source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Sums%20of%20powers
In mathematics and statistics, sums of powers occur in a number of contexts: Sums of squares arise in many contexts. For example, in geometry, the Pythagorean theorem involves the sum of two squares; in number theory, there are Legendre's three-square theorem and Jacobi's four-square theorem; and in statistics, the analysis of variance involves summing the squares of quantities. Faulhaber's formula expresses as a polynomial in , or alternatively in terms of a Bernoulli polynomial. Fermat's right triangle theorem states that there is no solution in positive integers for and . Fermat's Last Theorem states that is impossible in positive integers with . The equation of a superellipse is . The squircle is the case , . Euler's sum of powers conjecture (disproved) concerns situations in which the sum of integers, each a th power of an integer, equals another th power. The Fermat-Catalan conjecture asks whether there are an infinitude of examples in which the sum of two coprime integers, each a power of an integer, with the powers not necessarily equal, can equal another integer that is a power, with the reciprocals of the three powers summing to less than 1. Beal's conjecture concerns the question of whether the sum of two coprime integers, each a power greater than 2 of an integer, with the powers not necessarily equal, can equal another integer that is a power greater than 2. The Jacobi–Madden equation is in integers. The Prouhet–Tarry–Escott problem considers sums of two sets of th powers of integers that are equal for multiple values of . A taxicab number is the smallest integer that can be expressed as a sum of two positive third powers in distinct ways. The Riemann zeta function is the sum of the reciprocals of the positive integers each raised to the power , where is a complex number whose real part is greater than 1. The Lander, Parkin, and Selfridge conjecture concerns the minimal value of in Waring's problem asks whether for every natural number ther
https://en.wikipedia.org/wiki/A%20due
A due in Italian or à deux in French is a musical direction meaning "for two". Most often seen in its abbreviated form a2, the marking signifies that on a staff that normally carries parts for two players, both players are to play the single part in unison. It is generally seen in scores and parts where two players or sections of the same instrument share a staff. The instruction a2 indicates that both players or sections should play the notes indicated, while primo and secondo (often abbreviated to 1. and 2. or Io and IIo) indicate that only a single player or section should play while the other remains tacet. Increasingly larger groups of players can also be indicated in a similar manner, for instance "a3" for three players ("a tre" in Italian, "à trois" in French), "a4" for four players ("a quattro" in Italian, "à quatre" in French), and so on. For orchestral strings, playing in unison is usually assumed, but if returning to unison from a divisi passage, "unison" (or "unis.") is traditionally used to indicate this. If returning from a solo string passage (in which only a single string player in a section is performing), "tutti" is used to indicate that the whole ensemble should play once again. See also Duet Unison
https://en.wikipedia.org/wiki/Botanical%20illustration
Botanical illustration is the art of depicting the form, color, and details of plant species. They are generally meant to be scientifically descriptive about subjects depicted and are often found printed alongside a botanical description in books, magazines, and other media. Some are sold as artworks. Often composed by a botanical illustrator in consultation with a scientific author, their creation requires an understanding of plant morphology and access to specimens and references. Many illustrations are in watercolour, but may also be in oils, ink, or pencil, or a combination of these and other media. The image may be life-size or not, though at times a scale is shown, and may show the life cycle and/or habitat of the plant and its neighbors, the upper and reverse sides of leaves, and details of flowers, bud, seed and root system. The fragility of dried or otherwise preserved specimens, and restrictions or impracticalities of transport, saw illustrations used as valuable visual references for taxonomists. In particular, minute plants or other botanical specimens only visible under a microscope were often identified through illustrations. To that end, botanical illustrations used to be generally accepted as types for attribution of a botanical name to a taxon. However, current guidelines state that on or after 1 January 2007, the type must be a specimen 'except where there are technical difficulties of specimen preservation or if it is impossible to preserve a specimen that would show the features attributed to the taxon by the author of the name.' (Arts 40.4 and 40.5 of the Shenzen Code, 2018). History Early herbals and pharmacopoeia of many cultures include illustrations of plants. Botanical illustrations in such texts were often created to assist with identification of a specie for some medicinal purpose. The earliest surviving illustrated botanical work is the Codex vindobonensis. It is a copy of Dioscorides's , and was made in the year 512 for Juliana A
https://en.wikipedia.org/wiki/Pteropus%20brunneus
Pteropus brunneus is an extinct species of flying fox in the family Pteropodidae. It was said to be found at Percy Island, southeast of Mackay, Queensland, off the northeast coast of Australia. Taxonomy A single male specimen was collected in 1874 and deposited at the British Museum of Natural History (BMNH), this skin and skull was estimated to be a near adult. The description for this was published by George Edward Dobson in 1878, in a revision of chiropteran specimens held at the museum. Further details were provided when the specimen was again examined in 1912. Since that record, no further documentation is known of this species; the specimen is still located at BMNH. The description was re-evaluated in the late twentieth century, and recognition as a species is maintained in the third edition of The Mammals of Australia (National Photographic Index of Australian Wildlife, 2008). Speculation on the taxon includes the proposition the specimen may be an undiagnosed vagrant of another species. Description A smaller species of genus Pteropus, the weight estimated to be around . The length of the head and body combined is approximately , the forearm of the single specimen is . Fur colour of this macrobat is uniform across the body, a golden shade of brown. The first description notes the form of the ears, comparing the specimen to those of Pteropus keraudrenii (Pteropus mariannus) but lacking any hair. The uropatagium is narrow and obscured across the centre by fur. The hair of the pelage is longer at the nape, but mostly short elsewhere, the fur at the upper back is slightly appressed and oppositely directed for an inch either side of the centre. Little fur appears at the arm, the legs are almost completely covered with hair. The species bears no resemblance to the Australian pteropodids, the 'flying-foxes', yet was reported to be residing in a large camp that travelled to the Australian mainland to feed. Distribution and habitat The presumed distributio
https://en.wikipedia.org/wiki/Moiety%20conservation
Moiety conservation is the conservation of a subgroup in a chemical species, which is cyclically transferred from one molecule to another. In biochemistry, moiety conservation can have profound effects on the system's dynamics. Moiety-conserved cycles in biochemistry A typical example of a conserved moiety in biochemistry is the Adenosine diphosphate (ADP) subgroup that remains unchanged when it is phosphorylated to create adenosine triphosphate (ATP) and then dephosphorylated back to ADP forming a conserved cycle. Moiety-conserved cycles in nature exhibit unique network control features which can be elucidated using techniques such as metabolic control analysis. Other examples in metabolism include NAD/NADH, NADP/NADPH, CoA/Acetyl-CoA. Conserved cycles also exist in large numbers in protein signaling networks when proteins get phosphorylated and phosphorylated. Most, if not all, of these cycles, are time-scale-dependent. For example, although a protein in a phosphorylation cycle is conserved during the interconversion, over a longer time scale, there will be low levels of protein synthesis and degradation, which change the level of protein moiety. The same applies to cycles involving ATP, NAD, etc. Thus, although the concept of a moiety-conserved cycle in biochemistry is a useful approximation, over time scales that include significant net synthesis and degradation of the moiety, the approximation is no longer valid. When invoking the conserved-moiety assumption on a particular moiety, we are, in effect, assuming the system is closed to that moiety. Identifying conserved cycles Conserved cycles in a biochemical network can be identified by examination of the stoichiometry matrix, The stoichiometry matrix for a simple cycle with species A and AP is given by: The rates of change of A and AP can be written using the equation: Expanding the expression leads to: Note that . This means that , where is the total mass of moiety . Given an arbitrary system: e
https://en.wikipedia.org/wiki/Bulldozer%20%28microarchitecture%29
The AMD Bulldozer Family 15h is a microprocessor microarchitecture for the FX and Opteron line of processors, developed by AMD for the desktop and server markets. Bulldozer is the codename for this family of microarchitectures. It was released on October 12, 2011, as the successor to the K10 microarchitecture. Bulldozer is designed from scratch, not a development of earlier processors. The core is specifically aimed at computing products with TDPs of 10 to 125 watts. AMD claims dramatic performance-per-watt efficiency improvements in high-performance computing (HPC) applications with Bulldozer cores. The Bulldozer cores support most of the instruction sets implemented by Intel processors (Sandy Bridge) available at its introduction (including SSE4.1, SSE4.2, AES, CLMUL, and AVX) as well as new instruction sets proposed by AMD; ABM, XOP, FMA4 and F16C. Only Bulldozer GEN4 (Excavator) supports AVX2 instruction sets. Overview According to AMD, Bulldozer-based CPUs are based on GlobalFoundries' 32 nm Silicon on insulator (SOI) process technology and reuses the approach of DEC for multitasking computer performance with the arguments that it, according to press notes, "balances dedicated and shared computer resources to provide a highly compact, high units count design that is easily replicated on a chip for performance scaling." In other words, by eliminating some of the "redundant" elements that naturally creep into multicore designs, AMD has hoped to take better advantage of its hardware capabilities, while using less power. Bulldozer-based implementations built on 32nm SOI with HKMG arrived in October 2011 for both servers and desktops. The server segment included the dual chip (16-core) Opteron processor codenamed Interlagos (for Socket G34) and single chip (4, 6 or 8 cores) Valencia (for Socket C32), while the Zambezi (4, 6 and 8 cores) targeted desktops on Socket AM3+. Bulldozer is the first major redesign of AMD’s processor architecture since 2003, when the
https://en.wikipedia.org/wiki/Hankel%20singular%20value
In control theory, Hankel singular values, named after Hermann Hankel, provide a measure of energy for each state in a system. They are the basis for balanced model reduction, in which high energy states are retained while low energy states are discarded. The reduced model retains the important features of the original model. Hankel singular values are calculated as the square roots, {σi ≥ 0, i = 1,…,n}, of the eigenvalues, {λi ≥ 0, i = 1,…,n}, for the product of the controllability Gramian, WC, and the observability Gramian, WO. Properties The square of the Hilbert-Schmidt norm of the Hankel operator associated with a linear system is the sum of squares of the Hankel singular values of this system. Moreover, the area enclosed by the oriented Nyquist diagram of an BIBO stable and strictly proper linear system is equal π times the square of the Hilbert-Schmidt norm of the Hankel operator associated with this system. Hankel singular values also provide the optimal range of analog filters. See also Hankel matrix Hermann Hankel Notes
https://en.wikipedia.org/wiki/Biophone
The Biophone is a combination voice and telemetry radio communications system used in the 1970s and '80s by paramedics to talk to the physicians supervising them from a hospital base station. The key difference between this unit and another two-way radio was that it had the ability to transmit a patient's electrocardiogram. The Biophone was produced by the Biocom Company. The Biophone 3502 used the internals of a General Electric PE-series handheld radio mounted into an orange case, which was made of an orange laminated fiberglass with aluminum trim. The Biophone had an internal rechargeable battery that powered the sensor equipment, the radio, and an amplifier that raised the transmitting power to 50 watts. The unit had a connector for a vehicle-mounted antenna allowing better signal reception and transmission from the back of an ambulance. The Biophone could have any 6 (the maximum that could fit in the PE radio) of the 10 UHF medical duplex channels in the 450-470 MHz range. This allowed flexibility in the overall system. The NiCad battery could be charged up in 15 minutes. In popular culture This Biophone radio can be seen throughout the 1970s TV series Emergency!, being used by the fictional Los Angeles County Fire Department paramedic characters John Gage (Randolph Mantooth) and Roy DeSoto (Kevin Tighe). The actual Biophone 3502 radio used on the show was donated to the Smithsonian's National Museum of American History. See also Motorola APCOR External links https://web.archive.org/web/20110711082756/http://www.general-devices.com/files/learning_pdf/From_BioCom_to_Bluetooth.pdf http://www.bchwys.ca/E51/EMF_ME9.htm Emergency! Goods manufactured in the United States Medical equipment
https://en.wikipedia.org/wiki/Oil%20body
An oil body is a lipid-containing structure found in plant cells. The term can refer to at least two distinct kinds of structures in different kinds of plants. Oil bodies in liverworts Liverwort complex oil bodies are structures unique to liverworts that contain isoprenoid essential oils and are surrounded by a single membrane. The size, shape, color, and number of oil bodies per cell is characteristic of certain species and may be used to identify these. Oil bodies in vascular plants Some species of vascular plants also contain intracellular structures called oil bodies. Vascular plant oil bodies consist mainly of triacylglycerols surrounded by a layer consisting of phospholipids and the protein oleosin. These oil bodies occur largely in seeds but also occur in other plant parts, including leaves. Oil bodies in seeds Oil bodies are the organelle that has evolved to hold triglycerides in plant cells. They are therefore the principal store of chemical energy in oleaginous seeds. The structure and composition of plant seed oil bodies has been the subject of research from at least as far back as the 1980s, with several papers published in the 80s and 90s. Recent work, using updated techniques, has given a detailed molecular profile of oil bodies. It now seems that proteins out-number lipids on the surface of oil bodies, and that one protein in particular, called oleosin, dominates. The lipid and protein fractions of oil bodies are remarkable because they maintain a coherent monolayer over a wide temperature and hydration range. Gallery Microscopic views of liverwort cells, showing a variety of oil body shapes and arrangements.
https://en.wikipedia.org/wiki/Ribonucleoprotein%20particle
A ribonucleoprotein particle or RNP is vessicle complex formed between RNA and RNA-binding proteins (RBPs). The term RNP foci can also be used to denote intracellular compartments involved in processing of RNA transcripts. RNA/RBP complexes RBPs interact with RNA through various structural motifs. Aromatic amino acid residues in RNA-binding proteins result in stacking interactions with RNA. Lysine residues in the helical portion of RNA binding proteins help to stabilize interactions with other nucleic acids as a result of the force of attraction between the positively-charged lysine side chains and the negatively-charged phosphate "backbone" of RNA. It is hypothesized that RNA sequences in the 3'-untranslated region determine the binding of RBPs, and that these RBPs determine the post-transcriptional fate of mRNAs. RNP granules RNP granules are a highly diverse group of compartments. These include stress granules, processing bodies, and exosomes in somatic cells. Many RNP granules are cell type and/or species specific. For example, chromatoid bodies are found only in male germ cells, whereas transport granules have so far been found only in neurons and oocytes. RNP granules function mainly by physically separating or associating transcripts with proteins. They function in the storage, processing, degradation and transportation of their associated transcripts. RNP granules have been shown to have particular importance in cells where post-transcriptional regulation is of vital importance. For example, in neurons where transcripts must be transported and stored in dendrites for the formation and strengthening of connections, in oocytes/embryos where mRNAs are stored for years before being translated, and in developing sperm cells where transcription is halted before development is complete. See also Messenger RNP: complex between mRNA and protein(s) present in nucleus Heterogeneous ribonucleoprotein particle: complexes of RNA and protein present in t
https://en.wikipedia.org/wiki/Convergent%20Linux%20Platform
Convergent Linux Platform or CLP for short is an initiative of a la Mobile, inc. to present to the market a Linux-embedded mobile phone with raised security issues as well as the first Linux-based smart phone operating system.
https://en.wikipedia.org/wiki/List%20of%20quantum%20chemistry%20and%20solid-state%20physics%20software
Quantum chemistry computer programs are used in computational chemistry to implement the methods of quantum chemistry. Most include the Hartree–Fock (HF) and some post-Hartree–Fock methods. They may also include density functional theory (DFT), molecular mechanics or semi-empirical quantum chemistry methods. The programs include both open source and commercial software. Most of them are large, often containing several separate programs, and have been developed over many years. Overview The following tables illustrates some of the main capabilities of notable packages: Numerical details Quantum chemistry and solid-state physics characteristics Post processing packages in quantum chemistry and solid-state physics See also Footnotes † "Academic": academic (no cost) license possible upon request; "Commercial": commercially distributed. ‡ Support for periodic systems (3d-crystals, 2d-slabs, 1d-rods and isolated molecules): 3d-periodic codes always allow simulating systems with lower dimensionality within a supercell. Specified here is the ability for simulating within lower periodicity. 2 QuanPol is a full spectrum and seamless (HF, MCSCF, GVB, MP2, DFT, TDDFT, CHARMM, AMBER, OPLSAA) QM/MM package integrated in GAMESS-US. 10 Through CRYSCOR program.
https://en.wikipedia.org/wiki/Display%20motion%20blur
Display motion blur, also called HDTV blur and LCD motion blur, refers to several visual artifacts (anomalies or unintended effects affecting still or moving images) that are frequently found on modern consumer high-definition television sets and flat panel displays for computers. Causes Many motion blur factors have existed for a long time in film and video (e.g. slow camera shutter speed). The emergence of digital video, and HDTV display technologies, introduced many additional factors that now contribute to motion blur. The following factors are generally the primary or secondary causes of perceived motion blur in video. In many cases, multiple factors can occur at the same time within the entire chain, from the original media or broadcast, all the way to the receiver end. Pixel response time on LCD displays (motion blur caused by slow pixel response time) Lower camera shutter speeds common in Hollywood production films (blur in the content of the film), and common in miniaturized camera sensors that require more light. Blur from eye tracking fast-moving objects on sample-and-hold LCD, plasma, or microdisplay. Resolution resampling (blur due to resizing image to fit the native resolution of the HDTV); not a motion blur. Deinterlacing by the display, and telecine processing by studios. These processes can soften images, and/or introduce motion-speed irregularities. Compression artifacts, present in digital video streams, can contribute additional blur during fast motion. Motion blur has been a more severe problem for LCD displays, due to their sample-and-hold nature. Even in situations when pixel response time is very short, motion blur remains a problem because their pixels remain lit, unlike CRT phosphors that merely flash briefly. Reducing the time an LCD pixel is lit can be accomplished via turning off the backlight for part of a refresh. This reduces motion blur due to eye tracking by decreasing the time the backlight is on. In addition, strobed back
https://en.wikipedia.org/wiki/PKCS%2012
In cryptography, PKCS #12 defines an archive file format for storing many cryptography objects as a single file. It is commonly used to bundle a private key with its X.509 certificate or to bundle all the members of a chain of trust. A PKCS #12 file may be encrypted and signed. The internal storage containers, called "SafeBags", may also be encrypted and signed. A few SafeBags are predefined to store certificates, private keys and CRLs. Another SafeBag is provided to store any other data at individual implementer's choice. PKCS #12 is one of the family of standards called Public-Key Cryptography Standards (PKCS) published by RSA Laboratories. The filename extension for PKCS #12 files is .p12 or .pfx. These files can be created, parsed and read out with the OpenSSL pkcs12 command. Relationship to PFX file format PKCS #12 is the successor to Microsoft's "PFX"; however, the terms "PKCS #12 file" and "PFX file" are sometimes used interchangeably. The PFX format has been criticised for being one of the most complex cryptographic protocols. Normal usage The full PKCS #12 standard is very complex. It enables buckets of complex objects such as PKCS #8 structures, nested deeply. But in practice it is normally used to store just one private key and its associated certificate chain. PKCS #12 files are usually created using OpenSSL, which only supports a single private key from the command line interface. The Java keytool can be used to create multiple "entries" since Java 8, but that may be incompatible with many other systems. As of Java 9, PKCS #12 is the default keystore format. A simpler, alternative format to PKCS #12 is PEM which just lists the certificates and possibly private keys as Base 64 strings in a text file. GnuTLS's certtool may also be used to create PKCS #12 files including certificates, keys, and CA certificates via --to-p12. However, beware that for interchangeability with other software, if the sources are in PEM Base64 text, then --outder s
https://en.wikipedia.org/wiki/KH%20domain
The K Homology (KH) domain is a protein domain that was first identified in the human heterogeneous nuclear ribonucleoprotein (hnRNP) K. An evolutionarily conserved sequence of around 70 amino acids, the KH domain is present in a wide variety of nucleic acid-binding proteins. The KH domain binds RNA, and can function in RNA recognition. It is found in multiple copies in several proteins, where they can function cooperatively or independently. For example, in the AU-rich element RNA-binding protein KSRP, which has 4 KH domains, KH domains 3 and 4 behave as independent binding modules to interact with different regions of the AU-rich RNA targets. The solution structure of the first KH domain of FMR1 and of the C-terminal KH domain of hnRNP K determined by nuclear magnetic resonance (NMR) revealed a beta-alpha-alpha-beta-beta-alpha structure. Autoantibodies to NOVA1, a KH domain protein, cause paraneoplastic opsoclonus ataxia. The KH domain is found at the N-terminus of the ribosomal protein S3. This domain is unusual in that it has a different fold compared to the normal KH domain. Nucleic acid binding KH domains bind to either RNA or single stranded DNA. The nucleic acid is bound in an extended conformation across one side of the domain. The binding occurs in a cleft formed between alpha helix 1, alpha helix 2 the GXXG loop (contains a highly conserved sequence motif) and the variable loop. The binding cleft is hydrophobic in nature with a variety of additional protein specific interactions to stabilise the complex. Valverde and colleagues note that, "Nucleic acid base-to-protein aromatic side chain stacking interactions which are prevalent in other types of single stranded nucleic acid binding motifs, are notably absent in KH domain nucleic acid recognition". Structural groups Structurally there are two different types of KH domains identified by Grishin which are called type I and type II. The type I domains are mainly found in eukaryotic proteins, while the typ
https://en.wikipedia.org/wiki/Topological%20entropy%20in%20physics
The topological entanglement entropy or topological entropy, usually denoted by , is a number characterizing many-body states that possess topological order. A non-zero topological entanglement entropy reflects the presence of long range quantum entanglements in a many-body quantum state. So the topological entanglement entropy links topological order with pattern of long range quantum entanglements. Given a topologically ordered state, the topological entropy can be extracted from the asymptotic behavior of the Von Neumann entropy measuring the quantum entanglement between a spatial block and the rest of the system. The entanglement entropy of a simply connected region of boundary length L, within an infinite two-dimensional topologically ordered state, has the following form for large L: where is the topological entanglement entropy. The topological entanglement entropy is equal to the logarithm of the total quantum dimension of the quasiparticle excitations of the state. For example, the simplest fractional quantum Hall states, the Laughlin states at filling fraction 1/m, have γ = ½log(m). The Z2 fractionalized states, such as topologically ordered states of Z2 spin-liquid, quantum dimer models on non-bipartite lattices, and Kitaev's toric code state, are characterized γ = log(2). See also Quantum topology Topological defect Topological order Topological quantum field theory Topological quantum number Topological string theory
https://en.wikipedia.org/wiki/John%20Dix%20Fisher
John Dix Fisher (March 27, 1797 – March 3, 1850) was a physician and founder of Perkins Institution for the Blind in Boston, Massachusetts. Early life He was born in Needham, Massachusetts, the youngest of the six sons of Aaron and Lucy (Stedman) Fisher. The Fisher family was descended from Anthony Fisher, one of the signers of the Dedham Covenant in 1636. All six sons were self-made men who became successful merchants, traders and professional men in Dedham and Boston, Massachusetts. Career With the support of his older brothers, John Dix Fisher entered Brown University, graduating in 1820. After receiving his M.D. degree in 1825 from what was then called Massachusetts Medical College of Harvard University, he immediately accompanied his brother, the artist Alvan Fisher, on a trip to Europe. In Paris, he pursued his professional studies with such eminent physicians of the period as René Laennec, inventor of the stethoscope; Gabriel Andral, distinguished pathologist; and Alfred Velpeau, renowned for his knowledge of surgical anatomy. In medical school, Dr. Fisher had studied with Dr. James Jackson, Harvard's first professor of clinical medicine and one of the "fathers" of Massachusetts General Hospital. Dr. Jackson had touched on the difficulties of distinguishing smallpox from other eruptive diseases and the need for a series of colored pictures which would illustrate the progress of the disease. Dr. Fisher undertook such a project while in Paris and wrote Description of the Distinct, Confluent, and Inoculated Small Pox, Varioloid Disease, Cow Pox, and Chicken Pox (1829) which included thirteen colored plates. The paintings from which the plates were made were executed under Dr. Fisher's direction by a French artist working at the bedside of the patients during 1825 and 1826 when smallpox was an epidemic in Paris. Dr. Fisher also observed the methods of instructing the blind that were being practiced in Paris. He visited the world's first school for blind chi
https://en.wikipedia.org/wiki/CMD640
CMD640, the California Micro Devices Technology Inc product 0640, is an IDE interface chip for the PCI and VLB buses. CMD640 had some sort of hardware acceleration: WDMA and Read-Ahead (prefetch) support. CMD Technology Inc was acquired by Silicon Image Inc. in 2001. Hardware bug The original CMD640 has data corruption bugs, some of which remained in CMD646. The data corruption bug is similar to the bug affecting the contemporaneous PC Tech (a subsidiary of Zeos) RZ1000 chipset. Both chipsets were used on a number of motherboards, including those from Intel. Мodern operating systems have a workaround for this bug by prohibiting aggressive acceleration mode and losing about 10% of the performance.
https://en.wikipedia.org/wiki/Escherichia%20coli%20O104%3AH21
Escherichia coli O104:H21 is a rare serotype of Escherichia coli, a species of bacteria that lives in the lower intestines of mammals. Although there are many serotypes of E. coli, when in animals, there are benefits or do not cause disease. Some serotypes of E. coli have been recognized as pathogenic to humans, e.g. E. coli O157:H7, E. coli O121 and E. coli O104:H21. History Escherichia coli O104:H21 was discovered in 1982, when it caused an outbreak of severe bloody diarrhea. It had infected hamburgers, and those affected had eaten these hamburgers not fully cooked. An outbreak of E. coli responsible for at least 22 deaths in Northern Europe in May 2011 was reported to be caused by another O104 strain, Escherichia coli O104:H4. Effects Escherichia coli O104:H21 can cause outbreak of infection similar to that caused by E. coli O157:H7, the most common shiga-like toxin-producing E. coli (SLTEC). SLTECs are the most well-known causes of gastrointestinal illness and diarrhea. Treatment The body usually rids itself of harmful E. coli O104:H21 on its own within 5 to 10 days. Antibiotics should not be used, and neither should antidiarrheal agents such as loperamide. See also Escherichia coli E. coli O104:H4 E. coli O157:H7
https://en.wikipedia.org/wiki/Libythea%20cinyras
Libythea cinyras was a species of butterfly in the nymphalid subfamily Libytheinae. It is now thought to be extinct. It was endemic to Mauritius. The only known specimen is the holotype.
https://en.wikipedia.org/wiki/Salpicon
Salpicon (, meaning "hodgepodge" or "medley"; ) is a dish of one or more ingredients diced or minced and bound with a sauce or liquid. There are different versions found in Spanish and the broader Latin American cuisine. A salpicon is sometimes used as stuffing. In Mexican cuisine and Central American cuisine, the term refers to a salad mixture containing thinly sliced or chopped flank steak, onion, oregano, chile serrano, avocado, tomatoes, and vinegar. The mixture is commonly served on tostadas, tacos or as a filling of poblano peppers. In Honduras, rabbit meat is used. In Colombian cuisine, salpicón is a fruit cocktail beverage made with a base of watermelon and/or orange juice, which gives it its bright red color, and soda water. Notes
https://en.wikipedia.org/wiki/Lemoine%27s%20conjecture
In number theory, Lemoine's conjecture, named after Émile Lemoine, also known as Levy's conjecture, after Hyman Levy, states that all odd integers greater than 5 can be represented as the sum of an odd prime number and an even semiprime. History The conjecture was posed by Émile Lemoine in 1895, but was erroneously attributed by MathWorld to Hyman Levy who pondered it in the 1960s. A similar conjecture by Sun in 2008 states that all odd integers greater than 3 can be represented as the sum of a prime number and the product of two consecutive positive integers ( p+x(x+1) ). Formal definition To put it algebraically, 2n + 1 = p + 2q always has a solution in primes p and q (not necessarily distinct) for n > 2. The Lemoine conjecture is similar to but stronger than Goldbach's weak conjecture. Example For example, 47 = 13 + 2 × 17 = 37 + 2 × 5 = 41 + 2 × 3 = 43 + 2 × 2. counts how many different ways 2n + 1 can be represented as p + 2q. Evidence According to MathWorld, the conjecture has been verified by Corbitt up to 109. A blog post in June of 2019 additionally claimed to have verified the conjecture up to 1010. See also Lemoine's conjecture and extensions Notes
https://en.wikipedia.org/wiki/List%20of%20LDAP%20software
The following is a list of software programs that can communicate with and/or host directory services via the Lightweight Directory Access Protocol (LDAP). Client software Cross-platform Admin4 - an open source LDAP browser and directory client for Linux, OS X, and Microsoft Windows, implemented in Python. Apache Directory Server/Studio - an LDAP browser and directory client for Linux, OS X, and Microsoft Windows, and as a plug-in for the Eclipse development environment. FusionDirectory, a web application under license GNU General Public License developed in PHP for managing LDAP directory and associated services. JXplorer - a Java-based browser that runs in any operating environment. JXWorkBench - a Java-based plugin to JXplorer that includes LDAP reporting using the JasperReports reporting engine. LDAP Account Manager - a PHP based webfrontend for managing various account types in an LDAP directory. phpLDAPadmin - a web-based LDAP administration tool for creating and editing LDAP entries in any LDAP server. LDAP User Manager - A simple PHP interface to add LDAP users and groups. Also has a self-service password change feature. Designed to be run as a Docker container. SLAMD - an open source load generation software suite, for testing multiple application protocols, including LDAP. Also contains tools for creating test data and test scripts. RoundCube - an open source and free PHP IMAP client with support with LDAP based address books. GOsa² - provides a powerful framework for managing accounts and systems in LDAP databases web2ldap, a web application under license Apache License 2.0 developed in Python for managing LDAP directories. OpenDJ - a Java-based LDAP server and directory client that runs in any operating environment, under license CDDL LDAP Explorer - a VS Code extension to browse LDAP servers Linux/UNIX Evolution - the contacts part of GNOME's PIM can query LDAP servers. KAddressBook - the address book application for KDE, capabl
https://en.wikipedia.org/wiki/Foundation%20Fieldbus%20H1
Foundation Fieldbus H1 is one of the FOUNDATION fieldbus protocol versions. Foundation H1 (31.25 kbit/s) is a bi-directional communications protocol used for communications among field devices and to the control system. It utilizes either twisted pair, or fiber media to communicate between multiple nodes (devices) and the controller. The controller requires only one communication point to communicate with up to 32 nodes, this is a significant improvement over the standard 420 mA communication method which requires a separate connection point for each communication device on the controller system. The Foundation Fieldbus H1 has support for Intrinsically Safe Wiring. Unlike other protocols, FOUNDATION H1 provides explicit synchronization of control and communication for precisely periodic (isochronous) communication and execution of control functions with minimized dead time and jitter. It synchronizes clocks in fieldbus devices for support of Function Block scheduling and alarm time-stamping at the point of detection. The original concept was to connect as many fields devices as possible on controller field connection, limited only by signal strength. Foundation HSE Foundation HSE is a control network technology specifically designed for process automation to connect higher-level devices such as controllers and remote-I/O, high-density data generators etc., and for horizontal integration of subsystems. Foundation HSE is based on unmodified IEEE 802.3 Ethernet and, therefore, is compatible with standard Ethernet equipment. FOUNDATION HSE provides complete "DCS style" redundancy with redundant network switches, redundant devices, and redundant communication ports ensuring unsurpassed availability. Foundation HSE is also based on standard IP, enabling it to coexist with other devices and ensuring compatibility with standard tools. At the highest level, Foundation HSE includes a standard application layer that provides interoperability between devices beyond the mere
https://en.wikipedia.org/wiki/Cryptology%20Research%20Society%20of%20India
Cryptology Research Society of India (CRSI) is a scientific organisation that supports research in India on cryptography, data security, and related fields. The organisation was founded in 2001. CRSI organises workshops and conferences about cryptology. Activities CRSI organises several annual workshops and conferences about cryptology. More specifically, CRSI organises the annual events INDOCRYPT, an international conference on cryptography, and the Indian national workshop on cryptology. It also arranged the International Association for Cryptologic Research's (IACR) workshop on Fast Software Encryption in 2003 at New Delhi and IACR's conference Asiacrypt in 2013 and in 2005 at Chennai. Organizational structure The main office of CRSI is located in Kolkata. CRSI was founded by the current general secretary Prof. Bimal Roy, former Director of the Indian Statistical Institute. Padmashree R. Balasubramaniam, , is the organization's president.
https://en.wikipedia.org/wiki/GLUT8
GLUT8 also known as SLC2A8 is the eighth member of glucose transporter superfamily. It is characterized by the presence of two leucine residues in its N-terminal intracellular domain, which influences intracellular trafficking. Discovery GLUT8, originally named GLUTX1, was cloned almost simultaneously by two different groups. Tissue distribution Subcellular localization Contrary to GLUT4, GLUT8 (previously known as GLUTX1) is not insulin-sensitive. In other words, insulin does not promote GLUT8 translocation to the cell surface in neurons as well as in transfected cell lines. Where in the cell GLUT8 is localized in not yet clear. Most GLUT8 is not present at the cell surface. Some co-localization with both the endoplasmic reticulum and late endosomes/lysosomes has been published. When the N-terminal di-leucine motif is mutated into a di-alanine motif, GLUT8 is located mostly at the cell surface in Xenopus oocytes and mammalian cells such as HEK 293 cells and differentiated PC12 cells. Physiological role GLUT8 function in vivo remains to be defined, despite suggestions that it may play a role in fertility, being expressed at high levels in testes and in the acrosomal part of spermatozoa. Furthermore, GLUT8 appears to play an important role in the energy metabolism of sperm cells. GLUT8, when expressed in Xenopus oocytes, mediates glucose uptake with high affinity. Other hexoses are not good substrates of the transporter. Mice devoid of both copies of the SLC2A8 gene are viable, fertile and do not show any obvious phenotype. They are not diabetic, showing that GLUT8 is unlikely to play major roles in glucose homeostasis.
https://en.wikipedia.org/wiki/Active%20contour%20model
Active contour model, also called snakes, is a framework in computer vision introduced by Michael Kass, Andrew Witkin, and Demetri Terzopoulos for delineating an object outline from a possibly noisy 2D image. The snakes model is popular in computer vision, and snakes are widely used in applications like object tracking, shape recognition, segmentation, edge detection and stereo matching. A snake is an energy minimizing, deformable spline influenced by constraint and image forces that pull it towards object contours and internal forces that resist deformation. Snakes may be understood as a special case of the general technique of matching a deformable model to an image by means of energy minimization. In two dimensions, the active shape model represents a discrete version of this approach, taking advantage of the point distribution model to restrict the shape range to an explicit domain learnt from a training set. Snakes do not solve the entire problem of finding contours in images, since the method requires knowledge of the desired contour shape beforehand. Rather, they depend on other mechanisms such as interaction with a user, interaction with some higher level image understanding process, or information from image data adjacent in time or space. Motivation In computer vision, contour models describe the boundaries of shapes in an image. Snakes in particular are designed to solve problems where the approximate shape of the boundary is known. By being a deformable model, snakes can adapt to differences and noise in stereo matching and motion tracking. Additionally, the method can find Illusory contours in the image by ignoring missing boundary information. Compared to classical feature extraction techniques, snakes have multiple advantages: They autonomously and adaptively search for the minimum state. External image forces act upon the snake in an intuitive manner. Incorporating Gaussian smoothing in the image energy function introduces scale sensitivity.
https://en.wikipedia.org/wiki/Relaxation%20%28iterative%20method%29
In numerical mathematics, relaxation methods are iterative methods for solving systems of equations, including nonlinear systems. Relaxation methods were developed for solving large sparse linear systems, which arose as finite-difference discretizations of differential equations. They are also used for the solution of linear equations for linear least-squares problems and also for systems of linear inequalities, such as those arising in linear programming. They have also been developed for solving nonlinear systems of equations. Relaxation methods are important especially in the solution of linear systems used to model elliptic partial differential equations, such as Laplace's equation and its generalization, Poisson's equation. These equations describe boundary-value problems, in which the solution-function's values are specified on boundary of a domain; the problem is to compute a solution also on its interior. Relaxation methods are used to solve the linear equations resulting from a discretization of the differential equation, for example by finite differences. Iterative relaxation of solutions is commonly dubbed smoothing because with certain equations, such as Laplace's equation, it resembles repeated application of a local smoothing filter to the solution vector. These are not to be confused with relaxation methods in mathematical optimization, which approximate a difficult problem by a simpler problem whose "relaxed" solution provides information about the solution of the original problem. Model problem of potential theory When φ is a smooth real-valued function on the real numbers, its second derivative can be approximated by: Using this in both dimensions for a function φ of two arguments at the point (x, y), and solving for φ(x, y), results in: To approximate the solution of the Poisson equation: numerically on a two-dimensional grid with grid spacing h, the relaxation method assigns the given values of function φ to the grid points near the bou
https://en.wikipedia.org/wiki/KAOS%20%28software%20development%29
KAOS, is a goal-oriented software requirements capturing approach in requirements engineering. It is a specific Goal modeling method; another is i*. It allows for requirements to be calculated from goal diagrams. KAOS stands for Knowledge Acquisition in automated specification or Keep All Objectives Satisfied. The University of Oregon and the University of Louvain (Belgium) designed the KAOS methodology in 1990 by Axel van Lamsweerde and others. It is taught worldwide at the university level for capturing software requirements. There is lack of evidence that KAOS is used in the industry and as of February 2023, the only tool supporting it is Objectiver, written by the same group behind the KAOS methodology, with the latest release 3.0c47 dated at March 9th, 2012. External links A KAOS Tutorial Goal-Oriented Requirements Engineering: An Overview of the Current Research Evaluating the Effectiveness of a Goal-Oriented Requirements Engineering Method
https://en.wikipedia.org/wiki/Counternull
In statistics, and especially in the statistical analysis of psychological data, the counternull is a statistic used to aid the understanding and presentation of research results. It revolves around the effect size, which is the mean magnitude of some effect divided by the standard deviation. The counternull value is the effect size that is just as well supported by the data as the null hypothesis. In particular, when results are drawn from a distribution that is symmetrical about its mean, the counternull value is exactly twice the observed effect size. The null hypothesis is a hypothesis set up to be tested against an alternative. Thus the counternull is an alternative hypothesis that, when used to replace the null hypothesis, generates the same p-value as had the original null hypothesis of “no difference.” Some researchers contend that reporting the counternull, in addition to the p-value, serves to counter two common errors of judgment: assuming that failure to reject the null hypothesis at the chosen level of statistical significance means that the observed size of the "effect" is zero; and assuming that rejection of the null hypothesis at a particular p-value means that the measured "effect" is not only statistically significant, but also scientifically important. These arbitrary statistical thresholds create a discontinuity, causing unnecessary confusion and artificial controversy. Other researchers prefer confidence intervals as a means of countering these common errors. See also File drawer problem Publication bias
https://en.wikipedia.org/wiki/Gans%20theory
Gans theory or Mie-Gans theory is the extension of Mie theory for the case of spheroidal particles. It gives the scattering characteristics of both oblate and prolate spheroidal particles much smaller than the excitation wavelength. Since it is a solution of the Maxwell equations it should technically not be called a theory. The theory is named after Richard Gans who first published the solution for gold particles in 1912 in an article entitled "Über die Form ultramikroskopischer Goldteilchen". A subsequent article in 1915 discussed the case of silver particles. In Gans theory, the absorption is only dependent on the aspect ratio of the particles and not on the absolute dimensions. This dependence is introduced through so called polarization- or shape factors related to the three dimensions of the particle. For the case of spheroids, this reduces to only two different factors since the particle is rotational symmetric around one axis. It is currently being applied in the field of nanotechnology to characterize silver and gold nanorods. A popular alternative for this is the Discrete dipole approximation (DDA) method. Gans theory gives the exact solution for spheroidal particles; real nanorods, however, have a more cylindrical shape. Using DDA, it is possible to better model the exact shape of the particles. As the name suggests, this will only give an approximation. See also Discrete dipole approximation Mie theory Rayleigh–Gans approximation
https://en.wikipedia.org/wiki/Midhinge
In statistics, the midhinge is the average of the first and third quartiles and is thus a measure of location. Equivalently, it is the 25% trimmed mid-range or 25% midsummary; it is an L-estimator. The midhinge is related to the interquartile range (IQR), the difference of the third and first quartiles (i.e. ), which is a measure of statistical dispersion. The two are complementary in sense that if one knows the midhinge and the IQR, one can find the first and third quartiles. The use of the term "hinge" for the lower or upper quartiles derives from John Tukey's work on exploratory data analysis in the late 1970s, and "midhinge" is a fairly modern term dating from around that time. The midhinge is slightly simpler to calculate than the trimean (), which originated in the same context and equals the average of the median () and the midhinge. See also Interquartile mean L-estimator
https://en.wikipedia.org/wiki/Quantum%20dimer%20models
Quantum dimer models were introduced to model the physics of resonating valence bond (RVB) states in lattice spin systems. The only degrees of freedom retained from the motivating spin systems are the valence bonds, represented as dimers which live on the lattice bonds. In typical dimer models, the dimers do not overlap ("hardcore constraint"). Typical phases of quantum dimer models tend to be valence bond crystals. However, on non-bipartite lattices, RVB liquid phases possessing topological order and fractionalized spinons also appear. The discovery of topological order in quantum dimer models (more than a decade after the models were introduced) has led to new interest in these models. Classical dimer models have been studied previously in statistical physics, in particular by P. W. Kasteleyn (1961) and M. E. Fisher (1961).
https://en.wikipedia.org/wiki/CAPICOM
CAPICOM is a discontinued ActiveX control created by Microsoft to help expose a select set of Microsoft Cryptographic Application Programming Interface (CryptoAPI) functions through Microsoft Component Object Model (COM). It was intended to enable every environment that supports ActiveX to use Microsoft Cryptographic technologies, including web pages that are opened with Microsoft Internet Explorer or any other web browser that supports ActiveX. CAPICOM can be used to digitally sign data, inspect, verify and display their digital signature or digital certificate, add or remove certificates to or from the certificate stores, and finally, to encrypt or decrypt data. CAPICOM Version 2.1.0.3, the latest and last version of CAPICOM, is officially supported on Windows Vista. However, Microsoft has announced that CAPICOM is discontinued and is no longer being developed. Microsoft suggests replacing CAPICOM with .NET Framework's X509 Cryptographic Classes and a number of other alternatives. CAPICOM was not included in Windows 7. The linked Microsoft article goes into detail.
https://en.wikipedia.org/wiki/180%20%28video%20game%29
180 is a darts video game released for the ZX Spectrum, Commodore 64, Amstrad CPC, Atari 8-bit family in 1986 and MSX in 1987. Gameplay The player competes in 501 darts against other darts players waiting in a championship tournament with normal darts rules applying, subtracting your score from 501 to zero whilst finishing on a double. Beginning at the quarter-finals, the player must win a best of three match to advance through the tournament. Win another match in the semi-final stage to advance to the final and face the World Champion Jammy Jim. In the final match however, the player needs to win just one leg against him to win the tournament. Players can also compete against another human player or play Round the Clock, throwing darts around the dartboard from 20 to 1 within a time limit. Opponents There are a total of eight computer-controlled opponents in the game. Before the start of the match, the computer randomly selects an opponent, though Jammy Jim can only be played in the final. The opponents are Del Boy Desmond Sure Shot Sidney, Devious Dave, Limp Wrist Larry, Beer Belly Bill, Mega Mick, Tactical Tel, and Jammy Jim. Reception At the time of its release, ratings for the game were favourable. The Spectrum version got a 72% rating from Crash magazine who labelled it as "the best darts game ever". The Commodore 64 version received a 70% rating from ZZAP! magazine. The Amstrad version got a rating of 67% from Amstrad Action. The game was reviewed in Sinclair User, which rated the game 5 out of 5, stating "Darts ought to be boring and tedious, but with 180 it has been made funny, exciting and very impressive, a closet hit." The game was reviewed in Your Sinclair, which rated the game 9 out of 10, stating "In its presentation, 180 does veer toward the macho, crafty cockney Bristow school of darts rather than that of Gentleman John Lowe, but otherwise there's little to quibble about - a winner across the board!" The game was reviewed in ACE, stating "T
https://en.wikipedia.org/wiki/JBoss%20Seam
Seam was a web application framework developed by JBoss, a division of Red Hat. Seam 3 Seam 3 provides a modular set of extensions to the CDI programming model. Seam's mission is to provide a fully integrated development platform for building rich, standards-based Internet applications tailored for traditional and cloud deployments. Seam 3 is intended to be a more scalable, feature rich set of extensions than Seam 2, which is under maintenance development only. Seam sources on GitHub have not been updated since September 2012. Active development of Seam 3 has been halted by Red Hat. Seam 2 Seam 2 combines the two frameworks Enterprise JavaBeans (EJB3) and JavaServer Faces (JSF). However, simple POJOs can be used at the back end. One can turn any EJB3 object or any simple POJO object into a seam component by just using annotations. Once a component becomes a seam component, it can be accessed through JSF or through other business-logic components in a unified manner. Thus, one can access any back-end EJB component from the front-end by addressing it by its Seam component name. This Java web framework incorporates identity management features. Seam 2 introduces the concept of bijection, taken from Spring's dependency injection feature, where objects can be in-jected or out-jected to/from assigned variables using the @In and @Out annotations. The framework also expands the concept of contexts. Each seam component exists within a context. The default Seam context, a conversation, can span multiple pages and usually spans the whole business flow, from start to finish. The session context captures all actions of a user until he/she logs out or closes the browser - even across multiple uses of the browser back-button. One can automatically generate a CRUD (create-read-update-delete) web-application from an existing database using the command-line tool seam-gen supplied with the framework. Seam facilitates WYSIWYG development through the use of JBoss Tools, a set o
https://en.wikipedia.org/wiki/Bondareva%E2%80%93Shapley%20theorem
The Bondareva–Shapley theorem, in game theory, describes a necessary and sufficient condition for the non-emptiness of the core of a cooperative game in characteristic function form. Specifically, the game's core is non-empty if and only if the game is balanced. The Bondareva–Shapley theorem implies that market games and convex games have non-empty cores. The theorem was formulated independently by Olga Bondareva and Lloyd Shapley in the 1960s. Theorem Let the pair be a cooperative game in characteristic function form, where is the set of players and where the value function is defined on 's power set (the set of all subsets of ). The core of is non-empty if and only if for every function where the following condition holds:
https://en.wikipedia.org/wiki/Speech%20production
Speech production is the process by which thoughts are translated into speech. This includes the selection of words, the organization of relevant grammatical forms, and then the articulation of the resulting sounds by the motor system using the vocal apparatus. Speech production can be spontaneous such as when a person creates the words of a conversation, reactive such as when they name a picture or read aloud a written word, or imitative, such as in speech repetition. Speech production is not the same as language production since language can also be produced manually by signs. In ordinary fluent conversation people pronounce roughly four syllables, ten or twelve phonemes and two to three words out of their vocabulary (that can contain 10 to 100 thousand words) each second. Errors in speech production are relatively rare occurring at a rate of about once in every 900 words in spontaneous speech. Words that are commonly spoken or learned early in life or easily imagined are quicker to say than ones that are rarely said, learnt later in life, or are abstract. Normally speech is created with pulmonary pressure provided by the lungs that generates sound by phonation through the glottis in the larynx that then is modified by the vocal tract into different vowels and consonants. However speech production can occur without the use of the lungs and glottis in alaryngeal speech by using the upper parts of the vocal tract. An example of such alaryngeal speech is Donald Duck talk. The vocal production of speech may be associated with the production of hand gestures that act to enhance the comprehensibility of what is being said. The development of speech production throughout an individual's life starts from an infant's first babble and is transformed into fully developed speech by the age of five. The first stage of speech doesn't occur until around age one (holophrastic phase). Between the ages of one and a half and two and a half the infant can produce short sentences
https://en.wikipedia.org/wiki/High%20production%20volume%20chemicals
High production volume chemicals (HPV chemicals) are produced or imported into the United States in quantities of 1 million pounds or 500 tons per year. In OECD countries, HPV chemicals are defined as being produced at levels greater than 1,000 metric tons per producer/importer per year in at least one member country/region. A list of HPV chemicals serves as an overall priority list, from which chemicals are selected to gather data for a screening information dataset (SIDS), for testing and for initial hazard assessment. History OECD countries including EU In 1987, member countries of the Organisation for Economic Co-operation and Development decided to investigate existing chemicals. In 1991, they agreed to begin by focusing on High production volume (HPV) chemicals, where production volume was used as a surrogate for data on occupational, consumer, and environmental exposure. Each country agreed to "sponsor" the assessment of a proportion of the HPV chemicals. Countries also agreed on a minimum set of required information, the screening information dataset (SIDS). Six tests are: acute toxicity, chronic toxicity, developmental toxicity/reproductive toxicity, mutagenicity, ecotoxicity and environmental fate. Using SIDS and detailed exposure data OECD's High Production Volume Chemicals Programme conducted initial risk assessments to screen and to identify any need for further work. During the late 1990s, OECD member countries began to assess chemical categories and to use quantitative structure–activity relationship (QSAR) results to create OECD guidance documents, as well as a computerized QSAR toolbox. In 1998, the global chemical industry, organized in the International Council of Chemical Associations (ICCA) initiative, offered to join OECD efforts. The ICCA promised to sponsor by 2013 about 1,000 substances from the OECD's HPV chemicals list "to establish as priorities for investigation", based on "presumed wide dispersive use, production in two or more glo
https://en.wikipedia.org/wiki/Allen%20Coombs
Allen William Mark (Doc) Coombs (23 October 1911 – 30 January 1995) was a British electronics engineer at the Post Office Research Station, Dollis Hill. Coombs was one of the principal designers of the Mark II or production version of the Colossus computer used at Bletchley Park for codebreaking in World War II, and took over leadership of the project when Tommy Flowers moved on to other projects. Professor Brian Randell was researching the history of computer science in Britain for a conference on the history of computing held at the Los Alamos National Laboratory, New Mexico on 10-15 June 1976, and got permission to present a paper on wartime development of the COLOSSI at the Post Office Research Station, Dollis Hill (in October 1975 the British Government released a series of captioned photographs from the Public Record Office). The interest in the “revelations” in his paper resulted in a special evening meeting when Randell and Cooombs answered further questions. Coombs later wrote that no member of our team could ever forget the fellowship, the sense of purpose and, above all, the breathless excitement of those days. In 1977 Randell published an article The First Electronic Computer in several journals. Later at Dollis Hill Coombs worked on the MOSAIC machine. Coombs headed the scientific side of R14, the division working on optical character recognition for postal mechanisation, which moved to the new BT Research Centre at Martlesham in Suffolk. His work on pattern recognition led to the development of an early postcode-reading machine. He frequently lectured on pattern recognition using the concept of multi-dimensional space, and the 'caltrop', and would demonstrate the presence of feature-detection in the human visual system by means of a flash gun, the persistence of vision in the audience leading them to observe disintegration of a character fragment by fragment. 'Doc' Coombs was notable for a facial 'tic', which gave him something of the appeara
https://en.wikipedia.org/wiki/International%20Congress%20of%20Genetics
The International Congress of Genetics (ICG) is a five yearly conference for geneticists. The first ICG was held in 1898. Since 1973 It has been organized by the International Genetics Federation (IGF). The aim of the congress is to reflect on progress made in genetics, to celebrate the best of contemporary research and to anticipate future developments in the discipline. It is one of the most important genetics meetings, presenting all subfields of the discipline. These subfields cover all present-day experiments using the powerful genomic technologies. Also, the benefits and wider implications of genetic research to societies at large are explored. The Congress has been held in many major cities around the world, such as London, New York City, Paris, Ithaca, Edinburgh, Stockholm, Bellagio, Montreal, The Hague, Tokyo, Berkeley, Moscow, New Delhi, Toronto, Birmingham, Beijing, Melbourne, Berlin and Singapore. The last International Congress of Genetics took place in Singapore in 2013. In 2018, the 22nd International Congress of Genetics will be held in Foz de Iguaçu, Brazil. The International Genetics Federation (IGF) is an association of national genetics societies interested in promoting the advancement of the science of genetics. The IGF is governed by a representative council that meets every five years at the International Congress of Genetics (ICG) to choose the venue of the next Congress, to elect IGF officers and members of the Executive Board, and to set dues, make or affirm policy decisions, and amend the IGF Constitution as needed. Meeting history 2023 - Melbourne, Australia (XXIII) 2018 - Foz do Iguaçu, Brazil (XXII) 2013 - Singapore (XXI) 2008 - Berlin, Germany (XX) 2003 - Melbourne, Australia (XIX) 1998 - Beijing, China (XVIII) 1993 - Birmingham, UK (XVII) 1988 - Toronto, Canada (XVI) 1983 - New Delhi, India (XV) 1978 - Moscow, USSR (XIV) 1973 - Berkeley, USA(XIII) 1968 - Tokyo, Japan (XII) 1963 - The Hague, The Netherlands (XI) 1958
https://en.wikipedia.org/wiki/Y%20service
The "Y" service was a network of British signals intelligence collection sites, the Y-stations. The service was established during the First World War and used again during the Second World War. The sites were operated by a range of agencies including the Army, Navy and RAF plus the Foreign Office (MI6 and MI5), General Post Office and Marconi Company receiving stations ashore and afloat. There were more than 600 receiving sets in use at Y-stations during the Second World War. Background The "Y" stations tended to be one of two types, for intercepting the signals and for identifying where they were coming from. Sometimes both functions were operated at the same site, with the direction finding (D/F) hut being a few hundred metres from the main interception building, because of the need to minimise interference. The sites collected radio traffic which was then either analysed locally or if encrypted, passed for processing initially to the Admiralty Room 40 in London and during World War II to the Government Code and Cypher School at Bletchley Park in Buckinghamshire. In the Second World War a large house called "Arkley View" on the outskirts of Barnet (now part of the London Borough of Barnet) acted as a data collection centre, where traffic was collated and passed to Bletchley Park and it also acted as a Y station. Many amateur radio (ham) operators supported the work of the Y stations, being enrolled as "Voluntary Interceptors". Much of the traffic intercepted by the Y stations was recorded by hand and sent to Bletchley by motorcycle couriers, and later by teleprinter over post office land lines. The name derived from Wireless Interception (WI). The term was also used for similar stations attached to the India outpost of the Intelligence Corps, the Wireless Experimental Centre (WEC) outside Delhi. Direction-finding Y stations Specially constructed Y stations undertook High-frequency direction finding of wireless transmissions. This became particularly important
https://en.wikipedia.org/wiki/Histidine-tryptophan-ketoglutarate
Histidine-tryptophan-ketoglutarate, or Custodiol HTK solution, is a high-flow, low-potassium preservation solution used for organ transplantation. The solution was initially developed by Hans-Jürgen Bretschneider. HTK solution is intended for perfusion and flushing of donor liver, kidney, heart, lung and pancreas prior to removal from the donor and for preserving these organs during hypothermic storage and transport to the recipient. HTK solution is based on the principle of inactivating organ function by withdrawal of extracellular sodium and calcium, together with intensive buffering of the extracellular space by means of histidine/histidine hydrochloride, so as to prolong the period during which the organs will tolerate interruption of oxygenated blood. The composition of HTK is similar to that of intracellular fluid. All of the components of HTK occur naturally in the body. The osmolarity of HTK is 310 mOsm/L. Composition Sodium: 15 mmol/L Potassium: 9 mmol/L Magnesium: 4 mmol/L Calcium: 0.015 mmol/L Ketoglutarate/glutamic acid: 1 mmol/L Histidine: 198 mmol/L Mannitol: 30 mmol/L Tryptophan: 2 mmol/L Clinical Application HTK (branded as Custodiol® by Essential Pharmaceuticals LLC), has been presented by industry to surgeons as an alternative solution that exceeds other cardioplegias in myocardial protection during cardiac surgery. This claim relies on the single-dose administration of HTK compared with other multidose cardioplegias (MDC), sparing time in the adjustment of equipment during cardioplegia re-administration, allowing greater time to operate and thus a decreased CPB duration. Other benefits include a lower concentration of sodium, calcium, and potassium compared with other cardioplegias with cardiac arrest arising from the deprivation of sodium. Finally, histidine is thought to aid buffering, mannitol and tryptophan to improve membrane stability, and ketoglutarate to help ATP production during reperfusion. A 2021 meta-analysis demonstrated
https://en.wikipedia.org/wiki/Consolidated%20Tape%20Association
The Consolidated Tape Association (CTA) oversees the Securities Information Processor that disseminates real-time trade and quote information (market data) in New York Stock Exchange (NYSE) and American Stock Exchange (AMEX) listed securities (stocks and bonds). It is currently chaired by Emily Kasparov of the Chicago Stock Exchange, the first woman and the youngest chair elected to the position. CTA manages two Plans to govern the collection, processing and dissemination of trade and quote data: the Consolidated Tape Plan, which governs trades, and the Consolidated Quotation Plan, which governs quotes. The Plans were filed with and approved by the Securities and Exchange Commission (SEC) in accordance with Section 11A of the Securities Exchange Act of 1934. Since the late 1970s, all SEC-registered exchanges and market centers that trade NYSE or AMEX-listed securities send their trades and quotes to a central consolidator where the Consolidated Tape System (CTS) and Consolidated Quotation System (CQS) data streams are produced and distributed worldwide. The CTA is the operating authority for CQS and CTS. Participant exchanges The current Participants include: Cboe BZX Exchange (BZX) Cboe BYX Exchange (BYX) Cboe EDGX Exchange (EDGX) Cboe EDGA Exchange (EDGA) Financial Industry Regulatory Authority (FINRA) Nasdaq ISE (ISE) Nasdaq OMX BX (BSE) Nasdaq OMX PHLX (PHLX) Nasdaq Stock Market (NASDAQ) New York Stock Exchange (NYSE) NYSE Arca (ARCA) NYSE American (AMEX) NYSE Chicago (CHX) NYSE National (NSX) Acquisition and distribution of market data The New York Stock Exchange is the Administrator of Network A, which includes NYSE-listed securities, and the American Stock Exchange is the Administrator of Network B, which includes AMEX-listed securities. CTS and CQS receive trade and quote information, respectively from NYSE, AMEX, and the other regional market centers using a standard message format. Each system validates its respective message format, ve
https://en.wikipedia.org/wiki/Zonkey%20%28Tijuana%29
Zonkeys in Tijuana, Mexico are donkeys (also known as burros in Mexico and the Southwestern United States; burro is the Spanish word for a small donkey) painted with fake zebra stripes, so that tourists will pay the owner to appear in souvenir photos with them. They should not be confused with zebroids, zebra hybrids which are also sometimes called zonkeys. History In 1978, journalist Laurie Becklund reported in the Los Angeles Times that, according to the burro cart owners of that time, the practice began in the mid-1930s after gambling was prohibited in Mexico and Tijuana's Agua Caliente Casino was closed. The casino had had two plain burro carts at its entrance and tourists often took photographs with them. Entrepreneurs created and brought similar carts to the shopping areas on and around Avenida Revolución and charged tourists to take pictures seated in them. The entrepreneurs added elements that they thought that tourists would consider to be typically Mexican to the carts, such as painting of scenery and cacti, and serapes. Approximately in the late 1940s, one of the over 20 cart owners – which owner exactly is disputed – added stripes to his burro in order to create more impressive photographs, which were sepia or black-and-white during that era, and thus white or naturally colored donkeys did not show up well. A 2013 report by National Public Radio stated that the number of zonkeys in Downtown Tijuana had shrunk to three, due to the decline in American visitors after 9/11 and hours-long waits to return to the U.S. from Tijuana. At that time Tijuana preservation Uni2 had begun efforts to help ensure that the zonkey tradition continued on Tijuana's streets. Zonkeys in Tijuana culture Zonkeys have become an iconic symbol or image representing Tijuana, in particular its origins as a place providing entertainment, sometimes unusual, to American visitors. The Council of Baja California Cultural Heritage had declared zonkey to be part of the state's cultural
https://en.wikipedia.org/wiki/Seslis%C3%B6zl%C3%BCk
Sesli Sozluk is a multilingual online dictionary, primarily English to Turkish and Turkish to English. German, Italian, French, Spanish, Greek, Russian, Danish, Dutch, Polish and Portuguese translations are also provided. The online dictionary also can be used in PDAs, SmartPhones, any phone supporting a web browser. Seslisozluk.com, established in 1999 as one of the first English-Turkish online dictionaries, is a user-supported online dictionary. The name comes from Turkish sesli sözlük, "dictionary with sound", because the site enables users to listen to the pronunciation of the words. A contribution system lets users add new translations. With the user contribution feature, the dictionary has been steadily growing since it was started, and has now reached more than 2 million entries. Its users appreciate the easy user interface, fast response and multilanguage capability. The website also has a user forum. Seslisozluk.com has released its new version, version 5 in December 2008. With this version of the dictionary, word rating feature lets users vote for the best word for given search. For example, a 5 star word is listed in the first place. With new search bar features, users can see search related images, can listen pronunciations automatically, can see results in compact view and can use a multi language virtual keyboard. In 2007, Seslisozluk.com has been awarded with the top service award in information category by Informatics Associations of Turkey in Best Web Awards contest. In 2008, Seslisozluk.com reached the finals at Altın Örümcek Best Web Awards Contest. In January 2010, Seslisozluk announced its free iPhone application.
https://en.wikipedia.org/wiki/Community%20Collaborative%20Rain%2C%20Hail%20and%20Snow%20Network
The Community Collaborative Rain, Hail and Snow Network, or CoCoRaHS, is a network of volunteer weather observers in the United States, Canada, and the Bahamas that take daily readings of precipitation and report them to a central data store over the internet. The program is an example of citizen science. History The network was started in 1997 in Larimer County, Colorado, after a flash flood in Spring Creek killed five people and damaged structures in the city of Fort Collins, Colorado, including hundreds of millions of dollars in damage to the Colorado State University campus. The severity of the flood and its widespread spatial variability surprised meteorologists, and former assistant state climatologist for the state of Colorado, Nolan Doesken, asked for precipitation measurements from private citizens in the area. About 300 responded to his emergency request for data. Said Doesken later, "The results of the data showed that more than 14 in. (36 cm) of rain fell over southwest Fort Collins, the area where the flood waters originated, while less than 2 in. (5 cm) of rain fell only 3–4 mi (5–6 km) east. The enthusiastic interest shown by volunteers and the great value of the data verified the need for such a service, and CoCoRaHS was born." The program was originally confined to Colorado (the first "Co" in "CoCoRaHS" stood for "Colorado" instead of "Community"), but began expanding to other states during the 2000s. Users CoCoRaHS is used by a wide variety of organizations and individuals. The National Weather Service (NWS), other meteorologists, hydrologists, emergency managers, city utilities (water supply, water conservation, storm water), transportation departments, insurance adjusters, the USDA, engineers, mosquito control, ranchers and farmers, outdoor & recreation interests, teachers, students, and neighbors in the community are examples of people who use CoCoRaHS data. Other programs A similar program, the Significant Weather Observing Program (SWOP), w
https://en.wikipedia.org/wiki/Lantana%20camara
Lantana camara (common lantana) is a species of flowering plant within the verbena family (Verbenaceae), native to the American tropics. It is a very adaptable species, which can inhabit a wide variety of ecosystems; once it has been introduced into a habitat it spreads rapidly; between 45ºN and 45ºS and more than in altitude. It has spread from its native range to around 50 countries, where it has become an invasive species. It first spread out of the Americas when it was brought to Europe by Dutch explorers and cultivated widely, soon spreading further into Asia and Oceania where it has established itself as a notorious weed, and in Goa it was introduced by the Portuguese. L. camara can outcompete native species , leading to a reduction in biodiversity. It can also cause problems if it invades agricultural areas as a result of its toxicity to livestock, as well as its ability to form dense thickets which, if left unchecked, can greatly reduce the productivity of farmland by suppressing the pastures (grasses) essential for livestock production and also suppresses crops in cultivated farmlands. Description Lantana camara is a perennial, erect sprawling or scandent, shrub which typically grows to around tall and form dense thickets in a variety of environments. Under the right conditions, it can scramble up into trees and can grow to tall. The leaves are broadly ovate, opposite, and simple and have a strong odour when crushed. L. camara has small tubular-shaped flowers, which each have four petals and are arranged in clusters in terminal areas stems. Flowers come in many different colours, including red, yellow, white, pink and orange, which differ depending on location in inflorescences, age, and maturity. The flower has a tutti frutti smell with a peppery undertone. After pollination occurs, the colour of the flowers changes (typically from yellow to orangish, pinkish, or reddish); this is believed to be a signal to pollinators that the pre-change colour
https://en.wikipedia.org/wiki/ISO%2025178
ISO 25178: Geometrical Product Specifications (GPS) – Surface texture: areal is an International Organization for Standardization collection of international standards relating to the analysis of 3D areal surface texture. Structure of the standard Documents constituting the standard: Part 1: Indication of surface texture Part 2: Terms, definitions and surface texture parameters Part 3: Specification operators Part 6: Classification of methods for measuring surface texture Part 70: Material measures Part 71: Software measurement standards Part 72: XML file format x3p Part 600: Metrological characteristics for areal-topography measuring methods Part 601: Nominal characteristics of contact (stylus) instruments Part 602: Nominal characteristics of non-contact (confocal chromatic probe) instruments Part 603: Nominal characteristics of non-contact (phase-shifting interferometric microscopy) instruments Part 604: Nominal characteristics of non-contact (coherence scanning interferometry) instruments Part 605: Nominal characteristics of non-contact (point autofocus probe) instruments Part 606: Nominal characteristics of non-contact (focus variation) instruments Part 607: Nominal characteristics of non-contact (confocal microscopy) instruments Part 700: Calibration of surface texture measuring instruments [NWIP] Part 701: Calibration and measurement standards for contact (stylus) instruments Other documents might be proposed in the future but the structure is now almost defined. Part 600 will replace the common part found in all other parts. When revised, parts 60x will be reduced to only contain descriptions specific to the instrument technology. New features It is the first international standard taking into account the specification and measurement of 3D surface texture. In particular, the standard defines 3D surface texture parameters and the associated specification operators. It also describes the applicable measurement technologies, calibratio
https://en.wikipedia.org/wiki/Kernel%20debugger
A kernel debugger is a debugger present in some operating system kernels to ease debugging and kernel development by the kernel developers. A kernel debugger might be a stub implementing low-level operations, with a full-blown debugger such as GNU Debugger (gdb), running on another machine, sending commands to the stub over a serial line or a network connection, or it might provide a command line that can be used directly on the machine being debugged. Operating systems and operating system kernels that contain a kernel debugger: The Windows NT family includes a kernel debugger named KD, which can act as a local debugger with limited capabilities (reading and writing kernel memory, and setting breakpoints) and can attach to a remote machine over a serial line, IEEE 1394 connection, USB 2.0 or USB 3.0 connection. The WinDbg GUI debugger can also be used to debug kernels on local and remote machines. BeOS and Haiku include a kernel debugger usable with either an on-screen console or over a serial line. It features various commands to inspect memory, threads, and other kernel structures. DragonFly BSD Linux kernel; No kernel debugger was included in the mainline Linux tree prior to version 2.6.26-rc1 because Linus Torvalds didn't want a kernel debugger in the kernel. KDB (local) KGDB (remote) MDB (local/remote) NetBSD (DDB for local, KGDB for remote) macOS - ddb for local, kdp for remote OpenBSD includes ddb which has a syntax is similar to GNU Debugger.
https://en.wikipedia.org/wiki/Bolza%20surface
In mathematics, the Bolza surface, alternatively, complex algebraic Bolza curve (introduced by ), is a compact Riemann surface of genus with the highest possible order of the conformal automorphism group in this genus, namely of order 48 (the general linear group of matrices over the finite field ). The full automorphism group (including reflections) is the semi-direct product of order 96. An affine model for the Bolza surface can be obtained as the locus of the equation in . The Bolza surface is the smooth completion of the affine curve. Of all genus hyperbolic surfaces, the Bolza surface maximizes the length of the systole . As a hyperelliptic Riemann surface, it arises as the ramified double cover of the Riemann sphere, with ramification locus at the six vertices of a regular octahedron inscribed in the sphere, as can be readily seen from the equation above. The Bolza surface has attracted the attention of physicists, as it provides a relatively simple model for quantum chaos; in this context, it is usually referred to as the Hadamard–Gutzwiller model. The spectral theory of the Laplace–Beltrami operator acting on functions on the Bolza surface is of interest to both mathematicians and physicists, since the surface is conjectured to maximize the first positive eigenvalue of the Laplacian among all compact, closed Riemann surfaces of genus with constant negative curvature. Triangle surface The Bolza surface is a triangle surface – see Schwarz triangle. More specifically, the Fuchsian group defining the Bolza surface is a subgroup of the group generated by reflections in the sides of a hyperbolic triangle with angles . The group of orientation preserving isometries is a subgroup of the index-two subgroup of the group of reflections, which consists of products of an even number of reflections, which has an abstract presentation in terms of generators and relations as well as . The Fuchsian group defining the Bolza surface is also a subgroup of the
https://en.wikipedia.org/wiki/Futurama%3A%20Bender%27s%20Game
Futurama: Bender's Game is a 2008 American direct-to-video adult animated science fantasy comedy film and the third of the four Futurama films that make up the show's fifth season. It was released on DVD and Blu-ray on November 4, 2008. According to the Beast with a Billion Backs DVD commentary, the film, which spoofs Dungeons & Dragons, was in production when Dungeons & Dragons creator, Gary Gygax, died. The film contains a post-credits tribute to Gygax in the form of a title card and a clip of him from the episode "Anthology of Interest I". Elements of J. R. R. Tolkien's The Lord of the Rings and George Lucas' Star Wars are also parodied. The title of the film is a pun on the book Ender's Game, by Orson Scott Card, though the Futurama film has "very little to do with the subject material" of the book. Conversely, the 1985 book also used "Bender" as a mocking pun for "Ender", but Matt Groening stated this is not the original inspiration for Bender's name. Plot Defying Professor Farnsworth, Leela borrows the Planet Express Ship to enter a demolition derby after insults from rednecks anger her. Bender finds Cubert and Dwight playing Dungeons & Dragons, but cannot join in since, as a robot, he has no imagination. Bender manages to imagine himself as a medieval knight named "Titanius Anglesmith, fancy man of Cornwood" and enters the game. He becomes lost in his fantasy and goes on a rampage, resulting in his commitment to the Hal Institute for Criminally Insane Robots. The crew learns that Mom, who controls the world's only dark matter mine, is restricting the supply to drive up profits. The Professor reveals that while working for Mom, he discovered how to turn dark matter into fuel. The process created two crystals, with Mom keeping one for herself and Farnsworth hiding the other, "anti-backwards" crystal. If the crystals are brought together, they will render dark matter useless. Farnsworth, Fry, and Leela fly to Mom's mine with the crystal to neutralize the dark
https://en.wikipedia.org/wiki/Bioadhesive
Bioadhesives are natural polymeric materials that act as adhesives. The term is sometimes used more loosely to describe a glue formed synthetically from biological monomers such as sugars, or to mean a synthetic material designed to adhere to biological tissue. Bioadhesives may consist of a variety of substances, but proteins and carbohydrates feature prominently. Proteins such as gelatin and carbohydrates such as starch have been used as general-purpose glues by man for many years, but typically their performance shortcomings have seen them replaced by synthetic alternatives. Highly effective adhesives found in the natural world are currently under investigation. For example, bioadhesives secreted by microbes and by marine molluscs and crustaceans are being researched with a view to biomimicry. Furthermore, thiolation of proteins and carbohydrates enables these polymers (thiomers) to covalently adhere especially to cysteine-rich subdomains of proteins such as keratins or mucus glycoproteins via disulfide bond formation. Thiolated chitosan and thiolated hyaluronic acid are used as bioadhesives in various medicinal products. Bioadhesives in nature Organisms may secrete bioadhesives for use in attachment, construction and obstruction, as well as in predation and defense. Examples include their use for: Colonization of surfaces (e.g. bacteria, algae, fungi, mussels, barnacles, rotifers) Mussel's byssal threads Tube building by polychaete worms, which live in underwater mounds Insect egg, larval or pupal attachment to surfaces (vegetation, rocks), and insect mating plugs Host attachment by blood-feeding ticks Nest-building by some insects, and also by some fish (e.g. the three-spined stickleback) Defense by Notaden frogs and by sea cucumbers Prey capture in spider webs and by velvet worms Some bioadhesives are very strong. For example, adult barnacles achieve pull-off forces as high as 2 MPa (2 N/mm2). A similarly strong, rapidly adhering glue - which contai
https://en.wikipedia.org/wiki/AsciiMath
AsciiMath is a client-side mathematical markup language for displaying mathematical expressions in web browsers. Using the JavaScript script ASCIIMathML.js, AsciiMath notation is converted to MathML at the time the page is loaded by the browser, natively in Mozilla Firefox, Safari, and via a plug-in in IE7. The simplified markup language supports a subset of the LaTeX language instructions, as well as a less verbose syntax (which, for example, replaces "\times" with "xx" or "times" to produce the "×" symbol). The resulting MathML mathematics can be styled by applying CSS to class "mstyle". The script ASCIIMathML.js is freely available under the MIT License. The latest version also includes support for SVG graphics, natively in Mozilla Firefox and via a plug-in in IE7. Per May 2009 there is a new version available. This new version still contains the original ASCIIMathML and LaTeXMathML as developed by Peter Jipsen, but the ASCIIsvg part has been extended with linear-logarithmic, logarithmic-linear, logarithmic-logarithmic, polar graphs and pie charts, normal and stacked bar charts, different functions like integration and differentiation and a series of event trapping functions, buttons and sliders, in order to create interactive lecture material and exams online in web pages. ASCIIMathML.js has been integrated into MathJax, starting with MathJax v2.0. Example The well-known quadratic formula looks like this in AsciiMath: x=(-b +- sqrt(b^2 – 4ac))/(2a)
https://en.wikipedia.org/wiki/Dissipative%20particle%20dynamics
Dissipative particle dynamics (DPD) is an off-lattice mesoscopic simulation technique which involves a set of particles moving in continuous space and discrete time. Particles represent whole molecules or fluid regions, rather than single atoms, and atomistic details are not considered relevant to the processes addressed. The particles' internal degrees of freedom are integrated out and replaced by simplified pairwise dissipative and random forces, so as to conserve momentum locally and ensure correct hydrodynamic behaviour. The main advantage of this method is that it gives access to longer time and length scales than are possible using conventional MD simulations. Simulations of polymeric fluids in volumes up to 100 nm in linear dimension for tens of microseconds are now common. DPD was initially devised by Hoogerbrugge and Koelman to avoid the lattice artifacts of the so-called lattice gas automata and to tackle hydrodynamic time and space scales beyond those available with molecular dynamics (MD). It was subsequently reformulated and slightly modified by P. Español to ensure the proper thermal equilibrium state. A series of new DPD algorithms with reduced computational complexity and better control of transport properties are presented. The algorithms presented in this article choose randomly a pair particle for applying DPD thermostating thus reducing the computational complexity. Equations The total non-bonded force acting on a DPD particle i is given by a sum over all particles j that lie within a fixed cut-off distance, of three pairwise-additive forces: where the first term in the above equation is a conservative force, the second a dissipative force and the third a random force. The conservative force acts to give beads a chemical identity, while the dissipative and random forces together form a thermostat that keeps the mean temperature of the system constant. A key property of all of the non-bonded forces is that they conserve momentum locally, so
https://en.wikipedia.org/wiki/The%20Beck%20Group
The Beck Group is a company that provides architecture, construction, sustainability, virtual building, and technology services. The company is based in Dallas, Texas. It has regional offices in Atlanta, Austin, Charlotte, Denver, Fort Worth, Mexico City, Monterrey, South Florida, and Tampa. The Beck Group serves a diverse range of industries including commercial, corporate, healthcare, entertainment, faith-based, institutional, among others. They also provide services based on the use of their software product, DESTINI. History The Beck Group was founded in 1912 by Henry C. Beck in Houston, Texas as a general contractor as Central Contracting Company. In 1934, it moved its headquarters to Dallas, a requirement for building the city's Cotton Exchange Building. In 1946, Henry C. Beck, then the sole proprietor, changed the name to the Henry C. Beck Company. In 1981 the company changed its name to HCB Contractors. The majority of their work throughout their history has been commercial, but realized they needed to expand beyond that. In the 1990s, the construction company added other services like design and real estate development. It also acquired a UK-developed software product (Reflex). It began to develop a proprietary software, DESTINI, which would provide immediate costs for buildings as they were modeled in the schematic design phase. Management Under Larry Wilson In 1976, Larry Wilson Sr served as President and Chief Executive Officer of The Beck Group, then known as HCB Contractors, Inc. Wilson oversaw projects including the Crescent, Plaza of the Americas, the Reunion Project, Fountain Place and Cityplace. Under Wilson's leadership, The Beck Group also built large office projects in Boston, Philadelphia and Washington, D.C. Management Under Peter Beck In 1992, Henry C. Beck III "Peter", became the company's fourth chief executive officer. In 1999, under the leadership (present executive chairman) Henry C. Beck III, the company merged with Urban Architect
https://en.wikipedia.org/wiki/Mitsubishi%20AWC
All Wheel Control (AWC) is the brand name of a four-wheel drive (4WD) system developed by Mitsubishi Motors. The system was first incorporated in the 2001 Lancer Evolution VII. Subsequent developments have led to S-AWC (Super All Wheel Control), developed specifically for the new 2007 Lancer Evolution. The system is referred by the company as its unique 4-wheel drive technology umbrella, cultivated through its motor sports activities and long history in rally racing spanning almost half a century. AWC itself is the implementation of Mitsubishi's AWC philosophy, and the core of AWC is integrated in the form of Mitsubishi's various proprietary technologies, such as 4WD drivetrains, suspension technologies, braking systems, stability/traction control systems, and various differentials. Although initially developed for high performance Lancer Evolution full-time four-wheel drive models, the system is now incorporated in Mitsubishi's other 4WD vehicles, each having its own distinct configuration. History Dynamic Four, Dynamic ECS, Active TCL In line with this development philosophy, Mitsubishi developed its first high performance four-wheel drive vehicle in 1987, when it equipped the Galant VR-4 with "Dynamic Four", which featured a center differential-type full-time four-wheel drive system (this system incorporated a viscous coupling unit), a four wheel steering system, four-wheel independent suspension, and a four-wheel ABS (the first total integration of these systems in the world that were highly advanced at the time). The 1987 Galant also featured "Dynamic ECS", a semi-active electronically controlled air suspension system (a means of actively controlling a vehicle's cornering attitude and dynamic performance) that Mitsubishi developed. Mitsubishi's active ECS enhanced ride comfort and kept body inclination to a minimum under all driving conditions by controlling the grip between the tires and the road surface. The Galant won the 1987–1988 Japan Car of the Year,
https://en.wikipedia.org/wiki/NOR%20flash%20replacement
While flash memory remains one of the most popular storages in embedded systems because of its non-volatility, shock-resistance, small size, and low energy consumption, its application has grown much beyond its original design. Based on its original design, NOR flash memory is designed to store binary code of programs because it supports XIP (eXecute-In-Place) and high performance in read operations, while NAND flash memory is used as a data storage because of its lower price and higher performance in write/erase operations, compared to NOR flash. In recent years, the price of NAND flash has gone down much faster than that of NOR flash. Thus, to reduce the hardware cost ultimately, using NAND flash to replace NOR flash (motivated by a strong market demand) becomes a new trend in embedded-system designs, especially on mobile phones and arcade games. Overview The replacement depends on well-designed management of flash memory, which is carried out by either software on a host system (as a raw medium) or hardware circuits/firmware inside its devices. Here, an efficient prediction mechanism with limited memory-space requirements and an efficient implementation is proposed. The prediction mechanism collects the access patterns of program execution to construct a prediction graph by adopting the working set concept. According to the prediction graph, the prediction mechanism prefetches data (/code) to the SRAM cache, so as to reduce the cache miss rate. Therefore, the performance of the program execution is improved and the read performance gap between NAND and NOR is filled up effectively. Using NAND Flash for boot code requires the use of DRAM to shadow the code. An effective prefetching strategy Different from the popular caching ideas in the memory hierarchy, this approach aims at an application-oriented caching mechanism, which adopts prediction-assisted prefetching based on given execution traces of applications. The designs of embedded systems are considered w
https://en.wikipedia.org/wiki/Statistical%20energy%20analysis
Statistical energy analysis (SEA) is a method for predicting the transmission of sound and vibration through complex structural acoustic systems. The method is particularly well suited for quick system level response predictions at the early design stage of a product, and for predicting responses at higher frequencies. In SEA a system is represented in terms of a number of coupled subsystems and a set of linear equations are derived that describe the input, storage, transmission and dissipation of energy within each subsystem. The parameters in the SEA equations are typically obtained by making certain statistical assumptions about the local dynamic properties of each subsystem (similar to assumptions made in room acoustics and statistical mechanics). These assumptions significantly simplify the analysis and make it possible to analyze the response of systems that are often too complex to analyze using other methods (such as finite element and boundary element methods). History The initial derivation of SEA arose from independent calculations made in 1959 by Richard Lyon and Preston Smith as part of work concerned with the development of methods for analyzing the response of large complex aerospace structures subjected to spatially distributed random loading. Lyon's calculation showed that under certain conditions, the flow of energy between two coupled oscillators is proportional to the difference in the oscillator energies (suggesting a thermal analogy exists in structural-acoustic systems). Smith's calculation showed that a structural mode and a diffuse reverberant sound field attain a state of 'equipartition of energy' as the damping of the mode is reduced (suggesting a state of thermal equilibrium can exist in structural-acoustic systems). The extension of the two oscillator results to more general systems is often referred to as the modal approach to SEA. While the modal approach provides physical insights into the mechanisms that govern energy flow it
https://en.wikipedia.org/wiki/Chilled%20food
Chilled food is food that is stored at refrigeration temperatures, which are at or below . The key requirements for chilled food products are good quality and microbiological safety at the point of consumption. They have been available in the United Kingdom, United States, and many other industrialized countries since the 1960s. History The first chilled foods in the 1960s were sliced meats and pies. By the next decade (1970s), household refrigerators were stocked with salad dressings and dairy desserts. In the 1980s, TV dinners, quiches, flans, sandwiches, pizzas, ethnic snacks, pastas, and soups were kept chilled. Nondairy desserts, sandwich fillings, dips, sauces, stocks, prepared fruit and vegetables, and leafy salads were commonly chilled in the 1990s. Specialty breads, condiments, sushi, and meal kits were typical by the 2000s. Storage mediums being used are ziploc bags, vacuum sealed bags, pastry boxes, and microwavable plastic containers. Popularity The chilled food sector is one of the fastest growing sectors in the food industry and chilled foods currently represent about 10% of all of the United Kingdom's retail foods by value. One of the largest sectors is the chilled recipe dish sector, which has grown from an estimated £173 million in 1988 to over £1,750 million in 2005. The total UK chilled prepared food market was an estimated £7,187 million in 2004 and £13,126 million in 2018, and continues to evolve, reflecting consumers’ changing needs and lifestyles. In 2004, over 80% of UK households bought a chilled prepared meal with over 40% buying one within any given month.
https://en.wikipedia.org/wiki/POPLINE
POPLINE (or Population Information Online) was a reproductive health database, containing citations with abstracts to scientific articles, reports, books, and unpublished reports in the field of population, family planning, and reproductive health issues. POPLINE was maintained by the K4Health Project at the Johns Hopkins Bloomberg School of Public Health/Center for Communication Programs, and it was funded by the United States Agency for International Development (USAID). History The original database consisted of citations from Popinform, a database maintained from 1973 to 1978 by the Population Information Program (PIP) at George Washington University. In 1978, the database, along with Population Information Program, moved to the Johns Hopkins University. Between 1980 and 2001, renamed POPLINE, the database became part of the United States National Library of Medicine's (NLM) Medical Literature Analysis and Retrieval System (MEDLARS) along with MEDLINE and other NLM databases. Since 2001, POPLINE had been maintained by the Knowledge for Health (K4Health) Project, formerly PIP then INFO, based at the Johns Hopkins Bloomberg School of Public Health/Center for Communication Programs. Access to POPLINE was available free of charge at its website. Other organizations contributed to POPLINE throughout its history, such as the Center for Population and Family Health (CPFH) Library/Information Program at Columbia University, Population Index at Princeton University, and the Carolina Population Center (CPC) at the University of North Carolina. On September 1, 2019, POPLINE was officially retired along with the rest of the Knowledge for Health (K4Health) Project which closed a few days later. Coverage POPLINE provided more than 370,000 records citing worldwide literature in the area of reproductive health. The majority of items were published from 1970 to the present, but there were selected citations dating back to 1827. The database added 12 thousand records annual
https://en.wikipedia.org/wiki/Ageing%20of%20Europe
The ageing of Europe, also known as the greying of Europe, is a demographic phenomenon in Europe characterised by a decrease in fertility, a decrease in mortality rate, and a higher life expectancy among European populations. Low birth rates and higher life expectancy contribute to the transformation of Europe's population pyramid shape. The most significant change is the transition towards a much older population structure, resulting in a decrease in the proportion of the working age while the number of the retired population increases. The total number of the older population is projected to increase greatly within the coming decades, with rising proportions of the post-war baby-boom generations reaching retirement. This will cause a high burden on the working age population as they provide for the increasing number of the older population. Throughout history many states have worked to keep high birth rates in order to have moderate taxes, more economic activity and more troops for their military. Population ageing is observed in most European countries today. Overall trends Giuseppe Carone and Declan Costello of the International Monetary Fund projected in September 2006 that the ratio of retirees to workers in Europe will double to 0.54 by 2050 (from four workers per retiree to two workers per retiree). William H. Frey, an analyst for the Brookings Institution think tank, predicts the median age in Europe will increase from 37.7 years old in 2003 to 52.3 years old by 2050 while the median age of Americans will rise to only 45.4 years old. Máire Geoghegan-Quinn, the former European Commissioner for Research, Innovation and Science, stated in 2014 that by 2020 a quarter of the population of Europe will be 60 years or older. This shift in demographics will drastically change the economic, labor market, health care, and social security of Europe. The Organisation for Economic Co-operation and Development estimates 39% of Europeans between the ages of 55 to 65
https://en.wikipedia.org/wiki/Commander%20Shepard
Commander Shepard is the player character in the Mass Effect video game series by BioWare (Mass Effect, Mass Effect 2, and Mass Effect 3). A veteran soldier of the Systems Alliance Navy, an N7 graduate of the Interplanetary Combatives Training (ICT) military program, and the first human Citadel Council Spectre, Shepard works to stop the Reapers, a sentient machine race dedicated to wiping out all advanced organic life. Shepard is neither a hero, nor a villain; depending upon players' choices and actions, Shepard is the abstaining factor that acts as both on occasion, and will take whatever action is deemed necessary when presented with impossible scenarios. Shepard's gender, class, first name and facial appearance are chosen and customized by the player. The default male Shepard's face and body were modelled after Mark Vanderloo, while Mark Meer provided the voice for the male Shepard. Jennifer Hale voiced the female Shepard. Since the player can choose the gender of Shepard, much of the dialogue revolving around the character is gender-neutral with only a few exceptions. However, in some other Mass Effect media, Shepard is called "he" regardless of player choice for the gender. The character is inspired by and named after American astronaut Alan Shepard. Shepard's armor developed over the series, and was originally intended to be red-and-white. Most promotional material for the series focused on the male Shepard, due to the studio's desire for a single identifiable hero, though both versions of the character were given equal priority during development. Various merchandise has been made, including several figurines. Shepard has made cameo appearances in other Electronic Arts games and is referenced in Mass Effect: Andromeda. Concept and creation BioWare wanted players to feel special and empowered from the start of the game. Unlike other role-playing game protagonists, they felt Shepard should not be an entirely blank character for the player to create, in orde
https://en.wikipedia.org/wiki/Prenyltransferase
Prenyltransferases (PTs) are a class of enzymes that transfer allylic prenyl groups to acceptor molecules. Prenyl transferases commonly refer to isoprenyl diphosphate syntheses (IPPSs). Prenyltransferases are a functional category and include several enzyme groups that are evolutionarily independent. Prenyltransferases are commonly divided into two classes, cis (or Z) and trans (or E), depending upon the stereochemistry of the resulting products. Examples of trans-prenyltranferases include dimethylallyltranstransferase, and geranylgeranyl pyrophosphate synthase. Cis-prenyltransferases include dehydrodolichol diphosphate synthase (involved in the production of a precursor to dolichol). Trans- and cis-prenyltransferases are evolutionarily unrelated to each other and there is no sequential and structural similarity. The beta subunit of the farnesyltransferases is responsible for peptide binding. Squalene-hopene cyclase is a bacterial enzyme that catalyzes the cyclization of squalene into hopene, a key step in hopanoid (triterpenoid) metabolism. Lanosterol synthase () (oxidosqualene-lanosterol cyclase) catalyzes the cyclization of (S)-2,3-epoxysqualene to lanosterol, the initial precursor of cholesterol, steroid hormones and vitamin D in vertebrates and of ergosterol in fungi. Cycloartenol synthase () (2,3-epoxysqualene-cycloartenol cyclase) is a plant enzyme that catalyzes the cyclization of (S)-2,3-epoxysqualene to cycloartenol. Human proteins containing this domain FNTB; LSS; PGGT1B; RABGGTB
https://en.wikipedia.org/wiki/Helmholtz%20pitch%20notation
Helmholtz pitch notation is a system for naming musical notes of the Western chromatic scale. Fully described and normalized by the German scientist Hermann von Helmholtz, it uses a combination of upper and lower case letters (A to G), and the sub- and super-prime symbols ( ͵    or ) to denote each individual note of the scale. It is one of two formal systems for naming notes in a particular octave, the other being scientific pitch notation. History Helmholtz proposed this system in order to accurately define pitches in his classical work on acoustics Die Lehre von den Tonempfindungen als physiologische Grundlage für die Theorie der Musik (1863) translated into English by A.J. Ellis as On the Sensations of Tone (1875). Helmholtz based his notation on the practice of German organ builders for labelling their pipes, itself derived from the old German organ tablature in use from late medieval times until the early 18th century. His system is widely used by musicians across Europe and is the one used in the New Grove Dictionary. Once also widely used by scientists and doctors when discussing the scientific and medical aspects of sound in relation to the auditory system, it has now been replaced in the US in scientific and medical contexts by scientific pitch notation. Use The accenting of the scale in Helmholtz notation always starts on the note C and ends at B (e.g. C D E F G A B). The note C is shown in different octaves by using upper-case letters for low notes, and lower-case letters for high notes, and adding sub-primes and primes in the following sequence: C͵͵ C͵ C c c c c‴ (or ,,C ,C C c c c c‴ or C C C c c c c) and so on. Middle C is designated c, therefore the octave from middle C upwards is c–b. Variations The English multiple-letter notation uses repeated Cs in place of the sub-prime symbol. Therefore C͵ is rendered as CC ; C͵͵ as CCC ; etc. The English strokes notation replaces subscript-primes with underlines a
https://en.wikipedia.org/wiki/Neural%20cryptography
Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network algorithms, for use in encryption and cryptanalysis. Definition Artificial neural networks are well known for their ability to selectively explore the solution space of a given problem. This feature finds a natural niche of application in the field of cryptanalysis. At the same time, neural networks offer a new approach to attack ciphering algorithms based on the principle that any function could be reproduced by a neural network, which is a powerful proven computational tool that can be used to find the inverse-function of any cryptographic algorithm. The ideas of mutual learning, self learning, and stochastic behavior of neural networks and similar algorithms can be used for different aspects of cryptography, like public-key cryptography, solving the key distribution problem using neural network mutual synchronization, hashing or generation of pseudo-random numbers. Another idea is the ability of a neural network to separate space in non-linear pieces using "bias". It gives different probabilities of activating the neural network or not. This is very useful in the case of Cryptanalysis. Two names are used to design the same domain of research: Neuro-Cryptography and Neural Cryptography. The first work that it is known on this topic can be traced back to 1995 in an IT Master Thesis. Applications In 1995, Sebastien Dourlens applied neural networks to cryptanalyze DES by allowing the networks to learn how to invert the S-tables of the DES. The bias in DES studied through Differential Cryptanalysis by Adi Shamir is highlighted. The experiment shows about 50% of the key bits can be found, allowing the complete key to be found in a short time. Hardware application with multi micro-controllers have been proposed due to the easy implementation of multilayer neural networks in hardware. One example of a public-key
https://en.wikipedia.org/wiki/Transcription%20factor%20II%20B
Transcription factor II B (TFIIB) is a general transcription factor that is involved in the formation of the RNA polymerase II preinitiation complex (PIC) and aids in stimulating transcription initiation. TFIIB is localised to the nucleus and provides a platform for PIC formation by binding and stabilising the DNA-TBP (TATA-binding protein) complex and by recruiting RNA polymerase II and other transcription factors. It is encoded by the gene, and is homologous to archaeal transcription factor B and analogous to bacterial sigma factors. Structure TFIIB is a single 33kDa polypeptide consisting of 316 amino acids. TFIIB is made up of four functional regions: the C-terminal core domain; the B linker; the B reader and the amino terminal zinc ribbon. TFIIB makes protein-protein interactions with the TATA-binding protein (TBP) subunit of transcription factor IID, and the RPB1 subunit of RNA polymerase II. TFIIB makes sequence-specific protein-DNA interactions with the B recognition element (BRE), a promoter element flanking the TATA element. Mechanism of action There are six steps in the mechanism of TFIIB action in the formation of the PIC and transcription initiation: RNA polymerase II is recruited to DNA through the TFIIB B core and B ribbon. RNA polymerase II unwinds DNA, aided by the TFIIB B linker and B reader (open complex formation). RNA polymerase II selects a transcription start site, aided by the TFIIB B reader. RNA polymerase II forms the first phosphodiester bond. RNA polymerase II produces short abortive transcripts due to clashes between nascent RNA and the TFIIB B reader loop. Extension of nascent RNA to 12-13 nucleotides leads to ejection of TFIIB due to further clashes with TFIIB. Interactions with RNA polymerase II Each of the functional regions of TFIIB interacts with different parts of RNA polymerase II. The amino terminal B ribbon is located on dock domain of RNA polymerase II and extends in to the cleft towards the active site. Extending the
https://en.wikipedia.org/wiki/Transcription%20factor%20II%20E
Transcription factor II E (TFIIE) is one of several general transcription factors that make up the RNA polymerase II preinitiation complex. It is a tetramer of two alpha and two beta chains and interacts with TAF6/TAFII80, ATF7IP, and varicella-zoster virus IE63 protein. TFIIE recruits TFIIH to the initiation complex and stimulates the RNA polymerase II C-terminal domain kinase and DNA-dependent ATPase activities of TFIIH. Both TFIIH and TFIIE are required for promoter clearance by RNA polymerase. Transcription factor II E is encoded by the GTF2E1 and GTF2E2 genes. TFIIE is thought to be involved in DNA melting at the promoter: it contains a zinc ribbon motif that can bind single stranded DNA. See also TFIIH TFIIB TFIID
https://en.wikipedia.org/wiki/Transcription%20factor%20II%20F
Transcription factor II F (TFIIF) is one of several general transcription factors that make up the RNA polymerase II preinitiation complex. TFIIF is encoded by the , , and genes. TFIIF binds to RNA polymerase II when the enzyme is already unbound to any other transcription factor, thus preventing it from contacting DNA outside the promoter. Furthermore, TFIIF stabilizes the RNA polymerase II while it's contacting TBP and TFIIB. See also TFIIA TFIIB TFIID TFIIE TFIIH
https://en.wikipedia.org/wiki/Remote%20Audio%20Output%20Protocol
Remote Audio Output Protocol (RAOP) is an Internet streaming protocol based on RTSP / RTP authored by Apple Inc. It powers the AirPlay technology built into AirPort Express wireless (802.11b/g/n) access point as well as the Apple TV. The major difference from RTSP is an initial asymmetric key verification made by iTunes to verify it is communicating with an AirPort Express or an Apple TV (as opposed to a simulation), and vice versa. The data channel is also encrypted by AES, with a random key protected by the asymmetric key mentioned above. The RSA public key stored in iTunes was extracted by Jon Lech Johansen, enabling third-party software to stream music to an AirPort Express. The RSA private key stored in the AirPort Express was extracted by James Laird, enabling simulation of an Airport Express. The Shairport-sync application which emulates Airport Express hardware is available.
https://en.wikipedia.org/wiki/Marasmius%20oreades
Marasmius oreades, also known as the fairy ring mushroom, fairy ring champignon or Scotch bonnet, is a mushroom native to North America and Europe. Its common names can cause some confusion, as many other mushrooms grow in fairy rings, such as the edible Agaricus campestris and the poisonous Chlorophyllum molybdites. Distribution and habitat Marasmius oreades grows extensively throughout North America, especially the east where they are also more diverse, and Europe in the summer and autumn (fall) (June–November in the UK), or year-round in warmer climates. It appears in grassy areas such as lawns, meadows, and even dunes in coastal areas. May to October in Pennsylvania or Mid Atlantic (pg 38). Description Marasmius oreades grows gregariously in troops, arcs, or rings (type II, which causes the grass to grow and become greener). The cap is across; bell-shaped with a somewhat inrolled margin at first, becoming broadly convex with an even or uplifted margin, but usually retaining a slight central bump- an "umbo"; dry; smooth; pale tan or buff, occasionally white, or reddish tan; usually changing color markedly as it dries out; the margin sometimes faintly lined. The bare, pallid, and tough stem grows up to about tall and in diameter. The gills are attached to the stem or free from it, fairly thick and spaced apart, and white or pale tan, with a cyanide-like odor and dropping a white spore print. The spores measure 7–10 μm × 4–6 μm; they are smooth, elliptical, and inamyloid. Cystidia absent. Pileipellis without broom cells. Edibility Marasmius oreades is a choice edible mushroom. Its sweet taste lends it to baked goods such as cookies. It is also used in foods such as soups, stews, etc. Traditionally, the stems (which tend to be fibrous and unappetizing) are cut off and the caps are threaded and dried in strings. A possible reason why this mushroom is so sweet-tasting is due to the presence of trehalose, a type of sugar that allows M. oreades to resist
https://en.wikipedia.org/wiki/Glaucous
Glaucous (, ) is used to describe the pale grey or bluish-green appearance of the surfaces of some plants, as well as in the names of birds, such as the glaucous gull (Larus hyperboreus), glaucous-winged gull (Larus glaucescens), glaucous macaw (Anodorhynchus glaucus), and glaucous tanager (Thraupis glaucocolpa). The term glaucous is also used botanically as an adjective to mean "covered with a greyish, bluish, or whitish waxy coating or bloom that is easily rubbed off" (e.g. glaucous leaves). The first recorded use of glaucous as a color name in English was in the year 1671. Examples The epicuticular wax coating on mature plum fruit gives them a glaucous appearance. Another familiar example is found in the common grape genus (Vitis vinifera). Some cacti have a glaucous coating on their stem(s). Glaucous coatings are hydrophobic so as to prevent wetting by rain. Their waxy character serves to hinder climbing of leaves, stem or fruit by insects. On fruits, glaucous coatings may function as a deterrent to climbing and feeding by small insects in favor of increased seed dispersal offered by larger animals such as mammals and birds. The blue-grey camouflage coloring of some species of birds and sea and land animals causes their appearance to blend with their surroundings, making their detection by predators or prey difficult. See also Lists of colors Glaucus (disambiguation)
https://en.wikipedia.org/wiki/Self-limiting%20%28biology%29
In biology and medicine, the term self-limiting may describe a medical condition, or it may describe an organism or colony. Self-limiting organisms and colonies A self-limiting organism or colony of organisms limits its own growth by its actions. For example, a single organism may have a maximum size determined by genetics, or a colony of organisms may release waste which is ultimately toxic to the colony once it exceeds a certain population. In some cases, the self-limiting nature of a colony may be advantageous to the continued survival of the colony, such as in the case of parasites. If their numbers became too high, they would kill the host, and thus themselves. In other cases, self-limitation restricts the viability of predators, thus ensuring the long-term survival of rare species. Self-limiting medical conditions When referring to a medical condition the term may imply that a condition would run its course without the need of external influence, especially any medical treatment. However, the fact that a condition may be self-limiting does not mean that medical treatment would not bring the condition or its symptoms to an end more quickly, or that such medical attention would be unnecessary in severe cases.
https://en.wikipedia.org/wiki/Direct%20linear%20transformation
Direct linear transformation (DLT) is an algorithm which solves a set of variables from a set of similarity relations:   for where and are known vectors, denotes equality up to an unknown scalar multiplication, and is a matrix (or linear transformation) which contains the unknowns to be solved. This type of relation appears frequently in projective geometry. Practical examples include the relation between 3D points in a scene and their projection onto the image plane of a pinhole camera, and homographies. Introduction An ordinary system of linear equations   for can be solved, for example, by rewriting it as a matrix equation where matrices and contain the vectors and in their respective columns. Given that there exists a unique solution, it is given by Solutions can also be described in the case that the equations are over or under determined. What makes the direct linear transformation problem distinct from the above standard case is the fact that the left and right sides of the defining equation can differ by an unknown multiplicative factor which is dependent on k. As a consequence, cannot be computed as in the standard case. Instead, the similarity relations are rewritten as proper linear homogeneous equations which then can be solved by a standard method. The combination of rewriting the similarity equations as homogeneous linear equations and solving them by standard methods is referred to as a direct linear transformation algorithm or DLT algorithm. DLT is attributed to Ivan Sutherland. Example Suppose that . Let and be two known vectors, and we want to find the matrix such that where is the unknown scalar factor related to equation k. To get rid of the unknown scalars and obtain homogeneous equations, define the anti-symmetric matrix and multiply both sides of the equation with from the left Since the following homogeneous equations, which no longer contain the unknown scalars, are at hand In order t
https://en.wikipedia.org/wiki/International%20Mycological%20Institute
The International Mycological Institute was a non-profit organisation, based in England, that undertook research and disseminated information on fungi, particularly plant pathogenic species causing crop diseases. It was established as the Imperial Bureau of Mycology at Kew in 1920 and amalgamated with CAB International in 1998. History The Imperial Bureau of Mycology was established in 1920 as a centre for accumulating and disseminating information on plant pathogenic fungi in the British empire and for undertaking systematic research into such fungi. It was initially based in two houses at Kew, but in 1930 moved into a purpose-built building in the grounds of the Royal Botanic Gardens. In the same year, it became part of the Imperial Agricultural Bureaux and was renamed the Imperial Mycological Institute (IMI). IMI provided an identification service for pathogenic fungi from 1921 onwards and in 1922 started publishing abstracts of research literature in the Review of Applied Mycology. An herbarium of fungal specimens was also established. The journal Index of Fungi, covering all new fungal names, began in 1940 and the Bibliography of Systematic Mycology in 1947. In 1943, the first edition of the standard reference work, the Dictionary of the Fungi was published. A culture collection of living fungi was initiated in 1947. In 1948, IMI changed its name to the Commonwealth Mycological Institute and in 1986 to the International Mycological Institute. In 1993, it was moved from Kew to Egham, Surrey, and in 1998 it merged with the International Institute of Entomology, the International Institute of Biocontrol, and the International Institute of Parasitology to form CAB International. In 2010, the former IMI herbarium was merged with that of the Royal Botanic Gardens, Kew. Directors Sir Edwin John Butler (1920–1935) Sydney Francis Ashby (1935–1939) Samuel Paul Wiltshire (1940–1956) John Collier Frederick Hopkins (1956–1964) Geoffrey Clough Ainsworth (1964–1968) Ant
https://en.wikipedia.org/wiki/Scleromyositis
Scleromyositis, is an autoimmune disease (a disease in which the immune system attacks the body). People with scleromyositis have symptoms of both systemic scleroderma and either polymyositis or dermatomyositis, and is therefore considered an overlap syndrome. Although it is a rare disease, it is one of the more common overlap syndromes seen in scleroderma patients, together with MCTD and Antisynthetase syndrome. Autoantibodies often found in these patients are the anti-PM/Scl (anti-exosome) antibodies. The symptoms that are seen most often are typical symptoms of the individual autoimmune diseases and include Raynaud's phenomenon, arthritis, myositis and scleroderma. Treatment of these patients is therefore strongly dependent on the exact symptoms with which a patient reports to a physician and is similar to treatment for the individual autoimmune disease, often involving either immunosuppressive or immunomodulating drugs. Signs and symptoms Symptoms vary but they mostly involve skin disorders. The signs to look for include Raynaud's phenomenon, arthritis, myositis and scleroderma. Visual symptoms include discoloring of the skin and painful swelling. Cause There is no distinct cause for scleromyositis. Scleroderma can develop in every age group from infants to the elderly, but its onset is most frequent between the ages of 25 and 55. In most cases it is observed that the disease involves an overproduction of collagen. Diagnosis Diagnosis is by skin tests. Typically, after a consultation with a rheumatologist, the disease will be diagnosed. A dermatologist is also another specialist that can diagnose. Blood studies and numerous other specialized tests depending upon which organs are affected. Scleroderma overlap syndrome People with scleroderma overlap syndrome have symptoms of both systemic scleroderma and/or polymyositis and dermatomyositis: Scleroderma: a group of rare diseases that involve the hardening and tightening of the skin and connective tis
https://en.wikipedia.org/wiki/Crithidia%20fasciculata
Crithidia fasciculata is a species of parasitic excavates. C. fasciculata, like other species of Crithidia have a single host life cycle with insect host, in the case of C. fasciculata this is the mosquito. C. fasciculata have low host species specificity and can infect many species of mosquito. Life cycle C. fasciculata is found in two morphologically different life cycle stages - the free swimming choanomastigote form, which has a long external flagellum for motility, and the attached, immotile, amastigote form in the mosquito gut. Amastigotes excreted in the faeces contaminate the mosquito habitat; contamination of flowers during nectar feeding is common. Transmission of C fasciculata primarily occurs when amastigotes, washed into standing water, are ingested by mosquito larvae. The amastigotes are typically found in the rectum of a larva. Each molt of the larva results in loss of infection, but it is generally quickly re-acquired from the environment by ingestion of more amastigotes. When the fourth instar larva pupates the amastigote infection is maintained in the gut through metamorphosis giving rise to an infected adult mosquito. Role in research C. fasciculata is an example of a non-human infective trypanosomatid and is related to several human parasites, including Trypanosoma brucei (which causes African trypanosomiasis) and Leishmania spp. (which cause Leishmaniasis). C. fasciculata parasitizes several species of insects and has been widely used to test new therapeutic strategies against parasitic infections. C. fasciculata is often used as a model organism in research into trypanosomatid biology that may then be applied to understanding the biology of the human infective species. As is typical of the trypanosomatids, but unlike many other protists, C. fasciculata possess one mitochondrion. The mitochondrial DNA is found in a single structure, the kinetoplast, at the base of the single flagellum. As is common with parasitic species C. fasciculata requi
https://en.wikipedia.org/wiki/Overlap%20syndrome
An overlap syndrome is a medical condition which shares features of at least two more widely recognised disorders. Examples of overlap syndromes can be found in many medical specialties such as overlapping connective tissue disorders in rheumatology, and overlapping genetic disorders in cardiology. Rheumatology Examples of overlap syndromes in rheumatology include mixed connective tissue disease and scleromyositis. Diagnosis depends on which diseases the patient shows symptoms and has positive antibodies for in their lab serology. In overlap syndrome, features of the following diseases are found (most common listed): Systemic lupus erythematosus (SLE) Systemic sclerosis Polymyositis Dermatomyositis Rheumatoid arthritis (RA) Sjögren's syndrome Eosinophilic granulomatosis with polyangiitis (EGPA) Autoimmune thyroiditis Antiphospholipid antibody syndrome The treatment of overlapping connective tissue disorders is mainly based on the use of corticosteroids and immunosuppressants. Biologic drugs, i.e. anti-TNFα or anti-CD20 monoclonal antibodies, have been recently introduced as alternative treatments in refractory cases. There are some concerns with the use of anti-TNF agents in patients with systemic autoimmune diseases due to the risk of triggering disease exacerbations. The term polyangiitis overlap syndrome refers to a systemic vasculitis that shares features with two or more distinct vasculitis syndromes. The most common type of polyangiitis overlap syndrome is microscopic polyangiitis (MPA), which shares features with EGPA, granulomatosis with polyangiitis and panarteritis nodosa. Sometimes polyangiitis overlap syndrome is used as a synonym for MPA. Gastroenterology In gastroenterology, the term overlap syndrome may be used to describe autoimmune liver diseases that combine characteristic features of autoimmune hepatitis, primary biliary cirrhosis and primary sclerosing cholangitis. Cardiology In cardiology, genetic conditions such as Brugada sy
https://en.wikipedia.org/wiki/Smart%20city
A smart city is a technologically modern urban area that uses different types of electronic methods and sensors to collect specific data. Information gained from that data is used to manage assets, resources and services efficiently; in return, that data is used to improve operations across the city. This includes data collected from citizens, devices, buildings and assets that is processed and analyzed to monitor and manage traffic and transportation systems, power plants, utilities, urban forestry, water supply networks, waste, criminal investigations, information systems, schools, libraries, hospitals, and other community services. Smart cities are defined as smart both in the ways in which their governments harness technology as well as in how they monitor, analyze, plan, and govern the city. In smart cities, the sharing of data is not limited to the city itself but also includes businesses, citizens and other third parties that can benefit from various uses of that data. Sharing data from different systems and sectors creates opportunities for increased understanding and economic benefits. The smart city concept integrates information and communication technology ('ICT'), and various physical devices connected to the Internet of things ('IoT') network to optimize the efficiency of city operations and services and connect to citizens. Smart city technology allows city officials to interact directly with both community and city infrastructure and to monitor what is happening in the city and how the city is evolving. ICT is used to enhance quality, performance and interactivity of urban services, to reduce costs and resource consumption and to increase contact between citizens and government. Smart city applications are developed to manage urban flows and allow for real-time responses. A smart city may therefore be more prepared to respond to challenges than one with a conventional "transactional" relationship with its citizens. Yet, the term itself remains uncle
https://en.wikipedia.org/wiki/RNase%20PH
RNase PH is a tRNA nucleotidyltransferase, present in archaea and bacteria, that is involved in tRNA processing. Contrary to hydrolytic enzymes, it is a phosphorolytic enzyme, meaning that it uses inorganic phosphate as a reactant to cleave nucleotide-nucleotide bonds, releasing diphosphate nucleotides. The active structure of the proteins is a homohexameric complex, consisting of three ribonuclease (RNase) PH dimers. RNase PH has homologues in many other organisms, which are referred to as RNase PH-like proteins. The part of another larger protein with a domain that is very similar to RNase PH is called an RNase PH domain (RPD). See also Two highly related exoribonuclease complexes: Polynucleotide phosphorylase Exosome complex
https://en.wikipedia.org/wiki/Thermowell
Thermowells are cylindrical fittings used to protect temperature sensors installed to monitor industrial processes. A thermowell consists of a tube closed at one end and mounted on the wall of the piping or vessel within which the fluid of interest flows. A temperature sensor, such as a thermometer, thermocouple, or resistance temperature detector, is inserted in the open end of the tube, which is usually in the open air outside the piping or vessel and any thermal insulation. Thermodynamically, the process fluid transfers heat to the thermowell wall, which in turn transfers heat to the sensor. Since more mass is present with a sensor-well assembly than with a probe directly immersed into the fluid, the sensor's response to changes in temperature is slowed by the addition of the well. If the sensor fails, it can be easily replaced without draining the vessel or piping. Since the mass of the thermowell must be heated to the fluid temperature, and since the walls of the thermowell conduct heat out of the process, sensor accuracy and responsiveness is reduced by the addition of a thermowell. Traditionally, the thermowell length has been based in the degree of insertion relative to pipe wall diameter. This tradition is misplaced as it can expose the thermowell to the risk of flow-induced vibration and fatigue failure. When measurement error calculations are carried out for the installation, for insulated piping or near-ambient fluid temperatures, excluding thermal radiation effects, conduction error is less than one percent as long as the tip is exposed to flow, even in flanged mounted installations. Arguments for longer designs are based on traditional notions but rarely justified. Long thermowells may be used in low velocity services or in cases where historical experience justified their use. In modern high-strength piping and elevated fluid velocities, each installation must be carefully examined especially in cases where acoustic resonances in the process are in
https://en.wikipedia.org/wiki/Scientific%20Vector%20Language
SVL or Scientific Vector Language is a programming language created by Chemical Computing Group. It was first released in 1994. SVL is the built-in command, scripting and application development language of MOE. It is a "chemistry aware" computer programming language with over 1,000 specific functions for analyzing and manipulating chemical structures and related molecular objects. SVL is a concise, high-level language whose programs are typically 10 times smaller than their equivalent when compared to C or Fortran. SVL source code is compiled to a "byte code" representation, which is then executed by the base run-time environment making SVL programs inherently portable across different computer hardware and operating systems.
https://en.wikipedia.org/wiki/Tandem%20mass%20tag
A tandem mass tag (TMT) is a chemical label that facilitates sample multiplexing in mass spectrometry (MS)-based quantification and identification of biological macromolecules such as proteins, peptides and nucleic acids. TMT belongs to a family of reagents referred to as isobaric mass tags which are a set of molecules with the same mass, but yield reporter ions of differing mass after fragmentation. The relative ratio of the measured reporter ions represents the relative abundance of the tagged molecule, although ion suppression has a detrimental effect on accuracy. Despite these complications, TMT-based proteomics has been shown to afford higher precision than Label-free quantification. In addition to aiding in protein quantification, TMT tags can also increase the detection sensitivity of certain highly hydrophilic analytes, such as phosphopeptides, in RPLC-MS analyses. Versions There are currently six varieties of TMT available: TMTzero, a non-isotopically substituted core structure; TMTduplex, an isobaric pair of mass tags with a single isotopic substitution; TMTsixplex, an isobaric set of six mass tags with five isotopic substitutions; TMT 10-plex – a set of 10 isotopic mass tags which use the TMTsixplex reporter region, but use different elemental isotope to create a mass difference of 0.0063 Da, TMTpro a 16 plex version with a different reporter and mass normalizer than the original TMT, and TMTpro Zero. The tags contain four regions, namely a mass reporter region (M), a cleavable linker region (F), a mass normalization region (N) and a protein reactive group (R). The chemical structures of all the tags are identical but each contains isotopes substituted at various positions, such that the mass reporter and mass normalization regions have different molecular masses in each tag. The combined M-F-N-R regions of the tags have the same total molecular weights and structure so that during chromatographic or electrophoretic separation and in single MS mode, mo
https://en.wikipedia.org/wiki/Just%20enough%20operating%20system
Just enough operating system (JeOS, pronounced "juice" according to SUSE) is a paradigm for customizing operating systems to fit the needs of a particular application such as for a software appliance. The platform only includes the operating system components required to support a particular application and any other third-party components contained in the appliance (e.g., the kernel). This makes the appliance smaller, faster (to boot and to execute the particular application) and potentially more secure than an application running under a full general-purpose OS. Common implementations Typically, a JeOS will consist of the following: JeOS media (OS core [kernel, virtual drives, login]) OS minimum maintenance tools Minimum user space tools Packages repository (DVD or network based) It is important to differentiate between true fully minimalized OS install profiles forced, for example, with security hardening tools or representing Recovery Console images and JeOS richer install profiles which are designed and built for wider audience usage, so VM/VA creators and their users can easily perform needed installation or configuration tasks. Differences between minimialist, lightweight and appliance Light-weight Linux distribution minimalist e.g. Porteus (operating system) See also BareMetal Container Linux (discontinued) OpenELEC (JeOS software appliance with Kodi Media Center) LibreELEC (JeOS software appliance with Kodi Media Center) Ubuntu JeOS Containerization (computing) (modern retake on JeOS)
https://en.wikipedia.org/wiki/Horace%20Hearne%20Institute
The Horace Hearne Jr. Institute for Theoretical Physics is at Louisiana State University. The Hearne Institute is funded by a donation of two endowed chairs by Horace Hearne Jr. and the State of Louisiana, as well as additional grants from a variety of national and international granting agencies. It currently has as co-directors James Sauls and Jorge Pullin. Jonathan Dowling was a former co-director. The institute hosts faculty, postdoctoral researchers, students — as well as long- and short-term visitors — who conduct research on quantum matter, fields and information and on gravitational physics. The Hearne Institute also sponsors international workshops on quantum matter, relativity and quantum gravity.
https://en.wikipedia.org/wiki/Non-stop%20decay
Non-stop decay (NSD) is a cellular mechanism of mRNA surveillance to detect mRNA molecules lacking a stop codon and prevent these mRNAs from translation. The non-stop decay pathway releases ribosomes that have reached the far 3' end of an mRNA and guides the mRNA to the exosome complex, or to RNase R in bacteria for selective degradation. In contrast to nonsense-mediated decay (NMD), polypeptides do not release from the ribosome, and thus, NSD seems to involve mRNA decay factors distinct from NMD. Non-stop decay Non-stop decay (NSD) is a cellular pathway that identifies and degrades aberrant mRNA transcripts that do not contain a proper stop codon. Stop codons are signals in messenger RNA that signal for synthesis of proteins to end. Aberrant transcripts are identified during translation when the ribosome translates into the poly A tail at the 3' end of mRNA. A non-stop transcript can occur when point mutations damage the normal stop codon. Moreover, some transcriptional events are more likely to preserve gene expression on a lower scale in particular states. The NSD pathway discharges ribosomes that have stalled at the 3' end of mRNA and directs the mRNA to the exosome complex in eukaryotes or RNase R in bacteria.  Once directed to their appropriate sites, the transcripts are then degraded. The NSD mechanism requires the interaction of RNA exosome with the Ski complex, a multi-protein structure that includes the Ski2p helicase and (notably) Ski7p.  The combination of these proteins and subsequent complex formation activates the degradation of aberrant mRNAs. Ski7p is thought to bind the ribosome stalled at the 3’ end of the mRNA poly(A) tail and recruit the exosome to degrade the aberrant mRNA. However in mammalian cells, Ski7p is not found, and even the presence of the NSD mechanism itself has remained relatively unclear. The short splicing isoform of HBS1L (HBS1LV3) was found to be the long-sought after human homologue of Ski7p, linking the exosome and SKI com
https://en.wikipedia.org/wiki/Colombian%20electric%20ray
The Colombian electric ray (Diplobatis colombiensis) is a species of fish in the family Narcinidae endemic to Colombia. Its natural habitat is open seas.
https://en.wikipedia.org/wiki/Brownband%20numbfish
The brownband numbfish (Diplobatis guamachensis) is a species of fish in the family Narcinidae found in eastern Colombia, Venezuela and Trinidad and Tobago. Its natural habitat is open seas.
https://en.wikipedia.org/wiki/Ocellated%20electric%20ray
The ocellated electric ray or bullseye electric ray (Diplobatis ommata) is a species of electric ray in the family Narcinidae, native to the shallow inshore waters of the eastern central Pacific from the Gulf of California to Ecuador. Reaching in length, this species has a rounded pectoral fin disc and pelvic fins with convex margins. Its short and thick tail bears two dorsal fins and terminates in a triangular caudal fin. The ocellated electric ray is named for the distinctive large eyespot on the middle of its disc, consisting of a black or yellow center surrounded by concentric rings. Its dorsal coloration is otherwise highly variable, ranging from plain to ornately patterned on a light to dark brown background. The front part of its disc is darker brown. Solitary and nocturnal in nature, the ocellated electric ray is a bottom-dweller found in sandy and rocky habitats. It moves along the bottom by "hopping" on its pelvic fins, and feeds on small crustaceans and polychaete worms. For defense, it can generate an electrical discharge from its electric organs. This species probably bears live young that are sustained by yolk and later histotroph ("uterine milk") during gestation. The International Union for Conservation of Nature (IUCN) has listed the ocellated electric ray as least concern. It is susceptible to the heavy trawling activity within its limited range. Taxonomy American ichthyologists David Starr Jordan and Charles Henry Gilbert described the ocellated electric ray in an 1890 article for the scientific journal Proceedings of the United States National Museum. Their account was based on a female specimen caught by the United States Fish Commission steamer USS Albatross in 1888. The female was collected off the Pacific coast of Colombia at a depth of . Gilbert had previously obtained a specimen from Panama in 1882, but it had been destroyed in a fire before it could be studied. Jordan and Gilbert named the new species ommata (Greek for "eyed") in refere
https://en.wikipedia.org/wiki/Painted%20electric%20ray
The painted electric ray or variegated electric ray (Diplobatis pictus, sometimes misspelled picta) is a poorly known species of numbfish, family Narcinidae, native to the western Atlantic Ocean from southeastern Venezuela to the mouth of the Amazon River in Brazil. It is common on soft substrates at a depth of 2–120 meters.
https://en.wikipedia.org/wiki/Square%20root%20of%205
The square root of 5 is the positive real number that, when multiplied by itself, gives the prime number 5. It is more precisely called the principal square root of 5, to distinguish it from the negative number with the same property. This number appears in the fractional expression for the golden ratio. It can be denoted in surd form as: It is an irrational algebraic number. The first sixty significant digits of its decimal expansion are: . which can be rounded down to 2.236 to within 99.99% accuracy. The approximation (≈ 2.23611) for the square root of five can be used. Despite having a denominator of only 72, it differs from the correct value by less than (approx. ). As of January 2022, its numerical value in decimal has been computed to at least 2,250,000,000,000 digits. Rational approximations The square root of 5 can be expressed as the continued fraction The successive partial evaluations of the continued fraction, which are called its convergents, approach : Their numerators are 2, 9, 38, 161, … , and their denominators are 1, 4, 17, 72, … . Each of these is a best rational approximation of ; in other words, it is closer to than any rational number with a smaller denominator. The convergents, expressed as , satisfy alternately the Pell's equations When is approximated with the Babylonian method, starting with and using , the th approximant is equal to the th convergent of the continued fraction: The Babylonian method is equivalent to Newton's method for root finding applied to the polynomial . The Newton's method update, , is equal to when . The method therefore converges quadratically. Relation to the golden ratio and Fibonacci numbers The golden ratio is the arithmetic mean of 1 and . The algebraic relationship between , the golden ratio and the conjugate of the golden ratio () is expressed in the following formulae: (See the section below for their geometrical interpretation as decompositions of a rectangle.) then naturall
https://en.wikipedia.org/wiki/International%20Noble%20Gas%20Experiment
The International Noble Gas Experiment (INGE) was formed in 1999 as an informal expert's group of developers of radioactive xenon measurement systems for the International Monitoring System for the Comprehensive Nuclear-Test-Ban Treaty (CTBT) (signed in 1997, but which has not entered into force). The group originally consisted of research and development groups from Germany, France, Russia, Sweden, and the United States, as well as personnel from Provisional Technical Secretariat of the Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization CTBTO. The INGE group was formed to test aspects of measuring xenon fission product radionuclides released by nuclear explosions. The systems developed and participating in the INGE measure xenon isotopes in the atmosphere and includes 131mXe, 133Xe, 133mXe, and 135Xe. Since the INGE was formed in 1999, the group has expanded somewhat and now includes R&D and operational groups from many locations around the world. Although there is no official list of INGE members, the group is informally composed of scientists, engineers, and others from Argentina, Austria, Australia, Canada, China, France, Germany, Japan, Norway, South Korea, Sweden, Russia, the United States, and several other countries. These members regularly contribute to better understanding radioactive xenon measurements through operation of samplers, measurements of background at various locations, creation of data analysis routines, etc. Staff from the preparatory commission of the CTBTO oversaw the experiment, with technical assistance from a German group of noble gas experts from the BfS in Freiburg, Germany. As of 2009, the experiment was still on-going, and so far it had consisted of 3 phases: INGE Phase 1 The first phase of the INGE experiment took place in the laboratories. Four systems were developed to the point that they could measure xenon concentrations to specifications laid out by the CTBTO Preparatory Commission. I
https://en.wikipedia.org/wiki/Coffin%20ray
Hypnos monopterygius, also known as the coffin ray or Australian numbfish, is a species of electric ray endemic to Australia, where it is common in inshore waters shallower than . It is the sole member of its genus Hypnos, and family Hypnidae. This small species typically reaches in length. Greatly enlarged pectoral fins and an extremely short tail, coupled with diminutive dorsal and caudal fins all concentrated towards the rear, give the coffin ray a distinctive pear-like shape. It is a varying shade of brown in color above, and has tiny eyes and a large, highly distensible mouth. The sluggish and nocturnal coffin ray frequents sandy or muddy habitats, where it can bury itself during daytime. It can produce a powerful electric shock reaching 200 volts for attack and defense. This species is a voracious predator that feeds mainly on benthic bony fishes, often tackling fish approaching or exceeding itself in size. On occasion, it may also consume invertebrates and even small penguins and rats. Reproduction is aplacental viviparous, in which the developing embryos are nourished by yolk and maternally produced histotroph ("uterine milk"). The female gives birth to 4–8 pups during summer. The coffin ray can deliver a severe, albeit non-fatal, shock to a human. Not valued commercially, it is very hardy and can usually survive being captured and discarded. The International Union for Conservation of Nature (IUCN) has listed this species under Least Concern, as its population does not seem threatened by human activity. Taxonomy and phylogeny The first scientific reference to the coffin ray was written by English zoologist and botanist George Shaw to accompany Frederick Polydore Nodder's illustrations of a beached fish, published in their 1795 work The Naturalist's Miscellany. Shaw interpreted the specimen as a goosefish, calling it the "single-finned Lophius" or Lophius monopterygius in Latin. Independently, French zoologist Auguste Duméril described a new electric ray
https://en.wikipedia.org/wiki/Solar%20Cookers%20International
Solar Cookers International (SCI) is a 501(c)(3) nonprofit, non-governmental organization that works to improve human and environmental health by supporting the expansion of effective carbon-free solar cooking in world regions of greatest need. SCI leads through advocacy, research, and strengthening the capacity of the global solar cooking movement. SCI has consultative status with the United Nations Economic and Social Council (ECOSOC) and was founded in 1987. Recognition Solar Cookers International won an Ashden Award in 2002 for their work with solar cookers in Kenya. In August 2006, SCI was the winner of the World Renewable Energy Award. SCI was named as a winner in the Keeling Curve Prize for sustainable planet solutions in August 2021. SCI won for its work “improving human and environmental health by supporting the expansion of effective carbon-free solar cooking in world regions of greatest need” in the Social and Cultural Pathways category. SCI has also been honored by entities such as the California State Legislature and the Center for African Peace and Conflict Resolution. History Solar Cookers International was founded in 1987 as Solar Box Cookers International. Barbara Kerr and Sherry Cole partnered with other supporters to form this organization. SCI produced and distributed manuals describing the construction and use of solar box-style cookers. They became advocates of how solar cooking could be incorporated into development and relief agency programs. SCI's role evolved into networking with other solar cooking organizations worldwide. They hosted forums for dialog including co-sponsoring three international solar cooking conferences with the University of the Pacific, US, in 1992, the National University of Costa Rica in 1994 and the deemed university, Coimbatore, India in 1997. SCI also administered a series of solar cooking field projects. Since 1995, SCI has managed or co-managed solar cooking projects in the Nyakach district, Kenya; in the K
https://en.wikipedia.org/wiki/Oloid
An oloid is a three-dimensional curved geometric object that was discovered by Paul Schatz in 1929. It is the convex hull of a skeletal frame made by placing two linked congruent circles in perpendicular planes, so that the center of each circle lies on the edge of the other circle. The distance between the circle centers equals the radius of the circles. One third of each circle's perimeter lies inside the convex hull, so the same shape may be also formed as the convex hull of the two remaining circular arcs each spanning an angle of 4π/3. Surface area and volume The surface area of an oloid is given by: exactly the same as the surface area of a sphere with the same radius. In closed form, the enclosed volume is , where and denote the complete elliptic integrals of the first and second kind respectively. A numerical calculation gives . Kinetics The surface of the oloid is a developable surface, meaning that patches of the surface can be flattened into a plane. While rolling, it develops its entire surface: every point of the surface of the oloid touches the plane on which it is rolling, at some point during the rolling movement. Unlike most axial symmetric objects (cylinder, sphere etc.), while rolling on a flat surface, its center of mass performs a meander motion rather than a linear one. In each rolling cycle, the distance between the oloid's center of mass and the rolling surface has two minima and two maxima. The difference between the maximum and the minimum height is given by , where is the oloid's circular arcs radius. Since this difference is fairly small, the oloid's rolling motion is relatively smooth. At each point during this rolling motion, the oloid touches the plane in a line segment. The length of this segment stays unchanged throughout the motion, and is given by: . Related shapes The sphericon is the convex hull of two semicircles on perpendicular planes, with centers at a single point. Its surface consists of the pieces of four cones. I
https://en.wikipedia.org/wiki/Salalah%20guitarfish
The Salalah guitarfish (Acroteriobatus salalah) is a species of fish in the family Rhinobatidae. It is nearly endemic to the waters off Oman, with a few records off Pakistan. Its natural habitat is open seas. Salalah (صَلَالَة Ṣalālah) is a city in southern Oman where the only specimen was obtained at a fish market.
https://en.wikipedia.org/wiki/Erd%C5%91s%E2%80%93Anning%20theorem
The Erdős–Anning theorem states that an infinite number of points in the plane can have mutual integer distances only if all the points lie on a straight line. It is named after Paul Erdős and Norman H. Anning, who published a proof of it in 1945. Rationality versus integrality Although there can be no infinite non-collinear set of points with integer distances, there are infinite non-collinear sets of points whose distances are rational numbers. For instance, the subset of points on a unit circle obtained by repeatedly rotating by the sharp angle in a 3–4–5 right triangle has this property. It forms a dense set in the circle. The (still unsolved) Erdős–Ulam problem asks whether there can exist a set of points at rational distances from each other that forms a dense set for the whole Euclidean plane. According to Erdős, Stanisław Ulam was inspired to ask this question after hearing from Erdős about the Erdős–Anning theorem. For any finite set S of points at rational distances from each other, it is possible to find a similar set of points at integer distances from each other, by expanding S by a factor of the least common denominator of the distances in S. By expanding in this way a finite subset of the unit circle construction, one can construct arbitrarily large finite sets of non-collinear points with integer distances from each other. However, including more points into S may cause the expansion factor to increase, so this construction does not allow infinite sets of points at rational distances to be transformed into infinite sets of points at integer distances. Proof Shortly after the original publication of the Erdős–Anning theorem, Erdős provided the following simpler proof. The proof involves finding a system of curves so that each point of the set lies on a crossing of two of the curves. Given a set of points with integer distances, not all on a line, arbitrarily choose a triangle formed by three of the points. Let denote the Euclidean distance fu
https://en.wikipedia.org/wiki/Erd%C5%91s%E2%80%93Diophantine%20graph
An Erdős–Diophantine graph is an object in the mathematical subject of Diophantine equations consisting of a set of integer points at integer distances in the plane that cannot be extended by any additional points. Equivalently, in geometric graph theory, it can be described as a complete graph with vertices located on the integer square grid such that all mutual distances between the vertices are integers, while all other grid points have a non-integer distance to at least one vertex. Erdős–Diophantine graphs are named after Paul Erdős and Diophantus of Alexandria. They form a subset of the set of Diophantine figures, which are defined as complete graphs in the Diophantine plane for which the length of all edges are integers (unit distance graphs). Thus, Erdős–Diophantine graphs are exactly the Diophantine figures that cannot be extended. The existence of Erdős–Diophantine graphs follows from the Erdős–Anning theorem, according to which infinite Diophantine figures must be collinear in the Diophantine plane. Hence, any process of extending a non-collinear Diophantine figure by adding vertices must eventually reach a figure that can no longer be extended. Examples Any set of zero or one point can be trivially extended, and any Diophantine set of two points can be extended by more points on the same line. Therefore, all Diophantine sets with fewer than three nodes can be extended, so Erdős–Diophantine graphs on fewer than three nodes cannot exist. By numerical search, have shown that three-node Erdős–Diophantine graphs do exist. The smallest Erdős–Diophantine triangle is characterised by edge lengths 2066, 1803, and 505. The next larger Erdős–Diophantine triangle has edges 2549, 2307 and 1492. In both cases, the sum of the three edge-lengths is even. Brancheva has proven that this property holds for all Erdős–Diophantine triangles. More generally, the total length of any closed path in an Erdős–Diophantine graph is always even. An example of a 4-node Erdős–Diop
https://en.wikipedia.org/wiki/Argentine%20torpedo
Tetronarce puelcha, commonly known as the Argentine torpedo, is a species of fish in the family Torpedinidae. It is found in Argentina, Brazil, and Uruguay. Its natural habitat is open seas. It is rare electric ray fish species, which is moderately large (104 cm) found in South West Atlantic (mostly in Argentina and Brazil).
https://en.wikipedia.org/wiki/Marbled%20electric%20ray
The marbled electric ray (Torpedo marmorata) is a species of electric ray in the family Torpedinidae found in the coastal waters of the eastern Atlantic Ocean from the North Sea to South Africa. This benthic fish inhabits rocky reefs, seagrass beds, and sandy and muddy flats in shallow to moderately deep waters. It can survive in environments with very little dissolved oxygen, such as tidal pools. The marbled electric ray has a nearly circular pectoral fin disc and a muscular tail that bears two dorsal fins of nearly equal size and a large caudal fin. It can be identified by the long, finger-like projections on the rims of its spiracles, as well as by its dark brown mottled color pattern, though some individuals are plain-colored. Males and females typically reach and long respectively. Nocturnal and solitary, the marbled electric ray can often be found lying the sea floor buried except for its eyes and spiracles. This slow-moving predator feeds almost exclusively on small bony fishes, which it ambushes from the bottom and subdues with strong electric bursts. It defends itself by turning towards the threat, swimming in a loop, or curling up with its underside facing outward, while emitting electric shocks to drive off the prospective predator. Its paired electric organs are capable of producing 70–80 volts of electricity. This species is aplacental viviparous, with the developing embryos sustained by yolk and histotroph ("uterine milk") produced by the mother. Mating takes place from November to January, and females bear litters of 3–32 pups every other year after a gestation period of 9–12 months. The newborn ray is immediately capable of using electricity to hunt. The electric shock delivered by a marbled electric ray can be severe but is not directly life-threatening. Its electrogenic properties have been known since classical antiquity, when live rays were used to treat conditions such as chronic headaches. This and other electric ray species are used as mod