source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Dipleurula | Dipleurula is a hypothetical larva of the ancestral echinoderm. It represents the type of basis of all larval forms of, at least, the eleutherozoans (all echinoderms except crinoids), where the starfish, sea urchins, sea cucumbers and brittle stars belong. The dipleurula is a bilaterally symmetrical, ciliated echinoderm larva (cilia devoted to movement, feeding and perception).
Etymology
Derives from Ancient Greek di, meaning 'two' and the small form of pleura (pleurula), meaning 'little side', i.e. 'little, two-sided [larva]'.
History
Although the term dipleurula stems from Semon (1888),
it was first systematically introduced, described and drawn by Bather (1900) in his monography on the echinoderms. The name dipleurula, two-sided, was given to stress the fact that the larva of the typically five-rayed, (approximately) radially symmetric adults show a bilateral structure. It was this bilateral structure of the larvae that identified echinoderms as bilaterian animals.
The original doliolaria schema shows a benthic, crawling, larva. However Bather could not have known yet that larval echinoderms are typically pelagic (free-floating plankton).
Structure
The hypothetical dipleurula larva bears resemblance to stages of all extant echinoderms, such as the bipinnaria and the brachiolaria of the starfish, the auricularia of the sea cucumbers, the echinopluteus larva of the sea urchins, and the ophiopluteus of the brittle stars. Also the doliolaria of the crinoids (sea-lilies and feather stars) can be attributed to the same basic pattern. Note, that the extant echinoderms represent just a small window on the extraordinary diversity of early echinoderms as known from their rich fossil record. Although there is current research on fossilized larval skeletons, the doliolaria remains a hypothesis.
The doliolaria shows a three-partite body, each of which develop paired coelomic spaces which originate from the enterocoel. This, and their close resemblance to the torn |
https://en.wikipedia.org/wiki/Cellulose%20acetate%20phthalate | Cellulose acetate phthalate (CAP), also known as cellacefate (INN) and cellulosi acetas phthalas, is a commonly used polymer phthalate in the formulation of pharmaceuticals, such as the enteric coating of tablets or capsules and for controlled release formulations. It is a cellulose polymer where about half of the hydroxyls are esterified with acetyls, a quarter are esterified with one or two carboxyls of a phthalic acid, and the remainder are unchanged. It is a hygroscopic white to off-white free-flowing powder, granules, or flakes. It is tasteless and odorless, though may have a weak odor of acetic acid. Its main use in pharmaceutics is with enteric formulations. It can be used together with other coating agents, e.g. ethyl cellulose. Cellulose acetate phthalate is commonly plasticized with diethyl phthalate, a hydrophobic compound, or triethyl citrate, a hydrophilic compound; other compatible plasticizers are various phthalates, triacetin, dibutyl tartrate, glycerol, propylene glycol, tripropionin, triacetin citrate, acetylated monoglycerides, etc.
Synthesis
The most common way to prepare cellulose acetate phthalate consists of the reaction of a partially substituted cellulose acetate (CA) with phthalic anhydride in the presence of an organic solvent and a basic catalyst. The organic solvents widely used as reaction media for the phthaloylation of cellulose acetate are acetic acid, acetone, or pyridine. The basic catalysts employed are anhydrous sodium acetate when using acetic acid, amines when using acetone, and the organic solvent itself when using pyridine as reaction medium.
Malm et al., records the preparation of phthalic acid derivatives of ethyl-cellulose and cellulose acetate without the use of pyridine by substituting sodium acetate as catalyst and acetic acid as a reaction solvent. Phthalyl content of the derivatives produced by this method is inversely dependent on the reaction temperature, although the rate of phthalyl introduction is faster at h |
https://en.wikipedia.org/wiki/Babelgum | Babelgum was a free-to-view Internet television platform supported by advertising. The project was set up in 2005 by Italian media and telecommunications entrepreneur Silvio Scaglia (one of the founders of Italian TelCo FASTWEB) and scientist Erik Lumer, with the aim of developing interactive software for distributing TV shows and other forms of video over the Internet.
Babelgum uses streaming TV technology to provide free, on-demand TV content to end users. The company aims to combine the “immersive viewing experience” and visual quality of traditional television with the features made possible by the internet. The beta version of the service was presented on 7 March 2007.
On September 1, 2007, Babelgum launched the Babelgum Online Film Festival, the first global online film festival dedicated to independent film. Viewers voted for the shortlists while a professional jury, chaired by Spike Lee, selected the winners.
In October 2008 the company launched the Babelgum Music Video Awards, another online competition with audience voting, focusing solely on music videos from unsigned artists. The contest was run in partnership with Music Nation, and the jury included French director Michel Gondry.
In December 2008 the company launched Babelgum Mobile, a new mobile application bringing "web-tailored video content" to smartphones such as the iPhone via 3G and Wi-Fi.
In September 2009 the company launched the Babelgum Metropolis Art Prize, an online prize for the best Art videos. The winning videos were shown on jumbo monitors in Times Square, NY on Dec 17th, 2009. The jury was chaired by actor/artist Isabella Rossellini and included Howard Halle, art critic at Time Out NY, Cedar Lewisohn, curator at the Tate Britain and Lee Wells from PAM and Scope Art Fair.
In November 2009 it was reported that Babelgum was downsizing by closing its Nice office and Dublin HQ,
and consolidating its operations across the remaining offices in London, New York and Milan.
Name
Accord |
https://en.wikipedia.org/wiki/Pvserver | pvServer is a 3GPP/2 standards compliant multimedia server that provides streaming and broadcast services to mobile devices. pvServer is developed by PacketVideo Network Solutions , a wholly owned company of Alcatel-Lucent. pvServer delivers multiple streams of live and pre-recorded audio / video content (MPEG-4, H.263 and H.264, Enhanced aacPlus, etc.) to devices with a 3GPP-compatible player. Besides RTSP, It also supports HTTP and RTMP streaming, all with rate-adaptive capability.
Overview
The pvServer consists of the following modules:
The Streaming Module, which is a Unix-based "software appliance" for standards compliant multimedia streaming via RTSP/RTP connections to wireless clients.
The Download Module, which is a Unix-based "software appliance" for standards compliant multimedia download via HTTP connection to wireless clients. This is commonly known as HTTP Streaming.
The Integration Services Module, which is a Java-based platform for multimedia service development and integration.
Major Customers
T-Mobile
Telus
Orange
External links
PacketVideo Network Solutions - PacketVideo Network Solutions's official site
Alcatel-Lucent - Alcatel-Lucent official site
Servers (computing) |
https://en.wikipedia.org/wiki/Asynchronous%20cellular%20automaton | Cellular automata, as with other multi-agent system models, usually treat time as discrete and state updates as occurring synchronously. The state of every cell in the model is updated together, before any of the new states influence other cells. In contrast, an asynchronous cellular automaton is able to update individual cells independently, in such a way that the new state of a cell affects the calculation of states in neighbouring cells.
Implementations of synchronous updating can be analysed in two phases. The first, interaction, calculates the new state of each cell based on the neighbourhood and the update rule. State values are held in a temporary store. The second phase updates state values by copying the new states to the cells.
In contrast, asynchronous updating does not necessarily separate these two phases: in the simplest case (fully asynchronous updating), changes in state are implemented immediately.
The synchronous approach assumes the presence of a global clock to ensure all cells are updated together. While convenient for preparing computer systems, this might be an unrealistic assumption if the model is intended to represent, for example, a living system where there is no evidence of the presence of such a device.
A general method repeatedly discovered independently (by K. Nakamura in the 1970s, by T. Toffoli in the 1980s, and by C. L. Nehaniv in 1998) allows one to emulate exactly the behaviour of a synchronous cellular automaton via an asynchronous one constructed as a simple modification of the synchronous cellular automaton (Nehaniv 2002). Correctness of this method however has only more recently been rigorously proved (Nehaniv, 2004). As a consequence, it follows immediately from results on synchronous cellular automata that asynchronous cellular automata are capable of emulating, e.g., Conway's Game of Life, of universal computation, and of self-replication (e.g., as in a Von Neumann universal constructor).
Moreover, the general constr |
https://en.wikipedia.org/wiki/Transient%20lingual%20papillitis | Transient lingual papillitis are painful, hypertrophic, red and white lingual papillae on the tongue.
Cause
Transient lingual papillitis can affect males and females as early as 3 years of age. In many cases, the cause is unknown. Some dental professionals believe the inflammation is due to chronic irritation from teeth, fillings, or dental appliances. Stress, poor nutrition, smoking, and alcohol use may also be initiating factors. |
https://en.wikipedia.org/wiki/Acoustic%20suspension | Acoustic suspension (also known as air suspension, a closed box, or a sealed box) is a method of loudspeaker cabinet design and utilisation that uses one or more loudspeaker drivers mounted in a sealed box or cabinet. Acoustic suspension systems reduce bass distortion that can be caused by stiff motor suspensions in conventional loudspeakers.
A compact acoustic suspension loudspeaker was described in 1954 by Edgar Villchur, and it was brought to commercial production by Villchur and Henry Kloss with the founding of Acoustic Research in Cambridge, Massachusetts. In 1960, Villchur reiterated that: The first aim of the acoustic suspension design, over and above uniformity of frequency response, compactness, and extension of response into the low-bass range, is to reduce significantly the level of bass distortion that had previously been tolerated in loudspeakers. This is accomplished by substituting an air-spring for a mechanical one. Subsequently, the theory of closed-box loudspeakers was extensively described by Small.
Speaker cabinets with acoustic suspension can provide well-controlled bass response, especially in comparison with an equivalently-sized speaker enclosure that has a bass reflex port or vent. The bass vent boosts low-frequency output, but with the tradeoff of introducing phase delay and accuracy problems in reproducing transient signals. Sealed boxes are generally less efficient than a bass-reflex cabinet for the same low-frequency cut-off and cabinet volume, so a sealed-box speaker cabinet will need more electrical power to deliver the same amount of acoustic low-frequency bass output.
Theory
The acoustic suspension woofer uses the elastic cushion of air within a sealed enclosure to provide the restoring force for the woofer diaphragm. The cushion of air acts like a compression spring. Because the air in the cabinet serves to control the woofer's excursion, the physical stiffness of the driver can be reduced. Unlike the stiff physical suspension b |
https://en.wikipedia.org/wiki/History%20of%20quantum%20mechanics | The history of quantum mechanics is a fundamental part of the history of modern physics. The major chapters of this history begin with the emergence of quantum ideas to explain individual phenomena -- blackbody radiation, the photoelectric effect, solar emission spectra -- an era called the Old or Older quantum theories. The invention of wave mechanics by Schrodinger and expanded by many others triggers the "modern" era beginning around 1925. Dirac's relativistic quantum theory work lead him to explore quantum theories of radiation, culminating in quantum electrodynamics, the first quantum field theory. The history of quantum mechanics continues in the history of quantum field theory. The history of quantum chemistry, theoretical basis of chemical structure, reactivity, and bonding, interlaces with the events discussed in this article.
The phrase "quantum mechanics" was coined (in German, Quantenmechanik) by the group of physicists including Max Born, Werner Heisenberg, and Wolfgang Pauli, at the University of Göttingen in the early 1920s, and was first used in Born's 1925 paper "Zur Quantenmechanik".
The word quantum comes from the Latin word for "how much" (as does quantity). Something that is quantized, as the energy of Planck's harmonic oscillators, can only take specific values. For example, in most countries, money is effectively quantized, with the quantum of money being the lowest-value coin in circulation. Mechanics is the branch of science that deals with the action of forces on objects. So, quantum mechanics is the part of mechanics that deals with objects for which particular properties are quantized.
Triumph and trouble at the end of the classical era
The discoveries of the 19th century, both the successes and failures, set the stage for the emergence of quantum mechanics.
Wave theory of light
Beginning in 1670 and progressing over three decades, Isaac Newton developed and championed his corpuscular theory, arguing that the perfectly straight li |
https://en.wikipedia.org/wiki/Extinction%20risk%20from%20climate%20change | There are several plausible pathways that could lead to an increased extinction risk from climate change. This is because every plant and animal species has evolved to exist within a certain ecological niche, and as climate change represents the long-term alteration of temperature and average weather patterns, it can push climatic conditions outside of the species' niche, which will ultimately render it extinct. Normally, species faced with changing conditions can either adapt in place through microevolution or move to another habitat with suitable conditions. However, the speed of recent climate change is so unprecedented, that even under "mid-range" scenarios of future warming, only 5% of current ectotherm locations (a category which includes amphibians, reptiles and all invertebrates) are within 50 km of a place which could serve as an equally suitable habitat at the end of this century.
Climate change also increases both the frequency and intensity of extreme weather events, which can directly wipe out regional populations of species. Those species occupying coastal and low-lying island habitats can also be rendered extinct by sea level rise; this has already happened with Bramble Cay melomys in Australia. Finally, climate change has been linked with the increased prevalence and global spread of certain diseases affecting wildlife. This includes Batrachochytrium dendrobatidis, a fungus identified as one of the main drivers of the worldwide decline in amphibian populations.
So far, climate change has not yet been a major contributor to the Holocene extinction, and nearly all of the irreversible biodiversity loss to date has been caused by other anthropogenic pressures such as habitat loss or the introduction of invasive species. Yet, its effects are certain to become more prevalent in the future. As of 2021, 19% of species on the IUCN Red List of Threatened Species are already being impacted by climate change. Out of 4000 species analyzed by the IPCC Sixth Ass |
https://en.wikipedia.org/wiki/Freshtel | Freshtel Holdings Limited is an Australian telephony company developing and marketing Voice over IP products and services. Freshtel Holdings Limited offers VoIP solutions to wholesale customers globally through its wholly owned subsidiaries, Voicedot and Virbiage, and has a direct-to-market retail channel through Freshtel Pty Ltd.
In December 2005 Freshtel signed an agreement with Tesco to provide a white label Internet telephony solution for the UK market. In late December 2005 Tesco acquired a 6% stake in Freshtel, increased to 12% in November 2006.
Due to significant losses on its UK activity (including transfer costs), which contributed over 70% of revenue, Freshtel announced in February 2010 that an agreement had been reached with Tesco to terminate the VOIP services it had provided. In May 2010 Freshtel announced that it had sold its UK operation for $150,000.
Structure
The Freshtel Holdings business is structured into three separate channels and an internal research and development arm. Each channel has its own brand and performs a different business function.
Virbiage is a manufacturer and distributor of VoIP hardware such as Internet telephones and analogue telephone adaptors. Virbiage retails these products through its own web site and through distribution agreements with international partners.
Voicedot Networks (formerly VoiceStream Networks) runs the Internet telephone network used to route data for Freshtel's customers. Voicedot provides a wholesale version of the Freshtel Australia retail offering.
Both of these companies supply services to Freshtel Pty Ltd, the retail provider of these services.
Freshtel R&D undertakes all of Freshtel's product research and development. Freshtel R&D is currently part of the Australian Government R&D initiative. |
https://en.wikipedia.org/wiki/Flexible%20polyhedron | In geometry, a flexible polyhedron is a polyhedral surface without any boundary edges, whose shape can be continuously changed while keeping the shapes of all of its faces unchanged. The Cauchy rigidity theorem shows that in dimension 3 such a polyhedron cannot be convex (this is also true in higher dimensions).
The first examples of flexible polyhedra, now called Bricard octahedra, were discovered by . They are self-intersecting surfaces isometric to an octahedron. The first example of a flexible non-self-intersecting surface in , the Connelly sphere, was discovered by . Steffen's polyhedron is another non-self-intersecting flexible polyhedron derived from Bricard's octahedra.
Bellows conjecture
In the late 1970s Connelly and D. Sullivan formulated the bellows conjecture stating that the volume of a flexible polyhedron is invariant under flexing. This conjecture was proved for polyhedra homeomorphic to a sphere by
using elimination theory, and then proved for general orientable 2-dimensional polyhedral surfaces by . The proof extends Piero della Francesca's formula for the volume of a tetrahedron to a formula for the volume of any polyhedron. The extended formula shows that the volume must be a root of a polynomial whose coefficients depend only on the lengths of the polyhedron's edges. Since the edge lengths cannot change as the polyhedron flexes, the volume must remain at one of the finitely many roots of the polynomial, rather than changing continuously.
Scissor congruence
Connelly conjectured that the Dehn invariant of a flexible polyhedron is invariant under flexing. This was known as the strong bellows conjecture or (after it was proven in 2018) the strong bellows theorem. Because all configurations of a flexible polyhedron have both the same volume and the same Dehn invariant, they are scissors congruent to each other, meaning that for any two of these configurations it is possible to dissect one of them into polyhedral pieces that can be rea |
https://en.wikipedia.org/wiki/Robert%20Connelly | Robert Connelly (born July 15, 1942) is a mathematician specializing in discrete geometry and rigidity theory. Connelly received his Ph.D. from University of Michigan in 1969. He is currently a professor at Cornell University.
Connelly is best known for discovering embedded flexible polyhedra. One such polyhedron is in the National Museum of American History. His recent interests include tensegrities and the carpenter's rule problem. In 2012 he became a fellow of the American Mathematical Society.
Asteroid 4816 Connelly, discovered by Edward Bowell at Lowell Observatory 1981, was named after Robert Connelly. The official was published by the Minor Planet Center on 18 February 1992 ().
Author
Connelly has authored or co-authored several articles on mathematics, including Conjectures and open questions in rigidity; A flexible sphere; and A counterexample to the rigidity conjecture for polyhedra. |
https://en.wikipedia.org/wiki/Secure%20Socket%20Tunneling%20Protocol | Secure Socket Tunneling Protocol (SSTP) is a form of virtual private network (VPN) tunnel that provides a mechanism to transport PPP traffic through an SSL/TLS channel. SSL/TLS provides transport-level security with key negotiation, encryption and traffic integrity checking. The use of SSL/TLS over TCP port 443 (by default; port can be changed) allows SSTP to pass through virtually all firewalls and proxy servers except for authenticated web proxies.
SSTP servers must be authenticated during the SSL/TLS phase. SSTP clients can optionally be authenticated during the SSL/TLS phase and must be authenticated in the PPP phase. The use of PPP allows support for common authentication methods, such as EAP-TLS and MS-CHAP.
SSTP is available for Linux, BSD, and Windows.
SSTP is available on Windows Vista SP1 and later, in RouterOS since version 5.0, and in SEIL since its firmware version 3.50. It is fully integrated with the RRAS architecture in these operating systems, allowing its use with Winlogon or smart-card authentication, remote-access policies and the Windows VPN client. The protocol is also used by Windows Azure for Point-to-Site Virtual Network.
SSTP is intended only for remote client access, it generally does not support site-to-site VPN tunnels.
SSTP suffers from the same performance limitations as any other IP-over-TCP tunnel. In general, performance will be acceptable only as long as there is sufficient excess bandwidth on the un-tunneled network link to guarantee that the tunneled TCP timers do not expire. If this becomes untrue, performance falls off dramatically. This is known as the "TCP meltdown problem".
SSTP supports user authentication only; it does not support device authentication or computer authentication.
Packet structure
The following header structure is common to all types of SSTP packets:
Version (8 bits) – communicates and negotiates the version of SSTP that is used.
Reserved (7 bits) – reserved for future use.
C (1 bit) – contro |
https://en.wikipedia.org/wiki/Triangular%20interval | The triangular interval (also known as the lateral triangular space, lower triangular space, and triceps hiatus) is a space found in the axilla. It is one of the three intermuscular spaces found in the axillary space. The other two spaces are: quadrangular space and triangular space.
Borders
Two of its borders are as follows:
teres major - superior
long head of the triceps brachii - medial
Some sources state the lateral border is the humerus, while others define it as the lateral head of the triceps. (The effective difference is relatively minor, though.)
Contents
The contents of its borders are as follows:
Radial nerve
Profunda Brachii
The radial nerve is visible through the triangular interval, on its way to the posterior compartment of the arm.
Profunda Brachii also passes through the triangular interval from anterior to posterior.
Additional images
Triangular Interval Syndrome
Triangular Interval Syndrome (TIS) was described as a differential diagnosis for radicular pain in the upper extremity. It is a condition where the radial nerve is entrapped in the triangular interval resulting in upper extremity radicular pain. The radial nerve and profunda brachii pass through the triangular interval and are hence vulnerable. The triangular interval has a potential for compromise secondary alterations in thickness of the teres major and triceps. It is described based on cadaveric studies that fibrous bands were commonly present between the teres major and triceps. When these bands were present, rotation of the shoulder caused a reduction in cross sectional area of the space. Normal resting postures of humeral adduction and internal rotation with scapular protraction may be speculated as a precedent for teres major contractures owing to the shortened position of this muscle in this position. In addition, hypertrophy of this muscle can occur secondary to weight training and potentially compromise the triangular interval with resultant entrapment of the radial |
https://en.wikipedia.org/wiki/List%20of%20tools%20for%20static%20code%20analysis | This is a list of notable tools for static program analysis (program analysis is a synonym for code analysis).
Static code analysis tools
Languages
Ada
C, C++
C#
Fortran
Fortran-Lint (Information Processing Techniques, Inc)
IEC 61131-3
CODESYS Static Analysis integrated add-on for CODESYS (application code realized e.g. in ST, FBD, LD)
Java
JavaScript
ESLint JavaScript syntax checker and formatter.
Google's Closure Compiler JavaScript optimizer that rewrites code to be faster and smaller, and checks use of native JavaScript functions.
JSHint A community driven fork of JSLint.
JSLint JavaScript syntax checker and validator.
Semgrep A static analysis tool that helps expressing code standards and surfacing bugs early. A CI service and a rule library is also available.
Julia
JET.jl
StaticLint.jl (a linter for Visual Studio Code, i.e. its Julia extension, already included in it)
Objective-C, Objective-C++
Clang The free Clang project includes a static analyzer. As of version 3.2, this analyzer is included in Xcode.
Infer Developed by an engineering team at Facebook with open-source contributors. Targets null pointers, leaks, API usage and other lint checks. Available as open source on github.
Opa
Opa includes its own static analyzer. As the language is intended for web application development, the strongly statically typed compiler checks the validity of high-level types for web data, and prevents by default many vulnerabilities such as XSS attacks and database code injections.
Packaging
Lintian Checks Debian software packages for common inconsistencies and errors.
Rpmlint Checks for common problems in rpm packages.
Perl
Perl::Critic A tool to help enforce common Perl best practices. Most best practices are based on Damian Conway's Perl Best Practices book.
PerlTidy Program that acts as a syntax checker and tester/enforcer for coding practices in Perl.
Padre An IDE for Perl that also provides static code analysis to check for com |
https://en.wikipedia.org/wiki/Dell%20EMC%20Isilon | Dell EMC Isilon is a scale out network-attached storage platform offered by Dell EMC for high-volume storage, backup and archiving of unstructured data. It provides a cluster-based storage array based on industry standard hardware, and is scalable to 50 petabytes in a single filesystem using its FreeBSD-derived OneFS file system.
An Isilon clustered storage system is composed of three or more nodes. Each node is a server integrated with proprietary operating system software called OneFS (based on FreeBSD), which unifies a cluster of nodes into a single shared resource.
Isilon Systems
Isilon Systems was a computer hardware and software company founded in 2001 by Sujal Patel and Paul Mikesell, a 1996 graduate of the University of Maryland College of Computer, Mathematical, and Natural Sciences. It was headquartered in Seattle, Washington. It sold clustered file system hardware and software for digital content and other unstructured data to a variety of industries.
Isilon Systems became a publicly traded company on December 16, 2006. By this time, Isilon was selling its products indirectly through a channel partner program that included over 100 resellers and distributors, as well as directly through a field sales force. Its customers included NBC Universal, Cedars-Sinai, Kelman Technologies, and Kodak, among others.
Poor initial performance of the new public company led to management changes in 2007 that brought back founder Sujal Patel as CEO. In 2008, details emerged around an internal audit of Isilon System’s financials that led to a restatement of earnings. Just before the company would have announced four profitable quarters in a row – the first profitable year in the company’s history – Isilon Systems was acquired by EMC Corporation in November 2010 for $2.25 billion.
Isilon after merger
EMC said that with its acquisition of Isilon, it would be better able to provide storage infrastructure for private and public cloud environments, with a focus on so-call |
https://en.wikipedia.org/wiki/Dark%20Energy%20Survey | The Dark Energy Survey (DES) is an astronomical survey designed to constrain the properties of dark energy. It uses images taken in the near-ultraviolet, visible, and near-infrared to measure the expansion of the universe using Type Ia supernovae, baryon acoustic oscillations, the number of galaxy clusters, and weak gravitational lensing. The collaboration is composed of research institutions and universities from the United States, Australia, Brazil, the United Kingdom, Germany, Spain, and Switzerland. The collaboration is divided into several scientific working groups. The director of DES is Josh Frieman.
The DES began by developing and building Dark Energy Camera (DECam), an instrument designed specifically for the survey. This camera has a wide field of view and high sensitivity, particularly in the red part of the visible spectrum and in the near infrared. Observations were performed with DECam mounted on the 4-meter Víctor M. Blanco Telescope, located at the Cerro Tololo Inter-American Observatory (CTIO) in Chile. Observing sessions ran from 2013 to 2019; the DES collaboration has published results from the first three years of the survey.
DECam
DECam, short for the Dark Energy Camera, is a large camera built to replace the previous prime focus camera on the Victor M. Blanco Telescope. The camera consists of three major components: mechanics, optics, and CCDs.
Mechanics
The mechanics of the camera consists of a filter changer with an 8-filter capacity and shutter. There is also an optical barrel that supports 5 corrector lenses, the largest of which is 98 cm in diameter. These components are attached to the CCD focal plane which is cooled to with liquid nitrogen in order to reduce thermal noise in the CCDs. The focal plane is also kept in an extremely low vacuum of to prevent the formation of condensation on the sensors. The entire camera with lenses, filters, and CCDs weighs approximately 4 tons. When mounted at the prime focus it was supported with |
https://en.wikipedia.org/wiki/Pyocyanase | Pyocyanase was the first antibiotic drug to be used in hospitals. It is no longer used today.
Rudolph Emmerich and Oscar Löw, two German physicians who were the first to make an effective medication from microbes, conducted experiments in the 1890s, roughly 30 years after Louis Pasteur showed that many diseases were caused by bacteria and nearly 40 years before the effective prescription of penicillin. They proved that the germs that caused one disease may be the cure for another.
Emmerich and Löw isolated germs from infected bandages that caused green infections in open wounds. The germ was a bacterium then called Bacillus pyocyaneus (now called Pseudomonas aeruginosa, it produces pyocyanin, a characteristic green-blue phenazine pigment). They then mixed the isolate with other bacteria and showed that B. pyocyaneus and extracts from its cultures were able to destroy other strains of bacteria. Among the bacteria that it killed were those that caused cholera, typhoid, diphtheria, and anthrax.
From these experiments Emmerich and Löw created a medication based on extracts of B. pyocyaneus that they called pyocyanase. It was the first antibiotic to be used in hospitals. Unfortunately, its effectiveness was sporadic, did not work equally on all patients, and the presence of large amounts of phenazines such as pyocyanin made it quite toxic to humans. As a result, the drug was eventually abandoned.
See also
Prontosil |
https://en.wikipedia.org/wiki/Paul%20St%C3%A4ckel | Paul Gustav Samuel Stäckel (20 August 1862, Berlin – 12 December 1919, Heidelberg) was a German mathematician, active in the areas of differential geometry, number theory, and non-Euclidean geometry. In the area of prime number theory, he used the term twin prime (in its German form, "Primzahlzwilling") for the first time.
After passing his Abitur in 1880 he studied mathematics and physics at the University of Berlin, but also listened to lectures on philosophy, psychology, education, and history. A year later he qualified for teaching in higher education and then taught at Gymnasien in Berlin. In 1885 he wrote his doctoral dissertation under Leopold Kronecker and Karl Weierstraß. In 1891 he completed his Habilitation at the University of Halle. Later he worked as a professor at the University of Königsberg (außerordentlicher Professor from 1895 to 1897), the University of Kiel (ordentlicher Professor, 1897 to 1905), University of Hannover (1905 to 1908), the Karlsruhe Institute of Technology (1908 to 1913), and the University of Heidelberg (1913 to 1919).
Stäckel worked on both mathematics and the history of mathematics. He edited the letters exchanged between Carl Friedrich Gauss and Wolfgang Bolyai, made contributions to editions of the collected works of Euler and Gauss (for whose works he wrote Gauss als Geometer), and edited the Geometrischen Untersuchungen by Wolfgang and Johann Bolyai (published in 1913). Additionally he translated works of Jacob Bernoulli, Johann Bernoulli, Augustin Louis Cauchy, Leonhard Euler, Joseph-Louis Lagrange, Adrien-Marie Legendre, Carl Gustav Jacobi from French and Latin into German for the series Ostwalds Klassiker der exakten Wissenschaften.
In 1904 he was an invited speaker at the International Congress of Mathematicians in Heidelberg. In 1905 he was the president of the Deutsche Mathematiker-Vereinigung. His doctoral students include Paul Riebesell.
Works
Über die Bewegung eines Punktes auf einer Fläche, 1885, Dissertatio |
https://en.wikipedia.org/wiki/Anterior%20cutaneous%20branches%20of%20the%20femoral%20nerve | The anterior cutaneous branches of the femoral nerve consist of the following nerves: intermediate cutaneous nerve and medial cutaneous nerve.
Intermediate cutaneous nerve of thigh
The intermediate cutaneous nerve (middle cutaneous nerve) pierces the fascia lata (and generally the sartorius) about 7.5 cm below the inguinal ligament, and divides into two branches which descend in immediate proximity along the forepart of the thigh, to supply the skin as low as the front of the knee.
Here they communicate with the anterior division of lateral cutaneous nerve, the anterior division of medial cutaneous nerve and the infrapatellar branch of the saphenous, to form the patellar plexus.
In the upper part of the thigh the lateral branch of the intermediate cutaneous communicates with the lumboinguinal branch of the genitofemoral nerve.
Medial cutaneous nerve of thigh
The medial cutaneous nerve (internal cutaneous nerve) passes obliquely across the upper part of the sheath of the femoral artery, and divides in front, or at the medial side of that vessel, into two branches, an anterior and a posterior.
The anterior branch runs downward on the sartorius, perforates the fascia lata at the lower third of the thigh, and divides into two branches: one supplies the integument as low down as the medial side of the knee; the other crosses to the lateral side of the patella, communicating in its course with the infrapatellar branch of the saphenous nerve.
The posterior branch descends along the medial border of the sartorius to the knee, where it pierces the fascia lata, communicates with the saphenous nerve, and gives off several cutaneous branches.
It then passes down to supply the integument of the medial side of the leg.
Beneath the fascia lata, at the lower border of the adductor longus, it joins to form a plexiform net-work (subsartorial plexus) with branches of the saphenous and obturator nerves.
When the communicating branch from the obturator nerve is large and conti |
https://en.wikipedia.org/wiki/Vytautas%20Magnus%20University%20Botanical%20Garden | Vytautas Magnus University Botanical Garden also known as the Kaunas Botanical Garden (; ), is a university botanical garden located in the south of the center of Kaunas city, Freda district, Ž.E.Žilibero str. 6. With an area of it is the second largest in Lithuania. This institution is a member of BGCI, with international identification code KAUN.
About Garden
Botanical Garden was founded in 1923 as the centre of botanical sciences that belonged to Lithuanian (later Vytautas Magnus) University. Spacious green area with the old park, picturesque ponds and several buildings of the former estate of Juozapas Godlevskis (Aukstosios Fredos estate) was provided for establishing botanical garden at that time. Professor Constantin Regel from Tartu University was invited to direct Kaunas Botanical Garden. The detailed project for the garden landscape was made in 1924 by architect Karol Rauth from Hanover. With the help of other botanical gardens, especially Berlin's Dahlem, Königsberg and St. Petersburg's Kaunas Botanical Garden built up very rapidly. The construction of the Greenhouse was finished in 1938.
Presently, Vytautas Magnus University Botanical Garden occupies the area of 62.5 ha close to the city center. It is multifunctional university botanical garden that consists of three departments: Science, Expositions and Collections, and Service and Education. The Science department is divided into three sectors: Medicinal and Spice Plants, Dendrology and Phytopathology, and Pomology. Department of Expositions and Collections includes sectors of Plant systematics, Floriculture and Greenhouse.
The unique feature of this garden is peaceful and green environment created by an advantageous combination of cultural and natural heritage. Botanical expositions and collections, the Greenhouse, big landscape park with an interesting pond system – this is not only place for plant conservation and research but also area for all modern forms of interactive education, cultural tou |
https://en.wikipedia.org/wiki/Three%20cups%20problem | The three cups problem, also known as the three cup challenge and other variants, is a mathematical puzzle that, in its most common form, cannot be solved.
In the beginning position of the problem, one cup is upside-down and the other two are right-side up. The objective is to turn all cups right-side up in no more than six moves, turning over exactly two cups at each move.
The solvable (but trivial) version of this puzzle begins with one cup right-side up and two cups upside-down. To solve the puzzle in a single move, turn up the two cups that are upside down — after which all three cups are facing up. As a magic trick, a magician can perform the solvable version in a convoluted way, and then ask an audience member to solve the unsolvable version.
Proof of impossibility
To see that the problem is insolvable (when starting with just one cup upside down), it suffices to concentrate on the number of cups the wrong way up. Denoting this number by , the goal of the problem is to change from 1 to 0, i.e. by . The problem is insolvable because any move changes by an even number. Since a move inverts two cups and each inversion changes by (if the cup was the right way up) or (otherwise), a move changes by the sum of two odd numbers, which is even, completing the proof.
Another way of looking is that, at the start, 2 cups are in the "right" orientation and 1 is "wrong". Changing 1 right cup and 1 wrong cup, the situation remains the same. Changing 2 right cups results in a situation with 3 wrong cups, after which the next move restores the original status of 1 wrong cup. Thus, any number of moves results in a situation either with 3 wrongs or with 1 wrong, and never with 0 wrongs.
More generally, this argument shows that for any number of cups, it is impossible to reduce to 0 if it is initially odd. On the other hand, if is even, inverting cups two at a time will eventually result in equaling 0. |
https://en.wikipedia.org/wiki/Soleal%20line | The soleal line, also known as the popliteal line (in older texts), is a prominent ridge on the posterior surface of the tibia. It is the site of many muscle origins and insertions, such as those of popliteus muscle, soleus muscle, flexor digitorum longus muscle, and tibialis posterior muscle.
Structure
The soleal line is a prominent ridge on the posterior surface of the tibia. It extends obliquely downward from the back part of the articular facet for the fibula to the medial border, at the junction of its upper and middle thirds.
Development
The soleal line becomes more prominent between childhood and adulthood. It is rarely seen in children between the ages of 6 and 8.
Function
The soleal line marks the lower limit of the insertion of the popliteus muscle. It is the attachment of the fascia covering this muscle. It is the origin of part of soleus muscle (along with a triangular area above it), flexor digitorum longus muscle, and tibialis posterior muscle. |
https://en.wikipedia.org/wiki/Chain%20sequence | In the analytic theory of continued fractions, a chain sequence is an infinite sequence {an} of non-negative real numbers chained together with another sequence {gn} of non-negative real numbers by the equations
where either (a) 0 ≤ gn < 1, or (b) 0 < gn ≤ 1. Chain sequences arise in the study of the convergence problem – both in connection with the parabola theorem, and also as part of the theory of positive definite continued fractions.
The infinite continued fraction of Worpitzky's theorem contains a chain sequence. A closely related theorem shows that
converges uniformly on the closed unit disk |z| ≤ 1 if the coefficients {an} are a chain sequence.
An example
The sequence {¼, ¼, ¼, ...} appears as a limiting case in the statement of Worpitzky's theorem. Since this sequence is generated by setting g0 = g1 = g2 = ... = ½, it is clearly a chain sequence. This sequence has two important properties.
Since f(x) = x − x2 is a maximum when x = ½, this example is the "biggest" chain sequence that can be generated with a single generating element; or, more precisely, if {gn} = {x}, and x < ½, the resulting sequence {an} will be an endless repetition of a real number y that is less than ¼.
The choice gn = ½ is not the only set of generators for this particular chain sequence. Notice that setting
generates the same unending sequence {¼, ¼, ¼, ...}.
Notes |
https://en.wikipedia.org/wiki/DigiCash | DigiCash Inc. was an electronic money corporation founded by David Chaum in 1989. DigiCash transactions were unique in that they were anonymous due to a number of cryptographic protocols developed by its founder. DigiCash declared bankruptcy in 1998 and subsequently sold its assets to eCash Technologies, another digital currency company, which was acquired by InfoSpace on Feb. 19, 2002.
History
David Chaum is associated with the invention of Blind Signature Technology. In 1982, while studying at the University of California, Berkeley, Chaum wrote a paper describing the technological advancements to public and private key technology, in order to create this Blind Signature Technology. Chaum's Blind Signature Technology was designed to ensure the complete privacy of users who conduct online transactions. Chaum was concerned with the public nature and open access to online payments and personal information. He then proposed to construct a system of cryptographic protocols, in which a bank or the government would be unable to trace personal payments conducted online. This technology became fully implemented in 1990, through Chaum's company, DigiCash.
Technology
DigiCash was a form of early electronic payment, which required user software to withdraw notes from a bank and designate specific encrypted keys before it can be sent to a recipient. This advancement of public and private key cryptography allows electronic payments to become untraceable by the issuing bank, the government, or a third party. This system of Blind Signatures through DigiCash software improved security for its users through the issuance of secured keys, which prevented third parties from accessing personal information through online transactions. The Mark Twain Bank, later acquired by Mercantile bank, located in Missouri was the only U.S. bank that supported DigiCash systems. Deutsche Bank, based in Germany, was the second backing bank of DigiCash systems.
Bankruptcy
DigiCash was unable to grow t |
https://en.wikipedia.org/wiki/Airshaft | In manufacturing, an airshaft is a device used for handling winding reels in the processing of web-fed materials, such as continuous-process printing presses.
Airshafts—also called Air Expanding shafts—are used in the manufacturing processes for fitting into a core onto which materials such as paper, card and plastic film are wound. An airshaft is designed so that, on fitting into a core, it can be readily expanded, thereby achieving a quick and firm attachment, it may also be easily deflated to facilitate easy withdrawal of the shaft after winding of product is complete. Their efficient design makes them ideal for mounting onto bearing housings to enable the winding or unwinding of rolls of stock material with the minimum of equipment down time. The advantage of using an airshaft is its ability to grip the core, without damage, whilst providing a positive interface to control the web via motors & brakes. Airshafts are available as either lug type (with bladder down the centre) or strip type (bladders on the periphery of the shaft).
Air shafts are used on many converting machines. An example of one of these machines is a slitting machine or slitter rewinder which is used to cut or slit large rolls of material into smaller rollers.
Air shaft is a machine part or shaft which tightens the core or roll on filling air.
Air Shafts are of two types:
Contains Inflatable Rubber tube inside also called Lug shafts.
Which contains bladder multiple outside also called Multi-tube Shaft .
In Lugs type Air shaft, shaft consist of air bladder inside it. It is manufactured using Aluminium or Iron pipe as outer pipe in which there are u-shaped slot are there in which lugs are fitted manually. Then Inflatable bladder placed inside pipe below lugs. Then bladder is connected using a brass air valve. So, when we fill air using Air valve the bladder inflated and lugs comes out of shafts body (pipe) and tights the core in which shafts is placed.
In Multi tube Air Shafts there are sm |
https://en.wikipedia.org/wiki/Aerometer | An aerometer is an instrument designed to measure the density (among other parameters) of the air and some gases.
The word aerometer (or Ärometer, from Ancient Greek ἀήρ -aer "air" and μέτρον -métron "measure, scale") refers to various types of devices for measuring or handling of gases. The instruments designated with this name can be used to find: the density, the flow, the amount or some other parameter of the air or a determined gas.
Several different designs of aerometer have been developed for the study of speech. These make use of a mask fitting closely to the speaker's face, usually with a partition separating airflow from the nose from airflow from the mouth. Various designs of transducer convert the flow of air into electrical signals.
Another instrument called areometer (from Ancient Greek ἀραιός -araiós "lightness" and μέτρον -métron "measure, scale"), also known as hydrometer, used for measuring liquids density, is often confused with the term aerometer here defined.
Types of aerometers
Hall aerometer.
Hutchinson aerometer.
Struve aerometer.
Scheurer aerometer.
Smith aerometer.
Frøkjær-Jensen aerometer. |
https://en.wikipedia.org/wiki/Shocks%20and%20discontinuities%20%28magnetohydrodynamics%29 | In magnetohydrodynamics (MHD), shocks and discontinuities are transition layers where properties of a plasma change from one equilibrium state to another. The relation between the plasma properties on both sides of a shock or a discontinuity can be obtained from the conservative form of the MHD equations, assuming conservation of mass, momentum, energy and of .
Rankine–Hugoniot jump conditions for MHD
The jump conditions across a time-independent MHD shock or discontinuity are referred as the Rankine–Hugoniot equations for MHD. In the frame moving with the shock/discontinuity, those jump conditions can be written:
where , , are the plasma density, velocity, (thermal) pressure and magnetic field respectively. The subscripts and refer to the tangential and normal components of a vector (with respect to the shock/discontinuity front). The subscripts 1 and 2 refer to the two states of the plasma on each side of the shock/discontinuity
Contact and tangential discontinuities
Contact and tangential discontinuities are transition layers across which there is no particle transport. Thus, in the frame moving with the discontinuity, .
Contact discontinuities are discontinuities for which the thermal pressure, the magnetic field and the velocity are continuous. Only the mass density and temperature change.
Tangential discontinuities are discontinuities for which the total pressure (sum of the thermal and magnetic pressures) is conserved. The normal component of the magnetic field is identically zero. The density, thermal pressure and tangential component of the magnetic field vector can be discontinuous across the layer.
Shocks
Shocks are transition layers across which there is a transport of particles. There are three types of shocks in MHD: slow-mode, intermediate and fast-mode shocks.
Intermediate shocks are non-compressive (meaning that the plasma density does not change across the shock).
A special case of the intermediate shock is referred to as a rotational d |
https://en.wikipedia.org/wiki/Flappy | is a puzzle game by dB-Soft in the same vein as the Eggerland series and Sokoban that is obscure outside Japan. It features Flappy, a somewhat mole-like character who must complete each level by pushing a blue stone from its starting place to the blue tile destination.
Flappy first appeared on the Sharp X1 home computer in 1983. This debut was soon followed by conversions to a number of popular Japanese computers in the early 1980s, including the NEC's line of PCs and the Fujitsu FM series. Ports for the MSX computer line and the Family Computer were released in 1985. dB-Soft produced a sequel with more difficult puzzles called King Flappy for the benefit of anyone who managed to clear the original 200 levels (or "sides" or "scenes" as the game calls them). A Nintendo Game Boy port was released exclusively in Japan in 1990 and was published by Victor Musical Industries.
Plot
The beautiful planet of Blue Star, home-planet to a young boy named FLAPPY, is invaded by Dark Emperor Ngalo-Ngolo. The proud inhabitants of Blue Star, wanting neither war nor the invasion, self-destruct along with the planet on a path of self-determination. FLAPPY, however, is boarded onto an escape capsule headed for neighboring Planet Seviras by his father and so survives. From his capsule he sees fragments of the exploded Blue Star rain down incessantly on Planet Seviras.
Wandering aimlessly about Planet Seviras, FLAPPY reaches an oasis where he suddenly hears a voice from the sky saying, 'Gather up the fragments of Blue Star, the Blue Stones, to this Blue Area. When all of them have been gathered...' FLAPPY, believing a miracle has just occurred, begins on a journey to gather all the Blue Stones.
Gameplay
Gravity, gaps in the floors, and wandering enemies stand in the way of Flappy reaching his goal. Flappy can pick up and throw sleeping mushrooms at the enemies to knock them out for a while, or drop stones on them to crush them permanently. There are, however, many obstacles along th |
https://en.wikipedia.org/wiki/Tinc%20%28protocol%29 | Tinc is an open-source, self-routing, mesh networking protocol and software implementation used for compressed and encrypted virtual private networks. It was started in 1998 by Guus Sliepen, Ivo Timmermans, and Wessel Dankers, and released as a GPL-licensed project.
Platforms
Tinc is available on Linux, FreeBSD, OpenBSD, NetBSD, DragonFly BSD, Mac OS X, Microsoft Windows, Solaris, iOS (jailbroken only), Android with full support for IPv6.
Future goals
The authors of Tinc have goals of providing a platform that is secure, stable, reliable, scalable, easily configurable, and flexible.
Embedded technologies
Tinc uses OpenSSL or LibreSSL as the encryption library and gives the options of compressing communications with zlib for "best compression" or LZO for "fast compression".
Projects that use tinc
Freifunk has tinc enabled in their routers as of October 2006.
OpenWrt has an installable package for tinc.
OPNsense, an open source router and firewall distribution, has a plugin for Tinc
pfSense has an installable package in the 2.3 release.
Tomato variants Shibby and FreshTomato include Tinc support.
NYC Mesh uses tinc to connect parts of the mesh over the public internet that would be otherwise out of range.
See also
stunnel, encrypts any TCP connection (single port service) over SSL
OpenVPN, an open source SSL VPN solution
VTUN, an open source SSL VPN solution that can bridge Ethernet |
https://en.wikipedia.org/wiki/Submarine%20earthquake | A submarine, undersea, or underwater earthquake is an earthquake that occurs underwater at the bottom of a body of water, especially an ocean. They are the leading cause of tsunamis. The magnitude can be measured scientifically by the use of the moment magnitude scale and the intensity can be assigned using the Mercalli intensity scale.
Understanding plate tectonics helps to explain the cause of submarine earthquakes. The Earth's surface or lithosphere comprises tectonic plates which average approximately 50 miles in thickness, and are continuously moving very slowly upon a bed of magma in the asthenosphere and inner mantle. The plates converge upon one another, and one subducts below the other, or, where there is only shear stress, move horizontally past each other (see transform plate boundary below). Little movements called fault creep are minor and not measurable. The plates meet with each other, and if rough spots cause the movement to stop at the edges, the motion of the plates continue. When the rough spots can no longer hold, the sudden release of the built-up motion releases, and the sudden movement under the sea floor causes a submarine earthquake. This area of slippage both horizontally and vertically is called the epicenter, and has the highest magnitude, and causes the greatest damage.
As with a continental earthquake the severity of the damage is not often caused by the earthquake at the rift zone, but rather by events which are triggered by the earthquake. Where a continental earthquake will cause damage and loss of life on land from fires, damaged structures, and flying objects; a submarine earthquake alters the seabed, resulting in a series of waves, and depending on the length and magnitude of the earthquake, tsunami, which bear down on coastal cities causing property damage and loss of life.
Submarine earthquakes can also damage submarine communications cables, leading to widespread disruption of the Internet and international telephone networ |
https://en.wikipedia.org/wiki/Nikolai%20Yefimov | Nikolai Vladimirovich Yefimov (; 31 May 1910 in Orenburg – 14 August 1982 in Moscow) was a Soviet mathematician. He is most famous for his work on generalized Hilbert's problem on surfaces of negative curvature.
Yefimov grew up in Rostov-on-Don and graduated from Rostov State University, where he studied with Morduhai-Boltovskoi. He worked at Voronezh State University from 1934 to 1941. He taught at the Moscow State University since 1946. Aleksei Pogorelov was one of his students there.
He received the Lobachevsky Prize in 1951 and Lenin Prize in 1966. He was an invited plenary speaker at the International Congress of Mathematicians in Moscow, 1966. He became a corresponding member of the Academy of Sciences of the Soviet Union in 1979. |
https://en.wikipedia.org/wiki/Sputter%20deposition | Sputter deposition is a physical vapor deposition (PVD) method of thin film deposition by the phenomenon of sputtering. This involves ejecting material from a "target" that is a source onto a "substrate" such as a silicon wafer. Resputtering is re-emission of the deposited material during the deposition process by ion or atom bombardment.
Sputtered atoms ejected from the target have a wide energy distribution, typically up to tens of eV (100,000 K). The sputtered ions (typically only a small fraction of the ejected particles are ionized — on the order of 1 percent) can ballistically fly from the target in straight lines and impact energetically on the substrates or vacuum chamber (causing resputtering). Alternatively, at higher gas pressures, the ions collide with the gas atoms that act as a moderator and move diffusively, reaching the substrates or vacuum chamber wall and condensing after undergoing a random walk. The entire range from high-energy ballistic impact to low-energy thermalized motion is accessible by changing the background gas pressure. The sputtering gas is often an inert gas such as argon. For efficient momentum transfer, the atomic weight of the sputtering gas should be close to the atomic weight of the target, so for sputtering light elements neon is preferable, while for heavy elements krypton or xenon are used. Reactive gases can also be used to sputter compounds. The compound can be formed on the target surface, in-flight or on the substrate depending on the process parameters. The availability of many parameters that control sputter deposition make it a complex process, but also allow experts a large degree of control over the growth and microstructure of the film.
Uses
One of the earliest widespread commercial applications of sputter deposition, which is still one of its most important applications, is in the production of computer hard disks. Sputtering is used extensively in the semiconductor industry to deposit thin films of various mater |
https://en.wikipedia.org/wiki/Female%20urination%20device | A female urination device (FUD), personal urination device (PUD), female urination aid, or stand-to-pee device (STP) is a device that can be used to more precisely aim the stream of urine while urinating standing upright. Variations range from basic disposable funnels to more elaborate reusable designs. Personal urination devices have increased in popularity since the 1990s. They are used for outdoor occupations & recreation, gender affirmation/safety, and medical reasons.
In addition, fixed installation and relocatable urinals are available for use by females. Some designs require the user to supply their own personal female urination device, while other designs do not have this expectation.
Portable devices
Female urination devices are marketed towards many different groups. For sports and recreation they are sold for camping, traveling, snow sports, caving, rock climbing, diving, hunting/fishing, festivals, long car journeys, and any kind of outdoor pursuit where the toilet facilities are absent or less than desirable. People with physical restrictions such as recovery from hip surgery, broken bones, or those who find it challenging to sit or squat also benefit from these devices.
Since 2005, numerous personal urination devices have appeared on the market. Products come in a variety of designs and materials such as plastic, rubber, silicone and paper; some are reusable and some are disposable. Several devices have been marketed for medical applications, and are sometimes available on prescription.
Occupationally, urinary devices are used by first responders, armed forces, and other outdoor jobs. Some brands are NATO approved, and are supplied to military personnel.
Such devices are used by trans men as "stand-to-pee" devices, or STPs, often to combat gender dysphoria. More discreet solutions such as the "Snee-Kee" are specifically marketed for this purpose. Some stand-to-pee devices mimic the appearance of a penis and double as packers.
Cis men may also |
https://en.wikipedia.org/wiki/Female%20urinal | A female urinal is a urinal designed for the female anatomy to allow for ease of use by women and girls. Different models enable urination in standing, semi-squatting, or squatting postures, but usually without direct bodily contact with the toilet. Sitting models also exist, and are designed for body contact with the urinal.
Unisex urinals are also marketed by various companies, and can be used by both sexes. Female and unisex urinals are much less common than male urinals. Moreover, male urinals are more abundant in men's public toilets than in the toilets of private homes.
Background
Advantages compared to toilets for urination
Urinals for female users could potentially have some of the same advantages as urinals for male users, when compared to toilets (solely with regard to urination):
lower cost
simpler maintenance
smaller space requirements (several wall-mounted urinals may be installed on the floor space of a single toilet cubicle)
reduced water consumption for flushing compared to sit toilets (waterless urinals can even function without any flushing water)
more hygienic, contact-free urination process (no risk of contact with feces from previous users)
no urine on toilet seat from women who avoid contact
faster use
potential for easier recycling of nutrients as fertilizer
Due to an increased number of units in the same amount of floor space, there is usually a faster and shorter queue for public urinals; up to 30% more people can use the toilet facilities at the same time.
Female urinals could possibly be suitable for use in public toilets which are heavily used during peak hours and which are likely to attract large numbers of visitors, especially places like theaters, stadiums, schools, universities, discotheques, shopping centers, and public transit facilities. In addition, temporary mobile female urinals have been developed for use at open-air events and festivals, as well as free-standing units for public spaces.
Design and implementation |
https://en.wikipedia.org/wiki/Number%20of%20the%20beast | The number of the beast (, ) is associated with the Beast of Revelation in chapter 13, verse 18 of the Book of Revelation. In most manuscripts of the New Testament and in English translations of the Bible, the number of the beast is six hundred sixty-six or (in Greek numerals, represents 600, represents 60 and represents 6). Papyrus 115 (which is the oldest preserved manuscript of the Revelation ), as well as other ancient sources like Codex Ephraemi Rescriptus, give the number of the beast as χιϛ or χιϲ, transliterable in Arabic numerals as 616 (), not 666; critical editions of the Greek text, such as the Novum Testamentum Graece, note χιϛ/616 as a variant.
In the Bible
χξϛ
The number of the beast is described in Revelation 13:15–18. Several translations have been interpreted for the meaning of the phrase "Here is Wisdom. Let him that hath understanding count the number of the beast..." where the peculiar Greek word (psephisato) is used. Possible translations include "to count", "to reckon" and also "to vote" or "to decide".
In the Textus Receptus, derived from Byzantine text-type manuscripts, the number six hundred sixty-six is represented by the Greek numerals , with the Greek letter stigma () representing the number 6:
17 18
"17And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. 18Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is 666."
In several editions of the Greek Bible, the number is represented by the final three words, , hexakósioi hexēkonta héx, meaning "six hundred [and] sixty-six":
17 18
"17And that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name. 18Here is wisdom. Let him that hath understanding count the number of the beast: for it is the number of a man; and his number is six hundred and sixty-six."
Revelation 13:18 states that if one is wise |
https://en.wikipedia.org/wiki/Inverse%20Symbolic%20Calculator |
The Inverse Symbolic Calculator is an online number checker established July 18, 1995 by Peter Benjamin Borwein, Jonathan Michael Borwein and Simon Plouffe of the Canadian Centre for Experimental and Constructive Mathematics (Burnaby, Canada). A user will input a number and the Calculator will use an algorithm to search for and calculate closed-form expressions or suitable functions that have roots near this number. Hence, the calculator is of great importance for those working in numerical areas of experimental mathematics.
The ISC contains 54 million mathematical constants. Plouffe's Inverter (opened in 1998) contains 214 million. A newer version of the tables with 3.702 billion entries (as of June 19, 2010) exists.
In 2016, Plouffe released a portable version of Plouffe's Inverter containing 3 billion entries.
Literature
John Conway, Richard K. Guy: Zahlenzauber (The Book of Numbers), End of Chapter 1 about Numbers in languages. Birkhäuser, 1997, .
See also
On-Line Encyclopedia of Integer Sequences
Robert Munafo's RIES, a similar C program. |
https://en.wikipedia.org/wiki/Cahn%E2%80%93Hilliard%20equation | The Cahn–Hilliard equation (after John W. Cahn and John E. Hilliard) is an equation of mathematical physics which describes the process of phase separation, by which the two components of a binary fluid spontaneously separate and form domains pure in each component. If is the concentration of the fluid, with indicating domains, then the equation is written as
where is a diffusion coefficient with units of and gives the length of the transition regions between the domains. Here is the partial time derivative and is the Laplacian in dimensions. Additionally, the quantity is identified as a chemical potential.
Related to it is the Allen–Cahn equation, as well as the stochastic Cahn–Hilliard Equation and the stochastic Allen–Cahn equation.
Features and applications
Of interest to mathematicians is the existence of a unique solution of the Cahn–Hilliard equation, given by smooth initial data. The proof relies essentially on the existence of a Lyapunov functional. Specifically, if we identify
as a free energy functional, then
so that the free energy does not grow in time. This also indicates segregation into domains is the asymptotic outcome of the evolution of this equation.
In real experiments, the segregation of an initially mixed binary fluid into domains is observed. The segregation is characterized by the following facts.
There is a transition layer between the segregated domains, with a profile given by the function and hence a typical width because this function is an equilibrium solution of the Cahn–Hilliard equation.
Of interest also is the fact that the segregated domains grow in time as a power law. That is, if is a typical domain size, then . This is the Lifshitz–Slyozov law, and has been proved rigorously for the Cahn–Hilliard equation and observed in numerical simulations and real experiments on binary fluids.
The Cahn–Hilliard equation has the form of a conservation law, with . Thus the phase separation process conserves th |
https://en.wikipedia.org/wiki/London%20Burkers | The London Burkers were a group of body snatchers operating in London, England, who apparently modeled their activities on the notorious Burke and Hare murders. They came to prominence in 1831 for murdering victims to sell to anatomists, by luring and drugging them at their dwelling in the northern end of Bethnal Green, near St Leonard's, Shoreditch in London. They were also known as the Bethnal Green Gang.
Background
Nova Scotia Gardens
Nova Scotia Gardens was the area of a brick field, north-east of St Leonard's, Shoreditch. The brick clay had been exhausted and the area begun to be filled in with waste ("leystall", literally excrement). Cottages (probably evolving from sheds serving the gardens) came to be built here, but were undesirable as they remained below ground level, and so were prone to flooding.
Anatomy
During the early 19th century, the demand for legally obtained cadavers for the study and teaching of anatomy in British medical schools greatly exceeded the supply. In the 18th century, hundreds had been executed each year, often for quite trivial crimes, but by the 19th century only 55 people were being hanged each year, while as many as 500 were needed. As medical science began to flourish, demand rose sharply and attracted criminal elements willing to obtain specimens by any means. The activities of body-snatchers, or resurrectionists, gave rise to a particular public fear and revulsion. Relatives, or people paid by them, often guarded new graves for a period after burial.
Murders
Gang of Burkers
John Bishop, together with Thomas Williams, Michael Shields, a Covent Garden porter, and James May, an unemployed butcher, also known as Jack Stirabout and Black Eyed Jack, formed a notorious gang of resurrection men, stealing freshly buried bodies for sale to anatomists. In his subsequent confession, Bishop admitted to stealing (and selling) between 500 and 1,000 bodies, over a period of twelve years. The corpses were sold to anatomists, including su |
https://en.wikipedia.org/wiki/Noreen%20Murray | Noreen Elizabeth, Lady Murray (; 26 February 1935 – 12 May 2011) was an English molecular geneticist who helped pioneer recombinant DNA technology (genetic engineering) by creating a series of bacteriophage lambda vectors into which genes could be inserted and expressed in order to examine their function. During her career she was recognised internationally as a pioneer and one of Britain's most distinguished and highly respected molecular geneticists. Until her 2001 retirement she held a personal chair in molecular genetics at the University of Edinburgh. She was president of the Genetical Society, vice president of the Royal Society, and a member of the UK Science and Technology Honours Committee.
Education
Noreen Parker was brought up in the village of Read, Lancashire, then from the age of five in Bolton-le-Sands. She was educated at Lancaster Girls' Grammar School, at King's College London (BSc), and received her PhD from the University of Birmingham in 1959.
Career
Murray was a committed researcher. She worked at Stanford University, University of Cambridge, and the Medical Research Council (UK) before first joining the University of Edinburgh faculty in 1967. She briefly moved to the European Molecular Biology Laboratory from 1980 to 1982, but returned to Edinburgh, where she was awarded a personal chair of molecular genetics in 1988. At Edinburgh, she produced a considerable body of work focused on uncovering the mechanisms and biology of restriction enzymes, and their adaptation as tools underpinning modern biological research. It is notable that she has many single author publications; she was generally the main instigator and sole technical contributor. In 1968 Noreen had become interested in the phenomenon of host-controlled restriction (the ability of bacterial cells to "restrict" foreign DNA) and decided to study this phenomenon in Escherichia coli using bacteriophage lambda and her knowledge of bacteriophage genetics.
She was married to Sir Kenne |
https://en.wikipedia.org/wiki/Kenneth%20Murray%20%28biologist%29 | Sir Kenneth "Ken" Murray FRS FRSE FRCPath (30 December 1930 – 7 April 2013) was a British molecular biologist and the Biogen Professor of Molecular Biology at the University of Edinburgh.
An important early figure in genetic engineering, Murray cofounded Biogen. There, he and his team developed one of the first vaccines against hepatitis B. Along with his wife, biologist Lady Noreen (née Parker), Murray also founded the Darwin Trust of Edinburgh, a charity supporting young biologists in their doctoral studies.
Education and career
Murray achieved a 1st class honours degree in chemistry followed by PhD from the University of Birmingham. From 1960 to 1964 he was a researcher at J. Murray Luck's laboratory at Stanford University and from 1964 to 1967 he was a researcher at Fred Sanger's laboratory at Cambridge University. In 1967, he was appointed lecturer at the University of Edinburgh and in 1976 he became Head of Molecular Biology. In 1984 he was appointed Biogen Professor of Molecular Biology, a post which he retained until his retirement. He was elected a Fellow of the Royal Society in 1979, Fellow of the Royal Society of Edinburgh in 1989 and awarded the RSE Royal Medal in 2000 with the citation "For their outstanding contribution to the development of Biotechnology, both nationally and internationally, through his development of what is now known as recombinant DNA technology."
Personal life
Murray was born in Yorkshire and brought up in the Midlands. He left school at the age of 16 to become a laboratory technician at Boots in Nottingham. He studied part-time and obtained a degree in chemistry and then a PhD in microbiology from University of Birmingham.
Sir Kenneth's wife, Lady Noreen Murray CBE, was elected a Fellow of the Royal Society in 1982. She died on 12 May 2011 aged 76. |
https://en.wikipedia.org/wiki/Scleraxis | The scleraxis protein is a member of the basic helix-loop-helix (bHLH) superfamily of transcription factors. Currently two genes ( and respectively) have been identified to code for identical scleraxis proteins.
Function
It is thought that early scleraxis-expressing progenitor cells lead to the eventual formation of tendon tissue and other muscle attachments. Scleraxis is involved in mesoderm formation and is expressed in the syndetome (a collection of embryonic tissue that develops into tendon and blood vessels) of developing somites (primitive segments or compartments of embryos).
Inducing scleraxis expression
The syndetome location within the somite is determined by FGF secreted from the center of the myotome (a collection of embryonic tissue that develops into skeletal muscle)- the FGF then induces the adjacent anterior and posterior sclerotome (a collection of embryonic tissue that develops into the axial skeleton) to adopt a tendon cell fate. This ultimately places future scleraxis-expressing cells between the two tissue types they will ultimately join.
Scleraxis expression will be seen throughout the entire sclerotome (rather than just the sclerotome directly anterior and posterior to the myotome) with an overexpression of FGF8, demonstrating that all sclerotome cells are capable of expressing scleraxis in response to FGF signaling. While the FGF interaction has been shown to be necessary for scleraxis expression, it is still unclear as to whether the FGF signaling pathway directly induces the syndetome to secrete scleraxis, or indirectly through a secondary signaling pathway. Most likely, the syndetomal cells, through careful reading of the FGF concentration (coming from the myotome), can precisely determine their location and begin expressing scleraxis. Much of embryonic development follows this model of inducing specific cell fates through the reading of surrounding signaling molecule concentration gradients.
Background
bHLH transcription factor |
https://en.wikipedia.org/wiki/Buckley%E2%80%93Leverett%20equation | In fluid dynamics, the Buckley–Leverett equation is a conservation equation used to model two-phase flow in porous media. The Buckley–Leverett equation or the Buckley–Leverett displacement describes an immiscible displacement process, such as the displacement of oil by water, in a one-dimensional or quasi-one-dimensional reservoir. This equation can be derived from the mass conservation equations of two-phase flow, under the assumptions listed below.
Equation
In a quasi-1D domain, the Buckley–Leverett equation is given by:
where is the wetting-phase (water) saturation, is the total flow rate, is the rock porosity, is the area of the cross-section in the sample volume, and is the fractional flow function of the wetting phase. Typically, is an 'S'-shaped, nonlinear function of the saturation , which characterizes the relative mobilities of the two phases:
where and denote the wetting and non-wetting phase mobilities. and denote the relative permeability functions of each phase and and represent the phase viscosities.
Assumptions
The Buckley–Leverett equation is derived based on the following assumptions:
Flow is linear and horizontal
Both wetting and non-wetting phases are incompressible
Immiscible phases
Negligible capillary pressure effects (this implies that the pressures of the two phases are equal)
Negligible gravitational forces
General solution
The characteristic velocity of the Buckley–Leverett equation is given by:
The hyperbolic nature of the equation implies that the solution of the Buckley–Leverett equation has the form , where is the characteristic velocity given above. The non-convexity of the fractional flow function also gives rise to the well known Buckley-Leverett profile, which consists of a shock wave immediately followed by a rarefaction wave.
See also
Capillary pressure
Permeability (fluid)
Relative permeability
Darcy's law |
https://en.wikipedia.org/wiki/Cardiac%20shunt | A cardiac shunt is a pattern of blood flow in the heart that deviates from the normal circuit of the circulatory system. It may be described as right-left, left-right or bidirectional, or as systemic-to-pulmonary or pulmonary-to-systemic. The direction may be controlled by left and/or right heart pressure, a biological or artificial heart valve or both. The presence of a shunt may also affect left and/or right heart pressure either beneficially or detrimentally.
Terminology
The left and right sides of the heart are named from a dorsal view, i.e., looking at the heart from the back or from the perspective of the person whose heart it is. There are four chambers in a heart: an atrium (upper) and a ventricle (lower) on both the left and right sides. In mammals and birds, blood from the body goes to the right side of the heart first. Blood enters the upper right atrium, is pumped down to the right ventricle and from there to the lungs via the pulmonary artery. Blood going to the lungs is called the pulmonary circulation. When the blood returns to the heart from the lungs via the pulmonary vein, it goes to the left side of the heart, entering the upper left atrium. Blood is then pumped to the lower left ventricle and from there out of the heart to the body via the aorta. This is called the systemic circulation. A cardiac shunt is when blood follows a pattern that deviates from the systemic circulation, i.e., from the body to the right atrium, down to the right ventricle, to the lungs, from the lungs to the left atrium, down to the left ventricle and then out of the heart back to the systemic circulation.
A left-to-right shunt is when blood from the left side of the heart goes to the right side of the heart. This can occur either through a hole in the ventricular or atrial septum that divides the left and the right heart or through a hole in the walls of the arteries leaving the heart, called great vessels. Left-to-right shunts occur when the systolic blood pressure in |
https://en.wikipedia.org/wiki/Pulmonary%20shunt | A pulmonary shunt is the passage of deoxygenated blood from the right side of the heart to the left without participation in gas exchange in the pulmonary capillaries. It is a pathological condition that results when the alveoli of parts of the lungs are perfused with blood as normal, but ventilation (the supply of air) fails to supply the perfused region. In other words, the ventilation/perfusion ratio (the ratio of air reaching the alveoli to blood perfusing them) of those areas is zero.
A pulmonary shunt often occurs when the alveoli fill with fluid, causing parts of the lung to be unventilated although they are still perfused.
Intrapulmonary shunting is the main cause of hypoxemia (inadequate blood oxygen) in pulmonary edema and conditions such as pneumonia in which the lungs become consolidated. The shunt fraction is the percentage of cardiac output that is not completely oxygenated.
In pathological conditions such as pulmonary contusion, the shunt fraction is significantly greater and even breathing 100% oxygen does not fully oxygenate the blood.
Intrapulmonary shunt is specifically shunting where some of the blood flow through the lungs is not properly oxygenated. Other shunts may occur where venous and arterial blood mix but completely bypass the lungs (extrapulmonary shunt).
Anatomical shunt
If every alveolus was perfectly ventilated and all blood from the right ventricle were to pass through fully functional pulmonary capillaries, and there was unimpeded diffusion across the alveolar and capillary membrane, there would be a theoretical maximum blood gas exchange, and the alveolar PO2 and arterial PO2 would be the same. The formula for shunt describes the deviation from this ideal.
A normal lung is imperfectly ventilated and perfused, and a small degree of intrapulmonary shunting is normal. Anatomical shunting occurs when blood supply to the lungs via the pulmonary arteries is returned via the pulmonary veins without passing through the pulmonary ca |
https://en.wikipedia.org/wiki/Retinohypothalamic%20tract | In neuroanatomy, the retinohypothalamic tract (RHT) is a photic neural input pathway involved in the circadian rhythms of mammals. The origin of the retinohypothalamic tract is the intrinsically photosensitive retinal ganglion cells (ipRGC), which contain the photopigment melanopsin. The axons of the ipRGCs belonging to the retinohypothalamic tract project directly, monosynaptically, to the suprachiasmatic nuclei (SCN) via the optic nerve and the optic chiasm. The suprachiasmatic nuclei receive and interpret information on environmental light, dark and day length, important in the entrainment of the "body clock". They can coordinate peripheral "clocks" and direct the pineal gland to secrete the hormone melatonin.
Structure
The retinohypothalamic tract consists of retinal ganglion cells. A distinct population of ganglion cells, known as intrinsically photosensitive retinal ganglion cells (ipRGCs), is critically responsible for providing non-image-forming visual signals to the brain. Only about two percent of all retinal ganglion cells are ipRGCs, whose cell bodies are in mainly the ganglion cell layer (and some are displaced in the inner nuclear layer of the retina). The photopigment melanopsin is present on the dendrites of ipRGCs, giving ipRGCs sensitivity to light in the absence of rod or cone input. The dendrites spread outwards from ipRGCs within the inner plexiform layer. These dendrites can also receive more canonical signals from the rest of the neuroretina. These signals are then carried through the optic nerve, which projects to the suprachiasmatic nucleus (SCN), anterior hypothalamic area, retrochiasmatic area, and lateral hypothalamus. However, a major portion of the RHT ends in the SCN.
Neurotransmitters
Glutamate
Glutamate levels in the RHT are measured by means of immunoreactivity. Retinal nerve terminals display a significantly higher content of glutamate immunoreactivity than the postsynaptic dendrites and non-retinal terminals. The higher immuno |
https://en.wikipedia.org/wiki/RHPPC | The RHPPC is a radiation hardened processor based on PowerPC 603e technology licensed from Motorola (now Freescale) and manufactured by Honeywell. The RHPPC is equivalent to the commercial PowerPC 603e processor with the minor exceptions of the phase locked loop (PLL) and the processor version register (PVR). The RHPPC processor is compatible with the PowerPC architecture (Book I-III), the PowerPC 603e programmers interface and is also supported by common PowerPC software tools and embedded operating systems, like VxWorks.
Technical details
The RHPPC processor generates 190 MIPS with the Dhrystone mix with its core clock at 100 MHz (i.e. the RHPPC processor completes 1.9 instructions per cycle). The RHPPC runs with a 25, 33.3, 40, or 50 MHz 60x bus clock (SYSCLK) which is generated based on the PCI clock. The 60x bus clock is de-skewed on-chip by a PLL and can also be multiplied.
The RHPPC processor is a superscalar machine with five execution units: system register unit, integer unit, load/store unit, floating point unit, and branch processing unit. The dispatch unit can issue two instructions per cycle. The floating point unit has a three level deep pipeline. Out of order execution is supported through the use of shadow or rename registers. The completion unit can complete two instructions per cycle in order by copying results from the rename registers to the real registers. Independently, the branch processing unit can complete a branch each cycle. Thus, in theory, the RHPPC processor can complete three instructions per cycle. Within the RHPPC processor there is a 16 kB instruction
and a 16 kB data L1 caches that are 4 way set associative, and support write through or copy-back protocol. A cache line is fixed at eight words.
Fabrication process and packaging
The RHPPC processor is fabricated with Honeywell’s SOI-V 0.35 µm, four level metal process. Standard cells and custom drop-ins are used. It is packaged in a hermetic, aluminium oxide, 21 x 21 mm grid ar |
https://en.wikipedia.org/wiki/Zones%20of%20the%20lung | The zones of the lung divide the lung into four vertical regions, based upon the relationship between the pressure in the alveoli (PA), in the arteries (Pa), in the veins (Pv) and the pulmonary interstitial pressure (Pi):
Zone 1: PA > Pa > Pv
Zone 2: Pa > PA > Pv
Zone 3: Pa > Pv > PA
Zone 4: Pa > Pi > Pv > PA
This concept is generally attributed to an article by West et al. in 1964, but was actually proposed two years earlier by Permutt et al. In this article, Permutt suggests "The pressure in the pulmonary arteries and veins is less at the top than at the bottom of the lung. It is quite likely that there is a portion of the lung toward the top in an upright subject in which the pressure in the pulmonary arteries is less than alveolar pressure."
The concept is as follows:
Alveolar pressure (PA) at end expiration is equal to atmospheric pressure (0 cm H2O differential pressure, at zero flow), plus or minus 2 cm H2O (1.5 mmHg) throughout the lung. On the other hand, gravity causes a gradient in blood pressure between the top and bottom of the lung of 20 mmHg in the erect position (roughly half of that in the supine position). Overall, mean pulmonary venous pressure is ~5 mmHg. Local venous pressure falls to -5 at the apexes and rises to +15 mmHg at the bases, again for the erect lung.
Pulmonary blood pressure is typically in the range 25–10 mmHg with a mean pressure of 15 mmHg. Regional arterial blood pressure is typically in the range 5 mmHg near the apex of the lung to 25 mmHg at the base.
Zone 1 is not observed in the normal healthy human lung. In normal health pulmonary arterial (Pa) pressure exceeds alveolar pressure (PA) in all parts of the lung. It is generally only observed when a person is ventilated with positive pressure or hemorrhage. In these circumstances, blood vessels can become completely collapsed by alveolar pressure (PA) and blood does not flow through these regions. They become alveolar dead space.
Zone 2 is the part of the lungs about |
https://en.wikipedia.org/wiki/Effects%20of%20high%20altitude%20on%20humans | The effects of high altitude on humans are mostly the consequences of reduced partial pressure of oxygen in the atmosphere. The medical problems that are direct consequence of high altitude are caused by the low inspired partial pressure of oxygen, which is caused by the reduced atmospheric pressure, and the constant gas fraction of oxygen in atmospheric air over the range in which humans can survive. The other major effect of altitude is due to lower ambient temperature.
The oxygen saturation of hemoglobin determines the content of oxygen in blood. After the human body reaches around above sea level, the saturation of oxyhemoglobin begins to decrease rapidly. However, the human body has both short-term and long-term adaptations to altitude that allow it to partially compensate for the lack of oxygen. There is a limit to the level of adaptation; mountaineers refer to the altitudes above as the death zone, where it is generally believed that no human body can acclimatize. At extreme altitudes, the ambient pressure can drop below the vapor pressure of water at body temperature, but at such altitudes even pure oxygen at ambient pressure cannot support human life, and a pressure suit is necessary. A rapid depressurisation to the low pressures of high altitudes can trigger altitude decompression sickness.
The physiological responses to high altitude include hyperventilation, polycythemia, increased capillary density in muscle and hypoxic pulmonary vasoconstriction–increased intracellular oxidative enzymes. There are a range of responses to hypoxia at the cellular level, shown by discovery of hypoxia-inducible factors (HIFs), which determine the general responses of the body to oxygen deprivation. Physiological functions at high altitude are not normal and evidence also shows impairment of neuropsychological function, which has been implicated in mountaineering and aviation accidents. Methods of mitigating the effects of the high altitude environment include oxygen en |
https://en.wikipedia.org/wiki/Units%20of%20textile%20measurement | Textile fibers, threads, yarns and fabrics are measured in a multiplicity of units.
A fiber, a single filament of natural material, such as cotton, linen or wool, or artificial material such as nylon, polyester, metal or mineral fiber, or man-made cellulosic fibre like viscose, Modal, Lyocell or other rayon fiber is measured in terms of linear mass density, the weight of a given length of fiber. Various units are used to refer to the measurement of a fiber, such as: the denier and tex (linear mass density of fibers), super S (fineness of wool fiber), worsted count, woolen count, linen count (wet spun) (or Number English (Ne)), cotton count (or Number English (Ne)), Number metric (Nm) and yield (the reciprocal of denier and tex).
A yarn, a spun agglomeration of fibers used for knitting, weaving or sewing, is measured in terms of cotton count and yarn density.
Thread, usually consisting of multiple yarns plied together producing a long, thin strand used in sewing or weaving, is measured in the same units as yarn.
Fabric, material typically produced by weaving, knitting or knotting textile fibers, yarns or threads, is measured in units such as the momme, thread count (a measure of the coarseness or fineness of fabric), ends per inch (e.p.i) and picks per inch (p.p.i).
Fibers
Micronaire
Micronaire is a measure of the air permeability of cotton fiber and is an indication of fineness and maturity. Micronaire affects various aspects of cotton processing.
Micron
One millionth of a metre, or one thousandth of a millimetre; about one-fourth the width of a strand of spider silk.
Cotton Bale Size
Cotton lint is usually measured in bales, although there is no standard and the bale size may vary country to country. For example, in the United States it measures approximately and weighs . In India, a bale equals .
S or super S number
Not a true unit of measure, S or super S number is an index of the fineness of wool fiber and is most commonly seen as a label on woo |
https://en.wikipedia.org/wiki/Acquiescence%20bias | Acquiescence bias, also known as agreement bias, is a category of response bias common to survey research in which respondents have a tendency to select a positive response option or indicate a positive connotation disproportionately more frequently. Respondents do so without considering the content of the question or their 'true' preference. Acquiescence is sometimes referred to as "yea-saying" and is the tendency of a respondent to agree with a statement when in doubt. Questions affected by acquiescence bias take the following format: a stimulus in the form of a statement is presented, followed by 'agree/disagree,' 'yes/no' or 'true/false' response options. For example, a respondent might be presented with the statement "gardening makes me feel happy," and would then be expected to select either 'agree' or 'disagree.' Such question formats are favoured by both survey designers and respondents because they are straightforward to produce and respond to. The bias is particularly prevalent in the case of surveys or questionnaires that employ truisms as the stimuli, such as: "It is better to give than to receive" or "Never a lender nor a borrower be". Acquiescence bias can introduce systematic errors that affect the validity of research by confounding attitudes and behaviours with the general tendency to agree, which can result in misguided inference. Research suggests that the proportion of respondents who carry out this behaviour is between 10% and 20%.
Causes
Agreeableness
A prominent psychological explanation attributes acquiescence bias to social norms that encourage agreeable behaviour. Evidence indicates that respondents approach surveys as though they are common conversations. A consequence of this is that the conventions that govern conversations influence the interpretation of survey questions and responses to them. Accordingly, pressure to conform to such norms and conventions prompts people to agree with stimulus statements. Based on research into the |
https://en.wikipedia.org/wiki/Pulmonary%20gas%20pressures | The factors that determine the values for alveolar pO2 and pCO2 are:
The pressure of outside air
The partial pressures of inspired oxygen and carbon dioxide
The rates of total body oxygen consumption and carbon dioxide production
The rates of alveolar ventilation and perfusion
Partial pressures
The partial pressures (in torr) for a human at rest:
Partial pressure of oxygen (at sea level)
The alveolar oxygen partial pressure is lower than the atmospheric O2 partial pressure for two reasons.
Firstly, as the air enters the lungs, it is humidified by the upper airway and thus the partial pressure of water vapour (47 mmHg) reduces the oxygen partial pressure to about 150 mmHg.
The rest of the difference is due to the continual uptake of oxygen by the pulmonary capillaries, and the continual diffusion of CO2 out of the capillaries into the alveoli.
The alveolar pO2 is not routinely measured but is calculated from blood gas measurements by the alveolar gas equation.
Partial pressure of carbon dioxide
Pathology
The partial pressure of carbon dioxide, along with the pH, can be used to differentiate between metabolic acidosis, metabolic alkalosis, respiratory acidosis, and respiratory alkalosis.
Hypoventilation exists when the ratio of carbon dioxide production to alveolar ventilation increases above normal values – greater than 45mmHg. If pH is also less than 7.35 this is respiratory acidosis.
Hyperventilation exists when the same ratio decreases – less than 35mmHg. If the pH is also greater than 7.45 this is respiratory alkalosis.
See also
Alveolar-arterial gradient
Diffusing capacity
Pulmonary alveolus |
https://en.wikipedia.org/wiki/Alfred%20Kempe | Sir Alfred Bray Kempe FRS (6 July 1849 – 21 April 1922) was a mathematician best known for his work on linkages and the four colour theorem.
Biography
Kempe was the son of the Rector of St James's Church, Piccadilly, the Rev. John Edward Kempe. He was educated at St Paul's School, London and then studied at Trinity College, Cambridge, where Arthur Cayley was one of his teachers. He graduated BA (22nd wrangler) in 1872. Despite his interest in mathematics he became a barrister, specialising in the ecclesiastical law. He was knighted in 1913, the same year he became the Chancellor for the Diocese of London. He was also Chancellor of the dioceses of Newcastle, Southwell, St Albans, Peterborough, Chichester, and Chelmsford. He received the honorary degree DCL from the University of Durham and he was elected a Bencher of the Inner Temple in 1909.
In 1876 he published his article On a General Method of describing Plane Curves of the nth degree by Linkwork, which presented a procedure for constructing a linkage that traces an arbitrary algebraic plane curve. This was a remarkable generalization of his work on the design of linkages to trace straight lines. This direct connection between linkages and algebraic curves is now called Kempe's universality theorem. While Kempe's proof was flawed, the first complete proof was provided in 2002, based on his ideas.
In 1877 Kempe discovered a new straight line linkage called the Quadruplanar inversor or Sylvester–Kempe Inversor and published his influential lectures on the subject. In 1879 Kempe wrote his famous "proof" of the four colour theorem, shown incorrect by Percy Heawood in 1890. Much later, his work led to fundamental concepts such as the Kempe chain and unavoidable sets.
Kempe (1886) revealed a rather marked philosophical bent, and much influenced Charles Sanders Peirce. Kempe also discovered what are now called multisets, although this fact was not noted until long after his death.
Kempe was elected a fellow of th |
https://en.wikipedia.org/wiki/743%20%28number%29 | 743 (seven hundred [and] forty three) is the natural number following 742 and preceding 744. It is a prime number.
743 is a Sophie Germain prime, because 2 × 743 + 1 = 1487 is also prime.
743 is an emirp, because 347 (the reversal of its digits) is prime.
There are exactly 743 independent sets in a four-dimensional (16 vertex) hypercube graph, and exactly 743 connected cubic graphs with 16 vertices and girth four. |
https://en.wikipedia.org/wiki/Tj%C3%A4rn%C3%B6%20Marine%20Biological%20Laboratory | The Tjärnö Marine Laboratory is a marine science field station in Sweden. It is part of the University of Gothenburg and located on the island Tjärnö, Strömstad Municipality in the northern part of Bohuslän province.
TML was founded as a field station for university education in marine biology in 1963. During the first half of 1970s TML became manned year round, and scientists began to choose TML for their permanent place of work. The activities have expanded and diversified. 70 people now work permanently at TML.
Within 10 minutes by boat lies the Koster fjord, a 247 meter deep fissure fault between the Koster Islands and the mainland. It is in deep-water contact with the remaining Skagerrak, the North Sea and the Atlantic Ocean beyond, leading to oceanic salinity, 35 ‰, in the bottom water. This is the only true oceanic environment in Sweden, with the highest number of marine species in Sweden. Between 5000 and 10000 species are to be found in the Skagerrak, and more than 200 of them do not occur elsewhere in Swedish waters. For instance, cold water reefs of stony corals could be found.
Annually, about 500 university students, mainly from Gothenburg, attend courses at TML, lasting from one week to one term. A large proportion of the education is devoted to identification of marine algal and animal species. Other courses are more concerned with ecology, including training in experiments and investigations. Field education, on research vessels, in smaller boats and at the shore, are common.
The major research programs are directed towards marine ecology, presented under six programs – marine chemical ecology, evolution and genetics, biodiversity, biohydrodynamics, fishery biology and aquaculture, and integrated coastal zone management. Most scientists at TML belong to the Department of Marine Sciences at the University of Gothenburg.
TML is a resource for regional industry, decision-makers and authorities, and gives support for the development of research-based |
https://en.wikipedia.org/wiki/Viktor%20Wagner | Viktor Vladimirovich Wagner, also Vagner () (4 November 1908 – 15 August 1981) was a Russian mathematician, best known for his work in differential geometry and on semigroups.
Wagner was born in Saratov and studied at Moscow State University, where Veniamin Kagan was his advisor. He became the first geometry chair at Saratov State University. He received the Lobachevsky Medal in 1937.
Wagner was also awarded "the Order of Lenin, the Order of the Red Banner, and the title of Honoured Scientist RSFSR. Moreover, he was also accorded that rarest of privileges in the USSR: permission to travel abroad."
Wagner is credited with noting that the collection of partial transformations on a set X forms a semigroup which is a subsemigroup of the semigroup of binary relations on the same set X, where the semigroup operation is composition of relations. "This simple unifying observation, which is nevertheless an important psychological hurdle, is attributed by Schein (1986) to V.V. Wagner."
See also
Inverse semigroup
Heap |
https://en.wikipedia.org/wiki/Wang%202200 | The Wang 2200 was an all-in-one minicomputer released by Wang Laboratories in May 1973. Unlike some other desktop computers, such as the HP 9830, it had a cathode-ray tube (CRT) in a cabinet that also included an integrated computer-controlled cassette tape storage unit and keyboard. It was microcoded to run BASIC on startup, making it similar to home computers of a few years later. About 65,000 systems were shipped in its lifetime and it found wide use in small and medium-size businesses worldwide.
The 2200 series evolved from a singular desktop computer into larger systems able to support up to 16 workstations which utilized commercial disk technologies that appeared in the late 1970s and early 1980s. The disk subsystems could be attached to up to 15 computers giving a theoretical upper limit of 240 workstations in a single cluster.
Unlike other Wang product lines such as the VS and OIS, value-added resellers (VARs) were used to customize and market 2200 systems to customers. One such solution deployed dozens of 2200 systems and was developed in conjunction with Hawaii- and Hong Kong-based firm, Algorithms, Inc. It provided paging (beeper) services for much of the Hong Kong market in the early 1980s.
History
Early 2200 models
The first models of the 2200, released in April 1973, were the 2200A and B. This differed in the amount of microcode, with the B model holding additional commands in Wang BASIC. The extra commands in the B model were mostly related to data handling, allowing BASIC programs to construct databases with relative ease. The later C model added a small number of additional commands, including simple error handling.
The A, B and C were replaced by the S and T models, which re-implemented the CPU using newer, higher-density large-scale integration parts. S models added commands to convert strings to and from numbers and a few other commands. The T version added a complete set of matrix math commands like those seen in later versions of Dartmouth |
https://en.wikipedia.org/wiki/Honey%20Honey%20no%20Suteki%20na%20Bouken | is a shōjo manga by Hideko Mizuno first published in 1968 and made into a 29-episode anime television series in 1981 by Kokusai Eiga-sha and animated by Toei Animation. The anime was released in the English language in the United States in 1984 as Honey Honey. It was also broadcast in various European countries and in Latin America.
Story
The story begins in the city of Vienna in 1907, as the city holds a lavish birthday celebration for its beloved Princess Flora. The princess entertains a variety of suitors from around the world who have come to propose marriage. Also on hand for the celebration is Phoenix, a handsome, suave jewel thief who has his eye on stealing the princess's precious gemstone, the "Smile of the Amazon," which the princess wears as a ring. Phoenix remarks that Flora, though renowned worldwide for her great beauty, wouldn't be nearly as beautiful without her ring. Furious at the insult, Princess Flora then drops the ring holding her gemstone into a cooked fish and throws it out the window, to the shock of everyone present.
Meanwhile, a young teenaged orphan named Honey Honey is working as a waitress. Her pet cat and constant companion, Lily, spies the fish that the princess threw out the window and proceeds to eat the entire fish, thus swallowing the ring. Since Princess Flora has declared that whichever of her suitors successfully returns the ring to her shall become her husband, the princess's suitors and Phoenix immediately fan out all over the city pursuing Lily and her owner, Honey Honey.
Phoenix catches up with Honey and Lily and helps them hide from their pursuers. Honey proceeds to tell the handsome jewel thief the story of how she was orphaned and brought up in a convent, and of how she befriended Lily, who, like her, was abandoned. Phoenix then tries to persuade Honey to sell Lily to him, but Honey, who is still unaware that Lily has swallowed the princess's ring, furiously refuses (after driving Phoenix's initial offer of a millio |
https://en.wikipedia.org/wiki/Ocean%20bank | An ocean bank, sometimes referred to as a fishing bank or simply bank, is a part of the seabed that is shallow compared to its surrounding area, such as a shoal or the top of an underwater hill. Somewhat like continental slopes, ocean bank slopes can upwell as tidal and other flows intercept them, sometimes resulting in nutrient-rich currents. Because of this, some large banks, such as Dogger Bank and the Grand Banks of Newfoundland, are among the richest fishing grounds in the world.
There are some banks that were reported in the 19th century by navigators, such as Wachusett Reef, whose existence is doubtful.
Types
Ocean banks may be of volcanic nature. Banks may be carbonate or terrigenous. In tropical areas some banks are submerged atolls. As they are not associated with any landmass, banks have no outside source of sediments.
Carbonate banks are typically platforms, rising from the ocean depths, whereas terrigenous banks are elevated sedimentary deposits.
Seamounts, by contrast, are mountains rising from the deep sea and are steeper and higher in comparison to the surrounding seabed. Examples of these are Pioneer and Guide Seamounts, west of the Farallon Islands. The Pioneer Seamount has a depth of 1,000 meters, In other cases, parts of a bank may reach above the water surface, thereby forming islands.
Important banks
The largest banks in the world are:
Grand Banks of Newfoundland (280,000 km2) - terrigenous bank
Agulhas Bank (116,000 km2)
Great Bahama Bank (95,798.12 km2, has islands, area without islands)
Saya de Malha (35,000 km2, excluding the separate North bank, least depth 7 m)
Seychelles Bank (31,000 km2, including islands of 266 km2)
Georges Bank (28,800 km2) - terrigenous bank
Lansdowne Bank (4,300 km2, west of New Caledonia, least depth 3.7 m)
Dogger Bank (17,600 km2, least depth 13 m)
Little Bahama Bank (14,260.64 km2, has islands, area without islands)
Great Chagos Bank (12,642 km2, including islands of 4.5 km2)
Reed Bank, Spratly |
https://en.wikipedia.org/wiki/Dutch%20national%20flag%20problem | The Dutch national flag problem is a computational problem proposed by Edsger Dijkstra. The flag of the Netherlands consists of three colors: red, white, and blue. Given balls of these three colors arranged randomly in a line (it does not matter how many balls there are), the task is to arrange them such that all balls of the same color are together and their collective color groups are in the correct order.
The solution to this problem is of interest for designing sorting algorithms; in particular, variants of the quicksort algorithm that must be robust to repeated elements may use a three-way partitioning function that groups items less than a given key (red), equal to the key (white) and greater than the key (blue). Several solutions exist that have varying performance characteristics, tailored to sorting arrays with either small or large numbers of repeated elements.
The array case
This problem can also be viewed in terms of rearranging elements of an array.
Suppose each of the possible elements could be classified into exactly one of three categories (bottom, middle, and top).
For example, if all the elements are in 0 ... 1, the bottom could be defined as elements in 0 ... 0.25 (not including 0.25), the middle as 0.25 ... 0.5 (not including 0.5)
and the top as 0.5 and greater. (The choice of these values illustrates that the categories need not be equal ranges). The problem is then to produce an array such that all "bottom" elements come before (have an index less than the index of) all "middle" elements, which come before all "top" elements.
One algorithm is to have the top group grow down from the top of the array, the bottom group grow up from the bottom, and keep the middle group just above the bottom. The algorithm indexes three locations, the bottom of the top group, the top of the bottom group, and the top of the middle group. Elements that are yet to be sorted fall between the middle and the top group. At each step, examine the element just above t |
https://en.wikipedia.org/wiki/SenseTalk | SenseTalk is a high-level English-like scripting language in the XTalk family, that supports both procedural and object-oriented paradigms. SenseTalk scripts are intended to be largely readable by ordinary people, including those with little to no training in programming.
To this end, SenseTalk includes a number of language elements that provide functionality oriented towards human tasks rather than the underlying machine behavior. For example, to check whether a quantity is divisible by 3, the script could use the expression or , with the emphasis being on readability and a focus on the human concept of divisibility. Compare this to more traditional programming languages (C, Java, Python, etc.) where the same test would typically be written as , with the focus being on the machine operations needed to determine the result.
This shift in focus away from the underlying machine computation, towards an English-like description of the behavior in human terms leads to the description of SenseTalk as a “People Oriented Programming language”.
Distinctive Characteristics
As a self-styled “People Oriented Programming” language, certain aspects of SenseTalk’s design distinguish it from other programming languages, and give it a distinctive flavor. These range from mundane characteristics such as case insensitivity, to syntactic elements that enhance readability, to more subtle characteristics such as fluid variable types.
Case-insensitive
SenseTalk keywords and variable names are all case-insensitive. This allows people to be casual in their use of capitalization without any change of behavior.
Put 12 Into Apples
put 5 into Bananas
PUT "Total Pieces of Fruit: " & apples+bananas --> displays "Total Pieces of Fruit: 17"
This is also true of the names of properties in a property list (SenseTalk’s name for a dictionary or hash table).
Put {Name:"Green", HexCode:"#00FF00"} into AColor
put aColor's name --> displays "Green"
put the HEXcode of acolor --> displays "#00FF |
https://en.wikipedia.org/wiki/New%20England%20Biolabs | New England Biolabs (NEB) produces and supplies recombinant and native enzyme reagents for the life science research, as well as providing products and services supporting genome editing, synthetic biology and next-generation sequencing. NEB also provides free access to research tools such as REBASE, InBASE, and Polbase.
The company
The company was founded in 1974 by Donald "Don" Comb, a Harvard Medical School professor, as a cooperative laboratory of experienced scientists and initially produced restriction enzymes on a commercial scale. Comb held the CEO title until 2005 when, at 78 years old, he moved from management back into research at the firm.
NEB received approximately $1.7 million in Small Business Innovation Research (SBIR) grants between 2009 and 2013 for this research.
NEB produces 230 recombinant and 30 native restriction enzymes for genomic research, as well as nicking enzymes and DNA methylases. It pursues research in areas related to proteomics, DNA Sequencing, and drug discovery. NEB scientists also conduct basic research in Molecular Biology and Parasitology.
The company has subsidiaries in Singapore, Canada, China, France, Germany, Japan, the U.K., and Australia, and distributors in South America, Australia, and other countries in Europe and Asia. Its headquarters are in Ipswich, MA. Development of the current headquarters began in 2000, and was completed in 2005. Donald Comb served as the company's Chairman and CEO from the company's founding in 1974, until 2005. In 2005, he was replaced as chief executive by James Ellard, though Comb continued to serve as Chairman of the Board of Directors. In October 2020 Comb passed away at the age of 93. NEB employs over 450 people at its headquarters. As company policy, all scientists and some executives must work at least one day per month on the customer support telephone line, answering technical support questions about the company's products. In 2022 Jim Ellard stepped down as CEO, but remained ch |
https://en.wikipedia.org/wiki/Zoo | A zoo (short for zoological garden; also called an animal park or menagerie) is a facility in which animals are kept within enclosures for public exhibition and often bred for conservation purposes.
The term zoological garden refers to zoology, the study of animals. The term is derived from the Greek , , 'animal', and the suffix , , 'study of'. The abbreviation zoo was first used of the London Zoological Gardens, which was opened for scientific study in 1828, and to the public in 1847. The first modern Zoo was the Tierpark Hagenbeck by Carl Hagenbeck in Germany.
In the United States alone, zoos are visited by over 181 million people annually.
Etymology
The London Zoo, which was opened in 1828, was initially known as the "Gardens and Menagerie of the Zoological Society of London", and it described itself as a menagerie or "zoological forest". The abbreviation "zoo" first appeared in print in the United Kingdom around 1847, when it was used for the Clifton Zoo, but it was not until some 20 years later that the shortened form became popular in the rhyming song "Walking in the Zoo" by music-hall artist Alfred Vance. The term "zoological park" was used for more expansive facilities in Halifax, Nova Scotia, Washington, D.C., and the Bronx in New York, which opened in 1847, 1891 and 1899 respectively.
Relatively new terms for zoos in the late 20th century are "conservation park" or "bio park". Adopting a new name is a strategy used by some zoo professionals to distance their institutions from the stereotypical and nowadays criticized zoo concept of the 19th century. The term "bio park" was first coined and developed by the National Zoo in Washington D.C. in the late 1980s. In 1993, the New York Zoological Society changed its name to the Wildlife Conservation Society and re branded the zoos under its jurisdiction as "wildlife conservation parks".
History
Royal menageries
The predecessor of the zoological garden is the menagerie, which has a long history from the an |
https://en.wikipedia.org/wiki/Technetium-99m | Technetium-99m (99mTc) is a metastable nuclear isomer of technetium-99 (itself an isotope of technetium), symbolized as 99mTc, that is used in tens of millions of medical diagnostic procedures annually, making it the most commonly used medical radioisotope in the world.
Technetium-99m is used as a radioactive tracer and can be detected in the body by medical equipment (gamma cameras). It is well suited to the role, because it emits readily detectable gamma rays with a photon energy of 140 keV (these 8.8 pm photons are about the same wavelength as emitted by conventional X-ray diagnostic equipment) and its half-life for gamma emission is 6.0058 hours (meaning 93.7% of it decays to 99Tc in 24 hours). The relatively "short" physical half-life of the isotope and its biological half-life of 1 day (in terms of human activity and metabolism) allows for scanning procedures which collect data rapidly but keep total patient radiation exposure low. The same characteristics make the isotope unsuitable for therapeutic use.
Technetium-99m was discovered as a product of cyclotron bombardment of molybdenum. This procedure produced molybdenum-99, a radionuclide with a longer half-life (2.75 days), which decays to 99mTc. This longer decay time allows for 99Mo to be shipped to medical facilities, where 99mTc is extracted from the sample as it is produced. In turn, 99Mo is usually created commercially by fission of highly enriched uranium in a small number of research and material testing nuclear reactors in several countries.
History
Discovery
In 1938, Emilio Segrè and Glenn T. Seaborg isolated for the first time the metastable isotope technetium-99m, after bombarding natural molybdenum with 8 MeV deuterons in the cyclotron of Ernest Orlando Lawrence's Radiation laboratory. In 1970 Seaborg explained that:
Later in 1940, Emilio Segrè and Chien-Shiung Wu published experimental results of an analysis of fission products of uranium-235, including molybdenum-99, and detected the pres |
https://en.wikipedia.org/wiki/Stack%20register | A stack register is a computer central processor register whose purpose is to keep track of a call stack. On an accumulator-based architecture machine, this may be a dedicated register. On a machine with multiple general-purpose registers, it may be a register that is reserved by convention, such as on the IBM System/360 through z/Architecture architecture and RISC architectures, or it may be a register that procedure call and return instructions are hardwired to use, such as on the PDP-11, VAX, and Intel x86 architectures. Some designs such as the Data General Eclipse had no dedicated register, but used a reserved hardware memory address for this function.
Machines before the late 1960s—such as the PDP-8 and HP 2100—did not have compilers which supported recursion. Their subroutine instructions typically would save the current location in the jump address, and then set the program counter to the next address. While this is simpler than maintaining a stack, since there is only one return location per subroutine code section, there cannot be recursion without considerable effort on the part of the programmer.
A stack machine has 2 or more stack registers — one of them keeps track of a call stack, the other(s) keep track of other stack(s).
Stack registers in x86
In 8086, the main stack register is called stack pointer - SP. The stack segment register (SS) is usually used to store information about the memory segment that stores the call stack of currently executed program. SP points to current stack top. By default, the stack grows downward in memory, so newer values are placed at lower memory addresses. To push a value to the stack, the PUSH instruction is used. To pop a value from the stack, the POP instruction is used.
Example: Assuming that SS = 1000h and SP = 0xF820. This means that current stack top is the physical address 0x1F820 (this is due to memory segmentation in 8086). The next two machine instructions of the program are:
PUSH AX
PUSH BX
These fir |
https://en.wikipedia.org/wiki/Dental%20anatomy | Dental anatomy is a field of anatomy dedicated to the study of human tooth structures. The development, appearance, and classification of teeth fall within its purview. (The function of teeth as they contact one another falls elsewhere, under dental occlusion.) Tooth formation begins before birth, and the teeth's eventual morphology is dictated during this time. Dental anatomy is also a taxonomical science: it is concerned with the naming of teeth and the structures of which they are made, this information serving a practical purpose in dental treatment.
Usually, there are 20 primary ("baby") teeth and 32 permanent teeth, the last four being third molars or "wisdom teeth", each of which may or may not grow in. Among primary teeth, 10 usually are found in the maxilla (upper jaw) and the other 10 in the mandible (lower jaw). Among permanent teeth, 16 are found in the maxilla and the other 16 in the mandible. Each tooth has specific distinguishing features.
Growing of tooth
Tooth development is the complex process by which teeth form from embryonic cells, grow, and erupt into the mouth. Although many diverse species have teeth, non-human tooth development is largely the same as in humans. For human teeth to have a healthy oral environment, enamel, dentin, cementum, and the periodontium must all develop during appropriate stages of fetal development. Primary (baby) teeth start to form between the sixth and eighth weeks in utero, and permanent teeth begin to form in the twentieth week in utero. If teeth do not start to develop at or near these times, they will not develop at all.
A significant amount of research has focused on determining the processes that initiate tooth development. It is widely accepted that there is a factor within the tissues of the first branchial arch that is necessary for the development of teeth. The tooth bud (sometimes called the tooth germ) is an aggregation of cells that eventually forms a tooth and is organized into three parts: th |
https://en.wikipedia.org/wiki/ADAT%20Lightpipe | The ADAT Lightpipe, officially the ADAT Optical Interface, is a standard for the transfer of digital audio between equipment. It was originally developed by Alesis but has since become widely accepted, with many third party hardware manufacturers including Lightpipe interfaces on their equipment. The protocol has become so popular that the term ADAT is now often used to refer to the transfer standard rather than to the Alesis Digital Audio Tape itself.
Cables and interface
Lightpipe uses the same connection hardware as S/PDIF: fiber optic cables (hence its name) to carry data, with Toslink connectors and optical transceivers at either end. However, the data streams of the two protocols are incompatible. S/PDIF is mostly used for transferring stereo or multi-channel surround sound audio, whereas the ADAT optical interface supports up to 8 audio channels at 48 kHz, 24 bit. Lightpipe devices have been successfully interfaced via FireWire.
Data transfer
Lightpipe can carry eight channels of uncompressed digital audio at 24 bit resolution at 48,000 samples or four channels at 96,000 samples per second.
Initially used for the transfer of digital audio between ADATs, the protocol was designed with future improvements in mind. All Lightpipe signals are transmitted at 24 bit resolution, no matter what the depth of the audio; information is contained within the Most Significant Bits and the rest of the bits remain a string of zeros. For example, if a 16 bit signal is sent via Lightpipe, the first sixteen bits contain the audio information while the other eight are simply occupied by zeros. The receiving device ignores information it cannot process. For example, a 20 bit signal going from a Type II ADAT to a Type I (which only operates at 16 bits) will simply ignore the bits below the sixteen MSBs.
Higher sample rates can be accommodated with a reduced number of channels. While the original ADAT machines did not support this, the Lightpipe format was modified using bit-spli |
https://en.wikipedia.org/wiki/Lists%20of%20physics%20equations | In physics, there are equations in every field to relate physical quantities to each other and perform calculations. Entire handbooks of equations can only summarize most of the full subject, else are highly specialized within a certain field. Physics is derived of formulae only.
General scope
Variables commonly used in physics
Continuity equation
Constitutive equation
Specific scope
Defining equation (physical chemistry)
List of equations in classical mechanics
Table of thermodynamic equations
List of equations in wave theory
List of relativistic equations
List of equations in fluid mechanics
List of electromagnetism equations
List of equations in gravitation
List of photonics equations
List of equations in quantum mechanics
List of equations in nuclear and particle physics
See also
List of equations
Operator (physics)
Laws of science
Units and nomenclature
Physical constant
Physical quantity
SI units
SI derived unit
SI electromagnetism units
List of common physics notations |
https://en.wikipedia.org/wiki/Paramedian%20reticular%20nucleus | The paramedian reticular nucleus (in Terminologia Anatomica, or paramedian medullary reticular group in NeuroNames) sends its connections to the spinal cord in a mostly ipsilateral manner, although there is some decussation.
It projects to the vermis in the anterior lobe, the pyramis and the uvula.
The paramedian nucleus also projects to the contralateral PRN, the gigantocellular nucleus, and the nucleus ambiguous.
The paramedian reticular formation is adjacent to the abducens (VI)nucleus in the pons and adjacent to the oculomotor nucleus(III) in the midbrain.
The paramedian nucleus receives afferents mostly from the fastigial nucleus in the cerebellum and the cerebral cortex; however, the projections from the spinal cord are very sparse.
The descending afferent connections come mostly from the frontal and parietal lobes; however the pontine reticular formation also sends projections to the paramedian reticular nucleus.
There are also very sparse innervations from the superior colliculus.
Lesions in the paramedian reticular nucleus have been shown to cause a stereotyped increase in the random patterns of motion in rats. The paramedian nuclei on either side of the brain stem have been shown to mediate the horizontal eye movements on their ipsilateral sides. It seems possible that the random motion patterns of the above rats were caused by an inability to mediate their horizontal eye movements.
See also
Paramedian pontine reticular formation
Notes |
https://en.wikipedia.org/wiki/Sentry%20Firewall | Sentry Firewall is a free open-source network firewall Linux distribution that was first published in 2001 and has been the subject of multiple magazine reviews. The distribution is particularly notable because it consists solely of a bootable CD-ROM that is designed to be used in a computer with no hard disk. Configuration information is retrieved at boot time by automatically searching on an attached floppy disk drive, USB flash memory drive, or another server on the local network willing to provide the configuration.
Overview
Sentry Firewall starts from CD-ROM and immediately constructs a RAM disk in the computer's memory. Before the system fully boots, a script searches for removable media containing a file called "sentry.conf". If that file is found, it may contain detailed instructions and a list of files to be copied from the removable media to the RAM disk before the system is finally allowed to boot.
The CD-ROM is pre-loaded with a variety of configurable network tools, including iptables.
Because the RAM disk is created each time the machine boots, it is possible to recover from any sort of problem simply by rebooting the machine. From a security perspective, this is compelling because the machine essentially becomes immune to viruses or file corruption - or at least the effects of either problem can't survive a reboot.
Configuration
While basic Linux familiarity is necessary to configure a basic set of files necessary to use the firewall, there exist Windows programs capable of creating the bulk of the configuration scripts based on interaction with a graphical user interface. Firewall Builder is one such example; this program also works with other firewall products unrelated to Sentry Firewall.
Current status
According to the project's maintainer, Sentry Firewall has not been updated since its January 2005 release.
External links
Sentry Firewall on ArchiveOS.org |
https://en.wikipedia.org/wiki/Cellius | was a Japanese video game developer and publisher headquartered in Shibuya, Tokyo, founded in 2007 as a joint venture between Sony and Bandai Namco Holdings. The aim of the company was to "help take share from Microsoft Corp. and Nintendo Co." Sony hoped that the company would make up for the losses it made during quarter two of its financial year. Ken Kutaragi was announced as CEO. Bandai Namco Holdings held 51% of the company, and Sony held 49%. The company planned to use Sony's Cell microprocessor, the heart of the PlayStation 3, for PlayStation 3 games and games for mobile phones and personal computers. Its only video game project was the poorly-received Ridge Racer on the PlayStation Vita.
Notes |
https://en.wikipedia.org/wiki/Webroot | Webroot Inc. is an American privately-held cybersecurity software company that provides Internet security for consumers and businesses. The company was founded in Boulder, Colorado, US, and is now headquartered in Broomfield, Colorado, and has US operations in San Mateo and San Diego, and globally in Australia, Austria, Ireland, Japan and the United Kingdom.
History
Webroot was founded on 5 July 1997 when Steven Thomas and his girlfriend Boulderite Kristen Tally launched Webroot's first commercial product, a trace removal agent called Webroot Window Washer. Investors include venture capital firms such as Technology Crossover Ventures, Accel Partners and Mayfield.
In 2002, Webroot launched a spyware blocking and removal product called Webroot Spy Sweeper. The company introduced antivirus protection with the launch of Spy Sweeper with AntiVirus in 2006. In October 2007, Webroot AntiVirus with AntiSpyware and Desktop Firewall was released with added firewall protection feature.
Webroot entered the enterprise market in 2004 with the launch of Webroot Spy Sweeper Enterprise, which combined Spy Sweeper with technology that enables IT administrators to deploy antispyware protection across an entire network.
In October 2008, Webroot launched its first consumer security suite, Webroot Internet Security Essentials, in the United States. The international release of the security suite followed in early 2009.
In August 2009, Webroot appointed a new president and CEO, former CEO of Wily Technology.
In May 2010 Webroot announced plans to open its international headquarters in Dublin, Ireland. In July 2010 Webroot Internet Security Complete 2011 was released, including antivirus and antispyware protection, firewall capabilities, online back-up, password management licensed from LastPass, protection against identity theft and credit card monitoring for US customers.
In September 2010 Webroot opened a regional office in Leidschendam, The Netherlands which is primarily ai |
https://en.wikipedia.org/wiki/Norton%20360 | Norton 360 is an "all-in-one" security suite developed by Gen Digital, formerly Symantec and later NortonLifeLock. The current suite was released in 2019 as a replacement for Norton Security, which had itself replaced an earlier suite named Norton 360.
See also
Norton AntiVirus |
https://en.wikipedia.org/wiki/Homogeneously%20Suslin%20set | In descriptive set theory, a set is said to be homogeneously Suslin if it is the projection of a homogeneous tree. is said to be -homogeneously Suslin if it is the projection of a -homogeneous tree.
If is a set and is a measurable cardinal, then is -homogeneously Suslin. This result is important in the proof that the existence of a measurable cardinal implies that sets are determined.
See also
Projective determinacy |
https://en.wikipedia.org/wiki/Homogeneous%20tree | In descriptive set theory, a tree over a product set is said to be homogeneous if there is a system of measures such that the following conditions hold:
is a countably-additive measure on .
The measures are in some sense compatible under restriction of sequences: if , then .
If is in the projection of , the ultrapower by is wellfounded.
An equivalent definition is produced when the final condition is replaced with the following:
There are such that if is in the projection of and , then there is such that . This condition can be thought of as a sort of countable completeness condition on the system of measures.
is said to be -homogeneous if each is -complete.
Homogeneous trees are involved in Martin and Steel's proof of projective determinacy. |
https://en.wikipedia.org/wiki/Data%20loss%20prevention%20software | Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint actions), in motion (network traffic), and at rest (data storage).
The terms "data loss" and "data leak" are related and are often used interchangeably. Data loss incidents turn into data leak incidents in cases where media containing sensitive information is lost and subsequently acquired by an unauthorized party. However, a data leak is possible without losing the data on the originating side. Other terms associated with data leakage prevention are information leak detection and prevention (ILDP), information leak prevention (ILP), content monitoring and filtering (CMF), information protection and control (IPC) and extrusion prevention system (EPS), as opposed to intrusion prevention system.
Categories
The technological means employed for dealing with data leakage incidents can be divided into categories: standard security measures, advanced/intelligent security measures, access control and encryption and designated DLP systems, although only the latter category are currently thought of as DLP today. Common DLP methods for spotting malicious or otherwise unwanted activity and responding to it mechanically are automatic detection and response. Most DLP systems rely on predefined rules to identify and categorize sensitive information, which in turn helps system administrators zero in on vulnerable spots. After that, some areas could have extra safeguards installed.
Standard measures
Standard security measures, such as firewalls, intrusion detection systems (IDSs) and antivirus software, are commonly available products that guard computers against outsider and insider attacks. The use of a firewall, for example, prevents the access of outsiders to the internal network and an intrusion detection system detects intrusion attempts by outsiders. Inside attacks can be averted |
https://en.wikipedia.org/wiki/Disk%20laser | A disk laser or active mirror (Fig.1) is a type of diode pumped solid-state laser characterized by a heat sink and laser output that are realized on opposite sides of a thin layer of active gain medium.
Despite their name, disk lasers do not have to be circular; other shapes have also been tried. The thickness of the disk is considerably smaller than the laser beam diameter. Initially, this laser cavity configuration had been proposed and realized experimentally for thin slice semiconductor lasers.
The disk laser concepts allow very high average and peak powers due to its large area, leading to moderate power densities on the active material.
Active mirrors and disk lasers
Initially, disk lasers were called active mirrors, because the gain medium of a disk laser is essentially an optical mirror with reflection coefficient greater than unity. An active mirror is a thin disk-shaped double-pass optical amplifier.
The first active mirrors were developed in the Laboratory for Laser Energetics (United States).
Scalable diode-end-pumped disk Nd:YAG laser had been proposed in in Talbot active mirror configuration.
Then, the concept was developed in various research groups,
in particular, the University of Stuttgart (Germany) for Yb:doped glasses.
In the disk laser, the heat sink does not have to be transparent, so, it can be extremely efficient even with large transverse size of the device (Fig.1).
The increase in size allows the power scaling to many kilowatts without significant modification of the design.
Limit of power scaling for disk lasers
The power of such lasers is limited not only by the power of pump available, but also by overheating, amplified spontaneous emission (ASE) and
the background round-trip loss.
To avoid overheating, the size should be increased with power scaling.
Then, to avoid strong losses due to the exponential growth of the ASE, the transverse-trip gain
cannot be large.
This requires reduction of the gain ;
this gain is determi |
https://en.wikipedia.org/wiki/Robert%20Williams%20%28robot%20fatality%29 | Robert Nicholas Williams (May 2, 1953 – January 25, 1979) was an American factory worker who was the first known human to be killed by a robot. While working at the Ford Motor Company's Michigan Casting Center, Williams was killed by an industrial robot arm on January 25, 1979.
Death and litigation
Williams was one of three operators of the parts retrieval system, a five-story robot built by the Unit Handling Systems division of Litton Industries. The robot was designed to retrieve castings from high density storage shelves at the Flat Rock plant. Part of the machine included one-ton transfer vehicles, which were carts on rubber wheels equipped with mechanical arms to move castings to and from the shelves. When the robot gave erroneous inventory readings, Williams was asked to climb into the racks to retrieve parts manually. Another news account states the robot was not retrieving parts quickly enough.
He climbed into the third level of the storage rack, where he was struck from behind and crushed by one of the one-ton transfer vehicles, killing him instantly. His body remained in the shelf for 30 minutes until it was discovered by workers who were concerned about his disappearance.
His family sued the manufacturers of the robot, Litton Industries, alleging "that Litton was negligent in designing, manufacturing and supplying the storage system and in failing to warn [system operators] of foreseeable dangers in working within the storage area." In a 1983 jury decision, the court awarded his estate $10 million and concluded that there simply were not enough safety measures in place to prevent such an accident from happening. He would go down in history as the first recorded human death by robot. The award was raised to $15 million in January 1984. Litton settled with the estate of Williams for an undisclosed amount in exchange for Litton not admitting negligence.
Litton had sought indemnification and recovery of judgment costs from Ford because Ford had not sent |
https://en.wikipedia.org/wiki/FitzHugh%E2%80%93Nagumo%20model | The FitzHugh–Nagumo model (FHN) describes a prototype of an excitable system (e.g., a neuron).
It is an example of a relaxation oscillator because, if the external stimulus exceeds a certain threshold value, the system will exhibit a characteristic excursion in phase space, before the variables and relax back to their rest values.
This behaviour is a sketch for neural spike generations, with a short, nonlinear elevation of membrane voltage , diminished over time by a slower, linear recovery variable representing sodium channel reactivation and potassium channel deactivation, after stimulation by an external input current.
The equations for this dynamical system read
The FitzHugh–Nagumo model is a simplified 2D version of the Hodgkin–Huxley model which models in a detailed manner activation and deactivation dynamics of a spiking neuron.
In turn, the Van der Pol oscillator is a special case of the FitzHugh–Nagumo model, with .
History
It was named after Richard FitzHugh (1922–2007) who suggested the system in 1961 and Jinichi Nagumo et al. who created the equivalent circuit the following year.
In the original papers of FitzHugh, this model was called Bonhoeffer–Van der Pol oscillator (named after Karl-Friedrich Bonhoeffer and Balthasar van der Pol) because it contains the Van der Pol oscillator as a special case for . The equivalent circuit was suggested by Jin-ichi Nagumo, Suguru Arimoto, and Shuji Yoshizawa.
Qualitative analysis
Qualitatively, the dynamics of this system is determined by the relation between the three branches of the cubic nullcline and the linear nullcline.
The cubic nullcline is defined by .
The linear nullcline is defined by .
In general, the two nullclines intersect at one or three points, each of which is an equilibrium point. At large values of , far from origin, the flow is a clockwise circular flow, consequently the sum of the index for the entire vector field is +1. This means that when there is one equilibrium poin |
https://en.wikipedia.org/wiki/Global%20Ocean%20Data%20Analysis%20Project | The Global Ocean Data Analysis Project (GLODAP) is a synthesis project bringing together oceanographic data, featuring two major releases as of 2018. The central goal of GLODAP is to generate a global climatology of the World Ocean's carbon cycle for use in studies of both its natural and anthropogenically forced states. GLODAP is funded by the National Oceanic and Atmospheric Administration, the U.S. Department of Energy, and the National Science Foundation.
The first GLODAP release (v1.1) was produced from data collected during the 1990s by research cruises on the World Ocean Circulation Experiment, Joint Global Ocean Flux Study and Ocean-Atmosphere Exchange Study programmes. The second GLODAP release (v2) extended the first using data from cruises from 2000 to 2013. The data are available both as individual "bottle data" from sample sites, and as interpolated fields on a standard longitude, latitude, depth grid.
Dataset
The GLODAPv1.1 climatology contains analysed fields of "present day" (1990s) dissolved inorganic carbon (DIC), alkalinity, carbon-14 (14C), CFC-11 and CFC-12. The fields consist of three-dimensional, objectively-analysed global grids at 1° horizontal resolution, interpolated onto 33 standardised vertical intervals from the surface (0 m) to the abyssal seafloor (5500 m). In terms of temporal resolution, the relative scarcity of the source data mean that, unlike the World Ocean Atlas, averaged fields are only produced for the annual time-scale. The GLODAP climatology is missing data in certain oceanic provinces including the Arctic Ocean, the Caribbean Sea, the Mediterranean Sea and Maritime Southeast Asia.
Additionally, analysis has attempted to separate natural from anthropogenic DIC, to produce fields of pre-industrial (18th century) DIC and "present day" anthropogenic . This separation allows estimation of the magnitude of the ocean sink for anthropogenic , and is important for studies of phenomena such as ocean acidification. However, |
https://en.wikipedia.org/wiki/ScRGB | scRGB is a wide color gamut RGB color space created by Microsoft and HP that uses the same color primaries and white/black points as the sRGB color space but allows coordinates below zero and greater than one. The full range is −0.5 through just less than +7.5.
Negative numbers enables scRGB to encompass most of the CIE 1931 color space while maintaining simplicity and backward compatibility with sRGB without the complexity of color management. The cost of maintaining compatibility with sRGB is that approximately 80% of the scRGB color space consists of imaginary colors.
Large positive numbers allow high dynamic range images to be represented, though the range is inferior to that of some other high dynamic range formats such as OpenEXR.
Encoding
Two encodings are defined for the individual primaries: a linear 16 bit per channel encoding and a nonlinear 12 bit per channel encoding.
The 16 bit scRGB(16) encoding is the linear RGB channels converted by . Compared to 8-bit sRGB this ranges from almost times the color resolution near 0.0 to more than 14 times the color resolution near 1.0. Storage as 16 bits clamps the linear range to .
The 12-bit scRGB-nl encoding is the linear RGB channels passed through the same opto-electric conversion function as sRGB (for negative numbers use ) and then converted by . This is exactly 5 times the color resolution of 8-bit sRGB, and 8-bit sRGB can be converted directly with . The linear range is clamped to the slightly larger .
A 12-bit encoding called scYCC-nl is the conversion of the non-linear sRGB levels to JFIF-Y'CbCr and then converted by , , . This form can allow greater compression and direct conversion to/from JPEG files and video hardware.
With the addition of an alpha channel with the same number of bits the 16-bit encoding may be seen referred to as 64 bit and the 12-bit encoding referred to as 48-bit. Alpha is not encoded as above, however. Alpha is instead a linear 0-1 range multiplied by where is 12 or 16.
|
https://en.wikipedia.org/wiki/UTOPIA%20%28bioinformatics%20tools%29 | UTOPIA (User-friendly Tools for Operating Informatics Applications) is a suite of free tools for visualising and analysing bioinformatics data. Based on an ontology-driven data model, it contains applications for viewing and aligning protein sequences, rendering complex molecular structures in 3D, and for finding and using resources such as web services and data objects. There are two major components, the protein analysis suite and UTOPIA documents.
Utopia Protein Analysis suite
The Utopia Protein Analysis suite is a collection of interactive tools for analysing protein sequence and protein structure. Up front are user-friendly and responsive visualisation applications, behind the scenes a sophisticated model that allows these to work together and hides much of the tedious work of dealing with file formats and web services.
Utopia Documents
Utopia Documents brings a fresh new perspective to reading the scientific literature, combining the convenience and reliability of the Portable Document Format (pdf) with the flexibility and power of the web.
History
Between 2003 and 2005 work on UTOPIA was funded via The e-Science North West Centre based at The University of Manchester by the Engineering and Physical Sciences Research Council, UK Department of Trade And Industry, and the European Molecular Biology Network (EMBnet). Since 2005 work continues under the EMBRACE European Network of Excellence.
UTOPIA's CINEMA (Colour INteractive Editor for Multiple Alignments), a tool for Sequence Alignment, is the latest incarnation of software originally developed at The University of Leeds to aid the analysis of G protein-coupled receptors (GPCRs). SOMAP, a Screen Oriented Multiple Alignment Procedure was developed in the late 1980s on the VMS computer operating system, used a monochrome text-based VT100 video terminal, and featured context-sensitive help and pulldown menus some time before these were standard operating system features.
SOMAP was followed by a Unix tool c |
https://en.wikipedia.org/wiki/Radio%20music%20ripping | The term ripping (slang term for digital media extraction) can also apply to radio. New software, techniques and cloud services now makes it possible to extract the songs played on the radio and digitally save them on separate audio tracks. Available techniques make it possible to rip the music from Internet radio broadcasts, satellite radio broadcasts and FM radio broadcasts.
Ripping is more than simply recording the audio. The key aspect of ripping is disambiguation. When ripping songs from any source, the songs should be split into separate tracks or files, and the songs should be tagged. Otherwise, one is simply recording or dubbing the audio.
Internet radio
Popular audio formats for Internet radio include AAC, AAC+, and MP3. Many AM/FM stations simulcast online use the more efficient AAC format while Internet-only streams more typically use MP3. The Shoutcast database featured 34,281 online radio stations covering almost every conceivable music genre.
Cloud recording services such as DAR.fm, Quick Record can record from all of these formats. Most PC based Internet radio ripping software is built for Shoutcast-style of streams as this MP3-based protocol offers the widest selection of Internet radio stations. Such wide selection of music is one of the major advantages for recording songs from Internet radio compared to FM and satellite radio as well as the fact that it works with cloud services that do not require a separate audio receiver. The disadvantages may include fairly low audio quality in the saved MP3s, which varies from stream to stream.
To begin the recording process, the software connects to the audio stream over TCP. The stream is then buffered 15–30 seconds ahead. Some Internet radio ripping software, utilize special metadata that are being sent along with actual song content. These programs are generally more successful in determining the boundaries of songs (providing for a cleaner MP3 cut) as well as correctly identifying the song in questio |
https://en.wikipedia.org/wiki/Hairless | Hairless, also known as H, is a well-characterized Drosophila gene. Since Hairless is a dominant loss of function mutation, many mutations to Hairless are embryonic lethal, but there are several viable hairless mutants. This specific Drosophila gene is involved in the Notch signaling pathway (NSP) by acting as a suppressor of the organism's Notch signaling. This interaction of the NSP can be seen in Figure 1.
Hairless (H) encodes a hydrophilic protein that is composed of 1076 amino acids, and has a molecular weight of 110 kDa. The H protein is reported in insects, and is found in nearly all of the family Drosophilidae. It is also found in the family Culicidae, as well as the orders Lepidoptera, Hymenoptera, and Coleoptera.
In Drosophila, NSPs allow for communication intercellularly during embryo development, and the physiological activities of adult organisms. Furthermore, these pathways turn on periodically during devolvement to help determine cell fate functions of the cell. Since Hairless (H) is an antagonist of the NSP, as well as a “key member of the Su[H] repressor complex", it plays a significant part of embryo development in insects because it helps influence cell fate decisions during this time.
It is crucial that proteins HP120 and HP150 are present in the organism as they control the normal activity of H. This activity regulation also controls NSP, which allows the fly embryos to develop correctly, and if there is any fluctuation in the pathway or the proteins, it can change the outcome of the offspring. The two most common changes in the Drosophila phenotype as a result of Hairless mutation are bristle loss and vein gaps. These changes can be seen in Figure 2. |
https://en.wikipedia.org/wiki/AN/UYK-20 | The AN/UYK-20 "Data Processing Set" was a ruggedized small computer manufactured by Univac and used by the United States Navy for small and medium-sized shipboard and shore systems built in the 1970s. It featured non-volatile magnetic core memory and was housed in a heavy-duty metal cube-shaped box which was designed to fit through a 25-inch circular hatch.
In 1972, in response to the proliferation of small computer types in the Navy's inventory, the Chief of Naval Material mandated the use of the AN/UYK-20(V) in systems requiring a small digital processor. In March 1974 the AN/UYK-20 received service approval and by late 1974 they were in use in the development of tactical systems.
Programmers and operators colloquially referred to this computer as the "Yuck Twenty."
Technical
In addition to various uses throughout the fleet, the system was used to train the U.S. Navy's Data Systems Technicians (DS) on digital computer theory and application. The 9-month course had 4 phases and phase 3 was UYK-20. Phase 3 was broken into the following sections:
Microinstructions
Macroinstructions
Processor/Emulator
Memory
Input/Output
Graded Troubleshooting (Mids)- MIDS was the last week of Phase 3 where as the class started at 2300 hours and finished at 0630. Each night a series of faults was inserted into the UYK-20 for troubleshooting purposes. The student had to use diagnostic routines, troubleshooting techniques, and skill to find and fix the faults. The student had to pass with a majority of faults identified and fixed to move on to phase 4. Phase 3 for some was the toughest part of Data Systems A School at Mare Island, CA. I know this, because I attended A School as a DS from SEP 89 - MAY 90. Phase 2 used the training computer called the COMTRAN 10 aka "Comtrash 10".
After the dissolution of the Navy's DS rate, the primary maintenance responsibility was moved to the Electronic Technicians (ET), as the UYK-20 was already being used in several of their systems primarily t |
https://en.wikipedia.org/wiki/Dorsal%20radioulnar%20ligament | The dorsal radioulnar ligament (posterior radioulnar ligament) extends between corresponding surfaces on the dorsal aspect of the distal radioulnar articulation. |
https://en.wikipedia.org/wiki/Palmar%20radioulnar%20ligament | The palmar radioulnar ligament (volar radioulnar ligament, anterior radioulnar ligament) is a narrow band of fibers extending from the anterior margin of the ulnar notch of the radius to the front of the head of the ulna.
It is sometimes abbreviated PRUL. |
https://en.wikipedia.org/wiki/Ki-67%20%28protein%29 | Antigen Kiel 67, also known as Ki-67 or MKI67 (marker of proliferation Kiel 67), is a protein that in humans is encoded by the gene (antigen identified by monoclonal antibody Ki-67).
Function
Antigen KI-67 is a nuclear protein that is associated with cellular proliferation and ribosomal RNA transcription. Inactivation of antigen KI-67 leads to inhibition of ribosomal RNA synthesis, but does not significantly affect cell proliferation in vivo: Ki-67 mutant mice developed normally and cells lacking Ki-67 proliferated efficiently.
Use as a marker of proliferating cells
The Ki-67 protein (also known as MKI67) is a cellular marker for proliferation, and can be used in immunohistochemistry. It is strictly associated with cell proliferation. During interphase, the Ki-67 antigen can be exclusively detected within the cell nucleus, whereas in mitosis most of the protein is relocated to the surface of the chromosomes. Ki-67 protein is present during all active phases of the cell cycle (G1, S, G2, and mitosis), but is absent in resting (quiescent) cells (G0). Cellular content of Ki-67 protein markedly increases during cell progression through S phase of the cell cycle. In breast cancer Ki67 identifies a high proliferative subset of patients with ER-positive breast cancer who derive greater benefit from adjuvant chemotherapy.
Antibody labeling
Ki-67 is an excellent marker to determine the growth fraction of a given cell population. The fraction of Ki-67-positive tumor cells (the Ki-67 labeling index) is often correlated with the clinical course of cancer. The best-studied examples in this context are prostate, brain and breast carcinomas, as well as nephroblastoma and neuroendocrine tumors. For these types of tumors, the prognostic value for survival and tumor recurrence have repeatedly been proven in uni- and multivariate analysis.
MIB-1
Ki-67 and MIB-1 monoclonal antibodies are directed against different epitopes of the same proliferation-related antigen. Ki-67 and M |
https://en.wikipedia.org/wiki/Chartered%20Institute%20of%20Ecology%20and%20Environmental%20Management | The Chartered Institute of Ecology and Environmental Management (CIEEM, ) is the professional body which represents and supports ecologists and environmental managers, mainly in the United Kingdom but increasingly in Ireland and mainland Europe, and the rest of the world.
CIEEM's vision is of a healthy natural environment for the benefit of current and future generations.
Established in 1991, CIEEM now has over 6,000 members drawn from local authorities, government agencies, industry, environmental consultancy, teaching/research, and NGOs. Formerly known as IEEM, CIEEM attained a royal charter in 2013, being recognised for its high level of professionalism. The Inaugural President from 1991–94 was the ecologist Tony Bradshaw FRS.
Activities of CIEEM
CIEEM provides a variety of services (including conferences, training, events, guidance and advice) to develop the competency and standards of professional ecologists and environmental managers and also to promote ecology and environmental management as a profession.
CIEEM members are able to become Chartered Ecologists and/or Chartered Environmentalists.
CIEEM is a constituent body of the Society for the Environment and the Environmental Policy Forum (EPF). CIEEM is also a member of the IUCN-UK Committee and a supporter member of Greener UK.
CIEEM is a member of the UN Decade of Biodiversity 2011-2020 partnership, and was a signatory of the Countdown 2010 agreement to help save biodiversity and a member of the 2010 International Year of Biodiversity UK partnership.
Awards
The Institute makes a number of annual awards including:
CIEEM Medal
The CIEEM Medal is the Institute’s premier award and is presented in recognition of an outstanding single or lifelong contribution to the field of ecology and environmental management.
Best Practice Awards
Five best practice awards recognise the highest standards of ecological and environmental management practice by CIEEM members.
Tony Bradshaw Award
The Tony Bradshaw |
https://en.wikipedia.org/wiki/Interrupt%20flag | The Interrupt flag (IF) is a flag bit in the CPU's FLAGS register, which determines whether or not the (CPU) will respond immediately to maskable hardware interrupts. If the flag is set to 1 maskable interrupts are enabled. If reset (set to 0) such interrupts will be disabled until interrupts are enabled. The Interrupt flag does not affect the handling of non-maskable interrupts (NMIs) or software interrupts generated by the INT instruction.
Setting and clearing
In a system using x86 architecture, the instructions CLI (Clear Interrupt) and STI (Set Interrupt). The POPF (Pop Flags) removes a word from the stack into the FLAGS register, which may result in the Interrupt flag being set or cleared based on the bit in the FLAGS register from the top of the stack.
Privilege level
In systems that support privileged mode, only privileged applications (usually the OS kernel) may modify the Interrupt flag. In an x86 system this only applies to protected mode code (Real mode code may always modify the Interrupt flag). CLI and STI are privileged instructions, which cause a general protection fault if an unprivileged application attempts to execute them. The POPF instruction will not modify the Interrupt flag if the application is unprivileged.
Old DOS programs
Some old DOS programs that use a protected mode DOS extender and install their own interrupt handlers (usually games) use the CLI instruction in the handlers to disable interrupts and either POPF (after a corresponding PUSHF) or IRET (which restores the flags from the stack as part of its effects) to restore it. This works if the program was started in real mode, but causes problems when such programs are run in a DPMI-based container on modern operating systems (such as NTVDM under Windows NT or later). Since CLI is a privileged instruction, it triggers a fault into the operating system when the program attempts to use it. The OS then typically stops delivering interrupts to the program until the program executes |
https://en.wikipedia.org/wiki/Missing%20Link%20%28puzzle%29 | Missing Link is a mechanical puzzle invented in 1981 by Steven P. Hanson and Jeffrey D. Breslow.
The puzzle has four sides, each depicting a chain of a different color. Each side contains four tiles, except one which contains three tiles and a gap. The top and bottom rows can be rotated, and tiles can slide up or down into the gap. The objective is to scramble the tiles and then restore them to their original configuration.
The two middle rows cannot be rotated. To move tiles in these rows, you need to loop the tiles from one row to another, up and down.
There are 15 tiles and a gap, giving a maximum of 16! arrangements. However, the middle tiles of each four-tile chain are identical, and each position is equivalent to seven other positions obtained by rotating the entire puzzle (about its axis or upside-down), reducing the number of arrangements to 16! / 8 / 8 = 326,918,592,000. If the three long chains are also considered interchangeable, then the number of arrangements is further reduced to 16! / 8 / 8 / 6 = 54,486,432,000.
Reception
Games magazine included Inner Circle in their "Top 100 Games of 1981", expecting it to be "the torture of the season" but instead found it was "solvable by ordinary human beings and will not provoke a rash of how-to books".
See also
Combination puzzles
Mechanical puzzles |
https://en.wikipedia.org/wiki/Compatibility%20testing | Compatibility testing is a part of non-functional testing conducted on application software to ensure the application's compatibility with different computing environment.
The ISO 25010 standard, (System and Software Quality Models) defines compatibility as a characteristic or degree to which a software system can exchange information with other systems whilst sharing the same software and hardware. The degree to which a product can perform its required functions efficiently while sharing a common environment and resources with other products, without detrimental impact on any other product is known as co-existence while interoperability is the degree to which two or more systems, products, or components can exchange information and use the information that has been exchanged. In these contexts, compatibility testing would be information gathering about a product or software system to determine the extent of coexistence and interoperability exhibited in the system under test.
See also
List of International Organization for Standardization standards, 24000-25999
ISO/IEC 25010:2011 Systems and software engineering - Systems and software Quality Requirements and Evaluation (SQuaRE) - System and software quality models |
https://en.wikipedia.org/wiki/Gavaksha | In Indian architecture, gavaksha or chandrashala (kudu in Tamil, also nāsī) are the terms most often used to describe the motif centred on an ogee, circular or horseshoe arch that decorates many examples of Indian rock-cut architecture and later Indian structural temples and other buildings. In its original form, the arch is shaped like the cross-section of a barrel vault. It is called a chaitya arch when used on the facade of a chaitya hall, around the single large window. In later forms it develops well beyond this type, and becomes a very flexible unit, "the most common motif of Hindu temple architecture". Gavākṣha (or gavaksa) is a Sanskrit word which means "bull's or cow's eye". In Hindu temples, their role is envisioned as symbolically radiating the light and splendour of the central icon in its sanctum. Alternatively, they are described as providing a window for the deity to gaze out into the world.
Like the whole of the classic chaitya, the form originated in the shape of the wooden thatched roofs of buildings, none of which have survived; the earliest version replicating such roofs in stone is at the entrance to the non-Buddhist Lomas Rishi Cave, one of the man-made Barabar Caves in Bihar.
The "chaitya arch" around the large window above the entrance frequently appears repeated as a small motif in decoration, and evolved versions continue into Hindu decoration, long after actual chaityas had ceased to be built. In these cases it can become an elaborate cartouche-like frame, spreading rather wide, around a circular or semi-circular medallion, which may contain a sculpture of a figure or head. An early stage is shown in the entrance to Cave 9 at the Ajanta Caves, where the chaitya arch window frame is repeated several times as a decorative motif. Here, and in many similar early examples, the interior of the arch in the motif contains low relief lattice imitating receding roof timbers (purlins).
First stage
The arched gable-end form seen at the Lomas |
https://en.wikipedia.org/wiki/Dvoretzky%27s%20theorem | In mathematics, Dvoretzky's theorem is an important structural theorem about normed vector spaces proved by Aryeh Dvoretzky in the early 1960s, answering a question of Alexander Grothendieck. In essence, it says that every sufficiently high-dimensional normed vector space will have low-dimensional subspaces that are approximately Euclidean. Equivalently, every high-dimensional bounded symmetric convex set has low-dimensional sections that are approximately ellipsoids.
A new proof found by Vitali Milman in the 1970s was one of the starting points for the development of asymptotic geometric analysis (also called asymptotic functional analysis or the local theory of Banach spaces).
Original formulations
For every natural number k ∈ N and every ε > 0 there exists a natural number N(k, ε) ∈ N such that if (X, ‖·‖) is any normed space of dimension N(k, ε), there exists a subspace E ⊂ X of dimension k and a positive definite quadratic form Q on E such that the corresponding Euclidean norm
on E satisfies:
In terms of the multiplicative Banach-Mazur distance d the theorem's conclusion can be formulated as:
where denotes the standard k-dimensional Euclidean space.
Since the unit ball of every normed vector space is a bounded, symmetric, convex set and the unit ball of every Euclidean space is an ellipsoid, the theorem may also be formulated as a statement about ellipsoid sections of convex sets.
Further developments
In 1971, Vitali Milman gave a new proof of Dvoretzky's theorem, making use of the concentration of measure on the sphere to show that a random k-dimensional subspace satisfies the above inequality with probability very close to 1. The proof gives the sharp dependence on k:
where the constant C(ε) only depends on ε.
We can thus state: for every ε > 0 there exists a constant C(ε) > 0 such that for every normed space (X, ‖·‖) of dimension N, there exists a subspace E ⊂ X of dimension
k ≥ C(ε) log N and a Euclidean norm |·| on E such that
More precisely, |
https://en.wikipedia.org/wiki/Naum%20Akhiezer | Naum Ilyich Akhiezer (; ; 6 March 1901 – 3 June 1980) was a Soviet and Ukrainian mathematician of Jewish origin, known for his works in approximation theory and the theory of differential and integral operators. He is also known as the author of classical books on various subjects in analysis, and for his work on the history of mathematics. He is the brother of the theoretical physicist Aleksandr Akhiezer.
Biography
Naum Akhiezer was born in Cherykaw (now in Belarus). He studied in the Kyiv Institute of Public Education (now Taras Shevchenko National University of Kyiv). In 1928, he defended his PhD thesis "Aerodynamical Investigations" under the supervision of Dmitry Grave. From 1928 to 1933, he worked at the Kyiv University and at the Kyiv Aviation Institute.
In 1933, Naum Akhiezer moved to Kharkiv. From 1933 to his death, except for the years of war and evacuation, he was a professor at Kharkov University and at other institutes in Kharkiv. From 1935 to 1940 and from 1947 to 1950 he was director of the Kharkov Institute of Mathematics and Mechanics. For many years he headed the Kharkov Mathematical Society.
Work
Akhiezer obtained important results in approximation theory (in particular, on extremal problems, constructive function theory, and the problem of moments), where he masterly applied the methods of the geometric theory of functions of a complex variable (especially, conformal mappings and the theory of Riemann surfaces) and of functional analysis. He found the fundamental connection between the inverse problem for important classes of differential and finite difference operators of the second order with a finite number of gaps in the spectrum, and the Jacobi inversion problem for Abelian integrals. This connection led to explicit solutions of the inverse problem for the so-called finite-gap operators.
Some publications
Books in analysis
English translation:
. English translation:
. English translation:
English translation:
English translation |
https://en.wikipedia.org/wiki/Refined%20grains | Refined grains have been significantly modified from their natural composition, in contrast to whole grains. The modification process generally involves the mechanical removal of bran and germ, either through grinding or selective sifting.
Overview
A refined grain is defined as having undergone a process that removes the bran, germ and husk of the grain and leaves the endosperm, or starchy interior. Examples of refined grains include white bread, white flour, corn grits and white rice. Refined grains are milled which gives a finer texture and improved shelf life. Because the outer parts of the grain are removed and used for animal feed and non-food use, refined grains have been described as less sustainable than whole grains.
After refinement of grains became prevalent in the early 20th-century, nutritional deficiencies (iron, thiamin, riboflavin and niacin) became more common in the United States. To correct this, the Congress passed the U.S. Enrichment Act of 1942 which requires that iron, niacin, thiamin and riboflavin have to be added to all refined grain products before they are sold. Folate (folic acid) was added in 1996.
Refining grain includes mixing, bleaching, and brominating; additionally, folate, thiamin, riboflavin, niacin, and iron are added back in to nutritionally enrich the product. Enriched grains are refined grains that have been fortified with additional nutrients. Whole grains contain more dietary fiber than refined grains. After processing, fiber is not added back to enriched grains. Enriched grains are nutritionally comparable to whole grains but only in regard to their added nutrients. Whole grains contain higher amounts of minerals including chromium, magnesium, selenium, and zinc and vitamins such as Vitamin B6 and Vitamin E. Whole grains also provide phytochemicals which enriched grains lack.
In the case of maize, the process of nixtamalization (a chemical form of refinement) yields a considerable improvement in the bioavailability of |
https://en.wikipedia.org/wiki/Band%20offset | Band offset describes the relative alignment of the energy bands at a semiconductor heterojunction.
Introduction
At semiconductor heterojunctions, energy bands of two different materials come together, leading to an interaction. Both band structures are positioned discontinuously from each other, causing them to align close to the interface. This is done to ensure that the Fermi energy level stays continuous throughout the two semiconductors. This alignment is caused by the discontinuous band structures of the semiconductors when compared to each other and the interaction of the two surfaces at the interface. This relative alignment of the energy bands at such semiconductor heterojunctions is called the Band offset.
The band offsets can be determined by both intrinsic properties, that is, determined by properties of the bulk materials, as well as non-intrinsic properties, namely, specific properties of the interface. Depending on the type of the interface, the offsets can be very accurately considered intrinsic, or be able to be modified by manipulating the interfacial structure. Isovalent heterojunctions are generally insensitive to manipulation of the interfacial structure, whilst heterovalent heterojunctions can be influenced in their band offsets by the geometry, the orientation, and the bonds of the interface and the charge transfer between the heterovalent bonds. The band offsets, especially those at heterovalent heterojunctions depend significantly on the distribution of interface charge.
The band offsets are determined by two kinds of factors for the interface, the band discontinuities and the built-in potential. These discontinuities are caused by the difference in band gaps of the semiconductors and are distributed between two band discontinuities, the valence-band discontinuity, and the conduction-band discontinuity. The built-in potential is caused by the bands which bend close at the interface due to a charge imbalance between the two semiconducto |
https://en.wikipedia.org/wiki/Indium%20%28111In%29%20altumomab%20pentetate | Indium (111In) altumomab pentetate (INN) (USP, indium In 111 altumomab pentetate; trade name Hybri-ceaker) is a mouse monoclonal antibody linked to pentetate which acts as a chelating agent for the radioisotope indium-111. The drug is used for the diagnosis of colorectal cancer but has not been approved for use. |
https://en.wikipedia.org/wiki/Anatumomab%20mafenatox | Anatumomab mafenatox is a mouse monoclonal antibody studied for the treatment non-small cell lung cancer, which acts as a tumor-targeted superantigen.
It is a fusion protein of a human tumor-associated 5T4 antigen monoclonal IgG1 Fab fragment with an enterotoxin ('mafenatox') of Staphylococcus aureus.
Development was abandoned in 2005. |
https://en.wikipedia.org/wiki/Technetium%20%2899mTc%29%20arcitumomab | {{DISPLAYTITLE:Technetium (99mTc) arcitumomab}}
Technetium (99mTc) arcitumomab is a drug used for the diagnostic imaging of colorectal cancers, marketed by Immunomedics. It consists of the Fab' fragment of a monoclonal antibody (arcitumomab, trade name CEA-Scan) and a radionuclide, technetium-99m.
Chemistry
Technetium (99mTc) arcitumomab is an immunoconjugate. Arcitumomab is a Fab' fragment of IMMU-4, a murine IgG1 monoclonal antibody extracted from the ascites of mice. The enzyme pepsin cleaves the F(ab')2 fragment off the antibody. From this, the Fab' fragment is prepared by mild reduction.
Before application, arcitumomab is reconstituted with a solution of the radioactive agent sodium pertechnetate (99mTc) from a technetium generator.
Mechanism of action
Arcitumomab recognizes carcinoembryonic antigen (CEA), an antigen over-expressed in 95% of colorectal cancers. Consequently, the antibody accumulates in such tumours together with the radioisotope, which emits photons. Via single photon emission computed tomography (SPECT), high-resolution images showing localisation, remission or progression, and metastases of the tumour can be obtained.
Contraindications
Technetium (99mTc) arcitumomab is contraindicated for patients with known allergies or hypersensitivity to mouse proteins, as well as during pregnancy. Women should pause breast feeding for 24 hours after application of the drug.
Adverse effects and overdose
Only mild and transient side effects have been observed, mostly immunological reactions like eosinophilia, itching and fever. Some patients develop human anti-mouse antibodies, so there is the theoretical possibility of anaphylactic reactions. High doses of IMMU-4 (up to 20-fold diagnostic arcitumomab dose) have not led to any serious events. One patient has been reported to develop a grand mal after application.
Radioactivity can lead to radiation poisoning. Since the dose of an arcitumomab application is about 10 mSv, such an overdose is unlikely. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.