Grappleshot, which pulls Chief towards foes, retrieves items, or help to traverse the terrain.
The campaign mode's semi-open world structure allows players to freely explore parts of the ring-world Zeta Halo setting, which are segmented off from each other and initially impassable. Scattered across the environment are Forward Operating Bases (FOBs), which can be captured once cleared of enemies. Captured bases serve as fast-travel points. Other points of interest found across Zeta Halo's surface include "high-value target |
https://en.wikipedia.org/wiki/Sensorimotor%20network | The sensorimotor network (SMN), also known as somatomotor network, is a large-scale brain network that primarily includes somatosensory (postcentral gyrus) and motor (precentral gyrus) regions and extends to the supplementary motor areas (SMA). The auditory cortex may also be included. The SMN is activated during motor tasks, such as finger tapping, indicating that the network readies the brain when performing and coordinating motor tasks.
Clinical significance
Dysfunction in the SMN has been implicated in various neuropsychiatric disorders.
Bipolar Disorder: The psychomotor disturbances that characterize the depressive and manic phases of bipolar disorder may be related to dysfunction in the sensorimotor network (SMN) and its balance with other large-scale networks such as the default mode network.
Amyotrophic Lateral Sclerosis: Altered functional connectivity patterns in the SMN may contribute to various symptoms in the neurodegenerative disease .
Nomenclature
In 2019, Uddin et al. proposed that pericentral network (PN) be used as a standard anatomical name for the network.
References
Neuroscience
Brain |
https://en.wikipedia.org/wiki/Hardware%20watermarking | Hardware watermarking, also known as IP core watermarking is the process of embedding covert marks as design attributes inside a hardware or IP core design itself. Hardware Watermarking can represent watermarking of either DSP Cores (widely used in consumer electronics devices) or combinational/sequential circuits. Both forms of Hardware Watermarking are very popular. In DSP Core Watermarking a secret mark is embedded within the logic elements of the DSP Core itself. DSP
Core Watermark usually implants this secret mark in the form of a robust signature either in the RTL design or during High Level Synthesis (HLS) design. The watermarking process of a DSP Core leverages on the High Level Synthesis framework and implants a secret mark in one (or more) of the high level synthesis phases such as scheduling, allocation and binding. DSP Core Watermarking is performed to protect a DSP core from hardware threats such as IP piracy, forgery and false claim of ownership. Some examples of DSP cores are FIR filter, IIR filter, FFT, DFT, JPEG, HWT etc. Few of the most important properties of a DSP core watermarking process are as follows:
(a) Low embedding cost
(b) Secret mark
(c) Low creation time
(d) Strong tamper tolerance
(e) Fault tolerance.
Process of hardware watermarking
Hardware or IP core watermarking in the context of DSP/Multimedia Cores are significantly different from watermarking of images/digital content. IP Cores are usually complex in size and nature and thus require highly sophisticated mechanisms to implant signatures within their design without disturbing the functionality. Any small change in the functionality of the IP core renders the hardware watermarking process futile. Such is the sensitivity of this process. Hardware Watermarking can be performed in two ways: (a) Single-phase watermarking, (b) Multi-phase watermarking.
Single-phase watermarking process
As the name suggests, in single-phase watermarking process the secret marks in the form of |
https://en.wikipedia.org/wiki/Dirichlet%20hyperbola%20method | In number theory, the Dirichlet hyperbola method is a technique to evaluate the sum
where are multiplicative functions with , where is the Dirichlet convolution. It uses the fact that
Uses
Let be the number-of-divisors function. Since , the Dirichlet hyperbola method gives us the result
Wherer is the Euler–Mascheroni constant.
See also
Divisor summatory function
References
Number theory |
https://en.wikipedia.org/wiki/IPFire | IPFire is a hardened open source Linux distribution that primarily performs as a router and a firewall; a standalone firewall system with a web-based management console for configuration.
IPFire originally started as a fork of IPCop and has been rewritten on basis of Linux From Scratch since version 2. It supports installation of add-ons to add server services, which can be extended into a SOHO server.
In April 2015, the project became a member of the Open Invention Network.
System Requirements
The basic requirements are at least a 1 GHz CPU, 1GB of RAM, and a 4GB hard drive. Two network cards are needed to connect to an Ethernet network. DSL, LTE and Wi-Fi (WLAN) are supported, too, with corresponding hardware.
The required computing power to run IPFire depends on the area of application. Most commonly, x86 systems are being used, but ARM devices, such as Raspberry Pi or Banana Pi, are supported, too.
IPFire can be used in virtual environments (such as KVM, VMWare, XEN, Qemu, etc.).
The basic setup of IPFire happens over a guided dialogue on the console, and the further administration takes place on the web-based management interface, such as add-ons and additional features.
System Details
The project is regularly updated by the development team to maintain the security. Developed as a stateful packet inspection (SPI) firewall.
IPFire separates the network into different segments based on their security risk which are organised in colours. Normal clients connected to the LAN are represented as green, the Internet is represented as red, an optional DMZ is represented as orange and an optional Wireless network is represented as blue. No traffic can flow between segments unless specifically permitted through a firewall rule.
IPFire's package management system, called Pakfire allows to install system updates, which keep security up to date, and additional software packages for customisation to different usage scenarios and needs. The Linux system is customised |
https://en.wikipedia.org/wiki/IO-Link | IO-Link is a short distance, bi-directional, digital, point-to-point, wired (or wireless), industrial communications networking standard (IEC 61131-9) used for connecting digital sensors and actuators to either a type of industrial fieldbus or a type of industrial Ethernet. Its objective is to provide a technological platform that enables the development and use of sensors and actuators that can produce and consume enriched sets of data that in turn can be used for economically optimizing industrial automated processes and operations. The technology standard is managed by the industry association Profibus and Profinet International.
System overview
An IO-Link system consists of an IO-Link master and one or more IO-Link devices, i.e. Sensors or Actuators. The IO-Link master provides the interface to the higher-level controller (PLC) and controls the communication with the connected IO-Link devices.
An IO-Link master can have one or more IO-Link ports to which only one device can be connected at a time. This can also be a "hub" which, as a concentrator, enables the connection of classic switching sensors and actuators.
An IO-Link device can be an intelligent sensor, actuator, hub or, due to bidirectional communication, also a mechatronic component, e.g. a gripper or a power supply unit with IO-Link connection. Intelligent with regard to IO-Link means that a device has identification data e.g. a type designation and a serial number or parameter data (e.g. sensitivities, switching delays or characteristic curves) that can be read or written via the IO-Link protocol. This allows parameters to be changed by the PLC during operation, for example. Intelligent also means, however, that it can provide detailed diagnostic information. IO-Link and the data transmitted with it are often used for preventive maintenance and servicing, e.g. it is possible to set an optical sensor in such a way that it reports via IO-Link in good time if it threatens to become dirty. Cleaning no |
https://en.wikipedia.org/wiki/Two%20capacitor%20paradox | The two capacitor paradox or capacitor paradox is a paradox, or counterintuitive thought experiment, in electric circuit theory. The thought experiment is usually described as follows:
Two identical capacitors are connected in parallel with an open switch between them. One of the capacitors is charged with a voltage of , the other is uncharged. When the switch is closed, some of the charge on the first capacitor flows into the second, reducing the voltage on the first and increasing the voltage on the second. When a steady state is reached and the current goes to zero, the voltage on the two capacitors must be equal since they are connected together. Since they both have the same capacitance the charge will be divided equally between the capacitors so each capacitor will have a charge of and a voltage of . At the beginning of the experiment the total initial energy in the circuit is the energy stored in the charged capacitor:
At the end of the experiment the final energy is equal to the sum of the energy in the two capacitors
Thus the final energy is equal to half of the initial energy . Where did the other half of the initial energy go?
Solutions
This problem has been discussed in electronics literature at least as far back as 1955. Unlike some other paradoxes in science, this paradox is not due to the underlying physics, but to the limitations of the 'ideal circuit' conventions used in circuit theory. The description specified above is not physically realizable if the circuit is assumed to be made of ideal circuit elements, as is usual in circuit theory. If the wires connecting the two capacitors, the switch, and the capacitors themselves are idealized as having no electrical resistance or inductance as is usual, then closing the switch would connect points at different voltage with a perfect conductor, causing an infinite current to flow. Therefore a solution requires that one or more of the 'ideal' characteristics of the elements in t |
https://en.wikipedia.org/wiki/COSMIC%20functional%20size%20measurement | COSMIC functional size measurement is a method to measure a standard functional size of a piece of software. COSMIC is an acronym of COmmon Software Measurement International Consortium, a voluntary organization that has developed the method and is still expanding its use to more software domains.
The method
The "Measurement Manual" defines the principles, rules and a process for measuring a standard functional size of a piece of software. Functional size is a measure of the amount of functionality provided by the software, completely independent of any technical or quality considerations. The generic principles of functional size are described in the ISO/IEC 14143 standard. This method is also an International Standard by itself. The COSMIC standard is the first second generation implementation of the ISO/IEC 14143 standard. There are also four first generation implementations:
ISO/IEC 20926 - IFPUG function points
ISO/IEC 20968 - Mk II function points
ISO/IEC 24570 - Nesma function points
ISO/IEC 29881 - FiSMA function points
These first generation functional size measurement methods consisted of rules that are based on empirical results. Part of the terminology that deals with users and requirements has overlap with similar terms in software engineering. They work well for the software domains the rules were designed for, but for other domains, the rules need to be altered or extended. Key elements of a second generation functional size measurement method are:
Adoption of all measurement concepts from the ISO metrology
A defined measurement unit
Fully compliant with ISO/IEC 14143
Preferably domain independent
The method is based on principles rather than rules that are domain independent. The principles of the method are based on fundamental software engineering principles, which have been subsequently tested in practice.
The method may be used to size software that is dominated by functionality to maintain data, rather than software that predominant |
https://en.wikipedia.org/wiki/Photothermal%20time | Photothermal time (PTT) is a product between growing degree-days (GDD) and day length (hours) for each day. PTT = GDD × DL It can be used to quantify environment, as well as the timing of developmental stages of plants.
References
Product certification
Measurement
Ecology |
https://en.wikipedia.org/wiki/Enonic%20XP | Enonic XP is a free and open-source web application platform and content management system (CMS) in one based on Java and Elasticsearch. Developed by the Norwegian software company Enonic, the microservice web platform can be used to build progressive web applications, Next.js websites, or web-based APIs. Enonic XP uses an application framework for coding server logic with JavaScript, and has no need for SQL as it ships with an integrated content repository. The CMS is fully decoupled, meaning developers can create traditional websites and landing pages, or use XP in headless mode, that is without the presentation layer, for loading editorial content onto any device or client. Enonic is used by major organizations in Norway, including the national postal service Norway Post, the insurance company Gjensidige, the national lottery Norsk Tipping, the Norwegian Labour and Welfare Administration, and all the top football clubs in the national football league for men, Eliteserien.
Overview
Enonic XP has embedded web content management, blending applications and websites into one experience. The content management system (CMS) functionality includes a visual drag and drop editor, a landing page editor, support for multi-site and multi-language, media and structured content, advanced image editing, responsive user interface, permissions and roles management, revision and version control, and bulk publishing. Content and website(s) are managed through the "Content Studio," while integrations and applications can be directly installed via the "Applications" section in XP, where the platform finds apps approved in the official Enonic Market.
There are no third-party databases in Enonic XP. Instead, the developers have built a distributed storage repository on top of the search engine Elasticsearch, avoiding the need to index content. The system brings together capabilities from Filesystem, NoSQL, document stores, and search in the storage technology, which automatically ind |
https://en.wikipedia.org/wiki/NITROS%20Project | The NITROS (Network for Innovative Training on ROtorcraft Safety) project is an ongoing project which began in November 2016 consisting of 12 Early Stage Researchers (ESRs). It is funded through the European Union's Marie Skłodowska-Curie Actions (MSCA) research grant which is an Innovative Training Network (ITN) to support European Joint Doctorates (EJD). The collective aim of this specific MSCA scheme is for fostering new skills by means of excellent initial training of researchers.
The purpose of NITROS is to train aerospace engineers in Control Engineering, Computational Fluid Dynamics (CFD), Modeling and Simulation, Structural Dynamics and Human perception cognition and action, to address complex solutions for rotorcraft safety. Rotorcraft accident rates remain disproportionately high in comparison with fixed-wing aircraft.
The network is composed of four universities spread over four countries namely: Politecnico di Milano (Italy), Delft University of Technology (Netherlands), University of Liverpool (England) and the University of Glasgow (Scotland). Whilst there are also six international industrial partners involved in helping collaborate: Bristow Helicopters, Civil Aviation Authority, Eurocontrol, Leonardo Helicopter, National Aerospace Laboratory and the Max Planck Institute.
The NITROS project will be presented at the 44th European Rotorcraft Forum in Delft as well as the subsequent 45th and 46th European Rotorcraft Forums where the 12 projects will be presented.
Each research project is focused on a problem that affects the safety of the current or innovative rotorcraft configurations:
References
Aerospace engineering
Aviation safety in Europe
College and university associations and consortia in Europe
Engineering university associations and consortia
European Union and science and technology |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.