source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/International%20Academy%20of%20Pathology | The International Academy of Pathology, originally called the International Association of Medical Museums (IAMM), is an institution dedicated "to the advancement of Pathology". In 1906, it was established by Dr. William Osler and Maude Abbott.
Its first documented meeting occurred on May 6, 1907.
In 1955, the IAMM was rename as the International Academy of Pathology (IAP). |
https://en.wikipedia.org/wiki/Number%20sentence | In mathematics education, a number sentence is an equation or inequality expressed using numbers and mathematical symbols. The term is used in primary level mathematics teaching in the US, Canada, UK, Australia, New Zealand and South Africa.
Usage
The term is used as means of asking students to write down equations using simple mathematical symbols (numerals, the four main basic mathematical operators, equality symbol). Sometimes boxes or shapes are used to indicate unknown values. As such, number sentences are used to introduce students to notions of structure and elementary algebra prior to a more formal treatment of these concepts.
A number sentence without unknowns is equivalent to a logical proposition expressed using the notation of arithmetic.
Examples
A valid number sentence that is true: 83 + 19 = 102.
A valid number sentence that is false: 1 + 1 = 3.
A valid number sentence using a 'less than' symbol: 3 + 6 < 10.
A valid number sentence using a 'more than' symbol: 3 + 9 > 11.
An example from a lesson plan:
Some students will use a direct computational approach. They will carry out the addition 26 + 39 = 65, put 65 = 26 + , and then find that = 39.
See also
Expression (mathematics)
Equation
Inequality (mathematics)
Open sentence
Sentence (mathematical logic) |
https://en.wikipedia.org/wiki/Gland%20of%20Zeis | Glands of Zeis are unilobar sebaceous glands located on the margin of the eyelid. The glands of Zeis service the eyelash. These glands produce an oily substance that is issued through the excretory ducts of the sebaceous lobule into the middle portion of the hair follicle. In the same area of the eyelid, near the base of the eyelashes are apocrine glands called the "glands of Moll".
If eyelashes are not kept clean, conditions such as folliculitis may take place, and if the sebaceous gland becomes infected, it can lead to abscesses and styes. The glands of Zeis are named after German ophthalmologist Eduard Zeis (1807–68).
See also
Meibomian gland
Moll's gland
List of specialized glands within the human integumentary system |
https://en.wikipedia.org/wiki/Oden%20Institute%20for%20Computational%20Engineering%20and%20Sciences | The Oden Institute for Computational Engineering and Sciences is an interdisciplinary research unit and graduate program at The University of Texas at Austin dedicated to advancing computational science and engineering through a variety of programs and research centers. The Institute currently supports 16 research centers, seven research groups and maintains the Computational Sciences, Engineering and Mathematics Program, a graduate degree program leading to the M.S. and Ph.D. degrees in Computational Science, Engineering and Mathematics. The interdisciplinary programs underway at the Oden Institute involve 123 faculty representing 23 academic departments and five schools and colleges. Oden Institute faculty hold positions in the Cockrell School of Engineering, College of Natural Sciences, Jackson School of Geosciences, Dell Medical School and McCombs School of Business. The Institute also supports the Peter O'Donnell, Jr. Postdoctoral Fellowship program and a program for visiting scholars through the J. Tinsley Oden Faculty Fellowship Research Fund. Organizationally, the Oden Institute reports to the Vice President for Research.
Research centers and groups
The Oden Institute supports 23 research centers and research groups. Each center and group is organized around a research topic and is directed by an Oden Institute faculty member.
Applied Mathematics Group
Autonomous Systems Group
Center for Computational Astronautical Sciences and Technologies (CAST)
Center for Computational GeoSciences and Optimization
Center for Computational Life Sciences and Biology
Center for Computational Materials
Center for Computational Molecular Science
Center for Computational Oncology
Center for Distributed and Grid Computing
Center for Numerical Analysis
Center for Predictive Engineering and Computational Science
Center for Quantum Materials Engineering
Center for Scientific Machine Learning
Center for Subsurface Modeling
Computational Hydraulics Group
Computational Mechanics Gr |
https://en.wikipedia.org/wiki/Cam%20plastometer | The cam plastometer is a physical testing machine. It measures the resistance of non-brittle materials to compressive deformation at constant true-strain rates. In this way, it can be compared a bit to the Gleeble®. In the early days, the machine operates at relatively low strain rates, but over time it has been enhanced and currently it can operate over a wide range of strain rates
The machine is patented under the name of "United States Patent 4109516".
In the machine, deformation compressive forces are applied to a specimen by two flat, opposing platens which impact a flat, rectangular specimen. The deformation forces can be varied during operation, to simulate actual conditions which occur during industrial pressing and forming operations. The plastometer is also capable of torsional testing of specimens".
The cam plastometers are expensive and there are only a few of them in the world. |
https://en.wikipedia.org/wiki/Azoxystrobin | Azoxystrobin is a broad spectrum systemic fungicide widely used in agriculture to protect crops from fungal diseases. It was first marketed in 1996 using the brand name Amistar and by 1999 it had been registered in 48 countries on more than 50 crops. In the year 2000 it was announced that it had been granted UK Millennium product status.
History
In 1977, academic research groups in Germany published details of two new antifungal antibiotics they had isolated from the basidiomycete fungus Strobilurus tenacellus. They named these strobilurin A and B but did not provide detailed structures, only data based on their high-resolution mass spectra, which showed that the simpler of the two had molecular formula C16H18O3. In the following year, further details including structures were published and a related fungicide, oudemansin A from the fungus Oudemansiella mucida, whose identity had been determined by X-ray crystallography, was disclosed.
When the fungicidal effects were shown to stem from what was then a novel mode of action, chemists at the Imperial Chemical Industries (ICI) research site at Jealott's Hill became interested to use them as leads to develop new fungicides suitable for use in agriculture. The first task was to synthesize a sample of strobilurin A for testing. In doing so, it was discovered that the structure that had been published was incorrect in the stereochemistry of one of the double bonds: the strobilurins, in fact, have the E,Z,E not E,E,E configuration. Once this was realised and the correct material was made and tested it was shown, as expected, to be active in vitro but insufficiently stable to light to be active in the glasshouse. A large programme of chemistry to make analogues was begun when it was discovered that a new stilbene structure containing the β-methoxyacrylate portion (shown in blue and believed to be the toxophore) had good activity in glasshouse tests but still lacked sufficient photostability. After more than 1400 analogu |
https://en.wikipedia.org/wiki/Material%20nonimplication | Material nonimplication or abjunction (Latin ab = "away", junctio= "to join") is the negation of material implication. That is to say that for any two propositions and , the material nonimplication from to is true if and only if the negation of the material implication from to is true. This is more naturally stated as that the material nonimplication from to is true only if is true and is false.
It may be written using logical notation as , , or "Lpq" (in Bocheński notation), and is logically equivalent to , and .
Definition
Truth table
Logical Equivalences
Material nonimplication may be defined as the negation of material implication.
In classical logic, it is also equivalent to the negation of the disjunction of and , and also the conjunction of and
Properties
falsehood-preserving: The interpretation under which all variables are assigned a truth value of "false" produces a truth value of "false" as a result of material nonimplication.
Symbol
The symbol for material nonimplication is simply a crossed-out material implication symbol. Its Unicode symbol is 219B16 (8603 decimal): ↛.
Natural language
Grammatical
"p minus q."
"p without q."
Rhetorical
"p but not q."
"q is false, in spite of p."
Computer science
Bitwise operation: A&(~B)
Logical operation: A&&(!B)
See also
Implication
Boolean algebra
Set difference |
https://en.wikipedia.org/wiki/Converse%20nonimplication | In logic, converse nonimplication is a logical connective which is the negation of converse implication (equivalently, the negation of the converse of implication).
Definition
Converse nonimplication is notated , or , and is logically equivalent to and .
Truth table
The truth table of .
Notation
Converse nonimplication is notated , which is the left arrow from converse implication (), negated with a stroke ().
Alternatives include
, which combines converse implication's , negated with a stroke ().
, which combines converse implication's left arrow () with negation's tilde ().
Mpq, in Bocheński notation
Properties
falsehood-preserving: The interpretation under which all variables are assigned a truth value of 'false' produces a truth value of 'false' as a result of converse nonimplication
Natural language
Grammatical
Example,
If it rains (P) then I get wet (Q), just because I am wet (Q) does not mean it is raining, in reality I went to a pool party with the co-ed staff, in my clothes (~P) and that is why I am facilitating this lecture in this state (Q).
Rhetorical
Q does not imply P.
Colloquial
Boolean algebra
Converse Nonimplication in a general Boolean algebra is defined as .
Example of a 2-element Boolean algebra: the 2 elements {0,1} with 0 as zero and 1 as unity element, operators as complement operator, as join operator and as meet operator, build the Boolean algebra of propositional logic.
Example of a 4-element Boolean algebra: the 4 divisors {1,2,3,6} of 6 with 1 as zero and 6 as unity element, operators (co-divisor of 6) as complement operator, (least common multiple) as join operator and (greatest common divisor) as meet operator, build a Boolean algebra.
Properties
Non-associative
if and only if #s5 (In a two-element Boolean algebra the latter condition is reduced to or ). Hence in a nontrivial Boolean algebra Converse Nonimplication is nonassociative.
Clearly, it is associative if and only if .
Non-commutative
if and only |
https://en.wikipedia.org/wiki/Kilpatrick%20limit | In particle accelerators, a common mechanism for accelerating a charged particle beam is via copper resonant cavities in which electric and magnetic fields form a standing wave, the mode of which is designed so that the E field points along the axis of the accelerator, producing forward acceleration of the particles when in the correct phase.
The maximum electric field achievable is limited by a process known as RF breakdown. The reliable limits for various RF frequencies were tested experimentally in the 1950s by W. D. Kilpatrick.
An approximate relation by least-square optimization of the data yields
with (megavolts per metre).
This relation is known as the Kilpatrick Limit. |
https://en.wikipedia.org/wiki/Translocated%20promoter%20region | Translocated promoter region is a component of the tpr-met fusion protein.
External links |
https://en.wikipedia.org/wiki/Hfq%20protein | The Hfq protein (also known as HF-I protein) encoded by the hfq gene was discovered in 1968 as an Escherichia coli host factor that was essential for replication of the bacteriophage Qβ. It is now clear that Hfq is an abundant bacterial RNA binding protein which has many important physiological roles that are usually mediated by interacting with Hfq binding sRNA.
In E. coli, Hfq mutants show multiple stress response related phenotypes. The Hfq protein is now known to regulate the translation of two major stress transcription factors ( σS (RpoS) and σE (RpoE) ) in Enterobacteria. It also regulates sRNA in Vibrio cholerae, a specific example being MicX sRNA.
In Salmonella typhimurium, Hfq has been shown to be an essential virulence factor as its deletion attenuates the ability of S.typhimurium to invade epithelial cells, secrete virulence factors or survive in cultured macrophages. In Salmonella, Hfq deletion mutants are also non motile and exhibit chronic activation of the sigma mediated envelope stress response. A CLIP-Seq study of Hfq in Salmonella has revealed 640 binding sites across the Salmonella transcriptome. The majority of these binding sites was found in mRNAs and sRNAs.
In Photorhabdus luminescens, a deletion of the hfq gene causes loss of secondary metabolite production.
Hfq mediates its pleiotropic effects through several mechanisms. It interacts with regulatory sRNA and facilitates their antisense interaction with their targets. It also acts independently to modulate mRNA decay (directing mRNA transcripts for degradation) and also acts as a repressor of mRNA translation. Genomic SELEX has been used to show that Hfq binding RNAs are enriched in the sequence motif 5'-AAYAAYAA-3'. Hfq was also found to act on ribosome biogenesis in E. coli, specifically on the 30S subunit. Hfq mutants accumulate higher levels of immature small subunits and decreased translation accuracy. This function on the bacterial ribosome could also account for the pleiotropic effe |
https://en.wikipedia.org/wiki/CD4%20immunoadhesin | CD4 immunoadhesin is a recombinant fusion protein consisting of a combination of CD4 and the fragment crystallizable region, similarly known as immunoglobulin. It belongs to the antibody (Ig) gene family. CD4 is a surface receptor for human immunodeficiency virus (HIV). The CD4 immunoadhesin molecular fusion allow the protein to possess key functions from each independent subunit. The CD4 specific properties include the gp120-binding and HIV-blocking capabilities. Properties specific to immunoglobulin are the long plasma half-life and Fc receptor binding. The properties of the protein means that it has potential to be used in AIDS therapy as of 2017. Specifically, CD4 immunoadhesin plays a role in antibody-dependent cell-mediated cytotoxicity (ADCC) towards HIV-infected cells. While natural anti-gp120 antibodies exhibit a response towards uninfected CD4-expressing cells that have a soluble gp120 bound to the CD4 on the cell surface, CD4 immunoadhesin, however, will not exhibit a response. One of the most relevant of these possibilities is its ability to cross the placenta.
History and significance
CD4 immunoadhesin was first developed in the mid-1990s as a potential therapeutic agent and treatment for HIV/AIDS. The protein is a fusion of the extracellular domain of the CD4 receptor and the Fc domain of human immunoglobulin G (IgG), the most abundant antibody isotype in the human body. The Fc domain of IgG contributes several important properties to the fusion protein, including increased half-life in the bloodstream, enhanced binding to Fc receptors on immune cells, and the ability to activate complement.
The development of CD4 immunoadhesin stems from the observation that the CD4 receptor plays a critical role in the entry of HIV into human cells. The CD4 receptor is used as a primary receptor by HIV to attach to the surface of target cells. HIV then uses a co-receptor, either CCR5 or CXCR4, to facilitate entry into the cell. The ability of CD4 immunoadhesin to |
https://en.wikipedia.org/wiki/OPIE%20%28Entomology%29 | Office pour l'Information Eco-entomologique (abbreviated OPIE or OPIE-LR, English: Office for Entomological Information) is a French government organisation based in Guyancourt devoted to entomology, especially applied entomology.
External links
OPIE website
Revue Insectes (Insects Review)
Entomological organizations
Animal welfare organizations based in France
Organizations based in Île-de-France |
https://en.wikipedia.org/wiki/Heparin-binding%20EGF-like%20growth%20factor | Heparin-binding EGF-like growth factor (HB-EGF) is a member of the EGF family of proteins that in humans is encoded by the HBEGF gene.
HB-EGF-like growth factor is synthesized as a membrane-anchored mitogenic and chemotactic glycoprotein. An epidermal growth factor produced by monocytes and macrophages, due to an affinity for heparin is termed HB-EGF. It has been shown to play a role in wound healing, cardiac hypertrophy, and heart development and function. First identified in the conditioned media of human macrophage-like cells, HB-EGF is an 87-amino acid glycoprotein that displays highly regulated gene expression. Ectodomain shedding results in the soluble mature form of HB-EGF, which influences the mitogenicity and chemotactic factors for smooth muscle cells and fibroblasts. The transmembrane form of HB-EGF is the unique receptor for diphtheria toxin and functions in juxtacrine signaling in cells. Both forms of HB-EGF participate in normal physiological processes and in pathological processes including tumor progression and metastasis, organ hyperplasia, and atherosclerotic disease. HB-EGF can bind two locations on cell surfaces: heparan sulfate proteoglycans and EGF-receptor effecting cell to cell interactions.
Interactions
Heparin-binding EGF-like growth factor has been shown to interact with NRD1, Zinc finger and BTB domain-containing protein 16 and BAG1.
HB-EGF biological activities with these genes influence cell cycle progression, molecular chaperone regulation, cell survival, cellular functions, adhesion, and mediation of cell migration. The NRD1 gene codes for the protein nardilysin, an HB-EGF modulator. Zinc finger and BTB domain-containing protein 16 and BAG family molecular chaperone regulator function as co-chaperone proteins in processes involving HB-EGF.
Role in cancer
Recent studies indicate significant HB-EGF gene expression elevation in a number of human cancers as well as cancer-derived cell lines. Evidence indicates that HB-EGF plays a s |
https://en.wikipedia.org/wiki/Black%20swan%20emblems%20and%20popular%20culture | The black swan (Cygnus atratus) is widely referenced in Australian culture, although the character of that importance historically diverges between the prosaic in the east and the symbolic in the west. The black swan is also of spiritual significance in the traditional histories of many Aboriginal Australian peoples across southern Australia. Metaphoric references to black swans have appeared in European culture since long before Europeans became aware of Cygnus atratus in Australia in the 18th century.
The black swan is the official state emblem of Western Australia and is depicted on the flag and coat of arms of Western Australia. The symbol is used in other emblems, coins, logos, mascots and in the naming of sports teams.
Aboriginal history and lore
Daisy Bates recorded a nyoongar man called Woolberr "last of the black swan group" of the Nyungar people of south-western Australia in the 1920s. The website of the Premier of Western Australia refers to Nyungar lore of how the ancestors of the Nyungar people were once black swans who became men.
The Dreamtime story of the black swans tells how two brothers were turned into white swans so they could help an attack party during a raid for weapons. It is said that Wurrunna used a large gubbera, or crystal stone, to transform the men. After the raid, eaglehawks attacked the white swans and tore feathers from the birds. Crows who were enemies of the eaglehawks came to the aid of the brothers and gave the black swans their own black feathers. The black swan's red beak is said to be the blood of the attacked brothers, which stayed there forever.
The moral code embedded in Aboriginal lore is evident in a story from an unspecified locality in eastern Australia (probably in New South Wales) published in 1943. An Aboriginal man, fishing in a lagoon, caught a baby bunyip. Instead of returning the baby to the water, he wanted to take the bunyip back to the camp to boast of his fishing prowess, against the urging of his fri |
https://en.wikipedia.org/wiki/National%20boundary%20delimitation | In international law, national boundary delimitation (also known as national delimitation and boundary delimitation) is the process of legally establishing the outer limits ("borders") of a state within which full territorial or functional sovereignty is exercised.
National delimitation involves negotiations surrounding the modification of a state's borders and often takes place as part of the negotiations seeking to end a conflict over resource control, popular loyalties, or political interests.
Occasionally this is used when referring to the maritime boundaries, in which case it is called maritime delimitation.
The term "maritime delimitation" is a form of national delimitation that can be applied to the disputes between nations over maritime claims. An example is found at Maritime Boundary Delimitation in the Gulf of Tonkin. In international politics, the Division for Ocean Affairs and the Law of the Sea (Office of Legal Affairs, United Nations Secretariat) is responsible for the collection of all claims to territorial waters.
See also
National delimitation in the Soviet Union on the creation of territorial units based on ethnicity in the USSR;
Nation-building on the processes of creating or strengthening national identity within national territorial limits.
Sugauli Treaty
Maritime delimitation between Romania and Ukraine
Georges Bank
List of maritime boundary treaties |
https://en.wikipedia.org/wiki/Mark%20McMenamin | Mark A. S. McMenamin (born c. 1957) is an American paleontologist and professor of geology at Mount Holyoke College. He has contributed to the study of the Cambrian explosion and the Ediacaran biota.
He is the author of several books, most recently Deep Time Analysis (2018) and Dynamic Paleontology (2016). His earlier works include The Garden of Ediacara: Discovering the Earliest Complex Life (1998), one of the only popular accounts of research on the Ediacaran biota, and Science 101: Geology (2007). He is credited with co-naming several geological formations in Mexico, describing several new fossil genera and species, and naming the Precambrian supercontinent Rodinia. The Cambrian archeocyathid species Markocyathus clementensis was named in his honor in 1989.
Early life and career
McMenamin was born in Oregon, earned his B.S. at Stanford University in 1979 and his PhD at the University of California, Santa Barbara in 1984. In 1980, while at Santa Barbara he met his future wife, Dianna, also a paleontology graduate student, with whom he would co-author several publications. He joined the staff at Mount Holyoke College in 1984. In October 2021, he described a Jurassic-period dinosaur fossil in South Hadley, Massachusetts.
Origins of complex life
In 1995 McMenamin led a field expedition to Sonora, Mexico, that discovered fossils (550-560 million years old) which McMenamin argued belonged to a diverse community of early animals and Ediacaran biota. The paper was published in the Proceedings of the National Academy of Sciences of the United States of America where it was reviewed by Ediacaran expert James G. Gehling. In 2011, McMenamin reported the discovery of the oldest known adult animal fossils, Proterozoic chitons from the Clemente Formation, northwestern Sonora, Mexico. Further up in this same stratigraphic sequence, McMenamin also discovered and named the early shelly fossil Sinotubulites cienegensis, a fossil that allowed the first confident Proterozoic bios |
https://en.wikipedia.org/wiki/Technical%20debt | In software development, or any other IT field (e.g., Infrastructure, Networking, etc.) technical debt (also known as design debt or code debt) is the implied cost of future reworking required when choosing an easy but limited solution instead of a better approach that could take more time.
Analogous with monetary debt, if technical debt is not repaid, it can accumulate "interest", making it harder to implement changes. Unaddressed technical debt increases software entropy and cost of further rework. Similarly to monetary debt, technical debt is not necessarily a bad thing, and sometimes (e.g. as a proof-of-concept) is required to move projects forward. On the other hand, some experts claim that the "technical debt" metaphor tends to minimize the ramifications, which results in insufficient prioritization of the necessary work to correct it.
As a change is started on a codebase, there is often the need to make other coordinated changes in other parts of the codebase or documentation. Changes required that are not completed are considered debt, and until paid, will incur interest on top of interest, making it cumbersome to build a project. Although the term is primarily used in software development, it can also be applied to other professions.
In a Dagstuhl seminar held in 2016, technical debt was defined by academic and industrial experts of the topic as follows: "In software-intensive systems, technical debt is a collection of design or implementation constructs that are expedient in the short term, but set up a technical context that can make future changes more costly or impossible. Technical debt presents an actual or contingent liability whose impact is limited to internal system qualities, primarily maintainability and evolvability."
Causes
Common causes of technical debt include:
Ongoing development, long series of project enhancements over time renders old solutions sub-optimal.
Insufficient up-front definition, where requirements are still being def |
https://en.wikipedia.org/wiki/FNAEG | The Fichier National Automatisé des Empreintes Génétiques () is the French national DNA database, used by both the national police force and local gendarmerie.
Origins and evolution
In June 1998, the Guigou law on the prevention of sexually-related crimes, passed by the Plural Left Lionel Jospin government, created a national DNA database. The implementation, originally planned for 1999, was finally completed in 2001, with the database itself located at Écully in the Rhône, managed by a subdirectorate of the technical and scientific departments of the French police force.
In the aftermath of the September 11 attacks on the USA in 2001, the French government increased the scope of the database to include DNA related to other serious criminal offences, such as voluntary manslaughter, criminal violence and terrorism.
A further 'law for interior safety' introduced on 18 March 2003 expanded the scope still further to cover almost all violent crimes to people or property, serious crimes such as drug trafficking, simple thefts, tags and dégradations, and finally almost all small offenses, but not traffic offenses or crimes committed abroad. Samples are taken from convicted persons and also from simple suspects. The law does not specify a minimum age.
In September 2009, Matthieu Bonduelle, the general secretary of the Syndicat de la Magistrature (the first syndicat of juges) has declared that "nobody defends a universal database, but, in fact, it is being done."
Relative size
As at 1 October 2003, FNAEG was understood to contain the DNA records of approximately 8,000 convicted criminals and another 3,200 suspects.
In 2006, this number was believed to now be in excess of 330,000 entries.
In May 2007, this number was believed to now be in excess of nearly 500,000 entries.
In December 2009, there were 1.27 million entries.
Privacy concerns
With the expansion of the database in 2003, it also became an offence for suspects to fail to provide a DNA sample, with punishme |
https://en.wikipedia.org/wiki/Journal%20of%20Applied%20Ichthyology | The Journal of Applied Ichthyology is a peer-reviewed scientific journal on ichthyology, marine biology, and oceanography published by Wiley-Blackwell. It is the official journal of the World Sturgeon Conservation Society and of the Deutsche Wissenschaftliche Kommission für Meeresforschung ("German Scientific Commission for the Exploration of the Sea"). The editor-in-chief is Christian Wolter.
The Journal of Applied Ichthyology was established as a separate journal in 1985, but merged with the Archive of Fishery and Marine Research in 2005. The latter journal had been established as Berichte der Deutschen Wissenschaftlichen Kommission für Meeresforschung, published from before World War I (with a hiatus for the war) until volume 24 in 1975–1976. It was then renamed to Meeresforschung: Reports on Marine Research (, ) and was published by Paul Parey Verlag in Hamburg from 1976 until 1991, when the last volume (nr. 33) appeared in print. From 1994 (nr. 42) until 2005 it was published as the Archive of Fishery and Marine Research (Archiv für Fischerei- und Meeresforschung; ). |
https://en.wikipedia.org/wiki/Water%20Talkies | Water Talkies are devices which makes talking underwater possible. They were invented by Richie Stachowski, Jr. in 1995 at age 11.
It is a colorful, cone-shaped device that amplifies voices underwater for up to . What started as one product turned into a company producing water toys "made by a kid for kids" - a line of eight pool toys.
Stachowski won the 1999 Entrepreneur of the Year Award, the youngest ever, for this invention.
See also
Megaphone |
https://en.wikipedia.org/wiki/Moll%27s%20gland | Moll's gland, also known as the gland of Moll or ciliary gland, is a modified apocrine sweat gland that is found on the margin of the eyelid. They are next to the base of the eyelashes, and anterior to the meibomian glands within the distal eyelid margin. These glands are relatively large and tubular-shaped. The glands of Moll are named after Dutch oculist Jacob Anton Moll (1832–1914).
Glands of Moll empty into the adjacent lashes. Glands of Moll and Zeis secrete sebum that keeps lashes supple.
The glands of Moll are prone to infection and blockage of its duct with sebum and cell debris. Blockage of the gland's duct causes swelling which can manifest itself as a stye.
See also
Meibomian gland
List of specialized glands within the human integumentary system
List of distinct cell types in the adult human body |
https://en.wikipedia.org/wiki/Corniculate | Corniculate, an Anglicisation of the Latin diminutives corniculata, corniculatum, and corniculatus, describes an object possessing hornlike extensions. The root is Latin cornu = "horn". The term is used to describe the shape of the corniculate cartilages of the larynx. The horned puffin (Fratercula corniculata) is named for its distinctive horn-like coloration. Likewise Oxalis corniculata (creeping woodsorrel) is named for its two erect capsules, which resemble little horns, and the bird's-foot trefoil Lotus corniculatus and goat's horn mangrove Aegiceras corniculatum are named for their horn-shaped fruits. |
https://en.wikipedia.org/wiki/Mummia | Mummia, mumia, or originally mummy referred to several different preparations in the history of medicine, from "mineral pitch" to "powdered human mummies". It originated from Arabic mūmiyā "a type of resinous bitumen found in Western Asia and used curatively" in traditional Islamic medicine, which was translated as pissasphaltus (from "pitch" and "asphalt") in ancient Greek medicine. In medieval European medicine, mūmiyā "bitumen" was transliterated into Latin as mumia meaning both "a bituminous medicine from Persia" and "mummy". Merchants in apothecaries dispensed expensive mummia bitumen, which was thought to be an effective cure-all for many ailments. It was also used as an aphrodisiac.
Beginning around the 12th century when supplies of imported natural bitumen ran short, mummia was misinterpreted as "mummy", and the word's meaning expanded to "a black resinous exudate scraped out from embalmed Egyptian mummies". This began a period of lucrative trade between Egypt and Europe, and suppliers substituted rare mummia exudate with entire mummies, either embalmed or desiccated. After Egypt banned the shipment of mummia in the 16th century, unscrupulous European apothecaries began to sell fraudulent mummia prepared by embalming and desiccating fresh corpses.
During the Renaissance, scholars proved that translating bituminous mummia as mummy was a mistake, and physicians stopped prescribing the ineffective drug. Artists in the 17–19th centuries still used ground up mummies to tint a popular oil-paint called mummy brown.
Terminology
The etymologies of both English mummia and mummy derive from Medieval Latin mumia, which transcribes Arabic mūmiyā "a kind of bitumen used medicinally; a bitumen-embalmed body" from mūm "wax (used in embalming)", which descend from Persian mumiya and mum.
The Oxford English Dictionary records the complex semantic history of mummy and mummia. Mummy was first recorded meaning "a medicinal preparation of the substance of mummies; hence, an u |
https://en.wikipedia.org/wiki/List%20of%20flags%20of%20Malta | The following is a list of flags of Malta.
National flags
Governmental flags
Military flags
Historical flags
Local Councils
Some flags had been used prior to the creation of local councils in 1993. The coats of arms of the local councils are officially recognised, however the flags are not and thus a number of variants exist. Since 1993, a new local council, Mtarfa, has been created, and the local councils of Attard, Birżebbuġa, Floriana, Kalkara, Lija, Mellieħa, Mġarr, Mosta, Nadur, Naxxar, Paola, Qrendi, Siġġiewi, Xgħajra and Żebbuġ have changed their flags and coats of arms. Some, such as Mosta, had minor differences, but others, like Xgħajra changed the arms completely.
Malta
Gozo
Political flags
Religious flags
See also
Flag of Malta
Coat of arms of Malta |
https://en.wikipedia.org/wiki/Ferranti%20Orion | The Orion was a mid-range mainframe computer introduced by Ferranti in 1959 and installed for the first time in 1961. Ferranti positioned Orion to be their primary offering during the early 1960s, complementing their high-end Atlas and smaller systems like the Sirius and Argus. The Orion was based on a new type of logic circuit known as "Neuron" and included built-in multitasking support, one of the earliest commercial machines to do so (the KDF9 being a contemporary).
Performance of the system was much less than expected and the Orion was a business disaster, selling only about eleven machines. The Orion 2 project was quickly started to address its problems, and five of these were sold. Its failure was the capstone to a long series of losses for the Manchester labs, and with it, Ferranti management grew tired of the entire computer market. The division was sold to International Computers and Tabulators (ICT), who selected the Canadian Ferranti-Packard 6000 as their mid-range offering, ending further sales of the Orion 2.
History
Magnetic amplifiers
During the 1950s transistors were expensive and relatively fragile devices. Although they had advantages for computer designers, namely lower power requirements and their smaller physical packaging, vacuum tubes remained the primary logic device until the early 1960s. There was no lack of experimentation with other solid state switching devices, however.
One such system was the magnetic amplifier. Similar to magnetic core memory, or "cores", magnetic amplifiers used small toroids of ferrite as a switching element. When current passed through the core, a magnetic field would be induced that would reach a maximum value based on the saturation point of the material being used. This field induced a current in a separate read circuit, creating an amplified output with a known current. Unlike digital logic based on tubes or transistors, which uses defined voltages to represent values, magnetic amplifiers based their logic |
https://en.wikipedia.org/wiki/FEFLOW | FEFLOW (Finite Element subsurface FLOW system) is a computer program for simulating groundwater flow, mass transfer and heat transfer in porous media and fractured media. The program uses finite element analysis to solve the groundwater flow equation of both saturated and unsaturated conditions as well as mass and heat transport, including fluid density effects and chemical kinetics for multi-component reaction systems.
History
The software was firstly introduced by Hans-Jörg G. Diersch in 1979, see and. He developed the software in the Institute of Mechanics of the German Academy of Sciences Berlin up to 1990. In 1990 he was one of the founders of WASY GmbH of Berlin, Germany (the acronym WASY translates from German to Institute for Water Resources Planning and Systems Research), where FEFLOW has been developed further, continuously improved and extended as a commercial simulation package. In 2007 the shares of WASY GmbH were purchased by DHI. The WASY company has been fused and FEFLOW became part of the DHI Group software portfolio. FEFLOW is being further developed at DHI by an international team. Software distribution and services are worldwide.
Technology
The program is offered in both 32-bit and 64-bit versions for Microsoft Windows and Linux operating systems.
FEFLOW's theoretical basis is fully described in the comprehensive FEFLOW book. It covers a wide range of physical and computational issues in the field of porous/fractured-media modeling. The book starts with a more general theory for all relevant flow and transport phenomena on the basis of the continuum mechanics, systematically develops the basic framework for important classes of problems (e.g., multiphase/multispecies non-isothermal flow and transport phenomena, variably saturated porous media, free-surface groundwater flow, aquifer-averaged equations, discrete feature elements), introduces finite element methods for solving the basic multidimensional balance equations, in detail discusses a |
https://en.wikipedia.org/wiki/SahysMod | SahysMod is a computer program for the prediction of the salinity of soil moisture, groundwater and drainage water, the depth of the watertable, and the drain discharge in irrigated agricultural lands, using different hydrogeologic and aquifer conditions, varying water management options, including the use of ground water for irrigation, and several crop rotation schedules, whereby the spatial variations are accounted for through a network of polygons.
Rationale
There is a need for a computer program that is easier to operate and that requires a simpler data structure then most currently available models. Therefore, the SahysMod program was designed keeping in mind a relative simplicity of operation to facilitate the use by field technicians, engineers and project planners instead of specialized geo-hydrologists.
It aims at using input data that are generally available, or that can be estimated with reasonable accuracy, or that can be measured with relative ease. Although the calculations are done numerically and have to be repeated many times, the final results can be checked by hand using the formulas in this manual.
SahysMod's objective is to predict the long-term hydro-salinity in terms of general trends, not to arrive at exact predictions of how, for example, the situation would be on the first of April in ten years from now.
Further, SahysMod gives the option of the re-use of drainage and well water (e.g. for irrigation) and it can account for farmers' responses to waterlogging, soil salinity, water scarcity and over-pumping from the aquifer. Also it offers the possibility to introduce subsurface drainage systems at varying depths and with varying capacities so that they can be optimized.
Other features of SahysMod are found in the next section.
Methods
Calculation of aquifer conditions in polygons
The model calculates the ground water levels and the incoming and outgoing ground water flows between the polygons by a numerical solution of the well-known |
https://en.wikipedia.org/wiki/Taste%20receptor | A taste receptor or tastant is a type of cellular receptor which facilitates the sensation of taste. When food or other substances enter the mouth, molecules interact with saliva and are bound to taste receptors in the oral cavity and other locations. Molecules which give a sensation of taste are considered "sapid".
Vertebrate taste receptors are divided into two families:
Type 1, sweet, first characterized in 2001: –
Type 2, bitter, first characterized in 2000: In humans there are 25 known different bitter receptors, in cats there are 12, in chickens there are three, and in mice there are 35 known different bitter receptors.
Visual, olfactive, "sapictive" (the perception of tastes), trigeminal (hot, cool), mechanical, all contribute to the perception of taste. Of these, transient receptor potential cation channel subfamily V member 1 (TRPV1) vanilloid receptors are responsible for the perception of heat from some molecules such as capsaicin, and a CMR1 receptor is responsible for the perception of cold from molecules such as menthol, eucalyptol, and icilin.
Tissue distribution
The gustatory system consists of taste receptor cells in taste buds. Taste buds, in turn, are contained in structures called papillae. There are three types of papillae involved in taste: fungiform papillae, foliate papillae, and circumvallate papillae. (The fourth type - filiform papillae do not contain taste buds). Beyond the papillae, taste receptors are also in the palate and early parts of the digestive system like the larynx and upper esophagus. There are three cranial nerves that innervate the tongue; the vagus nerve, glossopharyngeal nerve, and the facial nerve. The glossopharyngeal nerve and the chorda tympani branch of the facial nerve innervate the TAS1R and TAS2R taste receptors. Next to the taste receptors in on the tongue, the gut epithelium is also equipped with a subtle chemosensory system that communicates the sensory information to several effector systems involved |
https://en.wikipedia.org/wiki/Dynamic%20application%20security%20testing | A dynamic application security testing (DAST) is a non functional testing process where one can assess an application using certain techniques and the end result of such testing process covers security weaknesses and vulnerabilities present in an application. This testing process can be carried out either in manual way or by using automated tools. Manual assessment of an application involves a more human intervention to identify the security flaws which might slip from an automated tool. Usually business logic errors, race condition checks, and certain zero day vulnerabilities can only be identified using manual assessments.
On the other side, a DAST tool is a program which communicates with a web application through the web front-end in order to identify potential security vulnerabilities in the web application and architectural weaknesses. It performs a black-box test. Unlike static application security testing tools, DAST tools do not have access to the source code and therefore detect vulnerabilities by actually performing attacks.
DAST tools allow sophisticated scans, detecting vulnerabilities with minimal user interactions once configured with host name, crawling parameters and authentication credentials. These tools will attempt to detect vulnerabilities in query strings, headers, fragments, verbs (GET/POST/PUT) and DOM injection.
Overview
DAST tools facilitate the automated review of a web application with the express purpose of discovering security vulnerabilities and are required to comply with various regulatory requirements. Web application scanners can look for a wide variety of vulnerabilities, such as input/output validation: (e.g. cross-site scripting and SQL injection), specific application problems and server configuration mistakes.
In a copyrighted report published in March 2012 by security vendor Cenzic, the most common application vulnerabilities in recently tested applications include:
Commercial and open-source scanners
Commercial scanner |
https://en.wikipedia.org/wiki/System%20on%20module | A system on a module (SoM) is a board-level circuit that integrates a system function in a single module. It may integrate digital and analog functions on a single board. A typical application is in the area of embedded systems. Unlike a single-board computer, a SoM serves a special function like a system on a chip (SoC). The devices integrated in the SoM typically requires a high level of interconnection for reasons such as speed, timing, bus width etc.. There are benefits in building a SoM, as for SoC; one notable result is to reduce the cost of the base board or the main PCB. Two other major advantages of SoMs are design-reuse and that they can be integrated into many embedded computer applications.
History
The acronym SoM has its roots in the blade-based modules. In the mid 1980s, when VMEbus blades used M-Modules, these were commonly referred to as system On a module (SoM). These SoMs performed specific functions such as compute functions and data acquisition functions. SoMs were used extensively by Sun Microsystems, Motorola, Xerox, DEC, and IBM in their blade computers.
Design
A typical SoM consists of:
at least one microcontroller, microprocessor or digital signal processor (DSP) core
multiprocessor systems-on-chip (MPSoCs) have more than one processor core
memory blocks including a selection of ROM, RAM, EEPROM and/or flash memory
timing sources
industry standard communication interfaces such as USB, FireWire, Ethernet, USART, SPI, I²C
peripherals including counter-timers, real-time timers and power-on reset generators
analog interfaces including analog-to-digital converters and digital-to-analog converters
voltage regulators and power management circuits
See also |
https://en.wikipedia.org/wiki/Circular%20buffer | In computer science, a circular buffer, circular queue, cyclic buffer or ring buffer is a data structure that uses a single, fixed-size buffer as if it were connected end-to-end. This structure lends itself easily to buffering data streams. There were early circular buffer implementations in hardware.
Overview
A circular buffer first starts out empty and has a set length. In the diagram below is a 7-element buffer:
Assume that 1 is written in the center of a circular buffer (the exact starting location is not important in a circular buffer):
Then assume that two more elements are added to the circular buffer — 2 & 3 — which get put after 1:
If two elements are removed, the two oldest values inside of the circular buffer would be removed. Circular buffers use FIFO (first in, first out) logic. In the example, 1 & 2 were the first to enter the circular buffer, they are the first to be removed, leaving 3 inside of the buffer.
If the buffer has 7 elements, then it is completely full:
A property of the circular buffer is that when it is full and a subsequent write is performed, then it starts overwriting the oldest data. In the current example, two more elements — A & B — are added and they overwrite the 3 & 4:
Alternatively, the routines that manage the buffer could prevent overwriting the data and return an error or raise an exception. Whether or not data is overwritten is up to the semantics of the buffer routines or the application using the circular buffer.
Finally, if two elements are now removed then what would be returned is not 3 & 4 but 5 & 6 because 5 & 6 are now the oldest elements, yielding the buffer with:
Uses
The useful property of a circular buffer is that it does not need to have its elements shuffled around when one is consumed. (If a non-circular buffer were used then it would be necessary to shift all elements when one is consumed.) In other words, the circular buffer is well-suited as a FIFO (first in, first out) buffer while a standard, |
https://en.wikipedia.org/wiki/Batyr | Batyr (May 24, 1970 – August 26, 1993) was an Asian elephant claimed to be able to use a large amount of meaningful human speech. Living in a zoo in Kazakhstan in the Soviet Union, Batyr was reported as having a vocabulary of more than 20 phrases.
A recording of Batyr saying "Batyr is good", his name and using words such as drink and give was played on Kazakh state radio and on the Soviet Central Television programme Vremya in 1980.
Like all cases of talking animals, these claims are subject to the observer-expectancy effect.
Biography
Born on May 24, 1970, at Almaty Zoo, Batyr lived his entire life in the Karaganda Zoo at Karaganda in Kazakhstan. He died in 1993. Batyr was the offspring of once-wild Indian elephants (a subspecies of the Asian elephant) and was the second child of his mother, Palm, (1959–1998) and father, Dubas, (1959–1978) presented to Kazakhstan's Almaty Zoo by the Indian Prime Minister Jawaharlal Nehru. The first baby elephant (Batyr's elder brother) was killed by his mother immediately after birth on May 15, 1968.
Abilities
Batyr, whose name is a Turkic word meaning 'dashing equestrian', 'man of courage' or 'athlete', was first alleged to speak just before New Year's Day in the winter of 1977 when he was seven years old. Zoo employees were the first to notice his "speech", but he soon delighted zoo-goers at large by appearing to ask his attendants for water and regularly praising or (infrequently) chastising himself. By 1979, his fame as the "speaking elephant" had spread in the wake of various mass-media stories about his abilities, many containing considerable fabrication and wild conjecture. Batyr's case was also included in several books on animal behaviour, and in the proceedings of several scientific conferences. These developments drew a spate of zoo visitors, and brought the offer of an exchange—Batyr for a rare bonobo—from the Czechoslovak Circus; an offer rejected by the zoo's employees.
A. N. Pogrebnoj-Aleksandroff, a young wor |
https://en.wikipedia.org/wiki/Carpus%20and%20tarsus%20of%20land%20vertebrates |
Carpals and tarsals
The carpus (wrist) and tarsus (ankle) of land vertebrates primitively had three rows of carpal or tarsal bones. Often some of these have become lost or fused in evolution.
Three proximals. In the hand humans have all three. In the foot the middle proximal appears in 5-15% of people as an os trigonum and can be involved in foot pain.
Centrale or os centrale, on the medial side. In humans and our closest relatives the African apes (chimpanzees and gorillas) it fuses to the scaphoid where it forms the articulation with the trapezoid bone; occasionally it stays separate. In Man's foot it is the navicular. Some early land vertebrates had more than one (up to three) os centrale per hand or foot (plural "(ossa) centralia").
Distals, one per finger / toe at the base of each metacarpal or metatarsal. In mammals the 4th and 5th fuse. In the horse the 1st is lost.
Figure to the right shows locations of rare accessory bones of the foot (presence variable from person to person):
1=Os cuneometatarsal I plantare, 2=os uncinatum, 3=os sesamoideum tibialis posterior, 4=os sesamoideum peroneum, 5=os cuboideum secundarium, 6=os trochleare calcanei, 7=os in sinus tarsi, 8=os sustentaculum tali, 9=os talocalcaneale posterius, 10=os aponeurosis plantaris, 11=os subcalcaneum, 12=os sesamoideum tibialis anterior, 13=os cuneometatarsal I tibiale, 14=os intermetatarsal I, 15=os cuneometatarsal II dorsale, 16=os paracuneiforme, 17=os cuneonaviculare, 18=os intercuneiforme, 19=os intermetatarsal IV, 20=/os talonaviculare, 21=os vesalianum pedis, 22=os tibiale externum, 23=os talotibiale dorsale, 24=os supratalare, 25=os calcaneus secundarius, 26=os subtibiale, 27=os subfibulare, 28=os retinaculi, 29=os calcaneus accessorius, 30=os trigonum, 31=os supracalcaneum, 32=os tendinis calcanei.
Comparative vertebrate anatomy
Abbreviations: A, Scaphoid bone; B, Lunate bone; C, Triquetrum; D, Trapezium; E, Trapezoid; F, Capitatum; G, Hamatum;
P, Pisiform; Cc, Centra |
https://en.wikipedia.org/wiki/Tesla%20%28microarchitecture%29 | Tesla is the codename for a GPU microarchitecture developed by Nvidia, and released in 2006, as the successor to Curie microarchitecture. It was named after the pioneering electrical engineer Nikola Tesla. As Nvidia's first microarchitecture to implement unified shaders, it was used with GeForce 8 Series, GeForce 9 Series, GeForce 100 Series, GeForce 200 Series, and GeForce 300 Series of GPUs collectively manufactured in 90 nm, 80 nm, 65 nm, 55 nm, and 40 nm. It was also in the GeForce 405 and in the Quadro FX, Quadro x000, Quadro NVS series, and Nvidia Tesla computing modules.
Tesla replaced the old fixed-pipeline microarchitectures, represented at the time of introduction by the GeForce 7 series. It competed directly with AMD's first unified shader microarchitecture named TeraScale, a development of ATI's work on the Xbox 360 which used a similar design. Tesla was followed by Fermi.
Overview
Tesla is Nvidia's first microarchitecture implementing the unified shader model. The driver supports Direct3D 10 Shader Model 4.0 / OpenGL 2.1 (later drivers have OpenGL 3.3 support) architecture. The design is a major shift for NVIDIA in GPU functionality and capability, the most obvious change being the move from the separate functional units (pixel shaders, vertex shaders) within previous GPUs to a homogeneous collection of universal floating point processors (called "stream processors") that can perform a more universal set of tasks.
GeForce 8's unified shader architecture consists of a number of stream processors (SPs). Unlike the vector processing approach taken with older shader units, each SP is scalar and thus can operate only on one component at a time. This makes them less complex to build while still being quite flexible and universal. Scalar shader units also have the advantage of being more efficient in a number of cases as compared to previous generation vector shader units that rely on ideal instruction mixture and ordering to reach peak throughput. The low |
https://en.wikipedia.org/wiki/Koala%20emblems%20and%20popular%20culture | Koala emblems and popular culture deals with the uses which have been made of the image of the Koala, such as coins, emblems, logos, mascots and in the naming of sports teams.
Australian emblems and logos
The Koala is the official fauna emblem of Queensland, Australia.
The Koala is the official fauna emblem for the Wildlife Preservation Society of Queensland.
Rugby union team Queensland Reds has the Koala as its logo.
Koala Corporation creates changing table that are seen in public restrooms.
United States mascots
The Koala is the official mascot of Columbia College, a formerly women-only college in Columbia, South Carolina.
The Koala is a student newspaper at the University of California, San Diego.
Lumpy The Koala is a mascot for WWE Super Show-Down
In popular culture
Blinky Bill is the koala star of several books, TV shows, a movie and games.
Nutsy is Blinky's friend then adopted sister in several books, TV shows, a movie and games.
Mrs. Koala is Blinky's mother in several books, TV shows, a movie.
Bunyip Bluegum is a koala in The Magic Pudding.
Buster Moon in Sing and its sequel.
Nigel an eccentric British koala in the 2006 Disney animated film The Wild.
The Australian version of the American Disney computer-animated film Zootopia has a koala as a newscaster character.
South Korean boyband BTS collaborated with Line Friends and released a set of characters called BT21; one of these characters, created by Namjoon, is a light blue koala named Koya.
TV and films
Star Trek: Lower Decks episode "Moist Vessel" reveals that the entire universe of the Star Trek franchise is carried in the back of a giant cosmic koala.
Qantas airlines used a Koala who continually complains about the airline's reliability in a series of television commercials.
An Australian children's show has animated characters headed by The Koala Brothers.
Coojee Bear was the koala friend of Australian entertainer Rolf Harris in his 1960s UK Television shows
In the animated series American Dad! |
https://en.wikipedia.org/wiki/Polyad | In mathematics, polyad is a concept of category theory introduced by Jean Bénabou in generalising monads. A polyad in a bicategory D is a bicategory morphism Φ from a locally punctual bicategory C to D, . (A bicategory C is called locally punctual if all hom-categories C(X,Y) consist of one object and one morphism only.) Monads are polyads where C has only one object.
Notes
Bibliography
Category theory |
https://en.wikipedia.org/wiki/Cellular%20microarray | A cellular microarray (or cell microarray) is a laboratory tool that allows for the multiplex interrogation of living cells on the surface of a solid support. The support, sometimes called a "chip", is spotted with varying materials, such as antibodies, proteins, or lipids, which can interact with the cells, leading to their capture on specific spots. Combinations of different materials can be spotted in a given area, allowing not only cellular capture, when a specific interaction exists, but also the triggering of a cellular response, change in phenotype, or detection of a response from the cell, such as a specific secreted factor.
There are a large number of types of cellular microarrays:
Reverse transfection cell microarrays. David M. Sabatini's laboratory developed reverse-transfection cell microarrays at the Whitehead Institute, publishing their work in 2001.
PMHC Cellular Microarrays. This type of microarray were developed by Daniel Chen, Yoav Soen, Dan Kraft, Patrick Brown and Mark Davis at Stanford University Medical Center. |
https://en.wikipedia.org/wiki/QMAP | QMAP was a balloon experiment to measure the anisotropy of the cosmic microwave background (CMB). It flew twice in 1996, and was used with an interlocking scan of the skies to produce CMB maps at angular scales between 0.7° and 9°.
The gondola was later used for ground-based observations as the MAT/TOCO experiment; so named because the instrument was called the Mobile Anisotropy Telescope and it was positioned at Cerro Toco in the Chilean Andes. It was the first such experiment to localize the position of the first acoustical peak in the CMB.
See also
Cosmic microwave background experiments
Observational cosmology |
https://en.wikipedia.org/wiki/TRPML | TRPML (transient receptor potential cation channel, mucolipin subfamily) comprises a group of three evolutionarily related proteins that belongs to the large family of transient receptor potential ion channels. The three proteins TRPML1, TRPML2 and TRPML3 are encoded by the mucolipin-1 (MCOLN1), mucolipin-2 (MCOLN2) and mucolipin-3 (MCOLN3) genes, respectively.
The three members of the TRPML ("ML" for mucolipin) sub-family are not extremely well characterized. TRPML1 is known to be localized in late endosomes. This subunit also contains a lipase domain between its S1 and S2 segments. While the function of this domain is unknown it has been proposed that it is involved in channel regulation. Physiological studies have described TRPML1 channels as proton leak channels in lysosomes responsible for preventing these organelles from becoming too acidic. TRPML2 and TRPML3 more poorly characterized than TRPML1.
Deficiencies can lead to enlarged vesicles.
Genes
(TRPML1)
(TRPML2)
(TRPML3) |
https://en.wikipedia.org/wiki/TRPP | TRPP (transient receptor potential polycystic) is a family of transient receptor potential ion channels which when mutated can cause polycystic kidney disease.
Subcategories
TRPP subunits can be divided into two subcategories depending on structural similarity.
Polycystic Kidney Disease 1 (PKD1)-Like Group
The first group, polycystic kidney disease 1 (PKD1)-like, contains polycystin-1 (Previously known as TRPP1), PKDREJ, PKD1L1, PKD1L2, and PKD1L3. Polycystin-1 contains numerous N-terminal adhesive domains that are important for cell-cell contact. This group of subunits also contain a large extracellular domain with numerous polycystin motifs. These motifs are of unknown function and are located between the S6 and S7 segments. The large intracellular C-terminal segment of TRPP1 seems to interact with TRPP2 to act as a signaling complex.
Polycystic Kidney Disease 2 (PKD2)-Like Group
This group of TRPP members (previously known as TRPP2-like) are: TRPP1 (previously known as TRPP2 or PKD2), TRPP2 (previously known as TRPP3 or PKDL2), and TRPP3 (previously known as TRPP5 or polycystin-L2). Unlike the previous group, which contain 11 membrane-spanning segments, this group resemble other TRP channels, having 6 membrane-spanning segments with intracellular N- and C-termini. All of the members of this group contain a coiled coil region in their C-terminus involved in the interaction with the polycystin-1 group. TRPP1 and TRPP3 form constitutively active cation-selective ion channels that are permeable to calcium. TRPP2 has also been implicated in sour taste perception. Coupling of PKD1 and TRPP1 recruits TRPP1 to the membrane. Here, its activity is decreased and it suppresses the activation of G proteins by PKD1.
Genes
Group 1: polycystic kidney disease 1 (PKD1) like proteins
PKD1
Group 2: polycystic kidney disease 2 (PKD2) like proteins
TRPP1
TRPP2
TRPP3
See also
Polycystic kidney disease |
https://en.wikipedia.org/wiki/TRPA%20%28ion%20channel%29 | TRPA is a family of transient receptor potential ion channels. The TRPA family is made up of 7 subfamilies: TRPA1, TRPA- or TRPA1-like, TRPA5, painless, pyrexia, waterwitch, and HsTRPA. TRPA1 is the only subfamily widely expressed across animals, while the other subfamilies (collectively referred to as the basal clade) are largely absent in deuterostomes (and in the case of HsTRPA, only expressed in hymenopteran insects).
TRPA1s have been the most extensively studied subfamily; they typically contain 14 N-terminal ankyrin repeats and are believed to function as mechanical stress, temperature, and chemical sensors. TRPA1 is known to be activated by compounds such as isothiocyanate (which are the pungent chemicals in substances such as mustard oil and wasabi) and Michael acceptors (e.g. cinnamaldehyde). These compounds are capable of forming covalent chemical bonds with the protein's cysteins. Non-covalent activators of TRPA1 also exists, such as methyl salicylate, menthol, and the synthetic compound PF-4840154.
The thermal sensitivity of TRPAs varies by species. For example, TRPA1 functions as a high-temperature sensor in insects and snakes, but as a cold sensor in mammals. The basal TRPAs have evolved some degree of thermal sensitivity as well: painless and pyrexia function in high-temperature sensing in Drosophila melanogaster, and the honey bee HsTRPA underwent neofunctionalization following its divergence from waterwitch, gaining function as a high-temperature sensor.
TRPA1s promiscuity with respect to sensory modality has been the source of controversy, particularly when considering its ability to detect cold. More recent work has alternatively (or additionally) proposed that reactive oxygen species activate TRPA1, across species. |
https://en.wikipedia.org/wiki/Polycystin%201 | Polycystin 1 (PC1) is a protein that in humans is encoded by the PKD1 gene. Mutations of PKD1 are associated with most cases of autosomal dominant polycystic kidney disease, a severe hereditary disorder of the kidneys characterised by the development of renal cysts and severe kidney dysfunction.
Protein structure and function
PC1 is a membrane-bound protein 4303 amino acids in length expressed largely upon the primary cilium, as well as apical membranes, adherens junctions, and desmosomes. It has 11 transmembrane domains, a large extracellular N-terminal domain, and a short (about 200 amino acid) cytoplasmic C-terminal domain. This intracellular domain contains a coiled-coil domain through which PC1 interacts with polycystin 2 (PC2), a membrane-bound Ca2+-permeable ion channel.
PC1 has been proposed to act as a G protein–coupled receptor. The C-terminal domain may be cleaved in a number of different ways. In one instance, a ~35 kDa portion of the tail has been found to accumulate in the cell nucleus in response to decreased fluid flow in the mouse kidney. In another instance, a 15 kDa fragment may be yielded, interacting with transcriptional activator and co-activator STAT6 and p100, or components of the canonical Wnt signaling pathway in an inhibitory manner.
The structure of the human PKD1-PKD2 complex has been solved by cryo-electron microscopy, which showed a 1:3 ratio of PKD1 and PKD2 in the structure. PKD1 consists of a voltage-gated ion channel fold that interacts with PKD2.
PC1 mediates mechanosensation of fluid flow by the primary cilium in the renal epithelium and of mechanical deformation of articular cartilage.
Gene
Splice variants encoding different isoforms have been noted for PKD1. The gene is closely linked to six pseudogenes in a known duplicated region on chromosome 16p. |
https://en.wikipedia.org/wiki/TRPM6 | TRPM6 is a transient receptor potential ion channel associated with hypomagnesemia with secondary hypocalcemia.
See also
TRPM
Ruthenium red |
https://en.wikipedia.org/wiki/TRPC6 | Transient receptor potential cation channel, subfamily C, member 6, also known as TRPC6, is a human gene encoding a protein of the same name. TRPC6 is a transient receptor potential channel of the classical TRPC subfamily. It has been associated with depression and anxiety (see below), as well as with focal segmental glomerulosclerosis (FSGS).
Interactions
TRPC6 has been shown to interact with:
FYN,
TRPC2, and
TRPC3.
Ligands
Two of the primary active constituents responsible for the antidepressant and anxiolytic benefits of Hypericum perforatum, also known as St. John's Wort, are hyperforin and adhyperforin. These compounds are inhibitors of the reuptake of serotonin, norepinephrine, dopamine, γ-aminobutyric acid, and glutamate, and they are reported to exert these effects by binding to and activating TRPC6. Recent results with hyperforin have cast doubt on these findings as similar currents are seen upon Hyperforin treatment regardless of the presence of TRPC6. |
https://en.wikipedia.org/wiki/Stretchable%20electronics | Stretchable electronics, also known as elastic electronics or elastic circuits, is a group of technologies for building electronic circuits by depositing or embedding electronic devices and circuits onto stretchable substrates such as silicones or polyurethanes, to make a completed circuit that can experience large strains without failure. In the simplest case, stretchable electronics can be made by using the same components used for rigid printed circuit boards, with the rigid substrate cut (typically in a serpentine pattern) to enable in-plane stretchability. However, many researchers have also sought intrinsically stretchable conductors, such as liquid metals.
One of the major challenges in this domain is designing the substrate and the interconnections to be stretchable, rather than flexible (see Flexible electronics) or rigid (Printed Circuit Boards). Typically, polymers are chosen as substrates or material to embed.
When bending the substrate, the outermost radius of the bend will stretch (see Strain in an Euler–Bernoulli beam, subjecting the interconnects to high mechanical strain. Stretchable electronics often attempts biomimicry of human skin and flesh, in being stretchable, whilst retaining full functionality. The design space for products is opened up with stretchable electronics, including sensitive electronic skin for robotic devices and in vivo implantable sponge-like electronics.
Strechable Skin electronics
Mechanical Properties of Skin
Skin is composed of collagen, keratin, and elastin fibers, which provide robust mechanical strength, low modulus, tear resistance, and softness. The skin can be considered as a bilayer of epidermis and dermis. The epidermal layer has a modulus of about 140-600 kPa and a thickness of 0.05-1.5 mm. Dermis has a modulus of 2-80 kPa and a thickness of 0.3–3 mm. This bilayer skin exhibits an elastic linear response for strains less than 15% and a non linear response at larger strains. To achieve conformability, it is p |
https://en.wikipedia.org/wiki/A%20Specimen%20of%20the%20Botany%20of%20New%20Holland | A Specimen of the Botany of New Holland, also known by its standard abbreviation Spec. Bot. New Holland, was the first published book on the flora of Australia. Written by James Edward Smith and illustrated by James Sowerby, it was published by Sowerby in four parts between 1793 and 1795. It consists of 16 colour plates of paintings by Sowerby, mostly based on sketches by John White, and around 40 pages of accompanying text. It was presented as the first volume in a series, but no further volumes were released.
Book
The work began as a collaboration between Smith and George Shaw. Together they produced a two-part work entitled Zoology and Botany of New Holland, with each part containing two zoology plates and two botany plates, along with accompanying text. These appeared in 1793, although the publications themselves indicate 1794. The collaboration then ended, and Shaw went on to independently produce his Zoology of New Holland. Smith's contributions to Zoology and Botany of New Holland became the first two parts of A Specimen of the Botany of New Holland, a further two parts of which were issued in 1795.
Australian plants listed
The book contained details of the following Australian plants:
Billardiera scandens
Tetratheca juncea
Ceratopetalum gummiferum
Banksia spinulosa (Hairpin Banksia)
Goodenia ramosissima, now Scaevola ramosissima
Platylobium formosum
Platylobium parviflorum, now Platylobium formosum subsp. parviflorum (not figured)
Embothrium speciosissimum, now Telopea speciosissima (New South Wales Waratah)
Embothrium silaifolium, now Lomatia silaifolia
Embothrium sericeum, now Grevillea sericea
E. s. var. minor, now Grevillea sericea
E. s. var. major, now Grevillea speciosa (Red Spider Flower)
E. s. var. angustifolia, now Grevillea linearifolia
Embothrium buxifolium, now Grevillea buxifolia (Grey Spider Flower)
Pimelea linifolia
Pultenaea stipularis
Eucalyptus robusta
Eucalyptus tereticornis (not figured)
Eucalyptus capitellata (not |
https://en.wikipedia.org/wiki/Lense%E2%80%93Thirring%20precession | In general relativity, Lense–Thirring precession or the Lense–Thirring effect (; named after Josef Lense and Hans Thirring) is a relativistic correction to the precession of a gyroscope near a large rotating mass such as the Earth. It is a gravitomagnetic frame-dragging effect. It is a prediction of general relativity consisting of secular precessions of the longitude of the ascending node and the argument of pericenter of a test particle freely orbiting a central spinning mass endowed with angular momentum .
The difference between de Sitter precession and the Lense–Thirring effect is that the de Sitter effect is due simply to the presence of a central mass, whereas the Lense–Thirring effect is due to the rotation of the central mass. The total precession is calculated by combining the de Sitter precession with the Lense–Thirring precession.
According to a 2007 historical analysis by Herbert Pfister, the effect should be renamed the Einstein–Thirring–Lense effect.
The Lense–Thirring metric
The gravitational field of a spinning spherical body of constant density was studied by Lense and Thirring in 1918, in the weak-field approximation. They obtained the metric
where the symbols represent:
the metric,
the flat-space line element in three dimensions,
the "radial" position of the observer,
the speed of light,
the gravitational constant,
the completely antisymmetric Levi-Civita symbol,
the mass of the rotating body,
the angular momentum of the rotating body,
the energy–momentum tensor.
The above is the weak-field approximation of the full solution of the Einstein equations for a rotating body, known as the Kerr metric, which, due to the difficulty of its solution, was not obtained until 1965.
The Coriolis term
The frame-dragging effect can be demonstrated in several ways. One way is to solve for geodesics; these will then exhibit a Coriolis force-like term, except that, in this case (unlike the standard Coriolis force), the force is not fictio |
https://en.wikipedia.org/wiki/Pilot%20%28operating%20system%29 | Pilot is a single-user, multitasking operating system designed by Xerox PARC in early 1977. Pilot was written in the Mesa programming language, totalling about 24,000 lines of code.
Overview
Pilot was designed as a single user system in a highly networked environment of other Pilot systems, with interfaces designed for inter-process communication (IPC) across the network via the Pilot stream interface. Pilot combined virtual memory and file storage into one subsystem, and used the manager/kernel architecture for managing the system and its resources.
Its designers considered a non-preemptive multitasking model, but later chose a preemptive (run until blocked) system based on monitors. Pilot included a debugger, Co-Pilot, that could debug a frozen snapshot of the operating system, written to disk.
A typical Pilot workstation ran 3 operating systems at once on 3 different disk volumes : Co-Co-Pilot (a backup debugger in case the main operating system crashed), Co-Pilot (the main operating system, running under co-pilot and used to compile and bind programs) and an inferior copy of Pilot running in a 3rd disk volume, that could be booted to run test programs (that might crash the main development environment).
The debugger was written to read and write variables for a program stored on a separate disk volume.
This architecture was unique because it allowed the developer to single-step even operating system code with semaphore locks, stored on an inferior disk volume. However, as the memory and source code of the D-series Xerox processors grew, the time to checkpoint and restore the operating system (known as a "world swap") grew very high. It could take 60-120 seconds to run just one line of code in the inferior operating system environment.
Eventually, a co-resident debugger was developed to take the place of Co-Pilot.
Pilot was used as the operating system for the Xerox Star workstation.
See also
Timeline of operating systems |
https://en.wikipedia.org/wiki/Nondeterministic%20programming | A nondeterministic programming language is a language which can specify, at certain points in the program (called "choice points"), various alternatives for program flow. Unlike an if-then statement, the method of choice between these alternatives is not directly specified by the programmer; the program must decide at run time between the alternatives, via some general method applied to all choice points. A programmer specifies a limited number of alternatives, but the program must later choose between them. ("Choose" is, in fact, a typical name for the nondeterministic operator.) A hierarchy of choice points may be formed, with higher-level choices leading to branches that contain lower-level choices within them.
One method of choice is embodied in backtracking systems (such as Amb, or unification in Prolog), in which some alternatives may "fail," causing the program to backtrack and try other alternatives. If all alternatives fail at a particular choice point, then an entire branch fails, and the program will backtrack further, to an older choice point. One complication is that, because any choice is tentative and may be remade, the system must be able to restore old program states by undoing side-effects caused by partially executing a branch that eventually failed.
Another method of choice is reinforcement learning, embodied in systems such as Alisp. In such systems, rather than backtracking, the system keeps track of some measure of success and learns which choices often lead to success, and in which situations (both internal program state and environmental input may affect the choice). These systems are suitable for applications to robotics and other domains in which backtracking would involve attempting to undo actions performed in a dynamic environment, which may be difficult or impractical.
See also
Nondeterminism (disambiguation)
Category: Nondeterministic programming languages
angelic non-determinism
demonic non-determinism |
https://en.wikipedia.org/wiki/Oracle%20Identity%20Management | Oracle Identity Management, a software suite marketed by Oracle Corporation, provides identity and access management (IAM) technologies.
The name of the software suite closely resembles the name of one of its components, Oracle Identity Manager.
Components
Sun rebranding
After Oracle acquired Sun Microsystems, they re-branded a number of products that overlapped in function. (See table below.) The re-branding, and Oracle's commitment to ongoing support and maintenance of these products were revealed by Hasan Rizvi, Senior Vice President of Oracle Fusion Middleware in an Oracle and Sun Identity Management Strategy webcast in 2010.
Other information
Originally, in the 10g and earlier versions, the Java-based portions of the suite ran mainly on OC4J, although some components (e.g. OIM) supported other J2EE appservers. For the 11g version, Oracle Corporation ported the OC4J-based components to WebLogic.
the software was undergoing Common Criteria evaluation process.
In March 2005 Oracle acquired Oblix and incorporated their web access control software into Oracle Identity Management.
See also
Oracle Directory Server Enterprise Edition
Oracle Internet Directory
Oracle Technology Network
Oracle Fusion Middleware |
https://en.wikipedia.org/wiki/Diallel%20cross | A diallel cross is a mating scheme used by plant and animal breeders, as well as geneticists, to investigate the genetic underpinnings of quantitative traits.
In a full diallel, all parents are crossed to make hybrids in all possible combinations. Variations include half diallels with and without parents, omitting reciprocal crosses. Full diallels require twice as many crosses and entries in experiments, but allow for testing for maternal and paternal effects. If such "reciprocal" effects are assumed to be negligible, then a half diallel without reciprocals can be effective.
Common analysis methods utilize general linear models to identify heterotic groups, estimate general or specific combining ability, interactions with testing environments and years, or estimates of additive, dominant, and epistatic genetic effects and genetic correlations.
Mating designs
There are four main types of diallel mating design:
Full diallel with parents and reciprocal F1 crosses
Full diallel as above, but excluding parents
Half diallel with parents, but without reciprocal crosses
Half diallel without parents or reciprocal crosses |
https://en.wikipedia.org/wiki/Sound%20%28nautical%29 | In nautical terms, the word sound is used to describe the process of determining the depth of water in a tank or under a ship. Tanks are sounded to determine if they are full (for cargo tanks) or empty (to determine if a ship has been holed) and for other reasons. Soundings may also be taken of the water around a ship if it is in shallow water to aid in navigation.
Methods
Tanks may be sounded manually or with electronic or mechanical automated equipment. Manual sounding is undertaken with a sounding line- a rope with a weight on the end. Per the Code of Federal Regulations, most steel vessels with integral tanks are required to have sounding tubes and reinforcing plates under the tubes which the weight strikes when it reaches the bottom of the tank. Sounding tubes are steel pipes which lead upwards from the ships' tanks to a place on deck.
Electronic and mechanical automated sounding may be undertaken with a variety of equipment including float level sensors, capacitance sensors, sonar, etc.
See also
Depth sounding
Sources
Code of Federal Regulations, Title 46
Nautical terminology
Navigational aids
Oceanography |
https://en.wikipedia.org/wiki/Visual%20cycle | The visual cycle is a process in the retina that replenishes the molecule retinal for its use in vision. Retinal is the chromophore of most visual opsins, meaning it captures the photons to begin the phototransduction cascade. When the photon is absorbed, the 11-cis retinal photoisomerizes into all-trans retinal as it is ejected from the opsin protein. Each molecule of retinal must travel from the photoreceptor cell to the RPE and back in order to be refreshed and combined with another opsin. This closed enzymatic pathway of 11-cis retinal is sometimes called Wald's visual cycle after George Wald (1906–1997), who received the Nobel Prize in 1967 for his work towards its discovery.
Retinal
Retinal is a chromophore that forms photosensitive Retinylidene proteins when covalently bound to proteins called opsins. Retinal can be photoisomerized by itself, but requires to be bound to an opsin protein to both trigger the phototransduction cascade and tune the spectral sensitivity to longer wavelengths, which enable color vision.
Retinal is a species of retinoid and the aldehyde form of Vitamin A. Retinal is interconvertible with retinol, the transport and storage form of vitamin A. During the visual cycle, retinal moves between several different isomers and is also converted to retinol and retinyl ester. Retinoids can be derived from the oxidation of carotenoids like beta carotene or can be consumed directly. To reach the retina, it is bound to Retinol Binding Protein (RBP) and Transthyretin, which prevents its filtration in the glomeruli.
As in transport via the RBP-Transthyretin pathway, retinoids must always be bound to Chaperone molecules, for several reasons. Retinoids are toxic, insoluble in aqueous solutions, and prone to oxidation, and as such they must be bound and protected when within the body. The body uses a variety of chaperones, particularly in the retina, to transport retinoids.
Overview
The visual cycle is consistent within mammals, and is summarized |
https://en.wikipedia.org/wiki/Scientists%20for%20Global%20Responsibility | Scientists for Global Responsibility (SGR) in the United Kingdom promotes the ethical practice and use of science, design and technology. SGR is affiliated to the International Network of Engineers and Scientists for Global Responsibility (INES). It is an independent UK-based membership organisation of hundreds of natural scientists, social scientists, engineers, IT professionals and architects. In 2017 its partner organization ICAN (International Campaign to Abolish Nuclear Weapons) won the Nobel Peace Prize. ICAN have promoted a Kurzgesagt YouTube video endorsed by the International Committee of the Red Cross and Crescent (ICRC) showing the consequences of a single atomic weapon exploded over a city.
SGR's work is focused on four main issues: security and disarmament; climate change and energy, including nuclear power; who controls science and technology?; emerging technologies. The main areas of concern are arms and arms control, including military involvement in UK universities; effect of excessive greenhouse gas emissions on climate; the nature of war and reducing barbarity; topsoil and water shortages resulting from modern agricultural methods; depletion of species of fish due to over-fishing; continual spread of nuclear weapons, and reduction of occurrence of serious nuclear accidents.
In 2019 SGR launched the journal Responsible Science. SGR evaluates the risk of new science and new technological solutions to older science-based problems and threats, while recognizing the enormous contribution science, design and technology has made to civilisation and human well-being.
SGR promotes science, design and technology that contribute to peace, social justice and environmental sustainability.
See also
Campaign for Nuclear Disarmament
Scientists against Nuclear Arms, a forerunner of SGR |
https://en.wikipedia.org/wiki/No%20instruction%20set%20computing | No instruction set computing (NISC) is a computing architecture and compiler technology for designing highly efficient custom processors and hardware accelerators by allowing a compiler to have low-level control of hardware resources.
Overview
NISC is a statically scheduled horizontal nanocoded architecture (SSHNA). The term "statically scheduled" means that the operation scheduling and Hazard handling are done by a compiler. The term "horizontal nanocoded" means that NISC does not have any predefined instruction set or microcode. The compiler generates nanocodes which directly control functional units, registers and multiplexers of a given datapath. Giving low-level control to the compiler enables better utilization of datapath resources, which ultimately result in better performance. The benefits of NISC technology are:
Simpler controller: no hardware scheduler, no instruction decoder
Better performance: more flexible architecture, better resource utilization
Easier to design: no need for designing instruction-sets
The instruction set and controller of processors are the most tedious and time-consuming parts to design. By eliminating these two, design of custom processing elements become significantly easier.
Furthermore, the datapath of NISC processors can even be generated automatically for a given application. Therefore, designer's productivity is improved significantly.
Since NISC datapaths are very efficient and can be generated automatically, NISC technology is comparable to high level synthesis (HLS) or C to HDL synthesis approaches. In fact, one of the benefits of this architecture style is its capability to bridge these two technologies (custom processor design and HLS).
Zero instruction set computer
In computer science, zero instruction set computer (ZISC) refers to a computer architecture based solely on pattern matching and absence of (micro-)instructions in the classical sense. These chips are known for being thought of as comparable to the n |
https://en.wikipedia.org/wiki/Stem%20Cell%20Research%20Enhancement%20Act | Stem Cell Research Enhancement Act was the name of two similar bills that both passed through the United States House of Representatives and Senate, but were both vetoed by President George W. Bush and were not enacted into law.
Stem Cell Research Enhancement Act of 2005
The Stem Cell Research Enhancement Act of 2005 () was the first bill ever vetoed by United States President George W. Bush, more than five years after his inauguration. The bill, which passed both houses of Congress, but by less than the two-thirds majority needed to override the veto, would have allowed federal funding of stem cell research on new lines of stem cells derived from discarded human embryos created for fertility treatments.
The bill passed the House of Representatives by a vote of 238 to 194 on May 24, 2005., then passed the Senate by a vote of 63 to 37 on July 18, 2006. President Bush vetoed the bill on July 19, 2006. The House of Representatives then failed to override the veto (235 to 193) on July 19, 2006.
Stem Cell Research Enhancement Act of 2007
The Stem Cell Research Enhancement Act of 2007 (), was proposed federal legislation that would have amended the Public Health Service Act to provide for human embryonic stem cell research. It was similar in content to the vetoed Stem Cell Research Enhancement Act of 2005.
The bill passed the Senate on April 11, 2007, by a vote of 63–34, then passed the House on June 7, 2007, by a vote of 247–176. President Bush vetoed the bill on June 19, 2007, and an override was not attempted.
Stem Cell Research Enhancement Act of 2009
The bill was re-introduced in the 111th Congress. It was introduced in the House by Representative Diana DeGette (D-CO) on February 4, 2009. A Senate version was introduced by Tom Harkin (D-IA) on February 26, 2009. The House bill had 113 co-sponsors and the Senate 10 co-sponsors, as of November 20, 2009.
Legislative history |
https://en.wikipedia.org/wiki/Open%20Verification%20Library | Open Verification Library (OVL) is a library of property checkers for digital circuit descriptions written in popular Hardware Description Languages (HDLs). OVL is currently maintained by Accellera.
Applications
OVL works by placing modules or components checking specific properties of the circuit alongside regular modules or components. Those special modules are called checkers and are tied to circuit signals via ports. Some aspects of the checker functionality can be modified by adjusting checker parameters. Typical properties verified by OVL checkers include:
condition that should be always met,
sequence of conditions that should be met,
condition that should never occur,
proper data value (even, odd, within a range, etc.),
proper value change (e.g. increment or decrement within specified range),
proper data encoding (e.g. one hot or one cold),
proper timing of event (within given number of clock cycles or within window created by trigger events),
valid protocol of data transmission,
valid behavior of popular building blocks (e.g. FIFOs).
Depending on the selected parameters, OVL checkers can work as assertion, assumption or coverage point checkers.
Main source of OVL popularity is the fact that it allows introducing high-level verification concepts to the existing or new designs without requiring new language, e.g. a designer having access to Verilog tools does not need a new language to start using property checking with OVL.
Supported Languages
While first versions of OVL supported Verilog and VHDL, most recent versions support (in alphabetical order):
PSL - Verilog flavour
SystemVerilog
Verilog
VHDL
Depending on the demand, support for two more languages may be added: PSL - VHDL flavour and SystemC.
External links
OVL section of the Accellera page
Hardware description languages |
https://en.wikipedia.org/wiki/Wolfgang%20Smith | Wolfgang Smith (born February 18, 1930 in Vienna, Austria) is a mathematician, physicist, philosopher of science, metaphysician, Roman Catholic and member of the Traditionalist School. He has written extensively in the field of differential geometry, as a critic of scientism and as a proponent of a new interpretation of quantum mechanics that draws heavily from premodern ontology and realism.
Biography
Smith graduated in 1948 from Cornell University with baccalaureate degrees in philosophy, physics, and mathematics. Two years later he obtained his M.S. in physics from Purdue University and, some time later, a Ph.D. in mathematics from Columbia University.
He worked as an aerodynamicist at Bell Aircraft Corporation, and while there researched and published on the problem of atmospheric reentry. He was a mathematics professor at MIT, UCLA and Oregon State University, doing research in the field of differential geometry and publishing in academic journals such as the Transactions of the American Mathematical Society, the Proceedings of the National Academy of Sciences, the American Journal of Mathematics, and others. He retired from academic life in 1992.
In parallel with his academic duties, he developed and still develops philosophical inquiries in the fields of metaphysics and the philosophy of science, publishing in specialized journals such as The Thomist, Sacred Web: A Journal of Tradition and Modernity, and Sophia: The Journal of Traditional Studies.
Philosophical work
Smith is a member of the Traditionalist School of metaphysics, having contributed extensively to its criticism of modernity while exploring the philosophical underpinnings of the scientific method and emphasizing the idea of bringing science back into a Platonist and Aristotelian framework of traditional ontological realism.
Identifying with Alfred North Whitehead's critique of the "bifurcationism" and "physical reductionism" of scientism — i.e., the belief that, first, the qualitative proper |
https://en.wikipedia.org/wiki/L%C3%A1szl%C3%B3%20R%C3%A9dei | László Rédei (15 November 1900 – 21 November 1980) was a Hungarian mathematician.
Rédei graduated from the University of Budapest and initially worked as a schoolteacher. In 1940 he was appointed professor in the University of Szeged and in 1967 moved to the Mathematical Institute of the Hungarian Academy of Sciences in Budapest.
His mathematical work was in algebraic number theory and abstract algebra, especially group theory. He proved that every finite tournament contains an odd number of Hamiltonian paths. He gave several proofs of the theorem on quadratic reciprocity. He proved important results concerning the invariants of the class groups of quadratic number fields. In several cases, he determined if the ring of integers of the real quadratic field Q() is Euclidean or not. He successfully generalized Hajós's theorem. This led him to the investigations of lacunary polynomials over finite fields, which he eventually published in a book. This work on lacunary polynomials has had a big influence in the field of finite geometry where it plays an important role in the theory of blocking sets. He introduced a very general notion of skew product of groups, of which both the Schreier-extension and the Zappa–Szép product are special case. He explicitly determined those finite noncommutative groups whose all proper subgroups were commutative (1947). This is one of the very early results which eventually led to the classification of all finite simple groups.
Rédei was the president of the János Bolyai Mathematical Society (1947–1949). He was awarded the Kossuth Prize twice. He was elected corresponding member (1949), full member (1955) of the Hungarian Academy of Sciences.
Books
1959: Algebra. Erster Teil, Mathematik und ihre Anwendungen in Physik und Technik, Reihe A, 26, Teil 1 Akademische Verlagsgesellschaft, Geest & Portig, K.-G., Leipzig, xv+797 pp.
1967: English translation, Algebra, volume 1, Pergamon Press
1963: Theorie der endlich erzeugbaren kommutative |
https://en.wikipedia.org/wiki/Vis5D | Vis5D is a 3D visualization system used primarily for animated 3D visualization of weather simulations. It was the first system to produce fully interactive animated 3D displays of time-dynamic volumetric data sets and the first open source 3D visualization system. It is GNU GPL licensed.
Design
Vis5D was created in response to two circumstances:
1. Output data from weather models and similar simulations are sampled on time sequences of regular 3D grids and are relatively straightforward to visualize.
2. The appearance in 1988 of commercial workstations such as the Stellar GS 1000 capable of rendering Gouraud-shaded 3D graphics fast enough for smooth animation.
Vis5D takes its name from its 5D array containing time sequences of 3D spatial grids for a set of physical parameters of the atmosphere or ocean. Its graphical user interface enables users to select from various ways of visualizing each parameter (e.g., iso-surfaces, plane slices, volume renderings), and to select a combination of parameters for view. A key innovation of Vis5D is that it computes and stores the geometries and colors for such graphics over the simulated time sequence, allowing them to be animated quickly so users can watch movies of their simulations. Furthermore, users can interactively rotate the animations in 3D.
Vis5D provides other visualization techniques. Users can drag a 3D cursor to a selected time and location, then trigger the calculation of a forward and backward wind trajectory from that point. Users can drag a vertical bar cursor and see, in another window, a thermodynamic diagram for the selected vertical column of atmosphere. And users can drag a 3D cursor to a selected time and location and read out individual values for parameters at that point. These examples all involve direct manipulation interfaces, as does the placement of plane slices through 3D grids.
Vis5D provides options for memory management, so that very large data sets can be visualized at individual time ste |
https://en.wikipedia.org/wiki/Mazur%27s%20lemma | In mathematics, Mazur's lemma is a result in the theory of normed vector spaces. It shows that any weakly convergent sequence in a normed space has a sequence of convex combinations of its members that converges strongly to the same limit, and is used in the proof of Tonelli's theorem.
Statement of the lemma
Let be a normed vector space and let be a sequence in that converges weakly to some in :
That is, for every continuous linear functional the continuous dual space of
Then there exists a function and a sequence of sets of real numbers
such that and
such that the sequence defined by the convex combination
converges strongly in to ; that is
See also |
https://en.wikipedia.org/wiki/Lynx%20Software%20Technologies | Lynx Software Technologies, Inc. (formerly LynuxWorks) is a San Jose, California software company founded in 1988. Lynx specializes in secure virtualization and open, reliable, certifiable real-time operating systems (RTOSes). Originally known as Lynx Real-Time Systems, the company changed its name to LynuxWorks in 2000 after acquiring, and merging with, ISDCorp (Integrated Software & Devices Corporation), an embedded systems company with a strong Linux background. In May 2014, the company changed its name to Lynx Software Technologies.
Over 30 years of processor evolution, Lynx has crafted and adapted platform architectures for builders of safety- and security-critical software systems. Lynx embraced open standards from its inception, with its original RTOS, LynxOS, featuring a UNIX-like user model and standard POSIX interfaces to embedded developers. LynxOS-178 is developed and certified to the FAA DO-178C DAL A safety standard and received the first and only FAA Reusable Software Component certificate for an RTOS. It supports ARINC API and FACE standards.
Lynx has created technology that has been deployed in thousands of designs and millions of products made by leading communications, industrial, transportation, avionics, aerospace/defense and consumer electronics companies. In 1989, LynxOS, the company's flagship RTOS, was selected for use in the NASA/IBM Space Station Freedom project. Lynx Software Technologies operating systems are also used in medical, industrial and communications systems around the world.
In early 2020, Lynx announced that the TR3 modernization program for the joint strike fighter had adopted Lynx’s LYNX MOSA.ic software development framework. The F-35 Lightning II Program (also known as the Joint Strike Fighter Program) is the US Department of Defense's focal point for defining affordable next generation strike aircraft weapon systems It is intended to replace a wide range of existing fighter, strike, and ground attack aircraft for the |
https://en.wikipedia.org/wiki/Tonelli%27s%20theorem%20%28functional%20analysis%29 | In mathematics, Tonelli's theorem in functional analysis is a fundamental result on the weak lower semicontinuity of nonlinear functionals on Lp spaces. As such, it has major implications for functional analysis and the calculus of variations. Roughly, it shows that weak lower semicontinuity for integral functionals is equivalent to convexity of the integral kernel. The result is attributed to the Italian mathematician Leonida Tonelli.
Statement of the theorem
Let be a bounded domain in -dimensional Euclidean space and let be a continuous extended real-valued function. Define a nonlinear functional on functions by
Then is sequentially weakly lower semicontinuous on the space for and weakly-∗ lower semicontinuous on if and only if the function defined by
is convex.
See also |
https://en.wikipedia.org/wiki/MIDI%20beat%20clock | MIDI beat clock, or simply MIDI clock, is a clock signal that is broadcast via MIDI to ensure that several MIDI-enabled devices such as a synthesizer or music sequencer stay in synchronization. Clock events are sent at a rate of 24 pulses per quarter note. Those pulses are used to maintain a synchronized tempo for synthesizers that have BPM-dependent voices and also for arpeggiator synchronization.
MIDI beat clock differs from MIDI timecode in that MIDI beat clock is tempo-dependent.
Location information can be specified using MIDI Song Position Pointer (SPP, see below), although many simple MIDI devices ignore this message.
Messages
MIDI beat clock defines the following real-time messages:
clock (decimal 248, hex 0xF8)
start (decimal 250, hex 0xFA)
continue (decimal 251, hex 0xFB)
stop (decimal 252, hex 0xFC)
MIDI also specifies a System Common message called Song Position Pointer (SPP). SPP can be used in conjunction with the above realtime messages for complete sync. This message consists of 3 bytes; a status byte (decimal 242, hex 0xF2), followed by two 7-bit data bytes (least significant byte first) forming a 14-bit value which specifies the number of "MIDI beats" (1 MIDI beat = a 16th note = 6 clock pulses) since the start of the song.
This message only needs to be sent once if a jump to a different position in the song is needed. Thereafter only realtime clock messages need to be sent to advance the song position one tick at a time.
See also
DIN sync
PPQN
Word clock
External links
Freeware to measure a midiclock beat signal
MAX/MSP documentation to their sync~ object
MIDI specification
Summary of MIDI messages
Song Position Pointer (SPP)
Encodings
MIDI standards
Synchronization |
https://en.wikipedia.org/wiki/Polyconvex%20function | In mathematics, the notion of polyconvexity is a generalization of the notion of convexity for functions defined on spaces of matrices. Let Mm×n(K) denote the space of all m × n matrices over the field K, which may be either the real numbers R, or the complex numbers C. A function f : Mm×n(K) → R ∪ {±∞} is said to be polyconvex if
can be written as a convex function of the p × p subdeterminants of A, for 1 ≤ p ≤ min{m, n}.
Polyconvexity is a weaker property than convexity. For example, the function f given by
is polyconvex but not convex. |
https://en.wikipedia.org/wiki/C.%20V.%20Durell | Clement Vavasor Durell (born 6 June 1882, Fulbourn, Cambridgeshire, died South Africa, 10 December 1968) was an English schoolmaster who wrote mathematical textbooks.
Background and early life
A son of John Vavasor Durell (1837–1923), Rector of Fulbourn, Cambridgeshire, and his wife Ellen Annie Carlyon, Durell had four older brothers. He was educated at Felsted School and Clare College, Cambridge (1900–1904), where he gained a first class in part two of the mathematics tripos and was seventh wrangler.
Career
Assistant master at Gresham's School, Holt, 1904–1905
Assistant master at Winchester College, 1910
Lieutenant in Royal Garrison Artillery during First World War
Mentioned in Dispatches
Housemaster of Chernocke House, Winchester College, 1920–1927
In 1900 he joined the Mathematical Association and in the 1900s was contributing articles on teaching to its journal, The Mathematical Gazette. After the First World War, he found a substantial second career and income in writing textbooks.
After spending most of his career teaching and writing about mathematics at Winchester, Durell retired to East Preston, Sussex, wintering in Madeira and South Africa, where he died in 1968.
His estate at death amounted to £200,098, which in the 1960s was a large fortune for the son of a clergyman to amass as a schoolmaster.
Books
Durell's textbooks were hugely successful from the 1920s, and by 1935 his publisher, G. Bell & Sons, was claiming:
There can indeed be few secondary schools in the English-speaking world in which some at least of Mr Durell's books are not now employed in the teaching of mathematics.
He collaborated on books with masters from other schools, such as R. M. Wright of Eton, A. W. Siddons of Harrow, C. O. Tuckey of Charterhouse, Alan Robson of Marlborough and G. W. Palmer of Christ's Hospital.
Durell's books cover all areas of school mathematics, including algebra, calculus, mechanics, geometry, and trigonometry, and include:
Elementary Problem Papers (A |
https://en.wikipedia.org/wiki/Pseudo-monotone%20operator | In mathematics, a pseudo-monotone operator from a reflexive Banach space into its continuous dual space is one that is, in some sense, almost as well-behaved as a monotone operator. Many problems in the calculus of variations can be expressed using operators that are pseudo-monotone, and pseudo-monotonicity in turn implies the existence of solutions to these problems.
Definition
Let (X, || ||) be a reflexive Banach space. A map T : X → X∗ from X into its continuous dual space X∗ is said to be pseudo-monotone if T is a bounded operator (not necessarily continuous) and if whenever
(i.e. uj converges weakly to u) and
it follows that, for all v ∈ X,
Properties of pseudo-monotone operators
Using a very similar proof to that of the Browder–Minty theorem, one can show the following:
Let (X, || ||) be a real, reflexive Banach space and suppose that T : X → X∗ is bounded, coercive and pseudo-monotone. Then, for each continuous linear functional g ∈ X∗, there exists a solution u ∈ X of the equation T(u) = g. |
https://en.wikipedia.org/wiki/Browder%E2%80%93Minty%20theorem | In mathematics, the Browder–Minty theorem (sometimes called the Minty–Browder theorem) states that a bounded, continuous, coercive and monotone function T from a real, separable reflexive Banach space X into its continuous dual space X∗ is automatically surjective. That is, for each continuous linear functional g ∈ X∗, there exists a solution u ∈ X of the equation T(u) = g. (Note that T itself is not required to be a linear map.)
The theorem is named in honor of Felix Browder and George J. Minty, who independently proved it.
See also
Pseudo-monotone operator; pseudo-monotone operators obey a near-exact analogue of the Browder–Minty theorem. |
https://en.wikipedia.org/wiki/RF%20and%20microwave%20filter | Radio frequency (RF) and microwave filters represent a class of electronic filter, designed to operate on signals in the megahertz to gigahertz frequency ranges (medium frequency to extremely high frequency). This frequency range is the range used by most broadcast radio, television, wireless communication (cellphones, Wi-Fi, etc.), and thus most RF and microwave devices will include some kind of filtering on the signals transmitted or received. Such filters are commonly used as building blocks for duplexers and diplexers to combine or separate multiple frequency bands.
Filter functions
Four general filter functions are desirable:
Band-pass filter: select only a desired band of frequencies
Band-stop filter: eliminate an undesired band of frequencies
Low-pass filter: allow only frequencies below a cutoff frequency to pass
High-pass filter: allow only frequencies above a cutoff frequency to pass
Filter technologies
In general, most RF and microwave filters are most often made up of one or more coupled resonators, and thus any technology that can be used to make resonators can also be used to make filters. The unloaded quality factor of the resonators being used will generally set the selectivity the filter can achieve. The book by Matthaei, Young and Jones provides a good reference to the design and realization of RF and microwave filters. Generalized filter theory operates with resonant frequencies and coupling coefficients of coupled resonators in a microwave filter.
Lumped-element LC filters
The simplest resonator structure that can be used in rf and microwave filters is an LC tank circuit consisting of parallel or series inductors and capacitors. These have the advantage of being very compact, but the low quality factor of the resonators leads to relatively poor performance.
Lumped-Element LC filters have both an upper and lower frequency range. As the frequency gets very low, into the low kHz to Hz range the size of the inductors used in the tank cir |
https://en.wikipedia.org/wiki/KEVA%20Planks | KEVA Planks are cuboid wooden block toys for children and adults. Each block is sized approximately . The blocks are available for sale in maple, that is produced in the United States, and less expensive imported pine versions.
KEVA Planks started out as a simple construction set that is unusual because they only use one piece and no connectors in glue, in contrast to other building sets that often have specific instructions and require sorting. It has developed into a teaching tool used in classrooms and enjoyed in homes.
A number of museums have KEVA exhibits for hands on experience with design and construction including:
Da Vinci Science Center of Allentown, PA
Exploration Place of The Sedgwick County Science and Discovery Center of Wichita, Kansas
Fleet Science Center in San Diego, CA
Kalamazoo Air Zoo of Kalamazoo, MI
Lawrence Hall of Science at University of California, Berkeley, CA
Rochester Museum and Science Center in Rochester, NY
Science World (Vancouver) in Vancouver, BC
Kaleideum of Winston-Salem, NC
Discovery Park of America in Union City, TN
The tallest tower built with KEVA planks was 51 feet, 8 inches constructed at the National Building Museum in 2006.
KEVA planks is a privately owned company located in Virginia. Mindware, a division of Oriental Trading subsidiary of Berkshire Hathaway, is the exclusive licensee of many KEVA Planks products.
KEVA Planks in Educational Settings
KEVA Planks are used in schools, libraries, museums, and maker spaces. They are a teaching tool that can be used as a manipulative to teach subjects including math, science, geography, history, and humanities. They were featured at Destination Imagination Global Finals in Knoxville, Tennessee in 2011.
Beginning in 2015, KEVA Planks traveled with Share Fair Nation STEMosphere events and was one of the most popular sessions in the professional development workshops. STEMosphere highlights innovative and creative teaching tools.
KEVA Planks were named number 3 |
https://en.wikipedia.org/wiki/Model%20of%20hierarchical%20complexity | The model of hierarchical complexity (MHC) is a framework for scoring how complex a behavior is, such as verbal reasoning or other cognitive tasks. It quantifies the order of hierarchical complexity of a task based on mathematical principles of how the information is organized, in terms of information science. This model was developed by Michael Commons and Francis Richards in the early 1980s.
Overview
The model of hierarchical complexity (MHC) is a formal theory and a mathematical psychology framework for scoring how complex a behavior is. Developed by Michael Lamport Commons and colleagues, it quantifies the order of hierarchical complexity of a task based on mathematical principles of how the information is organized, in terms of information science. Its forerunner was the general stage model.
Behaviors that may be scored include those of individual humans or their social groupings (e.g., organizations, governments, societies), animals, or machines. It enables scoring the hierarchical complexity of task accomplishment in any domain. It is based on the very simple notions that higher order task actions:
are defined in terms of the next lower ones (creating hierarchy);
organize the next lower actions;
organize lower actions in a non-arbitrary way (differentiating them from simple chains of behavior).
It is cross-culturally and cross-species valid. The reason it applies cross-culturally is that the scoring is based on the mathematical complexity of the hierarchical organization of information. Scoring does not depend upon the content of the information (e.g., what is done, said, written, or analyzed) but upon how the information is organized.
The MHC is a non-mentalistic model of developmental stages. It specifies 16 orders of hierarchical complexity and their corresponding stages. It is different from previous proposals about developmental stage applied to humans; instead of attributing behavioral changes across a person's age to the development of mental struc |
https://en.wikipedia.org/wiki/Bottleneck%20%28software%29 | In software engineering, a bottleneck occurs when the capacity of an application or a computer system is limited by a single component, like the neck of a bottle slowing down the overall water flow. The bottleneck has the lowest throughput of all parts of the transaction path.
System designers try to avoid bottlenecks through direct effort towards locating and tuning existing bottlenecks in a software application. Some examples of engineering bottlenecks that appear include the following: a processor, a communication link, and disk IO. A system or application will hit a bottleneck if the work arrives at a comparatively faster pace relative to other processing components. According to the theory of constraints, improving on the occurrences of hot-spot point of the bottleneck constraint improves the overall processing speed of the software. A thought-provoking stipulation of the theory reveals that improving the efficiency of a particular process stage rather than the constraint can generate even more delay and decrease overall processing capabilities of a software.
The process of tracking down bottlenecks (also referred as "hot spots" - sections of the code that execute most frequently - i.e. have the highest execution count) is called performance analysis. Reduction is achieved with the utilization of specialized tools such as performance analyzers or profilers, the objective being to make particular sections of code perform as effectively as possible to improve overall algorithmic efficiency.
See also
Performance engineering
Profiling (computer programming)
Program optimization |
https://en.wikipedia.org/wiki/Artificial%20gene%20synthesis | Artificial gene synthesis, or simply gene synthesis, refers to a group of methods that are used in synthetic biology to construct and assemble genes from nucleotides de novo. Unlike DNA synthesis in living cells, artificial gene synthesis does not require template DNA, allowing virtually any DNA sequence to be synthesized in the laboratory. It comprises two main steps, the first of which is solid-phase DNA synthesis, sometimes known as DNA printing. This produces oligonucleotide fragments that are generally under 200 base pairs. The second step then involves connecting these oligonucleotide fragments using various DNA assembly methods. Because artificial gene synthesis does not require template DNA, it is theoretically possible to make a completely synthetic DNA molecule with no limits on the nucleotide sequence or size.
Synthesis of the first complete gene, a yeast tRNA, was demonstrated by Har Gobind Khorana and coworkers in 1972. Synthesis of the first peptide- and protein-coding genes was performed in the laboratories of Herbert Boyer and Alexander Markham, respectively. More recently, artificial gene synthesis methods have been developed that will allow the assembly of entire chromosomes and genomes. The first synthetic yeast chromosome was synthesised in 2014, and entire functional bacterial chromosomes have also been synthesised. In addition, artificial gene synthesis could in the future make use of novel nucleobase pairs (unnatural base pairs).
Standard methods for DNA synthesis
Oligonucleotide synthesis
Oligonucleotides are chemically synthesized using building blocks called nucleoside phosphoramidites. These can be normal or modified nucleosides which have protecting groups to prevent their amines, hydroxyl groups and phosphate groups from interacting incorrectly. One phosphoramidite is added at a time, the 5' hydroxyl group is deprotected and a new base is added and so on. The chain grows in the 3' to 5' direction, which is backwards relative to biosy |
https://en.wikipedia.org/wiki/Representative%20elementary%20volume | In the theory of composite materials, the representative elementary volume (REV) (also called the representative volume element (RVE) or the unit cell) is the smallest volume over which a measurement can be made that will yield a value representative of the whole. In the case of periodic materials, one simply chooses a periodic unit cell (which, however, may be non-unique), but in random media, the situation is much more complicated. For volumes smaller than the RVE, a representative property cannot be defined and the continuum description of the material involves Statistical Volume Element (SVE) and random fields. The property of interest can include mechanical properties such as elastic moduli, hydrogeological properties, electromagnetic properties, thermal properties, and other averaged quantities that are used to describe physical systems.
Definition
Rodney Hill defined the RVE as a sample of a heterogeneous material that:
"is entirely typical of the whole mixture on average”, and
"contains a sufficient number of inclusions for the apparent properties to be independent of the surface values of traction and displacement, so long as these values are macroscopically uniform.”
In essence, statement (1) is about the material's statistics (i.e. spatially homogeneous and ergodic), while statement (2) is a pronouncement on the independence of effective constitutive response with respect to the applied boundary conditions.
Both of these are issues of mesoscale (L) of the domain of random microstructure over which smoothing (or homogenization) is being done relative to the microscale (d). As L/d goes to infinity, the RVE is obtained, while any finite mesoscale involves statistical scatter and, therefore, describes an SVE. With these considerations one obtains bounds on effective (macroscopic) response of elastic (non)linear and inelastic random microstructures. In general, the stronger the mismatch in material properties, or the stronger the departure from elastic |
https://en.wikipedia.org/wiki/Nvidia%20PureVideo | PureVideo is Nvidia's hardware SIP core that performs video decoding. PureVideo is integrated into some of the Nvidia GPUs, and it supports hardware decoding of multiple video codec standards: MPEG-2, VC-1, H.264, HEVC, and AV1. PureVideo occupies a considerable amount of a GPU's die area and should not be confused with Nvidia NVENC. In addition to video decoding on chip, PureVideo offers features such as edge enhancement, noise reduction, deinterlacing, dynamic contrast enhancement and color enhancement.
Operating system support
The PureVideo SIP core needs to be supported by the device driver, which provides one or more interfaces such as NVDEC, VDPAU, VAAPI or DXVA. One of these interfaces is then used by end-user software, for example VLC media player or GStreamer, to access the PureVideo hardware and make use of it.
Nvidia's proprietary device driver is available for multiple operating systems and support for PureVideo has been added to it. Additionally, a free device driver is available, which also supports the PureVideo hardware.
Linux
Support for PureVideo has been available in Nvidia's proprietary driver version 180 since October 2008 through VDPAU. Since April 2013 nouveau also supports PureVideo hardware and provides access to it through VDPAU and partly through XvMC.
Microsoft Windows
Microsoft's Windows Media Player, Windows Media Center and modern video players support PureVideo. Nvidia also sells PureVideo decoder software which can be used with media players which use DirectShow. Systems with dual GPU's either need to configure the codec or run the application on the Nvidia GPU to utilize PureVideo. Media players which use LAV, ffdshow or Microsoft Media Foundation codecs are able to utilize PureVideo capabilities.
OS X
OS X was sold with Nvidia hardware, so support is probably available.
PureVideo HD
PureVideo HD (see "naming confusions" below) is a label which identifies Nvidia graphics boards certified for HD DVD and Blu-ray Disc playba |
https://en.wikipedia.org/wiki/Prix%20Michel-Sarrazin | The Prix Michel-Sarrazin is awarded annually in the Canadian province of Quebec by the Club de Recherches Clinique du Québec to a celebrated Québécois scientist who, by their dynamism and productivity, have contributed in an important way to the advancement of research biomedical. It is named in honour of Michel Sarrazin (1659–1734) who was the first Canadian scientist.
Winners
Source: CRCQ
1977 – Michel Chrétien
1978 – Jean-Marie Delage
1979 – Guy Lemieux
1980 – Charles Philippe Leblond
1981 – René Simard
1982 – Louis Poirier
1983 – André Barbeau
1984 – Jacques R. Ducharme
1985 – André Lanthier
1986 – Claude Fortier
1987 – Domenico Regoli
1988 – Charles Scriver
1989 – Serge Carrière
1990 – Fernand Labrie
1991 – Étienne LeBel
1992 – Réginald Nadeau
1993 – Claude C. Roy
1994 – Jacques Leblanc
1995 – Clarke Fraser
1996 – Jacques Genest
1997 – Samuel Solomon
1998 – Jacques de Champlain
1999 – Claude Laberge
2000 – Martial G. Bourassa
2001 – Jean Davignon
2002 – Brenda Milner
2003 – Peter T. Macklem
2004 – Francis Glorieux
2005 – Pavel Hamet
2006 – Marek Rola-Pleszczynski
2007 – Rémi Quirion
2008 – Serge Rossignol
2009 – Jacques P. Tremblay
2010 – Michel Bouvier
2011 – Stanley Nattel
2012 – Michel L. Tremblay
2013 – Vassilios Papadopoulos
2014 – Roger Lecomte
2015 – Claude Perreault
2016 – Michel G. Bergeron
2017 – Anne-Marie Mes-Masson
2018 – William D. Fraser
See also
List of biochemistry awards
List of biomedical science awards
List of awards named after people |
https://en.wikipedia.org/wiki/Plantago%20maritima | Plantago maritima, the sea plantain, seaside plantain or goose tongue, is a species of flowering plant in the plantain family Plantaginaceae. It has a subcosmopolitan distribution in temperate and Arctic regions, native to most of Europe, northwest Africa, northern and central Asia, northern North America, and southern South America.
Description
It is a herbaceous perennial plant with a dense rosette of leaves without petioles. Each leaf is linear, 2–22 cm long and under 1 cm broad, thick and fleshy-textured, with an acute apex and a smooth or distantly toothed margin; there are three to five veins. The flowers are small, greenish-brown with brown stamens, produced in a dense spike 0.5–10 cm long on top of a stem 3–20 cm tall.
Subspecies
There are four subspecies:
Plantago maritima subsp. maritima. Europe, Asia, northwest Africa.
Plantago maritima subsp. borealis (Lange) A. Blytt and O. Dahl. Arctic regions. All parts of the plant small, compared to temperate plants.
Plantago maritima subsp. juncoides (Lam.) Hultén. South America, North America (this name to North American plants has been questioned).
Plantago maritima subsp. serpentina (All.) Arcang. Central Europe, on serpentine soils in mountains.
Ecology and physiology
In much of the range it is strictly coastal, growing on sandy soils. In some areas, it also occurs in alpine habitats, along mountain streams. Some of the physiology and metabolism of this species has been described, of particular note is how the metabolism of this species is altered with elevated atmospheric carbon dioxide concentrations.
Uses
Like samphires, the leaves of the plant are harvested to be eaten raw or cooked. The seeds are also eaten raw or cooked, and can be ground into flour. |
https://en.wikipedia.org/wiki/Li%20Huatian | Professor Li Huatian (1922–2007) was one of the first few computer scientists in China and was well known for his early contributions to the areas of computer science and computer networks.
Life and work
He was born on Jan 29, 1922 in Songjiang, Jiangsu (now Songjiang, Shanghai). He graduated from the National Southwestern Associated University with a degree in electrical engineering in 1943 and from Harvard University with a master's degree in 1948.
He returned to China in 1949 to start his research and teaching career as a university professor. He taught at Dalian University of Technology and Northeastern University. He served as the department chair of the departments of Automation and Computer Science and the university vice president at Northeastern University.
He also served as a vice president for IFAC, the International Federation of Automatic Control. He resigned administration positions in 1984 to return to full-time research and teaching. Meanwhile, he founded the first PhD program in computer science in China.
Till his final retirement in 1995, he had published numerous journal papers in areas of automatic control, computer theory, computer networks, and multimedia systems and brought up a lot of younger computer scientists in China. He also co-founded the Neusoft Group in early 1990s with his PhD student Liu Jiren. Professor Li died on Jan 24, 2007 in Shenzhen, China.
Chinese computer scientists
Theoretical computer scientists
Computer systems researchers
Harvard University alumni
Tsinghua University alumni
1922 births
2007 deaths
Educators from Shanghai
Academic staff of the Northeastern University (China)
Academic staff of Dalian University of Technology
Scientists from Shanghai
National Southwestern Associated University alumni |
https://en.wikipedia.org/wiki/Transsulfuration%20pathway | The transsulfuration pathway is a metabolic pathway involving the interconversion of cysteine and homocysteine through the intermediate cystathionine. Two transsulfurylation pathways are known: the forward and the reverse.
The forward pathway is present in several bacteria, such as Escherichia coli and Bacillus subtilis, and involves the transfer of the thiol group from cysteine to homocysteine (methionine precursor with the S-methyl group), thanks to the γ-replacement of the acetyl or succinyl group of a homoserine with cysteine via its thiol group to form cystathionine (catalysed by cystathionine γ-synthase, which is encoded by metB in E. coli and metI in B. subtilis). Cystathionine is then cleaved by means of the β-elimination of the homocysteine portion of the molecule leaving behind an unstable imino acid, which is attacked by water to form pyruvate and ammonia (catalysed by the metC-encoded cystathionine β-lyase).
The production of homocysteine through transsulfuration allows the conversion of this intermediate to methionine, through a methylation reaction carried out by methionine synthase.
The reverse pathway is present in several organisms, including humans, and involves the transfer of the thiol group from homocysteine to cysteine via a similar mechanism. In Klebsiella pneumoniae the cystathionine β-synthase is encoded by mtcB, while the γ-lyase is encoded by mtcC.
Humans are auxotrophic for methionine, hence it is called an "essential amino acid" by nutritionists, but are not for cysteine due to the reverse trans-sulfurylation pathway. Mutations in this pathway lead to a disease known as homocystinuria, due to homocysteine accumulation.
Role of pyridoxal phosphate
All four transsulfuration enzymes require vitamin B6 in its active form (pyridoxal phosphate or PLP). Three of these enzymes (cystathionine γ-synthase excluded) are part of the Cys/Met metabolism PLP-dependent enzyme family (type I PLP enzymes).
Direct sulfurization
The direct sulfurylatio |
https://en.wikipedia.org/wiki/Information%20rights%20management | Information rights management (IRM) is a subset of digital rights management (DRM), technologies that protect sensitive information from unauthorized access. It is sometimes referred to as E-DRM or Enterprise Digital Rights Management. This can cause confusion, because digital rights management (DRM) technologies are typically associated with business-to-consumer systems designed to protect rich media such as music and video. IRM is a technology which allows for information (mostly in the form of documents) to be ‘remote controlled’.
This means that information and its control can now be separately created, viewed, edited and distributed. A true IRM system is typically used to protect information in a business-to-business model, such as financial data, intellectual property and executive communications. IRM currently applies mainly to documents and emails.
Features
IRM technologies typically have a number of features that allow an owner to control, manage and secure information from unwanted access.
Information encryption
Information rights management solutions use encryption to prevent unauthorized access. A key or password can be used to control access to the encrypted data.
Permissions management
Once a document is encrypted against unauthorized users, an IRM user can apply certain access permissions that permit or deny a user from taking certain actions on a piece of information. Some of these standard permissions are included below.
Strong in use protection, such as controlling copy & paste, preventing screenshots, printing, editing.
A rights model/policy which allows for easy mapping of business classifications to information.
Offline use allowing for users to create/access IRM sealed documents without needing network access for certain periods of time.
Full auditing of both access to documents as well as changes to the rights/policy by business users.
It also allows users to change or revoke access permissions without sharing the document aga |
https://en.wikipedia.org/wiki/Phonological%20Awareness%20for%20Literacy | The Phonological Awareness for Literacy (PAL) Program (Burrows, Allison, Barnett, and Savina, 2007) is a commercial literacy therapy program for use by speech therapists designed to improve phonological awareness skills required for literacy in children aged 8 – 12. It aims to create and strengthen awareness of the relationship between phonological awareness skills to reading and writing.
Theoretical foundations
Adapted from Auditory Discrimination in Depth (Lindamood & Lindamood, 1975), which is now known as the Lindamood Phoneme Sequencing (LiPS) Program.
Intervention description
The PAL introduces identification, segmentation, blending and manipulation of speech sounds in syllables. It does not encourage reading using the whole-word approach instead teaching children to break written words up into individual graphemes and matching letters with their corresponding phonemes before reassembling the phonemes back into words to read.
Key skills taught
Developing an awareness of linguistic terms: Checks child's understanding of literacy terminology used and teaches the child how to talk about language (metalinguistic skills).
Sound–symbol association: Determines child's knowledge of how letters and sounds correspond, and that can be several representations of each sound.
Block representation of Consonant or vowel sequences: This component facilitates the child's ability to segment words into individual phonemes through developing auditory analysis skills. A single block represents an individual sound, and a row of blocks represent a string of sounds; so that the number of blocks directly correlates to the number of sounds in the sequence.
Block representation of syllables: Once the child understands that syllables consist of sounds, they then have to count the number of sounds, the order and distinguish between phonetic features. N.B. all block representation tasks deal only with non-words; this is to prevent the child from using pre-learned spelling pattern |
https://en.wikipedia.org/wiki/PlayStation%20Portable%20system%20software | The PlayStation Portable system software is the official firmware for the PlayStation Portable (PSP). It uses the XrossMediaBar (XMB) as its user interface, similar to the PlayStation 3 console.
Updates
Updates add new functionality as well as security patches to prevent unsigned code from being executed on the system. Updates can be obtained in four ways:
Direct download to the PSP over Wi-Fi. This can be performed by choosing [Settings], [System Update] from the XMB.
Download to a PC, then transfer to the PSP via a USB cable or Memory Stick.
Included on the UMD of some games. These games may not run with earlier firmware than the version on their UMD. See also List of PlayStation Portable system software compatibilities.
Download from a PS3 to a PSP system via USB cable (Japanese and American version only)
While system software updates can be used with consoles from any region, Sony recommends only downloading system software updates released for the region corresponding to the system's place of purchase. System software updates have added various features including a web browser, Adobe Flash Player 6 support, additional codecs for images, audio, and video, PlayStation 3 connectivity, as well as patches against several security exploits, vulnerabilities, and execution of homebrew programs. The battery must be at least 50% charged or else the system will prevent the update from installing. If the power supply is lost while writing to the system software, the console will no longer be able to operate unless the system is booted in service mode or sent to Sony for repair if still under warranty.
The current version of the software, 6.61, was made available on January 15, 2015. It is a minor update released more than three years after the release of the previous version 6.60 in 2011.
Technology
Graphical shell
The PlayStation Portable uses the XrossMediaBar (XMB) as its graphical user interface, which is also used in the PlayStation 3 (PS3) console, a vari |
https://en.wikipedia.org/wiki/Human%20Molecular%20Genetics | Human Molecular Genetics is a semimonthly peer-reviewed scientific journal published by the Oxford University Press. It covers all topics related to human molecular genetics. In addition, two "special review" issues are published each year. The editor-in-chief is CHaris Eng (Case Western Reserve University). The journal was established in 1992.
Abstracting and indexing
The journal is abstracted and indexed in:
According to the Journal Citation Reports, the journal has a 2020 impact factor of 6.150. |
https://en.wikipedia.org/wiki/Rod%20calculus | Rod calculus or rod calculation was the mechanical method of algorithmic computation with counting rods in China from the Warring States to Ming dynasty before the counting rods were increasingly replaced by the more convenient and faster abacus. Rod calculus played a key role in the development of Chinese mathematics to its height in Song Dynasty and Yuan Dynasty, culminating in the invention
of polynomial equations of up to four unknowns in the work of Zhu Shijie.
Hardware
The basic equipment for carrying out rod calculus is a bundle of counting rods and a counting board. The counting rods are usually made of bamboo sticks, about 12 cm- 15 cm in length, 2mm to 4 mm diameter, sometimes from animal bones, or ivory and jade (for well-heeled merchants). A counting board could be a table top, a wooden board with or without grid, on the floor or on sand.
In 1971 Chinese archaeologists unearthed a bundle of well-preserved animal bone counting rods stored in a silk pouch from a tomb in Qian Yang county in Shanxi province, dated back to the first half of Han dynasty (206 BC – 8AD). In 1975 a bundle of bamboo counting rods was unearthed.
The use of counting rods for rod calculus flourished in the Warring States, although no archaeological artefacts were found earlier than the Western Han Dynasty (the first half of Han dynasty; however, archaeologists did unearth software artefacts of rod calculus dated back to the Warring States); since the rod calculus software must have gone along with rod calculus hardware, there is no doubt that rod calculus was already flourishing during the Warring States more than 2,200 years ago.
Software
The key software required for rod calculus was a simple 45 phrase positional decimal multiplication table used in China since antiquity, called the nine-nine table, which were learned by heart by pupils, merchants, government officials and mathematicians alike.
Rod numerals
Displaying numbers
Rod numerals is the only numeric system that uses |
https://en.wikipedia.org/wiki/Vitascan | Vitascan (sometimes alternately spelled VitaScan) was an early color television camera system developed by American television equipment manufacturer DuMont Laboratories. Development began in 1949 and the product was released on an experimental basis in 1956. Vitascan was fully compatible with the NTSC color system, and DuMont Labs hoped the system would catch on in the television industry.
However, Vitascan cameras only worked indoors, due to Vitascan being in essence a flying-spot scanner based system. The system's camera basically worked in reverse by projecting a light through the camera's lens onto the subject from a cathode ray tube, or CRT, mounted behind the lens (instead of a pickup tube like conventional television cameras), providing the "flying spot". Four photomultiplier tubes (two for red, one for green, and one for blue) mounted inside special "scoops" placed in the studio and pointed at the subject would pick up the light from the camera's CRT and produce the final image to be televised.
Normally, with any flying-spot scanned system, the area between the flying-spot CRT and photomultiplier tubes (the whole studio in Vitascan's case) would have to be completely darkened, in order to prevent any other light, besides the light for the flying spot from the CRT, from interfering with the photomultiplier tubes. Darkening the whole room would make things quite inconvenient for any talent present in a Vitascan studio, but to get around this, strobe lighting was used in the studio for the aid of the talent. The strobe light, referred to as a "sync-lite" by DuMont, would light up only when the photomultiplier scoops were in the vertical blanking intervals of the video they would generate, to prevent any light interference to the photomultiplier tubes. Due to this, the system could not be used outdoors because sunlight would interfere during the scanning phase.
From 1956 to 1959, Vitascan cameras were in use at independent television station WITI in Mi |
https://en.wikipedia.org/wiki/North%20Vietnamese%20%C4%91%E1%BB%93ng | The đồng (Chữ Nôm: 銅; Chữ Hán: 元, nguyên) (; ) was the currency of North Vietnam from 3 November 1946 to 2 May 1978. It was subdivided into 10 hào, each itself divided into 10 xu.
History
The first đồng issued by the communists controlling northern Vietnam was introduced on January 31, 1946, and replaced the French Indochinese piastre at par. Two revaluations followed. In 1951, the second đồng was introduced at a rate of 1 1951 đồng = 100 1946 đồng. However, some sources say there were two consecutive revaluations in 1951 and 1953, each with factor of 10. In 1954, this became the currency of the newly recognized state of North Vietnam, with an exchange rate to the still circulating piastre and South Vietnamese đồng of 32 northern đồng = 1 piastre or southern đồng. In 1956, the đồng was pegged to the Chinese renminbi yuan at a rate of 1.47 đồng = 1 yuan.
On 28 February 1959, another đồng replaced the second at a rate of 1 1959 đồng = 1000 1951 đồng. An exchange rate with the Soviet rouble was established in 1961, with 3.27 đồng = 1 rouble. On May 3, 1978, following the unification of Vietnam, the đồng was also unified. 1 new đồng = 1 northern đồng = 0.8 southern "liberation" đồng.
Coins
1946 đồng
In 1946, aluminium 20 xu, 5 hào and 1 đồng and bronze 2 đồng were issued, with the 20 xu coins dated 1945. These were the only coins issued for this currency, with no coins at all issued for the 1951 đồng.
1958 đồng
In 1958, holed, aluminium coins in denominations of 1, 2 and 5 xu were introduced. These were the only coins issued in this currency.
Banknotes
1946 đồng
The government (Việt Nam Dân Chủ Cộng Hòa) issued two forms of paper money for this currency, "Vietnamese banknotes" (Giấy Bạc Việt Nam) and "Credit notes" (Tín Phiếu). In 1946, banknotes were introduced in denominations of 20 and 50 xu, 1, 5, 20, 50, 100 đồng, together with credit notes for 1 đồng. These were followed in 1948 by banknotes for 10 đồng and credit notes for 20 đồng, in 1949 by 500 đồng b |
https://en.wikipedia.org/wiki/Apple%20Communication%20Slot | The Apple Communication Slot, or Comm Slot, is an internal expansion data interface (slot) found in Apple Macintosh computers from the early to mid-1990s. It was designed as an inexpensive way to add communication expansion cards like network adapters or modems to Macs and Power Macs.
The slot exists in two forms. The original Communication Slot standard was introduced in the Macintosh LC 575 and can be identified by the notch toward its rear. This slot is based on the LC PDS. An updated PCI-based Communication Slot II debuted with the Performa 6360. This new slot moved the notch to the front so that incompatible cards could not be inserted.
In addition to the respective expansion bus pins, these slots also carried audio and serial lines. The serial bus was shared with the external modem port. Because the power and serial pins remained unchanged between the two slots, it was possible to design a universal modem card which could work in either. Network adapters, however, needed to be designed for one or the other.
A major disadvantage to both is that when a modem card is installed in the Communication Slot, the modem serial port on the back of the computer is disabled. Computers that came with this card installed had the modem port blanked out (though the connector was still present). Further, due to its unconventional architecture, the Performa 5200's printer port would be disabled if a network adapter was installed in the Communication Slot.
Compatible computers
Communication Slot
A Communication Slot (some documentation refers to this as a Communication Card I Slot) is found in some 68040 and PowerPC CPU Macs.
Macintosh 575 family
Macintosh 580 family
Macintosh 630 family
Power Macintosh/Performa 5200 family
Power Macintosh/Performa 5300 family
Power Macintosh/Performa 6200 family
Power Macintosh/Performa 6300 family (except 6360)
Communication Slot II
The Communication Slot II was used in the 6360 and later series of Power Macs and Performas.
Po |
https://en.wikipedia.org/wiki/Machine%20perception | Machine perception is the capability of a computer system to interpret data in a manner that is similar to the way humans use their senses to relate to the world around them. The basic method that the computers take in and respond to their environment is through the attached hardware. Until recently input was limited to a keyboard, or a mouse, but advances in technology, both in hardware and software, have allowed computers to take in sensory input in a way similar to humans.
Machine perception allows the computer to use this sensory input, as well as conventional computational means of gathering information, to gather information with greater accuracy and to present it in a way that is more comfortable for the user. These include computer vision, machine hearing, machine touch, and machine smelling, as artificial scents are, at a chemical compound, molecular, atomic level, indiscernible and identical.
The end goal of machine perception is to give machines the ability to see, feel and perceive the world as humans do and therefore for them to be able to explain in a human way why they are making their decisions, to warn us when it is failing and more importantly, the reason why it is failing. This purpose is very similar to the proposed purposes for artificial intelligence generally, except that machine perception would only grant machines limited sentience, rather than bestow upon machines full consciousness, self-awareness, and intentionality.
Machine vision
Computer vision is a field that includes methods for acquiring, processing, analyzing, and understanding images and high-dimensional data from the real world to produce numerical or symbolic information, e.g., in the forms of decisions. Computer vision has many applications already in use today such as facial recognition, geographical modeling, and even aesthetic judgment.
However, machines still struggle to interpret visual impute accurately if said impute is blurry, and if the viewpoint at which stimul |
https://en.wikipedia.org/wiki/Virtual%20Link%20Aggregation%20Control%20Protocol | Virtual LACP (VLACP) is an Avaya extension of the Link Aggregation Control Protocol to provide a Layer 2 handshaking protocol which can detect end-to-end failure between two physical Ethernet interfaces. It allows the switch to detect unidirectional or bi-directional link failures irrespective of intermediary devices and enables link recovery in less than one second.
With VLACP, far-end failures can be detected, which allows a Link aggregation trunk to fail over properly when end-to-end connectivity is not guaranteed for certain links through the internet in an aggregation group. When a remote link failure is detected, the change is propagated to the partner port.
See also
MLT
SMLT
RSMLT
External links
Virtual Link Aggregation Control Protocol (VLACP) Retrieved 29 July 2011
ERS-8600 All Documentation -Retrieved 29 July 2011
VSP 7000 Command Line Interface Commands Reference, Command: vlacp Retrieved 1 May 2020
Avaya
Ethernet
Link protocols
Network protocols
Network topology
Nortel protocols |
https://en.wikipedia.org/wiki/Operating%20system%20Wi-Fi%20support | Operating system Wi-Fi support is the support in the operating system for Wi-Fi and usually consists of two pieces: driver level support, and configuration and management support.
Driver support is usually provided by multiple manufacturers of the chip set hardware or end manufacturers. Also available are Unix clones such as Linux, sometimes through open source projects.
Configuration and management support consists of software to enumerate, join, and check the status of available Wi-Fi networks. This also includes support for various encryption methods. These systems are often provided by the operating system backed by a standard driver model. In most cases, drivers emulate an Ethernet device and use the configuration and management utilities built into the operating system. In cases where built-in configuration and management support is non-existent or inadequate, hardware manufacturers may include their own software to handle the respective tasks.
Microsoft Windows
Microsoft Windows has comprehensive driver-level support for Wi-Fi, the quality of which depends on the hardware manufacturer. Hardware manufacturers almost always ship Windows drivers with their products. Windows ships with very few Wi-Fi drivers and depends on the original equipment manufacturers (OEMs) and device manufacturers to make sure users get drivers. Configuration and management depend on the version of Windows.
Earlier versions of Windows, such as 98, ME and 2000 do not have built-in configuration and management support and must depend on software provided by the manufacturer
Microsoft Windows XP has built-in configuration and management support. The original shipping version of Windows XP included rudimentary support which was dramatically improved in Service Pack 2. Support for WPA2 and some other security protocols require updates from Microsoft. Many hardware manufacturers include their own software and require the user to disable Windows’ built-in Wi-Fi support.
Windows Vista, Win |
https://en.wikipedia.org/wiki/Bird%20colony | A bird colony is a large congregation of individuals of one or more species of bird that nest or roost in proximity at a particular location. Many kinds of birds are known to congregate in groups of varying size; a congregation of nesting birds is called a breeding colony. Colonial nesting birds include seabirds such as auks and albatrosses; wetland species such as herons; and a few passerines such as weaverbirds, certain blackbirds, and some swallows. A group of birds congregating for rest is called a communal roost. Evidence of colonial nesting has been found in non-neornithine birds (Enantiornithes), in sediments from the Late Cretaceous (Maastrichtian) of Romania.
Variations on colonial nesting in birds
Approximately 13% of all bird species nest colonially. Nesting colonies are very common among seabirds on cliffs and islands. Nearly 95% of seabirds are colonial, leading to the usage, seabird colony, sometimes called a rookery. Many species of terns nest in colonies on the ground. Herons, egrets, storks, and other large waterfowl also nest communally in what are called heronries. Colony nesting may be an evolutionary response to a shortage of safe nesting sites and abundance or unpredictable food sources which are far away from the nest sites. Colony-nesting birds often show synchrony in their breeding, meaning that chicks all hatch at once, with the implication that any predator coming along at that time would find more prey items than it could possibly eat.
What exactly constitutes a colony is a matter of definition. Tufted puffins, for example, are pelagic birds that nest on the steep slopes and rocky crevices on coastal cliffs, often on islands. Each pair excavates its own burrow. A congregation of puffin burrows on a marine island is considered a colony. Sand martins (called bank swallows in North America) are seldom, if ever, observed to nest in solitude; such a dependence on social nesting would term the bird a colonial nester. A more extreme example o |
https://en.wikipedia.org/wiki/Ephrin | Ephrins (also known as ephrin ligands or Eph family receptor interacting proteins) are a family of proteins that serve as the ligands of the Eph receptor. Eph receptors in turn compose the largest known subfamily of receptor protein-tyrosine kinases (RTKs).
Since ephrin ligands (ephrins) and Eph receptors (Ephs) are both membrane-bound proteins, binding and activation of Eph/ephrin intracellular signaling pathways can only occur via direct cell–cell interaction. Eph/ephrin signaling regulates a variety of biological processes during embryonic development including the guidance of axon growth cones, formation of tissue boundaries, cell migration, and segmentation. Additionally, Eph/ephrin signaling has been identified to play a critical role in the maintenance of several processes during adulthood including long-term potentiation, angiogenesis, and stem cell differentiation.
Classification
Ephrin ligands are divided into two subclasses of ephrin-A and ephrin-B based on their structure and linkage to the cell membrane. Ephrin-As are anchored to the membrane by a glycosylphosphatidylinositol (GPI) linkage and lack a cytoplasmic domain, while ephrin-Bs are attached to the membrane by a single transmembrane domain that contains a short cytoplasmic PDZ-binding motif. The genes that encode the ephrin-A and ephrin-B proteins are designated as EFNA and EFNB respectively. Eph receptors in turn are classified as either EphAs or EphBs based on their binding affinity for either the ephrin-A or ephrin-B ligands.
Of the eight ephrins that have been identified in humans there are five known ephrin-A ligands (ephrin-A1-5) that interact with nine EphAs (EphA1-8 and EphA10) and three ephrin-B ligands (ephrin-B1-3) that interact with five EphBs (EphB1-4 and EphB6). Ephs of a particular subclass demonstrate an ability to bind with high affinity to all ephrins of the corresponding subclass, but in general have little to no cross-binding to ephrins of the opposing subclass. However, |
https://en.wikipedia.org/wiki/Perfect%20Dark%20%28P2P%29 | is a peer-to-peer file-sharing (P2P) application from Japan designed for use with Microsoft Windows. It was launched in 2006. Its author is known by the pseudonym . Perfect Dark was developed with the intention for it to be the successor to both Winny and Share software. While Japan's Association for Copyright of Computer Software reported that in January 2014, the number of nodes connected on Perfect Dark () was less than on Share (), but more than on Winny (), Netagent in 2018 reported Winny being the largest with 50 000 nodes followed by Perfect Dark with 30 000 nodes followed by Share with 10 000. Netagent asserts that the number of nodes on Perfect Dark have fallen since 2015 while the numbers of Winny hold steady. Netagent reports that users of Perfect Dark are most likely to share books/manga.
As of version 1.02 (2008), code-named "Stand Alone Complex", there is support for the program to run in English, an option that can be selected when the program is installed.
Overview
Perfect Dark is still being actively developed. The author does not ask that the program's users at this point become dedicated "users" of the software. Instead, the author asks them to participate in the test phase. Through this test phase, the author hopes for bug reports and discussion that will help shape Perfect Dark into a better program.
DKT+DHT+DU
The author implements an architecture called DKT+DHT+DU in the design of the network. These three parts compose the entire network.
"DKT" stands for Distributed Keyword Table.
"DHT" for Distributed Hash Table.
"DU" for distributed Unity.
"DKT" is mainly for providing effective file searching while "DHT" and "DU" is used for effective file sharing and enhancing anonymity.
Network bandwidth requirement
Perfect Dark has higher bandwidth and hard drive space requirements than its predecessors Winny and Share. The minimum upload speed is 100 kbit/s.
Perfect Dark requires more network bandwidth and hard disk space than Winny or |
https://en.wikipedia.org/wiki/Trident%20laser | The Trident Laser was a high power, sub-petawatt class, solid-state laser facility located at Los Alamos National Laboratory (LANL website), in Los Alamos, New Mexico, originally built in the late 1980s for Inertial confinement fusion (ICF) research by KMS Fusion, founded by Kip Siegel, in Ann Arbor, Michigan, it was later moved to Los Alamos in the early 1990s to be used in ICF and materials research. The Trident Laser has been decommissioned, with final experiments in 2017, and is now in storage at the University of Texas at Austin.
The Trident Laser consisted of three main laser chains (A,B, and C) of neodymium glass amplifiers (or Nd:glass), two identical longpulse beams lines, A&B, and a third beamline, C, that could be operated either in longpulse or in chirped pulse amplification (CPA) shortpulse mode.
Longpulse beams A and B, were laser chains capable of delivering up to ~500 J at 1054 nm, which were frequency doubled to 527 nm and ~200 J depending on pulse duration; the pulse duration could be varied from 100 ps to 1 μs, and was a unique capability of any large laser in the US (and possibly the world). The third laser chain, beamline C, could produce up to ~200 J at 1054 nm, or could be frequency doubled to 527 nm at ~100 J in the longpulse mode with the same pulse duration variability as beams A and B; or could be used in the Trident enhancement configuration allowing the ~200 J beam to be compressed via CPA to ~600 fs and ~100 J, producing powers on the scale of a quarter petawatt(~200 TW) with a host of laser and plasma diagnostics. A 100 mJ 500 fs probe beamline is also available.
The 200TW shortpulse ultra high-intensity laser system is currently a world record holder in ion acceleration energy with Target Normal Sheath Acceleration mechanism, producing protons at 58.5 MeV from a flat-foil, beating the record of the NOVA Petawatt laser back in 1999; and 67.5 MeV protons from micro-cone targets. Trident delivers Petawatt performance at a fifth of |
https://en.wikipedia.org/wiki/Volatility%20%28finance%29 | In finance, volatility (usually denoted by σ) is the degree of variation of a trading price series over time, usually measured by the standard deviation of logarithmic returns.
Historic volatility measures a time series of past market prices. Implied volatility looks forward in time, being derived from the market price of a market-traded derivative (in particular, an option).
Volatility terminology
Volatility as described here refers to the actual volatility, more specifically:
actual current volatility of a financial instrument for a specified period (for example 30 days or 90 days), based on historical prices over the specified period with the last observation the most recent price.
actual historical volatility which refers to the volatility of a financial instrument over a specified period but with the last observation on a date in the past
near synonymous is realized volatility, the square root of the realized variance, in turn calculated using the sum of squared returns divided by the number of observations.
actual future volatility which refers to the volatility of a financial instrument over a specified period starting at the current time and ending at a future date (normally the expiry date of an option)
Now turning to implied volatility, we have:
historical implied volatility which refers to the implied volatility observed from historical prices of the financial instrument (normally options)
current implied volatility which refers to the implied volatility observed from current prices of the financial instrument
future implied volatility which refers to the implied volatility observed from future prices of the financial instrument
For a financial instrument whose price follows a Gaussian random walk, or Wiener process, the width of the distribution increases as time increases. This is because there is an increasing probability that the instrument's price will be farther away from the initial price as time increases. However, rather than increa |
https://en.wikipedia.org/wiki/Infinity%20%28philosophy%29 | In philosophy and theology, infinity is explored in articles under headings such as the Absolute, God, and Zeno's paradoxes.
In Greek philosophy, for example in Anaximander, 'the Boundless' is the origin of all that is. He took the beginning or first principle to be an endless, unlimited primordial mass (ἄπειρον, apeiron). The Jain metaphysics and mathematics were the first to define and delineate different "types" of infinities. The work of the mathematician Georg Cantor first placed infinity into a coherent mathematical framework. Keenly aware of his departure from traditional wisdom, Cantor also presented a comprehensive historical and philosophical discussion of infinity. In Christian theology, for example in the work of Duns Scotus, the infinite nature of God invokes a sense of being without constraint, rather than a sense of being unlimited in quantity.
Early thinking
Egyptian
Greek
Anaximander
An early engagement with the idea of infinity was made by Anaximander who considered infinity to be a foundational and primitive basis of reality. Anaximander was the first in the Greek philosophical tradition to propose that the universe was infinite.
Anaxagoras
Anaxagoras (500–428 BCE) was of the opinion that matter of the universe had an innate capacity for infinite division.
The Atomists
A group of thinkers of ancient Greece (later identified as the Atomists) all similarly considered matter to be made of an infinite number of structures as considered by imagining dividing or separating matter from itself an infinite number of times.
Aristotle and after
Aristotle, alive for the period 384–322 BCE, is credited with being the root of a field of thought, in his influence of succeeding thinking for a period spanning more than one subsequent millennium, by his rejection of the idea of actual infinity.
In Book 3 of the work entitled Physics, written by Aristotle, Aristotle deals with the concept of infinity in terms of his notion of actuality and of potentiality.
|
https://en.wikipedia.org/wiki/InterSwitch%20Trunk | InterSwitch Trunk (IST) is one or more parallel point-to-point links (Link aggregation) that connect two switches together to create a single logical switch. The IST allows the two switches to share addressing information, forwarding tables, and state information, permitting rapid (less than one second) fault detection and forwarding path modification. The link may have different names depending on the vendor. For example, Brocade calls this an Inter-Chassis Link (ICL). Cisco calls this a VSL (Virtual Switch Link).
Edge switches, servers or PCs see the two aggregate switches as one large switch. This allows any vendor's equipment configured to use the IEEE 802.3ad static link aggregation protocol to connect to both switches and take advantage of load balancing, redundant connections.
The IST protocol was developed by Nortel (now acquired by Avaya, which is now acquired by Extreme Networks) to enhance the capabilities of Link aggregation, and is required to be configured prior to configuring the SMLT, DSMLT or R-SMLT functions on the two aggregate (core, distribution, or access) switches. The edge equipment can be configured with any of the following; Multi-Link Trunking (MLT), DMLT, IEEE 802.3ad static link aggregation, IEEE 802.3ad Static Gigabit EtherChannel (GEC), IEEE 802.3ad Static Fast EtherChannel (FEC), SMLT, DSMLT, and other static link aggregation protocols.
Patent
United States Patent 7173934
Product support
IST is supported on Nortel's Routing Switch 1600, 5000, 8300, ERS 8600, MERS 8600 products and also on Avaya's Virtual Services Platform VSP 7000 and VSP 9000.
See also
Avaya
Avaya Government Solutions |
https://en.wikipedia.org/wiki/Maziacs | Maziacs is an action adventure maze game published by DK'Tronics in 1983 for the ZX Spectrum, Commodore 64, and MSX.
History
Maziacs, written by Don Priestley, was based on his earlier ZX81 game Mazogs which was published by Bug-Byte in 1982. Mazogs was one of the most successful ZX81 games so Don Priestley adapted it for the higher-resolution, colour-screen ZX Spectrum and MSX. The Commodore 64 port was written by Andy French.
Gameplay
Maziacs takes place in a randomly generated, scrolling, overhead-view maze, in which the player-controlled protagonist must find gold and exit the level. The gold is placed at least 200 moves from the start position, and the maze is patrolled by monsters called maziacs. Prisoners are sometimes found in the walls of the maze, who can highlight the path to the gold for a short period of time. Moving through the maze and fighting maziacs decreases the player's energy, which can be replenished by finding food. The main game screen shows one fiftieth of the maze, but a "view mode" expands the view to show one twelfth. Whilst this mode is useful for scouting purposes, the player cannot move whilst viewing it.
Maziacs can only be killed effectively with swords, several of which are found in the maze but can only be used once. A sword cannot be carried at the same time as the gold. These last two factors lead to the tactic of avoiding groups of maziacs, but killing as many as possible before collecting the gold.
Maziacs supported the Currah MicroSpeech peripheral.
Reception
When Maziacs was published, critical reception was good. CRASH magazine awarded 82%, highlighting the appealing graphics and animation. In a retrospective later in the year, CRASH criticized the slightly unresponsive keyboard controls and felt it was less addictive, but continued to praise the animation techniques.
Maziacs was ranked at number 99 in the Your Sinclair official top 100 ZX Spectrum games of all time, because of the game's claustrophobic atmosphere, c |
https://en.wikipedia.org/wiki/Digital%20Rights%20Ireland | Digital Rights Ireland is a digital rights advocacy and lobbying group based in Ireland. The group works for civil liberties in a digital age.
Telecommunications data retention
In 2012, the group brought an action before the Irish High Court, which subsequently made a reference to the Court of Justice of the European Union to take legal action over telecommunications data retention provided for by the Criminal Justice (Terrorist Offences) Act of 2005.
Digital Rights Ireland argues that the act led to Gardaí accessing retained data without having a specific crime to investigate, citing remarks by the Data Protection Commissioner.
On 8 April 2014, the Court of Justice of the European Union declared the Directive invalid in response to a case brought by Digital Rights Ireland against the Irish authorities and others.
File sharing
The Irish Recorded Music Association has sent letters to people it accuses of file sharing their music, demanding damages for financial losses. One issue is how the files belonging to the alleged file-sharers were searched. MediaSentry software was used to search their machines, but as it doesn't limit itself to searching only folders used for file sharing, this led to questions of violation of privacy. MediaSentry itself is based in the United States, which has less legislation about data protection than the European Union. This has been an issue in cases in the Netherlands and France.
Another issue is Internet service providers being compelled to identify users.
Current action still causes concern to DRI.
Former TD Dr. Jerry Cowley has requested that the complaints referee investigate whether his telephone is being tapped. DRI expressed concern, noting that there is no Irish equivalent of the Wilson Doctrine in Irish law. Fine Gael has also shown concern at the number of telephone taps authorised by former Minister for Justice Michael McDowell. DRI said that the reasons for withholding the information was unacceptable.
Other areas |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.