source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Sieve%20of%20Pritchard | In mathematics, the sieve of Pritchard is an algorithm for finding all prime numbers up to a specified bound.
Like the ancient sieve of Eratosthenes, it has a simple conceptual basis in number theory.
It is especially suited to quick hand computation for small bounds.
Whereas the sieve of Eratosthenes marks off each non-prime for each of its prime factors, the sieve of Pritchard avoids considering almost all non-prime numbers by building progressively larger wheels, which represent the pattern of numbers not divisible by any of the primes processed thus far.
It thereby achieves a better asymptotic complexity, and was the first sieve with a running time sublinear in the specified bound.
Its asymptotic running-time has not been improved on, and it deletes fewer composites than any other known sieve.
It was created in 1979 by Paul Pritchard.
Since Pritchard has created a number of other sieve algorithms for finding prime numbers, the sieve of Pritchard is sometimes singled out by being called the wheel sieve (by Pritchard himself) or the dynamic wheel sieve.
Overview
A prime number is a natural number that has no natural number divisors other than the number and itself.
To find all the prime numbers less than or equal to a given integer , a sieve algorithm examines a set of candidates in the range ,
and eliminates those that are not prime, leaving the primes at the end.
The sieve of Eratosthenes examines all of the range, first removing all multiples of the first prime , then of the next prime , and so on.
The sieve of Pritchard instead examines a subset of the range consisting of numbers that occur on successive wheels,
which represent the pattern of numbers left after each successive prime is processed by the sieve of Eratosthenes.
For the 'th wheel represents this pattern.
It is the set of numbers between and the product of the first prime numbers that are not divisible by any of these prime numbers (and is said to have an associated length ).
This is bec |
https://en.wikipedia.org/wiki/Underwater%20survey | An underwater survey is a survey performed in an underwater environment or conducted remotely on an underwater object or region. Survey can have several meanings. The word originates in Medieval Latin with meanings of looking over and detailed study of a subject. One meaning is the accurate measurement of a geographical region, usually with the intention of plotting the positions of features as a scale map of the region. This meaning is often used in scientific contexts, and also in civil engineering and mineral extraction. Another meaning, often used in a civil, structural, or marine engineering context, is the inspection of a structure or vessel to compare actual condition with the specified nominal condition, usually with the purpose of reporting on the actual condition and compliance with, or deviations from, the nominal condition, for quality control, damage assessment, valuation, insurance, maintenance, and similar purposes. In other contexts it can mean inspection of a region to establish presence and distribution of specified content, such as living organisms, either to establish a baseline, or to compare with a baseline.
These types of survey may be done in or of the underwater environment, in which case they may be referred to as underwater surveys, which may include bathymetric, hydrographic, and geological surveys, archaeological surveys, ecological surveys, and structural or vessel safety surveys. In some cases they can be done by remote sensing, using a variety of tools, and sometimes by direct human intervention, usually by a professional diver. Underwater surveys are an essential part of the planning, and often of quality control and monitoring, of underwater construction, dredging, mineral extraction, ecological monitoring, and archaeological investigations. They are often required as part of an ecological impact study.
Types
The types of underwater survey include, but are not necessarily restricted to, archeological, bathymetric and hydrographic |
https://en.wikipedia.org/wiki/375-line%20television%20system | 375-line corresponds to two different electronic television systems, both using 375 scan lines. One system (monochrome, 50 fields per second, interlaced) was used in Germany after 1936 along with the 180-line system, being replaced in a few years by the superior 441-line system. It was also tested in Italy around the same time.
In the United States a completely different system (field sequential color, 120 fields per second, interlaced) was used for early color television broadcasts
Germany
375-line (50 fps, interlaced) television was demonstrated in 1936 on the Berlin Funkausstellung. The system used electronic cameras for live exterior broadcasts.
The system was also used on experimental transmissions of the 1936 Summer Olympics (along with the 180-line system), using the Telefunken Iconoscope camera. A transmitter was setup in Berlin-Witzleben, broadcasting at 42.9 MHz. The Reichspost distributed the signal to major cities across Germany using cables.
After the Games transmissions continued to viewing rooms installed on post offices. Philips presented a radio/TV combo receiver for the system at the 1937 Berlin Funkausstellung, and Loewe also had a receiver available.
In the same year Telefunken demonstrated the 375-line system at the Paris Exposition Internationale des Arts et Techniques dans la Vie Moderne, displaying images taken from the exhibition's pavilion terrace.
Italy
In Italy 375-line television transmissions were undertaken by Arturo Castellani in 1937, with daily broadcasts from Rome, between 6pm and 9:30pm on 6.9 meters (43.45 MHz) with a power of 2 kW.
United States
In the spring of 1940, CBS staff engineer Peter Goldmark devised a system for color television, hoping to gain advantage regarding NBC and its black-and-white RCA system. The new system proposed by CBS was based on field sequential color and incompatible with existing sets but "gave brilliant and stable colors", while NBC developed a black and white compatible color TV system |
https://en.wikipedia.org/wiki/Algorithm%20Queen | Algorithm Queen is a 2022 painting of Queen Elizabeth II by Ai-Da, a humanoid robot credited with being the world's first ultra-realistic robot artist. Ai-Da painted the Queen in celebration of her Platinum Jubilee.
Description
Algorithm Queen was layered and scaled to produce the final multi-dimensional portrait of the monarch. The portrait will be exhibited publicly in London later in 2022.
Ai-Da said, "I'd like to thank Her Majesty the Queen for her dedication, and for the service she gives to so many people. She is an outstanding, courageous woman who is utterly committed to public service. I think she's an amazing human being, and I wish The Queen a very happy Platinum Jubilee".
Aidan Meller, the robot's creator, said the first portrait of the Queen by a robot provided an opportunity to think about "all that has changed during the Queen's life”. He said, "We are excited Ai-Da Robot has made history just in time for the Queen's Jubilee".
Jonathan Jones, The Guardian's art critic, said the painting showed the Queen's eyes with "a vacant, not quite human look. The mixture of leaden accuracy and, at the same time, complete lack of emphasis, feeling or conviction in Ai-Da's depiction of Her Maj is a telling glimpse of the limits of the AI 'art' genre. The machine records, but does not see. Because it has no conscious mind, let alone emotions".
References
Platinum Jubilee of Elizabeth II
21st-century portraits
Cultural depictions of Elizabeth II
Portraits of the British Royal Family
Portraits of women |
https://en.wikipedia.org/wiki/FatFs | FatFs is a lightweight software library for microcontrollers and embedded systems that implements FAT/exFAT file system support. Written on pure ANSI C, FatFs is platform-independent and easy to port on many hardware platforms such as 8051, PIC, AVR, ARM, Z80. FatFs is designed as thread-safe and is built into ChibiOS, RT-Thread, and Zephyr real-time operating systems.
Most often, FatFs is used in low-power Embedded systems where memory is limited, since the library takes up little space in RAM and program code. In the minimum version, the working code takes from 2 to 10 kB of RAM.
Overview
FatFs is designed to be a Filesystem Layer that is agnostic to the platform and storage media it is used with. This is achieved by providing a media access interface that is used to communicate with the storage device control module which is provided by the implementer. This means that FatFs can work with any physical device such as an SD card or a hard disk on any platform that can run plain C code if the implementer provides a control module interface.
Architecture
FatFs library architecture logically separates the abstractions of the user app and the platform-dependent code. The user application and the low level disk I/O layer (driver) must be added by the implementer. Also, the architecture of the library implies that the system can have several storage devices with different drivers and the library can work in a multi-threaded operating system. At the application level it is hidden which physical media is used.
In the minimum implementation, the driver layer must support at least these 3 interfaces:
disk_status — return block device status (not initialized, missing, protected, ready)
disk_initialize — initialize the physical disk
disk_read — read block from physical disk
This level of abstraction allows implementers to write an application once, and then port it on different platforms, changing only the implementation of the driver.
License
FatFs has its own |
https://en.wikipedia.org/wiki/PhyCV | PhyCV is the first computer vision library which utilizes algorithms directly derived from the equations of physics governing physical phenomena. The algorithms appearing in the first release emulate the propagation of light through a physical medium with natural and engineered diffractive properties followed by coherent detection. Unlike traditional algorithms that are a sequence of hand-crafted empirical rules, physics-inspired algorithms leverage physical laws of nature as blueprints. In addition, these algorithms can, in principle, be implemented in real physical devices for fast and efficient computation in the form of analog computing. Currently PhyCV has three algorithms, Phase-Stretch Transform (PST) and Phase-Stretch Adaptive Gradient-Field Extractor (PAGE), and Vision Enhancement via Virtual diffraction and coherent Detection (VEViD). All algorithms have CPU and GPU versions. PhyCV is now available on GitHub and can be installed from pip.
History
Algorithms in PhyCV are inspired by the physics of the photonic time stretch (a hardware technique for ultrafast and single-shot data acquisition). PST is an edge detection algorithm that was open-sourced in 2016 and has 800+ stars and 200+ forks on GitHub. PAGE is a directional edge detection algorithm that was open-sourced in February, 2022. PhyCV was originally developed and open-sourced by Jalali-Lab @ UCLA in May 2022. In the initial release of PhyCV, the original open-sourced code of PST and PAGE is significantly refactored and improved to be modular, more efficient, GPU-accelerated and object-oriented. VEViD is a low-light and color enhancement algorithm that was added to PhyCV in November 2022.
Background
Phase-Stretch Transform (PST)
Phase-Stretch Transform (PST) is a computationally efficient edge and texture detection algorithm with exceptional performance in visually impaired images. The algorithm transforms the image by emulating propagation of light through a device with engineered diffractive |
https://en.wikipedia.org/wiki/Flipper%20Zero | Flipper Zero is a portable Tamagotchi-like multi-functional device developed for interaction with access control systems. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface. It was first announced in August 2020 through the Kickstarter crowdfunding campaign, which raised $4.8 million. The first devices were delivered to backers 18 months after completion of the crowdfunding campaign.
The device's user interface embodies a pixel-art dolphin virtual pet. The interaction with the virtual pet is the device's core game mechanic. The usage of the device's functions defines the appearance and emotions of the pet.
In the built-in game, the main mechanic to "upgrade" the dolphin is to use the various hacking tools. While harmless uses (like as a remote control for a television, or carbon dioxide sensor) exist, some of the built-in tools have criminal uses, including RFID skimming and emulation of RFID chips such as those found in identification badges, using the built-in radio cloner to open garage doors, unlocking cars or even fully starting smart key-activated cars, functioning as a wireless BadUSB, and, with multiple infrared lights connected, emulating an Opticom, which can change traffic lights. Therefore, the device has been removed from Amazon.com and made illegal to import in some countries.
Origin
The device was developed by Alex Kulagin and Pavel Zhovner in 2019. They started raising funds on Kickstarter.
Overview
Flipper Zero is designed for interaction with various types of access control systems, radio protocols, RFID, near-field communication (NFC), and infrared signals. To operate the device, it is not required to have a computer or a smartphone; it can be controlled via a 5-position D-pad and a separate back button. Flipper Zero has a monochrome orange backlight LCD screen with a resolution of 128x64 pixels. For connection with external modules, the device has g |
https://en.wikipedia.org/wiki/Ideal%20reduction | The reduction theory goes back to the influential 1954 paper by Northcott and Rees, the paper that introduced the basic notions. In algebraic geometry, the theory is among the essential tools to extract detailed information about the behaviors of blow-ups.
Given ideals J ⊂ I in a ring R, the ideal J is said to be a reduction of I if there is some integer m > 0 such that . For such ideals, immediately from the definition, the following hold:
For any k, .
J and I have the same radical and the same set of minimal prime ideals over them (the converse is false).
If R is a Noetherian ring, then J is a reduction of I if and only if the Rees algebra R[It] is finite over R[Jt]. (This is the reason for the relation to a blow up.)
A closely related notion is that of analytic spread. By definition, the fiber cone ring of a Noetherian local ring (R, ) along an ideal I is
.
The Krull dimension of is called the analytic spread of I. Given a reduction , the minimum number of generators of J is at least the analytic spread of I. Also, a partial converse holds for infinite fields: if is infinite and if the integer is the analytic spread of I, then each reduction of I contains a reduction generated by elements.
References
Commutative algebra |
https://en.wikipedia.org/wiki/Account%20pre-hijacking | Account pre-hijacking attacks are a class of security exploit related to online services. They involve anticipating a user signing up for an online service and signing up to the service in their name, and then taking over their account when they attempt to register it themselves. The attack relies on confusion between accounts created by federated identity services and accounts created using e-mail addresses and passwords, and the failure of services to resolve this confusion correctly.
Pre-hijacking was first identified as a class of vulnerabilities in 2022, based on research funded by Microsoft's Security Response Center.
Out of 75 online services surveyed, 35 were found to be vulnerable to various forms of the exploit. Vulnerable services included Dropbox, Instagram, LinkedIn, WordPress and Zoom. The existence of the vulnerability was reported to all the service providers before publication of the paper.
See also
Single sign-on
Federated identity
References
Computer security exploits
Hacking in the 2020s
Federated identity |
https://en.wikipedia.org/wiki/Note%20G | Note G was a computer algorithm written by Ada Lovelace, and was designed to calculate Bernoulli numbers using the hypothetical analytical engine. Note G is generally agreed to be the first algorithm specifically for a computer, and Lovelace is considered as the first computer programmer as a result. The algorithm was the last note in a series labelled A to G, which she employed as visual aids to accompany her English translation of Luigi Menabrea's 1842 French transcription of Charles Babbage's lecture on the analytical engine at the University of Turin, "Notions sur la machine analytique de Charles Babbage" ("Elements of Charles Babbage’s Analytical Machine"). Lovelace's Note G was never tested, as the engine was never built. Her notes, along with her translation, were published in 1843.
In the modern era, thanks to more readily available computing equipment and programming resources, Lovelace's algorithm has since been tested, after being "translated" into modern programming languages. These tests have independently concluded that there was a bug in the script, due to a minor typographical error, rendering the algorithm in its original state unusable.
Origin
In 1840, Charles Babbage was invited to give a seminar in Turin on his analytical engine, the only public explanation he ever gave on the engine. During Babbage's lecture, mathematician Luigi Menabrea wrote an account of the engine in French. A friend of Babbage's, Charles Wheatstone, suggested that in order to contribute, Lovelace should translate Menabrea's account. Babbage suggested that she augment the account with appendices, which she compiled at the end of her translation as a series of seven "notes" labelled A-G. Her translation was published in August 1843, in Taylor's Scientific Memoirs, wherein Lovelace's name was signed "A.A.L". In these notes, Lovelace described the capabilities of Babbage's analytical engine if it were to be used for computing, laying out a more ambitious plan for the engine |
https://en.wikipedia.org/wiki/Polydactyly-myopia%20syndrome | Polydactyly-myopia syndrome, also known as Czeizel-Brooser syndrome, is a very rare genetic disorder which is characterized by post-axial polydactyly on all 4 limbs and progressive myopia. Additional symptoms include bilateral congenital inguinal hernia and undescended testes. It has only been described in nine members of a 4-generation Hungarian family in the year 1986. This disorder is inherited in an autosomal dominant manner.
References
Genetics |
https://en.wikipedia.org/wiki/Sysbench | In computing, sysbench is an open-source software tool. Specifically, it is a scriptable multi-threaded benchmarking tool designed for Linux systems. It is a C binary and uses LuaJIT scripts to execute benchmarks. It is most frequently used for database benchmarks, for example MySQL, but can also be used to create arbitrarily complex workloads that do not involve a database server. However, it is a multi-purpose benchmark that features tests for CPU, memory, I/O, and database performance testing. It is a basic command line utility that offers a direct and uncomplicated way to test your system. It now comes packaged in most major Linux distribution repositories such as Debian, Ubuntu, CentOS and Arch Linux.
History
Sysbench was originally created by Peter Zaitsev in 2004. Soon after, Alexy Kopytov took over its development.
Design
Sysbench tests the load by running multiple threads at the same time. The number of threads is specified by the user. Depending on the testing mode, Sysbench can test the total number of requests or the amount of time required to run the complete benchmark, or both.
Usage
Sysbench can be run benchmark test specified in a linux shell or in shell script, or there are several other commands such as prepare or cleanup. The type of test to run is specified in the command options and would be one of:
cpu: CPU performance test
fileio: File I/O test
memory: Memory speed test
mutex: Mutex performance test
threads: Threads subsystem performance test
Sample Command Usage
A commonly used variation of Sysbench may look like the following: sysbench --test=cpu --cpu-max-prime=20000 --threads=32 run.
References
Linux software
Benchmarks (computing) |
https://en.wikipedia.org/wiki/Energy%20Storage%20Materials | Energy Storage Materials is a peer-reviewed scientific journal by Elsevier BV.
Abstracting and indexing
Energy Storage Materials is abstracted and indexed the following bibliographic databases:
Science Citation Index Expanded
Scopus
INSPEC
According to the Journal Citation Reports, the journal has a 2020 impact factor of 17.789.
References
External links
English-language journals
Elsevier academic journals |
https://en.wikipedia.org/wiki/Microsoft%20Support%20Diagnostic%20Tool | The Microsoft Support Diagnostic Tool (MSDT) is a legacy service in Microsoft Windows that allows Microsoft technical support agents to analyze diagnostic data remotely for troubleshooting purposes. In April 2022 it was observed to have a security vulnerability that allowed remote code execution which was being exploited to attack computers in Russia and Belarus, and later against the Tibetan government in exile. Microsoft advised a temporary workaround of disabling the MSDT by editing the Windows registry.
Use
When contacting support the user is told to run MSDT and given a unique "passkey" which they enter. They are also given an "incident number" to uniquely identify their case. The MSDT can also be run offline which will generate a .CAB file which can be uploaded from a computer with an internet connection.
Security Vulnerabilities
Follina
Follina is the name given to a remote code execution (RCE) vulnerability, a type of arbitrary code execution (ACE) exploit, in the Microsoft Support Diagnostic Tool (MSDT) which was first widely publicized on May 27, 2022, by a security research group called Nao Sec. This exploit allows a remote attacker to use a Microsoft Office document template to execute code via MSDT. This works by exploiting the ability of Microsoft Office document templates to download additional content from a remote server. If the size of the downloaded content is large enough it causes a buffer overflow allowing a payload of Powershell code to be executed without explicit notification to the user. On May 30 Microsoft issued CVE-2022-30190 with guidance that users should disable MSDT. Malicious actors have been observed exploiting the bug to attack computers in Russia and Belarus since April, and it is believed Chinese state actors had been exploiting it to attack the Tibetan government in exile based in India. Microsoft patched this vulnerability in its June 2022 patches.
DogWalk
The DogWalk vulnerability is a remote code execution (RCE) vulne |
https://en.wikipedia.org/wiki/Museomics | Museomics is the study of genomic data obtained from ancient DNA (aDNA) and historic DNA (hDNA) specimens in museum collections.
Early research in this area focused on short sequences of DNA from mitochondrial genes, but sequencing of whole genomes has become possible.
Next-generation sequencing (NGS) and high-throughput sequencing (HTS) methods can be applied to the analysis of genetic datasets extracted from collections materials. Such techniques have been described as a "third revolution in sequencing technology". Like radiocarbon dating, the techniques of museomics are a transformative technology. Results are revising and sometimes overturning previously accepted theories about a wide variety of topics such as the domestication of the horse.
Museum collections contain unique resources such as natural history specimens, which can be used for genome-scale examinations of species, their evolution, and their responses to environmental change. Ancient DNA provides a unique window into genetic change over time. It enables scientists to directly study evolutionary and ecological processes, comparing ancient and modern populations, identifying distinct populations, and revealing patterns of change such as extinctions and migrations. Research may be used to identify isolated populations and inform conservation priorities.
However, museum specimens can be poorly preserved and are subject to degradation and contamination. Genomic analyses face considerable challenges as a result of the highly degraded DNA typical of museum specimens. DNA from such samples is often subject to post-mortem nucleotide damage such as the hydrolytic deamination of cytosine (C) to uracil (U) residues. PCR amplification of damaged templates can further substitute uracils with thymine (T), completing a C to T substitution path. Such errors tend to occur towards the ends of molecules, accumulate with time, and can be significant in specimens a century-old or later. Robust genomic and statistical |
https://en.wikipedia.org/wiki/Wilson%20matrix | Wilson matrix is the following matrix having integers as elements:
This is the coefficient matrix of the following system of linear equations considered in a paper by J. Morris published in 1946:
Morris ascribes the source of the set of equations to one T. S. Wilson but no details about Wilson have been provided. The particular system of equations was used by Morris to illustrate the concept of ill-conditioned system of equations. The matrix has been used as an example and for test purposes in many research papers and books over the years. John Todd has referred to as “the notorious matrix W of T. S. Wilson”.
Properties
is a symmetric matrix.
is positive definite.
The determinant of is .
The inverse of is
The characteristic polynomial of is .
The eigenvalues of are .
Since is symmetric, the 2-norm condition number of is .
The solution of the system of equations is .
The Cholesky factorisation of is where .
has the factorisation where .
has the factorisation with as the integer matrix .
Research problems spawned by Wilson matrix
A consideration of the condition number of the Wilson matrix has spawned several interesting research problems relating to condition numbers of matrices in certain special classes of matrices having some or all the special features of the Wilson matrix. In particular, the following special classes of matrices have been studied:
the set of nonsingular, symmetric matrices with integer entries between 1 and 10.
the set of positive definite, symmetric matrices with integer entries between 1 and 10.
An exhaustive computation of the condition numbers of the matrices in the above sets has yielded the following results:
Among the elements of , the maximum condition number is and this maximum is attained by the matrix .
Among the elements of , the maximum condition number is and this maximum is attained by the matrix .
References
Matrices |
https://en.wikipedia.org/wiki/QRIS | Quick Response Code Indonesia Standard (abbreviated as QRIS, the abbreviation being a play on keris, a traditional sword; ) is a QR code standard developed by Bank Indonesia (BI) and Indonesian Payment System Association for cashless payments in Indonesia.
History
Before Bank Indonesia (BI) applied the standard, QR codes used by mobile payment services were exclusive to themselves; a QR code issued by one service could not be used by another. On 16 August 2019, by the ratification of Board of Governor Decree No. 21/18/PADG/2019 on the Implementation of Quick Response Code National Standard for Payment Purpose, BI announced integration of cashless payment methods and services. This standard, named Quick Response Code Indonesia Standard (QRIS), was launched on the 74th anniversary of Indonesia's Independence Day. Payment services were required to implement QRIS by 1 January 2020.
During the start of COVID-19 pandemic in Indonesia, many small and large businesses in Indonesia registered their stores to obtain a QRIS-compliant QR code to accommodate increasing demand of online transactions and reduce the spread of COVID-19 from banknotes and coins. Secretary of Ministry of Cooperatives and SMEs of The Republic of Indonesia, Rully Indrawan, stated that by using QRIS, merchants "...could develop their credit profile which in turn increasing their chance to get funding loans. [...] Each transaction can also be documented and directly transferred to merchant's bank account, as well as helps prevent robbery and distribution of fake money."
According to BI, by October 2020, QRIS had been implemented by 3.6 million small and micro businesses in Indonesia. QRIS has also been implemented in several tourist attractions and public transport ticketing apps.
References
External links
Digital currencies
Indonesian brands
Online payments
2019 establishments in Indonesia
Barcodes |
https://en.wikipedia.org/wiki/Kosher%20by%20ingredient | Kosher by ingredient is an approach to observing the laws of kashrut that determines whether a food is kosher or not based on ingredient, rather than by the presence of a hechsher. This approach has fallen out of favor with Orthodox Jews, but is practiced by many Conservative Jews as well as by some Reform Jews and Reconstructionist Jews.
History
For much of history, Jews who kept kosher commonly utilized a "kosher by ingredient" approach in many situations. Prior to the 20th century, hechsherim were not commonly used for commercially available foods. As late as the 1960s and 1970s it was common for Jews who kept kosher, including Orthodox Jews, to examine boxes and cans of commercially processed foods to check for themselves whether they considered the food to be kosher or not. The rapid rise of commercial kosher certification during the mid-to-late 20th century caused this approach to fall out of favor with Orthodox Jews by the 1980s. However, many Conservative Jews and some Reform and Reconstructionist Jews still rely on this approach. Few contemporary Orthodox Jews would purchase commercially processed food that doesn't have a valid kosher certification according to Orthodox halakha.
Individual non-Orthodox synagogues differ on their interpretation of when "kosher by ingredient" food is or is not acceptable. Some synagogues maintain a policy that individual members may keep kosher by ingredient, but if they prepare food for communal events such as synagogue potlucks, they must use food with a hechsher. Other Conservative synagogues may regard it as preferable to keep a kosher kitchen by hechsher, but do not consider a kosher by ingredient kitchen to be non-kosher.
Some Jews may keep kosher by ingredient for much of the year, but are stricter during holidays such as Passover and prefer to use hechshered products during those times. Others are strict with meat and will only purchase kosher meat that has been certified, but are otherwise lenient by using the kos |
https://en.wikipedia.org/wiki/Trampling | Trampling is the act of walking on something repeatedly by humans or animals.
Trampling on open ground can destroy the above ground parts of many plants and can compact the soil, thereby creating a distinct microenvironment that specific species may be adapted for.
It can be used as part of a wildlife management strategy along grazing.
When carrying out investigations like a belt transect, trampling should be avoided. At other times, it is part of the experimental design.
Trampling can be a disturbance to ecology and to archaeological sites.
References
Human impact on the environment
Ecology |
https://en.wikipedia.org/wiki/Peter%20Koch%20%28wood%20scientist%29 | Peter Koch (October 15, 1920 – February 14, 1998) was an American engineer and wood scientist who was considered an expert in the field of wood technology by his peers. From 1963 to 1982, Koch led a team of US Forest Service scientists in forest products utilization research specific to forests of the southeastern US. Accomplishments by Koch and his research team included eight US patents plus hundreds of research publications.
Biography
Peter Koch was the youngest of 3 sons born to Elers and Gerda (Heiberg-Jurgensen) Koch in Missoula, Montana. In 1942, he graduated from Montana State College of Agriculture and Engineering at Bozeman with a degree in mechanical engineering. After graduation, Koch enlisted in the United States Army Air Corps as a pilot, mostly flying bombers over the hump into China from 1942 to 1946, attaining the rank of captain.
From 1946 to 1952, Koch worked in Washington (state) at Stetson-Ross Machine Company – a company that designs lumber processing machinery. In 1950, Koch married Doris Ann Hagen. In 1952, he enrolled in graduate school at the University of Washington and received a PhD in wood technology in 1954. Afterwards, Koch taught at Michigan State University (1955–1957) and was vice-president of a hardwood lumber producer – the Champlin Company – in Rochester, New Hampshire (1957–1963).
Forest Service research
By the 1960s, there was concern by timber industries in the South about the lack of forest product utilization research into the use of smaller trees that had replaced the virgin pine forests. To address that concern, the US Forest Service recruited Peter Koch in 1963 to head a newly formed wood utilization research program at the Southern Forest Experiment Station in Pineville, Louisiana. During his tenure, Koch and his staff of scientists generated the following technological advancements:
Developed wood adhesives that would bond southern pine plywood.
Developed laminated wooden beams by gluing laminae (layers of wood) |
https://en.wikipedia.org/wiki/Tagged%20Deterministic%20Finite%20Automaton | In the automata theory, a tagged deterministic finite automaton (TDFA) is an extension of deterministic finite automaton (DFA). In addition to solving the recognition problem for regular languages, TDFA is also capable of submatch extraction and parsing. While canonical DFA can find out if a string belongs to the language defined by a regular expression, TDFA can also extract substrings that match specific subexpressions. More generally, TDFA can identify positions in the input string that match tagged positions in a regular expression (tags are meta-symbols similar to capturing parentheses, but without the pairing requirement).
History
TDFA were first described by Ville Laurikari in 2000.
Prior to that it was unknown whether it is possible to perform submatch extraction in one pass on a deterministic finite-state automaton,
so this paper was an important advancement.
Laurikari described TDFA construction and gave a proof that the determinization process terminates,
however the algorithm did not handle disambiguation correctly.
In 2007 Chris Kuklewicz implemented TDFA in a Haskell library Regex-TDFA with POSIX longest-match semantics.
Kuklewicz gave an informal description of the algorithm
and answered the principal question whether TDFA are capable of POSIX longest-match disambiguation,
which was doubted by other researchers.
In 2017 Ulya Trafimovich described TDFA with one-symbol lookahead.
The use of a lookahead symbol reduces the number of registers and register operations in a TDFA,
which makes it faster and often smaller than Laurikari TDFA.
Trafimovich called TDFA variants with and without lookahead TDFA(1) and TDFA(0) by analogy with LR parsers LR(1) and LR(0).
The algorithm was implemented in the open-source lexer generator RE2C.
Trafimovich formalized Kuklewicz disambiguation algorithm.
In 2018 Angelo Borsotti worked on an experimental Java implementation of TDFA;
it was published later in 2021.
In 2019 Borsotti and Trafimovich adapted POSIX di |
https://en.wikipedia.org/wiki/IOS%2016 | iOS 16 is the sixteenth major release of Apple's iOS mobile operating system for the iPhone. It is the successor of iOS 15, and was announced at the company's Worldwide Developers Conference (WWDC) on June 6, 2022 alongside iPadOS 16, and released on September 12, 2022. It was succeeded by iOS 17 on September 18, 2023.
It is the first iOS release to be exclusive to iPhones since the first version release of iPhone OS 1, as it drops support for the last iPod Touch. It is also the last iOS release to support iPhone models with 5.5-inch display, especially the iPhone 8 and 8 Plus and the iPhone X. Its successor, iOS 17 was released on September 18, 2023.
System features
Freeform
Freeform is a whiteboard app that lets users collaborate together in real time. The whiteboard is an "Infinite" space where users can draw, import files, facetime, message, all fluently in sync.
AirDrop
In iOS 16.2, the default setting is "Contacts Only,” and the "Everyone" setting was changed to "Everyone for 10 Minutes,” which reverts to "Contacts Only" after 10 minutes "to prevent unwanted requests to receive content.” This was enabled in iOS 16.1.1 for iPhones in China.
Lock screen
The lock screen's appearance is customizable and it can host Widgets. The font and text color for the date and time can be customized to 8 presets and color effects can be applied to the entire lock screen. The date is now above the time and a small widget can be added next to the date. Other widgets can be added and arranged horizontally on the third row, below the time.
Multiple lock screens can be set up.
The live wallpapers have been removed because of the new tap and hold gesture that would allow users to customize their lockscreen.
The lock screen also supports landscape mode, arranging elements horizontally instead of vertically when the phone orientation is horizontal.
When listening to podcasts and music, tapping the album cover will cause the cover to appear full-sized in the center of the lock sc |
https://en.wikipedia.org/wiki/MacOS%20Ventura | macOS Ventura (version 13) is the nineteenth major release of macOS, Apple's operating system for Macintosh computers. The successor to macOS Monterey, it was announced at WWDC 2022 on June 6, 2022, and launched on October 24, 2022. macOS Ventura is succeeded by macOS Sonoma, which was released on September 26, 2023.
It is named after Ventura County and is the tenth macOS release to bear a name from the company's home state of California. The macOS 13 Ventura logo, official graphics and default wallpaper resemble an abstract California poppy.
macOS Ventura is the last version of macOS supporting Macs without Retina display, especially the 21.5-inch 2017 iMac and the 12-inch MacBook, as its successor, macOS Sonoma, drops support for those models.
History
New features
macOS Ventura includes changes, many related to productivity, and adds two apps from iOS and iPadOS: Weather and Clock. Freeform was added in an update to all three operating systems.
New system features
Stage Manager, which provides an alternative interface for multitasking, in addition to the previous Mission Control.
New apps
Weather: shows detailed weather forecasts. Clicking on the Weather widget now opens this app, not The Weather Channel's website.
Clock: displays world time and manages alarms, stopwatches, and timers. Clicking on the Clock widget now opens this app, not the Date & Time section of System Preferences.
Freeform, a whiteboard app that supports real-time collaboration (added in version 13.1).
Changes
Mail adds "send later" and "undo send" options and includes improvements to search, email organization, and formatting.
Spotlight produces richer search results; with Live Text, it can return pictures that contain the queried text.
Safari adds Shared Tab Groups and Passkeys, uses WebAuthn for password-less account management, gets a redesigned sidebar, and gains AVIF support.
Messages now allows the user to edit and unsend recent iMessages, similar to iOS and iPadOS 16.
|
https://en.wikipedia.org/wiki/IPadOS%2016 | iPadOS 16 is the fourth major release of the iPadOS operating system developed by Apple for its iPad line of tablet computers. The successor to iPadOS 15, it was announced at the company's Worldwide Developers Conference (WWDC) on June 6, 2022, along with iOS 16, macOS Ventura, watchOS 9, and tvOS 16. It received numerous new features, improving multitasking and many other aspects of the operating system, most notably on iPads with Apple's M1 SoC and later.
The public beta of iPadOS 16 was released on July 11, 2022. The public version of iPadOS 16 was released on October 24, 2022 as iPadOS 16.1.
iPadOS 16 is the final version of iPadOS that supports the first-generation iPad Pro and iPads without Apple Pencil compatibility, especially the fifth-generation iPad, as its successor, iPadOS 17, drops support for those models.
Features
Freeform
Freeform is a whiteboard app that lets users collaborate together in real time. It was released with iPadOS 16.2.
Weather
For the first time, Apple's Weather app is available on iPad. It was originally only available on iPhone and iPod Touch.
Lock screen
The Lock Screen has a new font and displays the date above the time to match iOS 16, but lacks the new customization features, which were later added in iPadOS 17.
Passkeys
iPads will now be able to sign into websites that implement WebAuthn using just the user’s passcode or biometrics.
Stage Manager
On iPads with Apple A12X Bionic, Apple A12Z Bionic, Apple M1 and Apple M2 processors, Stage Manager displays up to four apps at a time in adjustable windows. In addition, on iPads with Apple M1 and later, external displays are now driven using Stage Manager instead of screen mirroring, enabling display scaling on external displays.
Display scaling mode
On iPads with Apple M1 processors and later, and iPad Pro 11-inch with Apple A12X Bionic and A12Z Bionic processors, Display scaling mode allows more view space in apps by increasing the pixel density of the display.
Referen |
https://en.wikipedia.org/wiki/Power-voltage%20curve | Power-voltage curve (also P-V curve) describes the relationship between the active power delivered to the electrical load and the voltage at the load terminals in an electric power system under a constant power factor. When plotted with power as a horizontal axis, the curve resembles a human nose, thus it is sometimes called a nose curve. The overall shape of the curve (similar to a parabola placed on its side) is defined by the basic electrical equations and does not change much when the characteristics of the system vary: leading power factor lead stretches the "nose" further to the right and upwards, while the lagging one shrinks the curve. The curve is important for voltage stability analysis, as the coordinate of the tip of the nose defines the maximum power that can be delivered by the system.
As the load increases from zero, the power-voltage point travels from the top left part of the curve to the tip of the "nose" (power increases, but the voltage drops). The tip corresponds to the maximum power that can be delivered to the load (as long as sufficient reactive power reserves are available). Past this "collapse" point additional loads cause drop in both voltage and power, as the power-voltage point travels to the bottom left corner of the plot. Intuitively this result can be explained when a load that consists entirely of resistors is considered: as the load increases (its resistance thus lowers), more and more generator power dissipates inside the generator (that has it own fixed resistance connected sequentially with the load). Operation on the bottom part of the curve (where the same power is delivered with lower voltage – and thus higher current and losses) is not practical, as it corresponds to the "uncontrollability" region.
If sufficient reactive power is not available, the limit of the load power will be reached prior to the power-voltage point getting to the tip of the "nose". The operator shall maintain a sufficient margin between the operating |
https://en.wikipedia.org/wiki/IOS%2017 | iOS 17 is the seventeenth and current major release of Apple's iOS operating system for the iPhone and the successor to iOS 16. It was announced on June 5, 2023, at Apple's annual Worldwide Developers Conference, and released publicly on September 18, 2023.
Development
According to Mark Gurman, iOS 17's internal codename was Dawn. Apple leaders initially intended iOS 17 as a "tuneup release" similar to Mac OS X Snow Leopard in 2009, allowing them to focus on their new mixed reality headset. Despite this, several major features were added later in the development cycle.
Features
User interface and system features
Interactive widgets
The widgets are now interactive, on the Home and Lock screens. For example, users can turn on the lights or shutters of the house by pressing the corresponding button of the Home widget; or mark a task complete by pressing directly on a reminder in the widget, etc.
Wallpaper improvements
The brightness of the wallpaper image changes depending on the dark or light mode. Resized photos are automatically extended to the top with a gradient that fills the missing space. Live Photos are now also supported. The font weight for the text on the lock screen can be adjusted more freely.
StandBy mode
StandBy mode is automatically enabled when the phone is charging while horizontally oriented. It displays information via widgets in intelligent stacks and Live activities also the clock
. The appearance of this information changes according to the ambient light, so at night they appear with less flashy and less bright colors.
Autocorrect and text prediction improvements
The keyboard's autocorrection and dictation are powered by a new on-device transformer model, which Apple says is more accurate and personalized to users' writing styles. Unlike previous versions of iOS, it can learn not to autocorrect swear words. Autocorrected words are underlined, and can be reverted with a tap. Word predictions are shown inline, and added when the spaceb |
https://en.wikipedia.org/wiki/ProbLog | ProbLog is a probabilistic logic programming that extends Prolog with probabilities. It minimally extends Prolog by adding the notion of a probabilistic fact, which combines the idea of logic atoms and random variables. Similarly to Prolog, ProbLog can query an atom. While Prolog returns the truth value of the queried atom, ProbLog returns the probability of it being true.
Semantics
A probabilistic fact is a pair with an atom and the probability of being true. A rule is defined by an atom , called the head, and a finite set of literals , called the body.
ProbLog programs consist of a set of probabilistic facts and a set of rules . Using the distribution semantics, a probability distribution is defined over the two-valued well-founded models of the atoms in the program. The probability of a model is defined as where the product runs over all the literals in the model . For a query atom the distribution semantics defines a probability for the query
in which the sum runs over all the models where is true.
ProbLog supports multiple tasks:
Probabilistic inference: calculate
Most probable explanation: calculate the most probable model probability
Sampling: generate samples of
Learning from interpretations: learn the probabilities of ProbLog programs from data
Example
ProbLog can for example be used to calculate the probability of getting wet given the probabilities for rain and the probabilities that someone brings an umbrella as follows:
0.4 :: rain(weekday).
0.9 :: rain(weekend).
0.8 :: umbrella_if_rainy(Day).
0.2 :: umbrella_if_dry(Day).
umbrella(Day) :- rain(Day), umbrella_if_rainy(Day).
umbrella(Day) :- \+rain(Day), umbrella_if_dry(Day).
wet(Day) :- rain(Day), \+umbrella(Day).
query(\+wet(weekend)).
The last rule before the query states that someone gets wet if it rains and no umbrella was brought. When ProbLog is asked to solve the "probabilistic inference" task, the query asks for the probability to stay dry on a weekend day. When solving the |
https://en.wikipedia.org/wiki/Yip1%20domain%20family | The Yip1 domain family is a group of proteins involved in regulating secretory traffic in eukaryotes. The family consists of four members in yeast and nine members in humans. Family members have a shared architecture containing five transmembrane domains.
Evolution
Yip1 domain family members are found in all eukaryotes. The budding yeast Saccharomyces cerevisiae has four Yip1 domain family members: Yif1p, Yip1p, Yip4p, and Yip5p. The amino acid sequence of the Yip domain family members divides them into two groups, called α-subunits and β-subunits. The α-subunits – in yeast Yip1p and Yip4p – are more closely related to each other than they are to the β-subunits, Yip5p and Yif1p. In mammals, both groups are expanded, with α-subunits YipF4, YipF5, YipF6, and YipF7; as well as β-subunits Yif1A, Yif1B, YipF1, YipF2, and YipF3.
Function
Yip1 domain family members localize to the Golgi apparatus, where they interact with each other to form complexes involved in trafficking cargo within the Golgi, and/or between the endoplasmic reticulum and Golgi. The Yip1 domain family members are widely distributed throughout the body – with the exception of YipF7 found primarily in the skeletal muscle and tongue, while YipF1A is predominantly in the liver. Within the cell, the different Yip family members have slightly different localizations, with YipF5, YipF7, Yif1A, and Yif1B (in yeast Yip1p and Yif1p) at the margin of the endoplasmic reticulum and Golgi; YipF3 and YipF4 at the cis-Golgi; and YipF1, YipF2, and Yipf6 (in yeast Yip4p and Yip5p) at the trans-Golgi.
YipF1 was conditionally knocked-out in mice with no observable effect.
A non-functional version of YipF6 exacerbated intestinal inflammation in mice, and sometimes resulted in spontaneous intestinal inflammatory disease.
Structure
Each Yip1 domain family protein contains five transmembrane domains, with the N-terminus exposed to the cytosol and the C-terminus to the Golgi apparatus lumen. Yip1 domain family members are |
https://en.wikipedia.org/wiki/Thermotolerance | Thermotolerance is the ability of an organism to survive high temperatures. An organism's natural tolerance of heat is their basal thermotolerance. Meanwhile, acquired thermotolerance is defined as an enhanced level of thermotolerance after exposure to a heat stress.
In plants
Multiple factors contribute to thermotolerance including signaling molecules like abscisic acid, salicylic acid, and pathways like the ethylene signaling pathway and heat stress response pathway.
The various heat stress response pathways enhance thermotolerance. The heat stress response in plants is mediated by heat shock transcription factors (HSF) and is well conserved across eukaryotes. HSFs are essential in plants’ ability to both sense and respond to stress. The HSFs, which are divided into three families (A, B, and C), encode the expression of heat shock proteins (HSP). Past studies have found that transcriptional activators HsfA1 and HsfB1 are the main positive regulators of heat stress response genes in Arabidopsis thaliana. The general pathway to thermotolerance is characterized by sensing of heat stress, activation of HSFs, upregulation of heat response, and return to the non-stressed state.
In 2011, while studying heat stress A. thaliana, Ikeda et al. concluded that the early response is regulated by HsfA1 and the extended response is regulated by HsfA2. They used RT-PCR to analyze the expression of HS-inducible genes of mutant (ectopic and nonfunctional HsfB1) and wild type plants. Plants with mutant HsfB1 had lower acquired thermotolerance, based on both lower expression of heat stress genes and visibly altered phenotypes. With these results they concluded that class A HSFs positively regulated the heat stress response while class B HSFs repressed the expression of HSF genes. Therefore, both were necessary for plants to return to non-stressed conditions and acquired thermotolerance.
In animals
References
Biological concepts |
https://en.wikipedia.org/wiki/Sigma%20%28signature%20format%29 | Sigma is a signature format based on pattern matching for system logging, to detect malicious behavior in computer systems.
See also
YARA
Snort
Further reading
References
External links
GitHub repository
sigmatools on PyPi
Computer forensics |
https://en.wikipedia.org/wiki/Rhizorhabdus%20wittichii | The species Rhizorhabdus wittichii, formerly Sphingomonas wittichii, is a Gram-negative, rod-shaped motile bacterium, with an optimum growth temperature at 30 °C. It forms a greyish white colony. It has been found to have a 67mol% of DNA G+C content.
The R. wittichii RW1 genome consists of 5,915,246 bp and consists of a single circular chromosome and two plasmids.
Background
It was first isolated from water of the River Elbe by R.-M. Wittich, after whom the species is named.
The species was originally thought to belong to the genus Sphingomonas, despite poor alignment of its 16S rRNA gene with its putative nearest neighbor. It has since been reclassified to Rhizorhabdus as part of a larger re-evaluation of Alphaproteobacteria.
Strain(s)
Its type strain is R. wittichii RW1 DSM 6014T (= JCM 10273T = EY 4224T).
Mechanism and biotechnological applications
R. wittichii RW1 is notable for metabolising dibenzo-p-dioxin and phenazine-1-carboxylic acid. In fact, Sphingomonas wittichii strain RW1 (RW1) is one of the very few strains that can grow on dibenzo-p-dioxin (DD). Furthermore, this bacterium also grows on dibenzofuran and 4-chloro-dibenzofuran, using them as the sole carbon sources. Such biodegradative capabilities are not unique to this strain.
R. wittichii MPO218 degrades ibuprofen, carrying degradative genes on a large plasmid. Thanks to its wide-ranging metabolic capabilities and likely propensity to acquire novel degradation genes, in no small part due to its wealth of plasmids,
The unusual arrangement of its genes involved in dioxin degradation, and the full description of the dioxin degradation pathway, is still under investigation.
This organism holds a high potential for biotechnological applications.
References
Further reading
External links
Type strain of Sphingomonas wittichii at BacDive - the Bacterial Diversity Metadatabase
Sphingomonadales
Bacteria described in 2001
Environmental microbiology
Gram-negative bacteria |
https://en.wikipedia.org/wiki/Staircase%20paradox | In mathematical analysis, the staircase paradox is a pathological example showing that limits of curves do not necessarily preserve their length. It consists of a sequence of "staircase" polygonal chains in a unit square, formed from horizontal and vertical line segments of decreasing length, so that these staircases converge uniformly to the diagonal of the square. However, each staircase has length two, while the length of the diagonal is the square root of 2, so the sequence of staircase lengths does not converge to the length of the diagonal. Martin Gardner calls this "an ancient geometrical paradox". It shows that, for curves under uniform convergence, the length of a curve is not a continuous function of the curve.
For any smooth curve, polygonal chains with segment lengths decreasing to zero, connecting consecutive vertices along the curve, always converge to the arc length. The failure of the staircase curves to converge to the correct length can be explained by the fact that some of their vertices do not lie on the diagonal. In higher dimensions, the Schwarz lantern provides an analogous example showing that polyhedral surfaces that converge pointwise to a curved surface do not necessarily converge to its area, even when the vertices all lie on the surface.
As well as highlighting the need for careful definitions of arc length in mathematics education, the paradox has applications in digital geometry, where it motivates methods of estimating the perimeter of pixelated shapes that do not merely sum the lengths of boundaries between pixels.
See also
Aliasing, a more general phenomenon of inaccuracies caused by pixelation
Cantor staircase, a fractal curve along the diagonal of a unit square
Taxicab geometry, in which the lengths of the staircases and of the diagonal are equal
References
External links
A Short Note: Extending the Staircase Paradox
Length
Mathematical paradoxes
Limits (mathematics) |
https://en.wikipedia.org/wiki/Mathemalchemy | Mathemalchemy is a traveling art installation dedicated to a celebration of the intersection of art and mathematics. It is a collaborative work led by Duke University mathematician Ingrid Daubechies and fiber artist Dominique Ehrmann. The cross-disciplinary team of 24 people, who collectively built the installation during the calendar years 2020 and 2021, includes artists, mathematicians, and craftspeople who employed a wide variety of materials to illustrate, amuse, and educate the public on the wonders, mystery, and beauty of mathematics. Including the core team of 24, about 70 people contributed in some way to the realization of Mathemalchemy.
Description
The art installation occupies a footprint approximately , which extends up to in height (in addition, small custom-fabricated tables are arranged around the periphery to protect the more fragile elements). A map shows the 14 or so different zones or regions within the exhibit, which is filled with hundreds of detailed mathematical artifacts, some smaller than ; the entire exhibit comprises more than 1,000 parts which must be packed for shipment. Versions of some of the complex mathematical objects can be purchased through an associated "Mathemalchemy Boutique" website.
The art installation contains puns (such as "Pi" in a bakery) and Easter eggs, such as a miniature model of the Antikythera mechanism hidden on the bottom of "Knotilus Bay". Mathematically sophisticated visitors may enjoy puzzling out and decoding the many mathematical allusions symbolized in the exhibit, while viewers of all levels are invited to enjoy the self-guided tours, detailed explanations, and videos available on the accompanying official website .
A downloadable comic book was created to explore some of the themes of the exhibition, using an independent narrative set in the world of Mathemalchemy.
Themes
The installation features or illustrates mathematical concepts at many different levels. All of the participants regard "recre |
https://en.wikipedia.org/wiki/Pacman%20%28security%20vulnerability%29 | Pacman (stylized PACMAN or PacMan) is an exploit that takes advantage of a hardware bug in the speculative execution function of the Apple M1 processors which was made public on June 10, 2022, by MIT security researchers. The flaw is in a hardware security feature called pointer authentication codes (PAC) and is believed to be intrinsic to the platform and unable to be patched. The M1 was the first ARM desktop CPU to implement pointer authentication. Apple stated that they did not believe the vulnerability posed a serious danger to users because it requires specific conditions to be exploited. An exploit would involve a combination of memory corruption and speculative execution.
See also
Side-channel attack
References
External links
Speculative execution security vulnerabilities
Hardware bugs
2022 in computing
Side-channel attacks |
https://en.wikipedia.org/wiki/Energy-rich%20species | In chemistry and particularly biochemistry, an energy-rich species (usually energy-rich molecule) or high-energy species (usually high-energy molecule) is a chemical species which reacts, potentially with other species found in the environment, to release chemical energy.
In particular, the term is often used for:
adenosine triphosphate (ATP) and similar molecules called high-energy phosphates, which release inorganic phosphate into the environment in an exothermic reaction with water:
ATP + → ADP + Pi ΔG°' = −30.5 kJ/mol (−7.3 kcal/mol)
fuels such as hydrocarbons, carbohydrates, lipids, proteins, and other organic molecules which react with oxygen in the environment to ultimately form carbon dioxide, water, and sometimes nitrogen, sulfates, and phosphates
molecular hydrogen
monatomic oxygen, ozone, hydrogen peroxide, singlet oxygen and other metastable or unstable species which spontaneously react without further reactants
in particular, the vast majority of free radicals
explosives such as nitroglycerin and other substances which react exothermically without requiring a second reactant
metals or metal ions which can be oxidized to release energy
This is contrasted to species that are either part of the environment (this sometimes includes diatomic triplet oxygen) or do not react with the environment (such as many metal oxides or calcium carbonate); those species are not considered energy-rich or high-energy species.
Alternative definitions
The term is often used without a definition. Some authors define the term "high-energy" to be equivalent to "chemically unstable", while others reserve the term for high-energy phosphates, such as the Great Soviet Encyclopedia which defines the term "high-energy compounds" to refer exclusively to those.
The IUPAC glossary of terms used in ecotoxicology defines a primary producer as an "organism capable of using the energy derived from light or a chemical substance in order to manufacture energy-rich organic compou |
https://en.wikipedia.org/wiki/Lateral%20body | Lateral bodies are structures that sit on the concave sides of the viral core of a poxvirus and is surrounded by a membrane. They serve as immunomodulatory delivery packets, and membrane cloaking to spread poxviruses. They were first visualized using electron microscopy in 1956 and shortly after, it was shown that they detach from the viral core upon membrane fusion.
Lateral body proteins
Lateral bodies are made up of at least three proteins, phosphoprotein F17, dual-specificity phosphatase H1 and the viral oxidoreductase G4. F17 is the main structural protein and may play a role in modulating cellular immune response through MAPK signaling pathways. H1 dephosphorylates STAT1 to prevent nuclear transcription and block IFNy-induced immune signaling. Finally, G4 is essential for viral morphogenesis. Additionally, the proteins packed in lateral bodies are redox proteins, which modulates the host oxidative response impacting early gene expression and virion production.
References
Viruses |
https://en.wikipedia.org/wiki/Significant%20New%20Alternatives%20Policy | The Significant New Alternatives Policy (also known as Section 612 of the Clean Air Act or SNAP, promulgated at 40 CFR part 82 Subpart G) is a program of the EPA to determine acceptable chemical substitutes, and establish which are prohibited or regulated by the EPA. It also establishes a program by which new alternatives may be accepted, and promulgates timelines to the industry regarding phase-outs of substitutes.
Scope
Originally, Section 612 was limited by ozone-depleting chemicals. However, after passing regulations to phase-out R134a, an HFC refrigerant with no ozone-depleting potential, this phase-out was defended by a subsidiary of DuPont siding with the EPA as it was challenged by a major manufacturer of R134a, and was struck down in 2017. This decision was upheld in 2018. In 2021, a new law was passed as part of the appropriations bill extending the EPA's scope to substances with high GWP as well.
The EPA looks at available chemical substitutes in the following industrial sectors:
Adhesives, Coatings, and Inks
Aerosols
Cleaning Solvents
Fire Suppression and Explosion Protection
Foam Blowing Agents
Refrigeration and Air Conditioning
Sterilants
Tobacco Expansion
Evaluations are ongoing as technological understanding improves, and can only prohibit substance where the EPA has determined other available substitutes that pose less overall risk to human health and the environment.
Submittal process
In order to submit new proposed chemicals, along with general contact and marketing information, for a complete submittal, the EPA requires reports on:
Impurities
Byproducts
Degradation Products
Test Marketing
Physical Properties including:
molecular weight
physical state
melting point
boiling point
specific gravity
If a blend
bubble point
dew point
If flammable
lower flammability limit
upper flammability limit
flash point
Ozone Depletion Potential (ODP)
Global Warming Potential (GWP)
VOC content
Proposed cost
Toxicity Limits
Permissible Exposure Limits (PEL |
https://en.wikipedia.org/wiki/Smart-ID | Smart-ID is an electronic authentication tool developed by SK ID Solutions, an Estonian company. Users can log in to various electronic services and sign documents with an electronic signature.
Smart-ID meets the European Union's eIDAS Regulation and the European Central Bank's standards for a secure authentication solution. Smart-ID is a Qualified Signature Creator Device (QSCD) that can issue a Qualified Electronic Signature (QES).
The Smart-ID app is compatible with both iOS and Android devices and does not require a SIM card.
By 2021, the Smart-ID application was launched in the Huawei AppGallery.
As of May 2023, Smart-ID has 3,298,969 active users across the Baltic States (Latvia, Lithuania, and Estonia). Every month, the Smart-ID processes 79 million transactions. In March 2023, Smart-ID users made an exceptional 85 million transactions.
History
In November 2016, SK ID Solutions debuted the Smart-ID tool for the first time at its annual conference. In February 2017, eKool, Starman, and Tallinn Kaubamaja Grupp were the first to implement Smart-ID authentication in their e-services. In March 2017, Smart-ID was added as an authentication option to SEB bank and Swedbank's online banking in all three Baltic States.
Dokobit, previously known as DigiDoc, began offering its clients the ability to use e-services using Smart-ID in April 2017. More than 100 service providers had implemented Smart-ID as an authentication solution for their services by November 2019.
At its annual conference on November 8, 2018, SK ID Solutions revealed that Smart-ID had been certified as compatible with the QSCD[8] level, the highest level of qualified electronic signature in the European Union, following a rigorous certification process. As a result, the Smart-QES-level ID's electronic signature, the digital counterpart of a handwritten signature, is now available to all users who have registered with the tool. This signature is accepted by all European Union member states.
On Augu |
https://en.wikipedia.org/wiki/Rumbleverse | Rumbleverse was a free-to-play brawler battle royale video game developed by Iron Galaxy and published by Epic Games Publishing. The game was released for Windows via Epic Games Store, PlayStation 4, PlayStation 5, Xbox One and Xbox Series X/S on August 11, 2022. The servers shut down on February 28, 2023, six months after launch.
Gameplay
Rumbleverse was a battle royale game played from a third-person perspective. 40 players will be dropped into Grapital City or Low key key and they must fight against each other with the goal of being the last survivor. Unlike similar games in the market, Rumbleverse focuses on melee combat, and players have no access to any gun or firearm. Players have several base attacks, including punches, kicks, and elbow drops. Basic attacks can be blocked, while stronger attacks or in other words vicious attacks are unblockable and must be dodged instead.
At the beginning of a match, players must explore Grapital city or Low key key and collect magazines hidden inside boxes that can teach players special moves from special strikes all the way to unblockable vicious attacks, along with that players can use potions that increase the player's stats such as health, stamina and strength. Only a maximum of 10 potions can be used in solos, 8 in duos and finally a maximum of 6 in trios. Melee weapons, such as baseball bats and chairs, can be picked up and used as weapons against other opponents. Every building in the game is climbable, allowing players to quickly navigate through Grapital City and reach strategic positions while in a quick fight or in an intense endgame. Similar to other battle royale games, players must stay within a shrinking circle. When the player is outside the circle, a timer will begin counting down from 10. Players will be disqualified once the timer reaches zero. Iron Galaxy estimated that each match will last around 12–15 minutes.
Rumbleverse utilized a battle pass model. As players complete matches and progress in the |
https://en.wikipedia.org/wiki/Milk%20immunity | Milk immunity is the protection provided to immune system of an infant via the biologically active components in milk, typically provided by the infant's mother.
Mammalian milk
All mammalian milk contains water, sugar, fat, vitamins, and protein with the variation within and between species and individuals differing mainly in the amount of these components. Other than the variation in quantity of these components, not a lot is known about bio-active or immune-modulating factors in many mammalian species. However, in comparison to other mammalian milk, human milk has the most oligosaccharide diversity.
Bovine milk
Ruminant mothers do not transfer immunity to their infants during pregnancy, which makes milk the first introduction to maternal immunity calves receive. Bovine milk contains both immunoglobulins A and G, but in contrast to human milk where IgA is the most abundant, IgG is more abundant. Secretory Component, IgM, both anti-inflammatory and inflammatory cytokines, and other proteins with antimicrobial functions are also present in bovine milk.
Human milk
Avian crop milk
Crop milk is a secretion from the crop of a bird that is regurgitated to feed their offspring. Birds that produce this secretion include pigeons, flamingos, emperor penguins, and doves. Pigeon milk contains some immune-modulating factors such as microbes and IgA, as well as other components with similar biological activities to mammalian milk including pigeon growth factor, and transferrin.
References
Breastfeeding
Immunology
Milk |
https://en.wikipedia.org/wiki/Irish%20Bee%20Conservation%20Project | The Irish Bee Conservation Project is a charitable organisation in Ireland that seeks to conserve all native Irish bee species. It has four "pillars of support" in its work: providing habitats, increasing biodiversity, holding education events and performing research into the decline of bee species. Species of bee in Ireland include the honeybee (Apis mellifera), 21 species of bumblebee and 78 species of solitary bee.
History
The Irish Bee Conservation Project (IBCP) grew out of a research project looking at honeybees and the Varroa mite and was formed in 2019 as a not for profit private company limited by guarantee. That same year it designed and installed its first honeybee "lodges" in Fota Wildlife Park, County Cork.
In 2021, the Irish Bee Conservation Project registered as a charity with the Charities Regulator of Ireland.
Projects
The charity developed and installed a pollinator trail, in conjunction with the Office of Public Works, at Fota Gardens. Opened in 2021, the walking trail consists of a series of 12 stations with QR codes which provide links to information about the gardens, bees and other pollinators.
Other projects by the IBCP include the installation of 24 wild bee lodges at Lough Gur, County Limerick. These lodges are designed to replace lost natural habitats. Since 2020, it has been helping Randal Plunkett, 21st Baron of Dunsany with the rewilding of the Dunsany estate in County Meath by advising him and supplying bee lodges.
In 2022, the charity hosted a free educational event at the South East Technological University's Bealtaine Living Earth Festival. The charity also has an apiary holding native honeybees, where it performs breeding and an ongoing eight year research project into varroa mite tolerance, no research results have been published.
References
External links
Charities based in the Republic of Ireland
Bees
Conservation biology
Nature conservation in Ireland |
https://en.wikipedia.org/wiki/Hertzbleed | Hertzbleed is a hardware security attack which describes exploiting dynamic frequency scaling to reveal secret data. The attack is a kind of timing attack, bearing similarity to previous power analysis vulnerabilities. Hertzbleed is more dangerous than power analysis, as it can be exploited by a remote attacker. Disclosure of cryptographic keys is the main concern regarding the exploit.
The exploit has been verified to work against Intel and AMD processors, Intel's security advisory stating that all Intel processors are affected. Other processors using frequency scaling exist, but the attack has not been tested on them.
Neither Intel nor AMD are planning to release microcode patches, instead advising to harden cryptography libraries against the vulnerability.
Mechanism
Normal timing attacks are mitigated by using constant-time programming, which ensures that each instruction takes equally long, regardless of the input data. Hertzbleed combines a timing attack with a power analysis attack. A power analysis attack measures the power consumption of the CPU to deduce the data being processed. This, however, requires an attacker to be able to measure the power consumption.
Hertzbleed exploits execution time differences caused by dynamic frequency scaling, a CPU feature which changes the processor's frequency to maintain power consumption and temperature constraints. As the processor's frequency depends on the power consumption, which in turn depends on the data, a remote attacker can deduce the data being processed from execution time. Hertzbleed thus effectively bypasses constant-time programming, which does not take into account changes in processor frequency.
See also
References
2022 in computing
Hardware bugs
Computer security exploits
X86 architecture
Side-channel attacks |
https://en.wikipedia.org/wiki/Christian%20Game%20Developers%20Conference | The Christian Game Developers Conference (CGDC) is an annual conference for video game developers who profess the Christian religion. Attendees of the conference gather together to discuss how to improve their games through discussions, keynote speeches, and workshops.
History
The Christian Game Developers Conference was founded in 2002 by computer engineer Tim Emmerich from Corvallis, Oregon, apparently with the goal of providing greater support and experimentation for Christian video games. In its first year, the conference consisted of 30 attendees, with subsequent years seeing attendances of 90 participants, "over 100" participants, and then 100 participants in the years 2003, 2004, and 2005, respectively. In 2011, the conference hosted around 85 individuals and in 2012, the number of attendees once again exceeded 100 people. In 2011, the event was held at George Fox University, and in 2013 it was hosted at Concordia University in Portland, Oregon.
Those attending the event consist of members from game studios who are explicitly Christian as well as individual developers from more mainstream, secular studios who themselves personally identify as Christian. Many attendees are motivated by the desire to change the wider perception of Christians and especially the negative stigma associated with Christian video games being poorly made. Developers evidently use the event as an opportunity to network with other Christians and to find a community of individuals who share their beliefs and experiences.
Debate over mission
According to sources interviewed from within CGDC, there is a recurring debate at the conference regarding how evangelistic Christian games should be, if at all. Attendees seem to be in disagreement over whether their games should be overt in their Christian subject matter or more allegorical with a message they may present.
External links
Official event website
References
Video game conferences
Video game development
Trade shows in the Uni |
https://en.wikipedia.org/wiki/Quasisymmetry | In magnetic confinement fusion, quasisymmetry (sometimes hyphenated as quasi-symmetry) is a type of continuous symmetry in the magnetic field strength of a stellarator. Quasisymmetry is desired, as Noether's theorem implies that there exists a conserved quantity in such cases. This conserved quantity ensures that particles stick to the flux surface, resulting in better confinement and neoclassical transport.
It is currently unknown if it is mathematically possible to construct a quasi-symmetric magnetic field which upholds magnetohydrodynamic force balance, which is required for stability. There are stellarator designs which are very close to being quasisymmetric, and it is possible to find solutions by generalizing the magnetohydrodynamic force balance equation. Quasisymmetric systems are a subset of omnigenous systems. The Helically Symmetric eXperiment and the National Compact Stellarator Experiment are designed to be quasisymmetric.
References
Magnetic confinement fusion
Symmetry |
https://en.wikipedia.org/wiki/Linux%20on%20Apple%20devices | The Linux kernel can run on a variety of devices made by Apple, including devices where the unlocking of the bootloader is not possible with an official procedure, such as iPhones and iPads.
iPad
In June 2022, software developers Konrad Dybcio and Markuss Broks managed to run Linux kernel 5.18 on a iPad Air 2. The project made use of the Alpine Linux based Linux distribution called postmarketOS, which is primarily developed for Android devices. The developer suggested that they used the checkm8 exploit which was published back in 2019.
iPhone
In 2008, Linux kernel 2.6 was ported to the iPhone 3G, iPhone (1st generation), and iPod Touch (1st generation) using OpeniBoot.
Corellium's Project Sandcastle made it possible to run Android on an iPhone 7/7+ or an iPod Touch (7th generation) using the checkm8 exploit.
iPod
iPodLinux is a Linux distribution created specifically to run on Apple's iPod.
Mac
Motorola 68k Macs
Linux can be dual-booted on Macs that use Motorola 680x0 processors (only 68020 and higher, and only non-"EC" processor variants since an MMU is required). The Linux/mac68k community project provides resources to do so, and an m68k community port of the Debian Linux distribution is also available.
PowerPC Macs
PowerPC Macs can run Linux through both emulation and dual-booting ("bare metal"). The most popular PowerPC emulation tools for Mac OS/Mac OS X are Microsoft's Virtual PC, and the open-source QEMU.
Linux dual-booting is achieved by partitioning the boot drive, installing the Yaboot bootloader onto the Linux partition, and selecting that Linux partition as the Startup Disk. This results in users being prompted to select whether they want to boot into Mac OS or Linux when the machine starts.
By 2008, a number of major Linux distributions had official versions compatible with Mac PowerPC processors, including:
Gentoo
Debian (until Debian 8)
Ubuntu (until Ubuntu 16.10)
Fedora (until Fedora 17 for G3 and G4 processors, and Fedora 28 for |
https://en.wikipedia.org/wiki/Oligoclonal%20antibody | Oligoclonal antibodies are an emerging immunological treatment relying on the combinatory use of several monoclonal antibodies (mAb) in one single drug. The composition can be made of mAb targeting different epitopes of a same protein (homo-combination) or mAb targeting different proteins (hetero-combination). It mimicks the natural polyclonal humoral immunological response to get better efficiency of the treatment. This strategy is most efficient in infections and in cancer treatment as it allow to overcome acquired resistance by pathogens and the plasticity of cancers.
History
Oligoclonal antibody treatment is a part of the serotherapy strategy (or antiserum).
19th century: Serotherapy was initiated thanks to Shibasaburo Kitasato and Emil von Behring in Germany, and Emile Roux in France. It is the administration of animal or human serum that was previously exposed to a pathogen and thus contains antibodies against it and will help the patient to fight infection.
1975 and 1986: First mAb was produced by hybridomas technique and then fully licensed. It was great progress since it allows targeting of specific epitope that can be shared among several diseases.
1982: Combination of two antibodies to enhance the immune response against viruses.
2000's: Several research teams came up with the idea of combining antibodies against different epitopes of the same receptor in cancer treatment. Particularly in anti-EGFR, anti-HER2 or anti-cMET combinations.
2010: Combination of two antibodies against immune control checkpoint to enhance cytotoxic T lymphocytes response and inhibit regulatory T lymphocytes suppressive effect on the immune response.
2012: First oligoclonal antibody combination was approved for use. It is composed of trastuzumab and pertuzumab both targeting HER-2 in breast cancer.
Numerous studies on animal models or in clinical trials are currently ongoing for treatment of infections and cancers.
Infectious diseases treatment
In infection oligoclo |
https://en.wikipedia.org/wiki/Puncture%20%28topology%29 | In topology, puncturing a manifold is removing a finite set of points from that manifold. The set of points can be small as a single point. In this case, the manifold is known as once-punctured. With the removal of a second point, it becomes twice-punctured, and so on.
Examples of punctured manifolds include the open disk (which is a sphere with a single puncture), the cylinder (which is a sphere with two punctures), and the Möbius strip (which is a projective plane with a single puncture).
References
Topology |
https://en.wikipedia.org/wiki/Relationship-based%20access%20control | In computer systems security, Relationship-based access control (ReBAC) defines an authorization paradigm where a subject's permission to access a resource is defined by the presence of relationships between those subjects and resources.
In general, authorization in ReBAC is performed by traversing the directed graph of relationships. The nodes and edges of this graph are very similar to triples in the Resource Description Framework (RDF) data format. ReBAC systems allow hierarchies of relationships, and some allow more complex definitions that include algebraic operators on relationships such as union, intersection, and difference.
ReBAC gained popularity with the rise of social network web applications, where users need to control their personal information based on their relationship with the data receiver rather than the receiver’s role. Using ReBAC enabled to collectively define permissions for teams and groups, thus eliminating the need to set permissions individually for every resource.
In contrast to role-based access control (RBAC), which defines roles that carry a specific set of privileges associated with them and to which subjects are assigned, ReBAC (like ABAC), allows defining more fine-grained permissions. For example, if a ReBAC system defines resources of type document, which can allow one action editor, if the system contains the relationship ('alice', 'editor', 'document:budget'), then subject Alice can edit the specific resource document:budget. The downside of ReBAC is that, while it allows more fine-grained access, this means that the application may need to perform more authorization checks.
ReBAC systems are deny-by-default, and allow building RBAC systems on top of them.
History
The term ReBAC was coined by Carrie E. Gates in 2006.
In 2019 Google published a paper presenting "Zanzibar: Google’s Consistent, Global Authorization System". The paper defines a system composed of a namespace configuration and relationship data expressed as |
https://en.wikipedia.org/wiki/Kaniadakis%20exponential%20distribution | The Kaniadakis exponential distribution (or κ-exponential distribution) is a probability distribution arising from the maximization of the Kaniadakis entropy under appropriate constraints. It is one example of a Kaniadakis distribution. The κ-exponential is a generalization of the exponential distribution in the same way that Kaniadakis entropy is a generalization of standard Boltzmann–Gibbs entropy or Shannon entropy. The κ-exponential distribution of Type I is a particular case of the κ-Gamma distribution, whilst the κ-exponential distribution of Type II is a particular case of the κ-Weibull distribution.
Type I
Probability density function
The Kaniadakis κ-exponential distribution of Type I is part of a class of statistical distributions emerging from the Kaniadakis κ-statistics which exhibit power-law tails. This distribution has the following probability density function:
valid for , where is the entropic index associated with the Kaniadakis entropy and is known as rate parameter. The exponential distribution is recovered as
Cumulative distribution function
The cumulative distribution function of κ-exponential distribution of Type I is given by
for . The cumulative exponential distribution is recovered in the classical limit .
Properties
Moments, expectation value and variance
The κ-exponential distribution of type I has moment of order given by
where is finite if .
The expectation is defined as:
and the variance is:
Kurtosis
The kurtosis of the κ-exponential distribution of type I may be computed thought:
Thus, the kurtosis of the κ-exponential distribution of type I distribution is given by:orThe kurtosis of the ordinary exponential distribution is recovered in the limit .
Skewness
The skewness of the κ-exponential distribution of type I may be computed thought:
Thus, the skewness of the κ-exponential distribution of type I distribution is given by:The kurtosis of the ordinary exponential distribution is recovered in the limit .
Ty |
https://en.wikipedia.org/wiki/Heteroclinic%20channels | Heteroclinic channels are ensembles of trajectories that can connect saddle equilibrium points in phase space. Dynamical systems and their associated phase spaces can be used to describe natural phenomena in mathematical terms; heteroclinic channels, and the cycles (or orbits) that they produce, are features in phase space that can be designed to occupy specific locations in that space. Heteroclinic channels move trajectories from one equilibrium point to another. More formally, a heteroclinic channel is a region in phase space in which nearby trajectories are drawn closer and closer to one unique limiting trajectory, the heteroclinic orbit. Equilibria connected by heteroclinic trajectories form heteroclinic cycles and cycles can be connected to form heteroclinic networks. Heteroclinic cycles and networks naturally appear in a number of applications, such as fluid dynamics, population dynamics, and neural dynamics. In addition, dynamical systems are often used as methods for robotic control. In particular, for robotic control, the equilibrium points can correspond to robotic states, and the heteroclinic channels can provide smooth methods for switching from state to state.
Overview
Heteroclinic channels (or heteroclinic orbits) are building blocks for a subset of dynamical systems that are built around connected saddle equilibrium points. Homoclinic channels/orbits join a single equilibrium point to itself, whereas heteroclinic channels join two different saddle equilibrium points in phase space. The connection is formed from the unstable manifold of the first saddle (“pushing away” from that point) to the stable manifold of the next saddle point (“pulling towards” this point). Combining at least three saddle equilibria in this way produces a heteroclinic cycle, and multiple heteroclinic cycles can be connected into heteroclinic networks.
Heteroclinic channels have both spatial and temporal features in phase space. Spatial because they affect trajectories within |
https://en.wikipedia.org/wiki/The%20Cube%20Made%20Interesting | The Cube Made Interesting is a geometry book aimed at high school mathematics students, on the geometry of the cube. It was originally written in Polish by Aniela Ehrenfeucht (née Miklaszewska, 1905–2000), titled Ciekawy Sześcian [the interesting cube], and published by Polish Scientific Publishers PWN in 1960. Wacław Zawadowski translated it into English, and the translation was published in 1964 by the Pergamon Press and Macmillan Inc., in their "Popular Lectures in Mathematics" series.
Topics
The book begins with Euler's polyhedral formula, and includes material on the symmetries of their cube and their realization as geometric rotations, and on the shape of plane sections through cubes. It describes the 30 combinatorially distinct colorings of the six faces of the cube by six different colors, and discusses arrangements of colored cubes that match pairs of equal-colored faces. The final chapter of the book concerns Prince Rupert's cube, the problem of fitting a cube through a hole drilled through a smaller cube without breaking the smaller cube into pieces.
An unusual feature of the book is its heavy illustration with red-blue anaglyphs; provided with the book are red-blue glasses allowing readers to see these images as three-dimensional shapes.
Audience and reception
This book is based on talks given by Ehrenfeucht to students and teachers, and is aimed at a secondary-school audience. Reviewer A. A. Kosinski writes that it "would contribute profitably to the development of the geometric imagination of a student", and Martyn Cundy writes that "the claim of the title is certainly justified".
However, H. S. M. Coxeter notes that some of the terminology has become incorrect or nonstandard in the translation, suggesting that copyediting by someone more familiar with English mathematical terminology would have helped avoid these problems. Cundy complains that the material on Prince Rupert's cube does not provide its optimal solution, and suggests that the color p |
https://en.wikipedia.org/wiki/Hybrid%20cloud%20storage | Hybrid cloud storage, in data storage, is a term for a storage infrastructure that uses a combination of on-premises storage resources with a public cloud storage provider. The on-premises storage is usually managed by the organization, while the public cloud storage provider is responsible for the management and security of the data stored in the cloud.
Hybrid cloud storage can be used to supplement an organization's internal storage resources, or it can be used as the primary storage infrastructure. In either case, hybrid cloud storage can provide organizations with greater flexibility and scalability than traditional on-premises storage infrastructure.
There are several benefits to using hybrid cloud storage, including the ability to cache frequently used data on-site for quick access, while inactive cold data is stored off-site in the cloud. This can save space, reduce storage costs and improve performance. Additionally, hybrid cloud storage can provide organizations with greater redundancy and fault tolerance, as data is stored in both on-premises and cloud storage infrastructure.
There are a few drawbacks to hybrid cloud storage as well, including the need to manage two separate storage infrastructures, and the potential for increased costs. Additionally, data stored in the cloud is subject to the security and privacy policies of the cloud storage provider. One challenge in transitioning from traditional storage systems to hybrid cloud storage is that the infinite capacity of the cloud, may lead to accumulation of wasted resources and to uncontrolled spending, if usage is not monitored carefully.
Use cases
Use cases for Hybrid cloud storage include:
Burst for capacity - Hybrid cloud storage provides infinite and elastic storage capacity expansion to local sites.
Disaster recovery - Hybrid cloud storage can keep a replica of local data in the cloud for business continuity.
Burst for compute - Hybrid cloud storage can make locally produced accessible in |
https://en.wikipedia.org/wiki/Chialvo%20map | The Chialvo map is a two-dimensional map proposed by Dante R. Chialvo in 1995 to describe the generic dynamics of excitable systems. The model is inspired by Kunihiko Kaneko's Coupled map lattice (CML) numerical approach which considers time and space as discrete variables but state as a continuous one. Later on Rulkov popularized a similar approach. By using only three parameters the model is able to efficiently mimic generic neuronal dynamics in computational simulations, as single elements or as parts of inter-connected networks.
The model
The model is an iterative map where at each time step, the behavior of one neuron is updated as the following equations:
in which, is called activation or action potential variable, and is the recovery variable. The model has four parameters, is a time-dependent additive perturbation or a constant bias, is the time constant of recovery , is the activation-dependence of the recovery process and is an offset constant. The model has a rich dynamics, presenting from oscillatory to chaotic behavior, as well as non trivial responses to small stochastic fluctuations.
Analysis
Bursting and chaos
The map is able to capture the aperiodic solutions and the bursting behavior which are remarkable in the context of neural systems. For example, for the values , and and changing b from to the system passes from oscillations to aperiodic bursting solutions.
Fixed points
Considering the case where and the model mimics the lack of ‘voltage-dependence inactivation’ for real neurons and the evolution of the recovery variable is fixed at . Therefore, the dynamics of the activation variable is basically described by the iteration of the following equations
in which as a function of has a period-doubling bifurcation structure.
Examples
Example 1
A practical implementation is the combination of neurons over a lattice, for that, it can be defined as a coupling constant for combining the neurons. For neurons in a single r |
https://en.wikipedia.org/wiki/Samsung%20Wallet | Samsung Wallet () is a digital wallet platform developed by Samsung. It is available for the Samsung Galaxy-exclusive One UI Android operating system, and was announced on February 9, 2022, at the February 2022 Samsung Unpacked event. It combines both Samsung Pay and Samsung Pass.
History
The "Samsung Wallet" brand name was first used for the company's mobile wallet system of the same name, which was introduced in 2013 before being migrated into a new app called Samsung Pay in 2015. Samsung Wallet now contains the Samsung Pay service for payment cards, alongside other features such as cryptocurrency assets and digital credentials. Although in South Korea both the service and the app are still known as Samsung Pay.
Features
Samsung Wallet allows users to store items such as payment cards, loyalty cards, boarding passes, digital keys, and vaccination cards. It replaces the old Samsung Pay app on Android-powered Galaxy devices and is currently available in Australia, Bahrain, Brazil, Canada, China, Denmark, Finland, France, Germany, Hong Kong, India, Italy, Kazakhstan, Korea, Kuwait, Malaysia, Norway, Oman, Qatar, Singapore, South Africa, Spain, Sweden, Switzerland, Taiwan, Vietnam, UAE, the U.K. and the U.S.
Samsung Wallet also supports a variety of transit cards, such as T-money and cashbee in South Korea, as well as Octopus in Hong Kong. However, due to the region-specific nature of Samsung Wallet, users from other regions are not able to utilize these transit cards from their own devices.
Comparison between phone and wearable versions
Fast Mode & Battery depletion
As of 2023, car keys, transit cards, and campus IDs are supported types of cards that can be used with Fast Mode. However, Samsung limits some passes if they are the same type or from the same issuer from being used with Fast Mode. For example, a user can only have one campus ID and one car key each set to Fast Mode. This can be mitigated in a sense by using a Galaxy Watch to split the Fast Mode p |
https://en.wikipedia.org/wiki/LPAR2RRD | LPAR2RRD is an open-source software tool that is used for monitoring and reporting performance of servers, clouds and databases. It is developed by the Czech company XoruX.
Overview
LPAR2RRD is open-source software that is published under the GNU General Public License v3.0. As of April 2022, the latest version is 7.40. The software was first launched in 2006.
The software tool is designed to monitor and report on server virtualization utilizations. It produces utilization graphs, reports, or alerts of physical or virtual servers on CPU, memory, IOPS, and many other depending on specific virtualization platform. It also supports database engines as Oracle Database, PostgreSQL or containerization platforms like OpenShift or Docker. Cloud technologies are supported as well.
The software is compatible with various systems by IBM Power Systems, IBM i, VMware, Nutanix, Oracle VM, Oracle Solaris, oVirt / Red Hat Virtualization, XenServer, Microsoft Hyper-V, Linux, Oracle Database, PostgreSQL Database, Microsoft SQL Server, Amazon Web Services, Microsoft Azure, Google Cloud, Apache CloudStack, Kubernetes, Red Hat OpenShift, Docker, Huawei FusionCompute, and Proxmox.
References
External links
Demo
GitHub
Sourceforge
Software using the GPL license
Storage software
Virtualization
Virtualization software for Linux |
https://en.wikipedia.org/wiki/Partition%20algebra | The partition algebra is an associative algebra with a basis of set-partition diagrams and multiplication given by diagram concatenation. Its subalgebras include diagram algebras such as the Brauer algebra, the Temperley–Lieb algebra, or the group algebra of the symmetric group. Representations of the partition algebra are built from sets of diagrams and from representations of the symmetric group.
Definition
Diagrams
A partition of elements labelled is represented as a diagram, with lines connecting elements in the same subset. In the following example, the subset gives rise to the lines , and could equivalently be represented by the lines (for instance).
For and , the partition algebra is defined by a -basis made of partitions, and a multiplication given by diagram concatenation. The concatenated diagram comes with a factor , where is the number of connected components that are disconnected from the top and bottom elements.
Generators and relations
The partition algebra is generated by elements of the type
These generators obey relations that include
Other elements that are useful for generating subalgebras include
In terms of the original generators, these elements are
Properties
The partition algebra is an associative algebra. It has a multiplicative identity
The partition algebra is semisimple for . For any two in this set, the algebras and are isomorphic.
The partition algebra is finite-dimensional, with (a Bell number).
Subalgebras
Eight subalgebras
Subalgebras of the partition algebra can be defined by the following properties:
Whether they are planar i.e. whether lines may cross in diagrams.
Whether subsets are allowed to have any size , or size , or only size .
Whether we allow top-top and bottom-bottom lines, or only top-bottom lines. In the latter case, the parameter is absent, or can be eliminated by .
Combining these properties gives rise to 8 nontrivial subalgebras, in addition to the partition algebra itself:
|
https://en.wikipedia.org/wiki/Stability%20of%20matter | In physics, stability of matter refers to the problem of showing rigorously that a large number of charged quantum particles can coexist and form macroscopic objects, like ordinary matter. The first proof was provided by Freeman Dyson and Andrew Lenard in 1967–1968, but a shorter and more conceptual proof was found later by Elliott Lieb and Walter Thirring in 1975.
Background and history
In statistical mechanics, the existence of macroscopic objects is usually explained in terms of the behavior of the energy or the free energy with respect to the total number of particles. More precisely, it should behave linearly in for large values of .
In fact, if the free energy behaves like for some , then pouring two glasses of water would provide an energy proportional to , which is enormous for large . A system is called stable of the second kind or thermodynamically stable when the (free) energy is bounded from below by a linear function of . Upper bounds are usually easy to show in applications, and this is why people have worked more on proving lower bounds.
Neglecting other forces, it is reasonable to assume that ordinary matter is composed of negative and positive non-relativistic charges (electrons and nuclei), interacting solely via the Coulomb force. A finite number of such particles always collapses in classical mechanics, due to the infinite depth of the electron-nucleus attraction, but it can exist in quantum mechanics thanks to Heisenberg's uncertainty principle. Proving that such a system is thermodynamically stable is called the stability of matter problem and it is very difficult due to the long range of the Coulomb potential. Stability should be a consequence of screening effects, but those are hard to quantify.
Let us denote by
the quantum Hamiltonian of electrons and nuclei of charges and masses in atomic units. Here denotes the Laplacian, which is the quantum kinetic energy operator. At zero temperature, the question is whether the ground |
https://en.wikipedia.org/wiki/Hidegor%C5%8D%20Nakano | Hidegorō Nakano (; 16 May 1909 – 11 March 1974) is a Japanese mathematician, after whom Nakano Spaces are named.
Life
Nakano was born as the first son of Katsugoro Nakano and Kame Nakano, in Tokyo. After graduating from National First High School, a preparatory school for the Imperial University of Tokyo, he progressed to study mathematics in Tokyo Imperial University and graduated with a Bachelor of Science in 1933. Then he entered Graduate School at the same university under the supervision of Takuji Yoshie, and attained his doctoral degree in 1935. At that time, a doctorate was more commonly awarded to people over 50 years old.
Nakano started teaching in The National First High School in 1935. At the same year he married Sumiko Yamamura (11 December 1913, Tokyo - 5 March 1999, Detroit). Then he held academic positions (1938-1952) in Tokyo Imperial University, before moving to Hokkaido University and being appointed as a professor.
In 1960, he left Japan and took a visit to Queen's University in Canada for a year, under the invitation of Canadian Mathematical Congress. He then took up professorship in Wayne State University, Detroit, US, in 1961, and continued working there until his death in 1974.
Works
Nakano's name in mathematics
Nakano is known for his research in Functional Analysis, especially in vector lattice and operator theory in Hilbert spaces. He mainly made his name in his contribution to several mathematical subjects around modulars, Riesz spaces, Orlicz-Nakano spaces and Nakano space.
List of books with name translated from Japanese
From Riemann integral to Lebesgue integral (1940)
Hilbert Space Theory (1946)
Classical Integration Theory (1949)
Measure Theory (1950)
Banach Space Theory (1953)
Set Theory (1955)
Real Number Theory (1956)
How to teach mathematics (1956)
Problems in Mathematics (1956).
List of books in English
Modern Spectral Theory (1950)
Modulared Semi-Ordered Linear Spaces (1950)
Topology of linear topolog |
https://en.wikipedia.org/wiki/343-line%20television%20system | 343-line is the number of scan lines in some early electronic monochrome analog television systems. Systems with this number of lines were used with 30 interlaced frames per second the United States by from 1935 to 1938, and with 25 interlaced frames per second in the Soviet Union from 1937 onwards. A similar system was under development in Poland in 1939.
TV cameras were based on the iconoscope, the primary camera tube used in American broadcasting from 1936 until 1946, when it was replaced by the image orthicon tube. Earlier cameras used special spotlights or spinning disks to capture light from a single very brightly lit spot, and were not suitable for broadcasting of outdoor live events.
This early standard was soon replaced by 441-line systems.
United States
343-line broadcasts where introduced by RCA and NBC on November 6, 1936. Tests started the previous year from New York City (W2XF on the Empire State Building), where NBC converted a radio studio in the Rockefeller Center for television use.
Several prototype TV sets were produced by RCA in 1936, but none was available commercially. Broadcasts were limited to public demonstrations in New York City (RCA) and Philadelphia (Philco) - to be exact, Philco demonstrated a 345-line system, but in practice both systems were identical.
The 343-line system was proposed for FCC approval by the Radio Manufacturers Association (RMA) in December 1937. Broadcasts were phased out the following year, in favor of a 441-line system.
Technical details:
Soviet Union
A a similar 343-line system was tested in the Soviet Union (Moscow) from 1937 onwards. RCA provided broadcast equipment and documentation for the TV sets, that were then produced locally. The system was adapted for 50 Hz mains electricity, with a field rate of 50 Hz. The first experimental transmissions happened on March 9, 1937, followed by regular broadcasts on December 31, 1938.
Poland
In 1939 a 343-line system was under development in Poland, publicly |
https://en.wikipedia.org/wiki/Rsocks | RSOCKS (stylized in caps) was a Russian internet proxy service provider that was shut down by the US Department of Justice in June 2022 for using stolen IP addresses from hacked PCs, mobile and IoT devices and then selling them to unsuspecting users.
History
RSOCKS was launched in 2014. Based on a research done by KrebsonSecurity.com, the site was launched by Denis “Neo” Kloster (Born September 17, 1986), from Omsk, Russia. Other sources suggest that his real last name may be Emilyantsev. According to Kloster's social media posts, he got a US Visa and was operating from New York in 2013, but then decided to travel the world and work remotely.
When in existence, RSOCKS offered residential, mobile, and data center proxies on shared or dedicated basis.
Take down
On June 16, 2022, the US Department of Justice announced the take down of RSOCKS . The website displayed a message that it had been seized. The take down was in partnership with the governments of Germany, the Netherlands and the United Kingdom. The Rsocks operation was the largest of its kind and used millions of hacked devices and botnets around the world.
The FBI stated that the operation was run by a "highly sophisticated Russia-based cybercrime organization." However it did not disclose any specific suspect names, nor did they disclose that anyone was arrested.
According to the DoJ, anyone could buy proxies from RSOCKS and pay for access to a pool of proxies for a specified time period, with prices ranging from $30 per day for access to 2,000 proxies to $200 per day for access to 90,000 proxies.
See also
Proxy server
HMA (VPN)
References
Computer companies established in 2014
Virtual private network services
Proxy servers
Russian companies established in 2014 |
https://en.wikipedia.org/wiki/Land%20bridges%20of%20Japan | Due to changes in sea level, Japan has at various times been connected to the continent by , with continental Russia to the north via the Sōya Strait, Sakhalin, and the Mamiya Strait, and with the Korean Peninsula to the southwest, via the Tsushima Strait and Korea Strait. Land bridges also connected the Japanese Islands with each other. These land bridges enabled the migration of terrestrial fauna from the continent and their dispersal within Japan.
Geological background
Around 25 million years ago, the Sea of Japan began to open, separating Japan from the continent and giving rise to the Japanese island arc system of today. The Sea of Japan as a back-arc basin was open both to the northeast and to the southwest by 14 Ma, while marine transgression further contributed to the isolation and insulation of Japan. Due to the level of tectonic activity in the area and significant subsidence of the Japanese Islands since the Miocene, exact quantification of historic sea level changes is problematic.
Northern land bridge
Based on current depths, a reduction in sea level would be sufficient to connect Hokkaidō with the mainland. The and — sometimes referred to jointly as the or Sakhalin land bridge — are thus thought to have been in place during most glacial periods.
Western land bridge
With a minimum depth of and based in part on the appearance in Japan of Proboscidea, the and — sometimes referred to jointly as the Korean land bridge — are understood to have been in place at 1.2 Ma, 0.63 Ma, and 0.43 Ma.
Kuril land bridge
A has been insufficient to connect Hokkaidō with Kamchatka during the Quaternary. The southern Kuril land bridge that connected Kunashiri and the Lesser Kurils to Hokkaidō during the Early Holocene was insufficient with the rising sea level at around 6,000 BP.
Seto land bridges
Honshū, Shikoku, and Kyūshū are separated by shallow straits that rarely exceed in depth. Consequently, they were frequently connected together as a single land mass. |
https://en.wikipedia.org/wiki/Midjourney | Midjourney is a generative artificial intelligence program and service created and hosted by San Francisco–based independent research lab Midjourney, Inc. Midjourney generates images from natural language descriptions, called "prompts", similar to OpenAI's DALL-E and Stability AI's Stable Diffusion.
The tool is currently in open beta, which it entered on July 12, 2022. The Midjourney team is led by David Holz, who co-founded Leap Motion. Holz told The Register in August 2022 that the company was already profitable. Users create artwork with Midjourney using Discord bot commands.
History
Midjourney, Inc. was founded in San Francisco, California, by David Holz, previously co-founder of Leap Motion. The Midjourney image generation platform first entered open beta on July 12, 2022. However, on March 14, 2022, the Discord server launched with a request to post high-quality photographs to Twitter/Reddit for system's training.
Model versions
The company has been working on improving its algorithms, releasing new model versions every few months. Version 2 of their algorithm was launched in April 2022 and version 3 on July 25. On November 5, 2022, the alpha iteration of version 4 was released to users and on March 15, 2023, the alpha iteration of version 5 was released. The 5.1 model is more 'opinionated' than version 5, applying more of its own stylization to images, while the 5.1 RAW model adds improvement while working better with more literal prompts. After version 5.2 is released with a increasingly better image quality.
|}
Functionality
Midjourney is currently only accessible through a Discord bot on their official Discord server, by direct messaging the bot, or by inviting the bot to a third party server. To generate images, users use the command and type in a prompt; the bot then returns a set of four images. Users may then choose which images they want to upscale. Midjourney is also working on a web interface.
Beyond the command, Midjourney offers many othe |
https://en.wikipedia.org/wiki/Hyperpalatable%20food | Hyperpalatable food (HPF) combines high levels of fat, sugar, sodium, or carbohydrates to trigger the brain's reward system, encouraging excessive eating. The concept of hyperpalatability is foundational to ultra-processed foods, which are usually engineered to have enjoyable qualities of sweetness, saltiness, or richness. Hyperpalatable foods can stimulate the release of metabolic, stress, and appetite hormones that play a role in cravings and may interfere with the body's ability to regulate appetite and satiety.
Definition
Researchers have proposed specific criteria for hyperpalatability based on the percentage of calories from fat, sugar, and salt in a food item. A team at the University of Kansas analysed databases from the United States Department of Agriculture to identify the most common descriptive definitions for hyperpalatable foods. They found three combinations that most frequently defined hyperpalatable foods:
Foods with more than 25 per cent of calories from fat plus more than 0.30 per cent sodium by weight (often including bacon, cheese, and salami).
Foods with more than 20 per cent of calories from fat and more than 20 per cent of calories from simple sugars (typically cake, ice cream, chocolate).
Foods with more than 40 per cent of calories from carbohydrates and more than 0.20 per cent sodium by weight (many brands of pretzels, popcorn, and crackers).
The proportion of foods sold in the United States fitting this definition of hyperpalatable increased by twenty per cent between 1988 and 2018.
Neurobiology
Hyperpalatable foods have been shown to activate the reward regions of the brain, such as the hypothalamus, that influence food choices and eating behaviours. When these foods are consumed, the neurons in the reward region become very active, creating highly positive feelings of pleasure so that people want to keep seeking these foods regularly. Hyperpalatable foods can also modify the release of hormones that regulate appetite, stress, |
https://en.wikipedia.org/wiki/Secure%20element | A secure element (SE) is a secure operating system (OS) in a tamper-resistant processor chip or secure component. It can protect assets (root of trust, sensitive data, keys, certificates, applications) against high level software and hardware attacks. Applications that process this sensitive data on an SE are isolated and so operate within a controlled environment not impacted by software (including possible malware) found elsewhere on the OS.
The hardware and embedded software meet the requirements of the Security IC Platform Protection Profile [PP 0084] including resistance to physical tampering scenarios described within it. More than 96 billion secure elements have been produced and shipped between 2010 and 2021.
SEs exist in different form factors; as devices such as smart card, SIM/UICC, smart microSD, or as part of a larger device as an embedded or integrated SE. SEs are an evolution of the traditional chip that was powering smart cards, which have been adapted to suit the needs of numerous use cases, such as smartphones, tablets, set top boxes, wearables, connected cars, and other internet of things (IoT) devices. The technology is widely used by technology firms such as Oracle, Apple and Samsung.
SEs provide secure isolation, storage and processing for applications (called applets) they host while being isolated from the external world (e.g. rich OS and application processor when embedded in a smartphone) and from other applications running on the SE. Java Card and MULTOS are the most deployed standardized multi-application operating systems currently used to develop applications running on SE.
Since 1999, GlobalPlatform has been the body responsible for standardizing secure element technologies to support a dynamic model of application management in a multi actor model. GlobalPlatform also runs Functional and Security Certification programmes for secure elements, and hosts a list of Functional Certified and Security Certified products. GlobalPlatform t |
https://en.wikipedia.org/wiki/Geizhals | Geizhals, also known under the English name Skinflint Price Comparison is a feature and price comparison website, focusing on, but not limited to, the German speaking area. The product filters are managed by an editorial board. For notebooks it has 150 filters, and offers for each product type up to more than 100 different offers from online stores.
Scope
Usage
The database of products is set up by editorial members. Consumers can find hardware (e.g. notebooks, smartphones, cables, printers), software, electronics,household appliances, sports goods, and drugstore wares. It offers filtering for technical features, such as number and version of USB-ports or version of the operating system, specification sheets, test reports, product ratings, price historiy, warehouse stock, shipping costs and rating of the traders. Geizhals is an intermediary between consumer and traders, helping consumers find products and vendors for it.
Importance
Geizhals is an Austrian company focusing on the Austrian, German, British and Polish customers. Geizhals.at has monthly about 3.5 million unique clients, 2.4 million products, 280000 traders. Geizhals.at together with Geizhals.de has 12 Mio. visitors. In July 2019 Geizhals.at was on the 41 Position in the Austrian Alexa Rank. Alongside Herold (white pages and yellow pages) and GMX (Mail) – Geizhals is one of the most commonly visited Austrian service providers, and is the marked-leader for price-comparisons in Austria.
History
Geizhals was founded in 1997 by Marinos J. Yannikos, who was a scientist at TU Wien, under the name Hardware-Preisvergleich and focussed on traders around Vienna. Since 2005 Geizhals has a cooperation with heise, and in 2013 and 2014, Heinz Heise bought 75% of Internet Services AG shares, and since June 2021 it has indirect 100% of the shares.
Since June 1999 Geizhals provides price comparisons over the website geizhals.at, and is a trademark since 2001.
Preisvergleich Internet Services AG was founded in Jun |
https://en.wikipedia.org/wiki/Milnesium%20alpigenum | Milnesium alpigenum is a species of tardigrade that falls under the Tardigrada phylum. Like its taxonomic relatives it is an omnivorous predator that feeds on other small organisms, such as algae, rotifers, and nematodes. M. alpigenum was discovered by Christian Gottfried Ehrenberg in 1853. It is very closely related to Milnesium tardigradum along with many other species from the Milnesium genus.
History and taxonomy
M. alpigenum was first suggested to be an independent species by Christian Gottfried Ehrenberg in 1853. However immediately it was turned down to be a valid species due to its extreme morphological similarity to Milnesium tardigradum (Doyère, 1840). This was also because Intraspecific phenotypic variation was thought to be very large between species of tardigrade, and that each species was vastly physiologically different from one another. However, in the early 20th century more research was conducted in relation to the morphological differences within the Milnesium and other tardigrade genuses. It was discovered that any differences between species was very subtle and that all tardigrade were particularly sensitive to reproductive isolating mechanisms.
For almost a century (1853 - 1928) M. alpigenum remained Invalid. In 1928 zoologist Ernst Marcus conducted an experiment, synonymizing M. alpigenum along with Milnesium quadrifidum against M. tardigradum. Marcus concluded small morphological differences in claw configuration between the three species, along with statistical morphometry and DNA sequencing differences. These discoveries cemented M. alpigenum as a valid species and its taxonomic status was confirmed. Due to the sympatric nature of the speciation within most of the Milnesium Genus, the pre-zygotic isolating factors between M. alpigenum and M. tardigradum are currently unknown. Thus it is predicted that these species do breed, but are unable to produce viable offspring due to post-zygotic factors.
Phylogenetically M. alpigenum branches aw |
https://en.wikipedia.org/wiki/IEEE%20Photonics%20Journal | IEEE Photonics Journal is a bimonthly peer-reviewed open access scientific journal published by the Institute of Electrical and Electronics Engineers (IEEE). It was established in 2009. The editor-in-chief is Gabriella Cincotti of Roma Tre University.
Abstracting and indexing
The journal is abstracted and indexed in:
PubMed
Science Citation Index Expanded
Scopus
According to the Journal Citation Reports, the journal has a 2021 impact factor of 2.250, ranking it 164th out of 276 journals in the category "Engineering, Electrical & Electronic" and 60th out of 101 journals in the category "Optics".
References
External links
Optics journals
IEEE academic journals
Academic journals established in 2009
Bimonthly journals
English-language journals
Open access journals
Creative Commons-licensed journals |
https://en.wikipedia.org/wiki/NewspaperSG | NewspaperSG is an online newspaper archive launched in 2010 containing newspapers distributed in Singapore, including those published in the 19th century.
History
The National Library Board and Singapore Press Holdings signed an agreement in 2007 to make digitised articles of The Straits Times available for public access at NLB libraries. NewspaperSG was launched on 28 January 2010. At the archive's launch, it included 14 newspapers, including the New Nation, Sin Chew Jit Poh, The Straits Times, the Singapore Weekly Herald, the Straits Mail, The Business Times, today, the Malayan Saturday Post, the Straits Observer, and the Straits Telegraph and Daily Advertiser.
In December 2017, six more newspapers were added to the archive, the Syonan Shimbun, Comrade, the Indian Daily Mail, the Malaya Tribune, the Morning Tribune, and the Sunday Tribune bringing the number of newspapers on the site to 41.
References
Singaporean websites
Internet properties established in 2010
2010 establishments in Singapore
SPH Media
Online archives
Historic newspaper digitization projects
Geographic region-oriented digital libraries |
https://en.wikipedia.org/wiki/Edmund%20Harriss | Edmund Orme Harriss (born 1976 in Worcester, UK) is a British mathematician, writer and artist. Since 2010 he has been at the Fulbright College of Arts & Sciences at The University of Arkansas in Fayetteville, Arkansas where he is an Assistant Professor of Arts & Sciences (ARSC) and Mathematical Sciences (MASC). He does research in the Geometry of Tilings and Patterns, a branch of Convex and Discrete Geometry. He is the discoverer of the spiral that bears his name.
Education and career
Harriss earned a Master of Mathematics at the University of Warwick (2000) and then obtained his PhD at Imperial College London (2003) with the dissertation "On Canonical Substitution Tilings" under Jeroen Lamb.
Harriss has been a speaker at FSCONS, a Nordic Free software conference.
Harriss is active on Numberphile where he has given talks on Heesch numbers, Tribonacci numbers, the Rauzy fractal and the plastic ratio.
In May and June 2020 Harriss was a visiting fellow at The Institute for Advanced Study of Aix-Marseille University (IMéRA) where he studied the possibilities of visual and spatial models and animations to illustrate a wide variety of mathematical ideas.
Mathematical art
The Gauss–Bonnet theorem gives the relationship between the curvature of a surface and the amount of turning as you traverse the surface’s boundary. Harriss used this theorem to invent shapes called Curvahedra which were then incorporated into sculpture. Scientists at MIT are investigating ways in which curvahedra may have applications in construction.
Art and mathematics are intertwined in Harris's work. He uses public art to demonstrate deep mathematical ideas and his academic work frequently involves the visualization of mathematics. Mathematically themed sculptures by Harriss have been installed at Oklahoma State University, at the University of Arkansas, and at Imperial College London.
Combining his interest in art and mathematical tilings he is one of 24 mathematicians and artists who make |
https://en.wikipedia.org/wiki/List%20of%20discontinued%20x86%20instructions | Instructions that have at some point been present as documented instructions in one or more x86 processors, but where the processor series containing the instructions are discontinued or superseded, with no known plans to reintroduce the instructions.
Intel instructions
i386 instructions
The following instructions were introduced in the Intel 80386, but later discontinued:
Itanium instructions
These instructions are only present in the x86 operation mode of early Intel Itanium processors with hardware support for x86. This support was added in "Merced" and removed in "Montecito", replaced with software emulation.
MPX instructions
These instructions were introduced in 6th generation Intel Core "Skylake" CPUs. The last CPU generation to support them was the 9th generation Core "Coffee Lake" CPUs.
Intel MPX adds 4 new registers, BND0 to BND3, that each contains a pair of addresses. MPX also defines a bounds-table as a 2-level directory/table data structure in memory that contains sets of upper/lower bounds.
Hardware Lock Elision
The Hardware Lock Elision feature of Intel TSX is marked in the Intel SDM as removed from 2019 onwards. This feature took the form of two instruction prefixes, XACQUIRE and XRELEASE, that could be attached to memory atomics/stores to elide the memory locking that they represent.
VP2Intersect instructions
The VP2INTERSECT instructions (an AVX-512 subset) were introduced in Tiger Lake (11th generation mobile Core processors), but were never officially supported on any other processor, and are now considered deprecated.
Instructions specific to Xeon Phi processors
"Knights Corner" instructions
The first generation Xeon Phi processors, codenamed "Knights Corner" (KNC), supported a large number of instructions that are not seen in any later x86 processor. An instruction reference is available − the instructions/opcodes unique to KNC are the ones with VEX and MVEX prefixes (except for the KMOV, KNOT and KORTEST instructions − thes |
https://en.wikipedia.org/wiki/ArtFacts.Net | ArtFacts.Net is the world's largest online art database, founded in 2001 by Stine Albertsen and Marek Claassen. The company is registered as a Limited Company (Ltd.) in Great Britain. ArtFacts has been collecting, archiving, publishing and analyzing data on the art market worldwide since the company was founded, for example in the so-called Artist Ranking
History
Marek Claassen developed in cooperation with the Federal Association of German Galleries and Art Dealers e. V. and the Art Cologne trade fair database-driven websites, and systems for quickly creating exhibition catalogues. This was later done with GISI (Gallery Information System on the Internet) a virtual exhibition and archive system for galleries in Berlin, the forerunner of today's Artfacts art platform. Stine Albertsen (born 1978 in Copenhagen ) a co-founder of Artfacts, had initially worked for the Danish Embassy in Berlin before co-founding Artfacts in 2001.
With the founding of ArtFacts in 2001, the company began to systematically collect data on the (primary) art market . The focus is on the exhibition activities of artists; institutions (art associations, museums or art galleries, etc.). And galleries report their individual and group exhibitions to ArtFacts after which ArtFacts aggregates them for the respective artists and exhibition institutions into an exhibition history. In 2004, the so-called ArtFacts Ranking was introduced, which measures the artists' exhibition activities and illustrates them with graphs. The years before the global financial crisis caused the art market and the number of galleries to grow rapidly worldwide. In this context, ArtFacts developed into an international art market platform with 900,000 unique visitors per month.
With the financial market crisis, the art market also got into trouble, and as a result many galleries closed or cut their costs. Galleries, which were previously ArtFacts' main customers, declined, and thereby endangered the company not only finan |
https://en.wikipedia.org/wiki/IEEE%20Transactions%20on%20Robotics | IEEE Transactions on Robotics is a bimonthly peer-reviewed scientific journal published by the Institute of Electrical and Electronics Engineers (IEEE). It covers all aspects of robotics and is sponsored by the IEEE Robotics and Automation Society. The editor-in-chief is Kevin Lynch (Northwestern University).
Publication History
The journal was established in 1985 as the IEEE Journal on Robotics and Automation, but changed name in 1989 to IEEE Transactions on Robotics and Automation. In 2004 the journal split into IEEE Transactions on Automation Science and Engineering and IEEE Transactions on Robotics.
Abstracting and indexing
The journal is abstracted and indexed in:
Science Citation Index Expanded
Scopus
According to the Journal Citation Reports, the journal has a 2021 impact factor of 6.835, ranking it 7th out of 30 journals in the category "Robotics"
References
External links
Robotics journals
IEEE academic journals
Academic journals established in 1985
Bimonthly journals
English-language journals |
https://en.wikipedia.org/wiki/Aragats%20%28computer%29 | Aragats is a first-generation electronic computer developed at the Yerevan Computer Research and Development Institute (YerNIIMM). The elemental base is vacuum tubes. The work supervisor is B.E.Khaikin.
Development continued from 1958 to 1960. In total, 4 copies of the machine were produced.
The basis for the development was the M-3 computer, developed by the team of I. S. Bruk. Simultaneously with the work on "Aragats", and also on the basis of the M-3 scheme, the YerNIIMM developed the Razdan computer, based on a semiconductor element base. To assist in the creation of Razdan and Aragats, several employees of the Computing Center of the Academy of Sciences were seconded to Yerevan, the head of the group was A.P. Merenkov.
The head copy was acquired by Perm State University in 1961, although it was originally created for Leningrad State University. It was located on the basement floor of the educational building No. 2, and worked until 1973, until it was decommissioned. At the moment, the brass emblem from the computer is stored in the university museum.
Specifications
RAM – on ferrite cores
Information storage devices:
Magnetic drum
Magnetic tape
Punched tape
References
External links
Documents in the archive of Academician A. P. Ershov
A Brief History of YerNIIMM
Computer-related introductions in 1960
Soviet computer systems
Yerevan Computer Research and Development Institute |
https://en.wikipedia.org/wiki/DNF%20Duel | DNF Duel is a fighting video game co-developed by Arc System Works, Eighting and Neople, and published by Nexon. It is a spin-off of the Dungeon & Fighter series and it was released for the Microsoft Windows, PlayStation 4, and PlayStation 5 on 28 June 2022. A Nintendo Switch port was released on 20 April 2023.
Gameplay
Gameplay is similar to other fighting games developed by Arc System Works but with more simplified mechanics. Like some previous games, the game features simplified inputs to allow new players to be able to get into the game without being put off by complicated controls. One big difference in this game is the use of an MP bar that is used to activate certain attacks, called "skills" in the game, similar to the main series games and other RPGs. Though the bar disappears after each use of a skill, it slowly regenerates over time, unlike the use of special meters found in other fighting games.
Characters
The base roster includes 15 playable characters with 1 additional character being unlockable through gameplay directly coming from the main series. In December 2022, its first downloadable content character, Spectre, was announced alongside a season pass with four additional DLC fighters.
Plot
The story of DNF Duel is set in an astral plane full of gates, one of many alternate realities created in the aftermath of the destructive event known as the Great Metastasis. Each gates connects to other places in time and space exist, allowing its inhabitants to cross to other dimensions at will. Suddenly, the gates malfunctions and ultimately shuts down altogether, in an event known as "The Day the Doors Closed", and as their powers faded into myth the gates became known as "Wonders".
Moving forward to the present day, the fates of several adventures and warriors begin to converge in the Principality of Bel Myre. Each arms with their own "Wills", the special power that hides its true potential has recently awakened the Wonders once again, and upholds the |
https://en.wikipedia.org/wiki/Razdan%20%28computer%29 | Razdan is a family of general-purpose digital electronic computers created from 1958–1965 at the Yerevan Computer Research and Development Institute (YerNIIMM). The computer has a semiconductor element base, that is, it belongs to computers of the second generation.
Razdan
The machine has been developed since 1958, based on the documentation for the M-3 machine (created under the direction of N.Ya.Matyukhin in the laboratory of I. S. Bruk). The head of the work is E. L. Brusilovsky.
In 1960, the Razdan machine was handed over to the State Commission.
Machine specifications
Command system: two-address, 17 basic commands, each of which has 8 modifications
Number system: binary, the word consists of 36 binary digits, of which 29 are the mantissa, 1 is the sign, 5 is the order, 1 is the sign of the order.
Speed: 5000 ops/sec.
Power consumption: approx. 3 kW from AC 220/380 V, 50 Hz.
Occupied area: 20 sq. m.
In parallel with the assembly and adjustment of Razdan, in the same research institute, work was underway on the creation of the "Aragats" computer, which has the same architecture. To assist in the creation of Razdan and Aragats, several employees of the Computing Center of the Academy of Sciences were seconded to Yerevan, the head of the group was A. P. Merenkov.
Razdan-2
Serially produced since 1961.
Entering and storing data and code is on perforated 35mm film.
Razdan-3
Put into operation in 1965, serial production of the machine began in 1966.
Used as a control computer for working with scientific equipment. in nuclear research.
There were several scientific programming languages compiled for it such as Fortran and Algol-60.
On the basis of this model, in 1967–1977 YerNIIMM developed a system for automating the process of selling railway tickets – the Marshrut-1 complex (chief designer – A. Kuchukyan). This complex was used for a long time at several railway stations in Moscow (and later formed the basis of the first generation Express automat |
https://en.wikipedia.org/wiki/Gobuster | Gobuster is a software tool for brute forcing directories on web servers. It does not come preinstalled with Kali Linux.
See also
Nikto
References
External links
Free security software
Computer security software |
https://en.wikipedia.org/wiki/Hydrogen%20sulfide%20chemosynthesis | Hydrogen sulfide chemosynthesis is a form of chemosynthesis which uses hydrogen sulfide. It is common in hydrothermal vent microbial communities Due to the lack of light in these environments this is predominant over photosynthesis
Giant tube worms use bacteria in their trophosome to fix carbon dioxide (using hydrogen sulfide as their energy source) and produce sugars and amino acids. Some reactions produce sulfur:
hydrogen sulfide chemosynthesis:
18H2S + 6CO2 + 3O2 → C6H12O6 (carbohydrate) + 12H2O + 18S
In the above process, hydrogen sulfide serves as a source of electrons for the reaction. Instead of releasing oxygen gas while fixing carbon dioxide as in photosynthesis, hydrogen sulfide chemosynthesis produces solid globules of sulfur in the process.
Mechanism of Action
In deep sea environments, different organisms have been observed to have the ability to oxidize reduced compounds such as hydrogen sulfide. Oxidation is the loss of electrons in a chemical reaction. Most chemosynthetic bacteria form symbiotic associations with other small eukaryotes The electrons that are released from hydrogen sulfide will provide the energy to sustain a proton gradient across the bacterial cytoplasmic membrane. This movement of protons will eventually result in the production of adenosine triphosphate. The amount of energy derived from the process is also dependent on the type of final electron acceptor.
Other Examples Of Chemosynthetic Organisms (using H2S as electron donor)
Across the world, researchers have observed different organisms in various locations capable of carrying out the process. Yang and colleagues in 2011 surveyed five Yellowstone thermal springs of varying depths and observed that the distribution of chemosynthetic microbes coincided with temperature as Sulfurihydrogenibiom was found at higher temperatures while Thiovirga inhabited cooler waters Miyazaki et.al., in 2020 also found an endosymbiont capable of hydrogen sulfide chemosynthesis which conta |
https://en.wikipedia.org/wiki/Random%20pulse-width%20modulation | Random pulse-width modulation (RPWM) is a modulation technique introduced for mitigating electromagnetic interference (EMI) of power converters by spreading the energy of the noise signal over a wider bandwidth, so that there are no significant peaks of the noise. This is achieved by randomly varying the main parameters of the pulse-width modulation signal.
Description
Electromagnetic interference (EMI) filters have been widely used for filtering out the conducted emissions generated by power converters since their advent. However, when size is of great concern like in aircraft and automobile applications, one of the practical solutions to suppress conducted emissions is to use random pulse-width modulation (RPWM). In conventional pulse-width modulation (PWM) schemes, the harmonics power is concentrated on the deterministic or known frequencies with a significant magnitude, which leads to mechanical vibration, noise, and EMI. However, by applying randomness to the conventional PWM scheme, the harmonic power will spread out so that no harmonic of significant magnitude exists, and peak harmonics at discrete frequency are significantly reduced.
In RPWM, one of the switching parameters of the PWM signal, such as switching frequency, pulse position and duty cycle are varied randomly in order to spread the energy of the PWM signal. Hence, depending on the parameter which is made random, RPWM can be classified as random frequency modulation (RFM), random pulse-position modulation (RPPM) and random duty-cycle modulation (RDCM).
The properties of RPWM can be investigated further by looking at the power spectral density (PSD). For conventional PWM, the PSD can be directly determined from the Fourier Series expansion of the PWM signal. However, the PSD of the RPWM signals can be described only by a probabilistic level using the theory of stochastic processes such as wide-sense stationary (WSS) random processes.
RFM
Among the different RPWM techniques, RFM (random frequen |
https://en.wikipedia.org/wiki/Critical%20embankment%20velocity | Critical embankment velocity or critical speed, in transportation engineering, is the velocity value of the upper moving vehicle that causes the severe vibration of the embankment and the nearby ground. This concept and the prediction method was put forward by scholars in civil engineering communities before 1980 and stressed and exhaustively studied by Krylov in 1994 based on the Green function method and predicted more accurately using other methods in the following. When the vehicles such as high-speed trains or airplanes move approaching or beyond this critical velocity (firstly regarded as the Rayleigh wave speed and later obtained by sophisticated calculation or tests), the vibration magnitudes of vehicles and nearby ground increase rapidly and possibly lead to the damage to the passengers and the neighboring residents. This relevant unexpected phenomenon is called the ground vibration boom from 1997 when it was observed in Sweden for the first time.
This critical velocity is similar to that of sound which results in the sonic boom. However, there are some differences in terms of the transferring medium. The critical velocity of sound just changes in a small range, although the air quality and the interaction between the jet flight and atmosphere affect the critical velocity. But the embankment including the filling layers and ground soil underneath surface is a typically random medium. Such complex soil-structure coupling vibration system may have several critical velocity values. Therefore, the critical embankment velocity belongs to the general concept, the value of which is not constant and should be acquired by calculation or experiment in accordance with certain engineerings nowadays.
Mechanism
The wave superposition
Under the ideal assumptions, when the moving loads are imposed on the surface of the embankment, they will induce sub-waves which propagate inside and along the surface of the embankment. If the velocity of the moving loads is less th |
https://en.wikipedia.org/wiki/Multiresolution%20Fourier%20transform | Multiresolution Fourier Transform is an integral fourier transform that represents a specific wavelet-like transform with a fully scalable modulated window, but not all possible translations.
Comparison of Fourier transform and wavelet transform
The Fourier transform is one of the most common approaches when it comes to digital signal processing and signal analysis. It represents a signal through sine and cosine functions thus transforming the time-domain into frequency-domain. A disadvantage of the Fourier transform is that both sine and cosine function are defined in the whole time plane, meaning that there is no time resolution. Certain variants of Fourier transform, such as Short Time Fourier Transform (STFT) utilize a window for sampling, but the window length is fixed meaning that the results will be satisfactory only for either low or high frequency components. Fast fourier transform (FFT) is used often because of its computational speed, but shows better results for stationary signals.
On the other hand, the wavelet transform can improve all the aforementioned downsides. It preserves both time and frequency information and it uses a window of variable length, meaning that both low and high frequency components will be derived with higher accuracy than the Fourier transform. The wavelet transform also shows better results in transient states. Multiresolution Fourier Transform leverages the advantageous properties of the wavelet transform and uses them for Fourier transform.
Definition
Let be a function that has its Fourier transform defined as
The time line can be split by intervals of length π/ω with centers at integer multiples of π/ω
Then, new transforms of function can be introduced
and
where , when n is an integer.
Functions and can be used in order to define the complex Fourier transform
Then, set of points in the frequency-time plane is defined for the computation of the introduced transforms
|
https://en.wikipedia.org/wiki/Zinc%20in%20biology | Zinc is an essential trace element for humans and other animals, for plants and for microorganisms. Zinc is required for the function of over 300 enzymes and 1000 transcription factors, and is stored and transferred in metallothioneins. It is the second most abundant trace metal in humans after iron and it is the only metal which appears in all enzyme classes.
In proteins, zinc ions are often coordinated to the amino acid side chains of aspartic acid, glutamic acid, cysteine and histidine. The theoretical and computational description of this zinc binding in proteins (as well as that of other transition metals) is difficult.
Roughly grams of zinc are distributed throughout the human body. Most zinc is in the brain, muscle, bones, kidney, and liver, with the highest concentrations in the prostate and parts of the eye. Semen is particularly rich in zinc, a key factor in prostate gland function and reproductive organ growth.
Zinc homeostasis of the body is mainly controlled by the intestine. Here, ZIP4 and especially TRPM7 were linked to intestinal zinc uptake essential for postnatal survival.
In humans, the biological roles of zinc are ubiquitous. It interacts with "a wide range of organic ligands", and has roles in the metabolism of RNA and DNA, signal transduction, and gene expression. It also regulates apoptosis. A review from 2015 indicated that about 10% of human proteins (~3000) bind zinc, in addition to hundreds more that transport and traffic zinc; a similar in silico study in the plant Arabidopsis thaliana found 2367 zinc-related proteins.
In the brain, zinc is stored in specific synaptic vesicles by glutamatergic neurons and can modulate neuronal excitability. It plays a key role in synaptic plasticity and so in learning. Zinc homeostasis also plays a critical role in the functional regulation of the central nervous system. Dysregulation of zinc homeostasis in the central nervous system that results in excessive synaptic zinc concentrations is believed |
https://en.wikipedia.org/wiki/Molybdenum%20in%20biology | Molybdenum is an essential element in most organisms. It is most notably present in nitrogenase which is an essential part of nitrogen fixation.
Mo-containing enzymes
Molybdenum is an essential element in most organisms; a 2008 research paper speculated that a scarcity of molybdenum in the Earth's early oceans may have strongly influenced the evolution of eukaryotic life (which includes all plants and animals).
At least 50 molybdenum-containing enzymes have been identified, mostly in bacteria. Those enzymes include aldehyde oxidase, sulfite oxidase and xanthine oxidase. With one exception, Mo in proteins is bound by molybdopterin to give the molybdenum cofactor. The only known exception is nitrogenase, which uses the FeMoco cofactor, which has the formula Fe7MoS9C.
In terms of function, molybdoenzymes catalyze the oxidation and sometimes reduction of certain small molecules in the process of regulating nitrogen, sulfur, and carbon. In some animals, and in humans, the oxidation of xanthine to uric acid, a process of purine catabolism, is catalyzed by xanthine oxidase, a molybdenum-containing enzyme. The activity of xanthine oxidase is directly proportional to the amount of molybdenum in the body. An extremely high concentration of molybdenum reverses the trend and can inhibit purine catabolism and other processes. Molybdenum concentration also affects protein synthesis, metabolism, and growth.
Mo is a component in most nitrogenases. Among molybdoenzymes, nitrogenases are unique in lacking the molybdopterin. Nitrogenases catalyze the production of ammonia from atmospheric nitrogen:
The biosynthesis of the FeMoco active site is highly complex.
Molybdate is transported in the body as MoO42−.
Human metabolism and deficiency
Molybdenum is an essential trace dietary element. Four mammalian Mo-dependent enzymes are known, all of them harboring a pterin-based molybdenum cofactor (Moco) in their active site: sulfite oxidase, xanthine oxidoreductase, aldehyde oxida |
https://en.wikipedia.org/wiki/BusKill | BusKill is an open-source hardware and software project that designs computer kill cords to protect the confidentiality of the system's data from physical theft. The hardware designs are licensed CC BY-SA and the software is licensed GPLv3. BusKill cables are available commercially from the official website or through authorized distributors.
The name BusKill is an amalgamation of "Bus" from USB and "Kill" from kill cord.
History
The first computer kill cord was built by Michael Altfield in 2017
The term "BusKill" was coined by Altfield in January 2020 when publishing the first BusKill build and udev usage instructions (Linux-only), and it was ported by cyberkryption from Linux to Windows a couple weeks later. The project's official website launched the following month.
The first OS X version of the BusKill app was released in May 2020 by Steven Johnson.
A cross-platform rewrite of the software based on Kivy was released in August 2020 with support for Linux, OS X, and Windows.
In December 2021, Alt Shift International OÜ ran a crowdfunding campaign to manufacture BusKill cables on Crowd Supply. The campaign raised $18,507 by January 2022.
Hardware
The BusKill cable is a kill cord that physically tethers a user to their computer with a USB cable.
One end of the cable plugs into a computer. The other end of the cable is a carabiner that attaches to the user.
In the middle of the cable is a magnetic breakaway coupler, to allow the cable to be safely separated at any angle without physically damaging the computer or the user.
A 3D-printable hardware BusKill cable is currently under development.
Software
The BusKill project maintains a cross-platform GUI app that can either lock the screen or shutdown the computer when the cable's connection to the computer is severed and the app is in the "armed" state.
Use
If the computer is separated from the user, then a magnetic breakaway in the cable causes a USB hotplug removal event to execute a trigger in th |
https://en.wikipedia.org/wiki/Cobalt%20in%20biology | Cobalt is essential to the metabolism of all animals. It is a key constituent of cobalamin, also known as vitamin B, the primary biological reservoir of cobalt as an ultratrace element. Bacteria in the stomachs of ruminant animals convert cobalt salts into vitamin B, a compound which can only be produced by bacteria or archaea. A minimal presence of cobalt in soils therefore markedly improves the health of grazing animals, and an uptake of 0.20 mg/kg a day is recommended because they have no other source of vitamin B.
Proteins based on cobalamin use corrin to hold the cobalt. Coenzyme B12 features a reactive C-Co bond that participates in the reactions. In humans, B12 has two types of alkyl ligand: methyl and adenosyl. MeB12 promotes methyl (−CH3) group transfers. The adenosyl version of B12 catalyzes rearrangements in which a hydrogen atom is directly transferred between two adjacent atoms with concomitant exchange of the second substituent, X, which may be a carbon atom with substituents, an oxygen atom of an alcohol, or an amine. Methylmalonyl coenzyme A mutase (MUT) converts MMl-CoA to Su-CoA, an important step in the extraction of energy from proteins and fats.
Although far less common than other metalloproteins (e.g. those of zinc and iron), other cobaltoproteins are known besides B12. These proteins include methionine aminopeptidase 2, an enzyme that occurs in humans and other mammals that does not use the corrin ring of B12, but binds cobalt directly. Another non-corrin cobalt enzyme is nitrile hydratase, an enzyme in bacteria that metabolizes nitriles.
Cobalt deficiency
In humans, consumption of cobalt-containing vitamin B12 meets all needs for cobalt. For cattle and sheep, which meet vitamin B12 needs via synthesis by resident bacteria in the rumen, there is a function for inorganic cobalt. In the early 20th century, during the development of farming on the North Island Volcanic Plateau of New Zealand, cattle suffered from what was termed "bush sickne |
https://en.wikipedia.org/wiki/Maximum%20inner-product%20search | Maximum inner-product search (MIPS) is a search problem, with a corresponding class of search algorithms which attempt to maximise the inner product between a query and the data items to be retrieved. MIPS algorithms are used in a wide variety of big data applications, including recommendation algorithms and machine learning.
Formally, for a database of vectors defined over a set of labels in an inner product space with an inner product defined on it, MIPS search can be defined as the problem of determining
for a given query .
Although there is an obvious linear-time implementation, it is generally too slow to be used on practical problems. However, efficient algorithms exist to speed up MIPS search.
Under the assumption of all vectors in the set having constant norm, MIPS can be viewed as equivalent to a nearest neighbor search (NNS) problem in which maximizing the inner product is equivalent to minimizing the corresponding distance metric in the NNS problem. Like other forms of NNS, MIPS algorithms may be approximate or exact.
MIPS search is used as part of DeepMind's RETRO algorithm.
References
See also
Nearest neighbor search
Search algorithms
Computational problems
Machine learning |
https://en.wikipedia.org/wiki/Biodiversity%20and%20Conservation | Biodiversity and Conservation is a peer-reviewed scientific journal covering all aspects of biological diversity, its conservation, and sustainable use. It was established in 1992 and is published by Springer Science+Business Media.
Abstracting and indexing
The journal is abstracted and indexed in:
AGRICOLA
BIOSIS Previews
Biological Abstracts
CAB Abstracts
According to the Journal Citation Reports, the journal has a 2021 impact factor of 4.296.
References
External links
English-language journals
Publications with year of establishment missing
Springer Science+Business Media academic journals
Conservation biology
Ecology journals |
https://en.wikipedia.org/wiki/Akira%20Ishimaru | Akira Ishimaru (; born March 16, 1928) is a Japanese-American electrical engineer and professor emeritus at Department of Electrical and Computer Engineering at University of Washington. He is best known for his contributions to the theory of wave scattering in random media.
Biography
Akira Ishimaru was born on March 16, 1928, in Fukuoka, Japan. He received his bachelor's degree from University of Tokyo and Ph.D. degree in electrical engineering from University of Washington, respectively in 1951 and 1958. During his doctoral studies, he was supervised by Gedaliah Held. From 1951 to 1952, he worked at Electrotechnical Laboratory in Tanashi, Tokyo. In 1956, he was employed at Bell Labs. In 1958, he joined the faculty of the Department of Electrical Engineering of the University of Washington, where he was also an adjunct professor of applied mathematics. He became a professor emeritus at the institution in 1999.
In 1996, Ishimaru was elected as a member of National Academy of Engineering "for his contributions to the theory and application of wave propagation and scattering in random media." Ishimaru is also the recipient of IEEE Centennial Medal (1984), IEEE Heinrich Hertz Medal (1999) and IEEE Third Millennium Medal (2000). He is a fellow of IEEE, the Optical Society of America, the Acoustical Society of America, and the Institute of Physics. He was the editor of Radio Science from 1979 to 1983, as well as the founding editor of the journals Waves in Random Media and Waves in Random and Complex Media.
Research
Ishimaru's research has mainly focused on wave propagation and scattering in random and turbulent media; his research has contributed to advances in microwave remote sensing, ultrasound imaging, laser surgery, radar systems and astronomy, as well as wireless and optical communications. His other research interests object detection and imaging in cluttered environments, inverse problems, wave propagation and scattering in the atmosphere and the terrain, aco |
https://en.wikipedia.org/wiki/Light-up%20shoes | Light-up shoes or LED-shoes are footwear that have built-in light-emitting diodes, usually in the sole part of the shoe. These specialized shoes may be used at parties, festivals, raves and to increase visibility. Originally light-up shoes were marketed towards children, and they had a mechanism where the shoe would light up every time the person would step on the ground with them.
Raves
Ravers use these type of shoes for ostentatious dancing, and especially shuffling is a popular type of dance mechanic.
References
External links
DIY Light-Up Shoes
Dance
Light art
Light-emitting diodes
Shoes |
https://en.wikipedia.org/wiki/Tilt%20detector | A tilt detector or tilt indicator is a device which indicates whether a tilt has occurred. Tilt detectors can be used on shipments of tilt sensible items to indicate whether a potentially damaging tilt have occurred. They are also used in the field of electronics or automotive on some models to detect if a change in vehicle inclination has occurred.
Overview
Tilts are often specified by the angle formed by the object considered with a horizontal plane. This is usually expressed in degrees (or radian). Depending on the application, the accuracy of the tilt sensor must be adapted to the sensitivity of the object it is intended to monitor.
Indeed, they can indicate precisely the level of inclination with a digital dial ( as for the inclination sensors on some vehicles) or simply have an indicator that changes color when an inclination beyond the reference threshold has been exceeded.
Technologies
There is a wide variety of technologies of this type of device. Here is a list of the main technologies :
When the sensor is powered, a rolling ball drops to the bottom of the sensor to make an electrical connection with a conductive plate underneath. When the sensor is titled, the ball does not fall to the bottom so that current cannot flow through the two end terminals of the sensor.
When the indicator suffers a reversal beyond its reference threshold, a metal pellet, initially blocked in a cockpit, dislodges and leaves a red background irreversibly.
It can be the same principle as the point above but with powder.
When the electrolytic sensor tilts, the fluid surface remains level due to gravity. The fluid is electrically conductive, and the conductivity between the two electrodes is proportional to the length of electrode immersed in the fluid.
Transport & logistics
In general, it is a single-use device that allows supply chain operators to check if the package has been tilted, which could lead to its deterioration. It is positioned thanks to an adhesive backin |
https://en.wikipedia.org/wiki/Act%201%20adaptor%20protein | Act 1 adaptor protein (Act 1) is an essential intermediate in the interleukin-17 pathway. The IL-17 protein is a pro-inflammatory cytokine important for tissue inflammation in host defense against infection and in autoimmune disease. It is produced by the CD4 + T cells, in particular the Th17 cells. There are 6 subtypes of IL-17, from IL-17A to IL17-F, these subtypes have nearly identical structures. We know that the cytokines are interacting homotypically, but IL-17A and IL-17F are capable do perform heterotypic interaction too.
Each cytokine has its own receptor, IL-17RA to IL-17F, and their pathways are still under investigation. It has been proven that these receptors are not using MyD88 and IRAK in their signaling pathways. They indeed use the adaptor Act1 protein, and TRAF family protein in order to activate the nuclear factor-kappa B (NF-κB), a transcription factor involved in the immunity response (see the pathways explanation below). This protein has different binding sites, which can physically attach the different components in order to activate them.
Act1 is crucial in the IL-17 signaling pathway. Moreover, this protein is only used in cells expressing CD40 and CD40L, which are also from the tumor necrosis receptor superfamily and more importantly expressed by B cells. It can also be expressed by other cell types such as epithelial cells, monocytes, basophils, dendritic cells, fibroblasts, smooth muscle cells, endothelial cells. Therefore, Act1 has a very wide impact on the immune system.
Act1 malfunction could induce autoimmunity (see below).
Structure
Some studies have been done in order to understand the structure of each subunit, and their importance in the protein function:
C-Terminal SEFIR domain (residues 394 to 574): This domain is shared by the Act1 protein and the IL-17R. It has been shown that the two components interact through this domain physically. It allows to start the IL-17 pathway by direct contact between the receptor and th |
https://en.wikipedia.org/wiki/Read%27s%20conjecture | Read's conjecture is a conjecture, first made by Ronald Read, about the unimodality of the coefficients of chromatic polynomials in the context of graph theory. In 1974, S. G. Hoggar tightened this to the conjecture that the coefficients must be strongly log-concave. Hoggar's version of the conjecture is called the Read–Hoggar conjecture.
The Read–Hoggar conjecture had been unresolved for more than 40 years before June Huh proved it in 2009, during his PhD studies, using methods from algebraic geometry.
References
Conjectures that have been proved
Graph theory |
https://en.wikipedia.org/wiki/Clear-Vision | Clear-Vision is a Japanese EDTV (Extended Definition TV) television system introduced in the 1990s, that improves audio and video quality while remaining compatible with the existing broadcast standard. Developed to improve analog NTSC, it adds features like progressive scan, ghost cancellation and widescreen image format. A similar system named PALPlus was develop in Europe with the goal of improving analog PAL broadcasts.
The initial version of the system was called IDTV (Improved Definition Television, or SuperNTSC) and was based on advanced signal processing on TV receivers. This allowed improvements such as progressive scan, ghost cancellation (reducing the effects of multipath propagation) and NTSC luminance and chroma crosstalk reduction (by way of filtering), without requiring any extra information being broadcast. These early studies were done by NTV, under the direction of the MPT (Ministry of Post and Telecommunications) and the BTA (Broadcasting Technology Association).
This early standard was published as ITU-R recommendation BT.797 - "CLEARVISION". Public broadcasting began on NTV in August 1989, under the name of EDTV-I or "Clear-Vision", ending on July 24, 2011.
Tests for an updated system known as EDTV-II or "Wide-aspect Clear-vision" started in 1994. EDTV-II supported 480p progressive scan, wide-screen and digital audio. Public broadcasting began in July 1995 by NTV. The standard was published as ARIB STD-B9 - "Direct Coding for EDTV-II Television Signal" in 1997 and as ITU BT.1298 - "Enhanced wide-screen NTSC TV transmission system".
EDTV-II broadcasts are displayed in letterbox format (with black bands on the top and bottom of the screen) on regular 4:3 NTSC receivers with no decoding ability. Information to reconstruct the original image signal is transmitted as helper signals - HH (horizontal high), VH (vertical high) and VT (vertical-temporal) - placed on the black bars. This solution is similar to the one used on PALplus, a comparable s |
https://en.wikipedia.org/wiki/Detectable%20tape | Detectable tape or Underground warning tape is a conductive tape typically applied over buried utilities made of non-conductive materials such as plastic, fiberglass, or cement. It is used because most utility location methods work best on conductive objects, and hence may easily miss structures made of non-conductive materials.
The tape also serves as a physical warning. If uncovered during digging, it alerts the user to an underground object that might be damaged by further excavation. To aid in this, it is typically colored to reflect the nature of the buried object that it is protecting.
It is common for construction specifications to mandate the use of such tape.
The conductive material in detectable tapes is typically aluminium, but there have been studies investigating replacing this with a material which is both magnetic and conductive, to make it detectable to a wider variety of utility location techniques.
See also
Underground Service Alert, an organization that specializes in marking underground utilities.
References
Color codes
Public utilities
Subterranea (geography) |
https://en.wikipedia.org/wiki/Pollination%20of%20orchids | The pollination of orchids is a complex chapter in the biology of this family of plants that are distinguished by the complexity of their flowers and by intricate ecological interactions with their pollinator agents. It has captured the attention of numerous scientists over time, including Charles Darwin, father of the theory of evolution by natural selection. Darwin published in 1862 the first observations of the fundamental role of insects in orchid pollination, in his book The Fertilization of Orchids. Darwin stated that the varied stratagems orchids use to attract their pollinators transcend the imagination of any human being.
Adaptations of orchids to pollination by animals
97% of species of orchids need a pollinator for the transfer of pollen grains from one plant to the pistils of another individual to take place, and thus for fertilization and seeds formation to occur. The pollen of orchids is grouped in compact masses called pollinia (singular: "pollinium"), so that by itself or by wind action the pollen cannot disperse from one flower to another, so pollinators are essential to ensure their sexual reproduction. These pollinators are very varied and, depending on the species in question, may be flies, mosquitos, bees, wasps, butterflies, coleopterans, and birds (especially hummingbirds).
The zoophily that characterizes orchids presupposes that pollinating animals visit the flowers regularly and stop at them long enough; that they brush or touch the anthers and stigma with some frequency and that the pollen remains attached to the visitors so perfectly that it can reach with due safety the stigmas of other flowers. The result of zoophily depends essentially on the animals being able to recognize flowers from a certain distance and being attracted to flowers of the same species. Zoophilous flowers, then, must possess "attractive products" (baits, such as pollen and nectar), "means of attraction" (such as scents and colors) and, in addition, viscous or adh |
https://en.wikipedia.org/wiki/Wiliot | Wiliot is a startup company developing Internet of Things technology for supply-chains and asset management, founded in 2017 and based in Caesarea, Israel, with customer operations in San Diego, US.
Wiliot develops battery-free printable sensor tags to monitor products like groceries, apparel and pharmaceuticals from their sources to stores and homes. The company's business model is to sell the use of its cloud software.
History
Wiliot was founded in 2017 by Tal Tamir, Yaron Elboim, and Alon Yehezkely, following the sales of their previous startup Wilocity to Qualcomm in 2014.
In 2019, Williot closed a $30 million series B round of funding from Amazon, Avery Dennison, Samsung and its previous series A investors Norwest Venture Partners, 83North Venture Capital, Grove Ventures, Qualcomm Ventures, and M Ventures. Other early investors include PepsiCo, NTT Docomo Ventures, and Vintage Investment Partners.
In 2021 Wiliot raised $200 million in a series C funding round lead by SoftBank Vision Fund 2 and backed by all previous investors.
Technology
Wiliot’s tags, called IoT Pixels, are a postage stamp-sized printed computer that powers itself by harvesting the energy from surrounding Wi-Fi, cellular and Bluetooth radio signals. The IoT Pixel tags have sensors for temperature, fill level, motion, location changes, humidity, and proximity. The tags cost less than 10 cents a piece.
The IoT Pixel includes an ARM Cortex-M0+ processor core, Bluetooth Low Energy connectivity, 1 kB of non-volatile memory, and antennas for Bluetooth and energy harvesting. Dual-band models include connectivity in the ISM bands.
In June 2022, Wiliot launched a business card-sized battery-assisted version of the IoT Pixel providing continuous connectivity.
Data from the sensors is fed into a Wiliot Cloud server, where algorithms help its customers make decisions through a software as a service subscription.
As of 2022, Wiliot is the assignee of 66 patents that relate to harvesting energy fro |
https://en.wikipedia.org/wiki/Ultimate%20Boot%20CD | The Ultimate Boot CD (UBCD) is a bootable CD-ROM containing a collection of diagnostic tools
including CPU tests, memory tests, virus scanning, and other tools.
The Ultimate Boot CD (UBCD) contains over 100 system diagnostics and hardware troubleshooting utilities.
The Ultimate Boot CD contains freeware and open-source diagnostic tools from a variety of sources.
Many of these tools were originally designed to boot from a floppy disk drive. The Ultimate Boot CD made it possible to run them on a PC without a floppy drive.
UBCD can also run from USB for computers without an optical drive.
The UBCD website has relatively good documentation for using the UBCD, and a discussion forum.
The Ultimate Boot CD also includes tools to create customized USCD ISO images
that can run additional tools extracted from bootable physical floppy disks and stored on the CD as floppy images (".img" or ".img.gz" files).
Related projects
UBCD includes a variety of diagnostic tools that were originally intended to run under DOS,
and also includes FreeDOS, which is used to run them.
UBCD includes a variety of disk partitioning, disk cloning, and antivirus utilities that were originally intended to run under Linux,
and also includes a small Live CD Linux distribution
(as of 2022, the freeware version of Parted Magic), which is used to run them.
The "Ultimate Windows Boot CD with ReactOS"
is based on UBCD and ReactOS.
See also
List of bootable data recovery software
References
External links
Operating system distributions bootable from read-only media
Free data recovery software
Live USB |
https://en.wikipedia.org/wiki/Smash%20or%20pass%3F | Smash or pass? is a game in which players evaluate the sexual desirability of an individual and declare whether they would hypothetically want to "smash" them (have sex with them) or "pass" (choose not to). The subject of discussion may be a celebrity, a fictional character, or an individual known personally to the players.
The game has seen spikes of popularity on the Internet, including on Facebook, YouTube, and TikTok. It has also been used as a form of sexual harassment, including through the uploading of photographs of people without their consent.
The name comes from a slang meaning of smash meaning "have casual sex", which is attested from the early 2000s. The game's terminology is also used metaphorically to evaluate things outside the sexual sphere, like food or festival performances.
History
Smash or pass? originated as a party game, but has become popular on the Internet; it has been described as an Internet fad. Vice News reported that the game "has mysterious origins" and speculated that it may have originated from other risqué games played by adolescents, including spin the bottle, truth or dare?, and fuck, marry, kill. The game appeared on Internet forums in mid-2010, the same year in which the phrase smash or pass was first defined on Urban Dictionary.
In one version of the game, reported in 2011, teenagers uploaded photographs of themselves to Facebook so that others could evaluate their looks. In some cases, photographs were uploaded for the game without their subjects' knowledge or consent. Digital security specialists Theresa Payton and Tshaka Armstrong said the game was risky and urged parents to monitor their children's activity online. Payton called the game "sexploitation" and said that the photographs might be viewed by sexual predators. Missy Wall of Teen Contact expressed concern about how the game could affect teenagers' mental health: "When a teenager gets 'passed' that could be very detrimental to emotional health. The teen may try |
https://en.wikipedia.org/wiki/500-series%20format | The 500-series format is a standardized format for a modular signal processor system consisting of a combination of 500-series modules installed within a 500-series chassis (or rack), with the chassis providing power and audio connections for the individual modules. Originally invented by Automated Processes, Inc. co-founder Saul Walker, today numerous companies manufacture 500-series format products.
The modular nature of the 500-series format allows individual modules to be combined to create a customized signal processing chain, with individual modules added or changed as budget allows. Many 500-series chassis also offer portability, allowing a recording engineer to bring their desired signal processing chain to any recording session.
History
In 1967, Lou Lindauer and Saul Walker designed a mixing console for Apostolic Recording Studio, the first 12-track recording studio in New York City. The console's modular design, invented by Walker, became the 500-series format, and Walker and Lindauer co-founded Automated Processes, Inc. (API) in 1969.
API's 500-series modules include the 512C preamplifier, the 525 compressor, the 527 compressor, the 550A and 550B semi-parametric equalizers, and the 560 graphic equalizer.
In the mid-1970s, some recording engineers began removing individual processor modules from API mixing consoles and installing them into homemade mounting systems. In 1978, Datatronix licensed the rights to API from the owners and manufactured a 10-slot 500-series chassis.
In 1985, the assets of API were purchased by Paul Wolff. In response to increasing demand, Wolff introduced the API Lunchbox, a portable chassis for housing 500-series modules in 2-slot, 6-slot, and 10-slot configurations. Later, API would establish ownership of the Lunchbox trademark.
Popularity in the 500-series format surged in the mid-2000s, and by 2020, there were over five hundred different 500-series modules on the market from API and numerous third-party manufacturers, in |
https://en.wikipedia.org/wiki/Heme%20transporter | A heme transporter is a protein that delivers heme to the various parts of a biological cell that require it.
Heme is a major source of dietary iron in humans and other mammals, and its synthesis in the body is well understood, but heme pathways are not as well understood. It is likely that heme is tightly regulated for two reasons: the toxic nature of iron in cells, and the lack of a regulated excretory system for excess iron. Understanding heme pathways is therefore important in understanding diseases such as hemochromatosis and anemia.
Heme transport
Members of the SLC48 and SLC49 solute carrier family participate in heme transport across cellular membranes (heme-transporting ATPase).
SLC48A1—also known as Heme-Responsive Gene 1 (HRG1)—and its orthologues were first identified as a heme transporter family through a genetic screen in C.elegans. The protein plays a role in mobilizing heme from the lysosome to the cytoplasm.
Deletion of the gene in mice leads to accumulation of heme crystals called hemozoin within the lysosomes of bone marrow, liver and splenic macrophages, but the gene is not known to be associated with human disease.
FLVCR1 was originally identified as the receptor for the feline leukemia virus, whose genetic disruption leads to anemia and disruption of heme transport. It appears to protect cells at the CFU-E stage by exporting heme to prevent heme toxicity. Rare homozygous mutations result in autosomal recessive posterior column ataxia with retinitis pigmentosa.
FLVCR2 is closely related to FLCVR1, and genetic transfection experiments indicate that it transports heme. Mutations in the gene are associated with proliferative vasculopathy and hydranencephaly-hydrocephaly syndrome (PVHH, also known as Fowler syndrome).
Related genes SLC49A3 and SLC49A4 are less well characterized functionally, although SLC49A4 is also known as Disrupted In Renal Cancer Protein 2 or RCC4 due to an association with renal cell cancer.
References
Genetics
Heme e |
https://en.wikipedia.org/wiki/Dov%20Levine | Dov I. Levine (דב לוין, born July 19, 1958) is an American-Israeli physicist, known for his research on quasicrystals, soft condensed matter physics (including granular materials, emulsions, and foams), and statistical mechanics out of equilibrium.
Education and career
The son of a professor of physical chemistry, Dov Levine grew up in New York. He graduated in 1979 with a B.S. from Stony Brook University and in 1986 with a Ph.D. in physics from the University of Pennsylvania. His Ph.D. thesis Quasicrystals: A New Class of Ordered Structure was supervised by Paul Steinhardt.
In 1981, Levine and Steinhardt began developing their theory of a hypothetical new form of matter with icosahedral symmetry (or other forbidden symmetries) that violated the century-old laws of crystallography. The idea, motivated by their study of Penrose tilings ,was to consider atomic arrangements that are quasiperiodic rather than periodic. They introduced the term quasicrystals, short for quasiperiodic crystal, to describe the idea. Independently, in April 1982, while studying an aluminum-manganese alloy, A6Mn, Dan Shechtman made a scientific observation, published in 1984, of "a metallic solid which diffracts electrons like a single crystal but has a point group symmetry (icosahedral) that is inconsistent with lattice translations." When Levine and Steinhardt were shown a preprint, they recognized the diffraction pattern as matching their prediction for an icosahedral quasicrystal and, hence, published their theory and proposed that explanation.
According to Steinhardt:
Levine was from 1986 to 1988 a postdoctoral member of UCSB's ITP (now known as KIPT) and from 1988 to 1989 a visiting scientist at the Weizmann Institute. He was from 1988 to 1991 an assistant professor at the University of Florida. In 1990 he joined the physics department of the Technion, where he is now a professor of physics. For the academic year 1997–1998 he was a visiting member of UCSB's ITP.
In 2020 he pub |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.