source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Aircraft%20Research%20Association | The Aircraft Research Association (ARA) is an aerodynamics research institute in the north-west of Bedford.
History
The association was founded on 22 January 1952. 14 main British aviation companies funded £1.25m to build a large wind tunnel.
It was first proposed in 1953 to build the site at Stevington, north-east of Bedford. By March 1953, the current site was chosen.
Construction
Work started on Monday 7 September 1953.
The wind tunnel was fabricated by Moreland Hayne of east London.
The transonic tunnel first ran in April 1956.
Visits
The Duke of Edinburgh visited on the morning of Friday 4 May 1956. He had been planning to land by helicopter in the south-east of Bedford, and to be driven from there to the site by car, but weather conditions were unsuitable.
Structure
The site has the largest transonic wind tunnel in the UK, known as the TWT, with speeds up to Mach 1.4, powered by a Sulzer axial compressor. It is 25,000 hp electric-powered.
Wind tunnels
Supersonic tunnel, Mach 1.4 - 3.5, built in 1958
Two hypersonic tunnels
Mach 4-5 tunnel, built in 1965
Mach 7 tunnel, built in 1968
Research
Projects worked on include Concorde, the Harrier and most Airbus aircraft. The Rolls-Royce RB211 was tested there.
The site now works with RUAG of Switzerland.
See also
Aerospace Technology Institute, in Bedfordshire, launched in 2012 by the government as the UK Aerodynamics Centre
British Hydromechanics Research Association (BHRA), also in Bedfordshire
UK Aerospace Research Consortium (UK-ARC), formed in 2018, an alliance of university departments
List of wind tunnels
References
External links
ARA Bedford
1952 establishments in the United Kingdom
Aerospace engineering organizations
Aerospace industry in the United Kingdom
Engineering research institutes
Organisations based in Bedford
Research institutes established in 1952
Science and technology in Bedfordshire
Technology consortia
Wind tunnels |
https://en.wikipedia.org/wiki/Network-In-a-Box | A Network-In-a-Box (NIB) is the combination of multiple components of a computer network into a single device (a 'box'), which are traditionally separated into multiple devices.
Examples
In 2021, the company Genie launched a 5G Network-In-a-Box to run as an on-premise service.
In August 2021, Tecore Networks launched a 5G Network-In-a-Box, which also supported 3GGP and LTE.
History
In 2014, an open-source hardware Network-In-a-Box based on OpenBTS was deployed in West-Papua, Indonesia.
References
Computer networking |
https://en.wikipedia.org/wiki/Facebook%20content%20management%20controversies | Facebook or Meta Platforms has been criticized for its management of various content on posts, photos and entire groups and profiles. This includes but is not limited to allowing violent content, including content related to war crimes, and not limiting the spread of fake news and COVID-19 misinformation on their platform, as well as allowing incitement of violence against multiple groups.
Intellectual property infringement
Facebook has been criticized for having lax enforcement of third-party copyrights for videos uploaded to the service. In 2015, some Facebook pages were accused of plagiarizing videos from YouTube users and re-posting them as their own content using Facebook's video platform, and in some cases, achieving higher levels of engagement and views than the original YouTube posts. Videos hosted by Facebook are given a higher priority and prominence within the platform and its user experience (including direct embedding within the News Feed and pages), giving a disadvantage to posting it as a link to the original external source. In August 2015, Facebook announced a video-matching technology aiming to identify reposted videos, and also stated its intention to improve its procedures to remove infringing content faster. In April 2016, Facebook implemented a feature known as "Rights Manager", which allows rights holders to manage and restrict the upload of their content onto the service by third-parties.
Violent content
In 2013, Facebook was criticized for allowing users to upload and share videos depicting violent content, including clips of people being decapitated. Having previously refused to delete such clips under the guideline that users have the right to depict the "world in which we live", Facebook changed its stance in May, announcing that it would remove reported videos while evaluating its policy. The following October, Facebook stated that it would allow graphic videos on the platform, as long as the intention of the video was to "condemn, n |
https://en.wikipedia.org/wiki/Cole%E2%80%93Davidson%20equation | The Cole-Davidson equation is a model used to describe dielectric relaxation in glass-forming liquids. The equation for the complex permittivity is
where is the permittivity at the high frequency limit, where is the static, low frequency permittivity, and is the characteristic relaxation time of the medium. The exponent represents the exponent of the decay of the high frequency wing of the imaginary part, .
The Cole–Davidson equation is a generalization of the Debye relaxation keeping the initial increase of the low frequency wing of the imaginary part, . Because this is also a characteristic feature of the Fourier transform of the stretched exponential function it has been considered as an approximation of the latter, although nowadays an approximation by the Havriliak-Negami function or exact numerical calculation may be preferred.
Because the slopes of the peak in in double-logarithmic representation are different it is considered an asymmetric generalization in contrast to the Cole-Cole equation.
The Cole–Davidson equation is the special case of the Havriliak-Negami relaxation with .
The real and imaginary parts are
and
See also
Debye relaxation
Cole-Cole relaxation
Havriliak–Negami relaxation
Curie–von Schweidler law
References
Equations
Glass
Liquids
Electric and magnetic fields in matter |
https://en.wikipedia.org/wiki/Bunq | bunq B.V. (colloquially named bunq — bank of The Free; ; ) is a Dutch fintech and neobank licensed in the Netherlands within the European Union and operating in 30 European countries. It was founded in Amsterdam where its headquarters are currently located.
The company was founded in 2012 by Dutch-Canadian entrepreneur Ali Niknam, who previously founded web hosting provider TransIP and team.blue.
It began opening other offices from 2019 onward and currently has a presence in Amsterdam, Rotterdam, Dublin, Sofia, Madrid, Brussels, Vienna and Warsaw.
History
Early history (2012-2015)
Much of bunq's early history is documented in the book BreakThrough Banking by Dutch author Siebe Huizinga.
According to BreakThrough Banking, much of bunq's early efforts went toward obtaining a European banking license from ‘De Nederlandsche Bank’, the central bank of the Netherlands. In 2014, bunq received a banking license from the Dutch central bank, after which the company launched its bunq app and became the first fully mobile Dutch bank.
Breakthrough Banking further describes how Niknam's background as a programmer factored heavily into bunq's development. Most of the people Huizinga mentions as early contributors to the company were developers or came from an IT background. Niknam has stated in interviews that “bunq is the only bank built by coders”. This seems to have resonated in bunq's early public perception, as the bank was frequently labeled “an IT company with a banking license”. At its launch in 2015, bunq was coined “WhatsApp for Banking” by Dutch newspaper NRC, further underscoring its product and technology-focused banking model as an alternative to traditional ones.
International expansion (2015-present)
Although initially catering to the Dutch market, bunq has since expanded throughout Europe, offering mobile financial services in 30 European countries, as of 2019. In the early 2020s, bunq began offering multiple currencies and IBANs on a single subscription, |
https://en.wikipedia.org/wiki/Clavis%20mathematicae | Clavis mathematicae (English: The Key of Mathematics) is a mathematics book written by William Oughtred, originally published in 1631 in Latin. It was an attempt to communicate the contemporary mathematical practices, and the European history of mathematics, into a concise and digestible form. The book contains an addition in its 1647 English edition, "Easy Way of Delineating Sun-Dials by Geometry", which had been written by Oughtred earlier in life. The original edition brought the autodidactic Oughtred acclaim amongst mathematicians, but the English-language reissue brought him celebrity, especially amongst tradesman who made use of the arithmetic in their labors. The book is also notable for using the symbol "x" for multiplication, a method invented by Oughtred.
References
1631 books
Mathematics books |
https://en.wikipedia.org/wiki/Normal%20distributions%20transform | The normal distributions transform (NDT) is a point cloud registration algorithm introduced by Peter Biber and Wolfgang Straßer in 2003, while working at University of Tübingen.
The algorithm registers two point clouds by first associating a piecewise normal distribution to the first point cloud, that gives the probability of sampling a point belonging to the cloud at a given spatial coordinate, and then finding a transform that maps the second point cloud to the first by maximising the likelihood of the second point cloud on such distribution as a function of the transform parameters.
Originally introduced for 2D point cloud map matching in simultaneous localization and mapping (SLAM) and relative position tracking, the algorithm was extended to 3D point clouds and has wide applications in computer vision and robotics. NDT is very fast and accurate, making it suitable for application to large scale data, but it is also sensitive to initialisation, requiring a sufficiently accurate initial guess, and for this reason it is typically used in a coarse-to-fine alignment strategy.
Formulation
The NDT function associated to a point cloud is constructed by partitioning the space in regular cells. For each cell, it is possible to define the mean and covariance of the points of the cloud that fall within the cell. The probability density of sampling a point at a given spatial location within the cell is then given by the normal distribution
.
Two point clouds can be mapped by a Euclidean transformation with rotation matrix and translation vector
that maps from the second cloud to the first, parametrised by the rotation angles and translation components.
The algorithm registers the two point clouds by optimising the parameters of the transformation that maps the second cloud to the first, with respect to a loss function based on the NDT of the first point cloud, solving the following problem
where the loss function represents the negated likelihood, obtaine |
https://en.wikipedia.org/wiki/Bernoulli%20umbra | In Umbral calculus, the Bernoulli umbra is an umbra, a formal symbol, defined by the relation , where is the index-lowering operator, also known as evaluation operator and are Bernoulli numbers, called moments of the umbra. A similar umbra, defined as , where is also often used and sometimes called Bernoulli umbra as well. They are related by equality . Along with the Euler umbra, Bernoulli umbra is one of the most important umbras.
In Levi-Civita field, Bernoulli umbras can be represented by elements with power series and , with lowering index operator corresponding to taking the coefficient of of the power series. The numerators of the terms are given in OEIS A118050 and the denominators are in OEIS A118051. Since the coefficients of are non-zero, the both are infinitely large numbers, being infinitely close (but not equal, a bit smaller) to and being infinitely close (a bit smaller) to .
In Hardy fields (which are generalizations of Levi-Civita field) umbra corresponds to the germ at infinity of the function while corresponds to the germ at infinity of , where is inverse digamma function.
Exponentiation
Since Bernoulli polynomials is a generalization of Bernoulli numbers, exponentiation of Bernoulli umbra can be expressed via Bernoulli polynomials:
where is a real or complex number.
This can be further generalized using Hurwitz Zeta function:
From the Riemann functional equation for Zeta function it follows that
Derivative rule
Since and are the only two members of the sequences and that differ, the following rule follows for any analytic function :
Elementary functions of Bernoulli umbra
As a general rule, the following formula holds for any analytic function :
This allows to derive expressions for elementary functions of Bernoulli umbra.
Particularly,
Particularly,
,
,
Relations between exponential and logarithmic functions
Bernoulli umbra allows to establish relations between exponential, trigonometric and hyperbolic fun |
https://en.wikipedia.org/wiki/Arithmetic%20%28book%29 | Arithmetic () is a 1703 mathematics textbook by the Russian educator and mathematician Leonty Magnitsky. The book served as the standard Russian mathematics textbook until the mid-18th century. Mikhail Lomonosov was educated on this book, and referred to it as the "gates of my own erudition". It was the first mathematics textbook written in the Russian language that was not a translated edition of a foreign work. It consisted essentially of Magnitsky's own lecture notes, and offered an encyclopedic overview of arithmetic at the time, with sections on navigational astronomy, geodesy, algebra, geometry, and trigonometry.
It was organized in instructive question and answer format, and rooted not in the abstract but in practical and demonstrable applications of theories and axioms. The book also contained astronomical tables and coordinate maps for various Russian locales.
The origins of the book lie in Peter the Great's establishment of the School of Navigation in Moscow, and the subsequent appointment of Magnitsky at the school's helm. He needed a text to teach from, and so formulated the book around his lectures and the prevailing European mathematics texts of the age.
The full title and subtitle reads: "Arithmetic, that is the science of numbering. Translated from different languages into Russian, put together and divided into two parts". The book runs 600 pages. Its publication was extensively researched in 1914 by Dmitrii Galanin in his book Leonty Filippovich Magnitsky and His Arithmetic. Original copies are preserved in the Moscow State University library.
Gallery
References
1703 books
Mathematics textbooks
Russian-language books |
https://en.wikipedia.org/wiki/Lemnis%20Gate | Lemnis Gate was a first-person arena shooter video game developed by Ratloop and published by Frontier Foundry. It was released on September 28, 2021 for the PlayStation 4, PlayStation 5, Windows, Xbox One, and Xbox Series X/S. It was also published to Xbox Game Pass on its first day of release as well.
The game featured players taking turns in competitive multiplayer matches to complete 25 second runs with characters as they attempt to complete objectives. Each player's turn stacked on top of previous rounds, causing players to think critically over the best strategy to take in a given situation to win as previous loops continue.
Reception to the game was generally favorable, with critics praising its interesting take on first-person shooter mechanics and the injection of a new layer of strategy into the genre. The game's multiplayer servers were shut down on July 11, 2023, with reporters noting the game's low player count and that it is shut down during a wave of similar live service game failures.
Gameplay
Lemnis Gate was a turn-based first-person shooter with timeloop and hero shooter elements. Games are either 1v1 or 2v2, and the standard game mode, "Seek and Destroy", involved having one side defend five "resistors" at different points on the map while the other side attacked them. On each turn, the first player or team chose an operative (one of six characters with different abilities) and completed an action in a 25-second loop. The other player or team then completed their own 25-second loop. Previous operatives automatically carried out the actions that the player inputted for them in previous loops, and later operatives could disrupt the actions that they take in order to stop them from completing objectives.
One reviewer gave an example of how the loops affected gameplay: their operative was able to damage an opponent's character enough from an earlier loop that it caused a cascading effect, allowing them to eliminate all of the previously looped |
https://en.wikipedia.org/wiki/Space%20ethics | Space ethics, astroethics or astrobioethics is a discipline of applied ethics that discusses the moral and ethical implications arising from astrobiological research, space exploration and space flight. It deals with practical contemporary issues like the protection of the space environment and hypothetical future issues pertaining to our interaction with extraterrestrial life forms.
Specific issues of space ethics include space debris mitigation and the militarization of space, but also more theoretical topics like space colonization, terraforming and space mining. The field also concerns itself with more fundamental moral questions, such as the ethicality of SETI and METI, the intrinsic value of extraterrestrial life, and how humans should treat extraterrestrial non-intelligent life (like microbes) and extraterrestrial intelligent life (and whether this distinction should be made in the first place).
Astroethical issues are often discussed as elements of broader issues such as general environmental protection and imperialism. Astroethics have been described as an emerging discipline gaining in attention, a "necessity for astrobiology" and a "true issue for the future of astrobiology".
Ethical guidelines for space exploration
Planetary Protection
A guiding principle in astroethics is that of Planetary Protection (PP), which seeks to prevent the introduction of lifeforms from Earth to other celestial bodies (forward contamination) and vice versa (back contamination), and thereby possible adverse consequences on existing ecospheres resulting from such contamination. This principle is anchored in the UN Outer Space Treaty, which was established in 1967 and has since been signed and ratified by all space-faring nations.
Precautionary Principle
The precautionary principle was defined in the 1998 Wingspread Conference on the Precautionary Principle. This approach is supposed to guide decisions in the face of a lack of scientific knowledge or consensus on a matt |
https://en.wikipedia.org/wiki/Street%20Fighter%206 | Street Fighter 6 is a 2023 fighting game developed by Bandai Namco Studios and published by Capcom. Announced in February 2022, it is the seventh main entry in the Street Fighter franchise, and was released for PlayStation 4, PlayStation 5, Windows and Xbox Series X/S on June 2, 2023, while an arcade version will be published by Taito later in the year. Additionally, a prequel comic book series was unveiled in September 2022.
Developed on the RE Engine, Street Fighter 6 supports cross-platform play and rollback netcode. It offers three overarching game modes and three control options. The game also features a real-time commentary system, providing a tournament-style feel and the option to cheer on the player.
Street Fighter 6 received critical acclaim and sold over 2 million units by July 2023.
Gameplay
Street Fighter 6 features three overarching game modes: Fighting Ground, World Tour, and Battle Hub. Fighting Ground contains local and online versus battles as well as training and arcade modes, all featuring similar 2D fighting gameplay to the previous games in the series, in which two fighters use a variety of attacks and special abilities to knock out their opponent. World Tour is a single-player story mode featuring a customizable player avatar exploring 3D environments, such as Final Fights Metro City and the small, fictional South Asian nation of Nayshall, with action-adventure gameplay. Battle Hub acts as an online lobby mode, using customizable player avatars from the World Tour mode (the first fighting game to implement similar online features was Tecmo's Dead or Alive 4). In the Battle Hub, players can compete in ranked or casual matches, battle using their created avatars, using the skills learned in World Tour mode, participate in special events, or play emulated Capcom arcade titles, using the same emulation technology used in the Capcom Arcade Stadium series, among other features.
The main fighting gameplay of Street Fighter 6 is based around the |
https://en.wikipedia.org/wiki/Deposit%20gauge | A deposit gauge is a large, funnel-like scientific instrument used for capturing and measuring atmospheric particulates, notably soot, carried in air pollution and "deposited" back down to ground.
Design and construction
Deposit gauges are similar to rain gauges. They have a large circular funnel on top, made of stone so it's not corroded by acid rain and mounted on a simple wooden or metal stand, which drains down into a collection bottle beneath. Typically the funnel has a wire-mesh screen around its perimeter to deter perching birds. Most are made to a standardized design, known as a standard deposit gauge, introduced in 1916 and formalized in a British Standard in 1951, which means the pollution collected in different places can be systematically studied and compared. The bottle is removed after a month and the contents taken away for analysis of water (such as rain, fog, and snow), insoluble matter (such as soot), and soluble matter.
Early history
The first gauges of this type were developed in the early 20th century by W.J. Russell of St Bartholomew's Hospital and the Coal Smoke Abatement Society. Between 1910 and 1916, the design was refined and standardized by the Committee for the Investigation of Atmospheric Pollution, a group of expert, volunteer scientists studying air pollution of which Sir Napier Shaw, first director of the Met Office, was chair. The first scientific paper featuring deposit gauge measurements was titled "The Sootfall of London: Its Amount, Quality, and Effects" and published in The Lancet in January 1912. Thanks to the introduction of the deposit gauge, air quality in Britain was monitored systematically from 1914 onward and this played an important role in determining the effectiveness of efforts to control pollution. By 1927, some deposit gauges were already showing 50 percent reductions in "deposited matter", although air pollution remained a major problem.
Over the next few decades, deposit gauges were deployed in many Briti |
https://en.wikipedia.org/wiki/Ferdo%20Ivanek | Ferdo Ivanek (June 1, 1923 – October 2, 2021) was an American electrical engineer of Yugoslav origin. He is best known for his contributions to microwave oscillators and amplifiers. He is the father of the American actor Željko Ivanek.
Biography
Ferdinand Ivanek was born in Ljubljana, and grew up in the village of Zajezda in Hrvatsko zagorje, and then moved to Varaždin where he completed middle school. During World War II, Ivanek's parents were hung by the fascist Ustaše, while he also lost some 20 Jewish relatives on his mother's side, in Ustaše and Nazi concentration camps, as recounted in a book by his cousin Paul Schreiner.
Ivanek received his engineer's degree at the Technical High School in Zagreb (today's University of Zagreb) in 1948. Afterwards he moved to Vienna to study electrical engineering, and he received his bachelor's degree and Ph.D. in electrical engineering from TU Wien.
Between 1949 and 1955 Ivanek worked for his scholarship at the Central Radio Institute in Belgrade, then moved to Ljubljana where his family spent another decade. Between 1956 and 1957, he was employed at the University of Ljubljana's Institute for Telecommunications.
At the time in Yugoslavia, he worked in Zagreb, Belgrade, Ljubljana, Split before he moved abroad. In 1959, he came to the United States to work as a research assistant at Stanford University's Microwave Integrated Circuits Laboratory, where he remained until 1962.
He received his doctorate in Vienna in 1964. He later also obtained a doctorate in Zagreb in 1965. Between 1964 and 1967, when the Ljubljana research institute that specialized in radio equipment design and manufacturing was named the Institute for Automation (later part of the Iskra conglomerate), he was an advisor and a manager of research projects.
In 1967, he returned to the United States to work at Fairchild Semiconductor's Research and Development Division, where he focused on the applications of solid-state microwave devices. In 1986, he l |
https://en.wikipedia.org/wiki/Kiln%20furniture | Kiln furniture are devices and implements inside furnaces used during the heating of manufactured individual pieces, such as pottery or other ceramic or metal components. Kiln furniture is made of refractory materials, i.e., materials that withstand high temperatures without deformation. Kiln furniture can account for up to 80% of the mass of a kiln charge.
Materials
Commonly used materials are cordierite (up to 1275 °C), mullite (up to 1750 °C), silicon carbide (up to 1500 °C), alumina (up to 1750 °C), zirconia (up to 1650 °C). The choice depends on cost, weight, and physical properties.
Functions and effects
Functions of kiln furniture include carrying the kiln/furnace load and protecting the load from various kind of damage: open file, smoke, debris, from deforming or sticking the components to each other. In addition to various carriers and plates, capsules with heating material may be used.
Kiln furniture influences the heat distribution in the furnace and the interaction of the load with the atmosphere in the furnace. Since the furniture is being heated along with the load, this increases energy consumption hence the operating costs increase. An additional increase of costs comes from wear of the furniture due to thermomechanical and chemical stresses. To decrease heat capacity porous materials or thinner furniture components may be used. However this calls for a trade-off with load-bearing capacity and stress resistance.
Types of kiln furniture
A saggar (also misspelled as sagger or segger) is a ceramic boxlike container used in the firing of pottery to enclose or protect ware being fired inside a kiln. Saggars have been used to protect, or safeguard, ware from open flame, smoke, gases and kiln debris. Traditionally, saggars were made primarily from fireclay. Modern saggars are made of alumina ceramic, cordierite ceramic, mullite ceramic silicon carbide and in special cases from zirconia.
A pernette or stilt is a prop to support pottery in a kiln so |
https://en.wikipedia.org/wiki/Twosday | Twosday is the name given to Tuesday, February 22, 2022, and an unofficial one-time secular observance held on that day, characterized as a fad. The name is a portmanteau of two and Tuesday, deriving from the fact that the digits of the date form a numeral palindrome marked by exclusivity or prevalence of the digit 2—when written in different numerical date formats, such as: , 22/2/22 and 2/22/22. It is also an ambigram. According to University of Portland professor Aziz Inan, the palindrome is one of the "ubiquitous palindromes", as it retains its defining characteristics globally, despite the differences in national date formats. In countries that apply the ISO 8601 international standard for the calendar, there is an additional congruence inasmuch as Tuesday is the second day of the week under this scheme.
Anticipation
The attraction to the date is due to apophenia. Twosday was cited as an example of humans being conditioned under societal institutions to notice only some while ignoring other coincidences that surround them. Attraction to numerology was cited as a reason as well.
In 2016, the website 22-2-22.com was created to count down to the date. Snopes wrote about Twosday in 2018, in one of its articles debunking false rumors about special dates—the claim about Twosday was rated as "True", but the concept was criticized insofar "2/22/2022 certainly features a number of 2s, but isn’t it fudging things to use the 22nd day of a year that includes a number other than two?"
Events
The interest surrounding the date was noted as a social media phenomenon, with the hashtag #22222 receiving 58 million views on TikTok. Google marked the date with an Easter egg.
Twosday was marked by festivities in several cities:
In Sacramento, California, 222 couples were married, in a collective wedding at the California State Capitol.
In Las Vegas, Nevada, weddings were performed at the Harry Reid International Airport. It was suggested that the number of weddings may have |
https://en.wikipedia.org/wiki/Mona%20Demaidi | Mona Nabil Demaidi (), is an entrepreneur and women’s rights advocate. She was born in December 14, 1988 in Nablus, Palestine. She obtained her Ph.D. in Advanced Software Engineering and Machine Learning, MSc with distinction in Software Engineering and Data Management from the University of Manchester, UK. Dr. Mona joined an-Najah National University in 2016, to become the youngest female with a Ph.D. certificate at the Faculty of Engineering and Information Technology in Palestine. In 2014, she became a member of Women in Engineering, and Arab Women in Computing.
Biography
In 1993 she moved with her family to Dundee, UK and did her primary school at Hawkhill School and Park Place School.
Demaidi finished high school and undergraduate studies in computer engineering in Palestine.
Mona Demaidi took her Bachelor of Science (BSs) in Computer Engineering at An-Najah National University located in Nablus, Palestine. After getting her Master of Science degree in Advance Software Engineering and Data Management in 2010/11 at The University of Manchester, she pursued her education and obtained her Doctor of Philosophy in Artificial Intelligence till 2015.
Experience
Mona Demaidi is the founder of STEMpire which is powered by PALMEC International. STEMpire empower future innovators through STEM education, bootcamps, and hackathons. In addition, Dr Mona is the deputy chairwoman and advisory board member of Intersect Innovation Hub which is powered by Bank of Palestine. Moreover, she’s a committee member for both ABET and Innovation and Entrepreneurship as well as being an assistant Professor at An-Najah National University. Also, Demaidi plays an important role in the IEEE Palestine Subsection as she’s the Chairwoman, Student Branch Counselor and a previous judge at the end of 2019. In addition to that, she was or currently is a judge in several foundations including the Hult Prize Foundation, flow accelerator and Code Your Future. Mona is also a Co-Founder for VTech Roa |
https://en.wikipedia.org/wiki/Dimensions%20%28database%29 | Dimensions is a database of abstracts and citations and of research grants, which links grants to resulting publications, clinical trials and patents. Dimensions is part of Digital Science (or Digital Science & Research Solutions Ltd) - a technology company headquartered London, United Kingdom. The company focuses on strategic investments into startup companies, that support the research lifecycle.
Dimensions was launched in 2018. It is accessible free-of-charge at app.dimensons.ai.
Two studies published in 2021 compared Dimensions with its subscription-based commercial competitors, and both concluded that Dimensions.ai provided broader temporal and publication source coverage than Scopus and Web of Science in most subject areas, and that Dimensions was closer in its coverage to free aggregation databases, such as The Lens and Google Scholar. As of July 2023, Dimensions.ai covers nearly 140 million publications with over 1.8 billion citations.
References
External links
Dimensions official website
Bibliographic databases and indexes
Scholarly search services
Online databases
Citation indices |
https://en.wikipedia.org/wiki/Structured%20encryption | Structured encryption (STE) is a form of encryption that encrypts a data structure so that it can be privately queried. Structured encryption can be used as a building block to design end-to-end encrypted databases, efficient searchable symmetric encryption (SSE) and other algorithms that can be efficiently executed on encrypted data.
Description
A structured encryption scheme is a symmetric-key encryption scheme that encrypts a data structure in such a way that, given the key and a query , one can generate a query token with which the encrypted data structure can be queried. If the STE scheme is dynamic then it also supports update operations like inserts and deletes. There are several forms of STE including response-revealing STE where the response to the query is output in plaintext and response-hiding where the response to the query is output in encrypted form. STE schemes guarantee that no information about the data or queries can be recovered from the encrypted data structure and tokens beyond a well-specified and "reasonable" leakage profile.
STE schemes with a variety of leakage profiles have been designed for a wide array of abstract data types and data structures including arrays, multi-maps, dictionaries and graphs.
STE is closely related to but different than searchable symmetric encryption. The purpose of SSE is to encrypt document collections in such a way that keyword search can still be executed on the encrypted documents whereas the purpose of STE is to encrypt data structures in such a way that queries can still be executed over the encrypted structure. Certain types of STE schemes like multi-map encryption schemes can be used to design sub-linear and optimal SSE schemes.
References
Cryptographic primitives |
https://en.wikipedia.org/wiki/Global%20Internet%20Forum%20to%20Counter%20Terrorism | The Global Internet Forum to Counter Terrorism (GIFCT) is an Internet industry initiative to share proprietary information and technology for automated content moderation.
History
Founded in 2017 by a consortium of companies spearheaded by Facebook (now known as Meta), Google/YouTube, Microsoft and Twitter, it was created as an organization in 2019 and its membership has expanded to include 18 companies as of the end of 2021. The GIFCT began as a shared hash database of ISIS-related material but expanded to included a wider array of violent extremist content in the wake of the attack on two mosques in Christchurch, New Zealand that was live streamed on Facebook.
Members include Microsoft, Meta Platforms (Facebook, Instagram and WhatsApp), YouTube, Twitter, Airbnb, Discord, Dropbox, LinkedIn, Amazon, Mailchimp, Pinterest, JustPaste.it, Tumblr, WordPress.com and Zoom.
GIFCT maintains a database of perceptual hashes of terrorism-related videos and images that is submitted by its members, and which other members can voluntarily use to block the same material on their platforms. The material indexed includes images, videos and will be expanded to include URLs and textual data such as manifestos and other documents.
Global Network on Extremism and Technology
The Global Network on Extremism and Technology (GNET) is described as the "academic research arm of GICFT". It is a collaboration of several academic research centers, led by the International Centre for the Study of Radicalisation and Political Violence at King's College London.
Criticism
GIFCT has been flagged by civil society activists and scholars as a "content cartel" similar to YouTube's ContentID, and a potential tool for "cross-platform censorship".
Accusations of misuse
In 2022, Facebook, Inc., a subsidiary of Meta Platforms, was subject to a subpoena about GIFCT usage as OnlyFans was alleged to have used GIFCT to harm competitors by getting their content and accounts censored on Instagram. Face |
https://en.wikipedia.org/wiki/Sonia%20Fahmy | Sonia Amin Fahmy is a computer scientist specializing in computer networking, including network architectures and communication protocols, and particularly known for her work on clustering in wireless ad hoc networks. She is a professor of computer science at Purdue University.
Education and career
Fahmy studied computer science as an undergraduate at The American University in Cairo, graduating in 1992. After working for two years as a software engineer in Egypt, she went to the Ohio State University for graduate study in computer science, earning a master's degree there in 1996 and completing her Ph.D. in 1999. Her dissertation, Traffic Management for Point-to-Point and Multipoint Available Bit Rate (ABR) Service in Asynchronous Transfer Mode (ATM) Networks, was supervised by Rajendra Jain.
She joined the Purdue University faculty as an assistant professor in 1999, earned tenure as an associate professor there in 2005, and was promoted to full professor in 2011. She was named a University Faculty Scholar for 2015–2020.
Recognition
In 2022, Fahmy was named an IEEE Fellow "for contributions to design and evaluation of network protocols and sensor networks".
References
External links
Home page
Year of birth missing (living people)
Living people
American computer scientists
American women computer scientists
Computer networking people
The American University in Cairo alumni
Ohio State University alumni
Purdue University faculty
Fellow Members of the IEEE |
https://en.wikipedia.org/wiki/Mirror%20descent | In mathematics, mirror descent is an iterative optimization algorithm for finding a local minimum of a differentiable function.
It generalizes algorithms such as gradient descent and multiplicative weights.
History
Mirror descent was originally proposed by Nemirovski and Yudin in 1983.
Motivation
In gradient descent with the sequence of learning rates applied to a differentiable function , one starts with a guess for a local minimum of and considers the sequence such that
This can be reformulated by noting that
In other words, minimizes the first-order approximation to at with added proximity term .
This squared Euclidean distance term is a particular example of a Bregman distance. Using other Bregman distances will yield other algorithms such as Hedge which may be more suited to optimization over particular geometries.
Formulation
We are given convex function to optimize over a convex set , and given some norm on .
We are also given differentiable convex function , -strongly convex with respect to the given norm. This is called the distance-generating function, and its gradient is known as the mirror map.
Starting from initial , in each iteration of Mirror Descent:
Map to the dual space:
Update in the dual space using a gradient step:
Map back to the primal space:
Project back to the feasible region : , where is the Bregman divergence.
Extensions
Mirror descent in the online optimization setting is known as Online Mirror Descent (OMD).
See also
Gradient descent
Multiplicative weight update method
Hedge algorithm
Bregman divergence
References
Mathematical optimization
Optimization algorithms and methods
Gradient methods |
https://en.wikipedia.org/wiki/Hydraulic%20modular%20trailer | A hydraulic modular trailer (HMT) is a special platform trailer unit which feature swing axles, hydraulic suspension, independently steerable axles, two or more axle rows, compatible to join two or more units longitudinally and laterally and uses power pack unit (PPU) to steer and adjust height. These trailer units are used to transport oversized load, which are difficult to disassemble and are overweight. These trailers are manufactured using high tensile steel, which makes it possible to bear the weight of the load with the help of one or more ballast tractors which push and pull these units via drawbar or gooseneck this combination of tractor and trailer is also termed as heavy hauler.
Typical loads include oil rig modules, bridge sections, buildings, ship sections, and industrial machinery such as generators and turbines also many militaries uses HMT for tank transportation. There is a limited number of manufacturers who produce these heavy-duty trailers because the market share of oversized loads is very thin when we talk about the over all transportation industry. There are self powered units of hydraulic modular trailer which are called SPMT which are used when the ballast tractors can not be applied due to space.
History
The first hydraulic modular trailer modules can be traced back to 1962 when heavy trailer specialist Cranes Trailers limited from Dereham developed two 4 axle 32 wheel modules for Pickfords a London based heavy haulage company with combined payload capacity of 160 tons on a total of 8 axles and 64 wheels the modules incorporated hydraulic suspensions and each axle interlinked with mechanical steering system at an operational height varied from 2.9 to 3.11ft. The modules had drawbar coupling which could be coupled at any of both ends or even both for push-pull combination.
In 1963 Goldhofer developed modular trailers in Europe for heavy haulers. In the same year, Cometto developed a 300-ton capacity module in 14-axle, seven-row configura |
https://en.wikipedia.org/wiki/Tech%20Against%20Terrorism | Tech Against Terrorism is a United Nations-backed international initiative founded in April 2017 to combat terrorist activity within the online technology sphere. It builds tools to help other companies combat online terrorist activities.
Founding members include the United Nations Counter-Terrorism Committee Executive Directorate and ICT4Peace.
See also
Global Internet Forum to Counter Terrorism
References
External links
Internet-related organizations
Counterterrorism |
https://en.wikipedia.org/wiki/Commission%20de%20r%C3%A9gulation%20de%20l%27%C3%A9nergie | The (CRE, or French Energy Regulatory Commission under its official English title) is an independent body that regulates the French electricity and gas markets. It is a member of the European Union organisation ACER and the all-European CEER (Council of European Energy Regulators).
References
Electric power in France
Energy regulatory authorities
Organizations established in 2000
Energy in France
Energy organizations |
https://en.wikipedia.org/wiki/Hart%20circle | In geometry, the Hart circle is derived from three given circles that cross pairwise to form eight circular triangles. For any one of these eight triangles, and its three neighboring triangles, there exists a Hart circle, tangent to the inscribed circles of these four circular triangles. Thus, the three given circles have eight Hart circles associated with them. The Hart circles are named after their discover, Andrew Searle Hart. They can be seen as analogous to the nine-point circle of straight-sided triangles.
References
External links
History of the Nine-Point Circle, Cambridge University
Discussion of Hart Circle in context of Feuerbach's theorem
On Centers and Central Lines of Triangles in the Elliptic Plane
CRC Concise Encyclopedia of Mathematics by Eric W. Weisstein
Geometry
Triangles
Circles
Triangle geometry
Polygons |
https://en.wikipedia.org/wiki/K-stability%20of%20Fano%20varieties | In mathematics, and in particular algebraic geometry, K-stability is an algebro-geometric stability condition for projective algebraic varieties and complex manifolds. K-stability is of particular importance for the case of Fano varieties, where it is the correct stability condition to allow the formation of moduli spaces, and where it precisely characterises the existence of Kähler–Einstein metrics.
K-stability was first defined for Fano manifolds by Gang Tian in 1997 in response to a conjecture of Shing-Tung Yau from 1993 that there should exist a stability condition which characterises the existence of a Kähler–Einstein metric on a Fano manifold. It was defined in reference to the K-energy functional previously introduced by Toshiki Mabuchi. Tian's definition of K-stability was reformulated by Simon Donaldson in 2001 in a purely algebro-geometric way.
K-stability has become an important notion in the study and classification of Fano varieties. In 2012 Xiuxiong Chen, Donaldson, and Song Sun and independently Gang Tian proved that a smooth Fano manifold is K-polystable if and only if it admits a Kähler–Einstein metric. This was later generalised to singular K-polystable Fano varieties due to the work of Berman–Boucksom–Jonsson and others. K-stability is important in constructing moduli spaces of Fano varieties, where observations going back to the original development of geometric invariant theory show that it is necessary to restrict to a class of stable objects to form good moduli. It is now known through the work of Chenyang Xu and others that there exists a projective coarse moduli space of K-polystable Fano varieties of finite type. This work relies on Caucher Birkar's proof of boundedness of Fano varieties, for which he was awarded the 2018 Fields medal. Due to the reformulations of the K-stability condition by Fujita–Li and Odaka, the K-stability of Fano varieties may be explicitly computed in practice. Which Fano varieties are K-stable is well understood |
https://en.wikipedia.org/wiki/Internet%20Buzzword%20Award | is a Japanese award that determines the most popular buzzwords on the Internet during a year.
This article also deals with the Anime Buzzword Award, which has been held in conjunction with the awards since 2013.
Overview
The Internet Buzzword of the Year Award is selected annually by the online media company Gadget Tsushin Launched in 2007, candidates are solicited from the members of 2channel search,and the popular words are decided by the votes of those members. Since 2013, the "Anime Buzzword Awards" have been held only for words related to anime that aired that year.
Since the Grand Prize is held at the end of the year, words that were popular at the end of the year have a comparative advantage. Also, due to the selection method, words that were popular on 2channel and Nico Nico Douga tend to be selected. Many people may be more familiar with this award than the "New Word and Popular Word Awards" sponsored by You Can.
Award-winning terms
References
Internet culture
Anime awards
Japanese awards |
https://en.wikipedia.org/wiki/Suita%20conjecture | In mathematics, the Suita conjecture is a conjecture related to the theory of the Riemann surface, the boundary behavior of conformal maps, the theory of Bergman kernel, and the theory of the L2 extension. The conjecture states the following:
It was first proved by for the bounded plane domain and then completely in a more generalized version by . Also, another proof of the Suita conjecture and
some examples of its generalization to several complex variables (the multi (high) - dimensional Suita conjecture) were given in and . The multi (high) - dimensional Suita conjecture fails in non-pseudoconvex domains. This conjecture was proved through the optimal estimation of the Ohsawa–Takegoshi L2 extension theorem.
Notes
References
Several complex variables
Algebraic geometry |
https://en.wikipedia.org/wiki/Die%20shot | A die shot or die photography is a photo or recording of the layout of an integrated circuit, showings its design with any packaging removed. A die shot can be compared with the cross-section of an (almost) two-dimensional computer chip, on which the design and construction of various tracks and components can be clearly seen. Due to the high complexity of modern computer chips, die-shots are often displayed colourfully, with various parts coloured using special lighting or even manually.
Methods
A die shot is a picture of a computer chip without its housing. There are two ways to capture such a chip "naked" on a photo; by either taking the photo before a chip is packaged or by removing its package.
Avoiding the package
Taking a photo before the chip ends up in a housing is typically preserved to the chip manufacturer, because the chip is packed fairly quickly in the production process to protect the sensitive very small parts against external influences. However, manufacturers may be reluctant to share die shots to prevent competitors from easily gaining insight into the technological progress and complexity of a chip.
Removing the package
Removing the housing from a chip is typically a chemical process - a chip is so small and the parts are so microscopic that opening a housing (also named delidding) with tools such as saws, sanders or dremels could damage the chip in such a way that a die shot is no longer or less useful. For example, sulphuric acid can be used to dissolve the plastic housing of a chip. This is not a harmless process - sulphuric acid can cause a lot of health damage to people, animals and the environment. Chips are immersed in a glass jar with sulphuric acid, after which the sulphuric acid is boiled for up to 45 minutes at a temperature of 337 degrees Celsius. Once the plastic housing has decayed, there may be other processes to remove leftover carbon, such as with a hot bath of concentrated nitric acid. After this, the contents of a chip a |
https://en.wikipedia.org/wiki/Hash%20Code%20%28programming%20competition%29 | Hash Code was a global team programming competition organized by Google. The participants work in teams of 2–4 people solving a programming challenge inspired by software engineering at Google. The first edition was a local event at the Google office in Paris, with 200 participants in attendance. Since then, the competition expanded globally, and reached over 128,000 registered participants in the 2021 edition. The competition consists of a qualification round, after which the top teams are invited to a final event.
In 2023, it was announced that Google Hash Code would not continue.
References
Programming contests
Google events
nmk editer nkbvcjl gcc |
https://en.wikipedia.org/wiki/Postman%20%28software%29 | Postman is an API platform for developers. The company is headquartered in San Francisco and maintains an office in Bangalore, where it was founded. As of February 2023, Postman reports having more than 25 million registered users and 75,000 open APIs, which it says constitutes the world's largest public API hub.
History
Postman started in 2014 as a side project of software engineer Abhinav Asthana, a former intern at Yahoo Bangalore who found it difficult to develop and test APIs. He launched Postman as a free app in the Chrome Web Store. Abhinav recruited former colleagues Ankit Sobti and Abhijit Kane to found Postman Inc in 2014. The three co-founders lead the company today, with Abhinav serving as CEO and Sobti as CTO.
In May 2015 Postman raised a $1 million seed round. In August 2021 the company raised a $225 million Series D round at a $5.6 billion valuation.
As of 2023, Postman has been named to Forbes Cloud 100 list for three years running, ranking as high as #28.
Products
API repository: Allows users to store, catalog, and collaborate around API artifacts in a central platform within public, private, or partner networks
API builder: Helps implement an API design workflow through specifications including OpenAPI, GraphQL, and RAML. Integrates varied source controls, CI/CD, gateways, and APM solutions
Tools: API client, API design, API documentation, API testing, mock servers, and API detection
Intelligence: Security warnings, API repository search, workspaces, reporting, API governance
Workspaces: Personal, team, partner, and public workspaces allow developers to collaborate internally and externally
Plans
Postman offers a tiered pricing model. Options range from a free plan for small teams to enterprise plans that can serve thousands of developers and offer custom domains, reporting, analytics, governance, and enterprise integrations with GitHub and GitLab.
Ownership
Postman is privately held, with funding from Nexus Venture Partners, C |
https://en.wikipedia.org/wiki/Importance%20Value%20Index | The Importance Value Index in Ecology, is the measure of how dominant a species is in a given ecosystem.
References
Indexes
Ecology
Biodiversity |
https://en.wikipedia.org/wiki/Diffusion%20tube | A diffusion tube is a scientific device that passively samples the concentration of one or more gases in the air, commonly used to monitor average air pollution levels over a period ranging from days to about a month. Diffusion tubes are widely used by local authorities for monitoring air quality in urban areas, in citizen science pollution-monitoring projects carried out by community groups and schools, and in indoor environments such as mines and museums.
Construction and operation
A diffusion tube consists of a small, hollow, usually transparent, acrylic or polypropylene plastic tube, roughly 70mm long, with a cap at each end. One of the caps (coloured white) is either completely removed to activate the tube (in the case of nitrogen dioxide sampling) or contains a filter allowing in just the gas being studied. The other cap (a different colour) contains metal mesh discs coated with a chemical reagent that absorbs the gas being studied as it enters the tube. Tubes that work this way are also known as Palmes tubes after their inventor, American chemist Edward Palmes, who described using such a tube as a personal air quality sensor in 1976.
During operation, the tube is opened and vertically fastened with cable ties to something like a lamp-post or road sign, with the open end facing down, and the closed, coloured cap at the top. The gas being monitored, which is at a higher concentration in the atmosphere, diffuses into the bottom of the tube and is quickly absorbed by the chemical cap. Since it's absorbed, the process of diffusion continues. After a fixed period of time (typically from two weeks to a month), the tube is sealed up and sent away to a laboratory for analysis. The atmospheric concentration of the gas being studied can be calculated using the amount captured and Fick's laws of diffusion.
Diffusion tubes can be used to sample various different gases, including oxides of nitrogen (nitrogen dioxide and nitric oxide), sulphur dioxide, ammonia, and ozo |
https://en.wikipedia.org/wiki/ScGET-seq | Single-cell genome and epigenome by transposases sequencing (scGET-seq) is a DNA sequencing method for profiling open and closed chromatin. In contrast to single-cell assay for transposase-accessible chromatin with sequencing (scATAC-seq), which only targets active euchromatin. scGET-seq is also capable of probing inactive heterochromatin.
This is achieved through the use of TnH, which is created by linking the chromodomain (CD) of heterochromatin protein-1-alpha (HP-1) to the Tn5 transposase. TnH is then able to target histone 3 lysine 9 trimethylation (H3K9me3), a marker for heterochromatin.
Akin to RNA velocity, which uses the ratio of spliced to unspliced RNA to infer the kinetics of changes in gene expression over the course of cellular development, the ratio of TnH to Tn5 signals obtained from scGET-seq can be used to calculate chromatin velocity, which measures the dynamics of chromatin accessibility over the course of cellular developmental pathways.
History
Transcriptional regulation is tightly linked to chromatin states. Chromatin that is open, or permissive to transcription, make up only 2-3% of the genome, but encompass 94.4% of transcription factor binding sites. Conversely, more tightly packed DNA, or heterochromatin, is responsible for genome organization and stability. Chromatin density also changes over the course of cellular differentiation processes, but there is a lack of high-throughput sequencing methods for directly assaying heterochromatin.
Many genomic-related diseases such as cancer are highly linked to changes in their epigenome. Cancers in particular are characterized by single-cell heterogeneity, which can drive metastasis and treatment resistance. The mechanisms that underlie these processes are still largely unknown, although the advent of single-cell technologies, including single-cell epigenomics, has contributed greatly to their elucidation.
In 2015, ATAC-seq, which uses the Tn5 transposase to fragment and tag accessible ch |
https://en.wikipedia.org/wiki/BullSequana | BullSequana is the brand name of a range of high performance computer systems produced by Atos.
The range includes
BullSequana S series - a modular compute platform optimised for AI and GPU-intensive tasks.
BullSequana X series - supercomputers which are claimed to operate at exascale
References
Computer systems |
https://en.wikipedia.org/wiki/Ribonucleoprotein%20Networks%20Analyzed%20by%20Mutational%20Profiling | Ribonucleoprotein Networks Analyzed by Mutational Profiling (RNP-MaP) is a strategy for probing RNA-protein networks and protein binding sites at a nucleotide resolution. Information about RNP assembly and function can facilitate a better understanding of biological mechanisms. RNP-MaP uses NHS-diazirine (SDA), a hetero-bifunctional crosslinker, to freeze RNA-bound proteins in place. Once the RNA-protein crosslinks are formed, MaP reverse transcription is then conducted to reversely transcribe the protein-bound RNAs as well as introduce mutations at the site of RNA-protein crosslinks. Sequencing results of the cDNAs reveal information about both protein-RNA interaction networks and protein binding sites.
Strategy
Components
RNA-MaP involves three major components:
Ribonucleoproteins (RNPs): complexes made up of RNAs and RNA-binding proteins (RBPs)
NHS-diazirine (SDA): a cell permeable crosslinking reagent. SDA contains two reactive groups - a diazirine and a succinimidyl ester. The reaction between succinimidyl esters and amine groups (e.g. lysine side chains) results in peptide bonds (or amide bonds). When exposed to UV light with a wavelength of 365 nm, an intermediate broadly reactive toward nucleotide riboses and bases is formed. As a result, proteins are crosslinked with RNA by the SDA linker.
Mutational profiling (MaP): a method using reverse transcriptase with relaxed fidelity to incorporate modified residues at protein-RNA binding sites.
Workflow
Long-wavelength UV and SDA reagents are first supplied to living cells to crosslink protein residues with RNA by forming amide bonds between amine groups of lysine (or arginine) residues and succinimidyl esters. Next, cells containing crosslinked RNPs are lysed and the RNA-bound proteins are digested into peptide adducts. MaP reverse transcription is then performed to label the protein-RNA binding sites through peptide adduct-induced mutations. Sequencing of the mutation-containing cDNA product will reveal |
https://en.wikipedia.org/wiki/Ectopic%20hormone | An ectopic hormone is a hormone produced by tumors derived from tissue that is not typically associated with its production.
On the other hand, the term entopic is used to refer to hormones produced by tissue in tumors that are normally engaged in the production of that hormone.
The excess hormone secretion is considered detrimental to the normal body homeostasis. This hormone production typically results in a set of signs and symptoms that are called a paraneoplastic syndrome.
Some clinical syndromes caused by ectopic hormone production include:
References
Physiology
Endocrinology
Cell signaling |
https://en.wikipedia.org/wiki/DECpc | DECpc was a wide-ranging family of desktop computers, laptops, servers, and workstations sold by Digital Equipment Corporation. The vast majority in the family are based on x86 processors, although the APX 150 uses DEC's own Alpha processor. The line was DEC's first big break into the IBM PC compatible market.
Some entries in the desktop DECpc range were built by Olivetti S.p.A. and Tandy Corporation.
Line-up
Explanatory notes
Upgradable with snap-in processor/cache daughtercard
Advanced Power Management–compliant
Desktops
Laptops
Workstations and servers
See also
Digital HiNote, the successor to the DECpc line of laptops
DECstation, concurrent line of workstations
References
DEC workstations
DEC laptops
Computer-related introductions in 1991
IBM PC compatibles |
https://en.wikipedia.org/wiki/Fertility%20fraud | Fertility fraud is the failure on the part of a fertility doctor to obtain consent from a patient before inseminating her with his own sperm. This normally occurs in the context of people using assisted reproductive technology (ART) to address fertility issues.
The term is also used in cases where donor eggs are used without consent and more broadly, in instances where doctors and other medical professionals exploit opportunities that arise when people use assisted reproductive technology to address fertility issues. This may give rise to a number of different types of fraud involving insurance, unnecessary procedures, theft of eggs, and other issues related to fertility treatment.
Types
The main sense of fertility fraud is non-consensual insemination of a patient by her doctor, but there are other types as well.
Egg theft
The first "test tube baby" was facilitated by Robert Edwards in 1978, and he allegedly used eggs without the consent of the women involved.
One of the earliest cases involving egg theft occurred in 1987 in Garden Grove, California, in a clinic run by doctor Ricardo Asch, and his partners doctors Sergio Stone and Jose Balmaceda. Asch took eggs from women undergoing diagnostic procedures and used them in fertility procedures in other women.
Asch and his two partners were accused of taking eggs and embryos from patients without their consent, using them to cause pregnancies in other women, and defrauding insurance companies. The eggs of at least 20 women were used, and at least fifteen live births resulted. Thirty-five patients filed legal actions against Asch. An estimated 67 women were victims of egg or embryo theft. Asch and Balmaceda left the country and avoided trial. Stone faced trial in the case and was sentenced to three years probation for mail fraud. He was fined $50,000 by the judge in the case, required to repay more than $14,000 in restitution to insurance companies, and had to wear an electronic monitoring device.
In the "Egg A |
https://en.wikipedia.org/wiki/Reflexive%20control | Reflexive control is control someone has over their opponent's decisions by imposing on them assumptions that change the way they act.
Methods of reflexive control are widely used in a variety of fields: advertising, public relations, military art, etc. An example of such a strategy could be a card shark deliberately losing the first games in the game, systematic diversionary attacks on an unimportant area of combat, etc..
Introduction
As defined by Soviet scholar V. Lefebvre reflexive control is a process in which one adversary hands over to the other the basis for decision-making. In other words, there is a substitution of motivation factors of the enemy in order to encourage him to take disadvantageous decisions.
Professor G. Smolyan believes that the key point of reflexive control is implicitly forcing a subject to choose a desired result. As an aphoristic example of reflexive manipulation we can recall an episode from "Uncle Remus's Tales" in which Brother Rabbit eludes Brother Fox by asking:
The oldest of those literary villains who specialized in reflexive control is considered to be the biblical serpent who provoked Eve to taste the forbidden fruit. The category of typical provocateurs can also include one of the famous characters of the Swedish writer Astrid Lindgren, who terrorized the housewife Freken Bock with a simple question:
Individual techniques of reflexive control called "stratagems" have occupied an important place in the history of military art since ancient times. For example, Sun Tzu put in the title of the first chapter of one of his treatises the statement "War is the way of deception," thus defining the craft of warfare as the art of deception.
The preconditions for the actual emergence of the theory of reflexive control can be found in the Soviet military literature of the mid-20th century; four main stages are distinguished in the process of its improvement:
from the early 1960s to the late 1970s: research,
late 1970s to early 1 |
https://en.wikipedia.org/wiki/Bohemian%20matrices | A Bohemian matrix family is a set of matrices whose free entries come from a single discrete, usually finite population, denoted by the matrix list . Each input of any matrix from this particular Bohemian matrix family is required to be an element of the set . Such matrices containing these properties are defined to be Bohemian matrices. Bohemian matrices can have other structures as well, such as being a Toeplitz matrix or an upper Hessenberg matrix. Usually, only one Bohemian matrix family with a fixed population is studied at a time, and so one can classify any given matrix as being Bohemian or not without significant ambiguity.
Applications
Software testing
One common application of Bohemian matrices is to test software applied in linear algebra. Bohemian matrices are (usually) distinctly represented on a computer, and one can identify for extreme behavior either by exhaustive search (for small dimensions), random sampling, or optimization techniques. One prominent example is Steven E. Thornton, who had solved for more than two trillion eigenvalue problems. In doing so, he uncovered instances of convergence failure in some popular software systems.
An anymatrix is an extensible MATLAB matrix collection capturing a set of optimal classes of Bohemian matrices.
See also Cleve Moler's blog post on Bohemian Matrices in the Matlab Gallery.
Improved bounds
In a talk given at the 2018 Bohemian Matrices and Applications Workshop, Nick Higham explained how he utilized genetic algorithms on Bohemian matrices with population to sharpen lower bounds on the maximal growth factor for rook pivoting.
Connections to other fields
Random matrices
Bohemian matrices can be studied through random sampling; whereas, such studies might be considered part of the field of random matrices. However, most of the focus of the study of random matrices to date has been on real symmetric or Hermitian matrices, or on the study of matrices whose entries are drawn from a continuous distr |
https://en.wikipedia.org/wiki/Gitee | Gitee () is an online forge that allows software version control using Git and is intended primarily for the hosting of open source software. It was launched by Shenzhen-based OSChina in 2013. Gitee claims to have more than 10 million repositories and 5 million users.
Gitee was chosen by the Ministry of Industry and Information Technology of the Chinese government to make an "independent, open-source code hosting platform for China."
In May 18, 2022, Gitee announced all code will be manually reviewed before public availability. Gitee did not specify a reason for the change, though there was widespread speculation it was ordered by the Chinese government amid increasing online censorship in China.
References
2013 software
Git (software)
Version control
Bug and issue tracking software
Computing websites
Collaborative projects
Project hosting websites
Project management software
Free and open-source software |
https://en.wikipedia.org/wiki/Social%20token | A social token is a type of cryptocurrency used to monetize a brand. They can be personal (or creator tokens) or community tokens. The value of a social token revolves around the brand issuing it, and are used by holders as a way to feel belonging to a certain group.
Social token are usually used by creators, as a way to monetize their personal brand. They provide creators with a means to get paid by selling the tokens, with buyers receiving special perks such as meet and greets with the creators. The rewards associated with each token is determined by the creator.
References
Cryptocurrencies |
https://en.wikipedia.org/wiki/Comtal | Comtal Corporation was an American electronics company that was one of the first to specialize in digital image processing. It was founded in the early 1970s and was acquired by 3M in 1980. Users of Comtal image processors included NASA, the military, computer-aided designers, X-ray technicians, and engineers in the field of signal processing.
History
Comtal Corporation was founded in the early 1970s in Pasadena, California. The foundation for the company's first products was based on research conducted on digital image processing by NASA in the 1960s at the Stennis Space Center (then known as the Mississippi Test Facility). This research yielded the Spectravision system, a digital image display manufactured by Aerojet in the late 1960s. Team members on the Spectragraph project founded Comtal in 1971 or 1972. Although a small operation, the company aggressively marketed its digital image displays through the mid-1970s, by which point Aerojet's Spectragraph system was extinct.
Comtal's first commercial product, the Comtal 5000 Series, was offered as a standalone desk console or a peripheral unit to a minicomputer. The 5000 Series comprised a specialized cathode-ray tube monitor and the processor, which could render 24-bit color at a resolution of 512×512, progressive scan. The 5000 Series was released in January 1974. Two months later, Comtal followed up with the 8000 Series, which offered the same color depth and resolution but increased the processing speed by 50 percent, improved the user interface, added the ability to switch from grayscale to color display on the fly, and enlarged the size of the display. In May 1974, the company unveiled the 8300 Series, which allowed the RGB channels to be imported and manipulated separately while adding the ability for a grayscale image to be rendered in false color. Comtal's 1977 Vision One system was dubbed by Business Screen magazine as "one of the most significant breakthroughs in the industry" due to its ability to lo |
https://en.wikipedia.org/wiki/Robert%20A.%20Bosch | Robert A. (Bob) Bosch (born August 13, 1963, in Buffalo NY) is an author, recreational mathematician and the James F. Clark Professor of Mathematics at Oberlin College. He is known for domino art and for combining graph theory and mathematical optimization to design connect-the-dots eye candy: labyrinths, knight's tours, string art and TSP Art.
He is the author of Opt Art: From Mathematical Optimization to Visual Design.
Education and career
Bosch received a BA in mathematics at Oberlin College in 1985, an MS in operations research and statistics at Rensselaer Polytechnic Institute in 1987 and a PhD in operations research with the thesis Partial Updating in Interior-Point Methods for Linear Programming under Kurt Martin Anstreicher at Yale University in 1991.
He has been at Oberlin College since 1991 where he teaches mathematics, statistics and computer science.
Combining art and mathematics
Bosch is passionate about using computers and mathematical optimization techniques to design visual art. He refers to this work as "Opt Art." He has written dozens of papers on this topic, many of them with Oberlin College student collaborators. Over the years Bosch has created numerous portraits drawn with a single continuous line. Some of these drawings are solutions of the
Traveling salesman problem (or solutions to related problems). Examples include the "figurative tours" he created with computer scientist Tom Wexler and renditions of Leonardo da Vinci's Mona Lisa, a Van Gogh self portrait, and Vermeer's Girl with a Pearl Earring.
Domino portraits such as his renderings of Martin Luther King and Barack Obama are an expansion of the mathematical genre of opt art in another direction.
Awards
2007 Trevor Evans Award from the Mathematical Association of America (MAA), for the Math Horizons article "Opt Art".
2012 Inaugural Outstanding Paper Award from the Journal of Mathematics and the Arts, for the article "Simple-Close-Curve Sculptures of Knots and Links".
2010 First |
https://en.wikipedia.org/wiki/Industrial%20Electronic%20Engineers | Industrial Electronic Engineers, Inc. (IEE; sometimes spelled Industrial Electronics Engineers) is an American electronics company based in Van Nuys, California. Founded by Donald Gumpertz in 1946, the company is best known for its electronic displays, becoming a pioneer in the field under Gumpertz's leadership.
History
Early history
Industrial Electronic Engineers was founded in 1946 by Donald Gumpertz (June 22, 1918, in Oxnard, California – April 28, 2012, in Toluca Lake, California). Gumpertz had been interested in electronics from a young age, building a ham radio transceiver at the age of 14 and obtaining an unrestricted commercial operator's licence from the Federal Radio Commission (the predecessor to the FCC) at 15 in the early 1930s. Before founding IEE, Gumpertz worked as an engineer at and announcer for Santa Barbara's KDB and Berkeley's KRE.
One of IEE's first products to market was an electronic numeric display unit that worked from a rear-projection principle, in which several miniature lightbulbs arranged in a grid pattern shine one at a time through a black-and-white film etched with digits, along with two sets of condenser lenses for evening the lighting—both in a corresponding arrangement to the bulbs. The projected digit is then sent through a projection lens that centers each projected digit onto a frosted glass screen facing the viewer. This display unit was developed in the 1950s. One of the first bulk purchasers was Cohu, a manufacturer of test equipment who used it in their digital voltmeters in 1958.
Automatic warehouse system
In the mid-1950s Gumpertz and his company developed the system for an automated pharmacy warehouse for the Brunswig Drug Company of Los Angeles—the first of its kind.
The system comprised a number of chutes loaded with the Brunswig's items, each of which were packaged in a standardized shape—dubbed "cartridges"—which were loaded manually by the warehouse workers. Retailers carrying Brunswig's items, which in 1957 |
https://en.wikipedia.org/wiki/Arithmetic%20progression%20topologies | In general topology and number theory, branches of mathematics, one can define various topologies on the set of integers or the set of positive integers by taking as a base a suitable collection of arithmetic progressions, sequences of the form or The open sets will then be unions of arithmetic progressions in the collection. Three examples are the Furstenberg topology on , and the Golomb topology and the Kirch topology on . Precise definitions are given below.
Hillel Furstenberg introduced the first topology in order to provide a "topological" proof of the infinitude of the set of primes. The second topology was studied by Solomon Golomb and provides an example of a countably infinite Hausdorff space that is connected. The third topology, introduced by A.M. Kirch, is an example of a countably infinite Hausdorff space that is both connected and locally connected. These topologies also have interesting separation and homogeneity properties.
The notion of an arithmetic progression topology can be generalized to arbitrary Dedekind domains.
Construction
Two-sided arithmetic progressions in are subsets of the form
where and The intersection of two such arithmetic progressions is either empty, or is another arithmetic progression of the same form:
where is the least common multiple of and
Similarly, one-sided arithmetic progressions in are subsets of the form
with and . The intersection of two such arithmetic progressions is either empty, or is another arithmetic progression of the same form:
with equal to the smallest element in the intersection.
This shows that every nonempty intersection of a finite number of arithmetic progressions is again an arithmetic progression. One can then define a topology on or by choosing a collection of arithmetic progressions, declaring all elements of to be open sets, and taking the topology generated by those. If any nonempty intersection of two elements of is again an element of , the collection |
https://en.wikipedia.org/wiki/Bond%20Bridge | Bond Bridge is a Wi-Fi device that communicates with infra-red or RF controlled devices, such as ceiling fans, shades, and fireplaces. These devices often come with a battery powered remote control. The bond bridge receives commands form a network port, and it forwards the commands to the remote controlled device by simulating the signals the remote control would produce.
The photo shows a bond bridge in the dining room of Baywood Court, a senior community. The bond bridge controls ceiling fans in the dining room.
Broadlink MR4 is a competing product.
References
Computer networking |
https://en.wikipedia.org/wiki/Visible%20Embryo%20Project | The Visible Embryo Project (VEP) is a multi-institutional, multidisciplinary research project originally created in the early 1990s as a collaboration between the Developmental Anatomy Center at the National Museum of Health and Medicine and the Biomedical Visualization Laboratory (BVL) at the University of Illinois at Chicago, "to develop software strategies for the development of distributed biostructural databases using cutting-edge technologies for high-performance computing and communications (HPCC), and to implement these tools in the creation of a large-scale digital archive of multidimensional data on normal and abnormal human development." This project related to BVL's other research in the areas of health informatics, educational multimedia, and biomedical imaging science. Over the following decades, the list of VEP collaborators grew to include over a dozen universities, national laboratories, and companies around the world.
An early (1993) goal of the project was to enable what it called "Spatial Genomics," to create tools and systems for three-dimensional morphological mapping of gene expression, to correlate data from the Human Genome Project with the multidimensional location of genomic expression activity within the morphological context of organisms. This led to the invention in the late 1990s by VEP collaborators of the first system for Spatial transcriptomics. Other areas that VEP researchers pioneered include early web technologies, cloud computing, blockchain, and virtual assistant technology.
Early history
The VEP was created in 1992 as a collaboration between the UIC Biomedical Visualization Laboratory, directed by Michael Doyle, and the Human Developmental Anatomy Center at the National Museum of Health and Medicine (NMHM), directed by Adrianne Noe. Doyle had been appointed to the oversight committee of the Visible Human Project at the National Library of Medicine, but it would be several years before that data would become available. Lo |
https://en.wikipedia.org/wiki/Problem%20Solving%20Through%20Recreational%20Mathematics | Problem Solving Through Recreational Mathematics is a textbook in mathematics on problem solving techniques and their application to problems in recreational mathematics, intended as a textbook for general education courses in mathematics for liberal arts education students. It was written by Bonnie Averbach and Orin Chein, published in 1980 by W. H. Freeman and Company, and reprinted in 2000 by Dover Publications.
Audience and reception
Problem Solving Through Recreational Mathematics is based on mathematics courses taught by the authors, who were both mathematics professors at Temple University. It follows a principle in mathematics education popularized by George Pólya, of focusing on techniques for mathematical problem solving, motivated by the idea that by doing mathematics rather than being told about its "history, culture, or applications", liberal arts education students (for whom this might be their only college-level mathematics course) can gain a better idea of the nature of mathematics. By concentrating on problems in recreational mathematics, Averbach and Chein hope to motivate students by the fun aspect of these problems. However, this approach may also lead the students to lose sight of the important applications of the mathematics they learn, and contains little to no material on mathematical proof.
The book's exercises include some with detailed solutions, some with less-detailed answers, and some that provide only hints to the solution, providing flexibility to instructors in using this book as a textbook. Cartoons and other illustrations of the concepts help make the material more inviting to students.
As well as for general education at the college level, this book could also be used to help prepare students going into mathematics education, and for mathematics appreciation for secondary school students. It could also be used as a reference by secondary school mathematics teachers in providing additional examples for their students, or as pers |
https://en.wikipedia.org/wiki/Principles%20of%20Mathematical%20Analysis | Principles of Mathematical Analysis, colloquially known as "PMA" or "Baby Rudin," is an undergraduate real analysis textbook written by Walter Rudin. Initially published by McGraw Hill in 1953, it is one of the most famous mathematics textbooks ever written, and is renowned for its elegant and concise style of proof.
History
As a C. L. E. Moore instructor, Rudin taught the real analysis course at MIT in the 1951–1952 academic year. After he commented to W. T. Martin, who served as a consulting editor for McGraw Hill, that there were no textbooks covering the course material in a satisfactory manner, Martin suggested Rudin write one himself. After completing an outline and a sample chapter, he received a contract from McGraw Hill. He completed the manuscript in the spring of 1952, and it was published the year after. Rudin noted that in writing his textbook, his purpose was "to present a beautiful area of [m]athematics in a well-organized readable way, concisely, efficiently, with complete and correct proofs. It was an [a]esthetic pleasure to work on it."
The text was revised twice: first in 1964 (second edition) and then in 1976 (third edition). It has been translated into several languages, including Russian, Chinese, Spanish, French, German, Italian, Greek, Persian, Portuguese, and Polish.
Contents
Rudin's text was the first modern English text on classical real analysis, and its organization of topics has been frequently imitated. In Chapter 1, he constructs the real and complex numbers and outlines their properties. (In the third edition, the Dedekind cut construction is sent to an appendix for pedagogical reasons.) Chapter 2 discusses the topological properties of the real numbers as a metric space. The rest of the text covers topics such as continuous functions, differentiation, the Riemann–Stieltjes integral, sequences and series of functions (in particular uniform convergence), and outlines examples such as power series, the exponential and logarithmi |
https://en.wikipedia.org/wiki/Beki%C4%87%27s%20theorem | In computability theory, Bekić's theorem or Bekić's lemma is a theorem about fixed-points which allows splitting a mutual recursion into recursions on one variable at a time. It was created by Austrian Hans Bekić (1936-1982) in 1969, and published posthumously in a book by Cliff Jones in 1984.
The theorem is set up as follows. Consider two operators and on pointed directed-complete partial orders and , continuous in each component. Then define the operator . This is monotone with respect to the product order (componentwise order). By the Kleene fixed-point theorem, it has a least fixed point , a pair in such that and .
Bekić's theorem (called the "bisection lemma" in his notes) is that the simultaneous least fixed point can be separated into a series of least fixed points on and , in particular:
In this presentation is defined in terms of . It can instead be defined in a symmetric presentation:
Proof (Bekić):
since it is the fixed point. Similarly . Hence is a fixed point of . Conversely, if there is a pre-fixed point with , then and ; hence and is the minimal fixed point.
Variants
In a complete lattice
A variant of the theorem strengthens the conditions on and to be that they are complete lattices, and finds the least fixed point using the Knaster–Tarski theorem. The requirement for continuity of and can then be weakened to only requiring them to be monotonic functions.
Categorical formulation
Bekić's lemma has been generalized to fix-points of endofunctors of categories (initial -algebras).
Given two functors and such that all and exist, the fix-point is carried by the pair:
Usage
Bekić's theorem can be applied repeatedly to find the least fixed point of a tuple in terms of least fixed points of single variables. Although the resulting expression might become rather complex, it can be easier to reason about fixed points of single variables when designing an automated theorem prover.
References
Order theory
Fixed-point theore |
https://en.wikipedia.org/wiki/National%20Timber%20Group | National Timber Group (NTG) is one of the largest independent timber distribution and processing groups in the UK. The group has 60 processing and branch/distribution sites across the UK providing nationwide coverage, and employs at least 1450 people.
Formation
The group was formed in 2018 by specialist private equity investment firm Cairngorm Capital through the acquisition of Thornbridge, NYTimber, Rembrand and Arnold Laver. The CEO is Rob Barclay.
NTG acquired Scotia Roofing & Building Supplies and Glow Insulation - both Rembrand subsidiary companies - in June 2019, the assets of Cotswold Manufacturing in November 2019, independent timber merchant Hymor Timber in February 2021, and Orchard Timber Products in November 2021. In September 2022 SV Timber was acquired.
Four new brands - National Timber Systems, Timberworld.co.uk, Intelligent Door Solutions and Alco Timber - have been developed within the group.
Through the companies, NTG's customer base includes carpenters and joiners, housebuilders and building contractors. It is a supplier to large-scale infrastructure projects.
Group turnover is over £350 million. They have sites from the north of Scotland to London and the south west of England, providing customers with high quality timber, panel, decorative surfaces and engineered wood products supported by comprehensive timber knowledge and expertise.
NTG is a member of the Timber Trade Federation and is listed on Companies House.
Locations
Aberdeen
Alfreton
Ayr
Birmingham
Borehamwood
Bradford
Bristol
Brompton on Swale
Cannock
Cambridge
Coventry
Croydon
Dalbeattie
Darlington
Dumbarton
Dumfries
Dundee
Edinburgh
Elgin
Forfar
Glasgow
Glenrothes
Grangemouth
Hebburn, Newcastle
Ilkeston
Inverness
Inverurie
Irvine
Kidderminster
Kingston upon Hull
Leeds
Leicester
Livingston
Manchester
Middlesbrough
Milton Keynes
Motherwell
Newton Stewart
North Shields
Northallerton
Oban
Oldbury
Peterborough
Rainham, Kent
Reading
Ri |
https://en.wikipedia.org/wiki/Phorophyte | In botany phorophytes are plants, on which epiphytes grow. The term is composed of phoro, meaning bearer or carrier and phyte, meaning plant.
Commensalistic interactions
The epiphytes benefit from the habitats provided, but the phorophyte is unaffected. In other words, the obligate epiphytes utilize phorophytes as habitats, without parasitizing them.
Phorophyte specificity
Different phorophytes provide different conditions to the plants, which grown on their surface. The bark pH, degree of bark shedding, the presence of milk sap and the density and size of bark lenticels influence the occurrence of epiphytes. Bark ornamentations affect the establishment os seeds and the chemical composition of the bark may be inhibiting germination. Some epiphytic orchids tend to grow on phorophytes with rough bark. Conservation efforts of orchids need to account for the conservation of phorophytes as well.
References
Botany
Plant ecology |
https://en.wikipedia.org/wiki/Internetowy%20System%20Akt%C3%B3w%20Prawnych | The Internetowy System Aktów Prawnych ( in Polish), shortly ISAP, is a database with information about the legislation in force in Poland, which is part of the oldest and one of the most famous Polish legal information systems, and is publicly available on the website of the Sejm of the Republic of Poland.
References
External links
Computer systems |
https://en.wikipedia.org/wiki/Daxin%20%28spyware%29 | Daxin is a backdoor exploit discovered in late 2021 by Symantec researchers. It is considered highly sophisticated and is suspected to have been operational in espionage operations by the Chinese government for over a decade, targeting government agencies in Asia and Africa. It can be controlled from anywhere in the world, and its creators reportedly invested significant effort to make its communication blend in with network traffic.
References
Spyware
Common trojan horse payloads
Computer network security
Rogue software
Security breaches
Deception |
https://en.wikipedia.org/wiki/Slab%20%28geometry%29 | In geometry, a slab is a region between two parallel lines in the Euclidean plane, or between two parallel planes in three-dimensional Euclidean space or between two hyperplanes in higher dimensions.
Set definition
A slab can also be defined as a set of points:
where is the normal vector of the planes and .
Or, if the slab is centered around the origin:
where is the thickness of the slab.
See also
Bounding slab
Convex polytope
Half-plane
Hyperplane
Prismatoid
Slab decomposition
Spherical shell
References
Elementary geometry
Geometric shapes |
https://en.wikipedia.org/wiki/VPNLab | VPNLab was a VPN service that catered to cyber criminals. The service was shut down by following a seizure Europol in January 2022.
History
VPNLab was created in 2008. The service advertised VPN servers in multiple countries and offered double encryption. The service was known for providing services to cyber criminals, specifically ransomware authors. The site accepted a variety of payments, including WebMoney and Bitcoin. The "DoubleVPN" service was offered at $129 dollars a year. The owners advertised the website on the dark web.
Raid and shutdown
On January 17, 2022, Europol, along with other national law enforcement agencies seized VPNLab's domain. As of January 19, 2022, no arrests were made. Along with Europol, the FBI (United States), Central Directorate of the Judicial Police (France), and National Crime Agency (United Kingdom) were involved in the site raid.
References
Security companies
Defunct websites
Internet services shut down by a legal challenge
Virtual private network services
Internet properties established in 2008 |
https://en.wikipedia.org/wiki/Philanthropy%20as%20a%20service | Philanthropy as a service (PHaaS) is a type of philanthropy in which charitable giving is managed through technology and donor-advised funds.
Overview
Typically, corporate giving is a centralized function, controlled directly by a CEO or a small foundation team of the organization.
The application of philanthropy as a service helps decentralize corporate giving by engaging employees and stakeholders, and empowering donors of any size. It is a software service that facilitates individuals to partake and structure charitable giving, without relying on other parties in an organization. The service providers offer charitable fundraising tools and administrative services as an employee benefit. They set up personal funds for employees in which the employees can put a percentage of their paycheck. As a result, employees are able to contribute to charities and causes of their choice, with employers providing tax-advantaged matching funds.
References
As a service
Philanthropy
Software industry |
https://en.wikipedia.org/wiki/Lists%20of%20cereal%20pests%20and%20diseases | Pests and diseases of cereals:
List of barley diseases
List of maize diseases
List of insect pests of millets
List of pearl millet diseases
List of oat diseases
List of rice diseases
List of wild rice diseases
List of rye diseases
List of sorghum diseases
:Category:Triticale diseases
List of wheat diseases
:Category:Insect pests of wheat |
https://en.wikipedia.org/wiki/BattlEye | BattlEye is a proprietary anti-cheat software designed to detect players that hack or abusively use exploits in an online game. It was initially released as a third-party anti-cheat for Battlefield Vietnam in 2004 and has since been officially implemented in numerous video games, primarily shooter games such as PUBG: Battlegrounds, Arma 3, Destiny 2, and DayZ.
BattlEye supports Valve Corporation's Proton compatibility layer and is usable on the Steam Deck.
Games using BattlEye
Arma 2 (2009)
PlanetSide 2 (2012)
Arma 3 (2013)
Rainbow Six Siege (2015)
Heroes & Generals (2016)
Escape from Tarkov (2017)
Ark: Survival Evolved (2017)
Unturned (2017)
Destiny 2 (2017)
PUBG: Battlegrounds (2017)
Fortnite Battle Royale (2017)
Ghost Recon: Wildlands (2017)
Atlas (2018)
Z1 Battle Royale (2018)
DayZ (2018)
PlanetSide Arena (2019)
Ghost Recon: Breakpoint (2019)
Watch Dogs: Legion (2020)
Arma Reforger (2022)
The Cycle: Frontier (2022)
Mount & Blade II: Bannerlord (2022)
Tom Clancy's Rainbow Six Extraction (2022)
Tibia (2023)
War Rock'' (2023)
References
External links
Official website
Anti-cheat software
2004 software
Proprietary software for Linux
Proprietary software for macOS
Proprietary software for Windows |
https://en.wikipedia.org/wiki/Mate%20choice%20in%20humans | In humans, males and females differ in their strategies to acquire mates and focus on certain qualities. There are two main categories of strategies that both sexes utilize: short-term and long-term. Human mate choice, an aspect of sexual selection in humans, depends on a variety of factors, such as ecology, demography, access to resources, rank/social standing, genes, and parasite stress.
While there are a few common mating systems seen among humans, the amount of variation in mating strategies is relatively large. This is due to how humans evolved in diverse niches that were geographically and ecologically expansive. This diversity, as well as cultural practices and human consciousness, have all led to a large amount of variation in mating systems. Below are some of the overarching trends of mate choice.
Female mate choice
Although human males and females are both selective in deciding with whom to mate, females exhibit more mate choice selectivity than males, as is seen in nature. Relative to most other animals however, female and male mating strategies are found to be more similar to each other. According to Bateman's principle of Lifespan Reproductive Success (LRS), human females display the least variance of the two sexes in their LRS due to their high obligatory parental investment, that is a nine-month gestational period, as well as lactation following birth in order to feed offspring so that their brain can grow to the required size.
Human female sexual selection can be examined by looking at ways in which males and females are sexually dimorphic, especially in traits that serve little other evolutionary purpose. For example, male traits such as the presence of beards, overall lower voice pitch, and average greater height are thought to be sexually selected traits as they confer benefits to either the women selecting for them, or to their offspring. Experimentally, women have reported a preference for men with beards and lower voices.
Female mate choic |
https://en.wikipedia.org/wiki/Cycloheximide%20chase | Cycloheximide chase assays are an experimental technique used in molecular and cellular biology to measure steady state protein stability. Cycloheximide is a drug that inhibits the elongation step in eukaryotic protein translation, thereby preventing protein synthesis. The addition of cycloheximide to cultured cells followed by protein lysis at multiple timepoints is conducted to observe protein degradation over time and can be used to determine a protein's half-life. These assays are often followed by western blotting to assess protein abundance and can be analyzed using quantitative tools such as ImageJ.
Implementation
Cycloheximide chase assays have been conducted using a variety of cell types such as yeast and mammalian cell lines. Depending on the cell system used for analysis, the assay may vary in application and time course. For example, yeast cells expressing a protein substrate of interest typically require cycloheximide chases lasting up to 90 minutes to allow protein turnover to occur. In contrast, proteins that are expressed in mammalian cell lines tend to me more stable at steady state and may require a chase lasting 3 to 8 hours. Depending on the complexity of the protein and whether it is overexpressed or endogenous to the model system, the required length of the chase may vary. To ensure that protein synthesis is inhibited during the entire chase, cycloheximide is often spiked into the sample every few hours.
In yeast, deletion strains are frequently used to assess protein stability over time with cycloheximide chases. For example, yeast strains lacking critical degradation machinery such as chaperones, E3 ligases, and vacuolar proteins are often used to determine the mechanism of degradation for a protein substrate of interest. Drug treatments (such as MG132) are also used to inhibit steps of degradation, followed by a cycloheximide chase to observe how the stability of a protein of interest is affected. These experiments may be conducted in mam |
https://en.wikipedia.org/wiki/Scotch%20Whisky%20Research%20Institute | The Scotch Whisky Research Institute (SWRI) is the main, and only, research institute of the scotch whisky industry in Scotland.
History
It was founded on 30 September 1974 as Pentlands Scotch Whisky Research, at the North British Distillery.
It changed to its current name in October 1995. It moved to its present site on 1 August 1997.
Scotch whisky is the UK's fifth-biggest export, and the UK's largest food and drink commodity.
Construction
The first turf was dug on Tuesday 5 December 1995 by Brian McGregor, the chairman. It was to open in September 1996.
It has a pagoda roof, similar to that developed by the Scottish architect Charles C. Doig.
Visits
The new research institute was opened at around 2.20pm on Monday 15 December 1997 by the Princess Royal.
Structure
It is funded by over 90% of whisky producers in Scotland, who are also represented by the Scotch Whisky Association and Scotland Food & Drink.
Research
It works with gas chromatography-olfactometry. It employs biologists and chemists.
See also
Brewing Industry Research Foundation, off the M23 in eastern Surrey
United Distillers (later Diageo) had their Glenochil Research Unit at Menstrie, Clackmannanshire
Institute of Brewing and Distilling
References
External links
1974 establishments in Scotland
Alcohol industry trade associations
Biological research institutes in the United Kingdom
British food and drink organisations
Food science institutes
Industrial buildings in Scotland
Research institutes established in 1974
Research institutes in Edinburgh
Scotch whisky |
https://en.wikipedia.org/wiki/Cato%20Networks | Cato Networks is a Tel Aviv, Israel-based network security company that develops Secure Access Service Edge (SASE) technology, which combines enterprise communication and security capabilities into a single cloud-based platform. The company was founded in 2015. After an October 2021 funding round, the company was a tech unicorn valued at $2.5 billion.
History
Cato Networks was founded in 2015 in Tel Aviv, Israel by Shlomo Kramer, co-founder of Checkpoint and Imperva, and Gur Shatz, a co-founder of networking company Incapsula. Cato was initially funded with a $20 million Series A from U.S. Venture Partners and Aspect Ventures. Kramer became CEO, and Shatz became president and COO. It secured a Series B round of $50 million in September.
The company officially launched in February 2016. Its first products were designed to protect customers' WAN connections and mobile devices with services including next-generation firewalling, URL filtering, application control and VPN access.
In June 2018, the company added threat hunting capabilities to its networking service.
In 2019, the company secured a $55 million Series C funding round.
In April 2020, the company raised $77 million in a Series D. In November, the company announced a $130 million Series E funding round, led by return investors Lightspeed Partners, with participation from Greylock Partners, U.S. Venture Partners, Aspect Capital, Singaporean fund Singtel's subsidiary Innov8, and hedge fund Coatue Management. The investment reportedly valued the company at over $1 billion, making it a tech unicorn.
In June 2021, the company launched a new version of its managed detection and response (MDR) platform, used to detect security threats on its network. In October, the company announced it had raised $200 million at a $2.5 billion valuation. The round was led by Lightspeed Venture Partners with the participation of existing investors Greylock, Acrew Capital, Coatue, Singtel Innov8, and CEO Kramer.
In February 2 |
https://en.wikipedia.org/wiki/DivestOS | DivestOS is an operating system based on the Android mobile platform. It is a soft fork of LineageOS that aims to increase security and privacy with support for end-of-life devices. As much as possible, it removes unnecessary proprietary Android components and includes only free-software.
DivestOS builds are signed with release-keys so bootloaders may be re-locked on many devices. An automated CVE patcher is used to patch the kernels against many known vulnerabilities.
DivestOS includes few default applications. F-Droid is included with options for selecting several custom F-Droid repositories as well. DivestOS supports using Orbot and Tor Browser as privacy-enhancing features.
History
The DivestOS project began in 2014, with the first properly signed builds being released in 2015.
The project is the work of one primary developer with contributions from numerous other developers.
Public release of DivestOS was announced on F-Droid forums in June 2020.
Supported devices
DivestOS primarily supports devices that have been supported by LineageOS.
History
In February 2022, TechTracker.in said DivestOS is one of few custom ROMs focusing on security and privacy, with monthly and incremental updates.
GNU/Linux.ch Linux and Freie Software News called DivestOS "relatively new and ambitious" and said it supports many devices, both newer and older.
DevsJournal called DivestOS 18.1 one of the best custom ROMs for the One Plus One phone.
DivestOS' Hypatia malware scanner for Android, and how to use their F-Droid repository, was reviewed by Gadget Hacks in March 2021. In November 2021, the Kuketz Security blog said Hypatia was the only malware scanner without tracking libraries of several they reviewed, but said its functionality was limited.
In March 2023, the 2022 Free Software Foundation Award for Outstanding New Free Software Contributor went to Tad (SkewedZeppelin), chief developer of the DivestOS project.
In a review in June 2023, the Kuketz Security blog sa |
https://en.wikipedia.org/wiki/List%20of%20Twitter%20features | Twitter, currently rebranding to X, is an American microblogging and social networking service on which users post and interact with messages known as "tweets" (currently rebranding to "posts"). Registered users can post, like, and retweet tweets, and read those that are publicly available.
Twitter structure
Posts
Posts are publicly visible by default, but senders can restrict message delivery to only their followers. Users can mute users they do not wish to interact with, block accounts from viewing their tweets and remove accounts from their followers list. Users can tweet via the Twitter website, compatible external applications (such as for smartphones), or by Short Message Service (SMS) available in certain countries. Users may subscribe to other users' tweets—this is known as "following" and subscribers are known as "followers" or "tweeps", a portmanteau of Twitter and peeps. Individual tweets can be forwarded by other users to their own feed, a process known as a "retweet". In 2015, Twitter launched "quote tweet" (originally called "retweet with comment"), a feature that allows users to add a comment to their retweet, nesting one tweet in the other. Users can also "like" (formerly "favorite") individual tweets.
The counters for "likes", "retweets", and replies appear next to the respective buttons in timelines such as on profile pages and search results. Counters for likes and retweets exist on a tweet's standalone page too. Since September 2020, quote tweets, formerly known as "retweet with comment", have an own counter on their tweet page. Until the legacy desktop front end that was discontinued in 2020, a row with miniature profile pictures of up to ten liking or retweeting users was displayed (earliest documented implementation in December 2011 overhaul), as well as a tweet reply counter next to the according button on a tweet's page.
Twitter allows users to update their profile via their mobile phone either by text messaging or by apps released for |
https://en.wikipedia.org/wiki/Alpha%20Arrestin | The arrestin family of proteins is subdivided into α-arrestins (also referred to as arrestin-related trafficking adaptors (ARTs) or arrestin-like yeast proteins (ALYs) in yeast or ARRDCs (arrestin domain containing proteins) in mammals, β-arrestins (also referred to as visual and non-visual arrestins) and Vps26-like arrestins proteins. The α-Arrestins are an ancestral branch of the larger arrestin family of proteins and they are conserved across eukaryotes but are best characterized in the budding yeast Saccharomyces cerevisiae; to-date there are 6 α-arrestins identified in mammalian cells (arrestin-domain containing proteins [ARRDC]1-5 and thioredoxin interacting protein [TXNIP]) and 14 α-arrestins identified in the budding yeast Saccharomyces cerevisiae. The yeast α-arrestin family comprises Ldb19/Art1, Ecm21/Art2, Aly1/Art6, Aly2/Art3, Rod1/Art4, Rog3/Art7, Art5, Csr2/Art8, Rim8/Art9, Art10, Bul1, Bul2, Bul3 and Spo23. The best characterized α-arrestin function to date is their endocytic regulation of plasma membrane proteins, including G-protein coupled receptors (GPCRs) and nutrient transporters (reviewed in). α-Arrestins control endocytosis of these membrane proteins in response to cellular stressors, including nutrient or metal ion excess.
Structure
All members of the arrestin protein family possess two arrestin-fold domains consisting of 7 anti-parallel beta-sheets assembled into a β-sandwich structure. β-arrestins contain a polar core flanked on both sides by the arrestin N- and C-terminal fold domains. They also contain domains responsible for binding components of the endocytic machinery (i.e. a clathrin binding box and an AP-2 binding site). These key structural features allow for β-arrestins to regulate endocytic turnover of G-protein coupled receptors (GPCRs) expressed at the mammalian plasma membrane. It is unclear if α-arrestins lack each of these structural features thought to distinguish the β-arrestins from the α-arrestins. However, α-arrestins |
https://en.wikipedia.org/wiki/DIN%2091379 | The DIN standard DIN 91379: "Characters and defined character sequences in Unicode for the electronic processing of names and data exchange in Europe, with CD-ROM" defines a normative subset of Unicode Latin characters, sequences of base characters and diacritic signs, and special characters for use in names of persons, legal entities, products, addresses etc. The standard defines a normative mapping of Latin letters to base letters A-Z according to the recommendations of ICAO.
Languages and scripts supported
The subset supports all official languages of European Union countries as well as the official languages of Iceland, Liechtenstein, Norway, Switzerland, and also the German minority languages. To allow the transliteration of names in other writing systems to the Latin script according to the relevant ISO standards
all necessary diacritic signs are provided.
In addition to the normative characters the standard defines subsets of extended characters that contain modern Greek letters for Greece and Cyprus, Cyrillic letters for Bulgaria and special characters for names of products and legal entities.
Conforming applications may support additional characters, however for interface agreements or registers it may be appropriate to support only a final subset of characters and sequences based on this standard.
The text of the former standard, DIN SPEC 91379, explanations and lists of characters and sequences as Excel and XML files can be found in Koordinierungsstelle für IT-Standards (KoSIT). This reference contains also an XML schema file with patterns to check conformance of text to subsets defined in this standard. Lists of characters and sequences of DIN SPEC 91379 and DIN 91379 as plain text files are available via GitHub in DIN 91379 Characters and Sequences. The DIN contains few additional characters and sequences.
Application of the standard
The compliance to this standard will be mandatory for German authorities and organisations in the exchange of data |
https://en.wikipedia.org/wiki/Standard%20linear%20array | In the context of phased arrays, a standard linear array (SLA) is a uniform linear array (ULA) of interconnected transducer elements, e.g. microphones or antennas, where the individual elements are arranged in a straight line spaced at one half of the smallest wavelength of the intended signal to be received and/or transmitted. Therefore, an SLA is a subset of the ULA category. The reason for this spacing is that it prevents grating lobes in the visible region of the array.
Intuitively one can think of a ULA as spatial sampling of a signal in the same sense as time sampling of a signal. Grating lobes are identical to aliasing that occurs in time series analysis for an under-sampled signal. Per Shannon's sampling theorem, the sampling rate must be at least twice the highest frequency of the desired signal in order to preclude spectral aliasing. Because the beam pattern (or array factor) of a linear array is the Fourier transform of the element pattern, the sampling theorem directly applies, but in the spatial instead of spectral domain. The discrete-time Fourier transform (DTFT) of a sampled signal is always periodic, producing "copies" of the spectrum at intervals of the sampling frequency. In the spatial domain, these copies are the grating lobes. The analog of radian frequency in the time domain is wavenumber, radians per meter, in the spatial domain. Therefore the spatial sampling rate, in samples per meter, must be . The sampling interval, which is the inverse of the sampling rate, in meters per sample, must be .
References
Antennas (radio)
Phased arrays |
https://en.wikipedia.org/wiki/Raptor%20Lake | Raptor Lake is Intel's codename for the 13th- and 14th-generation of Intel Core processors based on a hybrid architecture, utilizing Raptor Cove performance cores and Gracemont efficiency cores. Raptor Lake launched on October 20, 2022. Like Alder Lake, Raptor Lake is fabricated using Intel's Intel 7 process. At Intel's Investor Meeting 2022, it was confirmed that Raptor Lake would feature up to 24 cores (8 performance cores plus 16 efficiency cores) and 32 threads and is socket compatible with Alder Lake systems (LGA 1700).
The company spokesman revealed that Raptor Lake was created to benefit from process improvements before Meteor Lake arrives since the next microarchitecture was likely to be delayed.
On January 3, 2023 at CES 2023, Intel announced new desktop Raptor Lake CPUs and mobile CPUs.
Raptor Lake competes with the AMD Ryzen 7000 series that was launched about one month earlier on September 27, 2022.
The 14th-generation Raptor Lake-Refresh is the last processor family to use the old Core i branding scheme.
Features
CPU
Cores
Up to 8 Raptor Cove performance cores (P-core)
Up to 16 Gracemont efficiency cores (E-core)
L2 cache for the P-core increased to 2 MB and for the E-core cluster to 4 MB
Up to 36 MB L3 cache
GPU
Up to 96 Execution Units
Intel Iris Xe-LP microarchitecture
Up to 1.65 GHz frequency
I/O
Up to DDR5-5600
Z790 chipset improvements
Up to 28 PCI Express lanes
Up to 5 USB 3.2 20 Gbit/s ports
Package
Third-generation Intel SuperFin transistors
Increased P- and E-cores maximum frequencies
Increased power efficiency
List of 13th generation Raptor Lake processors
Desktop processors
Raptor Lake-S
On September 27, 2022 at their Innovation event, Intel officially revealed six unlocked Raptor Lake SKUs launching for desktop on October 20, 2022. At the event, Intel CEO Pat Gelsinger confirmed that the then-upcoming highest-end Raptor Lake SKU, the 13900KS, could hit up to 6.0 GHz at stock configuration and would debut in |
https://en.wikipedia.org/wiki/The%20Eye%20of%20Mexico | The Eye of Mexico (Spanish: El Ojo de México) is an outdoor digital sculpture in Mexico City. It is located in Ampliación Granada, Miguel Hidalgo, at the mixed-use development Neuchâtel Polanco, developed by the Canadian real estate company Ivanhoé Cambridge. The artwork was created by the Turkish artist Ferdi Alıcı and it was selected from among 350 proposals from artists from 35 countries.
The project for The Eye of Mexico was developed by MIRA, a real estate investment and development company, and MASSIVart, a creative consulting agency. According to MIRA, upon its inauguration it became the first artwork in Latin America to use artificial intelligence (AI). The sculpture can read environmental and urban data using AI algorithms and transform the results into videos related to arts, science and technology. The ring was inaugurated on 20 May 2022 and it is high and wide.
See also
Artificial intelligence art
References
External links
(in Spanish)
"The Eye of Mexico: A portal towards the future of Mexico City" at MASSIVart's official website
2022 establishments in Mexico
2022 sculptures
Artificial intelligence art
Miguel Hidalgo, Mexico City
Outdoor sculptures in Mexico City |
https://en.wikipedia.org/wiki/Glossary%20of%20linear%20algebra | This is a glossary of linear algebra.
See also: glossary of module theory.
A
B
C
D
E
I
L
M
N
R
S
U
V
Z
Notes
References
Algebra
Wikipedia glossaries using description lists |
https://en.wikipedia.org/wiki/Green%20Gicumbi | Strengthening climate resilience of rural communities in Northern Rwanda, commonly known as the Green Gicumbi Project, is a six-year governmental project, launched on 26 October 2019 by the Government of Rwanda, through the Ministry of the Environment and the Rwanda Green Fund (FONERWA) with target of strengthening climate resilience of rural communities in Northern Rwanda, especially in Gicumbi District.
Background
The project is to be implemented by the National Fund for the Environment. Jean Marie Vianney Kagenza is Project Director.
Project Components
According to Ministry of environment of Rwanda, Green Gicumbi Project includes the following components:
Watershed protection and climate resilient agriculture
Forest management and sustainable energy
Climate resilient settlements
Knowledge development and transfer and mainstreaming
Implementations
In January 2022, the Government of Rwanda, through the Green Gicumbi Project, has started constructing 200 green and climate resilient houses for Gicumbi residents, most relocated citizens will be in Ubudehe category I and category II, high risk zones. The green housing project is located in the Rubaya and Kaniga sectors, and is considered a model village where beneficiaries will receive additional support such as cows and the resources to start horticulture farms around the village, the Project Director has stated.
Ongoing results
Controlled soil erosion, thus increasing productivity before there were land affected by erosion but now the green gicumbi is solution to control soil erosion and increasing productivity by farmers.
Climate resilient settlement is a third component of the Green Gicumbi project is “Climate Resilient Settlements”. So far 40 climate-resilient houses have been constructed and occupied by most vulnerable beneficiaries from high-risk zones in Rubaya sector, while 60 more houses are under construction in Kaniga sector, Mulindi cell to host the most vulnerable families living in hi |
https://en.wikipedia.org/wiki/Fractal%20physiology | Fractal physiology refers to the study of physiological systems using complexity science methods, such as chaos measure, entropy, and fractal dimensions. The underlying assumption is that biological systems are complex and exhibit non-linear patterns of activity, and that characterizing that complexity (using dedicated mathematical approaches) is useful to understand, and make inferences and predictions about the system.
Main Findings
Neurophysiology
Quantifications of the complexity of brain activity is used in the context of neuropsychiatric diseases and mental states characterization, such as schizophrenia, affective disorders, or neurodegenerative disorders. Particularly, diminished EEG complexity is typically associated with increased symptomatology.
Cardiovascular systems
The complexity of Heart Rate Variability is a useful predictor of cardiovascular health.
Software
In Python, NeuroKit provides a comprehensive set of functions for complexity analysis of physiological data. AntroPy implements several measures to quantify the complexity of time-series.
In R, TSEntropies provides methods to quantify the entropy. casnet implements a collection of analytic tools for studying signals recorded from complex adaptive systems.
In MATLAB, The Neurophysiological Biomarker Toolbox (NBT) allows the computation of Detrended fluctuation analysis. EZ Entropy implements the entropy analysis of physiological time-series.
See also
Fractal dimension
Entropy
Complex system
References
Fractals
Physiology |
https://en.wikipedia.org/wiki/Codon%20reassignment | Codon reassignment is the biological process via which the genetic code of a cell is changed as a response to the environment. It may be caused by alternative tRNA aminoacylation, in which the cell modifies the target aminoacid of some particular type of transfer-RNA. This process has been identified in bacteria, yeast and human cancer cells.
In human cancer cells, codon reassignment can be triggered by tryptophan depletion, resulting in proteins where the tryptophan aminoacid is substituted by phenylalanine.
See also
Expanded genetic code
References
Genetics
Amino acids
Biological processes
Bacteria
Yeasts
Cancer |
https://en.wikipedia.org/wiki/Western%20Electric%20%28tube%20manufacturer%29 | Western Electric Export Corporation (or simply Western Electric) is a manufacturer of vacuum tubes and high end audio gear. Based in Rossville, Georgia, the company is best known for building an ultra-premium version of the 300B electron tube. It traces its roots to 1872 and the Bell Telephone Company and the original Western Electric. The original AT&T-based company was shut down in 1984. The current company was started in 1995, when AT&T granted Charles G. Whitener (Westrex Corporation) a license to the trademark and intellectual property of the original Western Electric company. In January of 2007 Western Electric announced the acquisition of the assets of former vacuum tube factory Ei Niš from Serbia.
The company has announced intentions to manufacture vacuum tubes for musical instruments, such as electric guitars
300B
Few factories make tubes of any kind as the market for these devices is small. Tubes have generally been replaced by transistors, which are much more efficient, smaller, produce less heat and are less expensive. However, there still exists a couple of markets for tubes, such as high end audio reproduction and many electric guitar amplifiers. The current product line consists of just the 300B, which was originally designed for use in telephone amplification in the 1930s. By the 1980s, they found use by audiophiles. Western Electric's tubes are considered "ultra-premium", designed for audiophiles who want the best and are willing to pay for it. In 2020, the price for a matched pair of these single-ended tubes was $1499, while a matched quad cost over twice as much.
Guitar amplifier tubes
In March of 2022, Western Electric announced it would soon be producing tubes for the guitar tube amplifier market. This includes the 6L6, EL34, 6V6, EL84, 12AX7 and others. This comes as most nations have banned imports from Russia because of the 2022 Russian invasion of Ukraine. At the same time, Chinese manufacturing is being phased out, leaving only a single f |
https://en.wikipedia.org/wiki/Pr%3AYLF%20laser | A Pr:YLF laser (or Pr3+:LiYF4 laser) is a solid state laser that uses a praseodymium doped yttrium-lithium-fluoride crystal as its gain medium. The first Pr:YLF laser was built in 1977 and emitted pulses at 479 nm. Pr:YLF lasers can emit in many different wavelengths in the visible spectrum of light, making them potentially interesting for RGB applications and materials processing. Notable emission wavelengths are 479 nm, 523 nm, 607 nm and 640 nm.
Technology
Pr:YLF lasers are optically pumped using flashlamps, pulsed dye lasers or diode lasers. The strongest emission line of Pr:YLF is 640 nm, which stems from the transition of the Pr3+- ion. However, by suppressing this line (and other lines stronger than the desired one), other transitions can be used for obtaining different wavelengths. This can be done using dichroic mirrors. Pr:YLF lasers are pumped by using the transitions from to , or (corresponding wavelengths: 444 nm, 469 nm, 479 nm). The Pr3+- ion then undergoes a quick, radiationless transition (fast relaxation), followed by the light-emitting transition. Finally, the ground level () is reached via another radiationless transfer, making the Pr:YLF laser a 4-level system. Pr:YLF supports lasing at the following wavelengths: 479 nm, 523 nm, 546 nm, 607 nm, 640 nm, 698 nm, 721 nm, 907 nm and 915 nm.
The transition is of special interest, since its wavelength (444 nm) can be covered by InGaN laser diodes, which are commercially available at high output powers. Because the absorption peak at 444 nm only has a bandwidth of a few nanometers, pumpdiodes have to be selected and stabilized for efficient laser action. Diode pumped solid state (DPSS) lasers using these diodes have reached multiple watts of output powers in continuous wave operation. Typical DPSS setups using Pr:YLF crystals consist of a hemispheric resonator in which the crystal is pumped longitudinally by the pump diode. Depending on the resonator length, this resonator type can tolerate |
https://en.wikipedia.org/wiki/WINE%40Etersoft | WINE@Etersoft is a Microsoft Windows compatibility layer available for Linux and FreeBSD. This compatibility layer enables many Windows-based applications to run on Linux operating systems, or FreeBSD.
WINE@Etersoft is developed by Etersoft and based on Wine, an open-source Windows compatibility layer. WINE@Etersoft is focused on popular Russian software applications as 1C:Enterprise, Consultant Plus, and Garant. Unlike regular Wine, it supports security keys and cryptography.
In 2008, the WINE@Etersoft software product won Russian prestigious award on technology category CNews AWARDS.
Platforms
WINE@Etersoft supports many operating systems: Astra Linux, ALT Linux, Fedora Linux, Debian, Mandriva Linux,Slackware, openSUSE, FreeBSD, CentOS, Ubuntu, Red Hat Enterprise Linux.
Applications
Lots of applications have been supported by the software at one time over the span of 16 years. Some still are supported by either the Etersoft company or Applications' developers.
Some of the popular software:
1C:Enterprise,
Consultant Plus,
Garant,
T-FLEX CAD,
Kompas-3D,
AVARDA, MetaTrader 4, QUIK.
Education
There is a private use version of WINE@Etersoft named WINE@Etersoft Local that was once used in educational institutes between 2007 and 2010.
In 2010, the WINE@Etersoft School product was released, distributed free of charge among Russian schools and focused on running educational applications on Linux. It was later replaced with the WINE@Etersoft Network Special Education License.
See also
Wine
PlayOnMac
PlayOnLinux
Wine-Doors
Darwine
References
External links
Compatibility layers
Linux emulation software
Software derived from or incorporating Wine
Unix emulation software
Wine (software) |
https://en.wikipedia.org/wiki/Square%20root%20of%207 | The square root of 7 is the positive real number that, when multiplied by itself, gives the prime number 7. It is more precisely called the principal square root of 7, to distinguish it from the negative number with the same property. This number appears in various geometric and number-theoretic contexts. It can be denoted in surd form as:
and in exponent form as:
It is an irrational algebraic number. The first sixty significant digits of its decimal expansion are:
.
which can be rounded up to 2.646 to within about 99.99% accuracy (about 1 part in 10000); that is, it differs from the correct value by about . The approximation (≈ 2.645833...) is better: despite having a denominator of only 48, it differs from the correct value by less than , or less than one part in 33,000.
More than a million decimal digits of the square root of seven have been published.
Rational approximations
The extraction of decimal-fraction approximations to square roots by various methods has used the square root of 7 as an example or exercise in textbooks, for hundreds of years. Different numbers of digits after the decimal point are shown: 5 in 1773 and 1852, 3 in 1835, 6 in 1808, and 7 in 1797.
An extraction by Newton's method (approximately) was illustrated in 1922, concluding that it is 2.646 "to the nearest thousandth".
For a family of good rational approximations, the square root of 7 can be expressed as the continued fraction
The successive partial evaluations of the continued fraction, which are called its convergents, approach :
Their numerators are 2, 3, 5, 8, 37, 45, 82, 127, 590, 717, 1307, 2024, 9403, 11427, 20830, 32257… , and their denominators are 1, 1, 2, 3, 14, 17, 31, 48, 223, 271, 494, 765, 3554, 4319, 7873, 12192,….
Each convergent is a best rational approximation of ; in other words, it is closer to than any rational with a smaller denominator. Approximate decimal equivalents improve linearly (number of digits proportional to convergent number) at |
https://en.wikipedia.org/wiki/U%20band | The U band is a range of frequencies contained in the microwave region of the electromagnetic spectrum. Common usage places this range between 40 and 60 GHz, but may vary depending on the source using the term.
References
Microwave bands
Satellite broadcasting |
https://en.wikipedia.org/wiki/Central%20Yunnan%20Water%20Diversion%20Project | The Central Yunnan Water Diversion Project () is a large-scale civil engineering project under construction that will allow water from the Jinsha River near Lijiang to be transported to Central Yunnan. The total length of the water channels will be , of which will be in tunnels.
The project has a cost of US$ 12.03 billion, largely funded by the Ministry of Water Resources. It is planned for completion by 2026.
Background
Central Yunnan is a dry region in China, where currently, only of water is available per capita annually, compared to a recommended minimum. At the same time, Central Yunnan accounts for 68% of Yunnan's GDP. The region has suffered from long drought spells, such as a period of 30 months without heavy rains in Kunming. Water scarcity has been described as the "biggest bottleneck restricting the sustainable development of Central Yunnan." The idea of diverting water from the Jinsha River to Central Yunnan was first proposed by Yunnan's vice-governor Zhang Chong in the 1950s.
The water diversion project was included in the Thirteenth Five-Year Plan. In April 2017, it was approved by the State Council.
Construction
The project will include the world's longest water tunnel, the world's largest underground pump room, and largest pump capacity in Asia. In addition, it deals with challenging geological conditions due to passing through a number of faults. It crosses the four major watersheds of Yunnan: that of the Jinsha River, Mekong, Red River, and Nanpan River, as well as crossing the Hengduan Mountains in northwest Yunnan.
Construction commenced on 4 August 2017, with a planned construction time of 8 years. The project includes 58 tunnels with a total length of , 25 inverted siphons, 17 aqueducts, and 15 culverts.
Impact
Once completed, the project would improve water availability for 11 million people, spread over 35 counties in Yunnan and a total area of . Over billion of water would be transported through the channels annually by 2040. |
https://en.wikipedia.org/wiki/Unditching%20beam |
An unditching beam is a device that is used to aid in the recovery of armoured fighting vehicles when they become bogged or "ditched". The device is a beam that is attached to the continuous tracks that provides additional traction for the vehicle to extricate itself from a ditch or from boggy conditions.
The unditching beam was first introduced into service during the First World War with the British Mark IV tank. It is believed the device was designed by Philip Johnson who was serving as an engineering officer at the British Army's depot at Érin, originally the device weighed and was constructed of a solid beam of oak with two large steel plates bolted to two sides to provide protection. When not in use it was stowed on two rails mounted on the roof of the tank that ran the entire length of the vehicle, and when employed the beam was chained to the tank's tracks, giving the vehicle something firm to drive over.
Unditching beams remain a commonly carried standard ancillary on a number of Russian produced armoured fighting vehicles.
See also
Unditching roller
References
Citations
Bibliography
Automotive_engineering
World War I military equipment of the United Kingdom |
https://en.wikipedia.org/wiki/Nerve%20glide | Nerve glide, also known as nerve flossing or nerve stretching, is an exercise that stretches nerves. It facilitates the smooth and regular movement of peripheral nerves in the body. It allows the nerve to glide freely along with the movement of the joint and relax the nerve from compression. Nerve gliding cannot proceed with injuries or inflammations as the nerve is trapped by the tissue surrounding the nerve near the joint. Thus, nerve gliding exercise is widely used in rehabilitation programs and during the post-surgical period.
Radial, median, sciatica, and ulnar nerves require nerve gliding exercise during the rehabilitation period. The most common conditions that require nerve gliding exercise are carpal tunnel syndrome, cubital tunnel syndrome, radial neuropathy, and so on. Therapists prescribe different nerve gliding exercises in order to maximize the effects by correctly diagnosing the symptoms. Patients feel less pain when there is stretch in nerves, and there should be no aggressive exercise. Without correctly diagnosing symptoms and treatments, it worsens the conditions and nerves. Nerve gliding exercises should be done several times daily, depending on the issue. As patients continuously do nerve gliding exercises, they start to feel less pain after a few weeks.
Research
Carpal tunnel syndrome
Carpal tunnel syndrome (CTS) is a condition that induces pain when the median nerve passes through the carpal tunnel in the wrist. It occurs when median nerves get irritated, compress, and strengthen. CTS evokes symptoms, including pain, paresthesia, and muscle atrophy. This further leads to chronic pain and economic difficulties for patients as it requires work absence and surgical treatment.
Nerve gliding exercise becomes one of the optimal CTS treatments by assisting nerve mobilization. Restoring nerve mobilization would relieve edema and restore adhesion in the carpal tunnel. According to the research, nerve gliding exercise has reduced the pain, decreased |
https://en.wikipedia.org/wiki/Emergency%20data%20request | An emergency data request is a procedure used by U.S. law enforcement agencies for obtaining information from service providers in emergency situations where there is not time to get a subpoena. In 2022, Brian Krebs reported that emergency data requests were being spoofed by hackers to obtain confidential information.
There have been proposals to secure emergency data requests using digital signatures, but this would require substantial technical and legal effort to implement.
References
Security engineering
Social engineering (computer security)
Cybercrime |
https://en.wikipedia.org/wiki/Semiconductor%20industry%20in%20China | The Chinese semiconductor industry, including integrated circuit design and manufacturing, forms a major part of mainland China's information technology industry.
China's semiconductor industry consists of a wide variety of companies, from integrated device manufacturers to pure-play foundries, fabless semiconductor companies and OSAT companies. Integrated device manufacturers (IDMs) design and manufacture integrated circuits. Pure-play foundries only manufacture devices for other companies, without designing them, while fabless semiconductor companies only design devices. Examples of Chinese IDMs are YMTC and CXMT, examples of Chinese pure-play foundries are SMIC, Hua Hong Semiconductor and Wingtech, examples of Chinese fabless companies are Zhaoxin, HiSilicon and UNISOC, and examples of Chinese OSAT companies are JCET, Huatian Technology and Tongfu Microelectronics.
Overview
China is currently the world's largest semiconductor market in terms of consumption. In 2020, China represented 53.7% of worldwide chip sales, or $239.45 billion out of $446.1 billion. However, a large percentage are imported from multinational suppliers. In 2020, imports took up 83.38% ($199.7 billion) of total chip sales. In response, the country has launched a number of initiatives to close the gap, including investing $150 billion into its domestic IC industry through avenues like the National Integrated Circuit Industry Investment Fund (CICF), with a “Made in China 2025” goal of 70% domestic production.
China leads the world in terms of number of new fabs under construction, with 8 out of 19 worldwide in 2021, and 17 fabs in total are expected to start construction from 2021 to 2023. Total installed capacity of Chinese-owned chipmakers will also increase from 2.96 million wafers per month (wpm) in 2020 to 3.572 million wpm in 2021.
Due to the rapid pace of Chinese semiconductor industry advances, on October 7, 2022, the U.S. government announced a major set of export restrictions towa |
https://en.wikipedia.org/wiki/2022%20United%20Nations%20Biodiversity%20Conference | The 2022 United Nations Biodiversity Conference of the Parties (COP15) to the UN Convention on Biological Diversity (CBD) was a conference held in Montreal, Canada, which led to the international agreement to protect 30% of land and oceans by 2030 (30 by 30) and the adoption of the Kunming-Montreal Global Biodiversity Framework.
History
The conference was originally scheduled to be held in October 2020, but was delayed due to the COVID-19 pandemic. It was rescheduled to be held in April 2022 in Kunming, China, but was postponed again, for a fourth time due to China's zero-COVID policy, to the third quarter of 2022 according to the UN secretariat office on March 29. In May 2022, China requested Canada to assume the host responsibility. The Canadian Minister of Environment and Climate Change Steven Guilbeault met with representatives from the High Ambition Coalition in early June 2022 and these representatives asked Canada to host COP15. The Prime Minister of Canada Justin Trudeau approved the proposal. In June 2022, the UN secretariat for the Convention on Biological Diversity and China's environment ministry said in separate statements that the meeting would be held in December 2022 in Montreal, Canada, where the secretariat is based, though China would remain the president of the summit. This arrangement is consistent with previous practices of moving the meeting to a different country, such as the 2017 United Nations Climate Change Conference (Fiji held the presidency while Germany organized the meeting for practical purpose) and the 2019 United Nations Climate Change Conference (Chile maintained the presidency despite the meeting being moved to Spain due to political instability in Chile). While the host countries of previous COPs had one to two years to organize the conference, Canada had just five months to prepare for the arrival of 18,000 delegates from 196 CBD member states, non-governmental organizations, industry groups and academia.
This is the second |
https://en.wikipedia.org/wiki/Hi%21%21 | Hi!! is an English Language Sri Lankan society and lifestyle magazine, first published in March 2003, under the Wijeya Newspapers group. It covers a variety of areas, from lifestyle, parties, events, fashion, hotels, restaurants, and tourist attractions. Its founding editor since 2003 is Shyamalee Tudawe.
The 100th issue was launched in August 2021.
References
External links
Magazines published in Sri Lanka
Magazines established in 2003
Mass media in Colombo
English-language magazines
Monthly magazines
Online magazines
Magazines |
https://en.wikipedia.org/wiki/Unacademy | Unacademy is an Indian multinational educational technology company that provides online educational platform with its headquarters in Bangalore. It prepares students for various competitive exams (like JEE, NEET, UPSC, Chartered Accountancy, GATE, UPSC NDA, CUET, Boards etc.), as well as provides content on foundational (K-12) and skill building courses (programming, photography, entrepreneurship, etc). It was founded by Gaurav Munjal, Hemesh Singh and Roman Saini in 2015. As of May 2022, Unacademy was valued at US$3.44 billion.
Product and services
In February 2019, Unacademy launched its subscription-based model, Unacademy Plus. The Unacademy Plus Subscription provides students access to live courses by educators across the country in English and 14 Indian languages including Hindi, Punjabi, Telugu,Tamil, Malayalam, Marathi, Bengali, Gujarati, Bhojpuri etc.
In 2020, Unacademy launched Graphy, that helps creators launch their online school in under 60 seconds. In May 2022, Unacademy opened its first offline learning centre in Kota, Rajasthan, followed up with other centers in Delhi, Mumbai, Bengaluru etc.
History
Unacademy started off as a YouTube channel created by Gaurav Munjal in 2015 when he was an engineering student in Mumbai. Gaurav uploaded a short video tutorial on computer graphics on his YouTube channel to help his peers prepare for the semester exams. In December 2015, Gaurav Munjal roped in two of his friends, Hemesh Singh and Roman Saini, and launched Unacademy app to create free interactive content.
By 2017, it had over 1 million learners, 5000 plus registered educators and over 40,000 classes launched. In January 2022, Unacademy became one of the founding members of IAMAI's India EdTech Consortium along with other edtech firms like Simplilearn, PrepInsta Prime, UpGrad, Byjus and Vedantu.
Acquisitions
In 2018, Unacademy acquired WiFiStudy for $10 million, a Jaipur-based online exam preparation and learning platform founded by Dinesh Godara i |
https://en.wikipedia.org/wiki/UCIe | Universal Chiplet Interconnect Express (UCIe) is an open specification for a die-to-die interconnect and serial bus between chiplets. It is co-developed by AMD, Arm, ASE Group, Google Cloud, Intel, Meta, Microsoft, Qualcomm, Samsung, and TSMC.
In August 2022, Alibaba Group and Nvidia joined as board members.
Overview
A common chiplet interconnect specification enables construction of large System-on-Chip (SoC) packages that exceed maximum reticle size. It allows intermixing components from different silicon vendors within the same package and improves manufacturing yields by using smaller dies. Each chiplet can use a different silicon manufacturing process, suitable for a specific device type, or computing performance and power draw requirements.
Specifications
The UCIe 1.0 specification was released on March 2, 2022. It defines physical layer, protocol stack and software model, as well as procedures for compliance testing. The physical layer supports up to 32 GT/s with 16 to 64 lanes and uses a 256 byte Flow Control Unit (FLIT) for data, similar to PCIe 6.0; the protocol layer is based on Compute Express Link with CXL.io (PCIe), CXL.mem and CXL.cache protocols.
Various on-die interconnect technologies are defined, like organic substrate for a 'standard' 2D package, or embedded silicon bridge (EMIB), silicon interposer, and fanout embedded bridge for 'advanced' 2.5D/3D packages. Physical specifications are based on Intel's Advanced Interface Bus (AIB).
Shorter signal paths allow the links to have 20× better I/O performance and power consumption (~0.5 pJ per bit) comparing to typical PCIe SerDes, with bandwidth density up to 1.35 TByte/s per mm2 for a common bump pitch of 45 μm, and 3.24× higher density with a bump pitch of 25 μm.
Future versions may include additional protocols, wider data links, and higher density connections.
The UCIe 1.1 specification was released on August 8, 2023.
References
External links
Computer-related introductions in 2022
Open |
https://en.wikipedia.org/wiki/Sharp%20PC-4500 | The Sharp PC-4500 is a line of laptop computers released by Sharp Corporation in 1987. The line comprises the PC-4501, the PC-4502, and the PC-4521. The PC-4501 is a bare-bones unit with only 256 KB of RAM stock, only one floppy drive, no backlighting, and no built-in numeric keypad; the PC-4502 and PC-4521 bumps the stock RAM to 640 KB and includes the latter two features while providing either two floppy drive (PC-4502) or one floppy drive and a 20 MB hard drive (PC-4521). Prices on the line initially ranged from $1,295 to just under $3,000; the PC-4501 was later sold for $995, becoming one of the first sub-$1,000 laptops available on the market. The PC-4500 line received mixed, mostly positive, reviews on its release in September 1987.
Development and specifications
The PC-4500 series was developed by Sharp Electronics of Japan and co-developed by Vadem Inc., an original design manufacturer and computer design consultant of San Jose, California. The computer features the 80188-compatible NEC V40 central processing unit with a clock speed selectable between the IBM PC standard 4.77 MHz and 7.16 MHz. The NEC V40, with its 16-bit internal data bus and 8-bit external data bus, was chosen to evade a contemporary tariff on imported laptops with pure 16-bit CPUs. Personal computers based on the 80188 processor and its derivatives were relatively uncommon.
The most inexpensive entry in the PC-4500 line, the PC-4501, features 256 KB of RAM, a non-backlit supertwisted nematic monochrome LCD with a resolution of 640 by 200 pixels—CGA compatible—a 78-key keyboard (missing a numeric keypad), and one 3.5-inch double-density floppy disk drive and came shipped with MS-DOS 2.11. The middle-of-the-line entry, the PC-4502, features 640 KB of RAM, a backlit display of the same specification, an 88-key keyboard ( numeric keypad), two 3.5-inch double-density floppy drives and came shipped with MS-DOS 3.21 and GW-BASIC 3.2. The most expensive entry, the PC-4521, trades one of the fl |
https://en.wikipedia.org/wiki/EIA%201956%20resolution%20chart | The EIA 1956 Resolution Chart (until 1975 called RETMA Resolution Chart 1956) is a test card originally designed in 1956 to be used with black and white analogue TV systems, based on the previous (and very similar) RMA 1946 Resolution Chart. It consisted of a printed chart filmed by a TV camera or monoscope and displayed on a TV screen. Inspecting the chart allowed to check for defects like ringing, geometric distortions, raster scan linearity, cathode-ray tube uniformity and lack of image resolution. If needed, a technician could use it to perform the necessary hardware adjustments.
Today, this chart continues to be used to measure image resolution of modern cameras and lenses and also in scientific research.
Features and operation
The chart is composed of several features, each designed for a specific test:
Large white circle: Allows for image geometry adjustments (image should be centered with the circles being perfectly round).
Vertical stripe boxes: A grating with a resolution of 200 Television Lines (TVL), a measurement of image resolution on analogue TV systems, allowing adjustment of horizontal linearity and geometry.
Horizontal stripe boxes: A grating, allowing adjustment of vertical linearity.
Grayscale steps: Evaluating gamma and transfer characteristics, they allow for contrast and brightness adjustments (at least 6 to 8 steps should be visible)
Concentric circles: Allow to test cathode-ray beam sharpness and focus
Resolution wedges: The gradually expanding lines near the center, labeled with periodic indications of the corresponding spatial frequency, allow checking of image resolution.
Border arrows: Allow for overscan adjustments.
Numbers: Going from 200 to 800, they correspond to TV Lines (TVL).
Used with early monochrome TV systems, this chart was useful in measuring image resolution, determined by inspection of the image as displayed on a CRT.
On such systems an important measure is the limiting horizontal resolution, affected by hardware a |
https://en.wikipedia.org/wiki/Frequency%20modulation%20encoding | Frequency modulation encoding, or simply FM, is a method of storing data that saw widespread use in early floppy disk drives and hard disk drives. The data is modified using differential Manchester encoding when written to allow clock recovery to address timing effects known as "jitter" seen on disk media. It was introduced on IBM mainframe drives and was almost universal among early minicomputer and microcomputer floppies. In the case of floppies, FM encoding allowed about 80 kB of data to be stored on a -inch disk.
IBM began introducing the more efficient modified frequency modulation, or MFM, starting in 1970. They referred to this format as "double density", with the original FM retroactively becoming "single density". MFM was more difficult to implement and it was not until the early 1980s that low-cost all-in-one MFM floppy drive controllers like the WD1770 emerged. This led to the rapid demise of FM encoding in favor of MFM by the mid-1980s.
Underlying storage mechanism
Main memory systems in modern computers store binary information using two different electrical signals, typically voltages. In DRAM for instance, the presence of a voltage over a certain threshold represents a binary one, while any voltage below that value represents a zero. The letter "A" in ASCII is represented as 01000001 in binary, which might be stored in a typical late-1970s DRAM like the Mostek MK4116 as a series of 0 and 5 V voltages in the individual capacitors making up the memory.
In contrast, magnetic recording systems like floppy disks record this data as a change in magnetic polarity. This is due to the way the data is read and written, using magnetic induction. During reading, the disk is rotating so its surface moves rapidly past the read/write head, a small electromagnet. When the polarity of the magnetic charge on the disk changes, a brief pulse of electricity is induced in the head which is read as a one, any section where the polarity does not change produces a zero. To |
https://en.wikipedia.org/wiki/Bird%20%28mathematical%20artwork%29 | Bird, also known as A Bird in Flight refers to bird-like mathematical artworks that are introduced by mathematical equations. A group of these figures are created by combing through tens of thousands of computer-generated images. They are usually defined by trigonometric functions. An example of A Bird in Flight is made up of 500 segments defined in a Cartesian plane where for each the endpoints of the -th line segment are:
and
.
The 500 line segments defined above together form a shape in the Cartesian plane that resembles a bird with open wings. Looking at the line segments on the wings of the bird causes an optical illusion and may trick the viewer into thinking that the segments are curved lines. Therefore, the shape can also be considered as an optical artwork. Another version of A Bird in Flight was defined as the union of all of the circles with center and radius , where , and
The set of the 20,001 circles defined above form a subset of the plane that resembles a flying bird. Although this version's equations are a lot more complicated than the version made of 500 segments, it has a better resemblance to a real flying bird.
References
Birds in art
Mathematical artworks
Contemporary works of art
Geometric shapes |
https://en.wikipedia.org/wiki/Pixel%20binning | Pixel binning, often called binning, is the process of combining adjacent pixels throughout an image, by summing or averaging their values, during or after readout.
Charge from adjacent pixels in CCD image sensors and some other image sensors can be combined during readout, increasing the line rate or frame rate.
In the context of image processing, binning is the procedure of combining clusters of adjacent pixels, throughout an image, into single pixels. For example, in 2x2 binning, an array of 4 pixels becomes a single larger pixel, reducing the number of pixels to 1/4 and halving the image resolution in each dimension. The result can be the sum, average, median, minimum, or maximum value of the cluster. Some systems use more advanced algorithms such as considering the values of nearby pixels, edge detection, self-claimed "AI" etc to increase the perceived visual quality of the final downsized image.
This aggregation, although associated with loss of information, reduces the amount of data to be processed, facilitating analysis. The binned image has lower resolution, but the relative noise level in each pixel is generally reduced.
See also
Binning (disambiguation)
Downsampling (signal processing)
Image scaling
References
Image processing |
https://en.wikipedia.org/wiki/National%20Institute%20for%20Mathematical%20Sciences | The National Institute for Mathematical Sciences (NIMS; ) is a Korean government-funded mathematics research institute. Their work focuses both basic research and applied mathematics with industrial and medical applications. Founded in 2005, NIMS became an affiliated research institute of the Institute for Basic Science in 2012. After delays for multiple years, relocation is planned for late 2023. The vision of NIMS is to "attain a global top 10 competitiveness in industrial mathematics research by 2028".
Presidents
Cho Yong Seung (October 1, 2005–September 30, 2008)
Kim Jeong Han (October 17, 2008–August 15, 2011)
Kim Dong Su (September 11, 2012–September 10, 2015)
Park Hyung Ju (September 18, 2015–July 6, 2017)
Chung Soon-yeong (January 30, 2018–January 29, 2021)
Kim Hyun-Min (March 15, 2021–present)
See also
Korea Institute for Advanced Study
List of Institutes of Mathematics
References
External links
(English and Korean)
Facebook (Korean)
Schools of mathematics
Mathematical institutes
Institute for Basic Science
Research institutes established in 2005
2005 establishments in South Korea
Daejeon
Research institutes in South Korea
National Institute for Mathematical Sciences |
https://en.wikipedia.org/wiki/Monochrome-astrophotography-techniques | Monochrome photography is one of the earliest styles of photography and dates back to the 1800s. Monochrome photography is also a popular technique among astrophotographers. This is due to the omission of the Bayer filter, a colour filter array that sits in front of the CMOS or CCD sensor, allowing for a single sensor to produce a colour image.
Sensor design
Colour cameras produce colour images using a Bayer matrix, a colour filter array that sits in front of the sensor. The matrix allows light of primary colours, red, green and blue, to enter the sensor. A typical matrix arrangement consists of a 25% red pass through area, 25% blue, and 50% green. The Bayer matrix allows a single chip sensor to produce a colour image.
Many objects in deep space are made up of hydrogen, oxygen and sulphur. These elements emit light in the red, blue and red/orange spectrum respectively.
When imaging an object rich in Hydrogen, the object will primarily emit light in the hydrogen-alpha/red wavelengths. In this scenario, the Bayer matrix will only allow 25% off the incoming light from the nebula to reach the sensor, as only 25% of the matrix area will allow red light to pass through.
A monochromatic sensor does not have a Bayer matrix. This means the entire sensor can be utilised to capture specific wavelengths using specialised colour filters known as narrowband filters. Many nebulae are made up of hydrogen, oxygen and sulphur. These nebulae emit light in red, blue and orange wavelengths respectively. A narrowband filter can be used for each colour to produce three discrete monochrome images. These images can then be combined to produce a colour image.
Advantages
Monochrome astrophotography has gained its popularity as a method of combating the effects of modern light-pollution. The Bayer matrix in a traditional sensor will limit the available sensor area capable of collecting light from deep space objects to approximately 25%. The remaining 75% however is still capable of col |
https://en.wikipedia.org/wiki/Lichen%20product | Lichen products, also known as lichen substances, are organic compounds produced by a lichen. Specifically, they are secondary metabolites. Lichen products are represented in several different chemical classes, including terpenoids, orcinol derivatives, chromones, xanthones, depsides, and depsidones. Over 800 lichen products of known chemical structure have been reported in the scientific literature, and most of these compound are exclusively found in lichens. Examples of lichen products include usnic acid (a dibenzofuran), atranorin (a depside), lichexanthone (a xanthone), salazinic acid (a depsidone), and isolichenan, an α-glucan. Many lichen products have biological activity, and research into these effects is ongoing.
Lichen products accumulate on the outer walls of the fungal hyphae, and are quite stable. Crystal deposits can be visualised using scanning electron microscopy. For this reason, even very old herbarium specimens can be analysed. The amount of lichen products in lichen (as a percentage of dry weight) is typically between 0.1%–10%, although in some instances it may be as high as 30%. They are usually found in the medulla, or less commonly, the cortex.
Most lichen products are biochemically synthesized via the acetyl-polymalonyl pathway (also known as polyketide pathway), while only a few originate from the mevalonate and shikimate biosynthetic pathways.
In 1907, Wilhelm Zopf identified and classified about 150 lichen products. Seventy years later, this number had risen to 300, and by 1995, 850 lichen products were known; as of 2021, more than 1000 have been identified. Analytical methods were developed in the 1970s using thin-layer chromatography for the routine identification of lichen products. More recently, published techniques demonstrate ways to more efficiently harvest secondary metabolites from lichen samples.
References
Cited literature
Lichenology |
https://en.wikipedia.org/wiki/Moldable%20wood | Moldable wood is a strong and flexible cellulose-based material. Moldable wood can be folded into different shapes without breaking or snapping. The patented synthesis is based on the deconstruction and softening of the wood's lignin, then re-swelling the material in a rapid "water-shock" process that produces a wrinkled cell wall structure. The result of this unique structure is a flexible wood material that can be molded or folded, with the final shape locked in plate by simple air-drying. This discovery broadens the potential applications of wood as a sustainable structural material. This research, which was a collaborative effort between the University of Maryland, Yale University, Ohio State University, USDA Forest Service, University of Bristol, University of North Texas, ETH Zurich, and the Center for Materials Innovation, was published on the cover of Science in October 2021.
References
Materials science
Solid mechanics
Fracture mechanics |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.