source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Similarity%20system%20of%20triangles | A similarity system of triangles is a specific configuration involving a set of triangles. A set of triangles is considered a configuration when all of the triangles share a minimum of one incidence relation with one of the other triangles present in the set. An incidence relation between triangles refers to when two triangles share a point. For example, the two triangles to the right, and , are a configuration made up of two incident relations, since points and are shared. The triangles that make up configurations are known as component triangles. Triangles must not only be a part of a configuration set to be in a similarity system, but must also be directly similar. Direct similarity implies that all angles are equal between two given triangle and that they share the same rotational sense. As is seen in the adjacent images, in the directly similar triangles, the rotation of onto and onto occurs in the same direction. In the opposite similar triangles, the rotation of onto and onto occurs in the opposite direction. In sum, a configuration is a similarity system when all triangles in the set, lie in the same plane and the following holds true: if there are n triangles in the set and n − 1 triangles are directly similar, then n triangles are directly similar.
Background
J.G. Mauldon introduced the idea of similarity systems of triangles in his paper in Mathematics Magazine "Similar Triangles". Mauldon began his analyses by examining given triangles for direct similarity through complex numbers, specifically the equation . He then furthered his analyses to equilateral triangles, showing that if a triangle satisfied the equation when , it was equilateral. As evidence of this work, he applied his conjectures on direct similarity and equilateral triangles in proving Napoleon's theorem. He then built off Napoleon by proving that if an equilateral triangle was constructed with equilateral triangles incident on each vertex, the midpoints of the connecting |
https://en.wikipedia.org/wiki/Surface%20Studio%202 | The Surface Studio 2 is an all-in-one PC, designed and produced by Microsoft as part of its Surface series of Windows-based personal computing devices. It was announced at the Windows 10 Devices Event on October 2, 2018, two years after the release of the previous version Surface Studio, with pre-orders beginning that day.
The second desktop computer to be manufactured entirely by Microsoft, the Surface Studio uses the Windows 10 operating system with the October 2018 update preinstalled, with free upgrade to Windows 11. The product, starting at $3,499, is aimed primarily at people in creative professions such as graphic artists and designers.
The Surface Studio 2+ was announced on October 12, 2022 and features an updated Intel 11th-gen CPU, NVIDIA GeForce RTX 3060 GPU, and three USB4/Thunderbolt 4 ports supporting up to three distinct 4K@60Hz displays.
Features
Hardware
The Surface Studio 2 has a 28-inch 4.5K "PixelSense" display with 4500 x 3000 pixels, equivalent to 192 dpi. The screen, the thinnest ever built for an all-in-one PC at 12.5 millimetres thick, is capable of being used in both the DCI-P3 and sRGB color spaces, and features a unique hinge design that allows it be tilted to a flat position, in a manner similar to the Wacom Cintiq. The bezel of the display contains a 5.0 megapixel camera and a Windows Hello-compatible backlit infrared camera.
The CPU is located in the base. Its compact design contains a 7th generation (codename "Kaby Lake") Core i7 processor and either a NVIDIA GeForce GTX 1060 or GeForce GTX 1070 graphics processor (both dependent on configuration). The system can be configured with up to 32 GB of DDR4 RAM and a 2 terabyte SSD. It also features four USB 3.0 ports, a USB-C port, an SDXC card reader and a headset connection.
The updated Surface Studio 2+ has new CPU/GPU options, 2x USB 3.2 ports, 3x Thunderbolt 4/USB4 ports, a headphone connection, and Gigabit Ethernet but foregoes the SDXC card reader.
Unlike many desktop PCs, th |
https://en.wikipedia.org/wiki/Halite%20AI%20Programming%20Competition | Halite is an open-source computer programming contest developed by the hedge fund/tech firm Two Sigma in partnership with a team at Cornell Tech. Programmers can see the game environment and learn everything they need to know about the game. Participants are asked to build bots in whichever language they choose to compete on a two-dimensional virtual battle field.
History
Benjamin Spector and Michael Truell created the first Halite competition in 2016, before partnering with Two Sigma later that year.
Halite I
Halite I asked participants to conquer territory on a grid. It launched in November 2016 and ended in February 2017. Halite I attracted about 1,500 players.
Halite II
Halite II was similar to Halite I, but with a space-war theme. It ran from October 2017 until January 2018. The second installment of the competition attracted about 6,000 individual players from more than 100 countries. Among the participants were professors, physicists and NASA engineers, as well as high school and university students.
Halite III
Halite III launched in mid-October of 2018. It ran from October 2018 to January 2019, with an ocean themed playing field. Players were asked to collect and manage Halite, an energy resource. By the end of the competition, Halite III included more than 4000 players and 460 organizations.
Halite IV
Halite IV was hosted by Kaggle, and launched in mid-June of 2020.
See also
List of computer science awards
Competitive programming
References
External links
Halite AI Challenge
Programming contests
Computer science competitions
Artificial intelligence
2016 establishments in the United States |
https://en.wikipedia.org/wiki/Unramified%20morphism | In algebraic geometry, an unramified morphism is a morphism of schemes such that (a) it is locally of finite presentation and (b) for each and , we have that
The residue field is a separable algebraic extension of .
where and are maximal ideals of the local rings.
A flat unramified morphism is called an étale morphism. Less strongly, if satisfies the conditions when restricted to sufficiently small neighborhoods of and , then is said to be unramified near .
Some authors prefer to use weaker conditions, in which case they call a morphism satisfying the above a G-unramified morphism.
Simple example
Let be a ring and B the ring obtained by adjoining an integral element to A; i.e., for some monic polynomial F. Then is unramified if and only if the polynomial F is separable (i.e., it and its derivative generate the unit ideal of ).
Curve case
Let be a finite morphism between smooth connected curves over an algebraically closed field, P a closed point of X and . We then have the local ring homomorphism where and are the local rings at Q and P of Y and X. Since is a discrete valuation ring, there is a unique integer such that . The integer is called the ramification index of over . Since as the base field is algebraically closed, is unramified at (in fact, étale) if and only if . Otherwise, is said to be ramified at P and Q is called a branch point.
Characterization
Given a morphism that is locally of finite presentation, the following are equivalent:
f is unramified.
The diagonal map is an open immersion.
The relative cotangent sheaf is zero.
See also
Finite extensions of local fields
Ramification (mathematics)
References
Algebraic geometry
Morphisms |
https://en.wikipedia.org/wiki/Cowbellpedia | Cowbellpedia Secondary Schools Mathematics TV Quiz Show is a Nigerian national mathematics television quiz show that debuted in 2015. It was created by Oladapo Ojo.
Historical background
The initiative began in 1998 as Cowbell National Secondary School Mathematics Competition (NASSMAC) when it was a written examination without a TV show.
Since 1998, the Cowbell brand has been involved in promoting the study of mathematics in secondary schools across Nigeria. In the process, it has helped millions of students develop an interest in and gain a better understanding of the subject. The project is designed to identify, recognize, and reward excellence in the study of mathematics. The programme is deployed in public and private schools. It serves students between the ages of eight and eighteen.
In 2015, Promasidor Nigeria (PNG) became a sponsor of Cowbellpedia. Their sponsorship made the programme more robust. In the same year, the initiative took a new dimension when it was split into two stages. The Stage One is the Qualifying Examination (written exam in designated centres across the country) and the Stage two is the TV quiz competition.
Since 2016, Cowbell-Our Milk has decided to bring all its mathematics intervention activities under one umbrella, Cowbellpedia. The top prize was increased to 2 million Nigerian Naira in 2018 so as to celebrate the 20 years anniversary of the Mathematics competition initiative.
Cowbellpedia is an annual mathematics intervention for young students in Nigeria with many touch points. It is approved by the Federal Ministry of Education and endorsed by National Examination Council (NECO), the National Examination body for secondary schools in Nigeria.
After schools must have duly completed their registration on www.cowbellpedia.ng, all the eligible students are expected to write a national qualifying examination, administered by NECO, at designated centers closest to them. The results are released online every 1 June, to commemorate |
https://en.wikipedia.org/wiki/John%20Brass%20%28colliery%20manager%29 | John Brass was a manager and later director of Houghton Main Colliery Co Ltd. According to the Colliery Year Book and Coal Trades Directory he was "one of the most prominent figures in the South Yorkshire coal mining industry". He held significant posts in the mining, gas and coke industries both in South Yorkshire and nationally. Between 1934 and 1937 he was one of the assessors in the Gresford disaster inquiry and, along with the other assessor, published dissenting reports to the main inquiry.
Background
Brass' father Thomas Francis Brass OBE, JP, MA(Durham) was born in 1858, the son of a blacksmith in Sherburn Hill, County Durham. TF Brass rose from colliery clerk through colliery cashier, to become a Surface Manager and eventually the Under Manager for Kimblesworth Colliery. By 1921 he was the agent (responsible for the general laying out and supervision of the workings) for Charlaw & Sacriston Collieries Co Ltd. In 1903 he was one of the team of rescuers who entered the flooded Sacriston pit. For this he was awarded the silver medal of the Royal Humane Society. TF Brass retired in 1934 and died in 1937.
Early life
Brass was born 1879 in Wingate, County Durham. He was the eldest son of Thomas Francis Brass, the agent for Charlaw & Sacriston Collieries Co Ltd. Brass attended the Royal Grammar School, Newcastle upon Tyne. In 1894 he started work at Charlaw & Sacriston Collieries in County Durham. In 1902 he gained his Manager's certificate (number 2,098) and in 1903 became the manager or Primrose Colliery. In that year he was one of the rescuers who entered Sacriston Colliery along with his father. For this action he was awarded The Royal Humane Society's silver medal.<Royal Humane Society citation><Messrs. Spinks medal sale 19 November 2015> The Colliery Year Book and Coal Trades Directory for 1940 credits him with the medal, but the issues for 1933, 1945 and 1950 do not. The Mines Inspectors Report for 1903 states that: "six of the explorers |
https://en.wikipedia.org/wiki/Numerical%20certification | Numerical certification is the process of verifying the correctness of a candidate solution to a system of equations. In (numerical) computational mathematics, such as numerical algebraic geometry, candidate solutions are computed algorithmically, but there is the possibility that errors have corrupted the candidates. For instance, in addition to the inexactness of input data and candidate solutions, numerical errors or errors in the discretization of the problem may result in corrupted candidate solutions. The goal of numerical certification is to provide a certificate which proves which of these candidates are, indeed, approximate solutions.
Methods for certification can be divided into two flavors: a priori certification and a posteriori certification. A posteriori certification confirms the correctness of the final answers (regardless of how they are generated), while a priori certification confirms the correctness of each step of a specific computation. A typical example of a posteriori certification is Smale's alpha theory, while a typical example of a priori certification is interval arithmetic.
Certificates
A certificate for a root is a computational proof of the correctness of a candidate solution. For instance, a certificate may consist of an approximate solution , a region containing , and a proof that contains exactly one solution to the system of equations.
In this context, an a priori numerical certificate is a certificate in the sense of correctness in computer science. On the other hand, an a posteriori numerical certificate operates only on solutions, regardless of how they are computed. Hence, a posteriori certification is different from algorithmic correctness – for an extreme example, an algorithm could randomly generate candidates and attempt to certify them as approximate roots using a posteriori certification.
A posteriori certification methods
There are a variety of methods for a posteriori certification, including
Alpha |
https://en.wikipedia.org/wiki/Nonlinear%20algebra | Nonlinear algebra is the nonlinear analogue to linear algebra, generalizing notions of spaces and transformations coming from the linear setting. Algebraic geometry is one of the main areas of mathematical research supporting nonlinear algebra, while major components coming from computational mathematics support the development of the area into maturity.
The topological setting for nonlinear algebra is typically the Zariski topology, where closed sets are the algebraic sets. Related areas in mathematics are tropical geometry, commutative algebra, and optimization.
Algebraic geometry
Nonlinear algebra is closely related to algebraic geometry, where the main objects of study include algebraic equations, algebraic varieties, and schemes.
Computational nonlinear algebra
Current methods in computational nonlinear algebra can be broadly broken into two domains: symbolic and numerical. Symbolic methods often rely on the computation of Gröbner bases and resultants. On the other hand, numerical methods typically use algebraically founded homotopy continuation, with a base field of the complex numbers.
References
See also
Algebraic equation
Computational group theory
Algebraic geometry |
https://en.wikipedia.org/wiki/American%20Society%20for%20Engineering%20Management | The American Society for Engineering Management (ASEM) is an international professional society that is focused on promoting and advancing the field of Engineering Management. The subject of Engineering Management is concerned with the management of people and projects in a technological or engineering systems context. The successful engineering manager will have the ability to manage complex programs and systems while drawing on the tools and techniques developed within the field of Engineering Management.
History
The first Engineering Management academic program was launched at the University of Missouri – Rolla (now called Missouri University of Science and Technology) in the mid-1960s. A number of years later in 1979, the American Society for Engineering Management (ASEM) was founded by Professor Bernard R. Sarchet, who held the first Chair of the Engineering Management Department at Missouri S&T, with support provided by the university's Chancellor, Professor Merl Baker.
In recognition of Professor Sarchet's seminal impact on the field of Engineering Management, there are two prestigious awards named in his honor. These include the Bernard R. Sarchet Award in recognition for lifetime achievement in engineering management education, which is presented by the Engineering Management Division of ASEE and the Bernard R. Sarchet Award in recognition for advancement of the engineering management discipline, which is presented by ASEM.
Publications
ASEM is responsible for a number of technical publications associated with the field of Engineering Management. This includes an academic journal (Engineering Management Journal) and practitioner focused publication (Practice Periodical) as well as the Guide to the Engineering Management Body of Knowledge (EMBoK) and Engineering Management Handbook.
International Annual Conference
The ASEM International Annual Conference is held annually at different locations across the United States and includes research papers, wor |
https://en.wikipedia.org/wiki/Monarch%20Watch | Monarch Watch is a volunteer-based citizen science organization that tracks the fall migration of the monarch butterfly. It is self-described as "a nonprofit education, conservation, and research program based at the University of Kansas that focuses on the monarch butterfly, its habitat, and its spectacular fall migration."
Organization
The informal organization is largely supported by teachers and students participating in "classroom projects, collaborative research" among other opportunities. Its founder and director is Orley R. "Chip" Taylor, a "world-renowned expert on butterflies and their migration patterns." The organization creates and distributes tags to place on monarch butterflies in order to track their migration path from Canada and the United States to south-central Mexico. The tagging method used is derived from the one that was developed by Canadian scientist, Fred Urquhart. The tagging process was adapted by Orley Taylor to minimize the damage to the butterflies. Color-coded tags are glued to a monarch butterfly's wing. Volunteers have tagged over 1.5 million monarchs in the last 26 years from Colorado to Canada.
Monarch Waystation Program
The monarch butterfly is also known as the milkweed butterfly due to its subsistence on the milkweed plant for its habitat. Largely due to commercial farming practices, the habitats of monarch butterflies have declined. In an effort to mitigate the destruction of the monarch butterflies natural habitat, Monarch Watch has called for volunteers to plant milkweed wherever possible. Milkweed is essential to the life-cycle of the monarch butterfly as they lay their eggs on the underside of the plant's leaves. It is possible to register and certify a site that is designated as a "Monarch Waystation." These sites can also be added to an interactive map that is monitored by Monarch Watch. The program also offers free milkweed plugs to people that engage in the creation of habitats for monarchs and pollinators. Primar |
https://en.wikipedia.org/wiki/Diagrammatic%20Monte%20Carlo | In mathematical physics, the diagrammatic Monte Carlo method is based on stochastic summation of Feynman diagrams with controllable error bars. It was developed by Boris Svistunov and Nikolay Prokof'ev. It was proposed as a generic approach to overcome the numerical sign problem that precludes simulations of many-body fermionic problems. Diagrammatic Monte Carlo works in the thermodynamic limit, and its computational complexity does not scale exponentially with system or cluster volume.
References
Monte Carlo methods
Mathematical physics
Quantum mechanics |
https://en.wikipedia.org/wiki/Seneca%20effect | The Seneca effect, or Seneca cliff or Seneca collapse, is a mathematical model proposed by Ugo Bardi to describe situations where a system's rate of decline is much sharper than its earlier rate of growth.
Description
In 2017, Bardi published a book titled The Seneca Effect: When Growth is Slow but Collapse is Rapid, named as the Roman philosopher and writer Seneca, who wrote Fortune is of sluggish growth, but ruin is rapid (Letters to Lucilius, 91.6):
Bardi's book looked at cases of rapid decline across societies (including the fall of empires, financial crises, and major famines), in nature (including avalanches), and through man-made systems (including cracks in metal objects). Bardi concluded that rapid collapse is not a flaw, or "bug" as he terms it, but a "varied and ubiquitous phenomena" with multiple causes and resultant pathways. The collapse of a system can often clear the path for new, and better adapted, structures. In a 2019 book titled Before the Collapse: A Guide to the Other Side of Growth, Bardi describes a "Seneca Rebound" that often takes place where new systems replace the collapsed system, and often at a rate faster than preceding growth rates as the collapse has eliminated many of impediments or constraints from the previous system.
The "Seneca effect" model is related to the "World3" model from the 1972 report The Limits to Growth, issued by the Club of Rome.
Use
One of the model's main practical applications has been to describe the resultant outcomes given the condition of a global shortage of fossil fuels. Unlike the symmetrical Hubbert curve fossil fuel model, the Seneca cliff model shows material asymmetry, where the global rate of decline in fossil fuel production is far steeper than forecasted by the Hubbert curve.
The term has also been used to describe rapid declines in businesses that had grown for decades, with the rapid post-2005 decline and resultant bankruptcy in Kodak as a quoted example.
See also
Hubbert curve
Societ |
https://en.wikipedia.org/wiki/Bioresilience | Bioresilience refers to the ability of a whole species or an individual of a species to adapt to change. Initially the term applied to changes in the natural environment, but increasingly it is also used for adaptation to anthropogenically induced change.
History
Alexander von Humboldt was the first to note the resilience of life forms with increasing altitude and the accompanying decreasing prevalence in numbers, and he documented this in the 18th century on the slopes of the volcano Chimborazo.
Understanding of bioresilience evolved from research led by The Mountain Institute when establishing two of the national parks that surround Mount Everest, Makalu-Barun National Park in Nepal, and Qomolangma National Nature Preserve in the Tibet Autonomous Region of China. The research documented greater biodiversity at Everest's base than higher up. There were progressively fewer documented species as the mountain ascended into higher biomes, from subtropical to temperate to alpine to Arctic-like. These fewer species, though, had greater biologic robustness correlating directly with increasing bioresilience.
Current research
Monitoring of bioresilience, beginning in the Everest ecosystem but expanding to other mountain ecologies globally is being carried out by the Biomeridian Project at Future Generations University.
The concept of bioresilience has also been applied to human health to explain aging or chronic diseases decrease the ability of the body to adapt; in such cases, the system becomes rigid and unable to cross different life demands. As the human body loses robustness with age, an individual becomes unable to accommodate new life demands, be they contagions, stress, or events such as injury or even jet lag.
The importance of resilience in biological systems has been widely recognized in terms of the impacts on life by anthropogenic changes. Accelerating environmental change and continuing loss of genetic resources positions lower biodiversity around the pla |
https://en.wikipedia.org/wiki/Precordial%20concordance | Precordial concordance, also known as QRS concordance is when all precordial leads on an electrocardiogram are either positive (positive concordance) or negative (negative concordance). When there is a negative concordance, it almost always represents a life-threatening condition called ventricular tachycardia because there is no other condition that suggests any abnormal conduction from the apex of the heart to the upper parts. However, in positive concordance another rare conditions such as left side accessory pathways or blocks are also possible.
References
Electrophysiology
Physiology |
https://en.wikipedia.org/wiki/Horizontal%20Environmental%20Genetic%20Alteration%20Agents | Horizontal Environmental Genetic Alteration Agents (HEGAAs) are any artificially developed agents that are engineered to edit the genome of eukaryotic species they infect when intentionally dispersed into the environment (outside of contained facilities such as laboratories or hospitals).
History
The term “genetic alteration agent” first appears in a 2016 work plan by the Defense Advanced Research Projects Agency (DARPA) describing a tender for contracts to develop genetically modified plant viruses for an approach involving their dispersion into the environment. The prefixing of “horizontal environmental” to the former to generate the acronym HEGAA was first used in a 2018 scientific publication. The acronym HEGAA or its plural HEGAAs has subsequently been used in scientific defence and general media.
General usage
Agents such as pathogens, symbionts or synthetic protein assemblages that can be acquired through horizontal transmission in the environment can potentially be engineered to become HEGAAs. This would be achieved using biotechnology methods to confer to them the capacity to alter nucleotides in the chromosomes of infected individuals through sequence-specific editing systems like CRISPR, ZFNs or TALENs. No known infectious agent naturally has the capacity to gene edit eukaryotes in a manner that can be flexibly targeted to specific sequences (distinct from substantially random natural processes like retroviral integration).
By definition, HEGAA induced gene editing events are intended to occur outside of contained facilities such as laboratories or hospitals. While genetically modified viruses with CRISPR editing have been successfully used as research tools in laboratories or for gene therapy in clinical settings, all gene editing events are intended to physically occur within contained facilities. By contrast, HEGAAs for their intended mode of action relies on inducing gene editing events that occur largely or exclusively in the environment.
W |
https://en.wikipedia.org/wiki/Anne%20M.%20Leggett | Anne Marie Leggett (born May 28, 1947) is an American mathematical logician. She is an associate professor emerita of mathematics at Loyola University Chicago.
Leggett is the editor-in-chief of the bi-monthly newsletter of the Association for Women in Mathematics (AWM), a position she has held continuously since 1977. She has served on the Executive Committee of the AWM since 1977 and the AWM Policy and Advocacy Committee (2008-2015). With Bettye Anne Case, she is the editor of the book Complexities: Women in Mathematics (with Anne M. Leggett, Princeton University Press, 2005). Leggett received an Alpha Sigma Nu Book Award for Complexities in 2006.
Education and career
Leggett did her undergraduate studies at Ohio State University, and completed her Ph.D. in 1973 at Yale University. Her dissertation, Maximal -r.e. sets and their complements, was supervised by Manuel Lerman.
She became a C. L. E. Moore instructor at the Massachusetts Institute of Technology in 1973, and was also on the faculties of Western Illinois University and the University of Texas at Austin. In 1982, she married another mathematician, Gerard McDonald (1946–2012), and in 1983, they both joined the Loyola University Chicago faculty.
Recognition
Leggett was chosen to be part of the 2019 class of fellows of the Association for Women in Mathematics, "for extraordinary contributions in promoting opportunities for women in the mathematical sciences through AWM and as a teacher and scholar; for her amazing and steady work as editor of the AWM Newsletter since 1977; and for her invaluable leadership and guidance."
References
External links
Anne M. Leggett's Author Profile Page on MathSciNet
Living people
20th-century American mathematicians
21st-century American mathematicians
American women mathematicians
Mathematical logicians
Women logicians
Ohio State University alumni
Yale University alumni
Western Illinois University faculty
University of Texas at Austin faculty
Massachusetts Institute of |
https://en.wikipedia.org/wiki/Department%20of%20Genetics%2C%20University%20of%20Cambridge | The Department of Genetics is a department of the University of Cambridge that conducts research and teaching in genetics.
Research
, the department has 83 researchers over 27 research groups, studying functional genomics, systems biology, developmental biology, cell biology, epigenetic inheritance, microbial genetics and evolution and population genetics.
Notable academic staff
Anne Ferguson-Smith , Arthur Balfour Professor of Genetics, Head of the Department
Richard Durbin FRS, Honorary Professor of Computational genomics, Senior Group Leader at the Wellcome Trust Sanger Institute
Julie Ahringer FMedSci, Professor of Genetics and Genomics, Wellcome Trust Senior Research Fellow, and Director of the Gurdon Institute
David Glover FRS FRSE, Wellcome Investigator in the Department of Genetics, formerly Balfour Professor of Genetics
, the department also has 50-65 graduate students and about 30 Part II Tripos undergraduate students.
Emeritus and alumni
Notable alumni of the department include:
Reginald Punnett , inventor of the Punnett Square
Michael Ashburner , gene ontologist and co-founder of the European Bioinformatics Institute (EBI)
Ronald Fisher, statistical geneticist, who has been described as “a genius who almost single-handedly created the foundations for modern statistical science”.
References
Genetics, Department of
Genetics education
Genetics in the United Kingdom |
https://en.wikipedia.org/wiki/Spillover%20%28experiment%29 | In experiments, a spillover is an indirect effect on a subject not directly treated by the experiment. These effects are useful for policy analysis but complicate the statistical analysis of experiments.
Analysis of spillover effects involves relaxing the non-interference assumption, or SUTVA (Stable Unit Treatment Value Assumption). This assumption requires that subject i's revelation of its potential outcomes depends only on that subject i's own treatment status, and is unaffected by another subject j's treatment status. In ordinary settings where the researcher seeks to estimate the average treatment effect (), violation of the non-interference assumption means that traditional estimators for the ATE, such as difference-in-means, may be biased. However, there are many real-world instances where a unit's revelation of potential outcomes depend on another unit's treatment assignment, and analyzing these effects may be just as important as analyzing the direct effect of treatment.
One solution to this problem is to redefine the causal estimand of interest by redefining a subject's potential outcomes in terms of one's own treatment status and related subjects' treatment status. The researcher can then analyze various estimands of interest separately. One important assumption here is that this process captures all patterns of spillovers, and that there are no unmodeled spillovers remaining (ex. spillovers occur within a two-person household but not beyond).
Once the potential outcomes are redefined, the rest of the statistical analysis involves modeling the probabilities of being exposed to treatment given some schedule of treatment assignment, and using inverse probability weighting (IPW) to produce unbiased (or asymptotically unbiased) estimates of the estimand of interest.
Examples of spillover effects
Spillover effects can occur in a variety of different ways. Common applications include the analysis of social network spillovers and geographic spillovers. Ex |
https://en.wikipedia.org/wiki/Google%20One | Google One is a subscription service developed by Google that offers expanded cloud storage and is intended for the consumer market. Google One paid plans offer cloud storage starting at 100 gigabytes, up to a maximum of 30 terabytes, an expansion from the free Google Account storage space of 15 GB, which is shared across Google Drive, Gmail, and Google Photos. Launched in May 2018, Google One replaced the paid services of Google Drive to emphasize the fact that the program is used by multiple Google Services. The program's raw storage is not accessible by users, but emails, files, and pictures can be added and removed through Gmail, Google Drive, and Google Photos.
History
Google One was launched in May 2018. The 1 TB plan for Google Drive would be upgraded to 2 TB, while the 2 TB plan's price would be the same price as Google Drive's 1 TB plan (US$9.99). Google also announced that 24/7 support would be available with all Google One plans. From May to August 2018, Google began upgrading Google Drive users in the United States to Google One. On August 15, 2018, Google announced that all users could get access to Google One in the U.S. for free, but would not receive any member benefits or upgraded storage.
On October 29, 2020, Google added a VPN service to Google One users on a 2 TB plan or higher. It was launched in the United States on Android and later rolled out to more countries and iOS, Windows and MacOS. In January 2023, the Google One app passed one billion downloads on Android. In February 2023, the Magic Eraser editing feature in Google Photos (previously exclusive to Pixel 6 and 7 owners) was made available to all Google One users. In March 2023, Google expanded access to the VPN service to all plans and added a dark web monitoring feature for US users.
Features
Users with a paid plan are able to get:
Support from "Google experts" for Google services. The support is open 24/7 and is available over chat, email, and phone.
Automatic phone backup on |
https://en.wikipedia.org/wiki/Cyclic%20vector | An operator A on an (infinite dimensional) Banach space or Hilbert space H has a cyclic vector f if the vectors f, Af, A2f,... span H. Equivalently, f is a cyclic vector for A in case the set of all vectors of the form p(A)f, where p varies over all polynomials, is dense in H.
See also
Cyclic and separating vector
References
Abstract algebra
Functional analysis |
https://en.wikipedia.org/wiki/Quantum%20volume | Quantum volume is a metric that measures the capabilities and error rates of a quantum computer. It expresses the maximum size of square quantum circuits that can be implemented successfully by the computer. The form of the circuits is independent from the quantum computer architecture, but compiler can transform and optimize it to take advantage of the computer's features. Thus, quantum volumes for different architectures can be compared.
The current world record for highest quantum volume is 219, accomplished by Quantinuum's H1-1 20-qubit ion trap quantum computer.
Introduction
Quantum computers are difficult to compare. Quantum volume is a single number designed to show all around performance. It is a measurement and not a calculation, and takes into account several features of a quantum computer, starting with its number of qubits—other measures used are gate and measurement errors, crosstalk and connectivity.
IBM defined its Quantum Volume metric because a classical computer's transistor count and a quantum computer's quantum bit count aren't the same. Qubits decohere with a resulting loss of performance so a few fault tolerant bits are more valuable as a performance measure than a larger number of noisy, error-prone qubits.
Generally, the larger the quantum volume, the more complex the problems a quantum computer can solve.
Alternative benchmarks, such as Cross-entropy benchmarking and IonQ's Algorithmic Qubits, have also been proposed.
Definition
Original Definition
The quantum volume of a quantum computer was originally defined in 2018 by Nikolaj Moll et al. However, since around 2021 that definition has been supplanted by IBM's 2019 redefinition.
The original definition depends on the number of qubits N as well as the number of steps that can be executed, the circuit depth d
The circuit depth depends on the effective error rate as
The effective error rate is defined as the average error rate of a two-qubit gate. If the physical two-qubit gates |
https://en.wikipedia.org/wiki/Christine%20Paulin-Mohring | Christine Paulin-Mohring (born 1962) is a mathematical logician and computer scientist, and Professor Faculté des Sciences at Paris-Saclay University, best known for developing the interactive theorem prover Coq.
Biography
Paulin-Mohring received her PhD in 1989 under the supervision of Gérard Huet. She has been a professor at Paris-Saclay University since 1997 and the dean of the Paris-Saclay Faculty of Sciences since 2016.
Between 2012 and 2015, she was the Scientific Coordinator of the Labex DigiCosme. Currently, she is a member of the editorial board of the Journal of Formalized Reasoning.
Recognition
Paulin-Mohring won the of the French Academy of Sciences in 2015.
She and the rest of the Coq development team (Thierry Coquand, Gérard Huet, Bruno Barras, Jean-Christophe Filliâtre, Hugo Herbelin, Chetan Murthy, Yves Bertot and Pierre Castéran) won the 2013 ACM Software System Award awarded by the Association for Computing Machinery.
She was elected to the Academia Europaea in 2014.
Further reading
Lecture Notes in Computer Science. Types for Proofs and Programs: International Workshop TYPES'96, Aussois, France, 15–19 December 1996 Selected Papers; Eduardo Gimenez, Christine Paulin-Mohring, Springer
Types for Proofs and Programs: International Workshop, TYPES 2004, Jouy-en-Josas, France, 15–18 December 2004, Revised Selected Papers: 3839 (Lecture Notes in Computer Science); Jean-Christophe Filliatre, Christine Paulin-Mohring, Benjamin Werner, Springer, 2008
Interactive Theorem Proving: 4th International Conference, ITP 2013, Rennes, France, 22–26 July 2013, Proceedings (Lecture Notes in Computer Science); Sandrine Blazy, Christine Paulin-Mohring, David Pichardie, Springer, 2013
References
External links
Home page at LRI
Living people
Mathematical logicians
Women logicians
21st-century French mathematicians
20th-century French mathematicians
French computer scientists
French women computer scientists
20th-century women mathematicians
1962 birt |
https://en.wikipedia.org/wiki/Dear%20Reality | Dear Reality GmbH is a German company specialising in 3D audio software and Virtual acoustics. They have developed Software tools for professional audio production of linear and interactive content in Augmented reality, Virtual reality, Video games, Sound design and Music.
History
The company was founded by Christian Sander and Achim Fell in Düsseldorf, Germany 2014. In 2018 Sennheiser invested in Dear Reality.
Products
Dear Reality is mainly known for its 3D audio mixing plugins; (stylised dearVR) DearVR Music, DearVR Pro and DearVR Spatial Connect.
References
External links
German brands
Audio effects
Digital audio |
https://en.wikipedia.org/wiki/Codeforces | Codeforces is a website that hosts competitive programming contests. It is maintained by a group of competitive programmers from ITMO University led by Mikhail Mirzayanov. Since 2013, Codeforces claims to surpass Topcoder in terms of active contestants. As of 2018, it has over 600,000 registered users. Codeforces along with other similar websites are used by some sport programmers, like Gennady Korotkevich, Petr Mitrichev, Benjamin Qi and Makoto Soejima, and by other programmers interested in furthering their careers.
Overview
The Codeforces platform is typically used when preparing for competitive programming contests and it offers the following features:
Short (2-hours) contests, called "Codeforces Rounds", held about once a week
Educational contests (2-2.5 hours, with 12 hours (24 hours before Round 45) hacking period), held 2-3 times per month;
Challenge/hack other contestants' solutions;
Solve problems from previous contests for training purposes;
"Polygon" feature for creating and testing problems;
Social networking through internal public blogs.
Rating system
Contestants are rated by a system similar to Elo rating system. There are usually no prizes for winners, though several times a year special contests are held, in which top performing contestants receive T-shirts. Some bigger contests are hosted on Codeforces base, among them "The Lyft Level 5 Challenge 2018", provided by Lyft or "Microsoft Q# Coding Contest — Summer 2018" provided by Microsoft.
Contestants are divided into ranks based on their ratings. Since May 2018, users with ratings between 1900 and 2099 can be rated in both Div. 1 and Div. 2 contests. At the same time, Div. 3 was created for users rated below 1600. There is also a Div. 4, which is for users rated below 1400.
History
Codeforces was created by a group of competitive programmers from Saratov State University led by Mike Mirzayanov. It was originally created for those interested in solving tasks and taking part in competi |
https://en.wikipedia.org/wiki/Multi-Drop%20Bus%20/%20Internal%20Communication%20Protocol | Multi-Drop Bus / Internal Communication Protocol (MDB/ICP) is the latest, US-European iteration of a multidrop bus computer networking protocol used within the vending machine industry, currently published by the American National Automatic Merchandising Association and supported by the European Vending Association and the European Vending Machine Manufacturers Association. It is based on earlier protocols (also known as MDB in the US) dating back to at least the early 1990s.
Mechanism
The multidrop bus used by vending machine controllers to communicate with the vending machine's components, such as a currency detector, is also called MDB (for Multi-Drop Bus). In use since the 1980s, it is now an open standard of the National Automatic Merchandising Association, or NAMA. The devices communicate in a single-master, multiple-slave configuration using the MDB protocol, which is based on a Motorola 9-bit UART implemented as an 8-bit data value with an additional mode bit. The mode bit differentiates between ADDRESS and DATA bytes. The master sends messages containing one address byte and a variable number of data bytes. The bus "slave devices" listen for an address, and if it matches their address that slave device will process the message and respond to the master. Though 9-bit compliant UARTs are not popular in PCs, they can be found in many microcontrollers.
The physical connection is realized as a serial bus with a fixed data rate of . There are just 2 communications signals plus the essential common-ground reference signal. The TX signal goes from the MASTER to every SLAVE device. The RX signal goes from every SLAVE device to the MASTER device. Both signals have pull-ups. The bus is driven at every transmitter by an open collector transistor driver, and isolated at each receiver with an opto-isolator - though cable harnesses carrying the communication signals may also carry 24-volt power and ground signals to devices, meaning the devices may not be isolated fr |
https://en.wikipedia.org/wiki/Ultra%20Narrowband | In communication engineering, Ultra NarrowBand (UNB) systems are those in which the channel has a very narrow bandwidth.
Technical characteristics
An ultra narrowband receiver is highly selective and can reject noise and interference which may enter the receiver outside its narrow bandwidth, enabling an acceptable signal-to-noise ratio to be achieved with a relatively weak received signal. Consequently, transmitter power levels can be low and the effective range of transmissions may be greater than would typically be the case for technologies which do not provide such selectivity. Some other radio technologies, such as direct sequence spread spectrum and chirp spread spectrum, employ alternative approaches to selectively extract signals from interference and noise. Typical UNB systems operate with a bandwidth of a few 10s to a few 100s Hz and are used for the transmission and reception of digital signals.
The use of highly selective filters in UNB receivers can provide very effective rejection of UNB signals from other UNB devices on adjacent carrier frequencies, permitting the operation of many devices in a limited geographical area.
UNB LPWAN
UNB technology is often used where links from very high numbers of devices are needed, with relatively small amounts of data being exchanged on each link. Some such applications can be found in the Internet of things, with UNB being one of the technologies that have been used to implement Low-Power Wide Area Networks. Short, infrequent transmissions with low transmit power can enable long-life, battery-powered operation of UNB devices connected in a LPWAN.
UNB LPWAN often operate on VHF or UHF frequencies where radio signal propagation characteristics are suited to typical UNB applications with ranges of 10km or greater..They may be deployed in a shared spectrum (ISM band)
Typical properties of UNB devices operating in the UHF spectrum below 1 GHz have been described by ETSI; whilst specific UNB-based protocols for |
https://en.wikipedia.org/wiki/Trichoderma%20hamatum | Trichoderma hamatum is a species of fungus in the family Hypocreaceae. It has been used a biological control of certain plant diseases, including Sclerotinia lettuce drop caused by Sclerotinia minor.
References
External links
Trichoderma
Biopesticides
Biotechnology
Biological pest control
Fungi described in 1906 |
https://en.wikipedia.org/wiki/Trichoderma%20stromaticum | Trichoderma stromaticum is a species of fungus in the family Hypocreaceae. It is a parasite of the cacao witches broom pathogen and has been used in its biological control.
References
External links
Trichoderma
Biopesticides
Biotechnology
Biological pest control
Fungi described in 2000 |
https://en.wikipedia.org/wiki/U-Report | U-Report is a social messaging tool and data collection system developed by UNICEF to improve citizen engagement, inform leaders, and foster positive change. The program sends SMS polls and alerts to its participants, collecting real-time responses, and subsequently publishes gathered data. Issues polled include health, education, water, sanitation and hygiene, youth unemployment, HIV/AIDS, and disease outbreaks. The program currently has 28 million u-reporters in 95 countries.
History
In 2007, UNICEF Innovation used RapidSMS to develop U-Report, a platform that would allow anyone to publish real-time information and data analytics in SMS format without the need of a programmer. In May 2011, Uganda became the first country in which UNICEF launched the U-Report mobile initiative, due to its population being, on average, one of the youngest in the world. Another reason UNICEF cited for introducing the program in Uganda was the nation's high cellphone use compared to other developing nations, with 48% of the nation's citizens owning a cellphone. Due to U-Report's success in Uganda, UNICEF expanded the program to Zambia in December 2012 and to Nigeria in June 2014. In Zambia, U-report was used to prevent HIV among adolescents and young people, with voluntary HIV testing in the country rising from 24% of the population to 40%. In Nigeria, U-Report primarily conducts surveys on social and medical issues.
In July 2015, U-Report reached a total of one million reporters in fifteen countries. In October 2015, Ukraine became the first country in Europe to join the U-Report program, growing to 68,273 participants by September 30, 2018.
See also
World Health Report
Human Development Report
The State of the World's Children
World Development Report
References
External links
Official site
UNICEF
Organizations established in 2011
2011 establishments in Uganda
Public opinion
Information Technology and Innovation Foundation
Mediation
Technical communication
Instant messa |
https://en.wikipedia.org/wiki/Kurth%20Kiln | Kurth Kiln was established by the Forests Commission Victoria in 1941 on a site about 7 km north of Gembrook on the Tomahawk Creek.
Dr Ernest Edgar Kurth from the University of Tasmania was commissioned to design the kiln with the aim of mass-producing charcoal as an alternative fuel in the response to war-time petrol rationing.
Gembrook was selected as the ideal site for the Kurth Kiln because it fully met three essential criteria required for successful operation;
Water - the kiln required 2000 gallons (9,100 litres) of water per day in order for its cooling systems to be effective.
Wood - the kiln burnt about 28 cords (~100 cubic metres) of wood per week.
Gradient - sloping land enabled easier top loading of wood into the kiln.
Dr Kurth was paid £5 for the use of his patented design (No 2563/41) and the total cost of establishing the kiln was 1,799 pounds 17 shillings and 2 pence.
The kiln commenced operation in March 1942 but transport difficulties combined with an oversupply of charcoal from private operators meant the kiln was used only intermittently during 1943 and was shut down soon after. Over the period of its operation, Kurth Kiln produced only 471 tons of charcoal which represented a tiny fraction of Victoria’s total production.
Petrol rationing
Australia’s declaration of War on 2 September 1939 immediately raised concerns about the security of petrol supplies. At the time Australia was totally reliant on imported fuel and had a limited storage capacity. At the start of the war, the country had sufficient petrol for only three months supply and by May 1940 the Commonwealth Oil Board estimated that only 67 per cent of the total capacity of about 140 million gallons was on-hand.
The Federal Government considered increasing the price of fuel to dampen demand. Another plan was that petrol should be merchandised in two colours, blue for commercial vehicles, and red for private cars, with red petrol being substantially more expensive than blue. Th |
https://en.wikipedia.org/wiki/MAGESTIC | Multiplexed Accurate Genome Editing with Short, Trackable, Integrated Cellular barcodes (MAGESTIC) is a platform that builds on the CRISPR/Cas technique. It further improves CRISPR/Cas by making the gene-editing process more precise. It also increases cell survival during the editing process up to sevenfold.
This technology was invented at the Stanford Genome Technology Center in collaboration with the Joint Initiative for Metrology in Biology (JIMB) which is a coalition of Stanford University and the National Institute of Standards and Technology.
Overview
Gene editing is used for a variety of tasks including the modifying of crops, the modifying of bacteria, and the modifying of disease-causing genetic mutations in patients. When only a single edited cell line is required, CRISPR/Cas combined with the endogenous DNA repair efficiency is sufficient to obtain an edited cell line. However, when trying to introduce many edits in multiplex, a higher efficiency of Homology directed repair is required. The MAGESTIC technology has multiple components. One component, the LexA-Fkh1 protein is involved in the process of Donor Recruitment that increases the efficiency of homology directed repair. The second component is a library of CRISPR Guide RNAs paired with donor DNA which encodes for specified edited to be integrated through homology directed repair. This in turn is linked to a DNA barcodes that allows for specific variants to be tracked in pools, similar to how Genome-wide CRISPR-Cas9 knockout screens work, only MAGESTIC is more versatile as it allows for not only loss of function edits, but also DNA Codon changes, Single-nucleotide polymorphism, Indels, and other types of genetic changes to be introduced and tracked. By improving DNA repair efficiency, using array-synthesized guide–donor oligos for the plasmid-based high-throughput editing, and integrating a genomic barcode to prevent plasmid barcode loss, MAGESTIC leads to more uniform pools with genome integ |
https://en.wikipedia.org/wiki/Planet%20Simulator | The Planet Simulator, also known as a Planetary Simulator, is a climate-controlled simulation chamber designed to study the origin of life. The device was announced by researchers at McMaster University on behalf of the Origins Institute on 4 October 2018. The simulator project begun in 2012 and was funded with $1 million from the Canada Foundation for Innovation, the Ontario government, and McMaster University. It was built and manufactured by Angstrom Engineering Inc of Kitchener, Ontario.
The device was designed and developed by biophysicist Maikel Rheinstadter and co-principal investigators biochemist Yingfu Li and astrophysicist Ralph Pudritz for researchers to study a theory that suggests life on early Earth began in "warm little ponds" rather than in deep ocean vents nearly four billion years ago. The device can recreate conditions of the primitive Earth to see whether cellular life can be created, and then later, evolve.
In an 2018 news release, Maikel Rheinstadter stated: "We want to understand how the first living cell was formed - how the Earth moved from a chemical world to a biological world."
The Planet Simulator can mimic the environmental conditions consistent on the early Earth and other astronomical bodies, including other planets and exoplanets by controlling temperature, humidity, pressure, atmosphere and radiation levels within the simulation chamber.
Observations
According to researchers, preliminary tests with the simulator, under possible conditions of the early Earth, created protocells: cells which are not living but very important nonetheless. According to biologist David Deamer, the device is a game changer, and the cells produced so far are "significant". The "cells are not alive, but are evolutionary steps toward a living system of molecules ... [the simulator] opens up a lot of experimental activities that were literally impossible before.” Based on initial tests with the new simulator technology, project director Rheinstadter sta |
https://en.wikipedia.org/wiki/Arctic%20Ice%20Project | The Arctic Ice Project is a Silicon Valley non-profit research organization that aims to slow climate change by restoring ice in the Arctic. Their scientific research in ice preservation technologies represents an opportunity to buy up to 15 more years for the world's economies to decarbonize. The organization has built an innovation network of prestigious external scientific partnerships that include the top specialists and organizations in the climate field in order to coordinate a moonshot effort to stop Arctic ice melt in key portions of the Arctic, our planet's heat-shield.
Solution
The Arctic Ice Project's approach is to spread hollow silica microspheres (reflective sand) on top of ice in the Arctic. The microspheres raise the reflecting power of polar ice. This reduces the amount of sunlight absorbed, and slows the melting of the ice.
The microspheres are bright white, and each one is 35 microns in diameter (less than the diameter of a human hair). The microspheres are filled with air and they float. The vision is to cover a strategic area of the Arctic about the size of Belgium with microspheres. Target locations will be near communities that depend on the ice, and routes through which melting ice reaches the wider ocean.
The Arctic Ice Project aims to rebuild a natural system with the least possible intervention. The Arctic Ice Project's silica microspheres will dissolve over time. This is a form of “soft geoengineering”. It is claimed to be less damaging and more reversible than other techniques.
Some scientists are concerned about the risks of restoring Arctic ice, as this approach could have unintended consequences. The Arctic Ice Project maintains that its approach will not drastically alter the ecosystem or pollute the environment.
].
References
External links
Climate engineering |
https://en.wikipedia.org/wiki/Service%20design%20sprint | A Service Design Sprint is a time-constrained Service Design project that uses Design Thinking and Service Design tools to create a new service or improve an existing one. The term Service Design Sprint was first mentioned by Tenny Pinheiro in his book The Service Startup: Design Thinking Gets Lean (Elsevier; 2014).
Methodology
The Minimum Valuable Service methodology used in a Service Design Sprint combines Agile-based approaches with Service-dominant logic and Service Design tools to help product development teams understand, co-design, and prototype complex service scenarios with low resources and within the timespan of a week. The methodology, created by Tenny Pinheiro in 2014, was designed to be used by startups in their Agile sprints.
Applications
A Service Design Sprint differs from a traditional Design Sprint due to its service dominant logic inclination. Since its inception, the approach has been used by startup accelerators, educational institutions like the university of Lapland in Finland, MIT, and fortune 500 companies in many different sectors.
Structure
The Minimum Valuable Service model is divided into four phases each containing a set of tools.
Projection: Agile ethnographic tools are used to uncover untapped barriers, needs, and desires, understand mental models and get a sense of the user's “Learn, Use and Remember” journey.
Perspectives: Tools like the Swap Ideation are used here to co-design with users, generating valuable service propositions.
Playground: Mockup and roleplaying tools are used to prototype ideas and explore concepts in a playful manner.
Polish Off: The MVS Journey, an Agile service blueprint tool, is used in this phase to breakdown interactions in intentions and avatars.
References
Design
Software development process
Agile software development |
https://en.wikipedia.org/wiki/Bendixson%27s%20inequality | In mathematics, Bendixson's inequality is a quantitative result in the field of matrices derived by Ivar Bendixson in 1902. The inequality puts limits on the imaginary and real parts of characteristic roots (eigenvalues) of real matrices. A special case of this inequality leads to the result that characteristic roots of a real symmetric matrix are always real.
The inequality relating to the imaginary parts of characteristic roots of real matrices (Theorem I in ) is stated as:
Let be a real matrix and . If is any characteristic root of , then
If is symmetric then and consequently the inequality implies that must be real.
The inequality relating to the real parts of characteristic roots of real matrices (Theorem II in ) is stated as:
Let and be the smallest and largest characteristic roots of , then
.
See also
Gershgorin circle theorem
References
Abstract algebra
Linear algebra
Matrix theory |
https://en.wikipedia.org/wiki/Apeel%20Sciences | Apeel Sciences is a company based in Goleta, California whose edible coating product Apeel can make avocados, citrus and other types of fruit last twice as long as usual by using a tasteless edible coating made from plant materials. The coating's formulation can be modified for strawberries, mangoes, apples, bananas, kumquats, citrus, and asparagus.
Founding
Apeel was founded in 2012 by James Rogers, after receiving a $100,000 grant from the Bill and Melinda Gates Foundation to help reduce post-harvest food waste in developing countries that lacked refrigeration infrastructure.
After the initial grant, backing has been provided by Microsoft cofounder Bill Gates, venture capitalist firm Andreessen Horowitz, and ATEL Capital Group. Apeel has raised $110 million in financing to date.
In June 2018, Apeel was named a World Economic Forum Technology Pioneer. In August 2018, Apeel announced the appointment of former Whole Foods Market co-CEO Walter Robb to its board of directors.
See also
Edible packaging
References
External links
2012 establishments in California
Food preservation
Fruit |
https://en.wikipedia.org/wiki/Wigner%20surmise | In mathematical physics, the Wigner surmise is a statement about the probability distribution of the spaces between points in the spectra of nuclei of heavy atoms, which have many degrees of freedom, or quantum systems with few degrees of freedom but chaotic classical dynamics. It was proposed by Eugene Wigner in probability theory. The surmise was a result of Wigner's introduction of random matrices in the field of nuclear physics. The surmise consists of two postulates:
In a simple sequence (spin and parity are same), the probability density function for a spacing is given by,
Here, where S is a particular spacing and D is the mean distance between neighboring intervals.
In a mixed sequence (spin and parity are different), the probability density function can be obtained by randomly superimposing simple sequences.
The above result is exact for real symmetric matrices , with elements that are independent standard gaussian random variables, with joint distribution proportional to
In practice, it is a good approximation for the actual distribution for real symmetric matrices of any dimension. The corresponding result for complex hermitian matrices (which is also exact in the case and a good approximation in general) with distribution proportional to , is given by
History
During the conference on Neutron Physics by Time-of-Flight, held at Gatlinburg, Tennessee, November 1 and 2, 1956, Wigner delivered a presentation on the theoretical arrangement of neighboring neutron resonances (with matching spin and parity) in heavy nuclei. In the presentation he gave the following guess:
See also
Wigner semicircle distribution
References
Mathematical physics
Nuclear physics |
https://en.wikipedia.org/wiki/Streptomyces%20sp.%20myrophorea | Streptomyces sp. myrophorea, isolate McG1 is a species of Streptomyces, that originates from a (ethnopharmacology) folk cure in the townland of Toneel North in Boho, County Fermanagh. This area was previously occupied by the Druids (~1500 years ago) and before this neolithic people (~ 3,700 years ago) who engraved the nearby Reyfad stones. Streptomyces sp. myrophorea is inhibitory to many species of ESKAPE pathogens, can grow at high pH (10.5) and can tolerate relatively high levels of radioactivity.
Physiology and morphology
Streptomyces sp. myrophorea isolate McG1 has light green to white spores and hyphae when cultivated on SFM agar.
The colonies of Streptomyces sp. myrophorea have a distinctly dusty appearance and produce an aroma similar to germaline on maturation. This bacteria produces many spores, approximately 0.5-1.0 micrometers in width which form in straight chains.
Ecology
Streptomyces sp. myrophorea isolate McG1 was discovered in an alkaline, species rich environment. This bacteria grows at a maximum pH of 10.5, and is therefore alkaliphilic. The bacteria tolerate higher levels of alkalinity but do not thrive.
Streptomyces sp. myrophorea can also withstand relatively high levels of radiation (up to 4kGy. This may be related to the underlying limestone and shale substrata which emits radon gas.
Antibiotic production
Only antibiotic gene synthesis clusters have been identified in Streptomyces sp. myrophorea; the antibiotics actually produced in-situ have yet to be identified. Streptomyces sp. McG1 is broadly inhibitory to both Gram positive and Gram negative bacteria including carbapenem resistant Acinetobacter baumannii, (a critical pathogen on the World Health Organization priority pathogens list), vancomycin resistant Enterococcus faecium, methicillin resistant Staphylococcus aureus (listed as high priority) and Klebsiella pneumoniae. Streptomyces sp. myrophorea has limited effects against strains of Enterococcus faecium and Pseudomonas |
https://en.wikipedia.org/wiki/Neomammalian%20brain | The neomammalian brain is one of three aspects of Paul MacLean's triune theory of the human brain. MacLean was an American physician and neuroscientist who formulated his model in the 1960s, which was published in his own 1990 book The Triune Brain in Evolution. MacLean's three-part theory explores how the human brain has evolved from ancestors over millions of years, consisting of the reptilian, paleomammalian and neomammalian complexes. MacLean proposes that the neomammalian complex is only found in higher order mammals, for example, the human brain, accounting for increased cognitive ability such as motor control, memory, improved reasoning and complex decision-making.
MacLean's theory explores how in higher order mammals, the neomammalian brain works interdependently with the reptilian and paleomammalian complexes to allow sophisticated thought processes to occur.
The theory of the neomammalian brain is based on MacLean's vast research conducted through comparing the structural differences between human brains and other organisms, including monkeys and a range of reptiles. MacLean's research was built upon previous neuroscience researchers' findings, including James Papez, which led to the formulation of the triune theory of the human brain and the limbic system, the two major contributions that MacLean made to the faculty of neuroscience.
Paul MacLean
Paul Donald MacLean was an American physician and neuroscientist who was born in Phelps, New York, on May 1, 1913, into a Presbyterian minister's family, thus, ultimately becoming a religious man himself. MacLean married Alison Stokes and lived in Mitchellville, Maryland, with their five children Alison, Alexander, David, James and Paul. MacLean died in Potomac, Maryland, in 2007, aged 94. MacLean is famous for his significant contributions to brain research, psychiatry and physiology. He spent a large amount of his working life at Yale Medical School and the National Institutes of Health, where through his r |
https://en.wikipedia.org/wiki/Palm%20%28companion%29 | The Palm phone, or "Palm companion device", "Palm Palm", "TCL Palm", codenamed "Pepito" with model number PVG100 is a smartphone running the Android operating system, announced on October 15, 2018, and is first available in the United States from November 2, that year.
Palm is developed, designed, and marketed by Palm Ventures Group, a San Francisco-based start up founded by Dennis Miloseski and Howard Nuk. Palm Ventures is financially backed by Chinese electronics company TCL that owns the Palm trademark, originally of Palm, Inc. The phone is manufactured by China's Tinno Mobile as an ODM for TCL.
With a 3.3-inch screen and 62.5g weight that is noticeably smaller and lighter than other smartphones released at the same time, the Palm was initially marketed as "an ultra-mobile companion" device that is meant to be used in conjunction with a regular smartphone—positioning it as a cross-over between a wearable and a smartphone, and originally could only be used by pairing the device with another phone on the Verizon network. However, the restriction was subsequently lifted for new buyers as well as oversea markets, which make it also possible to use the device as a standalone phone.
It is the first "Palm"-branded device on the market since 2010 (Palm Pre 2).
Specifications
Software
Hardware
Availability
The Palm was initially launched on November 2, 2018, exclusively on Verizon in the US as a companion device in a bundle with a phone. Since December 2018 it has been available on Vodafone in the UK, Spain and Germany. Vodafone has secured a 6 months exclusivity deal for Europe. Since January 20, 2019, the device has been available in Hong Kong. It was released for sale as standalone device in the US in April 2019.
References
Smart devices
Android (operating system) devices
Mobile phones introduced in 2018 |
https://en.wikipedia.org/wiki/Aditya%20Birla%20Payments%20Bank | Aditya Birla Payments Bank Limited (ABPB) was a payments bank started as a joint venture by Aditya Birla Nuvo Ltd. and Idea Cellular. Launched on 22 February 2018, it is the fourth payments bank to begin operations since issuance of licenses to 11 firms by the Reserve Bank of India in August 2015. Payments Banks are a special category of banks that can accept deposits of up to 2 lakh but cannot give loans or credit cards.
On 20 July 2019, Aditya Birla Payments Bank announced that it would be shutting down operations subject to the receipt of requisite regulatory consents and approval.
History
Aditya Birla Nuvo (now Grasim Industries Limited) was one of the 11 entities to receive an in-principle approval by Reserve Bank of India (RBI) to set-up payments banks in India, in August 2015. Post the in-principle approval, RBI had issued a license to Aditya Birla Payments Bank under Section 22 (1) of the Banking Regulation Act, 1949 to commence with the business of payments bank in April 2017.
Aditya Birla Payments Bank earlier operated as IMCSL (Idea Mobile Commerce Services Ltd) as a brand of Idea Cellular Ltd.
Aditya Birla Nuvo Limited holds 51 percent shares while the remaining 49 percent are with Idea Cellular.
Aditya Birla Payments Bank, which was a joint venture between Aditya Birla Nuvo and Idea Cellular, discontinued its banking business within 2 years of its inceptions due to lack of funds.
References
External links
Payments banks
Banks established in 2016
Online payments
Indian brands
Privately held companies of India
Indian companies established in 2016
Banks disestablished in 2019
2019 disestablishments in India
2016 establishments in Maharashtra
Banks based in Mumbai |
https://en.wikipedia.org/wiki/Reboot%20to%20restore%20software | Reboot to restore is a system of restore technology that enables restoring the user-defined system configuration of a computing device after every restart. The technology maintains systems in their optimum working conditions and is used in multi-user computing environments.
Deploying solutions based on Reboot to Restore technology allows users to define a particular system configuration as the desired state. The baseline is the point that is restored on reboot. Once the baseline is set, the Reboot to Restore software continues to restore that configuration every time the device restarts or switches on after a shutdown.
How it works
A reboot to restore software helps to maintain optimal system configuration. The technology prevents many alterations to the baseline configuration, whether user inflicted or automatic. Alterations by end users are primarily changes to system settings, installing or uninstalling of software or applications, enabling or disabling specific functionalities, and so on. The automatic alterations include cookies, add-ons and browser extensions, and several types of temporary files that often get downloaded in the background during an online session. It also rolls back malicious alterations made by malware that penetrates a system and attempts to corrupt it.
Uses
Reboot to restore software solutions simplifies maintaining optimal system configuration of devices in a multi-user computing environment such as public libraries, computer labs in educational institutions, training centers, and public access kiosks among others. Because of constant use by multiple people for a wide range of purposes, these devices become susceptible to performance deterioration and malware infiltration.
During events of system malfunction or failure, it takes a considerably longer time to troubleshoot the issue using conventional practices like resetting or re-imaging. This may lead to prolonged downtime, causing poor user experience, potential loss of business o |
https://en.wikipedia.org/wiki/Pivot%20to%20video | "Pivot to video" is a phrase referring to the trend, starting in 2015, of media publishing companies cutting staff resources for written content (generally published on their own web sites) in favor of short-form video content (often published on third-party platforms such as Facebook, Instagram, Twitter, YouTube, Snapchat, and TikTok). These moves were generally presented by publishers as a response to changes in social media traffic or to changes in the media consumption habits of younger audiences. According to commentators, however, it was in reality driven by advertising; only advertisers, not consumers, prefer video over text. Due to the numerous jobs lost as a result, the term eventually became a euphemism for layoffs, death, and termination.
Commentators have also noted a lack of transparency and accuracy in the viewership metrics reported by platforms such as Facebook, pointing out that abrupt shifts in platforms' proprietary algorithms can have devastating effects on publishers' viewership, traffic, and revenue. Following a scandal in which Facebook revealed it had artificially inflated numbers to its advertisers about how long viewers watched ads, many journalists and industry analysts concluded that the shift to video was based on such misleading or inaccurate metrics, which created a false impression that there was customer demand for additional video content.
History
Streaming media technology has been available since the early 1990s, though it was relatively low-fidelity and not widely available until the mid-2000s. In 2007, legacy media publishers including the New York Times, Washington Post and Time Inc. created new divisions to develop web videos, and Facebook launched its video platform. Twitter purchased micro-video service Vine in October 2012, began adding native video streaming in late 2014, and acquired video-streaming service Periscope in January 2015.
An August 2014 profile on BuzzFeed noted the publisher's large investment into video |
https://en.wikipedia.org/wiki/Freedom%20U540 | The Freedom U540 is a microprocessor using the RISC-V open architecture by fabless semiconductor company SiFive that is used to power the HiFive Unleashed computer. The U540 is one of the first commercially available microprocessors to use the RISC-V architecture, which is in contrast to the majority of the market, which uses mostly proprietary x86 and ARM microarchitectures. As the U540 was designed specifically for the HFU, it is not available on other devices or as a standalone component.
The U540 has a partial compatibility with coreboot.
References
System on a chip |
https://en.wikipedia.org/wiki/HiFive%20Unleashed | The HiFive Unleashed, or HFU is a single-board computer development board created by SiFive with the intention to increase exposure and adoption of the open-source RISC-V architecture.
The HFU is capable of running the Debian Linux distribution and Quake II.
References
Single-board computers |
https://en.wikipedia.org/wiki/Rodent%20Research%20Hardware%20System | NASA's Rodent Research Hardware System provides a research platform aboard the International Space Station for long-duration experiments on rodents in space. Such experiments will examine how microgravity affects the rodents, providing information relevant to human spaceflight, discoveries in basic biology, and knowledge that can help treat human disease on Earth.
Background
Based on the recommendations from the National Academies of Sciences, Engineering, and Medicine report Recapturing a Future for Space Exploration: Life and Physical Sciences Research for a New Era (2011). The report included a recommendation that NASA establish a rodent research facility aboard the International Space Station designated as a national laboratory “as soon as possible” to enable high-priority, long duration rodent studies. The goal was to conduct studies of durations up to 6 months. As mice and rats have life spans of at most 5 years the “studies on these rodents in space have the potential to extrapolate important implications for humans living in space well beyond six months."
The Rodent Research Hardware System was developed by scientists and engineers at NASA's Ames Research Center in Moffett Field, California. In the past short-term rodent experiments transported to space on various vehicle including the Space Shuttle. This is the first "permanent" laboratory for rodent research. The system was developed based on what was learned from the Animal Enclosure Module that flew aboard 27 Space Shuttle missions between 1983 and 2011. The first Rodent Research Hardware System was delivered to the ISS by SpaceX CRS-4.
Design
The system has 4 major components. The Transporter is used to safely house the rodents while being transported from Earth to the space station. This is also referred to as the Animal Enclosure Module-Transporter(AEM-T). As the trip from Earth can take up to 10 days an Environmental Control and Life Support System(ECLSS) is required. This is provided by the Anima |
https://en.wikipedia.org/wiki/History%20of%20cloud%20computing | The concept of the cloud computing as a platform for distributed computing traces its roots back to 1993. At that time, Apple spin-off General Magic and AT&T utilized the term in the context of their Telescript and Personal Link technologies.
In an April 1994 feature by Wired, titled "Bill and Andy's Excellent Adventure II", Andy Hertzfeld elaborated on Telescript, General Magic's distributed programming language. He described the expansive potential of the cloud:
Early history
In 1963, the Defense Advanced Research Projects Agency (DARPA) funded Project MAC, the first computer time-sharing system. During the 1960s, the initial concepts of time-sharing became popularized via Remote Job Entry (RJE); this terminology was mostly associated with large vendors such as IBM and DEC. Full-time-sharing solutions were available by the early 1970s on such platforms as Multics (on GE hardware), Cambridge CTSS, and the earliest UNIX ports (on DEC hardware). Yet, the "data center" model where users submitted jobs to operators to run on IBM mainframes was overwhelmingly predominant.
In the late 1980s, the invention of the world wide web led to internet expansion and on-premises data centers. In the 1990s, telecommunications companies, who previously offered primarily dedicated point-to-point data circuits, began offering virtual private network (VPN) services with comparable quality of service, but at a lower cost. By switching traffic as they saw fit to balance server use, they could use overall network bandwidth more effectively. They began to use the cloud symbol to denote the demarcation point between what the provider was responsible for and what users were responsible for. Cloud computing extended this boundary to cover all servers as well as the network infrastructure. As computers became more diffused, scientists and technologists explored ways to make large-scale computing power available to more users through time-sharing. They experimented with algorithms to optimiz |
https://en.wikipedia.org/wiki/Hydrothermal%20vent%20microbial%20communities | The hydrothermal vent microbial community includes all unicellular organisms that live and reproduce in a chemically distinct area around hydrothermal vents. These include organisms in the microbial mat, free floating cells, or bacteria in an endosymbiotic relationship with animals. Chemolithoautotrophic bacteria derive nutrients and energy from the geological activity at Hydrothermal vents to fix carbon into organic forms. Viruses are also a part of the hydrothermal vent microbial community and their influence on the microbial ecology in these ecosystems is a burgeoning field of research.
Hydrothermal vents are located where the tectonic plates are moving apart and spreading. This allows water from the ocean to enter into the crust of the earth where it is heated by the magma. The increasing pressure and temperature forces the water back out of these openings, on the way out, the water accumulates dissolved minerals and chemicals from the rocks that it encounters. There are generally three kinds of vents that occur and are all characterized by its temperature and chemical composition. Diffuse vents release clear water typically up to 30 °C. White smoker vents emit a milky-coloured water between 200-330 °C, and black smoker vents generally release water hotter than the other vents between 300-400 °C. The waters from black smokers are darkened by the precipitates of sulfide that are accumulated. Due to the absence of sunlight at these ocean depths, energy is provided by chemosynthesis where symbiotic bacteria and archaea form the bottom of the food chain and are able to support a variety of organisms such as Riftia pachyptila and Alvinella pompejana. These organisms use this symbiotic relationship in order to use and obtain the chemical energy that is released at these hydrothermal vent areas.
Environmental Properties
Although there is a large variation in temperatures at the surface of the water with the changing depths of the thermocline seasonally, the temperat |
https://en.wikipedia.org/wiki/Noriko%20H.%20Arai | Noriko H. Arai (, born 1962) is a Japanese researcher in mathematical logic and artificial intelligence, known for her work on a project to develop robots that can pass the entrance examinations for the University of Tokyo. She is a professor in the information and society research division of the National Institute of Informatics.
Education and career
Arai was born in Tokyo. She earned a law degree from Hitotsubashi University and then, in 1985, a mathematics degree magna cum laude from the University of Illinois at Urbana–Champaign. Her doctorate is from the Tokyo Institute of Technology.
She joined the National Institute of Informatics in 2001.
Contributions
Arai's Todai Robot Project aims to build a robot that can pass the entrance examinations for the University of Tokyo (commonly known as Todai) by 2021.
Arai became director of the project in 2011.
At a 2017 TED Talk, she reported that her system could achieve a score better than 80% of the applicants to the university; however, this was still not a passing score.
Arai sees the success of the project as evidence that human education should concentrate more on problem solving and creativity, and less on rote learning.
Arai is also the founder of Researchmap, "the largest social network for researchers in Japan". She was one of 15 top artificial intelligence researchers invited by French president Emmanuel Macron to join him in March 2018 for the announcement of a major new French initiative for artificial intelligence research.
References
Further reading
External links
ResearchMap profile
1962 births
Living people
Japanese computer scientists
Japanese mathematicians
Japanese women computer scientists
Women mathematicians
Mathematical logicians
Women logicians
Artificial intelligence researchers
Hitotsubashi University alumni
Tokyo Institute of Technology alumni
University of Illinois College of Liberal Arts and Sciences alumni |
https://en.wikipedia.org/wiki/Software%20diversity | Software diversity is a research field about the comprehension and engineering of diversity in the context of software.
Areas
The different areas of software diversity are discussed in surveys on diversity for fault-tolerance or for security.
The main areas are:
design diversity, n-version programming, data diversity for fault tolerance
randomization
software variability
Techniques
Code transformations
It is possible to amplify software diversity through automated transformation processes that create synthetic diversity. A "multicompiler" is compiler embedding a diversification engine. A multi-variant execution environment (MVEE) is responsible for selecting the variant to execute and compare the output.
Fred Cohen was among the very early promoters of such an approach. He proposed a series of rewriting and code reordering transformations that aim at producing massive quantities of different versions of operating systems functions. These ideas have been developed over the years and have led to the construction of integrated obfuscation schemes to protect key functions in large software systems.
Another approach to increase software diversity of protection consists in adding randomness in certain core processes, such as memory loading. Randomness implies that all versions of the same program run differently from each other, which in turn creates a diversity of program behaviors. This idea was initially proposed and experimented by Stephanie Forrest and her colleagues.
Recent work on automatic software diversity explores different forms of program transformations that slightly vary the behavior of programs. The goal is to evolve one program into a population of diverse programs that all provide similar services to users, but with a different code. This diversity of code enhances the protection of users against one single attack that could crash all programs at the same time.
Transformation operators include:
code layout randomization: reorder functions |
https://en.wikipedia.org/wiki/Shiri%20Artstein | Shiri Artstein-Avidan (, born 28 September 1978) is an Israeli mathematician who in 2015 won the Erdős Prize. She specializes in convex geometry and asymptotic geometric analysis, and is a professor of mathematics at Tel Aviv University.
Education and career
Artstein was born in Jerusalem, the daughter of mathematician Zvi Artstein. She graduated summa cum laude from Tel Aviv University in 2000, with a bachelor's degree in mathematics, and completed her PhD at Tel Aviv University in 2004 under the supervision of Vitali Milman, with a dissertation on Entropy Methods. She worked from 2004 to 2006 as a Veblen Research Instructor in Mathematics at Princeton University and as a researcher at the Institute for Advanced Study before returning to Tel Aviv as a faculty member in 2006.
Recognition
Artstein won the Haim Nessyahu Prize in Mathematics, an annual dissertation award of the Israel Mathematical Union, in 2006.
In 2008 she won the Krill Prize for Excellence in Scientific Research, from the
Wolf Foundation.
In 2015 she won the Anna and Lajos Erdős Prize in Mathematics. The award cited her "solution of Shannon's long standing problem on monotonicity of entropy (with K. Ball, F. Barthe and A. Naor), profound and unexpected development of the concept of duality, Legendre and Fourier transform from axiomatic viewpoint (with V. Milman) and discovery of an astonishing link between Mahler's conjecture in convexity theory and an isoperimetric-type inequality involving symplectic capacities (with R. Karasev and Y. Ostrover)".
Selected publications
Her research publications include:
References
External links
Home page
1978 births
Living people
Israeli mathematicians
Women mathematicians
Mathematical analysts
Tel Aviv University alumni
Academic staff of Tel Aviv University
Erdős Prize recipients |
https://en.wikipedia.org/wiki/Mattermost | Mattermost is an open-source, self-hostable online chat service with file sharing, search, and integrations. It is designed as an internal chat for organisations and companies, and mostly markets itself as an open-source alternative to Slack and Microsoft Teams.
History
The code was originally proprietary, as Mattermost was used as an internal chat tool inside SpinPunch, a game developer studio, but was later open-sourced. The 1.0 was released on October 2, 2015.
The project is maintained and developed by Mattermost Inc. The company generates funds by selling support services and additional features that aren't in the open-source edition.
It was also integrated into GitLab as "GitLab Mattermost", although in 2017 GitLab acquired Gitter, another popular chat tool, but in 2021 GitLab sold Gitter to Element, the parent company of Matrix.
Features
In the media, Mattermost is mostly regarded as an alternative to the more popular Slack. Aside from the in-browser version, there are desktop clients for Windows, MacOS and Linux and mobile apps for iOS and Android.
As of version 6.0 Mattermost includes kanban board and playbook features integrated in main interface.
Adoption
Mattermost has been tested for community use by Wikimedia as Wikimedia Chat on Wikimedia Cloud Services as of late summer 2020.
Among other adopters, companies having adopted Mattermost include CERN with a reported "10,000 monthly active users" having chosen Mattermost under the reasoning “didn’t want to use another service that locked in our data”, and the U.S. Department of Defense.
See also
List of collaborative software
References
External links
2015 software
Communication software
Go (programming language) software
Groupware
Instant messaging
Instant messaging clients
JavaScript software
Open-source cloud applications |
https://en.wikipedia.org/wiki/Mechanics%20of%20gelation | Mechanics of gelation describes processes relevant to sol-gel process.
In a static sense, the fundamental difference between a liquid and a solid is that the solid has elastic resistance against a shearing stress while a liquid does not. Thus, a simple liquid will not typically support a transverse acoustic phonon, or shear wave. Gels have been described by Born as liquids in which an elastic resistance against shearing survives, yielding both viscous and elastic properties. It has been shown theoretically that in a certain low-frequency range, polymeric gels should propagate shear waves with relatively low damping. The distinction between a sol (solution) and a gel therefore appears to be understood in a manner analogous to the practical distinction between the elastic and plastic deformation ranges of a metal. The distinction lies in the ability to respond to an applied shear force via macroscopic viscous flow.
In a dynamic sense, the response of a gel to an alternating force (oscillation or vibration) will depend upon the period or frequency of vibration. As indicated here, even most simple liquids will exhibit some elastic response at shear rates or frequencies exceeding 5 x 106 cycles per second. Experiments on such short time scales probe the fundamental motions of the primary particles (or particle clusters) which constitute the lattice structure or aggregate. The increasing resistance of certain liquids to flow at high stirring speeds is one manifestation of this phenomenon. The ability of a condensed body to respond to a mechanical force by viscous flow is thus strongly dependent on the time scale over which the load is applied, and thus the frequency and amplitude of the stress wave in oscillatory experiments.
Structural relaxation
The structural relaxation of a viscoelastic gel has been identified as primary mechanism responsible for densification and associated pore evolution in both colloidal and polymeric silica gels. Experiments in the viscoelasti |
https://en.wikipedia.org/wiki/Automated%20Guideway%20Transit%20System%20project%20%28Philippines%29 | The Philippine government has commenced a project to develop a locally designed and manufactured Automated Guideway Transit System (AGTS) through its Department of Science and Technology (DOST). Two prototype lines has been set up by the DOST, one within the University of the Philippines Diliman campus and another in Bicutan in Taguig.
Background
The Philippine government through the Department of Science and Technology (DOST) has made efforts to develop a locally designed Automated Guideway Transit System (AGTS) to curb heavy traffic and air pollution in Metro Manila. The DOST's AGTS was conceptualized to be similar to that of a monorail system but at one-fifth of its cost. AGTS lines are intended to be set up in Metro Manila to augment or serve as a "feeder" to the existing Manila Metro Rail Transit System. A prototype system was developed by the DOST with the University of the Philippines Diliman as a means to demonstrate AGT technology as an efficient mode of transport for the country.
The project is part of the DOST's broader High-Impact Technology Solutions (HITS) project. The leading implementing agency is the Metals Industry Research and Development Center (MIRDC) Other child agencies of the DOST involved are the Philippine Council for Industry, Energy and Emerging Technology Research and Development (PCIEERD) which funded the project under the Makina at Teknolohiya para sa Bayan (MakiBayan) Program of the MIRDC, and Project Management and Engineering Design Services Office (PMEDSO).
The UP National Center for Transportation Studies, College of Engineering, and the National Institute of Geological Sciences are also involved in the project as consultants to the DOST.
The project's lead implementing agency in DOST— the Metals Industry Research and Development Center (MIRDC)—constructed the train's main mechanical frameworks or “rolling stocks”, and subcontracted local companies and Fil-Asia Automotive to construct the guideway and the coaches, respectivel |
https://en.wikipedia.org/wiki/Hamilton%20Walk | The Hamilton Walk from Dunsink Observatory to Broom Bridge on the Royal Canal in Dublin takes place on 16 October each year. This is the anniversary of the day in 1843 when William Rowan Hamilton discovered the non-commutative algebraic system known as quaternions, while walking with his wife along the banks of the Royal Canal.
History
The walk was launched in 1990 by Prof Tony O'Farrell of the Department of Mathematics at St Patrick's College, Maynooth. It starts at DIAS Dunsink Observatory, where Hamilton lived and was the Director from 1827 to 1865, and ends at the spot where he recorded his discovery by carving the following equation on Broom Bridge:
These are the basic relations which define the quaternions. The original inscription by Hamilton is no longer there, but a plaque erected by the Dublin Institute for Advanced Studies (DIAS) and unveiled by the Taoiseach Éamon de Valera in 1958 marks the spot where he recorded his discovery.
Many prominent mathematicians have attended the event; they include Wolf Prize winner Roger Penrose (2013), Abel Prize and Copley Medal winner Andrew Wiles (2003), Fields Medallists Timothy Gowers (2004) and Efim Zelmanov (2009), and Nobel Prize winners Murray Gell-Mann (2002), Steven Weinberg (2005) and Frank Wilczek (2007).
At the end of the 1990s, O'Farrell's younger colleague Fiacre Ó Cairbre took over the organisation of the walk, but O'Farrell always gives a speech at Broome Bridge. O’Farrell and Ó Cairbre received the 2018 Maths Week Ireland Award for "outstanding work in raising public awareness of mathematics" resulting from the founding and nurturing of the Hamilton walk.
It has been argued that the discovery of the quaternions, by revealing deep mathematical structures that did not obey the commutative law, allowed mathematicians to create new systems unbound by the rules of ordinary arithmetic. It follows that the climax of the Hamilton walk at Broom Bridge marks the exact spot where modern algebra was born.
T |
https://en.wikipedia.org/wiki/Engineering%20economics%20%28civil%20engineering%29 | The study of Engineering Economics in Civil Engineering, also known generally as engineering economics, or alternatively engineering economy, is a subset of economics, more specifically, microeconomics. It is defined as a "guide for the economic selection among technically feasible alternatives for the purpose of a rational allocation of scarce resources."
Its goal is to guide entities, private or public, that are confronted with the fundamental problem of economics.
This fundamental problem of economics consists of two fundamental questions that must be answered, namely what objectives should be investigated or explored and how should these be achieved? Economics as a social science answers those questions and is defined as the knowledge used for selecting among “…technically feasible alternatives for the purpose of a rational allocation of scarce resources.” Correspondingly, all problems involving "...profit-maximizing or cost-minimizing are engineering problems with economic objectives
and are properly described by the label "engineering economy".
As a subdiscipline practiced by civil engineers, engineering economics narrows the definition of the fundamental economic problem and related questions to that of problems related to the investment of capital, public or private in a broad array of infrastructure projects. Civil engineers confront more specialized forms of the fundamental problem in the form of inadequate economic evaluation of engineering projects.
Civil engineers under constant pressure to deliver infrastructure effectively and efficiently confront complex problems associated with allocating scarce resources for ensuring quality, mitigating risk and controlling project delivery. Civil engineers must be educated to recognize the role played by engineering economics as part of the evaluations occurring at each phase in the project lifecycle.
Thus, the application of engineering economics in the practice of civil engineering focuses on the decision |
https://en.wikipedia.org/wiki/Poison%20message | A poison message refers to a client–server model issue, where a client machine tries to send a message to the server and fails too many times (the actual amount of "too many" is variable).
The behavior toward Poison messages varies - they are either discarded, create a service request event, or initiate other failure indications. The term is used mainly in Microsoft-related frameworks, like SQL Server or Windows Communication Foundation (WCF).
RabbitMQ also has a notion of poisoned messages.
See also
Microsoft Message Queuing
References
Message Queuing
Message-oriented middleware
Computing terminology |
https://en.wikipedia.org/wiki/Blazor | Blazor is a free and open-source web framework that enables developers to create web apps using C# and HTML. It is being developed by Microsoft.
Overview
Six different editions of Blazor apps have been announced.
Blazor Server: These apps are hosted on an ASP.NET Core server in ASP.NET Razor format. Remote clients act as thin clients, meaning that the bulk of the processing load is on the server. The client's web browser downloads a small page and updates its UI over a SignalR connection. Blazor Server was released as a part of .NET Core 3.
Blazor WebAssembly: Single-page apps that are downloaded to the client's web browser before running. The size of the download is larger than for Blazor Server, depends on the app, and the processing is entirely done on the client hardware. However, this app type enjoys rapid response time. As its name suggests, this client-side framework is written in WebAssembly, as opposed to JavaScript (while they can be used together).
Blazor PWA and Blazor Hybrid editions: The former supports progressive web apps (PWA). The latter is a platform-native framework (as opposed to a web framework) but still renders the user interface using web technologies (e.g. HTML and CSS).
Blazor Native: A platform-native framework that renders a platform-native user interface – has also been considered but has not reached the planning stage.
Blazor United: These apps will be a combination of both Blazor Server and Blazor WebAssembly and allow a "best of both worlds" solution where developers would be able to more finely tune the rendering mode. This approach would overcome the shortcomings of the potentially large up-front download that Blazor WebAssembly requires and the constantly open SignalR connection that Blazor Server requires. This version of Blazor is currently part of the .NET 8 roadmap and has not yet been released.
Despite the confusion that the descriptions of ASP.NET and Blazor could generate, the latter focuses on the creation of web |
https://en.wikipedia.org/wiki/Vertex%20k-center%20problem | The vertex k-center problem is a classical NP-hard problem in computer science. It has application in facility location and clustering. Basically, the vertex k-center problem models the following real problem: given a city with facilities, find the best facilities where to build fire stations. Since firemen must attend any emergency as quickly as possible, the distance from the farthest facility to its nearest fire station has to be as small as possible. In other words, the position of the fire stations must be such that every possible fire is attended as quickly as possible.
Formal definition
The vertex k-center problem is a classical NP-Hard problem in computer science. It was first proposed by Hakimi in 1964. Formally, the vertex k-center problem consists in: given a complete undirected graph in a metric space, and a positive integer , find a subset such that and the objective function is minimized. The distance is defined as the distance from the vertex to its nearest center in .
Approximation algorithms
If , the vertex k-center problem can not be (optimally) solved in polynomial time. However, there are some polynomial time approximation algorithms that get near-optimal solutions. Specifically, 2-approximated solutions. Actually, if the best possible solution that can be achieved by a polynomial time algorithm is a 2-approximated one. In the context of a minimization problem, such as the vertex k-center problem, a 2-approximated solution is any solution such that , where is the size of an optimal solution. An algorithm that guarantees to generate 2-approximated solutions is known as a 2-approximation algorithm. The main 2-approximated algorithms for the vertex k-center problem reported in the literature are the Sh algorithm, the HS algorithm, and the Gon algorithm. Even though these algorithms are the (polynomial) best possible ones, their performance on most benchmark datasets is very deficient. Because of this, many heuristics and metaheu |
https://en.wikipedia.org/wiki/Garsia%E2%80%93Wachs%20algorithm | The Garsia–Wachs algorithm is an efficient method for computers to construct optimal binary search trees and alphabetic Huffman codes, in linearithmic time. It is named after Adriano Garsia and Michelle L. Wachs.
Problem description
The input to the problem, for an integer , consists of a sequence of non-negative weights . The output is a rooted binary tree with internal nodes, each having exactly two children. Such a tree has exactly leaf nodes, which can be identified (in the order given by the binary tree) with the input weights.
The goal of the problem is to find a tree, among all of the possible trees with internal nodes, that minimizes the weighted sum of the external path lengths. These path lengths are the numbers of steps from the root to each leaf. They are multiplied by the weight of the leaf and then summed to give the quality of the overall tree.
This problem can be interpreted as a problem of constructing a binary search tree
for ordered keys, with the assumption that the tree will be used only to search for values that are not already in the tree. In this case, the keys partition the space of search values into intervals, and the weight of one of these intervals can be taken as the probability of searching for a value that lands in that interval. The weighted sum of external path lengths controls the expected time for searching the tree.
Alternatively, the output of the problem can be used as a Huffman code, a method for encoding given values unambiguously by using variable-length sequences of binary values. In this interpretation, the code for a value is given by the sequence of left and right steps from a parent to the child on the path from the root to a leaf in the tree (e.g. with 0 for left and 1 for right). Unlike standard Huffman codes, the ones constructed in this way are alphabetical, meaning that the sorted order of these binary codes is the same as the input ordering of the values. If the weight of a value is its frequency in a |
https://en.wikipedia.org/wiki/Vagueness%20and%20Degrees%20of%20Truth | Vagueness and Degrees of Truth is a 2008 book by Nicholas J. Smith, in which the author examines vagueness based on the idea of "degrees of truth". It means that although some sentences are true and some are false, others possess intermediate truth values.
In other words, some sentences are truer than the false sentences, but not as true as the true ones.
See also
Fuzzy logic
Half-truth
References
External links
Vagueness and Degrees of Truth
2008 non-fiction books
Oxford University Press books
Logic books |
https://en.wikipedia.org/wiki/Logic%3A%20The%20Laws%20of%20Truth | Logic: The Laws of Truth is a 2012 book by Nicholas J. Smith, in which the author provides an introduction to classical logic. It covers the formal tools and techniques of logic and their underlying rationales and broader philosophical significance. The book also presents various forms of proof: proof trees, major variants of natural deduction, axiomatic proofs, and sequent calculus. It also includes numerous logical exercises.
References
External links
Logic: The Laws of Truth
2012 non-fiction books
Princeton University Press books
Logic books |
https://en.wikipedia.org/wiki/Sinespace | Sinespace is a free-to-play massively multiplayer online Unity 3D-based platform created and published by Sine Wave Entertainment. It enables users to create and sell 3D content and interact with others as 3D avatars. It was beta launched in November 2016 and teamed up with Unity to make its SDK available in the Unity Asset Store in March 2019. It supports Oculus Rift, HTC Vive and Windows Mixed Reality headsets, but is also accessible through PC, Mac, Linux, and Chrome web browsers.
Usage
Sinespace's usage is similar to that of multiplayer virtual worlds. Players can create and customize their own 3D worlds and 3D content such as vehicles, mini-games, avatar clothing and gestures, and sell them for real world money. Players can also customize the shape and appearance of their avatar and buy avatars from third party developers such as Daz 3D. Content is created through a Unity 3D-compatible SDK, and in-game through building tools.
Enterprise
Sinespace also has private, white-labeled grids for enterprise use. Customers include the U.S. Department of Defense, Pearson Education, Virgin Group, the Smithsonian, the University of Edinburgh, Michigan State University, and other organizations.
Events
Sinespace has hosted several in-world talk shows featuring live audiences of avatars with notable people in the arts and technology, who also appear in avatar form, including video game designer Warren Spector, VR pioneer Jaron Lanier, MMO pioneer Richard Bartle, and Hugh Welchman, producer of the Oscar-nominated animated feature Loving Vincent.
Developer
Sinespace's lead developer is Adam Frisby, who was also a key developer of the open source virtual world OpenSimulator. Frisby additionally created a company that earned seven figures in real money by selling content in Second Life. Sinespace is published by Sine Wave Entertainment, a company based in London. The Chairman is Peter Norris, who is also Chairman of Virgin Group.
References
2016 video games
Windows gam |
https://en.wikipedia.org/wiki/Netstalking | Netstalking is a searching activity carried out within the limits of Internet, aimed at finding little-known, inaccessible, forbidden, shocking and rarely-visited objects, including their analysis, systematisation and storage. The objects found are either aesthetically pleasing or informationally fulfilling to a seeker.
This mostly includes the deep web and the darknet, partially IoT devices, deprecated or developing web protocols. Although irrational, the activity develops web searching skills and mindful work with information.
The term of "netstalking" was most likely created in 2009 in Russian part of the Net, and refers to S.T.A.L.K.E.R.
Methods of netstalking
In netstalking, there are two general methods for finding unusual information: a deli-search and a net-random. Deli-search, or "deliberated search", is a targeted search for objects of interest whose characteristics are already known. This method usually uses the language of search queries and web archives, with which one can view old or deleted versions of these pages. Net-random searches for hidden and unknown information through the process of trial and error. For netstalkers, the second method is considered to be the most popular way to search for information, as it allows network researchers to find undefined hidden resources. Net-randoming is done by either scanning IP address ranges or by using content randomizers, such as PetitTube. Special programs are used for scanning include Advanced IP scanner, Nmap / Zenmap, NESCA, and RouterScan by Stas’m.
Search areas
Netstalkers analyze the entire Internet, which is traditionally divided into several conditional segments.
Surface web
The surface web is the public Internet. In this part, one can find everything that is used by the average user of the network: social networks, blogs, encyclopaedias, news sites and others. In other words, the surface web is all that can be found using ordinary search engines (Google, Yahoo and others). The surface web |
https://en.wikipedia.org/wiki/Bamboo-mud%20wall | Bamboo-mud wall (編竹夾泥牆, also known as Bamboo-net clay wall, Taiwanese wattle, and daub) is a composite wall construction method largely used in Taiwan under Japanese rule in the early 20th century. Derived from Japanese wattle and daub (木舞, 小舞), Bamboo-mud wall differs from Japanese processor in its materiality, using bamboo instead of wood for woven lattice.
History
In conjunction of modernization, the Japanese built large concrete public buildings throughout Taiwan, at the same time, Japanese officials and government employees from mainland Japan demanded a significant amount of housing. To solve this need, the Government-General in Taiwan issued Standard Building Drawings of Officer’s Residences in 1922, and thus built a large number of standard housings based on traditional Japanese wood structures. Non governmental houses followed this technique soon afterwards. The transformation from Japanese wattle and daub to Taiwanese Bamboo-mud wall, is due to the fundamental difference of climate and flora between two regions.
Although largely built on the island of Taiwan, some are torn down during the World War II to prevent wildfire among wood structures during Allies's heavy raid on Taipei and other cities.
These houses applying Bamboo-mudwall flourished until 1945, when the Allies took over Taiwan from Japan's reign. Republic of China (Taiwan) soon retreated from the Chinese Civil War and relocated the government to Taiwan, houses built for Japanese officials served the new government's officials seamlessly, as a result, many of the houses are kept intact and taken care of.
Description
Bamboo-mud wall is a common filling in wood frame walls found in Taiwan.
Bamboo wattle reinforce mud wall structure by weaving themselves together, including thicker, wider horizontal strips called lî-kīng (籬梗) and thinner, narrower horizontal strips called lî-á (籬仔). For larger walls, builders add timber strips, about 6 cm in width, called àm-kīng (暗梗) between vertical frame e |
https://en.wikipedia.org/wiki/List%20of%20threatened%20ecological%20communities%20of%20Australia | This list of threatened ecological communities of Australia is derived from the Australian federal government's assessment of submissions regarding ecological communities, assemblages of flora and fauna with identified interactions in particular habitats, with determinations on their conservation status and level of protection under the Environment Protection and Biodiversity Conservation Act 1999. Their status as threatened ecological communities (TEC) is noted as meeting the criteria as critically endangered, endangered, or vulnerable, and where a revision has resulted in delisting or ineligibility.
Alpine Sphagnum Bogs and Associated Fens, endangered.
Aquatic Root Mat Community 1 in Caves of the Leeuwin Naturaliste Ridge, endangered.
Aquatic Root Mat Community 2 in Caves of the Leeuwin Naturaliste Ridge, endangered.
Aquatic Root Mat Community 3 in Caves of the Leeuwin Naturaliste Ridge, endangered.
Aquatic Root Mat Community 4 in Caves of the Leeuwin Naturaliste Ridge, endangered.
Aquatic Root Mat Community in Caves of the Swan Coastal Plain, endangered.
Arnhem Plateau Sandstone Shrubland Complex, endangered.
Assemblages of plants and invertebrate animals of tumulus (organic mound) springs of the Swan Coastal Plain, endangered.
Assemblages of species associated with open-coast salt-wedge estuaries of western and central Victoria ecological community, endangered.
Banksia Woodlands of the Swan Coastal Plain ecological community, endangered.
Blue Gum High Forest of the Sydney Basin Bioregion, critically endangered.
Brigalow (Acacia harpophylla dominant and co-dominant), endangered.
Broad leaf tea-tree (Melaleuca viridiflora) woodlands in high rainfall coastal north Queensland, endangered.
Buloke Woodlands of the Riverina and Murray-Darling Depression Bioregions, endangered.
Castlereagh Scribbly Gum and Agnes Banks Woodlands of the Sydney Basin Bioregion, endangered.
Central Hunter Valley eucalypt forest and woodland, critically endangered.
Clay Pan |
https://en.wikipedia.org/wiki/Virtual%20assistant%20privacy | Virtual assistants are software technology that assist users complete various tasks. Well known virtual assistants include Amazon Alexa, and Siri, produced by Apple. Other companies, such as Google and Microsoft, also have virtual assistants. There are privacy issues concerning what information can go to the third party corporations that operate virtual assistants and how this data can potentially be used.
Because virtual assistants similarly to robots or other artificial intelligence are often considered "nurturing" bodies, consumers may overlook potential controversies and value their convenience more than their privacy. When forming relationships with devices, humans tend to become closer to those that perform humanly functions, which is what virtual assistants do. In order to allow users both convenience and assistance, privacy by design and the Virtual Security Button (VS Button) propose methods in which both are possible.
One layer versus multilayer authentication
The Virtual Security Button, which would detect motion, has been proposed as a method of adding multilayer authentication to devices that currently only have a single layer; devices with single layer authentication solely require a voice to be activated. This voice could be any person, not necessarily the intended human, which makes the method unreliable. Multilayer authentication requires multiple layers of security to authorize a virtual assistant to work. The Virtual Security button would provide a second layer of authentication for devices, such as Alexa, that would be triggered by both movement and the voice combined.
A specific instance in which there are issues with the lack of verification necessary to unlock access to the virtual assistants and to give them commands is when an Amazon Alexa is left in a living quarters unattended. Currently, there is only one layer of authentication which is the voice; there is not a layer that requires the owner of the virtual assistant to be present. Th |
https://en.wikipedia.org/wiki/List%20of%20megaprojects%20in%20India | This is a list of megaprojects in India. "Megaprojects are temporary endeavours (i.e. projects) characterized by: large investment commitment, vast complexity (especially in organisational terms), and long-lasting impact on the economy, the environment, and society".
Aerospace
Commercial
Defense
Engines
Spaceport
Rockets
Extraterrestrial Probes
Satellite-based Navigation
Locomotives & Rail Transport
Technical Standards
Airports
Science and Technology
Supercomputing
Laboratories, Observatories and Related Projects
Digital Public Goods
Medical Vaccines
Reservoir and Irrigation projects
Dams
Riverlink
Coastal Reservoir
Energy projects
Fertilizer Plant
Refinery
Petrochemical Complex
Bio Gas
Power Projects
Solar Parks
Nuclear Power Plants
Nuclear Power R&D projects
Pumped storage hydropower Projects
Bharatmala projects
Bridges
Tunnels & Border Roads
Roads and Expressways
Sagar Mala projects
Big Ports
Big Public Sector ports are planned in Sagar Mala project.
There are also Private ports under construction/reopening
National Waterways
Also see, Ministry of Ports, Shipping and Waterways
Ferry
Gati Shakti projects
Passenger Transport
Freight Transportation
Multi-Modal Cargo Terminal/Land Ports
Higher-speed rail Project
Urban rail transit
RRTS
Normal System
World Class Railway Stations
Religious Projects
Sports Projects
Recreational Projects
Industrial Corridors
Urban Development Projects
Industrial Projects
List of integrated steel plant under construction
Naval Projects
Defense
Warship
Submarine
See also
Bharatmala
Sagarmala
Expressways of India
Urban rail transit in India
High-speed rail in India
Emerging Kerala
References
Megaprojects
Proposed infrastructure in India
Economy of India lists
India |
https://en.wikipedia.org/wiki/RPR%20FOM | The Real-time Platform Reference Federation Object Model (RPR FOM) enables linking computer simulations of discrete physical entities into complex virtual worlds. It is a High Level Architecture (HLA) federation object model developed for distributed simulation applications of defense and security. RPR FOM is listed in the NATO Modelling and Simulation Standards Profile AMSP-01.
The RPR FOM provides backwards compatibility with simulations using the Distributed Interactive Simulation (DIS) standard. It is standardized by Simulation Interoperability Standards Organization (SISO) as SISO-STD-001-2015.
The standard consists of two parts:
SISO-STD-001-2015 Standard for Guidance, Rationale, and Interoperability Modalities for the Real-time Platform Reference Federation Object Model (“GRIM”), which provides guidance for use of the RPR FOM.
SISO-STD-001.1-2015 Real-time Platform Reference Federation Object Model, which provides the object model in XML format for use in HLA Federations.
History and versions
When the High Level Architecture was introduced by the US Department of Defense in 1996 the RPR FOM effort was initiated to facilitate the migration from DIS to HLA.
RPR FOM version 1.0
This first RPR FOM version was released in 1998. It supports the capabilities of DIS version IEEE 1278.1-1995 (DIS 5). The standard provides a FOM supporting HLA version 1.3.
RPR FOM version 2.0
This updated version was released in 2015 as SISO-STD-001. RPR FOM 2.0 supports the capabilities of DIS version IEEE 1278.1a-1998 (DIS 6). The development of RPR FOM 2.0 started in 2000, but came to a halt in 2007, resulting in a widely used draft version 17. The work was restarted in 2012 and finalized with a published standard in 2015. The standard provides FOMs supporting the following HLA versions: 1.3, IEEE 1516-2000 and IEEE 1516-2010 (“HLA Evolved”) in both modular and monolithic formats.
RPR FOM version 3.0
Development of this upcoming version was started in 2016 by the SISO DIS a |
https://en.wikipedia.org/wiki/Gan%E2%80%93Gross%E2%80%93Prasad%20conjecture | In mathematics, the Gan–Gross–Prasad conjecture is a restriction problem in the representation theory of real or p-adic Lie groups posed by Gan Wee Teck, Benedict Gross, and Dipendra Prasad. The problem originated from a conjecture of Gross and Prasad for special orthogonal groups but was later generalized to include all four classical groups. In the cases considered, it is known that the multiplicity of the restrictions is at most one
and the conjecture describes when the multiplicity is precisely one.
Motivation
A motivating example is the following classical branching problem in the theory of compact Lie groups. Let be an irreducible finite dimensional representation of the compact unitary group , and consider its restriction to the naturally embedded subgroup . It is known that this restriction is multiplicity-free, but one may ask precisely which irreducible representations of occur in the restriction.
By the Cartan–Weyl theory of highest weights, there is a classification of the irreducible representations of via their highest weights which are in natural bijection with sequences of integers .
Now suppose that has highest weight . Then an irreducible representation of with highest weight occurs in the restriction of to (viewed as a subgroup of ) if and only if and are interlacing, i.e. .
The Gan–Gross–Prasad conjecture then considers the analogous restriction problem for other classical groups.
Statement
The conjecture has slightly different forms for the different classical groups. The formulation for unitary groups is as follows.
Setup
Let be a finite-dimensional vector space over a field not of characteristic equipped with a non-degenerate sesquilinear form that is -Hermitian (i.e. if the form is Hermitian and if the form is skew-Hermitian). Let be a non-degenerate subspace of such that and is of dimension . Then let , where is the unitary group preserving the form on , and let be the diagonal subgroup of .
Let be an irreducible |
https://en.wikipedia.org/wiki/Toehold%20mediated%20strand%20displacement | Toehold mediated strand displacement (TMSD) is an enzyme-free molecular tool to exchange one strand of DNA or RNA (output) with another strand (input). It is based on the hybridization of two complementary strands of DNA or RNA via Watson-Crick base pairing (A-T/U and C-G) and makes use of a process called branch migration. Although branch migration has been known to the scientific community since the 1970s, TMSD has not been introduced to the field of DNA nanotechnology until 2000 when Yurke et al. was the first who took advantage of TMSD. He used the technique to open and close a set of DNA tweezers made of two DNA helices using an auxiliary strand of DNA as fuel. Since its first use, the technique has been modified for the construction of autonomous molecular motors, catalytic amplifiers, reprogrammable DNA nanostructures and molecular logic gates. It has also been used in conjunction with RNA for the production of kinetically-controlled ribosensors. TMSD starts with a double-stranded DNA complex composed of the original strand and the protector strand. The original strand has an overhanging region the so-called “toehold” which is complementary to a third strand of DNA referred to as the “invading strand”. The invading strand is a sequence of single-stranded DNA (ssDNA) which is complementary to the original strand. The toehold regions initiate the process of TMSD by allowing the complementary invading strand to hybridize with the original strand, creating a DNA complex composed of three strands of DNA. This initial endothermic step is rate limiting and can be tuned by varying the strength (length and sequence composition e.g. G-C or A-T rich strands) of the toehold region. The ability to tune the rate of strand displacement over a range of 6 orders of magnitude generates the backbone of this technique and allows the kinetic control of DNA or RNA devices.
After the binding of the invading strand and the original strand occurred, branch migration of the invading |
https://en.wikipedia.org/wiki/Expensive%20tissue%20hypothesis | The expensive tissue hypothesis (ETH) relates brain and gut size in evolution (specifically in human evolution). It suggests that in order for an organism to evolve a large brain without a significant increase in basal metabolic rate (as seen in humans), the organism must use less energy on other expensive tissues; the paper introducing the ETH suggests that in humans, this was achieved by eating an easy-to-digest diet and evolving a smaller, less energy intensive gut. The ETH has inspired many research projects to test its validity in primates and other organisms.
The human brain stands out among the mammals because its relative size compared to the rest of the body. The brain of a homo sapien is about three times larger than that of its closest living relative, the chimpanzee. For a primate of its body size, the relative size of the brain and that of the digestive tract is rather unexpected; the digestive tract is smaller than expected for a primate of a human body size. In 1995, two scientists proposed an attempt to solve this phenomenon of human evolution using the Expensive Tissue Hypothesis.
Original paper
The original paper introducing the ETH was written by Leslie Aiello and P. E. Wheeler. Availability to new data on basal metabolic rate (BMR) and brain size has shown that energetics is an issue in the maintenance of a relatively large brain, like the human brain. In mammals, brain size is positively correlated with the BMR. In the paper, they sought to explain how humans managed to have energy for their large and metabolically expensive brains while still maintaining a BMR comparable to other primates with smaller brains. They found that the humans’ smaller relative gut size almost completely compensated for the metabolic cost of the larger brain. They went on to postulate that a larger brain would allow for more complex foraging behavior, which would result in a higher quality diet, which would then allow the gut to shrink further, freeing up more energ |
https://en.wikipedia.org/wiki/Shabal | Shabal is a cryptographic hash function submitted by the France-funded research project Saphir to NIST's international competition on hash functions.
Saphir partners
The research partners of Saphir (with the exception of LIENS) initiated the conception of Shabal and were later joined by partners of the research project Saphir2 who actively contributed to the final design of Shabal. Saphir (Security and Analysis of Hash Primitives) is an ANR funded project on hash functions. Saphir has started in March 2006 for a duration of three years and brought five partners together: Cryptolog International, DCSSI, France Telecom (leader), Gemalto and LIENS. Partners of Saphir2 come from both industry and academia; in addition to partners of Saphir, 4 new partners: EADS SN, INRIA, Sagem Sécurité and UVSQ joined and contributed to the project.
History
Shabal was an entry in the NIST hash function competition, where it passed to the second round, but failed to enter the final round. Shabal was not selected as a finalist mainly due to security concerns. Although the security of the full hash algorithm was not compromised, the discovery of non-randomness properties with low time complexities raised concerns among NIST's cryptographers about the possibility of more powerful attacks in the future.
The name of the algorithm was chosen as a tribute to Sébastien Chabal.
Description
Shabal uses a mode of operation that can be considered as a variant of a wide-pipe, Merkle–Damgård hash construction. The internal state of Shabal consists of three parts, denoted as A, B and C. The keyed permutation of Shabal updates A and B using nonlinear feedback shift registers that interact with each other. The main loop of the permutation uses modular multiplication by three and five, modular addition, XOR, complementation, and AND operations.
The chaining mode of Shabal works as follows:
(A, B) ← PM,C
(A, B, C) ← (A, C – M, B),
(A ⊕ W, B + M),
where M is the message block, and W is the cou |
https://en.wikipedia.org/wiki/Push%20of%20the%20past | The push of the past is a type of survivorship bias associated with evolutionary diversification when extinction is possible. Groups that survive a long time are likely to have “got off to a flying start”, and this statistical bias creates an illusion of a true slow-down of diversification rate through time.
Birth–Death modelling in evolutionary studies
The evolutionary processes of speciation and extinction can be modelled with a stochastic “birth–death model” (BDM), which is an important component in the study of macroevolution. A BDM assigns each species a certain probability of splitting () or going extinct () per interval of time. This gives rise to an exponential distribution, with the number of species in a particular clade N at any time t given by
,
although this expression only gives the expected value when and are large (see below).
In the special case of there being no extinction, this simplifies to the so-called "Yule process".
Lineage-through-time plots
A different type of plot of diversity through time, called a “lineage through time” (LTT) plot, retrospectively reconstructs the number of lineages that led to the living species of a group. This is equivalent to constructing a dated phylogeny and then counting how many branches are present at each time interval. As we know retrospectively that all such lineages survived until the present, it follows that no extinction is possible along them. It can be shown that the rate of production of new lineages through time is given by .
Survivorship bias in diversification
Rather than considering the distribution of all possible stochastic outcomes for given values of and it is also possible to consider what happens when certain conditions of survivorship are imposed on the possible outcomes.
Push of the past
If a BDM is forward-modelled, i.e. if the fate of an original single species is modelled through time, then a wide range of possible outcomes can occur, as the process is stochastic. With |
https://en.wikipedia.org/wiki/Ulam%E2%80%93Warburton%20automaton | The Ulam–Warburton cellular automaton (UWCA) is a 2-dimensional fractal pattern that grows on a regular grid of cells consisting of squares. Starting with one square initially ON and all others OFF, successive iterations are generated by turning ON all squares that share precisely one edge with an ON square. This is the von Neumann neighborhood. The automaton is named after the Polish-American mathematician and scientist Stanislaw Ulam and the Scottish engineer, inventor and amateur mathematician Mike Warburton.
Properties and relations
The UWCA is a 2D 5-neighbor outer totalistic cellular automaton using rule 686.
The number of cells turned ON in each iteration is denoted with an explicit formula:
and for
where is the Hamming weight function which counts the number of 1's in the binary expansion of
The minimum upper bound of summation for is such that
The total number of cells turned ON is denoted
Table of wt(n), u(n) and U(n)
The table shows that different inputs to can lead to the same output.
This surjective property emerges from the simple rule of growth – a new cell is born if it shares only one-edge with an existing ON cell - the process appears disorderly and is modeled by functions involving but within the chaos there is regularity.
is OEIS sequence A147562 and is OEIS sequence A147582
Counting cells with quadratics
For all integer sequences of the form where and
Let
( is OEIS sequence A130665)
Then the total number of ON cells in the integer sequence is given by
Or in terms of we have
Table of integer sequences nm and Um
Upper and lower bounds
has fractal-like behavior with a sharp upper bound for given by
The upper bound only contacts at 'high-water' points when .
These are also the generations at which the UWCA based on squares, the Hex–UWCA based on hexagons and the Sierpinski triangle return to their base shape.
Limit superior and limit inferior
We have
The lower limit was obtained by Robert Price ( |
https://en.wikipedia.org/wiki/Bessie%20Niemeyer%20Marshall | Bessie Niemeyer Marshall was an American botanical illustrator known for her watercolor paintings of the wildflowers of Lee Memorial Park. Her artwork documented the variety of plant species being preserved in Lee Memorial Park, a Works Progress Administration-funded wildflower and bird sanctuary in Petersburg, Virginia.
Born Sarah Elizabeth Niemeyer on December 25, 1884, in Portsmouth, Virginia, Bessie Niemeyer married Myron Barrand Marshall, an Episcopalian priest, in 1907 and had nine children. After service in parishes in the Philippines and in Virginia, the family settled in Petersburg in 1937.
In 1935, the city of Petersburg, using W.P.A. (Women's and Professional Division) funds, authorized the creation of a 25-acre wildflower sanctuary in Lee Memorial Park. Under the direction of Petersburg Garden Club member Mary Donald Claiborne Holden, African American women labored on the project through 1940, clearing ravines, building ten miles of paths, and planting 365,00 plants, including 8,000 trees and 37,000 shrubs and more than one million honeysuckle roots to prevent erosion. In 1937, Holden hired Marshall to paint watercolors of the dried and pressed plant specimens of Lee Park flora. A self-taught artist, Marshall produced 238 watercolors of the Lee Park herbarium specimens; the paintings and 325 specimens were stored together in fourteen brown scrapbooks, ultimately housed for almost fifty years in the Petersburg Public Library. The collection was rediscovered by the Petersburg Garden Club in the 1990s. The current location of the collection is at Lewis Ginter Botanical Garden.
Although she pursued other illustration assignments, Marshall had no other major commissions. She died on February 14, 1960, in Portsmouth, Virginia.
Lee Memorial Park is now on the National Register of Historic Places. Marshall and the Lee Park W.P.A. project are the subjects of a monograph published in 2000. In 2014, fourteen reproductions of Marshall's paintings were exh |
https://en.wikipedia.org/wiki/Discrepancy%20game | A discrepancy game is a kind of positional game. Like most positional games, it is described by its set of positions/points/elements () and a family of sets (- a family of subsets of ). It is played by two players, called Balancer and Unbalancer. Each player in turn picks an element. The goal of Balancer is to ensure that every set in is balanced, i.e., the elements in each set are distributed roughly equally between the players. The goal of Unbalancer is to ensure that at least one set is unbalanced.
Formally, the goal of balancer is defined by a vector where n is the number of sets in . Balancer wins if in every set i, the difference between the number of elements taken by Balancer and the number of elements taken by Unbalancer is at most bi.
Equivalently, we can think of Balancer as labeling each element with +1 and Unbalancer labeling each element with -1, and Balancer's goal is to ensure the absolute value of the sum of labels in set i is at most bi.
The game was introduced by Frieze, Krivelevich, Pikhurko and Szabo, and generalized by Alon, Krivelevich, Spencer and Szabo.
Comparison to other games
In a Maker-Breaker game, Breaker has to take at least one element in every set.
In an Avoider-Enforcer game, Avoider has to take at most k-1 element in every set with k vertices.
In a discrepancy game, Balancer has to attain both goals simultaneously: he should take at least a certain fraction, and at most a certain fraction, of the elements in each set.
Winning conditions
Let n be the number of sets, and ki be the number of elements in set i.
If , then Balancer has a winning strategy. In particular, if for all i, , then Balancer has a winning strategy. In particular, if the size of all sets is k, then Balancer can ensure that in each set, each of the players has between and elements.
If , then Balancer has a winning-strategy for the case that for every i, bi = ki-1 (so Balancer can each player has an element in each of the sets).
References
|
https://en.wikipedia.org/wiki/Data%20center%20management | Data center management is the collection of tasks performed by those responsible for managing ongoing operation of a data center. This includes Business service management and planning for the future.
Historically, "data center management" was seen as something performed by employees, with the help of tools collectively called Data Center Infrastructure Management (DCIM) tools.
Both for in-house operation and outsourcing, service-level agreements must be managed to ensure data-availability.
Competition
Data center management is a growing major topic for a growing list of large companies who both compete and cooperate, including: Dell, Google, HP, IBM, Intel and Yahoo.
Hardware/software vendors who are willing to live with coopetition are working on projects such as "The Distributed Management Task Force" (DMTF) with a goal of learning to "more effectively manage mixed Linux, Windows and cloud environments."
With the DMTF a decade old, the list of companies is growing, and also includes companies much smaller than IBM, Microsoft, et al.
Focus
Among the topics currently being explored are: scalability, securing data center networks, disaster recovery, government restrictions.
Another major area is the cost of downtime regarding customer dissatisfaction & business loss, and also the "astonishing" yet hidden cost and effect regarding personnel & productivity.
Business-service management
Business-service management (BSM) treats IT as part of the larger enterprise strategy, and helps fill the gap between business and IT.
IBM notes that major problems often happen in the grey areas, particularly due to errors in the interfaces, and focuses on critical failures. Sufficient redundancy should allow failures in non-critical areas to protect the business from being affected. BSM, which is positioned above IT Service Management (ITSM), promotes a customer-centric and business-focused approach to service management, aligning business objectives with IT or ICT from strat |
https://en.wikipedia.org/wiki/Edmond%20de%20Belamy | Edmond de Belamy is a generative adversarial network portrait painting constructed in 2018 by Paris-based arts-collective Obvious. Printed on canvas, the work belongs to a series of generative images called La Famille de Belamy. The name Belamy is a tribute to Ian Goodfellow, inventor of GANs; In French "bel ami" means "good friend" so it is a translated pun of Goodfellow. It achieved widespread notoriety after Christie's announced its intention to auction the piece as the first artwork created using artificial intelligence to be featured in a Christie's auction. It surpassed pre-auction estimates which valued it at $7,000 to $10,000, instead selling for $432,500.
The piece is a portrait of a somewhat-blurry man. It is a print on canvas measuring 27 x 27 in (700 x 700 mm.) set within a gilded wood frame. The image was created by an algorithm that referenced 15,000 portraits from various periods.
It is signed at the bottom right with , which is part of the algorithm code that produced it. The algorithm was trained on a set of 15,000 portraits from online art encyclopedia WikiArt, spanning the 14th to the 19th century.
The organization that produced it is called Obvious. It is a collective comprising three people, Pierre Fautrel, Hugo Caselles-Dupré and Gauthier Vernier, who are based in Paris, France.
The piece has been criticized because it was created using a generative adversarial network (GAN) software package based on prior research by others and implemented by Robbie Barrat, an AI artist who was not affiliated with Obvious, leading to allegations that Obvious contributed minimally to the final work product. Posts on the project's issue tracker show Obvious members requesting that Barrat provide support and custom features.
The piece has also been placed within a tradition, dating back to Duchamp's Bicycle Wheel of 1913 and Tinguely's Méta-matics of the late 1950s, of works calling into question the basis of the modern art market, and highlighting the com |
https://en.wikipedia.org/wiki/E-NABLE | E-NABLE is a distributed, Open Source community that creates and shares open source designs for assistive devices. It is known for creating the first 3D printable prosthetic hand and sharing the designs and code for bioelectric limbs.
History
In 2011, Ivan Owen created a metal, functional puppet hand for a Steampunk costume. After posting a video of the hand on YouTube, he was contacted by South African carpenter Richard Van As who had lost his fingers in a woodworking accident. Owen and Van As worked on prototypes of a prosthetic hand, before Owen decided to incorporate 3D printing into the design process. This led to the creation of the first 3D printed mechanical hand. The sharing of the design of this hand on an Open License led to the creation of the community.
The e-NABLE community "started with around 100 or so people who were simply offering to print the files that were already in existence".
Chapters of the organisation exist in many countries, and each works in different ways. For example, one Canadian chapter recycles excess plastic waste to create the prosthetics. A chapter in Aden, Yemen, is producing prosthetic hands for people injured in Yemen's civil war.
The Open Source nature of the project is enabling diverse groups around the world to create prosthetics for people within their own communities. A Colombian engineer called Christian Silva has created superhero-themed prosthetic arms for children. In 2016, an Iron Man-themed arm created by Albert Menero was given to a child by Iron Man actor Robert Downey Jr.
How it works
The E-nable website contains a tool called the “Handomatic,” which is used to fit prosthetic hands according to the measurements of the individual recipient. The tool then creates a custom design which can then be downloaded.
Categories of design
Body powered arms and hands
Functional lower legs
Myoelectric upper limbs
Upper limb exoskeleton
Tools
Devices for people with vision impairment
Teaching manipulatives
|
https://en.wikipedia.org/wiki/Steinmetz%20curve | A Steinmetz curve is the curve of intersection of two right circular cylinders of radii and whose axes intersect perpendicularly. In case of the Steimetz curves are the edges of a Steinmetz solid. If the cylinder axes are the x- and y-axes and , then the Steinmetz curves are given by the parametric equations:
It is named after mathematician Charles Proteus Steinmetz, along with Steinmetz's equation, Steinmetz solids, and Steinmetz equivalent circuit theory.
In the case when the two cylinders have equal radii the curve degenerates to two intersecting ellipses.
See also
Cylinder
References
Curves
Euclidean geometry |
https://en.wikipedia.org/wiki/Jean%20Pedersen | Jean J. Pedersen (Sep 17, 1934–Jan 1, 2016) was an American mathematician and author particularly known for her works on the mathematics of paper folding.
Education and career
Pedersen was born in Salt Lake City, Utah, the daughter of an ophthalmologist and a teacher. She studied home economics changing to a double major in mathematics and physics as an undergraduate at Brigham Young University, before becoming a graduate student in mathematics at the University of Utah under the supervision of E. Allen Davis.
After completing her master's degree, she moved to San Jose, California, following her husband who worked for IBM. She joined the faculty at the Santa Clara University on a part-time basis in 1966, but shifted to full-time and was promoted to full professor in 1996. She was the first woman to teach mathematics at the university, and the first to be tenured as a mathematics professor.
Her discovery that the platonic solids could be braided from strips of paper led to Martin Gardner writing about it in the September, 1971 Mathematical Games column in Scientific American.
Books
Pedersen's books include:
Geometric Playthings (With Kent Pedersen, Dale Seymour Publications Secondary, 1973, )
Fear No More: An Adult Approach to Mathematics (with Peter Hilton, Dale Seymour Publications, 1982 )
Build Your Own Polyhedra (with Peter Hilton, Addison-Wesley, 1988)
Mathematical Reflections: In a Room with Many Windows (with Peter Hilton and Derek Holton, Springer, 1996)
Mathematical Vistas: From a Room with Many Windows (with Peter Hilton and Derek Holton, Springerl 2002)
99 Points of Intersection: Examples—Pictures—Proofs (by Hans Walser, translated with Peter Hilton, Mathematical Association of America, 2006)
A Mathematical Tapestry: Demonstrating the Beautiful Unity of Mathematics (with Peter Hilton, illustrated by Sylvie Donmoyer, Cambridge University Press, 2010)
She and Peter Hilton also translated The Golden Section and Symmetry by Hans Walser from German into E |
https://en.wikipedia.org/wiki/Division%20by%20infinity | In mathematics, division by infinity is division where the divisor (denominator) is ∞. In ordinary arithmetic, this does not have a well-defined meaning, since ∞ is a mathematical concept that does not correspond to a specific number, and moreover, there is no nonzero real number that, when added to itself an infinite number of times, gives a finite number. However, "dividing by ∞“ can be given meaning as an informal way of expressing the limit of dividing a number by larger and larger divisors.
Using mathematical structures that go beyond the real numbers, it is possible to define numbers that have infinite magnitude yet can still be manipulated in ways much like ordinary arithmetic. For example, on the extended real number line, dividing any real number by infinity yields zero, while in the surreal number system, dividing 1 by the infinite number yields the infinitesimal number . In floating-point arithmetic, any finite number divided by is equal to positive or negative zero if the numerator is finite. Otherwise, the result is NaN.
The challenges of providing a rigorous meaning of "division by infinity" are analogous to those of defining division by zero.
Within the domain of mathematical discourse, the contemplation of dividing infinity by itself gives rise to a proposition of interest. Specifically, the assertion that the result of dividing infinity by infinity ( ∞ ÷ ∞ = ∞ ) is tantamount to infinity itself merits exploration. A logical journey unveils the underpinnings of this concept and its mathematical validity.
Consider a parameter denoted as "y," which, for the sake of analysis, is assigned the value 10. The crux of the matter rests in the equation ∞ ÷ y = ∞, where the introduction of y introduces an essential condition. To render the equation coherent, y must assume a magnitude that is sufficiently vast to accommodate the division operation involving infinity. This requirement reflects the conceptual intricacies associated with dealing with the conc |
https://en.wikipedia.org/wiki/Human%20presence%20detection | Human presence detection is a range of technologies and methods for detecting the presence of a human body in an area of interest (AOI), or verification that computer, smartphone (or other device controlled by software) is operated by human.
Software and hardware technologies are used for human presence detection. Unlike human sensing, that is dealing with human body only, human presence detection technologies are used to verify for safety, security or other reasons that human person, but not any other object is identified. Methods can be used for internet security authentication. These include software technologies such CAPTCHA and reCAPTCHA, as well as hardware technologies such as:
Radar technology
Image recognition of human shapes
Security switch
Fingerprint sensors
Infrared detectors
Acoustic sensors
Vibration sensors
Examples
reCAPTCHA is a CAPTCHA-like system designed to establish that a computer user is human (normally in order to protect websites from bots) and, at the same time, assist in the digitization of books.
A sensor based on a piezoelectric film (EMFI sensor) is used to detect mechanical vibrations and the presence of a person seated on the rear bench of a vehicle. In order to distinguish between humans, heavy objects, and empty seats, signal processing techniques are used.
History
The first robot to successfully demonstrate a static motion detection capability was ROBART I, which was Everett's 1981 thesis project at the Naval Postgraduate School.
In 1997 CAPTCHA ("Completely Automated Public Turing test to tell Computers and Humans Apart") was invented. This test is used to ensure that computer is operated by a human, preventing spam robots.
See also
References
Sensors
Human–computer interaction |
https://en.wikipedia.org/wiki/AdGuard | AdGuard is an ad blocking service provided by AdGuard Software Limited with applications for Microsoft Windows, Linux, MacOS, Android and iOS. AdGuard is also available as a browser extension.
AdGuard Software Limited was founded in 2009 in Moscow. In 2014 AdGuard Software Limited's products became available in Cyprus, to where its headquarters were subsequently moved.
Features
AdGuard features include:
AdGuard Home
AdGuard Home acts as a recursive DNS resolver, which prevents most advertisements from displaying by responding with an invalid address for domains that appear in its filter lists. It is similar to Pi-hole.
AdGuard Browser extensions
The browser extension blocks video ads, interstitial ads, floating ads, pop-ups, banners, and text ads. It is also able to handle anti-AdBlock scripts. The product blocks spyware and warns users of malicious websites. AdGuard Content Blocker is an additional browser extension for browsers Yandex Browser and Samsung Internet, which uses Content Blocker API. It downloads filter list updates and asks browsers to enforce them via Content Blocker API.
AdGuard applications
AdGuard has Windows and Mac versions, as well as native mobile versions for Android and iOS. The application sets up a local VPN, which filters all traffic on the mobile device.
AdGuard DNS
AdGuard operates recursive name servers for public use. AdGuard DNS supports encryption technologies, including DNSCrypt, DNS over HTTPS, DNS over TLS, and DNS-over-QUIC. AdGuard began testing DNS service back in 2016, and officially launched it in 2018.
Reception
While the company's products have earned positive feedback in industry publications, a series of policies by Google and the Apple app store were implemented between 2014 - 2018, which impeded user access to AdGuard's mobile applications.
Macworld mentioned AdGuard for iOS in a list of five "best adblockers for iOS".
In April 2020, Android Central stated that AdGuard uses "a little more processin |
https://en.wikipedia.org/wiki/Serge%20Cantat | Serge Marc Cantat (born 3 June 1973, in Paris) is a French mathematician, specializing in geometry and dynamical systems.
Cantat received his PhD under the supervision of Étienne Ghys in 1999 at the École normale supérieure de Lyon. Cantat is a directeur de recherche of CNRS at the Institut de recherches mathématiques de Rennes (University of Rennes 1). He was previously directeur de recherche of CNRS at ENS Paris.
His research deals with complex dynamics and dynamics of automorphisms of algebraic surfaces. He examined the algebraic structure of Cremona groups (i.e. groups of birational automorphisms of -dimensional projective spaces over a field ) and showed with Stéphane Lamy that for an algebraically closed field and for dimension =2 the Cremona group is not a simple group. In particular, if is the field of complex numbers and =2, the Cremona group contains an infinite non-countable family of different normal subgroups.
In 2018, Cantat was an invited speaker at the International Congress of Mathematicians in Rio de Janeiro. In 2012 he received the Prix Paul Doistau–Émile Blutet for his work on dynamic systems (and especially holomorphic dynamic systems). In 2012 he was an invited speaker at the European Congress of Mathematics in Kraków. In 2012 he was awarded the Prix La Recherche.
Selected publications
Dynamique des automorphismes des surfaces K3, Acta Math., Vol. 187, 2001, pp. 1–57.
with C. Favre: Symétries birationnelles des surfaces feuilletées, J. Reine Ange. Math., Vol. 561, 2003, pp. 199–235, Arxiv
Endomorphismes des variétés homogènes, L'Enseignement Math., Vol. 49, 2004, pp. 237–262
Difféomorphismes holomorphes Anosov, Commentarii Math. Helvetici, vol. 79, 2004, pp. 779–797
with Frank Loray: Holomorphic dynamics, Painlevé VI equation, and character varieties, Annales de l'Institut Fourier, Vol. 59, 2009, pp. 2927–2978, Arxiv
Bers and Hénon, Painlevé and Schroedinger, Duke Math. Journal, Vol. 149, 2009, pp. 411–460, Arxiv
with Antoine Ch |
https://en.wikipedia.org/wiki/Faces%20%28online%20community%29 | Faces is an international online community of women who share an interest in digital media arts. They communicate via an email list and organize events both online and off. Founded in 1997, this informal network includes activists, artists, critics, theoreticians, technicians, journalists, researchers, programmers, networkers, web designers, and educators.
History
Faces was founded in 1997 by three participants in the first wave of net art — Kathy Rae Huffman, Diana McCarty, and Valie Djordjevic — as a response to the relative invisibility of women working in the field of new media arts. Initially, Huffman and McCarty served as co-moderators and Djordjevic as technical advisor. Ushi Reiter joined the team in 2000. Through email and meet-ups at European media arts and culture events, the Faces community discussed what was going on in new media, shared information about projects, and strategized about how to counter the lack of representation of women in the field of new media.
The Faces community has continued to grow and remains instrumental in generating cyberfeminist theory and critique, creating both offline and online spaces for discussion around this topic. It is recognised as part of the first wave of networked arts communities along with such email lists as Nettime, Rhizome, Fibreculture, and _empyre_.
As of 2018, the Faces email list constituted an international community of more than 400 members, with exhibitions and meetings organised within the framework of established art and media festivals and events (such as Ars Electronica, Transmediale, and ISEA) as well as through independent events such as the 20th anniversary of Faces (2017).
Since 2002 the Faces mailing list and website has been hosted by servus.at in Linz, Austria. In 2003, a grant from the Austrian Ministry of Culture enabled the creation of a Faces website, which launched in 2004.
Key events
"Beauty and the East", Ljubljana, Slovenia, 1997. An informal faces gathering was held during th |
https://en.wikipedia.org/wiki/Joint%20Enterprise%20Defense%20Infrastructure | The Joint Enterprise Defense Infrastructure (JEDI) contract was a large United States Department of Defense cloud computing contract which has been reported as being worth $10 billion over ten years. JEDI was meant to be a commercial off-the-shelf (COTS) implementation of existing technology, while providing economies of scale to DoD.
Controversy
Companies interested in the contract included Amazon, Google, Microsoft and Oracle. After protests from Google employees, Google decided to drop out of contention for the contract because of conflict with its corporate values. The deal was considered "gift-wrapped for Amazon" until Oracle (co-chaired by Safra Catz) contested the contract, citing the National Defense Authorization Act over IDIQ contracts and the conflicts of interest from Deap Ubhi, who worked for Amazon both before and after his time in the Department of Defense. This led Eric G. Bruggink, senior judge of the United States Court of Federal Claims, to place the contract award on hold.
In August 2019, weeks before the winner was expected to be announced, President Donald Trump ordered the contract placed on hold again for Defense Secretary Mark Esper to investigate complaints of favoritism towards Amazon. In October 2019, it was announced that the contract was awarded to Microsoft. Media has noted Trump's dislike towards Amazon's founder, Jeff Bezos, owner of the Washington Post, a newspaper critical of Trump. According to Bezos, Trump "used his power to 'screw Amazon' out of the JEDI Contract". The JEDI contract was awarded to Microsoft on October 25, 2019, the DoD announced, but AWS filed documents with the Court of Federal Claims on November 22, 2019 challenging the award; its legal strategy included calling Trump to testify.
A federal judge, Patricia Campbell-Smith, halted Microsoft's work on the project on February 13, 2020, a day before the system was scheduled to go live, awaiting a resolution in Amazon's suit. She said that Amazon's claims are reas |
https://en.wikipedia.org/wiki/Zimmer%27s%20conjecture | Zimmer's conjecture is a statement in mathematics "which has to do with the circumstances under which geometric spaces exhibit certain kinds of symmetries." It was named after the mathematician Robert Zimmer. The conjecture states that there can exist symmetries (specifically higher-rank lattices) in a higher dimension that cannot exist in lower dimensions.
In 2017, the conjecture was proven by Aaron Brown and Sebastián Hurtado-Salazar of the University of Chicago and David Fisher of Indiana University.
References
Symmetry
Conjectures that have been proved |
https://en.wikipedia.org/wiki/Head%20IV | Head IV, sometimes subtitled Man with a Monkey, is a 1949 painting by Irish-born British artist Francis Bacon, one of series of works made in 1949 for his first one-man exhibition at the Hanover Gallery, in London. It measures and is held in a private collection.
The painting is part of a series of six works from the late 1940s depicting heads. Like Head III and Head V, Head IV is usually considered as an intermediate steps towards his Head VI (and Head IV is sometimes confused with the better known Head VI). The work depicts the upper half of a male figure in a suit, in a rear quarter view facing away from the viewer, in a space shrouded with vertical bands interpreted as curtains. The figure is possibly looking in a mirror, where a simian face looks back. Like Head III, it is painted in dark tones of grey and black on a beige ground with white highlights, which in this case pick out the man's shirt collar, his neck, ear and temple. The placing of the two heads suggest the man is dissolving into the monkey, although the man is sometimes described as having a monkey on his shoulder; the low contrast between the elements have been likened to a cinematic dissolve. It may be based on a photograph.
Bacon's six Head paintings were first exhibited at the Hanover Gallery in 1949, alongside four other important early works by Bacon: Three Studies for Figures at the Base of a Crucifixion, Figure in a landscape, Study from the Human Body and Study for Portrait (also known as Man in a Blue Box). Many are now held by major public collections.
Head IV was bought in 1949 by Tony Hubbard, heir to a fortune from the Woolworth business. It entered the private collection of the New York broker Geoffrey Gates in 1963. It remains in a private collection.
A 1961 self-portrait of Bacon is also known as Head IV.
References
External links
Head IV (Man with a Monkey) (1949), francis-bacon.com
Head IV (Man with a Monkey), 1949, Artimage
Head IV (1961), francis-bacon.com
|
https://en.wikipedia.org/wiki/Photonically%20Optimized%20Embedded%20Microprocessors | The Photonically Optimized Embedded Microprocessors (POEM) is DARPA program. It should demonstrate photonic technologies that can be integrated within embedded microprocessors and enable energy-efficient high-capacity communications between the microprocessor and DRAM. For realizing POEM technology CMOS and DRAM-compatible photonic links should operate at high bit-rates with very low power dissipation.
Current research
Currently research in this field is at University of Colorado, Berkley University, and Nanophotonic Systems Laboratory ( Ultra-Efficient CMOS-Compatible Grating Coupler Design).
References
External links
University of Colorado, Photonically Optimized Embedded Microprocessors
MIT Photonic Microsystems Group, Nanophotonic Systems Laboratory
Berkley , Electrical Engineering and Computer Sciences
DARPA , News and events Electricity, Light, Join Forces to Advance Computing
Chen Sun RISC-‐V Microprocessor Chip with Photonic I/O
Computer hardware |
https://en.wikipedia.org/wiki/Hans%20Peter%20Bull | Hans Peter Bull (born 17 October 1936) is a German constitutional lawyer and jurist. He served between 1978 and 1985 as West Germany's first Federal Commissioner for Data Protection. It was widely believed that he was appointed at the eleventh hour only after the anticipated appointee, Spiros Simitis, had turned the job down because previously agreed levels of resourcing were dramatically cut at the last minute. Bull took on the job in an atmosphere of continuing scepticism over the levels of government commitment to data protection and Information Technology legislation more generally.
Life
Bull was born at Lübben (Spreewald), a small town in the marshy countryside to the south of Berlin. Hans-Joachim Bull (1906–1977), his father, was a lawyer and a judge whom Bull has described (in print) as "a self-confident choleric man with rigid principles, most of which dated back to the days of the kaiser...". The family - Hans Peter Bull, his two-year-old sister, the parents and his grandmother - fled Lübben on 19 April 1945 as the Red army advanced from the east. Under Soviet Military Administration they were obliged to return to their point of departure, but two years later they made a successful escape attempt, now exchanging life in the Soviet occupation zone for the British occupation zone. By 1947 they had ended up in Hamburg which is where Bull attended secondary school. After successfully completing his school career he had difficulty deciding whether he should pursue a career in journalism or in the law. In the end he opted for the law, although he continued to be actively involved in journalism as well. Between 1956 and 1960 he studied Jurisprudence at Hamburg, Marburg and at the Free University of Berlin. He also spent some time as an intern with Die Zeit, a weekly national newspaper published in Hamburg. He received his doctorate of law in 1963 for a piece of work concerned with "Verwaltung durch Maschinen. Rechtsprobleme der Technisierung |
https://en.wikipedia.org/wiki/Multiprocessor%20system%20architecture | A multiprocessor system is defined as "a system with more than one processor", and, more precisely, "a number of central processing units linked together to enable parallel processing to take place".
The key objective of a multiprocessor is to boost a system's execution speed. The other objectives are fault tolerance and application matching.
The term "multiprocessor" can be confused with the term "multiprocessing". While multiprocessing is a type of processing in which two or more processors work together to execute multiple programs simultaneously, multiprocessor refers to a hardware architecture that allows multiprocessing.
Multiprocessor systems are classified according to how processor memory access is handled and whether system processors are of a single type or various ones.
Multiprocessor system types
There are many types of multiprocessor systems:
Loosely coupled multiprocessor system
Tightly coupled multiprocessor system
Homogeneous multiprocessor system
Heterogeneous multiprocessor system
Shared memory multiprocessor system
Distributed memory multiprocessor system
Uniform memory access (UMA) system
cc–NUMA system
Hybrid system – shared system memory for global data and local memory for local data
Loosely-coupled (distributed memory) multiprocessor system
In loosely-coupled multiprocessor systems, each processor has its own local memory, input/output (I/O) channels, and operating system. Processors exchange data over a high-speed communication network by sending messages via a technique known as "message passing". Loosely-coupled multiprocessor systems are also known as distributed-memory systems, as the processors do not share physical memory and have individual I/O channels.
System characteristics
These systems are able to perform multiple-instructions-on-multiple-data (MIMD) programming.
This type of architecture allows parallel processing.
The distributed memory is highly scalable.
Tightly-coupled (shared memory) multiprocessor |
https://en.wikipedia.org/wiki/RSA%20Award%20for%20Excellence%20in%20Mathematics | The RSA Conference (RSAC) Award for Excellence in Mathematics is an annual award. It is announced at the annual RSA Conference in recognition of innovations and contributions in the field of cryptography. An award committee of experts, which is associated with the Cryptographer's Track committee at the RSA Conference (CT-RSA), nominates to the award persons who are pioneers in their field, and whose work has had applied or theoretical lasting value; the award is typically given for the lifetime achievements throughout the nominee's entire career. Nominees are often affiliated with universities or involved with research and development in the information technology industry. The award is cosponsored by the International Association for Cryptologic Research.
While the field of modern cryptography started to be an active research area in the 1970s, it has already contributed heavily to Information technology and has served as a critical component in advancing the world of computing: the Internet, Cellular networks, and Cloud computing, Information privacy, Privacy engineering, Anonymity, Storage security, and Information security, to mention just a few sectors and areas. Research in Cryptography as a scientific field involves the disciplines of Mathematics, Computer Science, and Engineering. The award, which started in 1998, is one of the few recognitions fully dedicated to acknowledging experts who have advanced the field of cryptography and its related areas (another such recognition is achieving the rank of an IACR Fellow).
The first recipient of the award in 1998 was Shafi Goldwasser. Also, many of the award winners have gotten other recognitions, such as other prestigious awards, and the rank of fellow in various professional societies, etc.
Research in Cryptography is broad and is dedicated to numerous areas. In fact, the award has, over the years, emphasized the methodological contributions to the field which involve mathematical research in various ways, |
https://en.wikipedia.org/wiki/Beraha%20constants | The Beraha constants are a series of mathematical constants by which the Beraha constant is given by
Notable examples of Beraha constants include is , where is the golden ratio, is the silver constant (also known as the silver root), and .
The following table summarizes the first ten Beraha constants.
See also
Chromatic polynomial
Notes
References
Beraha, S. Ph.D. thesis. Baltimore, MD: Johns Hopkins University, 1974.
Le Lionnais, F. Les nombres remarquables. Paris: Hermann, p. 143, 1983.
Saaty, T. L. and Kainen, P. C. The Four-Color Problem: Assaults and Conquest. New York: Dover, pp. 160–163, 1986.
Tutte, W. T. "Chromials." University of Waterloo, 1971.
Tutte, W. T. "More about Chromatic Polynomials and the Golden Ratio." In Combinatorial Structures and their Applications: Proc. Calgary Internat. Conf., Calgary, Alberta, 1969. New York: Gordon and Breach, p. 439, 1969.
Tutte, W. T. "Chromatic Sums for Planar Triangulations I: The Case ," Research Report COPR 72–7, University of Waterloo, 1972a.
Tutte, W. T. "Chromatic Sums for Planar Triangulations IV: The Case ." Research Report COPR 72–4, University of Waterloo, 1972b.
Mathematical constants |
https://en.wikipedia.org/wiki/Switching%20noise%20jitter | Switching Noise Jitter (SNJ) is the aggregation of variability of noise events in the time-domain on the supply bias of an electronic system, in particular with a voltage regulated supply bias incorporated with closed-loop (feedback) control, for instance, SMPS. SNJ is measurable using real-time spectral histogram analysis and expressed as a rate of occurrence in percentage. The existence of SNJ was firstly demonstrated and termed by TransSiP Inc in 2016 and 2017 at the Applied Power Electronics Conference (APEC), and reviewed with experts at Tektronix prior to be featured as a case study published by Tektronix. The discovery of SNJ was also featured in multiple articles published by Planet Analog magazine and EDN Network. Difficult to filter using conventional LC networks due to variability in both time and frequency domains, SNJ can introduce random errors in analog to digital conversion, affecting both data integrity and system performance in digital communications and location-based services (viz GPS, Satellite positioning)
Creation
In switching-mode power supplies (SMPS), noise present in the control loop circuitry of the supply causes dislocation in up-slope and down-slope timing of the saw-tooth ripple waveform. As a consequence, the ripple waveform exhibits jitter and noise carried on the ripple also jitters. When this type of supply bias is used to power a system operating in power-saving modes or pulsed applications as shown in Fig. 1 the current drain fluctuates in pulses. Typically a load enters a high power stage (e.g. RX/TX On) for tens of micro- to milli-seconds and is then switched to low power or standby mode for hundreds of milli- or tens of seconds. Inrush currents cause voltage fluctuations due to parasitics of both components and interconnections, creating random noise in addition to the ringing and harmonics normally present. The result is SNJ.
Associated issues
At present, many modern switching DC-DC converters offer dual-mode operation. |
https://en.wikipedia.org/wiki/Museum%20of%20Art%20%26%20Photography | The Museum of Art and Photography (MAP) is a private art museum based in Bangalore, India that is a custodian to a collection of Indian art, textiles, photography, craft, and design objects spanning from the twelfth century to the present.
MAP opened its doors to the public on 18th February, 2023 as a private art museum.
In December 2020, MAP launched a digital museum, that offers a virtual interactive experience to viewers.
Collections
MAP has more than 20,000 artworks, predominantly from the Indian subcontinent in its collection that are organised into six departments: Modern and Contemporary Art, Photography, Living Traditions, Popular Culture, Pre-Modern Art and Textiles, Craft and Design. The collection includes works by Indian modernists, as well as Indian artists. In addition, the vast collection includes photographs, and works by indigenous artists.
In 2017, Abhishek Poddar, the founder of the MAP, donated more than 7000 artworks to the museum.
Abhishek Poddar
Abhishek Poddar (born 1968), an Indian industrialist, philanthropist, and art collector, is the founder of the Museum of Art and Photography, Bengaluru. Besides serving on various boards and committees in India, Poddar also serves on the advisory committees of the India-Europe Foundation for New Dialogues, headquartered in Rome and on the Lincoln Centre Global Advisory Council. He has been collecting art since high school and has created a significant collection of South Asian art, craft and antiquities, including modern and contemporary art and photography, a majority of which he has donated to the museum's collection. In December 2016, Christie’s also held an auction of a large chunk of the Poddar family’s personal collection, and the funds acquired were used to drive forward his vision of establishing south India's first major private art museum.
He was named as one of Asia’s 2018 Heroes of Philanthropy by Forbes Magazine. He is also the director of Sua Explosives & Accessories, and the |
https://en.wikipedia.org/wiki/Qiskit | Qiskit is an open-source software development kit (SDK) for working with quantum computers at the level of circuits, pulses, and algorithms. It provides tools for creating and manipulating quantum programs and running them on prototype quantum devices on IBM Quantum Platform or on simulators on a local computer. It follows the circuit model for universal quantum computation, and can be used for any quantum hardware (currently supports superconducting qubits and trapped ions) that follows this model.
Qiskit was founded by IBM Research to allow software development for their cloud quantum computing service, IBM Quantum Experience. Contributions are also made by external supporters, typically from academic institutions.
The primary version of Qiskit uses the Python programming language. Versions for Swift and JavaScript were initially explored, though the development for these versions have halted. Instead, a minimal re-implementation of basic features is available as MicroQiskit, which is made to be easy to port to alternative platforms.
A range of Jupyter notebooks are provided with examples of quantum computing being used. Examples include the source code behind scientific studies that use Qiskit, as well as a set of exercises to help people to learn the basics of quantum programming. An open source textbook based on Qiskit is available as a university-level quantum algorithms or quantum computation course supplement.
Components
Qiskit is made up of elements that work together to enable quantum computing. The central goal of Qiskit is to build a software stack that makes it easy for anyone to use quantum computers, regardless of their skill level or area of interest; Qiskit allows users to easily design experiments and applications and run them on real quantum computers and/or classical simulators. Qiskit provides the ability to develop quantum software both at the machine code level of OpenQASM, and at abstract levels suitable for end-users without quantum com |
https://en.wikipedia.org/wiki/Landscape%20%28software%29 | Landscape is a systems management tool developed by Canonical. It can be run on-premises or in the cloud depending on the needs of the user. It is primarily designed for use with Ubuntu derivatives such as Desktop, Server, and Core. Landscape provides administrative tools, centralized package updates, machine grouping, script deployment, security audit compliance and custom software repositories for management of up to 40,000 instances.
Overview
Architecture
See also
Ansible (software)
Chef (software)
Puppet (software)
Salt (software)
Satellite (software)
References
External links
2007 software
Remote administration software
Software distribution
Systems management |
https://en.wikipedia.org/wiki/Journal%20of%20Computational%20and%20Applied%20Mathematics | The Journal of Computational and Applied Mathematics is a peer-reviewed scientific journal covering computational and applied mathematics. It was established in 1975 and is published biweekly by Elsevier. The editors-in-chief are Yalchin Efendiev (Texas A&M University), Taketomo Mitsui (Nagoya University), Michael Kwok-Po Ng (Hong Kong Baptist University) and Fatih Tank (Ankara University). According to the Journal Citation Reports, the journal has a 2021 impact factor of 2.872.
References
External links
Biweekly journals
Applied mathematics
Mathematics journals
Elsevier academic journals
Academic journals established in 1975
English-language journals
Computational mathematics |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.