source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Otic%20pit
The auditory pit, also known as the otic pit, is the first rudiment of the internal ear. It appears shortly after that of the eye, in the form of a patch of thickened ectoderm, the auditory plate, over the region of the hind-brain. The auditory plate becomes depressed and converted into the auditory pit (or otic pit).
https://en.wikipedia.org/wiki/Noise%2C%20vibration%2C%20and%20harshness
Noise, vibration, and harshness (NVH), also known as noise and vibration (N&V), is the study and modification of the noise and vibration characteristics of vehicles, particularly cars and trucks. While noise and vibration can be readily measured, harshness is a subjective quality, and is measured either via jury evaluations, or with analytical tools that can provide results reflecting human subjective impressions. The latter tools belong to the field psychoacoustics. Interior NVH deals with noise and vibration experienced by the occupants of the cabin, while exterior NVH is largely concerned with the noise radiated by the vehicle, and includes drive-by noise testing. NVH is mostly engineering, but often objective measurements fail to predict or correlate well with the subjective impression on human observers. For example, although the ear's response at moderate noise levels is approximated by A-weighting, two different noises with the same A-weighted level are not necessarily equally disturbing. The field of psychoacoustics is partly concerned with this correlation. In some cases, the NVH engineer is asked to change the sound quality, by adding or subtracting particular harmonics, rather than making the vehicle quieter. Noise, vibration, and harshness for vehicles can be distinguished easily by quantifying the frequency. Vibration is between 0.5 Hz and 50 Hz, noise is between 20 Hz and 5000 Hz, and harshness takes the coupling of noise and vibration. Sources of NVH The sources of noise in a vehicle can be classified as: Aerodynamic (e.g., wind, cooling fans of HVAC) Mechanical (e.g., engine, driveline, tire contact patch and road surface, brakes) Electrical (e.g., electromagnetically induced acoustic noise and vibration coming from electrical actuators, alternator, or traction motor in electric cars) Mainly, noise is either structure-borne noise or airborne noise. Many problems are generated as either vibration or noise, transmitted via a variety of paths
https://en.wikipedia.org/wiki/Self-certifying%20File%20System
In computing, Self-certifying File System (SFS) is a global and decentralized, distributed file system for Unix-like operating systems, while also providing transparent encryption of communications as well as authentication. It aims to be the universal distributed file system by providing uniform access to any available server, however, the usefulness of SFS is limited by the low deployment of SFS clients. It was developed in the June 2000 doctoral thesis of David Mazières. Implementation The SFS client daemon implements the Sun's Network File System (NFS) protocol for communicating with the operating system, and thus can work on any operating system that supports NFS, including Windows. The client manages connections to remote file systems as necessary, acting as a kind of protocol translation layer. The SFS server works similarly to other distributed file system servers, by exposing an existing disk file system over the network, over the specific SFS protocol. On Unix-like systems, SFS file systems can usually be found at . When an SFS file system is first accessed through this path, a connection to the server is made and the directory is created ("automounted"). Differences The primary motivation behind the file system is to address the shortcomings of hardwired, administratively configured distributed file systems in larger organizations, and various remote file transfer protocols. It is designed to operate securely between separate administrative realms. For example, with SFS, one could store all their files on a single remote server, and access the same files securely and transparently from any location as if they were stored locally, without any special privileges or administrative cooperation (other than running the SFS client daemon). Available file systems will be found at the same path regardless of physical location, and are implicitly authenticated by their path names — as they include the public-key fingerprint of the server (hence why it is called
https://en.wikipedia.org/wiki/NZG%20Models
Nürnberger Zinkdruckguß-Modelle GmbH (, mostly known for its initials NZG) is a German manufacturer of diecast scale models primarily in 1:50 scale for use both as toys and promotional models mainly by heavy transport and construction equipment manufacturers. As seen in the name, the company is based in Nuremberg, Germany. Car models were also important as well as jet engine, aircraft, and stamping press models were also produced by NZG. A main company in competition with NZG, especially in production of construction vehicles in diecast for promotional purposes, is Conrad Models. History According to the NZG website, Gerhard Schmid and Betty Hauer started NZG Modelle in 1968, when shop was set up in the second floor of a furniture company. The business soon moved to a site at Sigmundstraße industrial estate. The first model produced was a Weserhutte wheeled crane, in that year. By 1974, at least 30 models were in the NZG range were noted in David Sinclair's Catalog. Sinclair, in the mid-1960s was one of the first importers to bring lesser known European brands to the U.S. Since then, over 700 different models have been produced and the company makes over 400,000 models a year. In 1986 the company was operated by Inge Ludwig (née Schmid) and Hannelore Hauer. In 2000, NZG passed completely to the Ludwig family. Inge and Michael Ludwig run the company today. Scales produced are 1:25, 1:50, and 1:87, as well as commercial vehicle models in 1:43. Special models require at least a 300 piece production order. Not toys and not for children NZG specializes in a wide variety of heavy equipment types ranging from hand pallet movers, forklifts, scissors lifts, reach stackers, power generators and skidsteers to front loaders, shovels, excavators, graders, and mammoth ore carrying dump trucks. Caterpillar and other engines and machinery are sometimes also made and displayed free-standing. Some offerings, like pavement profilers, road finishers, asphalt strippers, road
https://en.wikipedia.org/wiki/Hypostatic%20gene
A hypostatic gene is one whose phenotype is altered by the expression of an allele at a separate locus, in an epistasis event. Example: In labrador retrievers, the chocolate coat colour is a result of homozygosity for a gene that is epistatic to the "black vs. brown" gene. The alleles determining whether the dog is black or brown, are that of the hypostatic gene in this event. See also Epistasis Bombay phenotype
https://en.wikipedia.org/wiki/Phenothrin
Phenothrin, also called sumithrin and d-phenothrin, is a synthetic pyrethroid that kills adult fleas and ticks. It has also been used to kill head lice in humans. d-Phenothrin is used as a component of aerosol insecticides for domestic use. It is often used with methoprene, an insect growth regulator that interrupts the insect's biological lifecycle by killing the eggs. Effects Phenothrin is primarily used to kill fleas and ticks. It is also used to kill head lice in humans, but studies conducted in Paris and the United Kingdom have shown widespread resistance to phenothrin. It is extremely toxic to bees. A U.S. Environmental Protection Agency (EPA) study found that 0.07 micrograms were enough to kill honey bees. It is also extremely toxic to aquatic life with a study showing concentrations of 0.03 ppb killing mysid shrimp. It has increased risk of liver cancer in rats and mice in long-term exposure, with doses in the range of 100 milligrams per kilogram of body weight per day, or above. It is capable of killing mosquitoes, although remains poisonous to cats and dogs, with seizures and deaths being reported due to poisoning. Specific data on concentrations or exposure are lacking. Phenothrin has been found to possess antiandrogen properties, and was responsible for a small epidemic of gynecomastia via isolated environmental exposure. The EPA has not assessed its effect on cancer in humans. However, one study performed by the Mount Sinai School of Medicine linked sumithrin with breast cancer; the link made by its effect on increasing the expression of a gene responsible for mammary tissue proliferation. EPA action In 2005, the U.S. EPA cancelled permission to use phenothrin in several flea and tick products, at the request of the manufacturer, Hartz Mountain Industries. The products were linked to a range of adverse reactions, including hair loss, salivation, tremors, and numerous deaths in cats and kittens. In the short term, the agreement called for new wa
https://en.wikipedia.org/wiki/Non-histone%20protein
In chromatin, those proteins which remain after the histones have been removed, are classified as non-histone proteins. The non-histone proteins, are a large group of heterogeneous proteins that play a role in organization and compaction of the chromosome into higher order structures. They play vital roles in regulating processes like nucleosome remodeling, DNA replication, RNA synthesis and processing, nuclear transport, steroid hormone action and interphase/mitosis transition. Scaffold proteins, DNA polymerase, Heterochromatin Protein 1 and Polycomb are common non-histone proteins. This classification group also includes numerous other structural, regulatory, and motor proteins. Non-histone protein are acidic. The methylation of non-histone proteins regulates responses to DNA damage including the modulation of DNA repair pathways in proliferating and post-mitotic neuronal cells. Such modulation likely has implications for neuronal function. See also Chromatin Cohesin Condensin
https://en.wikipedia.org/wiki/Nonsense%20suppressor
A nonsense suppressor is a factor which can inhibit the effect of the nonsense mutation. Nonsense suppressors can be generally divided into two classes: a) a mutated tRNA which can bind with a termination codon on mRNA; b) a mutation on ribosomes decreasing the effect of a termination codon. It is believed that nonsense suppressors keep a low concentration in the cell and do not disrupt normal translation most of the time. In addition, many genes do not have only one termination codon, and cells commonly use ochre codons as the termination signal, whose nonsense suppressors are usually inefficient. Nonsense suppressors are a useful genetic tool, but can also result in problematic side effects, since all identical stop codons in the genome will also be suppressed to the same degree. Genes with different or multiple stop codons will be unaffected. SUP35, a nonsense suppressor identified by Wickner in 1994, is a prion protein. In synthetic biology, artificial suppressor elongator tRNAs are used to incorporate unnatural amino acids at nonsense codons placed in the coding sequence of a gene. Start codons can also be suppressed with suppressor initiator tRNAs, such as the amber stop codon suppressor tRNAfMet2(CUA). The amber initiator tRNA is charged with methionine and glutamine. In recent research, a novel gene therapy approach is provided by Jiaming Wang and Yue Zhang. They use an adeno-associated virus (AAV) vector to deliver a new suppressor tRNA (sup-tRNAtyr) into a mouse model carrying a nonsense mutation(Idua-W401X,TCG→TAG). This model recapitulates a human LSD, mucopolysaccharidosis disease type I (or Hurler Syndrome), caused by absence of the enzyme α-l-iduronidase (IDUA) leading to accumulation of glycosaminoglycans (GAG) and resulting pathogenesis. This method rescues the pathogenic defects and is essentially stable for 6 months.
https://en.wikipedia.org/wiki/Residual%20body
In lysosomal digestion, residual bodies are vesicles containing indigestible materials. Residual bodies are either secreted by the cell via exocytosis (this generally only occurs in macrophages), or they become lipofuscin granules that remain in the cytosol indefinitely. Longer-living cells like neurons and muscle cells usually have a higher concentration of lipofuscin than other more rapidly proliferating cells. See also Autophagy Phagocytosis
https://en.wikipedia.org/wiki/MSN%20WiFi%20Hotspots
MSN WiFi Hotspots, previously Windows Live WiFi Hotspot Locator, was a website that helped users to locate wireless Internet hotspots worldwide and view their positions on a map using Live Search Maps. This service has been discontinued as of June 10, 2008. Windows Live WiFi Center Windows Live WiFi Center was part of Microsoft's Windows Live services that helped users to find and connect to wireless networks around the world. It allowed users to search for wireless networks that are available and displayed information about them such as security configuration and signal strength. In addition, users could also add wireless networks as favorites, track connection history, and manage network preferences. It used VPN technology to secure a wireless Internet connection on unsecured networks. The service allowed users to search for free and fee-based wireless networks, showing information such as address, description, available amenities, service providers and location using Live Search Maps. Windows Live Wifi Center was discontinued after the rebranding of Windows Live WiFi Hotspot Locator to MSN WiFi Hotspots. Requirements Windows Live WiFi Center requires the following software to be installed prior to installation: Microsoft .NET Framework 2.0 Microsoft Core XML Services (MSXML) 6.0 Wi-Fi Protected Access 2 (WPA2) External links Un-Wired Official Team Blog MSN Rebranding on Liveside.net Wi-Fi
https://en.wikipedia.org/wiki/Apple%20File%20Exchange
Apple File Exchange (AFE) is a utility program for Apple Macintosh computers. It was included on the Apple "Tidbits" or "Install 2" disk in system versions 7.0 through 7.1. In System 7.5 (released in 1994), it was replaced by PC Exchange. Apple File Exchange could read floppy disks from DOS/Windows and ProDOS (Apple II) systems, as well as disks from Macs. This utility enabled Macs to read PC disks, but only if they were inserted after launching Apple File Exchange. If Apple File Exchange was not launched while inserting PC-formatted floppy, the Mac would complain that the disk inserted "was not a Macintosh disk" and requested initialisation. Apple File Exchange was a file content translator, in contrast to the File System Translator of Apple GS/OS which just translated the file system between different computers' storage formats. AFE could convert data files produced by one program for use in another, e.g. between AppleWorks and ClarisWorks. Bugs A high-density diskette in DOS format formatted as a 720K disk would not function correctly; the Mac assumed that any high-density disk has been formatted as an HD disk. To solve this problem, a user could cover the square hole with a piece of tape opposite the write-protect tab, and re-insert the disk. (This square hole identifies the disk as a high-density disk.) Covering the square hole will make it appear to disk drive as a DD disk.
https://en.wikipedia.org/wiki/Intra-frame%20coding
Intra-frame coding is a data compression technique used within a video frame, enabling smaller file sizes and lower bitrates, with little or no loss in quality. Since neighboring pixels within an image are often very similar, rather than storing each pixel independently, the frame image is divided into blocks and the typically minor difference between each pixel can be encoded using fewer bits. Intra-frame prediction exploits spatial redundancy, i.e. correlation among pixels within one frame, by calculating prediction values through extrapolation from already coded pixels for effective delta coding. It is one of the two classes of predictive coding methods in video coding. Its counterpart is inter-frame prediction which exploits temporal redundancy. Temporally independently coded so-called intra frames use only intra coding. The temporally coded predicted frames (e.g. MPEG's P- and B-frames) may use intra- as well as inter-frame prediction. Usually only few of the spatially closest known samples are used for the extrapolation. Formats that operate sample by sample like Portable Network Graphics (PNG) can usually use one of four adjacent pixels (above, above left, above right, left) or some function of them like e.g. their average. Block-based (frequency transform) formats prefill whole blocks with prediction values extrapolated from usually one or two straight lines of pixels that run along their top and left borders. The term intra-frame coding refers to the fact that the various lossless and lossy compression techniques are performed relative to information that is contained only within the current frame, and not relative to any other frame in the video sequence. In other words, no temporal processing is performed outside of the current picture or frame. Non-intra coding techniques are extensions to these basics. It turns out that this block diagram is very similar to that of a JPEG still image video encoder, with only slight implementation detail differences
https://en.wikipedia.org/wiki/Inflammatory%20demyelinating%20diseases%20of%20the%20central%20nervous%20system
Inflammatory demyelinating diseases (IDDs), sometimes called Idiopathic (IIDDs) due to the unknown etiology of some of them, are a heterogenous group of demyelinating diseases - conditions that cause damage to myelin, the protective sheath of nerve fibers - that occur against the background of an acute or chronic inflammatory process. IDDs share characteristics with and are often grouped together under Multiple Sclerosis. They are sometimes considered different diseases from Multiple Sclerosis, but considered by others to form a spectrum differing only in terms of chronicity, severity, and clinical course. Multiple sclerosis for some people is a syndrome more than a single disease. As of 2019, three auto-antibodies have been found in atypical MS giving birth to separate diseases: Anti-AQP4 diseases, Anti-MOG and Anti-NF spectrums. A LHON-associated MS has also been reported, and in addition there have been inconclusive reports of TNF-α blockers inducing demyelinating disorders. The subject is under intense research and the list of MS autoantibodies is expected to grow in the near future. Separated variants Several previous MS variants have been recently separated from MS after the discovery of a specific auto-antibody. Those autoantibodies are currently anti-AQP4, anti-MOG and some anti-Neurofascins. The pathogenic mechanism is usually not related to the clinical course. Therefore, one given pathogenic underlying condition can yield several clinical diseases, and one disease can be produced by several pathogenic conditions. These conditions can appear as Neuromyelitis optica (NMO), and its associated "spectrum of disorders" (NMOSD), currently considered a common syndrome for several separated diseases but with some still idiopathic subtypes. Some researchers think that there could exist an overlapping between Anti-NMDA receptor encephalitis cases and neuromyelitis optica or acute disseminated encephalomyelitis. Anti-AQP4 spectrum See Anti-AQP4 diseases Origin
https://en.wikipedia.org/wiki/System%20integration
System integration is defined in engineering as the process of bringing together the component sub-systems into one system (an aggregation of subsystems cooperating so that the system is able to deliver the overarching functionality) and ensuring that the subsystems function together as a system, and in information technology as the process of linking together different computing systems and software applications physically or functionally, to act as a coordinated whole. The system integrator integrates discrete systems utilizing a variety of techniques such as computer networking, enterprise application integration, business process management or manual programming. System integration involves integrating existing, often disparate systems in such a way "that focuses on increasing value to the customer" (e.g., improved product quality and performance) while at the same time providing value to the company (e.g., reducing operational costs and improving response time). In the modern world connected by Internet, the role of system integration engineers is important: more and more systems are designed to connect, both within the system under construction and to systems that are already deployed. Methods of integration Vertical integration (as opposed to "horizontal integration") is the process of integrating subsystems according to their functionality by creating functional entities also referred to as silos. The benefit of this method is that the integration is performed quickly and involves only the necessary vendors, therefore, this method is cheaper in the short term. On the other hand, cost-of-ownership can be substantially higher than seen in other methods, since in case of new or enhanced functionality, the only possible way to implement (scale the system) would be by implementing another silo. Reusing subsystems to create another functionality is not possible. Star integration, also known as spaghetti integration, is a process of systems integration where ea
https://en.wikipedia.org/wiki/Linux%20Mint
Linux Mint is a community-driven Linux distribution based on Ubuntu (which is in turn based on Debian), bundled with a variety of free and open-source applications. It can provide full out-of-the-box multimedia support for those who choose to include proprietary software such as multimedia codecs. Compared to Ubuntu, it uses the Cinnamon interface by default, using a different, more traditional layout that can be customized by dragging the applets and creating panels. New applets can also be downloaded. The Linux Mint project was created by Clément Lefèbvre and is actively maintained by the Linux Mint Team and community. History Linux Mint began in 2006 with a beta release, 1.0, code-named 'Ada', based on Kubuntu and using its KDE interface. Linux Mint 2.0 'Barbara' was the first version to use Ubuntu as its codebase and its GNOME interface. It had few users until the release of Linux Mint 3.0, 'Cassandra'. Linux Mint 2.0 was based on Ubuntu 6.10, using Ubuntu's package repositories and using it as a codebase. It then followed its own codebase, building each release from the previous one, but continuing to use the package repositories of the latest Ubuntu release. This made the two systems' bases almost identical, guaranteeing full compatibility between them, rather than requiring Mint to be a fork. In 2008, Linux Mint adopted the same release cycle as Ubuntu and dropped its minor version number before releasing version 5 'Elyssa'. The same year, in an effort to increase compatibility between the two systems, Linux Mint decided to abandon its codebase and changed the way it built its releases. Starting with Linux Mint 6 'Felicia', each release was based completely on the latest Ubuntu release, built directly from it, and made available approximately one month after the corresponding Ubuntu release (usually in May or November). In 2010, Linux Mint released Linux Mint Debian Edition (LMDE). Unlike the other Ubuntu-based editions (Ubuntu Mint), LMDE was originall
https://en.wikipedia.org/wiki/Electron%20affinity%20%28data%20page%29
This page deals with the electron affinity as a property of isolated atoms or molecules (i.e. in the gas phase). Solid state electron affinities are not listed here. Elements Electron affinity can be defined in two equivalent ways. First, as the energy that is released by adding an electron to an isolated gaseous atom. The second (reverse) definition is that electron affinity is the energy required to remove an electron from a singly charged gaseous negative ion. The latter can be regarded as the ionization energy of the –1 ion or the zeroth ionization energy. Either convention can be used. Negative electron affinities can be used in those cases where electron capture requires energy, i.e. when capture can occur only if the impinging electron has a kinetic energy large enough to excite a resonance of the atom-plus-electron system. Conversely electron removal from the anion formed in this way releases energy, which is carried out by the freed electron as kinetic energy. Negative ions formed in these cases are always unstable. They may have lifetimes of the order of microseconds to milliseconds, and invariably autodetach after some time. Molecules The electron affinities Eea of some molecules are given in the table below, from the lightest to the heaviest. Many more have been listed by . The electron affinities of the radicals OH and SH are the most precisely known of all molecular electron affinities. Second and third electron affinity Bibliography . . Updated values can be found in the NIST chemistry webbook for around three dozen elements and close to 400 compounds. Specific molecules
https://en.wikipedia.org/wiki/Frontonasal%20process
The frontonasal process, or frontonasal prominence is one of the five swellings that develop to form the face. The frontonasal process is unpaired, and the others are the paired maxillary prominences, and the paired mandibular prominences. During the fourth week of embryonic development, an area of thickened ectoderm develops, on each side of the frontonasal process called the nasal placodes or olfactory placodes, and appear immediately under the forebrain. By invagination these areas are converted into two nasal pits, which indent the frontonasal prominence and divide it into medial and lateral nasal processes. Nasal processes The medial nasal process (nasomedial) on the inner side of each nasal pit merge into the intermaxillary segment and form the upper lip, crest, and tip of the nose. The medial nasal processes merge with the maxillary prominences. The lateral nasal process from each side merge to form the alae of the nose. Clinical significance Failure to fuse can cause a cleft lip. Genetics There is some evidence that development involves Sonic hedgehog and Fibroblast growth factor 8.
https://en.wikipedia.org/wiki/Karl%20Seebach
Karl Seebach (June 28, 1912 in Munich – July 18, 2007 in Munich) was a German mathematician. Seebach earned his doctorate at the University of Munich under Heinrich Tietze and Arnold Sommerfeld, in 1938. From 1977 to 1981, he held the Chair for Didactics of Mathematics at the University of Munich. Seebach was the author of many mathematics textbooks for the Gymnasium. Books Josef Breuer, Paul Knabe, Josef Lauter, Karl Seebach, and Klaus Wigand Handbuch der Schulmatematik: Band 2 Algebra (Hermann Schroedel) Johannes Blume, Gerhard Frey, Heinrich Gall, Paul Knabe, Paul Mönnig, Karl Seebach, and Klaus Wigand Handbuch der Schulmathematik: Band 5 Einzelfragen der Mathematik (Hermann Schroedel) Ludwig Schecher and Karl Seebach Einführung in die Mathematik. Bd. 1 (Schmidt, 1950) Karl Seebach and Reinhold Federle Vorschläge zum Aufbau der Analytischen Geometrie in vektorieller Behandlung (Ehrenwirth, 1965) Friedrich Barth, Karl Seebach, and Ernst Winkler Vorschläge zur Behandlung der geometrischen Abbildungen in der Ebene (Ehrenwirth, 1968) Karl Seebach and Edmund Kösel Arbeitsblätter zum Lehrerkolleg. Hauptschule. Schuljahr 9. H. 3. Mathematik, Physik, Chemie (TR-Verlagsunion, 1969) Notes 1912 births 20th-century German mathematicians Mathematics educators German textbook writers Ludwig Maximilian University of Munich alumni Academic staff of the Ludwig Maximilian University of Munich 2007 deaths
https://en.wikipedia.org/wiki/Intermaxillary%20segment
The intermaxillary segment in an embryo is a mass of tissue formed by the merging of tissues in the vicinity of the nose. It is essential for human survival. It is primordial, since in the further development of the embryo this particular mass no longer appears, but parts of it remain in "the intermaxillary portion of the upper jaw, the portion of the upper lip, and the primary palate". More precisely, the rounded lateral angles of the medial process constitute the globular processes. It is also known as the "Intermaxillary segment". It gives rise to the premaxilla. See also Philtrum
https://en.wikipedia.org/wiki/Primary%20palate
Around the 5th week, the intermaxillary segment arises as a result of fusion of the two medial nasal processes and the frontonasal process within the embryo. The intermaxillary segment gives rise to the primary palate. The primary palate will form the premaxillary portion of the maxilla (anterior one-third of the final palate). This small portion is anterior to the incisive foramen and will contain the maxillary incisors.
https://en.wikipedia.org/wiki/Black%20holes%20in%20fiction
Black holes, objects whose gravity is so strong that nothing including light can escape them, have been depicted in fiction since before the term was coined by John Archibald Wheeler in the late 1960s. Black holes have been depicted with varying degrees of accuracy to the scientific understanding of them. Because what lies beyond the event horizon is unknown and by definition unobservable from outside, authors have been free to employ artistic license when depicting the interiors of black holes. History The earliest stories featuring what would later be called black holes, such as E. E. Smith's 1928 story The Skylark of Space and its "black sun", typically portrayed them as hazards to spacefarers. Later works such as the 1975 Space: 1999 episode "Black Sun" have occasionally done likewise, and a few have even depicted black holes being outright weaponized, one example being the 1982 novel The Space Eater by David Langford. A concept portrayed in many early works featuring black holes is that of gravitational time dilation—whereby time passes more slowly closer to a black hole as a consequence of general relativity—seen in works like Poul Anderson's 1968 short story "Kyrie" as well as Frederik Pohl's 1977 novel Gateway and the rest of his Heechee Saga; the opposite effect of using a black hole for the purpose of time travel to the past is depicted in the 1967 Star Trek episode "Tomorrow Is Yesterday". Black holes have also been portrayed as ways to travel through space rather than time, acting as entrances to wormholes in works such as the 1974 novel The Forever War by Joe Haldeman. Other uses of black holes have been conceived, one being as a source of energy as in Gregory Benford's 1986 short story "As Big As the Ritz". Micro black holes were first depicted in Larry Niven's 1974 short story "The Hole Man", and were later used as a means of powering spaceship propulsion in the 1975 novel Imperial Earth by Arthur C. Clarke and a way to provide an artificial gravity
https://en.wikipedia.org/wiki/Badanj%20Cave
Badanj Cave () is located in Borojevići village near the town of Stolac, Bosnia and Herzegovina. This rather small cave has come to public attention after the 1976 discovery of its cave engravings, that date to between 12,000 and 16,000 BC. Thanks to local natural benefits and preferable composition, topography, climate, hydrography and vegetation and rich hunting grounds have long attracted prehistoric settlers: the region has been settled since antiquity. The site is rock shelter or overhang recessed beneath a cliff that descends to the right bank of the river Bregava. Two chronologically distinct strata of Palaeolithic occupation were identified beneath the surface layer. Of particular significance was the discovery of a particular carving of the Badanj site, as it ranks among the oldest works of art in Bosnia and Herzegovina. The carving is cut into the diagonal surface of a large polished block of stone, and probably represents a horse seen from the offside flank that has been hit by arrows. Only the rear half of the body survives, with flanks typical for a horse and part of the body; the rest of the drawing has been partly damaged. The Badanj carvings include depictions of animals and symbols, as is typical of Mediterranean prehistoric art. The site was dated to the late Upper Palaeolithic. The cave is part of The Natural and Architectural Ensemble of Stolac, submitted by the Stolac municipality, and the Herzegovina-Neretva county to be recognized a UNESCO heritage site in 2007 and inducted into UNESCO's tentative list. It has also been designated as a National Monument of Bosnia and Herzegovina since 2003. See also List of caves in Bosnia and Herzegovina
https://en.wikipedia.org/wiki/Complex%20polytope
In geometry, a complex polytope is a generalization of a polytope in real space to an analogous structure in a complex Hilbert space, where each real dimension is accompanied by an imaginary one. A complex polytope may be understood as a collection of complex points, lines, planes, and so on, where every point is the junction of multiple lines, every line of multiple planes, and so on. Precise definitions exist only for the regular complex polytopes, which are configurations. The regular complex polytopes have been completely characterized, and can be described using a symbolic notation developed by Coxeter. Some complex polytopes which are not fully regular have also been described. Definitions and introduction The complex line has one dimension with real coordinates and another with imaginary coordinates. Applying real coordinates to both dimensions is said to give it two dimensions over the real numbers. A real plane, with the imaginary axis labelled as such, is called an Argand diagram. Because of this it is sometimes called the complex plane. Complex 2-space (also sometimes called the complex plane) is thus a four-dimensional space over the reals, and so on in higher dimensions. A complex n-polytope in complex n-space is the analogue of a real n-polytope in real n-space. There is no natural complex analogue of the ordering of points on a real line (or of the associated combinatorial properties). Because of this a complex polytope cannot be seen as a contiguous surface and it does not bound an interior in the way that a real polytope does. In the case of regular polytopes, a precise definition can be made by using the notion of symmetry. For any regular polytope the symmetry group (here a complex reflection group, called a Shephard group) acts transitively on the flags, that is, on the nested sequences of a point contained in a line contained in a plane and so on. More fully, say that a collection P of affine subspaces (or flats) of a complex unitary sp
https://en.wikipedia.org/wiki/Reward%20system
The reward system (the mesocorticolimbic circuit) is a group of neural structures responsible for incentive salience (i.e., "wanting"; desire or craving for a reward and motivation), associative learning (primarily positive reinforcement and classical conditioning), and positively-valenced emotions, particularly ones involving pleasure as a core component (e.g., joy, euphoria and ecstasy). Reward is the attractive and motivational property of a stimulus that induces appetitive behavior, also known as approach behavior, and consummatory behavior. A rewarding stimulus has been described as "any stimulus, object, event, activity, or situation that has the potential to make us approach and consume it is by definition a reward". In operant conditioning, rewarding stimuli function as positive reinforcers; however, the converse statement also holds true: positive reinforcers are rewarding. The reward system motivates animals to approach stimuli or engage in behaviour that increases fitness (sex, energy-dense foods, etc.). Survival for most animal species depends upon maximizing contact with beneficial stimuli and minimizing contact with harmful stimuli. Reward cognition serves to increase the likelihood of survival and reproduction by causing associative learning, eliciting approach and consummatory behavior, and triggering positively-valenced emotions. Thus, reward is a mechanism that evolved to help increase the adaptive fitness of animals. In drug addiction, certain substances over-activate the reward circuit, leading to compulsive substance-seeking behavior resulting from synaptic plasticity in the circuit. Primary rewards are a class of rewarding stimuli which facilitate the survival of one's self and offspring, and they include homeostatic (e.g., palatable food) and reproductive (e.g., sexual contact and parental investment) rewards. Intrinsic rewards are unconditioned rewards that are attractive and motivate behavior because they are inherently pleasurable. Extrin
https://en.wikipedia.org/wiki/Ortolani%20test
The Ortolani test is part of the physical examination for developmental dysplasia of the hip, along with the Barlow maneuver. Specifically, the Ortolani test is positive when a posterior dislocation of the hip is reducible with this maneuver. This is part of the standard infant exam performed preferably in early infancy.The Ortolani test is named after Marino Ortolani, who developed it in 1937. Procedure The Ortolani test is performed with the Barlow maneuver and inspection of the hip joint and legs. It relocates the dislocation of the hip joint that has just been elicited by the Barlow maneuver. The Ortolani test is performed by an examiner first flexing the hips and knees of a supine infant to 90°, then with the examiner's index fingers placing anterior pressure on the greater trochanters, gently and smoothly abducting the infant's legs using the examiner's thumbs. Interpretation A positive sign is a distinctive 'clunk' which can be heard and felt as the femoral head relocates anteriorly into the acetabulum:
https://en.wikipedia.org/wiki/Cervical%20sinus
The cervical sinus is a structure formed during embryonic development. It is a deep depression found on each side of the neck. It is formed as the second pharyngeal arch (hyoid arch) grows faster than the other pharyngeal arches, so they become covered. The first pharyngeal arch (mandibular arch) also grows slightly faster. It may fail to obliterate, forming a branchial cleft cyst or fistula, which is prone to infection. Structure The cervical sinus is bounded in front by the second pharyngeal arch (hyoid arch), and behind by the thoracic wall. The second pharyngeal arch (hyoid arch) grows faster than the other pharyngeal arches, so they become covered. It is ultimately obliterated by the fusion of its walls by the 7th week of gestation. Clinical significance Sometimes, the cervical sinus can fail to obliterate and thus remains as a branchial cleft cyst. The second pharyngeal arch may also not grow over the lower pharyngeal arches. This may be found anterior to the sternocleidomastoid muscle. It can also communicate with the skin as an external cervical fistula or with the pharynx as an internal cervical fistula. It is prone to infection. Medical ultrasound may be used to diagnose them. Additional images
https://en.wikipedia.org/wiki/T-function
In cryptography, a T-function is a bijective mapping that updates every bit of the state in a way that can be described as , or in simple words an update function in which each bit of the state is updated by a linear combination of the same bit and a function of a subset of its less significant bits. If every single less significant bit is included in the update of every bit in the state, such a T-function is called triangular. Thanks to their bijectivity (no collisions, therefore no entropy loss) regardless of the used Boolean functions and regardless of the selection of inputs (as long as they all come from one side of the output bit), T-functions are now widely used in cryptography to construct block ciphers, stream ciphers, PRNGs and hash functions. T-functions were first proposed in 2002 by A. Klimov and A. Shamir in their paper "A New Class of Invertible Mappings". Ciphers such as TSC-1, TSC-3, TSC-4, ABC, Mir-1 and VEST are built with different types of T-functions. Because arithmetic operations such as addition, subtraction and multiplication are also T-functions (triangular T-functions), software-efficient word-based T-functions can be constructed by combining bitwise logic with arithmetic operations. Another important property of T-functions based on arithmetic operations is predictability of their period, which is highly attractive to cryptographers. Although triangular T-functions are naturally vulnerable to guess-and-determine attacks, well chosen bitwise transpositions between rounds can neutralize that imbalance. In software-efficient ciphers, it can be done by interleaving arithmetic operations with byte-swapping operations and to a small degree with bitwise rotation operations. However, triangular T-functions remain highly inefficient in hardware. T-functions do not have any restrictions on the types and the widths of the update functions used for each bit. Subsequent transposition of the output bits and iteration of the T-function also do not aff
https://en.wikipedia.org/wiki/Enrolled%20actuary
An enrolled actuary is an actuary enrolled by the Joint Board for the Enrollment of Actuaries under the Employee Retirement Income Security Act of 1974 (ERISA). Enrolled actuaries, under regulations of the Department of the Treasury and the Department of Labor, perform a variety of tasks with respect to pension plans in the United States under ERISA. As of July, 2020, there were approximately 3,500 enrolled actuaries. Qualifications The Joint Board for the Enrollment of Actuaries administers two examinations to prospective enrolled actuaries. Once the two examinations have been passed, and an individual has also obtained sufficient relevant professional experience, that individual becomes an enrolled actuary. The first exam (EA-1) tests basic knowledge of the mathematics of compound interest, the mathematics of life contingencies, and practical demographic analysis. The second (EA-2) examination consists of two segments, which are offered during separate exam sittings in either the fall or the spring. Segment F covers the selection of actuarial assumptions, actuarial cost methods, and the calculation of minimum (required) and maximum (tax-deductible) contributions to pension plans. Segment L tests knowledge of relevant federal pension laws (in particular, the provisions of ERISA) as they affect pension actuarial practice. Employers Enrolled actuaries generally work for human resource consulting firms, investment and insurance brokers, accounting firms, government organizations, and law firms. Some firms that employ enrolled actuaries combine two or more of these practice specialties. Organizations Many enrolled actuaries belong to one or more of the following organizations: the Society of Actuaries, the American Academy of Actuaries. the Conference of Consulting Actuaries or the American Society of Pension Professionals & Actuaries. Notes and references External links Joint Board for the Enrollment of Actuaries Actuary Actuary Employee Retirement I
https://en.wikipedia.org/wiki/Pharyngeal%20branches%20of%20glossopharyngeal%20nerve
The pharyngeal branches of the glossopharyngeal nerve are three or four filaments which unite, opposite the Constrictor pharyngis medius, with the pharyngeal branches of the vagus and sympathetic, to form the pharyngeal plexus. Branches from this plexus perforate the muscular coat of the pharynx and supply its muscles and mucous membrane.
https://en.wikipedia.org/wiki/Joint%20Board%20for%20the%20Enrollment%20of%20Actuaries
The Joint Board for the Enrollment of Actuaries licenses actuaries to perform a variety of actuarial tasks required of pension plans in the United States by the Employee Retirement Income Security Act of 1974 (ERISA). The Joint Board consists of five members – three appointed by the Secretary of the Treasury and two by the Secretary of Labor – as well as a sixth non-voting member representing the Pension Benefit Guaranty Corporation. The Joint Board administers two examinations to prospective Enrolled Actuaries. After an individual passes the two exams and completes sufficient relevant professional experience, she or he becomes an Enrolled Actuary. See also Title 20 of the Code of Federal Regulations Sources Joint Board for the Enrollment of Actuaries Employee Retirement Income Security Act of 1974 Pension Benefit Guaranty Corporation Actuary Actuary Actuarial science
https://en.wikipedia.org/wiki/Wet%20meadow
A wet meadow is a type of wetland with soils that are saturated for part or all of the growing season which prevents the growth of trees and brush. Debate exists whether a wet meadow is a type of marsh or a completely separate type of wetland. Wet prairies and wet savannas are hydrologically similar. Hydrology and ecology Wet meadows may occur because of restricted drainage or the receipt of large amounts of water from rain or melted snow. They may also occur in riparian zones and around the shores of large lakes. Unlike a marsh or swamp, a wet meadow does not have standing water present except for brief to moderate periods during the growing season. Instead, the ground in a wet meadow fluctuates between brief periods of inundation and longer periods of saturation. Wet meadows often have large numbers of wetland plant species, which frequently survive as buried seeds during dry periods, and then regenerate after flooding. Wet meadows therefore do not usually support aquatic life such as fish. They typically have a high diversity of plant species, and may attract large numbers of birds, small mammals and insects including butterflies. Vegetation in a wet meadow usually includes a wide variety of herbaceous species including sedges, rushes, grasses and a wide diversity of other plant species. A few of many possible examples include species of Rhexia, Parnassia, Lobelia, many species of wild orchids (e.g. Calopogon and Spiranthes), and carnivorous plants such as Sarracenia and Drosera. Woody plants, if present, account for a minority of the total area cover. High water levels are one of the important factors that prevent invasion by woody plants; in other cases, fire is important. In areas with low frequencies of fire, or reduced water level fluctuations, or higher fertility, plant diversity will decline. Conservation Wet meadows were once common in wetland types around the world. They remain an important community type in wet savannas and flatwoods. The also su
https://en.wikipedia.org/wiki/David%20Gries
David Gries (born April 26, 1939 in Flushing, Queens, New York) is an American computer scientist at Cornell University, United States mainly known for his books The Science of Programming (1981) and A Logical Approach to Discrete Math (1993, with Fred B. Schneider). He was Associate Dean for Undergraduate Programs at the Cornell University College of Engineering from 2003–2011. His research interests include programming methodology and related areas such as programming languages, related semantics, and logic. His son, Paul Gries, has been a co-author of an introductory textbook to computer programming using the language Python and is a teaching stream professor in the Department of Computer Science at the University of Toronto. Life Gries earned a Bachelor of Science (B.S.) from Queens College in 1960. He spent the next two years working as a programmer-mathematician for the U.S. Naval Weapons Laboratory, where he met his wife, Elaine. He earned a Master of Science (M.S.) in mathematics from the University of Illinois at Urbana-Champaign in 1963. While at Illinois, Gries worked with Manfred Paul and Ruediger Wiehle to write a full compiler for the language ALGOL 60 for the IBM 7090 mainframe computer. He earned his Dr. rer. nat. in 1966 from the TH München, studying under Friedrich L. Bauer and Josef Stoer. Gries is member emeritus of IFIP Working Group 2.3, whose aim is to increase programmers' ability to compose programs, and he edited Programming Methodology: a Collection of Articles by Members of IFIP WG2.3, which highlights the work of this group in its first ten years. Gries was an assistant professor at Stanford University from 1966–1969 and then became an associate professor at Cornell University in Ithaca, New York. He spent the next 30 years there, including time as chair of the computer science department from 1982–1987. By the late 1970s, a survey had Cornell as the fourth-ranked computer science program in the nation, with nationally visible fac
https://en.wikipedia.org/wiki/Data%20compression%20symmetry
Symmetry and asymmetry, in the context of data compression, refer to the time relation between compression and decompression for a given compression algorithm. If an algorithm takes the same time to compress a data archive as it does to decompress it, it is considered symmetrical. Note that compression and decompression, even for a symmetric algorithm, may not be perfectly symmetric in practice, depending on the devices the data is being copied to and from, and other factors such as latency and the fragmentation on the device. In turn, if the compression and decompression times of an algorithm are vastly different, it is considered asymmetrical. Examples Symmetric algorithms are typically used for media streaming protocols, as either the server taking too long to compress the data, or the client taking too long to decompress, would lead to delays in the viewing of the data. Asymmetrical algorithms wherein the compression is faster than the decompression can be useful for backing up or archiving data, as in these cases data is typically much more often stored than retrieved.
https://en.wikipedia.org/wiki/Athermalization
Athermalization, in the field of optics, is the process of achieving optothermal stability in optomechanical systems. This is done by minimizing variations in optical performance over a range of temperatures. Optomechanical systems are typically made of several materials with different thermal properties. These materials compose the optics (refractive or reflective elements) and the mechanics (optical mounts and system housing). As the temperature of these materials change, the volume and index of refraction will change as well, increasing strain and aberration content (primarily defocus). Compensating for optical variations over a temperature range is known as athermalizing a system in optical engineering. Material property changes Thermal expansion is the driving phenomena for the extensive and intensive property changes in an optomechanical system. Extensive properties Extensive property changes, such as volume, alter the shape of optical and mechanical components. Systems are geometrically optimized for optical performance and are sensitive to components changing shape and orientation. While volume is a three dimensional parameter, thermal changes can be modeled in a single dimension with linear expansion, assuming an adequately small temperature range. For examples, glass manufacturer Schott provides the coefficient of linear thermal expansion for a temperature range of -30 C to 70 C. The change in length of a material is a function of the change in temperature with respect to the standard measurement temperature, . This temperature is typically room temperature or 22 degrees Celsius. Where is the length of a material at temperature , is the length of the material at temperature , is the change in temperature, and is the coefficient of thermal expansion. These equations describe how diameter, thickness, radius of curvature, and element spacing change as a function of temperature. Intensive properties The dominant intensive property change, in term
https://en.wikipedia.org/wiki/Sahara%20pump%20theory
The Sahara pump theory is a hypothesis that explains how flora and fauna migrated between Eurasia and Africa via a land bridge in the Levant region. It posits that extended periods of abundant rainfall lasting many thousands of years (pluvial periods) in Africa are associated with a "wet-green Sahara" phase, during which larger lakes and more rivers existed. This caused changes in the flora and fauna found in the area. Migration along the river corridor was halted when, during a desert phase 1.8–0.8 million years ago (mya), the Nile ceased to flow completely and possibly flowed only temporarily in other periods due to the geologic uplift (Nubian Swell) of the Nile River region. Mechanism During periods of a wet or Green Sahara, the Sahara and Arabia become a savanna grassland and African flora and fauna become common. Following inter-pluvial arid periods, the Sahara area then reverts to desert conditions, usually as a result of the retreat of the West African Monsoon southwards. Evaporation exceeds precipitation, the level of water in lakes like Lake Chad falls, and rivers become dry wadis. Flora and fauna previously widespread as a result retreat northwards to the Atlas Mountains, southwards into West Africa, or eastwards into the Nile Valley and thence either southeast to the Ethiopian Highlands and Kenya or northeast across the Sinai into Asia. This separates populations of some of the species in areas with different climates, forcing them to adapt, possibly giving rise to allopatric speciation. Plio-Pleistocene The Plio-Pleistocene migrations to Africa included the Caprinae in two waves at 3.2 Ma and 2.7–2.5 Ma; Nyctereutes at 2.5 Ma, and Equus at 2.3 Ma. Hippotragus migrated at 2.6 Ma from Africa to the Siwaliks of the Himalayas. Asian bovids moved to Europe and to and from Africa. The primate Theropithecus experienced contraction and its fossils are found only in Europe and Asia, while Homo and Macaca settled wide ranges. 185,000–20,000 years ago Between ab
https://en.wikipedia.org/wiki/ATM25
ATM25 is an ATM (Asynchronous Transfer Mode) version wherein data is transferred at 25.6 Mbit/s over Category 3 cable. ATM25 has no particular distinctions from other ATM versions. However, ATM25 chipsets are inexpensive in comparison to faster ATM chipsets, having the result of making ATM technology available for small office/home office environments. However, these networks no longer have much potential for expansion, as Ethernet has become the first choice in this domain. The WAN connection side of ATM25 systems often takes place over a fast DSL variant such as RADSL. DSL is often considered in this case, as its technology is based on an ATM core. In March 2001, Network World article put it this way: Classified mostly as a solution looking for a problem, 25M bit/sec ATM to the desktop failed before it really got rolling. While many folks thought the idea of providing all that bandwidth to user PCs was worthwhile, the idea of paying twice as much for the luxury compared with switched Ethernet didn't fly.
https://en.wikipedia.org/wiki/Kaspersky%20Anti-Virus
Kaspersky Anti-Virus ( (Antivirus Kasperskogo); formerly known as AntiViral Toolkit Pro; often referred to as KAV) is a proprietary antivirus program developed by Kaspersky Lab. It is designed to protect users from malware and is primarily designed for computers running Microsoft Windows and macOS, although a version for Linux is available for business consumers. Product Kaspersky Anti-Virus features include real-time protection, detection and removal of viruses, trojans, worms, spyware, adware, keyloggers, malicious tools and auto-dialers, as well as detection and removal of rootkits. Microsoft Windows users may download an antivirus rescue disk that scans the host computer during booting inside an isolated Linux environment. In addition, Kaspersky Anti-Virus prevents itself from being disabled by malware without user permission via password access prompts upon disabling protection elements and changing internal settings. It also scans incoming instant messenger traffic, email traffic, automatically disables links to known malware hosting sites while using Internet Explorer or Firefox, and includes free technical support and free product upgrades within paid-subscription periods. Limits Kaspersky Anti-Virus lacks certain features found in Kaspersky Internet Security. These missing features include a personal firewall, HIPS, Secure Keyboard, AntiSpam, AntiBanner and parental control tools. Also, Kaspersky, like the majority of its competitors, is incompatible with many other anti-virus and anti-spyware software. Security vulnerabilities In 2005, two critical flaws were discovered in Kaspersky Anti-Virus. One could let attackers commandeer systems that use it, and one allowed CHM files to insert malicious code. Days later, the software maker had offered preliminary protection to customers, and a week later a permanent patch was made available. Operating systems Microsoft Windows Kaspersky has been initially developed for Windows, hence the system is suppo
https://en.wikipedia.org/wiki/Frequency%20specific%20microcurrent
Frequency Specific Microcurrent (FSM) or frequency Specific Microcurrent Therapy (FSMT) is the practice of introducing a mild electrical current into an area of damaged soft tissue. Practitioners claim that the introduced current enhances the healing process underway in that same tissue. Critics, such as David Gorski, call proponent's claims of the technique altering body tissue's vibrational amplitude pseudoscience. About Frequencies are simultaneously applied used on two channels so they intersect or cross in the area to be treated. Clinical experience shows that both frequencies need to accurately reflect the condition causing the problem (like inflammation or scarring) and the tissue being affected (like the nerve or spinal cord) in order for the treatment to be successful. Usage A 2012 systematic review of physical therapies for Achilles tendinopathy found limited evidence from a single randomized clinical trial suggests FSM as an effective therapy. Criticism Skeptics note that FSM is another form of vibration medicine and that there is no good evidence that when a tissue is injured it takes on a “different vibrational characteristic”. In addition to the implausibility of the underlying mechanism, critics further argue that the treatment lacks a body or research neither establishing the phenomenon nor the clinical claims. A 1994 review of electronic devices as potential cancer treatments by the American Cancer Society found the methods to questionable, ineffective, and strongly advises against using them. Another criticism is that the champion of the modality is a discredited chiropractor.
https://en.wikipedia.org/wiki/Comment%20%28computer%20programming%29
In computer programming, a comment is a programmer-readable explanation or annotation in the source code of a computer program. They are added with the purpose of making the source code easier for humans to understand, and are generally ignored by compilers and interpreters. The syntax of comments in various programming languages varies considerably. Comments are sometimes also processed in various ways to generate documentation external to the source code itself by documentation generators, or used for integration with source code management systems and other kinds of external programming tools. The flexibility provided by comments allows for a wide degree of variability, but formal conventions for their use are commonly part of programming style guides. Overview Comments are generally formatted as either block comments (also called prologue comments or stream comments) or line comments (also called inline comments). Block comments delimit a region of source code which may span multiple lines or a part of a single line. This region is specified with a start delimiter and an end delimiter. Some programming languages (such as MATLAB) allow block comments to be recursively nested inside one another, but others (such as Java) do not. Line comments either start with a comment delimiter and continue until the end of the line, or in some cases, start at a specific column (character line offset) in the source code, and continue until the end of the line. Some programming languages employ both block and line comments with different comment delimiters. For example, C++ has block comments delimited by /* and */ that can span multiple lines and line comments delimited by //. Other languages support only one type of comment. For example, Ada comments are line comments: they start with -- and continue to the end of the line. Uses How best to make use of comments is subject to dispute; different commentators have offered varied and sometimes opposing viewpoints. There
https://en.wikipedia.org/wiki/Subclavian%20groove
On the medial part of the clavicle is a broad rough surface, the costal tuberosity (rhomboid impression), rather more than 2 cm. in length, for the attachment of the costoclavicular ligament. The rest of this surface is occupied by a groove, which gives attachment to the Subclavius; the coracoclavicular fascia, which splits to enclose the muscle, is attached to the margins of the groove. Not infrequently this groove is subdivided longitudinally by a line which gives attachment to the intermuscular septum of the Subclavius.
https://en.wikipedia.org/wiki/EXIT%20chart
An extrinsic information transfer chart, commonly called an EXIT chart, is a technique to aid the construction of good iteratively-decoded error-correcting codes (in particular low-density parity-check (LDPC) codes and Turbo codes). EXIT charts were developed by Stephan ten Brink, building on the concept of extrinsic information developed in the Turbo coding community. An EXIT chart includes the response of elements of decoder (for example a convolutional decoder of a Turbo code, the LDPC parity-check nodes or the LDPC variable nodes). The response can either be seen as extrinsic information or a representation of the messages in belief propagation. If there are two components which exchange messages, the behaviour of the decoder can be plotted on a two-dimensional chart. One component is plotted with its input on the horizontal axis and its output on the vertical axis. The other component is plotted with its input on the vertical axis and its output on the horizontal axis. The decoding path followed is found by stepping between the two curves. For a successful decoding, there must be a clear swath between the curves so that iterative decoding can proceed from 0 bits of extrinsic information to 1 bit of extrinsic information. A key assumption is that the messages to and from an element of the decoder can be described by a single number, the extrinsic information. This is true when decoding codes from a binary erasure channel but otherwise the messages are often samples from a Gaussian distribution with the correct extrinsic information. The other key assumption is that the messages are independent (equivalent to an infinite block-size code without local structure between the components) To make an optimal code, the two transfer curves need to lie close to each other. This observation is supported by the theoretical result that for capacity to be reached for a code over a binary-erasure channel there must be no area between the curves and also by the i
https://en.wikipedia.org/wiki/Caddy%20%28hardware%29
In computer hardware, a caddy is a container used to hold some medium, such as a CD-ROM. If the medium is a hard disk drive, the caddy is also referred to as a disk enclosure. Its functionality is similar to that of the 3.5" floppy disk's jacket. The purpose of a disk caddy is to protect the disk from damage when handling; its use dates back to at least the Capacitance Electronic Disc in 1981, and they were used in initial versions of Blu-ray Discs, though as a cost-saving measure newer versions use hard-coating technology to prevent scratches and do not need a caddy. Caddies may be an integral part of the medium, as in some DVD-RAM discs, or separately attached. Examples Caddies date at least to the Capacitance Electronic Disc, which used a caddy from 1981 to protect the grooves of the disc. While caddies have become obsolete, some websites still sell them, although they have become quite expensive. Cartridges In addition to caddies that serve purely a storage purpose, there are also ones that are designed to be loaded directly for data access, usually via a shutter. Some early CD-ROM drives used a mechanism where CDs had to be inserted into special cartridges, somewhat similar in appearance to a jewel case. Although the idea behind this—a tougher plastic shell to protect the disc from damage—was sound, it did not gain wide acceptance among disc manufacturers. Consumers also eschewed the intended and pricey use, which required each disc to be protected with a caddy for its full useful life, preferring to only buy one caddy and transfer the discs between their traditional storage jewel cases and the caddy when in use, then the reverse when finished. Drives that used the caddy format required "bare" discs to be placed into a caddy before use, making them less convenient to use. Drives that worked this way were referred to as caddy drives or caddy load(ing), but from about 1994 most computer manufacturers moved to tray-loading, or slot-loading drives. Th
https://en.wikipedia.org/wiki/Fifth%20metatarsal%20bone
The fifth metatarsal bone is a long bone in the foot, and is palpable along the distal outer edges of the feet. It is the second smallest of the five metatarsal bones. The fifth metatarsal is analogous to the fifth metacarpal bone in the hand. As with the four other metatarsal bones it can be divided into three parts; a base, body and head. The base is the part closest to the ankle and the head is closest to the toes. The narrowed part in the middle is referred to as the body (or shaft) of the bone. The bone is somewhat flat giving it two surfaces; the plantar (towards the sole of the foot) and the dorsal side (the area facing upwards while standing). These surfaces are rough for the attachment of ligaments. The bone is curved longitudinally, so as to be concave below, slightly convex above. The base articulates behind, by a triangular surface cut obliquely in a transverse direction, with the cuboid; and medially, with the fourth metatarsal. The fifth metatarsal has a rough eminence on the lateral side of its base, known as the tuberosity or the styloid process. The plantar surface of the base is grooved for the tendon of the abductor digiti quinti. The head articulates with the fifth proximal phalanx, the first bone in the fifth toe. A strong band of the plantar aponeurosis connects the projecting part of the tuberosity with the lateral process of the tuberosity of the calcaneus. Proximal fractures Proximal fractures of the fifth metatarsal are common, and are distinguished by their locations: A proximal diaphysis fracture is typically a stress fracture, commonly among athletes. A metaphysis fracture is also called a Jones fracture. Due to poor blood supply in this area, such a fracture sometimes does not heal and surgery is required. A tuberosity fracture is also called a pseudo-Jones fracture or a dancer's fracture. It is typically an avulsion fracture. Normal anatomy that may simulate a fracture include mainly: The "apophysis", which is the secondary ossif
https://en.wikipedia.org/wiki/Fourth%20metatarsal%20bone
The fourth metatarsal bone is a long bone in the foot. It is smaller in size than the third metatarsal bone and is the third longest (and smallest) of the five metatarsal bones. The fourth metatarsal is analogous to the fourth metacarpal bone in the hand As the four other metatarsals bones it can be divided into three parts; base, body and head. The base is the part closest to the ankle and the head is closest to the toes. The narrowed part in the middle is referred to as the body or shaft of the bone. The bone is somewhat flatten giving it two surfaces; the plantar (towards the sole of the foot) and the dorsal side (the area facing upwards while standing). These surfaces are rough for the attachment of ligaments. The bone is curved longitudinally, so as to be concave below, slightly convex above. The base or posterior extremity is wedge-shaped. The base presents an oblique quadrilateral surface for articulation with the cuboid; a smooth facet on the medial side, divided by a ridge into an anterior portion for articulation with the third metatarsal, and a posterior portion for articulation with the third cuneiform; on the lateral side a single facet, for articulation with the fifth metatarsal. The head or anterior extremity articulates with the fourth proximal phalanx, the first bone in the fourth toe. Muscle attachments The third and fourth dorsal interossei muscles attaches to the fourth metatarsal bone. The third dorsal interossei from the medial side of the bone and the fourth dorsal interossei from the lateral side. The function of the muscle is to spread the toes. The second Plantar interossei muscle originates from the medial side of the base and shaft of the fourth metatarsal. The function of the muscle is to move the fourth toe medially and move the toes together. The horizontal head of the adductor hallucis also originates from the lateral side of the metacarpophalangeal joint and from the deep transverse metatarsal ligament, a narrow band which ru
https://en.wikipedia.org/wiki/Third%20metatarsal%20bone
The third metatarsal bone is a long bone in the foot. It is the second longest metatarsal. The longest being the second metatarsal. The third metatarsal is analogous to the third metacarpal bone in the hand As the four other metatarsals bones it can be divided into three parts; base, body and head. The base is the part closest to the ankle and the head is closest to the toes. The narrowed part in the middle is referred to as the body of the bone. The bone is somewhat flatten giving it two surfaces; the plantar (towards the sole of the foot) and the dorsal side (the area facing upwards while standing). These surfaces are rough for the attachment of ligaments. The bone is curved longitudinally, so as to be concave below, slightly convex above. The base or posterior extremity is wedge-shaped. The third metatarsal bone articulates proximally, by means of a triangular smooth surface, with the third cuneiform; medially, by two facets, with the second metatarsal; and laterally, by a single facet, with the fourth metatarsal. This last facet is situated at the dorsal angle of the base. The head or anterior extremity articulates with the third proximal phalanx. Muscle attachments The second and third dorsal interossei muscles attaches to the third metatarsal bone. The second dorsal interossei from the medial side of the bone and the third dorsal interossei from the lateral side. The function of the muscle is to spread the toes. The first Plantar interossei muscle originates from the medial side of the base and shaft of the third metatarsal. The function of the muscle is to move the third toe medially and move the toes together. The horizontal head of the adductor hallucis also originates from the lateral side of the metacarpophalangeal joint and from the deep transverse metatarsal ligament, a narrow band which runs across and connects together the heads of all the metatarsal bones. Additional images
https://en.wikipedia.org/wiki/Second%20metatarsal%20bone
The second metatarsal bone is a long bone in the foot. It is the longest of the metatarsal bones, being prolonged backward and held firmly into the recess formed by the three cuneiform bones. The second metatarsal forms joints with the second proximal phalanx (a bone in the second toe) through the metatarsophalangeal joint, the cuneiform bones, third metatarsal and occasionally the first metatarsal bone. Structure Like the four other metatarsal bones, it can be divided into three parts: base, body and head. The base is the part closest to the ankle and the head is closest to the big toe. The narrowed part in the middle is referred to as the body of the bone. The bone is somewhat flattened, giving it two sides: the plantar (towards the sole of the foot) and the dorsal side (the area facing upwards while standing). Its base is broad above, narrow and rough below. It presents four articular surfaces: one behind, of a triangular form, for articulation with the intermediate cuneiform bone; one at the upper part of its medial surface, for articulation with the medial cuneiform; and two on its lateral surface, an upper and lower, separated by a rough non-articular interval. Each of these lateral articular surfaces is divided into two by a vertical ridge: the two anterior facets articulate with the third metatarsal and the two posterior (sometimes continuous) with the lateral cuneiform. A fifth facet is occasionally present for articulation with the first metatarsal; it is oval in shape, and is situated on the medial side of the body near the base. The second metatarsal base acts as a "keystone" (like in an arch) for the lisfranc joint. Muscle attachments The first and second dorsal interossei muscles attach to the second metatarsal bone, the first dorsal interosseus from the medial side of the bone and the second dorsal interosseus from the lateral side. The function of the muscle is to spread the toes. The horizontal head of the adductor hallucis also originates
https://en.wikipedia.org/wiki/First%20metatarsal%20bone
The first metatarsal bone is the bone in the foot just behind the big toe. The first metatarsal bone is the shortest of the metatarsal bones and by far the thickest and strongest of them. Like the four other metatarsals, it can be divided into three parts: base, body and head. The base is the part closest to the ankle and the head is closest to the big toe. The narrowed part in the middle is referred to as the body of the bone. The bone is somewhat flattened, giving it two sides: the plantar (towards the sole of the foot) and the dorsal side (the area facing upwards while standing). The base presents, as a rule, no articular facets (joint surfaces) on its sides, but occasionally on the lateral side there is an oval facet, by which it articulates with the second metatarsal. On the lateral part of the plantar surface there is a rough oval prominence, or tuberosity, for the insertion of the tendon of the fibularis longus. The first metatarsal articulates (forms joints) with the medial cuneiform and to a small extent with the intermediate cuneiform bone. Its proximal articular surface is large and kidney-shaped; its circumference is grooved, for the tarsometatarsal ligaments, and medially gives insertion to part of the tendon of the tibialis anterior. The body of the bone is strong, and of well-marked prismoid form. The head is large; on its plantar surface are two grooved facets on which the sesamoid bones glide; the facets are separated by a smooth elevation. Muscle attachments Three muscles attach to the first metatarsal bone: the tibialis anterior, fibularis longus and first dorsal interosseus. The tibialis anterior inserts at the basis of the bone, while the fibularis longus inserts at the tuberosity. The lateral part of the first dorsal interosseus muscle originates from the medial side of the bone. Its function is to spread the toes. Additional images
https://en.wikipedia.org/wiki/Comparison%20of%20disk%20encryption%20software
This is a technical feature comparison of different disk encryption software. Background information Operating systems Features Hidden containers: Whether hidden containers (an encrypted container (A) within another encrypted container (B) so the existence of container A can not be established) can be created for deniable encryption. Note that some modes of operation like CBC with a plain IV can be more prone to watermarking attacks than others. Pre-boot authentication: Whether authentication can be required before booting the computer, thus allowing one to encrypt the boot disk. Single sign-on: Whether credentials provided during pre-boot authentication will automatically log the user into the host operating system, thus preventing password fatigue and reducing the need to remember multiple passwords. Custom authentication: Whether custom authentication mechanisms can be implemented with third-party applications. Multiple keys: Whether an encrypted volume can have more than one active key. Passphrase strengthening: Whether key strengthening is used with plain text passwords to frustrate dictionary attacks, usually using PBKDF2. Hardware acceleration: Whether dedicated cryptographic accelerator expansion cards can be taken advantage of. Trusted Platform Module: Whether the implementation can use a TPM cryptoprocessor. Filesystems: What filesystems are supported. Two-factor authentication: Whether optional security tokens (hardware security modules, such as Aladdin eToken and smart cards) are supported (for example using PKCS#11) Layering Whole disk: Whether the whole physical disk or logical volume can be encrypted, including the partition tables and master boot record. Note that this does not imply that the encrypted disk can be used as the boot disk itself; refer to pre-boot authentication in the features comparison table. Partition: Whether individual disk partitions can be encrypted. File: Whether the encrypted container can be stored in a file
https://en.wikipedia.org/wiki/Crossband%20operation
Crossband (cross-band, cross band) operation is a method of telecommunication in which a radio station receives signals on one frequency and simultaneously transmits on another for the purpose of full duplex communication or signal relay. To avoid interference within the equipment at the station, the two frequencies used need to be separated, and ideally on different 'bands'. An unattended station working in this way is a radio repeater. It re-transmits the same information that it receives. This principle is used by telecommunications satellites and terrestrial mobile radio systems. Uses Crossband operation is sometimes used by amateur radio operators. Rather than taking it in turns to transmit on the same frequency, both operators can transmit at the same time but on different bands, each one listening to the frequency that the other is using to transmit. A variation on this procedure includes establishing contact on one frequency and then changing to a pair of other frequencies to exchange messages. Crossband operation is also used in communication between ships (inter-ship) with a HF installation. Frequencies that may be used can be found in the 'Manual for use by the Maritime Mobile and Maritime Mobile-Satellite Services'. Usually inter-ship communication is simplex only (VHF or MF), HF gives the possibility to work duplex but usually the transmitter and receiver are so close to each other that this may cause problems. The solution is to work on frequencies that are far apart e.g.: sending on 8 MHz and receiving on 12 MHz. See also See Radio frequency for more details about the radio spectrum.
https://en.wikipedia.org/wiki/Cat%20behavior
Cat behavior is a cat's behavior and responses to events and other stimuli. Cat behavior includes body language, elimination habits, aggression, play, communication, hunting, grooming, urine marking, and face rubbing. It varies among individuals, colonies, and breeds. Communication and sociability can vary greatly among individual cats. In a family with many cats, the interactions can change depending on which individuals are present and how restricted the territory and resources are. One or more individuals may become aggressive: fighting may occur with the attack, resulting in scratches and deep bite wounds. Communication Kittens vocalize early in development. Some examples of different vocalizations are described below. Purring - means that the cat is either content or is self-soothing due to fear Meowing - a frequently used greeting. A mother meows when interacting with her young. Meows can also be used when a cat wishes for attention. Hissing or spitting - indicates an angry or defensive cat. Yowling - means that the cat is in distress or feeling aggressive. Chattering - occurs when hunting or tracking potential prey. This consists of quick chirps made while the mouth vibrates. The gaze is fixed and staring. This behavior may be in response to a surge of adrenaline or may be caused by the anticipation of a pending hunt. Body language Cats rely strongly on body language to communicate. A cat may rub against an object or lick a person. Much of a cat's body language is through its tail, ears, head position, and back posture. The tail Observing how a cat holds its tail can give a good sense of the cat’s current temperament. Held high, may have a slight curl forward - a sign of friendliness. The cat is happy, content, and comfortable. The tail may quiver or vibrate if the cat is excited. Held low and tucked under - a sign of fear or unease. The cat is attempting to make itself a smaller target to potential threats.
https://en.wikipedia.org/wiki/Key%20wrap
In cryptography, key wrap constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as protecting keys while in untrusted storage or transmitting keys over untrusted communications networks. The constructions are typically built from standard primitives such as block ciphers and cryptographic hash functions. Key Wrap may be considered as a form of key encapsulation algorithm, although it should not be confused with the more commonly known asymmetric (public-key) key encapsulation algorithms (e.g., PSEC-KEM). Key Wrap algorithms can be used in a similar application: to securely transport a session key by encrypting it under a long-term encryption key. Background In the late 1990s, the National Institute of Standards and Technology (NIST) posed the "Key Wrap" problem: to develop secure and efficient cipher-based key encryption algorithms. The resulting algorithms would be formally evaluated by NIST, and eventually approved for use in NIST-certified cryptographic modules. NIST did not precisely define the security goals of the resulting algorithm, and left further refinement to the algorithm developers. Based on the resulting algorithms, the design requirements appear to be (1) confidentiality, (2) integrity protection (authentication), (3) efficiency, (4) use of standard (approved) underlying primitives such as the Advanced Encryption Standard (AES) and the Secure Hash Algorithm (SHA-1), and (5) consideration of additional circumstances (e.g., resilience to operator error, low-quality random number generators). Goals (3) and (5) are particularly important, given that many widely deployed authenticated encryption algorithms (e.g., AES-CCM) are already sufficient to accomplish the remaining goals. Several constructions have been proposed. These include: AES Key Wrap Specification (November 2001, ) Implemented by the WebCrypto subtle
https://en.wikipedia.org/wiki/Moravian%20star
A Moravian star () is an illuminated Advent, Christmas, or Epiphany decoration popular in Germany and in places in Europe and America where there are Moravian congregations, notably the Lehigh Valley of Pennsylvania and the area surrounding Winston-Salem, North Carolina. The stars take their English name from the Moravian Church, originating in Moravia. In Germany, they are known as Herrnhut stars, named after the Moravian Mother Community in Saxony, Germany, where they were first commercially produced. History The first Moravian star is known to have originated in the 1830s at the Moravian Boys' School in Niesky, Germany, as a geometry lesson or project. The first mention is of a 110-point star for the 50th anniversary of the Paedagogium (classical school for boys) in Niesky. Around 1880, Peter Verbeek, an alumnus of the school, began making the stars and their instructions available for sale through his bookstore. His son Harry went on to found the Herrnhut Star Factory, which was the main source of stars until World War I. Although heavily damaged at the end of World War II, the Star Factory resumed manufacturing them. Briefly taken over by the government of East Germany in the 1950s, the factory was returned to the Moravian Church-owned Abraham Dürninger Company, which continues to make the stars in Herrnhut. Other star-making companies and groups have sprung up since then. Some Moravian congregations have congregation members who build and sell the stars as fund raisers. Cultural importance The star was soon adopted throughout the Moravian Church as an Advent symbol. At the time, Moravian congregations were inhabited exclusively by Moravians and the church owned and controlled all property. Daily life was centered on their Christian faith and there was no distinction between the secular and the sacred, even in their daily activities. Everything was considered worship. It did not take long for the stars to go from a pastime for children to an occupation for t
https://en.wikipedia.org/wiki/Openmoko
Openmoko is a discontinued project to create a family of open source mobile phones, including the hardware specification, the operating system (Openmoko Linux), and actual smartphone development implementation like the Neo 1973 and Neo FreeRunner. The whole project was sponsored by Openmoko Inc. The first sub-project was Openmoko Linux, a Linux-based operating system designed for mobile phones, built using free software. The second sub-project was developing hardware devices on which Openmoko Linux runs. The first device released was the Neo 1973, in 2007, which was followed up by the Neo FreeRunner on 25 June 2008. On 2 April 2009, Openmoko suspended development of their third device, codenamed GTA03, to focus on the FreeRunner. In 2010, development of the GTA03 was continued by Golden Delicious Computers under the new codename GTA04, which includes major hardware revision, and the first unit was shipped on 10 October 2011. Unlike most other mobile phone platforms, these phones are designed to provide end users with the ability to modify the operating system and software stack. Other Openmoko-supported phones are also available. History Project Openmoko was announced 7 November 2006 by its founders First International Computer (FIC). The Initial core team for Openmoko project included Werner Almesberger, Michael Lauer, Sean Moss-Pultz and Harald Welte. Etymology The name Openmoko is an acronym for Open Mobile Kommunikations. The codename for the phone product series, GTA, is an abbreviation of "GSM-TI-AGPS" which indicates the main components of the phone. Software Originally Openmoko Inc. developed its own operating system for the phones, which was called Openmoko Linux or Om. It uses the Linux kernel, together with a graphical user environment built using the X.Org Server. The OpenEmbedded build framework and opkg package system were used to create and maintain software packages. The initial version named Om 2007 used the GTK+ toolkit and the Matchbox
https://en.wikipedia.org/wiki/Von%20Neumann%20universal%20constructor
John von Neumann's universal constructor is a self-replicating machine in a cellular automaton (CA) environment. It was designed in the 1940s, without the use of a computer. The fundamental details of the machine were published in von Neumann's book Theory of Self-Reproducing Automata, completed in 1966 by Arthur W. Burks after von Neumann's death. While typically not as well known as von Neumann's other work, it is regarded as foundational for automata theory, complex systems, and artificial life. Indeed, Nobel Laureate Sydney Brenner considered Von Neumann's work on self-reproducing automata (together with Turing's work on computing machines) central to biological theory as well, allowing us to "discipline our thoughts about machines, both natural and artificial." Von Neumann's goal, as specified in his lectures at the University of Illinois in 1949, was to design a machine whose complexity could grow automatically akin to biological organisms under natural selection. He asked what is the threshold of complexity that must be crossed for machines to be able to evolve. His answer was to specify an abstract machine which, when run, would replicate itself. In his design, the self-replicating machine consists of three parts: a "description" of ('blueprint' or program for) itself, a universal constructor mechanism that can read any description and construct the machine (sans description) encoded in that description, and a universal copy machine that can make copies of any description. After the universal constructor has been used to construct a new machine encoded in the description, the copy machine is used to create a copy of that description, and this copy is passed on to the new machine, resulting in a working replication of the original machine that can keep on reproducing. Some machines will do this backwards, copying the description and then building a machine. Crucially, the self-reproducing machine can evolve by accumulating mutations of the description, not t
https://en.wikipedia.org/wiki/Key%20encapsulation%20mechanism
In cryptographic protocols, a key encapsulation mechanism (KEM) or key encapsulation method is used to secure symmetric key material for transmission using asymmetric (public-key) algorithms. It is commonly used in hybrid cryptosystems. In practice, public key systems are clumsy to use in transmitting long messages. Instead they are often used to exchange symmetric keys, which are relatively short. The symmetric key is then used to encrypt the longer message. The traditional approach to sending a symmetric key with public key systems is to first generate a random symmetric key and then encrypt it using the chosen public key algorithm. The recipient then decrypts the public key message to recover the symmetric key. As the symmetric key is generally short, padding is required for full security and proofs of security for padding schemes are often less than complete. KEMs simplify the process by generating a random element in the finite group underlying the public key system and deriving the symmetric key by hashing that element, eliminating the need for padding. Example using RSA encryption Using the same notation employed in the RSA system article, say Alice has transmitted her public key to Bob, while keeping her private key secret, as usual. Bob then wishes to send symmetric key M to Alice. M might be a 128 or 256-bit AES key, for example. Note that the public key is typically 2048-bits or even longer, thus much larger than typical symmetric keys. If is small enough that , then the encryption can be quickly broken using ordinary integer arithmetic. To avoid such potential weakness, Bob first turns M into a larger integer by using an agreed-upon reversible protocol known as a padding scheme, such as OAEP. He then computes the ciphertext corresponding to: Alice can recover from by using her private key exponent by the following computation: Given , she recovers the original message M by reversing the padding scheme. With KEM the process is simplif
https://en.wikipedia.org/wiki/Pharmaceutical%20formulation
Pharmaceutical formulation, in pharmaceutics, is the process in which different chemical substances, including the active drug, are combined to produce a final medicinal product. The word formulation is often used in a way that includes dosage form. Stages and timeline Formulation studies involve developing a preparation of the drug which is both stable and acceptable to the patients. For orally administered drugs, this usually involves incorporating the drug into a tablet or a capsule. It is important to make the distinction that a tablet contains a variety of other potentially inert substances apart from the drug itself, and studies have to be carried out to ensure that the encapsulated drug is compatible with these other substances in a way that does not cause harm, whether direct or indirect. Preformulation involves the characterization of a drug's physical, chemical, and mechanical properties in order to choose what other ingredients (excipients) should be used in the preparation. In dealing with protein pre-formulation, the important aspect is to understand the solution behavior of a given protein under a variety of stress conditions such as freeze/thaw, temperature, shear stress among others to identify mechanisms of degradation and therefore its mitigation. Formulation studies then consider such factors as particle size, polymorphism, pH, and solubility, as all of these can influence bioavailability and hence the activity of a drug. The drug must be combined with inactive ingredients by a method that ensures that the quantity of drug present is consistent in each dosage unit e.g. each tablet. The dosage should have a uniform appearance, with an acceptable taste, tablet hardness, and capsule disintegration. It is unlikely that formulation studies will be complete by the time clinical trials commence. This means that simple preparations are developed initially for use in phase I clinical trials. These typically consist of hand-filled capsules containing a
https://en.wikipedia.org/wiki/Gravitational%20biology
Gravitational biology is the study of the effects gravity has on living organisms. Throughout the history of the Earth life has evolved to survive changing conditions, such as changes in the climate and habitat. However, one constant factor in evolution since life first began on Earth is the force of gravity. As a consequence, all biological processes are accustomed to the ever-present force of gravity and even small variations in this force can have significant impact on the health and function and the system of organisms. Gravity and life on Earth The force of gravity on the surface of the Earth, normally denoted g, has remained constant in both direction and magnitude since the formation of the planet. As a result, both plant and animal life have evolved to rely upon and cope with it in various ways. For example, humans employ internal models in motor planning that account for the effects of gravity on gross and fine motor skills. Plant use of gravity Plant tropisms are directional movements of a plant with respect to a directional stimulus. One such tropism is gravitropism, or the growth or movement of a plant with respect to gravity. Plant roots grow towards the pull of gravity and away from sunlight, and shoots and stems grow against the pull of gravity and towards sunlight. Animal struggles with gravity Gravity has had an effect on the development of animal life since the first single-celled organism. The size of single biological cells is inversely proportional to the strength of the gravitational field exerted on the cell. That is, in stronger gravitational fields the size of cells decreases, and in weaker gravitational fields the size of cells increases. Gravity is thus a limiting factor in the growth of individual cells. Cells which were naturally larger than the size that gravity alone would allow for had to develop means to protect against internal sedimentation. Several of these methods are based upon protoplasmic motion, thin and elongated sha
https://en.wikipedia.org/wiki/Lung%20bud
The lung bud sometimes referred to as the respiratory bud forms from the respiratory diverticulum, an embryological endodermal structure that develops into the respiratory tract organs such as the larynx, trachea, bronchi and lungs. It arises from part of the laryngotracheal tube. Early stage In the fourth week of development, the respiratory diverticulum, starts to grow from the ventral (front) side of the foregut into the mesoderm that surrounds it, forming the lung bud. Around the 28th day, during the separation of the lung bud from the foregut it forms the trachea and splits into two bronchial buds, one on each side. Molecular signaling The molecular signaling involved in the specification of the respiratory bud starts with the expression of the Nkx2-1 gene, which determines the respiratory field – the area where the respiratory bud will begin to grow from. The signaling that makes the growth of the respiratory bud possible is complex and involves a number of interactions between the mesoderm and the respiratory bud epithelium, in which members of the Fgf and Fgfr family of genes express. Separation of trachea and esophagus At first, the posterior part of the trachea is open to the esophagus, but as the bud elongates two longitudinal mesodermal ridges known as the laryngotracheal folds, begin to form and grow until they join, forming a wall between the two organs. An incomplete separation of the organs leads to a congenital abnormality known as a tracheoesophageal fistula. Larynx development The epithelium of the larynx is of endodermal origin, but the laryngeal cartilages, unlike the rest of the respiratory bud connective tissue, come from the mesenchyme of the fourth and sixth pharyngeal arches. The fourth pharyngeal arch, adjacent to what will be the root of the tongue, will become the epiglottis. The sixth pharyngeal arch, located around the laryngeal orifice, will become the thyroid, cricoid and arytenoid cartilages. These structures are formed in a
https://en.wikipedia.org/wiki/List%20of%20therapeutic%20monoclonal%20antibodies
Therapeutic, diagnostic and preventive monoclonal antibodies are clones of a single parent cell. When used as drugs, the International Nonproprietary Names (INNs) end in -mab. The remaining syllables of the INNs, as well as the column Source, are explained in Nomenclature of monoclonal antibodies. The abbreviations in the column Type are as follows: mab: whole monoclonal antibody Fab: fragment, antigen-binding (one arm) F(ab')2: fragment, antigen-binding, including hinge region (both arms) Fab': fragment, antigen-binding, including hinge region (one arm) Variable fragments: scFv: single-chain variable fragment di-scFv: dimeric single-chain variable fragment sdAb: single-domain antibody BsAb: bispecific monoclonal antibody: 3funct: trifunctional antibody BiTE: bi-specific T-cell engager This list of over 500 monoclonal antibodies includes approved and investigational drugs as well as drugs that have been withdrawn from market; consequently, the column Use does not necessarily indicate clinical usage. See the list of FDA-approved therapeutic monoclonal antibodies in the monoclonal antibody therapy page.
https://en.wikipedia.org/wiki/Procyanidin
Procyanidins are members of the proanthocyanidin (or condensed tannins) class of flavonoids. They are oligomeric compounds, formed from catechin and epicatechin molecules. They yield cyanidin when depolymerized under oxidative conditions. See the box below entitled "Types of procyanidins" for links to articles on the various types. Distribution in plants Procyanidins, including the lesser bioactive / bioavailable polymers (4 or more catechines), represent a group of condensed flavan-3-ols that can be found in many plants, most notably apples, maritime pine bark, cinnamon, aronia fruit, cocoa beans, grape seed, grape skin, and red wines of Vitis vinifera (the common grape). However, bilberry, cranberry, black currant, green tea, black tea, and other plants also contain these flavonoids. Procyanidins can also be isolated from Quercus petraea and Q. robur heartwood (wine barrel oaks). Açaí oil, obtained from the fruit of the açaí palm (Euterpe oleracea), is rich in numerous procyanidin oligomers. Apples contain on average per serving about eight times the amount of procyanidin found in wine, with some of the highest amounts found in the Red Delicious and Granny Smith varieties. The seed testas of field beans (Vicia faba) contain procyanidins that affect the digestibility in piglets and could have an inhibitory activity on enzymes. Cistus salviifolius also contains oligomeric procyanidins. Analysis Condensed tannins can be characterised by a number of techniques including depolymerisation, asymmetric flow field flow fractionation or small-angle X-ray scattering. DMACA is a dye used for localization of procyanidin compounds in plant histology. The use of the reagent results in blue staining. It can also be used to titrate procyanidins. Total phenols (or antioxidant effect) can be measured using the Folin-Ciocalteu reaction. Results are typically expressed as gallic acid equivalents (GAE). Procyanidins from field beans (Vicia faba) or barley have been estimated us
https://en.wikipedia.org/wiki/Surface%20brightness%20fluctuation
Surface brightness fluctuation (SBF) is a secondary distance indicator used to estimate distances to galaxies. It is useful to 100 Mpc (parsec). The method measures the variance in a galaxy's light distribution arising from fluctuations in the numbers of and luminosities of individual stars per resolution element. The SBF technique uses the fact that galaxies are made up of a finite number of stars. The number of stars in any small patch of a galaxy will vary from point to point, creating a noise-like fluctuation in its surface brightness. While the various stars present in a galaxy will cover an enormous range of luminosity, the SBF can be characterized as having an average brightness. A galaxy twice as far away appears twice as smooth as a result of the averaging. Older elliptical galaxies have fairly consistent stellar populations, thus it closely approximates a standard candle. In practice, corrections are required to account for variations in age or metallicity from galaxy to galaxy. Calibration of the method is made empirically from Cepheids or theoretically from stellar population models. The SBF pattern is measured from the power spectrum of the residuals left behind from a deep galaxy image after a smooth model of the galaxy has been subtracted. The SBF pattern is evident as the transform of the point spread function in the Fourier domain. The amplitude of the spectrum gives the luminosity of the fluctuation star. Because the technique depends on a precise understanding of the image structure of the galaxy, extraneous sources such as globular clusters and background galaxies must be excluded. Corrections for interstellar dust absorption must also be accounted. In practice this means that SBF works best for elliptical galaxies or the bulges of S0 galaxies, and less so for spiral galaxies as they generally have complex morphologies and extensive dust features. SBF is calibrated by use of nearby Cepheid period-luminosity relation (P-L) based on me
https://en.wikipedia.org/wiki/Video%20wall
A video wall is a special multi-monitor setup that consists of multiple computer monitors, video projectors, or television sets tiled together contiguously or overlapped in order to form one large screen. Typical display technologies include LCD panels, Direct View LED arrays, blended projection screens, Laser Phosphor Displays, and rear projection cubes. Jumbotron technology was also previously used. Diamond Vision was historically similar to Jumbotron in that they both used cathode-ray tube (CRT) technology, but with slight differences between the two. Early Diamond vision displays used separate flood gun CRTs, one per subpixel. Later Diamond vision displays and all Jumbotrons used field-replaceable modules containing several flood gun CRTs each, one per subpixel, that had common connections shared across all CRTs in a module; the module was connected through a single weather-sealed connector. Screens specifically designed for use in video walls usually have narrow bezels in order to minimize the gap between active display areas, and are built with long-term serviceability in mind. Such screens often contain the hardware necessary to stack similar screens together, along with connections to daisy chain power, video, and command signals between screens. A command signal may, for example, power all screens in the video wall on or off, or calibrate the brightness of a single screen after bulb replacement (in Projection-based screens). Reasons for using a video wall instead of a single large screen can include the ability to customize tile layouts, greater screen area per unit cost, and greater pixel density per unit cost, due to the economics of manufacturing single screens which are unusual in shape, size, or resolution. Video walls are sometimes found in control rooms, stadiums, and other large public venues. Examples include the video wall in Oakland International Airport's baggage claim, where patrons are expected to observe the display at long distances,
https://en.wikipedia.org/wiki/Plasma-enhanced%20chemical%20vapor%20deposition
Plasma-enhanced chemical vapor deposition (PECVD) is a chemical vapor deposition process used to deposit thin films from a gas state (vapor) to a solid state on a substrate. Chemical reactions are involved in the process, which occur after creation of a plasma of the reacting gases. The plasma is generally created by radio frequency (RF) (alternating current (AC)) frequency or direct current (DC) discharge between two electrodes, the space between which is filled with the reacting gases. Discharges for processes A plasma is any gas in which a significant percentage of the atoms or molecules are ionized. Fractional ionization in plasmas used for deposition and related materials processing varies from about 10−4 in typical capacitive discharges to as high as 5–10% in high-density inductive plasmas. Processing plasmas are typically operated at pressures of a few millitorrs to a few torr, although arc discharges and inductive plasmas can be ignited at atmospheric pressure. Plasmas with low fractional ionization are of great interest for materials processing because electrons are so light, compared to atoms and molecules, that energy exchange between the electrons and neutral gas is very inefficient. Therefore, the electrons can be maintained at very high equivalent temperatures – tens of thousands of kelvins, equivalent to several electronvolts average energy—while the neutral atoms remain at the ambient temperature. These energetic electrons can induce many processes that would otherwise be very improbable at low temperatures, such as dissociation of precursor molecules and the creation of large quantities of free radicals. The second benefit of deposition within a discharge arises from the fact that electrons are more mobile than ions. As a consequence, the plasma is normally more positive than any object it is in contact with, as otherwise, a large flux of electrons would flow from the plasma to the object. The difference in voltage between the plasma and t
https://en.wikipedia.org/wiki/ExcelStor%20Technology
ExcelStor Technology () was established in 2000 as a small hard disk drive manufacturer and has evolved into a contract manufacturer and a system integrator. ExcelStor bought the bankrupt Conner Technology PLC, its products and factory. It has a manufacturing plant in Shenzhen, China, and an R&D center in Longmont, Colorado, United States. The company is partly owned by Shenzhen Kaifa Technology, of which the major share holder is China Great Wall Computer Group Co. In 2002, ExcelStor signed a deal with IBM to manufacture and sell the 40 GB version of IBM's Deskstar 120GXP series under the ExcelStor brand name. IBM was also to market these drives under its own brand name. In 2003, after Hitachi took over IBM's storage division, the deal was extended to include 40 GB and 80 GB drives from Hitachi's Deskstar 7K250 series. In addition to regular drives, the company also produced models with unusual firmware features, such as multi-boot management, and backup and restore features. Since 2004 ExcelStor has manufactured some of Iomega's products, including REV. In 2007 Iomega announced it would acquire ExcelStor in a stock swap valued at approximately $315 million. The deal fell apart, however, with Iomega paying a termination fee of $7.5 million in 2008 as Iomega was being acquired by EMC Corporation. In 2007, Excelstor laid off 20 of its 28 employees at its Longmont CO R&D Center.
https://en.wikipedia.org/wiki/ISO%206438
ISO 6438:1983, Documentation — African coded character set for bibliographic information interchange, is an ISO standard for an 8-bit character encoding for African languages. Developed separately from the African reference alphabet but apparently based on the same data sets, it has had little use; its forms are retained Unicode. Character set Prior to Unicode 7.0, mapped to .Prior to Unicode 8.0, mapped to . See also Africa Alphabet African reference alphabet Dinka alphabet Pan-Nigerian alphabet Standard Alphabet by Lepsius
https://en.wikipedia.org/wiki/Entropic%20security
Entropic security is a security definition used in the field of cryptography. Modern encryption schemes are generally required to protect communications even when the attacker has substantial information about the messages being encrypted. For example, even if an attacker knows that an intercepted ciphertext encrypts either the message "Attack" or the message "Retreat", a semantically secure encryption scheme will prevent the attacker from learning which of the two messages is encrypted. However, definitions such as semantic security are too strong to achieve with certain specialized encryption schemes. Entropic security is a weaker definition that can be used in the special case where an attacker has very little information about the messages being encrypted. It is well known that certain types of encryption algorithm cannot satisfy definitions such as semantic security: for example, deterministic encryption algorithms can never be semantically secure. Entropic security definitions relax these definitions to cases where the message space has substantial entropy (from an adversary's point of view). Under this definition it is possible to prove security of deterministic encryption. Note that in practice entropically-secure encryption algorithms are only "secure" provided that the message distribution possesses high entropy from any reasonable adversary's perspective. This is an unrealistic assumption for a general encryption scheme, since one cannot assume that all likely users will encrypt high-entropy messages. For these schemes, stronger definitions (such as semantic security or indistinguishability under adaptive chosen ciphertext attack) are appropriate. However, there are special cases in which it is reasonable to require high entropy messages. For example, encryption schemes that encrypt only secret key material (e.g., key encapsulation or Key Wrap schemes) can be considered under an entropic security definition. A practical application of this re
https://en.wikipedia.org/wiki/Bulbocapnine
Bulbocapnine is an alkaloid found in Corydalis (notably the European species C. cava) and Dicentra, genera of the plant family Fumariaceae which have caused (notably the American species Corydalis caseana) the fatal poisoning of sheep and cattle. It has been shown to act as an acetylcholinesterase inhibitor, and inhibits biosynthesis of dopamine via inhibition of the enzyme tyrosine hydroxylase. Like apomorphine, it is reported to be an inhibitor of amyloid beta protein (Aβ) fiber formation, whose presence is a hallmark of Alzheimer's disease (AD). Bulbocapnine is thus a potential therapeutic under the amyloid hypothesis. According to the Dorlands Medical Dictionary, it "inhibits the reflex and motor activities of striated muscle. It has been used in the treatment of muscular tremors and vestibular nystagmus". A psychiatrist at Tulane University named Robert Heath carried out experiments on prisoners at the Louisiana State Penitentiary using bulbocapnine to induce stupor. This work at Tulane inspired, and was continued parallel to, experiments carried out at the behest of the Central Intelligence Agency. The bulbocapnine work Heath conducted for the government was one component of a large investigation into the potential of psychoactive compounds as aids to interrogation. Effects It can induce catalepsy featuring the curious symptom of waxy flexibility and the state produced by the drug has been compared to Akinetic mutism. In popular culture In literature The author William S. Burroughs references the drug in his book Naked Lunch (1959), in which the fictional Dr. Benway uses it to induce obedience in torture victims. In television The drug's use to treat Mayor Kane's father-in-law and predecessor is a plot point in season 2 of the TV series Boss, e.g., in episodes s2.e8 ("Consequences"; October 5, 2012) and s2.e9 ("Church"; October 12, 2012). See also
https://en.wikipedia.org/wiki/Kutta%E2%80%93Joukowski%20theorem
The Kutta–Joukowski theorem is a fundamental theorem in aerodynamics used for the calculation of lift of an airfoil (and any two-dimensional body including circular cylinders) translating in a uniform fluid at a constant speed large enough so that the flow seen in the body-fixed frame is steady and unseparated. The theorem relates the lift generated by an airfoil to the speed of the airfoil through the fluid, the density of the fluid and the circulation around the airfoil. The circulation is defined as the line integral around a closed loop enclosing the airfoil of the component of the velocity of the fluid tangent to the loop. It is named after Martin Kutta and Nikolai Zhukovsky (or Joukowski) who first developed its key ideas in the early 20th century. Kutta–Joukowski theorem is an inviscid theory, but it is a good approximation for real viscous flow in typical aerodynamic applications. Kutta–Joukowski theorem relates lift to circulation much like the Magnus effect relates side force (called Magnus force) to rotation. However, the circulation here is not induced by rotation of the airfoil. The fluid flow in the presence of the airfoil can be considered to be the superposition of a translational flow and a rotating flow. This rotating flow is induced by the effects of camber, angle of attack and the sharp trailing edge of the airfoil. It should not be confused with a vortex like a tornado encircling the airfoil. At a large distance from the airfoil, the rotating flow may be regarded as induced by a line vortex (with the rotating line perpendicular to the two-dimensional plane). In the derivation of the Kutta–Joukowski theorem the airfoil is usually mapped onto a circular cylinder. In many textbooks, the theorem is proved for a circular cylinder and the Joukowski airfoil, but it holds true for general airfoils. Lift force formula The theorem applies to two-dimensional flow around a fixed airfoil (or any shape of infinite span). The lift per unit span of the
https://en.wikipedia.org/wiki/Position%20sensitive%20device
A position sensitive device and/or position sensitive detector (PSD) is an optical position sensor (OPS) that can measure a position of a light spot in one or two-dimensions on a sensor surface. Principles PSDs can be divided into two classes which work according to different principles: In the first class, the sensors have an isotropic sensor surface that supplies continuous position data. The second class has discrete sensors in an raster-like structure on the sensor surface that supply local discrete data. Isotropic Sensors The technical term PSD was first used in a 1957 publication by J.T. Wallmark for lateral photoelectric effect used for local measurements. On a laminar semiconductor, a so-called PIN diode is exposed to a tiny spot of light. This exposure causes a change in local resistance and thus electron flow in four electrodes. From the currents , , and in the electrodes, the location of the light spot is computed using the following equations. and The and are simple scaling factors, which permit transformation into coordinates. An advantage of this process is the continuous measurement of the light spot position with measuring rates up to over 100 kHz. The dependence of local measurement on form and size of the light spot as well as the nonlinear connection are a disadvantage that can be partly compensated by special electrode shapes. 2-D tetra-lateral Position Sensitive Device (PSD) A 2-D tetra-lateral PSD is capable of providing continuous position measurement of the incident light spot in 2-D. It consists of a single square PIN diode with a resistive layer. When there is an incident light on the active area of the sensor, photocurrents are generated and collected from four electrodes placed along each side of the square near the boundary. The incident light position can be estimated based on currents collected from the electrodes: and The 2-D tetra-lateral PSD has the advantages of fast response, much lower dark current, easy bi
https://en.wikipedia.org/wiki/Straw%20wine
Straw wine, or raisin wine, is a wine made from grapes that have been dried off the vine to concentrate their juice. Under the classic method, after a careful hand harvest, selected bunches of ripe grapes will be laid out on mats in full sun. (Originally the mats were made of straw, but these days the plastic nets for the olive harvest are likely to be used). This drying will probably be done on well exposed terraces somewhere near the wine press and the drying process will take around a week or longer. Small scale productions were laid out on flat roofs; however, if this still happens, it is extremely rare nowadays. Under less labour-intensive versions of the technique, easily portable racks might be used instead of mats or nets, or the grapes are left lying on the ground beneath the vines, or even left hanging on the vine with the vine-arm cut or the stem twisted. Technically speaking the grapes must be cut off from the vine in order for the wine to be a 'straw wine'. If the grapes are just left to over-ripen before being harvested, even if this is to the point of raisining, this is a 'late harvest' wine. The exact technique used varies according to local conditions, traditions and increasingly modern innovations. In some regions the grapes are laid first in the sun and later covered or they are covered at night to protect them against dew fall. In cooler, damper regions, the entire drying process takes place indoors in huts, attics or greenhouses with the bunches lying on racks or hanging up with good air circulation. Straw wines are typically sweet to very sweet white wines, similar in density and sweetness to Sauternes but potentially sweeter. They are capable of long ageing. The low yields and labour-intensive production method means that they are quite expensive. Around Verona red grapes are dried, and are fermented in two different ways to make a strong dry red wine (Amarone) and a sweet red wine (Recioto della Valpolicella). History The technique dates
https://en.wikipedia.org/wiki/Acoustic%20approximation
In acoustics, the acoustic approximation is a fundamental principle that states that an acoustic wave is created by a small, adiabatic, pressure ripple riding on a comparatively large equilibrium (bias) pressure. Typically, the acoustic pressure is on the order of a few ppm of the equilibrium pressure. By extension, the acoustic approximation also guarantees that an acoustic wave travels at a speed exactly equal to the local speed of sound. See also Sound Acoustics
https://en.wikipedia.org/wiki/Butasan
(also known as Mr. Pig and Pig and Bombers) is a arcade video game developed by NMK and Jaleco and released in 1987. It was ported to the ZX Spectrum, Commodore 64, MSX, and Amstrad CPC by U.S. Gold as Psycho Pigs U.X.B. Gameplay The player controls a pig and the aim of the game is to blow up other pigs by throwing bombs at them. The bombs are randomly spawned across the map and can be picked up and thrown at the other pigs. The bombs are given a number between 5 and 30; when the bomb is thrown it takes that number of seconds to explode. Bombs which directly hit pigs explode on contact. Various power ups are available throughout the game such as gas that makes all other characters fall asleep. A bonus sub-game involves random pigs popping out of holes, and the player must knock them back down the hole with their own pig, in a similar mode of gameplay to Whack-a-mole. Ports The game was released on the Nintendo Switch in the Nintendo eShop on 16 May 2019 by Hamster Corporation as part of their Arcade Archives series and also on the PlayStation 4 on 14 July 2015 as part of the same series. Reception There were several criticisms of sexism when an advert of the game showing a semi-naked model holding the video game case was published in some specialized magazines.
https://en.wikipedia.org/wiki/Single-instance%20storage
Single-instance storage (SIS) is a system's ability to take multiple copies of content and replace them by a single shared copy. It is a means to eliminate data duplication and to increase efficiency. SIS is frequently implemented in file systems, e-mail server software, data backup, and other storage-related computer software. Single-instance storage is a simple variant of data deduplication. While data deduplication may work at a segment or sub-block level, single-instance storage works at the whole-file level and eliminates redundant copies of entire files or e-mail messages. Concept In the case of an e-mail server, single-instance storage would mean that a single copy of a message is held within its database while individual mailboxes access the content through a reference pointer. However, there is a common misconception that the primary benefit of single-instance storage in mail servers is a reduction in disk space requirements. The truth is that its primary benefit is to greatly enhance delivery efficiency of messages sent to large distribution lists. In a mail server scenario disk space savings from single-instance storage are transient and drop off very quickly over time. When used in conjunction with backup software, single-instance storage can reduce the quantity of archive media required since it avoids storing duplicate copies of the same file. Often identical files are installed on multiple computers, for example operating system files. With single-instance storage, only one copy of a file is written to the backup media therefore reducing space. This becomes more important when the storage is offsite and on cloud storage such as Amazon S3. In such cases, it has been reported that deduplication can help reduce the costs of storage, costs of bandwidth and backup windows by up to 10:1. Novell GroupWise was built on single-instance storage, which accounts for its large capacity. ISO CD/DVD image files can be optimized to use SIS to reduce the size o
https://en.wikipedia.org/wiki/Paternal%20age%20effect
The paternal age effect is the statistical relationship between the father's age at conception and biological effects on the child. Such effects can relate to birthweight, congenital disorders, life expectancy and psychological outcomes. A 2017 review found that while severe health effects are associated with higher paternal age, the total increase in problems caused by paternal age is low. While paternal age has increased since 1960–1970, this is not seen as a major public health concern. The genetic quality of sperm, as well as its volume and motility, may decrease with age, leading the population geneticist James F. Crow to claim that the "greatest mutational health hazard to the human genome is fertile older males". The paternal age effect was first proposed implicitly by physician Wilhelm Weinberg in 1912 and explicitly by psychiatrist Lionel Penrose in 1955. DNA-based research started more recently, in 1998, in the context of paternity testing. Health effects Evidence for a paternal age effect has been proposed for a number of conditions, diseases and other effects. In many of these, the statistical evidence of association is weak, and the association may be related by confounding factors or behavioural differences. Conditions proposed to show correlation with paternal age include the following: Single-gene disorders Advanced paternal age may be associated with a higher risk for certain single-gene disorders caused by mutations of the FGFR2, FGFR3 and RET genes. These conditions are Apert syndrome, Crouzon syndrome, Pfeiffer syndrome, achondroplasia, thanatophoric dysplasia, multiple endocrine neoplasia type 2, and multiple endocrine neoplasia type 2b. The most significant effect concerns achondroplasia (a form of dwarfism), which might occur in about 1 in 1,875 children fathered by men over 50, compared to 1 in 15,000 in the general population. However, the risk for achondroplasia is still considered clinically negligible. The FGFR genes may be particular
https://en.wikipedia.org/wiki/List%20of%20medical%20roots%2C%20suffixes%20and%20prefixes
This is a used in medical terminology, their meanings, and their etymologies. Most of them are combining forms in Neo-Latin and hence international scientific vocabulary. There are a few general rules about how they combine. First, prefixes and suffixes, most of which are derived from ancient Greek or classical Latin, have a droppable vowel, usually -o-. As a general rule, this vowel almost always acts as a joint-stem to connect two consonantal roots (e.g. + + -logy = arthrology), but generally, the -o- is dropped when connecting to a vowel-stem (e.g. + -itis = arthritis, instead of ). Second, medical roots generally go together according to language, i.e., Greek prefixes occur with Greek suffixes and Latin prefixes with Latin suffixes. Although international scientific vocabulary is not stringent about segregating combining forms of different languages, it is advisable when coining new words not to mix different lingual roots. Prefixes and suffixes The following is an alphabetical list of medical prefixes and suffixes, along with their meanings, origins, and English examples. A B C D E F G H I J–K L M N O P Q–R S T U V X–Z English meanings This section contains lists of different root classification (e.g. body components, quantity, description, etc.). Each list is alphabetized by English meanings, with the corresponding Greek and Latin roots given. Roots of the body Roots of bodily concepts Body parts and substances Roots of color Roots of description Roots of position Prefixes of quantity or amount See also Glossary of medicine Classical compound International scientific vocabulary List of medical abbreviations Medical dictionary Medicine List of commonly used taxonomic affixes
https://en.wikipedia.org/wiki/Varnish%20%28software%29
Varnish is a reverse caching proxy used as HTTP accelerator for content-heavy dynamic web sites as well as APIs. In contrast to other web accelerators, such as Squid, which began life as a client-side cache, or Apache and nginx, which are primarily origin servers, Varnish was designed as an HTTP accelerator. Varnish is focused exclusively on HTTP, unlike other proxy servers that often support FTP, SMTP, and other network protocols. History The project was initiated by the online branch of the Norwegian tabloid newspaper Verdens Gang. The architect and lead developer is Danish independent consultant Poul-Henning Kamp (a well-known FreeBSD developer), with management, infrastructure and additional development originally provided by the Norwegian Linux consulting company Linpro. The support, management and development of Varnish was later spun off into a separate company, Varnish Software. Varnish is free and open source software, available under a two-clause BSD license. Commercial support is available from Varnish Software, amongst others. Version 1.0 of Varnish was released in 2006, Varnish 2.0 in 2008, Varnish 3.0 in 2011, Varnish 4.0 in 2014, Varnish 5.0 in 2016, Varnish 6.0 in March 2018, and Varnish 7.0 in September 2021. Architecture Varnish stores data in virtual memory and leaves the task of deciding what is stored in memory and what gets paged out to disk to the operating system. This helps avoid the situation where the operating system starts caching data while it is moved to disk by the application. Varnish is heavily threaded, with each client connection being handled by a separate worker thread. When the configured limit on the number of active worker threads is reached, incoming connections are placed in an overflow queue; when this queue reaches its configured limit incoming connections will be rejected. The principal configuration mechanism is Varnish Configuration Language (VCL), a domain-specific language (DSL) used to write hooks that are ca
https://en.wikipedia.org/wiki/Relative%20interior
In mathematics, the relative interior of a set is a refinement of the concept of the interior, which is often more useful when dealing with low-dimensional sets placed in higher-dimensional spaces. Formally, the relative interior of a set (denoted ) is defined as its interior within the affine hull of In other words, where is the affine hull of and is a ball of radius centered on . Any metric can be used for the construction of the ball; all metrics define the same set as the relative interior. A set is relatively open iff it is equal to its relative interior. Note that when is a closed subspace of the full vector space (always the case when the full vector space is finite dimensional) then being relatively closed is equivalent to being closed. For any convex set the relative interior is equivalently defined as where means that there exists some such that . Comparison to interior The interior of a point in an at least one-dimensional ambient space is empty, but its relative interior is the point itself. The interior of a line segment in an at least two-dimensional ambient space is empty, but its relative interior is the line segment without its endpoints. The interior of a disc in an at least three-dimensional ambient space is empty, but its relative interior is the same disc without its circular edge. Properties See also
https://en.wikipedia.org/wiki/Habeas%20data
Habeas data is a writ and constitutional remedy available in certain nations. The literal translation from Latin of habeas data is "[we command] you have the data," or "you [the data subject] have the data." The remedy varies from country to country, but in general, it is designed to protect, by means of an individual complaint presented to a constitutional court, the data, image, privacy, honour, information self-determination and freedom of information of a person. Habeas data can be sought by any citizen against any manual or automated data register to find out what information is held about his or her person. That person can request the rectification, update or the destruction of the personal data held. The legal nature of the individual complaint of habeas data is that of voluntary jurisdiction, which means that the person whose privacy is being compromised can be the only one to present it. The courts do not have any power to initiate the process by themselves. History Habeas data is an individual complaint filed before a constitutional court and related to the privacy of personal data. The first such complaint is the habeas corpus (which is roughly translated as "[we command] you have the body"). Other individual complaints include the writ of mandamus (USA), amparo (Spain, Mexico and Argentina), and respondeat superior (Taiwan). The habeas data writ itself has a very short history, but its origins can be traced to certain European legal mechanisms that protected individual privacy. In particular, certain German constitutional rights can be identified as the direct progenitors of the habeas data right. In particular, the right to information self-determination was created by the German constitutional tribunal by interpretation of the existing rights of human dignity and personality. This is a right to know what type of data are stored in manual and automatic databases about an individual, and it implies that there must be transparency on the gathering and
https://en.wikipedia.org/wiki/Elongatedness
In image processing, elongatedness for a region is the ratio between the length and width of the minimum bounding rectangle of the region. It is considered a feature of the region. It can be evaluated as the ratio between the area of the region to its thickness squared: . where the maximum thickness, , of a holeless region is given by the number of times the region can be eroded before disappearing.
https://en.wikipedia.org/wiki/Promontory%20of%20tympanic%20cavity
The promontory of the tympanic cavity, also known as the cochlear promontory is a rounded hollow prominence upon - and most prominent feature of - the medial wall of the tympanic cavity formed by the underlying first turn of the cochlea. The surface of the promontory is furrowed by fine grooves that accommodate to the strands of the tympanic plexus. The oval window is situated superoposteriorly to the promontory, and the round window inferoposteriorly to it. A minute spicule of bone frequently connects the promontory to the pyramidal eminence. Additional images
https://en.wikipedia.org/wiki/Vestibule%20of%20the%20ear
The vestibule is the central part of the bony labyrinth in the inner ear, and is situated medial to the eardrum, behind the cochlea, and in front of the three semicircular canals. The name comes from the Latin , literally an entrance hall. Structure The vestibule is somewhat oval in shape, but flattened transversely; it measures about 5 mm from front to back, the same from top to bottom, and about 3 mm across. In its lateral or tympanic wall is the oval window, closed, in the fresh state, by the base of the stapes and annular ligament. On its medial wall, at the forepart, is a small circular depression, the recessus sphæricus, which is perforated, at its anterior and inferior part, by several minute holes (macula cribrosa media) for the passage of filaments of the acoustic nerve to the saccule; and behind this depression is an oblique ridge, the crista vestibuli, the anterior end of which is named the pyramid of the vestibule. This ridge bifurcates below to enclose a small depression, the fossa cochlearis, which is perforated by a number of holes for the passage of filaments of the acoustic nerve which supply the vestibular end of the cochlear duct. The orifice of the vestibular aqueduct is the hind part of the medial wall; it extends to the posterior surface of the petrous portion of the temporal bone. It transmits a small vein and contains a tubular prolongation of the membranous labyrinth, the endolymphatic duct, which ends in a cul-de-sac between the layers of the dura mater within the cranial cavity. On the upper wall or roof, there is a transversely oval depression, the recessus ellipticus, separated from the recessus sphæricus by the crista vestibuli already mentioned. The pyramid and adjoining part of the recessus ellipticus are perforated by a number of holes (macula cribrosa superior). The apertures in the pyramid transmit the nerves to the utricle; those in the recessus ellipticus are the nerves to the ampullæ of the superior and lateral semicir
https://en.wikipedia.org/wiki/Inshore%20coastal%20areas%20of%20the%20United%20Kingdom
The inshore coastal areas of the United Kingdom are 15 fixed stretches of coastline that are used in weather forecasting especially for wind-powered or small coastal craft. Each area is delimited by geographical features such as headlands, seaports or estuaries. When used as part of a broadcast weather forecast they are mentioned in the same order, clockwise round the mainland starting and finishing in the north west of the island of Great Britain. The Isle of Man is included in the forecasts but it is not part of the United Kingdom. List of inshore coastal areas Cape Wrath – Rattray Head including Orkney Rattray Head – Berwick on Tweed Berwick on Tweed – Whitby Whitby – Gibraltar Point Gibraltar Point – North Foreland North Foreland – Selsey Bill Selsey Bill – Lyme Regis Lyme Regis – Land's End including the Isles of Scilly Land's End – St David's Head including the Bristol Channel St David's Head – Great Orme's Head including St George's Channel Great Orme's Head – Mull of Galloway Isle of Man Lough Foyle – Carlingford Lough (covers the entire coastline of Northern Ireland) Mull of Galloway – Mull of Kintyre including the Firth of Clyde and the North Channel Mull of Kintyre – Ardnamurchan Point Ardnamurchan Point – Cape Wrath including the Outer Hebrides Shetland Isles The BBC's coastal forecast splits some of these into shorter lengths of coast. The points at which they are split are Duncansby Head, Fife Ness, Harwich, Thames Estuary, Beachy Head, The Solent, St Albans Head, Start Point, Hartland Point, Holyhead, Morecambe Bay, Firth of Clyde. Additionally, there is a forecast for the Channel Islands. See also Coastline of the United Kingdom Shipping Forecast List of coastal weather stations in the British Isles External links Met Office Inshore Waters forecast Coasts of the United Kingdom Marine meteorology Meteorological data and networks
https://en.wikipedia.org/wiki/Basilar%20crest
The basilar crest lies within the cochlear duct in the inner ear. It gives attachment to the outer edge of the basilar membrane and is a spiral ligament that projects inward below as a triangular prominence.
https://en.wikipedia.org/wiki/Spiral%20ligament
The spiral ligament is a fibrous cushion located between the stria vascularis and the bony otic capsule. The periosteum, forming the outer wall of the cochlear duct (), is greatly thickened and altered in character. Additional images
https://en.wikipedia.org/wiki/Sulcus%20spiralis%20internus
On the upper plate of that part of the lamina which is outside the vestibular membrane, the periosteum is thickened to form the spiral limbus, this ends externally in a concavity, the sulcus spiralis internus, which represents, on section, the form of the letter C.
https://en.wikipedia.org/wiki/Sulcus%20spiralis%20externus
The basilar crest gives attachment to the outer edge of the basilar membrane; immediately above the crest is a concavity, the sulcus spiralis externus.
https://en.wikipedia.org/wiki/Saccular%20nerve
The saccular nerve is a nerve which supplies the macula of the saccule.
https://en.wikipedia.org/wiki/Computational%20logic
Computational logic is the use of logic to perform or reason about computation. It bears a similar relationship to computer science and engineering as mathematical logic bears to mathematics and as philosophical logic bears to philosophy. It is synonymous with "logic in computer science". The term “computational logic” came to prominence with the founding of the ACM Transactions on Computational Logic in 2000. However, the term was introduced much earlier, by J.A. Robinson in 1970. The expression is used in the second paragraph with a footnote claiming that "computational logic" is "surely a better phrase than 'theorem proving', for the branch of artificial intelligence which deals with how to make machines do deduction efficiently". In 1972 the Metamathematics Unit at the University of Edinburgh was renamed “The Department of Computational Logic” in the School of Artificial Intelligence. The term was then used by Robert S. Boyer and J Strother Moore, who worked in the Department in the early 1970s, to describe their work on program verification and automated reasoning. They also founded Computational Logic Inc. Computational logic has also come to be associated with logic programming, because much of the early work in logic programming in the early 1970s also took place in the Department of Computational Logic in Edinburgh. It was reused in the early 1990s to describe work on extensions of logic programming in the EU Basic Research Project "Compulog" and in the associated Network of Excellence. Krzysztof Apt, who was the co-ordinator of the Basic Research Project Compulog-II, reused and generalized the term when he founded the ACM Transactions on Computational Logic in 2000 and became its first Editor-in-Chief. See also Logic programming Automated theorem proving Type theory Formal verification
https://en.wikipedia.org/wiki/Polytetrahedron
Polytetrahedron is a term used for three distinct types of objects, all based on the tetrahedron: A uniform convex 4-polytope made up of 600 tetrahedral cells. It is more commonly known as a 600-cell or hexacosichoron. Other derivative 4-polytope are identified as polytetrahedra, where a qualifying prefix such as rectified or truncated is used. A connected set of regular tetrahedra, the 3-dimensional analogue of a polyiamond. Polytetrahedra and polyiamonds are related as polycubes are related to polyominoes. In origami, a polypolyhedron is "a compound of multiple linked polyhedral skeletons with uniform nonintersecting edges" . There exist two topologically distinct polytetrahedra, each made up of four intersecting triangles. See also Compound of five tetrahedra Compound of ten tetrahedra
https://en.wikipedia.org/wiki/Chinese%20telegraph%20code
The Chinese telegraph code, Chinese telegraphic code, or Chinese commercial code ( or ) is a four-digit decimal code (character encoding) for electrically telegraphing messages written with Chinese characters. Encoding and decoding A codebook is provided for encoding and decoding the Chinese telegraph code. It shows one-to-one correspondence between Chinese characters and four-digit numbers from 0000 to 9999. Chinese characters are arranged and numbered in dictionary order according to their radicals and strokes. Each page of the book shows 100 pairs of a Chinese character and a number in a 10×10 table. The most significant two digits of a code matches the page number, the next digit matches the row number, and the least significant digit matches the column number, with 1 being the column on the far right. For example, the code 0022 for the character (zhōng), meaning “center,” is given in page 00, row 2, column 2 of the codebook, and the code 2429 for the character (wén), meaning “script,” is given in page 24, row 2, column 9. The PRC’s Standard Telegraph Codebook (Ministry of Post and Telecommunications 2002) provides codes for approximately 7,000 Chinese characters. Senders convert their messages written with Chinese characters to a sequence of digits according to the codebook. For instance, the phrase (Zhōngwén xìnxī), meaning “information in Chinese,” is rendered into the code as 0022 2429 0207 1873. It is transmitted using Morse code. Receivers decode the Morse code to get a sequence of digits, chop it into an array of quadruplets, and then decode them one by one referring to the book. Due to the fact that non-digit characters were not used, the Morse codes for digits could be simplified, for example one's several consequent dashes could be replaced with a single dash. The codebook also defines codes for Zhuyin alphabet, Latin alphabet, Cyrillic alphabet, and various symbols including special symbols for months, days in a month, and hours. Senders may
https://en.wikipedia.org/wiki/Parallel%20compression
Parallel compression, also known as New York compression, is a dynamic range compression technique used in sound recording and mixing. Parallel compression, a form of upward compression, is achieved by mixing an unprocessed 'dry', or lightly compressed signal with a heavily compressed version of the same signal. Rather than lowering the highest peaks for the purpose of dynamic range reduction, it decreases the dynamic range by raising up the softest sounds, adding audible detail. It is most often used on stereo percussion buses in recording and mixdown, on electric bass, and on vocals in recording mixes and live concert mixes. History The internal circuitry of Dolby A noise reduction, introduced in 1965, contained parallel buses with compression on one of them, the two mixed in a flexible ratio. In October 1977, an article by Mike Beville was published in Studio Sound magazine describing the technique as applied to classical recordings. Many citations of this article claim that Beville called it "side-chain" compression, most likely due to a misquoting of a citation of the article in Roey Izhaki's book, Mixing Audio: Concepts, Practices and Tools. However, Beville used the term "side-chain" to describe the internal electronics and signal flow of compressors, not to describe a technique for using compressors. His discussion of parallel compression technique occurs in a separate section at the end of the article where he outlines how to place a limiter-compressor "in parallel with the direct signal" to obtain effective compression at low input levels. As Izhaki mentions in his book, others have referred to the technique as "side-chain" compression, which has made for confusion with the side-chain compression technique which uses an external "key" or "side chain" signal to determine compression on a target signal. Beville's article, entitled "Compressors and Limiters," was reprinted in the same magazine in June 1988. A follow-up article by Richard Hulse in the April
https://en.wikipedia.org/wiki/List%20of%20online%20encyclopedias
This is a list of well-known online encyclopedias—i.e., encyclopedias accessible or formerly accessible on the Internet. The largest online encyclopedias are general reference works, though there are also many specialized ones. Some online encyclopedias are editions of a print encyclopedia, such as Encyclopædia Britannica, whereas others have always existed online, such as Wikipedia. General reference Biography Antiquities, arts, and literature Regional interest US-specific Pop culture and fiction Mathematics Media Philosophy Politics, law, and history Religion and theology Science and technology Life sciences Medical See also Chinese encyclopedia List of academic databases and search engines List of blogs List of Danish online encyclopedic resources List of encyclopedias by branch of knowledge List of online databases List of online dictionaries List of multilingual MediaWiki sites List of wikis List of Wikipedias
https://en.wikipedia.org/wiki/List%20of%20online%20databases
This is a list of online databases accessible via the Internet. A Abandoned & Little-Known Airfields Academic OneFile Acronym Finder Aeiou Encyclopedia Airiti Inc Airliners.net All Media Guide Allgame (down) Allmovie Allmusic American National Corpus Animal Diversity Web Animal Genome Size Database Animator.ru Arachne ArchINFORM Archive site ArtCyclopedia Amazon.com Aviation Safety Reporting System B Bank of English Beilstein database BiblioPage.com Bibliotek.dk Big Cartoon DataBase Big Comic Book DataBase Bioinformatic Harvester BoardGameGeek C CAMPUS Catholic-Hierarchy.org CellarTracker ChEBI Chemical Abstracts Service Chessgames.com China Pollution Map Database CIDOB Foundation Cinema and Science CiteSeer ClassRanked.com Collection of Computer Science Bibliographies Comic book price guide Comics Buyer's Guide Credo Reference Croatian National Corpus Current Biography D DBLP DIALOG Dictionary of Canadian Biography Discogs Displayespecification E Earth Human STR Allele Frequencies Database ELDIS EMBASE Encyclopedia Astronautica Encyclopedia Mythica English Short Title Catalogue Entrez Everyone's a Critic F Factiva Facts on File Fashion Model Directory Filmarchives online Filmweb Find a Grave FINDbase (the Frequency of INherited Disorders database) FishBase Flags of the World Flora Europaea Fragrantica G Gallica GameRankings GeneNetwork GeoNames Gesamtkatalog der Wiegendrucke Getty Thesaurus of Geographic Names Golm Metabolome Database Google Grand Comics Database Gsmarena H Hong Kong Movie DataBase Hoover's HotPads.com I IGDB (Internet Games Database) IMDb (Internet Movie Database) INDUCKS IndexMaster Informit (database) Inorganic Crystal Structure Database Interment.net Internet Archive Internet Broadway Database Internet Movie Cars Database Internet Movie Firearms Database Internet Off-Broadway Database Internet Public Library Internet Speculative Fict
https://en.wikipedia.org/wiki/List%20of%20online%20dictionaries
An online dictionary is a dictionary that is accessible via the Internet through a web browser. They can be made available in a number of ways: free, free with a paid subscription for extended or more professional content, or a paid-only service. Many dictionaries have been digitized from their print versions and are available at online libraries. Some online dictionaries are organized as lists of words, similar to a glossary, while others offer search features, reverse lookups, and additional language tools and content such as verb conjugations, grammar references, and discussion forums. The variety of online dictionaries for specialized topics is enormous, covering a wide range of fields such as computing, business and investing, along with almost any other class of trade, science, art, or common interest with its own terminology. Selected online dictionaries The following is a concise list of online English dictionaries whose definitions are based upon well-established content. American Heritage Dictionary American Heritage Dictionary of the English Language, Fifth Ed. Collins Online Dictionary Collins Unabridged English Dictionary; Collins Unabridged Thesaurus; Collins Webster's American English Dictionary Dictionary.com Dictionary.com Unabridged, based on the Random House Webster's Unabridged Dictionary Merriam-Webster Online Merriam-Webster Online Dictionary Advanced learner's dictionaries Cambridge Dictionaries Online Cambridge Advanced Learner's Dictionary Longman Longman Dictionary of Contemporary English Macmillan Macmillan English Dictionary for Advanced Learners Oxford Advanced Learner's Dictionary Oxford Advanced Learner's Dictionary Other examples Multilingual English language Other specific languages See also Electronic dictionary Thesaurus List of online encyclopedias
https://en.wikipedia.org/wiki/Angle%20of%20the%20mandible
The angle of the mandible (gonial angle) is located at the posterior border at the junction of the lower border of the ramus of the mandible. The angle of the mandible, which may be either inverted or everted, is marked by rough, oblique ridges on each side, for the attachment of the masseter laterally, and the pterygoideus internus (medial pterygoid muscle) medially; the stylomandibular ligament is attached to the angle between these muscles. The forensic term for the midpoint of the mandibular angle is the gonion. The gonion is a cephalometric landmark located at the lowest, posterior, and lateral point on the angle. This site is at the apex of the maximum curvature of the mandible, where the ascending ramus becomes the body of the mandible. The mandibular angle has been named as a forensic tool for gender determination, but some studies have called into question whether there is any significant sex difference in humans in the angle. Many mammals have a distinctive bony prong, the angular process, immediately above the angle of the mandible. See also Ohngren's line Additional images
https://en.wikipedia.org/wiki/Maxillary%20tuberosity
At the lower part of the infratemporal surface of the maxilla is a rounded eminence, the maxillary tuberosity, especially prominent after the growth of the wisdom tooth; it is rough on its lateral side for articulation with the pyramidal process of the palatine bone and in some cases articulates with the lateral pterygoid plate of the sphenoid. It gives origin to a few fibers of the medial pterygoid muscle.
https://en.wikipedia.org/wiki/Chief%20Wahoo
Chief Wahoo is a logo that was used by the Cleveland Indians, a Major League Baseball (MLB) franchise based in Cleveland, Ohio, from 1951 to 2018. As part of the larger Native American mascot controversy, the logo drew criticism from Native Americans, social scientists, and religious and educational groups, but was popular among fans of the team. During the 2010s, it was gradually replaced by a block "C", which became the primary logo in 2013. Chief Wahoo was officially retired following the 2018 season, with it also barred from future National Baseball Hall of Fame and Museum plaques and merchandise sold outside of Ohio. History In 1932, the front page of the Cleveland Plain Dealer featured a cartoon by Fred George Reinert that used a caricatured Native American character with a definite resemblance to the later Chief Wahoo as a stand-in for the Cleveland Indians winning an important victory. The character came to be called "The Little Indian", eventually becoming a fixture in the paper's coverage of the team, including a small front-page visual box where his head would peek out to announce the outcome of the latest game. Journalist George Condon would write in 1972, "When the baseball club decided to adopt an Indian caricature as its official symbol, it hired an artist to draw a little guy who came very close to Reinert's creation; a blood brother, unquestionably." In 1947, Cleveland Indians owner Bill Veeck hired the J.F. Novak Company, designers of patches worn by the Cleveland police and fire departments, to create a new logo for his team. Seventeen-year-old draftsman Walter Goldbach, an employee of the Novak Company, was asked to perform the job. Tasked with creating a mascot that "would convey a spirit of pure joy and unbridled enthusiasm", he created a smiling face with yellow skin and a prominent nose. Goldbach has said that he had difficulty "figuring out how to make an Indian look like a cartoon", and that he was probably influenced by the cartoon styl
https://en.wikipedia.org/wiki/T-Square%20%28software%29
T-Square is an early drafting program written by Peter Samson assisted by Alan Kotok and possibly Robert A. Saunders while they were students at the Massachusetts Institute of Technology and members of the Tech Model Railroad Club. T-Square was written for the PDP-1 computer and its Type 30 precision CRT that Digital Equipment Corporation donated to MIT in 1961. It is unlikely that many people have had the opportunity to use T-Square although Samson has said the group drew some schematics. Authors Students of Jack Dennis and John McCarthy discovered a stunning array of uses for the very expensive room-sized computers that were given to MIT. They were privileged to be enrolled when the school's first programming courses were taught. They negotiated with their advisors and the operations manager John McKenzie for time and became single-users long before personal computers were available. About 1959 or 1960, some of this group of students became support staff and wrote software for about $1.75 USD per hour. They wrote the programming software which is used to build application software. Later Samson and Kotok became architects of DEC computers. CAD During this period Samson created other "firsts" in application software for music, games and page layout so it is perhaps not surprising he wrote what may be the first drafting program. Based on this experience, later in life Samson worked on an electronic drafting program with 80,000 lines of code. He received a patent in virtual reality at Autodesk, a vendor of CAD and CAM software. Input device To move the cursor, T-Square used a Spacewar! game controller built by Kotok and Saunders in 1962. It is not known if Saunders was involved in repurposing it for T-Square. Kotok, who was about 20 years old, did participate. He was known for doing what needed to be done and for taking an interest in "all things ingenious or intriguing." Ivan Sutherland used a light pen in his programs as did Jack Gilmore and others before him
https://en.wikipedia.org/wiki/Current%20differencing%20transconductance%20amplifier
Current differencing transconductance amplifier (CDTA) is a new active circuit element. Properties The CDTA is not free from parasitic input capacitances and it can operate in a wide frequency range due to current-mode operation. Some voltage and current mode applications using this element have already been reported in literature, particularly from the area of frequency filtering: general higher-order filters, biquad circuits, all-pass sections, gyrators, simulation of grounded and floating inductances and LCR ladder structures. Other studies propose CDTA-based high-frequency oscillators. Nonlinear CDTA applications are also expected, particularly precise rectifiers, current-mode Schmitt triggers for measuring purposes and signal generation, current-mode multipliers, etc. Basic operation The CDTA element with its schematic symbol in Fig 1 has a pair of low-impedance current inputs and p, n and an auxiliary terminal z, whose outgoing current is the difference of input currents. Here, output terminal currents are equal in magnitude, but flow in opposite directions, and the product of transconductance () and the voltage at the z terminal gives their magnitudes. Therefore, this active element can be characterized with the following equations: , , , . where and is the external impedance connected to z terminal of the CDTA. CDTA can be thought as a combination of a current differencing unit followed by a dual-output operational transconductance amplifier, DO-OTA. Ideally, the OTA is assumed as an ideal voltage-controlled current source and can be described by , where Ix is output current, and denote non-inverting and inverting input voltage of the OTA, respectively. Note that gm is a function of the bias current. When this element is used in CDTA, one of its input terminals is grounded (e.g., ). With dual output availability, condition is assumed.
https://en.wikipedia.org/wiki/SVI-728
The SVI-728 is the first home computer from Spectravideo that complied fully with the MSX home computer specification. It was introduced in 1984. The design is virtually identical to that of the earlier SV-328, which did not comply fully with the MSX standard. The SVI-738 is a portable version of this computer. Technical specifications Microprocessor Zilog Z80A with a clockspeed of 3.56 MHz. Memory ROM: 32 KB RAM: 64 KB (expandable to 256 KB) VRAM: 16 KB Video Graphical processor: Texas Instruments TMS9918A/TMS9929 (NTSC/PAL) Graphical resolution: 256 x 192 pixels text modes: 40 characters x 24 lines and 32 characters x 24 lines colors: 16 sprites: 32 Sound General Instrument AY-3-8910-soundchip 3 sound channels 1 noise channels 1 envelope controller Connectors 1 data recorder/Cassette deck 2 joysticks 1 cartridge 1 Super Expander 1 disk station