source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Cossaviricota | Cossaviricota is a phylum of viruses.
Classes
The following classes are recognized:
Mouviricetes
Papovaviricetes
Quintoviricetes
References
Viruses |
https://en.wikipedia.org/wiki/Papovaviricetes | Papovaviricetes is a class of viruses. The class shares the name of an abolished family, Papovaviridae, which was split in 1999 into the two families Papillomaviridae and Polyomaviridae. The class was established in 2019 and takes its name from the former family.
Orders
The following orders are recognized:
Sepolyvirales
Zurhausenvirales
See also
Bandicoot papillomatosis carcinomatosis virus
References
Viruses |
https://en.wikipedia.org/wiki/Cressdnaviricota | Cressdnaviricota is a phylum of viruses with small, circular single-stranded DNA genomes and encoding rolling circle replication-initiation proteins with the N-terminal HUH endonuclease and C-terminal superfamily 3 helicase domains. While the replication-associated proteins are homologous among viruses within the phylum, the capsid proteins are very diverse and have presumably been acquired from RNA viruses on multiple independent occasions. Nevertheless, all cressdnaviruses for which structural information is available appear to contain the jelly-roll fold.
Taxonomy
The following classes are recognized:
Arfiviricetes
Repensiviricetes
References
Viruses
Single-stranded DNA viruses |
https://en.wikipedia.org/wiki/Pimascovirales | Pimascovirales is an order of viruses. The term is a portmanteau of a portmanteau of pitho-, irido-, marseille-, and ascoviruses.
Families
The following families are recognized:
Ascoviridae
Iridoviridae
Marseilleviridae
References
Viruses |
https://en.wikipedia.org/wiki/Pokkesviricetes | Pokkesviricetes is a class of viruses.
Orders
The following orders are recognized:
Asfuvirales
Chitovirales
References
Viruses |
https://en.wikipedia.org/wiki/Preplasmiviricota | Preplasmiviricota is a phylum of viruses.
Taxonomy
The phylum contains the following classes:
Ainoaviricetes
Maveriviricetes
Polintoviricetes
Tectiliviricetes
References
Viruses |
https://en.wikipedia.org/wiki/Revtraviricetes | Revtraviricetes is a class of viruses that contains all viruses that encode a reverse transcriptase. The group includes all ssRNA-RT viruses (including the retroviruses) and dsDNA-RT viruses. It is the sole class in the phylum Artverviricota, which is the sole phylum in the kingdom Pararnavirae. The name of the group is a portmanteau of "reverse transcriptase" and -viricetes which is the suffix for a virus class.
Orders
The following orders are recognized:
Blubervirales (e.g. hepatitis B virus)
Ortervirales (retroviruses, Caulimoviridae and various LTR retrotransposons)
References
Viruses
Virus classes |
https://en.wikipedia.org/wiki/Duplornaviricota | Duplornaviricota is a phylum of RNA viruses, which contains all double-stranded RNA viruses, except for those in phylum Pisuviricota. Characteristic of the group is a viral capsid composed of 60 homo- or heterodimers of capsid protein on a pseudo-T=2 lattice. Duplornaviruses infect both prokaryotes and eukaryotes. The name of the group derives from Italian duplo which means double (a reference to double-stranded), rna for the type of virus, and -viricota which is the suffix for a virus phylum.
Classes
The following classes are recognized:
Chrymotiviricetes
Resentoviricetes
Vidaverviricetes
References
Viruses |
https://en.wikipedia.org/wiki/Ghabrivirales | Ghabrivirales is an order of double-stranded RNA viruses. It is the only order in the class Chrysmotiviricetes. The name of the class is a portmanteau of member families: chrysoviridae, megabirnaviridae, and totiviridae; and -viricetes which is the suffix for a virus class. The name of the order derives from Said Ghabrial, a pioneering researcher who studied viruses in this order, and -virales which is the suffix for a virus order.
Taxonomy
The following families are recognized:
Chrysoviridae
Megabirnaviridae
Quadriviridae
Totiviridae
References
Viruses |
https://en.wikipedia.org/wiki/Kitrinoviricota | Kitrinoviricota is a phylum of RNA viruses that includes all positive-strand RNA viruses that infect eukaryotes and are not members of the phylum Pisuviricota or Lenarviricota. The name of the group derives from Greek κίτρινος (kítrinos), which means yellow (a reference to yellow fever virus), and -viricota, which is the suffix for a virus phylum.
Classes
The following classes are recognized:
Alsuviricetes
Flasuviricetes
Magsaviricetes
Tolucaviricetes
References
Viruses |
https://en.wikipedia.org/wiki/Alsuviricetes | Alsuviricetes is a class of positive-strand RNA viruses which infect eukaryotes. The name of the group is a syllabic abbreviation of "alpha supergroup" with the suffix -viricetes indicating a virus class.
Taxonomy
The following orders are recognized:
Hepelivirales
Martellivirales
Tymovirales
References
Tymovirales
Viruses |
https://en.wikipedia.org/wiki/Hepelivirales | Hepelivirales is an order of viruses.
Taxonomy
The following families are recognized:
Alphatetraviridae
Benyviridae
Hepeviridae
Matonaviridae
References
Viruses |
https://en.wikipedia.org/wiki/Martellivirales | Martellivirales is an order of viruses.
Taxonomy
The following families are recognized:
Bromoviridae
Closteroviridae
Endornaviridae
Kitaviridae
Mayoviridae
Togaviridae
Virgaviridae
References
Viruses |
https://en.wikipedia.org/wiki/Nodamuvirales | Nodamuvirales is an order of positive-strand RNA viruses which infect eukaryotes. The name of the group is a contraction of "Nodamura virus" and -virales which is the suffix for a virus order.
Taxonomy
The following families are recognized:
Nodaviridae
Sinhaliviridae
References
Viruses |
https://en.wikipedia.org/wiki/Tolivirales | Tolivirales is an order of RNA viruses which infect insects and plants. Member viruses have a positive-sense single-stranded RNA genome. The virions are non-enveloped, spherical, and have an icosahedral capsid. The name of the group is a syllabic abbreviation of "tombusvirus-like" with the suffix -virales indicating a virus order.
Taxonomy
The following families are recognized:
Carmotetraviridae
Tombusviridae
References
Viruses |
https://en.wikipedia.org/wiki/Lenarviricota | Lenarviricota is a phylum of RNA viruses that includes all positive-strand RNA viruses that infect prokaryotes. Some members also infect eukaryotes. Most of these viruses do not have capsids, except for the genus Ourmiavirus. The name of the group is a syllabic abbreviation of the names of founding member families "Leviviridae and Narnaviridae" with the suffix -viricota, denoting a virus phylum.
Phylogenetics
Lenarviricota is the first branch of RNA viruses to emerge, since they are the most basal branch. Most of its members, the leviviruses (class Leviviricetes), only infect prokaryotes, and their known level of diversity has grown dramatically in recent years, which suggests that the RNA viruses may be more widespread in prokaryotes than previously believed.
It has been suggested that the origin of Lenarviricota may predate that of the last universal common ancestor (LUCA). Lenarviricota viruses appear to have arisen from a primordial RdRP of the RNA-protein world that gave rise to leviviruses (class Leviviricetes). It has also been suggested that the retroelements of cellular life (group II introns and retrotransposons) evolved from a shared ancestor with Lenarviricota.
The eukaryotic RNA viruses without capsids, Mitoviridae, Narnaviridae and Botourmiaviridae, arose from the leviviruses with the loss of the capsid during the time that eukaryogenesis occurred, when the bacterial endosymbiont became the mitochondria. The genus Ourmiavirus arose by recombination between a non-capsid botourmiavirus and a virus from the family Tombusviridae, which inherited its capsid proteins.
Taxonomy
The following classes are recognized:
Amabiliviricetes
Howeltoviricetes
Leviviricetes
Miaviricetes
References
Viruses |
https://en.wikipedia.org/wiki/Botourmiaviridae | Botourmiaviridae is a family of positive-strand RNA viruses which infect plants and fungi. The family includes four genera: Ourmiavirus, Botoulivirus, Magoulivirus and Scleroulivirus. Members of genus Ourmiavirus infect plants and the other genera infect fungi. The member viruses have genomes which range from 2900 to 4800 nucleotides.
Structure
Ourmiaviruses are the only members of the family that have a viral structure. The other members are naked and have no viral envelope or capsid. Ourmiaviruses are plant viruses that have a bacilliform virion composed of a single capsid protein. The virions have a series of discrete lengths from 30 to 62 nm.
Genome
Members of the family Botourmiaviridae have positive-sense, single-stranded RNA genomes. Contrary to the hosts they infect (plants and fungus), their genome is concise and has few redundancies. The genome of the genus Ourmiavirus has three segments that encode the capside protein (CP), movement protein (MP), and RNA-dependent RNA polymerase (RdRp). The length of the genome is around 4800 nucleotides. The genomes of the other three genera of the family are nonsegmented and have lengths which range from 2000 to 3200 nucleotides. The genomes of these fungal viruses only encode an RNA-dependent RNA polymerase and have no structural proteins.
Taxonomy
The family has six genera:
Botoulivirus
Magoulivirus
Ourmiavirus
Penoulivirus
Rhizoulivirus
Scleroulivirus
References
Viruses
Virus families |
https://en.wikipedia.org/wiki/Pisuviricota | Pisuviricota is a phylum of RNA viruses that includes all positive-strand and double-stranded RNA viruses that infect eukaryotes and are not members of the phylum Kitrinoviricota, Lenarviricota or Duplornaviricota. The name of the group is a syllabic abbreviation of “picornavirus supergroup” with the suffix -viricota, indicating a virus phylum. Phylogenetic analyses suggest that Birnaviridae and Permutotetraviridae, both currently unassigned to a phylum in Orthornavirae, also belong to this phylum and that both are sister groups. Another proposed family of the phylum is unassigned Polymycoviridae in Riboviria.
Classes
The following classes are recognized:
Duplopiviricetes
Pisoniviricetes
Stelpaviricetes
References
Viruses |
https://en.wikipedia.org/wiki/Durnavirales | Durnavirales is an order of double-stranded RNA viruses which infect eukaryotes. The name of the group derives from Italian duplo which means double (a reference to double-stranded), rna for the type of virus, and -virales which is the suffix for a virus order.
Families
The following families are recognized:
Amalgaviridae
Curvulaviridae
Hypoviridae
Partitiviridae
Picobirnaviridae
References
Viruses |
https://en.wikipedia.org/wiki/Pisoniviricetes | Pisoniviricetes is a class of positive-strand RNA viruses which infect eukaryotes. A characteristic of the group is a conserved 3C-like protease from the PA clan of proteases for processing the translated polyprotein. The name of the group is a portmanteau of member orders "picornavirales, sobelivirales, nidovirales" and -viricetes which is the suffix for a virus class.
Orders
The following orders are recognized:
Nidovirales
Picornavirales
Sobelivirales
References
Viruses |
https://en.wikipedia.org/wiki/Sobelivirales | Sobelivirales is an order of RNA viruses which infect eukaryotes. Member viruses have a positive-sense single-stranded RNA genome. The name of the group is a portmanteau of member orders "sobemovirus-like" and -virales which is the suffix for a virus order.
Taxonomy
The following families are recognized:
Alvernaviridae
Barnaviridae
Solemoviridae
References
Viruses |
https://en.wikipedia.org/wiki/Stelpaviricetes | Stelpaviricetes is a class of non-enveloped, positive-strand RNA viruses which infect plants and animals. Characteristic of the group is a VPg protein attached to the 5'-end of the genome and a conserved 3C-like protease from the PA clan of proteases for processing the translated polyprotein. The name of the group is a syllabic abbreviation of member orders "stellavirales, patatavirales" with the suffix -viricetes denoting a virus class.
Orders
The following orders are recognized:
Patatavirales
Stellavirales
References
Viruses |
https://en.wikipedia.org/wiki/The%20Tower%20of%20Hanoi%20%E2%80%93%20Myths%20and%20Maths | The Tower of Hanoi – Myths and Maths is a book in recreational mathematics, on the tower of Hanoi, baguenaudier, and related puzzles. It was written by Andreas M. Hinz, Sandi Klavžar, Uroš Milutinović, and Ciril Petr, and published in 2013 by Birkhäuser, with an expanded second edition in 2018. The Basic Library List Committee of the Mathematical Association of America has suggested its inclusion in undergraduate mathematics libraries.
Topics
Although this book is in recreational mathematics, it takes its subject seriously, and brings in material from automata theory, computational complexity, the design and analysis of algorithms, graph theory, and group theory, topology, fractal geometry, chemical graph theory, and even psychology (where related puzzles have applications in psychological testing).
The 1st edition of the book had 10 chapters, and the 2nd edition has 11. In both cases they begin with chapter zero, on the background and history of the Tower of Hanoi puzzle, covering its real-world invention by Édouard Lucas and in the mythical backstory he invented for it. Chapter one considers the Baguenaudier puzzle (or, as it is often called, the Chinese rings), related to the tower of Hanoi both in the structure of its state space and in the fact that it takes an exponential number of moves to solve, and likely the inspiration for Lucas. Chapter two introduces the main topic of the book, the tower of Hanoi, in its classical form in which one must move disks one-by-one between three towers, always keeping the disks on each tower sorted by size. It provides several different algorithms for solving the classical puzzle (in which the disks begin and end all on a single tower) in as few moves as possible, and for collecting all disks on a single tower when they begin in other configurations, again as quickly as possible. It introduces the Hanoi graphs describing the state space of the puzzle, and relates numbers of puzzle steps to distances within this graph. After |
https://en.wikipedia.org/wiki/Cecil%20Shadbolt | Cecil Victor Shadbolt (1859 – 8 July 1892) was a British photographer, who pioneered aerial photography from flying balloons.
Life
Shadbolt was born in 1859, the son of the mahogany dealer and photographer George Shadbolt.
He showed photographs of Welsh landscapes at the 1877 Photographic Society exhibition.
His first balloon ascent was in May 1882, at Alexandra Palace. He made his own device for attaching a camera to the basket below a balloon, allowing him to take pictures looking directly downwards. One of his images, taken from over Stamford Hill, is the earliest extant aerial photograph taken in the British Isles. A print of the same image, An Instantaneous Map Photograph taken from the Car of a Balloon, 2,000 feet high, was shown at the 1882 Photographic Society exhibition.
Shadbolt gave public lectures, using magic lantern slides, with the title Balloons and Ballooning, Upward and Onwards.
He was secretary of the West Kent Sunday School Union from 1886.
Death
On 29 June 1892, he took a flight in a gas balloon owned by (or which he co-owned with; sources vary) his friend 'Captain' William D. Dale, at Crystal Palace. The balloon ripped during the initial ascent, at around , and though those aboard dropped ballast, the basket crashed to the ground, immediately killing Dale. Shadbolt and the other passengers were taken to Norwood Cottage Hospital, but Shadbolt died on 8 July, aged 33. He was buried, alongside members of his family, in grave 1,932, square 113, at West Norwood Cemetery. His father was later buried in the adjacent plot.
An inquest at the hospital, on 12 July 1892, under coroner, Mr Jackson, returned verdicts of accidental death.
Shadbolt Collection
The Shadbolt Collection of 76 glass lantern slides taken between 1882 and 1892 is held by Historic England, The slides were found at a car boot sale and subsequently purchased at auction by Historic England in 2015.
Publications
– includes 24 photogravures by Shadbolt
An 1894 edition |
https://en.wikipedia.org/wiki/See%20Red%20Women%27s%20Workshop | See Red Women's Workshop was a collective screen printing studio which operated between 1974 and 1990 in London, England. The printing studio was run by a feminist collective and produced material that aimed to combat sexist images of women and contribute towards the visual culture of the Women's Liberation Movement. The workshop was founded by Pru Stevenson, Julia Franco and Suzy Mackie. Over 16 years, more than 40 women joined the workshop. They produced a range of printed material, primarily posters, as well as calendars and t-shirts.
The workshop closed in 1990 due to financial reasons. Partly this was due to changes in the printing industry. Screen printing had become expensive, so the printed material did not cover running costs anymore.
Themes
The themes touched on in the See Red posters were intimately connected with feminist issues, but they ranged widely. They included topics such as reproductive rights, women's refuges, women's liberation, racism, socialist feminism, violence against women, black women's rights, support for jailed women and lesbian rights.
Funding
The workshop was initially funded by the sale of printed material and community donations. These were barely enough to cover the bills, and the workshop often found itself in the position of appealing for funds from the women's movement and individual supporters. Between 1982 and 1986 See Red was funded by the Labour controlled Southwark Council and the newly formed Women's Committee of the Greater London Council. The funding enabled the women to be paid a wage and improve their printing equipment.
Equipment
The initial equipment was simple. Early posters were screen printed using paper stencils or blocking out. These methods were preferred since they needed the minimum of equipment, which ensured that the shop could be set up almost anywhere. By 1978, the workshop had a darkroom and started including photographs in its designs.
Locations
The workshop moved locations several times. It w |
https://en.wikipedia.org/wiki/PSA%20Certified | Platform Security Architecture (PSA) Certified is a security certification scheme for Internet of Things (IoT) hardware, software and devices. It was created by Arm Holdings, Brightsight, CAICT, Prove & Run, Riscure, TrustCB and UL as part of a global partnership.
Arm Holdings first brought forward the PSA specifications in 2017 to outline common standards for IoT security, with PSA Certified assurance scheme launching two years later in 2019.
History
In 2017, Arm Holdings created Platform Security Architecture (PSA) as a standard for IoT security. The standard builds trust between Internet of Things services and devices. It was built to include an array of specifications such as threat models, security analyses, hardware and firmware architecture specifications, and an open-source firmware reference implementation. It aimed to become an industry-wide security component, with built-in security functions for both software and device manufacturers.
PSA has since evolved into PSA Certified, a four-stage framework which can be used by IoT designers for security purposes. The framework includes different levels of trust, with each level containing a different level of assessment; levels respond with progressively increasing security assurances.
In 2018, the first IoT threat models and PSA documents were published.
The certification of PSA Certified launched at Embedded World in 2019, where Level 1 Certification was presented to chip vendors. A draft of Level 2 protection was presented at the same time.
Six of the seven founding stakeholders created the PSA Certified specifications, which are now makes up the PSA Joint Stakeholders Agreement. The stakeholders are Arm Holdings, Brightsight, CAICT, Prove & Run, Riscure and UL. TrustCB became the seventh PSA Certified JSA member, acting as an independent Certification Body for the scheme. Out of the six other founding members, four are security test laboratories, including Brightsight, CAICT, Riscure and UL.
Security |
https://en.wikipedia.org/wiki/Stronger%20Together%2C%20Tous%20Ensemble | Stronger Together, Tous Ensemble was a 90-minute Canadian benefit concert which aired on April 26, 2020, during the COVID-19 pandemic and a week after the 2020 Nova Scotia attacks. The program drew an audience of over 11,500,000 viewers and listeners, and was simulcast by every major Canadian television broadcast company, including Bell Media (CTV), Canadian Broadcasting Corporation (CBC Television), Rogers Media (Citytv), Corus Entertainment (Global), V, and numerous other television, radio, and Internet-based broadcast platforms. This made it both the largest multi-platform broadcast and highest viewed non-sporting broadcast in Canadian television history. Numerous singers, actors, athletes, charities, and those impacted by coronavirus were featured including remarks by Prime Minister Justin Trudeau. Over in donations during the event were raised for Food Banks Canada.
Production
Stronger Together, Tous Ensemble is primarily composed of homemade video from various celebrities' households, singing or giving words of encouragement. The program was created in collaboration to unite viewers during the COVID-19 pandemic and after the 2020 Nova Scotia attacks.
Broadcasters
The benefit concert aired on 120 different radio, television, and online platforms.
On television, the concert was broadcast on English-language stations CTV, CBC Television, Citytv, and Global. It was also broadcast on French-language station V. The special was also simulcast on networks owned by Bell Media (CP24, CTV 2, MTV, Much, TSN, and Vrak), the Canadian Broadcasting Corporation (Ici ARTV and Unis), Rogers Media (FX and Omni Television), Corus Entertainment (ABC Spark, National Geographic, SériesPlus, and Slice), Asian Television Network (ATN HD, ATN Bangla, ATN Cricket Plus, ATN Food Food, ATN Gujarati, ATN Jaya TV, ATN Life, ATN PM One, ATN Punjabi Plus, and CBN), Blue Ant Media (A.Side TV, BBC Earth, Cottage Life, HIFI, Love Nature, Makeful, and Smithsonian Channel), and Stingray Group ( |
https://en.wikipedia.org/wiki/Human%20Cell%20Atlas | The Human Cell Atlas is a project to describe all cell types in the human body. The initiative was announced by a consortium after its inaugural meeting in London in October 2016, which established the first phase of the project. Aviv Regev and Sarah Teichmann defined the goals of the project at that meeting, which was convened by the Broad Institute, the Wellcome Trust Sanger Institute and Wellcome Trust. Regev and Teichmann lead the project.
Description
The Human Cell Atlas will catalogue a cell based on several criteria, specifically the cell type, its state, its location in the body, the transitions it undergoes, and its lineage. It will gather data from existing research, and integrate it with data collected in future research projects. Among the data it will collect is the fluxome, genome, metabolome, proteome, and transcriptome.
Its scope is to categorize the 37 trillion cells of the human body to determine which genes each cell expresses by sampling cells from all parts of the body.
All aspects of the project will be made "available to the public for free", including software and results.
By April 2018, the project included more than 480 researchers conducting 185 projects.
Funding
In October 2017, the Chan Zuckerberg Initiative announced funding for 38 projects related to the Human Cell Atlas. Among them was a grant of undisclosed value to the Zuckerman Institute of the Columbia University Medical Center at Columbia University. The grant, titled "A strategy for mapping the human spinal cord with single cell resolution", will fund research to identify and catalogue gene activity in all spinal cord cells. The Translational Genomics Research Institute received a grant to develop a standard for the "processing and storage of solid tissues for single-cell RNA sequencing", compared to the typical practice of relying on the average of sequencing multiple cells. Project home pages are available at the Chan Zuckerberg Initiative's website.
The program is also |
https://en.wikipedia.org/wiki/TENET%20210 | The TENET 210 was a mainframe computer designed for timesharing services. The machine was designed for high throughput and expandability, including 20 direct memory access (DMA) channels and eight slots for core memory, allowing up to 128k 32-bit words of RAM. The sales materials boasted that it guaranteed user responses within one second.
The 210 was the only product of TENET Inc, formed by several former members of Fairchild Semiconductor during its heyday in the late 1960s. The company sold only a single 210 before going out of business.
History
The TENET 210 ultimately traces its history to a project within Fairchild Semiconductor's research and development center in Palo Alto, California run by Gordon Moore. A new group organized by Rex Rice was developing a machine specifically for the timesharing market. Known as the Symbol IIR, the design concept was a machine that ran a PL/1-like language as its native assembler language, and would be implemented entirely in hardware - no microcode or firmware was allowed.
In 1966, Chuck Runge was working for the Atomic Energy Commission, writing programs on a machine at Iowa State University. Rice visited the campus on a recruiting drive and Runge interviewed with Moore that March. Runge joined the company in June, but quickly became disillusioned with the no-software decree, and was convinced the project would never ship. He found a like-minded engineer in Dave Masters, who knew Fairchild president Bob Noyce.
The two approached Noyce with the idea of developing a new computer design. The system was initially pitched as a controller for Fairchild Instrumentation's new Sentry product, a software-controlled semiconductor testing system. This produced the 24-bit Fairchild FST-1, as well as the FACTOR programming language used to program the test suites. Although it was by most measures a general-purpose minicomputer, Fairchild was uninterested in marketing it as such.
At the time, the timesharing market was developing ra |
https://en.wikipedia.org/wiki/Fleming%20Prize%20Lecture | The Fleming Prize Lecture was started by the Microbiology Society in 1976 and named after Alexander Fleming, one of the founders of the society. It is for early career researchers, generally within 12 of being awarded their PhD, who have an outstanding independent research record making a distinct contribution to microbiology. Nominations can be made by any member of the society. Nominees do not have to be members.
The award is £1,000 and the awardee is expected to give a lecture based on their research at the Microbiology Society's Annual Conference.
List
The following have been awarded this prize.
1976 Graham Gooday Biosynthesis of the Fungal Wall – Mechanisms and Implications
1977 Peter Newell Cellular Communication During Aggregation of Dictyostelium
1978 George AM Cross Immunochemical Aspects of Antigenic Variation in Trypanosomes
1979 John Beringer The Development of Rhizobium Genetics
1980 Duncan James McGeoch Structural Analysis of Animal Virus Genomes
1981 Dave Sherratt The Maintenance and Propagation of Plasmid Genes in Bacterial Populations
1982 Brian Spratt Penicillin-binding Proteins and the Future of β-Lactam Antibiotics
1983 Ray Dixon The Genetic Complexity of Nitrogen Fixation Herpes Siplex and The Herpes Complex
1984 Paul Nurse Cell Cycle Control in Yeast
1985 Jeffrey Almond Genetic Diversity in Small RNA Viruses
1986 Douglas Kell Forces, Fluxes and Control of Microbial Metabolism
1987 Christopher Higgins Molecular Mechanisms of Membrane Transport: from Microbes to Man
1988 Gordon Dougan An Oral Route to Rational Vaccination
1989 Andrew Davison Varicella-Zoster Virus
1989 Graham J Boulnois Molecular Dissection of the Host-Microbe Interaction in Infection
1990 No award
1991 Lynne Boddy The Ecology of Wood- and Litter-rotting Basidiomycete Fungi
1992 Geoffrey L Smith Vaccinia Virus Glycoproteins and Immune Evasion
1993 Neil Gow Directional Growth and Guidance Systems of Fungal Pathogens
1994 Ian Roberts Bacterial Polysaccharides in Sickness and |
https://en.wikipedia.org/wiki/NameSilo | NameSilo LLC is an American Internet domain registrar and web hosting company headquartered in Phoenix, Arizona. It is owned by NameSilo Technologies Corp., which is listed on the Canadian Securities Exchange (an alternative stock exchange for micro-cap and emerging companies). NameSilo is an ICANN-accredited domain name registrar company which provides DNS domains, web hosting, email services, SSL certificates, and other website products.
History
NameSilo LLC was founded in 2010 by Michael Goldfarb and Michael McCallister in Phoenix, Arizona.
In July 2021, the company reached the 3 million active domains.
As of December 2019, NameSilo has 3.4 million active domains under management, placing it in the top 15 of registrars around the world.
Acquisition and partnership
On March 7, 2018, Vancouver based Brisio Innovations Inc. acquired an 81.5% stake of NameSilo LLC. NameSilo had 1.2 million active domains under management at the time. In November, 2018, Brisio Innovations Inc. announced plans to change its name to "NameSilo Technologies Corp".
In 2019, NameSilo acquired NamePal, a domain registrar and web hosting company with its 100% stake.
In Dec 2019, NameSilo partnered with NuSec.
Awards
NamePros' Registrar of the Year 2019
References
American companies established in 2010
Domain name registrars
Web hosting
Internet properties established in 2010
Companies listed on the Canadian Securities Exchange |
https://en.wikipedia.org/wiki/Pantawid%20ng%20Pag-ibig%3A%20At%20Home%20Together%20Concert | Pantawid ng Pag-ibig: At Home Together Concert () is a six-hour Philippine benefit concert television special held on March 22, 2020, in support of ABS-CBN Foundation's efforts in helping those heavily affected by the 2020 Luzon enhanced community quarantine caused by the COVID-19 pandemic in the Philippines. Hosted by TV Patrol Weekend news anchors Alvin Elchico and Zen Hernandez, the virtual concert featured musical performances and appearances by talents from ABS-CBN, appearing from their respective homes. The special aired on ABS-CBN and several of its sister broadcast and cable channels, radio stations, and digital streaming platforms. The special was also aired on other stations that are members of the Kapisanan ng mga Brodkaster ng Pilipinas.
Towards the end of the show, it was announced that the concert has raised nearly ₱237 million in pledges and donations.
Performances
Appearances
Agot Isidro
Alex Gonzaga*
Amy Perez
Angel Aquino
Angel Locsin
Angelica Panganiban
Anne Curtis
Anthony Taberna
Arci Muñoz
Arjo Atayde
Bea Alonzo
Beauty Gonzalez
Bernadette Sembrano
Boy Abunda
Charo Santos-Concio
Cherry Pie Picache
Chiara Zambrano
Coco Martin
Daniel Padilla
Dimples Romana
Donny Pangilinan
Edu Manzano
Edward Barber
Elisse Joson
Enchong Dee
Eula Valdez
Gerald Anderson
Isabel Oli
Ivana Alawi*
Jane De Leon
Jane Oineza
Janella Salvador
Jhong Hilario
Jodi Sta. Maria
John Arcilla
John Prats
Jorge Cariño
Judy Ann Santos
Julia Barretto
Julia Montes
Julius Babao
Karen Davila
Kathryn Bernardo
Kim Atienza
Kim Chiu*
Korina Sanchez
Lorna Tolentino
Luis Manzano
Maja Salvador
Marco Gumabao
Maricel Soriano
Maymay Entrata
Melai Cantiveros*
Nadine Lustre
Noli de Castro
Pia Wurtzbach
Piolo Pascual
Pokwang*
Ria Atayde
RK Bagatsing
Robi Domingo
Rowell Santiago
Ruffa Gutierrez
Ryan Bang
Sylvia Sanchez
Ted Failon
The Gold Squad (Francine Diaz, Andrea Brillantes, Kyle Echarri, and Seth Fedelin)*
Tony Labrusca
Vhong |
https://en.wikipedia.org/wiki/In%20Pursuit%20of%20the%20Unknown | In Pursuit of the Unknown: 17 Equations That Changed the World is a 2012 nonfiction book by British mathematician Ian Stewart , published by Basic Books. In the book Stewart traced a history of the role of mathematics in human history, beginning with the Pythagorean theorem (Pythagorean equation) to the equation that transformed the twenty-first century financial market, the Black–Scholes model.
Content
Seventeen equations are described in the book as follows:
Pythagorean equation,
Logarithm product identity,
Derivative,
Newton's law of universal gravitation,
Imaginary unit,
Euler's polyhedron formula,
Normal distribution,
Wave equation in one space dimension,
Fourier transform,
Navier–Stokes momentum equation,
Maxwell's equations, , , ,
Entropy and the second law of thermodynamics,
Mass–energy equivalence,
Time-dependent Schrödinger equation,
Entropy in information theory,
Logistic map,
Black–Scholes equation,
Reviews
Kirkus Reviews said that the book provided "clear, cogent explanations of how the equations work without burdening the reader with cumbersome derivations."
The Maclean's magazine review described the book as a "history of the human species told in equations" by the "finest living math popularizer".
The New York Book Review said that Stewart was a "genius in the way he conveys his excitement and sense of wonder across" who has a "valuable grasp" of "what it takes to make equations interesting" and "to make science cool."
The Physics Today journal review said that Stewart writes with "easy prose, which never fails to both educate and entertain."
Business Insider described the book as an "excellent and deeply researched book."
The Association for Computing Machinery's SIGACT News review called the book, the "latest spell" by the "master storyteller", the "Honorary Wizard of the Unseen University"—the "master storyteller"—who is able to "entertain" the reader with Greek symbols. The reviewer said Stewart focused on how eq |
https://en.wikipedia.org/wiki/Australian%20Web%20Archive | The Australian Web Archive (AWA) is an publicly available online database of archived Australian websites, hosted by the National Library of Australia (NLA) on its Trove platform, an online library database aggregator. It comprises the NLA's own PANDORA archive, the Australian Government Web Archive (AGWA) and the National Library of Australia's ".au" domain collections. Access is through a single interface in Trove, which is publicly available. The Australian Web Archive was created in March 2019, and is one of the biggest web archives in the world. Its purpose is to provide a resource for historians and researchers, now and into the future.
History of the three components
The PANDORA service started archiving websites in October 1996.
In 2005, the NLA started archiving annual snapshots of the entire Australian web domain (URLs with the suffix. ".au"), collected via large crawl harvests. Later, the earliest websites from the .au web domain, dating back to 1996, were obtained from the Internet Archive. In 2019 this content was first made publicly accessible through Trove.
The PANDORA infrastructure, which works well for a selective small scale archiving, does not adapt to large scale "bulk harvesting" of web content, so a new technical system had to be developed whereby a web archiving service which would integrate the delivery of archived websites within a live website interface delivering the archived websites seamlessly to the user, which is difficult to achieve technically.
AGWA
Australian Government websites are Commonwealth records, and are therefore publications to be managed in accordance with the Archives Act 1983.
The Australian Government Web Archive (AGWA) consists of bulk archiving of Commonwealth Government websites. The NLA began regular harvests of the websites in June 2011, after a significant obstacle had been overcome with an administrative agreement made in May 2010 allowing the NLA to collect, preserve and make accessible government webs |
https://en.wikipedia.org/wiki/Graduate%20Together%3A%20America%20Honors%20the%20High%20School%20Class%20of%202020 | Graduate Together: America Honors the High School Class of 2020 is an American television special that was simulcasted on the major television networks and online on May 16, 2020. Created by the XQ Institute, the LeBron James Family Foundation, and the Entertainment Industry Foundation, the special was curated by basketball player LeBron James in collaboration with high school students and educators across the United States, including the American Federation of Teachers. The broadcast included a variety of commencement addresses, celebrity performances and inspirational vignettes aimed at high school students, whose graduation ceremonies and proms were cancelled due to the COVID-19 pandemic, due to it causing the closure of most schools worldwide.
Appearances
LeBron James, host
Zendaya, actress
Kevin Hart, actor
Yara Shahidi, actress
Kane Brown & Maren Morris, singer
Timothée Chalamet, actor
Rodney Robinson, educator
Megan Rapinoe, athlete
Bad Bunny, singer
Kumail Nanjiani, actor (via Animal Crossing)
Olivia Wilde, actor
Malala Yousafzai, activist
Lena Waithe, screenwriter
Julianne Moore, actress
Shaquille O'Neal, athlete
Chris Harrison, television personality
Dave Matthews, musician
Loren Gray, singer
The Dolan Twins, internet personalities
Lana Condor, actress
Liza Koshy, actress
Pharrell Williams, singer
Barack Obama, 44th President of the United States
Students
Performances
Broadcast
The special was simulcasted on May 16, 2020, at 8pm EST on the major U.S. broadcast television networks ABC, CBS, Fox, and NBC, except PBS due to flex programming on member stations over most of their schedules and broadcast times for network shows may vary. It was also simulcasted on television networks California Music Channel and The CW, on Spanish-language network Univision, and on cable networks CNN, Fox Business, Fox News, Freeform, and MSNBC. It was also available for streaming in platforms such as ABC News Live, Associated Press, Bleacher Report, |
https://en.wikipedia.org/wiki/Build%20the%20Earth | Build the Earth (BTE) is a project dedicated to creating a 1:1 scale model of Earth within the sandbox video game Minecraft.
History
Build The Earth was created by YouTuber PippenFTS in March 2020 as a collaborative effort to recreate Earth in the video game Minecraft. In a YouTube video, PippenFTS called for prospective participants to recreate man-made structures over a rudimentary model of Earth's terrain. A Discord server created to help coordinate the project attracted over a hundred thousand users by April 2020.
Minecraft developer Mojang Studios featured the project on their website on Earth Day 2020. In July 2020, YouTuber MrBeast released a video where he and 50 other people built his hometown of Raleigh, North Carolina within the project.
Software
The Build The Earth project primarily depends on two Minecraft modifications to function: Cubic Chunks and Terra++. Cubic Chunks removes Minecrafts limitation on building structures beyond a certain height. Terra++ uses information from geographic data services, such as OpenStreetMap, to automatically generate terrain to ease the building process. The project originally used the Terra 1-to-1 mod instead of Terra++. PippenFTS stated that "with the Cubic Chunks mod breaking Minecraft's vertical limitations, we can now experience the Earth in Minecraft, just as it is, with no downscaling of any kind."
References
External links
Minecraft servers
2020 works
Internet properties established in 2020 |
https://en.wikipedia.org/wiki/Scorpionism%20in%20Central%20America | Scorpionism is defined as the accidental envenomation of humans by toxic scorpions. If the injection of venom in a human results in death, this is defined as scorpionism. This is seen all over the world but is predominantly seen in the tropical and subtropical areas. These areas include Mexico, northern South America and southeast Brazil in the Western hemisphere. In the Eastern hemisphere, scorpionism possess a public health threat in the regions of South Africa, the Middle East, and the Indian subcontinent.
Species involved
Scorpions are nocturnal animals that typically live in deserts, mountains, caves, and under rocks. It is when they are disturbed that they attack. Scorpions that possess the ability to inject poisonous venom with their sting belong to the family Buthidae. The Middle East and North Africa are home to the deadliest scorpions, belonging to the genus Buthus, Leiurus, Androctonus, and Hottentotta. In the region of South Africa, the deadliest scorpion belongs to the Tityus genus. In India and Mexico, the deadliest scorpions involved in scorpionism are Mesobuthus and Centruroides, respectively.
In Central America, most scorpion stings are mildly toxic to humans, however, Panama has reported an incidence of 52 cases per 100,000 people in 2007. Between 1998 and 2006, 28 people have died as result of scorpion stings. In Panama, the taxa of scorpions responsible for these deaths belong to the genus Tityus. This scorpion species is also found in parts of northern South America. Historically, the presence of these scorpions in Panama could be due to the closure of the Panamanian isthmus, thus allowing for the migration of the scorpions from Panama into the northern part of South America. Tityus pachyurus belongs to the family of Tityus scorpions found in Panama. T. pachyurus is among the most medically important species. Envenomation by this kind of scorpion is characterized by intense local pain, that usually does not result in tissue injury. Scorpions |
https://en.wikipedia.org/wiki/Swish%20function | The swish function is a mathematical function defined as follows:
where β is either constant or a trainable parameter depending on the model. For β = 1, the function becomes equivalent to the Sigmoid Linear Unit or SiLU, first proposed alongside the GELU in 2016. The SiLU was later rediscovered in 2017 as the Sigmoid-weighted Linear Unit (SiL) function used in reinforcement learning. The SiLU/SiL was then rediscovered as the swish over a year after its initial discovery, originally proposed without the learnable parameter β, so that β implicitly equalled 1. The swish paper was then updated to propose the activation with the learnable parameter β, though researchers usually let β = 1 and do not use the learnable parameter β. For β = 0, the function turns into the scaled linear function f(x) = x/2. With β → ∞, the sigmoid component approaches a 0-1 function pointwise, so swish approaches the ReLU function pointwise. Thus, it can be viewed as a smoothing function which nonlinearly interpolates between a linear function and the ReLU function. This function uses non-monotonicity, and may have influenced the proposal of other activation functions with this property such as Mish.
When considering positive values, Swish is a particular case of sigmoid shrinkage function defined in (see the doubly parameterized sigmoid shrinkage form given by Equation (3) of this reference).
Applications
In 2017, after performing analysis on ImageNet data, researchers from Google indicated that using this function as an activation function in artificial neural networks improves the performance, compared to ReLU and sigmoid functions. It is believed that one reason for the improvement is that the swish function helps alleviate the vanishing gradient problem during backpropagation.
References
Functions and mappings
Artificial neural networks |
https://en.wikipedia.org/wiki/A%20Dictionary%20of%20Musical%20Themes | A Dictionary of Musical Themes (New York: Crown, 1949) is a music reference book by Sam Morgenstern and Harold Barlow.
Contents
The book collects 10,000 musical themes (mostly classical works) and indexes them using a notation index based on transposing the pitches to C major or C minor (so that God Save the Queen/America, for instance, would come out as CCDBCDEEFE). It was followed a year later by A Dictionary of Vocal Themes (1950), including themes from songs and opera.
Authors
Sam Morgenstern (1906-1989) was a teacher at Mannes College of Music in Greenwich Village, New York, and the conductor of Lower Manhattan's Lemonade Opera Company, which gave the US premiere of Prokofiev’s Duenna in 1948. He composed two short operas, along with Warsaw Ghetto (setting a spoken word poem by Harry Granick to background music), which premiered at Carnegie Hall on February 10, 1946. He composed a choral cantata The Common Man, and the Latin-tinged piano piece Toccata Guatemala. Although no recordings of his work exist, a radio disk transcription of the second performance of Warsaw Ghetto exists, made in the studio a week after the premiere. Morgenstern’s other books included the anthology Composers on Music (1956).
Harold Barlow (1915-93) devised the notation scheme. He was a popular song composer who studied violin at Boston University and became a bandleader during World War II. He wrote the comedy song I’ve Got Tears in My Ears in 1949 (recorded by Homer and Jethro), and the lyrics to the 1960 Connie Francis hit Mama. Barlow became better known later in his career as a consultant on plagiarism, most famously defending George Harrison’s "My Sweet Lord" against accusations that it was copied from the Chiffons’ hit He’s So Fine. (Harrison lost the case). Barlow also worked on cases involving Bob Dylan, Elvis Presley, Elton John, Dolly Parton, and Billy Joel.
Alternative classification
A new attempt at classifying tunes was published in 1975 by Denys Parsons. The Director |
https://en.wikipedia.org/wiki/Immunity%20passport | An immunity passport, immunity certificate, health pass or release certificate (among other names used by various local authorities) is a document, whether in paper or digital format, attesting that its bearer has a degree of immunity to a contagious disease. Public certification is an action that governments can take to mitigate an epidemic.
When it takes into account natural immunity or very recent negative test results, an immunity passport cannot be reduced to a vaccination record or vaccination certificate that proves someone has received certain vaccines verified by the medical records of the clinic where the vaccines were given., such as the Carte Jaune ("yellow card") issued by the World Health Organization (WHO), which works as an official vaccination record.
The concept of immunity passports received much attention during the COVID-19 pandemic as a potential way to contain the pandemic and permit faster economic recovery. Reliable serological testing for antibodies against SARS-CoV-2 virus is done to certify people as relatively immune to COVID-19 and issue immunity documentation.
History
Quarantine has been used since ancient times as a method of limiting the spread of infectious disease. Consequently, there has also been a need for documents attesting that a person has completed quarantine or is otherwise known not to be infectious. One of the oldest known immunity passports, issued in 1578 in Venice, was found by Jacek Partyka, and since the 1600s, various Italian states issued fedi di sanità to exempt their bearers from quarantine.
The International Certificate of Vaccination (Carte Jaune) is a certificate of vaccination and prophylaxis, not immunity. The document has remained largely unchanged since it was adopted by the International Sanitary Convention of 1944. The certificate is most commonly associated with Yellow Fever, but it is also used to track vaccination against other illnesses.
Modern definition
An immunity certificate is a legal do |
https://en.wikipedia.org/wiki/Hypercentric%20lens | A hypercentric or pericentric lens is a lens system where the entrance pupil is located in front of the lens, in the space where an object could be located. This has the result that, in a certain region, objects that are farther away from the lens produce larger images than objects that are closer to the lens, in stark contrast to the behavior of the human eye or any ordinary camera (both entocentric lenses), where farther-away objects always appear smaller.
The geometry of a hypercentric lens can be visualized by imagining a point source of light at the center of the entrance pupil sending rays in all directions. Any point on the object will be imaged to the point on the image plane found by continuing the ray that passes through it, so the shape of the image will be the same as that of the shadow cast by the object from the imaginary point of light. So the closer an object gets to that point (the center of the entrance pupil), the larger its image will be.
This inversion of normal perspectivity can be useful for machine vision. Imagine a six-sided die sitting on a conveyor belt being imaged by a hypercentric lens system directly above, whose entrance pupil is below the conveyor belt. The image of the die would contain the top and all four sides at once, because the bottom of the die appears larger than the top.
See also
Entocentric lens
Telecentric lens
References
Photographic lenses
Machine vision |
https://en.wikipedia.org/wiki/Making%20Mathematics%20with%20Needlework | Making Mathematics with Needlework: Ten Papers and Ten Projects is an edited volume on mathematics and fiber arts. It was edited by Sarah-Marie Belcastro and Carolyn Yackel, and published in 2008 by A K Peters, based on a meeting held in 2005 in Atlanta by the American Mathematical Society.
Topics
The book includes ten different mathematical fiber arts projects, by eight contributors. An introduction provides a history of the connections between mathematics, mathematics education, and the fiber arts. Each of its ten project chapters is illustrated by many color photographs and diagrams, and is organized into four sections: an overview of the project, a section on the mathematics connected to it, a section of ideas for using the project as a teaching activity, and directions for constructing the project. Although there are some connections between topics, they can be read independently of each other, in any order. The thesis of the book is that directed exercises in fiber arts construction can help teach both mathematical visualization and concepts from three-dimensional geometry.
The book uses knitting, crochet, sewing, and cross-stitch, but deliberately avoids weaving as a topic already well-covered in mathematical fiber arts publications. Projects in the book include a quilt in the form of a Möbius strip, a "bidirectional hat" connected to the theory of Diophantine equations, a shawl with a fractal design, a knitted torus connecting to discrete approximations of curvature, a sampler demonstrating different forms of symmetry in wallpaper group, "algebraic socks" with connections to modular arithmetic and the Klein four-group, a one-sided purse sewn together following a description by Lewis Carroll, a demonstration of braid groups on a cable-knit pillow, an embroidered graph drawing of an Eulerian graph, and topological pants.
Beyond belcastro and Yackel, the contributors to the book include Susan Goldstine, Joshua Holden, Lana Holden, Mary D. Shepherd, Amy F. Sz |
https://en.wikipedia.org/wiki/Crystallopathy | Crystallopathy is a harmful state or disease associated with the formation and aggregation of crystals in tissues or cavities, or in other words, a heterogeneous group of diseases caused by intrinsic or environmental microparticles or crystals, promoting tissue inflammation and scarring.
Composition
Crystallopathies can be associated with four main kinds of crystalline structures: liquid non-aggregating crystal solutions, amorphous nano-scale solid particles, crystalline micro-scale solid particles, and polycrystalline larger solid structures. They can be composed of various minerals, metabolites, proteins, and microparticles, including the following:
Location
In principle, crystal formation can happen anywhere in the body. Well-known places are excretory organs where concentrations get high easily, like in the biliary and urinary tracts, but crystalline structures are also formed in intracellular and extracellular spaces of tissues, like within the arterial wall in atherosclerosis.
For example, mechanical obstruction by mineral stones causes nephrolithiasis, urolithiasis, cholecystolithiasis, choledocholithiasis, docholithiasis, and sialolithiasis, and acute inflammation caused by crystals in joints causes gout and pseudogout.
Renal diseases are also common in crystallopathies, including:
Mechanisms
Local supersaturation is a common trigger of crystallization, and when the nucleus of the crystalline structure is formed, crystals can self-perpetuate and cause more crystallization and aggregation. Main mechanisms by which the formed crystals and aggregates cause pathological states and ultimately disease are acute necroinflammation, chronic tissue remodelling, and mechanical obstruction.
Necroinflammation is an autoamplifying process where crystals are toxic to cells (cytotoxicity) and cause cell death (necrosis and regulated cell death) and a local and systemic inflammatory response. Cytotoxicity includes actin depolymerization, free radical and reactive ox |
https://en.wikipedia.org/wiki/Multitier%20programming | Multitier programming (or tierless programming) is a programming paradigm for distributed software, which typically follows a multitier architecture, physically separating different functional aspects of the software into different tiers (e.g., the client, the server and the database in a Web application). Multitier programming allows functionalities that span multiple of such tiers to be developed in a single compilation unit using a single programming language. Without multitier programming, tiers are developed using different languages, e.g., JavaScript for the Web client, PHP for the Web server and SQL for the database. Multitier programming is often integrated into general-purpose languages by extending them with support for distribution.
Concepts from multitier programming were pioneered by the Hop and Links languages
and have found industrial adoption in solutions such as Ocsigen, Opa, WebSharper, Meteor or GWT.
Multitier programming provides a global view on the distributed system. This aspect has been shown similar to other programming paradigms such as choreographic programming, macroprogramming, and aggregate computing.
Context
The code of the different tiers can be executed in a distributed manner on different networked computers. For instance, in a three-tier architecture, a system is divided into three main layers – typically the presentation, business, and data tiers. This approach has the benefit that by dividing a system into layers, the functionality implemented in one of the layers can be changed independently of the other layers. On the other hand, this architectural decision scatters a cross-cutting functionality belonging to several tiers over several compilation units.
In multitier programming, the different tiers are implemented using a single programming language. Different compilation backends take into account the destination tier (e.g., Java for a server and JavaScript for a web browser). Consequently, a functionality that is spread |
https://en.wikipedia.org/wiki/Susan%20Goldstine | Susan Goldstine is an American mathematician active in mathematics and fiber arts. She is a professor of mathematics at St. Mary's College of Maryland, and (for 2019–2022) the Steven Muller Distinguished Professor in the Sciences at St. Mary's College.
Education and career
Goldstine graduated summa cum laude from Amherst College in 1993. She completed a Ph.D. in mathematics at Harvard University in 1998. Her dissertation, Spin Representations and Lattices, was supervised by Benedict Gross.
After postdoctoral and visiting assistant professorships at McMaster University, Ohio State University, and Amherst College, she joined the St. Mary's College faculty in 2004.
Contributions
Goldstine has made and exhibited many pieces of mathematical art, often involving textiles. A set of bead crochet jewelry pieces by her visualizing the map coloring problem on three different manifolds won the prize for "best textile, sculpture, or other medium" in the art show of the 2015 Joint Mathematics Meetings.
She is the coauthor of the book Crafting Conundrums: Puzzles and Patterns for the Bead Crochet Artist (with Ellie Baker, A K Peters / CRC Press, 2014).
Combining her interests in mathematics and fiber arts she is one of 24 mathematicians and artists who make up the Mathemalchemy Team.
Personal life
Goldstine is the granddaughter of teacher and author Bel Kaufman and the great-great-granddaughter of Sholem Aleichem.
References
External links
Home page
Year of birth missing (living people)
Living people
20th-century American mathematicians
21st-century American mathematicians
American women mathematicians
Recreational mathematicians
Amherst College alumni
Harvard Graduate School of Arts and Sciences alumni
St. Mary's College of Maryland faculty
Mathematical artists
20th-century American women
21st-century American women |
https://en.wikipedia.org/wiki/Flandrica.be | Flandrica.be (launched 2011) is a web portal that links the online repositories of the Flanders Heritage Library consortium in partnership with the libraries of the Antwerp Museum for Diamonds, Jewellery and Silver and the Plantin-Moretus Museum. It showcases culturally significant or aesthetically pleasing items (manuscripts, printed books, periodicals and engravings) produced in or about what is now the Flemish Region of Belgium. It is funded by the Flemish Community and by the libraries themselves. Material included in Flandrica is also made available through the EU web portal for cultural heritage, Europeana.
See also
Europeana
Mexicana
Canadiana.org
References
External links
Home page in English
Internet properties established in 2011
Aggregation-based digital libraries
Online archives
Art websites
Scholarly search services
Mass digitization |
https://en.wikipedia.org/wiki/National%20edeposit | National edeposit (NED) is a collaboration between Australia's nine national, state and territory libraries which provides for the legal deposit, management, storage and preservation of, and access to, published electronic material across Australia. It is a website, a system and a service, the result of a project by National and State Libraries Australia, and is a world-first collaboration. The National Library of Australia (NLA), Libraries ACT, Libraries Tasmania, Northern Territory Library, State Library of New South Wales, State Library of Queensland, State Library of South Australia, State Library Victoria and the State Library of Western Australia are the member organisations, while the system is hosted and managed by the NLA.
Legal deposit in Australia
The federal Copyright Act 1968 and legal deposit legislation pertaining to each state mandates that publishers of any kind must deposit copies of their publications in the National Library of Australia as well as in the state or territory library in their jurisdiction. Until the 21st century, this has applied to all types of printed materials (and in some states, to audio-visual formats as well), and on 17 February 2016, the federal legal deposit provisions were extended to cover electronic publications of all types. By July 2018, while the Northern Territory was the only jurisdiction with legislation with explicit mention of "internet publications" (in its Publications (Legal Deposit) Act 2004), Queensland's Libraries Act 1988 and Tasmania's Libraries Act 1984 were broad enough to include digital publications. Most states and territories are reviewing or amending existing legislation to extend to digital publications as well.
Director-General of the NLA, Marie-Louise Ayres, stresses the importance of the legal deposit system as a way to capture the country's identity, where everything is captured impartially, and no selection or judgement of the content takes place.
Digital technologies created new challen |
https://en.wikipedia.org/wiki/NFA%20minimization | In automata theory (a branch of theoretical computer science), NFA minimization is the task of transforming a given nondeterministic finite automaton (NFA) into an equivalent NFA that has a minimum number of states, transitions, or both. While efficient algorithms exist for DFA minimization, NFA minimization is PSPACE-complete. No efficient (polynomial time) algorithms are known, and under the standard assumption P ≠ PSPACE, none exist. The most efficient known algorithm is the Kameda‒Weiner algorithm.
Non-uniqueness of minimal NFA
Unlike deterministic finite automata, minimal NFAs may not be unique. There may be multiple NFAs of the same size which accept the same regular language, but for which there is no equivalent NFA or DFA with fewer states.
References
External links
A modified C# implementation of Kameda-Weiner (1970)
PSPACE-complete problems
Finite automata |
https://en.wikipedia.org/wiki/Rule%20of%20division%20%28combinatorics%29 | In combinatorics, the rule of division is a counting principle. It states that there are ways to do a task if it can be done using a procedure that can be carried out in ways, and for each way , exactly of the ways correspond to the way .
In a nutshell, the division rule is a common way to ignore "unimportant" differences when counting things.
Applied to Sets
In the terms of a set: "If the finite set is the union of n pairwise disjoint subsets each with elements, then ."
As a function
The rule of division formulated in terms of functions: "If is a function from to where and are finite sets, and that for every value there are exactly values such that (in which case, we say that is -to-one), then ."
Examples
Example 1
- How many different ways are there to seat four people around a circular table, where two seatings are considered the same when each person has the same left neighbor and the same right neighbor?
To solve this exercise we must first pick a random seat, and assign it to person 1, the rest of seats will be labeled in numerical order, in clockwise rotation around the table. There are 4 seats to choose from when we pick the first seat, 3 for the second, 2 for the third and just 1 option left for the last one. Thus there are 4! = 24 possible ways to seat them. However, since we only consider a different arrangement when they don't have the same neighbours left and right, only 1 out of every 4 seat choices matter.
Because there are 4 ways to choose for seat 1, by the division rule () there are different seating arrangements for 4 people around the table.
Example 2
- We have 6 coloured bricks in total, 4 of them are red and 2 are white, in how many ways can we arrange them?
If all bricks had different colours, the total of ways to arrange them would be , but since they don't have different colours, we would calculate it as following:
4 red bricks have arrangements
2 white bricks have arrangements
Total arrangements of 4 red and |
https://en.wikipedia.org/wiki/Women%20Are%20Boring | Women Are Boring is an online publication featuring research by women. It aims to improve the visibility of women researchers, in response to the poor representation of discoveries by women in media outlets that quote or cover academic research. Women Are Boring is primarily a platform for women to post summaries or synopses of research that they have published in a different venue, on any topic.
History and motivation
Grace McDermott and Catherine Connolly founded the publication while they were PhD students at Dublin City University in May of 2016. McDermott and Connolly attributed their decision to found Women Are Boring to the under-representation of women in media, and particularly the underrepresentation of women scholars in news about research. They were specifically motivated by a study by The Global Media Monitoring Project which concluded that "only 24% of the persons heard, read about or seen in news media are women", and that only 28% of the sources cited in Irish news media were women, with only a very small proportion of those in expert roles like scientific or academic sources. McDermott and Connolly have noted the contrast between the dearth of women researchers in popular media and the plethora of research by women that they consistently encountered as PhD students.
McDermott and Connolly chose the name "Women Are Boring" for their platform partly to alter the Google Search results for that phrase, which they noted had previously consisted of results that were overwhelmingly demeaning to women. It is also intended to ironically contrast the attitude that women are boring with the interesting information that is shared by women on the platform, to demonstrate the absurdity of the claim that women are boring.
Women Are Boring was founded at a similar time to other efforts to increase the visibility of women academics online and specifically in news media, such as Women Also Know Stuff and 500 Women Scientists. It has also been compared to The Beard |
https://en.wikipedia.org/wiki/Basahan | Basahan script, also known as Guhit, is the native name used by Bicolanos to refer to Baybayin.
The word Basahan is already recorded in a book entitled Vocabulario de la Lengua Bicol by Marcos de Lisboa in 1628 which states that it has three vowels and fifteen consonants.
Alphabet
Basahan has three stand-alone vowels (a, e/i, o/u) and fifteen consonants (ba, ka, da, ga, ha, la, ma, na, nga, pa, ra, sa, ta, wa, ya). This script can be called an abugida because signs represent syllables, that is a consonant with a vowel.
Way of writing
According to Scott, when e.g. the sign for ba has to be read as be / bi it has a kaldit (a small "v" shaped diacritic sign) on the left (or above), if it has to be read as bu / bo the kaldit is on the right (resp. below). The of the older bikolanos has an own sign for /r/ while the basahans of Tagalog (Baybayin) and Ilokano (Kurdita) have not. In his time the kaldit was called or according to Marcos de Lisboa, author of the earliest dictionary of Bikol.
References
External links
sample of Basahan script font
Basahan
Writing systems
Philippine scripts |
https://en.wikipedia.org/wiki/Proximity%20labeling | Enzyme-catalyzed proximity labeling (PL), also known as proximity-based labeling, is a laboratory technique that labels biomolecules, usually proteins or RNA, proximal to a protein of interest. By creating a gene fusion in a living cell between the protein of interest and an engineered labeling enzyme, biomolecules spatially proximal to the protein of interest can then be selectively marked with biotin for pulldown and analysis. Proximity labeling has been used for identifying the components of novel cellular structures and for determining protein-protein interaction partners, among other applications.
History
Before the development of proximity labeling, determination of protein proximity in cells relied on studying protein-protein interactions through methods such as affinity purification-mass spectrometry and proximity ligation assays.
DamID is a method developed in 2000 by Steven Henikoff for identifying parts of the genome proximal to a chromatin protein of interest. DamID relies on a DNA methyltransferase fusion to the chromatin protein to nonnaturally methylate DNA, which can then be subsequently sequenced to reveal genome methylation sites near the protein. Researchers were guided by the fusion protein strategy of DamID to create a method for site-specific labeling of protein targets, culminating in the creation of the biotin protein labelling-based BioID in 2012. Alice Ting and the Ting lab at Stanford University have engineered several proteins that demonstrate improvements in biotin-based proximity labeling efficacy and speed.
Principles
Proximity labeling relies on a labeling enzyme that can biotinylate nearby biomolecules promiscuously. Biotin labeling can be achieved through several different methods, depending on the species of labeling enzyme.
BioID, also known as BirA*, is a mutant E. coli biotin ligase that catalyzes the activation of biotin by ATP. The activated biotin is short-lived and thus can only diffuse to a region proximal to BioID |
https://en.wikipedia.org/wiki/Fruit%20and%20Vegetable%20Preservation%20Research%20Station | The Fruit and Vegetable Preservation Research Station (FVPRS) was a former British government research institute, now a private research company, that has made important industry-wide advances in food preservation, notably canning.
History
The institute, founded in 1919, originally worked with the University of Bristol. The British fruit canning industry mostly began from around 1926. The site found a method to can peas that prevented the peas from turning yellow, retaining the green colour. It worked in the 1930s with Sir Edgar Jones of the National Food Canning Council.
It became an independent private research company for the vegetable and fruit industry from 16 August 1952.
It merged with a brewing research company from Surrey in September 2008.
Visits
The Duke of Kent visited on Wednesday 16 November 1994, with Sir Henry Elwes; the Duke was representing the British Overseas Trade Board. The Princess of Wales opened a new building on Thursday June 27, 1996. Anne, Princess Royal attended an annual lecture lunch on Wednesday June 9, 2004.
Structure
The private company is situated in the Cotswolds in Gloucestershire, next to the Cotswold Line, next to a level crossing.
Testing
The site is one of the two main sites in the UK for food safety testing; the other is in northern Surrey.
In May 2005, it was one of only two British labs that could test for illegal dyes in paprika, chilli powder and turmeric. Para red and Rhodamine B had been found in supermarket own brands and Old El Paso spice products.
Training
In recent years, the site has run training courses. The research company also runs customer focus groups for the food and drink industry, to test new products; since 2015 this has been at Royal Leamington Spa in Warwickshire.
See also
Fernhurst Research Station in West Sussex
Unilever Gloucester
References
1919 establishments in the United Kingdom
Biological research institutes in the United Kingdom
Cotswold District
Food preservation
Food safety in t |
https://en.wikipedia.org/wiki/Eddie%20Hall%20vs.%20Haf%C3%BE%C3%B3r%20Bj%C3%B6rnsson | Eddie Hall vs. Hafþór Björnsson, known as "The Heaviest Boxing Match in History" at its time, was a boxing match between strongmen Eddie Hall and Hafþór Björnsson that took place on 19 March 2022. Both have won the strongman competition "World's Strongest Man" owned by IMG Worldwide. Prior to Hall's injury, the match was set to take place on September 18, 2021, at VyStar Veterans Memorial Arena in Jacksonville, Florida. The replacement match in September 2021 was between Björnsson and Devon Larratt in Dubai while the match against Hall was rescheduled to March 19, 2022.
Hall started the first round with continuous haymakers but Björnsson kept his composure and stuck to the basics, focusing on a solid jab and better footwork. Once Björnsson realized Hall's game plan, he took control of the fight by hitting down Hall twice to the floor in rounds three and six. Hall sustained bleeding lacerations on top of both eyes and Björnsson won the fight via unanimous decision, having won all but the second round.
Background
The fight was announced in November 2020.
Both Hall and Björnsson went into the fight with numerous accolades in strength athletics. Hall holds the title of 2017 World's Strongest Man and won UK's Strongest Man and Britain's Strongest Man multiple times. Björnsson holds the title of 2018 World's Strongest Man and has placed in the top three positions of the competition every year since 2012. He is also the 2018 World's Ultimate Strongman, 3 times in a row Arnold Strongman Classic champion, 5 times Europe's Strongest Man, 8 times Strongman Champions League champion, 9 times Giants Live champion, and 15 times Iceland's Strongest Man and Strongest Man in Iceland champion.
In 2016, Hall set a world record in deadlifting with 500 kg (~1102 lbs) at the 2016 Europe's Strongest Man competition. However, Björnsson deadlifted 501 kg (~1105 lbs) at the 2020 World's Ultimate Strongman - Feats of Strength series and established the current world record.
On 26 July 2 |
https://en.wikipedia.org/wiki/Dietary%20biology%20of%20the%20brown%20bear | The brown bear (Ursus arctos) is one of the most omnivorous animals in the world and has been recorded to consume the greatest variety of foods of any bear. Throughout life, this species is regularly curious about the potential of eating virtually any organism or object that they encounter. Certainly no other animal in their given ecosystems, short perhaps of other bear species and humans, can claim to feed on as broad a range of dietary opportunities. Food that is both abundant and easily obtained is preferred. Their jaw structure has evolved to fit their dietary habits. Their diet varies enormously throughout their differing areas based on opportunity. In spring, winter-provided carrion, grasses, shoots, sedges and forbs are the dietary mainstays for brown bears from almost every part of their distribution. Fruits, including berries, become increasingly important during summer and early autumn. Roots and bulbs become critical in autumn for some inland bear populations if fruit crops are poor. The dietary variability is illustrated in the western United States, as meat made up 51% of the average year-around diet for grizzly bears from Yellowstone National Park, while it made up only 11% of the year-around diet for grizzlies from Glacier National Park a few hundred miles to the north.
Plants and fungi
Despite their reputation, most brown bears are not highly carnivorous, as they derive up to 90% of their dietary food energy from vegetable matter. Brown bears often feed on a variety of plant life, including berries, grasses, flowers, acorns (Quercus ssp.) and pine cones as well as mosses and fungi such as mushrooms. In total, over 200 plant species have been identified in their foods. Arguably the most herbivorous diets have come from the warmer temperate parts of Eurasia as more than 90% of the diet may be herbivorous. These include countries and regions such as Spain, Slovakia, most of the Balkans including Greece, Turkey, the Himalayas and presumably the Middle E |
https://en.wikipedia.org/wiki/Bombenzielanlage | The Bombenzielanlage ("Bomb Target System"), sometimes referred to as the Bomb Ziel Automat (BZA), was a German World War II bombsight analog computer designed to calculate the precise release of bombs during dive-bombing. It was fitted to a number of aircraft types, including the Junkers Ju 88 and the Arado Ar 234. The unit controlled an aiming mark on sight in front of the pilot. The computer assessed the angle of dive, aircraft track, and altitude. The operator set other variables, such as barometric pressure, target altitude, airspeed and wind speed. During operation, the bomb(s) were released when an aiming mark coincided with the target.
Further reading
Photographs of BZA equipment: Images 18 to 23 in image gallery in Hollway, Don, 'The Battle of Graveney Marsh'. History Magazine. Feb/March 2019. http://www.donhollway.com/graveneymarsh/index.html Accessed 2020-04-20.
References
German bomber aircraft
Optical bombsights
World War II military equipment of Germany
Analog computers |
https://en.wikipedia.org/wiki/System%20of%20differential%20equations | In mathematics, a system of differential equations is a finite set of differential equations. Such a system can be either linear or non-linear. Also, such a system can be either a system of ordinary differential equations or a system of partial differential equations.
Linear system of differential equations
Like any system of equations, a system of linear differential equations is said to be overdetermined if there are more equations than the unknowns.
For an overdetermined system to have a solution, it needs to satisfy the compatibility conditions. For example, consider the system:
Then the necessary conditions for the system to have a solution are:
See also: Cauchy problem and Ehrenpreis's fundamental principle.
Non-linear system of differential equations
Perhaps the most famous example of a non-linear system of differential equations is the Navier–Stokes equations. Unlike the linear case, the existence of a solution of a non-linear system is a difficult problem (cf. Navier–Stokes existence and smoothness.)
See also: h-principle.
Differential system
A differential system is a means of studying a system of partial differential equations using geometric ideas such as differential forms and vector fields.
For example, the compatibility conditions of an overdetermined system of differential equations can be succinctly stated in terms of differential forms (i.e., a form to be exact, it needs to be closed). See integrability conditions for differential systems for more.
See also: :Category:differential systems.
Notes
See also
Integral geometry
Cartan–Kuranishi prolongation theorem
References
L. Ehrenpreis, The Universality of the Radon Transform, Oxford Univ. Press, 2003.
Gromov, M. (1986), Partial differential relations, Springer,
M. Kuranishi, "Lectures on involutive systems of partial differential equations" , Publ. Soc. Mat. São Paulo (1967)
Pierre Schapira, Microdifferential systems in the complex domain, Grundlehren der Math- ematischen Wissen |
https://en.wikipedia.org/wiki/Jellyfin | Jellyfin is a free and open-source media server and suite of multimedia applications designed to organize, manage, and share digital media files to networked devices. Jellyfin consists of a server application installed on a machine running Microsoft Windows, macOS, Linux or in a Docker container, and another application running on a client device such as a smartphone, tablet, smart TV, streaming media player, game console or in a web browser. Jellyfin also can serve media to DLNA and Chromecast-enabled devices. It is a fork of Emby.
Features
Jellyfin follows a client–server model that allows for multiple users and clients to connect, even simultaneously, and stream digital media remotely. Because Jellyfin runs as a fully self-contained server, there is no subscription-based consumption model that exists, and Jellyfin does not utilize an external connection nor third-party authentication for any of its functionality. This enables Jellyfin to work on an isolated intranet in much the same fashion as it does over the Internet. Because it shares a heritage with Emby, some clients for that platform are unofficially compatible with Jellyfin; however, as Jellyfin's codebase diverges from Emby, this becomes less possible. Jellyfin does not support a direct migration path from Emby.
Jellyfin is extensible, and optional third-party plugins exist to provide additional feature functionality. The project hosts an official repository, however plugins need not be hosted in the official repository to be installable.
One of the main advantages of Jellyfin is in the way it handles Live TV and TV tuners. While other media servers such as Plex has a hard limit on channel number (480 max), Jellyfin has no such limit.
Version 10.6.0 of the server software introduced a feature known as "SyncPlay", which provides functionality for multiple users to consume media content together in a synchronized fashion. Support to read epub ebooks with Jellyfin was also added. Also introduced is multi |
https://en.wikipedia.org/wiki/Doas | doas (“dedicated openbsd application subexecutor”) is a program to execute commands as another user. The system administrator can configure it to give specified users privileges to execute specified commands. It is free and open-source under the ISC license and available in Unix and Unix-like operating systems.
doas was developed by Ted Unangst for OpenBSD as a simpler and safer sudo replacement. Unangst himself had issues with the default sudo config, which was his motivation to develop doas.
doas was originally developed by Ted Unangst and was released with OpenBSD 5.8 in October 2015 replacing sudo. However, OpenBSD still provides sudo as a package.
Configuration
Definition of privileges should be written in the configuration file, /etc/doas.conf. The syntax used in the configuration file is inspired by the packet filter configuration file.
Examples
Allow user1 to execute procmap as root without password:
permit nopass user1 as root cmd /usr/sbin/procmap
Allow members of the wheel group to run any command as root:
permit :wheel as root
Simpler version (only works if default user is root (after install it is)):
permit :wheel
To allow members of wheel group to run any command (default as root) and remember that they entered the password:
permit persist :wheel
Ports and availability
Jesse Smith’s port of doas is packaged for DragonFlyBSD, FreeBSD, and NetBSD. According to the author, it also works on illumos and macOS. OpenDoas, a Linux port, is packaged for Debian, Alpine, Arch, CRUX, Fedora, Gentoo, GNU Guix, Hyperbola, Manjaro, Parabola, NixOS, Ubuntu, and Void Linux.
Starting with Alpine Linux v3.16 release, OpenDoas became the suggested replacement for sudo, which got its security maintenance time reduced within the distribution.
See also
sudo
runas
References
Computer security software
Unix software |
https://en.wikipedia.org/wiki/Colonial%20morphology | In microbiology, colonial morphology refers to the visual appearance of bacterial or fungal colonies on an agar plate. Examining colonial morphology is the first step in the identification of an unknown microbe. The systematic assessment of the colonies' appearance, focusing on aspects like size, shape, colour, opacity, and consistency, provides clues to the identity of the organism, allowing microbiologists to select appropriate tests to provide a definitive identification.
Procedure
When a specimen arrives in the microbiology laboratory, it is inoculated into an agar plate and placed in an incubator to encourage microbial growth. Because the appearance of microbial colonies changes as they grow, colonial morphology is examined at a specific time after the plate is inoculated. Usually, the plate is read at 18–24 hours post-inoculation, but times may differ for slower-growing organisms like fungi. The microbiologist examines the appearance of the colony, noting specific features such as size, colour, shape, consistency, and opacity. A hand lens or magnifying glass may be used to view colonies in greater detail.
The opacity of a microbial colony can be described as transparent, translucent, or opaque. Staphylococci are usually opaque, while many Streptococcus species are translucent. The overall shape of the colony may be characterized as circular, irregular, or punctiform (like pinpoints). The vertical growth or elevation of the colony, another identifying characteristic, is assessed by tilting the agar plate to the side and is denoted as flat, raised, convex, pulvinate (very convex), umbilicate (having a depression in the centre) or umbonate (having a bump in the centre). The edge of the colony may be separately described using terms like smooth, rough, irregular and filamentous. Bacillus anthracis is notable for its filamentous appearance, which is sometimes described as resembling Medusa's head.
Consistency is examined by physically manipulating the colony w |
https://en.wikipedia.org/wiki/Polygraphia%20Nova | Polygraphia nova et universalis ex combinatoria arte directa is a 1663 work by the Jesuit scholar Athanasius Kircher. It was one of Kircher's most highly regarded works and his only complete work on the subject of cryptography, although he made passing references to the topic elsewhere. The book was distributed as a private gift to selected European rulers, some of who also received an arca steganographica, a presentation chest containing wooden tallies used to encrypt and decrypt codes.
Background
Kircher reported that the origin of the work was a request from Holy Roman Emperor Ferdinand III to develop "a kind of lingua universalis" which would allow written communication between all peoples. The Emperor knew of the earlier secret communication system developed by Johannes Trithemius in his 1518 work Polygraphia, dedicated to the art of steganography, and wanted to know if such a system could be used to bridge different languages.
Systems of cryptography had been developed in Italy in late medieval times and by the 17th century many rulers employed cipher secretaries for diplomatic and other sensitive communication. The Thirty Years War gave rise to a range of scholarly publications summarising existing knowledge of the field, and there was a growing interest in the relationship between cryptography and linguistics. Emperors Ferdinand III and Leopold I, who ruled over empires speaking many different languages, were particularly interested in this field.
The Jesuit order played an important role in spreading the idea of mathematics as a kind of universal scientific language. As well as geometry and theoretical mathematics, Jesuit scholars worked on a number of applied projects, including calculating machines such as the one Kircher had designed and then described in his 1637 work Specula Melitensis Encyclica and the Organum Mathematicum he had built for Emperor Ferdinand III. By such means the Jesuits sought to cultivate court patronage and to strengthen and pro |
https://en.wikipedia.org/wiki/Bitsquatting | Bitsquatting is a form of cybersquatting which relies on bit-flip errors that occur during the process of making a DNS request. These bit-flips may occur due to factors such as faulty hardware or cosmic rays. When such an error occurs, the user requesting the domain may be directed to a website registered under a domain name similar to a legitimate domain, except with one bit flipped in their respective binary representations.
A 2011 Black Hat paper detailed an analysis where eight legitimate domains were targeted with thirty one bitsquat domains. Over the course of about seven months, 52,317 requests were made to the bitsquat domains.
References
Domain Name System
Types of cyberattacks
Network addressing
URL |
https://en.wikipedia.org/wiki/Independent%20Engineer%20Battalion%20%22Codru%22 | The Independent Engineer Battalion "Codru" () is the engineering formation of the Moldovan National Army, based in the village of Negrești, Strășeni District. Soldiers of the battalion soldiers have been on international missions, including the Kosovo Force mission in Kosovo.
History
The battalion was formed on 16 October 1992. It was created to assist the regular army during the Transnistrian War in the early 90's. It was the first unit of the National Army to be decorated by presidential decree with the state order "Faith of the Fatherland", class I. Members of the unit deployed to Iraq both in 2003 and 2008. The Moldovan Ministry of Defense reported that in 2013, the battalion were called 133 times to safely dispose over 1,800 pieces of ordnance. Since January 2014, it has safely removed 192 pieces of unexploded ordnance.
Mine clearance operations
In March 2014, in the town Ungheni, a construction crew unearthed one of the largest caches of unexploded anti-tank, anti-personnel and artillery shells ever found dating back to the Nazi occupation of Moldova. The city leadership immediately asked for assistance from the battalion, members of which were deployed to the location and safely removed and destroyed over 32 pieces of German munitions. This earned it praise from Mayor Alexandru Ambros.
In later 2018, sixty-six bombs were found and neutralized in the Hîncești District.
In April 2020, the battalion underwent a demining mission in Bălțați village where over 30 projectiles were liquidated by the engineers of the battalion after two children were seriously injured as a result of an explosion.
See also
Mine clearance organization
References
Military units and formations of Moldova
Civil engineering organizations
Military engineering
Organizations based in Moldova
1992 establishments in Moldova
Military units and formations established in 1992 |
https://en.wikipedia.org/wiki/Marine%20prokaryotes | Marine prokaryotes are marine bacteria and marine archaea. They are defined by their habitat as prokaryotes that live in marine environments, that is, in the saltwater of seas or oceans or the brackish water of coastal estuaries. All cellular life forms can be divided into prokaryotes and eukaryotes. Eukaryotes are organisms whose cells have a nucleus enclosed within membranes, whereas prokaryotes are the organisms that do not have a nucleus enclosed within a membrane. The three-domain system of classifying life adds another division: the prokaryotes are divided into two domains of life, the microscopic bacteria and the microscopic archaea, while everything else, the eukaryotes, become the third domain.
Prokaryotes play important roles in ecosystems as decomposers recycling nutrients. Some prokaryotes are pathogenic, causing disease and even death in plants and animals. Marine prokaryotes are responsible for significant levels of the photosynthesis that occurs in the ocean, as well as significant cycling of carbon and other nutrients.
Prokaryotes live throughout the biosphere. In 2018 it was estimated the total biomass of all prokaryotes on the planet was equivalent to 77 billion tonnes of carbon (77 Gt C). This is made up of 7 Gt C for archaea and 70 Gt C for bacteria. These figures can be contrasted with the estimate for the total biomass for animals on the planet, which is about 2 Gt C, and the total biomass of humans, which is 0.06 Gt C. This means archaea collectively have over 100 times the collective biomass of humans, and bacteria over 1000 times.
There is no clear evidence of life on Earth during the first 600 million years of its existence. When life did arrive, it was dominated for 3,200 million years by the marine prokaryotes. More complex life, in the form of crown eukaryotes, didn't appear until the Cambrian explosion a mere 500 million years ago.
Evolution
The Earth is about 4.54 billion years old. The earliest undisputed evidence of life on Eart |
https://en.wikipedia.org/wiki/Cybersecurity%20Maturity%20Model%20Certification | The Cybersecurity Maturity Model Certification (CMMC) is an assessment framework and assessor certification program designed to increase the trust in measures of compliance to a variety of standards published by the National Institute of Standards and Technology.
The CMMC framework and model was developed by Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)) of the United States Department of Defense through existing contracts with Carnegie Mellon University, The Johns Hopkins University Applied, Physics Laboratory LLC, and Futures, Inc. The Cybersecurity Maturity Model Certification Accreditation Body oversees the program under a no cost contract. The program is currently overseen by the DOD CIO office.
CMMC, which often requires third party assessment if a contractor handles Controlled Unclassified Information, will impact the $768bn Defense industry – 3.2% of the Gross Domestic Product of the United States of America.
The purpose of the CMMC is to verify that the information systems used by the contractors of the United States Department of Defense to process, transmit or store sensitive data is in compliant with the mandatory information security requirements. The goal is to ensure appropriate protection of controlled unclassified information (CUI) and federal contract information (FCI) that is stored and processed by partner or vendor.
Model
The framework provides a model for contractors in the Defense Industrial Base to meet the security requirements from NIST SP 800-171 Rev 2, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations. Some contracts will also include a subset of requirements from NIST SP 800–172, Enhanced Security Requirements for Protecting Controlled Unclassified Information: A Supplement to NIST Special Publication.
800–171.
CMMC organizes these practices into a set of domains, which map directly to the NIST SP 800-171 Rev 2 and NIST SP 800-172 families. There are three |
https://en.wikipedia.org/wiki/Biotic%20interchange | Biotic interchange is the process by which species from one biota invade another biota, usually due to the disappearance of a previously impassable barrier. These dispersal barriers can be physical, climatic, or biological and can include bodies of water or ice, land features like mountains, climate zones, or competition between species. Biotic interchange has been documented to occur in marine, freshwater, and terrestrial environments.
Causes
The general cause of a biotic interchange is the disappearance of a barrier that had been previously blocking the dispersal of species from two distinct biotas. The disappearance of a barrier could be from the closing of a sea, connecting two previously unconnected continents; the melting of glaciers, allowing for migration across newly exposed areas that had been covered by ice; from sea level change, covering a land bridge would allow for marine interchange, while revealing a land bridge would allow for terrestrial interchange; and, it could also be from changing ocean currents, allowing for larval dispersal to new territories.
Humans have also become a vector of biotic interchange. They have fragmented species habitat by blocking interchange in some regions. Yet, humans have also intentionally and unintentionally spread many non-native species around the globe. Climate change may also be impacting the effectiveness of natural dispersal barriers.
Effects
Sometimes an interchange can result in the extinction of some species. These species may go extinct due to the introduction of a predator that they are not adapted to, or due to more successful competition by invading species. However, invading species can coexist with native species for millions of years after an invasion. Sometimes invading species can also improve biodiversity by increasing genetic diversity.
Another effect of biotic interchange is homogenization. This occurs when many invading species from both biotas become established, creating one similar biota |
https://en.wikipedia.org/wiki/Dirt%205 | Dirt 5 is a simcade racing video game developed and published by Codemasters. The game was released for PlayStation 4, Windows, and Xbox One on 6 November 2020, for Xbox Series X/S on 10 November, and for PlayStation 5 on 12 November (for North America, Oceania, Japan, and South Korea) and 19 November (for most other regions), for Stadia on 24 March 2021, and for Luna on 15 July 2021. It was the last video game released by Codemasters as a publisher before acquired by Electronic Arts (EA) on 18 February 2021.
Gameplay
Dirt 5 is a racing game focused on off-road racing. Disciplines within the game include rallycross, ice racing, Stadium Super Trucks and off-road buggies. Players can compete in events in a wide range of locations, namely Arizona, Brazil, China, Greece, Italy, Morocco, Nepal, New York City, Norway and South Africa. The game includes a dynamic weather system and seasons, which affect the racing; for example, the player can only compete in ice racing events in New York during winter months. A four-player splitscreen system is also introduced into the game.
Dirt 5 also features a narrative-focused career mode that pits the player character against a rival driver called Bruno Durand (voiced by Nolan North) in a series of championships. The player also has a mentor called Alex “AJ” Janiček (voiced by Troy Baker) who provides them with advice throughout their career. The game was also not to feature a cinematic replay. Instead, the game would follow in a series of podcasts by Donut Media that follows the storyline.
Development and release
Dirt 5 was announced during the 2020 Xbox Games Showcase presentation. In addition to releasing on the PlayStation 4, Windows, and Xbox One platforms, it was available for the ninth generation of video game consoles PlayStation 5 and Xbox Series X. Xbox versions of the game support Microsoft's "Smart Delivery" program, which allows the player to purchase the Xbox One copy of the game and receive the Xbox Series X version |
https://en.wikipedia.org/wiki/Parallel%20Computers%2C%20Inc. | Parallel Computers, Inc. was an American computer manufacturing company, based in Santa Cruz, California, that made fault-tolerant computer systems based around the Unix operating system and various processors in the Motorola 68000 series.
History
The company was founded in 1983 and was premised on the idea of providing a less expensive alternative to existing fault-tolerant solutions, one that would be attractive to smaller businesses. Over time it received some $21 million of venture capital funding. Parallel Computers was part of a wave of technology companies that were based in that area during the 1980s, the Santa Cruz Operation being the most well-known of them. Parallel Computers was also one of a number of new companies focusing on fault-tolerant solutions that were inspired by the success of Tandem Computers. Other such companies included Encore Computer, Stratus Computer, Tolerant Systems, Sequoia Systems, Synapse Computer, Auragen Systems, No Halt Computers, Corinthian Systems, Enmasse, and Computer Consoles Inc.
Parallel Computers made systems that featured redundant hardware elements from processors and storage to power supplies, and that self-detected error situations. Their systems fit into the supermicrocomputer to minicomputer ranges in size. The difficulties of building fault-tolerant systems were considerable, however, including the unsuitability of Unix in that era for that purpose, and Parallel Systems like the other new companies in the space severely underestimated the engineering tasks involved. Significant product delays resulted as a consequence, as did layoffs, and Parallel Computers changed its chief executive during 1984.
By 1986 Parallel had some $6 million in annual sales and employed 40 people. However it had made fewer than a hundred sales, and one industry analyst surmised that the small business marketplace Parallel was targeting was often not sophisticated enough to recognize the value of fault-tolerant solutions. Mor |
https://en.wikipedia.org/wiki/Multisystem%20inflammatory%20syndrome%20in%20children | Multisystem inflammatory syndrome in children (MIS-C), or paediatric inflammatory multisystem syndrome (PIMS / PIMS-TS), or systemic inflammatory syndrome in COVID-19 (SISCoV), is a rare systemic illness involving persistent fever and extreme inflammation following exposure to SARS-CoV-2, the virus responsible for COVID-19. MIS-C has also been monitored as a potential, rare pediatric adverse event following COVID-19 vaccination. It can rapidly lead to medical emergencies such as insufficient blood flow around the body (a condition known as shock). Failure of one or more organs can occur. A warning sign is unexplained persistent fever with severe symptoms following exposure to COVID-19. Prompt referral to paediatric specialists is essential, and families need to seek urgent medical assistance. Most affected children will need intensive care.
All affected children have persistent fever. Other clinical features vary. The first symptoms often include acute abdominal pain with diarrhoea or vomiting. Muscle pain and general tiredness are frequent, and low blood pressure is also common. Symptoms can also include pink eye, rashes, enlarged lymph nodes, swollen hands and feet, and "strawberry tongue". Various mental disturbances are possible. A cytokine storm may take place, in which the child's innate immune system stages an excessive and uncontrolled inflammatory response. Heart failure is common. Clinical complications can include damage to the heart muscle, respiratory distress, acute kidney injury, and increased blood coagulation. Coronary artery abnormalities can develop (ranging from dilatation to aneurysms).
This life-threatening disease has proved fatal in under 2% of reported cases. Early recognition and prompt specialist attention are essential. Anti-inflammatory treatments have been used, with good responses being recorded for intravenous immunoglobulin (IVIG), with or without corticosteroids. Oxygen is often needed. Supportive care is key for treating clinica |
https://en.wikipedia.org/wiki/Two-tone%20testing | Two-tone testing is a means of testing electronic components and systems, particularly radio systems, for intermodulation distortion. It consists of simultaneously injecting two sinusoidal signals of different frequencies (tones) into the component or system. Intermodulation distortion usually occurs in active components like amplifiers, but can also occur in some circumstances in passive items such as cable connectors, especially at high power.
Measurement in two-tone testing is most commonly done by examining the output of the device under test (DUT) with a spectrum analyser with which intermodulation products can be directly observed. Sometimes this is not possible with complete systems and instead the consequences of intermodulation are observed. For instance, in a radar system the result of intermodulation might be the generation of false targets.
Rationale
An electronic device can be tested by applying a single frequency to its input and measuring the response at its output. If there is any non-linearity in the device, this will cause harmonic distortion at the output. This kind of distortion consists of whole-number multiples of the applied signal frequency, as well as the original frequency being present at the device output. Intermodulation distortion can produce outputs at other frequencies. The new frequencies created by intermodulation are the sum and difference of the injected frequencies and the harmonics of these. Intermodulation effects cannot be detected with single-tone testing, but they may be just as, or more undesirable than harmonic distortion depending on their frequency and level.
Two-tone testing can also be used to determine the discrimination of a radio receiver. That is, the ability of the receiver to distinguish between transmissions close in frequency.
Testing
Component testing
Circuit components such as amplifiers can be tested using the two-tone method with a test setup like that shown in the figure. Two signal gener |
https://en.wikipedia.org/wiki/%CE%91-Isomethyl%20ionone | α-Isomethyl ionone, also known as α-cetone, is a synthetically made and naturally occurring organic compound found in Brewer's yeasts or the species known as Saccharomyces cerevisiae. The compound is an isomer of methyl ionone. Alpha-isomethyl ionone can be colorless or pale-straw coloured liquid. Its primary scent is flowery and secondary scent is violet. It may also have a woody or orris-like scent. and is often used in flavouring and cosmetic industries for example, aftershave lotions, bath products, hair care products, moisturizers, perfumes, shampoos and skin care products. It is also an ingredient used in Chanel No. 5, and other branded products such as Fidji by Guy Laroche. Perfume fragrances that α-isomethyl ionone is used in are for example, amber, chypre, violet, mimosa, reseda, iris, orris, cyclamen, chypre, berries, woody notes, ylang-ylang, leather, orange, nut, pistachio, muscatel, and tobacco.
Properties
α-Isomethyl ionone would be classified as a norsesquiterpenoid, having 14 carbon atoms (1 less than the 15 of three consecutive isoprene units). It is an extremely weak base, the calculated pKa values within the molecule being 19.7 (strongest acidic) and -4.8 (strongest basic). The percentage of α-isomethyl ionone used in perfumes is approximately ranging from 0.1% to 11.9%, with an average of 1.1%. For example, it is usually used in conjunction with hydroxycitronellal, woody notes, copaiba, N-methyl ionone, ionone, or Vetiver.
Synthesis
The synthesis of α-isomethyl ionone involves a cross-aldol condensation of citral with methyl ethyl ketone A high temperature and strong alkali is used. The ratio between the n-form and iso-form is controlled in order to obtain methyl pseudo-ionone and allow ring formation to occur. Iso-forms is then synthesized consequently.
References
Perfume ingredients
Flavors
Enones
Cyclohexenes |
https://en.wikipedia.org/wiki/German%20Army%20cryptographic%20systems%20of%20World%20War%20II | German Army cryptographic systems of World War II were based on the use of three types of cryptographic machines that were used to encrypt communications between units at the division level. These were the Enigma machine, the teleprinter cipher attachment (Lorenz cipher), and the cipher teleprinter the Siemens and Halske T52, (Siemens T-43). All were considered insecure.
Introduction
Machine ciphers
The first cipher attachment, the () SZ-40 original mode was introduced into the Army, probably in 1940, although Erich Hüttenhain, a cryptographer assigned to the Cipher Department of the High Command of the Wehrmacht (OKW/Chi), stated that the Army had been experimenting with this type of cryptographic apparatus from as early as 1937. It was replaced by the SZ-40 regular mode and this was succeeded by the SZ-42a and SZ-42b, both developed by Werner Liebknecht, Erich Hüttenhain and Fritz Menzer. The SZ-42c was also developed and 30 or 40 test sets built but the apparatus was evidently not used.
The (), the first cipher teleprinter, T-52a, was introduced in 1939. Newer models were versions T-52c, T-52d and T-52e were in use. The one-time tape cipher teleprinter designated the SFM T-43 was developed in 1943 and introduced in 1944. The machine was theoretically unbreakable, if the key tape was truly random. However, the key tape was pseudo random as it was generated by the T-52e, and therefore insecure.
Hand Ciphers
The German Army used hand ciphers below division level. The manually operated hand systems of the Army that were used between 1939 and 1942 were listed by Erich Hüttenhain as follows:
A monoalphabetic type substitution using a keyword mixed alphabet in a 5 x 5 square
A comb-transposition ()
A book key ()
A double Transposition cipher () 4-S-40 This system was used until 1926 or 1927
The Playfair cipher in Single Playfair () (TS-42)
The Double Playfair () Message Cypher 42 (NS-42)
In 1942, Walter Fricke of the General der Nachrichtenaufklärung, decl |
https://en.wikipedia.org/wiki/TEM-function | In petroleum engineering, TEM (true effective mobility), also called TEM-function developed by Abouzar Mirzaei-Paiaman, is a criterion to characterize dynamic two-phase flow characteristics of rocks (or dynamic rock quality). TEM is a function of relative permeability, porosity, absolute permeability and fluid viscosity, and can be determined for each fluid phase separately. TEM-function has been derived from Darcy's law for multiphase flow.
in which is the absolute permeability, is the relative permeability, φ is the porosity, and μ is the fluid viscosity.
Rocks with better fluid dynamics (i.e., experiencing a lower pressure drop in conducting a fluid phase) have higher TEM versus saturation curves. Rocks with lower TEM versus saturation curves resemble low quality systems.
TEM-function in analyzing relative permeability data is analogous with Leverett J-function in analyzing capillary pressure data. Furthermore, TEM-function in two-phase flow systems is an extension of RQI (rock quality index) for single-phase systems.
Also, TEM-function can be used for averaging relative permeability curves (for each fluid phase separately, i.e., water, oil, gas, ).
See also
Lak wettability index
USBM wettability index
References
Petroleum engineering |
https://en.wikipedia.org/wiki/Carpology | Carpology is a discipline of botany devoted to the study of seeds and fruits. The German inventor Joseph Gaertner, an 18th century doctor and botanist, dedicated his life to the study of natural history. He considered its inventor. When the discipline is applied to archaeological remains, it is known as paleocarpology, which in turn is located within paleobotanical science.
Carpology pursues two objectives: to reconstruct the evolution of a certain plant species; and to recreate the landscape and, thus, its flora and fauna.
Carpology data is considered "auxiliary" for fields such as archeology. Among other things, carpology can distinguish between indigenous seeds and those that have been domesticated for human cultivation. Landscape flora can be extrapolated.
Numerous research centers host carpology departments. France, the United Kingdom, the Netherlands, Belgium or Germany are the European states with the longest history of this discipline. Teams are dedicated to carpology also in Spain and Italy.
Teams carry out research in places such as Syria, Lebanon, Algeria, or Tunisia. This work linked to archeology by exploiting carpological materials.
References
External links
ALONSO i MARTINEZ, N., De la llavor a la farina: els processos agrícoles protohistòrics a la Catalunya occidental, Monographies d'archéologie méditerranéenne 4, Lattes, Association pour la recherche archéologique en Languedoc oriental, 1999
BUXÓ, R. y PIQUÉ, R., La recogida de muestras en arqueobotánica: objetivos y propuestas metodológicas, Museu d’Arqueologia de Catalunya, Barcelona, 2003.
BUXÓ, R., Arqueología de las plantas. La explotación económica de las semillas las frutas en el marco mediterráneo de la Península Ibérica, Crítica, Barcelona, 1997.
BUXÓ, R; MOLIST, M. (dir.), From the adoption of Agriculture to the Current Landscape: long term interaction between Men and Environment in the East Mediterranean Basin, European project ICA3-CT-2002-10022, Monografies 9, Museu d’Arqueol |
https://en.wikipedia.org/wiki/Geometry%20From%20Africa | Geometry From Africa: Mathematical and Educational Explorations is a book in ethnomathematics by . It analyzes the mathematics behind geometric designs and patterns from multiple African cultures, and suggests ways of connecting this analysis with the mathematics curriculum. It was published in 1999 by the Mathematical Association of America, in their Classroom Resource Materials book series.
Background
The book's author, Paulus Gerdes (1952–2014), was a mathematician from the Netherlands who became a professor of mathematics at the Eduardo Mondlane University in Mozambique, rector of Maputo University, and chair of the African Mathematical Union Commission on the History of Mathematics in Africa. He was a prolific author, especially of works on the ethnomathematics of Africa. However, as many of his publications were written in Portuguese, German, and French, or published only in Mozambique, this book makes his work in ethnomathematics more accessible to English-speaking mathematicians.
Topics
The book is heavily illustrated, and describes geometric patterns in the carvings, textiles, drawings and paintings of multiple African cultures. Although these are primarily decorative rather than mathematical, Gerdes adds his own mathematical analysis of the patterns, and suggests ways of incorporating this analysis into the mathematical curriculum.
It is divided into four chapters. The first of these provides an overview of geometric patterns in many African cultures, including examples of textiles, knotwork, architecture, basketry, metalwork, ceramics, petroglyphs, facial tattoos, body painting, and hair styles. The second chapter presents examples of designs in which squares and right triangles can be formed from elements of the patterns, and suggests educational activities connecting these materials to the Pythagorean theorem and to the theory of Latin squares. For instance, basket-weavers in Mozambique form square knotted buttons out of folded ribbons, and the resul |
https://en.wikipedia.org/wiki/Mining%20Research%20and%20Development%20Establishment | The Mining Research and Development Establishment was a British government mining research centre in south Derbyshire. It is now a commercial business park.
History
The Mining Research Establishment in west London was formed in 1951. It merged with the Central Engineering Establishment to form the MRDE in 1969.
Awards
It won the Queens Award for Technological Achievement in 1991 for its extraction drum for dust and frictional ignition control.
Structure
The site was on the south side of the A511 in the south of Derbyshire.
See also
Coal Research Establishment
References
Coal mining in the United Kingdom
Engineering research institutes
Mining engineering
Mining organizations
Science and technology in Derbyshire
South Derbyshire District |
https://en.wikipedia.org/wiki/Blackmer%20gain%20cell | The Blackmer gain cell is an audio frequency voltage-controlled amplifier (VCA) circuit with an exponential control law. It was invented and patented by David E. Blackmer between 1970 and 1973. The four-transistor core of the original Blackmer cell contains two complementary bipolar current mirrors that perform log-antilog operations on input voltages in a push-pull, alternating fashion. Earlier log-antilog modulators using the fundamental exponential characteristic of a p–n junction were unipolar; Blackmer's application of push-pull signal processing allowed modulation of bipolar voltages and bidirectional currents.
The Blackmer cell, which has been manufactured since 1973, is the first precision VCA circuit that was suitable for professional audio. As early as the 1970s, production Blackmer cells achieved control range with total harmonic distortion of no more than 0.01% and very high compliance with ideal exponential control law. The circuit was used in remote-controlled mixing consoles, signal compressors, microphone amplifiers, and dbx noise reduction systems. In the 21st century, the Blackmer cell, along with Douglas Frey's Operational Voltage Controlled Element (OVCE), remains one of two integrated VCA topologies that are still widely used in studio and stage equipment.
Development and applications
In the 1960s, American recording studios adopted multitrack recording. Narrow tracks of multitrack recorders were noisier than wide tracks of their predecessors; mixing down many narrow tracks further degraded the signal-to-noise ratio of master tapes. Mixing became a complex process requiring the precisely timed operation of numerous controls and faders, which were too numerous to operate manually. These problems of early multitrack studios created a demand for professional-grade noise reduction and console automation. At the core of both of these functions was the voltage-controlled amplifier (VCA).
The earliest solid-state VCA topology was an attenuator |
https://en.wikipedia.org/wiki/QST%20%28genetics%29 | In quantitative genetics, QST is a statistic intended to measure the degree of genetic differentiation among populations with regard to a quantitative trait. It was developed by Ken Spitze in 1993. Its name reflects that QST was intended to be analogous to the fixation index for a single genetic locus (FST). QST is often compared with FST of neutral loci to test if variation in a quantitative trait is a result of divergent selection or genetic drift, an analysis known as QST–FST comparisons.
Calculation of QST
Equations
QST represents the proportion of variance among subpopulations, and is it’s calculation is synonymous to FST developed by Sewall Wright. However, instead of using genetic differentiation, QST is calculated by finding the variance of a quantitative trait within and among subpopulations, and for the total population. Variance of a quantitative trait among populations (σ2GB) is described as:
And the variance of a quantitative trait within populations (σ2GW) is described as:
Where σ2T is the total genetic variance in all populations. Therefore, QST can be calculated with the following equation:
Assumptions
Calculation of QST is subject to several assumptions: populations must be in Hardy-Weinberg Equilibrium, observed variation is assumed to be due to additive genetic effects only, selection and linkage disequilibrium are not present, and the subpopulations exist within an island model.
QST-FST comparisons
QST–FST analyses often involve culturing organisms in consistent environmental conditions, known as common garden experiments, and comparing the phenotypic variance to genetic variance. If QST is found to exceed FST, this is interpreted as evidence of divergent selection, because it indicates more differentiation in the trait than could be produced solely by genetic drift. If QST is less than FST, balancing selection is expected to be present. If the values of QST and FSTare equivalent, the observed trait differentiation could be due to geneti |
https://en.wikipedia.org/wiki/Deformed%20Hermitian%20Yang%E2%80%93Mills%20equation | In mathematics and theoretical physics, and especially gauge theory, the deformed Hermitian Yang–Mills (dHYM) equation is a differential equation describing the equations of motion for a D-brane in the B-model (commonly called a B-brane) of string theory. The equation was derived by Mariño-Minasian-Moore-Strominger in the case of Abelian gauge group (the unitary group ), and by Leung–Yau–Zaslow using mirror symmetry from the corresponding equations of motion for D-branes in the A-model of string theory.
Definition
In this section we present the dHYM equation as explained in the mathematical literature by Collins-Xie-Yau. The deformed Hermitian–Yang–Mills equation is a fully non-linear partial differential equation for a Hermitian metric on a line bundle over a compact Kähler manifold, or more generally for a real -form. Namely, suppose is a Kähler manifold and is a class. The case of a line bundle consists of setting where is the first Chern class of a holomorphic line bundle . Suppose that and consider the topological constant
Notice that depends only on the class of and . Suppose that . Then this is a complex number
for some real and angle which is uniquely determined.
Fix a smooth representative differential form in the class . For a smooth function write , and notice that . The deformed Hermitian Yang–Mills equation for with respect to is
The second condition should be seen as a positivity condition on solutions to the first equation. That is, one looks for solutions to the equation such that . This is in analogy to the related problem of finding Kähler-Einstein metrics by looking for metrics solving the Einstein equation, subject to the condition that is a Kähler potential (which is a positivity condition on the form ).
Discussion
Relation to Hermitian Yang–Mills equation
The dHYM equations can be transformed in several ways to illuminate several key properties of the equations. First, simple algebraic manipulation shows that the dHYM |
https://en.wikipedia.org/wiki/Marine%20protists | Marine protists are defined by their habitat as protists that live in marine environments, that is, in the saltwater of seas or oceans or the brackish water of coastal estuaries. Life originated as marine single-celled prokaryotes (bacteria and archaea) and later evolved into more complex eukaryotes. Eukaryotes are the more developed life forms known as plants, animals, fungi and protists. Protists are the eukaryotes that cannot be classified as plants, fungi or animals. They are mostly single-celled and microscopic. The term protist came into use historically as a term of convenience for eukaryotes that cannot be strictly classified as plants, animals or fungi. They are not a part of modern cladistics because they are paraphyletic (lacking a common ancestor for all descendants).
Most protists are too small to be seen with the naked eye. They are highly diverse organisms currently organised into 18 phyla, but not easy to classify. Studies have shown high protist diversity exists in oceans, deep sea-vents and river sediments, suggesting large numbers of eukaryotic microbial communities have yet to be discovered. There has been little research on mixotrophic protists, but recent studies in marine environments found mixotrophic protists contribute a significant part of the protist biomass. Since protists are eukaryotes (and not prokaryotes) they possess within their cell at least one nucleus, as well as organelles such as mitochondria and Golgi bodies. Many protist species can switch between asexual reproduction and sexual reproduction involving meiosis and fertilization.
In contrast to the cells of prokaryotes, the cells of eukaryotes are highly organised. Plants, animals and fungi are usually multi-celled and are typically macroscopic. Most protists are single-celled and microscopic. But there are exceptions. Some single-celled marine protists are macroscopic. Some marine slime molds have unique life cycles that involve switching between unicellular, colonial, and |
https://en.wikipedia.org/wiki/Blackmer%20RMS%20detector | The Blackmer RMS detector is an electronic true RMS converter invented by David E. Blackmer in 1971. The Blackmer detector, coupled with the Blackmer gain cell, forms the core of the dbx noise reduction system and various professional audio signal processors developed by dbx, Inc.
Unlike earlier RMS detectors that time-averaged algebraic square of input signal, the Blackmer detector performs time-averaging on the logarithm of the input, being the first successful, commercialized instance of log-domain filter. The circuit, created by trial and error, computes root mean squared of various waveforms with high precision, although exact nature of its operation was not known to the inventor. First mathematical analysis of log-domain filtering and mathematical proof of Blackmer's invention were proposed by Robert Adams in 1979; general log-domain filter synthesis theory was developed by Douglas Frey in 1993.
Operation
Root mean square (RMS), defined as the square root of the mean square of input signal over time, is a useful metric of alternating currents. Unlike peak value or average value, RMS is directly related to energy, being equivalent to the direct current that would be required to get the same heating effect. In audio applications, RMS is the only metric directly related to perceived loudness, being insensitive to the phase of harmonics in complex waveforms. Magnetic recording and playback inevitably shifts phases of harmonics; a true RMS converter will not react to such phase shift. Simpler peak detectors or average detectors, on the contrary, respond to changes in phase with changing output values, although energy level and loudness remain unchanged. For this reason David Blackmer, designer of dbx noise reduction system, needed a cost-efficient precision RMS detector compatible with the Blackmer gain cell. The latter had an exponential control characteristic, so a suitable detector had to have logarithmic output.
Contemporary electronic RMS detectors had " |
https://en.wikipedia.org/wiki/Bridgeland%20stability%20condition | In mathematics, and especially algebraic geometry, a Bridgeland stability condition, defined by Tom Bridgeland, is an algebro-geometric stability condition defined on elements of a triangulated category. The case of original interest and particular importance is when this triangulated category is the derived category of coherent sheaves on a Calabi–Yau manifold, and this situation has fundamental links to string theory and the study of D-branes.
Such stability conditions were introduced in a rudimentary form by Michael Douglas called -stability and used to study BPS B-branes in string theory. This concept was made precise by Bridgeland, who phrased these stability conditions categorically, and initiated their study mathematically.
Definition
The definitions in this section are presented as in the original paper of Bridgeland, for arbitrary triangulated categories. Let be a triangulated category.
Slicing of triangulated categories
A slicing of is a collection of full additive subcategories for each such that
for all , where is the shift functor on the triangulated category,
if and and , then , and
for every object there exists a finite sequence of real numbers and a collection of triangles
with for all .
The last property should be viewed as axiomatically imposing the existence of Harder–Narasimhan filtrations on elements of the category .
Stability conditions
A Bridgeland stability condition on a triangulated category is a pair consisting of a slicing and a group homomorphism , where is the Grothendieck group of , called a central charge, satisfying
if then for some strictly positive real number .
It is convention to assume the category is essentially small, so that the collection of all stability conditions on forms a set . In good circumstances, for example when is the derived category of coherent sheaves on a complex manifold , this set actually has the structure of a complex manifold itself.
Technical remarks about stability co |
https://en.wikipedia.org/wiki/Perimeter%2081 | Perimeter 81 is an Israeli cloud and network security company that develops secure remote networks, based on the zero trust architecture, for organizations. Its technology replaces legacy security appliances like VPNs and firewalls.
Since 2023, Perimeter 81 has been owned by the American-Israeli multinational cybersecurity company Check Point.
History
The company was founded in 2018 by Sagi Gidali and Amit Bareket, founders of SaferVPN which was acquired by J2 Global. The SaferVPN network infrastructure, which was developed over six years, served as the basis for Perimeter 81's initial product development.
Based in Tel Aviv, Israel, it raised 19.5 million dollars in three funding rounds during 2019–2020, including investments from USA's SonicWall (Francisco Partners), Toba Capital and Israel's Spring Ventures. In August 2020, two months after raising funds at 100 million dollars valuation, it completed a $40 million Series B financing round at a company valuation of $160 million.
In June 2022 it completed a Series C financing round led by the USA's B Capital fund, with the participation of Insight Partners, Entree Capital, Toba Capital and ION Crossover Ventures. It has raised $100 million, at a $1b valuation, becoming a unicorn. The company has over 2,500 clients, among them Fortune 500 companies, as well as small and medium-sized enterprises.
In August 2023, it was reported that the company would be acquired for $490 million by Check Point. The following month, the American-Israeli cybersecurity company announced that it had completed the purchase of Perimeter 81.
Technology
The company develops a converged networking and security cloud edge delivered in a software as a service model. It offers global gateway deployment and multi-tenant management, allowing the distributed workforce to securely access company resources, whether these are located in the cloud or on-premises.
The platform intends to replace the traditional vpn service with a firewall as a |
https://en.wikipedia.org/wiki/International%20Cytokine%20%26%20Interferon%20Society | The International Cytokine & Interferon Society (ICIS) is a non-profit organization composed of researchers of cytokines, interferons and chemokine cell biology, molecular biology, biochemistry, and the use of biological response modifiers clinically. As the premier organization in the field of cytokine biology, it has more than 950 member scientists. Katherine A. Fitzgerald is the current president of the society.
History
Originally founded in 1988 as "The International Cytokine Society" (ICS), after having co-hosted annual meetings with the International Society for Interferon and Cytokine Research (ISICR), the two organizations merged to become the ICIS in 2013.
Journal
The ICIS manages Cytokine, a peer-reviewed scientific journal covering all aspects of cytokine biology. The journal was established in 1989 and is now published by Elsevier.
Milstein award
Each year the society selects a recipient of the Seymour & Vivian Milstein Award for excellence in interferon and cytokine research.
References
External links
Official website
Cell biology
Non-profit organizations based in the United States
Cytokines |
https://en.wikipedia.org/wiki/AI%20Song%20Contest | The AI Song Contest () is an international music competition for songs that have been composed using artificial intelligence (AI). The inaugural edition took place on 12 May 2020 and was organised by the Dutch public broadcaster VPRO, in collaboration with NPO 3FM and NPO Innovation. Since 2021, the contest has been held as part of an annual conference organised by the Belgian technology hub Wallifornia MusicTech.
Format
The format of the competition was created by the Dutch programme creator Karen van Dijk (VPRO) and was inspired by the Eurovision Song Contest. Participating teams are tasked with the composition of a song using artificial intelligence. Each submission is then evaluated by a jury, which assesses the use of AI in the songwriting process, and by the public, which assesses the quality of the song through online ratings. The winner of the contest is the entry with the highest overall score.
Unlike the Eurovision Song Contest, countries can be represented by multiple teams. While the 2020 edition only allowed teams from "Eurovision countries" to compete, this rule was dropped in 2021 to allow teams from outside Europe and Australia to enter as well. In addition, entries would no longer be judged for their suitability for the Eurovision Song Contest, and the maximum song length was extended from three to four minutes. In 2022, a semi-final was introduced in which the jury selected fifteen entries to advance to the final.
Past editions
Awards and nominations
See also
Algorithmic composition
Computer music
Music and artificial intelligence
Pop music automation
References
External links
Official website
2020 establishments in the Netherlands
Artificial intelligence art
Computer music
Recurring events established in 2020
Song contests |
https://en.wikipedia.org/wiki/AI%20Song%20Contest%202020 | The AI Song Contest 2020 was the inaugural edition of the AI Song Contest, organised by the Dutch public broadcaster VPRO, in collaboration with NPO 3FM and NPO Innovation. It was held on 12 May 2020 in the Netherlands and was presented by Lieven Scheire. Thirteen teams from eight countries participated in the contest. The contest was won by Uncanny Valley from Australia with the song "Beautiful the World".
Format
Each participating team had to submit a "Eurovision-like" song of up to three minutes that had been composed using artificial intelligence (AI). Human input was allowed, but the more AI was used, the more points the entry would get from the jury. The entries were also evaluated by the public through online ratings. The winner was announced in a live show on 12 May 2020.
Presenter and spokespersons
The live show was hosted by Belgian comedian Lieven Scheire. The points from the online voting were announced by Dutch television presenter Emma Wortelboer, who had been the Netherlands' spokesperson for the Eurovision Song Contest 2019. Dutch composer and AI researcher Vincent Koops revealed the points awarded by the jury.
Expert panel
The jury consisted of three AI experts, who assessed each entry based on the use of artificial intelligence in the songwriting process:
Vincent Koops (RTL Nederland)
Anna Huang (Google Brain)
Ed Newton-Rex (ByteDance)
Competing entries
The live show took place on 12 May 2020 at 20:30 CEST and was broadcast via a live stream on YouTube. As there were no pre-qualifying rounds, multiple teams from each country could enter the competition. The contest featured the following competing entries:
See also
Eurovision Song Contest 2020
Eurovision: Europe Shine a Light
External links
Official website
References
2020 in the Netherlands
2020 song contests
Artificial intelligence art
Computer music
May 2020 events in the Netherlands |
https://en.wikipedia.org/wiki/Phage-assisted%20continuous%20evolution | Phage-assisted continuous evolution (PACE) is a phage-based technique for the automated directed evolution of proteins. It relies on relating the desired activity of a target protein with the fitness of an infectious bacteriophage which carries the protein's corresponding gene. Proteins with greater desired activity hence confer greater infectivity to their carrier phage. More infectious phage propagate more effectively, selecting for advantageous mutations. Genetic variation is generated using error-prone polymerases on the phage vectors, and over time the protein accumulates beneficial mutations. This technique is notable for performing hundreds of rounds of selection with minimal human intervention.
Principle
The central component of PACE is a fixed-volume vessel known as the “lagoon”. The lagoon contains M13 bacteriophage vectors carrying the gene of interest (known as the selection plasmid, or SP), as well as host E. coli cells that allow the phage to replicate. The lagoon is constantly diluted via the addition and draining of liquid media containing E. coli cells. The liquid flow rate is set such that the dilution rate is faster than the rate of E. coli reproduction but slower than the rate of phage reproduction. Hence, a fresh supply of E. coli cells is constantly present in the lagoon, but phage can only be retained via sufficiently fast replication.
Phage replication requires E. coli infection, which, for M13 phage, relies on protein III (pIII). When using PACE, the phage vectors lack the gene to produce pIII. Instead, the production of pIII is tied with the activity of the protein of interest via a mechanism that varies per use case, oftentimes involves an extra plasmid containing the pIII-expressing gene III (gIII) known as the accessory plasmid, or AP. Notably, production of infectious phage scales with the production of pIII. Hence, the better the activity of the protein, the higher the rate of pIII production, and the more infectious phage are gene |
https://en.wikipedia.org/wiki/Xanadu%20Quantum%20Technologies | Xanadu Quantum Technologies is a Canadian quantum computing hardware and software company headquartered in Toronto, Ontario. The company develops cloud accessible photonic quantum computers and develops open-source software for quantum machine learning and simulating quantum photonic devices.
History
Xanadu was founded in 2016 by Christian Weedbrook and was a participant in the Creative Destruction Lab's accelerator program. Since then, Xanadu has raised a total of US$245M in funding with venture capital financing from Bessemer Venture Partners, Capricorn Investment Group, Tiger Global Management, In-Q-Tel, Business Development Bank of Canada, OMERS Ventures, Georgian, Real Ventures, Golden Ventures and Radical Ventures and innovation grants from Sustainable Development Technology Canada and DARPA.
Technology
Xanadu's hardware efforts have been focused on developing programmable Gaussian boson sampling (GBS) devices. GBS is a generalization of boson sampling, which traditionally uses single photons as an input; GBS uses squeezed states of light. In 2020, Xanadu published a blueprint for building a fault-tolerant quantum computer using photonic technology.
In June 2022 Xanadu reported on a boson sampling experiment summing up to those of Google and University of Science and Technology of China (USTC). Their setup used loops of optical fiber and multiplexing to replace the network of beam splitters by a single one which made it also more easily reconfigurable. They detected a mean of 125 to 219 photons from 216 squeezed modes (squeezed light follows a photon number distribution so they can contain more than one photon per mode) and claimed to have obtained a speedup 50 million times bigger than previous experiments.
References
External links
Official website
2016 establishments in Ontario
Quantum computing
Photonics
Photonics companies
Quantum information science
Companies involved in quantum computing |
https://en.wikipedia.org/wiki/Mechanical%20Workshops%20Wilhelm%20Albrecht | The Mechanical Workshops Wilhelm Albrecht (MWA) () were founded in 1926 by the innovator, engineer, and entrepreneur, Wilhelm Albrecht in Berlin-Tempelhof. The logo he designed became an internationally known trademark for complete device systems for image-synchronous sound recording and processing in film and television studios since the 1950s.
History of MWA
Early years
Initially, the company developed and produced kits for radio receivers and supplied them to end users, subsequently – in advanced versions - to industrial radio manufacturers such as Blaupunkt.
In 1936, the company moved to larger premises at Juliusstrasse in Berlin's Neukölln district. In the following years, development and manufacturing concentrated on equipment for communication technology. In 1944, the factory was partially damaged by a bomb attack.
The first post-war years
In the remaining workshops and with the inventory of materials and machinery saved after the end of the war, items for everyday’s use at that time were manufactured (e. g. tobacco cutting machines). In addition, repairs of damaged industrial equipment were carried out.
Entry into film sound engineering
In this context, Albrecht came into contact with remaining companies of the Berlin film industry. As early as 1946, MWA received an order from Berlin-based Kaudel-Film to design and manufacture an optical sound camera (LTK 1) and other devices for sound recording and processing of feature films in sync with the picture. In addition, the company developed and manufactured stationary and portable sound mixing consoles for film studios.
However, Albrecht soon realized that the future of film sound recording and processing would not be the optical sound technology that had been used until then, but the magnetic sound process, which had already been experimented with in the USA. He developed the first magnetic film sound device in Europe, the so-called magnetic sound camera (MTK 1).
Development from 1950
At the begin |
https://en.wikipedia.org/wiki/XL-413 | XL-413 is a drug which acts as a selective inhibitor of the enzyme cell division cycle 7-related protein kinase (CDC7). It is being researched for the treatment of some forms of cancer, and also has applications in genetic engineering.
References
Experimental cancer drugs
Enzyme inhibitors
Genetic engineering |
https://en.wikipedia.org/wiki/DigitaOS | DigitaOS was a short lived digital camera operating system created by Flashpoint Technology and used on various Kodak, Pentax, and HP cameras in the late 1990s. DigitaOS debuted with the Kodak DC220 on 20 May 1998, and was released on a total of 11 camera models before it was abandoned in 2001. DigitaOS was notable for its ability to run third party software, a concept that was not again realized until the release of various Android based digital cameras in the early 2010s.
DigitaOS applications were programmed either as JIT compiled scripts using "Digita Script", or AOT compiled programs written in C using an official SDK. The operating system abstracted away most camera functionality and hardware platform differences, allowing software to be compatible with most DigitaOS cameras. Additionally, DigitaOS handled the GUI presented to the user and basic camera functionality.
Because of its ability to run third party software, several games were ported to it. The most notable of these being DOOM and MAME.
Cameras using DigitaOS
Kodak DC220
Kodak DC260
Kodak DC265
Kodak DC290
Minolta Dimage 1500 EX
Minolta 1500 3D
HP C500 Photosmart
HP C618 Photosmart
HP C912 Photosmart
PENTAX EI-200
PENTAX EI-2000
References
1998 software
Discontinued operating systems |
https://en.wikipedia.org/wiki/Bump%20and%20hole | The bump-and-hole method is a tool in chemical genetics for studying a specific isoform in a protein family without perturbing the other members of the family. The unattainability of isoform-selective inhibition due to structural homology in protein families is a major challenge of chemical genetics. With the bump-and-hole approach, a protein–ligand interface is engineered to achieve selectivity through steric complementarity while maintaining biochemical competence and orthogonality to the wild type pair. Typically, a "bumped" ligand/inhibitor analog is designed to bind a corresponding "hole-modified" protein. Bumped ligands are commonly bulkier derivatives of a cofactor of the target protein. Hole-modified proteins are recombinantly expressed with an amino acid substitution from a larger to smaller residue, e.g. glycine or alanine, at the cofactor binding site. The designed ligand/inhibitor has specificity for the engineered protein due to steric complementarity, but not the native counterpart due to steric interference.
History
Inspiration for the bump-and-hole method was drawn from mutant E. coli strains which carried an A294S mutant version of phenylalanine tRNA synthetase and survived exposure to p-FluoroPhe, a slightly bumped phenylalanine analog which is cytotoxic when incorporated in translation. The A294S mutant strain was able to incorporate Phe, but not the bumped p-FluoroPhe due to steric crowding from the hydroxymethylene of S294. Later work in the labs of Peter G. Schultz and David A. Tirrell showed that a hole-modified A294G phenylalanine tRNA synthetase mutant was able to incorporate the bumped p-FluoroPhe in translation, demonstrating that steric manipulation can successfully broaden substrate scope, even for the highly specific aminoacyl synthetase.
The first bump-and-hole pair, developed by Stuart Schreiber and colleagues, was a bumped cyclosporin A small-molecule with an Ile replacing Val at position 11, and a hole-modified (S99T/F113A) cyclo |
https://en.wikipedia.org/wiki/Anna%20Caulfield%20McKnight | Anna Caulfield McKnight (born Cascade, Michigan, November 22, 1866; died Grand Rapids, Michigan, June 18, 1947) was an American traveler, lecturer on art and travel, club woman, woman suffragist, and businesswoman. Her oratory and magic lantern slides taken on her travels made her a well-known lecturer in her time.
Early life
McKnight was born the daughter of John Caulfield (1838-1919), a prosperous Irish immigrant in Grand Rapids, Michigan, and his wife Esther Egan (1844-1923). The oldest of seven children, she was educated at Sacred Heart Academy in Detroit and the "Harvard Annex" (soon to be Radcliffe College) in Cambridge, Massachusetts. At the Harvard Annex she studied art history with scholar Charles Eliot Norton, who encouraged her to study in Europe. In 1892 she left for Europe, where she studied with archaeologist Giovanni Battista de Rossi and spent four years travelling.
Early lectures
Anna gave her first lectures after joining the Grand Rapids Ladies' Literary Club after her graduation from Sacred Heart Academy; friends suggested that she pursue lecturing as a career, and she went to the Harvard Annex with that in mind. In Europe she gave lectures and pursued material of interest, meeting with Pope Leo XIII for example (she later met Pope Benedict XV and Pope Pius XI). On her return to the United States, she lectured widely at institutions such as the Brooklyn Institute of Arts and Sciences, the Chicago Art Institute, and Vassar College; her lecture at the French embassy in Washington, DC so impressed President William Howard Taft that he invited Anna and her mother to visit him at his summer home on Lake Champlain. She also spoke at the 1898 biennial meeting of the General Federation of Women's Clubs in Denver, Colorado. She was appointed a member of the Fine Arts department at the Paris Exposition, 1900 by United States Commissioner-General Ferdinand Peck.
Married life
On August 20, 1907 Anna married Grand Rapids lawyer and businessman William F. M |
https://en.wikipedia.org/wiki/The%20Mathematics%20of%20Chip-Firing | The Mathematics of Chip-Firing is a textbook in mathematics on chip-firing games and abelian sandpile models. It was written by Caroline Klivans, and published in 2018 by the CRC Press.
Topics
A chip-firing game, in its most basic form, is a process on an undirected graph, with each vertex of the graph containing some number of chips. At each step, a vertex with more chips than incident edges is selected, and one of its chips is sent to each of its neighbors. If a single vertex is designated as a "black hole", meaning that chips sent to it vanish, then the result of the process is the same no matter what order the other vertices are selected. The stable states of this process are the ones in which no vertex has enough chips to be selected; two stable states can be added by combining their chips and then stabilizing the result. A subset of these states, the so-called critical states, form an abelian group under this addition operation. The abelian sandpile model applies this model to large grid graphs, with the black hole connected to the boundary vertices of the grid; in this formulation, with all eligible vertices selected simultaneously, it can also be interpreted as a cellular automaton. The identity element of the sandpile group often has an unusual fractal structure.
The book covers these topics, and is divided into two parts. The first of these parts covers the basic theory outlined above, formulating chip-firing in terms of algebraic graph theory and the Laplacian matrix of the given graph. It describes an equivalence between states of the sandpile group and the spanning trees of the graph, and the group action on spanning trees, as well as similar connections to other combinatorial structures, and applications of these connections in algebraic combinatorics. And it studies chip-firing games on other classes of graphs than grids, including random graphs.
The second part of the book has four chapters devoted to more advanced topics in chip-firing. The firs |
https://en.wikipedia.org/wiki/Anna%20Ridler | Anna Ridler (born 1985) is an artist and researcher who lives and works in London. She works with collections of information or data, particularly self-generated data sets, to create new and unusual narratives in a variety of mediums.
Her work has been exhibited widely at cultural institutions including the Victoria and Albert Museum, Tate Modern, Barbican Centre, Centre Pompidou, The Photographers' Gallery, ZKM Center for Art and Media Karlsruhe, and Ars Electronica.
Biography
Born in London in 1985, Ridler spent her childhood raised between Atlanta, Georgia and the United Kingdom. She obtained a Bachelor of Arts in English Literature and Language from Oxford University in 2007 and a Master of Arts in Information Experience Design from the Royal College of Art in 2017.
Art
A core element of Ridler's work lies in the creation of handmade data sets through a laborious process of selecting and classifying images and text. By creating her own data sets, Ridler is able to uncover and expose underlying themes and concepts while also inverting the usual process of scraping pre-classified images found in large databases on the internet. Her interests are in drawing, machine learning, data collection, storytelling, and technology.
Selected works
Some of Anna Ridler's most notable works to date fall within her ‘tulip series’ which explores the hysteria around tulip mania and compares it to the speculation and bubbles surrounding cryptocurrencies. The series is expressed in three forms: a photographic dataset in Myriad (Tulips), 2018; two iterations of machine generated videos in Mosaic Virus (2018) and Mosaic Virus (2019); and a website with an accompanied functioning decentralized application in Bloemenveiling (2019).
Myriad (Tulips) (2018)
Myriad (Tulips) (2018) is an installation of ten thousand hand-labeled photographs forming a dataset of unique tulips. The ten thousand, or myriad of, photographs were taken by Ridler over the course of three months, roughly the |
https://en.wikipedia.org/wiki/Touch%20%27n%20Go%20eWallet | Touch 'n Go eWallet is a Malaysian digital wallet and online payment platform, established in Kuala Lumpur, Malaysia, in July 2017 as a joint venture between Touch 'n Go and Ant Financial. It allows users to make payments at over 280,000 merchant touch points via QR code; pay for tolls, street parking, payment on e-hailing, car-sharing apps or taxis via RFID or PayDirect; pay bills; top-up mobile prepaid; pay for purchases on e-commerce websites or apps; order food delivery; perform peer-to-peer money transfers; renew car insurance and purchase unique insurance plans; and purchase movie, bus, trains, and airline tickets.
Background
Before their e-wallet service was established, Touch 'n Go provided contactless card payments that allowed users in Malaysia to pay for toll roads, public transportation, and parking lots, and also allowed them to make purchases in retail stores.
Touch 'n Go has previously ventured into mobile payment through a partnership with Maxis via FastTap in 2009. It allowed Maxis customers to make payments with their Touch 'n Go technology integrated into their feature phones. The payment system utilized near-field communication (NFC), which allowed users to make payments by tapping the mobile phone to card readers, which also support physical credit, debit, and Touch 'n Go cards. Only one feature phone device was supported: the Nokia 6212 Classic. According to SoyaCincau, the service was not widely adopted by customers, and the poor reception meant that the service was generally regarded as unsuccessful.
In July 2012, Touch 'n Go announced a collaboration with CIMB and Maxis to create an NFC-based online transaction service, which can be used on NFC-enabled smartphones and allow users to make payments via NFC.
Before the partnership with Ant Financial, Touch 'n Go had originally released its e-wallet application in February 2017, which was called Touch 'n Go Wallet. It utilized QR code technology to make payments instead of relying on the NFC |
https://en.wikipedia.org/wiki/Sherpa.ai | Sherpa (also known as Sherpa.ai) is a Spanish artificial intelligence company specializing in predictive conversational digital assistants. It was founded by Xabi Uribe-Etxebarria in 2012 and is based in Erandio and Silicon Valley. In 2018, Fortune magazine included Sherpa in its ranking of the 100 best artificial intelligence companies.
Trajectory
The company was created in 2012 with the conviction to develop a predictive conversational digital assistant based on artificial intelligence algorithms for different companies and to provide consultancy in artificial intelligence. They are based in Erandio (Vizcaya, Spain) and Silicon Valley (California, United States), and are a ISO/IEC 27001 certified company.
In 2016, they obtained $6.5 million in a round of funding from Mundi Ventures and other private investors. In a second round in 2019, they obtained $8.5 million; and in 2021, they secured an additional $8.5 million in funding from Mundi Ventures, Ekarpen, Marcelo Gigliani of Apax Digital, and Alex Cruz of British Airways.
Products
Sherpa's first product was a mobile phone application of the same name. Their products are predictive conversational digital assistants that learn from the user's context to anticipate their needs. Sherpa uses 100,000 parameters from each user to answer requests. Additionally, they have developed a multi-purpose recommendation system for news, music, and filtering important emails.
Among their products are free applications for smartphones and tablets such as Sherpa Assistant and Sherpa News which have garnered over 3 million downloads. Sherpa also came pre-installed on Samsung smartphones as the default digital assistant, until Samsung Electronics launched Bixby.
Focused on business services, their AI assistants and operating systems are embedded in cars, smartphones, home speakers, and appliances. Sherpa also has agreements with companies such as Porsche and Samsung.
Work team
By 2018, Sherpa had 35 employees, most of whom we |
https://en.wikipedia.org/wiki/Lysn | Lysn () was a Korean mobile application created by South Korean company Dear U exclusively for SM Entertainment. The application specializes in artist-to-fan communications and fan club memberships through subscription. Initially launched in 2018, it gained popularity when it introduced the Bubble in February 2020 while expanding its service through the participation of other entertainment companies. Kwangya Club then replaced the application after its termination on July 20, 2022.
Development
SM Entertainment launched its fan community service, Lysn, in 2018. While the proprietary platform is free to use, it is also available for paid fan club membership, where one can have more interactive features and, at the same time, receive a membership box. Announcements, news, events, fan-signing events, music program schedules, and cheering posts of SM's artists are available at the platform. In February 2020, SM launched a service called Dear U Bubble, where it gained immense popularity when it added reply functions and "strengthened" the nature of mobile messengers. On the platform, fans can chat with artists and pay a charge to access Bubble content with a separate charge for each content they subscribe to. Moreover, artists can directly upload unreleased photos and utilize a coded messaging system while also reading and responding to message from numerous fans at once. According to an SM spokesperson, "The contactless platform makes it possible for artists to directly communicate with the fans without any time and space constraints". SM terminated the application's community service on July 20, 2022, and transferred its functions to Kwangya Club.
Features and tools
Bubble service
Bubble is a paid service by Lysn provided by SM Entertainment's Dear U where by paying 4,500 won per month, users can reply by receiving messages, photos, and videos sent by artists. Additionally, it offers a Dear U Bubble service that allows artists and fans to communicate. The service |
https://en.wikipedia.org/wiki/Matchbox%20Educable%20Noughts%20and%20Crosses%20Engine | The Matchbox Educable Noughts and Crosses Engine (sometimes called the Machine Educable Noughts and Crosses Engine or MENACE) was a mechanical computer made from 304 matchboxes designed and built by artificial intelligence researcher Donald Michie in 1961. It was designed to play human opponents in games of noughts and crosses (tic-tac-toe) by returning a move for any given state of play and to refine its strategy through reinforcement learning.
Michie did not have a computer readily available, so he worked around this restriction by building it out of matchboxes. The matchboxes used by Michie each represented a single possible layout of a noughts and crosses grid. When the computer first played, it would randomly choose moves based on the current layout. As it played more games, through a reinforcement loop, it disqualified strategies that led to losing games, and supplemented strategies that led to winning games. Michie held a tournament against MENACE in 1961, wherein he experimented with different openings.
Following MENACE's maiden tournament against Michie, it demonstrated successful artificial intelligence in its strategy. Michie's essays on MENACE's weight initialisation and the BOXES algorithm used by MENACE became popular in the field of computer science research. Michie was honoured for his contribution to machine learning research, and was twice commissioned to program a MENACE simulation on an actual computer.
Origin
Donald Michie (1923–2007) had been on the team decrypting the German Tunny Code during World War II. Fifteen years later, he wanted to further display his mathematical and computational prowess with an early convolutional neural network. Since computer equipment was not obtainable for such uses, and Michie did not have a computer readily available, he decided to display and demonstrate artificial intelligence in a more esoteric format and constructed a functional mechanical computer out of matchboxes and beads.
MENACE was constructed |
https://en.wikipedia.org/wiki/Ordered%20topological%20vector%20space | In mathematics, specifically in functional analysis and order theory, an ordered topological vector space, also called an ordered TVS, is a topological vector space (TVS) X that has a partial order ≤ making it into an ordered vector space whose positive cone is a closed subset of X.
Ordered TVS have important applications in spectral theory.
Normal cone
If C is a cone in a TVS X then C is normal if , where is the neighborhood filter at the origin, , and is the C-saturated hull of a subset U of X.
If C is a cone in a TVS X (over the real or complex numbers), then the following are equivalent:
C is a normal cone.
For every filter in X, if then .
There exists a neighborhood base in X such that implies .
and if X is a vector space over the reals then also:
There exists a neighborhood base at the origin consisting of convex, balanced, C-saturated sets.
There exists a generating family of semi-norms on X such that for all and .
If the topology on X is locally convex then the closure of a normal cone is a normal cone.
Properties
If C is a normal cone in X and B is a bounded subset of X then is bounded; in particular, every interval is bounded.
If X is Hausdorff then every normal cone in X is a proper cone.
Properties
Let X be an ordered vector space over the reals that is finite-dimensional. Then the order of X is Archimedean if and only if the positive cone of X is closed for the unique topology under which X is a Hausdorff TVS.
Let X be an ordered vector space over the reals with positive cone C. Then the following are equivalent:
the order of X is regular.
C is sequentially closed for some Hausdorff locally convex TVS topology on X and distinguishes points in X
the order of X is Archimedean and C is normal for some Hausdorff locally convex TVS topology on X.
See also
References
Functional analysis
Order theory
Topological vector spaces |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.