source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Semi-global%20matching
Semi-global matching (SGM) is a computer vision algorithm for the estimation of a dense disparity map from a rectified stereo image pair, introduced in 2005 by Heiko Hirschmüller while working at the German Aerospace Center. Given its predictable run time, its favourable trade-off between quality of the results and computing time, and its suitability for fast parallel implementation in ASIC or FPGA, it has encountered wide adoption in real-time stereo vision applications such as robotics and advanced driver assistance systems. Problem Pixelwise stereo matching allows to perform real-time calculation of disparity maps by measuring the similarity of each pixel in one stereo image to each pixel within a subset in the other stereo image. Given a rectified stereo image pair, for a pixel with coordinates the set of pixels in the other image is usually selected as , where is a maximum allowed disparity shift. A simple search for the best matching pixel produces many spurious matches, and this problem can be mitigated with the addition of a regularisation term that penalises jumps in disparity between adjacent pixels, with a cost function in the form where is the pixel-wise dissimilarity cost at pixel with disparity , and is the regularisation cost between pixels and with disparities and respectively, for all pairs of neighbouring pixels . Such constraint can be efficiently enforced on a per-scanline basis by using dynamic programming (e.g. the Viterbi algorithm), but such limitation can still introduce streaking artefacts in the depth map, because little or no regularisation is performed across scanlines. A possible solution is to perform global optimisation in 2D, which is however an NP-complete problem in the general case. For some families of cost functions (e.g. submodular functions) a solution with strong optimality properties can be found in polynomial time using graph cut optimization, however such global methods are generally too expensive for real-t
https://en.wikipedia.org/wiki/Magic%20state%20distillation
Magic state distillation is a method for creating more accurate quantum states from multiple noisy ones, which is important for building fault tolerant quantum computers. It has also been linked to quantum contextuality, a concept thought to contribute to quantum computers' power. The technique was first proposed by Emanuel Knill in 2004, and further analyzed by Sergey Bravyi and Alexei Kitaev the same year. Thanks to the Gottesman–Knill theorem, it is known that some quantum operations (operations in the Clifford algebra) can be perfectly simulated in polynomial time on a probabilistic classical computer. In order to achieve universal quantum computation, a quantum computer must be able to perform operations outside this set. Magic state distillation achieves this, in principle, by concentrating the usefulness of imperfect resources, represented by mixed states, into states that are conducive for performing operations that are difficult to simulate classically. A variety of qubit magic state distillation routines and distillation routines for qubits with various advantages have been proposed. Stabilizer formalism The Clifford group consists of a set of -qubit operations generated by the gates (where H is Hadamard and S is ) called Clifford gates. The Clifford group generates stabilizer states which can be efficiently simulated classically, as shown by the Gottesman–Knill theorem. This set of gates with a non-Clifford operation is universal for quantum computation. Magic states Magic states are purified from copies of a mixed state . These states are typically provided via an ancilla to the circuit. A magic state for the gate is where . By combining (copies of) magic states with Clifford gates, can be used to make a non-Clifford gate. Since Clifford gates combined with a non-Clifford gate are universal for quantum computation, magic states combined with Clifford gates are also universal. Purification algorithm for distilling |M〉 The first magic state di
https://en.wikipedia.org/wiki/Trained%20immunity
Trained immunity is a long-term functional modification of cells in the innate immune system which leads to an altered response to a second unrelated challenge. For example, the BCG vaccine leads to a reduction in childhood mortality caused by unrelated infectious agents. The term "innate immune memory" is sometimes used as a synonym for the term trained immunity which was first coined by Mihai Netea in 2011. The term "trained immunity" is relatively new – immunological memory has previously been considered only as a part of adaptive immunity – and refers only to changes in innate immune memory of vertebrates. This type of immunity is thought to be largely mediated by epigenetic modifications. The changes to the innate immune response may last up to several months, in contrast to the classical immunological memory (which may last up to a lifetime), and is usually unspecific because there is no production of specific antibodies/receptors. Trained immunity has been suggested to possess a transgenerational effect, for example the children of mothers who had also received vaccination against BCG had a lower mortality rate than children of unvaccinated mothers. The BRACE trial is currently assessing if BCG vaccination can reduce the impact of COVID-19 in healthcare workers. Other vaccines are also thought to induce immune training such as the DTPw vaccine. Immune cells subject to training Trained immunity is thought to be largely mediated by functional reprogramming of myeloid cells. One of the first described adaptive changes in macrophages were associated with lipopolysaccharide tolerance, which resulted in the silencing of inflammatory genes. Similarly, Candida albicans and fungal β-glucan trigger changes in monocyte histone methylation, this functional reprogramming eventually provides protection against reinfection. Also, a non-specific manner of protection in training with different microbial ligands was showed, for example treatment with fungal β-glucan induced
https://en.wikipedia.org/wiki/Water%20distribution%20system
A water distribution system is a part of water supply network with components that carry potable water from a centralized treatment plant or wells to consumers to satisfy residential, commercial, industrial and fire fighting requirements. Definitions Water distribution network is the term for the portion of a water distribution system up to the service points of bulk water consumers or demand nodes where many consumers are lumped together. The World Health Organization (WHO) uses the term water transmission system for a network of pipes, generally in a tree-like structure, that is used to convey water from water treatment plants to service reservoirs, and uses the term water distribution system for a network of pipes that generally has a loop structure to supply water from the service reservoirs and balancing reservoirs to consumers. Components A water distribution system consists of pipelines, storage facilities, pumps, and other accessories. Pipelines laid within public right of way called water mains are used to transport water within a distribution system. Large diameter water mains called primary feeders are used to connect between water treatment plants and service areas. Secondary feeders are connected between primary feeders and distributors. Distributors are water mains that are located near the water users, which also supply water to individual fire hydrants. A service line is a small diameter pipe used to connect from a water main through a small tap to a water meter at user's location. There is a service valve (also known as curb stop) on the service line located near street curb to shut off water to the user's location. Storage facilities, or distribution reservoirs, provide clean drinking water storage (after required water treatment process) to ensure the system has enough water to service in response to fluctuating demands (service reservoirs), or to equalize the operating pressure (balancing reservoirs). They can also be temporarily used to ser
https://en.wikipedia.org/wiki/Ring%20of%20modular%20forms
In mathematics, the ring of modular forms associated to a subgroup of the special linear group is the graded ring generated by the modular forms of . The study of rings of modular forms describes the algebraic structure of the space of modular forms. Definition Let be a subgroup of that is of finite index and let be the vector space of modular forms of weight . The ring of modular forms of is the graded ring . Example The ring of modular forms of the full modular group is freely generated by the Eisenstein series and . In other words, is isomorphic as a -algebra to , which is the polynomial ring of two variables over the complex numbers. Properties The ring of modular forms is a graded Lie algebra since the Lie bracket of modular forms and of respective weights and is a modular form of weight . A bracket can be defined for the -th derivative of modular forms and such a bracket is called a Rankin–Cohen bracket. Congruence subgroups of SL(2, Z) In 1973, Pierre Deligne and Michael Rapoport showed that the ring of modular forms is finitely generated when is a congruence subgroup of . In 2003, Lev Borisov and Paul Gunnells showed that the ring of modular forms is generated in weight at most 3 when is the congruence subgroup of prime level in using the theory of toric modular forms. In 2014, Nadim Rustom extended the result of Borisov and Gunnells for to all levels and also demonstrated that the ring of modular forms for the congruence subgroup is generated in weight at most 6 for some levels . In 2015, John Voight and David Zureick-Brown generalized these results: they proved that the graded ring of modular forms of even weight for any congruence subgroup of is generated in weight at most 6 with relations generated in weight at most 12. Building on this work, in 2016, Aaron Landesman, Peter Ruhm, and Robin Zhang showed that the same bounds hold for the full ring (all weights), with the improved bounds of 5 and 10 when has some nonzero od
https://en.wikipedia.org/wiki/Anti-CRISPR
Anti-CRISPR (Anti-Clustered Regularly Interspaced Short Palindromic Repeats or Acr) is a group of proteins found in phages, that inhibit the normal activity of CRISPR-Cas, the immune system of certain bacteria. CRISPR consists of genomic sequences that can be found in prokaryotic organisms, that come from bacteriophages that infected the bacteria beforehand, and are used to defend the cell from further viral attacks. Anti-CRISPR results from an evolutionary process occurred in phages in order to avoid having their genomes destroyed by the prokaryotic cells that they will infect. Before the discovery of this type of family proteins, the acquisition of mutations was the only way known that phages could use to avoid CRISPR-Cas mediated shattering, by reducing the binding affinity of the phage and CRISPR. Nonetheless, bacteria have mechanisms to retarget the mutant bacteriophage, a process that it is called "priming adaptation". So, as far as researchers currently know, anti-CRISPR is the most effective way to ensure the survival of phages throughout the infection process of bacteria. History Anti-CRISPR systems were first seen in Pseudomonas aeruginosa prophages, which disabled type I-F CRISPR–Cas system, characteristic of some strains of these bacteria. After analysing the genomic sequences of these phages, genes codifying five different Anti-CRISPR proteins (also named Acrs) were discovered. Such proteins were AcrF1, AcrF2, AcrF3, AcrF4 and AcrF5. Research found none of these proteins disrupted the expression of Cas genes nor the assembling of CRISPR molecules, so it was thought that those type I-F proteins directly affected the CRISPR–Cas interference. Further investigation confirmed this hypothesis with the discovery of 4 other proteins (AcrE1, AcrE2, AcrE3 and AcrE4), which were shown to impede Pseudomonas aeruginosa’s CRISPR-Cas system. Furthermore, the locus of the genes codifying these type I-E proteins was really close to the one responsible for the type
https://en.wikipedia.org/wiki/Birchfield%E2%80%93Tomasi%20dissimilarity
In computer vision, the Birchfield–Tomasi dissimilarity is a pixelwise image dissimilarity measure that is robust with respect to sampling effects. In the comparison of two image elements, it fits the intensity of one pixel to the linearly interpolated intensity around a corresponding pixel on the other image. It is used as a dissimilarity measure in stereo matching, where one-dimensional search for correspondences is performed to recover a dense disparity map from a stereo image pair. Description When performing pixelwise image matching, the measure of dissimilarity between pairs of pixels from different images is affected by differences in image acquisition such as illumination bias and noise. Even when assuming no difference in these aspects between an image pair, additional inconsistencies are introduced by the pixel sampling process, because each pixel is a sample obtained integrating the continuous light signal over a finite region of space, and two pixels matching the same feature of the image content may correspond to slightly different regions of the real object that can reflect light differently and can be subject to partial occlusion, depth discontinuity, or different lens defocus, thus generating different intensity signals. The Birchfield–Tomasi measure compensates for the sampling effect by considering the linear interpolation of the samples. Pixel similarity is then determined by finding the best match between the intensity of a pixel sample in one image and the interpolated function in an interval around a location in the other image. Considering the stereo matching problem for a rectified stereo pair, where the search for correspondences is performed in one dimension, given two columns and along the same scanline for the left and right image respectively, it is possible to define two symmetric functions where and are the linear interpolation functions of the left and right image intensity and along the scanline. The Birchfield–Tomasi dis
https://en.wikipedia.org/wiki/Gynogenesis
Gynogenesis, a form of parthenogenesis, is a system of asexual reproduction that requires the presence of sperm without the actual contribution of its DNA for completion. The paternal DNA dissolves or is destroyed before it can fuse with the egg. The egg cell of the organism is able to develop, unfertilized, into an adult using only maternal genetic material. Gynogenesis is often termed "sperm parasitism" in reference to the somewhat pointless role of male gametes. Gynogenetic species, "gynogens" for short, are unisexual, meaning they must mate with males from a closely related bisexual species that normally reproduces sexually. Gynogenesis is a disadvantageous mating system for males, as they are unable to pass on their DNA. The question as to why this reproductive mode exists, given that it appears to combine the disadvantages of both asexual and sexual reproduction, remains unsolved in the field of evolutionary biology. The male equivalent to this process is androgenesis where the father is the sole contributor of DNA. Examples Most gynogenetic species fall into the taxonomic groups of the fishes and the amphibians. Amazon mollies (Poecilia formosa) require the sperm of closely related male Poecilia latipinna to engage in gynogenesis. Research has shown that the P. latipinna males prefer to mate with females of their own species, given the previously-discussed disadvantage for males in mating with gynogens. This presents a problem for P. formosa, as they must compete for males with a preferred population. However, those P. formosa successful in finding a mate make up the deficit by producing twice as many female offspring as their competitors. The ant species Myrmecia impaternata is female-only, with its hybrid origin tracing back to Myrmecia banksi and Myrmecia pilosula. In ant species, sex is determined by the haplodiploidy system, where unfertilized eggs result in haploid males and fertilized eggs result in diploid females. In this species, the queen
https://en.wikipedia.org/wiki/Synthetic%20media
Synthetic media (also known as AI-generated media, media produced by generative AI, personalized media, personalized content, and colloquially as deepfakes) is a catch-all term for the artificial production, manipulation, and modification of data and media by automated means, especially through the use of artificial intelligence algorithms, such as for the purpose of misleading people or changing an original meaning. Synthetic media as a field has grown rapidly since the creation of generative adversarial networks, primarily through the rise of deepfakes as well as music synthesis, text generation, human image synthesis, speech synthesis, and more. Though experts use the term "synthetic media," individual methods such as deepfakes and text synthesis are sometimes not referred to as such by the media but instead by their respective terminology (and often use "deepfakes" as a euphemism, e.g. "deepfakes for text" for natural-language generation; "deepfakes for voices" for neural voice cloning, etc.) Significant attention arose towards the field of synthetic media starting in 2017 when Motherboard reported on the emergence of AI altered pornographic videos to insert the faces of famous actresses. Potential hazards of synthetic media include the spread of misinformation, further loss of trust in institutions such as media and government, the mass automation of creative and journalistic jobs and a retreat into AI-generated fantasy worlds. Synthetic media is an applied form of artificial imagination. History Pre-1950s Synthetic media as a process of automated art dates back to the automata of ancient Greek civilization, where inventors such as Daedalus and Hero of Alexandria designed machines capable of writing text, generating sounds, and playing music. The tradition of automaton-based entertainment flourished throughout history, with mechanical beings' seemingly magical ability to mimic human creativity often drawing crowds throughout Europe, China, India, and so on.
https://en.wikipedia.org/wiki/Abu%20Mansour
Abu Mansour al-Maghribi is a Moroccan citizen, former electrical engineer and self-claimed unofficial "ambassador of ISIS in Turkey". He claimed that he has been in charge of setting up border collaboration between ISIS and Turkey, mainly relative to migrations to ISIS territories, border security, and healthcare support to injured ISIS soldiers. With internal ISIS divisions and the first ISIS terror attack on Turkey, the relationship soured. Al-Maghribi was captured by SDF troops, and testified his action to various foreign journalists. However, some of what he says may likely be exaggeration. He has also claimed that ISIS received financial aid from Qatar and Israel and that he was communicating with several Israeli officials who allowed ISIS to use their hospitals for emergencies. References External links "ISIS ambassador to Turkey" cooperated with high-level officials in Ankara – Homeland Sec Today 2019-03-18 The ISIS Ambassador to Turkey March 18, 2019 Anne Speckhard and Ardian Shajkovci Moroccan engineers Islamic State of Iraq and the Levant members Living people Year of birth missing (living people)
https://en.wikipedia.org/wiki/Kathaleen%20Land
Bonnie Kathaleen Land (21 November 1918 - 7 October 2012) was a computer and mathematician at NASA's Langley facility. The 2016 movie Hidden Figures, which brought awareness to this early success within the NASA space program, was written by Land's former Sunday school student, and Land served as one of the first interviewees during research for the novel. Land was called the "inspiration behind, catalyst for, and gateway to" the creation of Hidden Figures. She was married to Stanley Land and had three daughters. She died on 7 October 2012. Biography Bonnie Kathaleen Pleasants was born on 21 November 1918 in Bridgewater, Virginia. She married Stanley Land on 1 December 1941 in Newport News, Virginia, and they had three daughters. She worked as a human computer and mathematician at NASA's Langley Research Center facility. When Margot Lee Shetterly, the author of Hidden Figures, was a child, Land taught her in Sunday school following Land's retirement from NASA. Land was one of the first people Shetterly interviewed when she began researching for the Hidden Figures book, and Land provided several of the names of the human computers who were featured in the book and film. She is described as "the inspiration behind, catalyst for, and gateway to Hidden Figures". Land died on 7 October 2012 in Hampton, Virginia. See also Katherine Johnson Dorothy Vaughan Mary Jackson References 20th-century African-American scientists 20th-century African-American women 20th-century American mathematicians 20th-century American women scientists 21st-century African-American scientists 21st-century African-American women 21st-century American mathematicians 21st-century American women scientists 1918 births 2012 deaths African Americans in Virginia African-American mathematicians American women mathematicians Christians from Virginia Human computers Mathematicians from Virginia NASA people People from Bridgewater, Virginia West Area Computers
https://en.wikipedia.org/wiki/Genetic%20saturation
Genetic saturation is the result of multiple substitutions at the same site in a sequence, or identical substitutions in different sequences, such that the apparent sequence divergence rate is lower than the actual divergence that has occurred. When comparing two or more genetic sequences consisting of single nucleotides, differences in sequence observed are only differences in the final state of the nucleotide sequence. Single nucleotides that undergoing genetic saturation change multiple times, sometimes back to their original nucleotide or to a nucleotide common to the compared genetic sequence. Without genetic information from intermediate taxa, it is difficult to know how much, or if any saturation has occurred on an observed sequence. Genetic saturation occurs most rapidly on fast-evolving sequences, such as the hypervariable region of mitochondrial DNA, or in short tandem repeats such as on the Y-chromosome. In phylogenetics, saturation effects result in long branch attraction, where the most distant lineages have misleadingly short branch lengths. It also decreases phylogenetic information contained in the sequences. Phylogenetic saturation Multiple substitutions Multiple substitutions take place when single nucleotides undergo multiple changes before reaching their final nucleotide identity. A sequence is said to be saturated because mutation has acted multiple times upon nucleotides and observed change in sequence is, in fact, less than the historical change in sequence. Detection It is possible to estimate the amount of saturation that a sequence might have undergone by estimating the substitution rate of a genetic sequence and how much time has passed since divergence. Divergence rates are estimated from a variety of sources including ancestral DNA, fossil records and biographical events. This use of molecular clocks to determine divergence is controversial because of its potential for inaccuracy and assumptions made in the model (such as consistent
https://en.wikipedia.org/wiki/Biogeography%20of%20paravian%20dinosaurs
The biogeography of Paravian dinosaurs is the study of the global distribution of Paraves through geological history. Paraves is a clade that includes all of the Theropoda that are more closely related to birds than to oviraptorosaurs. These include Dromaeosauridae and Troodontidae (historically grouped under Deinonychosauria) and Avialae (including crown group birds, i.e. modern birds). The distribution of paraves is closely related to the evolution of the clade. Understanding the changes in their distributions may shed light on problems like how and why paraves evolve, eventually gaining the ability to fly. Paraves first appeared in the fossil record in early Late Jurassic (163–145 million years ago), then rapidly diversified and dispersed during Cretaceous (145–66 million years ago). They emerged during the breakup of Pangea (since Early-Middle Jurassic), which influenced the biogeographic processes such as speciation, geodispersal and extinction. By the Late Cretaceous, Paraves reached global distribution with fossils found in modern Asia, Europe, Australia, Antarctica etc. Almost all Paravian dinosaurs died out before or during the end-Cretaceous mass extinction (~66 million years ago), also called the Cretaceous-Paleogene (K-Pg) mass extinction. As a result of this extinction event, only a small group of avialans – neornithines – were able to survive. This group of Avialae continued to flourish in Cenozoic and later evolved into all modern birds. There are limitations to be considered when studying the paleobiogeography of Paraves. Firstly, the fossil record may not represent the actual distribution of the three clades mainly due to taphonomic bias. Also, the fossil record may be incomplete, which may lead to misinterpretations. Vicariance and geodispersal Vicariance is a biogeographic process that occurs when a population is forced to separate into two or more groups due to geographic constraints. It is a key process in the biogeographic history of Para
https://en.wikipedia.org/wiki/Virtual%20Viking%20%E2%80%93%20The%20Ambush
Virtual Viking – The Ambush is a 2019 short film directed by Erik Gustavson, using volumetric video capture to create one of the first films in virtual reality. Produced for The Viking Planet centre in Oslo, Norway, the film is part of a wider exhibition of the lives of Norse seafarers and uses a number of VR headsets to enable visitors to experience a Viking longship in the heat of battle. Plot Skald recounts the story of how he was captured, in his youth, during an unsuccessful Viking raid. Cast Murray McArthur as Skald Luke White as Ulf Wolfie Hughes as Grim Christopher Rogers as Trym Ross O'Hennessy as Viking Awards and nominations At the Aesthetica Short Film Festival 2019, Virtual Viking – The Ambush was awarded Best VR Film. References External links 2019 films Norwegian short films Old Norse-language films Head-mounted displays Video game accessories Virtual reality
https://en.wikipedia.org/wiki/RDNA%202
RDNA 2 is a GPU microarchitecture designed by AMD, released with the Radeon RX 6000 series on November 18, 2020. Alongside powering the RX 6000 series, RDNA 2 is also featured in the SoCs designed by AMD for the PlayStation 5, Xbox Series X/S, and Steam Deck consoles. Background On July 7, 2019, AMD released the first iteration of the RDNA microarchitecture, a new graphics architecture designed specifically for gaming that replaced the aging Graphics Core Next (GCN) microarchitecture. With RDNA, AMD sought to reduce latency and improve power efficiency over their previous Vega series based on GCN 5th gen and Nvidia's competing Turing microarchitecture. RDNA 2 was first publicly announced in January 2020 with AMD initially calling RDNA 2 a "refresh" of the original RDNA architecture from the previous year. At AMD's Financial Analysts Day held on March 5, 2020, AMD showed a client GPU roadmap that gave details on RDNA's successor, RDNA 2, that it would again be built using TSMC's 7 nm process and would be coming in 2020. AMD told their investors that they were targeting a 50% uplift in performance-per-watt and increased IPC with the RDNA 2 microarchitecture. On October 28, 2020, AMD held an online unveiling event for the RDNA 2 architecture and Radeon RX 6000 series. The event came 20 days after AMD's unveiling event for Ryzen 5000 series processors built on the Zen 3 microarchitecture. Architectural details Compute Unit RDNA 2 contains a significant increase in the number of Compute Units (CUs) with a maximum of 80, a doubling from the maximum of 40 in the Radeon RX 5700 XT. Each Compute Unit contains 64 shader cores. CUs are organized into groups of two named Work Group Processors with 32KB of shared L0 cache per WGP. Each CU contains two sets of an SIMD32 vector unit, an SISD scalar unit, textures units, and a stack of various caches. New low precision data types like INT4 and INT8 are new supported data types for RDNA 2 CUs. The RDNA 2 graphics pipeline ha
https://en.wikipedia.org/wiki/Nanako%20Shigesada
is a Professor Emeritus at Nara Women's University in Japan, most notable for her work in the fields of mathematical biology and theoretical ecology. Her established career in academia has seen many of her journals published to acclaim, as well as contributing to the education of researchers at Kyoto University and Doshisha University. Shigesasda has served as the Research Supervisor for the Basic Research Program PRESTO in the research area "Innovative Models of Biological Processes and its Development", supported by the Japan Science and Technology Agency from 2007-2013. She has also served as Secretary General and President for The Japanese Society for Mathematical Biology. In 2013, she was awarded the Akira Okubo Prize. Career In the 1970s Shigesasda was an active member of Mumay Tansky, a group composed of Shigesasda and colleagues Ei Teramoto, Hiroshi Ashida, Hisao Nakajima, Kohkichi Kawasaki, and Norio Yamamura. The group, organised by Teramoto, published papers on structure, stability and efficiency of ecosystems. In 1979, Shigesada focused on the observational study of the spatial distribution of ant lions by ecologist Masaaki Morisita. She studied the concept of the structures of experience and consciousness (phenomenology) with regards to environmental density and the degree to which a habitat might be unfavourable. She introduced a model that combined population pressure, due to mutual interference between individuals, with environmental potential. Shigesasda extended Morisita's work, explaining how coexistence of competing species can arise through spatial segregation. In the last twenty years, Shigesada studied pine wilt disease which is caused by the pinewood roundworm with a pine sawyer beetle as vector. Through the study of population dynamics, she estimated beetle densities and parameter values, finding that there is a threshold host density above which the disease can spread, and that the minimum density critically depends on the eradication r
https://en.wikipedia.org/wiki/Surface%20Neo
The Surface Neo is an unreleased dual-touchscreen 2-in-1 PC that was unveiled by Microsoft on October 2, 2019. Slated to be part of the Microsoft Surface family of devices, the Surface Neo was designed to be used in various "postures" for different use cases and multitasking scenarios involving its screens, and feature Windows 10X—a variant of Windows 10 designed exclusively for dual-screen devices. The Surface Neo was expected to be launched in late-2020, alongside a range of other Windows 10X devices from third-party manufacturers. In May 2020, Microsoft postponed the release of Windows 10X-based dual-screen devices in favor of launching it with single-screen devices instead. This did not come to fruition, and Microsoft eventually cancelled Windows 10X outright in May 2021, with aspects of 10X repurposed for the mainstream Windows 11. Its sister device, the Android-based Surface Duo, was released in September 2020. Background Microsoft had first envisioned a dual-touchscreen device with its Courier concept, while rumors surfaced in 2017 of a similar project codenamed "Andromeda"—a foldable device which would use electronic paper displays. During a Surface hardware event on October 2, 2019, Microsoft unveiled a pair of dual-touchscreen devices—the Android-based Surface Duo smartphone, and the Surface Neo. Codenamed "Santorini", head of Windows Client Experiences Joe Belfiore explained that "we saw an opportunity both at Microsoft and with our partners to fill in some of the gaps in [laptop and tablet] experiences and offer something new". Microsoft unveiled an accompanying operating system known as Windows 10X, and stated that the OS, as well as dual-screen devices from Microsoft and other OEM partners, would be released in late-2020. Specifications Hardware Microsoft did not provide any specific information on the specifications of the Surface Neo, except that all Windows 10X devices launching in 2020 would use Intel "Lakefield" processors. Prototypes of t
https://en.wikipedia.org/wiki/Aburidashi
Aburidashi is a ninja technique of sending secret messages using a form of invisible ink. The technique uses ink made of juice extracted from soaked and crushed soybeans. The message becomes visible to the recipient by heating the paper. References Steganography Japanese culture
https://en.wikipedia.org/wiki/Riverbank%20Publications
The Riverbank Publications is a series of pamphlets written by the people who worked for millionaire George Fabyan in the multi-discipline research facility he built in the early 20th century near Chicago. They were published by Fabyan, often without author credit. The publications on cryptanalysis, mostly written by William Friedman, with contributions from Elizebeth Smith Friedman and others, are considered seminal in the field. In particular, Publication 22 introduced the Index of Coincidence, a powerful statistical tool for cryptanalysis. List of publications on cryptography The Riverbank Publications dealt with many subjects investigated at the laboratories. The ones dealing with cryptography began with number 15, and consists of: 15, A Method of Reconstructing the Primary Alphabet From a Single One of the Series of Secondary Alphabets, 1917 16, Methods for the Solution of Running-Key Ciphers, 1918 17, An Introduction to Methods for the Solution of Ciphers, 1918 18, Synoptic Tables for the Solution of Ciphers and A Bibliography of Cryptographic Literature, 1918 19, Formulae for the Solution of Geometrical Transposition Ciphers, written with Capt. Lenox R. Lohr, 1918 20, Several Machine Ciphers and Methods for their Solution, 1918 21, Methods for the Reconstruction of Primary Alphabets, written with Elizebeth Smith Friedman, 1918 22, The Index of Coincidence and Its Applications in Cryptography, imprint L. Fournier, Paris, 1922 50, The production and detection of messages in concealed writing and images, by H. O. Nolan, 1918 75, Memorization Methods: Specifically Illustrated in Respect to Their Applicability to Codes and Topographic Material, by H. O. Nolan, 1919, Except as noted, the above publications were written by William F. Friedman and were published by George Fabyan's Riverbank Laboratories in Geneva, Illinois. References Cryptography books World War I-related lists Cryptographic attacks Riverbank Laboratories
https://en.wikipedia.org/wiki/Evolutionary%20therapy
Evolutionary therapy is a subfield of evolutionary medicine that utilizes concepts from evolutionary biology in management of diseases caused by evolving entities such as cancer and microbial infections. These evolving disease agents adapt to selective pressure introduced by treatment, allowing them to develop resistance to therapy, making it ineffective. Evolutionary therapy relies on the notion that Darwinian evolution is the main reason behind lethality of late stage cancer and multi-drug resistant bacterial infections such as methicillin-resistant Staphylococcus aureus. Thus, evolutionary therapy suggests that treatment of such highly dynamic evolving diseases should be changing over time to account for changes in disease populations. Adaptive treatment strategies typically cycle between different drugs or drug doses to take advantage of predictable patterns of disease evolution. This is in contrast to standardized treatment approach which is applied to all patients and equally based on their cancer type and grade. There are still numerous obstacles to the use of evolutionary therapy in clinical practice. These obstacles include high contingency of trajectory, speed of evolution, and inability to track the population state of disease over time. Context Resistance to chemotherapy and molecularly targeted therapies is a major problem facing current cancer research. All malignant cancers are fundamentally governed by Darwinian dynamics of the somatic evolution in cancer. Malignant cancers are dynamically evolving clades of cells living in distinct microhabitats that almost certainly ensure the emergence of therapy-resistant populations. Cytotoxic cancer therapies also impose intense evolutionary selection pressures on the surviving cells and thus increase the evolutionary rate. Importantly, the principles of Darwinian dynamics also embody fundamental principles that can illuminate strategies for the successful management of cancer. Eradicating the large, divers
https://en.wikipedia.org/wiki/Hausdorff%20Medal
The Hausdorff medal is a mathematical prize awarded every two years by the European Set Theory Society. The award recognises the work considered to have had the most impact within set theory among all articles published in the previous five years. The award is named after the German mathematician Felix Hausdorff (1868–1942). Winners 2013: Hugh Woodin for his articles "Suitable extender models I" (J. Math. Log. 10 (2010), no. 1–2, pp. 101–339) and "Suitable extender models II: beyond ω-huge" (J. Math. Log. 11 (2011), no. 2, pp. 115–436). 2015: Ronald Jensen and John R. Steel for their article " without the measurable" (The Journal of Symbolic Logic, Volume 78, Issue 3 (2013), pp. 708–734). 2017: Maryanthe Malliaris and Saharon Shelah for their article "General topology meets model theory, on 𝔭 and 𝔱" (Proc. Natl. Acad. Sci. USA 110 (2013), no. 33, 13300–13305). 2019: Itay Neeman for his work on "the new method of iterating forcing using side conditions and the tree property". 2022: David Asperó and Ralf Schindler for their positive solution to the long standing conjecture that MM++, a strong form of Martin’s Maximum, implies Woodin’s Axiom (*). See also List of mathematics awards References Mathematics awards Set theory
https://en.wikipedia.org/wiki/BioMedical%20Engineering%20OnLine
BioMedical Engineering OnLine is a peer-reviewed online-only open access scientific journal covering biomedical engineering. It was established in 2002 and is published by BioMed Central. The editors-in-chief are Ervin Sejdic (University of Pittsburgh and Fong-Chin Su (National Cheng Kung University). According to the Journal Citation Reports, the journal has a 2018 impact factor of 2.013. References External links BioMed Central academic journals Online-only journals Academic journals established in 2002 English-language journals Biomedical engineering journals
https://en.wikipedia.org/wiki/Leonid%20Rudin
Leonid Rudin is an American computer scientist known as the co-founder and CEO of Cognitech. He is one of the leaders in the Forensic Video Image processing field. Education Rudin holds an MSci. and PhD., degrees in Computer Science and Computational Imaging Science from California Institute of Technology (Caltech). Career Rudin has worked in the computer software industry for decades. He pioneered Total Variation Minimization approach in Image Processing and Analysis. Rudin is the first author of a highly cited original paper in image processing. He is the co-founder of Forensic Video Processing and 360 Forensic Photogrammetry fields. Between 1989 and 2008, he served as "Principal R&D Investigator" for Defense Advanced Project Agency (DARPA). In 1992, he co-authored and co-designed the first commercial Forensic Video software known as "Video Investigator". In 1988, Rudin co-founded Cognitech, a company that develops forensic video enhancement software & hardware. Between 2000 and 2008, he served as "Prncipal R&D Investigator" for National Geospatial-Intelligence Agency (NGA). Rudin has several USPTO Patents. He is a member of professional associations such Institute of Electrical and Electronics Engineers (IEEE), American Academy of Forensic Science (AAFS), and American Society for Photogrammetry and Remote Sensing (ASPRS). Awards and honors Rudin is the winner of 2010 American Technology Award for PiX2GPS and the winner of DePrima Mathematics Applications Award. See also Stanley Osher Total variation denoising References Living people American chief executives American technology company founders American computer scientists Year of birth missing (living people) California Institute of Technology alumni Members of the IEEE
https://en.wikipedia.org/wiki/Stahl%27s%20theorem
In matrix analysis Stahl's theorem is a theorem proved in 2011 by Herbert Stahl concerning Laplace transforms for special matrix functions. It originated in 1975 as the Bessis-Moussa-Villani (BMV) conjecture by Daniel Bessis, Pierre Moussa, and Marcel Villani. In 2004 Elliott H. Lieb and Robert Seiringer gave two important reformulations of the BMV conjecture. In 2015 Alexandre Eremenko gave a simplified proof of Stahl's theorem. Statement of the theorem Let denote the trace of a matrix. If and are Hermitian matrices and is positive semidefinite, define , for all real . Then can be represented as the Laplace transform of a non-negative Borel measure on . In other words, for all real , () = , for some non-negative measure depending upon and . References Conjectures that have been proved Theorems in analysis Theorems in measure theory
https://en.wikipedia.org/wiki/Greta%20Panova
Greta Cvetanova Panova (, born 1983 in Sofia, Bulgaria) is a Bulgarian-American mathematician. She is a professor of mathematics at the University of Southern California in Los Angeles. Her research interests include combinatorics, probability and theoretical computer science. Education and career Panova received her B.S. in 2005 from MIT. She received M.A. in 2006 from University of California, Berkeley and Ph.D. in mathematics from Harvard University in 2011, under the supervision of Richard Stanley. She was then a postdoc at UCLA (2011-2014), Assistant and Associate Professor at the University of Pennsylvania (2014-2018), and is currently a tenured Associate Professor at the University of Southern California. She was also Visiting Scholar at the Simons Institute for the Theory of Computing (Fall 2018). Panova has published over 40 papers primarily in algebraic combinatorics with applications to geometric complexity theory, probability and statistical mechanics. She is currently a co-Editor-in-Chief of the Electronic Journal of Combinatorics. Selected awards Panova was a three time medalist at the International Mathematical Olympiad (1999-2001, one gold and two silver medals). She was a third prize winner at the William Lowell Putnam Mathematical Competition (2001), and a winner of the Best Student Paper Award at the Formal Power Series and Algebraic Combinatorics Conference (FPSAC, 2011). She is a recipient of Katz Fellowship (UC Berkeley), Putnam Fellowship (Harvard), James Mills Peirce Fellowship (Harvard), Simons Postdoctoral Fellowship (UCLA), and von Neumann Fellowship (IAS). Panova was also an invited plenary speaker at FPSAC 2017 in London. Panova is the recipient of the Institute of Mathematics and Informatics IMI Award for 2020 given once every three years to a Bulgarian citizen under the age of 40 for high achievements in the field of mathematics. References External links 1983 births Living people Scientists from Sofia Bulgarian emigrants
https://en.wikipedia.org/wiki/Rogue%20Company
Rogue Company is a free-to-play multiplayer tactical third-person hero shooter video game developed by First Watch Games and published by Hi-Rez Studios. The game was released in open beta on October 1, 2020 for Microsoft Windows via the Epic Games Store, Steam, Xbox One, PlayStation 4, Nintendo Switch, with an Xbox Series X/S release following on November 25, 2020, and a PlayStation 5 release on March 30, 2021. The game features full support for cross-platform play and cross-progression. The game takes inspiration from the Counter-Strike series of tactical shooters. The game came out of the Beta on May 23, 2022. Gameplay Rogue Company features a range of playable characters, referred to as Rogues. There are 26 playable Rogues in Rogue Company. The game features objective-based game modes and various maps. Matches consist of multiple rounds, with each round usually beginning with both teams skydiving from aircraft to the map below to compete against each other in various objectives. Between rounds players may use money earned from completing tasks and eliminating players in the previous round to buy and upgrade weapons, equipment and perks. A number of game modes have been revealed: Extraction is a 4v4 game mode, where the attacking team is tasked with hacking an objective; the winner of a round is determined once the objective is hacked or all players on a team have been eliminated. Strikeout is a variation of Extraction in which players are able to respawn after being eliminated, with each team having a limited number of respawns each round. In this mode, victory must be achieved via killing enemies until they have no respawns left. This can be more easily achieved by hacking the objective, an area rather than a box. Demolition is a 4v4 mode in which one team must plant a bomb within a time limit. Wingman is a 2v2 game mode, basically the game mode Strikeout but with less respawns and teams of 2. Development Rogue Company was announced on September 5, 2019. F
https://en.wikipedia.org/wiki/Fungal%20DNA%20barcoding
Fungal DNA barcoding is the process of identifying species of the biological kingdom Fungi through the amplification and sequencing of specific DNA sequences and their comparison with sequences deposited in a DNA barcode database such as the ISHAM reference database, or the Barcode of Life Data System (BOLD). In this attempt, DNA barcoding relies on universal genes that are ideally present in all fungi with the same degree of sequence variation. The interspecific variation, i.e., the variation between species, in the chosen DNA barcode gene should exceed the intraspecific (within-species) variation. A fundamental problem in fungal systematics is the existence of teleomorphic and anamorphic stages in their life cycles. These morphs usually differ drastically in their phenotypic appearance, preventing a straightforward association of the asexual anamorph with the sexual teleomorph. Moreover, fungal species can comprise multiple strains that can vary in their morphology or in traits such as carbon- and nitrogen utilisation, which has often led to their description as different species, eventually producing long lists of synonyms. Fungal DNA barcoding can help to identify and associate anamorphic and teleomorphic stages of fungi, and through that to reduce the confusing multitude of fungus names. For this reason, mycologists were among the first to spearhead the investigation of species discrimination by means of DNA sequences, at least 10 years earlier than the DNA barcoding proposal for animals by Paul D. N. Hebert and colleagues in 2003, who popularised the term "DNA barcoding". The success of identification of fungi by means of DNA barcode sequences stands and falls with the quantitative (completeness) and qualitative (level of identification) aspect of the reference database. Without a database covering a broad taxonomic range of fungi, many identification queries will not result in a satisfyingly close match. Likewise, without a substantial curatorial effort to
https://en.wikipedia.org/wiki/NewHope
In post-quantum cryptography, NewHope is a key-agreement protocol by Erdem Alkim, Léo Ducas, Thomas Pöppelmann, and Peter Schwabe that is designed to resist quantum computer attacks. NewHope is based on a mathematical problem ring learning with errors (RLWE) that is believed to be difficult to solve. NewHope has been selected as a round-two contestant in the NIST Post-Quantum Cryptography Standardization competition, and was used in Google's CECPQ1 experiment as a quantum-secure algorithm, alongside the classical X25519 algorithm. Design choices The designers of NewHope made several choices in developing the algorithm: Binomial Sampling: Although sampling to high-quality discrete Gaussian distribution is important in post-quantum lattice-based compact signature scheme such as Falcon (GPV-style Hash-and-Sign paradigm) and BLISS (GLP-style Fiat–Shamir paradigm) to prevent signature from leaking information about the private key, it's otherwise not so essential to key exchange schemes. The author chose to sample error vectors from binomial distribution. Error Reconciliation: What distinguishes NewHope from its predecessors is its method for error reconciliation. Previous ring learning with error key exchange schemes correct errors one coefficient at a time, whereas NewHope corrects errors 2 or 4 coefficients at a time based on high-dimension geometry. This allows for lower decryption failure rate and higher security. Base Vector Generation: The authors of NewHope proposed deriving the base "generator" vector (commonly denoted as A or ) from the output of the XOF function SHAKE-128 in order to prevent "back-doored" values from being used, as may happen with traditional Diffie–Hellman through Logjam attack. Security Levels: In the early versions of the papers describing NewHope, authors proposed using 1024-degree polynomial for 128-bit "post-quantum" security level, and a 512-degree polynomial as "toy" instance for cryptanalysis challenge. In the version submitt
https://en.wikipedia.org/wiki/Borel%20subalgebra
In mathematics, specifically in representation theory, a Borel subalgebra of a Lie algebra is a maximal solvable subalgebra. The notion is named after Armand Borel. If the Lie algebra is the Lie algebra of a complex Lie group, then a Borel subalgebra is the Lie algebra of a Borel subgroup. Borel subalgebra associated to a flag Let be the Lie algebra of the endomorphisms of a finite-dimensional vector space V over the complex numbers. Then to specify a Borel subalgebra of amounts to specify a flag of V; given a flag , the subspace is a Borel subalgebra, and conversely, each Borel subalgebra is of that form by Lie's theorem. Hence, the Borel subalgebras are classified by the flag variety of V. Borel subalgebra relative to a base of a root system Let be a complex semisimple Lie algebra, a Cartan subalgebra and R the root system associated to them. Choosing a base of R gives the notion of positive roots. Then has the decomposition where . Then is the Borel subalgebra relative to the above setup. (It is solvable since the derived algebra is nilpotent. It is maximal solvable by a theorem of Borel–Morozov on the conjugacy of solvable subalgebras.) Given a -module V, a primitive element of V is a (nonzero) vector that (1) is a weight vector for and that (2) is annihilated by . It is the same thing as a -weight vector (Proof: if and with and if is a line, then .) See also Borel subgroup Parabolic Lie algebra References . . . Representation theory Lie algebras
https://en.wikipedia.org/wiki/Anatomical%20model
An anatomical model is a three-dimensional representation of human or animal anatomy, used for medical and biological education. Model specs The model may show the anatomy partially dissected, or have removable parts allowing the student to remove and inspect the modelled body parts. Some models may have changeable genital inserts and other interchangeable parts which permit a unisex model to represent an individual of either sex. Although 3D computer models of anatomy now exist as an alternative, physical anatomical models still have advantages in providing insight into anatomy. See also Anatomy Comparative anatomy References External links Physical models Anatomy Medical education History of anatomy Sculpture
https://en.wikipedia.org/wiki/Instituto%20de%20Estad%C3%ADstica%20y%20Cartograf%C3%ADa%20de%20Andaluc%C3%ADa
Instituto de Estadística y Cartografía de Andalucía (IECA) is a public organization which coordinates and announces statistics and cartography in Andalucía. In 2019 it was named Elena Manzanera Díaz as the directress. References History of Andalusia Government of Andalusia Political history of Spain Geographic information systems organizations Statistics education Statistical service organizations National statistical services
https://en.wikipedia.org/wiki/Genome%20sequencing%20of%20endangered%20species
Genome sequencing of endangered species is the application of Next Generation Sequencing (NGS) technologies in the field of conservation biology, with the aim of generating life history, demographic and phylogenetic data of relevance to the management of endangered wildlife. Background In the context of conservation biology, genomic technologies such as the production of large-scale sequencing data sets via DNA sequencing can be used to highlight the relevant aspects of the biology of wildlife species for which management actions may be required. This may involve the estimation of recent demographic events, genetic variations, divergence between species and population structure. Genome-wide association studies (GWAS) are useful to examine the role of natural selection at the genome level, to identify the loci associated with fitness, local adaptation, inbreeding, depression or disease susceptibility. The access to all these data and the interrogation of genome-wide variation of SNP markers can help the identification of the genetic changes that influence the fitness of wild species and are also important to evaluate the potential respond to changing environments. NGS projects are expected to rapidly increase the number of threatened species for which assembled genomes and detailed information on sequence variation are available and the data will advance investigations relevant to the conservation of biological diversity. Methodology Non-computational methods The traditional approaches in the preservation of endangered species are captive breeding and the private farming. In some cases those methods led to great results, but some problems still remain. For example, by inbreeding only few individuals, the genetic pool of a subpopulation remains limited or may decrease. Phylogenetic analysis and gene family estimation Genetic analyses can remove subjective elements from the determination of the phylogenetic relationship between organisms. Considering the great v
https://en.wikipedia.org/wiki/Human%20somatic%20variation
Human somatic variations are somatic mutations (mutations that occur in somatic cells) both at early stages of development and in adult cells. These variations can lead either to pathogenic phenotypes or not, even if their function in healthy conditions is not completely clear yet. The term mosaic (from medieval Latin musaicum, meaning "work of the Muses") has been used since antiquity to refer to an artistic patchwork of ornamental stones, glass, gems, or other precious material. At a distance, the collective image appears as it would in a painting; only on close inspection do the individual components become recognizable. In biological systems, mosaicism implies the presence of more than one genetically distinct cell line in a single organism. Occurrence of this phenomenon not only can result in major phenotypic changes but also reveal the expression of otherwise lethal genetic mutations. Genetic mutations involved in mosaicism may be due to endogenous factors, such as transposons and ploidy changes, or exogenous factors, such as UV radiation and nicotine. Somatic mosaicism in healthy human tissues Somatic mosaicism arises a result of somatic mutations: genomic (or even mitochondrial) alterations of different sizes ranging from a single nucleotide to chromosome gains or loss within somatic cells. These alterations within somatic cells begin at an early stage (pre-implantation or conception) and continue during aging, giving rise to phenotypic heterogeneity within cells, which may lead to the development of diseases such as cancer. Novel array based techniques for screening genome-wide copy number variants and loss of heterozygosity in single cells showed that chromosome aneuploidies, uniparental disomies, segmental deletions, duplications, and amplifications frequently occur during embryogenesis. Yet not all somatic mutations are propagated to the adult individual, due to the phenomenon of cell competition. Genetic alterations involving gains or loss of entire
https://en.wikipedia.org/wiki/Human%20epigenome
Human epigenome is the complete set of structural modifications of chromatin and chemical modifications of histones and nucleotides (such as cytosine methylation). These modifications affect according to cellular type and development status. Various studies show that epigenome depends on exogenous factors. Chemical modifications Different types of chemical modifications exist and the ChIP-seq experimental procedure can be performed in order to study them. The epigenetic profiles of human tissues reveals the following distinct histone modifications in different functional areas: Methylation DNA functionally interacts with a variety of epigenetic marks, such as cytosine methylation, also known as 5-methylcytosine (5mC). This epigenetic mark is widely conserved and plays major roles in the regulation of gene expression, in the silencing of transposable elements and repeat sequences. Individuals differ with their epigenetic profile, for example the variance in CpG methylation among individuals is about 42%. On the contrary, epigenetic profile (including methylation profile) of each individual is constant over the course of a year, reflecting the constancy of our phenotype and metabolic traits. Methylation profile, in particular, is quite stable in a 12-month period and appears to change more over decades. Methylation sites CoRSIVs are Correlated Regions of Systemic Interindividual Variation in DNA methylation. They span only 0.1% of the human genome, so they are very rare; they can be inter-correlated over long genomic distances (>50 kbp). CoRSIVs are also associated with genes involved in a lot of human disorders, including tumors, mental disorders and cardiovascular diseases. It has been observed that disease-associated CpG sites are 37% enriched in CoRSIVs compared to control regions and 53% enriched in CoRSIVs relative to tDMRs (tissue specific Differentially Methylated Regions). Most of the CoRSIVs are only 200 – 300 bp long and include 5–10 CpG dinucleoti
https://en.wikipedia.org/wiki/Metal%E2%80%93inorganic%20framework
Metal–inorganic frameworks (MIFs) are a class of compounds consisting of metal ions or clusters coordinated to inorganic ligands to form one-, two-, or three-dimensional structures. They are a subclass of coordination polymers, with the special feature that they are often porous. They are inorganic counterpart of Metal–organic frameworks. History Millon's base which have been known since early 20th century, can be considered as MIFs. Linkers MIF with Borazocine linker was developed for hydrogen storage. Cu2I2Se6 has Se6 linkers. There are many MIFs with pnictogen linkers. References Crystal engineering Porous media Coordination polymers Inorganic compounds
https://en.wikipedia.org/wiki/Wingspan%20%28board%20game%29
Wingspan is a board game designed by Elizabeth Hargrave and published by Stonemaier Games in 2019. It is a card-driven, board game in which players compete to attract birds to their wildlife reserves. During the game's development process, Hargrave constructed personal charts of birds observed in Maryland, with statistics sourced from various biological databases; the special powers of birds were also selected to resemble real-life characteristics. Upon its release, Wingspan received critical and commercial acclaim for its gameplay, accurate thematic elements, and artwork. The game also won numerous awards, including the 2019 Kennerspiel des Jahres. Several expansions and a digital edition have been subsequently published. Gameplay In Wingspan, players spend food resources to add birds, which are represented by 170 individually illustrated cards, to the forest, prairie, and wetland habitats on their player boards. Each habitat is associated with a different player action: gaining food resources to pay for birds, laying eggs on birds, or drawing cards. Over the course of four rounds, players take turns activating the habitats on their player boards or adding new birds. As birds are added to a habitat, the basic action of gaining food, laying eggs, or drawing cards associated with that habitat is improved. Additionally, some birds have special abilities that are activated when a player uses their habitat. At the end of the game, players score points for the birds on their board, objectives achieved during each round and throughout the game, eggs accumulated, food stored on cards, and cards stored under cards. The player with the most points wins. Development Wingspan was designed by Elizabeth Hargrave, a health consultant in Silver Spring, an amateur birder, and a former policy analyst for NORC at the University of Chicago. The game was inspired by Hargrave's visits to Lake Artemesia near her home in Maryland. Hargrave stated that she selected the theme because "t
https://en.wikipedia.org/wiki/CCIR%20476
CCIR 476 is a character encoding used in radio data protocols such as SITOR, AMTOR and Navtex. It is a recasting of the ITA2 character encoding, known as Baudot code, from a five-bit code to a seven-bit code. In each character, exactly four of the seven bits are mark bits, and the other three are space bits. This allows for the detection of single-bit errors. Technical details The number of possible valid binary code values in CCIR 476 is the number of ways to choose 4 marks for 7 bit positions, and the number can be calculated using the binomial coefficient: Thus CCIR 476 has 3 additional code points available over ITA2's 32 code points. The SITOR protocol uses the additional three code points (denoted as SIA, SIB and RPT below) for idle, phasing, and repeat requests. In addition, some of the ordinary characters are reused as control signals. Character set In these tables, the hexadecimal code values are converted from a binary representation, with 1 being mark, 0 being space, and the most significant bit given first. The international version of ITA2 is used here; note also the added non-ITA2 codes SIA, SIB and RPT, used by SITOR. References Character encoding Character sets Telegraphy Amateur radio
https://en.wikipedia.org/wiki/Brewer%27s%20spent%20grain
Brewer's spent grain (BSG) or draff is a food waste that is a byproduct of the brewing industry that makes up 85 percent of brewing waste. BSG is obtained as a mostly solid residue after wort production in the brewing process. The product is initially wet, with a short shelf-life, but can be dried and processed in various ways to preserve it. Because spent grain is widely available wherever beer is consumed and is frequently available at a low cost, many potential uses for this waste have been suggested and studied as a means of reducing its environmental impact, such as use as a food additive, animal feed, fertilizer or paper. Composition The majority of BSG is composed of barley malt grain husks in combination with parts of the pericarp and seed coat layers of the barley. Though the composition of BSG can vary, depending on the type of barley used, the way it was grown, and other factors, BSG is usually rich in cellulose, hemicelluloses, lignin, and protein. BSG is also naturally high in fiber, making it of great interest as a food additive, replacing low-fiber ingredients. Food additive The high protein and fiber content of BSG makes it an obvious target to add to human foods. BSG can be ground and then sifted into a powder that can increase fiber and protein content while decreasing caloric content, possibly replacing flour in baked goods and other foods, such as breadsticks, cookies, and even hot dogs. Some breweries that also operate restaurants re-use their BSG in recipes, such as in pizza crust. Grainstone is an Australian based company that has developed a world leading modular energy efficient process to convert BSG to a premium specialty flour and a process to produce nutraceuticals; including protein isolate, soluble dietary fibre and antioxident. Livestock feed The low cost and high availability of BSG has led to its use as livestock feed. BSG can be fed to livestock immediate in its wet stage or once processed and dried. The high protein conten
https://en.wikipedia.org/wiki/Taxonomic%20boundary%20paradox
The term boundary paradox refers to the conflict between traditional, rank-based classification of life and evolutionary thinking. In the hierarchy of ranked categories it is implicitly assumed that the morphological gap is growing along with increasing ranks: two species from the same genus are more similar than other two species from different genera in the same family, these latter two species are more similar than any two species from different families of the same order, and so on. However, this requirement may only satisfy for the classification of contemporary organisms; difficulties arise if we wish to classify descendants together with their ancestors. Theoretically, such a classification necessarily involves segmentation of the spatio-temporal continuum of populations into groups with crisp boundaries. However, the problem is not only that many parent populations would separate at species level from their offspring. The truly paradoxical situation is that some between-species boundaries would necessarily coincide with between-genus boundaries, and a few between-genus boundaries with borders between families, and so on. This apparent ambiguity cannot be resolved in Linnaean systems; resolution is only possible if classification is cladistic (see below). Historical background Jean-Baptiste Lamarck, in Philosophie zoologique (1809), was the first who questioned the objectivity of rank-based classification of life, by saying: Half a century later, Charles Darwin explained that sharp separation of groups of organisms observed at present becomes less obvious if we go back into the past: In his book on orchids, Darwin also warned that the system of ranks would not work if we knew more details about past life: Finally, Richard Dawkins has argued recently that and with the following conclusion: Illustrative models The paradox may be best illustrated by model diagrams similar to Darwin’s single evolutionary tree in On the Origin of Species. In these tree grap
https://en.wikipedia.org/wiki/27-Norcholestane
27-Norcholestane, is a chemical compound with formula , that is a steroid derivative. 27-Norcholestane is used as a biomarker to constrain the source age of sediments and petroleum through the ratio between 24-norcholestane and 27-norcholestane (norcholestane ratio, NCR), especially when used with other age diagnostic biomarkers, like oleanane. See also Biomarker Cholestane Nor- References Steroids Biomarkers
https://en.wikipedia.org/wiki/Democratic%20Tsunami
Democratic Tsunami (, ) is a Catalan protest group advocating a self-determination referendum in Catalonia, formed and organized in the lead up to the final judgement on the Trial of the Catalonia independence leaders. It organizes supporters of the Catalan independence movement through the use of social media, apps and other online resources. It used a 'bespoke' Android app, along with a Telegram account with over 410,000 followers in order to mobilize and organize demonstrations during the 2019 Catalan Protests. Distributed outside of the official market for Android apps, the application (making use of overseas servers) infringes the European legislation for data protection in regards of geolocalization. Goals As stated in press notes and interviews, their objectives are the freedom of prisoners, exiles and reprisals; defense of fundamental rights and the self-determination of Catalonia. In a statement following the judgment of the trial of the Catalonia independence leaders, read by Pep Guardiola, they defended the rights of assembly and demonstration, freedom of expression and the right to a fair trial. They also held an independence referendum similar to that of Quebec or Scotland, and called on the international community to position itself for a "conflict resolution based on dialogue and respect." They defend civil disobedience and nonviolence. History Activity In one of its first actions, the group managed to organize a large protest at Barcelona Airport, which led to a major disruption and the cancellation of over 100 flights. The group endorses nonviolence and has supported occupation of government buildings and other protest acts, which were condemned by the Spanish government. The group's actions appear to mimic those of the 2019–20 Hong Kong protests, which also occupied a key airport. The group also used similar language to the Hong Kong Protesters, urging protesters to "add up like drops of water". The group managed to assert itself as one o
https://en.wikipedia.org/wiki/G%C3%A9rard%20Iooss
Gérard Iooss (born 14 June 1944 in Charbonnier-les-Mines, Puy-de-Dôme) is a French mathematician, specializing in dynamical systems and mathematical problems of hydrodynamics. Education and career Iooss attended school in Clermont-Ferrand and studied at the École Polytechnique from 1964 to 1966. From 1967 to 1972 he was with the Office National d'Etudes et de Recherches Aérospatiales (ONERA). In 1971 he received his doctorate from the Pierre and Marie Curie University (Paris 6) with thesis Théorie non linéaire de la stabilit des écoulements laminaires under the supervision of Jean-Pierre Guireaud. Iooss was a professor from 1972 to 1974 at the University of Paris-Sud in Orsay, and from 1974 at the University of Nice Sophia-Antipolis, where he retired in 2007. From 1994 to 2004 he was at the Institut Universitaire de France. He is today at the Laboratoire J. A. Dieudonné of the University of Nice. (The Laboratoire J. A. Diedonné is a unité mixte de recherche (UMR) of the CNRS.) He was also from 1970 to 1985 Maître de conférences at the École Polytechnique. He was a visiting professor at the University of Minnesota (1977/78), at the University of California, Berkeley (1978), and at the University of Stuttgart (1990, 1995, 1997), where he collaborated with Klaus Kirchgässner on reversible dynamical systems. Iooss's research deals with functional analysis of the Navier-Stokes equation, nonlinear hydrodynamic stability theory and water waves of different kinds, and general behavior (such as symmetry breaking and normal forms) of bifurcations (branching of solutions) in dynamic systems. In 1971, independently of David H. Sattinger, he treated the Hopf bifurcation in solutions of the Navier-Stokes equation as an infinite dimensional dynamical system. He studied in particular the Couette flow (Taylor-Couette) and discovered there theoretically several waveforms, which were later confirmed experimentally. He collaborated with Alain Chenciner on bifurcation of invariant t
https://en.wikipedia.org/wiki/Bofedales
Bofedales (singular bofedal), known in some parts of Peru as oconales, are a type of wetland found in the Andes in Peru, Chile, and Bolivia. They are a feature in the land use and ecology of high Andean ecosystems. They form in flat areas around ponds or streams and may be permanent or seasonal, and they can be man made or natural. The soil in a bofedal will be moist throughout the year. Bofedales are associated with peat in the soil and the presence of humidity in the soil means that they are green throughout the year. Bofedales are found above above sea level (asl), although some classifications put them no lower than asl. The Ramsar Convention describes bofedales as peatlands without forest. Bofedales absorb the limited amount of water derived from snow, glacier meltwater and rain showers storing it in ground and slowly releasing it. The water can be either fresh or saline. Their vegetation is slow-growing and tough, made up of grasses, especially rushes, and some low spreading herbs. Birds such as the Andean goose, ducks and wading birds use these wetlands for feeding and a wide variety of other birds depend on these permanent water sources and their associated insects. Other types of animals in the bofedales are poorly known. References Ecosystems Marshes
https://en.wikipedia.org/wiki/Gradient%20vector%20flow
Gradient vector flow (GVF), a computer vision framework introduced by Chenyang Xu and Jerry L. Prince, is the vector field that is produced by a process that smooths and diffuses an input vector field. It is usually used to create a vector field from images that points to object edges from a distance. It is widely used in image analysis and computer vision applications for object tracking, shape recognition, segmentation, and edge detection. In particular, it is commonly used in conjunction with active contour model. Background Finding objects or homogeneous regions in images is a process known as image segmentation. In many applications, the locations of object edges can be estimated using local operators that yield a new image called an edge map. The edge map can then be used to guide a deformable model, sometimes called an active contour or a snake, so that it passes through the edge map in a smooth way, therefore defining the object itself. A common way to encourage a deformable model to move toward the edge map is to take the spatial gradient of the edge map, yielding a vector field. Since the edge map has its highest intensities directly on the edge and drops to zero away from the edge, these gradient vectors provide directions for the active contour to move. When the gradient vectors are zero, the active contour will not move, and this is the correct behavior when the contour rests on the peak of the edge map itself. However, because the edge itself is defined by local operators, these gradient vectors will also be zero far away from the edge and therefore the active contour will not move toward the edge when initialized far away from the edge. Gradient vector flow (GVF) is the process that spatially extends the edge map gradient vectors, yielding a new vector field that contains information about the location of object edges throughout the entire image domain. GVF is defined as a diffusion process operating on the components of the input vector fiel
https://en.wikipedia.org/wiki/Overwatch%202
Overwatch 2 is a 2022 first-person shooter game developed and published by Blizzard Entertainment. As a sequel and replacement to the 2016 hero shooter Overwatch, the game intends a shared environment for player-versus-player (PvP) modes while initially having plans for introducing persistent cooperative modes, though the plans were later scrapped in 2023, focusing the game on its PvP elements. A major change in PvP modes was to reduce team sizes from six to five. Several major characters were also reworked. Overwatch 2 is free-to-play on Nintendo Switch, PlayStation 4, PlayStation 5, Windows, Xbox One, and Xbox Series X/S in early access on October 4 and features full cross-platform play. Blizzard dropped the early access label for the game on August 10, 2023 with the release of Overwatch 2'''s sixth season. GameplayOverwatch 2 is a hero shooter, where players are split into two teams and select a "hero" from a roster of 35 characters. Characters are organized into a "damage" class, responsible for offensive efforts; a "support" class, responsible for healing and buffing; and a "tank" class, responsible for creating space for their team. Each character has a unique set of skills, made up of active, passive, and ultimate abilities. Overwatch 2, like its predecessor, primarily centers on player versus player (PvP) combat across several different modes and maps, and includes both casual and ranked competitive matches. The original Overwatch was designed for six-on-six team combat, with two of each class on a team. In Overwatch 2, the number of tank slots was reduced by one, bringing the total number of players per team to five. According to game director Aaron Keller, developers hoped that losing a tank would speed up gameplay as they believed that the original six players scheme rendered gameplay slow. It is also intended to ease the amount of things players and spectators need to watch out for. New maps were designed to include more cover options to compensate for
https://en.wikipedia.org/wiki/Splitgate
Splitgate (known during development under the working title Splitgate: Arena Warfare) is a free-to-play multiplayer first-person shooter video game developed and published by 1047 Games. It was released in early access on May 24, 2019, for Linux and Microsoft Windows on Steam, and on Xbox One, and PlayStation 4 on July 27, 2021. A PlayStation 5 and Xbox Series X/S version came in 2022. On August 25, 2021, the developers announced that the game would stay in beta indefinitely and at the same time released Season Zero. The game revolves around Halo-inspired sci-fi combat in battle arenas where players can create wormhole portals between two points on the map that have been compared to those of the Portal series, and fire weapons or travel through those portals. Development The game was developed by Nevada-based 1047 Games. Its co-founders, Ian Proulx and Nicholas Bagamian started working on the game as a school project while they were attending Stanford University studying computer science. Proulx was inspired by Portal and Portal 2, and believed that its mechanic could translate well into other video game genres. They worked on the game without funding for six months, and then released a demo for user testing, which became unexpectedly popular as the game drew 600,000 downloads in its first month of release. The game design philosophy was described to be similar to that of Fortnite and Rocket League, in which the game is "easy to learn" but "difficult to master". The game was released as a free-to-play title on Steam on May 24, 2019. 1047 Games continued to work on the game post-release and had raised a total of $10 million for the project by May 2021 from investors. In June 2021, the company announced that the game would be coming to PlayStation 4, PlayStation 5, Xbox One, and Xbox Series X/S with cross-platform play supported. While Splitgate struggled to maintain a viable player base after its initial early access launch in 2019, the game saw a significant sur
https://en.wikipedia.org/wiki/Thermal%20ecology
Thermal ecology is the study of the interactions between temperature and organisms. Such interactions include the effects of temperature on an organism's physiology, behavioral patterns, and relationship with its environment. While being warmer is usually associated with greater fitness, maintaining this level of heat costs a significant amount of energy. Organisms will make various trade-offs so that they can continue to operate at their preferred temperatures and optimize metabolic functions. With the emergence of climate change scientists are investigating how species will be affected and what changes they will undergo in response. History While it is not known exactly when thermal ecology began being recognized as a new branch of science, in 1969, the Savanna River Ecology Laboratory (SREL) developed a research program on thermal stress due to heated water previously used to cool nuclear reactors being released into various nearby bodies of water. The SREL alongside the DuPont Company Savanna River Laboratory and the Atomic Energy Commission sponsored the first scientific symposium on thermal ecology in 1974 to discuss this issue as well as similar instances and the second symposium was held the next year in 1975. Animals Temperature has a notable effect on animals, contributing to body growth and size, and behavioral and physical adaptations. Ways that animals can control their body temperature include generating heat through daily activity and cooling down through prolonged inactivity at night. Because this cannot be done by marine animals, they have adapted to have traits such as a small surface-area-to-volume ratio to minimize heat transfer with their environment and the creation of antifreeze in the body for survival in extreme cold conditions. Endotherms Endotherms expend a large amount of energy keeping their body temperatures warm and therefore require a large energy intake to make up for it. There are several ways that they have evolved to solve t
https://en.wikipedia.org/wiki/Strategic%20fair%20division
Strategic fair division is the branch of fair division in which the participants are assumed to hide their preferences and act strategically in order to maximize their own utility, rather than playing sincerely according to their true preferences. To illustrate the difference between strategic fair division and classic fair division, consider the divide and choose procedure for dividing a cake among two agents. In classic fair division, it is assumed that the cutter cuts the cake into two pieces that are equal in his eyes, and thus he always gets a piece that he values at exactly 1/2 of the total cake value. However, if the cutter knows the chooser's preferences, he can get much more than 1/2 by acting strategically. For example, suppose the cutter values a piece by its size while the chooser values a piece by the amount of chocolate in it. So the cutter can cut the cake into two pieces with almost the same amount of chocolate, such that the smaller piece has slightly more chocolate. Then, the chooser will take the smaller piece and the cutter will win the larger piece, which may be worth much more than 1/2 (depending on how the chocolate is distributed). The research in strategic fair division has two main branches. One branch is related to game theory and studies the equilibria in games created by fair division algorithms: The Nash equilibrium of the Dubins-Spanier moving-knife protocol; The Nash equilibrium and subgame-perfect equilibrium of generalized-cut-and-choose protocols; The equilibria of envy-free protocols for allocating an indivisible good with monetary compensations. The price of anarchy of Nash equilibria of two mechanisms for homogeneous-resource allocation: the Fisher market game and the Trading Post game. The other branch is related to mechanism design and aims to find truthful mechanisms for fair division, in particular: Truthful cake-cutting; Truthful resource allocation; Truthful fair division of rooms and rent. References Fairness
https://en.wikipedia.org/wiki/Prime%20editing
Prime editing is a 'search-and-replace' genome editing technology in molecular biology by which the genome of living organisms may be modified. The technology directly writes new genetic information into a targeted DNA site. It uses a fusion protein, consisting of a catalytically impaired Cas9 endonuclease fused to an engineered reverse transcriptase enzyme, and a prime editing guide RNA (pegRNA), capable of identifying the target site and providing the new genetic information to replace the target DNA nucleotides. It mediates targeted insertions, deletions, and base-to-base conversions without the need for double strand breaks (DSBs) or donor DNA templates. The technology has received mainstream press attention due to its potential uses in medical genetics. It utilizes methodologies similar to precursor genome editing technologies, including CRISPR/Cas9 and base editors. Prime editing has been used on some animal models of genetic disease and plants. Genome editing Components Prime editing involves three major components: A prime editing guide RNA (pegRNA), capable of (i) identifying the target nucleotide sequence to be edited, and (ii) encoding new genetic information that replaces the targeted sequence. The pegRNA consists of an extended single guide RNA (sgRNA) containing a primer binding site (PBS) and a reverse transcriptase (RT) template sequence. During genome editing, the primer binding site allows the 3’ end of the nicked DNA strand to hybridize to the pegRNA, while the RT template serves as a template for the synthesis of edited genetic information. A fusion protein consisting of a Cas9 H840A nickase fused to a Moloney Murine Leukemia Virus (M-MLV) reverse transcriptase. Cas9 H840A nickase: the Cas9 enzyme contains two nuclease domains that can cleave DNA sequences, a RuvC domain that cleaves the non-target strand and a HNH domain that cleaves the target strand. The introduction of a H840A substitution in Cas9, through which the 840º amino acid hi
https://en.wikipedia.org/wiki/Radio%20Garden
Radio Garden is a non-profit Dutch radio and digital research project developed from 2013 to 2016, by the Netherlands Institute for Sound and Vision (under the supervision of Martin Luther University of Halle-Wittenberg's Golo Föllmer), by the Transnational Radio Knowledge Platform and five other European universities. According to the service, the idea is to narrow the boundaries from the radio. It gained popularity in 2016 when it surpassed 8,000 registered stations and, as announced at The Radio Conference 2016: Transnational Encounters, went viral. Operation and functionality The site interface is a three-dimensional geolocation, where the user navigates through a representation of the globe, listening to broadcasts of local radio stations, referring in some way to the technology of shortwave radios, long distances, but in this case the means of propagation of the radio edition is by data packets (streaming). The homepage, titled Live, allows the user to explore the world in real time, listening to what the local radios are broadcasting. To do this, it is just necessary to simply rotate the globe. It also provides information on the country where the signal is being transmitted. Concept and design Within Radio Garden, radios are arranged by geolocation and grouped by cities. According to specialized websites, the design is formed by greenish spheres superimposed on the map, which increases in size as the region's number of broadcasters available. This idea was developed by the companies Studio Puckey and Studio Moniker in partnership with the Netherlands Institute for Sound and Vision. On 14 March 2020 a new version, with upgraded features, was released. Interface and conversion The site adopted the generic .garden Top-level domain, which was originally intended for gardening professionals and, as noted on specialized websites, the interface is all responsive and fits any browser and resolution. For transmission, the signal generated by the broadcaster must
https://en.wikipedia.org/wiki/Trudy%20Morgan
Trudy Morgan (born 1966) is the first African woman to be awarded a Fellowship of the Institution of Civil Engineers (FICE) and the first female Vice President of the Sierra Leone Institution of Engineers. Born to Sierra Leone Creole parents in Liverpool, United Kingdom, Morgan and her family moved back to Sierra Leone where she received her education in civil engineering. In 2015, Morgan co-founded the non-profit Sierra Leone Women Engineers, to support women in engineering. Morgan is also the program director for Hilton Freetown Cape Sierra Hotel,  a member of the Professional Engineers Review Council and the UK's Institution of Civil Engineers International Representative to Sierra Leone. References External links Fellowship of the Institution of Civil Engineers (FICE) Sierra Leone Institution of Engineers 1966 births Living people Sierra Leone Creole people Sierra Leonean engineers
https://en.wikipedia.org/wiki/Composable%20disaggregated%20infrastructure
Composable disaggregated infrastructure (CDI), sometimes stylized as composable/disaggregated infrastructure, is a technology that allows enterprise data center operators to achieve the cost and availability benefits of cloud computing using on-premises networking equipment. It is considered a class of converged infrastructure, and uses management software to combine compute, storage and network elements. It is similar to public cloud, except the equipment sits on premises in an enterprise data center. Overview American market intelligence firm International Data Corporation (IDC) describes CDI as "an emerging category of infrastructure systems that make use of high-bandwidth, low-latency interconnects to aggregate compute, storage, and networking fabric resources into shared resource pools that can be available for on-demand allocation." These systems use what is sometimes called rack-scale architecture, which allows network operators to replace components on a rack while the entire data center behaves as a virtualized server. This allows operators to allocate compute, memory, and storage resources inside each server node on-demand, over a high speed, low latency computing fabric. The individual components can be managed as a resource pool, allowing dynamic provisioning and deprovisioning with a common application programming interface (API). No hardware configuration is required. Technology Composability refers to the composer, which is another term for the software that allows the server resources, which include compute, storage, and RAM, to be placed into a pool to become available for applications and workloads. Disaggregation is the process of aggregating server resources with the resources of other servers in the data center. These aggregated or pooled resources can be shared by applications or workloads. The composer software controls how much of each disaggregated resource is needed from each server. The use of software APIs to provisioning the res
https://en.wikipedia.org/wiki/Miles%20Dyson
Doctor Miles Bennett Dyson is a character in the sci-fi franchise Terminator. He is the original inventor of the microprocessor which would lead to the development of Skynet, an intelligent computer system intended to control the United States military, but which would later achieve sentience and launch a global war of extermination against humanity. Dyson is portrayed by Joe Morton in Terminator 2: Judgment Day (T2), by Phil Morris in Terminator: The Sarah Connor Chronicles, and by Courtney B. Vance in Terminator Genisys. Fictional biography Terminator 2: Judgment Day Miles Dyson is an expert in cybernetics at Cyberdyne Systems Corporation as the Director of Special Projects. He has a wife named Tarissa and a son named Danny. Dyson is creating a microprocessor inspired by two pieces of highly advanced technology recovered from a Terminator in the first film. Dyson is the man most directly responsible for Skynet's creation, which would lead to Judgment Day. One night at his home, Dyson is suddenly attacked by Sarah Connor, who believed that Judgment Day could be averted by killing Dyson, thereby stopping development of the microprocessor. When Sarah realizes that Dyson is effectively innocent and cannot bring herself to kill him in front of his family, Dyson is saved by Sarah's son, John, and the Model 101 Terminator. To convince Dyson that it is a Terminator, the machine removes skin to reveal its mechanical arm, identical to another arm held at Cyberdyne's laboratory. The group explain to Dyson the nature of Skynet and what his work would lead to. Dyson initially states that he will quit working at Cyberdyne and destroy all of his research, only for the Model 101 to explain that as long as the technology remains at Cyberdyne, Judgment Day remains inevitable. Dyson agrees to accompany Sarah, John and the Terminator to Cyberdyne to destroy his research. After unwillingly forcing their way into Cyberdyne at gunpoint, Dyson assists John to gather the technology fro
https://en.wikipedia.org/wiki/Truthful%20cake-cutting
Truthful cake-cutting is the study of algorithms for fair cake-cutting that are also truthful mechanisms, i.e., they incentivize the participants to reveal their true valuations to the various parts of the cake. The classic divide and choose procedure for cake-cutting is not truthful: if the cutter knows the chooser's preferences, he can get much more than 1/2 by acting strategically. For example, suppose the cutter values a piece by its size while the chooser values a piece by the amount of chocolate in it. So the cutter can cut the cake into two pieces with almost the same amount of chocolate, such that the smaller piece has slightly more chocolate. Then, the chooser will take the smaller piece and the cutter will win the larger piece, which may be worth much more than 1/2 (depending on how the chocolate is distributed). Randomized mechanisms There is a trivial randomized truthful mechanism for fair cake-cutting: select a single agent uniformly at random, and give him/her the entire cake. This mechanism is trivially truthful because it asks no questions. Moreover, it is fair in expectation: the expected value of each partner is exactly 1/n. However, the resulting allocation is not fair. The challenge is to develop truthful mechanisms that are fair ex-post and not just ex-ante. Several such mechanisms have been developed. Exact division mechanism An exact division (aka consensus division) is a partition of the cake into n pieces such that each agent values each piece at exactly 1/n. The existence of such a division is a corollary of the Dubins–Spanier convexity theorem. Moreover, there exists such a division with at most cuts; this is a corollary of the Stromquist–Woodall theorem and the necklace splitting theorem. In general, an exact division cannot be found by a finite algorithm. However, it can be found in some special cases, for example when all agents have piecewise-linear valuations. Suppose we have a non-truthful algorithm (or oracle) for finding an
https://en.wikipedia.org/wiki/Caballer%C3%ADa
The () was a unit of land measurement in the Spanish viceroyalties in the Americas during the times of the Spanish Empire in the 16th through 19th centuries. It was equivalent to . The unit came from Spain, where it had already been in use. History A decree of King Ferdinand V on 18 June 1513 is the first known law granting land in the Americas to Europeans. The decree dictated that conquered lands could be granted to Spanish soldier in two units: caballerías and peonias. The decree extended to the New World a system Castile had already been using for areas it conquered in Europe. While a "peonia" was the amount of land granted a retiring foot soldier, a was the amount granted to a retiring cavalryman. The unit was over four times larger than a peonia. Land grants measuring one or more were issued to the members of the cavalry of a Spanish war company upon resulting victorious over a territory during a war conquest expedition, with the condition that once the soldier had decided to make his residence at such location, they committed themselves to the defense of the town where they were to reside. Demise As open land became less available for granting by the Spanish Crown, and as portions of caballerías were pieced apart by their owners in sales transactions into smaller land units too small to be measured in caballerías and, thus, measured in the more convenient cuerda units, the use of caballería units started to become obsolete. References External links Manufacturas en Michoacán. Metrología Equivalencias aproximadas. Feijoo Osorio, Carlos: Antiguas unidades de superficie. Further reading Don Fernando V, Valladolid, Spain, 18 June and 9 August 1513. Chapter 1. Emperor Don Carlos. 26 June 1523. Toledo, Spain. 19 May 1525. Don Felipe II. Chapter titled "Instrucción". Toledo, Spain, 25 May 1596. Ordenanza 104, 105 and 106, "Poblaciones". Units of measurement Units of area
https://en.wikipedia.org/wiki/Polytopological%20space
In general topology, a polytopological space consists of a set together with a family of topologies on that is linearly ordered by the inclusion relation ( is an arbitrary index set). It is usually assumed that the topologies are in non-decreasing order, but some authors prefer to put the associated closure operators in non-decreasing order (operators and satisfy if and only if for all ), in which case the topologies have to be non-increasing. Polytopological spaces were introduced in 2008 by the philosopher Thomas Icard for the purpose of defining a topological model of Japaridze's polymodal logic (GLP). They subsequently became an object of study in their own right, specifically in connection with Kuratowski's closure-complement problem. Definition An -topological space is a set together with a monotone map Top where is a partially ordered set and Top is the set of all possible topologies on ordered by inclusion. When the partial order is a linear order, then is called a polytopological space. Taking to be the ordinal number an [[N-topological space|-topological space]] can be thought of as a set together with topologies on it (or depending on preference). More generally, a multitopological space is a set together with an arbitrary family of topologies on See also Bitopological space References Topology
https://en.wikipedia.org/wiki/Henry%20Crapo%20%28mathematician%29
Henry Howland Crapo (; August 12, 1932 – September 3, 2019) was an American-Canadian mathematician who worked in algebraic combinatorics. Over the course of his career, he held positions at several universities and research institutes in Canada and France. He is noted for his work in matroid theory and lattice theory. Education and career Crapo was born in Detroit, Michigan, in 1932. He received his Ph.D. in 1964 under the supervision of Gian-Carlo Rota and Kenneth Hoffman. He held academic positions at the University of Waterloo, Université de Montréal, INRIA Rocquencourt, and École des Hautes Études en Sciences Sociales. During his time in Waterloo, Crapo became a Canadian citizen. Crapo is known for his early work in matroid theory, and for related work in lattice theory. He introduced the beta invariant of a matroid, and published the first paper on the Tutte polynomial (though Tutte had already defined an equivalent polynomial in his thesis). Together with Gian-Carlo Rota, Crapo wrote the first book on matroid theory. He is also known for Crapo's Complementation Theorem in poset Möbius Inversion. Crapo wrote 65 mathematical publications during his career. Upon his retirement, Crapo moved to the south of France. He continued some mathematical activity, and hosted several small conferences at his house there. He died on September 3, 2019. Awards and honors A special 1999 issue of the journal Advances in Applied Mathematics was dedicated to Crapo on the occasion of his 67th birthday. Personal life Crapo was a patron of the arts. At the University of Waterloo he donated a collection of rare books on the history of dance and ballet, as well as a copy of the Porcellino sculpture of Florence; the latter shoulder-high bronze sculpture of a wild boar later became a mascot for the University of Waterloo Faculty of Arts. He also donated The Temptation of St. Anthony by James Ensor to the Royal Museum of Fine Arts in Antwerp. References 1932 births 20
https://en.wikipedia.org/wiki/Glossary%20of%20Lie%20groups%20and%20Lie%20algebras
This is a glossary for the terminology applied in the mathematical theories of Lie groups and Lie algebras. For the topics in the representation theory of Lie groups and Lie algebras, see Glossary of representation theory. Because of the lack of other options, the glossary also includes some generalizations such as quantum group. Notations: Throughout the glossary, denotes the inner product of a Euclidean space E and denotes the rescaled inner product A B C D E F G H I J K L N M P Q R S Classical Lie algebras: Exceptional Lie algebras: T U Unitarian trick V Verma module W References Erdmann, Karin & Wildon, Mark. Introduction to Lie Algebras, 1st edition, Springer, 2006. Humphreys, James E. Introduction to Lie Algebras and Representation Theory, Second printing, revised. Graduate Texts in Mathematics, 9. Springer-Verlag, New York, 1978. Jacobson, Nathan, Lie algebras, Republication of the 1962 original. Dover Publications, Inc., New York, 1979. Claudio Procesi (2007) Lie Groups: an approach through invariants and representation, Springer, . . J.-P. Serre, "Lie algebras and Lie groups", Benjamin (1965) (Translated from French) Lie Algebra Wikipedia glossaries using description lists
https://en.wikipedia.org/wiki/Lynda%20Soderholm
Lynda Soderholm is a physical chemist at the U.S. Department of Energy’s (DOE) Argonne National Laboratory with a specialty in f-block elements. She is a senior scientist and the lead of the Actinide, Geochemistry & Separation Sciences Theme within Argonne's Chemical Sciences and Engineering Division. Her specific role is the Separation Science group leader within Heavy Element Chemistry and Separation Science (HESS), directing basic research focused on low-energy methods for isolating lanthanide and actinide elements from complex mixtures. She has made fundamental contributions to understanding f-block chemistry and characterizing f-block elements. Soderholm became a Fellow of the American Association for the Advancement of Science (AAAS) in 2013, and is also an Argonne Distinguished Fellow. Early life and education Soderholm was awarded her PhD in 1982 by McMaster University under the direction of Prof John Greedan. Her dissertation focused on characterizing the structural and magnetic properties of a series of ternary f-ion oxides. After graduating, she was awarded a NATO postdoctoral fellow at the Centre national de la recherche scientifique in France from 1982 until 1985. After a short postdoctoral appointment as an Argonne postdoctoral fellow she was promoted to staff scientist the same year. Over several years, she moved up the ranks, becoming a senior chemist in 2001. She was also an adjunct professor at the University of Notre Dame from 2003 until 2007. In 2021, Soderholm was appointed interim Division Director for the Chemical Sciences and Engineering Division. Career and research Uncovering structure of Yttrium-123 Superconductor Early in her career, Soderholm focused on the characterizing the magnetic and electronic behavior of compounds containing f-ions (lanthanides and actinides) with a focus on high-Tc materials, compounds that are superconducting under usually high temperatures. She was part of the research group that first determined the s
https://en.wikipedia.org/wiki/Culture%20plate
In microbiology, a culture plate is a low flat-bottomed laboratory container for growing a layer of organisms such as bacteria, molds, and cells on a thin layer of nutrient medium. The most common types are the petri dish and multiwell plates. See also Roux culture bottle Inoculation loop Test tube References Microbiology equipment
https://en.wikipedia.org/wiki/Dread%20%28forum%29
Dread is a Reddit-like dark web discussion forum featuring news and discussions around darknet markets. The site's administrators go by the alias of Paris and HugBunter. History Dread is a popular community hub which has been described as a "Reddit-style forum" and the successor of the seized DeepDotWeb for discussion around market law enforcement activity and scams. It came to prominence in 2018 after Reddit banned several darknet market discussion communities, rapidly reaching 12,000 registered users within three months of being launched, and 14,683 users by June 2018. In September 2019, HugBunter's dead man's switch was triggered, accompanied by a weeks-long absence, signifying the temporary loss of control over the site. The site would be reinstated in November, with a revamped user interface, and remains active as of September 2022. It became known that the cause of the outage was a server failure, according to HugBunter, despite rumors concerning a potential compromising from a third party or law-enforcement authority. Activities In May 2019 a moderator of Wall Street Market posted its hidden IP address to Dread, potentially leading to its exit scam and seizure shortly after. Stolen data is sometimes sold via Dread. The site features in-depth guides around manufacture of illegal drugs. The shutdown of Dream Market was announced on Dread in March 2019. Major denial-of-service attacks have been launched against Dread and other markets exploiting a vulnerability in the Tor protocol. References Dark web Darknet markets Internet properties established in 2018 Tor onion services Internet forums
https://en.wikipedia.org/wiki/Dynamically%20Redefined%20Character%20Set
The Dynamically Redefined Character Set, or DRCS for short, was a feature of Digital Equipment Corporation's smart terminals starting with the VT200 series in 1983. DRCS added a RAM buffer where new glyphs could be uploaded from the host system using the Sixel data format. References DEC hardware
https://en.wikipedia.org/wiki/Bivariant%20theory
In mathematics, a bivariant theory was introduced by Fulton and MacPherson , in order to put a ring structure on the Chow group of a singular variety, the resulting ring called an operational Chow ring. On technical levels, a bivariant theory is a mix of a homology theory and a cohomology theory. In general, a homology theory is a covariant functor from the category of spaces to the category of abelian groups, while a cohomology theory is a contravariant functor from the category of (nice) spaces to the category of rings. A bivariant theory is a functor both covariant and contravariant; hence, the name “bivariant”. Definition Unlike a homology theory or a cohomology theory, a bivariant class is defined for a map not a space. Let be a map. For such a map, we can consider the fiber square (for example, a blow-up.) Intuitively, the consideration of all the fiber squares like the above can be thought of as an approximation of the map . Now, a birational class of is a family of group homomorphisms indexed by the fiber squares: satisfying the certain compatibility conditions. Operational Chow ring The basic question was whether there is a cycle map: If X is smooth, such a map exists since is the usual Chow ring of X. has shown that rationally there is no such a map with good properties even if X is a linear variety, roughly a variety admitting a cell decomposition. He also notes that Voevodsky's motivic cohomology ring is "probably more useful " than the operational Chow ring for a singular scheme (§ 8 of loc. cit.) References Dan Edidin and Matthew Satriano, Towards an intersection Chow cohomology for GIT quotients The last two lectures of Vakil, Math 245A Topics in algebraic geometry: Introduction to intersection theory in algebraic geometry External links nLab- bivariant cohomology theory Abelian group theory Algebraic geometry Cohomology theories Functors Homology theory
https://en.wikipedia.org/wiki/Bzigo
Bzigo is a technology start-up company that develops autonomous devices for a pest-free life. Its first product detects and locates mosquitoes, and future products will both detect and eliminate mosquitoes and other pests autonomously. The company was founded by Nadav Benedek and Saar Wilf, who are both alumni of the Israel Defense Forces' intelligence Unit 8200. Significance Mosquitoes are the worst of the disease-transmitting insects, infecting around 700 million people and killing 1 million annually, so implementing this technology in parts of the world where mosquito-borne diseases are prevalent could improve health and save lives. Even in areas without malaria or other diseases, the presence of mosquitoes can decrease sleep quality, some people have mosquito allergies (“skeeter syndrome”), and they are a general nuisance. Future generations of the device will be optimized for industrial usages, such as pest extermination in greenhouses and large farms, as well as deterring other pests like pigeons. Technology The Bzigo device scans a room for mosquitoes using specialized optics and computer vision algorithms to identify the flight patterns of mosquitoes. Once it detects that a mosquito has landed, the device marks its location with a pointer and sends a message to a phone application, allowing the recipient to locate the pest and kill it. The device is compliant with all safety standards and regulations. Pricing The first generation of the Bzigo designator is expected to cost $199. References External links Insect control Consumer electronics brands Smart devices Indoor positioning system American companies established in 2016 Electronics companies established in 2016
https://en.wikipedia.org/wiki/Intel%20Xe
Intel Xe (stylized as Xe and pronounced as two separate letters, abbreviation for "eXascale for everyone"), earlier known unofficially as Gen12, is a GPU architecture developed by Intel. Intel Xe includes a new instruction set architecture. The Xe GPU family consists of a series of microarchitectures, ranging from integrated/low power (Xe-LP), to enthusiast/high performance gaming (Xe-HPG), datacenter/high performance (Xe-HP) and high performance computing (Xe-HPC). History Intel's first attempt at a dedicated graphics card was the Intel740, released in February 1998. The Intel740 was considered unsuccessful due to its performance which was lower than market expectations, causing Intel to cease development on future discrete graphics products. However, its technology lived on in the Intel Extreme Graphics lineup. Intel made another attempt with the Larrabee architecture before canceling it in 2009; this time, the technology developed was used in the Xeon Phi, which was discontinued in 2020. In April 2018, it was reported that Intel was assembling a team to develop discrete graphics processing units, targeting both datacenters, as well as the PC gaming market, and therefore competitive with products from both Nvidia and AMD. Rumors supporting the claim included that the company had vacancies for over 100 graphics-related jobs, and had taken on former Radeon Technologies Group (AMD) leader Raja Koduri in late 2017 – the new product was reported to be codenamed "Arctic Sound". The project was reported to have initially been targeting video streaming chips for data centers, but had its scope expanded to include desktop GPUs. In June 2018, Intel confirmed it planned to launch a discrete GPU in 2020. The first functional discrete "Xe" GPU, codenamed "DG1", was reported as having begun testing in October 2019. According to a report by Hexus in late 2019, a discrete GPU would launch in mid 2020; combined GPU/CPU (GPGPU) products were also expected, for data center an
https://en.wikipedia.org/wiki/Swiss%20National%20Sound%20Archives
The Swiss National Sound Archives are the sound archives of Switzerland, based in Lugano. Its mission is to collect sound recordings related to the history and culture of Switzerland, to make them accessible and to make them available for use. In terms of audio recordings, it thus fulfils a similar function to the Swiss National Library in the field of literature. Since 2016, the National Sound Archives have been an organisational part of the Swiss National Library. The collection has more than 500,000 audio carriers and 20-25,000 audio documents are added each year (as of 2018). The institution is a member of the International Association of Sound and Audiovisual Archives (IASA) and the Audio Engineering Society (AES). The Swiss National Sound Archives is also a member of the Association for Recorded Sound Collections (ARSC) and the International Association of Music Libraries, Archives and Documentation Centres (IAML). History There were 15 years between the idea of a Swiss sound archives and the actual foundation. As early as 1972, Robert Wyler, who was responsible for special collections in the Swiss National Library, suggested that a sound archives should be set up for Switzerland. Hans-Rudolf Dürrenmatt, head of the music department at the Central Library in Solothurn, also called for a sound archives in 1976. The two also held this position in the Phonotheque Commission of the Association of Swiss Librarians and the Swiss Association for Documentation. The 1975 Clottu Report (official title: "Eléments pour une politique culturelle suisse"), named after National Councillor Gaston Clottu, recommended the realisation of a phonotek. In 1980, a working group of the Federal Office of Culture presented a report on the planned Swiss National Sound Archives, which also contained a draft of a deed of foundation. However, an application to the Federal Council from the Federal Department of Home Affairs to this effect was withdrawn due to financial hurdles. In 1982, t
https://en.wikipedia.org/wiki/List%20of%20media%20notable%20for%20being%20in%20development%20hell
This article lists notable examples of media projects, including films, music, and video games, that were or have been in development for at least ten years after their first public announcement before release without being officially cancelled, a state known as "development hell", or, in the software industry, vaporware. Films 1906: A film based on the 2004 historical novel was planned as early as when author James Dalessandro was researching 1906 as a prequel to his novel Bohemian Heart and he made a 38-page outline and six chapters of his novel when he found out the success of Titanic. Warner Bros. Pictures had the script sold despite other companies entering in a bidding war. Due to the big budget, Warner Bros. partnered up with Walt Disney Pictures and Pixar and it would have been the first time Pixar has been involved in a live-action film and the first time Pixar collaborated with a major production company other than Disney with Brad Bird directing though eventually he left the project due to working on Ratatouille. Warner Bros. reserved all sound-studios available on their Burbank lot for production. However, later that spring, Warner Bros. quietly released the reservations while Brad Bird continued rewriting the screenplay in order to lessen the massive scope of the story. In 2011, it was reported by Brad Bird that the film project was still being developed. The issues he raised was his difficulty in narrowing the scope of such a manner as to be true to the story within the constraints of practical film length. In February 2012, it was revealed that a rewrite of Dalessandro's script had been completed by Michael Hirst, and Brad Bird was now rewriting it yet again. In June 2018, Bird mentioned the possibility of adapting the book as a TV series and the earthquake sequence as a live-action film. Akira: Warner Bros. acquired the rights to make a live-action American adaptation of the anime film and its manga of the same name in 2002, and have made a number
https://en.wikipedia.org/wiki/Spin%20echo%20small%20angle%20neutron%20scattering
Spin echo small angle neutron scattering (SESANS) measures structures from around 20 to 2000 nm in size. The information is presented as a real-space (similar to g(r)) as opposed to a reciprocal space (q(r)) mapping. This can simplify the interpretation for some systems. SESANS is useful for studying processes that occur over relatively long time scales, as data collection is often slow, but large length scales. Aggregation of colloids, block copolymer micelles, Stöber silica particles being a prime examples. The technique offers some advantages over SANS but there are fewer SESANS instruments available than SANS instruments. Facilities for SESANS exist at TUDelft (Netherlands) and Rutherford Appleton Laboratory (UK). References Materials science Analytical chemistry Scientific techniques
https://en.wikipedia.org/wiki/Sycamore%20processor
Sycamore is a transmon superconducting quantum processor created by Google's Artificial Intelligence division. It has 53 qubits. In 2019, Sycamore completed a task in 200 seconds that Google claimed, in a Nature paper, would take a state-of-the-art supercomputer 10,000 years to finish. Thus, Google claimed to have achieved quantum supremacy. To estimate the time that would be taken by a classical supercomputer, Google ran portions of the quantum circuit simulation on the Summit, the most powerful classical computer in the world. Later, IBM made a counter-argument, claiming that the task would only take 2.5 days on a classical system like Summit. If Google's claims are upheld, then it would represent an exponential leap in computing power. In August 2020, quantum engineers working for Google reported the largest chemical simulation on a quantum computer – a Hartree–Fock approximation with Sycamore paired with a classical computer that analyzed results to provide new parameters for the 12-qubit system. In April 2021, researchers working with Sycamore reported that they were able to realize the ground state of the toric code, a topologically ordered state, with 31 qubits. They showed long-range entanglement properties of the state by measuring non-zero topological entropy, simulating anyon interferometry and their braiding statistics, and preparing a topological quantum error correcting code with one logical qubit. In July 2021, a collaboration consisting of Google and multiple universities reported the observation of a discrete time crystal on the Sycamore processor. The chip of 20 qubits was used to obtain a many-body localization configuration of up and down spins. The configuration was stimulated with a laser to achieve a periodically driven "Floquet" system where all up spins are flipped for down and vice versa in periodic cycles which are multiples of the laser's cycles. No energy was absorbed from the laser so the system remained in a protected eigenstate or
https://en.wikipedia.org/wiki/Comparison%20of%20OS%20emulation%20or%20virtualization%20apps%20on%20Android
There are many apps in Android that can run or emulate other operating systems, via utilizing hardware support for platform virtualization technologies, or via terminal emulation. Some of these apps support having more than one emulation/virtual file system for different OS profiles, thus the ability to have or run multiple OS's. Some even have support to run the emulation via a localhost SSH connection (letting remote ssh terminal apps on device access the OS emulation/VM, VNC, and XSDL. If more than one of these apps that support these protocols or technologies are available on the android device, via androids ability to do background tasking the main emulator/VM app on android can be used to launch multiple emulation/vm OS, which the other apps can connect to, thus multiple emulated/VM OS's can run at the same time. However, there are a few emulator or VM apps that require that the android device to be rooted for the app to work, and there are others that do not require such. Some remote terminal access apps also have the ability to access Android's internally implemented Toybox, via device loopback support. Some VM/emulator apps have a fixed set of OS's or applications that can be supported. Since Android 8 (Oreo) and latter versions of Android, some of these apps have been reporting issues as Google has heightened the security of file-access permissions on newer versions of Android. Some apps have difficulties or have lost access to SD card. It is also been reported that some of the apps have trouble utilizing packages like udisks2, Open vSwitch, Snort (software), and Mininet, due to new hardware or Android API restrictions on apps that have been put into place in the recent years. Due to this, many of these app developers and their community members are stating that the emulation/VM app can run itself and an OS without being rooted, however not all packages will be able to run unless the device is rooted. OS emulators or VM Android apps The followi
https://en.wikipedia.org/wiki/Halanay%20inequality
Halanay inequality is a comparison theorem for differential equations with delay. This inequality and its generalizations have been applied to analyze the stability of delayed differential equations, and in particular, the stability of industrial processes with dead-time and delayed neural networks. Statement Let be a real number and be a non-negative number. If satisfies where and are constants with , then where and . See also Grönwall's inequality References Control theory Lemmas in analysis Ordinary differential equations
https://en.wikipedia.org/wiki/List%20of%20human%20protein-coding%20genes%201
References Human protein-coding genes 1
https://en.wikipedia.org/wiki/List%20of%20human%20protein-coding%20genes%202
References Human protein-coding genes 2
https://en.wikipedia.org/wiki/Internet%20of%20Military%20Things
The Internet of Military Things (IoMT) is a class of Internet of things for combat operations and warfare. It is a complex network of interconnected entities, or "things", in the military domain that continually communicate with each other to coordinate, learn, and interact with the physical environment to accomplish a broad range of activities in a more efficient and informed manner. The concept of IoMT is largely driven by the idea that future military battles will be dominated by machine intelligence and cyber warfare and will likely take place in urban environments. By creating a miniature ecosystem of smart technology capable of distilling sensory information and autonomously governing multiple tasks at once, the IoMT is conceptually designed to offload much of the physical and mental burden that warfighters encounter in a combat setting. Over time, several different terms have been introduced to describe the use of IoT technology for reconnaissance, environment surveillance, unmanned warfare and other combat purposes. These terms include the Military Internet of Things (MIoT), the Internet of Battle Things, and the Internet of Battlefield Things (IoBT). Overview The Internet of Military Things encompasses a large range of devices that possess intelligent physical sensing, learning, and actuation capabilities through virtual or cyber interfaces that are integrated into systems. These devices include items such as sensors, vehicles, robots, UAVs, human-wearable devices, biometrics, munitions, armor, weapons, and other smart technology. In general, IoMT devices can generally be classified into one of four categories (but the devices are meant to be ubiquitous enough to form a data fabric): Data-carrying device: A device attached to a physical thing that indirectly connects it to the larger communication network. Data-capturing device: A reader/writer device capable of interacting with physical things. Sensing and actuating device: A device that can detect
https://en.wikipedia.org/wiki/Initial%20exchange%20offering
An Initial exchange offering (IEO) is the cryptocurrency exchange equivalent to a stock launch or Initial public offering (IPO). An IEO is the process of digital asset (e.g. coins or tokens) procurement through an established exchange for the purpose of raising capital for start-up companies. Exchanges act as a middleman between investors and the startup, profiting from fees generated by services rendered during the due diligence process and funding phase. IEO's and initial coin offerings (ICO) share similar characteristics with, however, an IEO can be seen as an evolution from the ICO due to legal influence and an increase in financial regulations within the cryptocurrency market. History The first use of an IEO by a major exchange was in January 2019, with the launch of Binance's platform Binance Launchpad. The first use of the platform was with BitTorrent Tokens (BTT) which raised $7.1 million in less than 18 minutes. Since 2019, Binance has launched 63 projects with a total of $133 million raised. Binance's venture into the IEO field further invited more exchanges to offer similar services. Advantages IEO's allow startup companies to participate in large scale fundraising through a trustworthy intermediary who will verify transactions and manage the funds generate during the capital generation process. Unlike in an initial coin offering (ICO) the startup does not need to manage and conduct the fundraising process. The duties are handled by the exchange who can execute transactions, manage currency wallets and the transferring of funds from different blockchains to customer wallets. IEO's allow for companies and startups to raise capital in through the sale of tokens or coin on a cryptocurrency exchange. This reduces investor risk by the due diligence and vetting completed by the exchange. The use of Utility Tokens allow for investors and business to mutual benefit due to the additional access given by holders of a given business utility token. IEO's cr
https://en.wikipedia.org/wiki/Helmut%20Schwichtenberg
Helmut Schwichtenberg (born 5 April 1942 in Żagań) is a German mathematical logician. Schwichtenberg studied mathematics from 1961 at the FU Berlin and from 1964 at the University of Münster, where he received his doctorate in 1968 from Dieter Rödding. He then worked as an assistant and then as a professor in Münster, and since 1978 has been professor of mathematical logic at the Ludwig-Maximilians-Universität Munich (successor of Kurt Schütte). Schwichtenberg deals with, among other things, proof theory, theory of computability, lambda calculus and applications of logic in computer science. He is a member of the Bavarian Academy of Sciences. Selected publications (2nd edition 2000: ) References External links Homepage at Ludwig-Maximilians-Universität Munich German logicians 1942 births University of Münster alumni Living people Free University of Berlin alumni Ludwig Maximilian University of Munich alumni
https://en.wikipedia.org/wiki/Tiversa
Tiversa is an American cybersecurity firm headquartered in Pittsburgh, Pennsylvania. It was founded by a retired chiropractor and real estate entrepreneur named Robert Boback in 2004. The company specialized in trawling the deep web, investigating peer-to-peer networks, and helping businesses counteract data breaches and other cybersecurity risks. Its main product was EagleVision X1, a piece of software that monitored the deep web -- the parts of the Internet that are not easily accessible to general browsers, such as peer-to-peer networks -- for sensitive data. History Before entering the cybersecurity field, Boback was a chiropractor and real estate entrepreneur. He started Tiversa in 2004 as a two-person shop. Tiversa quickly obtained a high-profile board of advisers, including Maynard Webb (former eBay executive and chairman of Yahoo), Howard Schmidt (Obama-era cybersecurity chief), and Wesley Clark (former Supreme Allied Commander of NATO). Marine One hack In 2009, Tiversa claimed to have discovered a major security breach involving then-President Barack Obama's helicopter, Marine One. The breach involved the leak to Iran of sensitive procurement information about the helicopter as well as the helicopter's blueprints. According to Tiversa's CEO, the breach was caused by a defense contractor employee whose daughter downloaded a peer-to-peer file-sharing client onto a disused laptop which contained the sensitive materials. This discovery made national news, but a whistleblower later claimed that the Iranian hack was actually fabricated by Tiversa employees. Boback, the CEO of Tiversa, denied the allegation. LabMD scandal In May 2008, a Tiversa executive contacted LabMD (a urology testing laboratory) claiming to have discovered evidence of a major data breach and offered to sell LabMD monitoring services to counteract the breach. When the head of LabMD declined to purchase the monitoring services, Tiversa allegedly leaked information about the breach to t
https://en.wikipedia.org/wiki/Zen%205
Zen 5 is the codename for an upcoming CPU microarchitecture by AMD, shown on their roadmap in May 2022. It is the successor to Zen 4 and is believed to use TSMC's 4 nm and 3 nm processes. It will power Ryzen 8000 mainstream desktop processors (codenamed "Granite Ridge"), high-end mobile processors (codenamed "Strix Point"), and Epyc 9005 server processors (codenamed "Turin"). Zen 5c Zen 5c is a compact variant of the Zen 5 core, primarily targeted at hyperscale cloud compute server customers. It will succeed the Zen 4c core. References AMD microarchitectures AMD x86 microprocessors X86 microarchitectures
https://en.wikipedia.org/wiki/Orleans%20%28software%20framework%29
Orleans is a cross-platform software framework for building scalable and robust distributed interactive applications based on the .NET Framework or on the more recent .NET. Overview Orleans was originally created by the eXtreme Computing Group at Microsoft Research and introduced the Virtual Actor Model as a new approach to building distributed systems for the cloud. Orleans scales from a single on-premises server to highly-available and globally distributed applications in the cloud. Starting with cloud services for the Halo franchise, the framework has been used by a number of cloud services at Microsoft and other companies since 2011. The core Orleans technology was transferred to 343 Industries and is available as open source since January 2015. The source code is licensed under MIT License and hosted on GitHub. Orleans runs on Microsoft Windows, Linux, and macOS and is compatible with .NET Standard 2.0 and above. Features Some Orleans features include: Persistence Distributed ACID transactions Streams Timers & Reminders Fault tolerance Related implementations The Electronic Arts BioWare division created Project Orbit. It is a Java implementation of virtual actors that was heavily inspired by the Orleans project. See also Distributed computing References Further reading External links GitHub - dotnet/orleans: Orleans is a cross-platform framework for building distributed applications with .NET Orleans - Virtual Actors - Microsoft Research Microsoft Orleans - a worked example - CodeProject .NET software Cloud computing Distributed computing Free and open-source software Free software programmed in C Sharp Microsoft free software Microsoft Research Software using the MIT license 2015 software
https://en.wikipedia.org/wiki/Square%20root%20of%206
The square root of 6 is the positive real number that, when multiplied by itself, gives the natural number 6. It is more precisely called the principal square root of 6, to distinguish it from the negative number with the same property. This number appears in numerous geometric and number-theoretic contexts. It can be denoted in surd form as: and in exponent form as: It is an irrational algebraic number. The first sixty significant digits of its decimal expansion are: . which can be rounded up to 2.45 to within about 99.98% accuracy (about 1 part in 4800); that is, it differs from the correct value by about . It takes two more digits (2.4495) to reduce the error by about half. The approximation (≈ 2.449438...) is nearly ten times better: despite having a denominator of only 89, it differs from the correct value by less than , or less than one part in 47,000. Since 6 is the product of 2 and 3, the square root of 6 is the geometric mean of 2 and 3, and is the product of the square root of 2 and the square root of 3, both of which are irrational algebraic numbers. NASA has published more than a million decimal digits of the square root of six. Rational approximations The square root of 6 can be expressed as the continued fraction The successive partial evaluations of the continued fraction, which are called its convergents, approach : Their numerators are 2, 5, 22, 49, 218, 485, 2158, 4801, 21362, 47525, 211462, …, and their denominators are 1, 2, 9, 20, 89, 198, 881, 1960, 8721, 19402, 86329, …. Each convergent is a best rational approximation of ; in other words, it is closer to than any rational with a smaller denominator. Decimal equivalents improve linearly, at a rate of nearly one digit per convergent: The convergents, expressed as , satisfy alternately the Pell's equations When is approximated with the Babylonian method, starting with and using , the th approximant is equal to the th convergent of the continued fraction: The Babylonian
https://en.wikipedia.org/wiki/Thomas%20H.%20Brylawski
Thomas Henry Brylawski (June 17, 1944 – July 18, 2007) was an American mathematician and professor at the University of North Carolina, Chapel Hill. He worked primarily in matroid theory. Education and career Brylawski was born in 1944, and grew up in Washington, D.C. He attended the Massachusetts Institute of Technology for his undergraduate degree, finishing with a Bachelor of Science in 1966. He then went on to Dartmouth College for his graduate work. He completed his PhD under the direction of Gian-Carlo Rota and Robert Norman in 1970. After his PhD, he moved to the University of North Carolina, Chapel Hill, where he spent the rest of his career. Brylawski was an editor for the Proceedings of the American Mathematical Society from 1977 until 1989. Brylawski wrote 40 mathematical publications, and advised 6 PhD students. He died in 2007 of esophageal cancer at the Duke Hospice inpatient facility in Hillsborough, North Carolina. Work Brylawski's early work used ideas and tools from category theory to understand the Tutte polynomial of a matroid. Indeed, this idea already appeared in his thesis, which made constructions in matroid theory similar to the Grothendieck group. He developed similar ideas in two papers in the Transactions of the American Mathematical Society. Another influential early paper of Brylawski's, published in the same journal, described the influence of a modular element in the lattice of flats on the characteristic polynomial of a matroid. Brylawski also contributed expository chapters to several matroid theory books that appeared in the Encyclopedia of Mathematics and its Applications series published by Cambridge University Press. The Tutte polynomial chapter (written jointly with James Oxley) has around 500 citations. In addition to his work in matroid theory, Brylawski also had an interest in mathematics in art, particularly in the role of symmetry in art. He gave lectures on mathematics in art on two occasions at the National Gal
https://en.wikipedia.org/wiki/Cooper%20Lake%20%28microprocessor%29
Cooper Lake is Intel's codename for the third-generation of their Xeon scalable processors, developed as the successor to Cascade Lake. Cooper Lake processors are targeted at the 4S and 8S segments of the server market; Ice Lake-SP serves the 1S and 2S segment. Features Cooper Lake was launched on June 18, 2020 and features up to 28 cores. Aside from a few microarchitectural changes, Cooper Lake's microarchitecture is mostly identical to Skylake. Cooper Lake features faster memory support (DDR4-3200 over DDR4-2933), support for second-generation Optane memory, and double the UPI links over Cascade Lake. Cooper Lake is the first x86 CPU to support the new bfloat16 instruction set as a part of Intel's Deep Learning Boost. Improvements New bfloat16 instruction Support for up to 12 DIMMs of DDR4 memory per CPU socket Xeon Platinum supports up to eight sockets; Xeon Gold supports up to four sockets; Xeon Silver and Bronze support up to two sockets -H: up to 1.12TB DDR4 per socket -HL: Large DDR memory tier support (up to 4.5TB) List of Cooper Lake processors Xeon Platinum (octa processor) Xeon Gold (quad processor) References Skylake microarchitecture Intel microarchitectures Transactional memory Intel Xeon (Cooper Lake) X86 microarchitectures
https://en.wikipedia.org/wiki/Undercut%20%28turning%29
In turning, an undercut is a recess in a diameter generally on the inside diameter of the part. On turned parts an undercut is also known as a neck or "relief groove". They are often used at the end of the threaded portion of a shaft or screw to provide clearance for the cutting tool, and also referred to as thread relief in this context. A rule of thumb is that the undercut should be at least 1.5 threads long and the diameter should be at least smaller than the minor diameter of the thread. Strictly speaking the relief simply needs to be equal or slightly smaller than the minor diameter of the thread. Thread relief can also be internal on a bore, and then the relief needs to be larger than the major thread diameter. They are also often used on shafts that have diameter changes so that a mating part can seat against the shoulder. If an undercut is not provided there is always a small radius left behind even if a sharp corner is intended. These types of undercuts are called out on technical drawings by saying the width and either the depth or the diameter of the bottom of the neck. References Bibliography . Mechanical engineering
https://en.wikipedia.org/wiki/Gawri%20Wall
The Gawri Wall (, Persian: دیوار گَوری) was a defensive fortification built and in use between the 4th and 6th centuries during the rule of the Sasanians and Parthians. The structure's ruins, which run the length of around , are located in Sarpol-e Zahab County near the Iran–Iraq border. 2019 archaeological discovery Though the site was known to the local population living in its vicinity, it was unknown to the archaeological community until its discovery was published in the journal Antiquity in August 2019. Locals have long referred to the fortification as the Gawri Wall. See also Great Wall of Gorgan Wall of Tammisha Khurasan Wall Sasanian defense lines References Border barriers Fortification lines Walls 2nd-century fortifications Sasanian defense lines Military history of the Sasanian Empire Gawri Walls in Iran Military history of the Parthian Empire Fortifications in Iran
https://en.wikipedia.org/wiki/Everykey
Everykey designs and builds a patented universal smart key that can unlock devices and log into online accounts on those devices. The idea began as an entrepreneurship class project at Case Western Reserve University. Crowdfunding Campaign Everykey launched its Kickstarter campaign on October 29, 2014. Within 48 hours, the campaign had reached trending status and raised over $25,000 in pre-orders. The project quickly gained attention, and Everykey launched another crowdfunding campaign on Indiegogo with John McAfee on December 7, 2015. While some media outlets such as Wired and TechCrunch were excited about the traction, they also expressed concern over the security versus convenience factor of the product. Writers at Business Insider focused more on the vision of the company, exploring Everykey’s future plans and classroom origin story. Products The company's debut product was an electronic wristband designed to replace keys and passwords. Development of the prototype into a working product was funded by a Kickstarter campaign. The current product, resembling a USB thumb drive that can be inserted into a wristband accessory, was funded by an Indiegogo crowdfunding campaign. The software enables Everykey to work with a variety of computer and mobile platforms. Everykey currently offers the hardware thumb-drive style product as well as a Key Ring Accessory, Band Accessory, Charging Cable, and Bluetooth Dongle. Technology Everykey is a Bluetooth device that can communicate securely with an unlimited number of other Bluetooth devices, simultaneously. The Everykey device employs a patented method including AES and RSA encryption to allow the user to unlock their devices and login to online accounts without having to type passwords. When the user leaves with Everykey, the app can lock everything back down and log out of online accounts. Everykey’s patented method allows it to perform unlocking and locking actions without plugging in the device. Reception Many were s
https://en.wikipedia.org/wiki/OS%20virtualization%20and%20emulation%20on%20Android
Android devices have the ability to run virtual machines or emulate other operating systems. It does this either via desktop virtualization, platform virtualization, or emulation via compatibility layer. Desktop virtualization Desktop virtualization apps are the least resource and space intensive compared to other virtualization types, since the Operating System that is being displayed on the Android device is actually located on another computer on the local network or elsewhere like on the internet. Depending upon how the desktop virtualization app works, they use RDP or can use another protocol of their own. Most business oriented desktop virtualization apps require specific types of equipment or services in order for the app to fully function. For example, VMware Horizon Client requires specific VMware equipment for the app to work. A major downside that desktop virtualization apps have compared to other types of virtualization or emulation technologies is that they require a network connection to the server as stated previously above. Platform virtualization Platform virtualization allows more leverage to the developer as anything that relates to the guest operating system only affects the guest operating system, and not the host operating system. Due to this it is possible for the guest operating system to be rooted, where as the host operating system remains unrooted. Due to the nature of platform virtualization and the fact that it can virtualize a rooted guest OS, it has a greater advantage over emulators as it can run applications or utilize packages that require access to the underlying system itself. As with all platform virtualization software and applications, they take up a lot of resources of the host in order to do the virtualization. Emulation Types of emulations Emulation of other operating systems Emulation of other operating systems on Android require the usage of some form of compatibility layer, where the compatibilit
https://en.wikipedia.org/wiki/Louis%20Schwabe
Louis Schwabe (1798-1845) was a manufacturer of silk and artificial silk fabrics in Manchester. He was noted for his pioneering work in the use of spinnerets for the production of an artificial glass based yarn. References Textile engineering Textile workers People of the Industrial Revolution 1798 births 1845 deaths
https://en.wikipedia.org/wiki/Electronics%20prototyping
In electronics, prototyping means building an actual circuit to a theoretical design to verify that it works, and to provide a physical platform for debugging it if it does not. The prototype is often constructed using techniques such as wire wrapping or using a breadboard, stripboard or perfboard, with the result being a circuit that is electrically identical to the design but not physically identical to the final product. Open-source tools like Fritzing exist to document electronic prototypes (especially the breadboard-based ones) and move toward physical production. Prototyping platforms such as Arduino also simplify the task of programming and interacting with a microcontroller. The developer can choose to deploy their invention as-is using the prototyping platform, or replace it with only the microcontroller chip and the circuitry that is relevant to their product. A technician can quickly build a prototype (and make additions and modifications) using these techniques, but for volume production it is much faster and usually cheaper to mass-produce custom printed circuit boards than to produce these other kinds of prototype boards. The proliferation of quick-turn PCB fabrication and assembly companies has enabled the concepts of rapid prototyping to be applied to electronic circuit design. It is now possible, even with the smallest passive components and largest fine-pitch packages, to have boards fabricated, assembled, and even tested in a matter of days. Boards Breadboard Perfboard Stripboard References P Prototypes
https://en.wikipedia.org/wiki/Multi-agent%20reinforcement%20learning
Multi-agent reinforcement learning (MARL) is a sub-field of reinforcement learning. It focuses on studying the behavior of multiple learning agents that coexist in a shared environment. Each agent is motivated by its own rewards, and does actions to advance its own interests; in some environments these interests are opposed to the interests of other agents, resulting in complex group dynamics. Multi-agent reinforcement learning is closely related to game theory and especially repeated games, as well as multi-agent systems. Its study combines the pursuit of finding ideal algorithms that maximize rewards with a more sociological set of concepts. While research in single-agent reinforcement learning is concerned with finding the algorithm that gets the biggest number of points for one agent, research in multi-agent reinforcement learning evaluates and quantifies social metrics, such as cooperation, reciprocity, equity, social influence, language and discrimination. Definition Similarly to single-agent reinforcement learning, multi-agent reinforcement learning is modeled as some form of a Markov decision process (MDP). For example, A set of environment states. One set of actions for each of the agents . is the probability of transition (at time ) from state to state under joint action . is the immediate joint reward after the transition from to with joint action . In settings with perfect information, such as the games of chess and Go, the MDP would be fully observable. In settings with imperfect information, especially in real-world applications like self-driving cars, each agent would access an observation that only has part of the information about the current state. In the partially observable setting, the core model is the partially observable stochastic game in the general case, and the decentralized POMDP in the cooperative case. Cooperation vs. competition When multiple agents are acting in a shared environment their interests might be alig
https://en.wikipedia.org/wiki/Electronic%20badge
An electronic badge (or electronic conference badge) is a gadget that is a replacement for a traditional paper-based badge or pass issued at public events. It is mainly handed out at computer (security) conferences and hacker events. Their main feature is to display the name of the attendee, but due to their electronic nature they can include a variety of software. The badges were originally a tradition at DEF CON, but spread across different events. Examples Hardware SHA2017 badge, which included an e-ink screen and an ESP32 Card10 for CCCamp2019 Electromagnetic Field Camp badge Software The organization badge.team has developed a platform called "Hatchery" to publish and develop software for several badges. References Computer hardware Hacker culture
https://en.wikipedia.org/wiki/Serre%27s%20inequality%20on%20height
In algebra, specifically in the theory of commutative rings, Serre's inequality on height states: given a (Noetherian) regular ring A and a pair of prime ideals in it, for each prime ideal that is a minimal prime ideal over the sum , the following inequality on heights holds: Without the assumption on regularity, the inequality can fail; see scheme-theoretic intersection#Proper intersection. Sketch of Proof Serre gives the following proof of the inequality, based on the validity of Serre's multiplicity conjectures for formal power series ring over a complete discrete valuation ring. By replacing by the localization at , we assume is a local ring. Then the inequality is equivalent to the following inequality: for finite -modules such that has finite length, where = the dimension of the support of and similar for . To show the above inequality, we can assume is complete. Then by Cohen's structure theorem, we can write where is a formal power series ring over a complete discrete valuation ring and is a nonzero element in . Now, an argument with the Tor spectral sequence shows that . Then one of Serre's conjectures says , which in turn gives the asserted inequality. References Commutative algebra
https://en.wikipedia.org/wiki/Inverse%20depth%20parametrization
In computer vision, the inverse depth parametrization is a parametrization used in methods for 3D reconstruction from multiple images such as simultaneous localization and mapping (SLAM). Given a point in 3D space observed by a monocular pinhole camera from multiple views, the inverse depth parametrization of the point's position is a 6D vector that encodes the optical centre of the camera when in first observed the point, and the position of the point along the ray passing through and . Inverse depth parametrization generally improves numerical stability and allows to represent points with zero parallax. Moreover, the error associated to the observation of the point's position can be modelled with a Gaussian distribution when expressed in inverse depth. This is an important property required to apply methods, such as Kalman filters, that assume normality of the measurement error distribution. The major drawback is the larger memory consumption, since the dimensionality of the point's representation is doubled. Definition Given 3D point with world coordinates in a reference frame , observed from different views, the inverse depth parametrization of is given by: where the first five components encode the camera pose in the first observation of the point, being the optical centre, the azimuth, the elevation angle, and the inverse depth of at the first observation. References Bibliography Computer vision
https://en.wikipedia.org/wiki/Distributive%20polytope
In the geometry of convex polytopes, a distributive polytope is a convex polytope for which coordinatewise minima and maxima of pairs of points remain within the polytope. For example, this property is true of the unit cube, so the unit cube is a distributive polytope. It is called a distributive polytope because the coordinatewise minimum and coordinatewise maximum operations form the meet and join operations of a continuous distributive lattice on the points of the polytope. Every face of a distributive polytope is itself a distributive polytope. The distributive polytopes all of whose vertex coordinates are 0 or 1 are exactly the order polytopes. See also Stable matching polytope, a convex polytope that defines a distributive lattice on its points in a different way References Order theory Polytopes
https://en.wikipedia.org/wiki/Order%20polytope
In mathematics, the order polytope of a finite partially ordered set is a convex polytope defined from the set. The points of the order polytope are the monotonic functions from the given set to the unit interval, its vertices correspond to the upper sets of the partial order, and its dimension is the number of elements in the partial order. The order polytope is a distributive polytope, meaning that coordinatewise minima and maxima of pairs of its points remain within the polytope. The order polytope of a partial order should be distinguished from the linear ordering polytope, a polytope defined from a number as the convex hull of indicator vectors of the sets of edges of -vertex transitive tournaments. Definition and example A partially ordered set is a pair where is an arbitrary set and is a binary relation on pairs of elements of that is reflexive (for all , ), antisymmetric (for all with at most one of and can be true), and transitive (for all , if and then ). A partially ordered set is said to be finite when is a finite set. In this case, the collection of all functions that map to the real numbers forms a finite-dimensional vector space, with pointwise addition of functions as the vector sum operation. The dimension of the space is just the number of elements of . The order polytope is defined to be the subset of this space consisting of functions with the following two properties: For every , . That is, maps the elements of to the unit interval. For every with , . That is, is a monotonic function For example, for a partially ordered set consisting of two elements and , with in the partial order, the functions from these points to real numbers can be identified with points in the Cartesian plane. For this example, the order polytope consists of all points in the -plane with . This is an isosceles right triangle with vertices at (0,0), (0,1), and (1,1). Vertices and facets The vertices of the order polytope consist of monotonic f
https://en.wikipedia.org/wiki/Soft%20Growing%20Robotics
Soft Growing Robotics is a subset of soft robotics concerned with designing and building robots that use robot body expansion to move and interact with the environment. Soft growing robots are built from compliant materials and attempt to mimic how vines, plant shoots, and other organisms reach new locations through growth. While other forms of robots use locomotion to achieve their objectives, soft growing robots elongate their body through addition of new material, or expansion of material. This gives them the ability to travel through constricted areas and form a wide range of useful 3-D formations. Currently there are two main soft growing robot designs: additive manufacturing and tip extension. Some goals of soft growing robotics development are the creation of robots that can explore constricted areas and improve surgical procedures. Additive manufacturing design One way of extending the robot body is through additive manufacturing. Additive manufacturing generally refers to 3-D printing, or the fabrication of three dimensional objects through the conjoining of many layers of material. Additive manufacturing design of a soft growing robot utilizes a modified 3-D printer at the tip of the robot to deposit thermoplastics (material that is rigid when cooled and flexible when heated) to extend the robot in the desired orientation. Design characteristics The body of the robot consists of: A base, where the power supply, circuit board, and spool of thermoplastic filament is stored. The tubular body of varying length created by additive manufacturing which extends outwards from the base. The tip where new material is deposited to lengthen the tubular body, and house sensors. The additive manufacturing process involves polylactic acid filament (a thermoplastic) being pulled through the tubular body of the robot by a motor in the tip. At the tip, the filament passes through a heating element, making it pliable. The filament is then turned perpendicular to the
https://en.wikipedia.org/wiki/Fantasy%20Strike
Fantasy Strike is a free-to-play fighting video game developed and published by Sirlin Games. It revolves around one-on-one battles that require fast reflexes. The game was released on July 25, 2019 for Linux, macOS, Microsoft Windows, Nintendo Switch, PlayStation 4. Gameplay Fantasy Strike is designed to reduce unnecessary complexity compared to traditional fighting games, having dedicated buttons for every action, including melee, jump/throw, special moves, and a super move. Each player picks a character to play, which are then placed in an arena. By performing various attacks unique to the character, each player tries to bring down their opponents health pool down to zero to win a round. Whoever is the first to win four out of seven rounds is given the match win. In addition to attacks, players can use blocking to defend against attacks and break through blocks by using throws. A unique feature to Fantasy Strike is the "Yomi Counter", which can be performed when not attacking by pressing no buttons at all. When yomi countering, if the character is hit by an opponent's throw, they won't get hit and instead perform a counter throw, turning the tables. The game features various modes. Single-player pits the player in matches against AI controlled opponents, with different modes putting a different spin on the formula. Arcade adds some story through artwork and dialog, as well as stronger version of the character Midori who serves as the final challenge, Survival provides a stream of progressively stronger opponents. Daily Challenge is similar to Survival, but can only be played once per day and compares the score between the players. Single Match allows a selection of any opponent and difficulty for a standard match. Boss Rush, which was added afterwards for the full release, allows the player to pick up and use power-ups, but introduces special opponents that also possess power-ups and get stronger after each battle. Multiplayer allows player-against-player mat
https://en.wikipedia.org/wiki/Inverse%20consistency
In image registration, inverse consistency measures the consistency of mappings between images produced by a registration algorithm. The inverse consistency error, introduced by Christiansen and Johnson in 2001, quantifies the distance between the composition of the mappings from each image to the other, produced by the registration procedure, and the identity function, and is used as a regularisation constraint in the loss function of many registration algorithms to enforce consistent mappings. Inverse consistency is necessary for good image registration but it is not sufficient, since a mapping can be perfectly consistent but not register the images at all. Definition Image registration is the process of establishing a common coordinate system between two images, and given two images registering a source image to a target image consists of determining a transformation that maps points from the target space to the source space. An ideal registration algorithm should not be sensitive to which image in the pair is used as source or target, and the registration operator should be antisymmetric such that the mappings produced when registering to and to respectively should be the inverse of each other, i.e. and or, equivalently, and , where denotes the function composition operator. Real algorithms are not perfect, and when swapping the role of source and target image in a registration problem the so obtained transformations are not the inverse of each other. Inverse consistency can be enforced by adding to the loss function of the registration a symmetric regularisation term that penalises inconsistent transformations Inverse consistency can be used as a quality metric to evaluate image registration results. The inverse consistency error () measures the distance between the composition of the two transforms and the identity function, and it can be formulated in terms of both average () or maximum () over a region of interest of the image: While inve
https://en.wikipedia.org/wiki/Ratl
A ratl (رطل ) is a medieval Middle Eastern unit of measurement found in several historic recipes. The term was used to measure both liquid and weight (around a pound and a pint in 10th century Baghdad, but anywhere from 8 ounces to 8 pounds depending on the time period and region). While there were a variety of names for different shapes of cups and mugs in use at the time, the ratl seems to have had a position roughly equivalent to a British pint in that the name of the drinking-vessel also implied a standardized measurement as opposed to merely the object's shape, in both 10th century Baghdad and 13th century Andalusia. However, those standardized measures varied both by region and by purpose: the spice-measuring ratl, the flax-measuring ratl, the oil-measuring ratl, and the quicksilver-measuring ratl all differed from each other. The ratl was a part of a sequence of measurements ranging from a grain of barley through the dirham (used as a common point of reference in both medieval European and Middle Eastern regions) on up to the Sa (Islamic measure). measurement 1 Mudd=8/6 ratl. 1 Sá =4 mudd=5+1/3 ratl. 1 Ratl =128+4/7 dirham or 128 dirham or 130 dirham. 1 Uqiyyah=40 dirham. 1 Nashsh=20 dirham. 7 mithqal =10 dirham. 1 mithqal=72 grains of average barely both edges cutted. 1 mithqal=20 qirat قِيراط of makkah=21+3/7 qirat of Damascus. 1 dirham=14 qirat of makkah=15 qirat of Damascus. 1 mil= 4000 zira. 1 wasq=60 sá. In al-Warraq's tenth-century cookbook, different regions used some of the same terms to mean different units of measurement and the relationships between them. Some of those relationships are described below. References Customary units of measurement Units of measurement Cooking weights and measures
https://en.wikipedia.org/wiki/S-Methylcysteine
S-Methylcysteine is the amino acid with the nominal formula CH3SCH2CH(NH2)CO2H. It is the S-methylated derivative of cysteine. This amino acid occurs widely in plants, including many edible vegetables. Biosynthesis The amino acid is not genetically coded, but it arises by post-translational methylation of cysteine. One pathway involves methyl transfer from alkylated DNA by zinc-cysteinate-containing repair enzymes. Beyond its biological context, it has been examined as a chelating agent. References Biochemistry Sulfur amino acids Thioethers Alpha-Amino acids Amino acid derivatives
https://en.wikipedia.org/wiki/Substrate%20presentation
Substrate presentation is a biological process that activates a protein. The protein is sequestered away from its substrate and then activated by release and exposure of the protein to its substrate. A substrate is typically the substance on which an enzyme acts but can also be a protein surface to which a ligand binds. The substrate is the material acted upon. In the case of an interaction with an enzyme, the protein or organic substrate typically changes chemical form. Substrate presentation differs from allosteric regulation in that the enzyme need not change its conformation to begin catalysis. Substrate presentation is best described for nanoscopic distances (<100 nm). Examples Amyloid Precursor Protein Amyloid precursor protein (APP) is cleaved by beta and gamma secretase to yield a 40-42 amino acid peptide responsible for beta amyloid plaques associated with Alzheimer's disease. The enzymes are regulated by substrate presentation. The substrate APP is palmitoylated and moves in and out of GM1 lipid rafts in response to astrocyte cholesterol. Cholesterol delivered by apolipoprotein E (ApoE) drives APP to associate with GM1 lipid rafts. When cholesterol is low, the protein traffics to the disordered region and is cleaved by alpha secretase to produce a non-amylogenic product. The enzymes do not appear to respond to cholesterol, only the substrate moves. Hydrophobicity drives the partitioning of molecules. In the cell, this gives rise to compartmentalization within the cell and within cell membranes. For lipid rafts, palmitoylation regulates raft affinity for the majority of integral raft proteins. Raft regulation is regulated by cholesterol signaling. Phospholipase D2 (PLD2) is a well-defined example of an enzyme activated by substrate presentation. The enzyme is palmitoylated causing the enzyme to traffic to GM1 lipid domains or "lipid rafts". The substrate of phospholipase D is phosphatidylcholine (PC) which is unsaturated and is of low abundance in li