source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/NPZ%20model
An NPZ model is the most basic abstract representation, expressed as a mathematical model, of a pelagic ecosystem which examines the interrelationships between quantities of nutrients, phytoplankton and zooplankton as time-varying states which depend only on the relative concentrations of the various states at the given time. One goal in pelagic ecology is to understand the interactions among available nutrients (i.e. the essential resource base), phytoplankton and zooplankton. The most basic models to shed light on this goal are called nutrient-phytoplankton-zooplankton (NPZ) models. These models are a subset of Ecosystem models. Example An unrealistic but instructive example of an NPZ model is provided in Franks et al. (1986) (FWF-NPZ model). It is a system of ordinary differential equations that examines the time evolution of dissolved and assimilated nutrients in an ideal upper water column consisting of three state variables corresponding to amounts of nutrients (N), phytoplankton (P) and zooplankton (Z). This closed system model is shown in the figure to the right which also shows the "flow" directions of each state quantity. These interactions, assumed to be spatial homogeneous (and thus is termed a "zero-dimensional" model) are described in general terms as follows This NPZ model can now be cast as a system of first order differential equations: where the parameters and variables are defined in the table below along with nominal values for a "standard environment" An example of a 60 day sequence for the values shown is depicted in the figure to the right. Each state is color coded (Nutrient – black, Phytoplankton – green and Zooplankton – blue). Note that the initial nutrient concentration is rapidly consumed resulting in a phytoplankton bloom until the zooplankton begin aggressive grazing around day 10. Eventually both populations drop to a very low level and a high nutrient concentration remains. In the next section more sophistication is a
https://en.wikipedia.org/wiki/Vertical%20banner
The written traditional Chinese characters for vertical banners are "直幡", and the horizontal counterpart, horizontal banners, are written as "横額" in traditional Chinese. Introduction English-language banners are often horizontally written, but because Chinese characters are traditionally written vertically and are read from top to bottom, Chinese characters on banners are often vertically scripted. Normally, smaller vertical banners in Hong Kong are used as election campaign material or as advertisement tactic. One may also see them hung on street lamps as celebratory decoration occasionally. Use as protest banners During mass protests and demonstrations dozens, and sometimes, hundreds, of Hong Kong protest marchers would hold up long banners horizontally so onlookers from high-rise buildings can see the words from above. In general, Cantonese characters and written Chinese are both used in these vertical protest banners. On the other hand, while most of these vertical protest banners were written in traditional Chinese characters, occasionally simplified Chinese, a product created by Communist China since the Cultural Revolution in 1949, are used in these protest banners for their negative connotations and cynical association with Communist China. In Hong Kong, with its native tongue being Cantonese and native written language being traditional Chinese characters, the controversy over traditional and simplified Chinese can be easily detected on these vertical protest banners. While banners, large and small, vertical and horizontal, have been used throughout Hong Kong since as early as 1967, and most frequently during the annual Tienanmen Square Massacre march and vigil since 1989, it was the Umbrella Movement of 2014 marked the beginning of the uniquely Hong Kong hill-top vertical protest banners movement. A group of rock climbing activists decided to unfurl a 30-meter vertical protest banner on Lion Rock and document their descent on YouTube. At the time, e
https://en.wikipedia.org/wiki/Dartmouth%20Oversimplified%20Programming%20Experiment
DOPE, short for Dartmouth Oversimplified Programming Experiment, was a simple programming language designed by John Kemény in 1962 to offer students a transition from flow-charting to programming the LGP-30. Lessons learned from implementing DOPE were subsequently applied to the invention and development of BASIC. Description Each statement was designed to correspond to a flowchart operation and consisted of a numeric line number, an operation, and the required operands: 7 + A B C 10 SIN X Z The final variable specified the destination for the computation. The above program corresponds in functionality to the later BASIC program: DOPE might be the first programming language to require every statement to have a line number, predating JOSS and BASIC. The language was case insensitive. Variable names were a single letter A to Z, or a letter followed by a digit (A0 to Z9). As with Fortran, different letters represented different variable types. Variables starting with letters A to D were floating point, as were variables from I to Z; variables E, F, G, and H each were defined as vectors with components from 1 to 16. The language was used by only one freshman computing class. Kemeny collaborated with high school student Sidney Marshall (taking freshman calculus) to develop the language. Legacy According to Thomas Kurtz, a co-inventor of BASIC, "Though not a success in itself, DOPE presaged BASIC. DOPE provided default vectors, default printing formats, and general input formats. Line numbers doubled as jump targets." The language had a number of other features and innovations that were carried over into BASIC: Variable names were either a letter or a letter followed by a digit Arrays (vectors) did not have to be declared and had a default size (16 instead of 10) Every line required a numeric label* Lines were sorted in numeric order* Every line begin with a keyword* Function names were three letters long* The only loop construct was a for-loop Unlike ei
https://en.wikipedia.org/wiki/California%20Privacy%20Rights%20Act
The California Privacy Rights Act of 2020 (CPRA), also known as Proposition 24, is a California ballot proposition that was approved by a majority of voters after appearing on the ballot for the general election on November 3, 2020. This proposition expands California's consumer privacy law and builds upon the California Consumer Privacy Act (CCPA) of 2018, which established a foundation for consumer privacy regulations. The proposition enshrines more provisions in California state law, allowing consumers to prevent businesses from sharing their personal data, correct inaccurate personal data, and limit businesses' usage of "sensitive personal information", which includes precise geolocation, race, ethnicity, religion, genetic data, private communications, sexual orientation, and specified health information. The Act creates the California Privacy Protection Agency as a dedicated agency to implement and enforce state privacy laws, investigate violations, and assess penalties of violators. The Act also removes the set time period in which businesses can correct violations without penalty, prohibits businesses from holding onto personal data for longer than necessary, triples the maximum fines for violations involving children under the age of 16 (up to $7,500), and authorizes civil penalties for the theft of specified login information. The California Privacy Rights Act took effect on January 1, 2023, applying to personal data collected on or after January 1, 2022. The law cannot be repealed by the state legislature, and any amendments made by the legislature must be “consistent with and further the purpose and intent” of the Act. Background The initiative represents an expansion of provisions first laid out by the California Consumer Privacy Act. In addition to the consumer protections, the proposition creates the California Privacy Protection Agency. The agency will share consumer privacy oversight and enforcement duties with the California Department of Justic
https://en.wikipedia.org/wiki/Barzilai-Borwein%20method
The Barzilai-Borwein method is an iterative gradient descent method for unconstrained optimization using either of two step sizes derived from the linear trend of the most recent two iterates.  This method, and modifications, are globally convergent under mild conditions, and perform competitively with conjugate gradient methods for many problems. Not depending on the objective itself, it can also solve some systems of linear and non-linear equations. Method To minimize a convex function with gradient vector at point , let there be two prior iterates, and , in which where is the previous iteration's step size (not necessarily a Barzilai-Borwein step size), and for brevity, let and . A Barzilai-Borwein (BB) iteration is where the step size is either [long BB step] , or [short BB step] . Barzilai-Borwein also applies to systems of equations for in which the Jacobian of is positive-definite in the symmetric part, that is, is necessarily positive. Derivation Despite its simplicity and optimality properties, Cauchy's classical steepest-descent method for unconstrained optimization often performs poorly. This has motivated many to propose alternate search directions, such as the conjugate gradient method. Jonathan Barzilai and Jonathan Borwein instead proposed new step sizes for the gradient by approximating the quasi-Newton method, creating a scalar approximation of the Hessian estimated from the finite differences between two evaluation points of the gradient, these being the most recent two iterates. In a quasi-Newton iteration, where is some approximation of the Jacobian matrix of (i.e. Hessian of the objective function) which satisfies the secant equation . Barzilai and Borwein simplify with a scalar , which usually cannot exactly satisfy the secant equation, but approximate it as . Approximations by two least-squares criteria are: [1] Minimize with respect to , yielding the long BB step, or [2] Minimize with respect to , yielding t
https://en.wikipedia.org/wiki/Richard%20Lary
Richard F. "Richie" Lary (born 1948, Brooklyn) is the RL of the PDP-8 RL Monitor System, which subsequently became MS/8. Years later, while working for Digital Equipment Corporation, he was also involved with other DEC hardware and software, including "principal architect for OS/8" and "working on the VAX architecture." Biography He graduated from Stuyvesant High School in 1965, along with ; they both were on the school's Math Team and "later wound up working on the VAX architecture." They were $2/hour summertime Fortran programmers in 1965, using an IBM 1130. Lary left DEC in 2000, forming a company he and his wife Ellen Lary, also a former DEC employee, named TuteLary. References Stuyvesant High School alumni People from Brooklyn 1948 births Living people Computer hardware engineers Digital Equipment Corporation people
https://en.wikipedia.org/wiki/Static%20Context%20Header%20Compression
Static Context Header Compression (SCHC) is a standard compression and fragmentation mechanism defined in the IPv6 over LPWAN working group at the IETF. It offers compression and fragmentation of IPv6/UDP/CoAP packets to allow their transmission over the Low-Power Wide-Area Networks (LPWAN). Compression scheme tailored to LPWAN About LPWAN Low-Power Wide-Area Network (LPWAN) gathers the connectivity technologies tailored for Internet of Things (IoT), allowing for: long-range communication (up to 40 km), very low energy consumption (on the device side), and energy efficiency (for networks). The trade-off for achieving these features includes severe limitation in terms of throughput and packet size supported. Also, LPWAN come with limitations on transmission modalities since, in order to save battery, devices are dormant most of the time and wake up only episodically to transmit and receive data for a short time window. As a result, the LPWAN use their specific protocols, each adapted to their own specificities. Most importantly, they cannot carry IPv6, which was designed to allocate addresses to the billions of IoT connected devices. IETF compression standards In the early 2000s, the IETF produced the first wave of mature standards for compression and fragmentation: RoHC (Robust Header Compression) in 2001, and 6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks) in 2007. Yet, these compression schemes cannot fit the LPWAN specificities. SCHC associates the benefits of the RoHC context, which provides high flexibility in the fields processing, and of the 6LoWPAN operations to avoid transiting fields that are known by the other side. SCHC compression SCHC takes advantage of the LPWAN characteristics (no routing, highly predictable traffic format and content of messages) to reduce the overhead to a few bytes and save network traffic. The SCHC compression is based on the notion of context. A context is a set of rules that describes the commu
https://en.wikipedia.org/wiki/Cryopreservation%20of%20testicular%20tissue
Cryopreservation of testicular tissue is an experimental method being used to preserve fertility in pre-pubescent males, or males who cannot produce sperm, to allow them the option of having biological children. Current first line treatment for fertility maintenance in men undergoing treatment which damages testicular tissue is cryopreservation of sperm. In boys yet to start producing sperm this is not possible, so cryopreservation of testicular tissue has been proposed as alternative therapy. This method is still experimental and not widely clinically available, and how to restore fertility with cryopreserved tissue is unknown and experimental. Indications One cause of infertility in males is the medical treatment used to treat cancer (chemotherapy or radiotherapy), as it can have a toxic effect on the sperm producing tissue in the testes. For prepubertal boys undergoing cancer treatment who haven’t yet begun producing sperm, preservation of sperm itself is not an option. Instead, cryopreservation of testicular tissue prior to cancer treatment can be offered to preserve fertility. This is available in a limited number of research centres. Later in life, if the affected individual decides they want biological children, their tissue can be retrieved from a tissue bank. Another cause of male infertility is Klinefelter syndrome. This is a chromosomal abnormality (XY individual with extra X chromosomes) which causes germ cell loss early in life. Current research suggests that cryopreserving testicular tissue for prepubertal individuals can have promising results for using the tissue to produce sperm later in life, but is less likely to be effective if the testicular tissue is taken from older individuals. In the future, cryopreservation of testicular tissue has the potential to be used to help transgender women have children. Again, in a scenario where a transgender women begins transitioning before spermarche (the beginning of sperm production, on average at 13.
https://en.wikipedia.org/wiki/Primordial%20germ%20cell%20migration
Primordial germ cell (PGC) migration is the process of distribution of primordial germ cells throughout the embryo during embryogenesis. Process Primordial germ cells are among the first lineages that are established in development and they are the precursors for gametes. It is thought that the process of primordial germ cell migration itself has been conserved rather than the specific mechanisms within it, as chemoattraction and repulsion seem to have been borrowed from blood cells, neurones, and the mesoderm. For most organisms, PGC migration starts in the posterior (back end) of the embryo. This process is in most cases distinct from PGC proliferation, with the exception of mammals in which both processes occur at the same time. In most mammals, specification occurs first, followed by migration, and then the proliferation process begins in the gonads. PGCs interact with a wide range of cell types as they move from the epiblast to the gonads. The PGCs move passively (without the need for energy) with underlying somatic cells, cross epithelial barriers, and respond to cues from their environment during active migration. An epithelium must be crossed in many species during germ cell migration, and changes in adhesion are observed in PGCs during their exit from the endoderm and during the initiation of active migration. Active migration takes place as PGCs move towards the developing somatic gonad. Effective migration requires cell elongation and polarity. Environmental guidance cues are required for the PGCs to initiate and sustain their mobility. Specific molecular pathways are activated to give PGCs motility. Function One of the functions of PGC migration is to allow them to reach the gonad, where they will go on to form sperm or oocytes. However, an additional function that this migration is thought to serve is as quality control for PGCs. Migration occurs early in gametogenesis, but PGCs could contain defects that could have a negative impact on later develo
https://en.wikipedia.org/wiki/Lion%20algorithm
Lion algorithm (LA) is one among the bio-inspired (or) nature-inspired optimization algorithms (or) that are mainly based on meta-heuristic principles. It was first introduced by B. R. Rajakumar in 2012 in the name, Lion’s Algorithm.. It was further extended in 2014 to solve the system identification problem. This version was referred as LA, which has been applied by many researchers for their optimization problems. Inspiration from lion’s social behaviour Lions form a social system called a "pride", which consists of 1–3 pair of lions. A pride of lions shares a common area known as territory in which a dominant lion is called as territorial lion. The territorial lion safeguards its territory from outside attackers, especially nomadic lions. This process is called territorial defense. It protects the cubs till they become sexually matured. The maturity period is about 2–4 years. The pride undergoes survival fights to protect its territory and the cubs from nomadic lions. Upon getting defeated by the nomadic lions, the dominating nomadic lion takes the role of territorial lion by killing or driving out the cubs of the pride. The lioness of the pride give birth to cubs though the new territorial lion. When the cubs of the pride mature and considered to be stronger than the territorial lion, they take over the pride. This process is called territorial take-over. If territorial take-over happens, either the old territorial lion, which is considered to be laggard, is driven out or it leaves the pride. The stronger lions and lioness form the new pride and give birth to their own cubs Terminology In the LA, the terms that are associated with lion’s social system are mapped to the terminology of optimization problems. Few of such notable terms are related here. Lion: A potential solution to be generated or determined as optimal (or) near-optimal solution of the problem. The lion can be a territorial lion and lioness, cubs and nomadic lions that represent the solution
https://en.wikipedia.org/wiki/Quadratic%20Fourier%20transform
In mathematical physics and harmonic analysis, the quadratic Fourier transform is an integral transform that generalizes the fractional Fourier transform, which in turn generalizes the Fourier transform. Roughly speaking, the Fourier transform corresponds to a change of variables from time to frequency (in the context of harmonic analysis) or from position to momentum (in the context of quantum mechanics). In phase space, this is a 90 degree rotation. The fractional Fourier transform generalizes this to any angle rotation, giving a smooth mixture of time and frequency, or of position and momentum. The quadratic Fourier transform extends this further to the group of all linear symplectic transformations in phase space (of which rotations are a subgroup). More specifically, for every member of the metaplectic group (which is a double cover of the symplectic group) there is a corresponding quadratic Fourier transform. References Fourier analysis Integral transforms Time–frequency analysis
https://en.wikipedia.org/wiki/List%20of%20marsupials%20by%20population
This is a list of estimated global populations of Marsupials species. This list is not comprehensive, as not all Marsupials have had their numbers quantified. See also Lists of organisms by population Lists of mammals by population Lists of elephant species by population References Mammals Marsupials Marsupials
https://en.wikipedia.org/wiki/MACD%20operations
MACD operations are basic actions (Move, Add, Change, Delete) taken by computer network or telecom service agents in the support of hardware and services. It can also refer to the "hours" spent and billed doing those kinds of support tasks. See also Call center Customer service Technical support References Computer networks Telecommunications
https://en.wikipedia.org/wiki/Boiled%20fish
Boiled fish, or more precisely salt-boiled fish, is fish boiled with salt and thus preserved for later consumption. Although this method is used in other parts of the world, it is of major commercial significance only in Southeast Asia. The shelf life of products so treated can range from as little as one or two days, up to several months. In Indonesia, this fish preservation method is known as pindang. Preservation method The technique works to preserve fish through both exposure to high temperatures and the high temperature of boiling water kills microbes that might otherwise decompose the fish flesh while the application of salt directly promotes preservation. This technique is especially prevalent in the tropics during monsoon season, since the torrential rains hinder the simpler and traditional salting and sun-drying method of preservation. This salted fish method is considered 'dry preservation', while the Pindang method is often called 'wet preservation'. After being covered in coarse salt, the fish are boiled on a low flame until the liquids are evaporated and the salt seasoning is well absorbed into fish. The wet boiling method requires less salt than dry preservation, and thus the taste is not as salty as that of sun-dried salted fish. Although the basic ingredients often involve only fish, water, and salt, other ingredients, especially spices or herbs that contains tannin, can be added to boost preservation effectiveness. Examples of sources of tannin used include turmeric, tamarind, shallot skin, teak leaves, guava leaves, tea, and soy sauce, as well as other spices common in Southeast Asia. Including tannins gives the food a yellowish to brown color and fish so treated will last longer than fish preserved via the plain boiled method. Regional variation In Indonesia, various boiled fish products are generally known as pindang, and the method of preparation is often described as 'Indonesian salt-boiled fish'. See also Cured fish Fish processing Fi
https://en.wikipedia.org/wiki/Project%20Negin
Negin () is the tentative title of an upcoming class of warship designed by Iran, unveiled in November 2019. The design of the vessel resembles littoral combat ship (LCS) in the American terminology, though Iranians have identified it as a 'heavy destroyer'. Design and construction The vessels in the class are to displace between 5,000 and 7,000 tons, according to what Iranian officials told press in November 2019. In April 2020, Iran announced that the design phase has been concluded and the construction of the lead ship will begin shortly. Analyses The project is described as an attempt to improve blue-water capabilities of the Islamic Republic of Iran Navy, by Farzin Nadimi of The Washington Institute for Near East Policy. Military journalist David Axe is skeptical that Iran can build such a warship. See also List of naval ship classes of Iran List of military equipment manufactured in Iran References Ship classes of the Islamic Republic of Iran Navy Military projects
https://en.wikipedia.org/wiki/Film%20industry%20and%20video%20game%20industry
The film industry and video game industry have a long and detailed common history – the two industries have collaborated many times since the 1980s. This includes collaboration between people from both industries and projects resulting in products such as video games, film adaptations of video games, among other things. History 1980s Video games have also been adapted into films, beginning in the early 1980s. Films closely related to the video game industries were done in this time, such as Tron and Cloak & Dagger, but only after the release of several films based on well-known brands has this genre become recognized in its own right. Video game films can take several forms, such as traditionally animated films based on the Pokémon, or computer-animated such as Final Fantasy: The Spirits Within. There exist Original Video Animations (OVAs) based on popular games such as Dead Space: Downfall, Halo Legends, Dante's Inferno: An Animated Epic which may be released direct-to-video. 1990s The 10th Planet which was scheduled to be released in October 1997 was canceled. The game was a collaboration between Bethesda Softworks and Centropolis Entertainment (film production company founded by Roland Emmerich and Dean Devlin). Christopher Weaver, the founder of Bethesda was introduced to Devlin and Emmerich through mutual friends. In 1993, Super Mario Bros. was released, a film loosely based on the Mario video game series by Nintendo. The film was poorly received by critics. Steven Spielberg proposed the concept for the first Medal of Honor video game in the spring of 1997. 2000s In 2000, Lionsgate CEO and Vice Chairman at the time Jon Feltheimer as well as Dean Devlin joined ZeniMax Media as company advisors. Also that year, Sam Simon joined ZeniMax as President of e-Nexus Studios. In 2002, Vin Diesel formed his own development studio, Tigon Studios. In October 2005, Steven Spielberg and Electronic Arts partnered to develop 3 video games. In December 2007, Jerry B
https://en.wikipedia.org/wiki/A.E.%20%28video%20game%29
A.E. (sometimes shown unpunctuated as AE) is a fixed shooter written by Jun Wada and Makoto Horai for the Apple II and Atari 8-bit family and published by Broderbund in 1982. Versions for the VIC-20 (1983) and MSX (1984) followed. Unlike most earlier shooters which have a solid color or starfield as a background, the action in A.E. takes place in front of science fiction scenes. Attacking creatures emerge from points in the image, often appearing to come from behind objects. Combined with a slight scaling as they advance, there is the impression of depth. According to the back of the box, "A.E. is the Japanese word for 'ray' as in Manta Ray or Sting Ray", robotic versions of which are enemies in the game. Gameplay The player's ship can be moved left and right along the bottom of the screen. The fire button launches a missile upward which detonates when the button is released. Development Broderbund partnered with Japanese developer Programmers-3 for several games, and A.E. was the first of these. According to Broderbund co-founder Doug Carlston, the Atari 8-bit version of A.E. was the first Atari computer game written in Japan. Reception Arnie Katz wrote for Arcade Express: "The swirling flightpaths of the attackers as they zoom hither and yon around the eight playscreens is the principal feature that distinguishes 'A.E.' from the usual run of invasion games." He pointed out that the images the game is played over have little bearing on gameplay. Citing a satisfying difficulty balance, Katz concluded with a score of 8/10. Computer Games magazine gave the Atari and Apple versions an "A" in its "1985 Software Buyers Guide." Writing for Videogaming and Computer Gaming Illustrated, Susan Levitan concluded: "A.E. is a highly recommended, very challenging and rewarding game. The 3-D graphics are stunning and the serpentine movement of the A.E. is mesmerizing." References External links A.E. at Atari Mania A.E. at MSX Games World Review in Softline Review in Comput
https://en.wikipedia.org/wiki/Analytical%20Dynamics%20of%20Particles%20and%20Rigid%20Bodies
A Treatise on the Analytical Dynamics of Particles and Rigid Bodies is a treatise and textbook on analytical dynamics by British mathematician Sir Edmund Taylor Whittaker. Initially published in 1904 by the Cambridge University Press, the book focuses heavily on the three-body problem and has since gone through four editions and has been translated to German and Russian. Considered a landmark book in English mathematics and physics, the treatise presented what was the state-of-the-art at the time of publication and, remaining in print for more than a hundred years, it is considered a classic textbook in the subject. In addition to the original editions published in 1904, 1917, 1927, and 1937, a reprint of the fourth edition was released in 1989 with a new foreword by William Hunter McCrea. The book was very successful and received many positive reviews. A 2014 "biography" of the book's development wrote that it had "remarkable longevity" and noted that the book remains more than historically influential. Among many others, G. H. Bryan, E. B. Wilson, P. Jourdain, G. D. Birkhoff, T. M. Cherry, and R. Thiele have reviewed the book. The 1904 review of the first edition by G. H. Bryan, who wrote reviews for the first two editions, sparked controversy among Cambridge University professors related to the use of Cambridge Tripos problems in textbooks. The book is mentioned in other textbooks as well, including Classical Mechanics, where Herbert Goldstein argued in 1980 that, although the book is outdated, it remains "a practically unique source for the discussion of many specialized topics." Background Whittaker was 31 years old and working as a lecturer at Trinity College, Cambridge when the book was first published, less than ten years after he graduated from Cambridge University in 1895. Whittaker was branded Second Wrangler in his Cambridge Tripos examination upon graduation in 1895 and elected as a Fellow of Trinity College, Cambridge the next year, where he remain
https://en.wikipedia.org/wiki/Regular%20Figures
Regular Figures is a book on polyhedra and symmetric patterns, by Hungarian geometer László Fejes Tóth. It was published in 1964 by Pergamon in London and Macmillan in New York. Topics Regular Figures is divided into two parts, "Systematology of the Regular Figures" and "Genetics of the Regular Figures", each in five chapters. Although the first part represents older and standard material, much of the second part is based on a large collection of research works by Fejes Tóth, published over the course of approximately 25 years, and on his previous exposition of this material in a 1953 German-language text. The first part of the book covers many of the same topics as a previously published book, Regular Polytopes (1947), by H. S. M. Coxeter, but with a greater emphasis on group theory and the classification of symmetry groups. Its first three chapters describe the symmetries that two-dimensional geometric objects can have: the 17 wallpaper groups of the Euclidean plane in the first chapter, with the first English-language presentation of the proof of their classification by Evgraf Fedorov, the regular spherical tilings in chapter two, and the uniform tilings of the hyperbolic plane in chapter three. Also mentioned is the Voderberg tiling by non-convex enneagons, as an example of a systematically-constructed tiling that lacks all symmetry (prefiguring the discovery of aperiodic tilings). The fourth chapter describes symmetric polyhedra, including the five Platonic solids, the 13 Archimedean solids, and the five parallelohedra also enumerated by Federov, which come from the discrete translational symmetries of Euclidean space. The fifth and final chapter of this section of the book extends this investigation into higher dimensions and the regular polytopes. The second part of the book concerns the principle that many of these symmetric patterns and shapes can be generated as the solutions to optimization problems, such as the Tammes problem of arranging a given numb
https://en.wikipedia.org/wiki/Heteroresistance
Heteroresistance is a phenotype in which a bacterial isolate contains sub-populations of cells with increased antibiotic resistance when compared with the susceptible main population. This phenomenon is known to be highly prevalent among several antibiotic classes and bacterial isolates and associated with treatment failure through the enrichment of low frequencies of resistant subpopulations in the presence of antibiotics. Heteroresistance is known to be highly unstable, meaning that the resistance sub-population can revert to susceptibility within a limited number of generations of growth in the absence of antibiotic. Regarding the instability and the transient characteristic of heteroresistance subpopulations, the detection of this subpopulation often face difficulties by the conventional minimum inhibitory concentration methods. Hence, there is a significant demand for clinical microbiology laboratories to use rapid standardized methods to identify heteroresistance in pathologic specimen to prescribe a proper antibiotic treatment for patients. Mechanisms The enrichment of resistance sub-populations can be due to the acquisition of resistant mutations that are genetically stable but have high fitness cost or due to the enrichment of sub-population with increased copy number of resistance-conferring tandem gene amplifications. References Bacteria
https://en.wikipedia.org/wiki/Thoth%20%28operating%20system%29
Thoth is a real-time, message passing operating system (OS) developed at the University of Waterloo in Waterloo, Ontario Canada. History Thoth was developed at the University of Waterloo in Waterloo, Ontario, Canada. The curriculum at Waterloo includes a Real Time Operating Systems course and an associated "Train lab", where students must develop a real-time operating system (RTOS) to control a model track with multiple trains. In 1972, the B programming language, a derivative of BCPL, was brought to Waterloo by Stephen C. Johnson while on sabbatical from Bell Labs. A new language derived from B, named Eh, was developed at Waterloo. Thoth was written originally in Eh with some assembly language. Initial development of Thoth occurred on a Honeywell 6050 computer. It was first run on a Data General Nova 2 in May 1976, and was next ported to a Texas Instruments TI990/10 in August 1976. In October 1976, the University of Waterloo published Laurence S. Melen's Master's Thesis, titled "A Portable Real-Time Executive, Thoth". Eh was later upgraded, in part with the addition of data types, and renamed Zed. Thoth was then rewritten in Zed. One of the early principal developers of Thoth was David Cheriton. Cheriton would go on to develop the Verex kernel, and the V-System OS; both influenced by Thoth. Another early developer was Michael Malcolm, who would later found Waterloo Microsystems, Network Appliances, Inc., Blue Coat Systems, and Kaliedescape, several of whose operating systems are believed to have been derived from or influenced by Thoth. Certain papers describe DEMOS as the inspiration for Thoth. As prior art Cheriton cited Per Brinch Hansen's RC 4000, then listed Thoth, DEMOS, and Accent together as later developments. Other influences on the development of Thoth included Multics, Data General's RTOS, Honeywell GCLS, and Unix. Later references cite Thoth as the original implementation of its particular use of synchronous message passing and multiprocess pro
https://en.wikipedia.org/wiki/Reverse%20correlation%20technique
The reverse correlation technique is a data driven study method used primarily in psychological and neurophysiological research. This method earned its name from its origins in neurophysiology, where cross-correlations between white noise stimuli and sparsely occurring neuronal spikes could be computed quicker when only computing it for segments preceding the spikes. The term has since been adopted in psychological experiments that usually do not analyze the temporal dimension, but also present noise to human participants. In contrast to the original meaning, the term is here thought to reflect that the standard psychological practice of presenting stimuli of defined categories to the participants is "reversed": Instead, the participant's mental representations of categories are estimated from interactions of the presented noise and the behavioral responses. It is used to create composite pictures of individual and/or group mental representations of various items (e.g. faces, bodies, and the self) that depict characteristics of said items (e.g. trustworthiness and self-body image). This technique is helpful when evaluating the mental representations of those with and without mental illnesses. Terms This technique utilizes spike-triggered average to explain what areas of signal and noise in an image are valuable for the given research question. Signal is information used to produce objects of value that help explain and connect the world around us. Noise is commonly referred to as unwanted signal that obscures the information that the signal is trying to present. Most importantly for reverse correlation studies, noise is randomly varying information. To determine the areas of importance using reverse correlation, noise is applied to a base image and then evaluated by observers. A base image is any image void of noise that relates to the research question. A base image that has noise superimposed on top is the stimuli that is presented to and evaluated by participan
https://en.wikipedia.org/wiki/PayPay
is a Japanese company that develops electronic payment services owned by LY Corporation. It was established in 2018 as a joint venture between the SoftBank Group and Yahoo Japan through Z Holdings, their holding company. With 38 million users, PayPay is the largest Japanese mobile payment app. In October 2018, it began a QR code and bar code-based payment service, which was developed in collaboration with Paytm, an India-based payment service company. From a smartphone app, users link their bank account and add money to their PayPay account. At the point of sale, the user makes a payment either by scanning a QR code, or by having the clerk scan a bar code on the smartphone. 2020 cybersecurity incident PayPay server was hacked on November 28, 2020 which was originated in Brazil. As per the operator of PayPay, a server containing personal and financial information of its entire userbase was compromised. The company acknowledged that configuration flaws led to unauthorized access to information. The service operator was later notified of the incident and preventive measures were taken. References Financial technology companies Mobile payments Online payments Payment systems
https://en.wikipedia.org/wiki/Central%20Research%20Laboratories
The Central Research Laboratories, often referred to as CRL, was a British research laboratory that originally belonged to the EMI Corporation. History During the period of 1927–29 EMI invested in developing a research and innovation centre that arguably set the tone for many of the technological advancements that would occur over the next 80 years in the UK and was held in extremely high regard globally. After years operating in central London and across various greater London locations, a new company site was built in the 1980s in Hayes, Middlesex. Hayes was often referred to as EMI Town, due to the presence of various company businesses, including the Gramophone Company HQ, which later became known as HMV. The lab's first director was Isaac Shoenberg, a pioneer of television. In 1996 the company formally became known as CRL Ltd after a management buy-out, in which EMI retained a nominal ownership. The company's business model became that of an incubator, that effectively funded innovations and research projects and once the products became 'viable', they were established into standalone subsidiary companies, that typically continued to operate out of their HQ office. In the year 2000, the company floated under a new parent company name Scipher Plc, which for the next two years was the UK's most admired and valuable tech stock on the FTSE 250 index. The Scipher brand included: CRL – This remained the heart of the business. It continued to act as the innovation centre of the business and initiated numerous on going research projects and initiatives. It also retained control of the majority of the existing products and technologies that had been developed where commercial agreements already existed. It also continued with Ministry of Defence (MoD) projects, which remained private under official secrecy obligations.. QED – An intellectual Property (IP) business that proactively registered and managed new and old patents for its parent company and third-par
https://en.wikipedia.org/wiki/Deflect.ca
Deflect is a DDoS mitigation and website security service by eQualitie, a Canadian social enterprise developing open and reusable systems with a focus on privacy, resilience and self-determination, to protect and promote human rights and press freedom online. History Deflect was founded by digital security expert and trainer Dmitri Vitaliev and Canadian internet entrepreneur David Mason in 2011. The Deflect project predates similar initiatives by Google's Project Shield and Cloudflare's Project Galileo. The initiative was created in response to an influential report by the Berkman Center for Internet & Society which highlighted the prevalence of DDoS as a means of political repression and censorship against independent media and human rights groups around the world, and recommended practical methods to protect websites from future incidents. The company claims to reach approximately 2% of the population connected to the Internet on an annual basis Deflect offers free services to many civil society organizations and commercial plans for small business and enterprise. In 2016, the Deflect team released its first investigative report into attacks against a Ukrainian independent media website. ""On the 2nd of February, the Kotsubynske website published an article from a meeting of the regional administrative council where it stated that members of the political party 'New Faces' were interfering with and trying to sabotage the council's work on stopping deforestation. Attacks against the website begin thereafter." Also in 2016, CBC noted that Deflect thwarted DDoS attacks for Black Lives Matter. Investigations led by the Deflect team to discover the methods and provenance of over a hundred separate incidents against the Black Lives Matter website, were noted in The Verge, Ars Technica and BoingBoing. In 2019, the Deflect team discovered a persistent cyber offensive campaign against Uzbek human rights activists, leading to a more detailed study by Amnesty Intern
https://en.wikipedia.org/wiki/Phylogenetic%20invariants
Phylogenetic invariants are polynomial relationships between the frequencies of various site patterns in an idealized DNA multiple sequence alignment. They have received substantial study in the field of biomathematics, and they can be used to choose among phylogenetic tree topologies in an empirical setting. The primary advantage of phylogenetic invariants relative to other methods of phylogenetic estimation like maximum likelihood or Bayesian MCMC analyses is that invariants can yield information about the tree without requiring the estimation of branch lengths of model parameters. The idea of using phylogenetic invariants was introduced independently by James Cavender and Joseph Felsenstein and by James A. Lake in 1987. At this point the number of programs that allow empirical datasets to be analyzed using invariants is limited. However, phylogenetic invariants may provide solutions to other problems in phylogenetics and they represent an area of active research for that reason. Felsenstein stated it best when he said, "invariants are worth attention, not for what they do for us now, but what they might lead to in the future." (p. 390) If we consider a multiple sequence alignment with t taxa and no gaps or missing data (i.e., an idealized multiple sequence alignment), there are 4t possible site patterns. For example, there are 256 possible site patterns for four taxa (fAAAA, fAAAC, fAAAG, … fTTTT), which can be written as a vector. This site pattern frequency vector has 255 degrees of freedom because the frequencies must sum to one. However, any set of site pattern frequencies that resulted from some specific process of sequence evolution on a specific tree must obey many constraints. and therefore have many fewer degrees of freedom. Thus, there should be polynomials involving those frequencies that take on a value of zero if the DNA sequences were generated on a specific tree given a particular substitution model. Invariants are formulas in the expected patte
https://en.wikipedia.org/wiki/Novymonas
Novymonas esmeraldas is a protist and member of flagellated trypanosomatids. It is an obligate parasite in the gastrointestinal tract of a bug, and is in turn a host to symbiotic bacteria. It maintains strict mutualistic relationship with the bacteria as a sort of cell organelle (endosymbiont) so that it cannot lead an independent life without the bacteria. Its discovery in 2016 suggests that it is a good model in the evolution of prokaryotes into eukaryotes by symbiogenesis. The endosymbiotic bacterium was identified as member of the genus Pandoraea. Discovery Novymonas esmeraldas was discovered from a bug, Niesthrea vincentii, from Ecuador. The bug was collected in July 2008 near Atacames in Esmeraldas Province, hence, the protist bears the species name. The genus name is after Frederick George Novy, an American bacteriologist and parasitologist who pioneered studies of insect trypanosomatids, and described in 1907 the first known symbiont-harbouring trypanosomatid, later named Strigomonas culicis. Biology Protist Novymonas esmeraldas spends it life cycle in the intestine (hindgut) of the bug, Niesthrea vincentii. During its life cycle it exists in two morphological forms, free-swimming promastigote and sedentary choanomastigote. Promastigotes are elongated and measure about 10.9 to 18 μm in length and about 1.3 to 4.8 μm in width. They bear a single flagellum in front that is 7.8 to 19.5 μm long. Choanomastigotes are more spherical in shape measuring 4.5 to 9.7 μm long and 2.8 to 6.4 μm wide. The flagellum is longer measuring 8.6 and 20.4 μm. The nucleus is centrally located, and in front of it is the kinetoplast. The kinetoplast is arranged in a compact disk which measures between 553 and 938 nm in diameter and 114 to 213 nm in cross section. Bacterium The endosymbiont is a bacterium classified as (Candidatus) Pandoraea novymonadis that belongs to Gram-negative rod-shaped β-proteobacteria in the family Burkholderiaceae. Unlike in other symbiont-harbouring
https://en.wikipedia.org/wiki/Sandy%20Munro
Sandy Munro is an automotive engineer who specializes in machine tools and manufacturing. He started as a toolmaker at the Valiant Machine & Tool company – a General Motors supplier in Windsor. In 1978, he joined the Ford Motor Company where he improved methods of engine assembly. In 1988, he started his own consultancy, Munro & Associates, in Troy, Michigan, specializing in lean design, tearing down automotive products to study and suggest improvements and innovations. Now located in Auburn Hills, Michigan, the company performs electric vehicle benchmarking and consults in the aerospace, defense and medical sectors. In 2018, he started broadcasting video analyses and interviews on his YouTube channel, Munro Live. The channel has over 300,000 subscribers and raised the profile of his consultancy during the COVID-19 pandemic, when meetings and trade shows were restricted. Early life Munro was born on 19. January 1949 and grew up in Windsor, Ontario, Canada. Munro said he first started working by picking tomatoes at age 9. He started his engineering career as a toolmaker at the Valiant Machine & Tool company which mainly supplied General Motors. He then joined Ford in 1978 where he became a manufacturing engineer and coordinator, improving methods of engine assembly. He then started his own consultancy in Troy, Michigan in 1988 and now has dual Canadian-US citizenship. Teardown reports Munro's consultancy specialises in deconstructing automobiles to analyse their construction and has analysed hundreds of vehicles. The detailed analyses are sold to manufacturers and suppliers who use the information to help plan, price and improve their products. For example, they studied the BMW i3 in 2015 – an innovative electric car which made extensive use of carbon composites and hemp. Their detailed cost analysis cost $2.1 million to produce and originally sold for $89,000. The report was 23,793 pages long, divided into the following sections: Body Exterior Roll
https://en.wikipedia.org/wiki/Culturomics%20%28microbiology%29
Culturomics is the high-throughput cell culture of bacteria that aims to comprehensively identify strains or species in samples obtained from tissues such as the human gut or from the environment. This approach was conceived as an alternative, complementary method to metagenomics, which relies on the presence of homologous sequences to identify new bacteria. Due to the limited phylogenetic information available on bacteria, metagenomic data generally contains large amounts of "microbial dark matter", sequences of unknown origin. Culturomics provides some of the missing gaps with the added advantage of enabling the functional study of the generated cultures. Its main drawback is that many bacterial species remain effectively uncultivable until their growth conditions are better understood. Therefore, optimization of the culturomics approach has been done by improving culture conditions. Unlike metagenomics, which relies on direct shotgun sequencing or 16S rRNA gene sequencing, culturomics is based on matrix-assisted laser desorption/ionization–time-of-flight (MALDI-TOF) mass spectrometry. However, culturomics also uses 16S RNA sequencing to identify new species. See also Genomics Microbiota References Further reading Omics Microbiology techniques
https://en.wikipedia.org/wiki/Frankel%20conjecture
In the mathematical fields of differential geometry and algebraic geometry, the Frankel conjecture was a problem posed by Theodore Frankel in 1961. It was resolved in 1979 by Shigefumi Mori, and by Yum-Tong Siu and Shing-Tung Yau. In its differential-geometric formulation, as proved by both Mori and by Siu and Yau, the result states that if a closed Kähler manifold has positive bisectional curvature, then it must be biholomorphic to complex projective space. In this way, it can be viewed as an analogue of the sphere theorem in Riemannian geometry, which (in a weak form) states that if a closed and simply-connected Riemannian manifold has positive curvature operator, then it must be diffeomorphic to a sphere. This formulation was extended by Ngaiming Mok to the following statement: In its algebro-geometric formulation, as proved by Mori but not by Siu and Yau, the result states that if is an irreducible and nonsingular projective variety, defined over an algebraically closed field , which has ample tangent bundle, then must be isomorphic to the projective space defined over . This version is known as the Hartshorne conjecture, after Robin Hartshorne. References Theodore Frankel. Manifolds with positive curvature. Pacific J. Math. 11 (1961), 165–174. Robin Hartshorne. Ample subvarieties of algebraic varieties. Notes written in collaboration with C. Musili. Lecture Notes in Mathematics, Vol. 156 (1970). Springer-Verlag, Berlin-New York. xiv+256 pp. Shoshichi Kobayashi and Takushiro Ochiai. Characterizations of complex projective spaces and hyperquadrics. J. Math. Kyoto Univ. 13 (1973), 31–47. Ngaiming Mok. The uniformization theorem for compact Kähler manifolds of nonnegative holomorphic bisectional curvature. J. Differential Geom. 27 (1988), no. 2, 179–214. Shigefumi Mori. Projective manifolds with ample tangent bundles. Ann. of Math. (2) 110 (1979), no. 3, 593–606. Yum Tong Siu and Shing Tung Yau. Compact Kähler manifolds of positive bisection
https://en.wikipedia.org/wiki/Fenner%20Medal
The Fenner Medal, named after the Australian virologist Frank Fenner, is awarded each year by The Australian Academy of Science for distinguished research in biology (excluding the biomedical sciences) by a scientist up to 10 years post-PhD in the calendar year of nomination. The award is restricted to Australian residents or for biologists whose research was conducted mainly in Australia. Recipients Source: Fenner Medal Awardees Australian Academy of Science See also List of academic awards References Biology awards Australian Academy of Science Awards Awards established in 2000
https://en.wikipedia.org/wiki/NordPass
NordPass is a proprietary password manager launched in 2019. It is meant to help its users to organise their passwords and secure notes, keeping them in a single place — an encrypted password vault. This service comes in both free and premium versions, though the free version lacks much of the paid functionality like multi-device login. NordPass is a cross-platform application available on Windows, macOS, Linux, Android, and iOS. It also offers browser extensions on Google Chrome, Mozilla Firefox, Microsoft Edge, Brave, Opera, and Safari. History NordPass was developed by the same cybersecurity team that created NordVPN, a VPN service provider. Security features NordPass is built with the ChaCha20 encryption algorithm specifically the XChaCha variant. NordPass has zero-knowledge architecture, meaning that passwords are encrypted on the user's device and only then stored in the cloud. This way, NordPass cannot view, edit, or in any other way manage users’ passwords. An encrypted vault acts as a digital safe where users can store login credentials, secure notes, and credit card details. The Master Password serves as the key that unlocks the encrypted vault. Master Password protects the user's passwords, but it's up to the user to make it strong. NordPass provides two-factor authentication (2FA). It supports multiple authentication apps, including Google Authenticator, Duo, and Authy. In its latest release it includes FIDO U2F support. This means that it will now work with YubiKey and other third party security keys. Though this protection is embedded at the service login instead of the app which is a weakness. NordPass provides a Secure Password Sharing Feature which allows for the secure sharing of passwords between NordPass users. NordPass can scan data breaches for password leaks. NordPass can identify weak, reused, or old passwords which it divides into Weak, Reused, and Old. An independent cybersecurity firm, Cure53, in February 2020 conducted an audi
https://en.wikipedia.org/wiki/Co%E2%80%93Star
Co–Star is an American astrological social networking service founded in 2017, and headquartered in New York City. Users enter the date, time and place they were born to receive an astrological chart and daily horoscopes that they can compare to those of their friends. History Founder and CEO Banu Guler came up with the idea for the app after she gifted a friend's child an astrological chart that became a surprise hit at the baby shower. In 2019, Co–Star raised a $5.2 million seed round from Maveron, Aspect, and 14W, following a $750,000 pre-seed from Female Founders Fund in early 2018. In January 2020, Co–Star for Android was launched to a 120,000-person waitlist—two years after their iOS app was launched. In April 2021, Co–Star announced their $15 million Series A, led by Spark Capital. As of that date, Co–Star has more than 20 million downloads and has been downloaded by a quarter of all young women ages 18–25 in the U.S. Features Co–Star employs artificial intelligence to analyze publicly accessible NASA JPL data and find patterns in a user’s transits. Co–Star’s algorithm maps human-written snippets of text to planetary movements to display personalized content for each user. That content has been called “slightly robotic,” “wildly beautiful,” “truly insane," “brutally honest,” and compared to “a free therapy session.” In July 2023, Co–Star released an in-app service called The Void that allows users to ask open-ended questions and receive answers informed by Co–Star's astrological database. See also Astrology NASA Timeline of social media References External links Official website 2017 software Internet properties established in 2017 Android (operating system) software IOS software Freeware Mobile applications Social networking services Youth culture
https://en.wikipedia.org/wiki/Invertebrate%20drift
Invertebrate drift is the downstream transport of invertebrate organisms in lotic freshwater systems such as rivers and streams. The term lotic comes from the Latin word lotus, meaning "washing", and is used to describe moving freshwater systems. This is in contrast with lentic coming from the Latin word lentus, meaning slow or motionless that typically describe still or standing waters such as lakes, ponds, and swamps. Drift can service freshwater invertebrates by giving them an escape route from predation, or the use of a current to disperse progeny downstream. On occasion, however, invertebrates will inadvertently lose their footing, and drift downstream. For that, invertebrates counter a stream's flow through physical and behavioral adaptations. And just as invertebrates adapted to stabilize themselves in the water column, or use the stream's energy to their advantage, so too have predators adapted to catch invertebrates as they drift. Species of fish, commonly salmonids, catch drifting insects during the peak times after dusk, and before dawn. Fishermen can exploit this relationship using fly fishing techniques and lures that mimic drifting insects to catch these fishes. Researchers have developed sampling techniques in lotic systems. From it, research as far back as 1928 has collected data on the phenomenon of drift. The study of invertebrate drift has progressed the field of stream ecology. Drift has been documented to impact community structure, benthic production, and the energy flow through trophic levels. Mechanisms of drift Types of drift Invertebrate drift can be categorized by the conditions that caused the drift to occur. Catastrophic drift: Disturbances such as floods physically dislodge animals. Behavioral drift: Behavior such as escaping, and inadvertently losing foothold in the water column, cause animals to drift downstream. Active drift describes animals choosing to enter drift. Distributional drift: Used by animals to disperse progeny
https://en.wikipedia.org/wiki/Blogs%2C%20Wikipedia%2C%20Second%20Life%20and%20Beyond%3A%20From%20Production%20to%20Produsage
Blogs, Wikipedia, Second Life and Beyond: From Production to Produsage is a 2008 book about the new media by Axel Bruns. The book has been credited with coining and popularizing the term produsage. Synopsis Reviews See also prosumer References 2008 non-fiction books English-language books Books about the media Sociology books New media Internet culture
https://en.wikipedia.org/wiki/Gracemont%20%28microarchitecture%29
Gracemont is a microarchitecture for low-power processors used in systems on a chip (SoCs) made by Intel, and is the successor to Tremont. Like its predecessor, it is also implemented as low-power cores in a hybrid design of the Alder Lake and Raptor Lake processors. Design Gracemont is the fourth generation out-of-order low-power Atom microarchitecture, built on the Intel 7 manufacturing process. The Gracemont microarchitecture has the following enhancements over Tremont: Level 1 cache per core: eight-way-associative 64KB instruction cache eight-way-associative 32KB data cache New On-Demand Instruction Length Decoder Instruction issue increased to five per clock (from four) Instruction retire increased to eight per clock (from seven) Execution ports (functional units) there are now 17 (from eight) Reorder buffer increased to 256 entries (from 208) Improved branch prediction Support for AVX, AVX2, FMA3 and AVX-VNNI instructions Technology System on a chip (SoC) architecture 3D tri-gate transistors 64KB L1 instruction cache, up from 32 KB in Tremont 2 or 4MB shared L2 cache per 4-core module Alder Lake-S/H/P/U family has 2MB. Raptor Lake-S/H/P/U family has 4MB. Intel Xe (Gen. 12.2) GPU with DirectX 12, OpenGL 4.6, Vulkan 1.3, OpenGL ES 3.2 and OpenCL 3.0 support. Thermal design power (TDP) 10W desktop processors 6W mobile processors List of Gracemont processors The microarchitecture is used as the efficient cores of the 12th generation of Intel Core hybrid processors (codenamed "Alder Lake") and the 13th generation of Intel Core hybrid processors (codenamed "Raptor Lake"). It's used exclusively in the Alder Lake-N line-up. Alder Lake-N See also List of Intel CPU microarchitectures References Intel x86 microprocessors Intel microarchitectures X86 microarchitectures
https://en.wikipedia.org/wiki/Budget-balanced%20mechanism
In mechanism design, a branch of economics, a weakly-budget-balanced (WBB) mechanism is a mechanism in which the total payment made by the participants is at least 0. This means that the mechanism operator does not incur a deficit, i.e., does not have to subsidize the market. Weak budget balance is considered a necessary requirement for the economic feasibility of a mechanism. A strongly-budget-balanced (SBB) mechanism is a mechanism in which the total payment made by the participants is exactly 0. This means that all payments are made among the participants - the mechanism has neither a deficit nor a surplus. The term budget-balanced mechanism is sometimes used as a shorthand for WBB, and sometimes as a shorthand for SBB. Weak budget balance A simple example of a WBB mechanism is the Vickrey auction, in which the operator wants to sell an object to one of n potential buyers. Each potential buyer bids a value, the highest bidder wins an object and pays the second-highest bid. As all bids are positive, the total payment is trivially positive too. As an example of a non-WBB mechanism, consider its extension to a bilateral trade setting. Here, there is a buyer and a seller; the buyer has a value of b and the seller has a cost of s. Trade should occur if and only if b > s. The only truthful mechanism that implements this solution must charge a trading buyer the cost s and pay a trading seller the value b; but since b > s, this mechanism runs a deficit. In fact, the Myerson–Satterthwaite theorem says that every Pareto-efficient truthful mechanism must incur a deficit. McAfee developed a solution to this problem for a large market (with many potential buyers and sellers): McAfee's mechanism is WBB, truthful and almost Pareto-efficient - it performs all efficient deals except at most one. McAfee's mechanism has been extended to various settings, while keeping its WBB property. See double auction for more details. Strong budget balance In a strongly-budget-balanced (S
https://en.wikipedia.org/wiki/Overcategory
In mathematics, specifically category theory, an overcategory (and undercategory) is a distinguished class of categories used in multiple contexts, such as with covering spaces (espace etale). They were introduced as a mechanism for keeping track of data surrounding a fixed object in some category . There is a dual notion of undercategory, which is defined similarly. Definition Let be a category and a fixed object of pg 59. The overcategory (also called a slice category) is an associated category whose objects are pairs where is a morphism in . Then, a morphism between objects is given by a morphism in the category such that the following diagram commutesThere is a dual notion called the undercategory (also called a coslice category) whose objects are pairs where is a morphism in . Then, morphisms in are given by morphisms in such that the following diagram commutesThese two notions have generalizations in 2-category theory and higher category theorypg 43, with definitions either analogous or essentially the same. Properties Many categorical properties of are inherited by the associated over and undercategories for an object . For example, if has finite products and coproducts, it is immediate the categories and have these properties since the product and coproduct can be constructed in , and through universal properties, there exists a unique morphism either to or from . In addition, this applies to limits and colimits as well. Examples Overcategories on a site Recall that a site is a categorical generalization of a topological space first introduced by Grothendieck. One of the canonical examples comes directly from topology, where the category whose objects are open subsets of some topological space , and the morphisms are given by inclusion maps. Then, for a fixed open subset , the overcategory is canonically equivalent to the category for the induced topology on . This is because every object in is an open subset contained in .
https://en.wikipedia.org/wiki/The%20Secrets%20of%20Triangles
The Secrets of Triangles: A Mathematical Journey is a popular mathematics book on the geometry of triangles. It was written by Alfred S. Posamentier and , and published in 2012 by Prometheus Books. Topics The book consists of ten chapters, with the first six concentrating on triangle centers while the final four cover more diverse topics including the area of triangles, inequalities involving triangles, straightedge and compass constructions, and fractals. Beyond the classical triangle centers (the circumcenter, incenter, orthocenter, and centroid) the book covers other centers including the Brocard points, Fermat point, Gergonne point, and other geometric objects associated with triangle centers such as the Euler line, Simson line, and nine-point circle. The chapter on areas includes both trigonometric formulas and Heron's formula for computing the area of a triangle from its side lengths, and the chapter on inequalities includes the Erdős–Mordell inequality on sums of distances from the sides of a triangle and Weitzenböck's inequality relating the area of a triangle to that of squares on its sides. Under constructions, the book considers 95 different triples of elements from which a triangle's shape may be determined (taken from its side lengths, angles, medians, heights, or angle bisectors) and describes how to find a triangle with each combination for which this is possible. Triangle-related fractals in the final chapter include the Sierpiński triangle and Koch snowflake. Audience and reception Reviewer Alasdair McAndrew criticizes the book as being too "breathless" in its praise of the geometry it discusses and too superficial to be of interest to professional mathematicians, and Patricia Baggett writes that it little of its content would be of use in high school mathematics education. However, Baggett suggests that it may be usable as a reference work, and similarly Robert Dawson suggests using its chapter on inequalities in this way. The book is written a
https://en.wikipedia.org/wiki/Starfish%20regeneration
Starfish, or sea stars, are radially symmetrical, star-shaped organisms of the phylum Echinodermata and the class Asteroidea. Aside from their distinguished shape, starfish are most recognized for their remarkable ability to regenerate, or regrow, arms and, in some cases, entire bodies. While most species require the central body to be intact in order to regenerate arms, a few tropical species can grow an entirely new starfish from just a portion of a severed limb. Starfish regeneration across species follows a common three-phase model and can take up to a year or longer to complete. Though regeneration is used to recover limbs eaten or removed by predators, starfish are also capable of autotomizing and regenerating limbs to evade predators and reproduce. Due to their wide range of regenerative capabilities, starfish have become model organisms for studying how the regenerative process has evolved and diversified over time. While the overall morphological processes have been well documented in many starfish, little is known regarding the underlying molecular mechanisms that mediate their regeneration. Moreover, some researchers hope starfish may one day serve as inspiration for therapeutics aiming to expand the extent to which humans can repair and replace damaged cells or tissues. Degrees of regeneration Regenerative ability differs greatly among starfish species, but can generally be classified within three categories: unidirectional regeneration, disk-dependent bidirectional regeneration, and disk-independent bidirectional regeneration. In each case, regenerative capacity is enabled by the uniquely simple body plan of starfish. The typical starfish has five or more arms, or “rays”, radiating from a central disk. Each arm contains a copy of vital organs and is equipped with eyespots, an eye-like structure that helps the starfish differentiate between light and darkness, and tube feet, which enable locomotion. All organs connect to the digestive system in the
https://en.wikipedia.org/wiki/List%20of%20plant%20genus%20names%20with%20etymologies%20%28L%E2%80%93P%29
Since the first printing of Carl Linnaeus's Species Plantarum in 1753, plants have been assigned one epithet or name for their species and one name for their genus, a grouping of related species. Many of these plants are listed in Stearn's Dictionary of Plant Names for Gardeners. William Stearn (1911–2001) was one of the pre-eminent British botanists of the 20th century: a Librarian of the Royal Horticultural Society, a president of the Linnean Society and the original drafter of the International Code of Nomenclature for Cultivated Plants. The first column below contains seed-bearing genera from Stearn and other sources as listed, excluding those names that no longer appear in more modern works, such as Plants of the World by Maarten J. M. Christenhusz (lead author), Michael F. Fay and Mark W. Chase. Plants of the World is also used for the family and order classification for each genus. The second column gives a meaning or derivation of the word, such as a language of origin. The last two columns indicate additional citations. Key Latin: = derived from Latin (otherwise Greek, except as noted) Ba = listed in Ross Bayton's The Gardener's Botanical Bu = listed in Lotte Burkhardt's Index of Eponymic Plant Names CS = listed in both Allen Coombes's The A to Z of Plant Names and Stearn's Dictionary of Plant Names for Gardeners G = listed in David Gledhill's The Names of Plants St = listed in Stearn's Dictionary of Plant Names for Gardeners Genera See also Glossary of botanical terms List of Greek and Latin roots in English List of Latin and Greek words commonly used in systematic names List of plant genera named for people: A–C, D–J, K–P, Q–Z List of plant family names with etymologies Notes Citations References See http://creativecommons.org/licenses/by/4.0/ for license. Further reading Available online at the Perseus Digital Library. Available online at the Perseus Digital Library. Systematic Greek words and phrases Systematic Systemati
https://en.wikipedia.org/wiki/Genotype%E2%80%93phenotype%20map
The genotype–phenotype map is a conceptual model in genetic architecture. Coined in a 1991 paper by Pere Alberch, it models the interdependency of genotype (an organism's full hereditary information) with phenotype (an organism's actual observed properties). Application The map visualises a relationship between genotype & phenotype which, crucially: is of greater complexity than a straightforward one-to-one mapping of genotype to/from phenotype. accommodates a parameter space, along which at different points a given phenotype is said to be more or less stable. accommodates transformational boundaries in the parameter space, which divide phenotype states from one another. accounts for different polymorphism and/or polyphenism in populations, depending on their area of parameter space they occupy. References Genetics 1991 introductions
https://en.wikipedia.org/wiki/Budget-feasible%20mechanism
In mechanism design, a branch of economics, a budget-feasible mechanism is a mechanism in which the total payment made by the auctioneer is upper-bounded by a fixed pre-specified budget. They were first presented by Yaron Singer, and studied by several others. References Mechanism design Auction theory
https://en.wikipedia.org/wiki/Women%20and%20Families%20for%20Defence
Women and Families for Defence was a Conservative-aligned pressure group originally founded in March 1983 as Women for Defence. It was founded in opposition to the Greenham Common Women's Peace Camp and the Campaign for Nuclear Disarmament, and aimed to oppose arguments in favour of unilateral nuclear disarmament. It was reportedly founded by Lady Olga Maitland, Ann Widdecombe, Virginia Bottomley and Angela Rumbold (who also became vice-chairwoman of the organization). However, Alfred Sherman told the Sunday Times that it was Maitland who 'solely' set up the group, with his help. The Viscount Trenchard, the former Minister for Defence Procurement, became its president. The group had its own magazine, Deter, and received a commendation from the U.S. president, Ronald Reagan. The group held its first public meeting on 1 May 1983 in Trafalgar Square, whereupon 150 members of the group met, sang "Land of Hope and Glory" and argued in favour of a nuclear deterrent as a precursor to multilateral nuclear disarmament. The group also delivered a petition signed by 13,000 people to respond to the proposals of the West for missile reductions. In 1986, it was expelled from a council that was organising events to mark the International Year of Peace that year. Maitland later turned the group into a general anti-Labour political canvassing group, Women and Families for Canvassing. References 1983 establishments in England Protests in England Politics of the United Kingdom Cold War Nuclear organizations
https://en.wikipedia.org/wiki/Wavelight
Wavelight is a pace-setting system using a series of LED lights on the inside of an athletics track developed by Robotronix Europe and Sport Technologies. It has been allowed to use in competition by World Athletics since 2020, citing benefits to pacing and the spectator experience. The system has generated controversy as an unfair advantage not offered to historical athletes, after being used to set multiple new world records. Standalone variants are also available for personal, recreational, and amateur use. Technical development and realization led by Peter Willemse owner of Robotronix Europe b.v. The co-creator and operational director of Wavelight is Dutch runner and pacemaker Bram Som. References Sports technology
https://en.wikipedia.org/wiki/CID-201
CID-201 was a digital computer produced in Cuba in 1970. History Cuba had already produced the analog computer SILNA 999. In 1969, the Cuban leader Fidel Castro asked during a visit to the University of Havana if Cuba could produce a digital computer. The (CID, "Center for Digital Researches") was formed. The project was directed by Luis Carrasco and mostly designed by Orlando Ramos. The first version was designed using transistors. After the introduction of integrated circuits, the design was changed. It was inspired by the American 1959 PDP-1. The components were mostly Japanese, due to the American embargo on Cuba. On 18 April 1970, the first computer was produced. It was named CID-201 following the earlier digital watch CID-101. It could do 25 000 additions/second. Its memory held 4 096 12-bit words. It was considered a third-generation computer. It could be programmed in LEAL (, "algorithmic language"). A later version is the CID-201 A. The CID also produced the CID-201 B, CID-300, CID-1408 and CID-1417. Among the peripherals produced, several thousands of displays were exported to the Soviet Union. Application The first computer was installed in the sugar refinery Camilo Cienfuegos to control the railroad traffic during the sugarcane harvest. Another one was installed in the Ecuador refinery. Several thousand computers were produced. It was also used in the education of Cuban technicians. Legacy On 2010, the Cuban Administración Postal issued a stamp commemorating the CID-201. See also History of computer hardware in Eastern Bloc countries References 1970 establishments in Cuba Cuban inventions 12-bit computers Minicomputers Science and technology in Cuba Computer-related introductions in 1970
https://en.wikipedia.org/wiki/Trioecy
Trioecy, tridioecy or subdioecy, is a sexual system characterized by the coexistence of males, females, and hermaphrodites. It has been found in both plants and animals. Trioecy, androdioecy and gynodioecy may be described as mixed mating systems. Evolution of trioecy Trioecy may be an unstable transient state associated with evolutionary transitioning from gynodioecy to dioecy. In brachiopod species trioecy usually breaks into androdioecy or gynodioecy. Other studies show that trioecious populations originated from gonochoristic ancestors which were invaded by a mutant selfing hermaphrodite, creating a trioecious population. It has been suggested that chromosomal duplication plays an important part in the evolution of trioecy. But one study found that trioecy can be stable under nucleocytoplasmic sex determination. Another theoretical analysis indicates that trioecy could be evolutionary stable in plant species if a large amount of pollinators vary geographically. Occurrence Trioecy is a relatively common sexual system in plants, estimated to occur in about 3.6% of flowering plant species, although most reports of trioecy could be misinterpretations of gynodioecy. It is rare as well as poorly understood in animals. Species that exhibit trioecy The following species have been observed to exhibit a trioecious breeding system. Plants Buddleja sessiliflora Buddleja americana Coccoloba cereifera Garcinia indica Fragaria virginiana Fraxinus excelsior Fuchsia procumbens Mercurialis annua Opuntia robusta Pachycereus pringlei Pleodorina starrii Animals Aiptasia diaphana Auanema rhodensis Auanema freiburgensis Hydra viridissima Thor manningi Semimytilus algosus Pacific mussel See also Dioecy Gynodioecy Androdioecy Hermaphrodite Monoicy References Reproductive system Fertility Sex Sexual system
https://en.wikipedia.org/wiki/Bendix%20Electrojector
The Bendix Electrojector is an electronically controlled manifold injection (EFI) system developed and made by Bendix Corporation. In 1957, American Motors (AMC) offered the Electrojector as an option in some of their cars; Chrysler followed in 1958. However, it proved to be an unreliable system that was soon replaced by conventional carburetors. The Electrojector patents were then sold to German car component supplier Bosch, who developed the Electrojector into a functioning system, the Bosch D-Jetronic, introduced in 1967. Description The Electrojector is an electronically controlled multi-point injection system that has an analogue engine control unit, the so-called "modulator" that uses the intake manifold vacuum and the engine speed for metering the right amount of fuel. The fuel is injected intermittently, and with a constant pressure of . The injectors are spring-loaded active injectors, actuated by a modulator-controlled electromagnet. Pulse-width modulation is used to change the amount of injected fuel: since the injection pressure is constant, the fuel amount can only be changed by increasing or decreasing the injection pulse duration. The modulator receives the injection pulse from an injection pulse generator that rotates in sync with the ignition distributor. The modulator converts the injection pulse into a correct injection signal for each fuel injector primarily by using the intake manifold and crankshaft speed sensor signals. It uses analogue transistor technology (i. e. no microprocessor) to do so. The system also supports setting the correct idle speed, mixture enrichment, and coolant temperature using additional resistors in the modulator. History The Electrojector was first offered by American Motors Corporation (AMC) in 1957. The Rambler Rebel was used to promote AMC's new engine. The Electrojector-injected engine was an option and rated at . It produced peak torque 500 rpm lower than the equivalent carburetor engine The cost of the EFI
https://en.wikipedia.org/wiki/MSU-DOE%20Plant%20Research%20Laboratory
The MSU-DOE Plant Research Laboratory (PRL), commonly referred to as Plant Research Lab, is a research institute funded to a large extent by the U.S. Department of Energy Office of Science and located at Michigan State University (MSU) in East Lansing, Michigan. The Plant Research Lab was founded in 1965, and it currently includes twelve laboratories that conduct collaborative basic research into the biology of diverse photosynthetic organisms, including plants, bacteria, and algae, in addition to developing new technologies towards addressing energy and food challenges. History 1964-1978 The contract for the establishment of the MSU-DOE Plant Research Laboratory was signed on March 6, 1964, between the U.S. Atomic Energy Commission (AEC) and Michigan State University. The institute was initially funded by the AEC's Division of Biology and Medicine, which saw a need for improving the state of plant sciences in the United States. The Division aimed to create a new program at one or more universities where student interest in plant research could be fostered. The contract signed between AEC and Michigan State University provided for a comprehensive research program in plant biology and related education and training at the graduate and postgraduate levels. The program was to draw strongly on related disciplines such as biochemistry, biophysics, genetics, microbiology, and others. In 1966, personnel of the new program - called MSU-AEC Plant Research Laboratory at that time - moved into their new quarters in the Plant Biology Laboratories building at Michigan State University. The first research projects generally focused on problems specific to plants, such as cell growth and its regulation by plant hormones, cell wall structure and composition, and the physiology of flower formation; other research projects addressed general biological problems, such as the regulation of enzyme formation during development and cellular and genetic aspects of hormone action. I
https://en.wikipedia.org/wiki/Nomurabacteria
Nomurabacteria is a candidate phylum of bacteria belonging to the CPR group so they are ultra-small bacteria. They have been found in a wide variety of environments, mainly in sediments under anaerobic conditions. Bacteria of this phylum share several of their characteristics with other ultra-small bacteria: such as nanometric size, small genomes, reduced metabolism, low capacity to synthesize nucleotides and aminoacids, they lack respiratory chains and the Krebs cycle. In addition, many can be endosymbionts of larger bacteria. Phylogenetic analyzes have suggested that Nomurabacteria and the other ultra-small bacteria make up the most basal clade of all bacteria. The archaea of the DPANN group are ultra-small archaea that share the same characteristics with these bacteria and are the most basal group of the archaeo-eukaryotic clade, although it can also be paraphyletic of eukaryotes and the other archaea as will be seen below. In some phylogenetic analyzes of the proteome, ultra-small bacteria emerge outside the traditional bacterial domain and emerge as a paraphyletic group of traditional Bacteria and the clade composed of archaea and eukaryotes. In these analyzes Nomurabacteria turns out to be the most basal clade of all cellular organisms. Phylogeny Proteome analyzes have shown that Nomurabacteria can be the most basal clade of cellular organisms and that the other CPR bacteria are a paraphyletic group as can be seen in the cladogram that shows the phylogenetic relationships between multiple bacterial, archaean and eukaryotes. References Bacteria Candidatus taxa
https://en.wikipedia.org/wiki/Curtailment%20%28electricity%29
In electric grid power generators, curtailment is the deliberate reduction in output below what could have been produced in order to balance energy supply and demand or due to transmission constraints. The definition is not strict, and several types of curtailment exist. "Economic dispatch" (low market price) is the most common. Curtailment is a loss of potentially useful energy, and may impact power purchase agreements. However, utilizing all available energy may require costly methods such as building new power lines or storage, becoming more expensive than letting surplus power go unused. Examples After ERCOT built a new transmission line from the Competitive Renewable Energy Zone in West Texas to the central cities in the Texas Interconnection in 2013, curtailment was reduced from 8-16% to near zero. Curtailment of wind power in western China was around 20% in 2018. In 2018, curtailment in the California grid was 460 GWh, or 0.2% of generation. Curtailment has since increased to 150-300 GWh/month in spring of 2020 and 2021, mainly solar power at noon as part of the duck curve. In Hawaii, curtailment reached 20% on the island of Maui in Hawaii in the second and third quarters of 2020. Mitigation options Transmission upgrade Demand response Battery storage power station Energy forecasting, including forecasting for price, wind and solar References External links Increase in curtailment in California, 2014—2022 Curtailment curves in South Australia, peaking at 69% (Christmas 2021) Electrical engineering
https://en.wikipedia.org/wiki/Institute%20for%20Digital%20Archaeology
The Institute for Digital Archaeology (IDA) is a joint venture between Harvard University, Oxford University, and the Museum of the Future (Dubai) that promotes the development and use of digital imaging techniques in archaeology, epigraphy, art history, and museum conservation. The IDA creates digital archives that aid in interdisciplinary collaboration and the crowdsourcing of research. The IDA was founded in 2012 by Roger Michel. Palmyra Arch In April 2016, The IDA erected a temporary full-scale replica of the arch from the Temple of Baalshamin from Palmyra in Trafalgar Square in London. The 20 foot tall marble replica, which weighs around 11 tons, was created from a 3-D computer model of the arch formed by compiling dozens of photographs taken at the site. Robots in Italy then used the 3-D model to carve the marble replica. Million Image Database Project The IDA is putting together an open-source Million Image Database. Its aim is to photograph artifacts that are at risk of being destroyed. The images taken before the destruction of sites would be a detailed visual record that could be enough to create a reconstruction. The institute supplied volunteers with 5,000 lightweight 3-D cameras to document at-risk cultural sites throughout the Middle East and North Africa. As of 2015, more than one thousand cameras have been distributed. References External links http://digitalarchaeology.org.uk/ Museum companies Joint-venture schools Digital imaging 2012 establishments
https://en.wikipedia.org/wiki/Two-Sided%20Matching
Two-Sided Matching: A Study in Game-Theoretic Modeling and Analysis is a book on matching markets in economics and game theory, particularly concentrating on the stable marriage problem. It was written by Alvin E. Roth and Marilda Sotomayor, with a preface by Robert Aumann, and published in 1990 by the Cambridge University Press as volume 18 in their series of Econometric Society monographs. For this work, Roth and Sotomayor won the 1990 Frederick W. Lanchester Prize of the Institute for Operations Research and the Management Sciences. Topics The book's introduction discusses the National Resident Matching Program and its use of stable marriage to assign medical students to hospital positions, and collects the problems in economics that the theory of matching markets is positioned to solve. Following this, it has three main sections. The first of these sections discusses the stable matching problem in its simplest form, in which two equal-sized groups of agents are to be matched one-to-one. It discusses the stability of solutions (the property that no pair of agents both prefer being matched to each other to their assigned matches), the lattice of stable matchings, the Gale–Shapley algorithm for finding stable solutions, and two key properties of this algorithm: that among all stable solutions it chooses the one that gives one group of agents their most-preferred stable match, and that it is an honest mechanism that incentivizes this group of agents to report their preferences truthfully. The second part of the book, which reviewer Ulrich Kamecke describes as its most central, concerns extensions of these results to the many-one matching needed for the National Resident Matching Program, and to the specific economic factors that made that program successful compared to comparable programs elsewhere, and that have impeded its success. One example concerns the two-body problem of married couples who would both prefer to be assigned to the same place, a constraint
https://en.wikipedia.org/wiki/Bloom%20Institute%20of%20Technology
Bloom Institute of Technology, also known as BloomTech, is a for-profit massive online course. When it launched in 2017 under the name Lambda School, it gained attention for being a coding bootcamp that offered income share agreements as a method of financing. Following several layoffs and cost cutting measures, it transitioned from a bootcamp model to MOOC, and refocused on traditional student loans. It currently faces several lawsuits for deceptive marketing, allegedly lying about how many students find jobs, among other issues. History BloomTech was founded by Austen Allred and Ben Nelson in 2017 as Lambda School. Nelson was an instructor for the code bootcamp DevMountain, and Allred was a manager at the payday loan company LendUp. BloomTech began as a single short course in functional programming. The previous name Lambda refers to lambda functions, a concept in functional programming. The company offers online coding programs in Full Stack Web Development, Data Science, Backend Development and Web3. BloomTech joined Y Combinator in 2017, and raised seed capital in 2018 from Ashton Kutcher's Sound Ventures, Gmail creator Paul Bucheit, and Zynga co-founder Justin Waldron. In January 2019, investors including Google Ventures, Y Combinator, and Ashton Kutcher placed $30 million in BloomTech investments. Enrollment was 700 in October 2018 and 2,700 in late-August 2019, at which point enrollment was expanding by 10 percent a month. By 2019, the curriculum had expanded to a full nine-month course, longer than most comparable bootcamps. As of February 2020, over $48 million in venture funding had been raised and the school was valued at $150 million. However, that April, the company announced a layoff of 19 employees, explaining the decision as an effort to focus. In August 2020, the company raised a $74 million Series C. In April 2021, the company laid off 65 employees. In November 2021, the company rebranded as BloomTech. In December of 2022, the company laid o
https://en.wikipedia.org/wiki/Spike%20response%20model
The spike response model (SRM) is a spiking neuron model in which spikes are generated by either a deterministic or a stochastic threshold process. In the SRM, the membrane voltage is described as a linear sum of the postsynaptic potentials (PSPs) caused by spike arrivals to which the effects of refractoriness and adaptation are added. The threshold is either fixed or dynamic. In the latter case it increases after each spike. The SRM is flexible enough to account for a variety of neuronal firing pattern in response to step current input. The SRM has also been used in the theory of computation to quantify the capacity of spiking neural networks; and in the neurosciences to predict the subthreshold voltage and the firing times of cortical neurons during stimulation with a time-dependent current stimulation. The name Spike Response Model points to the property that the two important filters and of the model can be interpreted as the response of the membrane potential to an incoming spike (response kernel , the PSP) and to an outgoing spike (response kernel , also called refractory kernel). The SRM has been formulated in continuous time and in discrete time. The SRM can be viewed as a generalized linear model (GLM) or as an (integrated version of) a generalized integrate-and-fire model with adaptation. Model equations for SRM in continuous time In the SRM, at each moment in time t, a spike can be generated stochastically with instantaneous stochastic intensity or 'escape function' that depends on the momentary difference between the membrane voltage and the dynamic threshold . The membrane voltage at time t is given by where is the firing time of spike number f of the neuron, is the resting voltage in the absence of input, is the input current at time t − s and is a linear filter (also called kernel) that describes the contribution of an input current pulse at time t − s to the voltage at time t. The contributions to the voltage caused by a spike at
https://en.wikipedia.org/wiki/Dedifferentiation
Dedifferentiation (pronounced dē-ˌdi-fə-ˌren-chē-ˈā-shən) is a transient process by which cells become less specialized and return to an earlier cell state within the same lineage. This suggests an increase in cell potency, meaning that, following dedifferentiation, a cell may possess the ability to re-differentiate into more cell types than it did prior to dedifferentiation. This is in contrast to differentiation, where differences in gene expression, morphology, or physiology arise in a cell, making its function increasingly specialized. The loss of specialization observed in dedifferentiation can be noted through changes in gene expression, physiology, function witin the organism, proliferative activity, or morphology. While it can be induced in a laboratory setting through processes like direct reprogramming and the production of induced pluripotent stem cells, endogenous dedifferentiation processes also exist as a component of wound healing mechanisms. History References to dedifferentiation can be found as far back as 1915, where Charles Manning Child described dedifferentiation as a “return or approach to the embryonic or undifferentiated condition”. While Manning's research was in reference to plants, it helped establish the foundation for our modern day understanding of dedifferentiation and cell plasticity. Just as plant cells respond to injury by undergoing callus formation via dedifferentiation, some animal models dedifferentiate their cells to form blastema, which are analogous to plant calluses, after limb amputation. In the 1940s C. H. Waddington created the “Epigenetic Landscape”, a diagrammatic representation of cell fate from less differentiated to more differentiated cell types. Here, the concept of a marble moving downhill through various paths is used to represent cell decision-making and cell potency, thus visualizing how cells can take different paths of differentiation to reach a final state. Dedifferentiation would be represented by the
https://en.wikipedia.org/wiki/Detecting%20Earth%20from%20distant%20star-based%20systems
There are several methods currently used by astronomers to detect distant exoplanets from Earth. Theoretically, some of these methods can be used to detect Earth as an exoplanet from distant star systems. History In June 2021, astronomers identified 1,715 stars (with likely related exoplanetary systems) within 326 light-years (100 parsecs) that have a favorable positional vantage point—in relation to the Earth Transit Zone (ETZ)—of detecting Earth as an exoplanet transiting the Sun since the beginnings of human civilization (about 5,000 years ago); an additional 319 stars are expected to arrive at this special vantage point in the next 5,000 years. Seven known exoplanet hosts, including Ross 128, may be among these stars. Teegarden's Star and Trappist-1 may be expected to see the Earth in 29 and 1,642 years, respectively. Radio waves, emitted by humans, have reached over 75 of the closest stars that were studied. In June 2021, astronomers reported identifying 29 planets in habitable zones that may be capable of observing the Earth. Earlier, in October 2020, astronomers had initially identified 508 such stars within 326 light-years (100 parsecs) that would have a favorable positional vantage point—in relation to the Earth Transit Zone (ETZ)—of detecting Earth as an exoplanet transiting the Sun. Transit method is the most popular tool used to detect exoplanets and the most common tool to spectroscopically analyze exoplanetary atmospheres. As a result, such studies, based on the transit method, will be useful in the search for life on exoplanets beyond the Solar System by the SETI program, Breakthrough Listen Initiative, as well as upcoming exoplanetary TESS mission searches. Detectability of Earth from distant star-based systems may allow for the detectability of humanity and/or analysis of Earth from distant vantage points such as via "atmospheric SETI" for the detection of atmospheric compositions explainable only by use of (artificial) technology like air pollu
https://en.wikipedia.org/wiki/List%20of%20plant%20genus%20names%20with%20etymologies%20%28A%E2%80%93C%29
Since the first printing of Carl Linnaeus's Species Plantarum in 1753, plants have been assigned one epithet or name for their species and one name for their genus, a grouping of related species. Many of these plants are listed in Stearn's Dictionary of Plant Names for Gardeners. William Stearn (1911–2001) was one of the pre-eminent British botanists of the 20th century: a Librarian of the Royal Horticultural Society, a president of the Linnean Society and the original drafter of the International Code of Nomenclature for Cultivated Plants. The first column below contains seed-bearing genera from Stearn and other sources as listed, excluding those names that no longer appear in more modern works, such as Plants of the World by Maarten J. M. Christenhusz (lead author), Michael F. Fay and Mark W. Chase. Plants of the World is also used for the family and order classification for each genus. The second column gives a meaning or derivation of the word, such as a language of origin. The last two columns indicate additional citations. Key Latin: = derived from Latin (otherwise Greek, except as noted) Ba = listed in Ross Bayton's The Gardener's Botanical Bu = listed in Lotte Burkhardt's Index of Eponymic Plant Names CS = listed in both Allen Coombes's The A to Z of Plant Names and Stearn's Dictionary of Plant Names for Gardeners G = listed in David Gledhill's The Names of Plants St = listed in Stearn's Dictionary of Plant Names for Gardeners Genera See also Glossary of botanical terms List of Greek and Latin roots in English List of Latin and Greek words commonly used in systematic names List of plant genera named for people: A–C, D–J, K–P, Q–Z List of plant family names with etymologies Notes Citations References See http://creativecommons.org/licenses/by/4.0/ for license. Further reading Available online at the Perseus Digital Library. Available online at the Perseus Digital Library. Systematic Greek words and phrases Systematic System
https://en.wikipedia.org/wiki/Mitchell%E2%80%93Netravali%20filters
The Mitchell–Netravali filters or BC-splines are a group of reconstruction filters used primarily in computer graphics, which can be used, for example, for anti-aliasing or for scaling raster graphics. They are also known as bicubic filters in image editing programs because they are bi-dimensional cubic splines. Definition The Mitchell–Netravali filters were designed as part of an investigation into artifacts from reconstruction filters. The filters are piece-wise cubic filters with four-pixel wide supports. After excluding unsuitable filters from this family, such as discontinuous curves, two parameters and remain, through which the Mitchell–Netravali filters can be configured. The filters are defined as follows: It is possible to construct two-dimensional versions of the Mitchell–Netravali filters by separation. In this case the filters can be replaced by a series of interpolations with the one-dimensional filter. From the color values of the four neighboring pixels , , , the color value is then calculated as follows: lies between and ; is the distance between and . Subjective effects Various artifacts may result from certain choices of parameters B and C, as shown in the following illustration. The researchers recommended values from the family (dashed line) and especially as a satisfactory compromise. Implementations The following parameters result in well-known cubic splines used in common image editing programs: Examples See also Ringing artifacts Anisotropic filtering Kernel (image processing) References Digital_signal_processing
https://en.wikipedia.org/wiki/Basis%20of%20a%20matroid
In mathematics, a basis of a matroid is a maximal independent set of the matroid—that is, an independent set that is not contained in any other independent set. Examples As an example, consider the matroid over the ground-set R2 (the vectors in the two-dimensional Euclidean plane), with the following independent sets: It has two bases, which are the sets {(0,1),(2,0)} , {(0,3),(2,0)}. These are the only independent sets that are maximal under inclusion. The basis has a specialized name in several specialized kinds of matroids: In a graphic matroid, where the independent sets are the forests, the bases are called the spanning forests of the graph. In a transversal matroid, where the independent sets are endpoints of matchings in a given bipartite graph, the bases are called transversals. In a linear matroid, where the independent sets are the linearly-independent sets of vectors in a given vector-space, the bases are just called bases of the vector space. Hence, the concept of basis of a matroid generalizes the concept of basis from linear algebra. In a uniform matroid, where the independent sets are all sets with cardinality at most k (for some integer k), the bases are all sets with cardinality exactly k. In a partition matroid, where elements are partitioned into categories and the independent sets are all sets containing at most kc elements from each category c, the bases are all sets which contain exactly kc elements from category c. In a free matroid, where all subsets of the ground-set E are independent, the unique basis is E. Properties Exchange All matroids satisfy the following properties, for any two distinct bases and : Basis-exchange property: if , then there exists an element such that is a basis. Symmetric basis-exchange property: if , then there exists an element such that both and are bases. Brualdi showed that it is in fact equivalent to the basis-exchange property. Multiple symmetric basis-exchange property: if
https://en.wikipedia.org/wiki/Base-orderable%20matroid
In mathematics, a base-orderable matroid is a matroid that has the following additional property, related to the bases of the matroid. For any two bases and there exists a feasible exchange bijection, defined as a bijection from to , such that for every , both and are bases.The property was introduced by Brualdi and Scrimger. A strongly-base-orderable matroid has the following stronger property:For any two bases and , there is a strong feasible exchange bijection, defined as a bijection from to , such that for every , both and are bases. The property in context Base-orderability imposes two requirements on the function : It should be a bijection; For every , both and should be bases. Each of these properties alone is easy to satisfy: All bases of a given matroid have the same cardinality, so there are n! bijections between them (where n is the common size of the bases). But it is not guaranteed that one of these bijections satisfies property 2. All bases and of a matroid satisfy the symmetric basis exchange property, which is that for every , there exists some , such that both and are bases. However, it is not guaranteed that the resulting function f be a bijection - it is possible that several are matched to the same . Matroids that are base-orderable Every partition matroid is strongly base-orderable. Recall that a partition matroid is defined by a finite collection of categories, where each category has a capacity denoted by an integer with . A basis of this matroid is a set which contains exactly elements of each category . For any two bases and , every bijection mapping the elements of to the elements of is a strong feasible exchange bijection. Every transversal matroid is strongly base-orderable. Matroids that are not base-orderable Some matroids are not base-orderable. A notable example is the graphic matroid on the graph K4, i.e., the matroid whose bases are the spanning trees of the clique on 4 vertices. Denote the v
https://en.wikipedia.org/wiki/Right%20group
In mathematics, a right group is an algebraic structure consisting of a set together with a binary operation that combines two elements into a third element while obeying the right group axioms. The right group axioms are similar to the group axioms, but while groups can have only one identity and any element can have only one inverse, right groups allow for multiple identity elements and multiple inverse elements. It can be proven (theorem 1.27 in ) that a right group is isomorphic to the direct product of a right zero semigroup and a group, while a right abelian group is the direct product of a right zero semigroup and an abelian group. Left group and left abelian group are defined in analogous way, by substituting right for left in the definitions. The rest of this article will be mostly concerned about right groups, but everything applies to left groups by doing the appropriate right/left substitutions. Definition A right group, originally called multiple group, is a set with a binary operation ⋅, satisfying the following axioms: Closure For all and in , there is an element c in such that . Associativity For all in , . Left identity element There is at least one left identity in . That is, there exists an element such that for all in . Such an element does not need to be unique. Right inverse elements For every in and every identity element , also in , there is at least one element in , such that . Such element is said to be the right inverse of with respect to . Examples Direct product of finite sets The following example is provided by. Take the group , the right zero semigroup and construct a right group as the direct product of and . is simply the cyclic group of order 3, with as its identity, and and as the inverses of each other. is the right zero semigroup of order 2. Notice the each element repeats along its column, since by definition , for any and in . The direct product of these two structures is defined as fo
https://en.wikipedia.org/wiki/Audio%20deepfake
An audio deepfake (also known as voice cloning) is a type of artificial intelligence used to create convincing speech sentences that sound like specific people saying things they did not say. This technology was initially developed for various applications to improve human life. For example, it can be used to produce audiobooks, and also to help people who have lost their voices (due to throat disease or other medical problems) to get them back. Commercially, it has opened the door to several opportunities. This technology can also create more personalized digital assistants and natural-sounding text-to-speech as well as speech translation services. Audio deepfakes, recently called audio manipulations, are becoming widely accessible using simple mobile devices or personal computers. These tools have also been used to spread misinformation using audio. This has led to cybersecurity concerns among the global public about the side effects of using audio deepfakes, including its possible role in disseminating misinformation and disinformation in audio-based social media platforms. People can use them as a logical access voice spoofing technique, where they can be used to manipulate public opinion for propaganda, defamation, or terrorism. Vast amounts of voice recordings are daily transmitted over the Internet, and spoofing detection is challenging. Audio deepfake attackers have targeted individuals and organizations, including politicians and governments. In early 2020, some scammers used artificial intelligence-based software to impersonate the voice of a CEO to authorize a money transfer of about $35 million through a phone call. According to a 2023 global McAfee survey, one person in ten reported having been targeted by an AI voice cloning scam; 77% of these targets reported losing money to the scam. Audio deepfakes could also pose a danger to voice ID systems currently deployed to financial consumers. Categories Audio deepfakes can be divided into three different
https://en.wikipedia.org/wiki/Radeon%20RX%206000%20series
The Radeon RX 6000 series is a series of graphics processing units developed by AMD, based on their RDNA 2 architecture. It was announced on October 28, 2020 and is the successor to the Radeon RX 5000 series. It consists of the RX 6400, RX 6500 XT, RX 6600, RX 6600 XT, RX 6650 XT, RX 6700, RX 6700 XT, RX 6750 XT, RX 6800, RX 6800 XT, RX 6900 XT and RX 6950 XT for desktop computers; and the RX 6600M, RX 6700M, and RX 6800M for laptops. A sub-series for mobile, Radeon RX 6000S (consisting of RX 6600S, RX 6700S, and RX 6800S), was announced in CES 2022, targeting thin and light laptop designs. The series is designed to compete with Nvidia's GeForce 30 series, and does compete with Intel's Arc Alchemist series of cards. It is also the first generation of AMD GPUs that supports hardware accelerated real-time ray tracing, variable-rate shading and mesh shaders. History On September 14, 2020, AMD hinted at the physical design of its RX 6000 series through a tweet shared on social messaging service Twitter. At the same time, it launched a virtual island inside the video game Fortnite containing a large-scale rendition of the RX 6000 hardware design, which players could freely explore using the game's Creative mode. AMD officially unveiled the first three cards, the RX 6800, RX 6800 XT, and RX 6900 XT, in an event titled "Where Gaming Begins: Ep. 2" on October 28. In the event, they announced the RX 6800 XT as its flagship graphics processor, comparing its performance to that of Nvidia's RTX 3080 graphics card in 1440p and 4K resolution gaming. The 6800 XT was announced with a price tag of $649 USD, $50 lower than the RTX 3080's starting price of $699. They then introduced the RX 6800 as a competitor to Nvidia's previous-generation RTX 2080 Ti, priced at $579 compared to the 2080 Ti's $999; and the RX 6900 XT as its top card, claiming performance comparable with Nvidia's RTX 3090, but with lower power consumption and a launch price of $999, $500 cheaper than the 3090.
https://en.wikipedia.org/wiki/Magway%20Ltd
Magway is a UK startup noted for its e-commerce and freight delivery system that aims to transport goods in pods that fit in new and existing -diameter pipes, underground and overground, reducing road congestion and air pollution. It uses linear magnetic motors to shuttle pods, designed to accommodate a standard delivery crate (or tote), at approximately . Founded in 2017 by Rupert Cruise, an engineer on Elon Musk's Hyperloop project, and Phill Davies, a business expert, Magway secured a £0.65 million grant in 2018, through Innovate UK’s 'Emerging and Enabling Technologies' competition, to develop an operational demonstrator. In 2019, £1.58 million was raised through crowdfunding to fund a pilot scheme, and in 2020, Magway was awarded £1.9 million from the UK Government's 'Driving the Electric Revolution Challenge', an initiative launched to coincide with the first meeting of a new Cabinet committee focused on climate change. In September 2020, Magway completed its first full loop of test track in a warehouse in Wembley. Primarily focused on two freight routes from large consolidation centres near London (Milton Keynes, Buckinghamshire and Hatfield, Hertfordshire) into Park Royal, a west London distribution centre, future plans involve installing of track in decommissioned London gas pipelines, to deliver e-commerce goods from distribution centres direct to consumers in the capital. The design of the pipes is similar to the current underground pipe system in small tunnels that distribute water, gas, and electricity in the city. The pods are powered by electromagnetic wave from magnetic motors that are similar to those used in roller coasters. A proposed route that runs from Milton Keynes to London will have the capacity to transport more than 600 million parcels annually. Outside of urban areas, Magway plans to build its pipe system alongside motorways. References Sustainable transport Transport systems Emerging technologies Linear induction motors Vacuum sys
https://en.wikipedia.org/wiki/TV%20accessory
A television accessory (TV accessory) is an accessory that is used in conjunction with a television (TV) or other compatible display devices and is intended to either improve the user experience or to offer new possibilities of using it. History It is difficult to say when the very first TV accessory was invented or when it hit the consumer market. The first TV accessory with which owners could actively influence the content displayed on the screen in real time was the Magnavox Odyssey, the first commercial home video game console, released in September 1972 by Magnavox for a list price of $99.95. One of the first TV accessories that could record TV programs available for consumers was the Clie Pega-VR100K by Sony, released on October 9, 2003, for a list price of $479.99. As of 2017, TV accessories are a rapidly growing market which is expected to grow even more rapidly in the near future. Some of the most popular manufacturers of TV accessories include Sony, Magnavox, Apple, Nvidia, Amazon, Samsung, Google as well as many independent third-party suppliers. Types Soundbars A soundbar (also called sound bar or media bar) is a type of loudspeaker that projects audio from a wide enclosure. Soundbars are one of the most popular TV accessories because they are affordable, very easy to install and a relatively large upgrade compared to other accessories, offering much better sound than most integrated TV loudspeakers. Universal remotes A universal remote is a remote control that can be programmed to operate various brands of one or more types of consumer electronics devices. On May 30, 1985, Philips introduced the first universal remote (U.S. Pat. #4774511) under the Magnavox brand name. In 1985, Robin Rumbolt, William "Russ" McIntyre, and Larry Goodson with North American Philips Consumer Electronics (Magnavox, Sylvania, and Philco) developed the first universal remote control. Streaming television Streaming television is the digital distribution of telev
https://en.wikipedia.org/wiki/Moodies%20Group
The Moodies Group is a geological formation in South Africa and Eswatini. It has the oldest well-preserved siliciclastic tidal deposits on Earth, where microbial mats flourished. See also Archean life in the Barberton Greenstone Belt Fig Tree Formation Onverwacht Group References Geologic groups of Africa Geologic formations of South Africa Geology of Eswatini Archean Africa Fossiliferous stratigraphic units of Africa Paleontology in South Africa Origin of life
https://en.wikipedia.org/wiki/List%20of%20plant%20genus%20names%20with%20etymologies%20%28Q%E2%80%93Z%29
Since the first printing of Carl Linnaeus's Species Plantarum in 1753, plants have been assigned one epithet or name for their species and one name for their genus, a grouping of related species. Many of these plants are listed in Stearn's Dictionary of Plant Names for Gardeners. William Stearn (1911–2001) was one of the pre-eminent British botanists of the 20th century: a Librarian of the Royal Horticultural Society, a president of the Linnean Society and the original drafter of the International Code of Nomenclature for Cultivated Plants. The first column below contains seed-bearing genera from Stearn and other sources as listed, excluding names with missing derivations and those names that no longer appear in more modern works, such as Plants of the World by Maarten J. M. Christenhusz (lead author), Michael F. Fay and Mark W. Chase. Plants of the World is also used for the family and order classification for each genus. The second column gives a meaning or derivation of the word, such as a language of origin. The last two columns indicate additional citations. Key Latin: = derived from Latin (otherwise Greek, except as noted) Ba = listed in Ross Bayton's The Gardener's Botanical Bu = listed in Lotte Burkhardt's Index of Eponymic Plant Names CS = listed in both Allen Coombes's The A to Z of Plant Names and Stearn's Dictionary of Plant Names for Gardeners G = listed in David Gledhill's The Names of Plants St = listed in Stearn's Dictionary of Plant Names for Gardeners Genera See also Glossary of botanical terms List of Greek and Latin roots in English List of Latin and Greek words commonly used in systematic names List of plant genera named for people: A–C, D–J, K–P, Q–Z List of plant family names with etymologies Notes Citations References See http://creativecommons.org/licenses/by/4.0/ for license. Further reading Available online at the Perseus Digital Library. Available online at the Perseus Digital Library. Systematic Greek
https://en.wikipedia.org/wiki/Turin%20Polytechnic%20University%20in%20Tashkent
Turin Polytechnic University in Tashkent (Uzbek: Toshkent shahridagi Turin politexnika universiteti (TTPU)) is a non-profit public higher education institution in Uzbekistan. Turin Polytechnic University in Tashkent was established in 2009 in a partnership with Politecnico di Torino, Italy. TTPU's main objective is to prepare specialists for the automotive, mechanical engineering, electrical industries and companies in the field of civil engineering and construction, and the power industry, in accordance with the educational programs adopted in collaboration with Politecnico di Torino, Italy. TTPU has five departments: Department of Natural-Mathematical Sciences, Department of Humanitarian-Economy Sciences, Department of Control and Computer Engineering, Department of Civil Engineering and Architecture, and Department of Mechanical and Aerospace Engineering. TTPU is a teaching and research university. History The official foundation date of the university is April 27, 2009, when the decree of the President of the Republic of Uzbekistan No. PP-1106 “On the organization of Turin Polytechnic University in Tashkent” was issued and from that date the university began its activity as a higher educational institution in accordance with the Educational Standards of the Republic of Uzbekistan. In summer of 2009, the first 200 students were admitted for bachelor's degree program and the new university building with academic and administrative buildings and a modern campus was commissioned. TTPU was established from the collaboration among Polytechnic University of Turin, UZAVTOSANOAT (the leading car manufacturer in Uzbekistan), and the Uzbek Ministry of Higher Education. The Cooperation Agreement and Double Degree Agreement was signed 2009 with the Politecnico di Torino (Italy) that developed three HE curricula in Engineering BS and MS in Uzbekistan in accordance with the Italian HE system and acknowledged from both, the Ministry of Higher and Secondary Education of Rep
https://en.wikipedia.org/wiki/Turntide%20Technologies
Turntide Technologies is a US-based business that makes intelligent, sustainable motor systems. Turntide applies its Technology for Sustainable Operations across buildings, agriculture, and transportation segments. It maintains operations in the US, Canada, the United Kingdom, and India. History Turntide was founded in 2013 as Software Motor Corporation (shortened to "SMC"), then changed its name to Software Motor Company in 2018. In July 2020, SMC rebranded to Turntide Technologies to better represent the company's solutions and ambitions. In 2016, SMC received a seed investment from National Science Foundation Small Business Innovation Research program, and a second investment in 2017. Also in 2017, Turntide received investment from Wells Fargo's Innovation Incubator. Turntide entered the agriculture space in 2018 by partnering with VES, a dairy technology supplier, to launch DairyBOS, the Dairy Barn Operating System. Turntide acquired VES fully in October 2020. Turntide then acquired and merged VES with Canadian agricultural tech company Artex Barn Solutions to expand its offering into intelligent barn systems. Turntide won a 2020 Gold Edison Award and 2020 Product of the Year from Environmental and Energy Leader. In September 2020, Amazon awarded Turntide an investment as part of its first round of five Climate Pledge Fund investments. At that time, Turntide also announced investment from Future Shape, the fund led by Nest founder Tony Fadell. Then in March 2021, Turntide announced it had raised funds from Bill Gates' Breakthrough Energy Ventures, Robert Downey Jr.'s climate fund FootPrint Coalition, Fifth Wall Capital, and Keyframe Capital. It also announced that it had acquired building automation company Riptide. Fast Company also named Turntide one the World's Most Innovative Companies for 2021 in the Energy category. CEO Ryan Morris told CNN in April 2021 that the company would "soon announce a push into electric vehicles." In June 2021, Turntide a
https://en.wikipedia.org/wiki/We%20Believe%20%28yard%20sign%29
We Believe is a yard sign created as a response to Donald Trump's victory in the 2016 United States presidential election. The sign was originally designed by Kristin Garvey, a librarian from Madison, Wisconsin. The signs became popular among American liberals during Trump's presidency. Original design The sign's design was originally created by librarian Kristin Garvey, of Madison, Wisconsin. Garvey thought of the concept the day after the 2016 United States presidential election, a day she described as more of a sense of loss than after any other election. She designed the sign by thinking of various groups she anticipated would be negatively affected by Trump's presidency, and attempting to find quotes from liberal activists and politicians in support of such groups. Popularity The sign spread rapidly among liberals during Trump's presidency, becoming an almost ubiquitous presence in liberal areas. Some people who have attempted to display the sign have come in conflict with homeowner associations, which can have rules disallowing political yard signs. The sign has proven popular at protests, including the 2017 Women's March and the George Floyd protests in 2020. Variations The sign has spawned multiple variations, with various levels of agreement with the original message. Some variations have been sold for-profit, which Garvey has expressed her disapproval of, writing: "I don't want people to make money off of it. If they're donating the money they make, then that's fine". Parodies of the sign from a right-wing perspective also exist, including one that promoted the conspiracy theory that the 2020 United States presidential election was stolen, that Epstein didn't kill himself, that Anthony Fauci and Bill Gates are untrustworthy, that Hillary Clinton belongs in prison, and that "media is propaganda". This sign was shared with approval by the Jefferson County, Colorado Republican Party. See also Black Lives Matter Women's rights are human rights Open
https://en.wikipedia.org/wiki/Proof%20of%20personhood
Proof of personhood (PoP) is a means of resisting malicious attacks on peer to peer networks, particularly, attacks that utilize multiple fake identities, otherwise known as a Sybil attack. Decentralized online platforms are particularly vulnerable to such attacks by their very nature, as notionally democratic and responsive to large voting blocks. In PoP, each unique human participant obtains one equal unit of voting power, and any associated rewards. The term is used in for cryptocurrency and blockchains as a parallel to proof of work, proof of stake, and other consensus mechanisms which attempt to distribute voting power and rewards to participants proportionately to an investment of resources. Background The problem of Sybil attacks using many virtual identities has been recognized for decades as a fundamental challenge for distributed systems that expect each human user to have only one account or identity. CAPTCHAs attempt to rate-limit automated Sybil attacks by using automated Turing tests to distinguish humans from machines creating accounts or requesting services. Even when successful in this goal, however, CAPTCHAs allow one human to obtain multiple accounts or shares of a resource simply by solving multiple CAPTCHAs in succession, and thus do not satisfy the one-per-person goal in proof of personhood. Aside from CAPTCHAs allowing people to obtain multiple users, there are additional complications. Many users who are visually impaired or have learning disabilities may struggle to complete the puzzles. Additionally, some recently developed AI has succeeded in solving the CAPTCHA issue. Distributed systems could require users to authenticate using strong identities verified by a government or trusted third party, using an identity verification service or self-sovereign identity system for example, but strong identification requirements conflict with the privacy and anonymity, and increase barriers to entry. One approach proposed to create anonymous bu
https://en.wikipedia.org/wiki/Cleversafe%20Inc.
Cleversafe Inc. was an object storage software and systems developer company. It was founded in 2004 by Chris Gladwin, an American technology entrepreneur. The company was acquired by IBM in 2015, and became an integral part of IBM Cloud Object Storage. History Cleversafe Inc was launched as a startup company in 2004 by Chris Gladwin, an American inventor, computer engineer and technology entrepreneur. Gladwin created Cleversafe because his prior company, MusicNow, Inc., deployed systems to store all digitized music and he felt that approach used by the enterprise data storage products could be vastly improved. Cleversafe had its headquarters in Chicago, Illinois, and was originally based in Illinois Institute of Technology incubator, where the company matured for the first years of its existence. From the beginning, Cleversafe's initial focus as a startup was on developing new dispersed storage technology for unstructured data in the petabyte-plus range, which the company called " Dispersed Storage Network" or dsNet. According to New York Times and other sources, Cleversafe's approach was to break the data into pieces and then disperses it in multiple locations around the world in order to additionally enhance data security. The initial funding was provided by OCA Ventures. Chairman and investor Christopher Galvin recruited John Morris as its new president and CEO in 2013 to build a more aggressive sales and marketing culture. Within two years, Morris rapidly expanded sales and successfully increased the value of Cleversafe to the $1.4 billion paid by IBM when it purchased the company three years later in 2015. Awards In 2008, Cleversafe was a winner of the Chicago Innovation Awards in the category "Data Backup and Security". In 2011, it was also supported by In-Q-Tel, a venture capital firm related to the US intelligence community. Forbes notes: "In 2013, the company was the 2nd largest cloud storage vendor by volume and received over $100 million in venture fu
https://en.wikipedia.org/wiki/Evansia%20%28journal%29
Evansia is a quarterly, peer-reviewed scientific journal, publishing research on issues in biology and environmental preservation related to lichenology and bryology, primarily in North America. It is published quarterly by the American Bryological and Lichenological Society (ABLS) and serves as the information bulletin of the ABLS. Articles are frequently popular or semi-technical rather than technical and intended for both amateurs and professionals. There are reports on local flora and presentations of techniques for studying and curating lichens, bryophytes, and hepatics. The ABLS named the journal in honor of Alexander William Evans. References Botany journals Academic journals established in 1984 Quarterly journals English-language journals Bryology Lichenology
https://en.wikipedia.org/wiki/Mageo
Mageo (until May 1998, MaMedia) was the oldest Czech message board, active from the end of 1995 until 2017. Milan Votava is considered the founder and spiritual father of the project, along with co-founder Aleš Němeček. In June 1997, the address mamedia.cz was recognized as the most visited Czech server with more than 2.5 million accesses per month. At the end of September, 2017, the operation of the discussion server was terminated and the domain was redirected to the project of a new social network with integrated game environment. History Mageo's predecessor, the MaMedia discussion, was founded in August 1995 by Milan Votava and Aleš Němeček, who established the legal entities MA Media s.r.o. and MAMEDIA.COM s.r.o. (the initial letters MA were an abbreviation of the names Milan and Aleš). At first, it seemed that the project would not have a long duration due to financial problems, however, with the help of Pavel Vojíř (then a Reflex reporter, Playboy editor, editor-in-chief of Melodie and editor-in-chief of Public Reality), MaMedia was able to survive and stay viable. Due to the impossibility of registering the domain www.mamedia.com, MaMedia was renamed to Mageo in May 1998, and there were also fundamental changes in the structure and graphics that lasted to its end. The genealogical portal genea.cz is based on the original Mageo auditorium from 1998. The popularity of the MaMedia server increased rapidly, as evidenced by regular user events (MaMedia / Mageo steamer, an event held regularly every year, moderated several times in the past by Leoš Mareš), as well as a hacker attack on February 15, 1997. Local phenomena (Drasťák - a novel to be continued, the so-called MUSIL mania) grew into a reality at the turn of the millennium and into reality (sabotage of the Miss Internet competition, Štěpán Turek as a stellar infantry general in the 2nd year of Česko hledá SuperStar). Many people who have made a significant contribution to the Czech Internet have passe
https://en.wikipedia.org/wiki/Nicolaos%20Alexopoulos
Nicolaos Georgiou Alexopoulos (born March 30, 1942) is a Greek electrical engineer, former professor and university dean, and a champion of education and research. He currently serves as the Vice President for Academic Programs and University Relations at the Broadcom Foundation, and previously was Vice President for Antennas, RF (Radio Frequency) Technologies, and University Relations at Broadcom Corporation from 2008 to 2015. In 2005, he received an honorary doctorate degree from the National Technical University of Athens "for contributions to education and research in engineering electrodynamics and for his public lectures on the 'Genesis and Destruction of the First Research University: The Museum/Library of Alexandria." Alexopoulos is a member of the Dean's Engineering Leadership Council at the Henry Samueli School of Engineering, University of California, Irvine (UCI). He is also a member of the Corporate Advisory Board for UCI's Department of Biomedical Engineering. He was a former member of the Scientific Advisory Board for the Centre for Integrated Circuits and Systems at Nanyang Technological University in Singapore from April 2010 to March 2012. Alexopoulos is a named inventor of 45 US patents. He is a Fellow of the Institute of Electrical and Electronics Engineers (IEEE) and was elected "for contributions to the understanding of substrate-superstrate effects on printed circuit antennas and integrated microwave circuits." He is a Member of the National Academy of Engineering, elected "For contributions to microwave circuits, antennas, and structures for low observable technologies, and for contributions in engineering education." In September 2016, the Henry Samueli School of Engineering at the University of California, Irvine, honored Alexopoulos and his wife with the naming of the Nicolaos G. and Sue Curtis Alexopoulos Presidential Chair in Electrical Engineering and Computer Science. In 2019, the University of Michigan awarded him the College of En
https://en.wikipedia.org/wiki/Rated%20R%26B
Rated R&B is an independent online magazine based in the United States, which is dedicated and devoted to news, topics and almost all things related to rhythm and blues (R&B) and soul music. It publishes independent music reviews, features, interview, and media. Founded and currently edited by Keithan Samuels in August 2011, the webzine has become a leading online source for R&B and soul music news according to Samuels himself and also openly promotes underrated/unnoticed artists of that genre. Reviews by Rated R&B have been mentioned in publications such as BBC,VIBE, Dazed, Essence, Forbes, The Huffington Post, Yahoo! and Vogue. Rated R&B also publishes music premieres, exclusive live performances and playlists. During an interview with Shannon Ramsey, the host of Incisive Entertainment's Let's Talk web series, Samuels, who first began writing articles about music in 2009, revealed the backstory and inspiration behind him launching the webzine, saying: In 2020, eZ Toolset listed Rated R&B at number two on their 15 Top R&B Music RSS Feeds To Follow list and Feedspost also listed the webzine at number four on their Top 40 R&B Music Blogs'' list. References External links Internet properties established in 2011 American music websites Online music magazines published in the United States Online magazines Music review websites Black-owned companies of the United States
https://en.wikipedia.org/wiki/Reliability%20verification
Reliability verification or reliability testing is a method to evaluate the reliability of the product in all environments such as expected use, transportation, or storage during the specified lifespan. It is to expose the product to natural or artificial environmental conditions to undergo its action to evaluate the performance of the product under the environmental conditions of actual use, transportation, and storage, and to analyze and study the degree of influence of environmental factors and their mechanism of action. Through the use of various environmental test equipment to simulate the high temperature, low temperature, and high humidity, and temperature changes in the climate environment, to accelerate the reaction of the product in the use environment, to verify whether it reaches the expected quality in R&D, design, and manufacturing. Description Reliability is the probability of a product performing its intended function over its specified period of usage and under specified operating conditions, in a manner that meets or exceeds customer expectations. Reliability verification is also called reliability testing, which refers to the use of modeling, statistics, and other methods to evaluate the reliability of the product based on the product's life span and expected performance. Most product on the market requires reliability testing, such as automotive, integrated circuit, heavy machinery used to mine nature resources, Aircraft auto software. Reliability criteria There are many criteria to test depends on the product or process that are testing on, and mainly, there are five components that are most common: Product life span Intended function Operating Condition Probability of Performance User exceptions The product life span can be split into four different for analysis. Useful life is the estimated economic life of the product, which is defined as the time can be used before the cost of repair do not justify the continue use to the product.
https://en.wikipedia.org/wiki/VAST%20Data
VAST Data is a technology company that focuses on data storage, specifically flash memory. Founded in 2016, VAST has offices in the United States, UK, France, Germany, Australia. VAST Data was founded with the aim of replacing multiple storage tiers with one solid state platform. VAST Data is being used by the National Institutes of Health and Harvard University to combat the COVID-19 pandemic, as well as by Ginkgo Bioworks for genomic studies. History VAST was founded in 2016 by Renen Hallak, a former engineer of R&D at XtremIO, Shachar Fienblit, formerly at Kaminario and Jeff Denworth, formerly at CTERA Networks. Mike Wing of Dell is a part of the leadership team at VAST Data. VAST Data's launch was supported by Dell and Goldman Sachs. As of April 2020, the company had 145 employees, most of which were remote workers. In April 2021, VAST moved to a software licensing model called Gemini that enables customers to separate the hardware purchasing cycle from the software licensing cost. Technology VAST Data uses Intel's Optane (or 3D Xpoint-based) NVMe SSDs. 3D XPoint non-volatile memory is integrated into VAST Data's architecture, as hardware mechanism to handle computational storage software tasks such as erasure coding, large stripe write shaping, and other software mechanics, so that lower cost, high density NAND Flash-based SSDs can be effectively used behind the 3D XPoint high performance SSDs. VAST Data's technology allows for collapsing multiple storage tiers into one that has decoupled compute nodes, which are accessed using NVMe-oF. After data reduction occurs, around 2PB of space is available. The single VAST Data tier uses wide data stripes, with the purpose of global erasure coding. NVMe-linked Databoxes contain flash drives for data and Optane XPoint for metadata. VAST storage enclosures are connected to servers through NVMe-oF, using either 100Gbit/s Ethernet or Infiniband. VAST Data, with regard to universal storage, uses Flash-QLC and 100 p
https://en.wikipedia.org/wiki/List%20of%20set%20identities%20and%20relations
This article lists mathematical properties and laws of sets, involving the set-theoretic operations of union, intersection, and complementation and the relations of set equality and set inclusion. It also provides systematic procedures for evaluating expressions, and performing calculations, involving these operations and relations. The binary operations of set union () and intersection () satisfy many identities. Several of these identities or "laws" have well established names. Notation Throughout this article, capital letters (such as and ) will denote sets. On the left hand side of an identity, typically, will be the eft most set, will be the iddle set, and will be the ight most set. This is to facilitate applying identities to expressions that are complicated or use the same symbols as the identity. For example, the identity may be read as: Elementary set operations For sets and define: and where the is sometimes denoted by and equals: One set is said to another set if Sets that do not intersect are said to be . The power set of is the set of all subsets of and will be denoted by Universe set and complement notation The notation may be used if is a subset of some set that is understood (say from context, or because it is clearly stated what the superset is). It is emphasized that the definition of depends on context. For instance, had been declared as a subset of with the sets and not necessarily related to each other in any way, then would likely mean instead of If it is needed then unless indicated otherwise, it should be assumed that denotes the universe set, which means that all sets that are used in the formula are subsets of In particular, the complement of a set will be denoted by where unless indicated otherwise, it should be assumed that denotes the complement of in (the universe) One subset involved Assume Identity: Definition: is called a left identity element of a binary operator if fo
https://en.wikipedia.org/wiki/Sinai%E2%80%93Ruelle%E2%80%93Bowen%20measure
In the mathematical discipline of ergodic theory, a Sinai–Ruelle–Bowen (SRB) measure is an invariant measure that behaves similarly to, but is not an ergodic measure. In order to be ergodic, the time average would need to be equal the space average for almost all initial states , with being the phase space. For an SRB measure , it suffices that the ergodicity condition be valid for initial states in a set of positive Lebesgue measure. The initial ideas pertaining to SRB measures were introduced by Yakov Sinai, David Ruelle and Rufus Bowen in the less general area of Anosov diffeomorphisms and axiom A attractors. Definition Let be a map. Then a measure defined on is an SRB measure if there exist of positive Lebesgue measure, and with same Lebesgue measure, such that: for every and every continuous function . One can see the SRB measure as one that satisfies the conclusions of Birkhoff's ergodic theorem on a smaller set contained in . Existence of SRB measures The following theorem establishes sufficient conditions for the existence of SRB measures. It considers the case of Axiom A attractors, which is simpler, but it has been extended times to more general scenarios. Theorem 1: Let be a diffeomorphism with an Axiom A attractor . Assume that this attractor is irreducible, that is, it is not the union of two other sets that are also invariant under . Then there is a unique Borelian measure , with , characterized by the following equivalent statements: is an SRB measure; has absolutely continuous measures conditioned on the unstable manifold and submanifolds thereof; , where is the Kolmogorov–Sinai entropy, is the unstable manifold and is the differential operator. Also, in these conditions is a measure-preserving dynamical system. It has also been proved that the above are equivalent to stating that equals the zero-noise limit stationary distribution of a Markov chain with states . That is, consider that to each point is associated a tran
https://en.wikipedia.org/wiki/Jennifer%20Morse%20%28mathematician%29
Jennifer Leigh Morse is a mathematician specializing in algebraic combinatorics. She is a professor of mathematics at the University of Virginia. Research Morse's interests in algebraic combinatorics include representation theory and applications to statistical physics, symmetric functions, Young tableaux, and -Schur functions, which are a generalization of Schur polynomials. Education and career Morse earned her Ph.D. in 1999 from the University of California, San Diego. Her dissertation, Explicit Expansions for Knop-Sahi and Macdonald Polynomials, was supervised by Adriano Garsia. She has been a faculty member at the University of Pennsylvania, at the University of Miami, and at Drexel University before moving to the University of Virginia in 2017. Book Morse is one of six coauthors of the book -Schur Functions and Affine Schubert Calculus (Fields Institute Monographs 33, Springer, 2014). Recognition Morse was named a Simons Fellow in Mathematics in 2012 and again in 2021. She was elected as a Fellow of the American Mathematical Society in the 2021 class of fellows, "for contributions to algebraic combinatorics and representation theory and service to the mathematical community". References External links Home page Year of birth missing (living people) Living people 20th-century American mathematicians 21st-century American mathematicians American women mathematicians Combinatorialists University of California, San Diego alumni University of Pennsylvania faculty University of Miami faculty Drexel University faculty University of Virginia faculty Fellows of the American Mathematical Society 20th-century American women 21st-century American women
https://en.wikipedia.org/wiki/Maffick
Maffick LLC is a social media digital content company based in Los Angeles, California that has been labelled a Russian state-backed entity by Facebook, Twitter, Tiktok and YouTube due to its connections to German-based Maffick Media GmbH, which was majority owned by RT (Russia Today) subsidiary Ruptly. In December 2021, Maffick LLC registered under the Foreign Agent Registration Act (FARA) as being financed by ANO TV-Novosti. It was incorporated in 2019, while its main channel is In the Now, launched in 2016. On February 28, 2022, CEO Anissa Naouai terminated Maffick's service agreement with RT following the 2022 Russian invasion of Ukraine. Brands According to CNN, Maffick "videos are generally critical of U.S. foreign policy and the mainstream American media, while largely avoiding criticism of the Russian government." Its content is targeted at American millennials. The company operates three major channels: In the Now (ITN), Wasted-ED, and Soapbox. By mid-2018, In The Now had three million likes on Facebook; by mid-2020, it had five million followers. Maffick appears affiliated with a similar group, Maffick Moscow, which runs a Russian-language website and social media accounts. Maffick launched a political podcast on Apple Podcast, Spotify, and Audible in October 2021, under the brand Maffick Podcasts, called Left Bitches (who are Right). History In The Now In The Now began as a programme on RT, fronted by Anissa Naouai, which became a stand-alone entity in June 2016. BuzzFeed News described it as "news served hot with a side of smile and a big dollop of propaganda". In The Now changed its Twitter handle from @InTheNowRT to @InTheNow_Tweet, but used the same IP address as RT. NBC observed Maffick's content, for instance on the Syrian civil war, promoted pro-Russian geopolitical positions. Early viral hits included Canadian blogger Eva Bartlett defending the legitimacy of the 2014 Syrian presidential election, another attacking Syria's White Helmets c
https://en.wikipedia.org/wiki/GreenPAK
GreenPAK™ is a Renesas Electronics' family of mixed-signal integrated circuits and development tools. GreenPAK circuits are classified as configurable mixed-signal ICs. This category is characterized by analog and digital blocks that can be configured through programmable non-volatile memory. These devices also have a "Connection Matrix", which supports routing signals between the various blocks. These devices can include multiple components within a single IC. Also, the company developed the Go Configure™ Software Hub for IC design creation, chip emulation, and programming. History The GreenPAK technology was developed by Silego Technology Inc. The company was established in 2001. The GreenPAK product line was introduced in April 2010. Then, the first generation of ICs was released. Later, Silego was acquired by Dialog Semiconductor PLC in 2017. Officially, the trademark for the GreenPAK title was registered in 2019. Currently, in the market, the sixth generation of GreenPAK ICs was already released. Over 6 billion GreenPAK ICs have been shipped to Dialog's customers all over the world. In 2021, Dialog was acquired by Renesas Electronics, therefore the GreenPAK technology is currently officially owned by Renesas. GreenPAK Integrated Circuits There are a few categories of ICs developed within the GreenPAK technology: Dual Supply GreenPAK – provides level translation from higher or lower voltage domains. GreenPAK with Power Switches – includes single and dual power switches up to 2A. GreenPAK with Asynchronous State Machine – allows developing customized state machine IC designs. GreenPAK with Low Power Dropout Regulators – enables a user to divide power loads using the unique concept of "Flexible Power Islands" devoted to wearable devices. GreenPAK with In-System Programmability – can be reprogrammed up to 1000 times using the I2C serial interface. Automotive GreenPAK – allows multiple system functions in a single IC used for automotive circuit designs.
https://en.wikipedia.org/wiki/Fungal%20genome
Fungal genomes are among the smallest genomes of eukaryotes. The sizes of fungal genomes range from less than 10 Mbp to hundreds of Mbp. The average genome size is approximately 37 Mbp in Ascomycota, 47 Mbp in Basidiomycota and 75 Mbp in Oomycota. The sizes and gene numbers of the smallest genomes of free-living fungi such as those of Wallemia ichthyophaga, Wallemia mellicola or Malassezia restricta are comparable to bacterial genomes. The genome of the extensively researched yeast Saccharomyces cerevisiae contains approximately 12 Mbp and was the first completely sequenced eukaryotic genome. Due to their compact size fungal genomes can be sequenced with less resources than most other eukaryotic genomes and are thus important models for research. Some fungi exist as stable haploid, diploid, or polyploid cells, others change ploidy in response to environmental conditions and aneuploidy is also observed in novel environments or during periods of stress. Genome comparisons The comparison of fungal genomes has been used to study the evolution of fungi, to improve the resolution of the phylogeny of fungal species, and to determine the time of the emergence and changes in species traits and lifestyles, such as the evolution symbiotic or pathogenic interactions, and the evolution of different morphologies. Major chromosomal rearrangements in fungi were found to be more frequent than in other eukaryotes, thus macrosynteny in fungi is rare. However, in filamentous ascomycetes genes were found to be conserved within homologous chromosomes, but with randomized orders and orientations, a phenomenon named mesosynteny. Mesosynteny was also observed in the basidiomycetous genus Rhodotorula. A comparison of more than 1000 Saccharomyces cerevisiae genomes was used to identify the geographical origin and several domestication events of the species as well as map genomic variants to the species-wide phenotypic landscape of the yeast. Comparisons of several genomes of the same speci
https://en.wikipedia.org/wiki/History%20of%20Delphi%20%28software%29
This page details the history of the programming language and software product Delphi. Roots and birth Delphi evolved from Borland's Turbo Pascal for Windows, itself an evolution with Windows support from Borland's Turbo Pascal and Borland Pascal with Objects, very fast 16-bit native-code MS-DOS compilers with their own sophisticated integrated development environment (IDE) and textual user interface toolkit for DOS (Turbo Vision). Early Turbo Pascal (for MS-DOS) was written in a dialect of the Pascal programming language; in later versions support for objects was added, and it was named Object Pascal. Delphi was originally one of many codenames of a pre-release development tool project at Borland. Borland developer Danny Thorpe suggested the Delphi codename in reference to the Oracle at Delphi. One of the design goals of the product was to provide database connectivity to programmers as a key feature and a popular database package at the time was Oracle database; hence, "If you want to talk to [the] Oracle, go to Delphi". As development continued towards the first release, the Delphi codename gained popularity among the development team and beta testing group. However, the Borland marketing leadership preferred a functional product name over an iconic name and made preparations to release the product under the name Borland AppBuilder. Shortly before the release of the Borland product in 1995, Novell AppBuilder was released, leaving Borland in need of a new product name. After much debate and many market research surveys, the Delphi codename became the Delphi product name. Early Borland years (1995–2003) Borland Delphi Delphi (later known as Delphi 1) was released in 1995 for the 16-bit Windows 3.1, and was an early example of what became known as Rapid Application Development (RAD) tools. Delphi 1 features included: Visual two-way tools Property Method Event (PME) model TObject, records, component, and owner memory management Visual Component Library
https://en.wikipedia.org/wiki/The%20Clean%20Network
The Clean Network was a U.S. government-led, bi-partisan effort announced by then U.S. Secretary of State Mike Pompeo in August 2020 to address what it describes as "the long-term threat to data privacy, security, human rights and principled collaboration posed to the free world from authoritarian malign actors." Its promoters state that it has resulted in an "alliance of democracies and companies," "based on democratic values." According to the Trump administration, the Clean Network is intended to implement internationally accepted digital trust standards across a coalition of trusted partners. In December 2020, the United States announced that more than 60 nations, representing more than two thirds of the world's gross domestic product, and 200 telecom companies, have publicly committed to the principles of The Clean Network. This alliance of democracies includes 27 of the 30 NATO members; 26 of the 27 EU members, 31 of the 37 OECD nations, 11 of the 12 Three Seas nations as well as Japan, Israel, Australia, South Korea, Singapore, Taiwan, Canada, New Zealand, Vietnam and India. The term "Clean Network" was coined by U.S. Undersecretary of State Keith Krach, who initially led the initiative, which includes officials in the Treasury Department, the Office of the U.S. Trade Representative, the National Security Council, and the Commerce Department. According to Bloomberg, Krach is credited with coordinating a variety of national and regional approaches to shape a more unified international project, relying on trust more than compulsion—a notable change in tone after years in which the Trump administration pursued a go-it-alone, "America First" strategy. On April 22, 2021, David Ignatius of the Washington Post stated that Krach's Clean Network provides continuity with the Biden administration's desire to get democracies together on the same playing field on technology. Krach described the Huawei effort as a “beachhead” in a wider battle to unite against Chinese e
https://en.wikipedia.org/wiki/SONiC%20%28operating%20system%29
The Software for Open Networking in the Cloud or alternatively abbreviated and stylized as SONiC, is a free and open source network operating system based on Linux. It was originally developed by Microsoft and the Open Compute Project. In 2022, Microsoft ceded oversight of the project to the Linux Foundation, who will continue to work with the Open Compute Project for continued ecosystem and developer growth. SONiC includes the networking software components necessary for a fully functional L3 device and was designed to meet the requirements of a cloud data center. It allows cloud operators to share the same software stack across hardware from different switch vendors and works on over 100 different platforms. There are multiple companies offering enterprise service and support for SONiC,. Overview SONiC was developed and open sourced by Microsoft in 2016. The software decouples network software from the underlying hardware and is built on the Switch Abstraction Interface API. It runs on network switches and ASICs from multiple vendors. Notable supported network features include Border Gateway Protocol (BGP), remote direct memory access (RDMA), QoS, and various other Ethernet/IP technologies. Much of the protocol support is provided through inclusion of the FRRouting suite of routing daemons. The SONiC community includes cloud providers, service providers, and silicon and component suppliers, as well as networking hardware OEMs and ODMs. It has more than 850 members. The source code is licensed under a mix of open source licenses including the GNU General Public License and the Apache License, and is available on GitHub. References External links Computing platforms Debian-based distributions Free and open-source software Linux Microsoft free software Microsoft operating systems Network operating systems Software using the Apache license Software using the GPL license 2017 software Linux Foundation projects
https://en.wikipedia.org/wiki/Free%20matroid
In mathematics, the free matroid over a given ground-set E is the matroid in which the independent sets are all subsets of E. It is a special case of a uniform matroid. The unique basis of this matroid is the ground-set itself, E. Among matroids on E, the free matroid on E has the most independent sets, the highest rank, and the fewest circuits. Free extension of a matroid The free extension of a matroid by some element , denoted , is a matroid whose elements are the elements of plus the new element , and: Its circuits are the circuits of plus the sets for all bases of . Equivalently, its independent sets are the independent sets of plus the sets for all independent sets that are not bases. Equivalently, its bases are the bases of plus the sets for all independent sets of size . References Matroid theory
https://en.wikipedia.org/wiki/Soft%20privacy%20technologies
Soft privacy technologies fall under the category of PETs, Privacy-enhancing technologies, as methods of protecting data. Soft privacy is a counterpart to another subcategory of PETs, called hard privacy. Soft privacy technology has the goal of keeping information safe, allowing services to process data while having full control of how data is being used. To accomplish this, soft privacy emphasizes the use of third-party programs to protect privacy, emphasizing auditing, certification, consent, access control, encryption, and differential privacy. Since evolving technologies like the internet, machine learning, and big data are being applied to many long-standing fields, we now need to process billions of datapoints every day in areas such as health care, autonomous cars, smart cards, social media, and more. Many of these fields rely on soft privacy technologies when they handle data. Applications Health care Some medical devices like Ambient Assisted Living monitor and report sensitive information remotely into a cloud. Cloud computing offers a solution that meets the healthcare need for processing and storage at an affordable price. Together, this system is used to monitor a patient's biometric conditions remotely, connecting with smart technology when necessary. In addition to monitoring, the devices can also send a mobile notification when certain conditions pass a set point such as a major change in blood pressure. Due to the nature of these devices, which report data constantly and use smart technology, this type of medical technology is subject to a lot of privacy concerns. Soft privacy is thus relevant for the third-party cloud service, as many privacy concerns center there, including risk in unauthorized access, data leakage, sensitive information disclosure, and privacy disclosure. One solution proposed for privacy issues around cloud computing in health care is through the use of Access control, by giving partial access to data based on a user's role
https://en.wikipedia.org/wiki/Shuffle-exchange%20network
In graph theory, the shuffle-exchange network is an undirected cubic multigraph, whose vertices represent binary sequences of a given length and whose edges represent two operations on these sequence, circular shifts and flipping the lowest-order bit. Definition In the version of this network introduced by Tomas Lang and Harold S. Stone in 1976, simplifying earlier work of Stone in 1971, the shuffle-exchange network of order consisted of an array of cells, numbered by the different binary numbers that can be represented with bits. These cells were connected by communications links in two different patterns: "exchange" links in which each cell is connected to the cell numbered with the opposite value in its lowest-order bit, and "shuffle" links in which each cell is connected to the cell whose number is obtained by a circular shift that shifts every bit to the next more significant position, except for the highest-order bit which shifts into the lowest-order position. The "exchange" links are bidirectional, while the "shuffle" links can only transfer information in one direction, from a cell to its circular shift. Subsequent work on networks with this topology removed the distinction between unidirectional and bidirectional communication links, allowing information to flow in either direction across each link. Applications The advantage of this communications pattern, over earlier methods, is that it allows information to be rapidly transferred through a small number of steps from any vertex in the network to any other vertex, while only requiring a single bit of control information (which of the two communications links to use) for each communications step. Fast parallel algorithms for basic problems including sorting, matrix multiplication, polynomial evaluation, and Fourier transforms are known for parallel systems using this network. Layout area If this network is given a straightforward layout in the integer lattice, with the vertices placed on a line in
https://en.wikipedia.org/wiki/Laminar%20set%20family
In combinatorics, a laminar set family is a set family in which each pair of sets are either disjoint or related by containment. Formally, a set family {S1, S2, ...} is called laminar if for every i, j, the intersection of Si and Sj is either empty, or equals Si, or equals Sj. Let E be a ground-set of elements. A laminar set-family on E can be constructed by recursively partitioning E into parts and sub-parts. In particular, the singleton family {E} is laminar; if we partition E into some k pairwise-disjoint parts E1,...,Ek, then {E, E1,...,Ek} is laminar too; if we now partition e.g. E1 into E11, E12, ... E1j, then adding these sub-parts yields another laminar family; etc. Hence, a laminar set-family can be seen as a partitioning of the ground-set into categories and sub-categories. References Families of sets
https://en.wikipedia.org/wiki/Call%20setup
In telecommunication, call setup is the process of establishing a virtual circuit across a telecommunications network. Call setup is typically accomplished using a signaling protocol. The term call set-up time has the following meanings: The overall length of time required to establish a circuit-switched call between users. For data communication, the overall length of time required to establish a circuit-switched call between terminals; i.e., the time from the initiation of a call request to the beginning of the call message. Note: Call set-up time is the summation of: (a) call request time—the time from initiation of a calling signal to the delivery to the caller of a proceed-to-select signal; (b) selection time—the time from the delivery of the proceed-to-select signal until all the selection signals have been transmitted; and (c) post selection time—the time from the end of the transmission of the selection signals until the delivery of the call-connected signal to the originating terminal. Success rate In telecommunications, the call setup success rate (CSSR) is the fraction of the attempts to make a call that result in a connection to the dialled number (due to various reasons not all call attempts end with a connection to the dialled number). This fraction is usually measured as a percentage of all call attempts made. In telecommunications a call attempt invokes a call setup procedure, which, if successful, results in a connected call. A call setup procedure may fail due to a number of technical reasons. Such calls are classified as failed call attempts. In many practical cases, this definition needs to be further expanded with a number of detailed specifications describing which calls exactly are counted as successfully set up and which not. This is determined to a great degree by the stage of the call setup procedure at which a call is counted as connected. In modern communications systems, such as cellular (mobile) networks, the call setup procedu
https://en.wikipedia.org/wiki/Diversity-generating%20retroelement
Diversity-generating retroelements (DGRs) are a family of retroelements that were first found in Bordetella phage (BPP-1), and since been found in bacteria (e.g.Treponema denticola and Legionella pneumophila), Archaea, Archaean viruses (e.g. ANMV-1), temperate phages (e.g. Hankyphage and CrAss-like phage), and lytic phages. DGRs benefit their host by mutating particular regions of specific target proteins, for instance, phage tail fiber in BPP-1, lipoprotein in legionella pneumophila ( the pathogen behind Legionnaires disease), and TvpA in Treponema denticola (oral-associated periopathogen). An error-prone reverse transcriptase is responsible for generating these hypervariable regions in target proteins (Mutagenic retrohoming). In mutagenic retrohoming, a mutagenized cDNA (containing substantial A to N mutations) is reverse transcribed from a template region (TR), and is replaced with a segment similar to the template region called variable region (VR). Accessory variability determinant (Avd) protein is another component of DGRs, and its complex formation with the error-prone RT is of importance to mutagenic rehoming. DGRs are beneficial to the evolution and survival of their host. A large fraction of Faecalibacterium prausnitzii phages contain DGRs that are believed to have a role in phage adaptability to the digestive system, as patients with inflammatory bowel disease (IBD), have more phages, but less F.prausnitzii in their stool samples compared to healthy individuals, suggesting that these phages activate during the illness, and that they may trigger F.prausnitzii depletion. Several tools have been implemented to identify DGRs, such as DiGReF, DGRscan, MetaCSST, and myDGR See also Retron References Mobile genetic elements Molecular biology
https://en.wikipedia.org/wiki/Dynamic-maturational%20model%20of%20attachment%20and%20adaptation
The dynamic-maturational model of attachment and adaptation (DMM) is a biopsychosocial model describing the effect attachment relationships can have on human development and functioning. It is especially focused on the effects of relationships between children and parents and between reproductive couples. It developed initially from attachment theory as developed by John Bowlby and Mary Ainsworth, and incorporated many other theories into a comprehensive model of adaptation to life's many dangers. The DMM was initially created by developmental psychologist Patricia McKinsey Crittenden and her colleagues including David DiLalla, Angelika Claussen, Andrea Landini, Steve Farnfield, and Susan Spieker. A main tenet of the DMM is that exposure to danger drives neural development and adaptation to promote survival. Danger includes relationship danger. In DMM-attachment theory, when a person needs protection or comfort from danger from a person with whom they have a protective relationship, the nature of the relationship generates relation-specific self-protective strategies. These are patterns of behavior which include the underlying neural processing. The DMM protective strategies describe aspects of the parent–child relationship, romantic relationships, and to a degree, relationships between patients/clients and long-term helping professionals. History Out of the development of attachment theory, British psychiatrist John Bowlby coalesced a coherent theory and is generally credited with creating the foundation for modern attachment theory. Mary Ainsworth, an American-Canadian psychologist, started working with Bowlby in 1950. Ainsworth completed her doctoral thesis in 1940 under William Blatz, who had developed security theory, a precursor to attachment theory. Blatz believed the core nature of the relationship between a (to use his colloquial terms) mother and child involved the development of a trusted and secure relationship to function as a safe base for a child's
https://en.wikipedia.org/wiki/Valentin%20Goranko
Valentin Feodorov Goranko (born 22 September 1959 in Sofia, Bulgaria) is a Bulgarian-Swedish logician, Professor of Logic and Theoretical Philosophy at the Department of Philosophy, Stockholm University. Education and academic career Goranko studied mathematics (M.Sc. 1984) and obtained Ph.D. in Mathematical Logic at the Faculty of Mathematics and Informatics of the Sofia University "St. Kliment Ohridski" in 1988. Before joining Stockholm University in 2014, he has had several academic positions at universities in Bulgaria (until 1992), South Africa (1992-2009), Denmark (2009-2014) and Sweden (since 2014) and has taught a wide variety of courses in Mathematics, Computer Science, and Logic. Research fields Goranko has a broad range of research interests in the theory and applications of Logic to artificial intelligence, multi-agent systems, philosophy, computer science, and game theory, where he has published 4 books and over 140 research papers and chapters in handbooks and other research collections. Professional service President elect (with mandate 2024–2027) of the Division of Logic, Methodology and Philosophy of Science and Technology (DLMPST) of the International Union of History and Philosophy of Science and Technology (IUHPST) President (since 2018) of the Scandinavian Logic Society Senior member and past president (2016-2020) of the management board of the Association for Logic, Language and Information (FoLLI) Editor-in-chief (Logic) of the FoLLI Publications series on Logic, Language and Information, a sub-series of Springer LNCS. Executive member of the Board of the European Association for Computer Science Logic EACSL Editor-in-chief on the journal Logics Associate Editor of the ACM Transactions on Computational Logic and member of the editorial boards of several other scientific journals. Published books 2015 Logic and Discrete Mathematics: A Concise Introduction 2016 Temporal Logics in Computer Science 2016 Logic as a Tool: A Gu
https://en.wikipedia.org/wiki/List%20of%20plant%20genus%20names%20with%20etymologies%20%28D%E2%80%93K%29
Since the first printing of Carl Linnaeus's Species Plantarum in 1753, plants have been assigned one epithet or name for their species and one name for their genus, a grouping of related species. Many of these plants are listed in Stearn's Dictionary of Plant Names for Gardeners. William Stearn (1911–2001) was one of the pre-eminent British botanists of the 20th century: a Librarian of the Royal Horticultural Society, a president of the Linnean Society and the original drafter of the International Code of Nomenclature for Cultivated Plants. The first column below contains seed-bearing genera from Stearn and other sources as listed, excluding those names that no longer appear in more modern works, such as Plants of the World by Maarten J. M. Christenhusz (lead author), Michael F. Fay and Mark W. Chase. Plants of the World is also used for the family and order classification for each genus. The second column gives a meaning or derivation of the word, such as a language of origin. The last two columns indicate additional citations. Key Latin: = derived from Latin (otherwise Greek, except as noted) Ba = listed in Ross Bayton's The Gardener's Botanical Bu = listed in Lotte Burkhardt's Index of Eponymic Plant Names CS = listed in both Allen Coombes's The A to Z of Plant Names and Stearn's Dictionary of Plant Names for Gardeners G = listed in David Gledhill's The Names of Plants St = listed in Stearn's Dictionary of Plant Names for Gardeners Genera See also Glossary of botanical terms List of Greek and Latin roots in English List of Latin and Greek words commonly used in systematic names List of plant genera named for people: A–C, D–J, K–P, Q–Z List of plant family names with etymologies Notes Citations References See http://creativecommons.org/licenses/by/4.0/ for license. Further reading Available online at the Perseus Digital Library. Available online at the Perseus Digital Library. Systematic Gardening lists Glossaries of biology Greek
https://en.wikipedia.org/wiki/List%20of%20spyware%20programs
This is a list of spyware programs. These common spyware programs illustrate the diversity of behaviours found in these attacks. Note that as with computer viruses, researchers give names to spyware programs which may not be used by their creators. Programs may be grouped into "families" based not on shared program code, but on common behaviors, or by "following the money" of apparent financial or business connections. For instance, a number of the spyware programs distributed by Claria are collectively known as "Gator". Likewise, programs that are frequently installed together may be described as parts of the same spyware package, even if they function separately. Spyware programs CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer's hosts file to direct DNS lookups to these sites. FinFisher, sometimes called FinSpy is a high-end surveillance suite sold to law enforcement and intelligence agencies. Support services such as training and technology updates are part of the package. GO Keyboard, virtual Android keyboard apps (GO Keyboard - Emoji keyboard and GO Keyboard - Emoticon keyboard), transmit personal information to its remote servers without explicit users' consent. This information includes user's Google account email, language, IMSI, location, network type, Android version and build, and device's model and screen size. The apps also download and execute a code from a remote server, breaching the Malicious Behavior section of the Google Play privacy policies. Some of these plugins are detected as Adware or PUP by many Anti-Virus engines, while the developer, a Chinese company GOMO Dev Team, claims in the apps' description that they will never collect personal data including credit card information. The apps with about 2 million users in total we
https://en.wikipedia.org/wiki/Telephone%20game%20%28game%20theory%29
The Telephone game is an example of a coordination game potentially having more than one Nash equilibrium proposed by David Lewis. The game was based on a convention in Lewis's home town of Oberlin, Ohio that when a telephone call was cut off then the caller would redial the callee. Equilibrium analysis This game involves two players in a town having a telephone service with only one telephone line that cuts callers off after a set period of time (e.g., five minutes) if their call is not completed. Assuming one player (the caller) calls a second player (the callee) and is cut-off, then the players will have two potential strategies - wait for the other to dial them back, or redial to call the other. If both players wait, then no call will be completed, resulting in zero benefit to either player. If both players call each other, then they will get a busy signal, again, resulting in zero benefit to either party. In a simple case where the cost of calling is negligible then it is equally optimal for both parties for one of the caller and the callee to wait whilst the other redials (represented as a benefit of 10 for both parties in Fig. 1) and as such this is a pure coordination game. In a more complex version of the game (Fig. 2), if the cost of calling is high, then the players will prefer the waiting strategy with its resulting deadlock. If one player calls and the other waits then the player that waits will receive a benefit (say, 6) and the player that calls will receive a lesser benefit as they have to pay the cost of the call (say, 3). In this case there are two potential Nash equilibria. References Non-cooperative games
https://en.wikipedia.org/wiki/Black-box%20obfuscation
In cryptography, black-box obfuscation was a proposed cryptographic primitive which would allow a computer program to be obfuscated in a way such that it was impossible to determine anything about it except its input and output behavior. Black-box obfuscation has been proven to be impossible, even in principle. Impossibility The unobfuscatable programs Barak et al. constructed a family of unobfuscatable programs, for which an efficient attacker can always learn more from any obfuscated code than from black-box access. Broadly, they start by engineering a special pair of programs that cannot be obfuscated together. For some randomly selected strings of a fixed, pre-determined length , define one program to be one that computes and the other program to one that computes (Here, interprets its input as the code for a Turing machine. The second condition in the definition of is to prevent the function from being uncomputable.) If an efficient attacker only has black-box access, Barak et al. argued, then the attacker only has an exponentially small chance of guessing the password , and so cannot distinguish the pair of programs from a pair where is replaced by some program that always outputs "0". However, if the attacker has access to any obfuscated implementations of , then the attacker will find with probability 1, whereas the attacker will always find unless (which should happen with negligible probability). This means that the attacker can always distinguish the pair from the pair with obfuscated code access, but not black-box access. Since no obfuscator can prevent this attack, Barak et al. conclude that no black-box obfuscator for pairs of programs exists. To conclude the argument, Barak et al. define a third program to implement the functionality of the two previous: Since equivalently efficient implementations of can be recovered from one of by hardwiring the value of , Barak et al. conclude that cannot be obfuscated either, which concludes