source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Gadd45 | The Growth Arrest and DNA Damage or gadd45 genes, including GADD45A (originally termed gadd45) GADD45B (originally termed MyD118), and GADD45G (originally termed CR6), are implicated as stress sensors that modulate the response of mammalian cells to genotoxic/physiological stress, and modulate tumor formation. Gadd45 proteins interact with other proteins implicated in stress responses, including PCNA, p21, Cdc2/CyclinB1, MEKK4, and p38 kinase.
GADD45 proteins regulate differentiation at the two cell stage of embryogenesis, a key stage of zygotic genome activation. GADD45 likely acts by promoting TET-mediated DNA demethylation leading to the induction of expression of genes necessary for zygote activation.
Overexpression of the GADD45 gene in the Drosophila melanogaster nervous system significantly increases longevity. This longevity increase can be attributed to more efficient recognition and repair of spontaneous DNA damages generated by physiological processes and environmental factors.
History
Gadd45a was discovered and characterized in the laboratory of Dr. Albert J. Fornace Jr. in 1988.
Gadd45b (MyD118) was discovered and characterized in the laboratories of Drs. Dan A. Liebermann and Barbara Hoffman in 1991.
Gadd45g (CR6) was discovered and characterized in the laboratories of Drs. Kenneth Smith, Dan A. Liebermann, and Barbara Hoffman in 1993 and 1999.
See also
GADD45A
GADD45B
GADD45G |
https://en.wikipedia.org/wiki/Region%20of%20freshwater%20influence | Region of Freshwater Influence (ROFI) is a region in coastal sea where stratification is governed by the local input of freshwater discharge from the coastal source, while the role of the seasonal input of buoyancy from atmospheric heating is much smaller.
Background
ROFI and river plume are similar terms related to water masses formed as a result of mixing of river discharge and sea water. The difference between river plumes and ROFI's consists in their spatial scales and freshwater residence time. River plumes are regarded as water masses formed as a result of transformation of freshwater discharge in coastal sea on diurnal to synoptic time scales, while ROFI’s reproduce transformation of freshwater discharge on seasonal to annual time scales. A river plume embedded into a ROFI reproduce a continuous process of transformation of freshwater discharge.
Initially, river discharge enters the shelf sea from a river mouth and forms a sub-mesoscale (with spatial extents ~1-10 km) or mesoscale (with spatial extents ~10-100 km) water mass referred to as a river plume. Salinity within a plume is significantly lower than that of surrounding sea water. Structure and dynamical characteristics within a river plume are strongly inhomogeneous. In particular, salinity and velocity fields in the vicinity of a freshwater source are significantly different as compared to the outer parts of a plume.
A river plume is spreading and mixing with ambient saline sea water, which results in the transformation of a plume, but also influences the hydrological structure of the ambient sea. Strength and extent of this influence mainly depend on the volume of freshwater discharge and varies from negligible impact of small plumes formed by rivers with low discharge rates to the formation of stable freshened water masses in the upper ocean by the World’s largest rivers on wide coastal and shelf areas. The latter water masses with spatial extents on the order of hundreds of kilometers are referre |
https://en.wikipedia.org/wiki/WD%20Anywhere%20Access | WD Anywhere Access (also known as WD Anywhere Access Powered by MioNet and MioNet) was a remote-access product offered by Western Digital from 2007 to 2016. MioNet was originally a product of Palo Alto–based Senvid. Western Digital purchased the assets of Senvid in 2007.
Overview
The product was composed of a server and client program. The service program was preinstalled on Western Digital NAS products, such as the My Book World Edition, with three interface methods available to the user: specifically, Start, Stop, and Reset.
Upon starting, the service established a connection across the Internet with MioNet. The client program was distributed in two formats: as a Java applet and an installable program. Both client formats could connect to the server, across either a LAN or the Internet, after first connecting to MioNet. The installable client program was initially required to register and associate the NAS with a MioNet account. MioNet then facilitated all connections to the NAS service. Once connected, the client could upload or download files to the NAS.
WD Anywhere Access also offered premium subscription services, such as a remote desktop similar to VNC, and a remote PC drive similar to FTP.
Criticism
According to complaints posted on many Internet discussion boards, the MioNet product had a reputation for intermittently dropping access to the network drive through the MioNet utility. Many users who did not want or need access to their files from remote locations carefully removed MioNet from their My Book World II storage network servers.
Termination of service
On 26 February 2015, Western Digital notified its MioNet customers that the service would be terminated on 31 March 2016. New subscriptions would not be accepted from March 2015. Month-to-month customers would have free access during that period. No reason was cited for the termination and no flow on service was announced.
Computer storage devices |
https://en.wikipedia.org/wiki/Pritchardia%20woodfordiana | Pritchardia woodfordiana is a species of flowering plant in the family Arecaceae. It is found only in Solomon Islands. It may be a form of Pritchardia pacifica. |
https://en.wikipedia.org/wiki/Hunchback%20%28video%20game%29 | Hunchback (shown as Hunch Back on the title screen) is a video game developed by Century Electronics and published in arcades in 1983. The game is loosely based on the 1831 Victor Hugo novel The Hunchback of Notre-Dame and the player controls Quasimodo. Set on top of a castle wall, the player must guide the Hunchback from left to right while avoiding obstacles on a series of non-scrolling screens. The goal of each screen is to ring the church bell at the far right.
Gameplay
Obstacles include pits which must be swung over on a long rope, ramparts which must be jumped (some of which contain knights with spears) and flying fireballs and arrows (to be ducked or jumped). To impose a time limit on each screen a knight climbs the wall, costing the player a life should he reach the top. Eventually, after completing a number of screens, the player must rescue Esmeralda. If this final screen is completed, the game begins again at a faster speed.
Development
The main character was originally Robin Hood with the game set in Sherwood Forest but the setting was changed to Nottingham Castle as the theme was deemed too similar to the games main inspiration, Pitfall!. The addition of the bell as a reward at the end of each screen led to the main character becoming the Hunchback of Notre Dame instead. A deadline to present the game at an industry show meant there was no time to rework the graphics, so the main character remained in a Lincoln green costume.
Ports
An unauthorised version of the game was published by Superior Software for the BBC Micro in 1983, reaching the number one position in the BBC charts. Century Electronics took out an injunction to prevent the game from being sold before reaching a licensing agreement with the publisher.
Ocean Software also licensed the game, publishing ports for the Commodore 64, Oric, and ZX Spectrum in late 1983, with versions for the Acorn Electron, Amstrad CPC, VIC-20, Dragon 32 and MSX released later. It was Ocean's first arcade p |
https://en.wikipedia.org/wiki/Photoionisation%20cross%20section | Photoionisation cross section in the context of condensed matter physics refers to the probability of a particle (usually an electron) being emitted from its electronic state.
Cross section in photoemission
The photoemission is a useful experimental method for the determination and the study of the electronic states. Sometimes the small amount of deposited material over a surface has a weak contribution to the photoemission spectra, which makes its identification very difficult.
The knowledge of the cross section of a material can help to detect thin layers or 1D nanowires over a substrate. A right choice of the photon energy can enhance a small amount of material deposited over a surface, otherwise the display of the different spectra won't be possible.
See also
Gamma ray cross section
ARPES
Synchrotron radiation
Cross section (physics)
Absorption cross section
Nuclear cross section |
https://en.wikipedia.org/wiki/Pentastarch | Pentastarch is a subgroup of hydroxyethyl starch, with five hydroxyethyl groups out of each 11 hydroxyls, giving it approximately 50% hydroxyethylation. This compares with tetrastarch at 40% and hetastarch at 70% hydroxyethylation, respectively.
It is sold under the name Pentaspan and used for fluid resuscitation. It is considered a plasma expander because it remains primarily intravascular after infusion.
Choice of resuscitation fluid
The choice of fluid (normal saline vs. Ringer's lactate vs. pentaspan) is controversial.
Physiologically, fluid with pentaspan stays primarily in the intravascular space: blood plasma. This is different than normal saline, which shifts quickly into the rest of the extracellular compartment.
Advocates of pentaspan use believe that:
the primary deficit in fluid resuscitation is intravascular volume loss and
use of normal saline may lead to pulmonary edema, particularly in older patients.
Normal saline versus pentastarch
Casualty
Pentastarch in the emergency setting is not well studied and its use not of proven benefit. One small study that compared normal saline and pentastarch failed to show any significant survival advantage; however, significantly less volume was required for resuscitation in the pentastarch group.
Cardiac surgery
A study is currently being done to compare normal saline with pentastarch following cardiac surgery.
Cost
Pentastarch is more expensive than normal saline, but less expensive than albumin.
See also
Hetastarch
Intravenous therapy |
https://en.wikipedia.org/wiki/Aggressive%20mimicry | Aggressive mimicry is a form of mimicry in which predators, parasites, or parasitoids share similar signals, using a harmless model, allowing them to avoid being correctly identified by their prey or host. Zoologists have repeatedly compared this strategy to a wolf in sheep's clothing. In its broadest sense, aggressive mimicry could include various types of exploitation, as when an orchid exploits a male insect by mimicking a sexually receptive female (see pseudocopulation), but will here be restricted to forms of exploitation involving feeding. For example, indigenous Australians who dress up as and imitate kangaroos when hunting would not be considered aggressive mimics, nor would a human angler, though they are undoubtedly practising self-decoration camouflage. Treated separately is molecular mimicry, which shares some similarity; for instance a virus may mimic the molecular properties of its host, allowing it access to its cells. An alternative term, Peckhamian mimicry, has been suggested (after George and Elizabeth Peckham), but it is seldom used.
Aggressive mimicry is opposite in principle to defensive mimicry, where the mimic generally benefits from being treated as harmful. The mimic may resemble its own prey, or some other organism which is beneficial or at least not harmful to the prey. The model, i.e. the organism being 'imitated', may experience increased or reduced fitness, or may not be affected at all by the relationship. On the other hand, the signal receiver inevitably suffers from being tricked, as is the case in most mimicry complexes.
Aggressive mimicry often involves the predator employing signals which draw its potential prey towards it, a strategy which allows predators to simply sit and wait for prey to come to them. The promise of food or sex are most commonly used as lures. However, this need not be the case; as long as the predator's true identity is concealed, it may be able to approach prey more easily than would otherwise be the case |
https://en.wikipedia.org/wiki/Hok/sok%20system | The hok/sok system is a postsegregational killing mechanism employed by the R1 plasmid in Escherichia coli. It was the first type I toxin-antitoxin pair to be identified through characterisation of a plasmid-stabilising locus. It is a type I system because the toxin is neutralised by a complementary RNA, rather than a partnered protein (type II toxin-antitoxin).
Genes involved
The hok/sok system involves three genes:
hok, host killing - a long lived (half-life 20 minutes) toxin
sok, suppression of killing - a short lived (half-life 30 seconds) RNA antitoxin
mok, modulation of killing - required for hok translation
Killing mechanism
When E. coli undergoes cell division, the two daughter cells inherit the long-lived hok toxin from the parent cell. Due to the short half-life of the sok antitoxin, daughter cells inherit only small amounts and it quickly degrades.
If a daughter cell has inherited the R1 plasmid, it has inherited the sok gene and a strong promoter which brings about high levels of transcription. So much so that in an R1-positive cell, Sok transcript exists in considerable molar excess over Hok mRNA. Sok RNA then indirectly inhibits the translation of hok by inhibiting mok translation. There is a complementary region where sok transcript binds hok mRNA directly (pictured), but it does not occlude the Shine-Dalgarno sequence. Instead, sok RNA regulates the translation of the mok open reading frame, which nearly entirely overlaps that of hok. It is this translation-coupling which effectively allows sok RNA to repress the translation of hok mRNA.
The sok transcript forms a duplex with the leader region of hok mRNA and this is recognized by RNase III and degraded. The cleavage products are very unstable and soon decay.
Daughter cells without a copy of the R1 plasmid die because they do not have the means to produce more sok antitoxin transcript to inhibit translation of the inherited hok mRNA. The killing system is said to be postsegregational (PSK) |
https://en.wikipedia.org/wiki/Resurrection%20stone | A resurrection stone is a stone of immense weight which was hired out to prevent newly buried corpses from being stolen.
List of resurrection stones in the United Kingdom
St Laurence Church, Lurgashall
Llantrisant
Dean Row Chapel, Wilmslow |
https://en.wikipedia.org/wiki/Diffusionless%20transformation | Diffusionless transformations, also referred to as displacive transformations, are solid-state changes in the crystal structure that do not rely on the diffusion of atoms over long distances. Instead, they occur due to coordinated shifts in atomic positions, where atoms move by a distance less than the span between neighboring atoms while maintaining their relative arrangement. An illustrative instance of this is the martensitic transformation observed in steel. The term "martensite" was initially used to designate the hard and finely dispersed constituent that forms in rapidly cooled steels. Subsequently, it was discovered that other materials, including non-ferrous alloys and ceramics, can undergo diffusionless transformations as well. As a result, the term "martensite" has taken on a more inclusive meaning to encompass the resulting product of such transformations. With diffusionless transformations, there is some form of cooperative, homogeneous movement that results in a change to the crystal structure during a phase change. These movements are small, usually less than their interatomic distances, and the neighbors of an atom remain close. The systematic movement of large numbers of atoms led to some to refer to these as military transformations in contrast to civilian diffusion-based phase changes, initially by Frederick Charles Frank and John Wyrill Christian.
The most commonly encountered transformation of this type is the martensitic transformation which, while probably the most studied, is only one subset of non-diffusional transformations. The martensitic transformation in steel represents the most economically significant example of this category of phase transformations. However, an increasing number of alternatives, such as shape memory alloys, are becoming more important as well.
Classification and definitions
When a structural change occurs by the coordinated movement of atoms (or groups of atoms) relative to their neighbors, the change is termed |
https://en.wikipedia.org/wiki/Camera%20matrix | In computer vision a camera matrix or (camera) projection matrix is a matrix which describes the mapping of a pinhole camera from 3D points in the world to 2D points in an image.
Let be a representation of a 3D point in homogeneous coordinates (a 4-dimensional vector), and let be a representation of the image of this point in the pinhole camera (a 3-dimensional vector). Then the following relation holds
where is the camera matrix and the sign implies that the left and right hand sides are equal except for a multiplication by a non-zero scalar :
Since the camera matrix is involved in the mapping between elements of two projective spaces, it too can be regarded as a projective element. This means that it has only 11 degrees of freedom since any multiplication by a non-zero scalar results in an equivalent camera matrix.
Derivation
The mapping from the coordinates of a 3D point P to the 2D image coordinates of the point's projection onto the image plane, according to the pinhole camera model, is given by
where are the 3D coordinates of P relative to a camera centered coordinate system, are the resulting image coordinates, and f is the camera's focal length for which we assume f > 0. Furthermore, we also assume that x3 > 0.
To derive the camera matrix, the expression above is rewritten in terms of homogeneous coordinates. Instead of the 2D vector we consider the projective element (a 3D vector) and instead of equality we consider equality up to scaling by a non-zero number, denoted . First, we write the homogeneous image coordinates as expressions in the usual 3D coordinates.
Finally, also the 3D coordinates are expressed in a homogeneous representation and this is how the camera matrix appears:
or
where is the camera matrix, which here is given by
,
and the corresponding camera matrix now becomes
The last step is a consequence of itself being a projective element.
The camera matrix derived here may appear trivial in th |
https://en.wikipedia.org/wiki/Hilbert%E2%80%93Schmidt%20integral%20operator | In mathematics, a Hilbert–Schmidt integral operator is a type of integral transform. Specifically, given a domain (an open and connected set) Ω in n-dimensional Euclidean space Rn, a Hilbert–Schmidt kernel is a function k : Ω × Ω → C with
(that is, the L2(Ω×Ω; C) norm of k is finite), and the associated Hilbert–Schmidt integral operator is the operator K : L2(Ω; C) → L2(Ω; C) given by
Then K is a Hilbert–Schmidt operator with Hilbert–Schmidt norm
Hilbert–Schmidt integral operators are both continuous (and hence bounded) and compact (as with all Hilbert–Schmidt operators).
The concept of a Hilbert–Schmidt operator may be extended to any locally compact Hausdorff spaces. Specifically, let X be a locally compact Hausdorff space equipped with a positive Borel measure. Suppose further that L2(X) is a separable Hilbert space. The above condition on the kernel k on Rn can be interpreted as demanding k belong to L2(X × X). Then the operator
is compact. If
then K is also self-adjoint and so the spectral theorem applies. This is one of the fundamental constructions of such operators, which often reduces problems about infinite-dimensional vector spaces to questions about well-understood finite-dimensional eigenspaces. See Chapter 2 of the book by Bump in the references for examples.
See also
Hilbert–Schmidt operator |
https://en.wikipedia.org/wiki/Distributed%20active%20transformer | Distributed active transformer is a circuit topology that allows low-voltage transistors to be used to generate large amounts of RF (radio frequency) power. Its main use has been in making integrated CMOS power amplifier for wireless applications, such as GSM/GPRS cellular phones.
At the time it was introduced, the distributed active transformer performance improved more than an order of magnitude relative to the previous state of the art.
Output power of up to 2.2 Watt in S-band was demonstrated back in 2002, utilizing Distributed active transformer which combine the power of four differential power amplifiers. |
https://en.wikipedia.org/wiki/Savage%20Pond | Savage Pond is an action pond simulation game which was written by Peter Judd for the Acorn Electron and BBC Micro, and by Gwyll Jones for the 16k versions of the Atari 8-bit family of home computers in 1983 and the Commodore 64 in 1984. It was originally released under the Starcade label and was reissued in 1985 when Argus acquired the Bug-Byte budget label.
Overview
The game is set in a pond with the player taking the role of a tadpole. The aim of the game is to build up a colony of frogs while avoiding the many hazards. The setting and characters are all quite true to life which was quite unique at the time. Most contemporary arcade games, even if not set in space, such as Frogger (with frogs that cannot swim) and Centipede (which is basically a space shoot 'em up with characters that look like insects), were far from realistic. The instructions include descriptions of all the 'cast' including their Latin names and information not relevant to the game itself. Although it may appear to be an educational game it is actually a fast-paced arcade game.
Gameplay
The game begins with Colony 1, which is a simple, peaceful pond. The tadpole character can swim around the pond eating amoeba. The only hazard in the pond are the hydra clinging to the bottom of the pond that will sting and kill the tadpole if they touch. There is also a dragonfly that occasionally flies over the pond and drops an egg. The egg can be eaten but if left to hatch, the larva will escape (but again can be eaten) and return as a nymph which will chase the tadpole until it catches and eats it or becomes exhausted and chrysalises to become another dragonfly. In order to build the frog colony, many 'evolutions' must take place, most of which increase the number of hazards. Blood worms regularly fall into the water and must be collected. After five worms are eaten, a beetle larva appears. If this is eaten quickly, the pond 'evolves'. In Colony 1 this means the introduction of jellyfish (similar to the |
https://en.wikipedia.org/wiki/PROLITH | PROLITH (abbreviated from Positive Resist Optical LITHography) is a computer simulator modeling the optical and chemical aspects of photolithography. Chris Mack started developing PROLITH after he began working in the field of photolithography at the NSA in 1983.
PROLITH was first developed on an IBM PC. The models implemented by the software were based on the work done by Rick Dill at IBM and Andy Neureuther at UC Berkeley, together with Chris Mack's own contributions such as the Mack model.
Originally PROLITH was given away for free, while NSA was paying Chris Mack's salary. In 1990 he founded FINLE Technologies to commercialize PROLITH. The first commercial version of the software, named PROLITH/2, was released in June of that year. PROLITH was made easier to use and it grew to include many more aspects of lithography simulation.
FINLE Technologies was purchased in February 2000 by KLA-Tencor, which now markets PROLITH. |
https://en.wikipedia.org/wiki/Molecular%20Biology%20and%20Evolution | Molecular Biology and Evolution is a monthly peer-reviewed scientific journal published by Oxford University Press on behalf of the Society for Molecular Biology and Evolution. It publishes work in the intersection of molecular biology and evolutionary biology. The founding editors-in-chief were Walter Fitch and Masatoshi Nei; the present editor-in-chief is Sudhir Kumar.
According to the Journal Citation Reports, the journal has a 2017 Impact Factor of 10.217, a 2018 Impact Factor of 14.797, a 2019 Impact Factor of 11.062, and a 2021 Impact Factor of 8.800 |
https://en.wikipedia.org/wiki/Ni%20Wei-tou | Ni Wei-tou (; born 1944 in Zhenhai, Ningbo, Zhejiang) is a Taiwanese physicist, who graduated from the Department of Physics of National Taiwan University (NTU), and got his PhD of Physics & Mathematics from California Institute of Technology. After his retirement on 1 October 2000, he is now appointed as a professor emeritus of the Department of Physics of National Tsing Hua University (NTHU) at Hsinchu, Taiwan, since 2006.
He is an expert of theoretical and experimental gravitational physics, astrophysics, cosmology, particle physics, and quantum optics etc. He is famous for his alternative theories of gravitation to general relativity, such as Ni (1972), Ni (1973), and Lee, Lightman & Ni (1974). He has been devoted to popular science in Taiwan.
Books
2017 One Hundred Years of General Relativity: From Genesis and Empirical Foundations to Gravitational Waves, Cosmology and Quantum Gravity (The 2 Volumes) |
https://en.wikipedia.org/wiki/Surge%20tank | A Surge tank is a water storage device used as a pressure neutralizer in hydropower water conveyance systems in order to dampen excess pressure variance.
A surge tank (or surge drum or surge pool) is a standpipe or storage reservoir at the downstream end of a closed aqueduct, feeder, dam, barrage pipe to absorb sudden rises of pressure, as well as to quickly provide extra water during a brief drop in pressure.
In mining technology, ore pulp pumps use a relatively small surge tank to maintain a steady loading on the pump.
For hydroelectric power uses, a surge tank is an additional storage space or reservoir fitted between the main storage reservoir and the powerhouse (as close to the powerhouse as possible). Surge tanks are usually provided in high or medium-head plants when there is a considerable distance between the water source and the power unit, necessitating a long penstock.
The main functions of the surge tank are:
1. When the load decreases, the water moves backward and gets stored in it.
2. When the load increases, the additional supply of water will be provided by a surge tank.
In short, the surge tank mitigates pressure variations due to rapid changes in the velocity of water.
Operation
Consider a pipe containing a flowing fluid. When a valve is either fully or partially closed at some point downstream, the fluid will continue to flow at the original velocity. In order to counteract the momentum of the fluid, the pressure will rise significantly (pressure surge) just upstream of the control valve and may result in damage to the pipe system. If a surge chamber is connected to the pipeline just upstream of the valve, on valve closure, the fluid, instead of being stopped suddenly by the valve, will flow upwards into the chamber, hence reducing the surge pressures experienced in the pipeline.
Upon closure of the valve, the fluid continues to flow, passing into the surge tank causing the water level in the tank to rise. The level in the tank will cont |
https://en.wikipedia.org/wiki/Selaginella%20rupestris | Selaginella rupestris, the northern selaginella sometimes locally known as ledge spike-moss or rock spike-moss, is a species of spike-moss occurring in dry rocky places in eastern North America, including one locality in Greenland. It has a wide but sporadic range. In the absence of water, it rolls into a ball for which, it is also known as bird nest moss. Again, when it comes in contact with water, it opens up.
It is listed as imperiled and threatened in the State of Indiana. |
https://en.wikipedia.org/wiki/1971%20Iraq%20poison%20grain%20disaster | The 1971 Iraq poison grain disaster was a mass methylmercury poisoning incident that began in late 1971. Grain treated with a methylmercury fungicide and never intended for human consumption was imported into Iraq as seed grain from Mexico and the United States. Due to a number of factors, including foreign-language labelling and late distribution within the growing cycle, this toxic grain was consumed as food by Iraqi residents in rural areas. People suffered from paresthesia (numbness of skin), ataxia (lack of coordination of muscle movements) and vision loss, symptoms similar to those seen when Minamata disease affected Japan. The recorded death toll was 459 people, but figures at least ten times greater have been suggested. The 1971 poisoning was the largest mercury poisoning disaster when it occurred, with cases peaking in January and February 1972 and stopping by the end of March.
Reports after the disaster recommended tighter regulation, better labelling and handling of mercury-treated grain, and wider involvement of the World Health Organization in monitoring and preventing poisoning incidents. Investigation confirmed the particular danger posed to fetuses and young children.
Context
The properties of mercury make it an effective fungicide. Methylmercury had been banned in Sweden in 1966, the first country to do so, and the United Kingdom followed in 1971. Previous mercury-poisoning incidents had occurred in Iraq in 1956 and 1960. In 1956, there had been around 200 cases, and 70 deaths; in 1960 there had been 1000 cases and 200 deaths, in both cases due to ethylmercury compounds. Among the recommendations made after the 1960 incident had been to colour any toxic grain for easy identification. Before the 1971 incident, around 200–300 cases of methylmercury poisoning had been reported worldwide. Drought had reduced harvests in 1969, affecting 500,000 people, and in 1970.
Causes
Some of grain (73,201 tonnes of wheat grain and 22,262 tonnes of barley) |
https://en.wikipedia.org/wiki/Absoluteness%20%28logic%29 | In mathematical logic, a formula is said to be absolute to some class of structures (also called models), if it has the same truth value in each of the members of that class. One can also speak of absoluteness of a formula between two structures, if it is absolute to some class which contains both of them.. Theorems about absoluteness typically establish relationships between the absoluteness of formulas and their syntactic form.
There are two weaker forms of partial absoluteness. If the truth of a formula in each substructure N of a structure M follows from its truth in M, the formula is downward absolute. If the truth of a formula in a structure N implies its truth in each structure M extending N, the formula is upward absolute.
Issues of absoluteness are particularly important in set theory and model theory, fields where multiple structures are considered simultaneously. In model theory, several basic results and definitions are motivated by absoluteness. In set theory, the issue of which properties of sets are absolute is well studied. The Shoenfield absoluteness theorem, due to Joseph Shoenfield (1961), establishes the absoluteness of a large class of formulas between a model of set theory and its constructible universe, with important methodological consequences. The absoluteness of large cardinal axioms is also studied, with positive and negative results known.
In model theory
In model theory, there are several general results and definitions related to absoluteness. A fundamental example of downward absoluteness is that universal sentences (those with only universal quantifiers) that are true in a structure are also true in every substructure of the original structure. Conversely, existential sentences are upward absolute from a structure to any structure containing it.
Two structures are defined to be elementarily equivalent if they agree about the truth value of all sentences in their shared language, that is, if all sentences in their language are a |
https://en.wikipedia.org/wiki/Aliquot%20sum | In number theory, the aliquot sum of a positive integer is the sum of all proper divisors of , that is, all divisors of other than itself.
That is,
It can be used to characterize the prime numbers, perfect numbers, sociable numbers, deficient numbers, abundant numbers, and untouchable numbers, and to define the aliquot sequence of a number.
Examples
For example, the proper divisors of 12 (that is, the positive divisors of 12 that are not equal to 12) are , and 6, so the aliquot sum of 12 is 16 i.e. ().
The values of for are:
0, 1, 1, 3, 1, 6, 1, 7, 4, 8, 1, 16, 1, 10, 9, 15, 1, 21, 1, 22, 11, 14, 1, 36, 6, 16, 13, 28, 1, 42, 1, 31, 15, 20, 13, 55, 1, 22, 17, 50, 1, 54, 1, 40, 33, 26, 1, 76, 8, 43, ...
Characterization of classes of numbers
The aliquot sum function can be used to characterize several notable classes of numbers:
1 is the only number whose aliquot sum is 0.
A number is prime if and only if its aliquot sum is 1.
The aliquot sums of perfect, deficient, and abundant numbers are equal to, less than, and greater than the number itself respectively. The quasiperfect numbers (if such numbers exist) are the numbers whose aliquot sums equal . The almost perfect numbers (which include the powers of 2, being the only known such numbers so far) are the numbers whose aliquot sums equal .
The untouchable numbers are the numbers that are not the aliquot sum of any other number. Their study goes back at least to Abu Mansur al-Baghdadi (circa 1000 AD), who observed that both 2 and 5 are untouchable. Paul Erdős proved that their number is infinite. The conjecture that 5 is the only odd untouchable number remains unproven, but would follow from a form of Goldbach's conjecture together with the observation that, for a semiprime number , the aliquot sum is .
The mathematicians noted that one of Erdős' "favorite subjects of investigation" was the aliquot sum function.
Iteration
Iterating the aliquot sum function produces the aliquot sequence of a nonneg |
https://en.wikipedia.org/wiki/Bolt%20circle | A bolt circle diameter or pitch circle diameter (PCD), sometimes simply called bolt circle or pitch circle, is a common term for when a number of screw holes for bolts are evenly distributed with their centers along an imaginary circle with a given diameter.
An example of use is mounting of car rims, where the bolt circle is one of several factors that determine whether a set of rims will fit a car. For example, a bolt circle of 5×130 or 5-130 indicates that a rim is to be attached to the car via 5 screws evenly spaced along a circle with a diameter of 130 millimeters. Other common uses for bolt circles are for indicating mounting for sim racing and real-world car steering wheels, or in the industry for mounting of servomotors or for specifying the bolt pattern of a flange. Attachment of chain rings for bicycle cranksets are also specified by a bolt circle.
Examples
Racing wheels
On steering wheels for cars utilizing bolt circles, this usually measures 6×70 mm. Some racing wheels attach to the car via a quick release hub, and this hub then usually has a corresponding bolt circle of 6×70 mm. Example of other less used patterns include: 3×1.75 in (44.45 mm), 5×2.75 in (69.85 mm), 6×74 mm and 6×2.75 in (69.85 mm).
Servomotors
Servomotors in the industry are often mounted via a flange-like coupling to give the shortest possible leverage for high-torque uses. Industrial servomotors often use standardised mounting patterns, of which one example is a bolt circle of 4×130 mm diameter (approximately corresponds to a square pattern of 91.9 mm × 91.9 mm).
Car rims
The mounting pattern of most car rims are described using bolt patterns, and this pattern is one of many factors which determine whether a rim will fit a given car. Here, the bolt circle indicates the number of wheel nuts and associated hub bolts (or alternatively just wheel bolts).
An example of a bolt circle is 5×100 which indicates 5 nuts placed on a circle with a diameter of 100 mm. Some of the most c |
https://en.wikipedia.org/wiki/Food%20contaminant | A food contaminant is a harmful chemical or microorganism present in food, which can cause illness to the consumer.
The impact of chemical contaminants on consumer health and well-being is often apparent only after many years of processing and prolonged exposure at low levels (e.g., cancer). Unlike food-borne pathogens, chemical contaminants present in foods are often unaffected by thermal processing. Chemical contaminants can be classified according to the source of contamination and the mechanism by which they enter the food product.
Agrochemicals
Agrochemicals are chemicals used in agricultural practices and animal husbandry with the intent to increase crop yields. Such agents include pesticides (e.g., insecticides, herbicides, rodenticides), plant growth regulators, veterinary drugs (e.g., nitrofuran, fluoroquinolones, malachite green, chloramphenicol), and bovine somatotropin (rBST).
Environmental contaminants
Environmental contaminants are chemicals that are present in the environment in which the food is grown, harvested, transported, stored, packaged, processed, and consumed. The physical contact of the food with its environment results in its contamination. Possible sources of contamination and contaminants common to that vector include:
Air: radionuclides (caesium-137, strontium-90), polycyclic aromatic hydrocarbons (PAH)
Water: arsenic, mercury
Soil: cadmium, nitrates, perchlorates
Packaging materials: antimony, tin, lead, perfluorooctanoic acid (PFOA), semicarbazide, benzophenone, isopropylthioxanthone (ITX), bisphenol A
Processing/cooking equipment: copper or other metal chips, lubricants, cleaning and sanitizing agents
Naturally occurring toxins: mycotoxins, phytohemagglutinin, pyrrolizidine alkaloids, grayanotoxin, scombrotoxin (histamine), ciguatera, shellfish toxins (see shellfish poisoning), tetrodotoxin, among many others.
Pesticides and carcinogens
There are many cases of banned pesticides or carcinogens found in foods.
Greenpeace expo |
https://en.wikipedia.org/wiki/Path-based%20strong%20component%20algorithm | In graph theory, the strongly connected components of a directed graph may be found using an algorithm that uses depth-first search in combination with two stacks, one to keep track of the vertices in the current component and the second to keep track of the current search path. Versions of this algorithm have been proposed by , , , , and ; of these, Dijkstra's version was the first to achieve linear time.
Description
The algorithm performs a depth-first search of the given graph G, maintaining as it does two stacks S and P (in addition to the normal call stack for a recursive function).
Stack S contains all the vertices that have not yet been assigned to a strongly connected component, in the order in which the depth-first search reaches the vertices.
Stack P contains vertices that have not yet been determined to belong to different strongly connected components from each other. It also uses a counter C of the number of vertices reached so far, which it uses to compute the preorder numbers of the vertices.
When the depth-first search reaches a vertex v, the algorithm performs the following steps:
Set the preorder number of v to C, and increment C.
Push v onto S and also onto P.
For each edge from v to a neighboring vertex w:
If the preorder number of w has not yet been assigned (the edge is a tree edge), recursively search w;
Otherwise, if w has not yet been assigned to a strongly connected component (the edge is a forward/back/cross edge):
Repeatedly pop vertices from P until the top element of P has a preorder number less than or equal to the preorder number of w.
If v is the top element of P:
Pop vertices from S until v has been popped, and assign the popped vertices to a new component.
Pop v from P.
The overall algorithm consists of a loop through the vertices of the graph, calling this recursive search on each vertex that does not yet have a preorder number assigned to it.
Related algorithms
Like this algorithm, Tarjan's strongly connected components algo |
https://en.wikipedia.org/wiki/Fluxomics | Fluxomics describes the various approaches that seek to determine the rates of metabolic reactions within a biological entity. While metabolomics can provide instantaneous information on the metabolites in a biological sample, metabolism is a dynamic process. The significance of fluxomics is that metabolic fluxes determine the cellular phenotype. It has the added advantage of being based on the metabolome which has fewer components than the genome or proteome.
Fluxomics falls within the field of systems biology which developed with the appearance of high throughput technologies. Systems biology recognizes the complexity of biological systems and has the broader goal of explaining and predicting this complex behavior.
Metabolic flux
Metabolic flux refers to the rate of metabolite conversion in a metabolic network. For a reaction this rate is a function of both enzyme abundance and enzyme activity. Enzyme concentration is itself a function of transcriptional and translational regulation in addition to the stability of the protein. Enzyme activity is affected by the kinetic parameters of the enzyme, the substrate concentrations, the product concentrations, and the effector molecules concentration. The genomic and environmental effects on metabolic flux are what determine healthy or diseased phenotype.
Fluxome
Similar to genome, transcriptome, proteome, and metabolome, the fluxome is defined as the complete set of metabolic fluxes in a cell. However, unlike the others the fluxome is a dynamic representation of the phenotype. This is due to the fluxome resulting from the interactions of the metabolome, genome, transcriptome, proteome, post-translational modifications and the environment.
Flux analysis technologies
Two important technologies are flux balance analysis (FBA) and 13C-fluxomics. In FBA metabolic fluxes are estimated by first representing the metabolic reactions of a metabolic network in a numerical matrix containing the stoichiometric coeffi |
https://en.wikipedia.org/wiki/NTSC-C | NTSC-C is a regional lockout created in 2003 by Sony Computer Entertainment for the official launch of its PlayStation 2 gaming system into the mainland Chinese market.
Mainland Chinese market
The system's original model, then called PlayStation 2, was launched throughout 2000, 2001 and 2002 in Japan, North America, Europe, Oceania and Southeast Asia, but it was not introduced in mainland China because of rampant piracy. In November 2003, Sony China Chairman Hiroshi Soda explained the situation:
However the situation changed in November 2003 as Sony China announced the PlayStation 2 (SCPH-50009 "Satin Silver" type) was planned to be launched in mainland China for Christmas, official release date December 20, 2003. Sales would be first limited to five large industrialized cities Beijing, Shanghai, Guangzhou, Shenzhen and Chengdu, then distribution would start in the whole country. However, on the eve of Christmas, arguing an "unfavorable environment," Sony China delayed the mainland release to next year with the system's new "slimline" type PS2 and sales limited to Shanghai and Guangzhou. Meanwhile, Kenichi Fukunaga, a Sony Japan spokesman in Tokyo, reportedly declared "the company simply had not prepared in time for the China launch."
The "NTSC/C" regional lockout for mainland China was specially created as the system is also a home NTSC DVD player with its specific Zone 6 regional code which is not compatible with the bordering countries (Japan is Zone 2; South Korea, Hong Kong, and Taiwan are all Zone 3, etc.)
The first batch of NTSC/C games was released in December 2005. Along with Sony Computer Entertainment Japan, third-party publishers included local branches of Bandai and Namco among others. The model types of NTSC-C PS2 for mainland China were SCPH-70006 CB, SCPH-75006 CB, SCPH-77006 CB, and SCPH-90006 CB.
Marketing definition
"C" stands for China. However Hong Kong, Macau and Taiwan are part of the NTSC-J region which was initially created for Japan. |
https://en.wikipedia.org/wiki/ACM%20ICPC%20Dhaka%20Site | ACM International Collegiate Programming Contest (abbreviated as ACM-ICPC or just ICPC) is an annual multi-tiered competition among the universities of the world. There are eighteen different sites in Asia that host Asia Regional Final and Dhaka is one of them. Each year the winner of the Asia Regional Final Dhaka Site Contest advances to the ACM-ICPC World Finals. Like other sites of ICPC, Dhaka site contest is also sponsored by IBM and operated under the auspices of the Association for Computing Machinery (ACM).
History
ACM ICPC Dhaka site contest started in 1997 with the initiative of Professor A. L. Haque of North South University (NSU). Its first event was held on 18 November 1997 with the participation of 18 teams from 11 institutions. Bangladesh University of Engineering and Technology - BUET Bengal Tigers team became the champion and moved to the world final which was held on 28 February 1998 at Atlanta, Georgia, United States. Champion BUET team of Suman Kumar Nath (now at Microsoft Research), Rezaul Alam Chowdhury (UT Austin) and Tarique Mesbaul Islam (Waterloo) occupied 24th position in the world final among 54 teams tying with Stanford University. Same year, NSU team received a wild card for being the host of the Dhaka site regional contest and participated in the world final.
North South University hosted this event 12 times from 1997 to 1999, 2004 to 2006, 2008 to 2011, 2013 and 2015 while Bangladesh University of Engineering and Technology hosted thrice from 2001 to 2003. East West University hosted the event in 2007. Daffodil International University hosted the event in 2012 and 2028. Bangladesh University of Business and Technology hosted the event in 2014 and 2021. Green University of Bangladesh hosted the event in 2022 which was held on 10-11 March 2023 at its permanent campus.
Past events
1997
Champion: Bangladesh University of Engineering and Technology
Host: North South University
Champion's position at the world final: 24th
Notes: |
https://en.wikipedia.org/wiki/Cartouche%20%28design%29 | A cartouche (also cartouch) is an oval or oblong design with a slightly convex surface, typically edged with ornamental scrollwork. It is used to hold a painted or low-relief design. Since the early 16th century, the cartouche is a scrolling frame device, derived originally from Italian . Such cartouches are characteristically stretched, pierced and scrolling.
Another cartouche figures prominently in the 16th-century title page of Giorgio Vasari's Lives of the Most Excellent Painters, Sculptors, and Architects, framing a minor vignette with a pierced and scrolling papery cartouche.
The engraved trade card of the London clockmaker Percy Webster shows a vignette of the shop in a scrolling cartouche frame of Rococo design that is composed entirely of scrolling devices.
History
Antiquity
Cartouches are found on buildings, funerary steles and sarcophagi. The cartouche is generally rectangular, delimited by a molding or one or more incised lines, with two symmetrical trapezoids on the lateral edges.
Chinese
From the Renaissance to Art Deco
The Renaissance brought back elements of Greco-Roman culture, including ornaments like the cartouche. Compared to their ancient ancestors, the ones from the Renaissance are usually much more complex. Cartouches continue to be used in styles that succeed the Renaissance. Most have the usual look of a symmetrical oval with scrolls developed during the Renaissance and Baroque periods, but some are highly stylized, showing the diversity of styles popular over time. They were used constantly, and were one of the main motifs of Rococo and Beaux Arts architecture.
Their use started to fade in Art Deco, a style created as a collective effort of multiple French designers to make a new modern style around 1910. This is because of the fact that artists of this movement tried to create new ornaments for their time, most often stylizing motifs used before, or coming up with completely new ones. Art Deco also followed the principle of simplici |
https://en.wikipedia.org/wiki/Drought%20tolerance | Drought tolerance is the ability by which a plant maintains its biomass production during arid or drought conditions. Some plants are naturally adapted to dry conditions, surviving with protection mechanisms such as desiccation tolerance, detoxification, or repair of xylem embolism. Other plants, specifically crops like corn, wheat, and rice, have become increasingly tolerant to drought with new varieties created via genetic engineering. From an evolutionary perspective, the type of mycorrhizal associations formed in the roots of plants can determine how fast plants can adapt to drought.
The plants behind drought tolerance are complex and involve many pathways which allows plants to respond to specific sets of conditions at any given time. Some of these interactions include stomatal conductance, carotenoid degradation and anthocyanin accumulation, the intervention of osmoprotectants (such as sucrose, glycine, and proline), ROS-scavenging enzymes. The molecular control of drought tolerance is also very complex and is influenced other factors such as environment and the developmental stage of the plant. This control consists mainly of transcriptional factors, such as dehydration-responsive element-binding protein (DREB), abscisic acid (ABA)-responsive element-binding factor (AREB), and NAM (no apical meristem).
Physiology of drought tolerance
Plants can be subjected to slowly developing water shortages (ie, taking days, weeks, or months), or they may face short-term deficits of water (ie, hours to days). In these situations, plants adapt by responding accordingly, minimizing water loss and maximizing water uptake. Plants are more susceptible to drought stress during the reproductive stages of growth, flowering and seed development. Therefore, the combination of short-term plus long-term responses allow for plants to produce a few viable seeds. Some examples of short-term and long-term physiological responses include:
Short-term responses
In the leaf: root-signal |
https://en.wikipedia.org/wiki/International%20Review%20of%20Cell%20and%20Molecular%20Biology | The International Review of Cell and Molecular Biology is a scientific book series that publishes articles on plant and animal cell biology. Until 2008 it was known as the International Review of Cytology. |
https://en.wikipedia.org/wiki/Hyperarithmetical%20theory | In recursion theory, hyperarithmetic theory is a generalization of Turing computability. It has close connections with definability in second-order arithmetic and with weak systems of set theory such as Kripke–Platek set theory. It is an important tool in effective descriptive set theory.
The central focus of hyperarithmetic theory is the sets of natural numbers known as hyperarithmetic sets. There are three equivalent ways of defining this class of sets; the study of the relationships between these different definitions is one motivation for the study of hyperarithmetical theory.
Hyperarithmetical sets and definability
The first definition of the hyperarithmetic sets uses the analytical hierarchy.
A set of natural numbers is classified at level of this hierarchy if it is definable by a formula of second-order arithmetic with only existential set quantifiers and no other set quantifiers. A set is classified at level of the analytical hierarchy if it is definable by a formula of second-order arithmetic with only universal set quantifiers and no other set quantifiers. A set is if it is both and . The hyperarithmetical sets are exactly the sets.
Hyperarithmetical sets and iterated Turing jumps: the hyperarithmetical hierarchy
The definition of hyperarithmetical sets as does not directly depend on computability results. A second, equivalent, definition shows that the hyperarithmetical sets can be defined using infinitely iterated Turing jumps. This second definition also shows that the hyperarithmetical sets can be classified into a hierarchy extending the arithmetical hierarchy; the hyperarithmetical sets are exactly the sets that are assigned a rank in this hierarchy.
Each level of the hyperarithmetical hierarchy is indexed by a countable ordinal number (ordinal), but not all countable ordinals correspond to a level of the hierarchy. The ordinals used by the hierarchy are those with an ordinal notation, which is a concrete, effective description |
https://en.wikipedia.org/wiki/Streptogramin | Streptogramins are a class of antibiotics.
Streptogramins are effective in the treatment of vancomycin-resistant Staphylococcus aureus (VRSA) and vancomycin-resistant Enterococcus (VRE), two of the most rapidly growing strains of multidrug-resistant bacteria. They fall into two groups: streptogramin A and streptogramin B.
Members include:
Quinupristin/dalfopristin
Pristinamycin
Virginiamycin
NXL 103, an experimental streptogramin in clinical trials for the treatment of respiratory tract infections. |
https://en.wikipedia.org/wiki/Hidden%20face | People often see hidden faces in things. Depending on the circumstances, this is referred to as pareidolia, the perception or recognition of a specific pattern or form in something essentially different. It is thus also a kind of optical illusion. When an artist notices that two different things have a similar appearance, and draws or paints a picture making this similarity evident, they make images with double meanings. Many of these images are hidden faces or hidden skulls.
These illusionistic pictures present the viewer with a mental choice of two interpretations: head or landscape, head or objects, head or architecture, etc. Both of them are valid, but the viewer sees only one of them, and very often they cannot see both interpretations simultaneously.
Chance images
There are everyday examples of hidden faces, they are "chance images" including faces in the clouds, figures of the Rorschach Test and the Man in the Moon. Leonardo da Vinci wrote about them in his notebook: "If you look at walls that are stained or made of different kinds of stones you can think you see in them certain picturesque views of mountains, rivers, rocks, trees, plains, broad valleys, and hills of different shapes. You can also find in them battles and rapidly moving figures, strange faces and costumes, as well as an infinite number of things." Francois and Jean Robert collected and published a lot of photos of "chance faces".
Hidden faces created by artists
The Mannerist master at the 16th-century imperial Habsburg courts of Vienna and Prague, Giuseppe Arcimboldo of Milan was probably the best known artist for creating extraordinary hidden faces. He arranged flowers, vegetables, fruits, shells, scallops and other animals, books and different things on the canvas in such a way that the whole collection of objects formed a portrait. His series of The Four Seasons seems to be the first use of this approach and technique. Arcimboldo's composite heads were celebrated and imitated by his c |
https://en.wikipedia.org/wiki/Four-center%20two-electron%20bond | A 4-center 2-electron (4c–2e) bond is a type of chemical bond in which four atoms share two electrons in bonding, with a net bond order of . This type of bonding differs from the usual covalent bond, which involves two atoms sharing two electrons (2c–2e bonding).
Four-center two-electron bonding is postulated in certain cluster compounds. For instance, the borane anion, is a octahedron with an additional proton attached to one of the triangular faces. As a result, the octahedron is distorted and a B–B–B–H rhomboid ring can be identified in which this 4c–2e bonding takes place. This type of bonding is associated with electron deficient rhomboid rings in general and is a relatively new research field, fitting in with the already well established three-center two-electron bond.
An example of a purely organic compound with four-center two-electron bonding is the adamantyl dication. The bond joins the four bridgehead atoms in a tetrahedral geometry.
Tetracyanoethylene forms a dianionic dimer in which the two alkenes are joined face-to-face by a rectangular four-center two-electron bond. Various solid salts of this dianion have been studied to determine bond strengths and vibrational spectroscopic details. |
https://en.wikipedia.org/wiki/Von%20Neumann%27s%20theorem | In mathematics, von Neumann's theorem is a result in the operator theory of linear operators on Hilbert spaces.
Statement of the theorem
Let and be Hilbert spaces, and let be an unbounded operator from into Suppose that is a closed operator and that is densely defined, that is, is dense in Let denote the adjoint of Then is also densely defined, and it is self-adjoint. That is,
and the operators on the right- and left-hand sides have the same dense domain in |
https://en.wikipedia.org/wiki/Electromagnetic%20acoustic%20transducer | Electromagnetic acoustic transducer (EMAT) is a transducer for non-contact acoustic wave generation and reception in conducting materials. Its effect is based on electromagnetic mechanisms, which do not need direct coupling with the surface of the material. Due to this couplant-free feature, EMATs are particularly useful in harsh, i.e., hot, cold, clean, or dry environments. EMATs are suitable to generate all kinds of waves in metallic and/or magnetostrictive materials. Depending on the design and orientation of coils and magnets, shear horizontal (SH) bulk wave mode (norm-beam or angle-beam), surface wave, plate waves such as SH and Lamb waves, and all sorts of other bulk and guided-wave modes can be excited. After decades of research and development, EMAT has found its applications in many industries such as primary metal manufacturing and processing, automotive, railroad, pipeline, boiler and pressure vessel industries, in which they are typically used for nondestructive testing (NDT) of metallic structures.
Basic components
There are two basic components in an EMAT transducer. One is a magnet and the other is an electric coil. The magnet can be a permanent magnet or an electromagnet, which produces a static or a quasi-static magnetic field. In EMAT terminology, this field is called bias magnetic field. The electric coil is driven with an alternating current (AC) electric signal at ultrasonic frequency, typically in the range from 20 kHz to 10 MHz. Based on the application needs, the signal can be a continuous wave, a spike pulse, or a tone-burst signal. The electric coil with AC current also generates an AC magnetic field. When the test material is close to the EMAT, ultrasonic waves are generated in the test material through the interaction of the two magnetic fields.
Transduction mechanism
There are two mechanisms to generate waves through magnetic field interaction. One is Lorentz force when the material is conductive. The other is magnetostriction when |
https://en.wikipedia.org/wiki/Carbon%20emission%20label | A carbon emission label or carbon label describes the carbon dioxide emissions created as a by-product of manufacturing, transporting, or disposing of a consumer product. This information is important to consumers wishing to minimize their ecological footprint and contribution to global warming made by their purchases.
Existing programs
The world's first carbon label, the Carbon Reduction Label, shows the carbon footprint embodied in a product and was first introduced in the UK in 2006 by the Carbon Trust. Examples of products featuring their carbon footprint are Walkers Crisps, Kingsmill bread, British Sugar, Cemex cement, Marshalls paving and Quaker Oats, which have all used the label. One of the biggest supporters of carbon labelling was Tesco, who began labelling a range of products including washing detergent, light bulbs, oranges, milk and toilet paper in 2007. In 2012 the scheme was terminated due to unforeseen costs and lack of take-up by other businesses. HBOS feature it on their online bank account.
The Carbon Trust label also requires companies to commit to reduce the embodied carbon in the labeled product or they lose the right to feature the label. An independent panel is currently verifying the process alongside Defra and the British Standards Institute BSI and a new standard PAS 2050 is due to be introduced in mid-2008. As of August 2009, Defra is undertaking a radical rethink of the food industry on issues of security and sustainability, among many things proposing a green labelling scheme for food products.
The CarbonCounted label started in January 2007. It uses a live carbon supply chain to determine the amount of carbon dioxide emitted to bring a product to market. This third party certified system, based on an open standard, eliminates the need for heavy auditing and guess work associated with values determined when using isolated accounting methods. This also addresses how to consistently and fairly apply the smaller details such as th |
https://en.wikipedia.org/wiki/Dentrix | Dentrix was the first dental practice management software for Microsoft Windows when it was launched in 1989 by Dentrix Dental Systems, a firm founded by Larry M. Gibson in 1985 and is based in American Fork, Utah. The Dentrix dental practice management system was designed to automate as many of the functions within the dental office as possible.
History
In 1997, Henry Schein, Inc. purchased Dentrix Dental Systems, which became Henry Schein Practice Solutions or HSPS and has continued to develop and release new versions and products. The firm at one point provided their own digital imaging software, Dentrix Image. In 2007, the Dentrix Image product was sold to DEXIS, LLC.
Product features
Dentrix products include practice management software for dental offices, imaging software, patient education software, computer-based training software, voice recognition software, and other products designed to enhance the dental office experience.
In 2012, the firm launched the Dentrix Developer Program (DDP), a program allowing third party vendors to access the Dentrix database through APIs. The program has steadily grown since then to include more than 250 vendors from all over the applications spectrum.
Dentrix vulnerabilities
When Dentrix G5 was released to the market, the client and server was vulnerable to packet sniffing. If someone finds the password to their site, then they would know the password to all sites. This was fixed in G5 PP1 HotFix 1. Now the password is randomly generated.
Dentrix G6 uses Data Camouflage. From US-CERT.GOV, "Faircom c-treeACE provides a weak obfuscation algorithm (CWE-327) that may be unobfuscated without knowledge of a key or password. The algorithm was formerly called Faircom Standard Encryption but is now called Data Camouflage."
Dentrix G6 uses Hard Coded Credentials.
Federal Trade Commission Fine
In 2016, The Federal Trade Commission reported that Henry Schein, the provider and distributor of Dentrix, will be forced to pa |
https://en.wikipedia.org/wiki/Auditory%20display | Auditory display is the use of sound to communicate information from a computer to the user.
The primary forum for exploring these techniques is the International Community for Auditory Display (ICAD), which was founded by Gregory Kramer in 1992 as a forum for research in the field.
Types of auditory display
Audification: a technique for listening to a large time series by mapping values directly to sound pressure levels
Sonification: the use of non-speech audio to convey information or perceptualize data
Earcons / auditory icons: brief, distinctive sounds used to represent a specific event or convey other information
Voice messaging: the automated use of speech synthesis or recorded speech samples to convey precise statements
Benefits and limitations
Auditory display enables eyes-free usage for blind users (via a screen reader) as well as sighted users who are using their eyes for other tasks. A rapid detection of acoustic signals and the omnidirectional feature of the sense of hearing can contribute to the effectiveness of an auditory display even when vision is available. On the other hand, sound output may interfere with other acoustic signals, such as speech communication. This complicates the use of auditory displays for certain applications. Furthermore, acoustic output may be annoying or distracting.
See also |
https://en.wikipedia.org/wiki/John%20West%20Foods | John West Foods is a United Kingdom-based seafood marketing company established in 1857, and currently owned by Thai Union Group of Thailand. The company produces canned salmon and tuna, as well as mackerel, sardine, herring, brisling, anchovies and shellfish.
History
The original company was founded by T. L. Pelling and C. H. Stanley, who created Pelling Stanley and Company in 1857. The company soon specialized in importing canned food, which at the time was a novel product. By 1879, they were importing canned salmon from the John West company in Oregon, US. Pelling Stanley purchased the rights to use the John West name in 1888. The first shipments of John West Salmon appeared in 1892.
By 1924, the three companies, operating separately, were all associated with Unilever:
Angus Watson and Co.
R B Green and Co.
Pelling Stanley and Company
By 1964, Unilever had merged the three into one company, John West Foods. Branches were expanded to Australia and Africa in 1974.
In 1997, Heinz acquired the brand and the majority of the John West Food company operations, excluding those in Australia, New Zealand and South Africa which continued to be part of Unilever. In June 2003, Simplot Australia bought the John West canned fish business in Australia from Unilever Australasia. In March 2006, Heinz sold its European Seafoods business to French-based MW Brands, itself owned by Lehman Brothers banking group, for EUR 425 million.
In 2010, Thailand-based seafood processing company Thai Union Group bought MWBrands, becoming the world's largest canned-tuna producer.
Sustainability issues
John West states that their salmon, mackerel and sardine products are certified to the Marine Stewardship Council's (MSC) standard for a well-managed and sustainable fishery, and that every can in these ranges carries the Marine Stewardship Council logo.
John West also states that they do not sell endangered or critically endangered species from the International Union Conservation of Nat |
https://en.wikipedia.org/wiki/Self-similar%20process | Self-similar processes are types of stochastic processes that exhibit the phenomenon of self-similarity. A self-similar phenomenon behaves the same when viewed at different degrees of magnification, or different scales on a dimension (space or time). Self-similar processes can sometimes be described using heavy-tailed distributions, also known as long-tailed distributions. Examples of such processes include traffic processes, such as packet inter-arrival times and burst lengths. Self-similar processes can exhibit long-range dependency.
Overview
The design of robust and reliable networks and network services has become an increasingly challenging task in today's Internet world. To achieve this goal,
understanding the characteristics of Internet traffic plays a more and more critical
role. Empirical studies of measured traffic traces have led to the wide recognition of
self-similarity in network traffic.
Self-similar Ethernet traffic exhibits dependencies over a long range of time scales. This is to be contrasted with telephone traffic which is Poisson in its arrival and departure process.
In traditional Poisson traffic, the short-term fluctuations would average out, and a graph covering a large amount of time would approach a constant value.
Heavy-tailed distributions have been observed in many natural phenomena including both physical and sociological phenomena. Mandelbrot established the use of heavy-tailed distributions to model real-world fractal phenomena, e.g. Stock markets, earthquakes, climate, and the weather.
Ethernet, WWW, SS7, TCP, FTP, TELNET and VBR video (digitised video of the type that is transmitted over ATM networks) traffic is self-similar.
Self-similarity in packetised data networks can be caused by the distribution of file sizes, human interactions and/ or Ethernet dynamics. Self-similar and long-range dependent characteristics in computer networks present a fundamentally different set of problems to people doing analysis and/or design of |
https://en.wikipedia.org/wiki/List%20of%20software%20that%20uses%20Subversion | The following is a list of software that uses Subversion, a revision control system used in software development.
SubversionEdge, a web-based front-end for Subversion.
TeamForge, distributed agile application lifecycle management software.
TortoiseSVN, an extension for Microsoft Explorer.
SnailSVN, a Mac OS X GUI client with Finder integration.
VisualSVN Server, a commercial and proprietary Subversion server package for Windows operating system.
Mindquarry, open-source collaborative software geared towards small and medium-sized workgroups.
Polarion ALM for Subversion - web based application lifecycle management platform.
RapidSVN, a visual subversion client.
SharpForge, a project management and bug-tracking web application.
SVK, a distributed revision control system.
svnX, an open-source GUI client for Mac OS X.
Versions, a Mac OS X GUI client.
Cornerstone, a Mac OS X GUI client.
RabbitVCS, an extension for GNOME's Nautilus file manager and gedit text editor.
Agilo for Trac, a web-based Scrum tool.
SVN Repo Browser Pro, an iPhone and iPad client.
BugBranch, an iPhone and iPad client.
Subdivision, a commercial GUI tool for managing Subversion repositories.
Integrated Development Environments
The following Integrated Development Environments (IDEs) support - or can be integrated with - Subversion:
Coda — As of version 1.5, Coda has integrated Subversion support
SlickEdit
Xcode — Apple's Mac OS X IDE
Microsoft Visual Studio, using the following add-ins: Agent SVN, plug-in that allows Subversion to integrate with Visual Studio; AnkhSVN, a Visual Studio .NET add-on, which allows one to perform the most common Subversion operations from directly inside the VS.NET IDE; VisualSVN, a Subversion integration for Visual Studio 2003-2017; PushOk SVN SCC PlugIn, another Visual Studio addin.
Borland Delphi/Embarcadero RAD Studio, through the DelphiSVN plug-in.
Eclipse, through the following environments/plug-ins: Aptana; Subclipse, an open source project |
https://en.wikipedia.org/wiki/Metalink%20Ltd. | Metalink was an Israeli-based hi-tech company specializing in silicon solutions for wireless and wireline broadband communications. Metalink offered integrated circuits and board level solutions targeting residential gateways, access points, routers, PC cards, set-top boxes (STB), digital media adapters (DMA) and wireless HDTVs. The products complied with IEEE 802.11n standard defining WLAN using Multiple-input multiple-output communications (MIMO). Other product lines included SDSL and VDSL products for triple-play services.
The company was headquartered in Yakum, Israel, with design centers in the US, Ukraine, and Taiwan.
Networking companies
Semiconductor companies of Israel
Fabless semiconductor companies
Electronics companies established in 1992
Companies formerly listed on the Nasdaq
Companies traded over-the-counter in the United States |
https://en.wikipedia.org/wiki/2-Thiouracil | 2-Thiouracil is a specific molecule consisting of a sulfated uracil.
Medical use
The substance is a historically relevant anti-thyroid preparation. Astwood E.B. used it in 1943 as therapy of Graves' disease for the first time. It remains in use.
Thiouracil inhibits thyroid activity by blocking the enzyme thyroid peroxidase. Its use in recent times has been replaced by advent of more potent and safer antithyroid drugs. It occurs in seeds of Brassica and Crucifera species. Thiouracil has been used as antithyroid, coronary vasodilator, and in congestive heart failure although its use has been largely supplanted by other drugs. |
https://en.wikipedia.org/wiki/Dysmorphic%20feature | A dysmorphic feature is an abnormal difference in body structure. It can be an isolated finding in an otherwise normal individual, or it can be related to a congenital disorder, genetic syndrome or birth defect. Dysmorphology is the study of dysmorphic features, their origins and proper nomenclature. One of the key challenges in identifying and describing dysmorphic features is the use and understanding of specific terms between different individuals. Clinical geneticists and pediatricians
are usually those most closely involved with the identification and description of dysmorphic features, as most are apparent during childhood.
Dysmorphic features can vary from isolated, mild anomalies such as clinodactyly or synophrys to severe congenital anomalies, such as heart defects and holoprosencephaly. In some cases, dysmorphic features are part of a larger clinical picture, sometimes known as a sequence, syndrome or association. Recognizing the patterns of dysmorphic features is an important part of a geneticist's diagnostic process, as many genetic disease present with a common collection of features. There are several commercially available databases that allow clinicians to input their observed features in a patient to generate a differential diagnosis. These databases are not infallible, as they require on the clinician to provide their own experience, particularly when the observed clinical features are general. A male child with short stature and hypertelorism could have several different disorders, as these findings are not highly specific. However a finding such as 2,3-toe syndactyly raises the index of suspicion for Smith–Lemli–Opitz syndrome.
Most open source projects that perform phenotype-driven disease or gene prioritization work with the terminology of the Human Phenotype Ontology. This controlled vocabulary can be used to describe the clinical features of a patient and is suitable for machine learning approaches. Publicly accessible databases that labs u |
https://en.wikipedia.org/wiki/Clinodactyly | Clinodactyly is a medical term describing the curvature of a digit (a finger or toe) in the plane of the palm, most commonly the fifth finger (the "little finger") towards the adjacent fourth finger (the "ring finger").
It is a fairly common isolated anomaly which often goes unnoticed, but also occurs in combination with other abnormalities in certain genetic syndromes. The term is from the Ancient Greek κλίνειν 'to bend' and δάκτυλος 'digit'.
Genetics
Clinodactyly is an autosomal dominant trait that has variable expressiveness and incomplete penetrance.
Clinodactyly can be passed through inheritance and presents as either an isolated anomaly or a component manifestation of a genetic syndrome. Many syndromes are associated with clinodactyly, including those listed below. But the phenotype, by itself, is not a sensitive or specific diagnostic test for these syndromes (it is present in up to 18% of the normal population).
Down syndrome
Turner syndrome
Aarskog syndrome
Carpenter syndrome
Seckel syndrome
Cornelia de Lange syndrome
Orofaciodigital syndrome 1
13q deletion syndrome
XXYY syndrome
Silver–Russell syndrome
Andersen-Tawil syndrome
Noonan syndrome
Ehlers–Danlos syndrome
When identified prenatally, in conjunction with other features of Down syndrome, for example during obstetric ultrasonography, it may be an indication for intrauterine sampling for fetal chromosome analysis.
Pathophysiology
Due to a developmental arrest, there is an abnormal alignment of the joint surfaces at either interphalangeal joint causing angulation in the plane of the palm. The finger may be slightly bent or have a very prominent bend.
Diagnosis
There is no consensus on what degree of angulation justifies a diagnosis; an incline between 15° and 30° is typical. A similar-sounding term, camptodactyly, is a fixed flexion deformity of a digit.
Management
Treatment is only necessary if the degree of curvature is sufficient to cause disability or if it causes emotional dis |
https://en.wikipedia.org/wiki/Multi-level%20cell | In electronics, a multi-level cell (MLC) is a memory cell capable of storing more than a single bit of information, compared to a single-level cell (SLC), which can store only one bit per memory cell. A memory cell typically consists of a single floating-gate MOSFET (metal–oxide–semiconductor field-effect transistor), thus multi-level cells reduce the number of MOSFETs required to store the same amount of data as single-level cells.
Triple-level cells (TLC) and quad-level cells (QLC) are versions of MLC memory, which can store three and four bits per cell respectively. The name "multi-level cell" is sometimes used specifically to refer to the "two-level cell". Overall, the memories are named as follows:
Single-level cell or SLC (1 bit per cell)
Multi-level cell or MLC (2 bits per cell), alternatively double-level cell or DLC
Triple-level cell or TLC (3 bits per cell) or 3-Bit MLC
Quad-level cell or QLC (4 bits per cell)
Penta-level cell or PLC (5 bits per cell) – currently in development
Notice that this nomenclature can be misleading, since an "n-level cell" in fact uses 2n levels of charge to store n bits (see below).
Typically, as the "level" count increases, performance (speed and reliability) and consumer cost decrease; however, this correlation can vary between manufacturers.
Examples of MLC memories are MLC NAND flash, MLC PCM (phase-change memory), etc. For example, in SLC NAND flash technology, each cell can exist in one of the two states, storing one bit of information per cell. Most MLC NAND flash memory has four possible states per cell, so it can store two bits of information per cell. This reduces the amount of margin separating the states and results in the possibility of more errors. Multi-level cells that are designed for low error rates are sometimes called enterprise MLC (eMLC).
New technologies, such as multi-level cells and 3D Flash, and increased production volumes will continue to bring prices down.
Single-level cell
Flash memory s |
https://en.wikipedia.org/wiki/Persistent%20cloaca | A persistent cloaca is a symptom of a complex anorectal congenital disorder, in which the rectum, vagina, and urinary tract meet and fuse, creating a cloaca, a single common channel.
Signs and symptoms
Cloacas appear in a wide spectrum of variation in females born with the malformation. The single orifice, called a common channel, may occur varying in length from 1 to 10 cm. The length of the common channel can be used to judge prognostic outcomes and technical challenges during surgical repair. A common channel less than 3 cm in length usually has good sphincter muscles and a well-developed sacrum.
Diagnosis
Diagnosis of a female with cloaca should be suspected in a female born with an imperforate anus and small looking genitalia. The diagnosis can be made clinically with tests like ultrasound, X-rays, voiding cystourethrogram (VCUG) and cloacagram. MRI of the spine and pelvis and endoscopic examinations may also be performed. Failure to identify a cloaca as being present in a newborn may be dangerous, as more than 90% have associated urological problems. The goal for treatment of a female born with cloaca is to achieve bowel control, urinary control, and sexual function, which includes menstruation, sexual intercourse, and possibly pregnancy. Cloacas probably occur in 1 in 20,000 live births.
Treatment
The prognostic outcomes for this type of cloaca are good for bowel control and urinary function. The surgical repair for this type of cloaca can usually be done by performing posterior sagittal approach without opening of the abdomen. A common channel longer than 3 cm in length usually has poor sphincter muscles and a poor sacrum, suggesting a prognostic outcome for bowel control and urinary function to be less likely. Common channels longer than 3 cm are generally considered more complex and more technically challenging in surgical repair.
See also
Cloaca (embryology)
Cloaca |
https://en.wikipedia.org/wiki/Surface%20of%20constant%20width | In geometry, a surface of constant width is a convex form whose width, measured by the distance between two opposite parallel planes touching its boundary, is the same regardless of the direction of those two parallel planes. One defines the width of the surface in a given direction to be the perpendicular distance between the parallels perpendicular to that direction. Thus, a surface of constant width is the three-dimensional analogue of a curve of constant width, a two-dimensional shape with a constant distance between pairs of parallel tangent lines.
Definition
More generally, any compact convex body D has one pair of parallel supporting planes in a given direction. A supporting plane is a plane that intersects the boundary of D but not the interior of D. One defines the width of the body as before. If the width of D is the same in all directions, then one says that the body is of constant width and calls its boundary a surface of constant width, and the body itself is referred to as a spheroform.
Examples
A sphere, a surface of constant radius and thus diameter, is a surface of constant width.
Contrary to common belief the Reuleaux tetrahedron is not a surface of constant width. However, there are two different ways of smoothing subsets of the edges of the Reuleaux tetrahedron to form Meissner tetrahedra, surfaces of constant width. These shapes were conjectured by to have the minimum volume among all shapes with the same constant width, but this conjecture remains unsolved.
Among all surfaces of revolution with the same constant width, the one with minimum volume is the shape swept out by a Reuleaux triangle rotating about one of its axes of symmetry, while the one with maximum volume is the sphere.
Properties
Every parallel projection of a surface of constant width is a curve of constant width. By Barbier's theorem, the perimeter of this projection is times the width, regardless of the direction of projection. It follows that every surface of consta |
https://en.wikipedia.org/wiki/Simple%20programmable%20logic%20device | A simple programmable logic device (SPLD) is a programmable logic device with complexity below that of a complex programmable logic device (CPLD).
The term commonly refers to devices such as ROMs, PALs, PLAs and GALs.
Basic description
Simple programmable logic devices (SPLD) are the simplest, smallest and least-expensive forms of programmable logic devices. SPLDs can be used in boards to replace standard logic components (AND, OR, and NOT gates), such as 7400-series TTL.
They typically comprise 4 to 22 fully connected macrocells. These macrocells typically consist of some combinatorial logic (such as AND OR gates) and a flip-flop. In other words, a small Boolean logic equation can be built within each macrocell. This equation will combine the state of some number of binary inputs into a binary output and, if necessary, store that output in the flip-flop until the next clock edge. Of course, the particulars of the available logic gates and flip-flops are specific to each manufacturer and product family. But the general idea is always the same.
Most SPLDs use either fuses or non-volatile memory cells (EPROM, EEPROM, Flash, and others) to define the functionality.
These devices are also known as:
Programmable array logic (PAL)
Generic array logic (GAL)
Programmable logic arrays (PLA)
Field-programmable logic arrays (FPLA)
Programmable logic devices (PLD)
Advantages
PLDs are often used for address decoding, where they have several clear advantages over the 7400-series TTL parts that they replaced:
One chip requires less board area, power, and wiring than several do.
The design inside the chip is flexible, so a change in the logic does not require any rewiring of the board. Rather, simply replacing one PLD with another part that has been programmed with the new design can alter the decoding logic. |
https://en.wikipedia.org/wiki/Runoff%20model%20%28reservoir%29 | A runoff models or rainfall-runoff model describes how rainfall is converted into runoff in a drainage basin (catchment area or watershed). More precisely, it produces a surface runoff hydrograph in response to a rainfall event, represented by and input as a hyetograph.
Rainfall-runoff models need to be calibrated before they can be used.
A well known runoff model is the linear reservoir, but in practice it has limited applicability.
The runoff model with a non-linear reservoir is more universally applicable, but still it holds only for catchments whose surface area is limited by the condition that the rainfall can be considered more or less uniformly distributed over the area. The maximum size of the watershed then depends on the rainfall characteristics of the region. When the study area is too large, it can be divided into sub-catchments and the various runoff hydrographs may be combined using flood routing techniques.
Linear reservoir
The hydrology of a linear reservoir (figure 1) is governed by two equations.
flow equation: Q = A·S, with units [L/T], where L is length (e.g. mm) and T is time (e.g. h, day)
continuity or water balance equation: R = Q + dS/dT, with units [L/T]
where:
Q is the runoff or discharge
R is the effective rainfall or rainfall excess or recharge
A is the constant reaction factor or response factor with unit [1/T]
S is the water storage with unit [L]
dS is a differential or small increment of S
dT is a differential or small increment of T
Runoff equation
A combination of the two previous equations results in a differential equation, whose solution is:
Q2 = Q1 exp{−A (T2 − T1)} + R[1 − exp{−A (T2 − T1)}]
This is the runoff equation or discharge equation, where Q1 and Q2 are the values of Q at time T1 and T2 respectively while T2−T1 is a small time step during which the recharge can be assumed constant.
Computing the total hydrograph
Provided the value of A is known, the total hydrograph can be obtained using a successive num |
https://en.wikipedia.org/wiki/National%20Defense%20Industrial%20Association | The National Defense Industrial Association (NDIA) is a trade association for the United States government and defense industrial base. It is an 501(c)3 educational organization. Its headquarters are in Arlington, Virginia. NDIA was established in 1919 as a result of the inability of the defense industry to scale up the war effort during World War I.
Founding
In 1917, Brigadier General Benedict Crowell was called to active duty and served on the General Munitions Board. As a board member, he established a relationship with the steel industry and was almost immediately appointed Assistant Secretary of War and Director of Munitions. As Director of Munitions, Crowell was a significant catalyst in improving the country's capability to produce arms and ammunition. However, he recognized the nation's need for an association that fostered cooperation between civilian industry and government in support of industrial preparedness. He founded the Army Ordnance Association (AOA) in 1919 and served as president for its first 25 years. Over the ensuing decades, AOA became the American Defense Preparedness Association (ADPA), which then merged with the 1944 National Security Industrial Association (NSIA) in 1997, creating NDIA.
Publications
NDIA currently publishes National Defense Magazine, Weekly Policy Digest, Weekly Defense Insider, and Monthly Defense Watch.
National Defense magazine
National Defense has been published under a series of different titles since 1940:
2005-Present - National Defense
1947-1954 - The Common Defense
1947-1970 - Ordnance
1920-1945 - Army Ordnance
1945-1947 - Logistics
1946 - Industrial Preparedness Bulletin
1943-1945 - Army Ordnance Report
1940-1946 - Army Ordnance Bulletin
Chapters
NDIA has 29 chapters located throughout the United States.
Divisions
NDIA consists of subject-specific divisions that aim to promote defense and national security through access, influence, and education.
Committees and working groups
NDIA has 5 industri |
https://en.wikipedia.org/wiki/Tetrachlorodecaoxide | "Tetrachlorodecaoxide" (TCDO) is a chlorite-containing substance with claimed immunomodulatory, macrophage-activating properties. WF10 (Macrokine, Immunokine, Oxoferin) is an aqueous solution of tetrachlorodecaoxide designed for intravenous injection. Tetrachlorodecaoxide/WF10 were originally developed by Oxo Chemie. The chemical formula is given as Cl4H2O114-. This incomplete formula shows a mixture of chlorite ion, water, and molecular oxygen: "Cl4H2O114-" = 4ClO2− + H2O + O2. Oxoferin was found to be equivalent with aqueous sodium chlorite.
Tetrachlorodecaoxide / WF10 is used in the management of radiation cystitis, is effective in the treatment of diabetic foot ulcers, and is used in wound healing, where the mechanism of action is activation of the macrophage system, and increasing the partial pressure of oxygen in the wound. |
https://en.wikipedia.org/wiki/Drainage%20model | Drainage model may refer to:
a surface drainage model or rainfall-runoff model; see surface runoff, runoff model (reservoir)
a subsurface (groundwater), drainage model related to:
a spacing equation for subsurface pipe drains and open ditches (horizontal drainage) or wells (vertical drainage); see watertable control
a hydrological subsurface drainage model; see soil salinity control for an example of an agro-hydro-salinity subsurface drainage model (SaltMod)
groundwater flow in the aquifer; see groundwater model or an example of an agro-hydro-salinity groundwater model: SahysMod
Hydrology models |
https://en.wikipedia.org/wiki/PEGASE | PEGASE is a design for a space observatory developed by France in the early 2000s. It combined formation flying with infrared telescopes operating as a double-aperture interferometer. Three free-flying satellites would operate together;a beam combiner and two siderostats. The baseline of the interferometer would be adjustable to between 50 and 500 meters. The goal of the mission is the study of Hot Jupiters ("pegasids"), brown dwarfs and the interior of protoplanetary disks. The design was developed by Centre National d'Études Spatiales and was studied for a launch as early as 2010–2012. However, the Phase-0 part of the study in 2005 suggested it would take 8 or 9 years to develop.
See also
List of proposed space observatories |
https://en.wikipedia.org/wiki/Neurexin | Neurexins (NRXN) are a family of presynaptic cell adhesion proteins that have roles in connecting neurons at the synapse. They are located mostly on the presynaptic membrane and contain a single transmembrane domain. The extracellular domain interacts with proteins in the synaptic cleft, most notably neuroligin, while the intracellular cytoplasmic portion interacts with proteins associated with exocytosis. Neurexin and neuroligin "shake hands," resulting in the connection between the two neurons and the production of a synapse. Neurexins mediate signaling across the synapse, and influence the properties of neural networks by synapse specificity. Neurexins were discovered as receptors for α-latrotoxin, a vertebrate-specific toxin in black widow spider venom that binds to presynaptic receptors and induces massive neurotransmitter release. In humans, alterations in genes encoding neurexins are implicated in autism and other cognitive diseases, such as Tourette syndrome and schizophrenia.
Structure
In mammals, neurexin is encoded by three different genes (NRXN1, NRXN2, and NRXN3) each controlled by two different promoters, an upstream alpha (α) and a downstream beta (β), resulting in alpha-neurexins 1-3 (α-neurexins 1–3) and beta-neurexins 1-3 (β-neurexins 1–3). In addition, there are alternative splicing at 5 sites in α-neurexin and 2 in β-neurexin; more than 2000 splice variants are possible, suggesting its role in determining synapse specificity.
The encoded proteins are structurally similar to laminin, slit, and agrin, other proteins involved in axon guidance and synaptogenesis. α-Neurexins and β-neurexins have identical intracellular domains but different extracellular domains. The extracellular domain of α-neurexin is composed of three neurexin repeats which each contain LNS (laminin, neurexin, sex-hormone binding globulin) – EGF (epidermal growth factor) – LNS domains. N1α binds to a variety of ligands including neuroligins and GABA receptors, though neuron |
https://en.wikipedia.org/wiki/Complexin | Complexin (also known as synaphin) refers to a one of a small set of eukaryotic cytoplasmic neuronal proteins which binds to the SNARE protein complex (SNAREpin) with a high affinity. These are called synaphin 1 and 2. In the presence of Ca2+, the transport vesicle protein synaptotagmin displaces complexin, allowing the SNARE protein complex to bind the transport vesicle to the presynaptic membrane.
Complexin acts as both an inhibitor and a facilitator of synaptic vesicle fusion and neurotransmitter release. In one conformation, it clamps SNAREpin complexes, preventing vesicle fusion, while in a different conformation it releases the SNAREpins, allowing synaptotagmin to trigger fusion.
Whereas complexin is not necessary for synaptic vesicle exocytosis, it does increase neurotransmitter release by 60–70% as demonstrated by complexin gene knockout in mice. A number of human neurological diseases have been linked to a deficiency of complexin.
Synaphin can promote exocytosis by promoting interaction between the complementary syntaxin and synaptobrevin transmembrane regions that reside in opposing membranes prior to fusion.
Structure and Binding
Complexin is a small highly charged cytosolic protein that is hydrophilic, rich in glutamic acid and lysine residues. Complexin's central region (amino acids 48–70) binds to the SNARE core as an anti-parallel α-helix, which attaches complexin to the SNARE complex. It interacts selectively with the ternary SNARE complex but not with monomeric SNARE proteins. Complexin binds to the groove between the synaptobrevin and syntaxin helices. Complexin stabilizes the C-terminal part of the SNARE complex.
Function
Complexin acts as a positive regulator of synaptic vesicle exocytosis, and binds selectively to the neuronal SNARE complex. Complexin has a two-fold function in that it can act as either a promoter or an inhibitor of vesicle fusion. This dual-functionality is dependent upon synaptic activity such as a depolarizing stimulus |
https://en.wikipedia.org/wiki/Ptenodactylus | Ptenodactylus is a scientific name which has been used for several distinct genera of animals. It may refer to:
Ptenodactylus (Gray, 1845): A junior synonym of the lizard genus Pristidactylus
"Ptenodactylus" (Seeley, 1869): A nomen nudum which in the 19th century was used to refer to at least 21 species of pterosaur including:
"Ptenodactylus" brachyrhinus: A synonym of Ornithocheirus brachyrhinus (nomen dubium)
"Ptenodactylus" capito: A synonym of Ornithocheirus capito
"Ptenodactylus" colorhinus: A synonym of Camposipterus colorhinus.
"Ptenodactylus" crassidens: A synonym of Ornithocheirus crassidens. (nomen dubium)
"Ptenodactylus" cuvieri: A synonym of Cimoliopterus cuvieri.
"Ptenodactylus" dentatus: A synonym of Ornithocheirus dentatus. (nomen dubium)
"Ptenodactylus" enchorhynchus: A synonym of Ornithocheirus enchorhynchus (nomen dubium)
"Ptenodactylus" eurygnathus: A synonym of Ornithocheirus eurygnathus. (nomen dubium)
"Ptenodactylus" fittoni: A synonym of Pterodactylus fittoni (nomen dubium)
"Ptenodactylus" machaerorhynchus: A synonym of Lonchodraco machaerorhynchus
"Ptenodactylus macrorhinus": A nomen nudum
"Ptenodactylus" microdon: A synonym of Lonchodraco microdon
"Ptenodactylus" nasutus: A synonym of Camposipterus nasutus
"Ptenodactylus" oweni: A synonym of Lonchodraco microdon
"Ptenodactylus" oxyrhinus: A synonym of Ornithocheirus oxyrhinus (nomen dubium)
"Ptenodactylus" platystomus: A synonym of Ornithocheirus platystomus.
"Ptenodactylus" polyodon: A synonym of Ornithocheirus polyodon
"Ptenodactylus" scaphorhynchus: A synonym of Ornithocheirus scaphorhynchus. (nomen dubium)
"Ptenodactylus" sedgwicki: A synonym of Camposipterus sedgwickii.
"Ptenodactylus" tenuirostris: A synonym of Ornithocheirus tenuirostris (nomen dubium)
"Ptenodactylus" woodwardi: A synonym of Pterodactylus woodwardi (nomen dubium) |
https://en.wikipedia.org/wiki/Tom%20Hull%20%28mathematician%29 | Thomas C. Hull is an associate professor of mathematics at Western New England University and is known for his expertise in the mathematics of paper folding.
Career
Hull was an undergraduate at Hampshire College. He earned a master's degree and Ph.D. in mathematics at the University of Rhode Island. His 1997 dissertation, Some Problems in List Coloring Bipartite Graphs, involved graph coloring, and was supervised by Nancy Eaton.
Prior to his appointment at Western New England, Hull taught at Merrimack College. He has also taught at the Hampshire College Summer Studies in Mathematics for many years: as junior staff from 1991 to 1995, and as senior staff in 1998 to 2007. Since 2013, he has taught at MathILy, an intensive residential summer program for mathematically excellent high school students.
Hull was a member of the board of directors of origami association OrigamiUSA from 1995 to 2008.
Author
Hull is the author or co-author of several books on origami, including:
Origametry: Mathematical Methods in Paper Folding (Cambridge University Press, 2021)
Project Origami: Activities for Exploring Mathematics (AK Peters, 2006; 2nd ed., CRC Press, 2013)
Russian Origami: 40 Original Models Designed by the Top Folders in the Former Soviet Union (with Sergei Afonkin, St. Martin's Press, 1998)
Origami, Plain and Simple (with Robert E. Neale, St. Martin's Press, 1994)
He is also featured in the 2010 origami documentary Between the Folds.
Awards and honors
With Tomohiro Tachi of the University of Tokyo, Hull was the recipient of the 2016 A. T. Yang Memorial Award in Theoretical Kinematics of the American Society of Mechanical Engineers, for their joint work on predicting the motion of rigid origami patterns when forces are applied to them in their flat state. |
https://en.wikipedia.org/wiki/Action%20algebra | In algebraic logic, an action algebra is an algebraic structure which is both a residuated semilattice and a Kleene algebra. It adds the star or reflexive transitive closure operation of the latter to the former, while adding the left and right residuation or implication operations of the former to the latter. Unlike dynamic logic and other modal logics of programs, for which programs and propositions form two distinct sorts, action algebra combines the two into a single sort. It can be thought of as a variant of intuitionistic logic with star and with a noncommutative conjunction whose identity need not be the top element. Unlike Kleene algebras, action algebras form a variety, which furthermore is finitely axiomatizable, the crucial axiom being a•(a → a)* ≤ a. Unlike models of the equational theory of Kleene algebras (the regular expression equations), the star operation of action algebras is reflexive transitive closure in every model of the equations. Action algebras were introduced by Vaughan Pratt in the European Workshop JELIA'90.
Definition
An action algebra (A, ∨, 0, •, 1, ←, →, *) is an algebraic structure such that (A, ∨, •, 1, ←, →) forms a residuated semilattice in the sense of Ward and Dilworth, while (A, ∨, 0, •, 1, *) forms a Kleene algebra in the sense of Dexter Kozen. That is, it is any model of the joint theory of both classes of algebras. Now Kleene algebras are axiomatized with quasiequations, that is, implications between two or more equations, whence so are action algebras when axiomatized directly in this way. However, action algebras have the advantage that they also have an equivalent axiomatization that is purely equational. The language of action algebras extends in a natural way to that of action lattices, namely by the inclusion of a meet operation.
In the following we write the inequality a ≤ b as an abbreviation for the equation a ∨ b = b. This allows us to axiomatize the theory using inequalities yet still have a purel |
https://en.wikipedia.org/wiki/Multiplet | In physics and particularly in particle physics, a multiplet is the state space for 'internal' degrees of freedom of a particle, that is, degrees of freedom associated to a particle itself, as opposed to 'external' degrees of freedom such as the particle's position in space. Examples of such degrees of freedom are the spin state of a particle in quantum mechanics, or the color, isospin and hypercharge state of particles in the Standard model of particle physics. Formally, we describe this state space by a vector space which carries the action of a group of continuous symmetries.
Mathematical formulation
Mathematically, multiplets are described via representations of a Lie group or its corresponding Lie algebra, and is usually used to refer to irreducible representations (irreps, for short).
At the group level, this is a triplet where
is a vector space over a field (in the algebra sense) , generally taken to be or
is a Lie group. This is often a compact Lie group.
is a group homomorphism , that is, a map from the group to the space of invertible linear maps on . This map must preserve the group structure: for we have .
At the algebra level, this is a triplet , where
is as before.
is a Lie algebra. It is often a finite-dimensional Lie algebra over or .
is an Lie algebra homomorphism . This is a linear map which preserves the Lie bracket: for we have .
The symbol is used for both Lie algebras and Lie groups as, at least in finite dimension, there is a well understood correspondence between Lie groups and Lie algebras.
In mathematics, it is common to refer to the homomorphism as the representation, for example in the sentence 'consider a representation ', and the vector space is referred to as the 'representation space'. In physics sometimes the vector space is referred to as the representation, for example in the sentence 'we model the particle as transforming in the singlet representation', or even to refer to a quantum field which takes |
https://en.wikipedia.org/wiki/Metabolite%20pool | Metabolite pool is a collective term for all of the substances involved in the metabolic process in a biological system.
Metabolic pools are within cells (or organelles such as chloroplasts) and refer to the reservoir of molecules upon which enzymes can operate. The size of the reservoir is referred to as its "metabolic pool." The metabolic pool concept is important to cellular biology.
In certain ways, a metabolic pathway is similar to a factory assembly line. Products are assembled from parts by workers who each perform a specific step in the manufacturing process. Enzymes of a cell are like workers on an assembly line; each is only responsible for a particular step in the assembly process. A lag period also occurs when a new factory is constructed, a time period before finished products begin to roll off the assembly line at a steady rate. This lag period partially results from the time needed to fill supply bins with the necessary parts. As you might imagine, when parts are not readily available, production slows or stops. Metabolite pools are somewhat analogous to the parts bins of a factory. The Calvin-Benson cycle will only operate at full speed when the cellular 'bins' are full of the molecular building blocks that lie between PGA and RUBP. |
https://en.wikipedia.org/wiki/Methyl%20cinnamate | Methyl cinnamate is the methyl ester of cinnamic acid and is a white or transparent solid with a strong, aromatic odor. It is found naturally in a variety of plants, including in fruits, like strawberry, and some culinary spices, such as Sichuan pepper and some varieties of basil. Eucalyptus olida has the highest known concentrations of methyl cinnamate (98%) with a 2–6% fresh weight yield in the leaf and twigs.
Methyl cinnamate is used in the flavor and perfume industries. The flavor is fruity and strawberry-like; and the odor is sweet, balsamic with fruity odor, reminiscent of cinnamon and strawberry.
It is known to attract males of various orchid bees, such as Aglae caerulea.
List of plants that contain the chemical
Eucalyptus olida 'Strawberry Gum'
Ocotea quixos South American (Ecuadorian) Cinnamon, Ishpingo
Ocimum americanum cv. Purple Lovingly (Querendona Morada)
Ocimum americanum cv. Purple Castle (Castilla Morada)
Ocimum americanum cv. Purple Long-legged (Zancona morada)
Ocimum americanum cv. Clove (Clavo)
Ocimum basilicum cv. Sweet Castle (Dulce de Castilla)
Ocimum basilicum cv. White Compact (Blanca compacta)
Ocimum basilicum cv. large green leaves ()
Ocimum micranthum cv. Cinnamon (Canela)
Ocimum minimum cv. Little Virgin (Virgen pequena)
Ocimum minimum cv. Purple Virgin (Virgen morada)
Ocimum sp. cv. Purple ruffle (Crespa morada)
Ocimum sp. cv. White Ruffle (Crespa blanca)
Stanhopea embreei, an orchid
Vanilla
Toxicology and safety
Moderately toxic by ingestion. The oral for rats is 2610 mg/kg.
It is combustible as a liquid, and when heated to decomposition it emits acrid smoke and irritating fumes.
Compendial status
Food Chemicals Codex
See also
Eucalyptus oil
Ralf Sieckmann v Deutsches Patent und Markenamt, a court case concerning a company attempting to trademark the chemical compound. |
https://en.wikipedia.org/wiki/Social%20defeat | Social defeat is a concept used in the study of the physiological and behavioral effects of hostile interactions among either conspecific animals, or humans, in either a dyadic or in a group-individual context, potentially generating very significant consequences in terms of control over resources, access to mates and social positions.
Background
Research on social stress has accumulated a useful body of knowledge, providing perspective on the effects of detrimental social and environmental interaction on the brain. Research and experimentation suffer from many methodological difficulties: usually a lack of ecological validity (similarity with natural conditions and stressors) or are not amenable to scientific investigation (difficult to test and verify).
Social psychology approaches to human aggression have developed a multitude of perspectives, based on observations of human phenomena like bullying, mobbing, physical and verbal abuse, relational and indirect aggression, etc. Despite the richness of theories developed, the body of knowledge generated has not satisfied scientific requirements of testability and verifiability.
Animal studies of within-species aggression developed in 2 main branches: A) approaches based on laboratory experiments, on controlled conditions, allowing the measurement of behavioral, endocrine and neurological variables, but with the shortcoming of applying unnatural stressors (such as foot-shocks and restraint stress) in unnatural conditions (laboratory cages rarely approximate native habitats); B) approaches based on observations of animals in naturalistic settings, which avoided artificial environments and unnatural stresses, but usually not allowing the measurement of physiological effects or the manipulation of relevant variables.
In real life situations, animals (including humans) have to cope with stresses generated within their own species, during their interactions with conspecifics, especially due to recurrent struggles over |
https://en.wikipedia.org/wiki/Amyloid%20%28mycology%29 | In mycology a tissue or feature is said to be amyloid if it has a positive amyloid reaction when subjected to a crude chemical test using iodine as an ingredient of either Melzer's reagent or Lugol's solution, producing a blue to blue-black staining. The term "amyloid" is derived from the Latin amyloideus ("starch-like"). It refers to the fact that starch gives a similar reaction, also called an amyloid reaction. The test can be on microscopic features, such as spore walls or hyphal walls, or the apical apparatus or entire ascus wall of an ascus, or be a macroscopic reaction on tissue where a drop of the reagent is applied. Negative reactions, called inamyloid or nonamyloid, are for structures that remain pale yellow-brown or clear. A reaction producing a deep reddish to reddish-brown staining is either termed a dextrinoid reaction (pseudoamyloid is a synonym) or a hemiamyloid reaction.
Melzer's reagent reactions
Hemiamyloidity
Hemiamyloidity in mycology refers to a special case of cell wall amyloidity where the blue staining by iodine only occurs when the tissue was pretreated with potassium hydroxide solution (KOH) or other strong bases, whereas direct application of iodine causes a red reaction when using Lugol's solution, but no reaction when using Melzer's reagent. Hemiamyloidity is so far only known in Ascomycota, but here widespread and an important taxonomic distinction criterion. If cell walls stain blue by iodine reagents without pretreatment with KOH, this is called euamyloid. The term amyloid comprises both variants.
Properties
A hemiamyloid element of the cell wall does not directly stain blue with iodine reagents added to a water preparation, but only when it has been pretreated with potassium hydroxide solution (KOH). Without KOH pretreatment, the result depends much on the type of iodine reagent: with Lugol's solution (IKI), hemiamyloid structures react red to reddish-brown, whereas any reaction is suppressed when using Melzer's reagent (MLZ). Th |
https://en.wikipedia.org/wiki/Wide%20area%20application%20services | Cisco Wide Area Application Services (WAAS) is technology developed by Cisco Systems that optimizes the performance of any TCP-based application operating in a wide area network (WAN) environment while preserving and strengthening branch security. WAAS combines WAN optimization, acceleration of TCP-based applications, and Cisco's Wide Area File Services (WAFS) in a single appliance or blade. It is Cisco's attempt to keep WAN optimization residing firmly in the router, eliminating the need to deploy acceleration appliances throughout the infrastructure. The technology preserves TCP information within the network while offering the performance benefits that come along with using WAN optimization technology.
WAN optimization appliances have traditionally limited IT when it comes to maintaining functions such as security, quality of service, visibility, and monitoring end-to-end transactions because they tend to cause problems for most network monitoring devices and tools. By design, WAN Optimization “confuses” performance monitoring systems by changing packet header data.
Latest Release
Cisco's latest WAAS software release, announced at the 2007 Cisco Networkers conference, is the industry's first solution for both end-to-end monitoring and acceleration of application traffic.
Notes |
https://en.wikipedia.org/wiki/Percentage%20depth%20dose%20curve | In radiotherapy, a percentage depth dose curve (PDD) (sometimes percent depth dose curve) relates the absorbed dose deposited by a radiation beam into a medium as it varies with depth along the axis of the beam. The dose values are divided by the maximum dose, referred to as dmax, yielding a plot in terms of percentage of the maximum dose. Dose measurements are generally made in water or "water equivalent" plastic with an ionization chamber, since water is very similar to human tissue with regard to radiation scattering and absorption.
Percent depth dose (PDD), which reflects the overall percentage of dose deposited as compared to the depth of maximum dose, depends on the depth of interest, beam energy, field size, and SSD (source to surface distance) as follows. Of note, PDD generally refers to depths greater than the depth of maximum dose
PDD decreases with increasing depth due to the inverse square law and due to attenuation of the radiation beam
PDD increases with increasing radiation field size due to greater primary and scattered photons from the irradiated medium
PDD increases with increasing SSD because inverse square variations over a fixed distance interval are smaller at large total distance than small total distance
See also
Dosimetry
Dose profile |
https://en.wikipedia.org/wiki/Nechisar%20nightjar | The Nechisar nightjar (Caprimulgus solala) is a species of nightjar in the family Caprimulgidae. It is endemic to Ethiopia.
The species was first discovered in 1990 when researchers discovered a decomposing specimen in the Nechisar National Park. After bringing back a single wing from the specimen to the Natural History Museum in London, it was determined to be a previously unknown species. Its specific name, solala, means "only a wing".
Its natural habitat is subtropical. It is probably endemic to Nechisar NP. |
https://en.wikipedia.org/wiki/Tennessee%20Soybean%20Festival | The Tennessee Soybean Festival in Martin, Tennessee is one of several local festivals which occur each year throughout the state. Beginning the first week of September, the festival celebrates the historical impact of the soybean crop on the economics of West Tennessee and specifically the City of Martin and Weakley County. Each year the festival features several locally-oriented events, various concerts, the Miss Soybean Festival Pageant (a qualifying event for the Miss Tennessee Pageant), the football home-opener for the University of Tennessee at Martin as well as a street fair.
The festival kicks off with the Mayor's Luncheon.
No festival was held in 2020, due to the COVID-19 pandemic.
Events
Soybean Festival Talent Show
Soybean Festival Parade
WPSD-TV's "What's It Worth?" (Similar to Antiques Road Show)
Soybean Festival Golf Tournament
Street Fair
Concerts
Chicken Crazy, Hog Wild Barbecue Cook Off (sponsored by Tyson)
Soybean Festival 5k Run
Soybean Festival Car & Bike Show
Super Retriever Series Super Fly & Super V Water Events |
https://en.wikipedia.org/wiki/Quantum%20%28journal%29 | Quantum is an online-only, open-access, peer-reviewed scientific journal for quantum science and related fields. The journal was established in 2017. Quantum is an arXiv overlay journal, meaning the journal's content is hosted on the arXiv.
Quantum is listed in the Directory of Open Access Journals and the Emerging Sources Citation Index, and it is recognized by the European Physical Society as maintaining a high standard of peer review.
See also
Discrete Analysis |
https://en.wikipedia.org/wiki/Martinique%20amazon | The Martinique amazon (Amazona martinicana) is a hypothetical extinct species of Caribbean parrot in the family Psittacidae. It is not known from any material remains, but was said to be similar to the red-necked amazon (A. arausiaca) from Dominica, the next major island to the north of Martinique. Natives are known to have traded extensively in parrots between the Antilles, and it seems that the Martinique population was in some way related to or even descended from A. arausiaca.
Description
Jean-Baptiste Labat described them as follows in 1742:
Assuming it was a genuine and distinct taxon, it was endemic to Martinique and became extinct due to habitat loss as Martinique was cleared for agriculture. It has not been recorded since 1722.
The Guadeloupe amazon ("A. violacea"), a similarly speculative "species", was said to inhabit the island of Guadeloupe. It is sometimes considered to be the same as "A. martinicana". However, it is more widely held to be related or identical to the imperial amazon (A. imperialis), the second Amazona species of Dominica. |
https://en.wikipedia.org/wiki/Guadeloupe%20amazon | The Guadeloupe amazon or Guadeloupe parrot (Amazona violacea) is a hypothetical extinct species of parrot that is thought to have been endemic to the Lesser Antillean island region of Guadeloupe. Mentioned and described by 17th- and 18th-century writers, it received a scientific name in 1789. It was moved to the genus Amazona in 1905, and is thought to have been related to, or possibly the same as, the extant imperial amazon. A tibiotarsus and an ulna bone from the island of Marie-Galante may belong to the Guadeloupe amazon. In 1905, a species of extinct violet macaw was also claimed to have lived on Guadeloupe, but in 2015, it was suggested to have been based on a description of the Guadeloupe amazon.
According to contemporary descriptions, the head, neck and underparts of the Guadeloupe amazon were mainly violet or slate, mixed with green and black; the back was brownish green; and the wings were green, yellow and red. It had iridescent feathers, and was able to raise a "ruff" of feathers around its neck. The bird fed on fruits and nuts, and the male and female took turns sitting on the nest. It was eaten by French settlers, who also destroyed its habitat. Rare by 1779, it appears to have become extinct by the end of the 18th century.
Taxonomy
The Guadeloupe amazon was first described in 1664 by the French botanist Jean-Baptiste Du Tertre, who also wrote about and illustrated the bird in 1667. The French clergyman Jean-Baptiste Labat described the bird in 1742, and it was mentioned in later natural history works by writers such as Mathurin Jacques Brisson, Comte de Buffon, and John Latham; the latter gave it the name "ruff-necked parrot". German naturalist Johann Friedrich Gmelin coined the scientific name Psittacus violaceus for the bird in his 1789 edition of Systema Naturae, based on the writings of Du Tertre, Brisson, and Buffon. The specific name violaceus means "violet".
In 1891, the Italian zoologist Tommaso Salvadori included Psittacus violaceus in a li |
https://en.wikipedia.org/wiki/Red-headed%20macaw | The red-headed macaw or Jamaican green-and-yellow macaw (Ara erythrocephala) may have been a species of parrot in the family Psittacidae that lived in Jamaica, but its existence is hypothetical.
Description
Rothschild based it on a description which a Mr. Hill had sent to Philip Henry Gosse:
Ara erythrocephala could have been found in the mountains of Trelawney and St. Anne's Parishes, Jamaica. It was described to have been found in the mountains, and presumably in forest as well.
Extinction
It is believed that the main reason for the macaw's extinction was overhunting.
The macaw is extinct, and it is conjectured to have been hunted to extinction in the early 19th century. It was a close relative of the Cuban and Dominican macaws. Its existence is considered dubious today. |
https://en.wikipedia.org/wiki/Jamaican%20red%20macaw | The Jamaican red macaw (Ara gossei) is a hypothetical species of parrot in the family Psittacidae that lived on Jamaica.
History
The only reported specimen was shot on Jamaica around 1765, and was later seen by a Dr. Robertson when it was stuffed; the specimen has since been lost. Robertson sent a description of it to Philip Henry Gosse, who published his own description in 1847:
Robertson stated the bird had never been seen or figured before, and that it was very different from any macaw he had ever seen. One 1765 illustration is thought to depict this bird, but has also been suggested to be an imported Cuban macaw. The parrot was considered identical to the Cuban macaw by some 19th-century naturalists, but was given its own binomial by Rothschild in 1905. |
https://en.wikipedia.org/wiki/Fluorescence%20cross-correlation%20spectroscopy | Fluorescence cross-correlation spectroscopy (FCCS) is a spectroscopic technique that examines the interactions of fluorescent particles of different colours as they randomly diffuse through a microscopic detection volume over time, under steady conditions.
Discovery
Eigen and Rigler first introduced the fluorescence cross-correlation spectroscopy (FCCS) method in 1994. Later, in 1997, Schwille experimentally implemented this method.
Theory
FCCS is an extension of the fluorescence correlation spectroscopy (FCS) method that uses two fluorescent molecules instead of one that emits different colours. The technique measures coincident green and red intensity fluctuations of distinct molecules that correlate if green and red labelled particles move together through a predefined confocal volume. FCCS utilizes two species that are independently labeled with two different fluorescent probes of different colours. These fluorescent probes are excited and detected by two different laser light sources and detectors typically labeled as "green" and "red." By combining FCCS with a confocal microscope, the technique's capabilities are highlighted, as it becomes possible to detect fluorescence molecules in femtoliter volumes within the nanomolar range, with a high signal-to-noise ratio, and at a microsecond time scale.
The normalized cross-correlation function is defined for two fluorescent species, G and R, which are independent green and red channels, respectively:
where differential fluorescent signals at a specific time, and at a delay time, later is correlated with each other. In the absence of spectral bleed-through -when the fluorescence signal from an adjacent channel is visible in the channel being observed-, the cross-correlation function is zero for non-interacting particles. In contrast to FCS, the cross-correlation function increases with increasing numbers of interacting particles.
FCCS is mainly used to study bio-molecular interactions both in living cells |
https://en.wikipedia.org/wiki/Guadeloupe%20parakeet | The Guadeloupe parakeet (Psittacara labati) is a hypothetical species of parrot that would have been endemic to Guadeloupe.
Description
Jean-Baptiste Labat described a population of small parrots living on Guadeloupe:
Taxonomy
They were later named Conurus labati, and are now called the Guadeloupe parakeet. It has been postulated to be a separate species based on little evidence. There are no specimens or remains of the extinct parrots. Their taxonomy may never be fully elucidated, and so their postulated status as a separate species is hypothetical. It is presumed to have gone extinct in the late 18th century, if it did indeed exist. |
https://en.wikipedia.org/wiki/Plant%20ontology | Plant ontology (PO) is a collection of ontologies developed by the Plant Ontology Consortium. These ontologies describe anatomical structures and growth and developmental stages across Viridiplantae. The PO is intended for multiple applications, including genetics, genomics, phenomics, and development, taxonomy and systematics, semantic applications and education.
Project Members
Oregon State University
New York Botanical Garden
L. H. Bailey Hortorium at Cornell University
Ensembl
SoyBase
SSWAP
SGN
Gramene
The Arabidopsis Information Resource (TAIR)
MaizeGDB
University of Missouri at St. Louis
Missouri Botanical Garden
See also
Generic Model Organism Database
Open Biomedical Ontologies
OBO Foundry |
https://en.wikipedia.org/wiki/Dropbear%20%28software%29 | Dropbear is a software package written by Matt Johnston that provides a Secure Shell-compatible server and client. It is designed as a replacement for standard OpenSSH for environments with low memory and processor resources, such as embedded systems. It is a core component of OpenWrt and other router distributions.
Dropbear was originally released in April 2003.
Technology
Dropbear implements version 2 of the Secure Shell (SSH) protocol.
The cryptographic algorithms are implemented using third-party cryptographic libraries like LibTomCrypt included internally in the Dropbear distribution. It derives some parts from OpenSSH to handle BSD-style pseudo terminals.
Features
Dropbear implements the complete SSH version 2 protocol in both the client and the server. It does not support SSH version 1 backwards-compatibility in order to save space and resources, and to avoid the inherent security vulnerabilities in SSH version 1. SCP is also implemented. SFTP support relies on a binary file which can be provided by OpenSSH or similar programs. FISH works in any case and is supported by Konqueror.
Dropbear supports elliptic curve cryptography for key exchange, as of version 2013.61test and beyond.
See also
Lsh – GNU Project's implementation of ssh
Comparison of SSH clients
Comparison of SSH servers |
https://en.wikipedia.org/wiki/Arthur%20T.%20Benjamin | Arthur T. Benjamin (born March 19, 1961) is an American mathematician who specializes in combinatorics. Since 1989 he has been a professor of mathematics at Harvey Mudd College, where he is the Smallwood Family Professor of Mathematics.
He is known for mental math capabilities and "Mathemagics" performances in front of live audiences. His mathematical abilities have been highlighted in newspaper and magazine articles, at TED Talks and on the Colbert Report.
Education
Benjamin earned a Bachelor of Science with highest honors in applied mathematics at Carnegie Mellon University in 1983. He then went on to receive a Master of Science in Engineering in 1985 and a Doctor of Philosophy in 1989 in mathematical sciences at Johns Hopkins University. His PhD dissertation was titled "Turnpike Structures for Optimal Maneuvers", and was supervised by Alan J. Goldman.
During his freshman year at CMU he wrote the lyrics and created the magic effects for the musical comedy, Kije!, in collaboration with author Scott McGregor and composer Arthur Darrell Turner. This musical was the winner of an annual competition and was first performed as the CMU's Spring Musical in 1980.
Career
Academic
Benjamin held several mathematics positions while attending university, including stints with the National Bureau of Standards, the National Security Agency, and the Institute for Defense Analyses. Upon receipt of his PhD he was hired as an assistant professor of mathematics at Harvey Mudd College. He is currently a full professor at Harvey Mudd and was chair of the mathematics department from 2002 to 2004. He has published over 90 academic papers and five books. He has also filmed several sets of lectures on mathematical topics for The Great Courses series from The Teaching Company, including a course on Discrete Mathematics, Mental Math, and The Mathematics of Games and Puzzles: From Cards to Sudoku. He served as co-editor of Math Horizons magazine for five years.
Mathemagics
Benjamin has |
https://en.wikipedia.org/wiki/American%20Phytopathological%20Society | The American Phytopathological Society (APS) is an international scientific organization devoted to the study of plant diseases (phytopathology). APS promotes the advancement of modern concepts in the science of plant pathology and in plant health management in agricultural, urban and forest settings.
The Society has nearly 5,000 plant pathologists and scientists worldwide. It is the oldest and largest organization of its type in the world. It is also a member of the International Society for Plant Pathology.
APS provides information on the latest developments and research advances in plant health science through its journals and its publishing arm, APS Press.
APS advocates and participates in the exchange of plant health information with public policy makers and the larger scientific community, and it provides advice on education and training.
History
The society was founded in December 1908 by a group led by Cornelius Lott Shear. The first regular meeting was held in December 1909. It was the first scientific organization in the world to be devoted exclusively to phytopathology.
In 1929, its Canadian Phytopathological division was spun off into an independent organization, the Canadian Phytopathological Society.
Journals
The society began publishing scientific peer-reviewed research in 1911 and today publishes five journals in the area of plant pathology:
Phytopathology
Plant Disease
Molecular Plant-Microbe Interactions
Plant Health Progress
Plant Health Instructor
Phytobiomes Journal
Awards
The society gives a number of awards, designated by the National Research Council (United States) as "prestigious."
Ruth Allen Award has been given since 1966 to outstanding researchers in plant pathology. The award is named after Ruth F. Allen 1879–1963, a researcher in rust fungi and the first woman to receive a PhD in botany from the University of Wisconsin. It is distinct from the Ruth Allen Award established in 2005 by the Pipeline Industries Gui |
https://en.wikipedia.org/wiki/Semi-elliptic%20operator | In mathematics — specifically, in the theory of partial differential equations — a semi-elliptic operator is a partial differential operator satisfying a positivity condition slightly weaker than that of being an elliptic operator. Every elliptic operator is also semi-elliptic, and semi-elliptic operators share many of the nice properties of elliptic operators: for example, much of the same existence and uniqueness theory is applicable, and semi-elliptic Dirichlet problems can be solved using the methods of stochastic analysis.
Definition
A second-order partial differential operator P defined on an open subset Ω of n-dimensional Euclidean space Rn, acting on suitable functions f by
is said to be semi-elliptic if all the eigenvalues λi(x), 1 ≤ i ≤ n, of the matrix a(x) = (aij(x)) are non-negative. (By way of contrast, P is said to be elliptic if λi(x) > 0 for all x ∈ Ω and 1 ≤ i ≤ n, and uniformly elliptic if the eigenvalues are uniformly bounded away from zero, uniformly in i and x.) Equivalently, P is semi-elliptic if the matrix a(x) is positive semi-definite for each x ∈ Ω. |
https://en.wikipedia.org/wiki/English%20Botany | English Botany was a major publication of British plants comprising a 36 volume set, issued in 267 monthly parts over 23 years from 1790 to 1814. The work was conceived, illustrated, edited and published by the botanical illustrator and natural historian, James Sowerby. The brief formal technical descriptions were mostly supplied by the founder of the Linnean Society, Sir James Edward Smith. Initially Smith had declined to have his name associated with the work as he considered that his professional co-operation with a socially inferior artisan such as Sowerby might degrade his standing in higher circles. However, following the phenomenal public success and general acceptance by the professional class of the work he insisted that the title page of the fourth and succeeding volumes credited the work to his name with Sowerby named solely as the illustrator. The work, however, continued to be generally referred to as "Sowerby's Botany". In spite of this abuse of their social class differences by Smith, the two men were good friends and happily worked together on several projects over many years. The work was printed by J. Davis, London; initially on Edmeads and Pine laid paper.
The full title reads; English Botany or, Coloured Figures of British Plants, with their Essential Characters, Synonyms and Places of Growth. The complete First Edition comprises 2,592 hand-coloured, finely detailed, copper-plate engravings, including 3 fold-outs, each with a single page of text. The work is comprehensively indexed with each of the 36 volumes having its own specific set. In September 1814, Sowerby published a comprehensive, 42 page, three-part final index comprising; two indexes with Latin nomenclature (systematical and alphabetical) and an index of the common English names. The final indexes were also sold to non-subscribers as a set that included a six-page index to Sowerby's concurrent work "Coloured Figures of English Fungi or Mushrooms" (1797-1809 with five supplements to |
https://en.wikipedia.org/wiki/Magnetic%20impurity | A magnetic impurity is an impurity in a host metal that has a magnetic moment. The magnetic impurity can then interact with the conduction electrons of the metal, leading to interesting physics such as the Kondo effect, and heavy fermion behaviour. Some examples of magnetic impurities that metals can be doped with are iron and nickel. Such an impurity will contribute a Curie-Weiss term to the magnetic susceptibility,
.
Early theoretical work concentrated on explaining the trend observed as the impurity was varied across the transition metal group. Based on the idea of a virtual bound state, Anderson proposed a model that was successful in explaining the formation of a localized magnetic moment from a magnetic impurity.
See also
Anderson impurity model
Anderson orthogonality theorem
Magnetic semiconductors |
https://en.wikipedia.org/wiki/Negros%20fruit%20dove | The Negros fruit dove (Ptilinopus arcanus) is a species of bird in the pigeon and dove family, Columbidae. It is endemic to the island of Negros in the Philippines. This fruit dove is known from a single female specimen collected from the slopes of Mount Kanlaon in the northern part of the island. While it was found at a high elevation, it is suspected that the species originally lived in the lowland dipterocarp forests and was driven to higher elevations by habitat destruction. While some have suggested that the specimen is either a runt or a hybrid instead of a valid species, this is not widely accepted. The female Negros fruit dove was a small fruit dove with vivid dark green plumage and an ashy-grey forehead. It had a distinctive ring of bare yellow skin around its eye, and yellow fringes to some of its feathers gave it the appearance of having a yellow wingbar when perched. The throat was white, while the undertail and vent were yellow.
The original specimen was shot along with a bird suspected to be its mate from a fruiting tree. Nothing else is known about its behavior. The species has not been definitively reported since its original discovery in 1953, and as several searches of Mount Kanlaon and the surrounding forests have not discovered any sign of the bird, many believe that it may be extinct. However, a local hunter from southern Negros claimed to have shot it the nineties, and the discovery of many species formerly thought endemic to Negros on the nearby island of Panay have given some hope that the species may persist. As such, it is currently listed as Critically Endangered by the IUCN. Any surviving population would be very small, likely numbering fewer than 50 individuals, and would be threatened by habitat destruction and hunting.
Taxonomy
The Negros fruit dove was described in 1955 as Ptilinopus arcanus by Sidney Dillon Ripley and Dioscoro Rabor on the basis of a single female specimen collected by Rabor on May 1, 1953. This specimen, collected |
https://en.wikipedia.org/wiki/Filtering%20problem%20%28stochastic%20processes%29 | In the theory of stochastic processes, filtering describes the problem of determining the state of a system from an incomplete and potentially noisy set of observations. While originally motivated by problems in engineering, filtering found applications in many fields from signal processing to finance.
The problem of optimal non-linear filtering (even for the non-stationary case) was solved by Ruslan L. Stratonovich (1959, 1960), see also Harold J. Kushner's work and Moshe Zakai's, who introduced a simplified dynamics for the unnormalized conditional law of the filter known as Zakai equation. The solution, however, is infinite-dimensional in the general case. Certain approximations and special cases are well understood: for example, the linear filters are optimal for Gaussian random variables, and are known as the Wiener filter and the Kalman-Bucy filter. More generally, as the solution is infinite dimensional, it requires finite dimensional approximations to be implemented in a computer with finite memory. A finite dimensional approximated nonlinear filter may be more based on heuristics, such as the extended Kalman filter or the assumed density filters, or more methodologically oriented such as for example the projection filters, some sub-families of which are shown to coincide with the Assumed Density Filters.
Particle filters are another option to attack the infinite dimensional filtering problem and are based on sequential Monte Carlo methods.
In general, if the separation principle applies, then filtering also arises as part of the solution of an optimal control problem. For example, the Kalman filter is the estimation part of the optimal control solution to the linear-quadratic-Gaussian control problem.
The mathematical formalism
Consider a probability space (Ω, Σ, P) and suppose that the (random) state Yt in n-dimensional Euclidean space Rn of a system of interest at time t is a random variable Yt : Ω → Rn given by the solution to an Itō stochastic |
https://en.wikipedia.org/wiki/Sharpe%27s%20rail | Sharpe's rail (Gallirallus sharpei) is a species of bird in the family Rallidae. It is known only from the type specimen of unknown origin, but it has been speculated that it originated from Indonesia. Due to the lack of recent records, it has been considered extinct, but new evidence suggests it is possibly better regarded as a morph of the buff-banded rail.
The common name and Latin binomial name commemorate the British zoologist Richard Bowdler Sharpe.
Notes |
https://en.wikipedia.org/wiki/Arctium%20minus | Arctium minus, commonly known as lesser burdock, little burdock, louse-bur, common burdock, button-bur, cuckoo-button, or wild rhubarb, is a biennial plant. This plant is native to Europe, but has become introduced elsewhere such as Australia, North and South America, and other places.
Lesser burdock produces purple flowers in its second year of growth, from July to October. Outer bracts end in hooks that are like hook-and-loop. After the flower head dries, the hooked bracts will attach to humans and animals to transport the entire seedhead.
Characteristics
Arctium minus can grow up to tall and form multiple branches. It is large and bushy. Flowers are prickly and pink to lavender in color. Flower heads are about wide. The plant flowers from July through October. The flowers resemble and can be easily mistaken for thistles, but burdock can be distinguished by its extremely large (up to 50 cm) leaves and its hooked bracts. Leaves are long and ovate. Lower leaves are heart-shaped and have very wavy margins. Leaves are dark green above and woolly below. It grows an extremely deep taproot, up to into the ground.
Uses
The leafstalks (a year old or younger) and flower stalks can be eaten raw or cooked. The roots are edible boiled with a change of water, though become too woody to eat in plants over a year old. |
https://en.wikipedia.org/wiki/Nicomedes%20%28mathematician%29 | Nicomedes (; ; c. 280 – c. 210 BC) was an ancient Greek mathematician.
Life and work
Almost nothing is known about Nicomedes' life apart from references in his works. Studies have stated that Nicomedes was born in about 280 BC and died in about 210 BC. It is known that he lived around the time of Eratosthenes or after, because he criticized Eratosthenes' method of doubling the cube. It is also known that Apollonius of Perga called a curve of his creation a "sister of the conchoid", suggesting that he was naming it after Nicomedes' already famous curve. Consequently, it is believed that Nicomedes lived after Eratosthenes and before Apollonius of Perga.
Like many geometers of the time, Nicomedes was engaged in trying to solve the problems of doubling the cube and trisecting the angle, both problems we now understand to be impossible using the tools of classical geometry. In the course of his investigations, Nicomedes created the conchoid of Nicomedes; a discovery that is contained in his famous work entitled On conchoid lines. Nicomedes discovered three distinct types of conchoids, now unknown. Pappus wrote: "Nicomedes trisected any rectilinear angle by means of the conchoidal curves, the construction, order and properties of which he handed down, being himself the discoverer of their peculiar character".
Nicomedes also used the Hippias' quadratrix to square the circle, since according to Pappus, "For the squaring of the circle there was used by Dinostratus, Nicomedes, and certain other later persons a certain curve which took its name from this property, for it is called by them square-forming". Eutocius mentions that Nicomedes "prided himself inordinately on his discovery of this curve, contrasting it with Eratosthenes's mechanism for finding any number of mean proportionals, to which he objected formally and at length on the ground that it was impracticable and entirely outside the spirit of geometry".
Citations and footnotes |
https://en.wikipedia.org/wiki/Residuated%20Boolean%20algebra | In mathematics, a residuated Boolean algebra is a residuated lattice whose lattice structure is that of a Boolean algebra. Examples include Boolean algebras with the monoid taken to be conjunction, the set of all formal languages over a given alphabet Σ under concatenation, the set of all binary relations on a given set X under relational composition, and more generally the power set of any equivalence relation, again under relational composition. The original application was to relation algebras as a finitely axiomatized generalization of the binary relation example, but there exist interesting examples of residuated Boolean algebras that are not relation algebras, such as the language example.
Definition
A residuated Boolean algebra is an algebraic structure such that
An equivalent signature better suited to the relation algebra application is where the unary operations x\ and x▷ are intertranslatable in the manner of De Morgan's laws via
x\y = ¬(x▷¬y), x▷y = ¬(x\¬y),
and dually /y and ◁y as
x/y = ¬(¬x◁y), x◁y = ¬(¬x/y),
with the residuation axioms in the residuated lattice article reorganized accordingly (replacing z by ¬z) to read
⇔ ⇔
This De Morgan dual reformulation is motivated and discussed in more detail in the section below on conjugacy.
Since residuated lattices and Boolean algebras are each definable with finitely many equations, so are residuated Boolean algebras, whence they form a finitely axiomatizable variety.
Examples
Any Boolean algebra, with the monoid multiplication • taken to be conjunction and both residuals taken to be material implication x→y. Of the remaining 15 binary Boolean operations that might be considered in place of conjunction for the monoid multiplication, only five meet the monotonicity requirement, namely 0, 1, x, y, and . Setting y = z = 0 in the residuation axiom y ≤ x\z ⇔ x•y ≤ z, we have 0 ≤ x\0 ⇔ x•0 ≤ 0, which is falsified by taking x = 1 when x•y = 1, x, or . The dual argument for z/y r |
https://en.wikipedia.org/wiki/Problems%20in%20Latin%20squares | In mathematics, the theory of Latin squares is an active research area with many open problems. As in other areas of mathematics, such problems are often made public at professional conferences and meetings. Problems posed here appeared in, for instance, the Loops (Prague) conferences and the Milehigh (Denver) conferences.
Open problems
Bounds on maximal number of transversals in a Latin square
A transversal in a Latin square of order n is a set S of n cells such that every row and every column contains exactly one cell of S, and such that the symbols in S form {1, ..., n}. Let T(n) be the maximum number of transversals in a Latin square of order n. Estimate T(n).
Proposed: by Ian Wanless at Loops '03, Prague 2003
Comments: Wanless, McKay and McLeod have bounds of the form cn < T(n) < dn n!, where c > 1 and d is about 0.6. A conjecture by Rivin, Vardi and Zimmermann (Rivin et al., 1994) says that you can place at least exp(c n log n) queens in non-attacking positions on a toroidal chessboard (for some constant c). If true this would imply that T(n) > exp(c n log n). A related question is to estimate the number of transversals in the Cayley tables of cyclic groups of odd order. In other words, how many orthomorphisms do these groups have?
The minimum number of transversals of a Latin square is also an open problem. H. J. Ryser conjectured (Oberwolfach, 1967) that every Latin square of odd order has one. Closely related is the conjecture, attributed to Richard Brualdi, that every Latin square of order n has a partial transversal of order at least n − 1.
Characterization of Latin subsquares in multiplication tables of Moufang loops
Describe how all Latin subsquares in multiplication tables of Moufang loops arise.
Proposed: by Aleš Drápal at Loops '03, Prague 2003
Comments: It is well known that every Latin subsquare in a multiplication table of a group G is of the form aH x Hb, where H is a subgroup of G and a, b are elements of G.
Densest partial Latin square |
https://en.wikipedia.org/wiki/Antisymmetrizer | In quantum mechanics, an antisymmetrizer (also known as antisymmetrizing operator) is a linear operator that makes a wave function of N identical fermions antisymmetric under the exchange of the coordinates of any pair of fermions. After application of the wave function satisfies the Pauli exclusion principle. Since is a projection operator, application of the antisymmetrizer to a wave function that is already totally antisymmetric has no effect, acting as the identity operator.
Mathematical definition
Consider a wave function depending on the space and spin coordinates of N fermions:
where the position vector ri of particle i is a vector in and σi takes on 2s+1 values, where s is the half-integral intrinsic spin of the fermion. For electrons s = 1/2 and σ can have two values ("spin-up": 1/2 and "spin-down": −1/2). It is assumed that the positions of the coordinates in the notation for Ψ have a well-defined meaning. For instance, the 2-fermion function Ψ(1,2) will in general be not the same as Ψ(2,1). This implies that in general and therefore we can define meaningfully a transposition operator that interchanges the coordinates of particle i and j. In general this operator will not be equal to the identity operator (although in special cases it may be).
A transposition has the
parity (also known as signature) −1. The Pauli principle postulates that a wave function of identical fermions must be an eigenfunction of a transposition operator with its parity as eigenvalue
Here we associated the transposition operator with the permutation of coordinates π that acts on the set of N coordinates. In this case π = (ij), where (ij) is the cycle notation for the transposition of the coordinates of particle i and j.
Transpositions may be composed (applied in sequence). This defines a product between the transpositions that is associative.
It can be shown that an arbitrary permutation of N objects can be written as a product of transpositions and that the |
https://en.wikipedia.org/wiki/Frobenius%20covariant | In matrix theory, the Frobenius covariants of a square matrix are special polynomials of it, namely projection matrices Ai associated with the eigenvalues and eigenvectors of . They are named after the mathematician Ferdinand Frobenius.
Each covariant is a projection on the eigenspace associated with the eigenvalue .
Frobenius covariants are the coefficients of Sylvester's formula, which expresses a function of a matrix as a matrix polynomial, namely a linear combination
of that function's values on the eigenvalues of .
Formal definition
Let be a diagonalizable matrix with eigenvalues λ1, …, λk.
The Frobenius covariant , for i = 1,…, k, is the matrix
It is essentially the Lagrange polynomial with matrix argument. If the eigenvalue λi is simple, then as an idempotent projection matrix to a one-dimensional subspace, has a unit trace.
Computing the covariants
The Frobenius covariants of a matrix can be obtained from any eigendecomposition , where is non-singular and is diagonal with .
If has no multiple eigenvalues, then let ci be the th right eigenvector of , that is, the th column of ; and let ri be the th left eigenvector of , namely the th row of −1. Then .
If has an eigenvalue λi appearing multiple times, then , where the sum is over all rows and columns associated with the eigenvalue λi.
Example
Consider the two-by-two matrix:
This matrix has two eigenvalues, 5 and −2; hence .
The corresponding eigen decomposition is
Hence the Frobenius covariants, manifestly projections, are
with
Note , as required. |
https://en.wikipedia.org/wiki/Anales%20de%20F%C3%ADsica | Anales de Física was a peer-reviewed scientific journal covering research in all areas of physics published by the Royal Spanish Society of Physics (Real Sociedad Española de Física). It continued Anales de la Real Sociedad Española de Física y Química/Serie A, Física and its first independent title was:
Anales de Física, 1968 (vol 64) to 1980 (vol. 76; , CODEN: ANFIA6)
From 1981 (vol. 77 (1981) to Vol. 87 (1992) the journal was split in two sections:
Anales de Física/Serie A, Fenómenos e Interacciones (, CODEN: AFAIDU),
Anales de Física/Serie B, Aplicaciones, Métodos e Instrumentos (, CODEN: AFBIDZ).
Finally, the journal was renamed to
Anales de Física, 1992 (vol. 88) to 1998 (vol. 94; , CODEN: AFISEX)
Publication ceased after issue no. 2, 1998, when the journal was merged with several other European journals in the European Physical Journal. The Royal Spanish Society of Physics is now publishing two other journals entitled Revista Española de Física and Revista Iberoamericana de Física.
External links
Royal Spanish Society of Physics
Physics journals
Academic journals established in 1968
Publications disestablished in 1998
Multilingual journals
Defunct journals |
https://en.wikipedia.org/wiki/IP%20fragmentation%20attack | IP fragmentation attacks are a kind of computer security attack based on how the Internet Protocol (IP) requires data to be transmitted and processed. Specifically, it invokes IP fragmentation, a process used to partition messages (the service data unit (SDU); typically a packet) from one layer of a network into multiple smaller payloads that can fit within the lower layer's protocol data unit (PDU). Every network link has a maximum size of messages that may be transmitted, called the maximum transmission unit (MTU). If the SDU plus metadata added at the link layer exceeds the MTU, the SDU must be fragmented. IP fragmentation attacks exploit this process as an attack vector.
Part of the TCP/IP suite is the Internet Protocol (IP) which resides at the Internet Layer of this model. IP is responsible for the transmission of packets between network end points. IP includes some features which provide basic measures of fault-tolerance (time to live, checksum), traffic prioritization (type of service) and support for the fragmentation of larger packets into multiple smaller packets (ID field, fragment offset). The support for fragmentation of larger packets provides a protocol allowing routers to fragment a packet into smaller packets when the original packet is too large for the supporting datalink frames. IP fragmentation exploits (attacks) use the fragmentation protocol within IP as an attack vector.
According to [Kurose 2013], in one type of IP fragmentation attack "the attacker sends a stream of small fragments to the target host, none of which has an offset of zero. The target can collapse as it attempts to rebuild datagrams out of the degenerate packets." Another attack involves sending overlapping fragments with non-aligned offsets, which can render vulnerable operating systems not knowing what to do, causing some to crash.
Process
IP packets are encapsulated in datalink frames, and, therefore, the link MTU affects larger IP packets and forces them to be s |
https://en.wikipedia.org/wiki/Medical%20test | A medical test is a medical procedure performed to detect, diagnose, or monitor diseases, disease processes, susceptibility, or to determine a course of treatment. Medical tests such as, physical and visual exams, diagnostic imaging, genetic testing, chemical and cellular analysis, relating to clinical chemistry and molecular diagnostics, are typically performed in a medical setting.
Types of tests
By purpose
Medical tests can be classified by their purposes, the most common of which are diagnosis, screening and evaluation.
Diagnostic
A diagnostic test is a procedure performed to confirm or determine the presence of disease in an individual suspected of having a disease, usually following the report of symptoms, or based on other medical test results. This includes posthumous diagnosis. Examples of such tests are:
Using nuclear medicine to examine a patient suspected of having a lymphoma.
Measuring the blood sugar in a person suspected of having diabetes mellitus after periods of increased urination.
Taking a complete blood count of an individual experiencing a high fever to check for a bacterial infection.
Monitoring electrocardiogram readings on a patient with chest pain to diagnose or determine any heart irregularities.
Screening
Screening refers to a medical test or series of tests used to detect or predict the presence of disease in at-risk individuals within a defined group such as a population, family, or workforce. Screenings may be performed to monitor disease prevalence, manage epidemiology, aid in prevention, or strictly for statistical purposes.
Examples of screenings include measuring the level of TSH in the blood of a newborn infant as part of newborn screening for congenital hypothyroidism, checking for Lung cancer in non-smoking individuals who are exposed to second-hand smoke in an unregulated working environment, and Pap smear screening for prevention or early detection of cervical cancer.
Monitoring
Some medical tests are used to mon |
https://en.wikipedia.org/wiki/VIA%20Nano | The VIA Nano (formerly code-named VIA Isaiah) is a 64-bit CPU for personal computers. The VIA Nano was released by VIA Technologies in 2008 after five years of development by its CPU division, Centaur Technology. This new Isaiah 64-bit architecture was designed from scratch, unveiled on 24 January 2008, and launched on 29 May, including low-voltage variants and the Nano brand name. The processor supports a number of VIA-specific x86 extensions designed to boost efficiency in low-power appliances.
History
Unlike Intel and AMD, VIA uses two distinct development code names for each of its CPU cores. In this case, the codename 'CN' was used in the United States by Centaur Technology. Biblical names are used as codes by VIA in Taiwan, and Isaiah was the choice for this particular processor and architecture. It is expected that the VIA Isaiah will be twice as fast in integer performance and four times as fast in floating-point performance as the previous-generation VIA Esther at an equivalent clock speed. Power consumption is also expected to be on par with the previous-generation VIA CPUs, with thermal design power ranging from 5 W to 25 W. Being a completely new design, the Isaiah architecture was built with support for features like the x86-64 instruction set and x86 virtualization which were unavailable on its predecessors, the VIA C7 line, while retaining their encryption extensions. Several independent tests showed that the VIA Nano performs better than the single-core Intel Atom across a variety of workloads. In a 2008 Ars Technica test, a VIA Nano gained significant performance in memory subsystem after its CPUID changed to Intel, hinting at the possibility that the benchmark software only checks the CPUID instead of the actual features supported by the CPU to choose a code path. The benchmark software used had been released before the release of VIA Nano.
On November 3, 2009, VIA launched the Nano 3000 series. VIA claims that these models can offer a 20% pe |
https://en.wikipedia.org/wiki/Prunus%20speciosa | Prunus speciosa, the Oshima cherry, Japanese オオシマザクラ (Oshima zakura), is native to Izu Ōshima island and the Izu Peninsula on Honshū near Tokyo, Japan.
Description
Prunus speciosa is a deciduous tree typically high. The leaves are 5–10 cm long and 3–6 cm broad, with a double-toothed margin, and an acuminate apex.
The flowers are 2.5–4 cm diameter, with five white petals, gold stamens and brown sepals; they grow in clusters in the spring, and are hermaphroditic. The fruit is a small black cherry about 1 cm diameter.
A tree 8 m in circumference and 800 years old is known on Ōshima island. It has been designated a national treasure.
Cultivation and cultivar
The Oshima cherry, is widely cultivated as an ornamental tree. Because of its large, showy flowers it is planted in many gardens and parks. It prefers sun and moist but well draining soil.
There are many cultivars. It is also a hybrid parent of many of the sakura flowering cherry cultivars. Among these cultivars, those that originated from Oshima cherry are called Cerasus Sato-zakura Group, and many cultivars have a large number of petals, and the representative cultivar is Prunus lannesiana ‘Kanzan’ or ‘Sekiyama’. The reason for this is that Oshima cherry tend to mutate into double-flowered, grow fast, have many large flowers, and have a strong fragrance, so they have been favored for cherry blossom viewing because of their characteristics. When the population of the southern Kanto region increased during the medieval Kamakura period, Oshima cherry, which was originally from Izu Ōshima Island, was brought to Honshu and started to be cultivated there, and then brought to the capital, Kyoto. In the Muromachi period, Prunus lannesiana 'Albo-rosea' Makino (Fugenzou) and Prunus serrulata 'Mikurumakaisi' (Mikuruma gaeshi) derived from Oshima cherry were born, and in the Edo period, various kinds of Cerasus Sato-zakura Group such as ‘Kanzan’ were born, and many cultivars have been succeeded until now.
Oshima cherr |
https://en.wikipedia.org/wiki/Noncontracting%20grammar | In formal language theory, a grammar is noncontracting (or monotonic) if for all of its production rules,
α → β (where α and β are strings of nonterminal and terminal symbols), it holds that
|α| ≤ |β|, that is β has at least as many symbols as α.
A grammar is essentially noncontracting if there may be one exception, namely, a rule
S → ε
where S is the start symbol and ε the empty string, and furthermore, S never occurs in the right-hand side of any rule.
A context-sensitive grammar is a noncontracting grammar in which all rules are of the form αAβ → αγβ, where A is a nonterminal, and γ is a nonempty string of nonterminal and/or terminal symbols.
However, some authors use the term context-sensitive grammar to refer to noncontracting grammars in general.
A noncontracting grammar in which |α| < |β| for all rules is called a growing context-sensitive grammar.
History
Chomsky (1959) introduced the Chomsky hierarchy, in which context-sensitive grammars occur as "type 1" grammars; general noncontracting grammars do not occur.
Chomsky (1963) calls a noncontracting grammar a "type 1 grammar", and a context-sensitive grammar a "type 2 grammar", and by presenting a conversion from the former into the latter, proves the two weakly equivalent .
Kuroda (1964) introduced Kuroda normal form, into which all noncontracting grammars can be converted.
Example
This grammar, with the start symbol S, generates the language
,
which is not context-free due to the pumping lemma.
A context-sensitive grammar for the same language is shown below.
Expressive power
Every context-sensitive grammar is a noncontracting grammar.
There are easy procedures for
bringing any noncontracting grammar into Kuroda normal form, and
converting any noncontracting grammar in Kuroda normal form into a context-sensitive grammar.
Hence, these three types of grammar are equal in expressive power, all describing exactly the context-sensitive languages that do not include the empty string; the esse |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.