source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/When%20the%20Weather%20Is%20Fine%20%28song%29 | "When the Weather Is Fine" is the fourth and final single released from Australian pop rock band Thirsty Merc's debut album, Thirsty Merc (2004). The song only appears on the 2005 re-packaged version of the album.
Music video
The music video features Thirsty Merc playing the song in a theatre and there's water shallowly covering the stage (to ankle height) intercut with scenes from the audience where a young man and woman appear to be having relationship troubles, reflecting the lyrical content of the song.
Track listing
Australian CD single
"When the Weather Is Fine" – 3:24
"Baby Tell Me I'm the Only One" – 3:25
"Crystal Striker" – 3:51
"Someday, Someday" (video)
"Wasting Time" (video)
Charts |
https://en.wikipedia.org/wiki/E%C3%B6tv%C3%B6s%20rule | The Eötvös rule, named after the Hungarian physicist Loránd (Roland) Eötvös (1848–1919) enables the prediction of the surface tension of an arbitrary liquid pure substance at all temperatures. The density, molar mass and the critical temperature of the liquid have to be known. At the critical point the surface tension is zero.
The first assumption of the Eötvös rule is:
1. The surface tension is a linear function of the temperature.
This assumption is approximately fulfilled for most known liquids. When plotting the surface tension versus the temperature a fairly straight line can be seen which has a surface tension of zero at the critical temperature.
The Eötvös rule also gives a relation of the surface tension behaviour of different liquids in respect to each other:
2. The temperature dependence of the surface tension can be plotted for all liquids in a way that the data collapses to a single master curve. To do so either the molar mass, the density, or the molar volume of the corresponding liquid has to be known.
More accurate versions are found on the main page for surface tension.
The Eötvös rule
If V is the molar volume and Tc the critical temperature of a liquid the surface tension γ is given by
where k is a constant valid for all liquids. The Eötvös constant has a value of 2.1×10−7 J/(K·mol2/3).
More precise values can be gained when considering that the line normally passes the temperature axis 6 K before the critical point:
The molar volume V is given by the molar mass M and the density ρ
The term is also referred to as the "molar surface tension" γmol :
A useful representation that prevents the use of the unit mol−2/3 is given by the Avogadro constant NA :
As John Lennard-Jones and Corner showed in 1940 by means of the statistical mechanics the constant k′ is nearly equal to the Boltzmann constant.
Water
For water, the following equation is valid between 0 and 100 °C.
History
As a student, Eötvös started to research surface tension and |
https://en.wikipedia.org/wiki/Mp3DirectCut | mp3DirectCut is a lossless editor for MP3 (and to a degree, MP2 and AAC) audio files, able to provide cuts and crops, copy and paste, gain and fades to audio files without having to decode or re-encode the audio. By modifying the global gain field of each frame of MPEG audio, the volume of that frame can be modified without altering the audio data itself. This allows for rapid, lossless MP3 audio editing that does not degrade the data from re-encoding.
mp3DirectCut provides audio normalization and pause (silence) detection, and can split long recordings into separate files based on cue points in the audio, such as those provided by pause detection. mp3DirectCut can also record audio directly to MP3 from the computer's sound card input.
All audio operations are performed using frame manipulation so, as such, mp3DirectCut is not a waveform editor. Audio clean-up such as click, hiss and noise removal is not possible.
Features
An MP3 file can be edited without transcoding.
Cut, copy, paste, and volume change operations are provided; edits can be previewed, including a command that plays a segment without a selected region (previewing a cut)
Audio normalization and pause detection
MP3 recording with ACM or LAME encoder (not bundled)
Fast MP3 visualization
Supports Layer 2 (DVD/DVB audio)
Includes a tag editor for ID3v1 tags
Cue sheet support with auto cue (track division by time values)
Track splitting with filename and ID3v1.1 tag creation
VU meter, bitrate visualization
Supported on all versions of Microsoft Windows from 95 through 7; certain modes can be invoked from the command line
Unobtrusive: The installation file (as of October 2020) is 303 Kbytes; the installed program occupies a single directory (with one subdirectory for non-English help files, which can be deleted if not needed); the program does not modify the Windows Registry; a user's manual and a page of Frequently Asked Questions is included in the installation
The edited file can be used |
https://en.wikipedia.org/wiki/Complete%20quotient | In the metrical theory of regular continued fractions, the kth complete quotient ζ k is obtained by ignoring the first k partial denominators ai. For example, if a regular continued fraction is given by
then the successive complete quotients ζ k are given by
A recursive relationship
From the definition given above we can immediately deduce that
or, equivalently,
Complete quotients and the convergents of x
Denoting the successive convergents of the regular continued fraction x = [a0; a1, a2, …] by A0, A1/B1, A2/B2, … (as explained more fully in the article fundamental recurrence formulas), it can be shown that
for all k ≥ 0.
This result can be better understood by recalling that the successive convergents of an infinite regular continued fraction approach the value x in a sort of zig-zag pattern:
so that when k is even we have Ak/Bk < x < Ak+1/Bk+1, and when k is odd we have Ak+1/Bk+1 < x < Ak/Bk. In either case, the k + 1st complete quotient ζ k+1 is the unique real number that expresses x in the form of a semiconvergent.
Complete quotients and equivalent real numbers
An equivalence relation defined by LFTs
Consider the set of linear fractional transformations (LFTs) defined by
where a, b, c, and d are integers, and ad − bc = ±1. Since this set of LFTs contains an identity element (0 + x)/1, and since it is closed under composition of functions, and every member of the set has an inverse in the set, these LFTs form a group (the group operation being composition of functions), GL(2,Z).
We can define an equivalence relation on the set of real numbers by means of this group of linear fractional transformations. We will say that two real numbers x and y are equivalent (written x ~ y) if
for some integers a, b, c, and d such that ad − bc = ±1.
Clearly this relation is symmetric, reflexive, and transitive, so it is an equivalence relation and it can be used to separate the real numbers into equivalence classes. All the rational numbers are equivalent, beca |
https://en.wikipedia.org/wiki/Conservation%20Biology%20%28journal%29 | Conservation Biology is a bimonthly peer-reviewed scientific journal of the Society for Conservation Biology, published by Wiley-Blackwell and established in May 1987. It covers the science and practice of conserving Earth's biological diversity, including issues concerning any of the Earth's ecosystems or regions. The editor-in-chief is Mark Burgman.
Scope
The scientific papers in the journal cover a variety of topics, such as population ecology and genetics, climate change, freshwater and marine conservation, ecosystem management, citizen science, and other human dimensions of conservation, but all topics focus primarily on conservation relevance rather than specific ecosystems, species, or situations. Subscription to the journal is only open to members of Society for Conservation Biology.
Journal Metrics
According to the Journal Citation Reports, the journal has a 2019 impact factor of 5.405. It ranks 3rd among 55 in journals that focus on biodiversity and conservation, 12th among 158 in journals with an ecological focus. Conservation Biology also has an h5 index of 59, a cited half-life of >10, and a CiteScore of 5.97. |
https://en.wikipedia.org/wiki/Weitzenb%C3%B6ck%27s%20inequality | In mathematics, Weitzenböck's inequality, named after Roland Weitzenböck, states that for a triangle of side lengths , , , and area , the following inequality holds:
Equality occurs if and only if the triangle is equilateral. Pedoe's inequality is a generalization of Weitzenböck's inequality. The Hadwiger–Finsler inequality is a strengthened version of Weitzenböck's inequality.
Geometric interpretation and proof
Rewriting the inequality above allows for a more concrete geometric interpretation, which in turn provides an immediate proof.
Now the summands on the left side are the areas of equilateral triangles erected over the sides of the original triangle and hence the inequation states that the sum of areas of the equilateral triangles is always greater than or equal to threefold the area of the original triangle.
This can now can be shown by replicating area of the triangle three times within the equilateral triangles. To achieve that the Fermat point is used to partition the triangle into three obtuse subtriangles with a angle and each of those subtriangles is replicated three times within the equilateral triangle next to it. This only works if every angle of the triangle is smaller than , since otherwise the Fermat point is not located in the interior of the triangle and becomes a vertex instead. However if one angle is greater or equal to it is possible to replicate the whole triangle three times within the largest equilateral triangle, so the sum of areas of all equilateral triangles stays greater than the threefold area of the triangle anyhow.
Further proofs
The proof of this inequality was set as a question in the International Mathematical Olympiad of 1961. Even so, the result is not too difficult to derive using Heron's formula for the area of a triangle:
First method
It can be shown that the area of the inner Napoleon's triangle, which must be nonnegative, is
so the expression in parentheses must be greater than or equal to 0.
Secon |
https://en.wikipedia.org/wiki/List%20of%20plants%20with%20symbolism | Various folk cultures and traditions assign symbolic meanings to plants. Although these are no longer commonly understood by populations that are increasingly divorced from their rural traditions, some meanings survive. In addition, these meanings are alluded to in older pictures, songs and writings. New symbols have also arisen: one of the most known in the United Kingdom is the red poppy as a symbol of remembrance of the fallen in war.
List
Plants
Flowers
See also |
https://en.wikipedia.org/wiki/Mathematical%20maturity | In mathematics, mathematical maturity is an informal term often used to refer to the quality of having a general understanding and mastery of the way mathematicians operate and communicate. It pertains to a mixture of mathematical experience and insight that cannot be directly taught. Instead, it comes from repeated exposure to mathematical concepts. It is a gauge of mathematics students' erudition in mathematical structures and methods, and can overlap with other related concepts such as mathematical intuition and mathematical competence. The topic is occasionally also addressed in literature in its own right.
Definitions
Mathematical maturity has been defined in several different ways by various authors, and is often tied to other related concepts such as comfort and competence with mathematics, mathematical intuition and mathematical beliefs.
One definition has been given as follows:
A broader list of characteristics of mathematical maturity has been given as follows:
Finally, mathematical maturity has also been defined as an ability to do the following:
It is sometimes said that the development of mathematical maturity requires a deep reflection on the subject matter for a prolonged period of time, along with a guiding spirit which encourages exploration.
Progression
Mathematician Terence Tao has proposed a three-stage model of mathematics education that can be interpreted as a general framework of mathematical maturity progression. The stages are summarized in the following table:
See also
Logical intuition
Four stages of competence |
https://en.wikipedia.org/wiki/Enterocoely | Enterocoelom (adjective forms: enterocoelic and enterocoelous) describes both the process by which some animal embryos develop and the origin of the cells involved. In enterocoely, a mesoderm (middle layer) is formed in a developing embryo, in which the coelom appears from pouches growing and separating from the digestive tract (also known as the embryonic gut, or archenteron). As the incipient coelomic epithelium originates from archenteral diverticula, the endoderm therefore gives rise to the mesodermal cells.
Etymology
The term enterocoely derives from the Ancient Greek words (), meaning 'intestine', and (), meaning 'cavity'. This refers to the fact that fluid-filled body cavities are formed from pockets related to the embryonic gut.
Taxonomic distribution
Enterocoely is the stage of embryological development of deuterostomes in which the coelom forms. This type of coelom formation occurs in deuterostome animals, which for this reason are also known as enterocoelomates.
By contrast, in protostomes, the body cavity is often formed by schizocoely.
Embryonic development
Enterocoelous development begins once the embryo reaches the gastrula phase of development. At this point, there are two layers of cells: the ectoderm (outermost) and the endoderm (innermost) layers. The mesoderm begins to form as two "pockets" of tissue (one above the endoderm, and one below) are formed via folding of the endoderm. These "pockets" begin to grow larger, and as they do so, they extend towards each other. When the two "pockets" of cells meet, the mesoderm is formed – a complete layer of tissue right in between the endoderm and ectoderm layers. This then leads to the formation of a coelom.
The stage of coelom formation starts with the gastrula; as the archenteron forms, pockets of migrating cells also form, creating another layer between the endoderm and ectoderm, the mesoderm. These pockets gradually expand to form the coelom.
See also
Deuterostome
Development of the dige |
https://en.wikipedia.org/wiki/Dm-crypt | dm-crypt is a transparent block device encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD. It is part of the device mapper (dm) infrastructure, and uses cryptographic routines from the kernel's Crypto API. Unlike its predecessor cryptoloop, dm-crypt was designed to support advanced modes of operation, such as XTS, LRW and ESSIV (see disk encryption theory for further information), in order to avoid watermarking attacks. In addition to that, dm-crypt addresses some reliability problems of cryptoloop.
dm-crypt is implemented as a device mapper target and may be stacked on top of other device mapper transformations. It can thus encrypt whole disks (including removable media), partitions, software RAID volumes, logical volumes, as well as files. It appears as a block device, which can be used to back file systems, swap or as an LVM physical volume.
Some Linux distributions support the use of dm-crypt on the root file system. These distributions use initrd to prompt the user to enter a passphrase at the console, or insert a smart card prior to the normal boot process.
Frontends
The dm-crypt device mapper target resides entirely in kernel space, and is only concerned with encryption of the block device it does not interpret any data itself. It relies on user space front-ends to create and activate encrypted volumes, and manage authentication. At least two frontends are currently available: cryptsetup and cryptmount.
cryptsetup
The cryptsetup command-line interface, by default, does not write any headers to the encrypted volume, and hence only provides the bare essentials: encryption settings have to be provided every time the disk is mounted (although usually employed with automated scripts), and only one key can be used per volume; the symmetric encryption key is directly derived from the supplied passphrase.
Because it lacks a "salt", using cryptsetup is less secure in this mode than is the case with Linux Unified Key Setup (LUKS). H |
https://en.wikipedia.org/wiki/Irregularity%20of%20distributions | The irregularity of distributions problem, stated first by Hugo Steinhaus, is a numerical problem with a surprising result. The problem is to find N numbers, , all between 0 and 1, for which the following conditions hold:
The first two numbers must be in different halves (one less than 1/2, one greater than 1/2).
The first 3 numbers must be in different thirds (one less than 1/3, one between 1/3 and 2/3, one greater than 2/3).
The first 4 numbers must be in different fourths.
The first 5 numbers must be in different fifths.
etc.
Mathematically, we are looking for a sequence of real numbers
such that for every n ∈ {1, ..., N} and every k ∈ {1, ..., n} there is some i ∈ {1, ..., k} such that
Solution
The surprising result is that there is a solution up to N = 17, but starting at N = 18 and above it is impossible. A possible solution for N ≤ 17 is shown diagrammatically on the right; numerically it is as follows:
In this example, considering for instance the first 5 numbers, we have
Mieczysław Warmus concluded that 768 (1536, counting symmetric solutions separately) distinct sets of intervals satisfy the conditions for N = 17. |
https://en.wikipedia.org/wiki/Branch%20collar | A branch collar is the "shoulder" between the branch and trunk of woody plants; the inflammation formed at the base of the branch is caused by annually overlapping trunk tissue. The shape of the branch collar is due to two separate growth patterns, initially the branch grows basipetally, followed by seasonal trunk growth which envelops the branch.
Branch collars serve as a strong foundation to the branch, and its orientation and internal characteristics allow the branch to withstand stress from numerous directions. Functionally the branch collars also influence the conductivity of nutrients and growth patterns.
The branch collar which provides a protective barrier to prevent infection and decay, can also be useful in diagnosing bacterial diseases.
Proper pruning techniques should accommodate for the branch collar structure, as by damaging the tree it is likely to decay or become diseased.
Definition
In arboriculture, the "shoulder" junction structure between the branch and the trunk is known as the branch collar. This structure can be identified as a raised ring of tissue around the base of the branch The branch collar and trunk collar are collectively called the branch collar.
Morphology
Growth stages
Tree branches are attached to the trunk with a series of trunk collars that annually envelope the branch collar. The branch tissues develop a basal collar first in spring, then trunk tissue envelops the collar later during seasons of growth. This rhythm of growth results in a tissue arrangement that wraps around the branch, creating the branch collar. This processes where the branch tissue develops basipetally and the trunk tissue develops perpendicular to the branch, results in the cambium cells of the upper segments of the branch collar to develop in a right-angle formation.
The expanding cambium of the trunk, over time, slowly overtakes the newly forming branch tissue, which causes the branch collar to swallow up more of the branch as the tree grows. T |
https://en.wikipedia.org/wiki/Fagnano%27s%20problem | In geometry, Fagnano's problem is an optimization problem that was first stated by Giovanni Fagnano in 1775:
The solution is the orthic triangle, with vertices at the base points of the altitudes of the given triangle.
Solution
The orthic triangle, with vertices at the base points of the altitudes of the given triangle, has the smallest perimeter of all triangles inscribed into an acute triangle, hence it is the solution of Fagnano's problem. Fagnano's original proof used calculus methods and an intermediate result given by his father Giulio Carlo de' Toschi di Fagnano. Later however several geometric proofs were discovered as well, amongst others by Hermann Schwarz and Lipót Fejér. These proofs use the geometrical properties of reflections to determine some minimal path representing the perimeter.
Physical principles
A solution from physics is found by imagining putting a rubber band that follows Hooke's Law around the three sides of a triangular frame , such that it could slide around smoothly. Then the rubber band would end up in a position that minimizes its elastic energy, and therefore minimize its total length. This position gives the minimal perimeter triangle.
The tension inside the rubber band is the same everywhere in the rubber band, so in its resting position, we have, by Lami's theorem,
Therefore, this minimal triangle is the orthic triangle.
See also
Set TSP problem, a more general task of visiting each of a family of sets by the shortest tour |
https://en.wikipedia.org/wiki/Taraxacum%20officinale | Taraxacum officinale, the dandelion or common dandelion, is a herbaceous perennial flowering plant in the daisy family Asteraceae (syn. Compositae). The common dandelion is well known for its yellow flower heads that turn into round balls of many silver-tufted fruits that disperse in the wind. These balls are called "clocks" in both British and American English. The name "blowball" is also used.
The common dandelion grows in temperate regions of the world in areas with moist soils. They are very hardy plants, able to grow in a variety of environments, and are tolerant of crowding, extremes of temperature, and low moisture. As a result of this hardiness, in addition to its ability to rapidly propagate itself, the dandelion has become established over a wide range via human activity, originally being native to Eurasia, but can also be found across the Americas, southern Africa, India, Australia and New Zealand as a result of incidental or deliberate introductions.
It is most often considered a weed, especially in lawns and along roadsides, but the leaves, flowers, and roots are sometimes used in herbal medicine and as food.
Description
Taraxacum officinale grows from (generally unbranched) taproots and produces several hollow, leafless flower stems that are typically tall, but sometimes up to tall. The stems can be tinted purplish, they are upright or lax, and produce flower heads that are held as tall or taller than the foliage. The foliage may be upright-growing or horizontally spreading; the leaves have petioles that are either unwinged or narrowly winged. The stems can be glabrous or sparsely covered with short hairs. Plants have milky latex and the leaves are all basal; each flowering stem lacks bracts and has one single flower head. The yellow flower heads lack receptacle bracts and all the flowers, which are called florets, are ligulate and bisexual. In many lineages, fruits are mostly produced by apomixis, notwithstanding the flowers are visited by many |
https://en.wikipedia.org/wiki/Capers%20Jones |
Capers Jones is an American specialist in software engineering methodologies, and is often associated with the function point model of cost estimation.
He was born in St Petersburg, Florida, United States and graduated from the University of Florida, having majored in English. He later became the President and CEO of Capers Jones & Associates and latterly Chief Scientist Emeritus of Software Productivity Research (SPR).
In 2011, he co-founded Namcook Analytics LLC, where he is Vice President and Chief Technology Officer (CTO).
He formed his own business in 1984, Software Productivity Research, after holding positions at IBM and ITT. After retiring from Software Productivity Research in 2000, he remains active as an independent management consultant.
He is a Distinguished Advisor to the Consortium for IT Software Quality (CISQ). |
https://en.wikipedia.org/wiki/Negative%20base | A negative base (or negative radix) may be used to construct a non-standard positional numeral system. Like other place-value systems, each position holds multiples of the appropriate power of the system's base; but that base is negative—that is to say, the base is equal to for some natural number ().
Negative-base systems can accommodate all the same numbers as standard place-value systems, but both positive and negative numbers are represented without the use of a minus sign (or, in computer representation, a sign bit); this advantage is countered by an increased complexity of arithmetic operations. The need to store the information normally contained by a negative sign often results in a negative-base number being one digit longer than its positive-base equivalent.
The common names for negative-base positional numeral systems are formed by prefixing nega- to the name of the corresponding positive-base system; for example, negadecimal (base −10) corresponds to decimal (base 10), negabinary (base −2) to binary (base 2), negaternary (base −3) to ternary (base 3), and negaquaternary (base −4) to quaternary (base 4).
Example
Consider what is meant by the representation in the negadecimal system, whose base is −10:
The representation (which is intended to be negadecimal notation) is equivalent to in decimal notation, because 10,000 + (−2,000) + 200 + (−40) + 3 = .
Remark
On the other hand, in decimal would be written in negadecimal.
History
Negative numerical bases were first considered by Vittorio Grünwald in an 1885 monograph published in Giornale di Matematiche di Battaglini. Grünwald gave algorithms for performing addition, subtraction, multiplication, division, root extraction, divisibility tests, and radix conversion. Negative bases were later mentioned in passing by A. J. Kempner in 1936 and studied in more detail by Zdzisław Pawlak and A. Wakulicz in 1957.
Negabinary was implemented in the early Polish computer BINEG (and UMC), built 1957–59, ba |
https://en.wikipedia.org/wiki/Ovomucin | Ovomucin is a glycoprotein found mainly in egg whites, as well as in the chalaza and vitelline membrane. The protein makes up around 2-4% of the protein content of egg whites; like other members of the mucin protein family, ovomucin confers gel-like properties. It is composed of two subunits, alpha-ovomucin (MUC5B) and beta-ovomucin (MUC6), of which the beta subunit is much more heavily glycosylated.
External links |
https://en.wikipedia.org/wiki/Quantum%20cellular%20automaton | A quantum cellular automaton (QCA) is an abstract model of quantum computation, devised in analogy to conventional models of cellular automata introduced by John von Neumann. The same name may also refer to quantum dot cellular automata, which are a proposed physical implementation of "classical" cellular automata by exploiting quantum mechanical phenomena. QCA have attracted a lot of attention as a result of its extremely small feature size (at the molecular or even atomic scale) and its ultra-low power consumption, making it one candidate for replacing CMOS technology.
Usage of the term
In the context of models of computation or of physical systems, quantum cellular automaton refers to the merger of elements of both (1) the study of cellular automata in conventional computer science and (2) the study of quantum information processing. In particular, the following are features of models of quantum cellular automata:
The computation is considered to come about by parallel operation of multiple computing devices, or cells. The cells are usually taken to be identical, finite-dimensional quantum systems (e.g. each cell is a qubit).
Each cell has a neighborhood of other cells. Altogether these form a network of cells, which is usually taken to be regular (e.g. the cells are arranged as a lattice with or without periodic boundary conditions).
The evolution of all of the cells has a number of physics-like symmetries. Locality is one: the next state of a cell depends only on its current state and that of its neighbours. Homogeneity is another: the evolution acts the same everywhere, and is independent of time.
The state space of the cells, and the operations performed on them, should be motivated by principles of quantum mechanics.
Another feature that is often considered important for a model of quantum cellular automata is that it should be universal for quantum computation (i.e. that it can efficiently simulate quantum Turing machines, some arbitrary quantum circu |
https://en.wikipedia.org/wiki/Xircom | Xircom, Inc., was an American computer networking hardware and mobile technology company. Headquartered in Thousand Oaks, California, Xircom was one of the first companies to develop network computing products for notebook computers. Products included computer memory cards, LAN adapters, modems, and remote access server products. The company's products enabled notebook users to share information over a network connection.
During its existence, the company possessed manufacturing facilities in Penang, Malaysia, and international offices throughout Europe and the Asia Pacific. In 2001, Intel acquired Xircom and in early 2003 laid off most of Xircom's Thousand Oaks employees.
History
The company was founded in 1988 by Dirk Gates and Kirk Mathews on the premise of delivering modem and Ethernet connectivity to mobile computers. The company grew to over 2,000 employees and achieved revenues of $500M and a market cap in excess of $2B. Mobility solutions were based on IEEE 802.11, GPRS, and Bluetooth technologies.
Xircom was known as an innovative leader in networking technology, pioneering the world's first wireless networking devices for portable computers, known as Netwave. Xircom's NetWave adapters boasted a raw data rate of 1M bit/sec (blazing fast at the time) and fostered the creation and development of today's WiFi infrastructure and devices, which are virtually everywhere today.
Xircom was also equally innovative in its working environment. Employees were encouraged to express their creative natures, fostering a positive and creative environment where new ideas and efficiency flowed as easily as the waterfall in their indoor fish pond, which was originally constructed in front of the Engineering Vice President's cubicle as a joke.
Products
Pocket LAN Adapter
In 1988, the only universal connection available on notebook PCs was the printer port, so Xircom devised the Pocket LAN Adapter that attached to the printer port and connected the notebook PC to a ne |
https://en.wikipedia.org/wiki/Natural%20prolongation%20principle | The natural prolongation principle or principle of natural prolongation is a legal concept introduced in maritime claims submitted to the United Nations.
The phrase denotes a concept of political geography and international law that a nation's maritime boundary should reflect the 'natural prolongation' of where its land territory reaches the coast.
Oceanographic descriptions of the land mass under coastal waters became conflated and confused with criteria that are deemed relevant in border delimitation. The concept was developed in the process of settling disputes if the borders of adjacent nations were located on a contiguous continental shelf.
An unresolved issue is whether a natural prolongation defined scientifically, without reference to equitable principles, is to be construed as a "natural prolongation" for the purpose of maritime border delimitation or maritime boundary disputes.
History
The phrase natural prolongation was established as a concept in the North Sea Continental Cases in 1969.
The relevance and importance of natural prolongation as a factor in delimitation disputes and agreements has declined during the period in which international acceptance of UNCLOS III has expanded.
The Malta/Libya Case in 1985 is marked as the eventual demise of the natural prolongation principle being used in delimiting between adjoining national maritime boundaries.
The Bay of Bengal cases in the early 2010s (Bangladesh v Myanmar) and (Bangladesh v India) likewise dealt a blow to natural prolongation as the guiding principle for delimitation of the continental shelf more than 200 nautical miles beyond baselines.
See also
Equidistance principle |
https://en.wikipedia.org/wiki/Convex%20metric%20space | In mathematics, convex metric spaces are, intuitively, metric spaces with the property any "segment" joining two points in that space has other points in it besides the endpoints.
Formally, consider a metric space (X, d) and let x and y be two points in X. A point z in X is said to be between x and y if all three points are distinct, and
that is, the triangle inequality becomes an equality. A convex metric space is a metric space (X, d) such that, for any two distinct points x and y in X, there exists a third point z in X lying between x and y.
Metric convexity:
does not imply convexity in the usual sense for subsets of Euclidean space (see the example of the rational numbers)
nor does it imply path-connectedness (see the example of the rational numbers)
nor does it imply geodesic convexity for Riemannian manifolds (consider, for example, the Euclidean plane with a closed disc removed).
Examples
Euclidean spaces, that is, the usual three-dimensional space and its analogues for other dimensions, are convex metric spaces. Given any two distinct points and in such a space, the set of all points satisfying the above "triangle equality" forms the line segment between and which always has other points except and in fact, it has a continuum of points.
Any convex set in a Euclidean space is a convex metric space with the induced Euclidean norm. For closed sets the converse is also true: if a closed subset of a Euclidean space together with the induced distance is a convex metric space, then it is a convex set (this is a particular case of a more general statement to be discussed below).
A circle is a convex metric space, if the distance between two points is defined as the length of the shortest arc on the circle connecting them.
Metric segments
Let be a metric space (which is not necessarily convex). A subset of is called a metric segment between two distinct points and in if there exists a closed interval on the real line and an isometry |
https://en.wikipedia.org/wiki/Mascot%20%28software%29 | Mascot is a software search engine that uses mass spectrometry data to identify proteins from peptide sequence databases. Mascot is widely used by research facilities around the world. Mascot uses a probabilistic scoring algorithm for protein identification that was adapted from the MOWSE algorithm. Mascot is freely available to use on the website of Matrix Science. A license is required for in-house use where more features can be incorporated.
History means
MOWSE was one of the first algorithms developed for protein identification using peptide mass fingerprinting. It was originally developed in 1993 as a collaboration between Darryl Pappin of the Imperial Cancer Research Fund (ICRF) and Alan Bleasby of the Science and Engineering Research Council (SERC). MOWSE stood apart from other protein identification algorithms in that it produced a probability-based score for identification. It was also the first to take into account the non-uniform distribution of peptide sizes, caused by the enzymatic digestion of a protein that is needed for mass spectrometry analysis. However, MOWSE was only applicable to peptide mass fingerprint searches and was dependent on pre-compiled databases which were inflexible with regard to post-translational modifications and enzymes other than trypsin. To overcome these limitations, to take advantage of multi-processor systems and to add non-enzymatic search functionality, development was begun again from scratch by David Perkins at the Imperial Cancer Research Fund. The first versions were developed for Silicon Graphics Irix and Digital Unix systems. Eventually this software was named Mascot and to reach a wider audience, an external bioinformatics company named Matrix Science was created by David Creasy and John Cottrell to develop and distribute Mascot. Legacy software versions exist for Tru64, Irix, AIX, Solaris, Microsoft Windows NT4 and Microsoft Windows 2000. Mascot has been available as a free service on the Matrix Science website |
https://en.wikipedia.org/wiki/Lek%20paradox | The lek paradox is the conundrum of how additive or beneficial genetic variation is maintained in lek mating species in the face of consistent sexual selection based on female preferences. While many studies have attempted to explain how the lek paradox fits into Darwinian theory, the paradox remains. Persistent female choice for particular male trait values should erode genetic diversity in male traits and thereby remove the benefits of choice, yet choice persists. This paradox can be somewhat alleviated by the occurrence of mutations introducing potential differences, as well as the possibility that traits of interest have more or less favorable recessive alleles.
The basis of the lek paradox is continuous genetic variation in spite of strong female preference for certain traits. There are two conditions in which the lek paradox arises. The first is that males contribute only genes and the second is that female preference does not affect fecundity. Female choice should lead to directional runaway selection, resulting in a greater prevalence for the selected traits. Stronger selection should lead to impaired survival, as it decreases genetic variance and ensures that more offspring have similar traits. However, lekking species do not exhibit runaway selection.
In a lekking reproductive system, what male sexual characteristics can signal to females is limited, as the males provide no resources to females or parental care to their offspring. This implies that a female gains indirect benefits from her choice in the form of "good genes" for her offspring. Hypothetically, in choosing a male that excels at courtship displays, females gain genes for their offspring that increase their survival or reproductive fitness.
Amotz Zahavi declared that male sexual characteristics only convey useful information to the females if these traits confer a handicap on the male. Otherwise, males could simply cheat: if the courtship displays have a neutral effect on survival, males |
https://en.wikipedia.org/wiki/Television%20standards%20conversion | Television standards conversion is the process of changing a television transmission or recording from one video system to another.
Converting video between different numbers of lines, frame rates, and color models in video pictures is a complex technical problem. However, the international exchange of television programming makes standards conversion necessary so that video may be viewed in another nation with a differing standard. Typically video is fed into video standards converter which produces a copy according to a different video standard. One of the most common conversions is between the NTSC and PAL standards.
History
The first known case of television systems conversion was in Europe a few years after World War II, mainly with the RTF (France) and the BBC (UK) trying to exchange their black and white 441 line and 405 line programming.
The problem got worse with the introduction of color standards PAL, SECAM (both 625 lines), and the French black and white 819 line service.
Until the 1980s, standards conversion was so difficult that 24 frame/s 16 mm or 35mm film was the preferred medium of programming interchange.
Overview
Perhaps the most technically challenging conversion to make is the PAL and SÉCAM to NTSC conversion.
PAL and SÉCAM use 625 lines at 50 fields/s or 25 frames/s
NTSC uses 525 lines at fields/s (60000/1001) or 30 frames/s
The NTSC standard is temporally and spatially incompatible with both PAL and SÉCAM. Aside from the line count being different, converting to a format that requires 60 fields every second from a format that has only 50 fields poses difficulty. Every second, an additional 10 fields must be generated—the converter has to create new frames (from the existing input) in real time.
Conversion between PAL and SÉCAM does not require similar timing changes, but still requires color encoding and sound conversion.
Hidden signals: not always transferred
TV contains many hidden signals. One signal type that is not transferre |
https://en.wikipedia.org/wiki/Label%20Information%20Base | Label Information Base (LIB) is the software table maintained by IP/MPLS capable routers to store the details of port and the corresponding MPLS router label to be popped/pushed on incoming/outgoing MPLS packets.
Entries are populated from label-distribution protocols.
LIB functions in the control plane of router's MPLS layer. It is used by the label distribution protocol for mapping the next hop labels.
MPLS networking |
https://en.wikipedia.org/wiki/Residue%20field | In mathematics, the residue field is a basic construction in commutative algebra. If R is a commutative ring and m is a maximal ideal, then the residue field is the quotient ring k = R/m, which is a field. Frequently, R is a local ring and m is then its unique maximal ideal.
This construction is applied in algebraic geometry, where to every point x of a scheme X one associates its residue field k(x). One can say a little loosely that the residue field of a point of an abstract algebraic variety is the 'natural domain' for the coordinates of the point.
Definition
Suppose that R is a commutative local ring, with maximal ideal m. Then the residue field is the quotient ring R/m.
Now suppose that X is a scheme and x is a point of X. By the definition of scheme, we may find an affine neighbourhood U = Spec(A), with A some commutative ring. Considered in the neighbourhood U, the point x corresponds to a prime ideal p ⊆ A (see Zariski topology). The local ring of X in x is by definition the localization R = Ap, with the maximal ideal m = p·Ap. Applying the construction above, we obtain the residue field of the point x :
k(x) := Ap / p·Ap.
One can prove that this definition does not depend on the choice of the affine neighbourhood U.
A point is called K-rational for a certain field K, if k(x) = K.
Example
Consider the affine line A1(k) = Spec(k[t]) over a field k. If k is algebraically closed, there are exactly two types of prime ideals, namely
(t − a), a ∈ k
(0), the zero-ideal.
The residue fields are
, the function field over k in one variable.
If k is not algebraically closed, then more types arise, for example if k = R, then the prime ideal (x2 + 1) has residue field isomorphic to C.
Properties
For a scheme locally of finite type over a field k, a point x is closed if and only if k(x) is a finite extension of the base field k. This is a geometric formulation of Hilbert's Nullstellensatz. In the above example, the points of the first kind are closed, havin |
https://en.wikipedia.org/wiki/William%20Kaye%20Estes | William Kaye Estes (June 17, 1919 – August 17, 2011) was an American psychologist. A Review of General Psychology survey, published in 2002, ranked Estes as the 77th most cited psychologist of the 20th century. In order to develop a statistical explanation for the learning phenomena, William Kaye Estes developed the Stimulus Sampling Theory in 1950 which suggested that a stimulus-response association is learned on a single trial; however, the learning process is continuous and consists of the accumulation of distinct stimulus-response pairings.
Background and education
As an undergraduate, Estes was a student of Richard M. Elliott at the University of Minnesota. As a graduate student he stayed at the University of Minnesota, and worked under B. F. Skinner, with whom he developed the conditioned suppression paradigm (Estes & Skinner, 1941).
After receiving his doctorate, Estes joined Skinner on the faculty of Indiana University. After Estes got out of the U. S. Army at the end of World War II, he established his reputation as one of the originators of mathematical learning theory. Estes went from Indiana University to Stanford University, to Rockefeller University in New York, and finally to Harvard University. While teaching at Harvard University, Estes contributed as an instituting first editor of the Psychological Science for the Association for Psychological Science. He was also editor of Psychological Review from 1977 to 1982
After retiring from Harvard, Estes returned to Bloomington, Indiana, where he remained active in academics to become professor emeritus at his original academic home department.
One of Estes' most famous contributions to learning theory was stimulus-sampling theory, which conceives of learning as establishing associations to hypothetical stimulus elements that are randomly drawn from a pool of elements that characterize a particular learning situation. This theory predicted probability matching, which has been found in a wide range o |
https://en.wikipedia.org/wiki/E%E2%80%93Z%20notation | E–Z configuration, or the E–Z convention, is the IUPAC preferred method of describing the absolute stereochemistry of double bonds in organic chemistry. It is an extension of cis–trans isomer notation (which only describes relative stereochemistry) that can be used to describe double bonds having two, three or four substituents.
Following the Cahn–Ingold–Prelog priority rules (CIP rules), each substituent on a double bond is assigned a priority, then positions of the higher of the two substituents on each carbon are compared to each other. If the two groups of higher priority are on opposite sides of the double bond (trans to each other), the bond is assigned the configuration E (from entgegen, , the German word for "opposite"). If the two groups of higher priority are on the same side of the double bond (cis to each other), the bond is assigned the configuration Z (from zusammen, , the German word for "together").
The letters E and Z are conventionally printed in italic type, within parentheses, and separated from the rest of the name with a hyphen. They are always printed as full capitals (not in lowercase or small capitals), but do not constitute the first letter of the name for English capitalization rules (as in the example above).
Another example: The CIP rules assign a higher priority to bromine than to chlorine, and a higher priority to chlorine than to hydrogen, hence the following (possibly counterintuitive) nomenclature.
For organic molecules with multiple double bonds, it is sometimes necessary to indicate the alkene location for each E or Z symbol. For example, the chemical name of alitretinoin is (2E,4E,6Z,8E)-3,7-dimethyl-9-(2,6,6-trimethyl-1-cyclohexenyl)nona-2,4,6,8-tetraenoic acid, indicating that the alkenes starting at positions 2, 4, and 8 are E while the one starting at position 6 is Z.
See also
Descriptor (chemistry)
Geometric isomerism
Molecular geometry |
https://en.wikipedia.org/wiki/Email%20forwarding | Email forwarding generically refers to the operation of re-sending a previously delivered email to an email address to one or more different email addresses.
The term forwarding, used for mail since long before electronic communications, has no specific technical meaning, but it implies that the email has been moved "forward" to a new destination.
Email forwarding can also redirect mail going to a certain address and send it to one or more other addresses. Vice versa, email items going to several different addresses can converge via forwarding to end up in a single address in-box.
Email users and administrators of email systems use the same term when speaking of both server-based and client-based forwarding.
Server-based forwarding
The domain name (the part appearing to the right of @ in an email address) defines the target server(s)
for the corresponding class of addresses. A domain may also define backup servers; they have no mailboxes and forward messages without changing any part of their envelopes. By contrast, primary servers can deliver a message to a user's mailbox and/or forward it by changing some envelope addresses. ~/.forward files (see below) provide a typical example of server-based forwarding to different recipients.
Email administrators sometimes use the term redirection as a synonym for server-based email-forwarding to different recipients. Protocol engineers sometimes use the term Mediator to refer to a forwarding server.
Because of spam, it is becoming increasingly difficult to reliably forward mail across different domains, and some recommend avoiding it if at all possible.
Uses of server-based forwarding to different recipients
Role-addresses info, sales, postmaster, and similar names can appear to the left of @ in email addresses. An organization may forward messages intended for a given role to the address of the person(s) currently functioning in that role or office.
Pseudonym-addresses Most domain name hosting facilities provide |
https://en.wikipedia.org/wiki/Herbimycin | Herbimycin is a benzoquinone ansamycin antibiotic that binds to Hsp90 (Heat Shock Protein 90) and alters its function. Hsp90 client proteins play important roles in the regulation of the cell cycle, cell growth, cell survival, apoptosis, angiogenesis and oncogenesis.
It was originally found by its herbicidal activity, and thus named. The most recent herbimycins to be discovered, herbimycins D-F, were isolated from a Streptomyces isolated from thermal vents associated with the Ruth Mullins coal fire in Appalachian Kentucky.
Synonyms
Antibiotic Tan 420F
Herbimycin A
Biological activity
Herbimycin induces the degradation of proteins that are need to be mutated in tumor cells such as v-Src, Bcr-Abl and p53 preferentially over their normal cellular counterparts. This effect is mediated via Hsp90.
See also
Geldanamycin
Satoshi Ōmura |
https://en.wikipedia.org/wiki/Frequency%20synthesizer | A frequency synthesizer is an electronic circuit that generates a range of frequencies from a single reference frequency. Frequency synthesizers are used in many modern devices such as radio receivers, televisions, mobile telephones, radiotelephones, walkie-talkies, CB radios, cable television converter boxes, satellite receivers, and GPS systems. A frequency synthesizer may use the techniques of frequency multiplication, frequency division, direct digital synthesis, frequency mixing, and phase-locked loops to generate its frequencies. The stability and accuracy of the frequency synthesizer's output are related to the stability and accuracy of its reference frequency input. Consequently, synthesizers use stable and accurate reference frequencies, such as those provided by a crystal oscillator.
Types
Three types of synthesizer can be distinguished. The first and second type are routinely found as stand-alone architecture: direct analog synthesis (also called a mix-filter-divide architecture as found in the 1960s HP 5100A) and the more modern direct digital synthesizer (DDS) (table-look-up). The third type are routinely used as communication system IC building-blocks: indirect digital (PLL) synthesizers including integer-N and fractional-N. The recently emerged TAF-DPS is also a direct approach. It directly constructs the waveform of each pulse in the clock pulse train.
Digiphase synthesizer
It is in some ways similar to a DDS, but it has architectural differences. One of its big advantages is to allow a much finer resolution than other types of synthesizers with a given reference frequency.
Time-Average-Frequency Direct Period Synthesis (TAF-DPS)
Recently, a technique named Time-Average-Frequency Direct Period Synthesis (TAF-DPS) emerges as a new member to the frequency synthesizer family. It focuses on frequency generation for clock signal driving integrated circuit. Different from all other techniques, it uses a novel concept of Time-Average-Frequency. Its aim |
https://en.wikipedia.org/wiki/Multiprocessor%20system%20on%20a%20chip | A multiprocessor system on a chip (, or ) is a system on a chip (SoC) which includes multiple microprocessors. As such, it is a multi-core system on a chip.
MPSoCs are usually targeted for embedded applications. It is used by platforms that contain multiple, usually heterogeneous, processing elements with specific functionalities reflecting the need of the expected application domain, a memory hierarchy and I/O components. All these components are linked to each other by an on-chip interconnect, such as buses and Networks on chip (NoCs). These architectures meet the performance needs of multimedia applications, telecommunication architectures, network security and other application domains while limiting the power consumption through the use of specialised processing elements and architecture.
Structure
A multiprocessor system on a chip must by definition have multiple processor cores. MPSoCs often contain multiple logically distinct processor modules as well. Additionally, MPSoCs typically contain:
Memory blocks, often using scratchpad RAM and direct memory access
timing sources to generate clock signals to control execution of SoC functions
crystal oscillators and phase-locked loops are popular clock generators.
peripherals including counters and power-on reset generators
external interfaces, typically for communication protocols
These are often based upon industry standards such as USB, FireWire, Ethernet, USART, SPI, HDMI, I²C, etc.
each interface is typically to one given core or logical unit on the MPSoC
a network on a chip (NoC) to communicate and share data between the processors and functional units of the MPSoC
Applications
MPSoCs are used when microcontrollers or systems-on-chip must have multiprocessing capabilities. This can include smartphone devices, embedded systems, digital signal processors and other various applications.
Examples
This section is a short list of multiprocessor systems-on-chip.
Cell processor
Adapteva's Epiph |
https://en.wikipedia.org/wiki/HTC%20Shift | HTC Shift (code name: Clio) is an Ultra-Mobile PC by HTC.
Features
Dual Operating System
Microsoft Windows Vista Business 32-Bit (notebook mode)
SnapVUE (PDA mode)
Processor
Intel A110 Stealey CPU 800 MHz (for Windows Vista)
ARM11 CPU (for SnapVUE)
Memory and Storage
1 GB RAM (notebook mode)
64 MB RAM (PDA mode)
40/60 GB HDD
SD card slot
Intel GMA 950 graphics
Communications
Quad band GSM / GPRS / EDGE (data only): GSM 850, GSM 900, GSM 1800, GSM 1900
Triband UMTS / HSDPA (data only): UMTS 850, UMTS 1900, UMTS 2100
Wi-Fi 802.11 b/g
Bluetooth v2.0
USB port
7" display
Active TFT touchscreen, 16M colors
800 x 480 pixels (Wide-VGA), 7 inches
QWERTY keyboard
Handwriting recognition
Fingerprint Recognition
Ringtones
MP3
Dual speakers
Upgrading
In November 2011 the team from DistantEarth have succeeded in loading the developer preview of Windows 8 onto the HTC Shift. |
https://en.wikipedia.org/wiki/Narrative%20medicine | Narrative Medicine is the discipline of applying the skills used in analyzing literature to interviewing patients. The premise of narrative medicine is that how a patient speaks about his or her illness or complaint is analogous to how literature offers a plot (an interconnected series of events) with characters (the patient and others) and is filled with metaphors (picturesque, emotional, and symbolic ways of speaking), and that becoming conversant with the elements of literature facilitates understanding the stories that patients bring. Narrative Medicine is a diagnostic and comprehensive approach that utilizes patients' narratives in clinical practice, research, and education to promote healing. Beyond attempts to reach accurate diagnoses, it aims to address the relational and psychological dimensions that occur in tandem with physical illness. Narrative medicine aims not only to validate the experience of the patient, it also encourages creativity and self-reflection in the physician.
History of the Development of Narrative Medicine
In 1910, the Carnegie Foundation for the Advancement of Teaching created the Flexner Report, which set out to redefine medical educational practices. The report argues that the goal of medicine is "an attempt to fight the battle against disease most advantageously to the patient." Flexner wrote that "the practitioner deals with facts of two categories. Chemistry, physics, biology enable him to apprehend one set; he needs a different apperceptive and appreciative apparatus to deal with other more subtle elements. Specific preparation is in this direction much more difficult; one must rely for the requisite insight and sympathy on a varied and enlarging cultural experience." In the late 20th century, narrative medicine came to emphasize an aspect of wider cultural elements in medicine.
From the 1990s, physicians such as Rachel Naomi Remen and Rita Charon, who also holds a doctorate in English literature, argued that medical practi |
https://en.wikipedia.org/wiki/Molecular%20Plant%20Pathology | Molecular Plant Pathology is a monthly open access peer-reviewed scientific journal published by Wiley-Blackwell on behalf of the British Society for Plant Pathology. It was established in January 2000 by Gary D. Foster, University of Bristol, who acted as editor-in-chief from 2000 to 2012. The journal covers research concerning plant pathology, in particular its molecular aspects such as plant-pathogen interactions. The current editor-in-chief is Ralph A. Dean (North Carolina State University). The journal had a 2017 impact factor of 4.188, ranking it 17th out of 223 journals in the category "Plant Sciences". The journal became open access in January 2019.
Chief editors
Gary D. Foster (2000–2012)
Martin B. Dickman (2012–2017)
Ralph A. Dean (since 2017) |
https://en.wikipedia.org/wiki/PEAKS | PEAKS is a proteomics software program for tandem mass spectrometry designed for peptide sequencing, protein identification and quantification.
Description
PEAKS is commonly used for peptide identification (Protein ID) through de novo peptide sequencing assisted search engine database searching. PEAKS has also integrated PTM and mutation characterization through automatic peptide sequence tag based searching (SPIDER) and PTM Identification.
PEAKS provides a complete sequence for each peptide, confidence scores on individual amino acid assignments, simple reporting for high-throughput analysis, amongst other information.
The software has the ability to compare results of multiple search engines. PEAKS inChorus will cross check test results automatically with other protein ID search engines, like Sequest, OMSSA, X!Tandem and Mascot. This approach guards against false positive peptide assignments.
PEAKS Q is an add-on tool for protein quantification, supporting label (ICAT, iTRAQ, SILAC, TMT, 018, etc.) and label free techniques.
SPIDER is a sequence tag based search tool within PEAKS, which deals with the possible overlaps between the de novo sequencing errors and the homology mutations. It reconstructs the real peptide sequence by combining both the de novo sequence tag and the homolog, automatically and efficiently.
A collection of algorithms used within the PEAKS software have been adapted and configured into a specialized project, PEAKS AB, which has proven to be the first method for automatic monoclonal antibody sequencing.
Notes
Mass spectrometry software
Proteomic sequencing |
https://en.wikipedia.org/wiki/Hypersociability | In the context of transmedia storytelling, hypersociability is the encouraged involvement of media consumers in a story through ordinary social interaction. A story may be shared through discourse within a fan group. Hypersociability lessens the need for a publisher to offer fixed media. Instead, storytellers hope that fans will build on the story themselves either over the Internet or through direct conversation. The principle of hypersociability is most widely used in Japanese pop culture, examples of which include Yu-Gi-Oh! and Pokémon, which used multiplayer games separate from the original media. The Wachowskis deliberately incorporated elements of hypersociability for The Animatrix by seeking the help of Japanese animators.
Hypersociability can also occasionally refer to a symptom of Williams syndrome characterized by an unusual willingness to converse with others. |
https://en.wikipedia.org/wiki/Immunoglobulin%20light%20chain | The immunoglobulin light chain is the small polypeptide subunit of an antibody (immunoglobulin).
A typical antibody is composed of two immunoglobulin (Ig) heavy chains and two Ig light chains.
In humans
There are two types of light chain in humans:
kappa (κ) chain, encoded by the immunoglobulin kappa locus (IGK@) on chromosome 2 (locus: 2p11.2)
lambda (λ) chain, encoded by the immunoglobulin lambda locus (IGL@) on chromosome 22 (locus: 22q11.2)
Antibodies are produced by B lymphocytes, each expressing only one class of light chain. Once set, light chain class remains fixed for the life of the B lymphocyte. In a healthy individual, the total kappa-to-lambda ratio is roughly 2:1 in serum (measuring intact whole antibodies) or 1:1.5 if measuring free light chains, with a highly divergent ratio indicative of neoplasm. The free light chain ratio ranges from 0.26 to 1.65. Both the kappa and the lambda chains can increase proportionately, maintaining a normal ratio. This is usually indicative of something other than a blood cell dyscrasia, such as kidney disease.
In other animals
The immunoglobulin light chain genes in tetrapods can be classified into three distinct groups: kappa (κ), lambda (λ), and sigma (σ). The divergence of the κ, λ, and σ isotypes preceded the radiation of tetrapods. The σ isotype was lost after the evolution of the amphibian lineage and before the emergence of the reptilian lineage.
Other types of light chains can be found in lower vertebrates, such as the Ig-Light-Iota chain of Chondrichthyes and Teleostei.
Camelids are unique among mammals as they also have fully functional antibodies which have two heavy chains, but lack the light chains usually paired with each heavy chain.
Sharks also possess, as part of their adaptive immune systems, a functional heavy-chain homodimeric antibody-like molecule referred to as IgNAR (immunoglobulin new antigen receptor). IgNAR is believed to have never had an associated light chain, in contrast with |
https://en.wikipedia.org/wiki/Karamata%27s%20inequality | In mathematics, Karamata's inequality, named after Jovan Karamata, also known as the majorization inequality, is a theorem in elementary algebra for convex and concave real-valued functions, defined on an interval of the real line. It generalizes the discrete form of Jensen's inequality, and generalizes in turn to the concept of Schur-convex functions.
Statement of the inequality
Let be an interval of the real line and let denote a real-valued, convex function defined on . If and are numbers in such that majorizes , then
Here majorization means that and satisfies
and we have the inequalities
and the equality
If is a strictly convex function, then the inequality () holds with equality if and only if we have for all .
Remarks
If the convex function is non-decreasing, then the proof of () below and the discussion of equality in case of strict convexity shows that the equality () can be relaxed to
The inequality () is reversed if is concave, since in this case the function is convex.
Example
The finite form of Jensen's inequality is a special case of this result. Consider the real numbers and let
denote their arithmetic mean. Then majorizes the -tuple , since the arithmetic mean of the largest numbers of is at least as large as the arithmetic mean of all the numbers, for every . By Karamata's inequality () for the convex function ,
Dividing by gives Jensen's inequality. The sign is reversed if is concave.
Proof of the inequality
We may assume that the numbers are in decreasing order as specified in ().
If for all , then the inequality () holds with equality, hence we may assume in the following that for at least one .
If for an , then the inequality () and the majorization properties () and () are not affected if we remove and . Hence we may assume that for all .
It is a property of convex functions that for two numbers in the interval the slope
of the secant line through the points and of the graph of is a monoto |
https://en.wikipedia.org/wiki/Cockade%20of%20Spain | The Cockade of Spain is a national symbol that arose after the French revolution, by pleating a golden pin over the former red ribbon, colors of the ancient Royal Bend of Castile. The resulting insignia is a circle that symbolizes the colors of the Spanish flag: Red and Yellow, being carried as individual representation in case of distinctions or prizes or by other types of events. At the moment it is not used in Spain, except as a roundel for the identification of Spanish Armed Forces aircraft.
Gallery
See also
Roundel of the Spanish Republican Air Force |
https://en.wikipedia.org/wiki/Power%20supply%20rejection%20ratio | In electronic systems, power supply rejection ratio (PSRR), also supply-voltage rejection ratio (kSVR; SVR), is a term widely used to describe the capability of an electronic circuit to suppress any power supply variations to its output signal.
In the specifications of operational amplifiers, the PSRR is defined as the ratio of the change in supply voltage to the equivalent (differential) output voltage it produces, often expressed in decibels. An ideal op-amp would have infinite PSRR, as the device should have no change to the output voltage with any changes to the power supply voltage. The output voltage will depend on the feedback circuit, as is the case of regular input offset voltages. But testing is not confined to DC (zero frequency); often an operational amplifier will also have its PSRR given at various frequencies (in which case the ratio is one of RMS amplitudes of sinewaves present at a power supply compared with the output, with gain taken into account). Unwanted oscillation, including motorboating, can occur when an amplifying stage is too sensitive to signals fed via the power supply from a later power amplifier stage.
Some manufacturers specify PSRR in terms of the offset voltage it causes at the amplifiers inputs; others specify it in terms of the output; there is no industry standard for this issue. The following formula assumes it is specified in terms of input:
where is the voltage gain.
For example: an amplifier with a PSRR of 100 dB in a circuit to give 40 dB closed-loop gain would allow about 1 millivolt of power supply ripple to be superimposed on the output for every 1 volt of ripple in the supply. This is because
.
And since that's 60 dB of rejection, the sign is negative so:
Note:
The PSRR doesn't necessarily have the same poles as A(s), the open-loop gain of the op-amp, but generally tends to also worsen with increasing frequency (e.g. http://focus.ti.com/lit/ds/symlink/opa2277.pdf).
For amplifiers with both positive and neg |
https://en.wikipedia.org/wiki/Zuckerman%20functor | In mathematics, a Zuckerman functor is used to construct representations of real reductive Lie groups from representations of Levi subgroups. They were introduced by Gregg Zuckerman (1978). The Bernstein functor is closely related.
Notation and terminology
G is a connected reductive real affine algebraic group (for simplicity; the theory works for more general groups), and g is the Lie algebra of G. K is a maximal compact subgroup of G.
L is a Levi subgroup of G, the centralizer of a compact connected abelian subgroup, and *l is the Lie algebra of L.
A representation of K is called K-finite if every vector is contained in a finite-dimensional representation of K. Denote by WK the subspace of K-finite vectors of a representation W of K.
A (g,K)-module is a vector space with compatible actions of g and K, on which the action of K is K-finite.
R(g,K) is the Hecke algebra of G of all distributions on G with support in K that are left and right K finite. This is a ring which does not have an identity but has an approximate identity, and the approximately unital R(g,K)- modules are the same as (g,K) modules.
Definition
The Zuckerman functor Γ is defined by
and the Bernstein functor Π is defined by |
https://en.wikipedia.org/wiki/Ocean%20Tracking%20Network | The Ocean Tracking Network (OTN) is a global network research and monitoring effort using implanted acoustic transmitters to study fish migration patterns. It is based at Dalhousie University in Nova Scotia. The technology used by the Ocean Tracking Network comes from the Pacific Ocean Shelf Tracking Project (POST) and the Tagging of Pacific Pelagics (TOPP) project.
Operations
OTN operates a fleet of autonomous vehicles—Teledyne Webb Slocum gliders and Liquid Robotics Wave Gliders. The TWS gliders are electrically powered and collect physical, biological and chemical information. The LRW glides are solar and wave powered. They each gather data on weather and sea surface conditions. Additionally, OTN maintains a rental fleet of Innovasea Vemco acoustic receiver units for use by those in academia, government, non-profits and industry. |
https://en.wikipedia.org/wiki/Project%20Bacchus | Project Bacchus was a covert investigation by the Defense Threat Reduction Agency US Defense Department to determine whether it is possible to construct a bioweapons production facility with off-the-shelf equipment.
History
The project
Project Bacchus operated from 1999-2000 to investigate whether would-be terrorists could build an anthrax production facility and remain undetected. During the two-year simulation, the facility was constructed, and successfully produced an anthrax-like bacterium. The participating scientists were able to make about of highly refined bacterial particles.
Reportage
The secret Project Bacchus was disclosed in a September 2001 article in The New York Times. Reporters Judith Miller, Stephen Engelberg and William J. Broad collaborated on the article. Shortly after it appeared, they published a book containing further details. The book, Germs: Biological Weapons and America's Secret War, and the article are the only publicly available sources concerning Project Bacchus and its sister projects, Clear Vision and Jefferson. |
https://en.wikipedia.org/wiki/Nature%20deficit%20disorder | Nature-deficit disorder is the idea that human beings, especially children, are spending less time outdoors than they have in the past, and the belief that this change results in a wide range of behavioral problems.
This disorder is not recognized in any of the medical manuals for mental disorders, such as the ICD-10 or the DSM-5.
This term was coined by Richard Louv in 2005. Louv does not intend the term "disorder" to represent an actual illness but instead intends the term to act as a metaphor describing the costs of alienation from nature. Louv claims that causes for nature-deficit disorder include parental fears and restricted access to natural areas.
Elizabeth Dickinson has criticized the term as a misdiagnosis that obscures and problems of dysfunctional cultural practices.
Research
Nature-deficit disorder is unrecognized by most medical institutions. Some preliminary research shows that lack of time outdoors does have negative effects on children's mental well-being.
Most research relating to nature-deficit disorder does not specifically mention it by name. Though studies on the impact of natural environments, particularly the concept of urban green space, on mental and physical wellbeing often show supporting claims.
A study on Italian undergraduate students showed how mental fatigue can be improved quicker in natural environments compared to urban ones.
In Edinburgh, UK, a survey was professionally analyzed to show the effects exposure to greenspace has on primary school children. It found that more exposure helps increase self-esteem in young children.
Increased urbanization in the Netherlands was studied in correlation to an increase in various mental and physical health issues. They found less disease clusters in areas with more greenspace.
Causes
Researchers have not assessed the causes of nature-deficit disorder. However, Richard Louv has proposed some causes:
Parents are keeping children indoors in order to keep them safe from danger. Louv b |
https://en.wikipedia.org/wiki/String%20operations | In computer science, in the area of formal language theory, frequent use is made of a variety of string functions; however, the notation used is different from that used for computer programming, and some commonly used functions in the theoretical realm are rarely used when programming. This article defines some of these basic terms.
Strings and languages
A string is a finite sequence of characters.
The empty string is denoted by .
The concatenation of two string and is denoted by , or shorter by .
Concatenating with the empty string makes no difference: .
Concatenation of strings is associative: .
For example, .
A language is a finite or infinite set of strings.
Besides the usual set operations like union, intersection etc., concatenation can be applied to languages:
if both and are languages, their concatenation is defined as the set of concatenations of any string from and any string from , formally .
Again, the concatenation dot is often omitted for brevity.
The language consisting of just the empty string is to be distinguished from the empty language .
Concatenating any language with the former doesn't make any change: ,
while concatenating with the latter always yields the empty language: .
Concatenation of languages is associative: .
For example, abbreviating , the set of all three-digit decimal numbers is obtained as . The set of all decimal numbers of arbitrary length is an example for an infinite language.
Alphabet of a string
The alphabet of a string is the set of all of the characters that occur in a particular string. If s is a string, its alphabet is denoted by
The alphabet of a language is the set of all characters that occur in any string of , formally:
.
For example, the set is the alphabet of the string ,
and the above is the alphabet of the above language as well as of the language of all decimal numbers.
String substitution
Let L be a language, and let Σ be its alphabet. A string substitution or simply a substitution is a |
https://en.wikipedia.org/wiki/Ly49 | Ly49 is a family of membrane C-type lectin-like receptors expressed mainly on NK cells but also on other immune cells (some CD8+ and CD3+ T lymphocytes, intestinal epithelial lymphocytes (IELs), NKT cells, uterine NK cells (uNK) cells, macrophages or dendritic cells). Their primary role is to bind MHC-I molecules to distinguish between self healthy cells and infected or altered cells. Ly49 family is coded by Klra gene cluster and include genes for both inhibitory and activating paired receptors, but most of them are inhibitory. Inhibitory Ly49 receptors play a role in the recognition of self cells and thus maintain self-tolerance and prevent autoimmunity by suppressing NK cell activation. On the other hand, activating receptors recognise ligands from cancer or viral infected cells (induced-self hypothesis) and are used when cells lack or have abnormal expression of MHC-I molecules (missing-self hypothesis), which activate cytokine production and cytotoxic activity of NK and immune cells.
Ly49 receptors are expressed in some mammals including rodents, cattle, some primates but not in humans. Only one human gene homologous to rodent Ly49 receptors is found in the human genome, KLRA1P (LY49L), however, it represents a non-functional pseudogene. However killer cell immunoglobulin-like receptors (KIR) have the same function in humans. They have different molecular structure but recognise HLA class I molecules as ligands and include both inhibitory (mainly) and activating receptors.
Function
Role in NK cells
The function of NK cells is the killing of virally infected or cancerous cells. Therefore, they must have a precisely regulated system of self-cell recognition to prevent the destruction of healthy cells. They express several types of inhibitory and activating receptors on their surface, including the Ly49 receptor family, which have roles in NK cell licensing, antiviral, and antitumor immunity,.
NK cells are activated when signal from activating receptors outwei |
https://en.wikipedia.org/wiki/John%20Reif | John H. Reif (born 1951) is an American academic, and Professor of Computer Science at Duke University, who has made contributions to large number of fields in computer science: ranging from algorithms and computational complexity theory to robotics. He has also published in many other scientific fields including chemistry (in particular, nanoscience), optics (in particular optical computing and design of head-mounted displays), and mathematics (in particular graph theory and game theory.
Biography
John Reif received a B.S. (magna cum laude) from Tufts University in 1973, a M.S. from Harvard University in 1975 and a Ph.D. from Harvard University in 1977.
From 1983 to 1986 he was associate professor of Harvard University, and since 1986 he has been Professor of Computer Science at Duke University. Currently he holds the Hollis Edens Distinguished Professor, Trinity College of Arts and Sciences, Duke University. From 2011 to 2014 he was Distinguished Adjunct Professor, Faculty of Computing and Information Technology (FCIT), King Abdulaziz University (KAU), Jeddah, Saudi Arabia.
He has also contributed to bringing together various disjoint research communities working in different areas of nano-sciences by organizing (as General Chairman) annual Conferences on "Foundations of Nanoscience: Self-assembled architectures and devices" (FNANO) for last 20 years.
He has been awarded Fellow of the following organizations: American Association for the Advancement of Science, IEEE, ACM, and the Institute of Combinatorics.
He is the son of Arnold E. Reif and like him he has dual citizenship in USA and Austria.
Research contributions
John Reif has made contributions to large number of fields in computer science: ranging from algorithms and computational complexity theory to robotics and to game theory. He developed efficient randomized algorithms and parallel algorithms for a wide variety of graph, geometric, numeric, algebraic, and logical problems. His Google Scholar H- |
https://en.wikipedia.org/wiki/KLRA1 | Killer cell lectin-like receptor subfamily A (KLRA, alternative nomenclature Ly49) is a gene cluster coding proteins from family Ly49, which are membrane receptors expressed mainly on the surface of NK cells and other cells of immune system in some mammals including rodents and cattle but not humans. Mouse Klra gene cluster is located on chromosome 6 and comprises 20-30 genes and pseudogenes, e.g. Klra1 (Ly49A). Klra gene family is highly polymorphic and polygenic and various mouse strains encode different number of Klra genes.
The homologous human KLRAP1 gene has been classified as a transcribed pseudogene because all associated transcripts are candidates for nonsense-mediated decay (NMD). |
https://en.wikipedia.org/wiki/B-cell%20activating%20factor | B-cell activating factor (BAFF) also known as tumor necrosis factor ligand superfamily member 13B and CD257 among other names, is a protein that in humans is encoded by the TNFSF13B gene. BAFF is also known as B Lymphocyte Stimulator (BLyS) and TNF- and APOL-related leukocyte expressed ligand (TALL-1) and the Dendritic cell-derived TNF-like molecule (CD257 antigen; cluster of differentiation 257).
Structure and function
BAFF is a cytokine that belongs to the tumor necrosis factor (TNF) ligand family. This cytokine is a ligand for receptors TNFRSF13B/TACI, TNFRSF17/BCMA, and TNFRSF13C/BAFF-R. This cytokine is expressed in B cell lineage cells, and acts as a potent B cell activator. It has been also shown to play an important role in the proliferation and differentiation of B cells.
BAFF is a 285-amino acid long peptide glycoprotein which undergoes glycosylation at residue 124. It is expressed as a membrane-bound type II transmembrane protein on various cell types including monocytes, dendritic cells and bone marrow stromal cells. The transmembrane form can be cleaved from the membrane, generating a soluble protein fragment. BAFF steady-state concentrations depend on B cells and also on the expression of BAFF-binding receptors. BAFF is the natural ligand of three nonconventional tumor necrosis factor receptors named BAFF-R (BR3), TACI (transmembrane activator and calcium modulator and cyclophilin ligand interactor), and BCMA (B-cell maturation antigen), all of which have differing binding affinities for it. These receptors are expressed mainly on mature B lymphocytes and their expression varies in dependence of B cell maturation (TACI is also found on a subset of T-cells and BCMA on plasma cells). BAFF-R is involved in the positive regulation during B cell development. TACI binds worst since its affinity is higher for a protein similar to BAFF, called a proliferation-inducing ligand (APRIL). BCMA displays an intermediate binding phenotype and will work with eithe |
https://en.wikipedia.org/wiki/TNFSF9 | Tumor necrosis factor ligand superfamily member 9 also known as 4-1BB ligand or 4-1BBL or CD137L is a protein that in humans is encoded by the TNFSF9 gene.
4-1BBL is a type 2 transmembrane glycoprotein receptor that is found on APCs (antigen presenting cells) and binds to 4-1BB (also known as CD137). The 4-1BB/4-1BBL complex belongs to the TNFR:TNF superfamily, which is expressed on activated T Lymphocytes.
Structure of 4-1BB/4-1BBL complex
The 4-1BB/4-1BBL complex consists of three monomeric 4-1BBs bound to a trimeric 4-1BBL. Each 4-1BB monomer binds to two 4-1BBLs via cysteine-rich domains (CRDs). The interaction between 4-1BB and the second 4-1BBL is required to stabilize their interactions. The link with 4-1BBL is largely made up of amino acids from the dynamic loops of the CRD2 and the β sheet of CRD3 of 4-1BB, according to a detailed study of the binding between the 4-1BB and 4-1BBL interface. CRD2 amino acids (T61, Q67, and K69) interact with the AA′ loop (Y110 and G114) and the intra-H-strand loop (Q227 and Q230) of 4-1BBL to form various hydrogen bond interactions.
Application to cancer immunotherapy
Studies on the poorly immunogenic Ag104A sarcoma and the extremely tumorigenic P815 mastocytoma provided the first systematic proof that anti-4-1BB antibodies have potent anti-tumor effects. Anti-4-1BB administration to mice with the aforementioned tumors was shown to substantially inhibit tumor growth by increasing CTL activity. In the years to come, more studies verified and legitimized the effect of 4-1BB signaling to inhibit tumor growth.
The interaction between 4-1BB and 4-1BBL provide costimulatory signals to a variety of T cells, which can be used to discover cancer immunotherapy. The 4-1BB/4-1BBL complex together with a signal provided by a T-cell receptor can provide costimulatory signals to CD4+ and CD8+ T cells in mice, leading to the activation of CD4+ and CD8+ T cells. The activation of CD8+ T cells is essential in antitumor immunity. The 4- |
https://en.wikipedia.org/wiki/Subgroups%20of%20cyclic%20groups | In abstract algebra, every subgroup of a cyclic group is cyclic. Moreover, for a finite cyclic group of order n, every subgroup's order is a divisor of n, and there is exactly one subgroup for each divisor. This result has been called the fundamental theorem of cyclic groups.
Finite cyclic groups
For every finite group G of order n, the following statements are equivalent:
G is cyclic.
For every divisor d of n, G has at most one subgroup of order d.
If either (and thus both) are true, it follows that there exists exactly one subgroup of order d, for any divisor of n.
This statement is known by various names such as characterization by subgroups. (See also cyclic group for some characterization.)
There exist finite groups other than cyclic groups with the property that all proper subgroups are cyclic; the Klein group is an example. However, the Klein group has more than one subgroup of order 2, so it does not meet the conditions of the characterization.
The infinite cyclic group
The infinite cyclic group is isomorphic to the additive subgroup Z of the integers. There is one subgroup dZ for each integer d (consisting of the multiples of d), and with the exception of the trivial group (generated by d = 0) every such subgroup is itself an infinite cyclic group. Because the infinite cyclic group is a free group on one generator (and the trivial group is a free group on no generators), this result can be seen as a special case of the Nielsen–Schreier theorem that every subgroup of a free group is itself free.
The fundamental theorem for finite cyclic groups can be established from the same theorem for the infinite cyclic groups, by viewing each finite cyclic group as a quotient group of the infinite cyclic group.
Lattice of subgroups
In both the finite and the infinite case, the lattice of subgroups of a cyclic group is isomorphic to the dual of a divisibility lattice. In the finite case, the lattice of subgroups of a cyclic group of order n is isomorphic to the d |
https://en.wikipedia.org/wiki/Myelin%20protein%20zero | Myelin protein zero (P0, MPZ) is a single membrane glycoprotein which in humans is encoded by the MPZ gene. P0 is a major structural component of the myelin sheath in the peripheral nervous system (PNS). Myelin protein zero is expressed by Schwann cells and accounts for over 50% of all proteins in the peripheral nervous system, making it the most common protein expressed in the PNS. Mutations in myelin protein zero can cause myelin deficiency and are associated with neuropathies like Charcot–Marie–Tooth disease and Dejerine–Sottas disease.
Structure
In humans, the gene that encodes myelin protein zero is located on chromosome 1 near the Duffy Locus or the Duffy Antigen/Chemokine Receptor. The gene is about 7,000 bases long and is divided into 6 exons. In total, myelin protein zero is 219 amino acids long and has many basic amino acid residues.
Myelin protein zero consists of an extracellular N-terminal domain (amino acids 1–124), a single transmembrane region (125-150), and a smaller positively charged intracellular region (151-219). Its cytoplasmic domain is highly positively charged but presumably does not fold into a globular structure. The extracellular domain is structurally similar to the immunoglobulin domain and therefore the protein is considered as belonging to immunoglobulin superfamily
Besides existing as a monomer, myelin protein zero is also known to form dimers and tetramers with other myelin protein zero molecules in vertebrates.
Function
The myelin sheath is a multi-layered membrane, unique to the nervous system, that functions as an insulator to greatly increase the velocity of axonal impulse conduction. Myelin protein zero, absent in the central nervous system, is a major component of the myelin sheath in peripheral nerves. Mutations that disrupt the function of myelin protein zero can lead to less expression of myelin and degeneration of myelin sheath in the peripheral nervous system. Currently, myelin protein zero expression is postulate |
https://en.wikipedia.org/wiki/Journal%20of%20Systems%20and%20Software | The Journal of Systems and Software is a computer science journal in the area of software systems, established in 1979 and published by Elsevier.
Content and scope
The journal publishes research papers, state-of-the-art surveys, and practical experience reports. It includes papers covering issues of programming methodology, software engineering, and hardware/software systems. Topics include: "software systems, prototyping issues, high-level specification techniques, procedural and functional programming techniques, data-flow concepts, multiprocessing, real-time, distributed, concurrent, and telecommunications systems, software metrics, reliability models for software, performance issues, and management concerns."
Abstracting and indexing
According to the 2021 Journal Citation Reports, the Journal of Systems and Software has an impact factor of 3.514.
According to Google Scholar, the journal has an h5-index of 61, which ranks third among international publication venues in software systems, after ICSE and IEEE Transactions on Software Engineering.
Past and present editors-in-chief
John Manley and Alan Salisbury (1979–1983)
Richard E. Fairley (1984–1985)
Robert L. Glass (1986–2001)
David N. Card (2002–2008)
Hans van Vliet (2009–2017)
Paris Avgeriou and David Shepherd (2018–current)
Notable articles
A few of the most notable (downloaded) articles are:
Software defect prediction based on enhanced metaheuristic feature selection optimization and a hybrid deep neural network
A software engineering perspective on engineering machine learning systems: State of the art and challenges
MeTeaM: A method for characterizing mature software metrics teams |
https://en.wikipedia.org/wiki/Last%20Armageddon | is a 1988 post-apocalyptic role-playing video game for the NEC PC-8801, MSX, Sharp X68000, MS-DOS, PC Engine CD-ROM², and Nintendo Family Computer. The game was exclusively in the Japanese language until an English translation patch was created for the Nintendo Famicom.
The game had a sequel, After Armageddon Gaiden, released for the Sega CD in 1994. Working Designs planned to release the game in North America as A Side Story of Armageddon in 1995, but the localization was cancelled due to the demise of the Sega CD system.
Plot
The humans, who breathed the toxin-filled air on Earth's surface, became one with the Earth and kept dissolving. The history of humanity ended and dominion of the planet returned to the demons. These mutant creatures did not depend on oxygen to survive. Therefore, they were able to breathe the air and use the land. Meanwhile, an army of robots wage World War IV against the demons in order to conquer what is now known as Makai - the Demon World. These robots came to the planet on a wave of energy that created an explosion that turned the world into a wasteland. Much later in the game, concurrent themes including Adolf Hitler, war, creating a perfect race of people, and the destruction of humanity in the year 1999 are revealed to the player inside one of the robot's main bases.
The demons attempt to gain dominion on the humans' old planet while the robots intend to impose a millennium of logic and dictatorial force throughout Makai. Playing as the robots is not an option open to the player. Therefore, the player must take advantage of their mutant army and crush the robot invaders. The game builds on the theme of an impending world domination through machines, as popularized famously in the Terminator series. The gameplay is similar to Final Fantasy featuring turn-based fights viewed from a third-person perspective.
Gameplay
Both the demon soldiers and their enemies may cast magic spells or physical attacks. Some magic attacks have the abi |
https://en.wikipedia.org/wiki/Allotype%20%28immunology%29 | The word allotype comes from two Greek roots, allo meaning 'other or differing from the norm' and typos meaning 'mark'. In immunology, allotype is an immunoglobulin variation (in addition to isotypic variation) that can be found among antibody classes and is manifested by heterogeneity of immunoglobulins present in a single vertebrate species. The structure of immunoglobulin polypeptide chain is dictated and controlled by number of genes encoded in the germ line. However, these genes, as it was discovered by serologic and chemical methods, could be highly polymorphic. This polymorphism is subsequently projected to the overall amino acid structure of antibody chains. Polymorphic epitopes can be present on immunoglobulin constant regions on both heavy and light chains, differing between individuals or ethnic groups and in some cases may pose as immunogenic determinants. Exposure of individuals to a non-self allotype might elicit an anti- allotype response and became cause of problems for example in a patient after transfusion of blood or in a pregnant woman. However, it is important to mention that not all variations in immunoglobulin amino acid sequence pose as a determinant responsible for immune response. Some of these allotypic determinants may be present at places that are not well exposed and therefore can be hardly serologically discriminated. In other cases, variation in one isotype can be compensated by the presence of this determinant on another antibody isotype in one individual. This means that divergent allotype of heavy chain of IgG antibody may be balanced by presence of this allotype on heavy chain of for example IgA antibody and therefore is called isoallotypic variant. Especially large number of polymorphisms were discovered in IgG antibody subclasses. Which were practically used in forensic medicine and in paternity testing, before replaced by modern day DNA fingerprinting.
Definition and organisation of allotypes in humans
Human allotypes nomencl |
https://en.wikipedia.org/wiki/Gross%20pathology | Gross pathology refers to macroscopic manifestations of disease in organs, tissues, and body cavities. The term is commonly used by anatomical pathologists to refer to diagnostically useful findings made during the gross examination portion of surgical specimen processing or an autopsy.
In the intricate process of anatomical pathology, the grossing stage plays a pivotal role. It is vital to systematically explain the gross appearance of a pathological state, for example, a malignant tumor, noting the site, size, shape, consistency, presence of a capsule and appearance on cut section whether well circumscribed or diffusely infiltrating, homogeneous or variegated, cystic, necrotic, hemorrhagic areas, as well as papillary projections.
Therefore, upon receipt of a specimen, pathologists meticulously document its characteristics. They note the specimen's dimensions, hue, texture, and any distinctive features that stand out. This careful observation lays the groundwork for the subsequent steps. Following this, the tissue is delicately sectioned and securely placed into cassettes, each identified by a unique barcode. This systematic approach ensures precision and traceability, hallmarks of the highest standards in pathology. |
https://en.wikipedia.org/wiki/Idiotype | In immunology, an idiotype is a shared characteristic between a group of immunoglobulin or T-cell receptor (TCR) molecules based upon the antigen binding specificity and therefore structure of their variable region. The variable region of antigen receptors of T cells (TCRs) and B cells (immunoglobulins) contain complementarity-determining regions (CDRs) with unique amino acid sequences. They define the surface and properties of the variable region, determining the antigen specificity and therefore the idiotope of the molecule. Immunoglobulins or TCRs with a shared idiotope are the same idiotype. Antibody idiotype is determined by:
Gene rearrangement
Junctional diversity
P-nucleotides (palindromic nucleotides at sites of single-strand breaks)
N-nucleotides
Somatic hypermutations
Etymology and usage
The word idiotype comes from two Greek roots, idio meaning 'private, distinctive, peculiar' and typos meaning 'mark.' Thus, idiotype describes the distinctive sequence and region that makes any immunoglobulin/TCR unique from others of the same type which is its variable region.
The term "idiotype" is sometimes used to describe the collection of multiple idiotopes, and therefore overall antigen binding capacity, possessed by an antibody.
The word "idiotype" became influential in immunology when Niels Jerne formulated his immune network theory. Jerne was awarded the Nobel Prize in Physiology or Medicine in 1984 largely for being the father of immune network theory. He defined idiotype as the set of epitopes on the V region of an antibody molecule, where epitope means an antigenic determinant. He also defined the "paratope" to be that part of an antibody variable region that binds to an antigen. The best developed version of immune network theory is called the symmetrical network theory, in which the distinction between idiotype and paratope plays no role.
See also
Allotype (immunology)
Isotype (immunology)
Immune network theory
External links
Overview at Medical U |
https://en.wikipedia.org/wiki/Isotype%20%28immunology%29 | In immunology, antibodies (immunoglobulins (Ig)) are classified into several types called isotypes or classes.
The variable (V) regions near the tip of the antibody can differ from molecule to molecule in countless ways, allowing it to specifically target an antigen (or more exactly, an epitope).
In contrast, the constant (C) regions only occur in a few variants, which define the antibody's class.
Antibodies of different classes activate distinct effector mechanisms in response to an antigen (triggering different elements of the innate immune system).
They appear at different stages of an immune response, differ in structural features, and in their location around the body.
Isotype expression reflects the maturation stage of a B cell. Naive B cells express IgM and IgD isotypes with unmutated variable genes, which are produced from the same initial transcript following alternative splicing. Expression of other antibody isotypes (in humans: IgG, IgA, and IgE) occurs via a process of class switching after antigen exposure. Class switching is mediated by the enzyme AID (activation-induced cytidine deaminase) and occurs after the B cell binds an antigen through its B cell receptor. Class-switching usually requires interaction with a T helper cell.
In humans, there are five heavy chain isotypes α,δ,γ,ε,μ, corresponding to five antibody isotypes:
α – IgA, further divided into subclasses IgA1 and IgA2
δ – IgD
γ – IgG, further divided into subclasses IgG1 to IgG4
ε – IgE
μ – IgM
There are also two light chain isotypes κ and λ; however, there is no significant difference in function between the two. Thus an antibody isotype is determined by the constant regions of the heavy chains only.
IgM is first expressed as a monomer on the surface of immature B cells. Upon antigenic stimulation, IgM+ B cells secrete pentameric IgM antibody formed by five Ig monomers are linked via disulfide bonds. The pentamer also contains a polypeptide J-chain, which links two of the monome |
https://en.wikipedia.org/wiki/Odd%E2%80%93even%20sort | In computing, an odd–even sort or odd–even transposition sort (also known as brick sort or parity sort) is a relatively simple sorting algorithm, developed originally for use on parallel processors with local interconnections. It is a comparison sort related to bubble sort, with which it shares many characteristics. It functions by comparing all odd/even indexed pairs of adjacent elements in the list and, if a pair is in the wrong order (the first is larger than the second) the elements are switched. The next step repeats this for even/odd indexed pairs (of adjacent elements). Then it alternates between odd/even and even/odd steps until the list is sorted.
Sorting on processor arrays
On parallel processors, with one value per processor and only local left–right neighbor connections, the processors all concurrently do a compare–exchange operation with their neighbors, alternating between odd–even and even–odd pairings. This algorithm was originally presented, and shown to be efficient on such processors, by Habermann in 1972.
The algorithm extends efficiently to the case of multiple items per processor. In the Baudet–Stevenson odd–even merge-splitting algorithm, each processor sorts its own sublist at each step, using any efficient sort algorithm, and then performs a merge splitting, or transposition–merge, operation with its neighbor, with neighbor pairing alternating between odd–even and even–odd on each step.
Batcher's odd–even mergesort
A related but more efficient sort algorithm is the Batcher odd–even mergesort, using compare–exchange operations and perfect-shuffle operations.
Batcher's method is efficient on parallel processors with long-range connections.
Algorithm
The single-processor algorithm, like bubblesort, is simple but not very efficient. Here a zero-based index is assumed:
function oddEvenSort(list) {
function swap(list, i, j) {
var temp = list[i];
list[i] = list[j];
list[j] = temp;
}
var sorted = false;
while (!sorted |
https://en.wikipedia.org/wiki/Publius%20%28publishing%20system%29 | Publius was an attempted communication protocol developed by Lorrie Cranor, Avi Rubin and Marc Waldman to give individuals the ability to publish information on the web anonymously and with a high guarantee that their publications would not be censored or modified by a third party. The experiment terminated sometime in 2001 with no significant results. The name of the system was chosen to reflect the joint pen name of the authors of The Federalist Papers.
Design goals
The nine design goals of the Publius development team were:
Censorship resistance: decreasing the chance that a third party will manage to modify or delete the published materials.
Tamper evident: unauthorized changes are traceable.
Source anonymous: there is no way to tell who published the material once it is available on the web.
Updatable: publishers are allowed to modify or delete their material.
Deniable: third parties participating in publishing the materials lacks the responsibility for the hosted content.
Fault tolerant: system should function even when some involved third parties are faulty or malicious.
Persistent: there is no expiration date for published materials.
Extensible: support for future protocol extensions or growth in the number of publishers.
Freely available: all software tools required for the system should be out of charge.
Technical details
The Publius web system consisted of the following agents:
Publishers - participants who publish their content on the web.
Servers - which host the publishers' content on the web (considered as part of the third parties).
Retrievers - participants who browse the web content published by the publishers.
Publius limited file sizes to 100 kilobytes. Files on Publius could reference other files, allowing users to upload works larger than 100 kilobytes, if the file format allowed it (e.g., upload HTML, PDF, or PostScript files referencing outside images or fonts).
The Publius system relied on a static list of web servers. When a publisher |
https://en.wikipedia.org/wiki/Post%20Irradiation%20Examination | Post Irradiation Examination (PIE) is the study of used nuclear materials such as nuclear fuel. It has several purposes. It is known that by examination of used fuel that the failure modes which occur during normal use (and the manner in which the fuel will behave during an accident) can be studied. In addition information is gained which enables the users of fuel to assure themselves of its quality and it also assists in the development of new fuels. After major accidents the core (or what is left of it) is normally subject to PIE in order to find out what happened. One site where PIE is done is the ITU which is the EU centre for the study of highly radioactive materials.
Materials in a high radiation environment (such as a reactor) can undergo unique behaviors such as swelling and non-thermal creep. If there are nuclear reactions within the material (such as what happens in the fuel), the stoichiometry will also change slowly over time. These behaviors can lead to new material properties, cracking, and fission gas release:
Fission gas release
As the fuel is degraded or heated the more volatile fission products which are trapped within the uranium dioxide may become free.
Fuel cracking
As the fuel expands on heating, the core of the pellet expands more than the rim which may lead to cracking. Because of the thermal stress thus formed the fuel cracks, the cracks tend to go from the centre to the edge in a star shaped pattern.
In order to better understand and control these changes in materials, these behaviors are studied. . Due to the intensely radioactive nature of the used fuel this is done in a hot cell. A combination of nondestructive and destructive methods of PIE are common.
In addition to the effects of radiation and the fission products on materials, scientists also need to consider the temperature of materials in a reactor, and in particular, the fuel. Too high fuel temperatures can compromise the fuel, and therefore it is important to control t |
https://en.wikipedia.org/wiki/Rosselli%E2%80%93Gulienetti%20syndrome | Rosselli–Gulienetti syndrome, also known as Zlotogora–Ogur syndrome and Bowen–Armstrong syndrome, is a type of congenital ectodermal dysplasia syndrome. The syndrome is relatively rare and has only been described in a few cases.
Signs and symptoms
There is a range of signs and symptoms including cleft lip or palate, intellectual disabilities and various forms of ectodermal dysplasia. Additional symptoms may include fused eyelids, absent nails, delayed bone growth and dry skin. It is believed that this syndrome follows an autosomal dominant pattern of inheritance with incomplete penetrance, and caused by a mutation affecting the TP63 gene. It has been suggested that this syndrome, AEC syndrome and Rapp–Hodgkin syndrome may be variations of the same disease.
It is not uncommon for heterozygotes for the condition (especially those originating from Margarita Island) to have a broad and flat philtrum.
Cause
It is caused by mutations in the gene PVRL1 (11q23-q24) which encodes nectin-1, the principal receptor used by alpha-herpesviruses to mediate entry into human cells. Although the mechanism underlying the physiopathology of this syndrome is still unknown, it has been proposed that nectin-1 is a cell-cell adhesion molecule that is preferentially expressed in keratinocytes and that mutations in PVRL1 may abrogate NAP (nectin, afadin, ponsin)-dependent cell-cell adhesion. It is thought that the genetic transmission is autosomal recessive gene transmission.[8]
The cause was found in the year 2000 by Suzuki et al. when he analyzed the genome of patients with the disorder and discovered a homozygous nonsense mutation in the PVRL1 gene, in chromosome 11. It was suggested that the regular occurrence of this disorder among the people of Margarita Island was due to resistance to alpha-herpes viruses people carrying only one copy of the mutated gene (heterozygosity) had. The same mutation in the same gene was found in two families from the Middle East and South America (Israe |
https://en.wikipedia.org/wiki/JX%20%28operating%20system%29 | JX is a microkernel operating system with both the kernel and applications implemented using the Java programming language.
Overview
JX is implemented as an extended Java virtual machine (the JX Core), adding support to the Java system for necessary features such as protection domains and hardware access, along with a number of components written in Java that provide kernel facilities to applications running on the computer. Because Java is a type-safe language, JX is able to provide isolation between running applications without needing to use hardware memory protection. This technique, known as language-based protection means that system calls and inter-process communication in JX does not cause an address space switch, an operation which is slow on most computers. JX runs on standard PCs, with support for a limited range of common hardware elements. It is free software, developed by the University of Erlangen.
The primary benefits of JX include:
Based on a small trusted computing base (TCB) security system
Lack of address space switching compared to most other microkernel systems.
It is a highly flexible operating system with different configuration possibilities.
See also
JavaOS |
https://en.wikipedia.org/wiki/Wirecard | Wirecard AG is an insolvent German payment processor and financial services provider whose former CEO, COO, two board members, and other executives have been arrested or otherwise implicated in criminal proceedings. In June 2020, the company announced that €1.9 billion in cash was missing. It owed €3.2 billion in debt. In November 2020, the company was dismantled after it sold the assets of its main business unit to Santander Bank for €100 million. Other assets, including its North American, UK and Brazilian units had been previously sold at nondisclosed prices. The company offered electronic payment transaction services and risk management, and issued and processed physical and virtual cards. As of 2017, the company was listed on the Frankfurt Stock Exchange, and was a part of the DAX stock index from September 2018 to August 2020.
The company is at the center of an international financial scandal. Allegations of accounting malpractices had trailed the company since the early days of its incorporation, reaching a peak in 2019 after the Financial Times published a series of investigations along with whistleblower complaints and internal documents. On 25 June 2020, Wirecard filed for insolvency following revelations that an amount of €1.9 billion was "missing". Long-time CEO Markus Braun subsequently resigned and was later arrested. Former COO Jan Marsalek disappeared, after being fired from his position and board seat, and remains a fugitive wanted by the German police. He has been on Europe's Most Wanted list since 2020.
On 25 August 2020, the court-appointed insolvency administrator issued a statement that "under the preliminary insolvency administration, it has since been possible to stabilize the ongoing business and create a basis for its continuation." The statement mentioned how "far-reaching cuts are therefore necessary in order to make any kind of continuation possible" and announced the impending layoff of around 730 employees, in addition to all members |
https://en.wikipedia.org/wiki/SPC%20file%20format | The SPC file format is a file format for storing spectroscopic data.
The SPC file format is a file format in which all kinds of spectroscopic data, including among others infrared spectra, Raman spectra and UV/VIS spectra. The format can be regarded as a database with records of variable length and each record stores a different kind of data (instrumental information, information on one spectrum of a dataset, the spectrum itself or extra logs). It was invented by Galactic Industries as generic file format for its programs. Their original specification was implemented in 1986, but a more versatile format was created in 1996.
Galactic Industries was purchased by Thermo Fisher Scientific who now maintain and develop the GRAMS Software Suite for which the format was defined. They provide free tools and libraries to allow developers to create and maintain SPC files consistently.
This file format is not in plaintext, such as XML or CSV, but is a binary format and is therefore not readable with a standard text editor but requires a special reader or software to interpret the file data. The Environmental Protection Agency publishes a free spectra reader called ShowSPC that is open to the public for reading spectra data. Additionally, a company AnalyzeIQ produces a free SPC to CSV converter aptly titled SPC2CSV, an open-source project OpenSpectralWorks is an alternative free reader, as well as SpectraGryph which has analytic and display capabilities for reading SPC files. The Essential FTIR software offers a file reader that can read, display, analyze and export .spc files as well as many other spectroscopy file formats. |
https://en.wikipedia.org/wiki/Upper-atmospheric%20lightning | Upper-atmospheric lightning and ionospheric lightning are terms sometimes used by researchers to refer to a family of short-lived electrical-breakdown phenomena that occur well above the altitudes of normal lightning and storm clouds. Upper-atmospheric lightning is believed to be electrically induced forms of luminous plasma. The preferred usage is transient luminous event (TLE), because the various types of electrical-discharge phenomena in the upper atmosphere lack several characteristics of the more familiar tropospheric lightning.
Transient luminous events have also been observed in far-ultraviolet images of Jupiter's upper atmosphere, high above the altitude of lightning-producing water clouds.
Characteristics
There are several types of TLEs, the most common being sprites. Sprites are flashes of bright red light that occur above storm systems. C-sprites (short for “columniform sprites”) is the name given to vertical columns of red light. C-sprites exhibiting tendrils are sometimes called “carrot sprites”. Other types of TLEs include sprite halos, ghosts, blue jets, gigantic jets, pixies, gnomes, trolls, blue starters, and ELVESs. The acronym ELVES (“Emission of Light and Very Low Frequency perturbations due to Electromagnetic Pulse Sources”) refers to a singular event which is commonly thought of as being plural. TLEs are secondary phenomena that occur in the upper atmosphere in association with underlying thunderstorm lightning.
TLEs generally last anywhere from less than a millisecond to more than 2 seconds. The first video recording of a TLE was captured accidentally on July 6, 1989 when researcher R.C Franz left a camera running overnight to view the night sky. When reviewing the video taken, two finger-like vertical images appeared in two frames of the film. The next known video recordings of a TLE were taken in 1989, when the Shuttle Mission STS-34 was conducting the Mesoscale Lightning Observation Experiment. On October 21, 1989 TLEs were recorded dur |
https://en.wikipedia.org/wiki/Male%20egg | Male egg can refer to either:
An egg that artificially contains genetic material from a male.
An egg from a haplodiploid species such as an ant or bee that is unfertilized and will hatch a male
A fertilized egg that a male organism is developing in
This article focuses on the first definition.
Male eggs are the result of a process in which the eggs of a female would be emptied of their genetic contents (a technique similar to that used in the cloning process), and those contents would be replaced with male DNA. Such eggs could then be fertilized by sperm. The procedure was conceived by Calum MacKellar, a Scottish bioethicist. With this technique, two males could be the biological parents of a child. However, such a procedure would additionally require an artificial womb or a female gestational carrier.
In 2023, male eggs from male mice cells were developed and used to create bi-paternal mice that grew into adulthood; bi-paternal mice had been obtained in 2008, but they only survived for a few days.
See also
Female sperm
Male pregnancy
LGBT reproduction
Genomic imprinting |
https://en.wikipedia.org/wiki/Female%20sperm | Female sperm can refer to either:
A sperm which contains an X chromosome, produced in the usual way in the testicles, referring to the occurrence of such a sperm fertilizing an egg and giving birth to a female.
A sperm which artificially contains genetic material from a female.
Since the late 1980s, scientists have explored how to produce sperm where all of the chromosomes come from a female donor.
Artificial female sperm production
Creating female sperm was first raised as a possibility in a patent filed in 1991 by injecting a woman's cells into a man's testicles, though the patent focused mostly on injecting altered male cells into a man's testes (to correct genetic diseases). In 1997, Japanese scientists partially confirmed such techniques by creating chicken female sperm in a similar manner. "However, the ratio of produced W chromosome-bearing (W-bearing) spermatozoa fell substantially below expectations. It is therefore concluded that most of the W-bearing PGC could not differentiate into spermatozoa because of restricted spermatogenesis." These simple transplantation methods follow from earlier observations by developmental biologists that germ stem cells are autonomous in the sense that they can begin the processes to become both sperm and eggs.
One potential roadblock to injecting a woman's cells into a man's testicles is that the man's immune system might attack and destroy the woman's cells. In usual circumstances, when foreign cells (such as cells or organs from other people, or infectious bacteria) are put into a human body, its immune system will reject such cells or organs. However, a special property of a man's testicles is that they are immune-privileged, that is, a man's immune system will not attack foreign cells (such as a woman's cells) injected into the sperm-producing part of the testicles. Thus, a woman's cells will remain in the man's testicles long enough to be converted into sperm.
However, there are more serious challenges. Biologist |
https://en.wikipedia.org/wiki/Levi%27s%20lemma | In theoretical computer science and mathematics, especially in the area of combinatorics on words, the Levi lemma states that, for all strings u, v, x and y, if uv = xy, then there exists a string w such that either
uw = x and v = wy (if |u| ≤ |x|)
or
u = xw and wv = y (if |u| ≥ |x|)
That is, there is a string w that is "in the middle", and can be grouped to one side or the other. Levi's lemma is named after Friedrich Wilhelm Levi, who published it in 1944.
Applications
Levi's lemma can be applied repeatedly in order to solve word equations; in this context it is sometimes called the Nielsen transformation by analogy with the Nielsen transformation for groups. For example, starting with an equation xα = yβ where x and y are the unknowns, we can transform it (assuming |x| ≥ |y|, so there exists t such that x=yt) to ytα = yβ, thus to tα = β. This approach results in a graph of substitutions generated by repeatedly applying Levi's lemma. If each unknown appears at most twice, then a word equation is called quadratic; in a quadratic word equation the graph obtained by repeatedly applying Levi's lemma is finite, so it is decidable if a quadratic word equation has a solution. A more general method for solving word equations is Makanin's algorithm.
Generalizations
The above is known as the Levi lemma for strings; the lemma can occur in a more general form in graph theory and in monoid theory; for example, there is a more general Levi lemma for traces originally due to Christine Duboc.
Several proofs of Levi's Lemma for traces can be found in The Book of Traces.
A monoid in which Levi's lemma holds is said to have the equidivisibility property. The free monoid of strings and string concatenation has this property (by Levi's lemma for strings), but by itself equidivisibility is not enough to guarantee that a monoid is free. However an equidivisible monoid M is free if additionally there exists a homomorphism f from M to the monoid of natural numbers (free monoid on |
https://en.wikipedia.org/wiki/Trace%20theory | In mathematics and computer science, trace theory aims to provide a concrete mathematical underpinning for the study of concurrent computation and process calculi. The underpinning is provided by an algebraic definition of the free partially commutative monoid or trace monoid, or equivalently, the history monoid, which provides a concrete algebraic foundation, analogous to the way that the free monoid provides the underpinning for formal languages.
The power of trace theory stems from the fact that the algebra of dependency graphs (such as Petri nets) is isomorphic to that of trace monoids, and thus, one can apply both algebraic formal language tools, as well as tools from graph theory.
While the trace monoid had been studied by Pierre Cartier and Dominique Foata for its combinatorics in the 1960s, trace theory was first formulated by Antoni Mazurkiewicz in the 1970s, in an attempt to evade some of the problems in the theory of concurrent computation, including the problems of interleaving and non-deterministic choice with regards to refinement in process calculi. |
https://en.wikipedia.org/wiki/Minimum%20bactericidal%20concentration | The minimum bactericidal concentration (MBC) is the lowest concentration of an antibacterial agent required to kill a particular bacterium. It can be determined from broth dilution minimum inhibitory concentration (MIC) tests by subculturing to agar plates that do not contain the test agent. The MBC is identified by determining the lowest concentration of antibacterial agent that reduces the viability of the initial bacterial inoculum by ≥99.9%. The MBC is complementary to the MIC; whereas the MIC test demonstrates the lowest level of antimicrobial agent that inhibits growth, the MBC demonstrates the lowest level of antimicrobial agent that results in microbial death. This means that even if a particular MIC shows inhibition, plating the bacteria onto agar might still result in organism proliferation because the antimicrobial did not cause death. Antibacterial agents are usually regarded as bactericidal if the MBC is no more than four times the MIC. Because the MBC test uses colony-forming units as a proxy measure of bacterial viability, it can be confounded by antibacterial agents which cause aggregation of bacterial cells. Examples of antibacterial agents which do this include flavonoids and peptides. |
https://en.wikipedia.org/wiki/Cerebral%20crus | The cerebral crus (crus cerebri) is the anterior portion of the cerebral peduncle which contains the motor tracts, travelling from the cerebral cortex to the pons and spine. The plural of which is cerebral crura.
In some older texts this is called the cerebral peduncle but presently it is usually limited to just the anterior white matter portion of it.
Additional images
See also
Efferent nerve fiber
Motor neuron (efferent neuron)
Motor nerve |
https://en.wikipedia.org/wiki/Tonality%20flux | Tonality flux is Harry Partch's term for the kinds of subtle harmonic changes that can occur in a microtonal context from notes moving from one chord to another by tiny increments of voice leading. For instance, within a major third G-B, there can be a minor third G to B, such that in moving from one to the other each line shifts less than a half-step. Within a just intonation scale, this could be represented (, indicates an approximate quarter-tone sharp, an approximate quarter-tone flat) by
moving to
like so:
One voice slides down from 386 cents to 347, the other slides up from 0 cents to 32, yet the harmonic shift can be dramatic. The best-known example of tonality flux, and one of the two Partch uses as illustration, is the beginning of his composition The Letter, in which the kithara alternates between two chords, one major and one minor, with the minor third of one nestled inside the major third of the other (given here in Ben Johnston's pitch notation):
In this notation, which assumes G as the tonic or 1/1, a 7 lowers a pitch from a just intonation value by 35/36, or 48.77 cents; an upside-down 7 raises a pitch by the same amount. The first chord is a major triad and, relative to G, contains the notes 8/7 (231 cents above G), 10/7 (617 cents), and 12/7 (933 cents); the second chord is a minor triad comprising the pitches 7/6 (267 cents), 7/5 (583 cents), and 7/4 (969 cents). Notice that while the outer notes ascend from the first chord to the second, the middle note descends. Such subtle movements were among the attractions that Partch found in an expanded just intonation of more than 12 pitches per octave. Tonality flux is a special instance of the principle of parsimonious (most direct) voice leading.
See also
Enharmonic and enharmonic progression
Identity (tuning)
Tonality diamond |
https://en.wikipedia.org/wiki/Feller%27s%20coin-tossing%20constants | Feller's coin-tossing constants are a set of numerical constants which describe asymptotic probabilities that in n independent tosses of a fair coin, no run of k consecutive heads (or, equally, tails) appears.
William Feller showed that if this probability is written as p(n,k) then
where αk is the smallest positive real root of
and
Values of the constants
For the constants are related to the golden ratio, , and Fibonacci numbers; the constants are and . The exact probability p(n,2) can be calculated either by using Fibonacci numbers, p(n,2) = or by solving a direct recurrence relation leading to the same result. For higher values of , the constants are related to generalizations of Fibonacci numbers such as the tribonacci and tetranacci numbers. The corresponding exact probabilities can be calculated as p(n,k) = .
Example
If we toss a fair coin ten times then the exact probability that no pair of heads come up in succession (i.e. n = 10 and k = 2) is p(10,2) = = 0.140625. The approximation gives 1.44721356...×1.23606797...−11 = 0.1406263... |
https://en.wikipedia.org/wiki/Posterior%20median%20sulcus%20of%20medulla%20oblongata | The posterior median sulcus of medulla oblongata (or posterior median fissure or dorsal median sulcus) is a narrow groove; and exists only in the closed part of the medulla oblongata; it becomes gradually shallower from below upward, and finally ends about the middle of the medulla oblongata, where the central canal expands into the cavity of the fourth ventricle.
Additional images |
https://en.wikipedia.org/wiki/List%20of%20flags%20of%20Finland | The following is a list of flags of Finland. For more information, see flag of Finland.
National flag
Presidential flag
Regent of Finland
Military flag
Navy
Air Force
Civil Maritime Flags
Diplomatic services flags
Customs Flags
Postal Flags
Vexillology Association flags
Regions
City and municipality flags
Pennants
Finnish regions also have traditional Household pennants.
Political flags
Ethnic groups flags
Historical flags
Proposed flags
Finnish shipping companies
Finnish yacht clubs
Åland
Historical Åland flags
Proposed custom flags
See also
Flag of Finland
Household pennant
Coat of arms of Finland |
https://en.wikipedia.org/wiki/Dullard%20protein | In cell biology, Dullard protein is a protein coding gene involved in neural development. It is a member of DXDX(T/V) phosphatase family and is a potential regulator of neural tube development in Xenopus. The gene promotes neural development by inhibiting Bone Morphogenetic Proteins (BMPs). Dullard is also known as CTDnep1, which stands for CTD nuclear envelope phosphatase 1. This gene is relatively small and only contains 244 amino acids.
Description
Dullard is also known as CTDnep1, which stands for CTD nuclear envelope phosphatase 1. It is a protein coding gene, which include phosphatase activity and protein serine/threonine phosphatase activity. This gene is relatively small and only contains 244 amino acids. Dullard protein or CTDnep1 encodes a protein serine/threonine phosphatase and dephosphoroylates LPIN1 and LPIN2. LPIN1 and LPIN2 catalyze the reaction of the conversion of phosphatidic acid to diacylglycerol. The reaction can affect and change the lipid concentration of the endoplasmic reticulum and the nucleus.
Dullard and BNP signaling
Neural development happens in the dorsal ectoderm. In the genus Xenopus, over expression of Dullard undergoes apoptosis in early development. Dullard helps promote Ubiquitin by proteosomal degradation. Dullard mRNA is derived from maternal genes and is localized within the animal neural hemisphere. Functioning negatively for the regulation of Bone Morphogenetic Proteins (BMPs), Dullard conserves the C-terminal region of NLI-IF, in which is fairly dominant in cellular functions. Dullard is essential for inhibiting BMP receptor activation during Xenopus neuralization.
Human Dullard
Human Dullard has shown that the protein has two membrane spanning regions. One end is the N-terminal end, which helps localize the protein to the nuclear envelope. Dullard dephosphorylates the mammalian phospatidic acid phosphatase, lipin. Dullard participates in a unique phosphatase cascade regulating nuclear membrane biogenesis, and that this |
https://en.wikipedia.org/wiki/Bryan%20Simonaire | Bryan Warner Simonaire (born September 6, 1963) is an American politician who serves as a Maryland state senator representing District 31, which encompasses much of northern Anne Arundel County's Baltimore suburbs. A member of the Republican Party, he served as the minority leader of the Maryland Senate from 2020 to 2023.
Background
Simonaire was born in Baltimore. He graduated from Bob Jones University in 1985, receiving a Bachelor of Science degree in computer science, and from Loyola College, where he earned a Master of Science degree in engineering in 2005. He is a member of Upsilon Pi Epsilon.
After graduating from Bob Jones, Simonaire has worked as a computer systems engineer for Westinghouse Electronic Systems (now Northrop Grumman since its acquisition in 1995). In 2002, he founded Heroes-at-Home, a web-based program that helps the needy.
Simonaire became involved in politics in 2005, when he joined the North Count Republican Club's board of directors. He entered the race for state Senate in District 31 later that year, seeking to succeed retiring Democratic state senator Philip C. Jimeno and running on a "common sense, conservative" platform that included opposition to same-sex marriage. The district was targeted by the Maryland Republican Party, which saw the election as an opportunity to make legislative gains. Simonaire won the Republican primary in September 2006, and later won the general election on November 7, 2006, defeating Democratic state delegate Walter J. Shandrowsky by 659 votes, or a margin of 1.72 percent. It was the closest election in the 2006 Maryland Senate elections.
In the legislature
Simonaire was sworn into the Maryland Senate on January 10, 2007. He was initially a member of the Judicial Proceedings Committee from 2007 to 2010, afterwards serving on the Health and Environmental Affairs Committee until 2022. Since 2023, he has served on the Education, Energy, and the Environment Committee.
Simonaire endorsed Mitt Romney in the |
https://en.wikipedia.org/wiki/List%20of%20Danish%20flags | The following is a list of flags of Denmark.
National flag and State flag
Royal flags
Historical Royal flags
Military flags
Army
Former regiments of the Royal Danish Army
Navy
Customs services
Flags of state-owned companies
Subnational flags
Autonomous entities
Regions
The regions of Denmark do not have flags, instead using "logos" as symbols. These are sometimes misattributed as flags, and can be seen flown at times, but this is not the official use of them.
Unofficial regional flags
Some areas in Denmark have unofficial flags, listed below. The regional flags of Bornholm and Ærø are known to be in active use. The flags of Vendsyssel (Vendelbrog), the Jutlandic flag ("Den jyske fane"), and the flag of Funen ("Fynbo fanen") are obscure. None of these flags have legal recognition in Denmark, and are officially considered to be "fantasy flags". Denmark reserves official recognition to official flags and regional flags (områdeflag) from other jurisdictions.
Political flags
Ethnic groups flags
Historical
House flags of Danish freight companies
Yacht clubs of Denmark
Other flags/Microstate flags |
https://en.wikipedia.org/wiki/Emboliform%20nucleus | The emboliform nucleus (or anterior interposed nucleus) is a deep cerebellar nucleus that lies immediately to the medial side of the nucleus dentatus, and partly covering its hilum. It is one among the four pairs of deep cerebellar nuclei, which are from lateral to medial: the dentate, interposed (which consists of the emboliform and globose), and fastigial nuclei. These nuclei can be seen using Weigert's elastic stain.
Emboliform, from Ancient Greek, means "shaped like a plug or wedge".
Structure
The emboliform nucleus is a wedge-shaped structure of gray matter found at the medial side of the hilum of the dentate nucleus. Its neurons display a similar structure from those of the dentate nucleus. In some mammals the emboliform nucleus is continuous with the globose nucleus, forming together the interposed nucleus. When present, the interposed nucleus can be divided in an anterior and a posterior interposed nucleus, considered homologues of the emboliform and globose nuclei, respectively.
Function
As a part of the interposed nucleus, the emboliform participates in the spinocerebellum, a system that regulates the precision of limb movements. Axons leaving the emboliform exit through the superior cerebellar peduncle and reach the red nucleus in the midbrain and several thalamic nuclei which project into areas of the cerebral cortex that control limb movement. |
https://en.wikipedia.org/wiki/Straight%20gyrus | The portion of the inferior frontal lobe immediately adjacent to the longitudinal fissure (and medial to the medial orbital gyrus and olfactory tract) is named the straight gyrus,(or gyrus rectus) and is continuous with the superior frontal gyrus on the medial surface.
A specific function for the straight gyrus has not yet been brought to light; however, in males, greater activation of the straight gyrus within the medial orbitofrontal cortex while observing sexually visual pictures has been strongly linked to HSDD (hypoactive sexual desire disorder).
Additional images |
https://en.wikipedia.org/wiki/Lateral%20occipital%20sulcus | In the occipital lobe, the lateral occipital sulcus, where present, divides the lateral, or middle occipital gyrus into a superior and an inferior part, which are then continuous in front with the parietal and temporal lobes. The anterior portion is often incomplete, but in some individuals it may encounter the superior temporal sulcus whilst the posterior portion originates from the middle of the curved lunate sulcus, or from a curved portion of the transverse occipital sulcus if absent. |
https://en.wikipedia.org/wiki/HipNav | HipNav was the first computer-assisted surgery system developed to guide the surgeon during total hip replacement surgery. It was developed at Carnegie Mellon University. |
https://en.wikipedia.org/wiki/Marginal%20sulcus | In neuroanatomy, the marginal sulcus (margin of the cingulate sulcus) is a sulcus (crevice) that may be considered the termination of the cingulate sulcus. It separates the paracentral lobule anteriorly and the precuneus posteriorly.
Additional images |
https://en.wikipedia.org/wiki/Hypoglossal%20trigone | In the upper part of the medulla oblongata, the hypoglossal nucleus approaches the rhomboid fossa, where it lies close to the middle line, under an eminence named the hypoglossal trigone. It is a slight elevation in the floor of the inferior recess of the fourth ventricle, beneath which is the nucleus of origin of the twelfth cranial nerve. |
https://en.wikipedia.org/wiki/Zamzam%E2%80%93Sheriff%E2%80%93Phillips%20syndrome | Zamzam–Sheriff–Phillips syndrome is a rare autosomal recessive congenital disorder. It is characterized by aniridia, ectopia lentis, abnormal upper incisors and intellectual disability. Not a lot of research has been undertaken of this particular disease so thus far there is no known gene that affects this condition. However it has been hypothesised that the symptoms described are found at a particular gene, though intellectual disability is believed to be due to a different genetic cause.
Consanguinuity (intermarrying among relatives such as cousins), often associated with autosomal recessive inheritance, has been attributed to the inheritance of this disease. |
https://en.wikipedia.org/wiki/Face%20diagonal | In geometry, a face diagonal of a polyhedron is a diagonal on one of the faces, in contrast to a space diagonal passing through the interior of the polyhedron.
A cuboid has twelve face diagonals (two on each of the six faces), and it has four space diagonals. The cuboid's face diagonals can have up to three different lengths, since the faces come in congruent pairs and the two diagonals on any face are equal. The cuboid's space diagonals all have the same length. If the edge lengths of a cuboid are a, b, and c, then the distinct rectangular faces have edges (a, b), (a, c), and (b, c); so the respective face diagonals have lengths and
Thus each face diagonal of a cube with side length a is .
A regular dodecahedron has 60 face diagonals (and 100 space diagonals). |
https://en.wikipedia.org/wiki/Tony%20Hey | Professor Anthony John Grenville Hey (born 17 August 1946) was vice-president of Microsoft Research Connections, a division of Microsoft Research, until his departure in 2014.
Education
Hey was educated at King Edward's School, Birmingham and the University of Oxford. He graduated with a Bachelor of Arts degree in physics in 1967, and a Doctor of Philosophy in theoretical physics in 1970 supervised by P. K. Kabir. He was a student of Worcester College, Oxford and St John's College, Oxford.
Career and research
From 1970 through 1972 Hey was a postdoctoral fellow at California Institute of Technology (Caltech).
Moving to Pasadena, California, he worked with Richard Feynman and Murray Gell-Mann, both winners of the Nobel Prize in Physics.
He then moved to Geneva, Switzerland and worked as a fellow at CERN (the European organisation for nuclear research) for two years.
Hey worked about thirty years as an academic at University of Southampton, starting in 1974 as a particle physicist.
He spent 1978 as a visiting fellow at Massachusetts Institute of Technology.
For 1981 he returned to Caltech as a visiting research professor. There he learned of Carver Mead's work on very-large-scale integration and become interested in applying parallel computing techniques to large-scale scientific simulations.
Hey worked with British semiconductor company Inmos on the Transputer project in the 1980s.
He switched to computer science in 1985, and in 1986 became professor of computation in the Department of Electronics and Computer Science at Southampton. While there, he was promoted to Head of the School of Electronics and Computer Science in 1994 and Dean of Engineering and Applied Science in 1999.
Among his work was "doing research on Unix with tools like LaTeX."
In 1990 he was a visiting fellow at the Thomas J. Watson Research Center of IBM Research.
He then worked with Jack Dongarra, Rolf Hempel and David Walker, to define the Message Passing Interface (MPI) which became a de |
https://en.wikipedia.org/wiki/D-17B | The D-17B (D17B) computer was used in the Minuteman I NS-1OQ missile guidance system. The complete guidance system contained a D-17B computer, the associated stable platform, and power supplies.
The D-17B weighed approximately , contained 1,521 transistors, 6,282 diodes, 1,116 capacitors, and 504 resistors. These components were mounted on double copper-clad, engraved, gold-plated, glass fiber laminate circuit boards. There were 75 of these circuit boards and each one was coated with a flexible polyurethane compound for moisture and vibration protection. The high degree of reliability and ruggedness of the computer were driven by the strict requirements of the weapons system.
Design constraints
High reliability was required of the D-17B. It controlled a key weapon that would have just one chance to execute its mission. Reliability of the D-17B was achieved through the use of solid-state electronics and a relatively simple design. Simpler DRL (diode–resistor) logic was used extensively, but less-reliable DTL (diode–transistor) logic (which provides gain and inversion) was used only where needed. In the late 1950s and early 1960s, when the D-17B was designed, transistors lacked today's reliability. Reliability was also enhanced by the rotating-disk memory with non-destructive readout (NDRO). In actual real-time situations, Minuteman missiles achieved a mean time between failures (MTBF) of over 5.5 years .
The Soviets had much larger rockets and could use vacuum tubes in their guidance systems. (The weights of the Minuteman I and II remain classified, but the Minuteman III was 35,000 kg versus the Soviet R-7 missile (1959) of 280,000 kg.) The US planners had to choose either to develop solid state guidance systems (which weigh less) or consider the additional cost and time delay of developing larger rockets.
Specifications
Minuteman I D-17B computer specifications
Year: 1962
The D17B is a synchronous serial general-purpose digital computer.
Manufacturer:
Auto |
https://en.wikipedia.org/wiki/Fineness%20ratio | In naval architecture and aerospace engineering, the fineness ratio is the ratio of the length of a body to its maximum width. Shapes that are short and wide have a low fineness ratio, those that are long and narrow have high fineness ratios. Aircraft that spend time at supersonic speeds, e.g. the Concorde, generally have high fineness ratios.
At speeds below critical mach, one of the primary forms of drag is skin friction. As the name implies, this is drag caused by the interaction of the airflow with the aircraft's skin. To minimize this drag, the aircraft should be designed to minimize the exposed skin area, or "wetted surface". One solution to this problem is constructing an "egg shaped" fuselage, for example as used on the home-built Questair Venture.
Theoretical ideal fineness ratios in subsonic aircraft fuselages are typically found at about 6:1, however this may be compromised by other design considerations such as seating or freight size requirements. Because a higher fineness fuselage can have reduced tail surfaces, this ideal ratio can practically be increased to 8:1.
Most aircraft have fineness ratios significantly greater than this, however. This is often due to the competing need to place the tail control surfaces at the end of a longer moment arm to increase their effectiveness. Reducing the length of the fuselage would require larger controls, which would offset the drag savings from using the ideal fineness ratio. An example of a high-performance design with an imperfect fineness ratio is the Lancair. In other cases, the designer is forced to use a non-ideal design due to outside factors such as seating arrangements or cargo pallet sizes. Modern airliners often have fineness ratios much higher than ideal, a side effect of their cylindrical cross-section which is selected for strength, as well as providing a single width to simplify seating layout and air cargo handling.
As an aircraft approaches the speed of sound, shock waves form on areas of |
https://en.wikipedia.org/wiki/Pall%20%28heraldry%29 | A pall (or pairle) in heraldry and vexillology is a Y-shaped charge, normally having its arms in the three corners of the shield. An example of a pall placed horizontally (fesswise) is the green portion of the South African national flag.
A pall that stops short of the shield's edges and that has pointed ends to its three limbs is called a shakefork, although some heraldic sources do not make a distinction between a pall and a shakefork. A pall standing upside down is named pall reversed.
A pall on a shield may indicate a connection with the clergy, particularly archbishoprics, although in these cases the pall's lower limb usually stops short of the bottom of the shield and is fringed. Such a pall is often called an ecclesiastical pall or pallium, representing the ecclesiastical vestment from which this heraldic charge derives.
If there is symmetry within the arms, its blazon can be simplified in the English language by use of the heraldic term 'between' -- 'in the midst of, so as to make a symmetrical composition'. The coat of Saint-Wandrille-Rançon is an example where the French blasonnement is similar to the traditional English blazon, yet can be described with a simplified English blazon.
Modified palls
A pall can be modified by most of the lines of partition, such as the pall wavy in the coat of Saint-Wandrille-Rançon.
Gallery |
https://en.wikipedia.org/wiki/Reynoutria%20sachalinensis | Reynoutria sachalinensis (giant knotweed or Sakhalin knotweed Japanese オオイタドリ ooitadori, Russian Горец сахалинский, Гречиха сахалинская; syns. Polygonum sachalinense, Fallopia sachalinensis) is a species of Fallopia native to northeastern Asia in northern Japan (Hokkaidō, Honshū) and the far east of Russia (Sakhalin and the southern Kurile Islands).
Reynoutria sachalinensis is a herbaceous perennial plant growing to tall, with strong, extensively spreading rhizomes forming large clonal colonies. The leaves are some of the largest in the family, up to long and broad, nearly heart-shaped, with a somewhat wavy, crenate margin. The flowers are small, produced on short, dense panicles up to long in late summer or early autumn; it is gynodioecious, with male and female (male sterile) flowers on separate plants. The species is closely related to the Japanese knotweed, Reynoutria japonica, and can be distinguished from it by its larger size, and in its leaves having a heart-shaped (not straight) base and a crenate margin. Reynoutria sachalinensis has a chromosome count of 2n=44.
Cultivation and uses
The shoots are tender and edible. It was introduced to Europe and grown in many botanic gardens. It came prominently into notice about 1893, when a drought in western Europe caused a decided shortage in forage for cattle. This plant was little affected, and since its tender shoots and leaves were eaten by stock, the plant was widely grown experimentally as a forage crop. It has proved less useful than was predicted, and its deliberate cultivation has been almost entirely abandoned. It has, however, like F. japonica, proved to be an invasive weed in several areas.
It has hybridised with Reynoutria japonica in cultivation; the hybrid, Reynoutria × bohemica (Chrtek & Chrtková) J.P.Bailey, is frequently found in the British Isles and elsewhere.
Extracts of this plant can be used as plant protectants for certain fungal and bacterial diseases.
The species has been cultivated |
https://en.wikipedia.org/wiki/History%20monoid | In mathematics and computer science, a history monoid is a way of representing the histories of concurrently running computer processes as a collection of strings, each string representing the individual history of a process. The history monoid provides a set of synchronization primitives (such as locks, mutexes or thread joins) for providing rendezvous points between a set of independently executing processes or threads.
History monoids occur in the theory of concurrent computation, and provide a low-level mathematical foundation for process calculi, such as CSP the language of communicating sequential processes, or CCS, the calculus of communicating systems. History monoids were first presented by M.W. Shields.
History monoids are isomorphic to trace monoids (free partially commutative monoids) and to the monoid of dependency graphs. As such, they are free objects and are universal. The history monoid is a type of semi-abelian categorical product in the category of monoids.
Product monoids and projection
Let
denote an n-tuple of (not necessarily pairwise disjoint) alphabets . Let denote all possible combinations of one finite-length string from each alphabet:
(In more formal language, is the Cartesian product of the free monoids of the . The superscript star is the Kleene star.) Composition in the product monoid is component-wise, so that, for
and
then
for all in . Define the union alphabet to be
(The union here is the set union, not the disjoint union.) Given any string , we can pick out just the letters in some using the corresponding string projection . A distribution is the mapping that operates on with all of the , separating it into components in each free monoid:
Histories
For every , the tuple is called the elementary history of a. It serves as an indicator function for the inclusion of a letter a in an alphabet . That is,
where
Here, denotes the empty string. The history monoid is the submonoid of the product monoid generated by th |
https://en.wikipedia.org/wiki/Marcks%20Family%20Miniature%20Circus | The Marcks Family Miniature Circus is a miniature representation of the Sells Floto Circus of the 1930s. It was conceived and originated by Isaac Marcks and hand carved over the span of 50 years by him and his son Donald Marcks, publisher of the popular weekly publication Circus Report.
The circus is built to a scale of one-half inch equals one foot and consists of multiple tents and scores of wagonsand people, all hand carved. All figures are exact copies of the Sells Floto Circus as it appeared on a particular date, June 30, 1930. With over 300,000 pieces in the collection, the miniature circus main tent stands 25 inches tall and is 5 feet wide and 11 feet long. Until 2018 it was on display at Playland-Not-At-The-Beach. When Playland-Not-At-The-Beach closed, the miniature circus was put up for auction. Each of the five circus-wagon display cases and its contents were auctioned separately, and they sold for a total of $15,500. |
https://en.wikipedia.org/wiki/Video%20Disk%20Recorder | Video Disk Recorder (VDR) is an open-source application for Linux designed to allow any computer to function as a digital video recorder, in order to record and replay TV programming using the computer's hard drive. The computer needs to be equipped with a digital TV tuner card. VDR can also operate as an mp3 player and DVD player using available plugins. VDR uses drivers from the LinuxTV project. VDR was originally written by Klaus-Peter Schmidinger, one of the founders of CadSoft Computer GmbH and original developer of the EAGLE electronic design application. The software was originally hosted on CadSoft's server.
See also
Comparison of PVR software packages |
https://en.wikipedia.org/wiki/Hypnopompia | Hypnopompia (also known as hypnopompic state) is the state of consciousness leading out of sleep, a term coined by the psychical researcher Frederic Myers. Its mirror is the hypnagogic state at sleep onset; though often conflated, the two states are not identical and have a different phenomenological character. Hypnopompic and hypnagogic hallucinations are frequently accompanied by sleep paralysis, which is a state wherein one is consciously aware of one's surroundings but unable to move or speak.
Hallucinations
Hallucinations are commonly understood as "sensory perceptions that occur in the absence of an objective stimulus". As this definition implies, though, like dreams, most hallucinations are visual, they can encompass a broader range of sensory experience. Auditory hallucinations are thus also common: "patients can hear simple sounds, structured melodies or complete sentences". Slightly less common but not unheard of are "somesthetic" hallucinations involving the sense of touch and location, with such experiences ranging from tactile sensations to full-blown "cenesthopathic" or "out-of-body experiences", which involve sudden changes in the perception of the body’s location, or even a sense of movement of the entire body. Finally, a unique characteristic of hypnopompic hallucinations is that as opposed to dreams, wherein they rarely understand that they are asleep, here sleepers do indeed have "the clear subjective awareness of being awake" yet are frequently mentally and physically trapped in the experience.
Neurobiology
The objective difference between the subjective experiences of dreams and hypnopompic hallucinations emerges from a close look at the sleep cycle and its attendant brain activity: there are essentially two types of sleep, R.E.M. sleep, which is indeed categorized by "rapid eye movement" and N.R.E.M., which stands for "Non-Rapid Eye Movement". In R.E.M. sleep, brains are extremely active. In particular, during this stage, both the brain-ste |
https://en.wikipedia.org/wiki/Brain%20fag%20syndrome | Brain fag syndrome (BFS) describes a set of symptoms; somatic, sleep-related and cognitive complaints, difficulty in concentrating and retaining information, head and or neck pains, and eye pain. Brain fag is very common in adolescents and young adults. It is believed to be the most common in these age ranges due to the immense amount of pressure occurring in life during these years. This term, now outdated, was first used in 19th-century Britain before becoming a colonial description of Nigerian high school and university students in the 1960s. Its consideration as a culture-bound syndrome caused by excessive pressure to be successful among the young is disputed by Ayonrinde (2020)
Etymology
The term 'brain fag' presumably stems from the verb meaning of the word, "To cause (a person, animal, or part of the body) to become tired; to fatigue, wear out" chiefly found in British English.
Classification
BFS is classified in the fourth revision of the Diagnostic and Statistical Manual of Mental Disorders (DSM-IV) as a culture-bound syndrome. Individuals with symptoms of brain fag must be differentiated from those with the syndrome according to the Brain Fag Syndrome Scale (BFSS); Ola et al said it would not be "surpris[ing] if BFS was called an equivalent of either depression or anxiety".
Causes
Brain fag is typically driven in people with high anxiety and people with high stress levels. Morakinyo found in 20 people with BFS an achievement drive that was anxiety-related that led to the use of psychostimulants and consequent sleep deprivation which contributed to cognitive disruption. Omoluabi related BFS to test anxiety.
Treatment
Anumonye reported treatment success with lorazepam; others found benefit with antidepressants and relaxation exercises.
Epidemiology
BFS has been reported in other African cultures, and also in Brazil, Argentina, and Ethiopian Jews. Historic higher reported prevalence among males may be due to more males being present in higher edu |
https://en.wikipedia.org/wiki/Erd%C5%91s%E2%80%93Stone%20theorem | In extremal graph theory, the Erdős–Stone theorem is an asymptotic result generalising Turán's theorem to bound the number of edges in an H-free graph for a non-complete graph H. It is named after Paul Erdős and Arthur Stone, who proved it in 1946, and it has been described as the “fundamental theorem of extremal graph theory”.
Statement for Turán graphs
The extremal number ex(n; H) is defined to be the maximum number of edges in a graph with n vertices not containing a subgraph isomorphic to H; see the Forbidden subgraph problem for more examples of problems involving the extremal number. Turán's theorem says that ex(n; Kr) = tr − 1(n), the number of edges of the Turán graph T(n, r − 1), and that the Turán graph is the unique such extremal graph. The Erdős–Stone theorem extends this result to H = Kr(t), the complete r-partite graph with t vertices in each class, which is the graph obtained by taking Kr and replacing each vertex with t independent vertices:
Statement for arbitrary non-bipartite graphs
If H is an arbitrary graph whose chromatic number is r > 2, then H is contained in Kr(t) whenever t is at least as large as the largest color class in an r-coloring of H, but it is not contained in the Turán graph T(n,r − 1), as this graph and therefore each of its subgraphs can be colored with r − 1 colors.
It follows that the extremal number for H is at least as large as the number of edges in T(n,r − 1), and at most equal to the extremal function for Kr(t); that is,
For bipartite graphs H, however, the theorem does not give a tight bound on the extremal function. It is known that, when H is bipartite, ex(n; H) = o(n2), and for general bipartite graphs little more is known. See Zarankiewicz problem for more on the extremal functions of bipartite graphs.
Turán density
Another way of describing the Erdős–Stone theorem is using the Turán density of a graph , which is defined by . This determines the extremal number up to an additive error term. It can also be |
https://en.wikipedia.org/wiki/Optimal%20rotation%20age | In forestry, the optimal rotation age is the growth period required to derive maximum value from a stand of timber. The calculation of this period is specific to each stand and to the economic and sustainability goals of the harvester.
Economically optimum rotation age
In forestry rotation analysis, economically optimum rotation can be defined as “that age of rotation when the harvest of stumpage will generate the maximum revenue or economic yield”. In an economically optimum forest rotation analysis, the decision regarding optimum rotation age is undertake by calculating the maximum net present value. It can be shown as follows:
Revenue (R) = Volume × Price
Cost (C) = Cost of harvesting + handling.
Hence, Profit = Revenue − Cost.
Since the benefit is generated over multiple years, it is necessary to calculate that particular age of harvesting which will generate the maximum revenue. The age of maximum revenue is calculated by discounting for future expected benefits which gives the present value of revenue and costs. From this net present value (NPV) of profit is calculated.
This can be done as follows:
NPV = PVR – PVC
Where PVR is the present value of revenue and PVC is the present value of cost. Rotation will be undertaken where NPV is maximum.
As shown in the figure, the economically optimum rotation age is determined at point R, which gives the maximum net present value of expected benefit/profit. Rotation at any age before or after R will cause the expected benefit/profit to fall.
Biologically optimum rotation age
Biologists use the concept of maximum sustainable yield (MSY) or mean annual increment (MAI), to determine the optimal harvest age of timber. MSY can be defined as “the largest yield that can be harvested which does not deplete the resource (timber) irreparably and which leaves the resource in good shape for future uses”. MAI can be defined as “the average annual increase in volume of individual trees or stands up to the specified point in t |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.