source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Mod%20openpgp | mod_openpgp was an Apache server module authored by Arturo 'Buanzo' Busleiman. The module implemented access authorization to servers, virtual hosts, or directories when incoming requests' HTTP OpenPGP signatures are valid and known by the local keyring. The module also allowed for the signing and encryption of HTTP requests, providing increased data integrity and confidentiality. The now defunct Enigform Mozilla Firefox extension implemented the client-side requirements of mod_openpgp.
Despite its innovative approach to HTTP request security, Mod_OpenPGP faced challenges due to the complexities of the OpenPGP standard. This resulted in the concept of signed/encrypted HTTP request enhancements sometimes falling behind other methodologies in terms of adoption and usability.
Prior to version 0.2.2, mod_openpgp was known as mod_auth_openpgp.
The author maintained his interest in OpenPGP, releasing a Python module that extends the famous requests module, with some OpenPGP capabilities.
mod_openpgp participated in the OWASP Summer of Code 2008.
Enigform was mentioned in a worldwide survey of encryption products conducted by Bruce Schneier, K. Seidel, and S. Vijayakumar, highlighting its role in addressing data security challenges.
Enigform received a Silver Award in the Security category at Les Trophées du Libre. |
https://en.wikipedia.org/wiki/Weather%20with%20You | "Weather with You" is a song by Australian-New Zealand rock band Crowded House. It was the third and most successful single released from the group's third studio album, Woodface (1991), reaching top 50 in 10 countries, including the United Kingdom, where it reached number seven. At the APRA Music Awards of 1994, the song won Most Performed Australian Work Overseas. The song was intended to be part of the Finn Brothers' unreleased 1990 debut, but after Capitol Records found the recordings, they were merged with a Crowded House session to become Woodface.
In 1996, Crowded House disbanded, releasing a greatest hits album Recurring Dream in June of that year. "Weather with You" was made the album's first track. Later in the year, the band reunited for one final performance at the Sydney Opera House and performed the song again, calling upon ex-member Tim Finn, who originally performed the song with the group, to join the group onstage. This live performance was not included on the VHS release of the concert, but it was shown on television broadcast and also appeared on the 10-year anniversary DVD entitled Farewell to the World.
Background
On his website, Neil Finn explained:
The first day we got together, we wrote "Weather with You" and [Tim Finn] had the title and the chorus line. 'Everywhere you go you always take the weather with you', and the opening line, 'Walking round the room singing stormy weather'. We started playing that and got the guitar riff going and wrote the whole thing on the first day, so it got off to a good start.
57 Mount Pleasant Street is a fictitious address as far as the number goes, but my sister used to live in a house in Mount Pleasant Road in Auckland and that’s what we were thinking of when we wrote the song. It was just a good contrast to the theme of the song for it to be called Mount Pleasant Street because really it was about a guy who's totally wrapped up in melancholia standing in his lounge room feeling lost.
He went on to say |
https://en.wikipedia.org/wiki/Remarriage | Remarriage is a marriage that takes place after a previous marital union has ended, as through divorce or widowhood.
Some individuals are more likely to remarry than others; the likelihood can differ based on previous relationship status (e.g. divorced vs. widowed), level of interest in establishing a new romantic relationship, gender, culture, and age among other factors. Those who choose not to remarry may prefer alternative arrangements like cohabitation or living apart together.
Remarriage also provides mental and physical health benefits. However, although remarried individuals tend to have better health than individuals who do not repartner, they still generally have worse health than individuals who have remained continuously married. Remarriage is addressed differently in various religions and denominations of those religions. Someone who repeatedly remarries is referred to as a serial wedder.
Remarriage following divorce or separation
As of 1995, depending on individual and contextual factors, up to 50% of couples in the USA ended their first marriage in divorce or permanent separation (i.e. the couple is not officially divorced but they no longer live together or share assets). Couples typically end their marriage because they are unhappy during the partnership; however, while these couples give up hope for their partner, this does not mean they give up on the institution of marriage. The majority of people who have divorced (close to 80%) go on to marry again. On average, they remarry just under 4 years after divorcing; younger adults tend to remarry more quickly than older adults. For women, just over half remarry in less than 5 years, and by 10 years after a divorce 75% have remarried.
People may be eager to remarry because they do not see themselves as responsible for the previous marriage ending. Generally, they are more likely to believe their partner's behaviors caused the divorce, and minimize the influence of their own actions. Therefore, they r |
https://en.wikipedia.org/wiki/Anticalin | Anticalin proteins are artificial proteins that are able to bind to antigens, either to proteins or to small molecules. They are not structurally related to antibodies, which makes them a type of antibody mimetic. Instead, they are derived from human lipocalins which are a family of naturally binding proteins. Anticalin proteins are being used in lieu of monoclonal antibodies, but are about eight times smaller with a size of about 180 amino acids and a mass of about 20 kDa.
The Anticalin technology is exclusively commercialized by Pieris Pharmaceuticals in Freising, Germany. Anticalin is a registered trademark of Pieris.
Properties
Anticalin proteins have better tissue penetration than antibodies and are stable at temperatures up to 70 °C. Unlike antibodies, they can be produced in bacterial cells like E. coli in large amounts.
While antibodies can only be directed at macromolecules such as proteins and at small molecules (haptens) only if bound to macromolecules, Anticalin proteins are able to selectively bind to small molecules as well.
They were mainly developed at the Technical University of Munich and are currently used as research tools. Diagnostic and therapeutic applications, including the use for targeted drug delivery, are being aimed at. The underlying technology was nominated for the German Future Prize in 2004.
Structure
Characteristic for Anticalin proteins is their barrel structure formed by eight antiparallel β-strands pairwise connected by loops and an attached α-helix.
The main structure of Anticalin proteins is identical to wild type lipocalins. Conformational deviations are primarily located in the four loops reaching in the ligand binding site. Mutagenesis of amino acids at the binding site allows for changing the affinity and selectivity. |
https://en.wikipedia.org/wiki/SABRENet | The South Australian Broadband Research & Education Network (SABRENet) is a fibre-optic broadband network linking the major research and education sites in metropolitan Adelaide, South Australia.
At over 110 km, SABRENet is the second largest underground network in Adelaide after Telstra's.
Sites connected to SABRENet include
All of Adelaide's university campuses
Most teaching hospitals
TAFE colleges
Some public high schools
Research precincts and science parks
The Techport Australia maritime precinct
Two AARNet POPs
SABRENet has been supported by the Australian Government under the Systemic Infrastructure Initiative, and forms part of the Australian Research and Education Network.
SABRENet Ltd is a non-profit public company formed by the SABRENet Members to build, own and operate SABRENet.
The SABRENet Ltd members are Flinders University, the South Australian Government, the
University of Adelaide and the University of South Australia.
See also
Systemic Infrastructure Initiative
AARNet
External links
SABRENet web site
'Grid Today' article - SABRENet Brings High-Speed to Southern Australia
Media release - Premier of South Australia
Media Release - University of Adelaide
ABC TV - Behind the News
Academic computer network organizations
Telecommunications in Australia
Scientific organisations based in Australia
Economy of Adelaide
Organizations established in 2007
Education in Adelaide |
https://en.wikipedia.org/wiki/Code%3A%20The%20Hidden%20Language%20of%20Computer%20Hardware%20and%20Software | Code: The Hidden Language of Computer Hardware and Software (1999) is a book by Charles Petzold that seeks to teach how personal computers work at a hardware and software level. In the preface to the 2000 softcover edition, Petzold wrote that his goal was for readers to understand how computers work at a concrete level that "just might even rival that of electrical engineers and programmers" and that he "went as far back" as he could go in regard to the history of technological development. Petzold describes Code as being structured as moving "up each level in the hierarchy" in which computers are constructed. On June 10, 2022, Petzold announced that an expanded second edition would be published on August 19, 2022 and he is building a companion interactive website.
The idea of writing the book came to him in 1987 while writing a column called "PC Tutor" for PC Magazine.
Chapter outline
Best Friends
Codes and Combinations
Braille and Binary Codes
Anatomy of a Flashlight
Seeing Around Corners
Telegraphs and Relays
Our Ten Digits
Alternatives to Ten
Bit by Bit by Bit
Logic and Switches
Gates (Not Bill)
A Binary Adding Machine
But What About Subtraction?
Feedback and Flip-Flops
Bytes and Hex
An Assemblage of Memory
Automation
From Abaci to Chips
Two Classic Microprocessors
ASCII and a Cast of Characters
Get on the Bus
The Operating System
Fixed Point, Floating Point
Languages High and Low
The Graphical Revolution
Content
Petzold begins Code by discussing older technologies like Morse code, Braille, and Boolean logic, which he uses to explain vacuum tubes, transistors, and integrated circuits. Code is notable for its explanations of historical technologies in order to build the pieces for further understanding. Electricity is explained through the example of a basic flashlight, which is then expanded upon through the explanation of the electrical telegraph. He noted that "very smart people" had to go down the "dead ends" of mechanical compu |
https://en.wikipedia.org/wiki/Abel%27s%20binomial%20theorem | Abel's binomial theorem, named after Niels Henrik Abel, is a mathematical identity involving sums of binomial coefficients. It states the following:
Example
The case m = 2
See also
Binomial theorem
Binomial type |
https://en.wikipedia.org/wiki/Bounded%20deformation | In mathematics, a function of bounded deformation is a function whose distributional derivatives are not quite well-behaved-enough to qualify as functions of bounded variation, although the symmetric part of the derivative matrix does meet that condition. Thought of as deformations of elasto-plastic bodies, functions of bounded deformation play a major role in the mathematical study of materials, e.g. the Francfort-Marigo model of brittle crack evolution.
More precisely, given an open subset Ω of Rn, a function u : Ω → Rn is said to be of bounded deformation if the symmetrized gradient ε(u) of u,
is a bounded, symmetric n × n matrix-valued Radon measure. The collection of all functions of bounded deformation is denoted BD(Ω; Rn), or simply BD, introduced essentially by P.-M. Suquet in 1978. BD is a strictly larger space than the space BV of functions of bounded variation.
One can show that if u is of bounded deformation then the measure ε(u) can be decomposed into three parts: one absolutely continuous with respect to Lebesgue measure, denoted e(u) dx; a jump part, supported on a rectifiable (n − 1)-dimensional set Ju of points where u has two different approximate limits u+ and u−, together with a normal vector νu; and a "Cantor part", which vanishes on Borel sets of finite Hn−1-measure (where Hk denotes k-dimensional Hausdorff measure).
A function u is said to be of special bounded deformation if the Cantor part of ε(u) vanishes, so that the measure can be written as
where H n−1 | Ju denotes H n−1 on the jump set Ju and denotes the symmetrized dyadic product:
The collection of all functions of special bounded deformation is denoted SBD(Ω; Rn), or simply SBD. |
https://en.wikipedia.org/wiki/Cylindrical%20algebraic%20decomposition | In mathematics, cylindrical algebraic decomposition (CAD) is a notion, and an algorithm to compute it, that are fundamental for computer algebra and real algebraic geometry. Given a set S of polynomials in Rn, a cylindrical algebraic decomposition is a decomposition of Rn into connected semialgebraic sets called cells, on which each polynomial has constant sign, either +, − or 0. To be cylindrical, this decomposition must satisfy the following condition: If 1 ≤ k < n and π is the projection from Rn onto Rn−k consisting in removing the last k coordinates, then for every pair of cells c and d, one has either π(c) = π(d) or π(c) ∩ π(d) = ∅. This implies that the images by π of the cells define a cylindrical decomposition of Rn−k.
The notion was introduced by George E. Collins in 1975, together with an algorithm for computing it.
Collins' algorithm has a computational complexity that is double exponential in n. This is an upper bound, which is reached on most entries. There are also examples for which the minimal number of cells is doubly exponential, showing that every general algorithm for cylindrical algebraic decomposition has a double exponential complexity.
CAD provides an effective version of quantifier elimination over the reals that has a much better computational complexity than that resulting from the original proof of Tarski–Seidenberg theorem. It is efficient enough to be implemented on a computer. It is one of the most important algorithms of computational real algebraic geometry. Searching to improve Collins' algorithm, or to provide algorithms that have a better complexity for subproblems of general interest, is an active field of research.
Implementations
Mathematica: CylindricalDecomposition
QEPCAD -- Quantifier Elimination by Partial Cylindrical Algebraic Decomposition
redlog
Maple: The RegularChains Library and ProjectionCAD |
https://en.wikipedia.org/wiki/Glycerol%20ester%20of%20wood%20rosin | Glycerol ester of wood rosin (or gum rosin), also known as glyceryl abietate or ester gum, is an oil-soluble food additive (E number E445). The food-grade material is used in foods, beverages, and cosmetics to keep oils in suspension in water, and its name may be shortened in the ingredient list as glycerol ester of rosin. It is also used as an ingredient in the production of chewing gum and ice cream.
To make the glycerol ester of wood rosin, refined wood rosin is reacted with glycerin to produce the glycerol ester.
Glycerol ester of wood rosin is an alternative to brominated vegetable oil in citrus oil-flavored soft drinks. In some cases, both ingredients are used together. |
https://en.wikipedia.org/wiki/Cellular%20waste%20product | Cellular waste products are formed as a by-product of cellular respiration, a series of processes and reactions that generate energy for the cell, in the form of ATP. One example of cellular respiration creating cellular waste products are aerobic respiration and anaerobic respiration.
Each pathway generates different waste products.
Aerobic respiration
When in the presence of oxygen, cells use aerobic respiration to obtain energy from glucose molecules.
Simplified Theoretical Reaction: C6H12O6 (aq) + 6O2 (g) → 6CO2 (g) + 6H2O (l) + ~ 30ATP
Cells undergoing aerobic respiration produce 6 molecules of carbon dioxide, 6 molecules of water, and up to 30 molecules of ATP (adenosine triphosphate), which is directly used to produce energy, from each molecule of glucose in the presence of surplus oxygen.
In aerobic respiration, oxygen serves as the recipient of electrons from the electron transport chain. Aerobic respiration is thus very efficient because oxygen is a strong oxidant.
Aerobic respiration proceeds in a series of steps, which also increases efficiency - since glucose is broken down gradually and ATP is produced as needed, less energy is wasted as heat. This strategy results in the waste products H2O and CO2 being formed in different amounts at different phases of respiration. CO2 is formed in Pyruvate decarboxylation, H2O is formed in oxidative phosphorylation, and both are formed in the citric acid cycle.
The simple nature of the final products also indicates the efficiency of this method of respiration. All of the energy stored in the carbon-carbon bonds of glucose is released, leaving CO2 and H2O. Although there is energy stored in the bonds of these molecules, this energy is not easily accessible by the cell. All usable energy is efficiently extracted.
Anaerobic respiration
Anaerobic respiration is done by aerobic organisms when there is not sufficient oxygen in a cell to undergo aerobic respiration as well as by cells called anaerobes that |
https://en.wikipedia.org/wiki/Logic%20redundancy | Logic redundancy occurs in a digital gate network containing circuitry that does not affect the static logic function. There are several reasons why logic redundancy may exist. One reason is that it may have been added deliberately to suppress transient glitches (thus causing a race condition) in the output signals by having two or more product terms overlap with a third one.
Consider the following equation:
The third product term is a redundant consensus term. If switches from 1 to 0 while and , remains 1. During the transition of signal in logic gates, both the first and second term may be 0 momentarily. The third term prevents a glitch since its value of 1 in this case is not affected by the transition of signal .
Another reason for logic redundancy is poor design practices which unintentionally result in logically redundant terms. This causes an unnecessary increase in network complexity, and possibly hampering the ability to test manufactured designs using traditional test methods (single stuck-at fault models). Testing might be possible using IDDQ models.
Removing logic redundancy
Logic redundancy is, in general, not desired.
Redundancy, by definition, requires extra parts (in this case: logical terms) which raises the cost of implementation (either actual cost of physical parts or CPU time to process).
Logic redundancy can be removed by several well-known techniques, such as Karnaugh maps, the Quine–McCluskey algorithm, and the heuristic computer method.
Adding logic redundancy
In some cases it may be desirable to add logic redundancy. One of those cases is to avoid race conditions whereby an output can fluctuate because different terms are "racing" to turn off and on. To explain this in more concrete terms the Karnaugh map to the right shows the minterms for the following function:
The boxes represent the minimal AND/OR terms needed to implement this function:
The k-map visually shows where race conditions occur in the minimal expression by h |
https://en.wikipedia.org/wiki/Gpg4win | Gpg4win is an email and file encryption package for most versions of Microsoft Windows and Microsoft Outlook, which utilises the GnuPG framework for symmetric and public-key cryptography, such as data encryption, digital signatures, hash calculations etc.
History of Gpg4win
The original creation of Gpg4win was initiated and funded by Germany's Federal Office for Information Security (BSI) in 2005, resulting in the release of Gpg4win 1.0.0 on 6 April 2006; however Gpg4win and all included tools are free and open source software, and it is typically the non-proprietary option for privacy recommended to Windows users.
As Gpg4win v1 was a much overhauled derivate of GnuPP, both were using GnuPG v1 for cryptographic operations and thus only supported OpenPGP as cryptography standard.
Hence in 2007 the development of a fundamentally enhanced version was started, also with support from the German BSI (Federal Office for Information Security); this effort culminated in the release of Gpg4win 2.0.0 on 7 August 2009 after a protracted beta testing phase, which was based on GnuPG 2.0, included S/MIME support, Kleopatra as a new certificate manager, the Explorer plug-in GpgEX for cryptography operations on files, basic support of smart cards, a full set of German dialogue texts in addition to the English ones, new manuals in English and German, plus many other enhancements.
In contrast to Gpg4win v2, which focused on new features and software components, the development of Gpg4win v3 focused on usability, plus consolidation of code and features: This resulted in the release of Gpg4win 3.0.0 on 19 September 2017 with proper support for Elliptic Curve Cryptography (ECC) by utilising GnuPG 2.2 (instead of 2.0), broadened, stabilised and enhanced smart card support, a fundamentally overhauled Outlook plug-in GpgOL for Outlook 2010 and newer, support of 64-bit versions of Outlook 2010 and newer, supporting dialogues in all languages which KDE supports etc. It is also distribute |
https://en.wikipedia.org/wiki/Pamela%20Low | Pamela Low (March 16, 1928 in Manchester, New Hampshire – June 1, 2007 in New London, New Hampshire) was an American flavorist, best known for developing and creating the flavor coating for Cap'n Crunch breakfast cereal.
Biography
Pamela Low was the daughter of Kneeland West and Pauline (Smith) Low. She graduated from the Pinkerton Academy in 1946 and studied microbiology at the University of New Hampshire where she graduated in 1951. She went on to work as a flavorist for the Arthur D. Little consulting firm in the Boston metropolitan area.
She was reportedly asked to develop a flavor for the new Cap'n Crunch cereal in the early 1960s. Her inspiration for the flavor coating was rice with a sauce composed of butter and brown sugar that her grandmother, Luella Low, used to serve to her family on Sundays as a child in Derry. Cap'n Crunch was officially unveiled in 1963 and the original recipe has been unchanged since its launch. She is often referred to as the "Grandmother" of Cap'n Crunch. She also worked on the flavors for Almond Joy and Mounds candy bars while at Arthur D. Little, where she worked for 34 years.
Pamela Low lived in New London, New Hampshire since 1973. She was President of the Baptist Women's Fellowship from 1987 to 1988, and of the New London Hospital Auxiliary in 1992. In 1996, she established a scholarship at the University of New Hampshire for students in clinical microbiology. She was also the President of the Women's Golf League of the country club of New Hampshire
Pamela Low died at the New London Hospital in New London, New Hampshire on June 1, 2007 at the age of 79. Her body lies at the Forest Hill Cemetery in East Derry, New Hampshire. Low never married nor did she have children. |
https://en.wikipedia.org/wiki/Molecular%20spring | A Molecular spring is a device or part of a biological system based on molecular mechanics and is associated with molecular vibration.
Any molecule can be deformed in several ways - A-A bond length, A-A-A angle, A-A-A-A torsion angle.
Deformed molecules store energy, which can be released and cause mechanical work as the molecules return into their optimal geometrical conformation.
The term molecular string is usually used in nano-science and molecular biology, however theoretically also macroscopic molecular springs can be considered, if it is manufactured. Such a device composed for example of arranged ultra-high molecular mass polymer fibres (Helicene, Polyacetylene) could store extraordinary (0.1-10MJ/kg in comparison to 0.0003MJ/kg of clockwork spring) amount of energy which can be stored and released almost instantly, with high energy conversion efficiency. The amount of energy storable in molecular spring is limited by the value of deformation the molecule can withstand until it undergoes chemical change. Manufacturing of such macroscopic device is however out of reach of contemporary technology, because of difficulties of synthesis and molecular arrangement of such long polymer molecules. In addition, the force needed to draw molecular string to its maximum length could be impractically high - comparable to the tensile strength of particular polymer molecule (~100GPa for some carbon compounds)
See also
Ultra high molecular weight polyethylene
Carbon nanotube
Carbon nanotube springs |
https://en.wikipedia.org/wiki/List%20of%20comets%20discovered%20by%20the%20LINEAR%20project | The following is a list of comets discovered, co-discovered and re-discovered by the Lincoln Laboratory Near-Earth Asteroid Research project (LINEAR), an Earth-based automated sky survey.
In comet nomenclature, the letter before the "/" is either "C" (a non-periodic comet), "P" (a periodic comet), "D" (a comet which has been lost or has disintegrated), "X" (a comet for which no reliable orbit could be calculated — usually historical comets), or "A" for an object that was mistakenly identified as a comet, but is a minor planet.
Numbered periodic comets
Unnumbered periodic comets
Non-periodic comets
See also
List of periodic comets
List of non-periodic comets
Minor Planet Center
Footnotes
External links
Minor Planet Center Periodic Comet Numbers
Cometography.com Periodic Comets
Seiichi Yoshida's Comet Catalog (includes a listing of unnumbered periodic comets)
Periodic comets on the Planetary Data System Small Bodies Node
LINEAR |
https://en.wikipedia.org/wiki/MonRoi | MonRoi, Inc. is a Montreal-based company that created a system to allow the recording of chess games in an electronic format. The system also allows for games to be broadcast via MonRoi's World Databank of Chess in realtime, as the games are being played.
MonRoi is one of five electronic scorekeeping devices that are approved for use during USCF rated games. The other four are the DGT Electronic Chessboard the eNotate computer program running on a Windows Mobile PDA, Plycounter, and ChessNoteR which uses the Android operating system and repurposes a Motorola Nexus 6 device to deliver its software.
The MonRoi system uses the Personal Chess Manager (PCM) to input moves on an electronic screen, similar to PDA's, rather than using the paper score sheet to record moves. The PCM stores the games for future retrieval or for downloading to a computer via a memory card. The system also allows for the Professional Tournament Manager (PTM) to be connected to a computer, allowing chess arbiters and organizers to monitor all the devices, collect the games for publication and to broadcast hundreds of games simultaneously on the Internet.
The MonRoi system has been approved for use by FIDE, the European Chess Union and the United States Chess Federation.
The MonRoi system was invented and patented by Brana Malobabic-Giancristofaro, an electrical engineer whose credentials include developing new technologies at Nortel Networks.
MonRoi, Inc. launched the first MonRoi International Women's Grand Prix, recognizing women in chess. The company collaborated with the European Chess Union, the Continental Chess Association, the Quebec Chess Federation, the Chess'n Math Association, the Susan Polgar Foundation and the Association of Chess Professionals. The Grand-Prix Finale was an eight-player round robin format tournament held in Montreal in July 2007. The host countries for the qualification events included Canada, Croatia, France, Germany, Gibraltar, Italy, Liechtenstein, and the |
https://en.wikipedia.org/wiki/Fusion%20mechanism | A fusion mechanism is any mechanism by which cell fusion or virus–cell fusion takes place, as well as the machinery that facilitates these processes. Cell fusion is the formation of a hybrid cell from two separate cells. There are three major actions taken in both virus–cell fusion and cell–cell fusion: the dehydration of polar head groups, the promotion of a hemifusion stalk, and the opening and expansion of pores between fusing cells. Virus–cell fusions occur during infections of several viruses that are health concerns relevant today. Some of these include HIV, Ebola, and influenza. For example, HIV infects by fusing with the membranes of immune system cells. In order for HIV to fuse with a cell, it must be able to bind to the receptors CD4, CCR5, and CXCR4. Cell fusion also occurs in a multitude of mammalian cells including gametes and myoblasts.
Viral mechanisms
Fusogens
Proteins that allow viral or cell membranes to overcome barriers to fusion are called fusogens. Fusogens involved in virus-to-cell fusion mechanisms were the first of these proteins to be discovered. Viral fusion proteins are necessary for membrane fusion to take place. There is evidence that ancestral species of mammals may have incorporated these same proteins into their own cells as a result of infection. For this reason, similar mechanisms and machinery are utilized in cell–cell fusion.
In response to certain stimuli, such as low pH or binding to cellular receptors, these fusogens will change conformation. The conformation change allows the exposure of hydrophobic regions of the fusogens that would normally be hidden internally due to energetically unfavorable interactions with the cytosol or extracellular fluid. These hydrophobic regions are known as fusion peptides or fusion loops, and they are responsible for causing localized membrane instability and fusion. Scientists have found the following four classes of fusogens to be involved with virus–cell or cell–cell fusions.
Class I |
https://en.wikipedia.org/wiki/Induced%20pluripotent%20stem%20cell | Induced pluripotent stem cells (also known as iPS cells or iPSCs) are a type of pluripotent stem cell that can be generated directly from a somatic cell. The iPSC technology was pioneered by Shinya Yamanaka and Kazutoshi Takahashi in Kyoto, Japan, who together showed in 2006 that the introduction of four specific genes (named Myc, Oct3/4, Sox2 and Klf4), collectively known as Yamanaka factors, encoding transcription factors could convert somatic cells into pluripotent stem cells. Shinya Yamanaka was awarded the 2012 Nobel Prize along with Sir John Gurdon "for the discovery that mature cells can be reprogrammed to become pluripotent."
Pluripotent stem cells hold promise in the field of regenerative medicine. Because they can propagate indefinitely, as well as give rise to every other cell type in the body (such as neurons, heart, pancreatic, and liver cells), they represent a single source of cells that could be used to replace those lost to damage or disease.
The most well-known type of pluripotent stem cell is the embryonic stem cell. However, since the generation of embryonic stem cells involves destruction (or at least manipulation) of the pre-implantation stage embryo, there has been much controversy surrounding their use. Patient-matched embryonic stem cell lines can now be derived using somatic cell nuclear transfer (SCNT).
Since iPSCs can be derived directly from adult tissues, they not only bypass the need for embryos, but can be made in a patient-matched manner, which means that each individual could have their own pluripotent stem cell line. These unlimited supplies of autologous cells could be used to generate transplants without the risk of immune rejection. While the iPSC technology has not yet advanced to a stage where therapeutic transplants have been deemed safe, iPSCs are readily being used in personalized drug discovery efforts and understanding the patient-specific basis of disease.
Yamanaka named iPSCs with a lower case "i" due to the popular |
https://en.wikipedia.org/wiki/Wildlife%20of%20Nigeria | The wildlife of Nigeria consists of the flora and fauna of this country in West Africa. Nigeria has a wide variety of habitats, ranging from mangrove swamps and tropical rainforest to savanna with scattered clumps of trees. About 290 mammal species and 940 bird species have been recorded in the country.
Geography
Nigeria is a large country in West Africa just north of the equator. It is bounded by Benin to the west, Niger to the north, Cameroon to the east and the Atlantic Ocean to the south. The country consists of several large plateaus separated by the valleys of the two major rivers, the Niger and the Benue, and their tributaries. These converge inland and flow into the Gulf of Guinea through a network of creeks and branches which form the extensive Niger Delta. Other rivers flow directly to the sea further west, with many smaller rivers being seasonal. The highest mountain is Chappal Waddi () on the Mambilla Plateau in the southeast of the country near the border with Cameroon. The Shere Hills () are another mountainous region located on the Jos Plateau in the center of the country. Major lakes include two reservoirs, Oguta Lake and Kainji Lake, and Lake Chad in the northeast. There are extensive coastal plains in the southwest and the southeast, and the coastline is low.
The wet season lasts from March to October, with winds from the southwest. The rest of the year is dry, with northeasterly harmattan winds blowing in from the Sahara. The coastal zone has between of rainfall per year, and the inland zones are drier except for the highland areas.
Flora
The most southerly part of the country is classified as "salt water swamp" or "mangrove swamp" because the vegetation consists primarily of mangroves. North of this is a fresh water swamp area containing salt-intolerant species such as the raffia palm, and north of this is rainforest. Further north again, the countryside becomes savanna with scattered groups of trees. A common species in riverine forests in |
https://en.wikipedia.org/wiki/Dry-ice%20blasting | Dry-ice blasting is a form of carbon dioxide cleaning, where dry ice, the solid form of carbon dioxide, is accelerated in a pressurized air stream and directed at a surface in order to clean it.
The method is similar to other forms of media blasting such as sand blasting, plastic bead blasting, or sodablasting in that it cleans surfaces using a media accelerated in a pressurized air stream, but dry-ice blasting uses dry ice as the blasting medium. Dry-ice blasting is nonabrasive, non-conductive, nonflammable, and non-toxic.
Dry-ice blasting is an efficient cleaning method. Dry ice is made of reclaimed carbon dioxide that is produced from other industrial processes, and is an approved media by the EPA, FDA and USDA. It also reduces or eliminates employee exposure to the use of chemical cleaning agents.
Compared to other media blasting methods, dry-ice blasting does not create secondary waste or chemical residues as dry ice sublimates, or converts back to a gaseous state, when it hits the surface that is being cleaned. Dry-ice blasting does not require clean-up of a blasting medium. The waste products, which includes just the dislodged media, can be swept up, vacuumed or washed away depending on the containment.
Method
Dry-ice blasting involves propelling pellets at extremely high speeds. The actual dry ice pellets are quite soft, and much less dense than other media used in blast-cleaning (i.e. sand or plastic pellets). Upon impact, the pellet sublimates almost immediately, transferring minimal kinetic energy to the surface on impact and producing minimal abrasion. The sublimation process absorbs a large volume of heat from the surface, producing shear stresses due to thermal shock. This is assumed to improve cleaning as the top layer of dirt or contaminant is expected to transfer more heat than the underlying substrate and flake off more easily. The efficiency and effectiveness of this process depends on the thermal conductivity of the substrate and contaminan |
https://en.wikipedia.org/wiki/FRIACO | FRIACO stands for Flat Rate Internet Access Call Origination. It refers to the unmetered access to dial-up Internet services. Telephone numbers used for such dial-up services are free-phone (or toll-free) numbers, so that the user of the service is not paying for the duration of the call in a metered way. Instead, an ISP (Internet service provider) would make other arrangements to cover costs through fixed subscriptions and/or advertising. The UK Government's regulatory body for communications, Ofcom, dealt with the introduction of FRIACO in the UK. |
https://en.wikipedia.org/wiki/SPIN%20%28operating%20system%29 | The SPIN operating system is a research project implemented in the computer programming language Modula-3, and is an open source project. It is designed with three goals: flexibility, safety, and performance. SPIN was developed at the University of Washington.
The kernel can be extended by dynamic loading of modules which implement interfaces that represent domains. These domains are defined by Modula-3 INTERFACE. All kernel extensions are written in Modula-3 safe subset with metalanguage constructs and type safe casting system. The system also issued a special run-time extension compiler.
One set of kernel extensions provides an application programming interface (API) that emulates the Digital UNIX system call interface. This allows Unix applications to run on SPIN. |
https://en.wikipedia.org/wiki/Peano%E2%80%93Russell%20notation | In mathematical logic, Peano–Russell notation was Bertrand Russell's application of Giuseppe Peano's logical notation to the logical notions of Frege and was used in the writing of Principia Mathematica in collaboration with Alfred North Whitehead:
"The notation adopted in the present work is based upon that of Peano, and the following explanations are to some extent modelled on those which he prefixes to his Formulario Mathematico." (Chapter I: Preliminary Explanations of Ideas and Notations, page 4)
Variables
In the notation, variables are ambiguous in denotation, preserve a recognizable identity appearing in various places in logical statements within a given context, and have a range of possible determination between any two variables which is the same or different. When the possible determination is the same for both variables, then one implies the other; otherwise, the possible determination of one given to the other produces a meaningless phrase. The alphabetic symbol set for variables includes the lower and upper case Roman letters as well as many from the Greek alphabet.
Fundamental functions of propositions
The four fundamental functions are the contradictory function, the logical sum, the logical product, and the implicative function.
Contradictory function
The contradictory function applied to a proposition returns its negation.
Logical sum
The logical sum applied to two propositions returns their disjunction.
Logical product
The logical product applied to two propositions returns the truth-value of both propositions being simultaneously true.
Implicative function
The implicative function applied to two ordered propositions returns the truth value of the first implying the second proposition.
More complex functions of propositions
Equivalence is written as , standing for .
Assertion is same as the making of a statement between two full stops.
An asserted proposition is either true or an error on the part of the writer.
Inference is equivalent t |
https://en.wikipedia.org/wiki/Gluten-sensitive%20enteropathy%E2%80%93associated%20conditions | Gluten-sensitive enteropathy–associated conditions are comorbidities or complications of gluten-related gastrointestinal distress (that is, gluten-sensitive enteropathy or GSE). GSE has key symptoms typically restricted to the bowel and associated tissues; however, there are a wide variety of associated conditions. These include bowel disorders (diarrhoea, constipation, irritable bowel), eosinophilic gastroenteritis and increase with coeliac disease (CD) severity. With some early onset and a large percentage of late onset disease, other disorders appear prior to the coeliac diagnosis or allergic-like responses (IgE or IgA, IgG) markedly increased in GSE. Many of these disorders persist on a strict gluten-free diet (GF diet or GFD), and are thus independent of coeliac disease after triggering. For example, autoimmune thyroiditis is a common finding with GSE.
However, GSEs' association with disease is not limited to common autoimmune diseases. Coeliac disease has been found at increased frequency on followup to many autoimmune diseases, some rare. Complex causes of autoimmune diseases often demonstrates only weak association with coeliac disease. The frequency of GSE is typically around 0.3 to 1% and lifelong risk of this form of gluten sensitivity increases in age, possibly as high as 2% for people over 60 years of age. This coincides with the period in life when late-onset autoimmune diseases also rise in frequency.
Genetic studies indicate that coeliac disease genetically links to loci shared by linkage with other autoimmune diseases. These linkages may be coincidental with how symptomatic disease is selected from a largely asymptomatic population.
Associated blood disorders
Deficiencies
Avitaminosis. Avitaminosis caused by malabsorption in GSE can result in decline of fat soluble vitamins and vitamin B, as well as malabsorption of essential fatty acids. This can cause a wide variety of secondary problems. Hypocalcinemia is also associated with GSE. In treat |
https://en.wikipedia.org/wiki/Nexus%20Hawk | The Nexus Hawk 4G is a gateway router linking broadband cellular data, such as CDMA, GSM and Wi-Fi (IEEE 802.11)a, b, g, n) and WAN (such as BGAN Satellite) networks providing enterprises with broadband wireless internet/network data services in mobile and remote environments.
The Nexus Hawk's original development was funded under a DOD (Department of Defense) prime contract. The technology was primarily designed for military use and supports public safety. The Nexus Hawk is currently in use by law enforcement agencies, governmental data infrastructure, commercial fleet, connectivity in and to retail locations, and livery services in Washington, DC.
The device provides secure access to public and private wired and wireless networks including, Sprint (CDMA EVDO Rev A, 1xRTT), Verizon Wireless LTE, CDMA EVDO Rev A 1xRTT, AT&T Wireless 4G, GSM /HSDPA, Telus HSDPA+, CDMA EVDO Rev A 1xRTT, Washington DC EVDO Rev A Regional Wireless Broadband Network (RWBN), non-U.S. cellular networks, and secure WiFi. GPS for applications such as Automatic Vehicle Location (AVL) sometimes commercial referred to as fleet tracking or Geo-Based Dispatch and Navigation. Connectivity to multiple simultaneous WAN via GIG ethernet, USB or WiFi paths with user-selectable order for failover and fail back. Access to 4 simultaneous WANS and GPS. Automatic and persistent network connections. Incorporates 2 USB and 4 PCI-M slots to accommodate future networks such as WiMAX and Public Safety Band), accepts ExpressCard 34mm air cards, PCMCIA CardBus air cards and USB air cards via adapter, Secure Remote Configuration Management, Built in IPsec and OpenVPN and pass through security features, FIPS140-2 SSL Certified Module.
See also
HSPA
Huawei E220
External links
Nexus Hawk Official website
Networking companies of the United States
Telecommunications equipment
Wireless networking hardware |
https://en.wikipedia.org/wiki/The%20Dan%20Le%20Batard%20Show%20with%20Stugotz | The Dan Le Batard Show with Stugotz is a syndicated sports talk show hosted by Dan Le Batard and Jon "Stugotz" Weiner broadcast out of Miami. It was also carried on many ESPN Radio Network affiliates nationwide and simulcast nationally on various ESPN platforms until the show's departure from ESPN in January 2021.
The show features commentary on the day's sports news, perspective on other news stories, interviews with sports analysts and athletes, as well as pop culture. The hosts are known for their self-deprecating humor, which carries over through running jokes.
History
The Dan Le Batard Show with Stugotz first aired on September 1, 2004, heard on AM 790 WAXY. After running for nine years on local radio, The Dan Le Batard Show debuted on ESPN Radio on September 30, 2013.
On February 14, 2007, the week of the 2007 NBA All-Star Game, former Miami Heat player Tim Hardaway appeared on the show. When asked if he would be accepting of a gay teammate, such as retired NBA center John Amaechi, Hardaway replied: "First of all, I wouldn't want him on my team." Hardaway continued, "You know, I hate gay people, so I let it be known," Hardaway said. "I don't like gay people and I don't like to be around gay people. I am homophobic. I don't like it. It shouldn't be in the world or in the United States." NBA commissioner David Stern, upon learning of the remarks Wednesday, banished Hardaway from All-Star weekend in Las Vegas. Following the comments, Hardaway apologized and attended counseling. He has also made public appearances supporting gay rights, including one in El Paso, Texas in response to an attempted recall.
In early 2015, it was announced that the show would be televised on Fusion starting May 19, 2015. After the departure of Colin Cowherd from ESPN, the network moved the time slot of the show into the 10 AM to 1 PM slot formerly occupied by The Herd with Colin Cowherd, and moved the live simulcast to ESPNU, with the Fusion broadcast shifting to a tape delay f |
https://en.wikipedia.org/wiki/Eternity%20II%20puzzle | The Eternity II puzzle (abbreviated E2 or E II) is an edge-matching puzzle launched on 28 July 2007. It was developed by Christopher Monckton and marketed and copyrighted by TOMY UK Ltd as a successor to the original Eternity puzzle. The puzzle was part of a competition in which a $2 million prize was offered for the first complete solution. The competition ended at noon on 31 December 2010, with no solution being found.
Description
The Eternity II puzzle is an edge-matching puzzle which involves placing 256 square puzzle pieces into a 16 × 16 grid, constrained by the requirement to match adjacent edges. It has been designed to be difficult to solve by brute-force computer search.
Each puzzle piece has its edges on one side marked with different shape/colour combinations (collectively called "colours" here), each of which must match precisely with its neighbouring side on each adjacent piece when the puzzle is complete. The other side of each piece is blank apart from an identifying number, and is not used in the puzzle. Thus, each piece can be used in only 4 orientations. There are 22 colours, not including the grey edges. Five of the colours are found exclusively in the 60 edge-pairs ("diamonds") in the outermost ring, i.e. between the border and corner pieces, while the other 17 are used in the remaining 420 "interior" edge-pairs. The colours are used evenly, with each of the 5 border colours used in exactly 12 edge-pairs, and each of the 17 inner colours used for either 24 edge-pairs (5 colours) or 25 edge-pairs (12 colours). The total number of edge-pairs is 480. One of the five border colours is not found on any corner piece, while all of the 17 inner colours are used at least once on a border piece.
There are 4 corner pieces (with two grey sides), 56 border pieces (with one grey side) and 142 = 196 inner pieces (with four coloured sides). Each piece has a unique arrangement of colours, and none of the pieces are rotationally symmetric, so each of the 256 × |
https://en.wikipedia.org/wiki/Holdridge%20life%20zones | The Holdridge life zones system is a global bioclimatic scheme for the classification of land areas. It was first published by Leslie Holdridge in 1947, and updated in 1967. It is a relatively simple system based on few empirical data, giving objective criteria. A basic assumption of the system is that both soil and the climax vegetation can be mapped once the climate is known.
Scheme
While it was first designed for tropical and subtropical areas, the system now applies globally. The system has been shown to fit not just tropical vegetation zones,but Mediterranean zones, and boreal zones too, but is less applicable to cold oceanic or cold arid climates where moisture becomes the predominant factor. The system has found a major use in assessing the potential changes in natural vegetation patterns due to global warming.
The three major axes of the barycentric subdivisions are:
precipitation (annual, logarithmic)
biotemperature (mean annual, logarithmic)
potential evapotranspiration ratio (PET) to mean total annual precipitation.
Further indicators incorporated into the system are:
humidity provinces
latitudinal regions
altitudinal belts
Biotemperature is based on the growing season length and temperature. It is measured as the mean of all annual temperatures, with all temperatures below freezing and above 30 °C adjusted to 0 °C, as most plants are dormant at these temperatures. Holdridge's system uses biotemperature first, rather than the temperate latitude bias of Merriam's life zones, and does not primarily consider elevation directly. The system is considered more appropriate for tropical vegetation than Merriam's system.
Scientific relationship between the 3 axes and 3 indicators
Potential evapotranspiration (PET) is the amount of water that would be evaporated and transpired if there were enough water available. Higher temperatures result in higher PET. Evapotranspiration (ET) is the raw sum of evaporation and plant transpiration from the Earth's lan |
https://en.wikipedia.org/wiki/Genetic%20exceptionalism | Genetic exceptionalism is the belief that genetic information is special and so must be treated differently from other types of medical data or other personally identifiable information.
For example, patients are able to obtain information about their blood pressure without involving any medical professionals, but to obtain information about their genetic profile might require an order from a physician and expensive counseling sessions. Disclosure of an individual's genetic information or its meaning, such as telling a woman with red hair that she has a higher risk of skin cancer, has been legally restricted in some places, as providing medical advice.
That policy approach has been taken by state legislatures to safeguard individuals' genetic information in the United States from individuals, their families, their employers, and the government. The approach builds upon the existing protection required of general health information provided by such laws as the Health Insurance Portability and Accountability Act.
Expert debate
There is ongoing debate over whether or when certain genetic information should be considered exceptional. In some cases, the predictive power of genetic information (such as a risk for a disease like Huntington's disease, which is highly penetrant) may justify special considerations for genetic exceptionalism, in that individuals with a high risk for developing this condition may face a certain amount of discrimination. However, for most common human health conditions, a specific genetic variant only plays a partial role, interacting with other genetic variants and environmental and lifestyle influences to contribute to disease development. In these cases, genetic information is often considered similarly to other medical and lifestyle data, such as smoking status, age, or biomarkers.
See also
Genetic privacy
HIV exceptionalism, similar rules for HIV/AIDS testing |
https://en.wikipedia.org/wiki/Isomorphism%20extension%20theorem | In field theory, a branch of mathematics, the isomorphism extension theorem is an important theorem regarding the extension of a field isomorphism to a larger field.
Isomorphism extension theorem
The theorem states that given any field , an algebraic extension field of and an isomorphism mapping onto a field then can be extended to an isomorphism mapping onto an algebraic extension of (a subfield of the algebraic closure of ).
The proof of the isomorphism extension theorem depends on Zorn's lemma. |
https://en.wikipedia.org/wiki/Rocky%20Mountain%20Biological%20Laboratory | The Rocky Mountain Biological Laboratory (also known by its acronym RMBL — pronounced 'rumble') is a high-altitude biological field station located near Crested Butte, in the abandoned mining town of Gothic, Colorado in the West Elk Mountains. The laboratory was founded in 1928. Research areas include the ecology of the region, climate change, pollination biology, and a long-running study of the yellow-bellied marmot. The laboratory offers courses for undergraduate students, including National Science Foundation-funded REU students, and provides support for researchers from universities and colleges.
History
RMBL was founded in 1928 on the remains of an abandoned mining town in Gothic, Colorado. Approximately 180 people are in residence there during the summer field season. Over 1500 scientific publications have been based on work from the Laboratory (currently 30–50 per year).
Research
The diversity and depth of research at the lab make the area around Gothic, Colorado a well-understood ecosystem. While scientists can use RMBL's facilities to study any topics relevant to the ecosystems around the Lab, a number of particular research areas have emerged as topics of particular interests. Charles Remington, an influential figure in the study of butterflies, spent a number of years working on the genetics of butterflies at the Lab. A number of other scientists, such as Paul R. Ehrlich, Carol L. Boggs, Ward Watt (former President of the California Academy of Sciences), Maureen Stanton, and Naomi Pierce, have also spent time working on butterflies at the Lab.
Among the geneticists who took their work to RMBL in the summer months was Edward Novitski, whose research in Drosophila melanogaster led to the posthumous creation of the Edward Novitski Prize, awarded by the Genetics Society of America to recognize an extraordinary level of creativity and intellectual ingenuity in solving significant problems in genetics research.
Climate change is another well-studied are |
https://en.wikipedia.org/wiki/Cervical%20dislocation | Cervical dislocation is a common method of animal euthanasia. It refers to a technique used in physical euthanasia of small animals by applying pressure to the neck and dislocating the spinal column from the skull or brain. The aim is to quickly separate the spinal cord from the brain so as to provide the animal with a fast and painless death.
Technique
Firm pressure is applied at the base of the skull, along with a sharp pinching and twisting of the thumb and forefinger. At the same time, the tail is pulled backward. This severs the spinal cord at the base of the brain or within the cervical spine area (the upper third of the neck). According to the Canadian Council on Animal Care (CCAC), cervical dislocation is normally only conducted on small animals.
Ethics
The University of Iowa and some veterinary associations consider the technique to be an ethically acceptable method for killing small rodents such as rats, mice, squirrels, etc.
See also
Cervical fracture
Blunt trauma
Slaughter (livestock) |
https://en.wikipedia.org/wiki/Comparative%20Biochemistry%20and%20Physiology%20B | Comparative Biochemistry and Physiology Part B: Biochemistry & Molecular Biology is a peer-reviewed scientific journal that covers research in biochemistry, physiology, and molecular biology.
External links
Biochemistry journals
Physiology journals
Elsevier academic journals
Academic journals established in 1971 |
https://en.wikipedia.org/wiki/Sarcospan | Originally identified as Kirsten ras associated gene (KRAG), sarcospan (SSPN) is a 25-kDa transmembrane protein located in the dystrophin-associated protein complex of skeletal muscle cells, where it is most abundant. It contains four transmembrane spanning helices with both N- and C-terminal domains located intracellularly. Loss of SSPN expression occurs in patients with Duchenne muscular dystrophy. Dystrophin is required for proper localization of SSPN. SSPN is also an essential regulator of Akt signaling pathways. Without SSPN, Akt signaling pathways will be hindered and muscle regeneration will not occur.
Function
Sarcospan is a protein that plays a crucial role in muscle health and function. It is part of the dystrophin-associated glycoprotein complex (DGC), which is a protein complex found in muscle cells that helps to maintain the structural integrity of muscle fibers. Sarcospan interacts with other proteins in the DGC, and mutations in the gene that encodes sarcospan can lead to muscular dystrophy, a group of genetic disorders characterized by progressive muscle weakness and degeneration.
Sarcospan has multiple functions within the DGC that contribute to its role in muscle health. The DGC is a complex of proteins that spans the cell membrane of muscle cells and links the extracellular matrix to the intracellular cytoskeleton, providing stability and integrity to the muscle fiber. Sarcospan is one of the components of the DGC and interacts with other proteins in the complex, including dystrophin, syntrophins, and dystroglycans.
One of the key functions of sarcospan is to help stabilize the DGC and promote its proper localization at the muscle cell membrane. Sarcospan interacts with dystroglycans, which are transmembrane proteins that connect the DGC to the extracellular matrix. This interaction helps to anchor the DGC to the muscle cell membrane and contributes to the overall stability of the muscle fiber. Additionally, sarcospan interacts with syntrophin |
https://en.wikipedia.org/wiki/Pest-exclusion%20fence | A pest-exclusion fence is a barrier that is built to exclude certain types of animal pests from an enclosure. This may be to protect plants in horticulture, preserve grassland for grazing animals, separate species carrying diseases (vector species) from livestock, prevent troublesome species entering roadways, or to protect endemic species in nature reserves. These fences are not necessarily traditional wire barriers, but may also include barriers of sound, or smell.
Design techniques
Animals can be excluded by a fence's height, depth under the ground and mesh size. It is also important to choose a construction material that cannot be climbed; furthermore, sometimes it is necessary to create a subsurface fencing element to prevent burrowing under the fence. Fences are usually designed with the target pest species (the species to be excluded) in mind, and the fences are made to effectively exclude those species. This results in a wide variety of designs for pest exclusion fences (see examples below). Often the fence is encircled in electric wire to ensure that animals can not climb over the fence.
Examples
The 1.9m-high fence at the Orokonui Ecosanctuary in Waitati, New Zealand is designed to keep out all introduced mammals such as possums, rats, stoats, ferrets and even mice. It uses stainless steel mesh that continues down to form a skirt at ground level that prevents animals from burrowing under it. On the top is a curved steel hood that prevents climbers like cats and possums from climbing over the top.
Agricultural exclusion fences in central-western Queensland vary between 1.6m and 2m in height. The fences have a single top barbed wire and ring-lock or hinge-joint wire underneath and steel fence posts. The ring-lock or hinge joint wire has smaller holes at the bottom, gradually increasing in size to be marginally larger at the top. A section of this mesh lays flat against the ground at the bottom of the posts to form a skirt (or radial-apron) on the outside |
https://en.wikipedia.org/wiki/Ballard%20Maturational%20Assessment | The Ballard Maturational Assessment, Ballard Score, or Ballard Scale is a commonly used technique of gestational age assessment. It was devised by Dr Jeanne L Ballard, Professor Emeritus of Pediatrics, Obstetrics and Gynecology at the University of Cincinnati College of Medicine.
The assessment assigns a score to various criteria, the sum of all of which is then extrapolated to the gestational age of the fetus. These criteria are divided into physical and neurological criteria. This scoring allows for the estimation of age in the range of 26 weeks-44 weeks. The New Ballard Score is an extension of the above to include extremely pre-term babies i.e. up to 20 weeks.
The scoring relies on the intra-uterine changes that the fetus undergoes during its maturation. Whereas the neurological criteria depend mainly upon muscle tone, the physical ones rely on anatomical changes. The neonate (less than 37 weeks of age) is in a state of physiological hypotonia. This tone increases throughout the fetal growth period, meaning a more premature baby would have lesser muscle tone.
It was developed in 1979.
The neuromuscular criteria
These are:
Posture:muscle tone is reflected in the infant's preferred posture at rest. As maturation progresses, the foetus gradually assumes increasing passive flexor tone at rest that precedes in a centripetal direction with lower extremities slightly ahead of upper extremities. Term newborn (flexed posture) and preterm newborn (extended posture).
Square window, assessing the flexibility of the wrist. Wrist flexibility and resistance to extensor stretching are responsible for the resulting angle of flexion at the wrist. The examiner strengthen the infant's fingers and applies gentle pressure on the dorsum of the hand, close to the fingers. From extremely preterm to post term, the resulting angle between the palm of the infant's hand and forearm is gradually diminished.
Arm recoil: Arm recoil examines the passive flexor tone of the biceps muscle b |
https://en.wikipedia.org/wiki/Memory%20bank | A memory bank is a logical unit of storage in electronics, which is hardware-dependent. In a computer, the memory bank may be determined by the memory controller along with physical organization of the hardware memory slots. In a typical synchronous dynamic random-access memory (SDRAM) or double data rate SDRAM (DDR SDRAM), a bank consists of multiple rows and columns of storage units, and is usually spread out across several chips. In a single read or write operation, only one bank is accessed, therefore the number of bits in a column or a row, per bank and per chip, equals the memory bus width in bits (single channel). The size of a bank is further determined by the number of bits in a column and a row, per chip, multiplied by the number of chips in a bank.
Some computers have several identical memory banks of RAM, and use bank switching to switch between them. Harvard architecture computers have (at least) two very different banks of memory, one for program storage and another for data storage.
In caching
A memory bank is a part of cache memory that is addressed consecutively in the total set of memory banks, i.e., when data item is stored in bank , data item is stored in bank . Cache memory is divided in banks to evade the effects of the bank cycle time (see above) [=> missing "bank cycle" definition, above]. When data is stored or retrieved consecutively each bank has enough time to recover before the next request for that bank arrives.
The number of memory modules needed to have the same number of data bits as the bus. A bank can consist of one or more memory modules.
See also
Bank switching
Interleaved memory
Memory rank
Memory geometry
Memory organisation
Further reading |
https://en.wikipedia.org/wiki/Four%20Seasons%20in%20One%20Day | "Four Seasons in One Day" is a song by rock group Crowded House, released as a single in June 1992. It was co-written by Neil Finn and brother Tim Finn, originally intended for their debut Finn Brothers album; however, it was moved onto the Woodface project as the two projects amalgamated. The song's title references a common saying used in Melbourne to describe the city's changeable weather. The song reached number 26 on the UK Singles Chart and number 47 on the Australian ARIA Singles Chart. The song also peaked at number 68 in Canada, but was not released in the US.
The song was later released on the group's greatest hits collection Recurring Dream and was performed at the group's farewell performance in 1996, Farewell to the World.
After the death of Crowded House drummer Paul Hester, Tim Finn and Neil Finn had been performing together as the Finn Brothers and as a tribute to Hester, played the song in his honour at their performances.
In 2005, a tribute album was created featuring a collection of Neil and Tim Finn's songs reinterpreted by female singers as the album She Will Have Her Way. "Four Seasons in One Day" was performed by Australian multi-instrumentalist Sally Seltmann, who was known by the stage name New Buffalo. The New Buffalo version was primarily recorded in the same way as the Crowded House version; however, the song title was shortened to "Four Seasons".
Inspiration
Neil Finn wrote the song in his flat in East St Kilda, a suburb of Melbourne. The song's title references a phrase used in Melbourne to refer to the city's changeable weather. Finn explained in an interview:
Music video
This was the first Crowded House video made in New Zealand. Director Kerry Brown and producer Bruce Sheridan wanted to emphasise the surreal, fantasy elements of the song, using distinctly Kiwi imagery. Locations included beaches and dense bush on the West Coast, the plains of Central Otago and the Victorian architecture of Oamaru. Scenes of an Anzac Day ceremony |
https://en.wikipedia.org/wiki/Constant%20phase%20element | In electronics, a constant phase element is an equivalent electrical circuit component that models the behaviour of a double layer, that is an imperfect capacitor (see double-layer capacitance).
Constant phase elements are also used in equivalent circuit modeling and data fitting of electrochemical impedance spectroscopy data.
A constant phase element also currently appears in modeling the imperfect dielectrics' behavior. The generalization in the fields of imperfect electrical resistances, capacitances, and inductances leads to the general "phasance" concept: http://fr.scribd.com/doc/71923015/The-Phasance-Concept
General equation
The electrical impedance can be calculated:
where the CPE admittance is: and Q0 and n (0<n<1) are frequency independent.
Q0 = 1/|Z| at ω = 1 rad/s
The constant phase is always −(90*n)°, with n from 0 to 1. The case n = 1 describes an ideal capacitor while the case n = 0 describes a pure resistor. |
https://en.wikipedia.org/wiki/Digital%20video%20fingerprinting | Video fingerprinting or video hashing are a class of dimension reduction techniques in which a system identifies, extracts, and then summarizes characteristic
components of a video as a unique or a set of multiple perceptual hashes or fingerprints, enabling that video to be uniquely identified. This technology has proven to be effective at searching and comparing video files.
History and process
Video fingerprinting was first developed into practical use by Philips in 2002.
Different methods exist for video fingerprinting. Van Oostveen relied on changes in patterns of image intensity over successive video frames. This makes the video fingerprinting robust against limited changes in color - or the transformation of color into gray scale of the original video. Others have tried to reduce the size of the fingerprint by only looking around shot changes.
Video fingerprinting does not rely on any addition to the video stream. A video fingerprint cannot be removed, because it is not added. In addition, a reference video fingerprint can be created at any point, from any copy of the video.
Compared to digital watermarking
Video fingerprinting should not be confused with digital watermarking, which relies on inserting identifying features into the content and therefore changing the content. Some watermarks can be inserted in a way that they are imperceptible to a viewer. A robust watermark can be difficult to detect and remove, but the removal of invisible watermarks is a significant weakness.
Since watermarks must be inserted into the video, they only identify copies of the particular video made after that point in time. For example, if a watermark is inserted at broadcast it cannot be used to identify copies of the video made before the broadcast.
Watermarks offer some advantages over fingerprinting. A unique watermark can be added to the content at any stage in the distribution process, and multiple independent watermarks can be inserted into the same video content. |
https://en.wikipedia.org/wiki/Randles%20circuit | In electrochemistry, a Randles circuit is an equivalent electrical circuit that consists of an active electrolyte resistance in series with the parallel combination of the double-layer capacitance and an impedance () of a faradaic reaction. It is commonly used in electrochemical impedance spectroscopy (EIS) for interpretation of impedance spectra, often with a constant phase element (CPE) replacing the double layer capacity.
The Randles equivalent circuit is one of the simplest possible models describing processes at the electrochemical interface. In real electrochemical systems, impedance spectra are usually more complicated and, thus, the Randles circuit may not give appropriate results.
Explanation
Figure 1 shows the equivalent circuit initially proposed by John Edward Brough Randles for modeling of interfacial electrochemical reactions in presence of semi-infinite linear diffusion of electroactive particles to flat electrodes. A simple model for an electrode immersed in an electrolyte is simply the series combination of the ionic resistance, , with the double layer capacitance, . If a faradaic reaction is taking place then that reaction is occurring in parallel with the charging of the double layer – so the charge transfer resistance, , associated with the faradaic reaction is in parallel with . The key assumption is that the rate of the faradaic reaction is controlled by diffusion of the reactants to the electrode surface. The diffusional resistance element (the Warburg impedance, ), is therefore in series with .
In this model, the impedance of a faradaic reaction consists of an active charge transfer resistance and a specific electrochemical element of diffusion , represented by a Warburg element
where
is the Warburg coefficient;
is an imaginary unit;
is the angular frequency.
Identifying the Warburg element
In a simple situation, the Warburg element manifests itself in EIS spectra by a line with an angle of 45 degrees in the low frequency region. |
https://en.wikipedia.org/wiki/Ribosome-binding%20site | A ribosome binding site, or ribosomal binding site (RBS), is a sequence of nucleotides upstream of the start codon of an mRNA transcript that is responsible for the recruitment of a ribosome during the initiation of translation. Mostly, RBS refers to bacterial sequences, although internal ribosome entry sites (IRES) have been described in mRNAs of eukaryotic cells or viruses that infect eukaryotes. Ribosome recruitment in eukaryotes is generally mediated by the 5' cap present on eukaryotic mRNAs.
Prokaryotes
The RBS in prokaryotes is a region upstream of the start codon. This region of the mRNA has the consensus 5'-AGGAGG-3', also called the Shine-Dalgarno (SD) sequence. The complementary sequence (CCUCCU), called the anti-Shine-Dalgarno (ASD) is contained in the 3’ end of the 16S region of the smaller (30S) ribosomal subunit. Upon encountering the Shine-Dalgarno sequence, the ASD of the ribosome base pairs with it, after which translation is initiated.
Variations of the 5'-AGGAGG-3' sequence have been found in Archaea as highly conserved 5′-GGTG-3′ regions, 5 basepairs upstream of the start site. Additionally, some bacterial initiation regions, such as rpsA in E.coli completely lack identifiable SD sequences.
Effect on translation initiation rate
Prokaryotic ribosomes begin translation of the mRNA transcript while DNA is still being transcribed. Thus translation and transcription are parallel processes. Bacterial mRNA are usually polycistronic and contain multiple ribosome binding sites. Translation initiation is the most highly regulated step of protein synthesis in prokaryotes.
The rate of translation depends on two factors:
the rate at which a ribosome is recruited to the RBS
the rate at which a recruited ribosome is able to initiate translation (i.e. the translation initiation efficiency)
The RBS sequence affects both of these factors.
Factors affecting rate of ribosome recruitment
The ribosomal protein S1 binds to adenine sequences upstream of the |
https://en.wikipedia.org/wiki/Arcto-Tertiary%20Geoflora | The Arcto-Tertiary Geoflora is a hypothesized floral assemblage that once covered the Northern Hemisphere, from roughly the late Mesozoic to mid Cenozoic Eras.
Origins
First proposed by the paleobotanists J.S. Gardner and C. Ettinghausen in 1879, the concept was intended to answer questions about the disjunct distribution of identical or closely related plant species: for instance, magnolia and tulip trees are native to both the Southeast United States and southern China and Indochina.
As envisioned, the ATG had a wide distribution when the global climate was much warmer than it is currently, a situation strengthened by the closer position of some of the continents in late Mesozoic to early Cenozoic times. With the onset of global cooling and the Ice Ages, the ranges of these tropical to subtropical species were left in isolated pockets of warmer climates.
The southern, more tropical equivalent of the ATG was the Neotropical Tertiary Geoflora.
Footnotes
External links
https://php.radford.edu/~swoodwar/biomes/?page_id=94
Biogeography |
https://en.wikipedia.org/wiki/Padaek | Padaek or padek (Lao: ປາແດກ) is a traditional Lao condiment made from pickled or fermented fish that has been cured. It often contains chunks of fish, and is thicker, as well as more seasoned than fish sauce. The fermentation takes a long time, giving padaek an aroma similar to cheeses like Époisses. Unlike other versions of fish sauce in Southeast Asia, padaek is made from freshwater fish, owing to the landlocked nature of the former kingdom of Lan Xang. Padaek is used in many Lao dishes, most notably tam maak hoong.
See also
, Burmese fish paste
External links
What is Padaek?
Fish sauces
Umami enhancers
Lao cuisine |
https://en.wikipedia.org/wiki/Epipodophyllotoxin | Epipodophyllotoxins are substances naturally occurring in the root of American Mayapple plant (Podophyllum peltatum).
Some epipodophyllotoxin derivatives are currently used in the treatment of cancer. These include etoposide and teniposide. They act as anti-cancer drugs by inhibiting topoisomerase II.
See also
Podophyllotoxin |
https://en.wikipedia.org/wiki/Cary%20Institute%20of%20Ecosystem%20Studies | Cary Institute of Ecosystem Studies (Cary Institute), formerly known as the Institute of Ecosystem Studies, is an independent, not-for-profit environmental research organization dedicated to the scientific study of the world's ecosystems and the natural and human factors that influence them. The organization is headquartered in Millbrook, NY on a research campus. Areas of expertise include disease ecology, urban ecology, freshwater ecology and provisioning, and forest health.
Details
Cary Institute's research is collaborative and multidisciplinary. Its scientists lead two of the National Science Foundation's Long Term Ecological Research Network sites: the Baltimore Ecosystem Study (Baltimore, MD; focus: urban ecology) and the Hubbard Brook Ecosystem Study (Woodstock, NH; focus: forest and freshwater health). They also play a leadership role in the Global Lake Ecological Observatory Network, an international effort that shares and interprets high resolution sensor data to understand, predict, and communicate the role and response of lakes in a changing global environment.
While working at Hubbard Brook Experimental Forest in the 1960s, Cary Institute founder Gene E. Likens co-discovered acid rain in North America. His longterm studies on precipitation and stream water chemistry were instrumental in shaping the 1990 Clean Air Act amendments. Today, Cary Institute continues to steward the longest continuous data set on acid rain and deposition through its direction of the Hubbard Brook Ecosystem Study.
Cary Institute's grounds have been home to long-term studies on the ecology of tick-borne disease for more than 20 years. Findings underpin The Tick Project, a 5-year study testing interventions with the potential to reduce Lyme disease and protect public health. A three-decade research program on the Hudson River informs sustainable shoreline management, and a synthesis of imported forest pests and pathogens is the basis for Tree-SMART Trade, a national policy init |
https://en.wikipedia.org/wiki/Belkin | Belkin International, Inc., is an American consumer electronics and networking company headquartered in El Segundo, California. It produces mobile and computer connectivity devices and peripherals for consumer and commercial use. These include wireless chargers, power banks, charging cables, data cables, audio and video adapters, headphones, earbuds, smart speakers, screen protectors, surge protectors, Wi-Fi routers, smart home products, electronic device sanitizers, docking stations and data hubs, network switches, KVM switches and network cables.
Belkin is the parent company for Linksys and WeMo branded products and services, as well as the smart home water management company, Phyn. In 2018, Belkin was acquired by Foxconn, the largest provider of electronics manufacturing services. It now operates as an independent subsidiary.
History
While attending UCLA, Chet Pipkin, who was spending his time in local computer shops, saw the growing need for cables that would connect personal computers to new printers being released for home use. In the early 1980s, Chet Pipkin founded Belkin in his parents' home in Hawthorne, California, to manufacture computer cables for the new personal computer and tech accessory market. Pipkin began to sell computer-to-printer cables to local computer shops. As Pipkin's cable connector sales grew in Southern California, he recruited assembly help from his machinist father, brother and a handful of friends. In 1982, Pipkin left his university studies to focus on expanding the business.
On January 1, 1983, Pipkin moved into a professional workplace and hired his first full-time employees. Belkin performed its cable manufacturing in the United States, which gave the company a fast turnaround for customers. In 1985, in addition to U.S. manufacturing, Belkin began contracting Asian factories to increase production for a global market. In the 1990s, Belkin added surge protectors and USB storage devices to its product line. In the early 2000s, |
https://en.wikipedia.org/wiki/Sokhotski%E2%80%93Plemelj%20theorem | The Sokhotski–Plemelj theorem (Polish spelling is Sochocki) is a theorem in complex analysis, which helps in evaluating certain integrals. The real-line version of it (see below) is often used in physics, although rarely referred to by name. The theorem is named after Julian Sochocki, who proved it in 1868, and Josip Plemelj, who rediscovered it as a main ingredient of his solution of the Riemann–Hilbert problem in 1908.
Statement of the theorem
Let C be a smooth closed simple curve in the plane, and an analytic function on C. Note that the Cauchy-type integral
cannot be evaluated for any z on the curve C. However, on the interior and exterior of the curve, the integral produces analytic functions, which will be denoted inside C and outside. The Sokhotski–Plemelj formulas relate the limiting boundary values of these two analytic functions at a point z on C and the Cauchy principal value of the integral:
Subsequent generalizations relax the smoothness requirements on curve C and the function φ.
Version for the real line
Especially important is the version for integrals over the real line.
where is the Dirac delta function. This should be interpreted as an integral equality, as follows.
Let be a complex-valued function which is defined and continuous on the real line, and let and be real constants with . Then
where denotes the Cauchy principal value. (Note that this version makes no use of analyticity.)
Proof of the real version
A simple proof is as follows.
For the first term, we note that is a nascent delta function, and therefore approaches a Dirac delta function in the limit. Therefore, the first term equals ∓i f(0).
For the second term, we note that the factor approaches 1 for |x| ≫ ε, approaches 0 for |x| ≪ ε, and is exactly symmetric about 0. Therefore, in the limit, it turns the integral into a Cauchy principal value integral.
Physics application
In quantum mechanics and quantum field theory, one often has to evaluate integrals of t |
https://en.wikipedia.org/wiki/Admission%20note | An admission note is part of a medical record that documents the patient's status (including history and physical examination findings), reasons why the patient is being admitted for inpatient care to a hospital or other facility, and the initial instructions for that patient's care.
Purpose
Admission notes document the reasons why a patient is being admitted for inpatient care to a hospital or other facility, the patient's baseline status, and the initial instructions for that patient's care. Health care professionals use them to record a patient's baseline status and may write additional on-service notes, progress notes (SOAP notes), preoperative notes, operative notes, postoperative notes, procedure notes, delivery notes, postpartum notes, and discharge notes. These notes constitute a large part of the medical record. Medical students often develop their clinical reasoning skills by writing admission notes. The traditional, rational definition of being admitted usually involves spending an overnight in the hospital. This definition is sometimes stretched in the U.S. medical billing industry, where hospital corporations may blur the definitions of "admission" and "observation" because of reimbursement rules under which healthcare payors pay less for the care if an "admission" was involved.
Components
An admission note may sometimes be incorrectly referred to as an HPI (history of present illness) or H and P (history and physical), which include only portions of an admission note.
An admission note can include the following sections:
Outline
Not every admission note explicitly discusses every item listed below, however, the ideal admission note would include:
Header
Patient identifying information (maybe located separately)
name
ID number
chart number
room number
date of birth
attending physician
sex
admission date
Date
Time
Service
Chief complaint (CC)
Typically one sentence including
age
race
sex
presenting complaint
example: "34 yo whi |
https://en.wikipedia.org/wiki/Cutaway%20drawing | A cutaway drawing, also called a cutaway diagram is a 3D graphics, drawing, diagram and or illustration, in which surface elements of a three-dimensional model are selectively removed, to make internal features visible, but without sacrificing the outer context entirely.
Overview
According to Diepstraten et al. (2003) "the purpose of a cutaway drawing is to allow the viewer to have a look into an otherwise solid opaque object. Instead of letting the inner object shine through the surrounding surface, parts of outside object are simply removed. This produces a visual appearance as if someone had cutout a piece of the object or sliced it into parts. Cutaway illustrations avoid ambiguities with respect to spatial ordering, provide a sharp contrast between foreground and background objects, and facilitate a good understanding of spatial ordering".
Though cutaway drawing are not dimensioned manufacturing blueprints, they are meticulously drawn by a handful of devoted artists who either had access to manufacturing details or deduced them by observing the visible evidence of the hidden skeleton (e.g. rivet lines, etc.). The goal of this drawings in studies can be to identify common design patterns for particular vehicle classes. Thus, the accuracy of most of these drawings, while not 100 percent, is certainly high enough for this purpose.
The technique is used extensively in computer-aided design, see first image. It has also been incorporated into the user interface of some video games. In The Sims, for instance, users can select through a control panel whether to view the house they are building with no walls, cutaway walls, or full walls.
History
The cutaway view and the exploded view were minor graphic inventions of the Renaissance that also clarified pictorial representation. This cutaway view originates in the early fifteenth century notebooks of Marino Taccola (1382 – 1453). In the 16th century cutaway views in definite form were used in Georgius Agricola's ( |
https://en.wikipedia.org/wiki/Fiber%20to%20the%20telecom%20enclosure | Fiber to the Edge (FTTE), fiber to the telecom enclosure (FTTTE), fiber to the zone (FTTZ), or fibre to the cabinet (FTTC) in the UK, is a networking approach used in the enterprise building (hotels, convention centers, office buildings, hospitals, senior living communities, Multi-Dwelling Units, stadiums, etc.). It is a standards-compliant structured cabling system architecture that extends the optical fiber backbone network from the equipment room directly to a telecommunications enclosure (TE), access node, ONT, or media converter installed in a common space to serve a number of users or devices in a nearby area.
In other words, fiber reaches directly from the main distribution frame of a building out to the edge devices, eliminating or reducing the need for intermediate distribution frames.
Implementation
Its implementation is based on the TIA-569-B “Pathways and Spaces” technical standard, which defines the Telecommunications Enclosure (TE), and TIA/EIA-568-B.1 Addendum 5, which defines the cabling when a TE is used. The FTTE architecture allows for many media choices from the TE to the work area; it may be balanced twisted pair copper, multi-mode optical fiber, or even wireless if an access point is installed in or near the TE.
Depending on the user’s needs, FTTE can be deployed in low-density or high-density configurations. A low-density system might use one or two inexpensive 8-port Ethernet mini-switches as an example (these switches have eight 10/100 Mbit/s Ethernet copper ports and one 1 Gbit/s Ethernet fiber uplink).
A high-density FTTE design might use commonly available 24- or 48-port switches (these switches are configured with one 1 Gbit/s uplink port per twelve 100BASE-TX user ports). This relatively high work area-to-backbone port ratio provides better performance than is typically provided to enterprise users. Both low and high-density FTTE architectures provide excellent performance in terms of bandwidth delivered to the work area.
Pros an |
https://en.wikipedia.org/wiki/Myth%20of%20the%20flat%20Earth | The myth of the flat Earth, or the flat-Earth error, is a modern historical misconception that European scholars and educated people during the Middle Ages believed the Earth to be flat.
The earliest clear documentation of the idea of a spherical Earth comes from the ancient Greeks (5th century BC). The belief was widespread in the Greek world when Eratosthenes calculated the circumference of Earth around 240 BC. This knowledge spread with Greek influence such that during the Early Middle Ages (~600–1000 AD), most European and Middle Eastern scholars espoused Earth's sphericity. Belief in a flat Earth among educated Europeans was almost nonexistent from the Late Middle Ages onward, though fanciful depictions appear in art, such as the exterior panels of Hieronymus Bosch's famous triptych The Garden of Earthly Delights, in which a disc-shaped Earth is shown floating inside a transparent sphere.
According to Stephen Jay Gould, "there never was a period of 'flat Earth darkness' among scholars, regardless of how the public at large may have conceptualized our planet both then and now. Greek knowledge of sphericity never faded, and all major medieval scholars accepted the Earth's roundness as an established fact of cosmology." Historians of science David Lindberg and Ronald Numbers point out that "there was scarcely a Christian scholar of the Middle Ages who did not acknowledge [Earth's] sphericity and even know its approximate circumference".
Historian Jeffrey Burton Russell says the flat-Earth error flourished most between 1870 and 1920, and had to do with the ideological setting created by struggles over biological evolution. Russell claims "with extraordinary few exceptions no educated person in the history of Western Civilization from the third century B.C. onward believed that the Earth was flat", and ascribes popularization of the flat-Earth myth to histories by John William Draper, Andrew Dickson White, and Washington Irving.
History
In Inventing the Flat Ea |
https://en.wikipedia.org/wiki/H.%20Paul%20Shuch | H. Paul Shuch (born May 23, 1946) is an American scientist and engineer who has coordinated radio amateurs to help in the search for extraterrestrial intelligence (SETI).
Shuch, an aerospace engineer, microwave technologist, and radio amateur call sign N6TX, is believed by colleague Jack Unger to be the creator of the world's first commercial home satellite TV receiver. Recently a visiting professor at Lycoming College and Heidelberg University of Applied Sciences, Shuch continues to volunteer as the Executive Director Emeritus of The SETI League, Inc. He has taught physics, astronomy, and engineering on various university campuses for over four decades. He is also active in science fiction fandom and filk music.
Early life
Born Howard Paul Wakes in Chicago, Illinois, United States, Shuch later adopted the name of his stepfather, physicist Milton L. Shuch (12 Oct 1922–20 Jan 2014).
Shuch earned a Bachelor of Science in industrial technology from San Jose State University and a Doctor of Philosophy (Ph.D.) in engineering from the University of California, Berkeley. Shuch is a Vietnam War-era United States Air Force veteran and active instrument flight instructor. After his military career he worked as an engineer for several Silicon Valley aerospace companies before commencing his academic career. He founded Microcomm Consulting in 1975, where in 1978 he designed and produced a commercial home satellite television receiver.
SETI activities
Shuch first learned about Search for extraterrestrial intelligence (SETI), from Nicholas Marshall, W6OLO, a Hungarian engineer with whom he served on the Board of Project OSCAR, builders of the world's first non-Government satellite. Marshall introduced Shuch to longtime SETI proponent Bernard M. Oliver, then vice-president of Engineering at the Hewlett-Packard Company. Oliver in turn introduced Paul to SETI pioneers Frank Drake and Philip Morrison, who encouraged his continued interest and involvement in the development of |
https://en.wikipedia.org/wiki/Cell%20fusion | Cell fusion is an important cellular process in which several uninucleate cells (cells with a single nucleus) combine to form a multinucleate cell, known as a syncytium. Cell fusion occurs during differentiation of myoblasts, osteoclasts and trophoblasts, during embryogenesis, and morphogenesis. Cell fusion is a necessary event in the maturation of cells so that they maintain their specific functions throughout growth.
History
In 1847 Theodore Schwann expanded upon the theory that all living organisms are composed of cells when he added to it that discrete cells are the basis of life. Schwann observed that in certain cells the walls and cavities of the cells coalesce together. It was this observation that provided the first hint that cells fuse.
It was not until 1960 that cell biologists deliberately fused cells for the first time. To fuse the cells, biologists combined isolated mouse cells, with the same kind of tissue, and induced fusion of their outer membrane using the Sendai virus (a respiratory virus in mice). Each of the fused hybrid cells contained a single nucleus with chromosomes from both fusion partners. Synkaryon became the name of this type of cell combined with a nucleus.
In the late 1960s biologists successfully fused cells of different types and from different species. The hybrid products of these fusions, heterokaryon, were hybrids that maintained two or more separate nuclei. This work was headed by Henry Harris at the University of Oxford and Nils Ringertz from Sweden's Karolinska Institute. These two men are responsible for reviving the interest of cell fusion. The hybrid cells interested biologists in the area of how different kinds of cytoplasm affect different kinds of nuclei. The work conducted by Henry and Nils showed that proteins from one gene fusion affect gene expression in the other partner's nucleus, and vice versa. These hybrid cells that were created were considered forced exceptions to normal cellular integrity and it was not unti |
https://en.wikipedia.org/wiki/Robot%20Battle%20%28Macintosh%20game%29 | Robot Battle is a programming game developed in 1991 by Blue Cow Software for the Apple Macintosh where players design and code adaptable battling robots. Its idea is similar to RobotWar. The concept of the game was invented by Toby Smith in a BASIC program "when people with 512K of RAM and two floppy drives were power-users", as he states in the game manual.
The game consists of a battleground and two robots. Before the game starts, each robot is preprogrammed using a BASIC-like language called RIPPLE ("Robot Instructional Programming Language"). 0–99 humans can also be placed into the battleground to throw the robots with hand grenades. The programs are checked for syntax and the game starts. The robot to survive the longer is the winner.
The RIPPLE language programs consist of logic commands, such as flow of control statements; and action commands, that actually make the robot perform an action, such as fire a weapon. To perform one action command takes the same time as to perform 99 logic commands.
External links
Demo version of Robot Battle as a StuffIt archive in FUNET's FTP archive of old Macintosh games
1991 video games
Classic Mac OS-only games
Classic Mac OS games
Programming games
Video games about robots
Video games developed in the United States |
https://en.wikipedia.org/wiki/Extramacrochaetae | The gene extramachrochaetae (emc) is a Drosophila melanogaster gene that codes for the Emc protein, which has a wide variety of developmental roles. It was named, as is common for Drosophila genes, after the phenotypic change caused by a mutation in the gene (macrochaetae are the longer bristles on Drosophila).
The emc gene
The emc gene is located near the tip of the left arm of the 3rd Drosophila chromosome. It is about 4100 base pairs long, including two exons and one intron. Its FlyBase designation is Dmel_emc, and its location is at 3L:749,406..753,505 [+]. 86 alleles have been reported.
Emc interactions with other proteins
The Emc protein has a helix-loop-helix protein domain without the basic region, making it unable to bind to DNA and act as a transcription factor. It does, however, have the ability to bind other basic helix-loop-helix domain-containing proteins, such as the products of the achaete-scute complex (ac-s), to form dimers that inactivate the target protein, which is usually a transcription factor. In this way, the Emc protein can have an effect on the gene expression of many genes during Drosophila development.
Emc in neural development
The extra sensory organs (SOs) in Drosophila arise from cell-clusters known as sensory mother cells (SMCs). Once an imaginal disc cell has been selected to become an SMC, it will go on to mature into an SO. Therefore, the regulation of which imaginal disc cells become SMCs is vital to neural development. This transition is caused by the Da and AS-C genes, which are transcription factors with the basic helix-loop-helix (bHLH) domains. The Da protein (made by the daughterless gene) is a Class I HLH protein, meaning it has generalized distribution, whereas the AS-C proteins (made by the as-c gene complex) are Class II HLH proteins, meaning they have restricted distribution. The Emc protein itself is a Class V HLH protein due to its lack of the basic region and consequential inability to bind DNA. The |
https://en.wikipedia.org/wiki/Ping-pong%20scheme | Algorithms said to employ a Ping-Pong scheme exist in different fields of software engineering. They are characterized by an alternation between two entities. In the examples described below, these entities are communication partners, network paths or file blocks.
Databases
In most database management systems durable database transactions are supported through a log file. However, multiple writes to the same page of that file can produce a slim chance of data loss. Assuming for simplicity that the log file is organized in pages whose size matches the block size of its underlying medium, the following problem can occur:
If the very last page of the log file is only partially filled with data and has to be written to permanent storage in this state, the very same page will have to be overwritten during the next write operation. If a crash happens during that later write operation, previously stored log data may be lost.
The Ping-Pong scheme described in Transaction Processing eliminates this problem by alternately writing the contents of said (logical) last page to two different physical pages inside the log file (the actual last page i and its empty successor i+1). Once said logical log page is no longer the last page (i.e. it is completely filled with log data), it is written one last time to the regular physical position (i) inside the log file.
This scheme requires the usage of time stamps for each page in order to distinguish the most recent version of the logical last page one from its predecessor.
Networking
Internet
A functionality which lets a computer A find out whether a computer B is reachable and responding is built into the Internet Control Message Protocol (ICMP). Through an "Echo Request" Computer A asks B to send back an "Echo Reply". These two messages are also sometimes erroneously called "ping" and "pong".
Routing
In Routing, a Ping-Pong scheme is a simple algorithm for distributing data packets across
two paths. If you had two paths A and B |
https://en.wikipedia.org/wiki/Action%20Message%20Format | Action Message Format (AMF) is a binary format used to serialize object graphs such as ActionScript objects and XML, or send messages between an Adobe Flash client and a remote service, usually a Flash Media Server or third party alternatives. The Actionscript 3 language provides classes for encoding and decoding from the AMF format.
The format is often used in conjunction with Adobe's RTMP to establish connections and control commands for the delivery of streaming media. In this case, the AMF data is encapsulated in a chunk which has a header which defines things such as the message length and type (whether it is a "ping", "command" or media data).
Format analysis
AMF was introduced with Flash Player 6, and this version is referred to as AMF0. It was unchanged until the release of Flash Player 9 and ActionScript 3.0, when new data types and language features prompted an update, called AMF3. Flash Player 10 added vector and dictionary data types documented in a revised specification of January 2013.
Adobe Systems published the AMF binary data protocol specification in December 2007 and announced that it will support the developer community to make this protocol available for every major server platform.
AMF self-contained packet
The following amf-packet is for transmission of messages outside of defined Adobe/Macromedia containers or transports such as Flash Video or the Real Time Messaging Protocol.
If either the header-length or message-length are unknown then they are set to -1 or 0xFFFFFFFF
uimsbf: unsigned integer, most significant bit first
simsbf: signed integer, most significant bit first
AMF0
The format specifies the various data types that can be used to encode data. Adobe states that AMF is mainly used to represent object graphs that include named properties in the form of key-value pairs, where the keys are encoded as strings and the values can be of any data type such as strings or numbers as well as arrays and other objects. XML is supported as |
https://en.wikipedia.org/wiki/Kota%20Damansara%20Community%20Forest%20Park | The Kota Damansara Community Forest Park (KDCFP) is a secondary forest located in Selangor, Malaysia. It was part of a defunct Sungai Buloh Forest Reserve gazetted in 1898 which contained of protected primary forest. This made it as the oldest forest reserve in Peninsular Malaysia. The forest reserve was degazetted a number of times and subsequent development brought down the size of the reserve to a .
Logging activities especially has turned the area into a secondary forest. This results in the abundance of pioneer plants as well as rare species of plant such as Begonia aequilateralis. Despite being a secondary forest, a number of primary forest species such as meranti are observable at the park. Furthermore, KDCFP is a dipterocarp forest typically found in tropical countries such as Malaysia. The area is a combination of flat land and low elevation hill.
The trademark of KDCFP is an artificial lake. The lake was created in early 2000s due to the building of a road that blocked a small stream that flows through the park. This has introduced aquatic flora and fauna attributable to slow-flowing water body to the area.
Current development
Kota Damansara is a developing area and there are efforts to develop the area. The local residents and the Malaysian Nature Society with aid from the United Nations Development Program through the Small Grants Program are trying to protect the area from further development projects.
See also
Geography of Malaysia
External links
() Geo Links for Kota Damansara Forest Park
Selamatkan Hutan Simpan Kota Damansara
Clean-Up Program during EARTH DAY 2008 |
https://en.wikipedia.org/wiki/Volume%20operator | A quantum field theory of general relativity provides operators that measure the geometry of spacetime. The volume operator of a region is defined as the operator that yields the expectation value of a volume measurement of the region , given a state of quantum General Relativity. I.e. is the expectation value for the volume of . Loop Quantum Gravity, for example, provides volume operators, area operators and length operators for regions, surfaces and path respectively.
Sources
Carlo Rovelli and Lee Smolin, "Discreteness of Area and Volume in Quantum Gravity", Nuclear Physics B 442, 593 (1995).
Abhay Ashtekar and Jerzy Lewandowski, Quantum Theory of Geometry II: Volume operators
Quantum field theory
General relativity |
https://en.wikipedia.org/wiki/Siegel%20disc | A Siegel disc or Siegel disk is a connected component in the Fatou set where the dynamics is analytically conjugate to an irrational rotation.
Description
Given a holomorphic endomorphism on a Riemann surface we consider the dynamical system generated by the iterates of denoted by . We then call the orbit of as the set of forward iterates of . We are interested in the asymptotic behavior of the orbits in (which will usually be , the complex plane or , the Riemann sphere), and we call the phase plane or dynamical plane.
One possible asymptotic behavior for a point is to be a fixed point, or in general a periodic point. In this last case where is the period and means is a fixed point. We can then define the multiplier of the orbit as and this enables us to classify periodic orbits as attracting if superattracting if ), repelling if and indifferent if . Indifferent periodic orbits can be either rationally indifferent or irrationally indifferent, depending on whether for some or for all , respectively.
Siegel discs are one of the possible cases of connected components in the Fatou set (the complementary set of the Julia set), according to Classification of Fatou components, and can occur around irrationally indifferent periodic points. The Fatou set is, roughly, the set of points where the iterates behave similarly to their neighbours (they form a normal family). Siegel discs correspond to points where the dynamics of are analytically
conjugate to an irrational rotation of the complex unit disc.
Name
The Siegel disc is named in honor of Carl Ludwig Siegel.
Gallery
Formal definition
Let be a holomorphic endomorphism where is a Riemann surface, and let U be a connected component of the Fatou set . We say U is a Siegel disc of f around the point if there exists a biholomorphism where is the unit disc and such that for some and .
Siegel's theorem proves the existence of Siegel discs for irrational numbers satisfying a strong irrationality c |
https://en.wikipedia.org/wiki/Princess%20and%20monster%20game | A princess and monster game is a pursuit–evasion game played by two players in a region.
Formal definition
In his book Differential Games (1965), Rufus Isaacs defined the game as:
This game remained a well-known open problem until it was solved by Shmuel Gal in the late 1970s. His optimal strategy for the princess is to move to a random location in the room and stay still for a time interval which is neither too short nor too long, before going to another (independent) random location and repeating the procedure. The proposed optimal search strategy for the monster is based on subdividing the room into many narrow rectangles, picking a rectangle at random and searching it in some specific way, after some time picking another rectangle randomly and independently, and so on.
Princess and monster games can be played on a pre-selected graph. It can be demonstrated that for any finite graph an optimal mixed search strategy exists that results in a finite payoff. This game has been solved by Steve Alpern and independently by Mikhail Zelikin only for the very simple graph consisting of a single loop (a circle). The value of the game on the unit interval (a graph with two nodes with a link in-between) has been estimated approximatively.
The game appears simple but is quite complicated. The obvious search strategy of starting at a random end and "sweeping" the whole interval as fast as possible guarantees a 0.75 expected capture time, and is not optimal. By utilizing a more sophisticated mixed searcher and hider strategy, one can reduce the expected capture time by about 8.6%. This number would be quite close to the value of the game if someone was able to prove the optimality of the related strategy of the princess.
See also
Search games
List of games in game theory |
https://en.wikipedia.org/wiki/Sorbitan%20tristearate | Sorbitan tristearate is a nonionic surfactant. It is variously used as a dispersing agent, emulsifier, and stabilizer, in food and in aerosol sprays. As a food additive, it has the E number E492. Brand names for polysorbates include Alkest, Canarcel, and Span. The consistency of sorbitan tristearate is waxy; its color is light cream to tan.
See also
Sorbitan monostearate (Span 60) |
https://en.wikipedia.org/wiki/Green%20Dot%20%28symbol%29 | The Green Dot () is the financing symbol of a European network of industry-funded systems for recycling the packaging materials of consumer goods. The logo is a trademark protected worldwide - it is not a recycling logo.
Background
The German "Der Grüne Punkt" is considered the forerunner of the European scheme. It was originally introduced by Der Grüne Punkt - Duales System Deutschland GmbH (DSD) in 1990 before the introduction of a Packaging Ordinance under the Waste Act. Since the successful introduction of the German industry-funded dual system, similar Green Dot systems have been introduced in most other European countries.
The Green Dot scheme is covered under the European "Packaging and packaging waste directive - 94/62/EC", which is binding on all companies if their products use packaging and requires manufacturers to recover their own packaging. According to the directive, companies are held responsible for the end-of-life management of their packaging - either through self-compliance or joining a s.c. producer responsibility organization (PRO). Environmentalists claim that some countries deliberately turn a blind eye to the European directive.
Since its European introduction, the scheme has been rolled out to 31 European countries. Use of the symbol on packaging is voluntary but if it is used, producers need to ensure a valid contract with the respective organizations.
The Green Dot is used by more than 130,000 companies, encompassing more than 200 billion packages globally.
Concept
The Green Dot system was conceived by Klaus Töpfer, Germany's environment minister in the early 1990s. The aim of the Green Dot is to indicate to consumers who see the logo that the manufacturer of the product contributes to the cost of recovery and recycling. This can be with household waste collected by the authorities (e.g. in special bags - in Germany these are yellow), or in containers in public places such as car parks and outside supermarkets.
The system is finan |
https://en.wikipedia.org/wiki/Ractopamine | Ractopamine () is an animal feed additive used to promote leanness and increase food conversion efficiency in farmed animals in several countries, but banned in others. Pharmacologically, it is a phenol-based TAAR1 agonist and β adrenoreceptor agonist that stimulates β1 and β2 adrenergic receptors.
It is most commonly administered to animals for meat production as ractopamine hydrochloride. It is the active ingredient in products marketed in the US as Paylean for swine, Optaflexx for cattle, and Topmax for turkeys. It was developed by Elanco Animal Health, a division of Eli Lilly and Company.
As of 2014, the use of ractopamine was banned in 160 countries, including the European Union, China and Russia, while 27 other countries, such as Japan, the United States, South Korea, and New Zealand have deemed meat from livestock fed ractopamine safe for human consumption.
Commercial ractopamine is a mixture of all four possible stereoisomers. It is also a positional isomer of dobutamine, a related drug.
Mode of action
When used as a food additive, ractopamine added to feed can be distributed by the blood to the muscle tissues, where it serves as a full agonist to murine (mouse or rat) TAAR1, a receptor protein (not necessarily in humans). It is also an agonist to beta-adrenergic receptors. A cascade of events will then be initiated to increase protein synthesis, which results in increased muscle fiber size. Ractopamine is known to increase the rate of weight gain, improve feed efficiency, and increase carcass leanness in finishing swine. Its use in finishing swine yields about of additional lean pork per animal, and improves feed efficiency by 10%. In cattle on 28 January 2004 Elanco Animal Health
made Optaflexx commercially available in the US. Optaflexx is a "medicated feed additive that is labeled only for use in steers or market heifers (not breeding heifers or bulls) during the last 28–42 days on feed."
Regulation around the world
On 6 July 2012, the internationa |
https://en.wikipedia.org/wiki/Non-innocent%20ligand | In chemistry, a (redox) non-innocent ligand is a ligand in a metal complex where the oxidation state is not
clear. Typically, complexes containing non-innocent ligands are redox active at mild potentials. The concept assumes that redox reactions in metal complexes are either metal or ligand localized, which is a simplification, albeit a useful one.
C.K. Jørgensen first described ligands as "innocent" and "suspect": "Ligands are innocent when they allow oxidation states of the central atoms to be defined. The simplest case of a suspect ligand is NO..."
Redox reactions of complexes of innocent vs. non-innocent ligands
Conventionally, redox reactions of coordination complexes are assumed to be metal-centered. The reduction of MnO4− to MnO42− is described by the change in oxidation state of manganese from 7+ to 6+. The oxide ligands do not change in oxidation state, remaining 2-. Oxide is an innocent ligand. Another example of conventional metal-centered redox couple is
[Co(NH3)6]3+/[Co(NH3)6]2+. Ammonia is innocent in this transformation.
Redox non-innocent behavior of ligands is illustrated by nickel bis(stilbenedithiolate) ([Ni(S2C2Ph2)2]z). As all bis(1,2-dithiolene) complexes of nd8 metal ions, three oxidation states can be identified: z = 2-, 1-, and 0. If the ligands are always considered to be dianionic (as is done in formal oxidation state counting), then z = 0 requires that that nickel has a formal oxidation state of +IV. The formal oxidation state of the central nickel atom therefore ranges from +II to +IV in the above transformations (see Figure). However, the formal oxidation state is different from the real (spectroscopic) oxidation state based on the (spectroscopic) metal d-electron configuration. The stilbene-1,2-dithiolate behaves as a redox non-innocent ligand, and the oxidation processes actually take place at the ligands rather than the metal. This leads to the formation of ligand radical complexes. The charge-neutral complex (z =0), showi |
https://en.wikipedia.org/wiki/Sliding%20%28motion%29 | Sliding is a type of motion between two surfaces in contact. This can be contrasted to rolling motion. Both types of motion may occur in bearings.
The relative motion or tendency toward such motion between two surfaces is resisted by friction. Friction may damage or "wear" the surfaces in contact. However, wear can be reduced by lubrication. The science and technology of friction, lubrication, and wear is known as tribology.
Sliding may occur between two objects of arbitrary shape, whereas rolling friction is the frictional force associated with the rotational movement of a somewhat disclike or other circular object along a surface. Generally, the frictional force of rolling friction is less than that associated with sliding kinetic friction. Typical values for the coefficient of rolling friction are less than that of sliding friction. Correspondingly sliding friction typically produces greater sound and thermal bi-products. One of the most common examples of sliding friction is the movement of braking motor vehicle tires on a roadway, a process which generates considerable heat and sound, and is typically taken into account in assessing the magnitude of roadway noise pollution.
Sliding friction
Sliding friction (also called kinetic friction) is a contact force that resists the sliding motion of two objects or an object and a surface. Sliding friction is almost always less than that of static friction; this is why it is easier to move an object once it starts moving rather than to get the object to begin moving from a rest position.
Where , is the force of kinetic friction. is the coefficient of kinetic friction, and N is the normal force.
Examples of sliding friction
Sledding
Pushing an object across a surface
Rubbing one's hands together (The friction force generates heat.)
A car sliding on ice
A car skidding as it turns a corner
Opening a window
Almost any motion where there is contact between an object and a surface
Falling down a bowling |
https://en.wikipedia.org/wiki/Kabsch%20algorithm | The Kabsch algorithm, also known as the Kabsch-Umeyama algorithm, named after Wolfgang Kabsch and Shinji Umeyama, is a method for calculating the optimal rotation matrix that minimizes the RMSD (root mean squared deviation) between two paired sets of points. It is useful for point-set registration in computer graphics, and in cheminformatics and bioinformatics to compare molecular and protein structures (in particular, see root-mean-square deviation (bioinformatics)).
The algorithm only computes the rotation matrix, but it also requires the computation of a translation vector. When both the translation and rotation are actually performed, the algorithm is sometimes called partial Procrustes superimposition (see also orthogonal Procrustes problem).
Description
Let and be two sets, each containing points in . For simplicity, we will consider the three-dimensional case ().
The sets and can each be represented by matrices with the first row containing the coordinates of the first point, the second row containing the coordinates of the second point, and so on, as shown in this matrix:
The algorithm works in three steps: a translation, the computation of a covariance matrix, and the computation of the optimal rotation matrix.
Translation
Both sets of coordinates must be translated first, so that their centroid coincides with the origin of the coordinate system. This is done by subtracting from the point coordinates of the respective centroid.
Computation of the covariance matrix
The second step consists of calculating a matrix . In matrix notation,
or, using summation notation,
which is a cross-covariance matrix when and are seen as data matrices.
Computation of the optimal rotation matrix
It is possible to calculate the optimal rotation based on the matrix formula
but implementing a numerical solution to this formula becomes complicated when all special cases are accounted for (for example, the case of not having an inverse).
If singular value |
https://en.wikipedia.org/wiki/Nebulette | Nebulette is a cardiac-specific isoform belonging to the nebulin family of proteins. It is encoded by the NEBL gene. This family is composed of 5 members: nebulette, nebulin, N-RAP, LASP-1 and LASP-2. Nebulette localizes to Z-discs of cardiac muscle and appears to regulate the length of actin thin filaments.
Structure
Nebulette is a 116.4 kDa protein composed of 1014 amino acids. As a member of the nebulin family of proteins, nebulette is characterized by 35 amino acid stretches of ‘‘nebulin repeats’’, which are actin binding domains containing a conserved SDxxYK motif. Like nebulin, nebulette has an acidic region with unknown structure at its N-terminus, and a serine-rich region adjacent to an SH3 domain at its C-terminus. Though nebulette shares structural features with nebulin, nebulin is expressed preferentially in skeletal muscle and has an enormous size (600-900 kDa), while nebulette is expressed in cardiac muscle at Z-disc regions and is significantly smaller (roughly 1/6 of the size). Nebulette interacts with actin, tropomyosin, alpha-actinin. Xin, and XIRP2.
Function
Nebulette was identified in 1995 by Moncman and Wang using primary cultures of chicken embryonic cardiomyocytes by immunoprecipitations with certain anti-nebulin monoclonal antibodies. Normal expression of nebulette is essential for the assembly and contractile function of myofibrils. Specifically, nebulette appears to regulate the stability and length of actin thin filaments, as well as beating frequencies of cardiomyocytes; reduction of full-length nebulette protein in cardiomyocytes resulted in reduced thin filament lengths, depressed beating frequencies and loss of thin filament regulatory proteins troponin I and tropomyosin.
Clinical significance
Mutations in the NEBL gene have been associated with dilated cardiomyopathy. Studies in transgenic mice have supported their causative role in endocardial fibroelastosis and dilated cardiomyopathy.
Further reading |
https://en.wikipedia.org/wiki/LongHaul | VIA LongHaul is a CPU speed throttling and power saving technology developed by VIA Technologies. By executing specialized instructions, software can exercise fine control on the bus-to-core frequency ratio and CPU core voltage. When the system first boots, the ratio and voltage are set to hardware defaults. While the operating system runs, a CPU driver controls the throttling according to how much load is put on the CPU.
This fine control over the CPU's operating parameters brings LongHaul in contrast to other competing technologies, where a CPU is typically allowed to switch between only two states - one that is fast but power-consuming and one that is slow but uses less power. However LongHaul is considered similar to Transmeta's LongRun technology.
There are 3 versions of LongHaul:
Version 1 only supports dynamic frequency scaling and is implemented in the Cyrix III Samuel (C5A) core and C3 Samuel 2 (C5B) stepping 0 core.
Version 2 adds voltage scaling and is implemented in the C3 Samuel 2 (C5B) stepping 1-7 and Ezra (C5C) cores.
Version 3 was renamed to PowerSaver and is implemented in the C3 Ezra-T (C5N) and Nehemiah cores as well as the C7 Esther (C5J) core. Some variants of the C7-D do not support PowerSaver.
Processors supporting LongHaul
Cyrix III - some models
VIA C3
VIA C7 (PowerSaver)
VIA Nano (PowerSaver)
External links
VIA C3 in EBGA Datasheet
Tom's Computer Dictionary - LongHaul entry
Computer hardware tuning
Clock signal
VIA Technologies |
https://en.wikipedia.org/wiki/SH3BP2 | SH3BP2 (SH3 domain-binding protein 2) is a protein that comes from a gene located on Chromosome 4. SH3BP2 binds differentially to the SH3 domains of certain proteins of signal transduction pathways. It binds to phosphatidylinositols linking the hemopoietic tyrosine kinase fes to the cytoplasmic membrane in a phosphorylation dependent mechanism. It is also associated with cherubism.
See also
SH3 domain
External links
GeneReviews/NCBI/NIH/UW entry on Cherubism
Genetics Home Reference on SH3BP2 |
https://en.wikipedia.org/wiki/Differential%20coefficient | In physics, the differential coefficient of a function f(x) is what is now called its derivative df(x)/dx, the (not necessarily constant) multiplicative factor or coefficient of the differential dx in the differential df(x).
A coefficient is usually a constant quantity, but the differential coefficient of f is a constant function only if f is a linear function. When f is not linear, its differential coefficient is a function, call it , derived by the differentiation of f, hence, the modern term, derivative.
The older usage is now rarely seen.
Early editions of Silvanus P. Thompson's Calculus Made Easy use the older term. In his 1998 update of this text, Martin Gardner lets the first use of "differential coefficient" stand, along with Thompson's criticism of the term as a needlessly obscure phrase that should not intimidate students, and substitutes "derivative" for the remainder of the book.
Mathematical analysis
Differential calculus
Functions and mappings |
https://en.wikipedia.org/wiki/Nylint | The Nylint Corporation is an American company that produces model toys. It was founded in 1937 by brothers Bernard and Ragnar Klint, and David Nyberg of Rockford, Illinois. Their uncle, David Nyberg, supplied much of the initial capital to start the company. The company name of Nylint is a combination of both the Nyberg and Klint names. It was incorporated under the name “Nylint Tool and Manufacturing” and its initial operation was located at 5th Avenue and 13th Street in Rockford. Bernard (known as Barney) Klint and his wife Grace remained actively involved for nearly 60 years in this privately held company until their deaths in the mid-1990s.
History
Looking back on Nylint's 60-plus year history, they survived by constantly evolving – changing their direction to meet the demands of the diverse toy market. One can see at least eight phases of their history. These phases, or “eras,” often overlap.
Early years
The company began (1st Phase pre-World War II) producing kitchen utensils. Nylint also did special-order tooling work for other companies. For example, they produced refrigerator door handles and cast aluminum parts for the automobile industry. In 1940, the company moved to a larger factory 16th Avenue where it remained for 60 years.
As with most manufacturers, World War II caused a shift to making war-related products. During the war years, Nylint prospered while employing 50 employees who made anti-aircraft magazines and torpedo-related components for the Federal government. Nylint produced, almost exclusively, war-related products during 1941–1945.
After the war, Nylint worked to establish its post-war direction. After an extensive study in late 1945, the company decided upon toy production. This decision was made primarily because of Nylint's modern metal-stamping facilities. Nylint hired Carl Swenson, the inventor of a wind-up toy car with steering and directional actions, based on the Chrysler Airflow design. Nylint called this the “Amazing Car.” When |
https://en.wikipedia.org/wiki/Order%20dual%20%28functional%20analysis%29 | In mathematics, specifically in order theory and functional analysis, the order dual of an ordered vector space is the set where denotes the set of all positive linear functionals on , where a linear function on is called positive if for all implies
The order dual of is denoted by .
Along with the related concept of the order bound dual, this space plays an important role in the theory of ordered topological vector spaces.
Canonical ordering
An element of the order dual of is called positive if implies
The positive elements of the order dual form a cone that induces an ordering on called the canonical ordering.
If is an ordered vector space whose positive cone is generating (that is, ) then the order dual with the canonical ordering is an ordered vector space.
The order dual is the span of the set of positive linear functionals on .
Properties
The order dual is contained in the order bound dual.
If the positive cone of an ordered vector space is generating and if holds for all positive and , then the order dual is equal to the order bound dual, which is an order complete vector lattice under its canonical ordering.
The order dual of a vector lattice is an order complete vector lattice.
The order dual of a vector lattice can be finite dimension (possibly even ) even if is infinite-dimensional.
Order bidual
Suppose that is an ordered vector space such that the canonical order on makes into an ordered vector space.
Then the order bidual is defined to be the order dual of and is denoted by .
If the positive cone of an ordered vector space is generating and if holds for all positive and , then is an order complete vector lattice and the evaluation map is order preserving.
In particular, if is a vector lattice then is an order complete vector lattice.
Minimal vector lattice
If is a vector lattice and if is a solid subspace of that separates points in , then the evaluation map defined by sending to the map given by |
https://en.wikipedia.org/wiki/Pressure-correction%20method | Pressure-correction method is a class of methods used in computational fluid dynamics for numerically solving the Navier-Stokes equations normally for incompressible flows.
Common properties
The equations solved in this approach arise from the implicit time integration of the incompressible Navier–Stokes equations.
Due to the non-linearity of the convective term in the momentum equation that is written above, this problem is solved with a nested-loop approach. While so called global
or inner iterations represent the real time-steps and are used to update the variables and , based on a linearized system, and boundary conditions; there is also an outer loop for updating the coefficients of the linearized system.
The outer iterations comprise two steps:
Solve the momentum equation for a provisional velocity based on the velocity and pressure of the previous outer loop.
Plug the new newly obtained velocity into the continuity equation to obtain a correction.
The correction for the velocity that is obtained from the second equation one has with incompressible flow, the non-divergence criterion or continuity equation
is computed by first calculating a residual value , resulting from spurious mass flux, then using this mass imbalance to get a new pressure value. The pressure value that is attempted to compute, is such that when plugged into momentum equations a divergence-free velocity field results. The mass imbalance is often also used for control of the outer loop.
The name of this class of methods stems from the fact that the correction of the velocity field is computed through the pressure-field.
The discretization of this is typically done with either the finite element method or the finite volume method. With the latter, one might also encounter the dual mesh, i.e. the computation grid obtained from connecting the centers of the cells that the initial subdivision into finite elements of the computation domain yielded.
Implicit split-update procedures
|
https://en.wikipedia.org/wiki/STATPHYS | STATPHYS or IUPAP International Conference on Statistical Physics is a series of conferences organized by the International Union of Pure and Applied Physics. The conferences take place every three years in a different continent to give the maximum international relevance and visibility to the event. It is the world event for the broad field of statistical physics and all its interdisciplinary developments. The first meeting was in Florence (Italy) from 17 to 20 May 1949. After a pioneering period the periodicity of three years was established and the conference has acquired more and more importance. The participation has reached peaks up to 1500 participants in the recent years. Also on the occasion of this conference the prestigious Boltzmann medal is awarded. In addition several satellite meetings are usually held along with the main event, adding to the scientific value of the meeting. |
https://en.wikipedia.org/wiki/RR%20Media | RR Media was a NASDAQ listed provider of global digital media services to the broadcast industry and content owners. Its services can be divided into four main groups: global content distribution network (satellite, fiber and the internet); content management & playout; sports, news & live events; and online video services.
The company was rebranded to RR Media from RRsat in September 2014.
In February 2016, it was announced that, subject to regulatory approvals, RR Media was to be acquired by SES, based in Betzdorf, Luxembourg, and merged with SES subsidiary company, SES Platform Services a media services provider for television broadcasters, production companies and platform operators, based in Unterföhring near Munich, Germany. In July 2016, the merged company was named MX1.
Digital media services
Global content distribution services RR Media's global distribution network uses a combination of satellite, fiber and the internet. The network includes satellite downlink and uplink; fiber connectivity to digital media hubs; connectivity to TV service providers; and internet-based content delivery. RR Media's network delivers live television channels, streaming media and Video on demand (VOD) content in all formats including Standard-definition television (SD), High-definition television (HD), 4K resolution (4K) & 3D television (3D).
End-to-end content management & playout services RR Media manages, prepares and plays out content from its media centers. Services include: content preparation (digitization, localization, conversion, ingest, multiple formatting, editing, restoration); content management (digital asset management, media ingest and library, streamlined workflows, metadata curation, Video on demand (VOD) delivery) and playout, channel creation, playlist management, advertising insertion/management, graphics, titles & overlay, live events operations). RR Media also creates branded or white label product television channels using live and archived materi |
https://en.wikipedia.org/wiki/Doob%27s%20martingale%20convergence%20theorems | In mathematicsspecifically, in the theory of stochastic processesDoob's martingale convergence theorems are a collection of results on the limits of supermartingales, named after the American mathematician Joseph L. Doob. Informally, the martingale convergence theorem typically refers to the result that any supermartingale satisfying a certain boundedness condition must converge. One may think of supermartingales as the random variable analogues of non-increasing sequences; from this perspective, the martingale convergence theorem is a random variable analogue of the monotone convergence theorem, which states that any bounded monotone sequence converges. There are symmetric results for submartingales, which are analogous to non-decreasing sequences.
Statement for discrete-time martingales
A common formulation of the martingale convergence theorem for discrete-time martingales is the following. Let be a supermartingale. Suppose that the supermartingale is bounded in the sense that
where is the negative part of , defined by . Then the sequence converges almost surely to a random variable with finite expectation.
There is a symmetric statement for submartingales with bounded expectation of the positive part. A supermartingale is a stochastic analogue of a non-increasing sequence, and the condition of the theorem is analogous to the condition in the monotone convergence theorem that the sequence be bounded from below. The condition that the martingale is bounded is essential; for example, an unbiased random walk is a martingale but does not converge.
As intuition, there are two reasons why a sequence may fail to converge. It may go off to infinity, or it may oscillate. The boundedness condition prevents the former from happening. The latter is impossible by a "gambling" argument. Specifically, consider a stock market game in which at time , the stock has price . There is no strategy for buying and selling the stock over time, always holding a non-negative amoun |
https://en.wikipedia.org/wiki/Electrical%20penetration%20graph | The electrical penetration graph or EPG is a system used by biologists to study the interaction of insects such as aphids, thrips, and leafhoppers with plants. Therefore, it can also be used to study the basis of plant virus transmission, host plant selection by insects and the way in which insects can find and feed from the phloem of the plant. It is a simple system consisting of a partial circuit which is only completed when a species such as aphids, which are the most abundantly studied, inserts its stylet into the plant in order to probe the plant as a suitable host for feeding. The completed circuit is displayed visually as a graph with different waveforms indicating either different insect activities such as saliva excretion or the ingestion of cellular contents or indicating which tissue type has been penetrated (i.e. phloem, xylem or mesophyll). So far, around ten different graphical waveforms are known, correlating with different insect/plant interaction events.
The Circuit
The circuit connects to the insect via a 20 μm gold or platinum wire and to the plant via a copper electrode placed in the soil. The circuit also passes through, normally, a one gigaohm resistor and a 50x amplifier before the results are stored digitally and interpreted by a computer to calculate the final graph.
See also
Plant Viruses
Epidemiology
Aphididae
Insect |
https://en.wikipedia.org/wiki/Moses%20%28machine%20translation%29 | Moses is a free software, statistical machine translation engine that can be used to train statistical models of text translation from a source language to a target language, developed by the University of Edinburgh. Moses then allows new source-language text to be decoded using these models to produce automatic translations in the target language. Training requires a parallel corpus of passages in the two languages, typically manually translated sentence pairs. Moses is released under the LGPL licence and available both as source code and binaries for Windows and Linux. Its development is primarily supported by the EuroMatrix project, with funding by the European Commission.
Among its features are:
A beam search algorithm that quickly finds the highest probability translation within a number of choices
Phrase-based translation of short text chunks
Handles words with multiple factored representations to enable the integration of linguistic and other information (e.g., surface form, lemma and morphology, part-of-speech, word class)
Decodes ambiguous forms of a source sentence, represented as a confusion network, to support integration with upstream tools such as speech recognizers
Support for large language models (LMs) such as IRSTLM (an exact LM using memory-mapping) and RandLM (an inexact LM based on Bloom filters)
See also
Apertium
OpenLogos
Comparison of machine translation applications
Machine translation |
https://en.wikipedia.org/wiki/Anti-gliadin%20antibodies | Anti-gliadin antibodies are produced in response to gliadin, a prolamin found in wheat. In bread wheat it is encoded by three different alleles, AA, BB, and DD. These alleles can produce slightly different gliadins, which can cause the body to produce different antibodies. Some of these antibodies can detect proteins in specific grass taxa such as Triticeae (Triticeae glutens), while others react sporadically with certain species in those taxa, or over many taxonomically defined grass tribes.
Subtypes
Anti-gliadin IgA
This antibody is found in ~80% of patients with coeliac disease. It is directed
against the alpha/beta and gamma (α,β,γ) gliadins. It is also found in a number of patients who are not enteropathic. Some of these patients may have neuropathies that respond favorably to a gluten elimination diet. This is referred to as gluten-sensitive idiopathic neuropathy. Clinically these antibodies and IgG antibodies to gliadin are abbreviated as AGA.
Anti-gliadin IgG
The IgG antibody is similar to AGA IgA, but is found at higher levels in patients with the IgA-less phenotype. It is also associated with coeliac disease and non-celiac gluten sensitivity.
Anti-gliadin antibodies are frequently found with anti-transglutaminase antibodies.
Anti-gliadin IgE
The IgE antibodies are more typically found in allergy-related conditions such as urticaria, asthma, and wheat-dependent exercise-induced anaphylaxis. The target of the most allergenic antibodies is ω-5 gliadin, which is encoded by the Gli-1B gene found on the B haplome (Aegilops speltoides derived) of wheat.
Gluten-free diet
What is the relationship of gluten and anti-gliadin antibodies? In gluten-sensitive individuals AGA testing is a routinely used blood test for possible presence of coeliac disease, allergies or idiopathic phenomena. The measurement of AGA is done with ELISA or radioimmunoassay. Such tests measure the level of AGA relative to a standard, such as a level of 10 = point which 85% of normal po |
https://en.wikipedia.org/wiki/Lipoatrophy | Lipoatrophy is the term describing the localized loss of fat tissue. This may occur as a result of subcutaneous injections of insulin in the treatment of diabetes, from the use of human growth hormone or from subcutaneous injections of copaxone used for the treatment of multiple sclerosis. In the latter case, an injection may produce a small dent at the injection site. Lipoatrophy occurs in HIV-associated lipodystrophy, one cause of which is an adverse drug reaction that is associated with some antiretroviral medications.
A more general term for an abnormal or degenerative condition of the entire body's adipose tissue is lipodystrophy. |
https://en.wikipedia.org/wiki/Sea%20surface%20microlayer | The sea surface microlayer (SML) is the boundary interface between the atmosphere and ocean, covering about 70% of Earth's surface. With an operationally defined thickness between 1 and , the SML has physicochemical and biological properties that are measurably distinct from underlying waters. Recent studies now indicate that the SML covers the ocean to a significant extent, and evidence shows that it is an aggregate-enriched biofilm environment with distinct microbial communities. Because of its unique position at the air-sea interface, the SML is central to a range of global marine biogeochemical and climate-related processes.
The sea surface microlayer is the boundary layer where all exchange occurs between the atmosphere and the ocean. The chemical, physical, and biological properties of the SML differ greatly from the sub-surface water just a few centimeters beneath.
Despite the huge extent of the ocean's surface, until now relatively little attention has been paid to the sea surface microlayer (SML) as the ultimate interface where heat, momentum and mass exchange between the ocean and the atmosphere takes place. Via the SML, large-scale environmental changes in the ocean such as warming, acidification, deoxygenation, and eutrophication potentially influence cloud formation, precipitation, and the global radiation balance. Due to the deep connectivity between biological, chemical, and physical processes, studies of the SML may reveal multiple sensitivities to global and regional changes.
Understanding the processes at the ocean's surface, in particular involving the SML as an important and determinant interface, could provide an essential contribution to the reduction of uncertainties regarding ocean-climate feedbacks. As of 2017, processes occurring within the SML, as well as the associated rates of material exchange through the SML, remained poorly understood and were rarely represented in marine and atmospheric numerical models.
Overview
The sea surface |
https://en.wikipedia.org/wiki/Norton%20Confidential | Norton Confidential is a program released in 2006 designed to encrypt passwords online and to detect phishing sites. |
https://en.wikipedia.org/wiki/International%20Association%20for%20Sports%20Surface%20Sciences | The International Association for Sports Surface Sciences (ISSS) is the union of labs and experts in the field of sports surfaces. It was founded in 1985 in Switzerland. Its aims are the exchange of information and ideas regarding testing sports surfaces such as sports hall floors, synthetic surfaces of athletic tracks and artificial turf surfaces. Members are located all over the world.
The ISSS is officially related to the IAAF. The ISSS has a board of directors consisting of Hans J. Kolitzus (CH/D), Vic Watson (GB), Ties Joosten (NL) and Alastair Cox (GB)). The head office is located in Switzerland. The ISSS organizes regular Technical Meetings with experts from the industry to discuss issues of common interest.
External links
ISSS website. |
https://en.wikipedia.org/wiki/Point%20distribution%20model | The point distribution model is a model for representing the mean geometry of a shape and some statistical modes of geometric variation inferred from a training set of shapes.
Background
The point distribution model concept has been developed by Cootes, Taylor et al. and became a standard in computer vision for the statistical study of shape and for segmentation of medical images where shape priors really help interpretation of noisy and low-contrasted pixels/voxels. The latter point leads to active shape models (ASM) and active appearance models (AAM).
Point distribution models rely on landmark points. A landmark is an annotating point posed by an anatomist onto a given locus for every shape instance across the training set population. For instance, the same landmark will designate the tip of the index finger in a training set of 2D hands outlines. Principal component analysis (PCA), for instance, is a relevant tool for studying correlations of movement between groups of landmarks among the training set population. Typically, it might detect that all the landmarks located along the same finger move exactly together across the training set examples showing different finger spacing for a flat-posed hands collection.
Details
First, a set of training images are manually landmarked with enough corresponding landmarks to sufficiently approximate the geometry of the original shapes. These landmarks are aligned using the generalized procrustes analysis, which minimizes the least squared error between the points.
aligned landmarks in two dimensions are given as
.
It's important to note that each landmark should represent the same anatomical location. For example, landmark #3, might represent the tip of the ring finger across all training images.
Now the shape outlines are reduced to sequences of landmarks, so that a given training shape is defined as the vector . Assuming the scattering is gaussian in this space, PCA is used to compute normalized eigenvector |
https://en.wikipedia.org/wiki/Language-based%20system | A language-based system is a type of operating system that uses language features to provide security, instead of or in addition to hardware mechanisms. In such systems, code referred to as the trusted base is responsible for approving programs for execution, assuring they cannot perform operations detrimental to the system's stability without first being detected and dealt with. A very common strategy of guaranteeing that such operations are impossible is to base the system around a high-level language, such as Java, whose design precludes dangerous constructs; many are entirely written in such a language, with only the minimum amount of low-level code being used. Since language-based systems can assure ahead of time that they cannot do things that can damage the system (such as corrupting memory by dereferencing dangling pointers), it is possible for them to avoid expensive address space switches needed by traditional OSes; because of this, microkernels are more popular than traditional systems. A more extreme form of this is a high-level language computer architecture, where the trusted base is pushed into hardware, and the entire system is written in a high-level language.
Examples
Burroughs MCP
Cosmos
Emerald
Inferno
JX
Lisp machine
Midori
Oberon
Singularity
Smalltalk
Theseus OS
UCSD P-system
Verve
See also
High-level language computer architecture |
https://en.wikipedia.org/wiki/International%20breastfeeding%20symbol | The international breastfeeding symbol is a symbol that depicts a woman breastfeeding a baby. It was designed by Matt Daigle, a graphic artist and father, in response to a contest hosted by Mothering magazine. The winner was chosen in November 2006 out of a total of more than 500 entries. Daigle, who says his wife and son were the inspiration behind the symbol, released the copyright to the symbol to the public domain.
Increasing cultural diversity and personal mobility have motivated a desire for universal modes of communication. The international breastfeeding symbol was created in the style of the AIGA symbol signs commonly seen in public places. Such symbols are intended to be understood at a glance by most people without written descriptions explaining what they mean.
The international breastfeeding symbol was created to address the perceived problem of not having a universally accepted and understood symbol for breastfeeding available for use in public places. The modern iconography representing infancy usually involves artificial feeding or soothing objects, like a nurser bottle icon or pacifier symbol. Nursing rooms have often used a baby bottle symbol to indicate what they are instead of a symbol of a mother nursing a child. It has been suggested that use of the symbol may be helpful in shifting the bottle-feeding cultural paradigm toward the biological norm of breastfeeding.
In July 2007, the International Breastfeeding Symbol site, a website dedicated to the new symbol, was launched.
Examples of uses of the symbol include:
In 2008, the South Sound Breastfeeding Network of the state of Washington, United States, featured the symbol on a "Breastfeeding Welcome Here" campaign.
In 2009, the symbol was agreed to be posted at a Chick-fil-A restaurant in Winter Park, Florida, United States, following a complaint by a restaurant customer that the manager of the restaurant had unlawfully asked her to cover her baby's head while breastfeeding.
See also
Li |
https://en.wikipedia.org/wiki/Modern%20Arabic%20mathematical%20notation | Modern Arabic mathematical notation is a mathematical notation based on the Arabic script, used especially at pre-university levels of education. Its form is mostly derived from Western notation, but has some notable features that set it apart from its Western counterpart. The most remarkable of those features is the fact that it is written from right to left following the normal direction of the Arabic script. Other differences include the replacement of the Greek and Latin alphabet letters for symbols with Arabic letters and the use of Arabic names for functions and relations.
Features
It is written from right to left following the normal direction of the Arabic script. Other differences include the replacement of the Latin alphabet letters for symbols with Arabic letters and the use of Arabic names for functions and relations.
The notation exhibits one of the very few remaining vestiges of non-dotted Arabic scripts, as dots over and under letters (i'jam) are usually omitted.
Letter cursivity (connectedness) of Arabic is also taken advantage of, in a few cases, to define variables using more than one letter. The most widespread example of this kind of usage is the canonical symbol for the radius of a circle (), which is written using the two letters nūn and qāf. When variable names are juxtaposed (as when expressing multiplication) they are written non-cursively.
Variations
Notation differs slightly from region to another. In tertiary education, most regions use the Western notation. The notation mainly differs in numeral system used, and in mathematical symbol used.
Numeral systems
There are three numeral systems used in right to left mathematical notation.
"Western Arabic numerals" (sometimes called European) are used in western Arabic regions (e.g. Morocco)
"Eastern Arabic numerals" are used in middle and eastern Arabic regions (e.g. Egypt and Syria)
"Eastern Arabic-Indic numerals" are used in Persian and Urdu speaking regions (e.g. Iran, Pakistan, India)
|
https://en.wikipedia.org/wiki/Garlic%20routing | Garlic routing is a variant of onion routing that encrypts multiple messages together to make it more difficult for attackers to perform traffic analysis and to increase the speed of data transfer.
Michael J. Freedman defined "garlic routing" as an extension of onion routing, in which multiple messages are bundled together. He called each message a "bulb", whereas I2P calls them "garlic cloves". All messages, each with their own delivery instructions, are exposed at the endpoint. This allows the efficient bundling of an onion routing "reply block" with the original message.
Garlic routing is one of the key factors that distinguishes I2P from Tor and other privacy or encryption networks. The name alludes to the garlic plant, whose structure this protocol resembles. "Garlic routing" was first coined by Michael J. Freedman in Roger Dingledine's Free Haven Master's thesis Section 8.1.1 (June 2000), as derived from Onion Routing. However, the garlic routing implementation in I2P differs from the design proposed by Freedman. The key difference is that garlic routing has unidirectional tunnels, whereas mainstream alternatives like Tor and Mixmaster use bidirectional tunnels.
Garlic Cast: Lightweight and Decentralized Content Sharing
One potential implementation of the Garlic Routing protocol is shown in the paper, Garlic Cast: Lightweight and Decentralized Anonymous Content Sharing. The idea is to provide a resilient and low latency anonymous content sharing network based on garlic routing. The distinguishing benefit that makes the system different from traditional Tor networks is that it is designed around secure, fast communication. This is made possible by allowing the garlic cast system to use random walks to find proxies in the overlay network and then use the security-enhanced Information Dispersal Algorithm to deliver content in a secure and fast manner. Lastly, the garlic cast network is designed to be highly resistant to a wide range of attacks while still |
https://en.wikipedia.org/wiki/Narayana%20number | In combinatorics, the Narayana numbers form a triangular array of natural numbers, called the Narayana triangle, that occur in various counting problems. They are named after Canadian mathematician T. V. Narayana (1930–1987).
Formula
The Narayana numbers can be expressed in terms of binomial coefficients:
Numerical values
The first eight rows of the Narayana triangle read:
Combinatorial interpretations
Dyck words
An example of a counting problem whose solution can be given in terms of the Narayana numbers , is the number of words containing pairs of parentheses, which are correctly matched (known as Dyck words) and which contain distinct nestings. For instance, , since with four pairs of parentheses, six sequences can be created which each contain two occurrences the sub-pattern :
(()(())) ((()())) ((())())
()((())) (())(()) ((()))()
From this example it should be obvious that , since the only way to get a single sub-pattern is to have all the opening parentheses in the first positions, followed by all the closing parentheses. Also , as distinct nestings can be achieved only by the repetitive pattern .
More generally, it can be shown that the Narayana triangle is symmetric:
The sum of the rows in this triangle equal the Catalan numbers:
Monotonic lattice paths
The Narayana numbers also count the number of lattice paths from to , with steps only northeast and southeast, not straying below the -axis, with peaks.
The following figures represent the Narayana numbers , illustrating the above mentioned symmetries.
The sum of is 1 + 6 + 6 + 1 = 14, which is the 4th Catalan number, . This sum coincides with the interpretation of Catalan numbers as the number of monotonic paths along the edges of an grid that do not pass above the diagonal.
Rooted trees
The number of unlabeled ordered rooted trees with edges and leaves is equal to .
This is analogous to the above examples:
Each Dyck word can be represented as a rooted tree. We start w |
https://en.wikipedia.org/wiki/Fisheries%20monitoring%20control%20and%20surveillance | Monitoring, control and surveillance (MCS), in the context of fisheries, is defined by the Food and Agriculture Organization (FAO) of the United Nations as a broadening of traditional enforcing national rules over fishing, to the support of the broader problem of fisheries management.
Internationally, the basis of law for fisheries management comes from the 1982 United Nations Convention on the Law of the Sea (UNCLOS). Further definition was in the Declaration of Cancun This is complemented by the work of a variety of regional organizations that cover high seas fishing areas. A key concept in international fishing laws is that of the Exclusive Economic Zone, which extends 200 miles (370 km) from the coast of nations bordering on the oceans. EEZ is not a meaningful concept in relatively small seas such as the Mediterranean and Baltic, so those areas tend to have regional agreements for MCS of international waters within those seas.
Components and related activities
MCS has aspects distinct from fisheries management, although there is overlap. According to the 2003 FAO paper on Recent Trends, fisheries management consists of:
Data collection and analysis
Participatory management planning
Establishing a regulatory framework
Input controls
Operational and output controls
Implementation
While MCS, in the basic FAO definitions, does not include enforcement, that category will be included here as part of the means of implementing MCS operations. In MCS discussions, there is a strong emphasis that the success of MCS is not to be measured in number of arrests, but in the level of compliance with presumably reasonable frameworks (i.e., the "control" part of MCS). If a sense of participation in the development of controls, as well as peer pressure, leads to meeting the fisheries management controls without a single arrest, the MCS program is successful.
Monitoring
A 1981 Conference of Experts defined monitoring as " the continuous requirement for the measurement of |
https://en.wikipedia.org/wiki/6-sphere%20coordinates | In mathematics, 6-sphere coordinates are a coordinate system for three-dimensional space obtained by inverting the 3D Cartesian coordinates across the unit 2-sphere . They are so named because the loci where one coordinate is constant form spheres tangent to the origin from one of six sides (depending on which coordinate is held constant and whether its value is positive or negative). They have nothing whatsoever to do with the 6-sphere, which is an object of considerable interest in its own right.
The three coordinates are
Since inversion is its own inverse, the equations for x, y, and z in terms of u, v, and w are similar:
This coordinate system is -separable for the 3-variable Laplace equation.
See also
Multiplicative inverse (for 1-dimensional version) |
https://en.wikipedia.org/wiki/Vessel%20monitoring%20system | Vessel Monitoring Systems (VMS) is a general term to describe systems that are used in commercial fishing to allow environmental and fisheries regulatory organizations to track and monitor the activities of fishing vessels. They are a key part of monitoring control and surveillance (MCS) programs at national and international levels. VMS may be used to monitor vessels in the territorial waters of a country or a subdivision of a country, or in the Exclusive Economic Zones (EEZ) that extend 200 nautical miles (370.4 km) from the coasts of many countries. VMS systems are used to improve the management and sustainability of the marine environment, through ensuring proper fishing practices and the prevention of illegal fishing, and thus protect and enhance the livelihoods of fishermen.
The exact functionality of a VMS system and the associated equipment varies with the requirements of the nation of the vessel's registry, and the regional or national water in which the vessel is operating. Within regional and national VMS initiatives there are also sub-divisions which apply different functionality to different vessel categories. Categories may be size or type of vessel or activity. For example:
Local/regional fish such as scallops in the Northeast U.S., anchovies in Peruvian waters, or rock shrimp in the Gulf of Mexico
Highly migratory species (HMS) such as tuna and billfish, or Patagonian toothfish (Dissostichus eleginoides) in the Antarctic. which can be caught in multiple regions
In this discussion, VMS relates specifically to fisheries management systems. VMS describes the specific application of monitoring commercial fishing boats. It is not to be confused with VTS which is describes the specific application of monitoring marine traffic primarily for safety and efficiency in ports and busy waterways. It is also not to be confused with specific communication technologies such as AIS, Iridium, Inmarsat, Argos, GPRS which relate to the communication method on which |
https://en.wikipedia.org/wiki/Software%20aging | In software engineering, software aging is the tendency for software to fail or cause a system failure after running continuously for a certain time, or because of ongoing changes in systems surrounding the software. Software aging has several causes, including the inability of old software to adapt to changing needs or changing technology platforms, and the tendency of software patches to introduce further errors. As the software gets older it becomes less well-suited to its purpose and will eventually stop functioning as it should. Rebooting or reinstalling the software can act as a short-term fix. A proactive fault management method to deal with the software aging incident is software rejuvenation. This method can be classified as an environment diversity technique that usually is implemented through software rejuvenation agents (SRA).
The phenomenon was first identified by David Parnas, in an essay that explored what to do about it:"Programs, like people, get old. We can't prevent aging, but we can understand its causes, take steps to limit its effects, temporarily reverse some of the damage it has caused, and prepare for the day when the software is no longer viable."
From both an academic and industrial point of view, the software aging phenomenon has increased. Recent research has focussed on clarifying its causes and effects. Memory bloating and leaking, along with data corruption and unreleased file-locks are particular causes of software aging.
Proactive management of software aging
Software aging
Software failures are a more likely cause of unplanned systems outages compared to hardware failures. This is because software exhibits over time an increasing failure rate due to data corruption, numerical error accumulation and unlimited resource consumption. In widely used and specialized software, a common action to clear a problem is rebooting because aging occurs due to the complexity of software which is never free of errors. It is almost impossible |
https://en.wikipedia.org/wiki/Deferred%20Procedure%20Call | A Deferred Procedure Call (DPC) is a Microsoft Windows operating system mechanism which allows high-priority tasks (e.g. an interrupt handler) to defer required but lower-priority tasks for later execution. This permits device drivers and other low-level event consumers to perform the high-priority part of their processing quickly, and schedule non-critical additional processing for execution at a lower priority.
DPCs are implemented by DPC objects which are created and initialized by the kernel when a device driver or some other kernel mode program issues DPC requests. DPC requests are added to the end of a DPC queue. Each processor has a separate DPC queue. DPCs have three priority levels: low, medium, and high. By default, all DPCs are set to medium priority. When Windows drops to an IRQL of Dispatch/DPC level, it checks the DPC queue for any pending DPCs and executes them until the queue is empty or some other interrupt with a higher IRQL occurs.
For example, when the clock interrupt is generated, the clock interrupt handler generally increments the counter of the current thread to calculate the total execution time of that thread, and decrements its quantum time remaining by 1. When the counter drops to zero, the thread scheduler has to be invoked to choose the next thread to be executed on that processor and dispatcher to perform a context switch. Since the clock interrupt occurs at a much higher IRQL, it will be desirable to perform this thread dispatching which is a less critical task at a later time when the processor's IRQL drops. So the clock interrupt handler requests a DPC object and adds it to the end of the DPC queue which will process the dispatching when the processor's IRQL drops to DPC/Dispatch level.
When working with streaming audio or video that uses interrupts, DPCs are used to process the audio in each buffer as they stream in. If another DPC (from a poorly written driver) takes too long and another interrupt generates a new buffer of da |
https://en.wikipedia.org/wiki/List%20of%20Yamaha%20Corporation%20products | This is a list of products made by Yamaha Corporation. This does not include products made by Bösendorfer, which has been a wholly owned subsidiary of Yamaha Corporation since February 1, 2008.
For products made by Yamaha Motor Company, see the list of Yamaha motorcycles. Yamaha Motor Company shares the brand name but has been a separate company since 1955.
Musical instruments
Pianos
In 1900, Yamaha started to manufacture pianos.
Grand pianos
CF series
FC / CF
CFIII
CFIIIS
CF4 (2010–
CF6 (2010–
CFX (2010–)
C series
G1 / C1 / C1x
DC1A
G2 / C2 /C2x
G2F / DG2FII
C3 / C3x
#35 / G5 / new C5 / C5x
old C5 / C6 / C7
G7 / C7 / C7x
SC / CS
G series
G1, G2, G5, G7
#25 / G3
GA1E / DGA1[XG][E]
GC1
GC1S / GC1SG
GC1G / GC1FP
GC1M / DGC1 / DGC1ME3
GC2
GH1 / GH1G
GT7
A series
A1
A1[L][S][SG]
DA1IIXG / DA1E3 / DA1M4
EA1
S series
S4
S4BB
DS4E3PRO PE
S6
S6BB
DS6E3PRO PE
S400
S700E
Z series
Z1
Z1B
Baby grand pianos
GB1
GB1K / DGB1CD — most compact models (depth: ) on current product line
Upright pianos
B1
B2
B3
C108
M460
M560
P121
P22
P660
SU118C
T118
T121
U1
U10
U10 BL
U100
U2
U2M
U3
U30
U300
U5
U7
UX
UX1
UX10
UX100
UX3
UX30
UX300
UX5
UX50
UX500
YU116D/W
YUA
YUS1
YUS3
YUS5
YUX
SU7
Player pianos
Disklavier
Disklavier E3 series
disklavier control unit
DKC-850 (MIDI recorder with PCM sound )
EMR1 (MIDI recorder with PCM sound )
Silent pianos
silent piano system
RSG-1 / RSG-3 / RSG-5 / RSG-10 / RSG-30 (2008, for U1/U3/-/UX10/b121/YF&b113)
ensemble unit
RE-1 / RE-3 / RE-10 / RE-30 (1999, for U1/U3/UX10/W100)
silent ensemble unit
RSE-1 / RSE-3 / RSE-10 (1999, for U1/U3/UX10)
Newer Silent Piano Systems
SG-1 - ? - ?
SG-2 - ? - ?
SC-1 (Aka. SC) - ? -
SC-2 - ? - 2023
SC-3 - 2022 onwards
SC series found in Upright B1,B2,B3 and Grand GB1K - "entry level" models.
SH-1 (Aka. SH)
SH-2 - ? - 2023
SH-3 - 2022 onwards
SH series silent modules found in more up |
https://en.wikipedia.org/wiki/AMD%20FireStream | AMD FireStream was AMD's brand name for their Radeon-based product line targeting stream processing and/or GPGPU in supercomputers. Originally developed by ATI Technologies around the Radeon X1900 XTX in 2006, the product line was previously branded as both ATI FireSTREAM and AMD Stream Processor. The AMD FireStream can also be used as a floating-point co-processor for offloading CPU calculations, which is part of the Torrenza initiative. The FireStream line has been discontinued since 2012, when GPGPU workloads were entirely folded into the AMD FirePro line.
Overview
The FireStream line is a series of add-on expansion cards released from 2006 to 2010, based on standard Radeon GPUs but designed to serve as a general-purpose co-processor, rather than rendering and outputting 3D graphics. Like the FireGL/FirePro line, they were given more memory and memory bandwidth, but the FireStream cards do not necessarily have video output ports. All support 32-bit single-precision floating point, and all but the first release support 64-bit double-precision. The line was partnered with new APIs to provide higher performance than existing OpenGL and Direct3D shader APIs could provide, beginning with Close to Metal, followed by OpenCL and the Stream Computing SDK, and eventually integrated into the APP SDK.
For highly parallel floating point math workloads, the cards can speed up large computations by more than 10 times; Folding@Home, the earliest and one of the most visible users of the GPGPU, obtained 20-40 times the CPU performance. Each pixel and vertex shader, or unified shader in later models, can perform arbitrary floating-point calculations.
History
Following the release of the Radeon R520 and GeForce G70 GPU cores with programmable shaders, the large floating-point throughput drew attention from academic and commercial groups, experimenting with using then for non-graphics work. The interest led ATI (and Nvidia) to create GPGPU products — able to calculate general pu |
https://en.wikipedia.org/wiki/Scheutjens%E2%80%93Fleer%20theory | Scheutjens–Fleer theory is a lattice-based self-consistent field theory that is the basis for many computational analyses of polymer adsorption. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.