source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Wood-pasture%20hypothesis
The wood-pasture hypothesis (also known as the Vera hypothesis and the megaherbivore theory) is a scientific hypothesis positing that open and semi-open pastures and wood-pastures formed the predominant type of landscape in post-glacial Europe, rather than the common belief of primeval forests. The hypothesis proposes that such a landscape would be formed and maintained by large wild herbivores. Although others, including Oliver Rackham, who criticised the idea of an all-encompassing, dark primeval forest in pre-neolithic Europe, had previously expressed similar ideas, it was Dutch researcher Frans Vera, who, in his 2000 book Grazing Ecology and Forest History, first developed a comprehensive framework for such ideas and formulated them into a theorem. Vera's proposals, although highly controversial, came at a time when the role grazers played in woodlands was increasingly being reconsidered, and are credited for ushering in a period of increased reassesment and interdisciplinary research in European conservation theory and practice. Although Vera largely focused his research on the European situation, his findings could also be applied to other temperate ecological regions worldwide, especially the broadleaved ones. Vera's ideas have met with both rejection and approval in the scientific community, and continue to lay an important foundation for the rewilding-movement. While his proposals for widespread semi-open savanna as the predominant landscape of temperate Europe in the early to mid-Holocene have at large been rejected, they do partially agree with the established wisdom about vegetation structure during previous interglacials. Moreover, modern research has shown that, under the current climate, free-roaming large grazers can indeed influence and even temporarily halt vegetation succession. It has also been questioned whether the Holocene prior to the rise of agriculture provides an adequate approximation to a state of "pristine nature" at all, since by that
https://en.wikipedia.org/wiki/Random%20graph%20theory%20of%20gelation
Random graph theory of gelation is a mathematical theory for sol–gel processes. The theory is a collection of results that generalise the Flory–Stockmayer theory, and allow identification of the gel point, gel fraction, size distribution of polymers, molar mass distribution and other characteristics for a set of many polymerising monomers carrying arbitrary numbers and types of reactive functional groups. The theory builds upon the notion of the random graph, introduced by mathematicians Paul Erdős and Alfréd Rényi, and independently by Edgar Gilbert in late 1950's, as well as on the generalisation of this concept known as the random graph with a fixed degree sequence. The theory has been originally developed to explain step-growth polymerisation, and adaptations to other types of polymerisation now exist. Along with providing theoretical results the theory is also constructive. It indicates that the graph-like structures resulting from polymerisation can be sampled with an algorithm using the configuration model, which makes these structures available for further examination with computer experiments. Premises and degree distribution At a given point of time, degree distribution , is the probability that a randomly chosen monomer has connected neighbours. The central idea of the random graph theory of gelation is that a cross-linked or branched polymer can be studied separately at two levels: 1) monomer reaction kinetics that predicts and 2) random graph with a given degree distribution. The advantage of such a decoupling is that the approach allows one to study the monomer kinetics with relatively simple rate equations, and then deduce the degree distribution serving as input for a random graph model. In several cases the aforementioned rate equations have a known analytical solution. One type of functional groups In the case of step-growth polymerisation of monomers carrying functional groups of the same type (so called polymerisation) the degree distrib
https://en.wikipedia.org/wiki/Pray%20As%20You%20Go
Pray As You Go is a daily prayer website, podcast and application that was created in 2006 by the Jesuits in the United Kingdom. Since its founding it has been adapted into nine other languages and as of 2020, it is used 30 million times a year. Format Based on Ignatian spirituality, the website and its application has daily audio prayers that regularly use music, passages from the Bible and contemplations from the Spiritual Exercises, with reflective questions based on the examination of conscience. Later other prayers such as the rosary and stations of the cross were added. History On 1 March 2006, Pray As You Go was launched. It was founded by Peter Scally who had previously worked on Sacred Space in Ireland and who went on to also found Thinking Faith, an online theology journal in 2008. An open, public trial began. However, after more than 250,000 prayer sessions were downloaded, it was decided to continue it indefinitely. It started as a website and a podcast, where it could be downloaded and then listened to later, allowing people to be able to do it while commuting or travelling. By March 2008, over five million prayer sessions had been downloaded. On 6 April 2014, a Pray As You Go mobile application was launched. Before 2015, a Spanish version was created and called Rezando Voy. During Lent 2017, the French version, Prie en Chemin was launched, which after two years had 30,000 users. In 2019, in conjunction with Christian Life Community in Egypt, an Arabic version called Fi Tariqi Osally (on my way, I pray) was launched. In 2020, it was launched on Amazon Alexa. As of 2020, it is available in over 180 countries and there is a version in Dutch called Bidden Onderweg, in Hungarian it is called Napi-útra-való, in Polish as Modlitwa w Drodze, Portuguese as Passo a Rezar, Ukrainian as iMolytva and Vietnamese as Phút cãu nguyên. See also Saint Ignatius of Loyola List of Jesuit sites in the United Kingdom References External links Pray-As-You-Go.org Cat
https://en.wikipedia.org/wiki/CallApp
CallApp is a mobile app offering caller ID, call blocking and call recording. It gives background information about the entities behind incoming or outgoing calls by utilizing the user's community-generated content and social networking services. History CallApp was invented and founded in 2011, in Tel Aviv, Israel by its former CEO, Oded Volovitz and current CEO, Amit On. raising $1 million in seed investment. It was initially introduced publicly at the TechCrunch Disrupt New York 2012, where it launched its application for Android, at the DEMO conference, and at the Mobile World Congress, Barcelona. It won the Geek Award for the fledgling start-up of the year 2012. In 2014, the company raised $4 million from the angel investors Saar Wilf and Moshe Lichtman and from Giza and Susquehanna venture capital funds. Amit On was named the company's CEO in 2014, CallApp had five million users along with 50,000 daily downloads, making it one of the 100 leading apps on Google Play. As of February 2021, it has over 100 million users. Features CallApp provides caller ID, which gives the users the means to identify telemarketing, spammers and robocall numbers, and enables call blocking and blacklisting unsolicited callers. The app provides the user with real-time information about the entities behind incoming or outgoing calls by utilizing info that people and businesses share about themselves all over the web along with communications that CallApp community decides to share. The app synchronizes the user email and calendar, shows mutual contacts, and includes business information. It also offers call recording, telephone directory, reverse telephone directory, private browsing, call reminder and car mode, as well as paid upgrade options. See also RealCall Truecaller References External links CallApp Homepage Caller ID Spam filtering Android (operating system) software Software companies of Israel 2011 establishments in Israel Telecommunications companies of Israel Ca
https://en.wikipedia.org/wiki/David%20J.%20McClements
David Julian McClements is a British food scientist who is a distinguished professor at the University of Massachusetts Amherst Department of Food Science. He is an elected fellow of the Royal Society of Chemistry, American Chemical Society, and Institute of Food Technologists, as well as the editor of the Annual Review of Food Science and Technology. Early life and education David Julian McClements was born in northern England. He graduated from the University of Leeds with a bachelor's degree in 1985 and a PhD in food science in 1989. Following his PhD, he had postdoctoral research appointments at the University of Leeds, University of California, Davis, and University College Cork. Career David J. McClements was hired as an assistant professor at the University of Massachusetts Amherst in 1994. He was promoted to associate professor in 2000 and full professor in 2005. From 2014 to 2016 he was an adjunct professor at King Abdulaziz University in Saudi Arabia; he became a visiting professor at Harvard University in 2016 and an adjunct at Zhejiang Gongshang University in 2019. He was named a distinguished professor at UMass Amherst in 2016 in its Department of Food Science. McClements researches the structure of colloids, the functionality of biopolymers, use of nanotechnology in foods, and the bioactivity of nutraceuticals. One of his areas of research is the development of textured non-meat products with a similar taste and texture to real meat. McClements became a co-editor of the Annual Review of Food Science and Technology with Michael P. Doyle as of 2019. As of April 2021, he became the sole editor of the Annual Review of Food Science and Technology. He is the most cited author in numerous journals in the field of food science: Journal of Agricultural and Food Chemistry, Food Chemistry, Journal of Food Science, Food Research International, Food Hydrocolloids, Food & Function, Critical Reviews in Food Science and Nutrition, Food Biophysics, Annual Review
https://en.wikipedia.org/wiki/Rickard%20%C3%96ste
Rickard Öste (11 June 1948) is a Swedish scientist and businessman, the inventor of oat milk, and the co-founder of Oatly, a Swedish food company making oat milk products. In 1994, Öste co-founded Oatly with his brother Björn. The parent company of Oatly AB is Ceba AB, which was founded by Öste in 1994, and he is the majority owner. Another Ceba subsidiary is Aventure AB, a research company. In 1993, Öste also founded Agrovision AB. Öste is professor emeritus in Lund University's Department of Food Technology, Engineering and Nutrition. Öste spends 20% of his time at Lund University. In 2021, Öste along with his collaborator Angeliki Triantafyllou won the Polhem Prize for their work on oat-based foodstuff. References Living people Academic staff of Lund University Food scientists Swedish company founders Year of birth missing (living people)
https://en.wikipedia.org/wiki/Tardigrade%20specific%20proteins
Tardigrade specific proteins are types of intrinsically disordered proteins specific to tardigrades. These proteins help tardigrades survive desiccation, one of the adaptations which contribute to tardigrade's extremotolerant nature. Tardigrade specific proteins are strongly influenced by their environment, leading to adaptive malleability across a variety of extreme abiotic environments. History The mechanisms of tardigrade desiccation protection were originally thought to result from high levels of the sugar trehalose. Trehalose is used by organisms like yeast to avoid desiccation in dry environments by working with heat shock proteins to keep desiccation-sensitive proteins in solution. However, while tardigrades can accumulate small levels of trehalose, the levels are insufficient to provide protection from extreme conditions. Other molecules which help certain organisms avoid cellular desiccation include late embryogenesis abundant proteins, which provide protection to embryonic cotton seeds. Certain proteins actually responsible for the tardigrade's hardiness, including the cytoplasmic and secreted abundant heat soluble proteins, were discovered when searching for late embryogenesis abundant proteins in tardigrades. One strategy used by the tardigrade to survive in dry environments is anhydrobiosis. Anhydrobiosis is a process in which an organism can lose nearly all of its water and enter an ametabolic state. Function Tardigrade specific proteins are a type of intrinsically disordered proteins, which have no predetermined shape or task. These proteins use many different conformations, called an ensemble, to move through different structures. Because of this, intrinsically disordered proteins may react strongly to the environment they inhabit. There are three families of tardigrade specific proteins, each named after where the protein is localized within a cell. These proteins are similar to late embryogenesis abundant proteins but are specific to tardigrad
https://en.wikipedia.org/wiki/Tumor%20mutational%20burden
Tumour mutational burden (abbreviated as TMB) is a genetic characteristic of tumorous tissue that can be informative to cancer research and treatment. It is defined as the number of non-inherited mutations per million bases (Mb) of investigated genomic sequence, and its measurement has been enabled by next generation sequencing. TMB has shown potential as a predictive biomarker with several applications, including associations reported between different TMB levels and patient response to immune checkpoint inhibitor (ICI) therapy in a variety of cancers. While both TMB and mutational signatures give us critical information about cancer behaviour, they have different definitions. TMB is defined as the number of somatic mutations/megabase whereas mutational signatures are distinct mutational patterns of single base substitutions, double base substitutions, or small insertions and deletions in tumors. For instance, COSMIC single base substitution signature 1 is characterized by the enzymatic deamination of cytosine to thymine and has been associated with age of an individual. Scientists postulate that high TMB is associated with an increased amount of neoantigens, which are tumour specific markers displayed by cells. An increase in these antigens may then lead to increased detection of cancer cells by the immune system and more robust activation of cytotoxic T-lymphocytes. Activation of T-cells is further regulated by immune checkpoints that can be displayed by cancer cells, thus treatment with ICIs can lead to improved patient survival. On June 16, 2020 the U.S. Food and Drug Administration expanded the approval of the immunotherapy drug pembrolizumab to treat any advanced solid-tumor cancers with a TMB greater than 10 mutations per Mb and continued growth following prior treatments. This marks the first time that the FDA has approved a drug with its use based on TMB measurements. Importance TMB as a Biomarker One survival mechanism in tumors is to increase the
https://en.wikipedia.org/wiki/Center%20for%20Resilient%20Networks%20and%20Applications
Center for Resilient Networks and Applications, CRNA. is owned by Simula Research Laboratories (SRL) and Oslo Metropolitan University. The center was established in 2014 as a response to modern society's increasing dependability on applications running on top of the Internet and the serious societal consequences of outages. CRNA is a culmination of earlier research undertaken between 2006 and 2014 in projects called Resilient Networks and Resilient Networks II. The center receives its base funding from the Norwegian government, initially from the Ministry of Transport and Communications but has from 2019 been moved under the Ministry of Digitalisation. CRNA's mandate includes operating a country-wide infrastructure for monitoring the reliability and performance of mobile networks, the NorNet Edge. So far seven annual reports have been published tracking the evolution of Norwegian mobile operators and highlighting points with scope for improvements. The research undertaken at CRNA is informing the Norwegian Government's policy on communications infrastructure, and the importance of the work is expressed in the Government's Digital agenda. References Telecommunications Internet in Norway Mobile technology Computer networks
https://en.wikipedia.org/wiki/Chemical%20sensor%20array
A chemical sensor array is a sensor architecture with multiple sensor components that create a pattern for analyte detection from the additive responses of individual sensor components. There exist several types of chemical sensor arrays including electronic, optical, acoustic wave, and potentiometric devices. These chemical sensor arrays can employ multiple sensor types that are cross-reactive or tuned to sense specific analytes. Overview Definition Sensor array components are individual sensors, which are selected based on their individual sensing properties (ie. method of detection, specificity for a particular class of analyte and molecular interaction). Sensor components are chosen to respond to as many analytes as possible; so, while the sensitivity and selectivity of individual sensor components vary, the sensors have an additive effect by creating a nonselective fingerprint for a particular analyte when combined into an array architecture. Recognition of fingerprints enables detection of analytes in mixtures. Chemical sensor arrays differ from other multianalyte tests such as a urinalysis stick assay which utilizes multiple, specific sensor materials for targeted detection of analytes in a mixture; instead, chemical sensor arrays rely on cross-reactivity of individual sensor components to generate fingerprints based on the additive responses of sensor components to the target analyte. Comparison to other chemical sensors Single sensor devices sense target analytes based on physical, optical, and electronic properties. Some sensors contain specific molecular targets to afford strong and specific binding with a particular analyte; however, while this approach is specific, complex mixture impact sensor performance. Several of these complex mixtures include odors and vapors exhaled from the lungs. Individual chemical sensors often utilize controlled sensing environments, and variations in ambient conditions (e.g., temperature and humidity) can interfere wi
https://en.wikipedia.org/wiki/Ferdinand%20Peterson
Ferdinand August Peterson (also Ferdinand Petersen; 13 March 1887 Lehtse Parish, Järva County – 18 February 1979 Chapel Hill, North Carolina) was an Estonian engineer and politician. From 1918 to 1919, he was the minister of roads in the Estonian Provisional Government. In 1919, he was a member of the Estonian Constituent Assembly. In 1944, he fled the Soviet occupation of Estonia to Germany, and in 1949 he emigrated to the United States. He was an honorary alumnus of the Estonian Students' Society. Peterson died at Hillhaven Nursing Home in Chapel Hill, North Carolina in 1979. References 1887 births 1979 deaths Estonian Labour Party politicians Members of the Estonian Constituent Assembly Government ministers of Estonia Estonian World War II refugees Estonian emigrants to the United States People from Rakvere Parish
https://en.wikipedia.org/wiki/Javier%20Esparza
Francisco Javier Esparza Estaun (born 27 April 1964 in Pamplona, Spain) is a Spanish computer scientist. He is a professor at the Technische Universität München. Education Javier Esparza Estaun received his Master of Science degree in Theoretical Physics from the University of Zaragoza (1987). He earned his Doctoral degree (PhD) in Computer Science (1990, on free-choice Petri nets) from the same university. He habilitated 1994 at the University of Hildesheim on the subject of Petri net unfoldings. Career During his habilitation and in the period afterwards, Javier Esparza's focus was on concurrency theory and the theory of Petri nets. He made important contributions to Petri net structure theory and to the unfolding approach, initially proposed by Kenneth L. McMillan, and he is the co-author of two books on these subjects. After his habilitation, he was employed as an associate professor at Technische Universität München (1994–2001). He was then successively Chair of Theoretical Computer Science at the University of Edinburgh (2001–2003) and Chair of Software Reliability and Security at the Universität Stuttgart (2003–2007). Since 2007, he holds the chair for Foundations of Software Reliability and Theoretical Computer Science, again at Technische Universität München. He has also made contributions to the automata-theoretic approach to software model checking, to program analysis, and to the verification of infinite-state systems. More recently, his work has focused on the verification of parametrised and stochastic systems. He has published over 250 peer-reviewed scientific papers in the aforementioned fields, as well as lecture notes on an algorithmic approach to automata theory. Multiple software verification tools have been developed by his group, such as Moped and jMoped, Rabinizer, Strix, and Peregrine. He received an Advanced Grant from the European Research Council in 2018 and has been Principal Investigator of more than 20 research projects, most of
https://en.wikipedia.org/wiki/Spring%20Research%20Conference
The IMS/ASA Spring Research Conference (SRC) is an annual conference sponsored by the American Statistical Association (ASA) Section on Physical and Engineering Sciences (SPES) and the Institute of Mathematical Statistics (IMS). The goal of the SRC is to promote cross-disciplinary statistical research in engineering, science and technology. The topics broadly cover a wide range of research areas including design and analysis of experiments, uncertainty quantification, computer experiment, machine learning, quality control, reliability modeling, and statistical computing, with the applications in business, industry, environment, information technology and advanced manufacturing. The SRC also regularly has invited sessions organized by editors of the top journals including Technometrics, Journal of Quality Technology, and SIAM/ASA Journal on Uncertainty Quantification. The SRC has the tradition to support students and postdocs with scholarships to selected participants who present contributed talks or posters at the conference. About every three or four years, the Spring Research Conference (SRC) and the Quality and Productivity Research Conference (QPRC) have a joint conference together as the Joint Research Conference (JRC). The QPRC is an annual conference sponsored by the American Statistical Association's Section on Quality and Productivity. History The SRC was the brainchild of Jeff Wu and Vijay Nair. Its precursor was the 1992 IMS Regional Meeting-Special Topics in Industrial Statistics in Philadelphia, which was initiated by Jeff Wu and program co-chaired by Vijay Nair and Jeff Wu. The inaugural conference was held in Chapel Hill, North Carolina, in June, 1994, with Dr. Rob Easterling as the program chair and Dr. Jerry Sacks as the local organizer. The long-term welfare of the conference is handled by a conference management committee. The members of the first conference management committee were Drs. Vijay Nair (Chair), Jon Kettenring, Jerry Lawless, Je
https://en.wikipedia.org/wiki/RNA%20timestamp
An RNA timestamp is a technology that enables the age of any given RNA transcript to be inferred by exploiting RNA editing. In this technique, the RNA of interest is tagged to an adenosine rich reporter motif that consists of multiple MS2 binding sites. These MS2 binding sites recruit a complex composed of ADAR2 (adenosine deaminase acting on RNA catalytic 2 domain) and MCP (MS2 capsid protein). The binding of the ADAR2 enzyme to the RNA timestamp initiates the gradual conversion of adenosine to inosine molecules. Over time, these edits accumulate and are then read through RNA-seq. This technology allows us to glean cell-type specific temporal information associated with RNA-seq data, that until now, has not been accessible. Background The advent of RNA-sequencing (RNA-seq) in 2009 allowed for a deeper look into the biology of unique cell types by allowing researchers to examine the presence and quantity of RNA in a sample at any given time. The ability for analysis of the transcriptome has revealed valuable information about cellular differences and transcriptional changes between cell types. Further, RNA-seq has provided insights into examining alternative gene splicing, post-transcriptional modification and fusion genes – all of which would go undetected with genome analysis alone. The missing piece of the puzzle is understanding temporally when genes are expressed in a cell. RNA-seq requires the destruction of the cell, thus only revealing the transcriptome at a single moment. Understanding expression times and patterns of genes transcription would create a deeper understanding of the roles of genes and how regulation of expression timing could be affecting cellular processes and possible dysregulation could be contributing to disease development. In recent years, there have been other technologies created with the end goal of determining the age of RNA transcripts within a given cell. For example, TimeLapse-seq, SLAM-seq as well as measuring RNA veloci
https://en.wikipedia.org/wiki/Cellular%20deconvolution
Cellular deconvolution (also referred to as cell type composition or cell proportion estimation) refers to computational techniques aiming at estimating the proportions of different cell types in samples collected from a tissue. For example, samples collected from the human brain are a mixture of various neuronal and glial cell types (e.g. microglia and astrocytes) in different proportions, where each cell type has a diverse gene expression profile. Since most high-throughput technologies use bulk samples and measure the aggregated levels of molecular information (e.g. expression levels of genes) for all cells in a sample, the measured values would be an aggregate of the values pertaining to the expression landscape of different cell types. Therefore, many downstream analyses such as differential gene expression might be confounded by the variations in cell type proportions when using the output of high-throughput technologies applied to bulk samples. The development of statistical methods to identify cell type proportions in large-scale bulk samples is an important step for better understanding of the relationship between cell type composition and diseases. Cellular deconvolution algorithms have been applied to a variety of samples collected from saliva, buccal, cervical, PBMC, brain, kidney, and pancreatic cells, and many studies have shown that estimating and incorporating the proportions of cell types into various analyses improves the interpretability of high-throughput omics data and reduces the confounding effects of cellular heterogeneity, also known as tissue heterogeneity, in functional analysis of omics data. Mathematical Formulation Most cellular deconvolution algorithms consider an input data in a form of a matrix , which represents some molecular information (e.g. gene expression data or DNA methylation data) measured over a group of samples and marks (e.g. genes or CpG sites). The goal of the algorithm is to use these data and return an output
https://en.wikipedia.org/wiki/Knockout%20City
Knockout City was an action video game developed by Velan Studios. Publisher Electronic Arts released the game for Microsoft Windows, Nintendo Switch, PlayStation 4 and Xbox One in May 2021 under its EA Originals label. Velan Studios took over publishing duties in June 2022, and the game transitioned into a fully free-to-play title on June 1, 2022. The game has been shut down as of June 6, 2023, though a Windows version compatible with private hosted servers is available. Gameplay Knockout City is a team-based competitive multiplayer video game whose gameplay rules resemble dodgeball. The player's goal is to attack enemies from the opposing team by knocking them out with a ball. There are several types of balls in the game, including the Moon Ball, which allows the player holding the ball to jump higher, and the Bomb Ball, which is a time bomb that explodes on impact. A player can also throw another player as a ball. When ready to throw a ball, the player targets and locks on to an enemy; holding down the throw button charges up the ball for a faster shot that can be more difficult to catch. A successful throw depends not on the accuracy or the precision of the throw, but on the player's positioning and strategy. Players can dodge or catch a ball that is thrown at them, and they will respawn after getting hit by a ball twice. The player can also fake throw a ball, and tackle an opponent holding a ball. As the player progresses in the game, they will receive Holobux, which can be spent at the Brawl Shop to unlock various customization items. At launch, the game features five maps and six modes. All of the maps are set in a futuristic metropolis named Knockout City, and each map also features various environmental hazards which can knock a player out. The modes announced include Team KO, which is a variant of team deathmatch, Diamond Dash, in which players must collect diamonds dropped by defeated enemies, and Ball-Up Brawl, a four-versus-four mode in which the play
https://en.wikipedia.org/wiki/Dominant%20Species%20%28board%20game%29
Dominant Species is a 2010 competitive, area control board game published by GMT Games, designed by Chad Jensen. The game is an evolution-themed game in which players take on the role of broad categories of life: mammals, reptiles, birds, amphibians, arachnids, and insects in a world heading for the Ice Age. Game Play The map is formed from hexagonal tiles in 7 terrain varieties (mountain, desert, forest, jungle, savannah, wetland or sea). Over the course of the game new tiles are added but also some are overlain with smaller tundra tiles. Each player has a player board and a number of species cubes, which the players aim to spread across the map. A key component in the game is the 6 Elements (grass, grub, meat, seed, sun, water), which can be both on the corners of tiles (representing supply) and on the players' boards (representing requirements) and also in the draw bag or action display. The better a species matches its requirements with the supply offered by the Elements on the tiles they occupy, the better it is doing. Also each player has action pawns which are used in a worker placement style in the action display section of the board. Each turn consists of three phases: Planning, Execution and Reset. In the Planning phase players use their action pawns to claim a slot in the Execution phase. In the Execution phase each action pawn does its action according to the slot it was placed in, starting at the top of the action display and working down. Each player gets a special ability based on their animal class. For example birds can move further in the migration stage; insects get a free speciation action and arachnids get a free competition action. Most of the Execution actions move Elements, tiles or species cubes in ways that help or hinder the players. However the two with most dramatic effects are Glaciation and Dominance. In the Glaciation action the player may change one tile to a much less hospitable tundra tile. This will remove species and possib
https://en.wikipedia.org/wiki/Sex%20as%20a%20biological%20variable
Sex as a biological variable (SABV) is a research policy recognizing sex as an important variable to consider when designing studies and assessing results. Research including SABV has strengthened the rigor and reproducibility of findings. Public research institutions including the European Commission, Canadian Institutes of Health Research, and the U.S. National Institutes of Health have instituted SABV policies. Editorial policies were established by various scientific journals recognizing the importance and requiring research to consider SABV. Background Public research institutions In 1999, the Institute Of Medicine established a committee on understanding the biology of sex and gender differences. In 2001, they presented a report that sex is an important variable in designing studies and assessing results. The quality and generalizability of biomedical research depends on the consideration of key biological variables, such as sex. To improve the rigor and reproducibility of research findings, the European Commission, Canadian Institutes of Health Research, and the U.S. National Institutes of Health (NIH) established policies on sex as a biological variable (SABV). Enrolling both men and women in clinical trials can impact the application of results and permit the identification of factors that affect the course of disease and the outcome of treatment. In 2003, the European Commission (EC) began influencing investigators to include sex and gender in their research methodologies. The Canadian Institutes of Health Research (CIHR) requires four approaches: sex and gender integration in research proposals, sex and gender expertise among research teams, sex and gender platform in large consortiums, and starting in September 2015, the completion of sex and gender online training programs. In May 2014, the NIH announced the formation of SABV policy. The policy came into effect in 2015 which specified that "SABV is frequently ignored in animal study designs and an
https://en.wikipedia.org/wiki/QTY%20Code
The QTY Code is a design method to transform membrane proteins that are intrinsically insoluble in water into variants with water solubility, while retaining their structure and function. Similar structures of amino acids The QTY Code is based on two key molecular structural facts: 1) all 20 natural amino acids are found in alpha-helices regardless of their chemical properties, although some amino acids have a higher propensity to form an alpha-helix; and, 2) several amino acids share striking structural similarities despite their very different chemical properties. These may be paired as: Glutamine (Q) vs Leucine (L); Threonine (T) vs Valine (V) and Isoleucine (I); and Tyrosine (Y) vs Phenylalanine (F). The QTY Code systematically replaces water-insoluble amino acids (L, V, I and F) with water-soluble amino acids (Q, T and Y) in transmembrane alpha-helices. Thus, its application to membrane proteins changes the water-insoluble form of membrane proteins into water-soluble variants. The QTY Code was specifically conceived to render G protein-coupled receptors (GPCRs) into a water-soluble form. Despite substantial transmembrane domain changes, the QTY variants of GPCRs maintain stable structure and ligand binding activities. Hydrogen bond interactions between water and the amino acids The side chain of glutamine (Q) can form 4 hydrogen bonds with 4 water molecules. There are 2 hydrogen donors from nitrogen and 2 hydrogen acceptors for oxygen. The –OH group of threonine (T) and tyrosine (Y) can form 3 hydrogen bonds with 3 water molecules (2 H-acceptors and 1 H-donor). Color code: Green = carbon, red = oxygen, blue = nitrogen, gray = hydrogen, yellow disks = hydrogen bonds. Three types of alpha-helices and with nearly identical molecular structure There are 3 types of alpha-helices and with nearly identical molecular structure, namely: a) 1.5Å per amino acid rise, b) 100˚ per amino acid turn, c) 3.6 amino acids and 360˚ per helical turn, and d) 5.4Å per helic
https://en.wikipedia.org/wiki/Ten%20Horn%27s%20sign
Ten Horn's sign is a clinical sign used for diagnosing appendicitis, particularly in older adults. Method The patient lies on a couch. The examiner gently stretches the right spermatic cord using the thumb and index finger right about the testis in the right scrotum. For a patient with appendicitis, this causes pain in the right iliac fossa. The traction of spermatic cord is thought to cause right iliac fossa pain due to the apposition of the gonadal vessels against an inflamed appendix. The sensitivity and specificity of the Ten Horn's sign is unknown. History This sign was proposed by Carel Hendrik Leo Herman ten Horn (1884–1964). References Medical diagnosis Surgical procedures and techniques
https://en.wikipedia.org/wiki/Adaptive%20noise%20cancelling
Adaptive noise cancelling is an unorthodox signal processing technique that is highly effective in suppressing additive interference or noise corrupting a received target signal at the main or primary sensor in certain common situations where the interference is known and is accessible but unavoidable and where the target signal and the interference are unrelated, that is, uncorrelated. Examples of such situations include: a microphone attempting to receive speech near machinery or other noise sources in the environment, such as an aircraft cockpit a naval ship towing sonar array where the ship's own noise masks a much weaker detected target signal obtaining a fetal electrocardiogram (ECG) where the presence of the mother's stronger ECG represents an unavoidable interference. Conventional signal processing techniques rely on filtering the received signal, consisting of the target signal and the corrupting interference, so as to minimise the effect of the interference. The objective of optimal filtering is to maximise the signal-to-noise ratio at the receiver output or to produce the optimal estimate of the target signal in the presence of interference (Wiener Filter). In contrast, adaptive noise cancelling relies on a second sensor, usually located near the source of the known interference, to obtain a relatively 'pure' version of the interference free from the target signal and other interference. This second version of the interference and the sensor receiving it are called the reference. The adaptive noise canceller consists of a self-adjusting adaptive filter which automatically transforms the reference signal into an optimal estimate of the interference corrupting the target signal before subtracting it from the received signal thereby cancelling (or minimising) the effect of the interference at the noise canceller output. The adaptive filter adjusts itself continuously and automatically to minimise the residual interference affecting the target signal
https://en.wikipedia.org/wiki/B%C3%A9la%20Krek%C3%B3
Béla Krekó (29 September 1915 – 7 December 1994) was a Hungarian mathematician. His main research interests were linear programming and matrix ring. He was a university professor in Károly Marx University of Economics Biography Krekó's parents were Ferenc Krekó and Terézia Princz. He married his wife Katalin Kovács (1919-2010) in 1944. His children are Béla (1945), István (1946), Ágnes (1948), and László (1951). In 1940, he obtained a degree in mathematics at the Pázmány Péter University, then in 1948 he also obtained a qualification in economics and a doctorate from the József Nádor University of Technology and Economics. From 1949 to 1954 he was a college teacher at the Academy of Commerce and then the Academy of Economic Engineering. From 1954 he was an associate professor at the Department of Mathematics of the Károly Marx University of Economics. In 1957, he wrote his book, "Introduction to Linear Programming." Author of additional books that serve as a foundation for generations. In 1959, he was the head of the department at the Department of Mathematics at the university, where he began the reform of mathematics education and the integration of the most important areas of operations research into education. From 1967 to 1980, he was director of the University Computer Center. He was appointed university professor in 1969. He played a prominent and decisive role in the 1961 launch of the plan-mathematical economist program. In 1975 he defended his dissertation at the Hungarian Academy of Sciences. He is the organizer and regular speaker of the first computer science education conferences. Until his death in 1994, he took part in the modernization of university education. The National Memorial and Commemorative Committee decided to declare the resting place of Béla Krekó, economist, mathematician, part of the national cemetery by its decision No. 85/2022 (Budapest, Óbuda cemetery, 20-0-1-225) Notable works Bacskay Zoltán-Krekó Béla. Kombinatorika és valós
https://en.wikipedia.org/wiki/Sovereign%20Internet%20Law
The Sovereign Internet Law () is the informal name for a set of 2019 amendments to existing Russian legislation that mandate Internet surveillance and grants the Russian government powers to partition Russia from the rest of the Internet, including the creation of a national fork of the Domain Name System. In a statement released by the State Legal Department on March 13, 2019, the federal law was aimed at "suppressing the dissemination of unreliable socially significant information under the guise of reliable messages that creates a threat of harm to the life and (or) health of citizens, property, a threat of massive disruption of public order and (or) public safety, or a threat of interfering with the functioning or termination of the functioning of facilities life support, transport or social infrastructure, credit institutions, energy facilities, industry and communications." The system was tested on 6 July 2023. References See also Internet censorship in Russia Mass surveillance in Russia Internet balkanization Alternative DNS root Yarovaya’s Law 2019 in law 2019 in Russia Law of Russia Censorship in Russia Internet law Internet access Internet censorship in Russia
https://en.wikipedia.org/wiki/Catrobat
Catrobat is a block-based visual programming language and Open Source Software non-profit project. The first release dates back to 2010 and was initiated by Wolfgang Slany from the Technical University Graz in Austria. The multidisciplinary team develops the programming language and free apps for teenagers to create their own games, animations, music videos, or all other kinds of apps directly on a smartphone based on the catrobat framework. The visual programming language used for coding is very similar to the one used in Scratch except with Catrobat, no laptop or PC is needed. Every aspect of development can be covered solely on a smartphone and therefore over the years the usage of Catrobat and the Apps spread all over the world. Some activities of Catrobat are targeted directly at female and male teenagers to close the gender gap in STEM-Studies. Other activities are especially for less developed countries because native language support is provided directly in Catrobat's apps, without the need to be supported on the operating systems language level. History Catrobat started with the name Catroid in 2010 and the name was inspired by Scratch's cat mascot and the android operating system. The first public version of the free app was published in 2013 on Google Play. Currently, there are more than 74 releases of the main coding app as of November 2020. The first version for iOS has been published in 2018. The mobile apps currently have more than 5 million users in 180 countries, are natively available in 50+ languages (including several languages not directly supported by the underlying operating system), and have been developed so far by over 1,300 volunteers from around the world. License The Catrobat project is under the Affero General Public License (AGPL) in version 3 and is hosted publicly on GitHub. Vision The aim of Catrobat is to introduce young people to the world of coding, using only their smartphones and bypassing traditional education. With a p
https://en.wikipedia.org/wiki/Tim%20Denvir
Tim Denvir (born 1939) is a British software engineer, specialising in formal methods. Denvir studied for a Mathematics degree at Trinity College, Cambridge during 1959–1962. Before his degree, during 1958–1959, Tim Denvir was an engineering assistant at Texas Instruments, designing, building and testing electronic circuits using discrete semiconductors. After his degree, during 1962–1965, he was a systems programmer with Elliott Brothers, programming operating systems and device drivers. During 1965–1969, he was a systems programmer at the University of London Atlas Computing Service, undertaking systems programming for the Atlas computer and compiler design. During 1969–1971, he was a project manager with RADICS, working on ALGOL 60 compilers. During 1971–1972, Denvir was a principal technical officer at International Computers Limited (ICL), working on unifying compiler design for the ICL 2900 Series of mainframe computers. During 1972–1986, he was a department manager and then from 1980 chief research engineer at the Standard Telecommunication Laboratories (STL), working on project management, technical education, and research. He won the STL Creativity Award. During 1986–1991, he was a senior/principal consultant at Praxis Systems plc, seconded for part of the time to the Information Technology Division of the UK Government Department of Trade and Industry (DTI). During 1991–2003, he was Director of Translimina Ltd. Academically, during 1988–1989, Denvir was an Associate Reader at Brunel University, teaching formal methods. During 1992–1994, he was Honorary Visiting Professor at City University in London, where he developed and delivered a course on denotational semantics. Denvir has been a member of the editorial board for the Formal Aspects of Computing journal (1989-2003) and the Springer FACIT book series. He was a member of the BSI IST/51-119 Vienna Development Method (VDM) Standardisation Committee. He was the Secretary of VDM Europe (1986–88 & 1991)
https://en.wikipedia.org/wiki/Electromaterials
In physics, electrical engineering and materials science, electromaterials are the set of materials which store, controllably convert, exchange and conduct electrically charged particles. The term electromaterial can refer to any electronically or ionically active material. While this definition is quite broad, the term is typically used in the context of properties and/or applications in which atomic electronic transition is pertinent. The word electromaterials is a compound form of the Ancient Greek term, ἤλεκτρον ēlektron, "Amber", and the Latin term, materia, "Matter". Properties Electromaterials enable the transport of charged species (electrons and/or ions) as well as facilitate the exchange of charge to other materials. For atomic and molecule systems, this is observed as atomic electronic transition between discrete orbitals, while for bulk semiconductor materials electronic bands determine which transitions may occur. Metals, in which the conduction band is permanently populated, may also be considered electromaterials, although this is typically outside the category compared to other conduction mechanisms such as for a degenerate semiconductor (transparent conductive oxides) or polaron hopping (organic conductor). Materials which can be ionised (i.e. electrons either added or stripped away) may also be considered electronically active. Electromaterials have a number of properties broadly, including: Opto-electronic properties Photoelectric properties Exotic phenomena such as super-conductive properties Partial charge transfer, adsorption of species leading to change in electronic properties of material Ion conductive materials Applications In the application of electromaterials, ions or electrons are used to carry out a specific function. For example, the oxidation or reduction (loss or gain of electrons, respectively) of another species. Materials such as metals, metal particles, conducting polymers, conducting carbon, e.g. CNTs, graphene, carbo
https://en.wikipedia.org/wiki/The%20Preparation%20of%20Programs%20for%20an%20Electronic%20Digital%20Computer
The Preparation of Programs for an Electronic Digital Computer (sometimes called WWG, after its authors' initials) was the first book on computer programming. Published in 1951, it was written by Maurice Wilkes, David Wheeler, and Stanley Gill of Cambridge University. The book was based on the authors' experiences constructing and using EDSAC, one of the first practical computers in the world. Contents Overview It was the first book to describe a number of important concepts in programming, including: the first account of a library of reusable code the first API the first explanation of using a memory dump for debugging a program, which the book called a "post-mortem routine" the first use of the term "assembly" in programming, though with a somewhat different meaning than the modern use of the term Much of the book is dedicated to explaining the library. This consisted of eighty-eight subroutines implementing mathematical operations like the calculation of trigonometric functions and arithmetic operations on complex numbers. The library was a physical collection stored in a filing cabinet containing punched paper tape encoding the subroutines. This included a "library catalog" describing how a programmer could use each subroutine; today this is called API documentation. Part one Chapter 6 - Debugging This chapter extensively investigates "proofreading" and location of the mistakes in the programs. It also advises against frequent refactoring as it introduces more mistakes as programmer tries to improve the program. Chapter 7 - Examples of programs for EDSAC Includes examples of calculations of formula and definite integral, integration of ordinary differential equitation, and evaluation of the Fourier transform by using EDSAC programs. Chapter 8 - Automatic programming discusses an assembling (compiling) and interpretation of a program, it also discusses motivation behind "floating addresses" which are, in modern terms, are variable references (ak
https://en.wikipedia.org/wiki/HUION
HUION () is a China-based drawing tablet brand founded on 12 March 2011 by Henry Xu. It sells drawing tablets, light pads, and pen displays for beginners and professionals. Its products are compatible with Android, Windows, macOS, and Linux and can be used to create digital works and for photo editing. Headquartered in Shenzhen, HUION has entered the market in Indonesia and India. In 2018, it introduced the H610 Pro V2, which is lightweight and features a battery-free stylus, tilt function and 8192 pressure levels. History HUION stepped into the industry of graphic tablet in 2011. In 2014, it released out the brand's first light pad product. In 2019, the manufacturer participated in the CES convention. In the same year, it set up a distributor in Indonesia. In January 2021, HUION unveiled a new product, which combines a keyboard and a pen tablet into one. References External links Official website Chinese brands Display technology Computing input devices 2011 establishments in China Display technology companies
https://en.wikipedia.org/wiki/QNu%20Labs
QNu Labs (or QuNu Labs Private Limited) is a cybersecurity company headquartered in Bengaluru, India. It is credited to be the first firm in India to successfully develop commercial cybersecurity products using quantum physics. It has a subsidiary called QNu Labs Inc, which was set up in Massachusetts, US in 2019. The company was founded in 2016 by Sunil Gupta, Srinivasa Rao Aluri, Mark Mathias, and Anil Prabhakar. It was incubated at Indian Institute of Technology-Madras and later began operations in Bengaluru. After conducting field trials for its quantum key distribution product, QNu Labs received support from Cisco Launchpad in 2018. Subsequently, it launched two products—a quantum key distributor called Armos and a quantum random number generator called Tropos—for national and international markets in 2020. References External links Company Website DRDO tests quantum key distribution tech for secure communication between two facilities Budget 2020 announces Rs 8,000 crore national mission on quantum technologies and applications India’s billion-dollar quantum push The Race Is On Quantum cryptography Indian companies established in 2016 Companies based in Karnataka Technology companies of India Technology companies established in 2016
https://en.wikipedia.org/wiki/Gamma%20ray%20cross%20section
Gamma ray cross section - a measure of the probability that gamma ray interacts with matter. The total cross section of gamma ray interactions is composed of several independent processes: photoelectric effect, Compton scattering, electron-positron pair production in the nucleus field and electron-positron pair production in the electron field (triplet production). The cross section for single process listed above is a part of the total gamma ray cross section. Other effects, like the photonuclear absorption, Thomson or Rayleigh (coherent) scattering can be omitted because of their nonsignificant contribution in the gamma ray range of energies. The detailed equations for cross sections (barn/atom) of all mentioned effects connected with gamma ray interaction with matter are listed below. Photoelectric effect cross section This phenomenon describes the situation in which a gamma photon interacts with an electron located in the atomic structure. This results the ejection of that electron from the atom. The photoelectric effect is the dominant energy transfer mechanism for X-ray and gamma ray photons with energies below 50 keV, but it is much less important at higher energies, but still need to be taken into consideration. Usually, the cross section of the photoeffect can be approximated by the simplified equation of where k = Eγ / Ee, and where Eγ = hν is the photon energy given in eV and Ee = me c2 ≈ 5,11∙105 eV is the electron rest mass energy, Z is an atomic number of the absorber’s element, α = e2/(ħc) ≈ 1/137 is the fine structure constant, and re2 = e4/Ee2 ≈ 0.07941 b is the square of the classical electron radius. For higher precision, however, the Sauter equation is more appropriate: where and EB is a binding energy of electron, and ϕ0 is a Thomson cross section (ϕ0 = 8πe4/(3Ee2) ≈ 0.66526 barn). For higher energies (>0.5 MeV) the cross section of the photoelectric effect is very small because other effects (especially Compton scattering) dominates.
https://en.wikipedia.org/wiki/Syngameon
Syngameon refers to groups of taxa that frequently engage in natural hybridization and lack strong reproductive barriers that prevent interbreeding. Syngameons are more common in plants than animals, with approximately 25% of plant species and 10% of animal species producing natural hybrids. The most well known syngameons include irises of the California Pacific Coast and white oaks of the Eastern United States. Hybridization within a syngameon is typically not equally distributed among species and few species often dominate patterns of hybridization. The term syngameon comes from the root word syngamy coined by Edward Bagnall Poulton to define groups that freely interbreed. He also coined the word asyngamy referring to groups that do not freely interbreed (with the substantive noun forms Syngamy and Asyngamy). The term syngameon was first used by Johannes Paulus Lotsy, who used it to describe a habitually interbreeding community that was reproductively isolated from other habitually interbreeding communities. Syngameon was used interchangeably with the term species to describe groups of closely related individuals that interbreed to varying degrees. A more specific definition of syngameon has been given to groups of taxa that frequently engage in natural hybridization and lack strong morphological differences that could be used to define them. Taxa in syngameons may have separate species names, but evolutionary biologists often suggest they should be treated as a single species. Variation among species within a syngameon can be due to a number of factors related to their biogeography, ecology, phylogeny, reproductive biology, and genetics. Coenospecies The terms coenospecies and syngameons are both used to describe clusters of lineages that are morphologically distinct and lack strong isolation mechanisms. Coenospecies, first coined by Göte Turesson in 1922, refers to the total sum of possible combinations in a genotype compound, which includes hybridization tha
https://en.wikipedia.org/wiki/Ontophylogenesis
Ontophylogenesis merges the concepts of Ontogenesis and Phylogenesis to yield Darwinian theory at the cellular level. Described by its originator Jean-Jacques Kupiec as "the extension of natural selection, taking place inside the organism among the cell populations of which it is constituted. It ends with evolution and ontogenesis merging into a single phenomenon." Hierarchical analysis of ontogenetic time describing heterochrony and taxonomy of developmental stages is viewed as segmentation of ontogenetic time depicting ontophylogenesis. This permits the graphical depiction of time based evolutions of organs for a set of species, and is consistent with accepted theories of evolutionary biology. References Phylogenetics Charles Darwin
https://en.wikipedia.org/wiki/McMaster%20Manufacturing%20Research%20Institute
The McMaster Manufacturing Research Institute (MMRI) is a major manufacturing research facility affiliated with the Department of Mechanical Engineering at McMaster University in Hamilton, Ontario. The institute opened in 2001, and has an endowed research chair affiliated with it. It is a member of SONAMI (the Southern Ontario Network for Advanced Manufacturing Innovation) along with centers at Niagara College, Mohawk College, and Sheridan College. In 2020, after the impact of the COVID-19 pandemic became known, the MMRI collaborated with Hamilton Health Sciences to develop face shields and help with other types of PPE manufacturing. References Manufacturing companies of Canada Organizations based in Hamilton, Ontario McMaster University Manufacturing companies based in Ontario
https://en.wikipedia.org/wiki/Eike%20Best
Eike Best (born 13 March 1951) is a German computer scientist, best known for his contributions to concurrency theory. Early life and education Eike Best was born in Neustadt an der Weinstraße. During his childhood, he lived in Argentina, Germany, and Turkey, where his father worked as high school teacher. Best received a high school diploma from the German School of Istanbul in 1969, a Diploma in Computer Science from the Technische Hochschule Karlsruhe in 1974, and a PhD from Newcastle University in 1981 for a dissertation on semantics, verification, and design of concurrent programs, supervised by Peter Lauer and Brian Randell. He habilitated in 1988 at the University of Bonn with a thesis on causal semantics of non-sequential programs. Career and contributions Best was research assistant in Carl Adam Petri's research group at the Gesellschaft für Mathematik und Datenverarbeitung near Bonn (1981–1988), and professor in the Computer Science departments at the University of Hildesheim (1989–1996) and the Carl von Ossietzky University of Oldenburg (1996–2018), where he headed the Group for Parallel Systems. During his Bonn period he developed Petri's theory of non-sequential processes together with César Fernández, and contributed to the theory of free-choice Petri nets. During his Hildesheim and Oldenburg periods he developed the Petri Box Calculus, a process algebra with a Petri net semantics, together with Raymond Devillers and Maciej Koutny. During the last years of his career in Oldenburg he worked on the automatic synthesis of Petri nets from transition systems. In the 1990s, Best was one of the founders of CONCUR, the International Conference on Concurrency Theory, together with Jos Baeten, Kim Larsen, Ugo Montanari, and Pierre Wolper. Moreover, Best was coordinator of the DEMON and CALIBAN projects, funded by the European Community. He acted as dean of the Computer Science Faculty from 2000 to 2002 and became director of the Computer Science Departmen
https://en.wikipedia.org/wiki/Integrative%20and%20conjugative%20element
Integrative and conjugative elements (ICEs) are mobile genetic elements present in both gram-positive and gram-negative bacteria. In a donor cell, ICEs are located primarily on the chromosome, but have the ability to excise themselves from the genome and transfer to recipient cells via bacterial conjugation. Due to their physical association with chromosomes, identifying integrative and conjugative elements has proven challenging, but in silico analysis of bacterial genomes indicate these elements are widespread among many microorganisms. ICEs have been detected in Pseudomonadota (e.g., Pseudomonas spp., Aeromonas spp., E. coli, Haemophilus spp.), Actinomycetota and Bacillota. Among many other virulence determinants, ICEs may spread antibiotic and metal ion resistance genes across prokaryotic phyla. In addition, ICE elements may also facilitate the mobilisation of other DNA modules such as genomic islands. Characteristics Although ICEs exhibit various mechanisms promoting their integration, transfer and regulation, they share many common characteristics. ICEs comprise all mobile genetic elements with self-replication, integration, and conjugation abilities, including conjugative transposons, regardless of the particular conjugation and integration mechanism by which they act. Some immobile genomic pathogenicity islands are also believed to be defective ICEs that have lost their ability to conjugate. ICEs combine certain features of the following mobile genetic elements: Bacteriophages that have the ability to insert into and excise from bacterial chromosomes. Transposons that, besides their inherent transposable activity, can additionally be subject to horizontal gene transfer via conjugation. Conjugative plasmids that transfer from donor to recipient bacteria via conjugation. In contrast to plasmids and phages, integrative and conjugative elements cannot remain in an extrachromosomal form in the cytoplasm of bacterial cells and replicate only with the chr
https://en.wikipedia.org/wiki/WiFi%20Sensing
WiFi Sensing (also referred to as WLAN Sensing) uses existing Wi-Fi signals to detect events or changes such as motion, gesture recognition, and biometric measurement (e.g. breathing). WiFi Sensing is a combination of Wi-Fi and RADAR sensing technology working in tandem to enable usage of the same Wi-Fi transceiver hardware and RF spectrum for both communication and sensing. The applications of WiFi Sensing are broad. Wi-Fi may operate in multiple frequency bands, each providing a unique range of possible use cases dependent on the physical electro-magnetic propagation properties, approved power levels, and allocated bandwidth. There are three major applications: Detection (binary classification), Recognition (multi-class classification), and Estimation (quantity values of size, length, angle, distance, etc.). Combining communication and sensing within mobile networking technology is a large area of exploration. It is sometimes referred to as Joint Communications and radar/radio Sensing (JCAS). Combining the two technologies can leverage existing hardware and infrastructure, enable new services, and provide a higher level of interaction with networked devices (e.g. IoT and automation). Technical In comparison with RADAR technology, such as Frequency-modulated continuous-wave radar, WiFi Sensing may use its physical layer (PHY) for both environment measurements as well as digital communication. Wi-Fi benefits from having a well-defined Medium access control (MAC) layer entity specified in the 802.11 standard. Having a MAC layer present in a RADAR system makes coordination and sharing of air-time resource usage between multiple devices possible. Additionally, it allows for the exchange of information between multiple devices. WiFi Sensing systems require more complex algorithms compared to traditional RADAR systems. With traditional RADAR systems, the PHY layer components produce waveforms designed so minimal processing is required to extract the desired physical
https://en.wikipedia.org/wiki/Shuri%20%28Marvel%20Cinematic%20Universe%29
Shuri is a fictional character portrayed primarily by Letitia Wright in the Marvel Cinematic Universe (MCU) media franchise based on the Marvel Comics character of the same name, also inspired by the James Bond character Q. She is the courageous and tech-savvy younger sister of T'Challa, and the daughter of T'Chaka and Ramonda, all preceding monarchs of Wakanda. Highly intelligent and a master engineer, she is Wakanda's lead scientist and the princess of the country. Following her father's death, Shuri assists her brother in reclaiming the Wakandan throne from their cousin N'Jadaka and then helps remove Bucky Barnes's programming. Later, she assists the Avengers by attempting to use her technology to safely remove the Mind Stone from Vision's head. However, she gets stopped by Corvus Glaive and shortly after, falls victim to the Blip. After getting restored to life, she joins the battle against an alternate Thanos. Following her brother and mother's death, she becomes the new Black Panther, defeating Namor in combat and forming an alliance with Talokan against the rest of the world. , the character has appeared in four films. Wright's portrayal of Shuri has been well received. Alternate versions from within the MCU multiverse appear in the animated series What If...? (2021), voiced by Ozioma Akagha. Fictional character biography Helping T'Challa and Bucky Barnes In 2016, with Shuri's father T'Chaka having died, her brother T'Challa assumes the Wakandan throne. She attends his coronation ceremony with her mother Ramonda. At the ceremony, the Jabari Tribe's leader M'Baku challenges T'Challa for the crown in ritual combat, and mocks him for his use of Shuri's technology. Although M'Baku initially has the upper hand, T'Challa defeats M'Baku and persuades him to yield rather than die. After Ulysses Klaue and his accomplice Erik "Killmonger" Stevens steal a Wakandan artifact from a London museum, T'Challa, Okoye, and Nakia travel to Busan, South Korea, with Shuri pro
https://en.wikipedia.org/wiki/Embanking%20of%20the%20tidal%20Thames
The Embanking of the tidal Thames is the historical process by which the lower River Thames, at one time a broad, shallow waterway winding through malarious marshlands, has been transformed by human intervention into a deep, narrow tidal canal flowing between solid artificial walls, and restrained by these at high tide. The Victorian civil engineering works in central London, usually called "the Embankment", are just a small part of the process. With small beginnings in Roman Londinium, it was pursued more vigorously in the Middle Ages. Mostly it was achieved by farmers reclaiming marshland and building protective embankments or, in London, frontagers pushing out into the stream to get more riverfront property. Today, over 200 miles of walls line the river's banks from Teddington down to its mouth in the North Sea; they defend a tidal flood plain where 1.25 million people work and live. Since the Thames has a large tidal amplitude, early modern thinkers could not believe local people were capable of building mighty embankments beside it; hence the works were attributed to "the Romans". The current explanation is that tides were small at first, requiring modest embankments only; as the sea has gradually invaded the Thames valley, the embankments have been raised to match in easy stages. It has been argued that land reclamation in the Thames contributed to the decay of the feudal system. Other political consequences were said to be two clauses in Magna Carta, and one of the declared causes of the English Civil War. The deepening of the Thames made it navigable by larger ships that could travel further inland: an unforeseen result was the growth of the world's largest port. Much of present-day London is recovered marshland, and considerable parts lie below high water mark. Some London streets originated as tracks running along the wall and yet today, are not even in sight of the river. The Thames before the walls versus the river today In the Roman era The natu
https://en.wikipedia.org/wiki/Water%20droplet%20erosion
Water droplet erosion (WDE) is "a form of materials wear that is caused by the impact of liquid droplets with sufficiently high speed." The phenomenon was furthermore previously known as liquid impingement erosion (LIE). Distinction from other phenomena The emphasis of discrete water droplets serves to distinguish the WDE problem from liquid jet erosion and cavitation. The impact pressures invoked by discrete water droplet impact have a range considerably higher than the stagnation pressure created by liquid jet. The difference between WDE and cavitation erosion is the fact that WDE usually comprises a gaseous or vaporous phase containing discrete liquid droplets; while cavitation erosion is observed when a continual liquid phase carries separate gaseous bubbles or cavities inside it. Recently, Ibrahim & Medraj developed an analytical model to predict the threshold speed of water droplet erosion and verified it experimentally, a challenge having been attempted hitherto without success since the 1950s. Consequences For an extended period of time, many industries have encountered the problem of erosion due to water droplet impact, and it continues to reappear wherever rotation or movement of a component at high speed in a hydrometer environment is employed. Recently, with the use of larger wind turbine blades, the issue of erosion of the leading edge due to rain droplets has grown more grave. Aerodynamics efficiency of turbine blades is severely diminished due to leading-edge erosion, resulting in a considerable decrease in annual energy production. References Materials degradation
https://en.wikipedia.org/wiki/Workpiece
A workpiece is a piece, often made of a single material, that is being processed into another desired shape (such as building blocks). The workpiece is usually a piece of relatively rigid material such as wood, metal, plastic, or stone. After a processing step, the workpiece may be moved on to further steps of processing. For example, a part can made out of bar stock and later become part of a semi-finished product. The workpiece is often attached to the tool being used via a jig or fixture, like for example to a milling machine via an angle plate, or to a lathe via a lathe faceplate. A vise is another example of a simple type of fixture used to fix workpieces. A workpiece may be subjected to various cutting operations, like truing, making fillets, chamfers, countersinking, counterboring, etc. It may also receive various surface treatments and finishes. The term "workpiece" has established itself within crafts and the manufacturing industry, and connects the work or treatment and the object to be treated. A workbench is often used to hold a workpiece steady during work on it. See also Surface finishing Metalworking References External links Video demonstration of workpieces being attached to faceplates and angleplates Video demonstration of different methods of filing a metal workpiece Machining
https://en.wikipedia.org/wiki/Endosphere
Some microorganisms, such as endophytes, penetrate and occupy the plant internal tissues, forming the endospheric microbiome. The arbuscular mycorrhizal and other endophytic fungi are the dominant colonizers of the endosphere. Bacteria, and to some degree archaea, are important members of endosphere communities. Some of these endophytic microbes interact with their host and provide obvious benefits to plants. Unlike the rhizosphere and the rhizoplane, the endospheres harbor highly specific microbial communities. The root endophytic community can be very distinct from that of the adjacent soil community. In general, diversity of the endophytic community is lower than the diversity of the microbial community outside the plant. The identity and diversity of the endophytic microbiome of above-and below-ground tissues may also differ within the plant. Leaves and bacteria Exposure to light can trigger photosynthesis in plant leaves, such as leafy-greens, and increase concentrations of photosynthetic products, such as glucose, within the leaf tissue. Bacteria existing at the leaf surfaces may respond to the available photosynthetic products and migrate into the leaf tissue by chemotaxis toward nutrient concentration gradients. Once the bacteria are inside the leaf tissue, they cannot be washed away, presenting a risk to consumers. Several bacteria, such as Escherichia coli and Salmonella enterica, are able to attach the microstructure at the surface of plant leaves, such as trichomes, stomata and grooves, and localize at sites that are not accessible for wash water and sanitizers. The bacteria are also able to infiltrate into available openings at the leaf surface, such as stomata, cuts and wounds, to reach tens of micrometer depths below the leaf epidermis. This infiltration can present a risk to human consumption of raw leafy greens. Light is one of the driving forces that can promote infiltration of pathogenic bacteria into plant leaves. Incubation of S. enterica (se
https://en.wikipedia.org/wiki/Katalin%20Bimb%C3%B3
Katalin Bimbó (born 1963) is a logician and philosopher known for her books on mathematical logic and proof theory. She earned a Ph.D. in 1999 at Indiana University, under the supervision of Jon Michael Dunn, and is a professor of philosophy at the University of Alberta after having earned tenure there in 2013. Selected works Monographs Generalized Galois Logics: Relational Semantics of Nonclassical Logical Calculi (with J. M. Dunn, CSLI Publications, 2008) Combinatory Logic: Pure, Applied and Typed (CRC Press, 2012) Proof Theory: Sequent Calculi and Related Formalisms (CRC Press, 2015) Edited volumes J. Michael Dunn on Information Based Logics (Outstanding Contributions to Logic, vol. 8; Springer, 2016). Relevance Logics and other Tools for Reasoning. Essays in Honor of J. Michael Dunn (Tributes, vol. 46; College Publications, London, UK, 2022). References External links Home page 1963 births Living people Canadian logicians Canadian women mathematicians Canadian women philosophers Mathematical logicians Women logicians Indiana University alumni Academic staff of the University of Alberta
https://en.wikipedia.org/wiki/Electron-on-helium%20qubit
An electron-on-helium qubit is a quantum bit for which the orthonormal basis states |0⟩ and |1⟩ are defined by quantized motional states or alternatively the spin states of an electron trapped above the surface of liquid helium. The electron-on-helium qubit was proposed as the basic element for building quantum computers with electrons on helium by Platzman and Dykman in 1999. History of electrons on helium The electrostrictive binding of electrons to the surface of liquid helium was first demonstrated experimentally by Bruschi and co-workers in 1966. A theoretical treatment of the electron-helium interaction was developed by Cole and Cohen in 1969 and, independently, by Shikin in 1970. An electron close to the surface of liquid helium experiences an attractive force due to the formation of a weak (~0.01e) image charge in the dielectric liquid. However, the electron is prevented from entering the liquid by a high (~1 eV) barrier formed at the surface due to the hard-core repulsion of the electron by the helium atoms. As a result, the electron remains trapped outside the liquid. The energy of the electron in this potential well is quantised in a Hydrogen-like series with the modified Rydberg constant RHe 10−4 RH. The binding energies of the ground (n = 1) and first excited (n = 2) states are -7.6 K and -1.9 K respectively and, as the energy required for excitation is higher than the typical experimental temperature (1 K), the electron remains in the ground state, trapped several nanometres above the liquid surface. The first spectroscopic evidence for these surface states was presented by Grimes and co-workers in 1976.   The electron motion parallel to the helium surface is free and, as the surface is free of impurities, the electron can move across the helium with record-high mobility. The liquid surface can support electron densities up to an electrohydrodynamic limit of 2.4×109 cm−2, much lower than those typically achieved in semiconductor two-dimensional ele
https://en.wikipedia.org/wiki/Molecular%20glue
A molecular glue is a small molecule that induces the interaction between two proteins that do not normally interact. The most commonly employed molecular glue induces a novel interaction between a substrate receptor of an E3 ubiquitin ligase and a target protein leading to proteolysis of the target. Examples of molecular glues that induce degradation of protein targets include the immunomodulatory imide drug (also known as IMiD; e.g., thalidomide, lenalidomide, pomalidomide), which generate a novel interaction between a substrate (e.g., IKZF1/3, also known as Ikaros/Aiolos) and cereblon, a substrate receptor (also known as DCAF) for Cullin-RING ubiquitin ligase 4 (CRL4). They work in a similar manner to PROTAC molecules, bringing about targeted protein degradation. Distinct from PROTAC molecules, molecular glues insert into a naturally occurring PPI interface, with contacts optimized for both the substrate and ligase within the same small molecule entity. The phrase "molecular glue" was coined in 1992 by Stuart Schreiber in reference to the immunophilins. References Medicinal chemistry Biotechnology
https://en.wikipedia.org/wiki/Ventoy
Ventoy is a free and open-source utility used for writing image files such as .iso, .wim, .img, .vhd(x), and files onto storage media to create bootable USB flash drives. Once Ventoy is installed onto a USB drive, there is no need to reformat the disk to update it with new installation files; it is enough to copy the .iso, , , , or file(s) to the USB drive and boot from them directly. Ventoy will present the user with a boot menu to select one of these files. Features Ventoy can be installed on a USB flash drive, local disk, SSD (NVMe), or SD Card and it will directly boot from the selected .iso, , , , or file(s) added. Ventoy does not extract the image file(s) to the USB drive, but uses them directly. It is possible to place multiple ISO images on a single device and select the image to boot from the menu displayed just after Ventoy boots. MBR and GPT partition styles, x86 Legacy BIOS and various UEFI boot methods (including persistence) are supported. ISO files larger than 4 GB can be used. Ventoy supports various operating system boot and installation ISO files including Windows 7 and above, Debian, Ubuntu, CentOS, RHEL, Deepin, Fedora and more than a hundred other Linux distributions; various UNIX releases, VMware, Citrix XenServer, etc. have also been tested. See also List of tools to create Live USB systems References External links Github Repository Softpedia: Ventoy Linux Uprising Blog on Ventoy Cross-platform software Free system software Linux installation software Multiboot live USB
https://en.wikipedia.org/wiki/Algorithmic%20management
Algorithmic management is a term used to describe certain labor management practices in the contemporary digital economy. In scholarly uses, the term was initially coined in 2015 by Min Kyung Lee, Daniel Kusbit, Evan Metsky, and Laura Dabbish to describe the managerial role played by algorithms on the Uber and Lyft platforms, but has since been taken up by other scholars to describe more generally the managerial and organisational characteristics of platform economies. However, digital direction of labor was present in manufacturing already since the 1970s and algorithmic management is becoming increasingly widespread across a wide range of industries. The concept of algorithmic management can be broadly defined as the delegation of managerial functions to algorithmic and automated systems. Algorithmic management has been enabled by recent advances in digital technologies which allow for the real-time and "large-scale collection of data" which is then used to "improve learning algorithms that carry out learning and control functions traditionally performed by managers". In the contemporary workplace, firms employ an ecology of accounting devices, such as “rankings, lists, classifications, stars and other symbols’ in order to effectively manage their operations and create value without the need for traditional forms of hierarchical control.” Many of these devices fall under the label of what is called algorithmic management, and were first developed by companies operating in the sharing economy or gig economy, functioning as effective labor and cost cutting measures. The Data&Society explainer of the term, for example, describes algorithmic management as ‘a diverse set of technological tools and techniques that structure the conditions of work and remotely manage workforces. Data&Society also provides a list of five typical features of algorithmic management: Prolific data collection and surveillance of workers through technology; Real-time responsiveness to
https://en.wikipedia.org/wiki/Mati%20Meos
Mati Meos (born 5 October 1946 in Jõgeva) is an Estonian politician and engineer. He was a member of VIII Riigikogu and a director and founder of the Estonian Aviation Museum. References Living people 1946 births Estonian engineers Estonian Coalition Party politicians Members of the Riigikogu, 1995–1999 Recipients of the Order of the White Star, 4th Class Tallinn University of Technology alumni People from Jõgeva
https://en.wikipedia.org/wiki/Modular%20Product%20Architecture
A Modular Product Architecture is a product design practice, using principles of modularity. In short, a Modular Product Architecture can be defined as a collection of modules with unique functions and strategies, protected by interfaces to deliver an evolving family of market-driven products. Karl Ulrich, Professor in Mechanical Engineering, defines a Product Architecture as “(1) the arrangement of functional elements; (2) the mapping from functional elements to physical components; (3) the specification of the interfaces among interacting physical components”. A Modular Product Architecture consists of interchangeable building blocks (modules) that can be combined into a variety of product variants. Assigning strategic intent to each module enables the producing company to connect its business objectives with the design of the product:. This can be done by the use of Module Drivers. The Module Drivers were first defined in 1998 by Gunnar Erixon, PhD in Design Engineering at KTH Royal Institute of Technology, and grouped into Primary and Secondary Module Drivers. The Primary drivers defines the strategy of the module based on its need for development or variance, as follows Carry Over: Describes a part that is unlikely to undergo any design changes during the life of the Modular Product Architecture. Common Unit: Describes a part that can be used for the entire product assortment or large parts of it. Technical Specification: Describes a part that carries the product’s variance and performance properties. Styling: Describes visible parts of the product that represent identity towards the customer. These parts are strongly influenced by trends and are often connected to a brand or trademark. Technology Push: Describes a part that is likely to undergo design changes due to changing demands or technology shifts. Planned Development: Describes a part that the company intends to further develop, for example to better fulfill a customer value or to cut cost.
https://en.wikipedia.org/wiki/Story%20%28social%20media%29
In social media, a story is a function in which the user tells a narrative or provides status messages and information in the form of short, time-limited clips from several automatically running sequences. A story is usually displayed on a user's profile page and thus represents an audiovisual extension to the text-based status function. Definition A story is usually a short, automatic sequence of images or videos that is divided into several sequences, which is accompanied by backgrounds, music, texts, stickers, animations, effects and emojis. The aim of stories is to tell a narrative (e.g. an everyday experience) or to convey a message. Most stories cannot be changed afterwards and are only available for a short time. Hashtags, tagging, and location the reach of a stories can also be added. As with other functions in social networks, the visibility of the stories for groups of people can be adjusted in the settings. Stories are almost exclusively created on a mobile device such as a smartphone or tablet computer and are usually displayed vertically. History With the advent of better cell phone cameras and the increasing popularity of internet-enabled mobile apps, the need has also increased to extend the status function, which has been around for a long time in social networks, to the multimedia area and thereby remove functions of the feed. In October 2013, Snapchat first introduced the story function. This is a series of snaps that together tell a narrative through a chronological order. A story is deleted after 24 hours. Snapchat became very well known and popular with teenagers because of this feature, among other things. After 2015 they introduced a feature to add private stories which the user can control the viewer of their stories. Later other apps would copy this feature. In October 2015, Twitter introduced the story feature called Moments. In 2016, Google introduced the Google AMP Stories service, which enables mobile websites to load faster and be
https://en.wikipedia.org/wiki/2021%20Microsoft%20Exchange%20Server%20data%20breach
A global wave of cyberattacks and data breaches began in January 2021 after four zero-day exploits were discovered in on-premises Microsoft Exchange Servers, giving attackers full access to user emails and passwords on affected servers, administrator privileges on the server, and access to connected devices on the same network. Attackers typically install a backdoor that allows the attacker full access to impacted servers even if the server is later updated to no longer be vulnerable to the original exploits. , it was estimated that 250,000 servers fell victim to the attacks, including servers belonging to around 30,000 organizations in the United States, 7,000 servers in the United Kingdom, as well as the European Banking Authority, the Norwegian Parliament, and Chile's Commission for the Financial Market (CMF). On 2 March 2021, Microsoft released updates for Microsoft Exchange Server 2010, 2013, 2016 and 2019 to patch the exploit; this does not retroactively undo damage or remove any backdoors installed by attackers. Small and medium businesses, local institutions, and local governments are known to be the primary victims of the attack, as they often have smaller budgets to secure against cyber threats and typically outsource IT services to local providers that do not have the expertise to deal with cyber attacks. On 12 March 2021, Microsoft announced the discovery of "a new family of ransomware" being deployed to servers initially infected, encrypting all files, making the server inoperable and demanding payment to reverse the damage. On 22 March 2021, Microsoft announced that in 92% of Exchange servers the exploit has been either patched or mitigated. Background Microsoft Exchange is considered a high-value target for hackers looking to penetrate business networks, as it is email server software, and, according to Microsoft, it provides "a unique environment that could allow attackers to perform various tasks using the same built-in tools or scripts that adm
https://en.wikipedia.org/wiki/No-justified-envy%20matching
In economics and social choice theory, a no-justified-envy matching is a matching in a two-sided market, in which no agent prefers the assignment of another agent and is simultaneously preferred by that assignment. Consider, for example, the task of matching doctors for residency in hospitals. Each doctor has a preference relation on hospitals, ranking the hospitals from best to worst. Each hospital has a preference relation on doctors, ranking the doctors from best to worst. Each doctor can work in at most one hospital, and each hospital can employ at most a fixed number of doctors (called the capacity of the hospital). The goal is to match doctors to hospitals, without monetary transfers. Envy is a situation in which some doctor d1, employed in some hospital h1, prefers some other hospital h2, which employs some other doctor d2 (we say that d1 envies d2). The envy is justified if, at the same time, h2 prefers d1 over d2. Note that, if d1 has justified envy w.r.t. h2, then h2 has justified envy w.r.t. d1 (h2 envies h1). In this case, we also say that d1 and h2 are a blocking pair. A matching with no blocking pairs is called a no-justified-envy (NJE) matching, or a matching that eliminates justified envy. Related terms No-justified-envy matching is a relaxation of two different conditions: Envy-free matching is a matching in which there is no envy at all, whether justified or not. Stable matching is a matching in which there is no justified envy, and in addition, there is no waste. A matching has waste if there is a doctor d and a hospital h, such that d prefers h over his or her current employer, h has some vacant positions, and h prefers d over a vacant position. Lattice structure In a many-to-one matching problem, stable matchings exist and can be found by the Gale–Shapley algorithm. Therefore, NJE matchings exist too. In general there can be many different NJE matchings. The set of all NJE matchings is a lattice. The set of stable matchings (which a
https://en.wikipedia.org/wiki/Isopropyl%20salicylate
Isopropyl salicylate is the ester formed by the condensation of salicylic acid and isopropyl alcohol. It is a transparent liquid that is sparingly soluble in water. However, it is soluble in ethyl alcohol and ether. See also Methyl salicylate Ethyl salicylate References Flavors Perfume ingredients Isopropyl esters Salicylate esters 3-Hydroxypropenals
https://en.wikipedia.org/wiki/Shutdown%20of%20Sky%20Global
Sky Global was a communications network and service provider founded in 2008 in Vancouver, Canada. It developed the world's largest encrypted messaging network called Sky ECC, operating through three servers of the OVHcloud company in Roubaix, France. A significant share of the system's users were international crime organizations involved in drug trafficking, and the company management was suspected of collusion. In a series of police raids against criminal organizations in several countries in early 2021, a part of Sky's infrastructure in Western Europe was dismantled, and US Department of Justice issued an arrest warrant against the company's CEO Jean-François Eap. On March 19, 2021, the company apparently shut down the operations after BlackBerry, Inc. cut it off from its services. Its website has been seized by the FBI. Background Sky Global was founded in 2008 by Jean-François Eap, in Vancouver, Canada. The company provided Sky ECC, a subscription-based end-to-end encrypted messaging application. Originally developed for the BlackBerry platform, it uses elliptic-curve cryptography (ECC) for encryption. One of its features was "self-destruction" of messages after a user-defined expiration period. The company modified Nokia, Google, Apple and BlackBerry phones. Phones supplied by the company had cameras, microphones and GPS disabled. If a phone was not contactable by the network, the message would be retained for up to 48 hours, then deleted. The phones had a kill switch: if a user entered a "panic" password, the device would delete its contents. The company website offered a US$4 million (€3.2 million Euro) prize to anyone who could break the encryption within 90 days. They support Android, BlackBerry and iPhone apps. Messages were stored using 512-bit elliptic-curve cryptography and network connections are protected by 2048 bit SSL. 171,000 SKY ECC devices were registered, mainly in Europe, North America, several central and South American countries – m
https://en.wikipedia.org/wiki/Flow-based%20generative%20model
A flow-based generative model is a generative model used in machine learning that explicitly models a probability distribution by leveraging normalizing flow, which is a statistical method using the change-of-variable law of probabilities to transform a simple distribution into a complex one. The direct modeling of likelihood provides many advantages. For example, the negative log-likelihood can be directly computed and minimized as the loss function. Additionally, novel samples can be generated by sampling from the initial distribution, and applying the flow transformation. In contrast, many alternative generative modeling methods such as variational autoencoder (VAE) and generative adversarial network do not explicitly represent the likelihood function. Method Let be a (possibly multivariate) random variable with distribution . For , let be a sequence of random variables transformed from . The functions should be invertible, i.e. the inverse function exists. The final output models the target distribution. The log likelihood of is (see derivation): To efficiently compute the log likelihood, the functions should be 1. easy to invert, and 2. easy to compute the determinant of its Jacobian. In practice, the functions are modeled using deep neural networks, and are trained to minimize the negative log-likelihood of data samples from the target distribution. These architectures are usually designed such that only the forward pass of the neural network is required in both the inverse and the Jacobian determinant calculations. Examples of such architectures include NICE, RealNVP, and Glow. Derivation of log likelihood Consider and . Note that . By the change of variable formula, the distribution of is: Where is the determinant of the Jacobian matrix of . By the inverse function theorem: By the identity (where is an invertible matrix), we have: The log likelihood is thus: In general, the above applies to any and . Since is
https://en.wikipedia.org/wiki/Simion%20Filip
Simion Filip is a mathematician from Moldova with dual citizenship of Romania and Moldova. He is an associate professor of mathematics at the University of Chicago who works in dynamical systems and algebraic geometry. Early life and education Filip was born in Chișinău, where he grew up and attended the Moldo-Turkish "Orizont" Lyceum, graduating in 2005. He is a dual citizen of Romania and Moldova. In 2004 and 2005, Filip won a bronze medal and a silver medal respectively while representing Moldova at the International Mathematical Olympiad. Filip graduated with an A.B. in mathematics from Princeton University in 2009. He attended Part III of the Mathematical Tripos at the University of Cambridge where he received a master's degree with distinction in 2010. He received his Ph.D. under the supervision of Alex Eskin at the University of Chicago in 2016. Career Filip spent two postdoctoral years as a Junior Fellow at Harvard University from 2016 to 2018, and another year at the Institute for Advanced Study. Since 2019, he has been an associate professor at the University of Chicago. Awards Filip received a five-year Clay Research Fellowship lasting from 2016 to 2021. In 2020, Filip was one of the recipients of the EMS Prize. Research Filip's research focuses on the interactions between dynamical systems and algebraic geometry. In particular, he studies dynamics on Teichmüller spaces and studies Hodge theory in complex geometry. References External links Year of birth missing (living people) Living people Scientists from Chișinău 21st-century Romanian mathematicians 21st-century Moldovan mathematicians International Mathematical Olympiad participants Romanian expatriates in the United States Moldovan expatriates in the United States Princeton University alumni Alumni of the University of Cambridge University of Chicago alumni University of Chicago faculty Algebraic geometers Dynamical systems theorists
https://en.wikipedia.org/wiki/Allen%20Clark%20Research%20Centre
The Allen Clark Research Centre was a solid-state physics optoelectronics research centre of the Plessey company at Caswell, near Towcester, Northamptonshire, England. History It was opened on Friday 20 March 1964 by the Duke of Edinburgh. He toured the laboratories and took lunch there, in the company of James Orr and the Earl of Kilmuir. The Duke unveiled a memorial to Sir Allen Clark. The site was named after Sir Allen George Clark (1898–1962), who was succeeded by his son Sir John Allen Clark (1926–2001). The site won the 1974 Queen's Award for Technology, for silicon integrated circuits. The Duke of Kent visited on the morning of Thursday 9 May 1974. Scientists Sir Derek Roberts CBE FRS FREng (1932–2021), former director Research It worked with the Physics department of the University of Sussex. It worked with Square D of the US in the late 1970s. It conducted early work on fibre optic networks in the mid-1980s, with the fibre made by BICC, with a 107km test fibre-optic cable, with dispersion-shifted monomode fibre. It developed spectrum-splicing for fibres in the mid-1980s. Successor The site is now Caswell Science Park, run by Lumentum Technology UK. See also Invention of the integrated circuit Timeline of electrical and electronic engineering Taplow Court, has carried out similar work for BT References 1964 establishments in England Chemical research institutes History of electronic engineering History of telecommunications in the United Kingdom Materials science institutes Plessey Research institutes established in 1964 Science and technology in Northamptonshire West Northamptonshire District
https://en.wikipedia.org/wiki/Fairchild%20660
The Fairchild 660 is a tube-based single-channel audio compressor invented by Rein Narma and manufactured by the Fairchild Recording Equipment Corporation beginning in 1959. The 660 was the first intelligent automatic volume control limiter. The Fairchild 670, introduced shortly after the 660, is a dual-channel version. The rarity of Fairchild compressors has made them highly desirable and very valuable, with a used 660 now selling for $20,000 or more and a 670 selling for $30-$40,000 or more. They are commonly referred to as the "holy grail" of outboard gear. History The 660 was designed by Rein Narma, who had worked with Les Paul to build a recording mixer to use with Les Paul's Ampex 8-track. Les Paul asked Narma if he would build a compressor/limiter. Sherman Fairchild, who was friends with Les Paul, learned of the compressor and licensed Narma's compressor design, hiring Narma to be chief engineer at Fairchild Recording Equipment Corporation. The first 10 Fairchild 660 were built by Narma himself. The first unit was sold to Rudy Van Gelder who used it to cut lacquer masters for Blue Note Records and Vox Records. The second unit went to Olmsted Sound Studios in New York City, and the third 660 built went to Mary Ford and Les Paul. Design The mono 660 and dual-channel 670 can function as a compressor with a ratio of 2 to 1 and a threshold of 5 db below normal program level, as a peak limiter with a compression ratio of 30 to 1 and a threshold of 10 db above normal program level, or can operate anywhere between those two extremes. Utilizing a single push-pull stage of amplification and an extremely high control voltage, the sound of the 660 and 670 is characterized by the complete absence of audible thumps, with extremely low distortion and noise. Both feature an extremely fast attack time that can produce the full limiting effect during the first 1/10,000 of a second. This extremely fast attack time is combined with six different variable release timing curve
https://en.wikipedia.org/wiki/Windscribe
Windscribe is a commercial, cross-platform virtual private network (VPN) service provider that is based in Canada, but operates internationally. History Windscribe was founded by Yegor Sak and Alex Paguis in 2016. In January 2021, Windscribe began beta testing ControlD, a new standalone DNS-based ad and tracker service, a direct competitor to services such as NextDNS, DNSFilter, and Cisco Umbrella. In April 2023, a mid-sized VPN provider WeVPN shut down due to "unforeseen financial difficulties". Windscribe offered to match the remaining time left on WeVPN customer subscriptions, free of charge. Windscibe and WeVPN stated that this is not an acquisition, but "purely a gesture of good will". Features Windscribe uses the OpenVPN, Internet Key Exchange v2/IPsec, and WireGuard protocols in its applications and manual configurations. Windscribe servers support P2P file sharing and is promoted as a no-log VPN service from their privacy policy. Windscribe offers open source desktop applications for Windows and macOS, with a command-line utility for Linux, and open source mobile applications for iOS, Android, and Android TV. Windscribe also offers encrypted proxy support via browser extensions on Google Chrome and Firefox web browsers. Windscribe users can connect unlimited simultaneous devices. Social responsibility Windscribe has been an active proponent of freedom of access to information censored by authoritarian regimes. These efforts include providing expanded bandwidth free accounts to everyone affected by the Russian invasion of Ukraine, using profanity laden promo codes in both Russian and Ukrainian languages, as well as free and unlimited service to all journalists in the region, and subsequently combatting Russian blocks that were aimed to render these efforts fruitless. In September of 2022, with the outbreak of the Mahsa Amini protests in Iran, Windscribe once again offered expanded free accounts to those affected, as well as Signal (software) proxies ai
https://en.wikipedia.org/wiki/Black%20Software
Black Software: The Internet and Racial Justice, From the Afronet to Black Lives Matter is a 2019 American book that sets out to understand Black Lives Matter through the six-decade history of racial justice movement organizing online. Overview Charlton McIlwain is an American academic and author whose expertise includes the role of race and media in politics and social life. McIlwain is Professor of media, culture, and communication and is the Vice Provost for Faculty Engagement and Development at New York University. Dr. McIlwain is the author of multiple books, including Black Software: The Internet and Racial Justice, From the Afronet to Black Lives Matter, which has been widely reviewed. Black Software has been nominated for the MAAA Stone Book Award. See also Kamal Al-Mansour AfroNet References External links https://charltonmcilwain.com/ https://www.nyu.edu/about/news-publications/news/2019/november/charlton-mcilwain-on-black-software.html Black Lives Matter Software engineering books Social movements in the United States Critical race theory 2019 non-fiction books Books about race and ethnicity Oxford University Press books
https://en.wikipedia.org/wiki/Comparison%20of%20user%20features%20of%20operating%20systems
Comparison of user features of operating systems refers to a comparison of the general user features of major operating systems in a narrative format. It does not encompass a full exhaustive comparison or description of all technical details of all operating systems. It is a comparison of basic roles and the most prominent features. It also includes the most important features of the operating system's origins, historical development, and role. Overview An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs. Time-sharing operating systems schedule tasks for efficient use of the system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources. For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes system calls to an OS function or is interrupted by it. Operating systems are found on many devices that contain a computer from cellular phones and video game consoles to web servers and supercomputers. , the dominant general-purpose desktop operating system is Microsoft Windows with a market share of around 74.14%. macOS by Apple Inc. is in second place (15.33%), and the varieties of Linux are collectively in third place (2.91%). In the mobile sector, including both smartphones and tablets, Android is dominant with a market share of 71%, followed by Apple's iOS with 28%; for smartphones alone, Android has 72% and iOS has 28%. Linux distributions are dominant in the server and supercomputing sectors. Other specialized classes of operating systems (special-purpose operating systems)), such as embedded and real-time systems, exist for many applications. Security-focused operating systems also exist. Some operating sys
https://en.wikipedia.org/wiki/Microsoft%20Power%20Platform
Microsoft Power Platform is a line of business intelligence, app development, and app connectivity software applications. Microsoft developed the Power Fx low-code programming language for expressing logic across the Power Platform. It also provides integrations with GitHub and Teams among other apps. Products The Power Platform family of products includes: Power BI, software for visualizing data with different kinds of charts. It competes with tools like Tableau. Power Apps, graphical software for writing low-code custom business applications. (Known as PowerApps until 2019). Power Automate, a toolkit similar to IFTTT and Zapier for implementing business workflow products. (Formerly Microsoft Flow). Power Automate Desktop (PAD), robotic process automation (RPA) software for automating graphical user interfaces (via the acquisition of Softomotive in May 2020). This product uses a Robin Script based language to achieve RPA. Power Virtual Agents, software for writing chatbots Power Pages, graphical software for making low-code websites. Formerly part of Power Apps as "Power Apps Portals" until 2022 Microsoft Dataverse Microsoft Dataverse, formerly known as Microsoft Common Data Service until November 2020, is a relational database engine offered by Microsoft as a cloud-based data management software as a service for storing business data. It is mainly a database with associated functionalities, and separates itself from on-premises solutions (for example Microsoft Access) in that a developer needs internet access to connect to Dataverse. It is mainly a tool for managing and storing data, and allows for creation and management of datasets through a single user interface. MS Dataverse is marketed for use with other Microsoft products such as Power Apps and Microsoft Dynamics 365 applications, and has data connectors to other Microsoft products like Azure Event Hub, Azure Service Bus, Microsoft SQL and Azure Data Lake. One example of use could be to use Data
https://en.wikipedia.org/wiki/Tapan%20Sarkar
Tapan Kumar Sarkar (August 2, 1948 – March 12, 2021) was an Indian-American electrical engineer and Professor Emeritus at the Department of Electrical Engineering and Computer Science at Syracuse University. He was best known for his contributions to computational electromagnetics and antenna theory. Sarkar was the recipient of IEEE Electromagnetics Award in 2020. Biography Sarkar was born on August 2, 1948, in Kolkata, India. He obtained his Bachelor of Technology from IIT Kharagpur and Master of Engineering from University of New Brunswick in 1969 and 1971, respectively. He received his Master of Science and Doctor of Philosophy degrees from Syracuse University in 1975. Between 1975 and 1976, Sarkar worked for TACO Division of General Instrument. Between 1976 and 1985, he was a faculty member at Rochester Institute of Technology; he also briefly held a research fellowship position at Gordon McKay Laboratory for Applied Sciences in Harvard University in between 1977 and 1978. In 1985, he became a professor at Syracuse University and held the position until his death. He died on March 12, 2021, in Syracuse, New York. Sarkar acted as an associate editor for the IEEE Transactions on Electromagnetic Compatibility in between 1986-1989 and for IEEE Transactions on Antennas and Propagation in between 2004 and 2010. He was the 2014 president of IEEE Antennas & Propagation Society and the vice president of the Applied Computational Electromagnetics Society (ACES). Sarkar also served as board member for journals such as Digital Signal Processing, Journal of Electromagnetic Waves and Applications and Microwave and Optical Technology Letters. Sarkar was the president of OHRN Enterprises, Inc., an incorporated business specializing in computer services and system analysis. Research and awards Sarkar's research interests focused on "numerical solutions of operator equations arising in electromagnetics and signal processing with application to system design." He is the auth
https://en.wikipedia.org/wiki/Gagik%20Khachatryan%20%28politician%29
Gagik Gurgeni Khachatryan (; born November 26, 1955) is an Armenian politician who held various positions in Armenia's state bureaucracy, notably serving as chairman of the State Revenue Committee from 2008 to 2014 and minister of finance from 2014 to 2016. He was popularly known as the "super minister" due to his numerous responsibilities. He is currently the defendant in a corruption-related criminal case in Armenia. Early life and education Gagik Khachatryan was born in the village of Amasia in the Armenian SSR in 1955. He graduated from Yerevan Polytechnic University in 1977, majoring in industrial electronics. In 1987, he graduated from the Yerevan Institute of National Economy, receiving a degree in accounting and analysis of economic activity. Professional experience 1977–1978 worked as an electronics engineer in “Electron” factory 1978–1984 served as the second secretary of the initial organization of the Lenin Communist Youth Union Nairi regional committee 1984–1986 worked as the head of the department of the State Agro-technical school after G. Aghajanyan 1986–1989 served as the secretary of the initial party organization of Nor-Geghi State Technical College 1989–1996 – First Deputy Director of "Nairi" agro-firm 1996 worked as the Deputy Head of Hrazdan Tax Inspectorate 1996–1999 – Head of Mashtots Region Tax Inspectorate 1999–2000 – Head of the Tax Inspectorate of Erebuni region 2000 – Head of the Tax Inspectorate of Shahumyan region 2000–2001 – Deputy Head of the Tax Department of the RA Ministry of State Revenues 2001–2008 – Deputy Chairman of the RA State Customs Committee April 15 – June 4, 2008 – Acting Chairman of the RA State Customs Committee On June 4, 2008, by the decision of the Prime Minister of Armenia, he was relieved of the post of Deputy Chairman of the State Customs Committee under the Government of Armenia On June 4, 2008, by the decree of the President of Armenia he was appointed as the Chairman of the State Customs C
https://en.wikipedia.org/wiki/Journal%20of%20Electromagnetic%20Waves%20and%20Applications
The Journal of Electromagnetic Waves and Applications is a peer-reviewed scientific journal published by Taylor & Francis in 18 issues per year. It covers electromagnetic wave theory and its applications, including but not limited to wave propagation, antenna theory, photonics, and electromagnetic compatibility. The editors-in-chief are Pankaj Kumar Choudhury (National University of Malaysia) and Mohamad Abou El-Nasr (Arab Academy for Science, Technology & Maritime Transport). The founding editor-in-chief of the journal was Jin Au Kong. Abstracting and indexing The journal is abstracted and indexed in: Current Contents/Engineering, Computing & Technology EBSCO databases Ei Compendex Inspec Science Citation Index Expanded Scopus Zentralblatt MATH According to the Journal Citation Reports, the journal has a 2021 impact factor of 1.438. References External links Optics journals English-language journals Journals published between 13 and 25 times per year Taylor & Francis academic journals Academic journals established in 1987 Electromagnetism journals
https://en.wikipedia.org/wiki/Pastfinder
Pastfinder is a vertically scrolling shooter designed by David Lubar and published by Activision in 1984 for the Atari 8-bit, Commodore 64 and MSX home computers. Plot The year is 8878, and the player is a member of an elite legion of planetary explorers known as The Pastfinders. His job is to collect artifacts from a mysterious, irradiated planet and deliver them to bases distributed across the lifeless area. Searing radiation and a deadly, mechanized landscape defense are the player's obstacles: the only remnants of an extinct civilization. Gameplay The goal of the Pastfinder is to collect historical artifacts and deliver them to bases scattered around the planet. Two major obstacles stand in the way of this mission. The first is the planet's automated defense system, consisting of multiple hovering barriers, rising and falling columns, opening and closing doors, fixed obstacles, and drones. Some of these can be destroyed, others simply bypassed or jumped over. The other obstacle is the land itself, large areas of which are intensely radioactive. The player is equipped with a radiation meter and alarm, as well as anti-radiation devices. At the beginning of the game, the player has access to a very small portion of the planet map, which will be revealed as exploration progresses. After selecting a square of the map to explore, the player is presented with a weapons screen and can choose their equipment. To replenish supplies, the player can collect spare parts that are scattered around the planet. The game ends when a player loses all their ships. Additional ships can sometimes be found on the planet's surface and are also earned every 5000 points. Development David Lubar began work on Pastfinder with a simple top view. Then one of his colleagues suggested that he try a more 45-degree back view. At first, it was a view of just the main character, but then Lubar began adding obstacles in the background. Using a unique Atari 8-bit hardware feature, he was able t
https://en.wikipedia.org/wiki/Empowerment%20%28artificial%20intelligence%29
Empowerment in the field of artificial intelligence formalises and quantifies (via information theory) the potential an agent perceives that it has to influence its environment. An agent which follows an empowerment maximising policy, acts to maximise future options (typically up to some limited horizon). Empowerment can be used as a (pseudo) utility function that depends only on information gathered from the local environment to guide action, rather than seeking an externally imposed goal, thus is a form of intrinsic motivation. The empowerment formalism depends on a probabilistic model commonly used in artificial intelligence. An autonomous agent operates in the world by taking in sensory information and acting to change its state, or that of the environment, in a cycle of perceiving and acting known as the perception-action loop. Agent state and actions are modelled by random variables () and time (). The choice of action depends on the current state, and the future state depends on the choice of action, thus the perception-action loop unrolled in time forms a causal bayesian network. Definition Empowerment () is defined as the channel capacity () of the actuation channel of the agent, and is formalised as the maximal possible information flow between the actions of the agent and the effect of those actions some time later. Empowerment can be thought of as the future potential of the agent to affect its environment, as measured by its sensors. In a discrete time model, Empowerment can be computed for a given number of cycles into the future, which is referred to in the literature as 'n-step' empowerment. The unit of empowerment depends on the logarithm base. Base 2 is commonly used in which case the unit is bits. Contextual Empowerment In general the choice of action (action distribution) that maximises empowerment varies from state to state. Knowing the empowerment of an agent in a specific state is useful, for example to construct an empowerment maximi
https://en.wikipedia.org/wiki/Northern%20resident%20orcas
Northern resident orcas, also known as northern resident killer whales (NRKW), are one of four separate, non-interbreeding communities of the exclusively fish-eating ecotype of orca in the northeast portion of the North Pacific Ocean. They live primarily off the coast of British Columbia (BC), Canada, and also travel to southeastern Alaska and northern Washington state in the United States. The northern resident population consists of three clans (A, G, R) that consists of several pods with one or more matrilines within each pod. The northern residents are genetically distinct from the southern resident orcas and their calls are also quite distinct. Social structure Like the Southern residents, the Northern residents live in groups of matrilines. A typical Northern resident matriline group consists of an elder female, her offspring, and the offspring of her daughters. Both males and female orcas remain within their natal matriline for life. Matrilines have a tendency to split apart over time. Pods consists of related matrilines that tend to travel, forage, socialize, and rest together. Each pod has a unique dialect of acoustic calls. Pods that share one or more certain calls belong to a common clan. Behaviours In the summer months the Northern residents can often be observed swimming close to shores of Johnstone Strait and positioning their stomachs to rub themselves on beach pebbles. More than 90% of the Northern resident population observed in Johnstone Strait visit these rubbing beaches. They emit certain and specific calls more frequently while engaging in this activity. Although it is not clear why they engage in this activity, beach rubbing has been identified as an important activity to the culture of the entire Northern resident community. This behaviour was originally thought to be unique to the Northern resident community; however, the Southern Alaska resident killer whales have also been observed beach rubbing. Location The Northern residents
https://en.wikipedia.org/wiki/Shadow%20rate
The shadow rate is an interest rate in some financial models. It is used to measure the economy when nominal interest rates come close to the zero lower bound. It was created by Fischer Black in his final paper, "Interest Rates as Options". The shadow rate derives from Fischer Black's insight that currency is an option. If someone has money, the person can either (1) spend it today or (2) not spend it and have money tomorrow. Thus, when loans would return less money than was initially loaned out, investors will choose to "exercise the option" and not loan their money. Thus, the nominal short-term interest rate is always greater than or equal to zero. In Black's model, the shadow nominal short-term rate is what the nominal short-term rate would be if it was allowed to go below the zero lower bound. When the shadow nominal short-term rate is positive, the nominal short-term rate is equal to the shadow rate. But when the shadow short-term rate is negative — such as during deflation or a bad recession with low inflation — the nominal short-term rate will diverge and stay above zero. In Black's model, even when nominal short-term interest rates stay close to zero, the long-term nominal interest rates can be well above zero. This is because nominal interest rates behave like options and there is some chance that the shadow short-term rate becomes positive in the future. There is also a shadow real rate. The shadow real short-term rate is equal to the shadow nominal short-term rate minus expected inflation. Fischer Black published his paper in 1995 and mentioned that the most recent time that the USA had experienced the zero lower bound was the Great Depression. Shadow rate models got renewed interest with the Financial Crisis of 2007–2008 when interest rates plunged to near zero and, even, below zero in some instances. Models Due to the option effect, the shadow short-term rate cannot be observed directly in the market. Economists use models to infer its value fro
https://en.wikipedia.org/wiki/Popularity%20of%20text%20encodings
A number of text encoding standards are used on the World Wide Web. Exact measurements for the prevalence of each are not possible. Attempts at measuring encoding popularity may utilize counts of numbers of documents, or counts weighed by actual use or visibility of those documents. The decision to use any one encoding may depend on the language used for the documents, or the locale that is the source of the document, or the purpose of the document. Text may be ambiguous as to what encoding it is in, for instance pure ASCII text is valid ASCII or ISO-8859-1 or CP1252 or UTF-8. "Tags" may indicate a document encoding, but when this is incorrect this may be silently corrected by display software (for instance the HTML spec says that the tag for ISO-8859-1 should be treated as CP1252), so counts of tags may not be accurate. Popularity on the World Wide Web UTF-8 has been the most common encoding for the World Wide Web since 2008. , UTF-8 accounts for 98.0% of all web pages (and 99.0% of top 10,000 pages and 98.5% of the top 1,000 highest ranked web pages, the next most popular encoding, ISO-8859-1, is used by 13 of those sites). Although many pages only use ASCII characters to display content, few websites now declare their encoding to only be ASCII instead of UTF-8. Virtually all countries and over 97% all of the tracked languages have 95% or more use of UTF-8 encodings on the web. See below for the major alternative encodings: The second-most popular encoding varies depending on locale, and is typically more efficient for the associated language. One such encoding is the Chinese GB 18030 standard, which is a full Unicode Transformation Format, still 95.2% of websites in China and territories use UTF-8 with it (effectively) the next popular encoding. Big5 is another popular Chinese (for traditional characters) encoding and is next-most popular in Taiwan after UTF-8 at 96.2%, and it's also second-most used in Hong Kong, while there as elsewhere, UTF-8 is even mor
https://en.wikipedia.org/wiki/Pollinator-mediated%20selection
Pollinator-mediated selection is an evolutionary process occurring in flowering plants, in which the foraging behavior of pollinators differentially selects for certain floral traits. Flowering plant are a diverse group of plants that produce seeds. Their seeds differ from those of gymnosperms in that they are enclosed within a fruit. These plants display a wide range of diversity when it comes to the phenotypic characteristics of their flowers, which attracts a variety of pollinators that participate in biotic interactions with the plant. Since many plants rely on pollen vectors, their interactions with them influence floral traits and also favor efficiency since many vectors are searching for floral rewards like pollen and nectar. Examples of pollinator-mediated selected traits could be those involving the size, shape, color and odor of flowers, corolla tube length and width, size of inflorescence, floral rewards and amount, nectar guides, and phenology. Since these types of traits are likely to be involved in attracting pollinators, they may very well be the result of selection by the pollinators themselves. Having a floral display that either attracts a variety of pollinators or is efficient in the exchanges that occur during pollination can have advantages for the reproductive success of plants. Thus, pollinator behavior is important to understand in relation to the evolution of flowering plants and in some cases pollinator behavior is thought to lead to specialized pollination syndromes where floral traits have co-evolved with their pollinators in a way that are a direct response to the selection occurring from their pollen vectors. However, many flowering plants don’t display morphology that excludes all pollinators except the one they co-evolved with. The most effective pollinator principle posits that floral traits reflect the adaptation to the pollinator that is efficient at transferring the most pollen. Selection might actually favor some degree of gene
https://en.wikipedia.org/wiki/Online%20fair%20division
Online fair division is a class of fair division problems in which the resources, or the people to whom they should be allocated, or both, are not all available when the allocation decision is made. Some situations in which not all resources are available include: Allocating food donations to charities (the "food bank" problem). Each donation must be allocated immediately when it arrives, before future donations arrive. Allocating donated blood or organs to patients. Again, each donation must be allocated immediately, and it is not known when and what future donations will be. Some situations in which not all participants are available include: Dividing a cake among people in a party. Some people come early and want to get a cake when they arrive, but other people may come later. Dividing the rent and rooms among tenants in a rented apartment, when one or more of them are not available during the allocation. The online nature of the problem requires different techniques and fairness criteria than in the classic, offline fair division. Online arrival of people The party cake-cutting problem Walsh studies an online variant of fair cake-cutting, in which agents arrive and depart during the division process, like in a party. Well-known fair division procedures like divide and choose and the Dubins-Spanier moving-knife procedure can be adapted to this setting. They guarantee online variants of proportionality and envy-freeness. The online version of divide-and-choose is more robust to collusion, and has better empirical performance. The secretive agent problem Several authors studied fair division problems in which one agent is "secretive", i.e., unavailable during the division process. When this agent arrives, he is allowed to choose any part of the resource, and the remaining n-1 parts should be divided among the remaining n-1 agents such that the division is fair. Note that divide and choose satisfies these requirements for n=2 agents, but extending th
https://en.wikipedia.org/wiki/Piezoelectrochemical%20transducer%20effect
The piezoelectrochemical transducer effect (PECT) is a coupling between the electrochemical potential and the mechanical strain in ion-insertion-based electrode materials. It is similar to the piezoelectric effect – with both exhibiting a voltage-strain coupling - although the PECT effect relies on movement of ions within a material microstructure, rather than charge accumulation from the polarization of electric dipole moments. Many different materials have been shown to exhibit a PECT effect including: lithiated graphite.; carbon fibers inserted with lithium, sodium, and potassium; sodiated black phosphorus; lithiated aluminium; lithium cobalt oxide; vanadium oxide nanofibers inserted with lithium and sodium; and lithiated silicon.   These materials all exhibit a voltage-strain coupling, whereby the material expands when it is charged with ions, and contracts when it is discharged. The reverse is also true: when applying a mechanical strain the electrical potential changes. This has led to various proposals of applications for the PECT effect with research focusing on actuators, strain-sensors, and energy harvesters. Origins The PECT effect was first reported by Dr. F Lincoln Vogel in 1981 when studying how intercalation voltages could be used to provide an actuation force in graphitized carbon fibres. The research used sulphate (SO4) ions from sulfuric acid to intercalate into the microstructure of carbon fibers, forming graphite intercalation compounds (GICs). It was hypothesized that an axial strain of up to 2% should be possible, however only 0.2% was observed due to experimental limitations. The effect is often explained by the theories of Larché and Cahn who derived mathematical formulations for the equilibrium relationships between the electric potential, chemical potential, and mechanical stress in solid materials. In summary the theory states that solid materials under mechanical stress undergo a change in chemical potential, which in turn affects t
https://en.wikipedia.org/wiki/Macedonite
Macedonite is a mineral named by Radusinović and Markov in 1971. It has the elemental formula PbTiO3 and exhibits tetragonal crystal system. The type locality is near Crni Kamen, Selecka Planina, Prilep Municipality, North Macedonia. It can be confused with perovskite. It is found in an amazonite-rich area. Fame Lead titanate, which is the premier piezoelectric material, had not been previously reported in the wild. References Lead minerals Titanium minerals Transducers Geology of North Macedonia
https://en.wikipedia.org/wiki/Flajolet%20Lecture%20Prize
The Philippe Flajolet Lecture Prize is awarded to for contributions to analytic combinatorics and analysis of algorithms, in the fields of theoretical computer science. This prize is named in memory of Philippe Flajolet. History The Flajolet Lecture Prize has been awarded since 2014. The Flajolet Lecture Prize is awarded in odd-numbered years. After being selected for the prize, the recipient delivers the Flajolet Lecture during the following year. This lecture is organized as a keynote address at the International Conference on Probabilistic, Combinatorial and Asymptotic Methods for the Analysis of Algorithms (AofA). AofA is the international conference that began as a series of seminars, started by Flajolet and others in 1993. The Selection Committee consists of three members from this field. Scientific topics The recipients of the Flajolet Lecture Prize work in a variety of areas, including analysis of algorithms, analytic combinatorics, combinatorics, communication protocols, complex analysis, computational biology, data mining, databases, graphs, information theory, limit distributions, maps, trees, probability, statistical physics. In the inaugural lecture, Don Knuth discussed five "Problems That Philippe Would Have Loved". Knuth surveyed five problems, including enumeration of polyominoes, mathematical tiling, tree pruning, lattice paths, and perturbation theory. In particular, he discussed the asymptotic enumeration of polyominoes (see OEIS entry A001168 for context and history). Knuth's discussion of forest pruning caused Peter Luschny to observe a connection to Dyck paths (see OEIS entry A091866). The portion of the talk on Lattice Paths of Slope 2/5 focused on a theorem by Nakamigawa and Tokushige. Knuth made a conjecture about the related enumeration of lattice paths, which was subsequently resolved by Cyril Banderier and Michael Wallner. Knuth's discussion of lattice paths also led to the creation of two new OEIS entries, A322632 and A3226
https://en.wikipedia.org/wiki/Horizon%20Worlds
Meta Horizon Worlds is a free virtual reality, online video game with an integrated game creation system developed and published by Meta Platforms. On this multi-player virtual platform, players move and interact with each other in various worlds that host events, games, and social activities. The game works on Oculus Rift S and Meta Quest 2 headsets. In February 2022, Meta reported Horizon Worlds had an estimated 300,000 users; yet, by October 2022, The Wall Street Journal was reporting less than 200,000 monthly users. Horizon Worlds has received mixed reviews, with critics citing bugs and an unenjoyable environment that degrades the user experience. In August 2023, Meta announced a new first-party studio called Ouro Interactive to build Horizon Worlds games. Its first title Super Rumble has largely received favorable feedback from users and media outlets. It utilizes new creation features such as asset imports and TypeScript that are not yet available for general creators. Gameplay The game may be played with an Oculus Rift S or Meta Quest 2 virtual reality headset and uses full 3D motion via the motion capture system of the headset and two hand-held motion controllers, which are required to interact with objects in the game. In October 2022, Meta announced that they will be launching a web version, allowing users to access the game without a headset as well. Players can explore the space around them within the confines of their physical floor-space, while roaming further by using controller buttons to teleport a short distance or to move continuously through the virtual space. According to Meta, users can create their own avatar, with a custom face and outfit, to represent themselves in the virtual world. All players begin at the hub (also known as the “plaza”), where they can take portals to different worlds created by other users. An integrated game creation system allows users to create new worlds. Users can also create their own personal space, which is a
https://en.wikipedia.org/wiki/List%20of%20human%20genetics%20conferences
National and international associations and societies for human genetics host regular meetings to advance human genetics in science, health, and society through excellence in research, education, and advocacy. References Human genetics Genetics organizations Conferences Genetics
https://en.wikipedia.org/wiki/Authentication%20and%20authorization%20infrastructure
Authentication and authorization infrastructure (AAI) refers to a service and a procedure that enables members of different institutions to access protected information that is distributed on different web servers. Traditional approaches to authorization and access control in computer systems are not sufficient to address the requirements of federated and distributed systems, where infrastructural support may be required. Authentication and authorization infrastructure solutions address such limitations. With an AAI, access control is not managed by a central register, but by the respective organization of the user who wishes to access a specific resource. In Switzerland, the SWITCH Information Technology Services Foundation is developing a Shibboleth-based AAI system that helps Swiss universities in particular to make their e-learning offers accessible to students beyond their own institutional boundaries. Based on the success of SWITCHaai, other countries are following with their own AAI projects. Projects CSTCloud AAI, China DFN-AAI, Germany ELIXIR AAI, UK EOSC-hub AAI, European Union GARR IDEM AAI, Italy GRNET AAI, Greece SWITCHaai, Switzerland See also Authentication Authorization Central Authentication Service Federated identity Identity as a service (IDaaS) Identity management Infrastructure as a service (IaaS) Keycloak List of single sign-on implementations OpenAthens Shibboleth Single Sign-on architecture References Authentication Access control Federated identity
https://en.wikipedia.org/wiki/Non-numerical%20words%20for%20quantities
The English language has a number of words that denote specific or approximate quantities that are themselves not numbers. Along with numerals, and special-purpose words like some, any, much, more, every, and all, they are Quantifiers. Quantifiers are a kind of determiner and occur in many constructions with other determiners, like articles: e.g., two dozen or more than a score. Scientific non-numerical quantities are represented as SI units. List of non-numerical quantities References English language Numbers
https://en.wikipedia.org/wiki/Year%20loss%20table
A Year Loss Table (YLT) is a list of historical or simulated years, with financial losses for each year. YLTs are widely used in catastrophe modeling, as a way to record and communicate historical or simulated losses from catastrophes. The use of lists of years with historical or simulated financial losses is discussed in many references on catastrophe modelling and disaster risk management, but it is only more recently that the name YLT has become standard. Overview Year of interest In a simulated YLT, each year of simulated loss is considered a possible loss outcome for a single year, the year of interest, which is usually in the future. In insurance industry catastrophe modelling, the year of interest is often this year or next year, due to the annual nature of many insurance contracts. However, the year can also be defined to be any year in the past or the future. Events Many YLTs are event based i.e., they are constructed from historical or simulated catastrophe events, each of which has an associated loss. Each event is allocated to one or more years in the YLT and there may be multiple events in a year. The events may have an associated frequency model, that specifies the distribution for the number of different types of events per year, and an associated severity distribution, that specifies the distribution of loss for each event. Events in an event-based YLT may all be of one peril-type (such as hurricane) or may be a mixture of peril-types (such as hurricane and earthquake). Period Loss Tables (PLTs) YLTs represent the possible losses in a period of one year, but can be generalized to represent the possible losses in any length of time, in which case they may be referred to as Period Loss Tables (PLTs). Use in insurance YLTs are widely used in the insurance industry, because they are a flexible way to store samples from a distribution of possible losses. Two properties, in particular, make them useful: The number of events within a year ca
https://en.wikipedia.org/wiki/Polygon%20with%20holes
In geometry, a polygon with holes is an area-connected planar polygon with one external boundary and one or more interior boundaries (holes). Polygons with holes can be dissected into multiple polygons by adding new edges, so they are not frequently needed. An ordinary polygon can be called simply-connected, while a polygon-with-holes is multiply-connected. An H-holed-polygon is H-connected. Degenerate holes Degenerate cases may be considered, but a well-formed holed-polygon must have no contact between exterior and interior boundaries, or between interior boundaries. Nondegenerate holes should have 3 or more sides, excluding internal point boundaries (monogons) and single edge boundaries (digons). Boundary orientation Area fill algorithms in computational lists the external boundary vertices can be listed in counter-clockwise order, and interior boundaries clockwise. This allows the interior area to be defined as left of each edge. Conversion to ordinary polygon A polygons with holes can be transformed into an ordinary unicursal boundary path by adding (degenerate) connecting double-edges between boundaries, or by dissecting or triangulating it into 2 or more simple polygons. In polyhedra Polygons with holes can be seen as faces in polyhedra, like a cube with a smaller cube externally placed on one of its square faces (augmented), with their common surfaces removed. A toroidal polyhedron can also be defined connecting a holed-face to a holed-faced on the opposite side (excavated). The 1-skeleton (vertices and edges) of a polyhedron with holed-faces is not a connected graph. Each set of connected edges will make a separate polyhedron if their edge-connected holes are replaced with faces. The Euler characteristic of hole-faced polyhedron is χ = V - E + F = 2(1-g) + H, genus g, for V vertices, E edges, F faces, and H holes in the faces. Examples Examples with degenerate holes A face with a point hole is considered a monogonal hole, adding one vertex, and one e
https://en.wikipedia.org/wiki/Translation%20regulation%20by%205%E2%80%B2%20transcript%20leader%20cis-elements
Translation regulation by 5′ transcript leader cis-elements is a process in cellular translation. Background Gene expression is tightly controlled at many different stages. Alterations in translation of mRNA into proteins rapidly modulates the proteome without changing upstream steps such as transcription, pre-mRNA splicing, and nuclear export. The strict regulation of translation in both space and time is in part governed by cis-regulatory elements located in 5′ mRNA transcript leaders (TLs) and 3′ untranslated regions (UTRs). Due to their role in translation initiation, mRNA 5′ transcript leaders (TLs) strongly influence protein expression. Eukaryotic translation consists of three stages: initiation elongation, and termination. Translation is primary regulated at the initiation stage where the small ribosomal subunit and initiation factors are recruited to the mRNA; directionally scanning along the 5′ TL to select the first “best” start codon to begin protein synthesis. Cap-dependent ribosomal scanning accounts for 95-97% of all translation in eukaryotes under normal conditions. Therefore, the cis-regulatory elements in TLs greatly influence translation initiation and ultimately protein expression. Kozak consensus sequence The first step in initiation is formation of the pre-initiation complex, 48S PIC. The small ribosomal subunit and various eukaryotic initiation factors are recruited to the mRNA 5′ TL and to form the 48S PIC complex, which scans 5′ to 3′ along the mRNA transcript, inspecting each successive triplet for a functional start codon. Translation initiation is most successful at an AUG codon surrounded upstream and downstream by a favorable sequence known as the “Kozak consensus sequence” or “Kozak context”. (See A) Weak or absent Kozak context surrounding the AUG leads to “leaky” scanning where the start codon is skipped, whereas a strong Kozak context leads to start codon recognition by the 48S PIC and binding of Met-tRNAi in the “closed” state.
https://en.wikipedia.org/wiki/DL%20Boost
Intel's Deep Learning Boost (DL Boost) is a marketing name for instruction set architecture (ISA) features on the x86-64 designed to improve performance on deep learning tasks such as training and inference. Features DL Boost consists of two sets of features: AVX-512 VNNI, 4VNNIW, or AVX-VNNI: fast multiply-accumulation mainly for convolutional neural networks. AVX-512 BF16: lower-precision bfloat16 floating-point numbers for generally faster computation. Operations provided include conversion to/from float32 and dot product. DL Boost features were introduced in the Cascade Lake architecture. A TensorFlow-based benchmark run on the Google Cloud Platform Compute Engine shows improved performance and reduced cost compared to previous CPUs and to GPUs, especially for small batch sizes. Notes External links Deep Learning Boost at Intel Andres Rodrigues et al., "Lower Numerical Precision Deep Learning Inference and Training", Intel White paper Intel and ML (2017), from Intel's Developer Relations Division SIMD computing Deep learning X86 architecture
https://en.wikipedia.org/wiki/Smell%20training
Smell training or olfactory training is the act of regularly sniffing or exposing oneself to robust aromas with the intention of regaining a sense of smell. The stimulating smells used are often selected from major smell categories, such as aromatic, flowery, fruity, and resinous. Using strong scents, the patient is asked to sniff each different smell for a minimum of 20 seconds, no less than two times per day, for three to six months or more. It is used as a rehabilitative therapy to help people who have anosmia or post-viral olfactory dysfunction, a symptom of COVID-19. It was considered a promising experimental treatment in a 2017 meta-analysis. Efficacy Along with olfactory implants, smell training is a promising but experimental treatment option. Several individual studies have indicated that smell training can increase olfactory sensitivity. In 2021 a meta-analysis was published that examined research studies of olfactory training for treating loss of smell as a consequence of a viral infection. It found clinically significant improvements and supported its use as a treatment option. As of March 2021, there have been no studies of smell training's efficacy for children. In 2017, the International and European Rhinologic Societies recommended smell training for treating loss of smell due to various conditions. In 2020, the British Rhinological Society published consensus guidelines for the treatment of smell loss due to COVID-19. Although no specific studies were available at that time, the expert panel made recommendations regarding treatment options and concluded that "olfactory training was recommended for all [COVID-19] patients with persistent loss of sense of smell of more than 2 weeks duration." Critics such as Richard Doty have pointed to the small sample sizes in the studies and the potential for the observed improvements to have been the result of nerve regeneration that would have occurred without intervention as reason to be skeptical. Mechani
https://en.wikipedia.org/wiki/Matground
Matgrounds are strong surface layers of seabed-hardening bacterial fauna preserved in the Proterozoic and lower Cambrian. Wrinkled matgrounds are informally named "elephant skin" because of its wrinkled surface in the fossil record. Matgrounds supported themselves until early burrowing worms were ubiquitous enough to unharden them. Burrowing animals broke down the hardy mats to further penetrate the underlying sediment for protection and feeding. Once matgrounds disappeared, exceptional preservation of lagerstätten such as the Burgess Shale or Ediacara Hills also did so too. Trace fossils such as Treptichnus are evidence for soft-bodied burrowers more anatomically complex than the Ediacaran biota that also caused the matgrounds disappearance. See also Cambrian substrate revolution References Proterozoic life Microbiology Evolutionary biology Precambrian
https://en.wikipedia.org/wiki/Blik
Blik (stylised: BLIK) is a payment system in Poland that allows users to make instant payments and withdraw cash using only the user's standard mobile banking app. The system allows users to make online and in-store purchases and to transfer money in real time between bank accounts and ATMs, including cash withdrawal from ATMs, without the need of a payment card. Transactions are uniquely identified by a 6-digit one-time code, valid for 2 minutes, which the user generates and authenticates in their mobile banking app. The code can then be typed in online, entered on the ATM screen, or typed by the payment recipient in their mobile app. The resulting payments are near instant. Blik allows phone number transfers by binding a phone number with a bank account. These transfers are free and instantaneous, even between accounts from different banks. Some online shopping platforms, like Allegro, are able to connect a customer account to a Blik-compatible app instance allowing for payment confirmation with just a notification prompt and pin code or biometric login. Blik was launched in February 2015 by Polski Standard Płatności, an alliance of six Polish banks, itself a member of the European Mobile Payment Systems Association. The number of participating banks has grown since. Blik had 8,6 million users and processed 424 million transactions in 2020. In 2021, Blik introduced mobile contactless payments in ground terminals. Between 2019 and 2020, police reported several cases of fraud using Blik ATM withdrawal. By gaining access to a person's social media account, the perpetrator is able to request a loan from acquaintances and perform cash withdrawals if provided with a Blik code. Participating banks The Blik service is available from the following banks: Alior Bank, Bank Millennium BNP Paribas Citi Handlowy Crédit Agricole Getin Bank ING Bank Śląski Nest Bank Getin Noble Bank mBank Bank Pocztowy Bank Pekao PKO Bank Polski & Inteligo Santander Bank Po
https://en.wikipedia.org/wiki/Electronic%20Design%20%28magazine%29
Electronic Design magazine, founded in 1952, is an electronics and electrical engineering trade magazine and website. History Hayden Publishing Company began publishing the bi-weekly magazine Electronic Design in December 1952, and was later published by InformaUSA, Inc. In 1986, Verenigde Nederlandse Uitgeverijen, purchased Hayden Publishing Inc. In June 1988, Verenigde Nederlandse Uitgeverijen, purchased Electronic Design from McGraw-Hill. In July 1989, Penton Media, purchased Electronic Design, then in Hasbrouck, N.J., from Verenigde Nederlandse Uitgeverijen. In July 2007, Penton Media's OEM electronics publication, EE Product News, merged with Penton Media's "Electronic Design" magazine. EE Product News was founded in 1941, as a monthly publication. In September 2016, Informa, purchased Penton Media, including Electronic Design. In November 2019, Endeavor Business Media purchased Electronic Design from Informa. Content Sections include Technology Reports (products), Engineering Essentials (new standards), Engineering Features (events), and Embedded in Electronic Design (embedded hardware and software). Design Solutions are contributed by field engineers and Ideas For Design are submitted by readers. Electronic Design also covers components. Techview presents news and products in the categories of Analog & Power, Digital, Electronic design automation, Communications, Test, and Wireless. The magazine covers emerging technologies and large-scale trends. Six "big" issues are published per year. The Technology Forecast issue is published in January. In June, the Megatrends issue describes industry trends. The "Best" issue reviews the year's "best" designs, events and products. "Your Issue" covers topics from the annual reader survey results. "One Powerful Issue" covers Power and "Wireless Everywhere" covers Wireless. Editorial staff include: William Wong, Senior Content Director; James Morra, Senior Editor; Cabe Atwell, Technology Editor; Alix Paultre,
https://en.wikipedia.org/wiki/Heresthetic
Heresthetic is an approach to understanding how political actors manipulate the decision-making process so they can win. Heresthetic is a positive political theory, including aspects of game theory, public choice theory, rational choice theory, and social choice theory to political science. Political scientist William H. Riker is considered the creator and one of the most prominent supports of theory. Description Riker argues that herestheticians win because they compel or persuade others to join them in voting or political coalitions. Heresthetic focuses both on the use of rhetoric and political strategy. Riker argues that there are three vital components to heresthetic. Agenda control: political agents may structure debate in ways that highlight favorable or eliminate undesirable policy alternatives. Depending upon the order that policy options are discussed, debate can produce different outcomes, including outcomes that are not preferred by the heresthetician. The order of choice matters. Riker's concept of agenda control differs from conventional accounts of agenda-setting involving policy-makers, which focus on how policy-makers’ agendas are influenced by exogenous factors, such as the media and public opinion. Riker's focus is on how policy-makers affect the ordering of items on the political agenda, and how that ordering can be manipulated. Strategic voting: in deliberative settings herestheticians can take advantage of voting procedures to influence outcomes. For example, agents may vote against their own interest in the short-term to secure a better long-term position. Another element of strategic voting is vote trading. Policy-makers may informally trade votes with others in exchange for future votes or benefits. Strategic voting is common in legislative settings because of open rules and sequential voting procedures. Dimension manipulation: herestheticians can manipulate the dimensionality of political decision-making by introducing new dimensions or
https://en.wikipedia.org/wiki/Commonwealth%20Engineers%20Council
The Commonwealth Engineers Council (CEC) is a network of professional engineering institutions of the Commonwealth, established to foster cooperation and exchange of information, support the development of indigenous engineering institutions, and foster the education, training and professional development of engineers. The CEC is an affiliated organisation of The Commonwealth. History In the autumn of 1945 the Secretary of The Institution of Civil Engineers (UK) suggested to his President and to The Institution of Mechanical Engineers and to the Institution of Electrical Engineers that a conference of representatives of Commonwealth Engineering Institutions should be held in London in 1946 to increase collaboration and co-operation between them. In consequence a meeting was held in London in September 1946 and was attended by representatives of institutions in Australia, Canada, India, New Zealand, South Africa and the UK. Many common problems and matters of common interest were discussed. Moreover it was agreed to establish CEC (it was then called the Commonwealth Engineering Conference) and to meet on a regular basis. Subsequent meetings have been held in Johannesburg, South Africa 1950 London, UK 1954 Sydney, Melbourne and Canberra, Australia (including New Zealand) 1958 Montreal, Canada 1962 London, UK 1966 Delhi, India 1969 London, UK 1973 Accra, Ghana 1975 London, UK 1977 Hong Kong 1979 Trinidad 1981 Harare, Zimbabwe 1983 Colombo, Sri Lanka 1985 Canada 1987 The pattern of meetings changed from a four year interval to a two year interval when the Commonwealth Foundation which had been founded in 1966 recognized CEC as a Commonwealth Professional Association to which it could grant funds so that representatives could attend meetings. CEC today The Institution of Civil Engineers (ICE) serves as the Secretariat for the Commonwealth Engineers’ Council. ICE’s ties to CEC have been longstanding, and the current CEC President is ICE
https://en.wikipedia.org/wiki/IOS%2015
iOS 15 is the fifteenth major release of the iOS mobile operating system developed by Apple for its iPhone and iPod Touch lines of products. It was announced at the company's Worldwide Developers Conference on June 7, 2021, as the successor to iOS 14, and released to the public on September 20, 2021. On June 6, 2022, at WWDC 2022, its successor, iOS 16, was announced. iOS 15 was officially succeeded by iOS 16 on September 12, 2022. iOS 15 is the final version of iOS that supports the iPhone 6S & 6S Plus, first-generation iPhone SE, iPhone 7 & 7 Plus and iPod Touch, as its successor, iOS 16, drops support for those models, including the seventh-generation iPod Touch. System features Focus Focus is a new feature that allows a user to change their "state", such as work, sleep, do not disturb or a custom focus. Based on the selected state, users can set the type of notification they want to receive and from which application. It is also possible to choose which pages and then apps to show on the Home based on the state. The state can change automatically based on where the user is or a time. Focus also controls the interactions with Contacts, so it is possible to decide which specific contacts can "disturb" the user. Some Lock Screen settings can be controlled based on the state: for example, the Dim Lock Screen feature, which darkens the lock screen from not showing notifications on that screen, can be automatically turned on or off based on the state. Focus is synchronized automatically across different iOS and macOS devices on the same iCloud account, as well as any paired watchOS devices. Notifications Notifications receive a new look with contact photos for all communication apps and larger app icons. When the notification arrives, the user can mute the corresponding app for one hour or all day. The Summary allows the user to group and postpone the notifications coming from the chosen apps, delivering them at a scheduled time in a single big notification c
https://en.wikipedia.org/wiki/TianoCore%20EDK%20II
TianoCore EDK II (formerly Tiano) is the reference implementation of UEFI by Intel. EDK is the abbreviation for EFI Development Kit and is developed by the TianoCore community. TianoCore EDK II is the de facto standard generic UEFI services implementation. History In 2004, Intel released their "Foundation Code" of their EFI implementation using a free license. The resulting code formed the basis of the community-run EDK project on SourceForge, started in 2004. The name "Tiano" was present in the initial intel code. The last update to the EDK project happened in May 2010. An "edk2" project was imported into SourceForge in April 2006, with a package-oriented code base again written by Intel. The initial "DeveloperManual" referred to this project as "Tiano R9". In 2008, a stable, validated version of EDK II was tagged as "UEFI Development Kit 2008" (UDK2008). The tag includes a BuildNotes.txt dating to November 2006 describing the code found in the initial import, and a BuildNotes2.txt describing modules added in May 2008. UDK2010 was the first version of EDK II to be widely known. Intel would continue to validate certain snapshots of EDK II as UDK until 2018, when EDK II moved into a "stable tag" format. Although EDK II implements the UEFI specification, it is not endorsed by the UEFI Forum. Projects EDK II code has been integrated into other projects. A part of TianoCore is the UEFI shell. When a specific UEFI vendor does not provide a UEFI shell, the one from TianoCore can be used. Coreboot Google uses a version of coreboot modified to launch Tiano. This feature is called PIANO (payload into Tiano) or tianocoreboot. PIANO code was merged into coreboot in 2013. The code was updated to be compatible with EDK II in 2017. EDK2 source code includes instructions for building as a payload for coreboot or Intel's "slim bootloader". Project Mu Project Mu is a fork of EDK-II by Microsoft. It is an open source release of the UEFI core used in Microsoft Surface and
https://en.wikipedia.org/wiki/APWEN
The Association of Professional Women Engineers of Nigeria (APWEN) was established in 1982 by Nigerian engineer Joana Maduka. It is a division of the Nigerian Society of Engineers (NSE). According to the body's leadership, APWEN was founded by six women and now has a membership of over 3,000 people with chapters in 35 cities, and collegiate in 16 campuses in all six geopolitical zones of Nigeria. APWEN advocates the inclusion of females in the engineering sector, by educating them to contribute to the production sector of the economy. The chairman of the Ota chapter, Dr. Imhade Okokpujie during the 2021/2022 executives' inauguration was quoted to have said, "Nigeria, as it stands, lacks involvement in that aspect of production engineering, hence the need to answer the question, 'What do Nigeria produce?' This is why women's development will be a catalyst for national development, hence, the need for more mentorship and encouragement for the girl child to study engineering." APWEN advocates for more female representation in STEM courses and projects in the engineering field by organising programs that encourage young girls in high schools and colleges, as well as promote women considered prominent in various engineering fields. Some of their programs include scholarships to young females. The award programme is often in conjunction with other bodies and corporations. References Engineering organizations Professional associations based in Nigeria 1982 establishments in Nigeria Women in engineering Non-governmental organizations
https://en.wikipedia.org/wiki/Benjaminiella
Benjaminiella is a genus of fungi belonging to the family Mucoraceae. The genus name of Benjaminiella is in honour of Richard Keith Benjamin (1922 - 2002), an American botanist from Rancho Santa Ana Botanic Garden. Species: Benjaminiella multispora Benny, Samson & M.C.Sriniv. Benjaminiella poitrasii (R.K.Benj.) Arx Benjaminiella youngii P.M.Kirk References Fungi Fungus genera
https://en.wikipedia.org/wiki/Introduction%20to%20Lattices%20and%20Order
Introduction to Lattices and Order is a mathematical textbook on order theory by Brian A. Davey and Hilary Priestley. It was published by the Cambridge University Press in their Cambridge Mathematical Textbooks series in 1990, with a second edition in 2002. The second edition is significantly different in its topics and organization, and was revised to incorporate recent developments in the area, especially in its applications to computer science. The Basic Library List Committee of the Mathematical Association of America has suggested its inclusion in undergraduate mathematics libraries. Topics Both editions of the book have 11 chapters; in the second book they are organized with the first four providing a general reference for mathematicians and computer scientists, and the remaining seven focusing on more specialized material for logicians, topologists, and lattice theorists. The first chapter concerns partially ordered sets, with a fundamental example given by the partial functions ordered by the subset relation on their graphs, and covers fundamental concepts including top and bottom elements and upper and lower sets. These ideas lead to the second chapter, on lattices, in which every two elements (or in complete lattices, every set) has a greatest lower bound and a least upper bound. This chapter includes the construction of a lattice from the lower sets of any partial order, and the Knaster–Tarski theorem constructing a lattice from the fixed points of an order-preserving functions on a complete lattice. Chapter three concerns formal concept analysis, its construction of "concept lattices" from collections of objects and their properties, with each lattice element representing both a set of objects and a set of properties held by those objects, and the universality of this construction in forming complete lattices. The fourth of the introductory chapters concerns special classes of lattices, including modular lattices, distributive lattices, and Boolean lat
https://en.wikipedia.org/wiki/Libcom.org
libcom.org is an online platform featuring a variety of libertarian communist essays, blog posts, and archives, primarily in English. It was founded in 2005 by editors in the United States and the United Kingdom. Libcom.org also has a forum and social media features including the ability to comment on post and upload original articles. In contrast with traditional archives, anarchistic archival practices embrace "use as preservation", making use of digital technology to host niche political material in online repositories like Libcom.org. The site was launched in 2003 originally as enrager.net, named for the enragés of the French Revolution, but changed its name in 2005 to the present name libcom.org, short for libertarian communism. The enrager.net web collective was a splinter of the London group inside the Anarchist Youth Network, an organization founded in 2002 by two members of the Anarchist Federation. See also Spunk Library, a defunct anarchist web archive (1992–2002) Anarchy Archives, an online research center on the history and theory of anarchism founded in 1995 References External links Official website Anarchist websites Discipline-oriented digital libraries Internet properties established in 2003 Online archives Political Internet forums
https://en.wikipedia.org/wiki/Ken%20Robinson%20%28computer%20scientist%29
Kenneth ("Ken") Arthur Robinson (30 July 1938 – 5 September 2020) was an Australian computer scientist. He has been called "The Father of Formal Methods in Australia". Early life and education Ken Robinson was born in 1938. He received his BE degree in electrical engineering in 1959 and a BSc degree in physics and mathematics in 1961, both from the University of Sydney. Career Robinson worked at the University of New South Wales (UNSW) from 1965 to 2012, initially in the Department of Electronic Computation under Professor Murray Allen. During 1987–1989 he was Head of the Department of Computer Science and during 1996–2000 he was Head of the Department of Software Engineering. He held visiting positions in the United Kingdom at the University of Southampton (1978–79), the Programming Research Group at Oxford University as a visiting fellow at Wolfson College (1985–86), the Oxford University Computing Laboratory and B-Core (1999), and Royal Holloway College (University of London) and the University of Surrey (2003). In 1971, Robinson's courses in computer science included ALGOL W (from Stanford University), WATFOR (a student version of FORTRAN from the University of Waterloo), Plago (PL/I for students, from Brooklyn), SNOBOL (from Bell Labs), and IBM System/360 assembly language. The latter used an assembler program written by Robinson since the IBM assembler was too slow for student use. In 1974, the Department of Computer Science at UNSW had a PDP-11/40 minicomputer from Digital Equipment Corporation, used for teaching and administration. Ken Robinson wrote to Dennis Ritchie at Bell Labs requesting a copy of the Unix operating system. This arrived in 1975, making UNSW the first university outside the United States to run Unix regularly. Robinson's later research and teaching was especially centred around formal methods, particularly the B-Method, Event-B, and the Rodin tool. Robinson designed the initial BE Software Engineering program at UNSW and with the pr
https://en.wikipedia.org/wiki/Jane%20Kister
Jane Elizabeth Kister (born and also published as Jane Bridge, 18 October 1944 – 1 December 2019) was a British and American mathematical logician and mathematics editor who served for many years as an editor of Mathematical Reviews. Early life and education Jane Bridge was originally from Weybridge, England, where she was born on 18 October 1944; her father was a lawyer and later a judge. Her family moved to London when she was four, and she studied at St Paul's Girls' School in London. She matriculated at Somerville College, Oxford in 1963, but her studies were interrupted by a diagnosis of lupus; she resumed reading mathematics there in 1964, tutored by Anne Cobbe. She earned a first, won a Junior Mathematical Prize, and continued at Oxford for graduate study. She was given the Mary Somerville Research Fellowship in 1969, and completed her doctorate (D.Phil.) at Oxford in 1972. Her dissertation, Some Problems in Mathematical Logic: Systems of Ordinal Functions and Ordinal Notations, was supervised by Robin Gandy. She then became a tutorial fellow in mathematics at Somerville College, taking Anne Cobbe's position after Cobbe's retirement, and a member of the Mathematical Institute, University of Oxford, working among others there with Dana Scott. Marriage and later life In 1977, mathematician James Kister from the University of Michigan visited Oxford on sabbatical; they married in 1978 and she returned with him to the US, giving up her position at Oxford and in 1992 taking US citizenship. She obtained a visiting professorship at the Massachusetts Institute of Technology, and then in 1979 began working at Mathematical Reviews, where she would remain for the rest of her career. She became associate executive editor in 1984, and executive editor in 1998, the first woman to hold that position. When Mathematical Reviews shifted from being a paper review journal to an online electronic database, MathSciNet, in 1996, Kister was heavily involved in this advance. She a
https://en.wikipedia.org/wiki/Boxing%20barcode
Boxing is high-capacity 2D barcode. The flexible barcode format is fully customizable in terms of frame geometry, number of symbols per pixel and forward-error-correction (FEC) method. This makes it a suitable choice for storing large amounts of any kind of digital data on storage mediums such paper, photographic film or similar. Applications Boxing barcode is used on piqlFilm by Piql AS to store many infos in Arctic World Archive: the Vatican Library the photographic collection GitHub and other Format The Boxing barcode used in the piqlFilm consists 4096 rows and 2160 cols. Each frame has: border four corner marks external bars (reference, calibration, structural metadata, human-readable) data container sync points References External links Archival File Systems (AFS) Piql film-reader App Barcodes
https://en.wikipedia.org/wiki/Anca%20Muscholl
Anca Muscholl (born 1967) is a Romanian-German mathematical logician and theoretical computer scientist known for her work on formal verification, model checking, and two-variable logic. She is a researcher at the (LaBRI), a professor at the University of Bordeaux, and a former junior member of the Institut Universitaire de France. Education and career Muscholl was born in Bucharest, came to Germany as a teenage refugee in 1984, and won first place in two German national mathematics competitions (the ) in 1985 and 1986. She earned a master's degree at the Technical University of Munich, and completed her Ph.D. at the University of Stuttgart in 1994. Her dissertation, Über die Erkennbarkeit unendlicher Spuren, was supervised by Volker Diekert and published by Tuebner in 1996. She also earned a habilitation at the University of Stuttgart in 1999. After becoming a professor at Paris Diderot University in 1999, she moved to the University of Bordeaux in 2006. Recognition Muscholl was a junior member of the Institut Universitaire de France from 2007 to 2012. She won the CNRS Silver Medal in 2010. References External links Home page 1967 births Living people People from Bucharest 20th-century German mathematicians German women mathematicians German computer scientists German women computer scientists Romanian emigrants to Germany Romanian refugees Theoretical computer scientists Mathematical logicians Women logicians Technical University of Munich alumni University of Stuttgart alumni Academic staff of the University of Bordeaux Academic staff of Paris Diderot University 21st-century German mathematicians
https://en.wikipedia.org/wiki/MKE%20TAMGE%C3%87
MKE TAMGEÇ is a mine destruction system ( Mine-clearing line charge ) produced by MKEK, consisting of chain explosives attached to the back of a rocket. When the rocket is activated, it follows a parabola course and the explosives attached to its back follow this course with it. When the rocket falls to the ground, explosives also fall to the ground at the level of a rope and explode when they come into contact with the ground. As a result, a pathway cleared of mines is opened. MKE TAMGEÇ and MKE TAMKAR actively used by the Turkish armed forces and firstly used during operation Operation Euphrates Shield and Operation Olive Branch. References Rockets and missiles Mine warfare Mine action Explosives engineering Military engineering vehicles Military vehicles of Turkey Mine warfare countermeasures
https://en.wikipedia.org/wiki/Spongy%20degeneration%20of%20the%20central%20nervous%20system
Spongy degeneration of the central nervous system, also known as Canavan's disease, Van Bogaert-Bertrand type or Aspartoacylase (AspA) deficiency, is a rare autosomal recessive neurodegenerative disorder. It belongs to a group of genetic disorders known as leukodystrophies, where the growth and maintenance of myelin sheath in the central nervous system (CNS) are impaired. There are three types of spongy degeneration: infantile, congenital and juvenile, with juvenile being the most severe type. Common symptoms in infants include lack of motor skills, weak muscle tone, and macrocephaly. It may also be accompanied by difficulties in feeding and swallowing, seizures and sleep disturbances. Affected children typically die before the age of 10, but life expectancy can vary. The cause of spongy degeneration of the CNS is the mutation in a gene coding for aspartoacylase (AspA), an enzyme that hydrolyzes N-acetyl aspartic acid (NAA). In the absence of AspA, NAA accumulates and results in spongy degeneration. The exact pathophysiological causes of the disease are currently unclear, but there are developing theories. Spongy degeneration can be diagnosed with neuroimaging techniques and urine examination. There is no current treatment for spongy degeneration, but research utilising gene therapy to treat the disease is underway. Spongy degeneration is found to be more prevalent among Ashkenazi Jews, with an incidence of 1/6000 amongst this ethnic group. Clinical Symptoms Spongy Degeneration of the CNS is classified into three types: infantile, juvenile and congenital; based on the age of onset and severity of symptoms. Infantile Type The infantile type is the most common type of spongy degeneration of the CNS. Usually, affected infants appear normal for the first few months of life. The age of onset is around 6 months, where infants begin to develop noticeable psychomotor defects. Various motor skills such as turning over and stabilising head movements are affected. Hypoton