source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Translate%20Toolkit | The Translate Toolkit is a localization and translation toolkit. It provides a set of tools for working with localization file formats and files that might need localization. The toolkit also provides an API on which to develop other localization tools.
The toolkit is written in the Python programming language. It is free software originally developed and released by Translate.org.za in 2002 and is now maintained by Translate.org.za and community developers.
Translate Toolkit uses Enchant as spellchecker.
History
The toolkit was originally developed as the mozpotools by David Fraser for Translate.org.za. Translate.org.za had focused on translating KDE which used Gettext PO files for localization. With an internal change to focus on end-user, cross-platform, OSS software, the organisation decided to localize the Mozilla Suite. This required using new tools and new formats that were not as rich as Gettext PO. Thus mozpotools was created to convert the Mozilla DTD and .properties files to Gettext PO.
Various tools were developed as needed, including , a tool to count source text words to allow correct estimations for work, , to search through translations, and , to check for various quality issues.
When Translate.org.za began translating OpenOffice.org it was only natural that the Translate Toolkit would be adapted to handle the OpenOffice.org internal file format. Translating OpenOffice.org using PO files is now the default translation method.
As part of the WordForge project the work received a major boost and the toolkit was further extended to manage XLIFF files alongside PO files. Further funded development has added other features including the ability to convert Open Document Format to XLIFF and the management of placeholders (Variables, acronyms, terminology, etc.).
Design goals
The main aim of the toolkit is to increase the quality of localisation and translation. This is achieved by firstly, focusing on good localisation formats thus the to |
https://en.wikipedia.org/wiki/London%20Beer%20Flood | The London Beer Flood was an accident at Meux & Co's Horse Shoe Brewery, London, on 17 October 1814. It took place when one of the wooden vats of fermenting porter burst. The escaping liquid dislodged the valve of another vessel and destroyed several large barrels: between 128,000 and 323,000 imperial gallons (580,000–1,470,000 L; 154,000–388,000 US gal) of beer were released in total.
The resulting wave of porter destroyed the back wall of the brewery and swept into an area of slum dwellings known as the St Giles rookery. Eight people were killed, five of them mourners at the wake being held by an Irish family for a two-year-old boy. The coroner's inquest returned a verdict that the eight had lost their lives "casually, accidentally and by misfortune". The brewery was nearly bankrupted by the event; it avoided collapse after a rebate from HM Excise on the lost beer. The brewing industry gradually stopped using large wooden vats after the accident. The brewery moved in 1921, and the Dominion Theatre is now where the brewery used to stand. Meux & Co went into liquidation in 1961.
Background
In the early nineteenth century the Meux Brewery was one of the two largest in London, along with Whitbread. In 1809 Sir Henry Meux purchased the Horse Shoe Brewery, at the junction of Tottenham Court Road and Oxford Street. Meux's father, Sir Richard Meux, had previously co-owned the Griffin Brewery in Liquor-Pond Street (now Clerkenwell Road), in which he had constructed the largest vat in London, capable of holding 20,000 imperial barrels.
Henry Meux emulated his father's large vat, and constructed a wooden vessel tall and capable of holding 18,000 imperial barrels. of iron hoops were used to strengthen the vat. Meux brewed only porter, a dark beer that was first brewed in London and was the most popular alcoholic drink in the capital. Meux & Co brewed 102,493 imperial barrels in the twelve months up to July 1812. Porter was left in the large vessels to mature for severa |
https://en.wikipedia.org/wiki/NORBIT | In electronics, the NORBIT family of modules is a very early form (since 1960) of digital logic developed by Philips (and also provided through and Mullard) that uses modules containing discrete components to build logic function blocks in resistor–transistor logic (RTL) or diode–transistor logic (DTL) technology.
Overview
The system was originally conceived as building blocks for solid-state hard-wired programmed logic controllers (the predecessors of programmable logic controllers (PLC)) to replace electro-mechanical relay logic in industrial control systems for process control and automation applications, similar to early Telefunken/AEG Logistat, Siemens Simatic, Brown, Boveri & Cie, ACEC Logacec or Estacord systems.
Each available logical function was recognizable by the color of its plastic container, black, blue, red, green, violet, etc. The most important circuit block contained a NOR gate (hence the name), but there were also blocks containing drivers, and a timer circuit similar to the later 555 timer IC.
The original Norbit modules of the YL 6000 series introduced in 1960 had potted single in-line packages with up to ten long flying leads arranged in two groups of up to five leads in a row. These modules were specified for frequencies of less than 1 kHz at ±24 V supply.
Also available in 1960 were so called Combi-Element modules in single-in line packages with ten evenly spaced stiff leads in a row (5.08 mm / 0.2-inch pitch) for mounting on a PCB. They were grouped in the 1-series (aka "100 kHz series") with ±6 V supply. The newer 10-series and 20-series had similarly sized packages, but came with an additional parallel row of nine staggered leads for a total of 19 leads. The 10-series uses germanium alloy transistors, whereas in the 20-series silicon planar transistors are used for a higher cut-off frequency of up to 1 MHz (vs. 30 kHz) and a higher allowed temperature range of +85 °C (vs. +55 °C).
In 1967, the Philips/Mullard NORBIT 2 aka Valvo NOR |
https://en.wikipedia.org/wiki/ANOVA%E2%80%93simultaneous%20component%20analysis | In computational biology and bioinformatics, analysis of variance – simultaneous component analysis (ASCA or ANOVA–SCA) is a method that partitions variation and enables interpretation of these partitions by SCA, a method that is similar to principal components analysis (PCA). Analysis of variance (ANOVA) is a collection of statistical models and their associated estimation procedures used to analyze differences. Statistical coupling analysis (SCA) is a technique used in bioinformatics to measure covariation between pairs of amino acids in a protein multiple sequence alignment (MSA).
This method is a multivariate or even megavariate extension of analysis of variance (ANOVA). The variation partitioning is similar to ANOVA. Each partition matches all variation induced by an effect or factor, usually a treatment regime or experimental condition. The calculated effect partitions are called effect estimates. Because even the effect estimates are multivariate, interpretation of these effects estimates is not intuitive. By applying SCA on the effect estimates one gets a simple interpretable result.<ref>Daniel J Vis , Johan A Westerhuis , Age K Smilde: Jan van der Greef (2007) "Statistical validation of megavariate effects in ASCA", BMC Bioinformatics" , 8:322 </ref> In case of more than one effect, this method estimates the effects in such a way that the different effects are not correlated.
Details
Many research areas see increasingly large numbers of variables in only few samples. The low sample to variable ratio creates problems known as multicollinearity and singularity. Because of this, most traditional multivariate statistical methods cannot be applied.
ASCA algorithm
This section details how to calculate the ASCA model on a case of two main effects with one interaction effect. It is easy to extend the declared rationale to more main effects and more interaction effects. If the first effect is time and the second effect is dosage, only the interaction betwee |
https://en.wikipedia.org/wiki/Instant | In physics and the philosophy of science, instant refers to an infinitesimal interval in time, whose passage is instantaneous. In ordinary speech, an instant has been defined as "a point or very short space of time," a notion deriving from its etymological source, the Latin verb instare, from in- + stare ('to stand'), meaning 'to stand upon or near.'
The continuous nature of time and its infinite divisibility was addressed by Aristotle in his Physics, where he wrote on Zeno's paradoxes. The philosopher and mathematician Bertrand Russell was still seeking to define the exact nature of an instant thousands of years later.
, the smallest time interval certified in regulated measurements is on the order of 397 zeptoseconds (397 × 10−21 seconds).
See also
Infinitesimal
Present |
https://en.wikipedia.org/wiki/Toroidal%20ring%20model | The toroidal ring model, known originally as the Parson magneton or magnetic electron, is a physical model of subatomic particles. It is also known as the plasmoid ring, vortex ring, or helicon ring. This physical model treated electrons and protons as elementary particles, and was first proposed by Alfred Lauck Parson in 1915.
Theory
Instead of a single orbiting charge, the toroidal ring was conceived as a collection of infinitesimal charge elements, which orbited or circulated along a common continuous path or "loop". In general, this path of charge could assume any shape, but tended toward a circular form due to internal repulsive electromagnetic forces. In this configuration the charge elements circulated, but the ring as a whole did not radiate due to changes in electric or magnetic fields since it remained stationary. The ring produced an overall magnetic field ("spin") due to the current of the moving charge elements. These elements circulated around the ring at the speed of light c, but at frequency ν = c/2πR, which depended inversely on the radius R. The ring's inertial energy increased when compressed, like a spring, and was also inversely proportional to its radius, and therefore proportional to its frequency ν. The theory claimed that the proportionality constant was the Planck constant h, the conserved angular momentum of the ring.
According to the model, electrons or protons could be viewed as bundles of "fibers" or "plasmoids" with total charge ±e. The electrostatic repulsion force between charge elements of the same sign was balanced by the magnetic attraction force between the parallel currents in the fibers of a bundle, per Ampère's law. These fibers twisted around the torus of the ring as they progressed around its radius, forming a Slinky-like helix. Circuit completion demanded that each helical plasmoid fiber twisted around the ring an integer number of times as it proceeded around the ring. This requirement was thought to account for "quant |
https://en.wikipedia.org/wiki/Gymnemic%20acid | Gymnemic acids are a class of chemical compounds isolated from the leaves of Gymnema sylvestre (Asclepiadaceae). They are anti-sweet compounds, or sweetness inhibitors. After chewing the leaves, solutions sweetened with sugar taste like water.
Chemically, gymnemic acids are triterpenoid glycosides. The central structure is the aglycone gymnemagenin (C30H50O6). This is adorned with a sugar such as glucuronic acid and with various ester groups. These variations give rise to the different gymnemic acids. More than 20 homologs of gymnemic acid are known.
Gymnemic acid I has the highest anti-sweet properties. It suppresses the sweetness of most of the sweeteners including intense artificial sweeteners such as aspartame and natural sweeteners such as thaumatin, a sweet protein. The anti-sweet activity is reversible, but sweetness recovery on the tongue can take more than 10 minutes.
Example chemical structures
See also
Other anti-sweeteners:
Hodulcine, a dammarane-type triterpene glycoside from the leaves of Hovenia dulcis
Lactisole, sodium 2-(4-methoxyphenoxy)propanoate
Ziziphin, a triterpene glycoside, C51H80O18
Gurmarin |
https://en.wikipedia.org/wiki/VMware%20Infrastructure | VMware Infrastructure is a collection of virtualization products from VMware (a division of Dell Technologies). Virtualization is an abstraction layer that decouples hardware from operating systems. The VMware Infrastructure suite allows enterprises to optimize and manage their IT infrastructure through virtualization as an integrated offering. The core product families are vSphere, vSAN and NSX for on-premises virtualization. VMware Cloud Foundation (VCF) is an infrastructure platform for hybrid cloud management. The VMware Infrastructure suite is designed to span a large range of deployment types to provide maximum flexibility and scalability.
Components
The suite included:
VMware ESX Server version 3
VMware ESXi version 3.x
VMware vCenter version 2 (formally VMware VirtualCenter)
Virtual SMP (which allows a guest operating system to "see" up to four CPUs in the virtual machine).
Users can supplement this software bundle by purchasing optional products, such as VMotion, as well as distributed services such as high availability (HA), distributed resource scheduler (DRS), or consolidated backup.
VMware Inc. released VMware Infrastructure 3 in June 2006. The suite came in three "editions": Starter, Standard and Enterprise.
Limitations
Known limitations in VMware Infrastructure 3 may constrain the design of data centers:
limitations in VMware Infrastructure version 3.5 included the following:
Guest system maximum RAM: 64 mb
Number of guest CPUs: 4
Number of hosts in an HA cluster: 32
Number of hosts in a DRS cluster: 32
Size of RAM per server: 256 GB
Number of hosts managed by Virtual Center Server: 200
Number of virtual machines managed by Virtual Center Server: 2000
No limitations were, for example, volume size of 64 TB with no more than 6 SCSI controllers per virtual machine; maximum number of remote consoles to a virtual machine is 10.
It is also not possible to connect Fibre Channel tape drives, which hinders the ability to do backups u |
https://en.wikipedia.org/wiki/The%20Copernican%20Revolution%20%28book%29 | The Copernican Revolution is a 1957 book by the philosopher Thomas Kuhn, in which the author provides an analysis of the Copernican Revolution, documenting the pre-Ptolemaic understanding through the Ptolemaic system and its variants until the eventual acceptance of the Keplerian system.
Kuhn argues that the Ptolemaic system provided broader appeal than a simple astronomical system but also became intertwined in broader philosophical and theological beliefs. Kuhn argues that this broader appeal made it more difficult for other systems to be proposed.
Summary
At the end of the book, Kuhn summarizes the achievements of Copernicus and Newton, while comparing the incompatibility of Newtonian physics with Aristotelian concepts that preceded the then new physics. Kuhn also noted that discoveries, such as that produced by Newton, were not in agreement with the prevailing worldview during his lifetime. |
https://en.wikipedia.org/wiki/Decoy%20cells | Decoy cells are virally infected epithelial cells that can be found in the urine. Decoy cells owe their name to their strong resemblance to cancer cells, and may as such confuse the diagnosis of either viral infection or urothelial malignancy. During 1950s, cytotechnologist Andrew Ricci observed cells mimicking cancer cells by they were not, in a group of persons working in some kinds of industries - they were referred to as “decoy cells”, analogous to “decoy ducks” used in hunting wild ducks, by Andrew Ricci, a cytotechnologist working renown cytopathologist Dr. Leopold G. Koss.
Epidemiology and presentation
Decoy cells are mostly prevalent in immunocompromised individuals, such as transplant recipients who are treated with immunosuppressive medication in order for their immune system not to reject the foreign transplanted organ. Several viruses mediated the emergence of decoy cells, amongst which cytomegalovirus and polyomavirus. Decoy cells are virus infected urothelial cells with a distinct morphology of enlarged nuclei and intranuclear inclusions. In renal transplant recipients, such cells may be found in up to 40 percent of cases. Decoy cells are clinically relevant since they may be used as a prognostic marker for clinical conditions such as polyomavirus BK-induced nephropathy in renal transplant recipients, and haemorrhagic cystitis in haematopoietic stem cell transplant recipients.
Diagnosis
Decoy cells can be seen in a urine sample through Papanicolaou staining or phase-contrast microscopy. By Papanicolaou stain, most decoy cells have an enlarged nucleus that bears a basophilic inclusion which is surrounded by chromatin that confers a ground-glass or gelatinous appearance. Sometimes the nuclear inclusion has a vesicular aspect, the chromatin may be clumped, and it may be surrounded by a halo. When decoy cells derive from the urothelium, the heavily enlarged and altered nuclei as well as the irregular shape of the cell body can mimic the changes observed |
https://en.wikipedia.org/wiki/Hibernia%20%28personification%29 | Hibernia as a national personification representing Ireland appeared in numerous cartoons and drawings, especially in the nineteenth century.
As depicted in frequent cartoons in Punch, a magazine outspokenly hostile to Irish nationalism, Hibernia was shown as "Britannia's younger sister". She is an attractive, vulnerable girl. She is threatened by manifestations of Irish nationalism such as the Fenians or the Irish National Land League, often depicted as brutish, ape-like monsters. Unable to defend herself, Hibernia is depicted turning to the strong, armoured Britannia for defence. John Tenniel, now mainly remembered as the illustrator of Alice's Adventures in Wonderland, produced a number of such depictions of Hibernia.
At times, nationalist publications (such as the Land League and Parnell's United Ireland newspaper) did use the image of Hibernia. However, possibly because of the pro-union publications' adoption of the "helpless" image of Hibernia, nationalist publications would later use Erin and Kathleen Ni Houlihan as personifications of Irish nationhood. (Although Irish Nationalists did continue to use the terms "Hibernia" and "Hibernian" in other contexts, such as the Ancient Order of Hibernians). A statue, derived from an original by Edward Smyth and depicting a more confident Hibernia (with harp and spear), stands in the central position of three atop the General Post Office in Dublin. The statue appeared on a €2 commemorative coin in 2016 to mark the centenary of the 1916 Easter Rising.
See also
Róisín Dubh (song)
The Sean-Bhean bhocht
Four Green Fields
Mise Éire |
https://en.wikipedia.org/wiki/Ecological%20trap | Ecological traps are scenarios in which rapid environmental change leads organisms to prefer to settle in poor-quality habitats.
The concept stems from the idea that organisms that are actively selecting habitat must rely on environmental cues to help them identify high-quality habitat. If either the habitat quality or the cue changes so that one does not reliably indicate the other, organisms may be lured into poor-quality habitat.
Overview
Ecological traps are thought to occur when the attractiveness of a habitat increases disproportionately in relation to its value for survival and reproduction. The result is preference of falsely attractive habitat and a general avoidance of high-quality but less-attractive habitats. For example, Indigo buntings typically nest in shrubby habitat or broken forest transitions between closed canopy forest and open field. Human activity can create 'sharper', more abrupt forest edges and buntings prefer to nest along these edges. However, these artificial sharp forest edges also concentrate the movement of predators which predate their nests. In this way, Buntings prefer to nest in highly altered habitats where their nest success is lowest.
While the demographic consequences of this type of maladaptive habitat selection behavior have been explored in the context of the sources and sinks, ecological traps are an inherently behavioral phenomenon of individuals. Despite being a behavioural mechanism, ecological traps can have far-reaching population consequences for species with large dispersal capabilities, such as the grizzly bear (Ursus arctos). The ecological trap concept was introduced in 1972 by Dwernychuk and Boag and the many studies that followed suggested that this trap phenomenon may be widespread because of anthropogenic habitat change.
As a corollary, novel environments may represent fitness opportunities that are unrecognized by native species if high-quality habitats lack the appropriate cues to encourage settlement |
https://en.wikipedia.org/wiki/European%20Journal%20of%20Combinatorics | The European Journal of Combinatorics is an international peer-reviewed scientific journal that specializes in combinatorics. The journal primarily publishes papers dealing with mathematical structures within combinatorics and/or establishing direct links between combinatorics and the theories of computing. The journal includes full-length research papers, short notes, and research problems on several topics.
This journal has been founded in 1980 by Michel Deza, Michel Las Vergnas and Pierre Rosenstiehl.
The current editor-in-chief is Patrice Ossona de Mendez and the vice editor-in-chief is Marthe Bonamy.
Abstracting and indexing
The journal is abstracted and indexed in
MathSciNet,
Science Citation Index Expanded,
Scopus, and
ZbMATH Open.
The impact factor for the European Journal of Combinatorics in 2020 was 0.847.
External links
European Journal of Combinatorics |
https://en.wikipedia.org/wiki/Sebenza | The Sebenza is a folding pocket knife manufactured by Chris Reeve Knives of Boise, Idaho. It is constructed with a stainless steel blade and titanium handle. Its handle functions as the lock mechanism similar in concept to the Walker linerlock differing in that the handle itself forms the lock bar which holds the blade open. This mechanism was invented by Chris Reeve, and is called the Reeve Integral Lock (R.I.L). It is also commonly referred to as the Framelock, and is one of the most widely implemented locking systems in the folding knife industry, where lock strength and reliability is a product requirement. The name Sebenza is derived from the Zulu word meaning "Work," a tribute to Mr. Reeve's South African origins.
Design and history
There are currently two size models of the Sebenza 31, small and large. The Small 31 has a 2.99" (76.17mm) blade and the Large 31 has a 3.61" (91.69mm) blade.
First introduced in 1990, the current basic model has a sand-blasted titanium handle and a stonewashed finish CPM S35VN steel blade.
There are numerous options for the embellishment of the Sebenza's titanium handles, such as computer-generated graphics, custom (unique) graphics, or inlays such as exotic wood, micarta, or mammoth ivory.
Originally the Chris Reeve Sebenza was available with a blade of ATS-34 steel.
In 1996, the blade material was changed to BG-42 blade steel, and later in 2001, the Sebenza blade material transitioned to CPM S30V steel. CPM S30V was developed by Crucible Steel with the collaboration of Chris Reeve. Damascus steel blades are also available as an option on the Sebenza. Since 2012, all Chris Reeve knives have transitioned to CPM S35VN steel.
A feature of the Sebenza that is highly praised by users is the ease of maintenance, as CRK actually encourages the customer to disassemble and maintain the knife by including a hex wrench, as well as small tube of fluorinated grease (to lubricate the pivot) and a tube of Loctite (for screws) in th |
https://en.wikipedia.org/wiki/Cube-connected%20cycles | In graph theory, the cube-connected cycles is an undirected cubic graph, formed by replacing each vertex of a hypercube graph by a cycle. It was introduced by for use as a network topology in parallel computing.
Definition
The cube-connected cycles of order n (denoted CCCn) can be defined as a graph formed from a set of n2n nodes, indexed by pairs of numbers (x, y) where 0 ≤ x < 2n and 0 ≤ y < n. Each such node is connected to three neighbors: , , and , where "⊕" denotes the bitwise exclusive or operation on binary numbers.
This graph can also be interpreted as the result of replacing each vertex of an n-dimensional hypercube graph by an n-vertex cycle. The hypercube graph vertices are indexed by the numbers x, and the positions within each cycle by the numbers y.
Properties
The cube-connected cycles of order n is the Cayley graph of a
group that acts on binary words of length n by rotation and flipping bits of the word. The generators used to form this Cayley graph from the group are the group elements that act by rotating the word one position left, rotating it one position right, or flipping its first bit. Because it is a Cayley graph, it is vertex-transitive: there is a symmetry of the graph mapping any vertex to any other vertex.
The diameter of the cube-connected cycles of order n is for any n ≥ 4; the farthest point from (x, y) is (2n − x − 1, (y + n/2) mod n). showed that the crossing number of CCCn is ((1/20) + o(1)) 4n.
According to the Lovász conjecture, the cube-connected cycle graph should always contain a Hamiltonian cycle, and this is now known to be true. More generally, although these graphs are not pancyclic, they contain cycles of all but a bounded number of possible even lengths, and when n is odd they also contain many of the possible odd lengths of cycles.
Parallel processing application
Cube-connected cycles were investigated by , who applied these graphs as the interconnection pattern of a network connecting the processors i |
https://en.wikipedia.org/wiki/Gas%20electron%20multiplier | A gas electron multiplier (GEM) is a type of gaseous ionization detector used in nuclear and particle physics and radiation detection.
All gaseous ionization detectors are able to collect the electrons released by ionizing radiation, guiding them to a region with a large electric field, and thereby initiating an electron avalanche. The avalanche is able to produce enough electrons to create a current or charge large enough to be detected by electronics. In most ionization detectors, the large field comes from a thin wire with a positive high-voltage potential; this same thin wire collects the electrons from the avalanche and guides them towards the readout electronics. GEMs create the large electric field in small holes in a thin polymer sheet; the avalanche occurs inside of these holes. The resulting electrons are ejected from the sheet, and a separate system must be used to collect the electrons and guide them towards the readout.
GEMs are one of the class of micropattern gaseous detectors; this class includes micromegas and other technologies.
History
GEMs were invented in 1997 in the Gas Detector Development Group at CERN by physicist Fabio Sauli.
Operation
Typical GEMs are constructed of 50–70 micrometre thick Kapton foil clad in copper on both sides. A photolithography and acid etching process makes 30–50 micrometer diameter holes through both copper layers; a second etching process extends these holes all the way through the kapton. The small holes can be made very regular and dimensionally stable. For operation, a voltage of 150–400 V is placed across the two copper layers, making large electric fields in the holes. Under these conditions, in the presence of appropriate gases, a single electron entering any hole will create an avalanche containing 100–1000 electrons; this is the "gain" of the GEM. Since the electrons exit the back of the GEM, a second GEM placed after the first one will provide an additional stage of amplification. Many experiments |
https://en.wikipedia.org/wiki/Ritiometan | Ritiometan is an antibacterial used in nasal sprays. Also, it is used in an aerosol preparation for the treatment of infections of the nose and throat. It is marketed in France under the trade name Nécyrane. |
https://en.wikipedia.org/wiki/Reversible%20diffusion | In mathematics, a reversible diffusion is a specific example of a reversible stochastic process. Reversible diffusions have an elegant characterization due to the Russian mathematician Andrey Nikolaevich Kolmogorov.
Kolmogorov's characterization of reversible diffusions
Let B denote a d-dimensional standard Brownian motion; let b : Rd → Rd be a Lipschitz continuous vector field. Let X : [0, +∞) × Ω → Rd be an Itō diffusion defined on a probability space (Ω, Σ, P) and solving the Itō stochastic differential equation
with square-integrable initial condition, i.e. X0 ∈ L2(Ω, Σ, P; Rd). Then the following are equivalent:
The process X is reversible with stationary distribution μ on Rd.
There exists a scalar potential Φ : Rd → R such that b = −∇Φ, μ has Radon–Nikodym derivative and
(Of course, the condition that b be the negative of the gradient of Φ only determines Φ up to an additive constant; this constant may be chosen so that exp(−2Φ(·)) is a probability density function with integral 1.) |
https://en.wikipedia.org/wiki/2-Nonenal | 2-Nonenal is an unsaturated aldehyde. The colorless liquid is an important aroma component of aged beer and buckwheat.
Odor characteristics
The odor of this substance is perceived as orris, fat and cucumber. Its odor has been associated with human body odor alterations during aging. |
https://en.wikipedia.org/wiki/Fat%20comma | The fat comma (also termed hash rocket in Ruby and a fat arrow in JavaScript) is a syntactic construction that appears in a position in a function call (or definition) where a comma would usually appear. The original usage refers to the ")letters:(" construction in ALGOL 60. Newer usage refers to the "=>" operator present in some programming languages. It is primarily associated with PHP, Ruby and Perl programming languages, which use it to declare hashes. Using a fat comma to bind key-value pairs in a hash, instead of using a comma, is considered an example of good idiomatic Perl. In CoffeeScript and TypeScript, the fat comma is used to declare a function that is bound to this.
# a typical, idiomatic use of the fat comma in Perl
my %hash = (
first_name => "Larry",
last_name => "Wall",
);
Subtleties
ALGOL 60
The ALGOL "fat comma" is semantically identical to the comma. In particular, whether letter strings are used, and what their contents are, need not match between the definition of a function and its uses. The following are equivalent:
S(s-5, T, P)
S(s-5) t: (T) p: (P)
S(s-5) Temperature: (T) Pressure: (P)
Perl
The "fat comma" forces the word to its left to be interpreted as a string.
Thus, where this would produce a run-time error under strict (barewords are not allowed):
%bad_example = ( bad_bareword, "not so cool" );
the following use of the fat comma would be legal and idiomatic:
%good_example = ( converted_to_string => "very monkish" );
This is because the token converted_to_string would be converted to the string literal "converted_to_string" which is a legal argument in a hash key assignment.
The result is easier-to-read code, with a stronger emphasis on the name-value pairing of associative arrays.
PHP
In PHP, the fat comma is termed a double arrow, and is used to specify key/value relationships when declaring an array. Unlike in Perl, the double arrow does not treat what comes before it as a bare word, but rather evaluates it. Hence, |
https://en.wikipedia.org/wiki/Red%20Star%20Yeast | Red Star Yeast Company, LLC is a joint-venture of Lesaffre, and Archer Daniels Midland Company.
Red Star operates two plants in the United States—a plant in Headland, AL, and a new plant built in 2006 in Cedar Rapids, IA. Lesaffre Yeast Corporation (prior to the joint-venture) used to operate plants in Milwaukee, WI; Baltimore, MD; and Oakland, CA, but those facilities have been closed since 2006. Dallas tx was also producing yeast from 1982-1996. Their corporate office is located in Milwaukee, WI.
Red Star Yeast and Products was the former division of Sensient Technologies (formerly Universal Foods), which distributed the Red Star brand. Red Star Yeast was then sold to French-based Lesaffre group in 2001. In 2004, Lesaffre and Archer Daniels Midland Company (ADM) created the joint-venture that the company operates under today.
All Red Star Yeast products are certified Kosher except for Passover.
External links
Food additives
Leavening agents
Yeasts
Privately held companies based in Wisconsin
Companies based in Milwaukee
Archer Daniels Midland
Joint ventures |
https://en.wikipedia.org/wiki/Bessel%27s%20correction | In statistics, Bessel's correction is the use of n − 1 instead of n in the formula for the sample variance and sample standard deviation, where n is the number of observations in a sample. This method corrects the bias in the estimation of the population variance. It also partially corrects the bias in the estimation of the population standard deviation. However, the correction often increases the mean squared error in these estimations. This technique is named after Friedrich Bessel.
Formulation
In estimating the population variance from a sample when the population mean is unknown, the uncorrected sample variance is the mean of the squares of deviations of sample values from the sample mean (i.e. using a multiplicative factor 1/n). In this case, the sample variance is a biased estimator of the population variance.
Multiplying the uncorrected sample variance by the factor
gives an unbiased estimator of the population variance. In some literature, the above factor is called Bessel's correction.
One can understand Bessel's correction as the degrees of freedom in the residuals vector (residuals, not errors, because the population mean is unknown):
where is the sample mean. While there are n independent observations in the sample, there are only n − 1 independent residuals, as they sum to 0. For a more intuitive explanation of the need for Bessel's correction, see .
Generally Bessel's correction is an approach to reduce the bias due to finite sample size. Such finite-sample bias correction is also needed for other estimates like skew and kurtosis, but in these the inaccuracies are often significantly larger. To fully remove such bias it is necessary to do a more complex multi-parameter estimation. For instance a correct correction for the standard deviation depends on the kurtosis (normalized central 4th moment), but this again has a finite sample bias and it depends on the standard deviation, i.e. both estimations have to be merged.
Caveats
There are thr |
https://en.wikipedia.org/wiki/Ultrasound%20research%20interface | An ultrasound research interface (URI) is a software tool loaded onto a diagnostic clinical ultrasound device which provides functionality beyond typical clinical modes of operation.
A normal clinical ultrasound user only has access to the ultrasound data in its final processed form, typically a B-Mode image, in DICOM format. For reasons of device usability they also have limited access to the processing parameters that can be modified.
A URI allows a researcher to achieve different results by either acquiring the image at various intervals through the processing chain, or changing the processing parameters.
Typical B-mode receive processing chain
A typical digital ultrasound processing chain for B-Mode imaging may look as follows:
Multiple analog signals are acquired from the ultrasound transducer (the transmitter/receiver applied to the patient)
Analog signals may pass through one or more analog notch filters and a variable-gain amplifier (VCA)
Multiple analog-to-digital converters convert the analog radio frequency (RF) signal to a digital RF signal sampled at a predetermined rate (typical ranges are from 20MHz to 160MHz) and at a predetermined number of bits (typical ranges are from 10 bits to 16 bits)
Beamforming is applied to individual RF signals by applying time delays and summations as a function of time and transformed into a single RF signal
The RF signal is run through one or more digital FIR or IIR filters to extract the most interesting parts of the signal given the clinical operation
The filtered RF signal runs through an envelope detector and is log compressed into a grayscale format
Multiple signals processed in this way are lined up together and interpolated and rasterized into a readable image.
Data access
A URI may provide data access at many different stages of the processing chain, these include:
Pre-beamformed digital RF data from individual channels
Beamformed RF data
Envelope detected data
Interpolated image data
Where many diagnost |
https://en.wikipedia.org/wiki/Choke%20exchange | A choke exchange is a telephone exchange designed to handle many simultaneous call attempts to telephone numbers of that exchange. Choke exchanges are typically used to service telephone numbers of talk radio caller and contest lines of radio stations and event ticket vendors.
Motivation
A central office might only have physical plant resources to handle ca. 8% of allocated telephone numbers, based on historical call traffic averages. A choke exchange has trunk facilities to other exchanges designed in a manner that high call volume is handled through the choke connection rather than overwhelming the rest of the local telephone network. Other local exchanges have a limited number of direct trunks (junctions) to the choke exchange, which may only serve one or more customers, such as a radio station contest line, which may experience many simultaneous calls. But instead of calls being overflowed to main or tandem routes shared with other calls, the unsuccessful callers receive a reorder tone from their local or tandem exchange. If the calls were overflowed to the tandem route, the caller would receive a busy tone from the exchange serving the radio station, and the sudden peak would disrupt calls between other customers.
With common-channel signaling (CCS), e.g., Signalling System No. 7, separate choke exchanges may not be required for these customers.
Examples
Examples of choke exchanges in North America have included:
One of the early choke lines (exchanges) was instituted due to a widely advertised contest by a local radio station in the Miami/Fort Lauderdale area. WHYI-FM advertised their "Last Contest". The top prize was an automobile. Since the advertising lasted over a month, there were a very large volume of calls when they announced for people to call in. There were so many calls that the local exchanges ran out of dial tones. This caused major issues since at the time if a caller had no dial tone, the caller could not dial at all. After it was over, the |
https://en.wikipedia.org/wiki/Record%20sealing | Record sealing is the process of making public records inaccessible to the public.
In many cases, a person with a sealed record gains the legal right to deny or not acknowledge anything to do with the arrest and the legal proceedings from the case itself.
Records are commonly sealed in a number of situations:
Sealed birth records (typically after adoption or determination of paternity)
Juvenile criminal records may be sealed
Other types of cases involving juveniles may be sealed, anonymized, or pseudonymized ("impounded"); e.g., child sex offense or custody cases
Cases using witness protection information may be partly sealed
Cases involving trade secrets
Cases involving state secrets
Filing under seal in US court
Normally, records should not be filed under seal without a court permission. However, FRCP 5.2 requires that sensitive text – like Social Security number, Taxpayer Identification Number, birthday, bank accounts, and children’s names – should be redacted off the filings made with the court and accompanying exhibits. A person making a redacted filing can file an unredacted copy under seal, or the Court can choose to order later that an additional filing be made under seal without redaction. Alternately, the filing party may ask the court’s permission to file some exhibits completely under seal.
When the document is filed "under seal", it should have a clear indication for the court clerk to file it separately – most often by stamping words "Filed Under Seal" on the bottom of each page. Person making filing should also provide instructions to the court clerk that the document needs to be filed "under seal". Courts often have specific requirements to these filings in their Local Rules.
Difference from expungement
Expungement, which is a physical destruction, namely a complete erasure of one's criminal records, and therefore usually carries a higher standard, differs from record sealing, which is only to restrict the public's access to records, so that |
https://en.wikipedia.org/wiki/List%20of%20WLAN%20channels | Wireless LAN (WLAN) channels are frequently accessed using IEEE 802.11 protocols, and equipment that does so is sold mostly under the trademark Wi-Fi. Other equipment also accesses the same channels, such as Bluetooth. The radio frequency (RF) spectrum is vital for wireless communications infrastructure.
The 802.11 standard provides several distinct radio frequency bands for use in Wi-Fi communications: 860/900 MHz, 2.4 GHz, 3.6 GHz, 4.9 GHz, 5 GHz, 5.9 GHz, 6 GHz, 45 GHz and 60 GHz. Each range is divided into a multitude of channels. In the standards, channels are numbered at 5 MHz spacing within a band (except in the 45/60 GHz band, where they are 0.54/1.08/2.16 GHz apart), and the number linearly relates to the centre frequency of the channel. Although channels are numbered at 5 MHz spacing, transmitters generally occupy at least 20 MHz, and standards allow for channels to be bonded together to form wider channels for faster throughput.
Countries apply their own regulations to allowable channels, allowed users and maximum power levels within these frequency ranges. The ISM band ranges are also often used.
860/900 MHz (802.11ah)
802.11ah operates in sub-gigahertz unlicensed bands. Each world region supports different sub-bands, and the channels number depends on the starting frequency of the sub-band it belongs to. Therefore there is no global channels numbering plan, and the channels numbers are incompatible between world regions (and even between sub-bands of a same world region).
The following sub-bands are defined in the 802.11ah specifications:
2.4 GHz (802.11b/g/n/ax)
Fourteen channels are designated in the 2.4 GHz range, spaced 5 MHz apart from each other except for a 12 MHz space before channel 14.
Interference happens when two networks try to operate in the same band, or when their bands overlap. The two modulation methods used have different characteristics of band usage and therefore occupy different widths:
The DSSS method used by legacy 802.1 |
https://en.wikipedia.org/wiki/Battenburg%20markings | Battenburg markings or Battenberg markings are a pattern of high-visibility markings developed in the United Kingdom in the 1990s and currently seen on many types of emergency service vehicles in the UK, Crown dependencies, British Overseas Territories and several other European countries such as the Czech Republic, Iceland, Sweden, Germany, Romania, Spain, Ireland, and Belgium as well as in Australia, New Zealand, Hong Kong, Pakistan, Trinidad and Tobago, and more recently, Canada. The name comes from its similarity in appearance to the cross-section of a Battenberg cake.
History
Battenburg markings were developed in the mid-1990s in the United Kingdom by the Police Scientific Development Branch (now the Home Office Centre for Applied Science and Technology) at the request of the national motorway policing sub-committee of the Association of Chief Police Officers. They were first developed for traffic patrol cars for United Kingdom police forces; private organisations and civil emergency services have also used them since then.
The brief was to design a livery for motorway and trunk road police vehicles that would maximise the vehicles' visibility, from a distance of up to , when stopped either in daylight or under headlights, and which distinctively marked them as police vehicles.
The primary objectives were to design markings that:
Made officers and vehicles more conspicuous (e.g. to prevent collisions when stopped)
Made police vehicles recognisable at a distance of up to in daylight
Assisted in high-visibility policing for public reassurance and deterrence of traffic violations
Made police vehicles nationally recognisable
Were an equal-cost option compared to existing markings
Were acceptable to at least 75% of the staff
Conspicuity
Battenburg design uses a regular pattern and the contrast between a light and a dark colour to increase conspicuity for the human eye.
The lighter colour is daylight-fluorescent (such as fluorescent-yellow) for better vi |
https://en.wikipedia.org/wiki/Bitmap | In computing, a bitmap is a mapping from some domain (for example, a range of integers) to bits. It is also called a bit array or bitmap index.
As a noun, the term "bitmap" is very often used to refer to a particular bitmapping application: the pix-map, which refers to a map of pixels, where each one may store more than two colors, thus using more than one bit per pixel. In such a case, the domain in question is the array of pixels which constitute a digital graphic output device (a screen or monitor). In some contexts, the term bitmap implies one bit per pixel, whereas pixmap is used for images with multiple bits per pixel.
A bitmap is a type of memory organization or image file format used to store digital images. The term bitmap comes from the computer programming terminology, meaning just a map of bits, a spatially mapped array of bits. Now, along with pixmap, it commonly refers to the similar concept of a spatially mapped array of pixels. Raster images in general may be referred to as bitmaps or pixmaps, whether synthetic or photographic, in files or memory.
Many graphical user interfaces use bitmaps in their built-in graphics subsystems; for example, the Microsoft Windows and OS/2 platforms' GDI subsystem, where the specific format used is the Windows and OS/2 bitmap file format, usually named with the file extension of .BMP (or .DIB for device-independent bitmap). Besides BMP, other file formats that store literal bitmaps include InterLeaved Bitmap (ILBM), Portable Bitmap (PBM), X Bitmap (XBM), and Wireless Application Protocol Bitmap (WBMP). Similarly, most other image file formats, such as JPEG, TIFF, PNG, and GIF, also store bitmap images (as opposed to vector graphics), but they are not usually referred to as bitmaps, since they use compressed formats internally.
Pixel storage
In typical uncompressed bitmaps, image pixels are generally stored with a variable number of bits per pixel which identify its color, the color depth. Pixels of 8 bits and fewer |
https://en.wikipedia.org/wiki/Neozealandia | Neozealandia is a biogeographic province of the Antarctic Realm according to the classification developed by Miklos Udvardy in 1975.
Concept
Neozealandia consists primarily of the major islands of New Zealand, including North Island and South Island, as well as Chatham Island. The southernmost areas of Neozealandia overlap with the Insulantarctica province, which includes the New Zealand Subantarctic Islands.
Both New Zealand and the New Zealand Subantarctic Islands are remnants of a submerged subcontinent known as Zealandia, which gradually submerged itself beneath the sea after breaking off from the Gondwanan land masses of Antarctica and Australia. Due to isolation, the entire Zealandia archipelago has remained virtually free of mammals (except for bats and a few others) and invasive alien species. Since only very few mammals and other alien species have actually colonized the islands of the Neozealandia province over the millions of years, the flora and fauna on most of the islands, including those of New Zealand itself, have remained almost exactly the same as they were when the original Gondwana supercontinent existed.
A couple of tuatara species survive in small numbers on small islets adjacent to New Zealand. Also, New Zealand has vestiges of ancient temperate rain forests with plant species, such as giant club mosses, tree ferns and Nothofagus trees, dating from the time when the Zealandia subcontinent split off from Gondwana. New Zealand grasslands are dominated by vast spreadings of tussock grass fed upon by the native ground parrots. Most of New Zealand's few mammals are like those frequenting Antarctic shores.
See also
Zealandia (continent) |
https://en.wikipedia.org/wiki/Seedbox | A seedbox is a high-bandwidth remote server for uploading and downloading of digital files from a P2P network. The bandwidth ranges generally from 100 Mbit/s to 20 Gbit/s. After the seedbox has acquired the files, people with access to the seedbox can download the file to their personal computers.
Function
Seedboxes generally use the BitTorrent protocol, although they have also been used on the eDonkey2000 network. Seedboxes are usually connected to a high-speed network, often with a throughput of 100 Mbit/s or even 1 Gbit/s. Some providers are testing and offering 10 Gbit/s shared servers, while others are developing other systems that will allow users to scale their needs on the fly. Once the seedbox has a full copy of the files, they can be downloaded at high speeds to a user's personal computer via the HTTP, FTP, SFTP, or rsync protocols. This allows for anonymity and, usually, removes the need to worry about share ratio. More expensive seedboxes may support VNC or Remote Desktop Protocol, allowing many popular clients to be run remotely. Other seedboxes are special-purpose and run a variety of torrent-specific software including web interfaces of popular clients like Transmission, rTorrent, Deluge, and μTorrent, as well as the TorrentFlux web interface clients. Mobile interface support is also offered by clients such as Transmission.
Seedboxes on high-speed networks are typically able to download large files within minutes, provided that the swarm can actually handle such a high upload bandwidth. Seedboxes generally have download and upload speeds of 100 Mbit/s. This means that a 1 GB file can finish downloading in under half a minute. That same 1 GB file can be uploaded to other users in the same amount of time, creating a 1:1 share ratio for that individual file. The ability to transfer files so quickly makes them very attractive to the P2P communities. Because of the mentioned high speeds, seedboxes tend to be popular when using private torrent trackers, w |
https://en.wikipedia.org/wiki/Tennenbaum%27s%20theorem | Tennenbaum's theorem, named for Stanley Tennenbaum who presented the theorem in 1959, is a result in mathematical logic that states that no countable nonstandard model of first-order Peano arithmetic (PA) can be recursive (Kaye 1991:153ff).
Recursive structures for PA
A structure in the language of PA is recursive if there are recursive functions and from to , a recursive two-place relation <M on , and distinguished constants such that
where indicates isomorphism and is the set of (standard) natural numbers. Because the isomorphism must be a bijection, every recursive model is countable. There are many nonisomorphic countable nonstandard models of PA.
Statement of the theorem
Tennenbaum's theorem states that no countable nonstandard model of PA is recursive. Moreover, neither the addition nor the multiplication of such a model can be recursive.
Proof sketch
This sketch follows the argument presented by Kaye (1991). The first step in the proof is to show that, if M is any countable nonstandard model of PA, then the standard system of M (defined below) contains at least one nonrecursive set S. The second step is to show that, if either the addition or multiplication operation on M were recursive, then this set S would be recursive, which is a contradiction.
Through the methods used to code ordered tuples, each element can be viewed as a code for a set of elements of M. In particular, if we let be the ith prime in M, then . Each set will be bounded in M, but if x is nonstandard then the set may contain infinitely many standard natural numbers. The standard system of the model is the collection . It can be shown that the standard system of any nonstandard model of PA contains a nonrecursive set, either by appealing to the incompleteness theorem or by directly considering a pair of recursively inseparable r.e. sets (Kaye 1991:154). These are disjoint r.e. sets so that there is no recursive set with and .
For the latter construction, be |
https://en.wikipedia.org/wiki/Senior%E2%80%93L%C3%B8ken%20syndrome | Senior–Løken syndrome is a congenital eye disorder, first characterized in 1961. It is a rare, ciliopathic, autosomal recessive disorder characterized by juvenile nephronophthis and progressive eye disease.
Genetics
Genes involved include:
Pathophysiology
The cause of Senior–Løken syndrome type 5 has been identified to mutation in the NPHP1 gene which adversely affects the protein formation mechanism of the cilia.
Relation to other rare genetic disorders
Recent findings in genetic research have suggested that a large number of genetic disorders, both genetic syndromes and genetic diseases, that were not previously identified in the medical literature as related, may be, in fact, highly related in the genetypical root cause of the widely varying, phenotypically-observed disorders. Such diseases are becoming known as ciliopathies. Known ciliopathies include primary ciliary dyskinesia, Bardet–Biedl syndrome, polycystic kidney and liver disease, nephronophthisis, Alström syndrome, Meckel–Gruber syndrome and some forms of retinal degeneration.
Diagnosis
Treatment |
https://en.wikipedia.org/wiki/Richard%20Mollier | Richard Mollier (; 30 November 1863, Triest – 13 March 1935, Dresden) was a German professor of Applied Physics and Mechanics in Göttingen and Dresden, a pioneer of experimental research in thermodynamics, particularly for water, steam, and moist air.
Mollier diagrams (enthalpy-entropy charts) are routinely used by engineers in the design work associated with power plants (fossil or nuclear), compressors, steam turbines, refrigeration systems, and air conditioning equipment to visualize the working cycles of thermodynamic systems.
The Mollier diagram of enthalpy of moist air versus its water vapor content (h–x diagram) is equivalent to the Psychrometrics Chart commonly used in the US and Britain.
Education and career
After attending Gymnasium (grammar school) in Triest, he commenced studies in mathematics and physics at the university of Graz (Austria), continuing at the Technical University of Munich. He presented his first publications as an outside lecturer for Theoretical Mechanics. After a short stint in Göttingen, he succeeded Gustav Zeuner in 1897 as Professor of Mechanical Engineering at the Technischen Hochschule Dresden. His 1904 publication New Graphs for Technical Thermodynamics greatly simplified calculations involving thermodynamic processes. His New Tables and Diagrams for Water Vapor, first published in 1906, appeared in six further editions through 1932, as he updated it to reflect new developments.
Honors
At the 1923 Thermodynamics Conference held in Los Angeles, it was decided to name, in his honor, as a “Mollier graph” any thermodynamic diagram using the Enthalpy h as one of its axes. Example: the h–s graph for steam or the h–x graph for moist air.
Publications
Die Entropie der Wärme (The Entropy of Heat) 1895
Dampftafeln und Diagramme des Kohlendioxid (Vapor Tables and Diagrams for Carbon Dioxide) 1896
Neue Diagramme zur Technischen Wärmelehre (New Graphs for Technical Thermodynamics) 1904
Neue Tabellen und Diagramme für Wasserdampf (Ne |
https://en.wikipedia.org/wiki/Tebuconazole | Tebuconazole is a triazole fungicide used agriculturally to treat plant pathogenic fungi.
Environmental Hazards
Though the U.S. Food and Drug Administration considers this fungicide to be safe for humans, it may still pose a risk. It is listed as a possible carcinogen in the United States Environmental Protection Agency Office of Pesticide Programs carcinogen list with a rating of C (possible carcinogen). Its acute toxicity is moderate. According to the World Health Organization toxicity classification, it is listed as III, which means slightly hazardous.
Due to the potential for endocrine-disrupting effects, tebuconazole was assessed by the Swedish Chemicals Agency as being potentially removed from the market by EU regulation 1107/2009. |
https://en.wikipedia.org/wiki/M%C3%B6bius%E2%80%93Kantor%20graph | In the mathematical field of graph theory, the Möbius–Kantor graph is a symmetric bipartite cubic graph with 16 vertices and 24 edges named after August Ferdinand Möbius and Seligmann Kantor. It can be defined as the generalized Petersen graph G(8,3): that is, it is formed by the vertices of an octagon, connected to the vertices of an eight-point star in which each point of the star is connected to the points three steps away from it.
Möbius–Kantor configuration
asked whether there exists a pair of polygons with p sides each, having the property that the vertices of one polygon lie on the lines through the edges of the other polygon, and vice versa. If so, the vertices and edges of these polygons would form a projective configuration. For p = 4 there is no solution in the Euclidean plane, but found pairs of polygons of this type, for a generalization of the problem in which the points and edges belong to the complex projective plane. That is, in Kantor's solution, the coordinates of the polygon vertices are complex numbers. Kantor's solution for p = 4, a pair of mutually-inscribed quadrilaterals in the complex projective plane, is called the Möbius–Kantor configuration. The Möbius–Kantor graph derives its name from being the Levi graph of the Möbius–Kantor configuration. It has one vertex per point and one vertex per triple, with an edge connecting two vertices if they correspond to a point and to a triple that contains that point.
The configuration may also be described algebraically in terms of the abelian group with nine elements.
This group has four subgroups of order three (the subsets of elements of the form , , , and ), each of which can be used to partition the nine group elements into three cosets of three elements per coset. These nine elements and twelve cosets form a configuration, the Hesse configuration. Removing the zero element and the four cosets containing zero gives rise to the Möbius–Kantor configuration.
As a subgraph
The Möbius–Kantor gr |
https://en.wikipedia.org/wiki/M%C3%B6bius%E2%80%93Kantor%20configuration | In geometry, the Möbius–Kantor configuration is a configuration consisting of eight points and eight lines, with three points on each line and three lines through each point. It is not possible to draw points and lines having this pattern of incidences in the Euclidean plane, but it is possible in the complex projective plane.
Coordinates
asked whether there exists a pair of polygons with p sides each, having the property that the vertices of one polygon lie on the lines through the edges of the other polygon, and vice versa. If so, the vertices and edges of these polygons would form a projective configuration. For there is no solution in the Euclidean plane, but found pairs of polygons of this type, for a generalization of the problem in which the points and edges belong to the complex projective plane. That is, in Kantor's solution, the coordinates of the polygon vertices are complex numbers. Kantor's solution for , a pair of mutually-inscribed quadrilaterals in the complex projective plane, is called the Möbius–Kantor configuration.
supplies the following simple complex projective coordinates for the eight points of the Möbius–Kantor configuration:
(1,0,0), (0,0,1), (ω, −1, 1), (−1, 0, 1),
(−1,ω2,1), (1,ω,0), (0,1,0), (0,−1,1),
where ω denotes a complex cube root of 1.
The eight points and eight lines of the Möbius–Kantor configuration, with these coordinates, form the eight vertices and eight 3-edges of the complex polygon 3{3}3. Coxeter named it a Möbius–Kantor polygon.
Abstract incidence pattern
More abstractly, the Möbius–Kantor configuration can be described as a system of eight points and eight triples of points such that each point belongs to exactly three of the triples. With the additional conditions (natural to points and lines) that no pair of points belong to more than one triple and that no two triples have more than one point in their intersection, any two systems of this type are equivalent under some permutation of the points. That is, th |
https://en.wikipedia.org/wiki/Gorgonin | Gorgonin is a complex protein that makes up the horny skeleton of the holaxonia suborder of gorgonians. It frequently contains appreciable quantities of bromine, iodine, and tyrosine.
Scientific use
Research has shown that measurements of the gorgonin and calcite within species of gorgonia can be useful in paleoclimatology and paleoceanography. Studies of the growth, composition, and structure of the skeleton of certain gorgonia species, (e.g., Primnoa resedaeformis, and Plexaurella dichotoma) can be highly correlated with seasonal and climatic variation. |
https://en.wikipedia.org/wiki/Institutiones%20calculi%20integralis | Institutiones calculi integralis (Foundations of integral calculus) is a three-volume textbook written by Leonhard Euler and published in 1768. It was on the subject of integral calculus and contained many of Euler's discoveries about differential equations.
See also
Institutiones calculi differentialis
External links
Full text available from Archive.org.
Full text (1768) available from books.google.com.
provides a complete English translation of Euler's Institutiones calculi integralis by Ian Bruce.
German translation Vollständige Anleitung zur Integralrechnung (1828) available from e-rara.ch.
1768 non-fiction books
18th-century Latin books
Mathematics textbooks
Leonhard Euler |
https://en.wikipedia.org/wiki/Myarc%20Disk%20Operating%20System | MDOS (short for Myarc Disk Operating System) is an operating system commercialized by Myarc. It was designed and implemented specifically for the Geneve 9640 by Paul Charlton. MDOS was designed to fully emulate the TI-99/4A computer while providing an advanced (for its time) virtual memory operating environment with full support for mouse, GUI, and complex mathematical applications.
In 1993, Beery Miller the publisher of 9640 News, organized a group of Geneve 9640 owners and was able to purchase all rights to the source code for MDOS, Advanced Basic, the PSYSTEM runtime module, and the GPL Interpreter from Myarc and Paul Charlton.
Over the years, MDOS has been updated by individuals including T. Tesch, Clint Pulley, Alan Beard, John Johnson, James Schroeder, Mike Maksimik, James Uzzell, Tony Knerr, Beery Miller, and others. Support adding SCSI, IDE, and larger ramdisks were added in the earlier years from the buyout. In late 2020 and early 2021 with the release of the TIPI for the TI-99/4A, the Geneve was interfaced with the TIPI and a Raspberry Pi providing TCP socket access and nearly unlimited high speed hard-drive like file access.
A small but active base of users still exist on www.Atariage.com as of 2021 where T. Tesch, Beery Miller, and others provide support.
MDOS was written specifically for the TMS9995 16-bit CPU and the Yamaha V9938 video display processor.
All source code for the Geneve 9640 is in the public domain.
External links
Myarc Geneve 9640 Family Computer
Myarc Geneve 9640 Software
9640News Software
Geneve 9640 - a close look at the system board and sales flyer
Geneve 9640 at the Home Computer Museum
Geneve items @ Richard Bell's Company
Photo of Geneve 9640 booting - HD-based vertical PEB system belonging to Gregory McGill
Photo of Geneve showing swan image - from Mainbyte
1988 Dallas TI Fair - mixed Geneve 9640 and TI-99/4A photos
Geneve 9640 - at old-computers.com
Heatwave BBS - Telnet BBS operating on a Myarc Geneve 9640 under MDOS. |
https://en.wikipedia.org/wiki/Communal%20roosting | Communal roosting is an animal behavior where a group of individuals, typically of the same species, congregate in an area for a few hours based on an external signal and will return to the same site with the reappearance of the signal. Environmental signals are often responsible for this grouping, including nightfall, high tide, or rainfall. The distinction between communal roosting and cooperative breeding is the absence of chicks in communal roosts. While communal roosting is generally observed in birds, the behavior has also been seen in bats, primates, and insects. The size of these roosts can measure in the thousands to millions of individuals, especially among avian species.
There are many benefits associated with communal roosting including: increased foraging ability, decreased thermoregulatory demands, decreased predation, and increased conspecific interactions. While there are many proposed evolutionary concepts for how communal roosting evolved, no specific hypothesis is currently supported by the scientific community as a whole.
Evolution
One of the adaptive explanations for communal roosting is the hypothesis that individuals are benefited by the exchange of information at communal roosts. This idea is known as the information center hypothesis (ICH) and proposed by Peter Ward and Amotz Zahavi in 1973. It states that bird assemblages such as communal roosts act as information hubs for distributing knowledge about food source location. When food patch knowledge is unevenly distributed amongst certain flock members, the other "clueless" flock members can follow and join these knowledgeable members to find good feeding locations. To quote Ward and Zahavi on the evolutionary reasons as to how communal roosts came about, "...communal roosts, breeding colonies and certain other bird assemblages have been evolved primarily for the efficient exploitation of unevenly-distributed food sources by serving as ' information-centres.' "
The two strategies h |
https://en.wikipedia.org/wiki/Sullivan%20conjecture | In mathematics, Sullivan conjecture or Sullivan's conjecture on maps from classifying spaces can refer to any of several results and conjectures prompted by homotopy theory work of Dennis Sullivan. A basic theme and motivation concerns the fixed point set in group actions of a finite group . The most elementary formulation, however, is in terms of the classifying space of such a group. Roughly speaking, it is difficult to map such a space continuously into a finite CW complex in a non-trivial manner. Such a version of the Sullivan conjecture was first proved by Haynes Miller. Specifically, in 1984, Miller proved that the function space, carrying the compact-open topology, of base point-preserving mappings from to is weakly contractible.
This is equivalent to the statement that the map → from X to the function space of maps → , not necessarily preserving the base point, given by sending a point of to the constant map whose image is is a weak equivalence. The mapping space is an example of a homotopy fixed point set. Specifically, is the homotopy fixed point set of the group acting by the trivial action on . In general, for a group acting on a space , the homotopy fixed points are the fixed points of the mapping space of maps from the universal cover of to under the -action on given by in acts on a map in by sending it to . The -equivariant map from to a single point induces a natural map η: → from the fixed points to the homotopy fixed points of acting on . Miller's theorem is that η is a weak equivalence for trivial -actions on finite-dimensional CW complexes. An important ingredient and motivation for his proof is a result of Gunnar Carlsson on the homology of as an unstable module over the Steenrod algebra.
Miller's theorem generalizes to a version of Sullivan's conjecture in which the action on is allowed to be non-trivial. In, Sullivan conjectured that η is a weak equivalence after a certain p-completion procedure due to A. Bousfi |
https://en.wikipedia.org/wiki/Domine%20Database | DOMINE is a database of known and predicted protein domain interactions (or domain-domain interactions). It contains interactions observed in PDB crystal structures, and those predicted by several computational approaches. DOMINE uses Pfam HMM profiles for protein domain definitions. The DOMINE database contains 26,219 interactions among 5,410 domains), which includes 6,634 known interactions inferred from PDB structure data. |
https://en.wikipedia.org/wiki/Medicon%20Valley | Medicon Valley is a leading international life-sciences cluster in Europe, spanning the Greater Copenhagen region of eastern Denmark and southern Sweden. It is one of Europe's strongest life science clusters, with many life science companies and research institutions located within a relatively small geographical area. The name has officially been in use since 1997.
Major life science sectors of the Medicon Valley cluster includes pharmacology, biotechnology, health tech and medical technology. It is specifically known for its research strengths in the areas of neurological disorders, inflammatory diseases, cancer and diabetes.
Background and activities
The population of Medicon Valley reaches close to 4 million inhabitants. In 2008, 60% of Scandinavian pharmaceutical companies were located in the region. The area includes 17 universities, 32 hospitals, and more than 400 life science companies. 20 are large pharmaceutical or medical technology firms and 170 are dedicated biotechnology firms. Between 1998 and 2008, 100 new biotechnology and medical technology companies were created here. The biotechnology industry alone employs around 41,000 people in the region, 7,000 of whom are academic researchers.
International companies with major research centres in the region include Novo Nordisk, Baxter, Lundbeck, LEO Pharma, HemoCue and Ferring Pharmaceuticals. There are more than 7 science parks in the region, all with a significant focus on life science, including the Medicon Village in Lund, established in 2010. Companies within Medicon Valley account for more than 20% of the total GDP of Denmark and Sweden combined.
Medicon Valley is promoted by Invest in Skåne and Copenhagen Capacity.
Many of the region's universities have a strong heritage in biological and medical research and have produced several Nobel Prize winners. The almost century-long presence of a number of research-intensive and fully integrated pharmaceutical companies, such as Novo Nordisk, |
https://en.wikipedia.org/wiki/Volari%20Duo | On September 15, 2003 XGI Technology Inc introduced the Volari Duo V8 Ultra and the Volari Duo V5 Ultra. These dual GPU graphics cards while impressive looking failed to compete with the single core GPU cards put out by NVIDIA and ATI and disappeared from the market. |
https://en.wikipedia.org/wiki/Generalised%20metric | In mathematics, the concept of a generalised metric is a generalisation of that of a metric, in which the distance is not a real number but taken from an arbitrary ordered field.
In general, when we define metric space the distance function is taken to be a real-valued function. The real numbers form an ordered field which is Archimedean and order complete. These metric spaces have some nice properties like: in a metric space compactness, sequential compactness and countable compactness are equivalent etc. These properties may not, however, hold so easily if the distance function is taken in an arbitrary ordered field, instead of in
Preliminary definition
Let be an arbitrary ordered field, and a nonempty set; a function is called a metric on if the following conditions hold:
if and only if ;
(symmetry);
(triangle inequality).
It is not difficult to verify that the open balls form a basis for a suitable topology, the latter called the metric topology on with the metric in
In view of the fact that in its order topology is monotonically normal, we would expect to be at least regular.
Further properties
However, under axiom of choice, every general metric is monotonically normal, for, given where is open, there is an open ball such that Take Verify the conditions for Monotone Normality.
The matter of wonder is that, even without choice, general metrics are monotonically normal.
proof.
Case I: is an Archimedean field.
Now, if in open, we may take where and the trick is done without choice.
Case II: is a non-Archimedean field.
For given where is open, consider the set
The set is non-empty. For, as is open, there is an open ball within Now, as is non-Archimdedean, is not bounded above, hence there is some such that for all Putting we see that is in
Now define We would show that with respect to this mu operator, the space is monotonically normal. Note that
If is not in (open set containing ) and is not in (ope |
https://en.wikipedia.org/wiki/Rate%20of%20reinforcement | In behaviorism, rate of reinforcement is number of reinforcements per time, usually per minute. Symbol of this rate is usually Rf. Its first major exponent was B.F. Skinner (1939). It is used in the Matching Law.
Rf = # of reinforcements/unit of time = SR+/t
See also
Rate of response |
https://en.wikipedia.org/wiki/Rate%20of%20response | In behaviorism, rate of response is a ratio between two measurements with different units. Rate of responding is the number of responses per minute, or some other time unit. It is usually written as R. Its first major exponent was B.F. Skinner (1939). It is used in the Matching Law.
R = # of Responses/Unit of time = B/t
See also
Rate of reinforcement |
https://en.wikipedia.org/wiki/Hofstadter%20sequence | In mathematics, a Hofstadter sequence is a member of a family of related integer sequences defined by non-linear recurrence relations.
Sequences presented in Gödel, Escher, Bach: an Eternal Golden Braid
The first Hofstadter sequences were described by Douglas Richard Hofstadter in his book Gödel, Escher, Bach. In order of their presentation in chapter III on figures and background (Figure-Figure sequence) and chapter V on recursive structures and processes (remaining sequences), these sequences are:
Hofstadter Figure-Figure sequences
The Hofstadter Figure-Figure (R and S) sequences are a pair of complementary integer sequences defined as follows
with the sequence defined as a strictly increasing series of positive integers not present in . The first few terms of these sequences are
R: 1, 3, 7, 12, 18, 26, 35, 45, 56, 69, 83, 98, 114, 131, 150, 170, 191, 213, 236, 260, ...
S: 2, 4, 5, 6, 8, 9, 10, 11, 13, 14, 15, 16, 17, 19, 20, 21, 22, 23, 24, 25, ...
Hofstadter G sequence
The Hofstadter G sequence is defined as follows
The first few terms of this sequence are
0, 1, 1, 2, 3, 3, 4, 4, 5, 6, 6, 7, 8, 8, 9, 9, 10, 11, 11, 12, 12, ...
Hofstadter H sequence
The Hofstadter H sequence is defined as follows
The first few terms of this sequence are
0, 1, 1, 2, 3, 4, 4, 5, 5, 6, 7, 7, 8, 9, 10, 10, 11, 12, 13, 13, 14, ...
Hofstadter Female and Male sequences
The Hofstadter Female (F) and Male (M) sequences are defined as follows
The first few terms of these sequences are
F: 1, 1, 2, 2, 3, 3, 4, 5, 5, 6, 6, 7, 8, 8, 9, 9, 10, 11, 11, 12, 13, ...
M: 0, 0, 1, 2, 2, 3, 4, 4, 5, 6, 6, 7, 7, 8, 9, 9, 10, 11, 11, 12, 12, ...
Hofstadter Q sequence
The Hofstadter Q sequence is defined as follows
The first few terms of the sequence are
1, 1, 2, 3, 3, 4, 5, 5, 6, 6, 6, 8, 8, 8, 10, 9, 10, 11, 11, 12, ...
Hofstadter named the terms of the sequence "Q numbers"; thus the Q number of 6 is 4. The presentation of the Q sequence in Hofstadter's book is actually the first k |
https://en.wikipedia.org/wiki/Semantics%20of%20Business%20Vocabulary%20and%20Business%20Rules | The Semantics of Business Vocabulary and Business Rules (SBVR) is an adopted standard of the Object Management Group (OMG) intended to be the basis for formal and detailed natural language declarative description of a complex entity, such as a business. SBVR is intended to formalize complex compliance rules, such as operational rules for an enterprise, security policy, standard compliance, or regulatory compliance rules. Such formal vocabularies and rules can be interpreted and used by computer systems. SBVR is an integral part of the OMG's model-driven architecture (MDA).
Overview
The SBVR standard defines the vocabulary and rules for documenting the semantics of business vocabularies, business facts, and business rules; as well as an XMI schema for the interchange of business vocabularies and business rules among organizations and between software tools.
SBVR allows the production of business vocabularies and rules; vocabulary plus rules constitute a shared domain model with the same expressive power of standard ontological languages. SBVR allows multilingual development, since it is based on separation between
symbols and their meaning. SBVR enables making business rules accessible to software tools, including tools that support the business experts in creating, finding, validating, and managing business rules, and tools that support the information technology experts in converting business rules into implementation rules for automated systems.
SBVR uses OMG's Meta-Object Facility (MOF) to provide interchange capabilities MOF/XMI mapping rules, enable
generating MOF-compliant models and define an XML schema. SBVR proposes Structured English as one of possibly many notations that can map to the SBVR Metamodel.
SBVR and Knowledge Discovery Metamodel (KDM) are designed as two parts of a unique OMG Technology Stack for software analytics related to existing software systems. KDM defines an ontology related to software artifacts and thus provides an initial |
https://en.wikipedia.org/wiki/CAMFAK%20syndrome | CAMFAK syndrome (or CAMAK syndrome) is an acronym used to describe a rare inherited neurologic disease, characterized by peripheral and central demyelination of nerves, similar to that seen in Cockayne syndrome. The name "CAMFAK" comes from the first letters of the characteristic findings of the disease: cataracts, microcephaly, failure to thrive, and kyphoscoliosis. The disease may occur with or without failure to thrive and arthrogryposis.
Presentation
Low birth weight and a bird-like face may be the first signs. Severe intellectual deficit and death within the first decade are typical.
Genetics
CAMFAK syndrome is inherited in an autosomal recessive manner. This means the defective gene responsible for the disorder is located on an autosome, and two copies of the defective gene (one inherited from each parent) are required in order to be born with the disorder. The parents of an individual with an autosomal recessive disorder both carry one copy of the defective gene, but usually do not experience any signs or symptoms of the disorder.
Treatment |
https://en.wikipedia.org/wiki/Sodium%20ferrocyanide | Sodium ferrocyanide is the sodium salt of the coordination compound of formula [Fe(CN)6]4−. In its hydrous form, Na4Fe(CN)6 (sodium ferrocyanide decahydrate), it is sometimes known as yellow prussiate of soda. It is a yellow crystalline solid that is soluble in water and insoluble in alcohol. The yellow color is the color of ferrocyanide anion. Despite the presence of the cyanide ligands, sodium ferrocyanide has low toxicity (acceptable daily intake 0–0.025 mg/kg body weight). The ferrocyanides are less toxic than many salts of cyanide, because they tend not to release free cyanide. However, like all ferrocyanide salt solutions, addition of an acid or exposure to UV light can result in the production of hydrogen cyanide gas, which is extremely toxic.
Uses
When combined with an Fe(III) salt, it converts to a deep blue pigment called Prussian blue, Fe[Fe(CN)]. It is used as a stabilizer for the coating on welding rods. In the petroleum industry, it is used for removal of mercaptans.
In the EU, ferrocyanides (E 535–538) were, as of 2018, solely authorized as additives in salt and salt substitutes, where they serve as anticaking agents. The kidneys are the organ susceptible to ferrocyanide toxicity, but according to the EFSA, ferrocyanides are of no safety concern at the levels at which they are used.
Production
Sodium ferrocyanide is produced industrially from hydrogen cyanide, ferrous chloride, and calcium hydroxide, the combination of which affords Ca2[Fe(CN)6]. A solution of this salt is then treated with sodium salts to precipitate the mixed calcium-sodium salt CaNa2[Fe(CN)6]2, which in turn is treated with sodium carbonate to give the tetrasodium salt. |
https://en.wikipedia.org/wiki/Heavy%20baryon%20chiral%20perturbation%20theory | Heavy baryon chiral perturbation theory (HBChPT) is an effective quantum field theory used to describe the interactions of pions and nucleons/baryons. It is somewhat an extension of chiral perturbation theory (ChPT) which just describes the low-energy interactions of pions. In a richer theory one would also like to describe the interactions of baryons with pions. A fully relativistic Lagrangian of nucleons is non-predictive as the quantum corrections, or loop diagrams can count as quantities and therefore do not describe higher-order corrections.
Because the baryons are much heavier than the pions, HBChPT rests on the use of a nonrelativistic description of baryons compared to that of the pions. Therefore, higher order terms in the HBChPT Lagrangian come in at higher orders of where is the baryon mass.
Quantum chromodynamics |
https://en.wikipedia.org/wiki/FRACTRAN | FRACTRAN is a Turing-complete esoteric programming language invented by the mathematician John Conway. A FRACTRAN program is an ordered list of positive fractions together with an initial positive integer input n. The program is run by updating the integer n as follows:
for the first fraction f in the list for which nf is an integer, replace n by nf
repeat this rule until no fraction in the list produces an integer when multiplied by n, then halt.
gives the following FRACTRAN program, called PRIMEGAME, which finds successive prime numbers:
Starting with n=2, this FRACTRAN program generates the following sequence of integers:
2, 15, 825, 725, 1925, 2275, 425, 390, 330, 290, 770, ...
After 2, this sequence contains the following powers of 2:
The exponent part of these powers of two are primes, 2, 3, 5, etc.
Understanding a FRACTRAN program
A FRACTRAN program can be seen as a type of register machine where the registers are stored in prime exponents in the argument n.
Using Gödel numbering, a positive integer n can encode an arbitrary number of arbitrarily large positive integer variables. The value of each variable is encoded as the exponent of a prime number in the prime factorization of the integer. For example, the integer
represents a register state in which one variable (which we will call v2) holds the value 2 and two other variables (v3 and v5) hold the value 1. All other variables hold the value 0.
A FRACTRAN program is an ordered list of positive fractions. Each fraction represents an instruction that tests one or more variables, represented by the prime factors of its denominator. For example:
tests v2 and v5. If and , then it subtracts 2 from v2 and 1 from v5 and adds 1 to v3 and 1 to v7. For example:
Since the FRACTRAN program is just a list of fractions, these test-decrement-increment instructions are the only allowed instructions in the FRACTRAN language. In addition the following restrictions apply:
Each time an instruction is execut |
https://en.wikipedia.org/wiki/Clarkson%27s%20inequalities | In mathematics, Clarkson's inequalities, named after James A. Clarkson, are results in the theory of Lp spaces. They give bounds for the Lp-norms of the sum and difference of two measurable functions in Lp in terms of the Lp-norms of those functions individually.
Statement of the inequalities
Let (X, Σ, μ) be a measure space; let f, g : X → R be measurable functions in Lp. Then, for 2 ≤ p < +∞,
For 1 < p < 2,
where
i.e., q = p ⁄ (p − 1).
The case p ≥ 2 is somewhat easier to prove, being a simple application of the triangle inequality and the convexity of |
https://en.wikipedia.org/wiki/Asymmetric%20carbon | In stereochemistry, an asymmetric carbon is a carbon atom that is bonded to four different types of atoms or groups of atoms. The four atoms and/or groups attached to the carbon atom can be arranged in space in two different ways that are mirror images of each other, and which lead to so-called left-handed and right-handed versions (stereoisomers) of the same molecule. Molecules that cannot be superimposed on their own mirror image are said to be chiral; as the asymmetric carbon is the center of this chirality, it is also known as a chiral carbon.
As an example, malic acid () has 4 carbon atoms but just one of them is asymmetric. The asymmetric carbon atom, bolded in the formula, is the one attached to two carbon atoms, an oxygen atom, and a hydrogen atom. One may initially be inclined to think this atom is not asymmetric because it is attached to two carbon atoms, but because those two carbon atoms are not attached to exactly the same things, there are two different groups of atoms that the carbon atom in question is attached to, therefore making it an asymmetric carbon atom:
Knowing the number of asymmetric carbon atoms, one can calculate the maximum possible number of stereoisomers for any given molecule as follows:
If is the number of asymmetric carbon atoms then the maximum number of isomers = (Le Bel-van't Hoff rule)
This is a corollary of Le Bel and van't Hoff's simultaneously announced conclusions, in 1874, that the most probable orientation of the bonds of a carbon atom linked to four groups or atoms is toward the apexes of a tetrahedron, and that this accounted for all then-known phenomena of molecular asymmetry (which involved a carbon atom bearing four different atoms or groups).
A tetrose with 2 asymmetric carbon atoms has 22 = 4 stereoisomers:
An aldopentose with 3 asymmetric carbon atoms has 23 = 8 stereoisomers:
An aldohexose with 4 asymmetric carbon atoms has 24 = 16 stereoisomers: |
https://en.wikipedia.org/wiki/Creola%20bodies | Creola bodies are a histopathologic finding indicative of asthma. Found in a patient's sputum, they are ciliated columnar cells sloughed from the bronchial mucosa of a patient with asthma. Other common findings in the sputum of asthma patients include Charcot-Leyden crystals, Curschmann's Spirals, and eosinophils (and excessive amounts of sputum).
Yoshihara et al. reported 60% of pediatric asthmatic patients demonstrating acute symptoms were found to have creola bodies in their sputum. These patients had increased levels of neutrophil-mediated cytokine activity concluding that "epithelial damage is associated with a locally enhanced chemotactic signal for and activity of neutrophils, but not eosinophils, during acute exacerbations of paediatric asthma."
Ogata et al. found significant correlations among the CrB score, the concentration of sputum ECP and %FEV1.0 (p less than 0.001). The CrB score on the day of clinical appraisal significantly correlated with the number 6f days of treatment needed for remission. These results were in keeping with the hypothesis that eosinophils cause desquamation of respiratory epithelial cells resulting in prolongation of asthmatic attacks. Observation of CrB seemed to be useful as a marker of duration of asthmatic attacks. |
https://en.wikipedia.org/wiki/Null%20cell | Null cells are large granular lymphocytes that develop inside the bone marrow and attack pathogens and abnormal cells. These cells do not have receptors like one would typically find on either mature B cells or T cells. There are common characteristics that null cells lack to be categorized into surface markers in mature B-cells and T-cells. Null cells are, in fact, T cells that fail to express CD2. Even though they are large granular lymphocytes, they are still relatively small, chromophobic cells. When the term chromophobic is used, it means when viewed under a light microscope. These cells appear to be small. Null cells are present in small numbers in lymphoid organs but are often found in nonlymphoid tissues. While they do not contain known anterior pituitary hormones in their cytoplasm, they do contain secretory granules that may contain various properties like; hormone pieces, forerunners, or biologically inactive substances. These cells are seen as a representation of resting cells, precursors of various cell types, or an unknown cell type.
Null cells account for a small proportion of the lymphocytes found in an organism. They are quick to act in the presence of pathogens like viruses and attack viral-infected or tumor cells in a non-MHC-restricted manner. The number of null cells has increased over time in subpopulations of mononuclear cells. Mononuclear cells are blood cells that have a round and single nucleus like lymphocytes and monocytes. They are called peripheral blood mononuclear cells (PBMC) when isolated from circulating blood. However, they are found elsewhere, like the umbilical cord, spleen, and bone marrow. With null cells increasing during an immune response, the changes are believed to be due to defects involved with an aging immune system and can be used as a representation of a healthy immune system in the healthy aged group, which is linked to survival.
Null cells are in small numbers in lymphoid organs but are often found in nonlymph |
https://en.wikipedia.org/wiki/Ferruginous%20body | A ferruginous body is a histopathologic finding in interstitial lung disease suggestive of significant asbestos exposure (asbestosis). Asbestos exposure is associated with occupations such as shipbuilding, roofing, plumbing, and construction.
They appear as small brown nodules in the septum of the alveolus. Ferruginous bodies are typically indicative of asbestos inhalation (when the presence of asbestos is verified they are called "asbestos bodies"). In this case they are fibers of asbestos coated with an iron-rich material derived from proteins such as ferritin and hemosiderin. Ferruginous bodies are believed to be formed by macrophages that have phagocytosed and attempted to digest the fibers.
Additional images |
https://en.wikipedia.org/wiki/Winzapper | Winzapper is a freeware utility / hacking tool used to delete events from the Microsoft Windows NT 4.0 and Windows 2000 Security Log. It was developed by Arne Vidstrom as a proof-of-concept tool, demonstrating that once the Administrator account has been compromised, event logs are no longer reliable. According to Hacking Exposed: Windows Server 2003, Winzapper works with Windows NT/2000/2003.
Prior to Winzapper's creation, Administrators already had the ability to clear the Security log either through the Event Viewer or through third-party tools such as Clearlogs. However, Windows lacked any built-in method of selectively deleting events from the Security Log. An unexpected clearing of the log would likely be a red flag to system administrators that an intrusion had occurred. Winzapper would allow a hacker to hide the intrusion by deleting only those log events relevant to the attack. Winzapper, as publicly released, lacked the ability to be run remotely without the use of a tool such as Terminal Services. However, according to Arne Vidstrom, it could easily be modified for remote operation.
There is also an unrelated trojan horse by the same name.
Countermeasures
Winzapper creates a backup security log, "dummy.dat," at %systemroot%\system32\config. This file may be undeleted after an attack to recover the original log. Conceivably, however, a savvy user might copy a sufficiently large file over the dummy.dat file and thus irretrievably overwrite it. Winzapper causes the Event Viewer to become unusable until after a reboot, so an unexpected reboot may be a clue that Winzapper has recently been used. Another potential clue to a Winzapper-based attempt would be corruption of the Security Log (requiring it to be cleared), since there is always a small risk that Winzapper will do this.
According to WindowsNetworking.com, "One way to prevent rogue admins from using this tool on your servers is to implement a Software Restriction Policy using Group Policy that preve |
https://en.wikipedia.org/wiki/Mathematics%20and%20fiber%20arts | Ideas from mathematics have been used as inspiration for fiber arts including quilt making, knitting, cross-stitch, crochet, embroidery and weaving. A wide range of mathematical concepts have been used as inspiration including topology, graph theory, number theory and algebra. Some techniques such as counted-thread embroidery are naturally geometrical; other kinds of textile provide a ready means for the colorful physical expression of mathematical concepts.
Quilting
The IEEE Spectrum has organized a number of competitions on quilt block design, and several books have been published on the subject. Notable quiltmakers include Diana Venters and Elaine Ellison, who have written a book on the subject Mathematical Quilts: No Sewing Required. Examples of mathematical ideas used in the book as the basis of a quilt include the golden rectangle, conic sections, Leonardo da Vinci's Claw, the Koch curve, the Clifford torus, San Gaku, Mascheroni's cardioid, Pythagorean triples, spidrons, and the six trigonometric functions.
Knitting and crochet
Knitted mathematical objects include the Platonic solids, Klein bottles and Boy's surface.
The Lorenz manifold and the hyperbolic plane have been crafted using crochet. Knitted and crocheted tori have also been constructed depicting toroidal embeddings of the complete graph K7 and of the Heawood graph. The crocheting of hyperbolic planes has been popularized by the Institute For Figuring; a book by Daina Taimina on the subject, Crocheting Adventures with Hyperbolic Planes, won the 2009 Bookseller/Diagram Prize for Oddest Title of the Year.
Embroidery
Embroidery techniques such as counted-thread embroidery including cross-stitch and some canvas work methods such as Bargello make use of the natural pixels of the weave, lending themselves to geometric designs.
Weaving
Ada Dietz (1882 – 1950) was an American weaver best known for her 1949 monograph Algebraic Expressions in Handwoven Textiles, which defines weaving patterns based on |
https://en.wikipedia.org/wiki/Astellas%20Institute%20for%20Regenerative%20Medicine | Astellas Institute for Regenerative Medicine is a subsidiary of Astellas Pharma located in Marlborough, Massachusetts, US, developing stem cell therapies with a focus on diseases that cause blindness. It was formed in 1994 as a company named Advanced Cell Technology, Incorporated (ACT), which was renamed to Ocata Therapeutics in November 2014. In February 2016 Ocata was acquired by Astellas for $379 million USD.
History
Advanced Cell Technology was formed in 1994 and was led from 2005 to late 2010 by William M. Caldwell IV, Chairman and Chief Executive Officer. Upon Mr. Caldwell's death on December 13, 2010, Gary Rabin, a member of ACT's board of directors with experience in investment and capital raising, assumed the role of Chairman and CEO.
In 2007 the company's Chief Scientific Officer (CSO), Michael D. West, PhD, also founder of Geron left Ocata to join a regenerative medicine firm, BioTime as CEO. In 2008, for $250,000 plus royalties up to a total of $1 million, the company licensed its "ACTCellerate" technology to BioTime. Robert Lanza was appointed CSO.
On November 22, 2010, the company announced that it had received approval from the U.S. Food and Drug Administration (FDA) to initiate the first human clinical trial using embryonic stem cells to treat retinal diseases. A preliminary report of the trial published in 2012, and a follow-up article was published in February 2015.
In July 2014, Ocata announced that Paul K. Wotton, previously of Antares Pharma Inc (ATRS:NASDAQ CM), became President and Chief Executive Officer.
On August 27, 2014, Ocata announced a 1-100 reverse stock split of its common stock. Ocata was listed on NASDAQ in February 2015.
Research
Macular degeneration
On November 30, 2010, Ocata filed an Investigational New Drug application with the U.S. FDA for the first clinical trial using embryonic stem cells to regenerate retinal pigment epithelium to treat Dry Age-Related Macular Degeneration (Dry AMD). Dry AMD is the most commo |
https://en.wikipedia.org/wiki/Problem%20frames%20approach | Problem analysis or the problem frames approach is an approach to software requirements analysis. It was developed by British software consultant Michael A. Jackson in the 1990s.
History
The problem frames approach was first sketched by Jackson in his book Software Requirements & Specifications (1995) and in a number of articles in various journals devoted to software engineering. It has received its fullest description in his Problem Frames: Analysing and Structuring Software Development Problems (2001).
A session on problem frames was part of the 9th International Workshop on Requirements Engineering: Foundation for Software Quality (REFSQ)] held in Klagenfurt/Velden, Austria in 2003. The First International Workshop on Applications and Advances in Problem Frames was held as part of ICSE’04 held in Edinburgh, Scotland. One outcome of that workshop was a 2005 special issue on problem frames in the International Journal of Information and Software Technology.
The Second International Workshop on Applications and Advances in Problem Frames was held as part of ICSE 2006 in Shanghai, China. The Third International Workshop on Applications and Advances in Problem Frames (IWAAPF) was held as part of ICSE 2008 in Leipzig, Germany. In 2010, the IWAAPF workshops were replaced by the International Workshop on Applications and Advances of Problem-Orientation (IWAAPO). IWAAPO broadens the focus of the workshops to include alternative and complementary approaches to software development that share an emphasis on problem analysis. IWAAPO-2010 was held as part of ICSE 2010 in Cape Town, South Africa.
Today research on the problem frames approach is being conducted at a number of universities, most notably at the Open University in the United Kingdom as part of its Relating Problem & Solution Structures research theme
The ideas in the problem frames approach have been generalized into the concepts of problem-oriented development (POD) and problem-oriented engineering ( |
https://en.wikipedia.org/wiki/Propylene%20glycol%20alginate | Propylene glycol alginate (PGA) is an emulsifier, stabilizer, and thickener used in food products. It is a food additive with E number E405. Chemically, propylene glycol alginate is an ester of alginic acid, which is derived from kelp. Some of the carboxyl groups are esterified with propylene glycol, some are neutralized with an appropriate alkali, and some remain free.
See also
List of food additives, Codex Alimentarius |
https://en.wikipedia.org/wiki/Graminivore | A graminivore is a herbivorous animal that feeds primarily on grass, specifically "true" grasses, plants of the family Poaceae (also known as Graminae). Graminivory is a form of grazing. These herbivorous animals have digestive systems that are adapted to digest large amounts of cellulose, which is abundant in fibrous plant matter and more difficult to break down for many other animals. As such, they have specialized enzymes to aid in digestion and in some cases symbiotic bacteria that live in their digestive track and "assist" with the digestive process through fermentation as the matter travels through the intestines.
Horses, cattle, geese, guinea pigs, hippopotamuses, capybara and giant pandas are examples of vertebrate graminivores. Some carnivorous vertebrates, such as dogs and cats, are known to eat grass occasionally. Grass consumption in dogs can be a way to rid their intestinal tract of parasites that may be threatening to the carnivore's health. Various invertebrates also have graminivorous diets. Many grasshoppers, such as individuals from the family Acrididae, have diets consisting primarily of plants from the family Poaceae. Although humans are not graminivores, we do get much of our nutrition from a type of grass called cereal, and especially from the fruit of that grass which is called grain.
Graminivores generally exhibit a preference on which species of grass they choose to consume. For example, according to a study done on North American bison feeding on shortgrass plains in north-eastern Colorado, the cattle consumed a total of thirty-six different species of plant. Of that thirty-six, five grass species were favoured and consumed the most pervasively. The average consumption of these five species comprised about 80% of their diet. A few of these species include Aristida longiseta, Muhlenbergia species, and Bouteloua gracilis. |
https://en.wikipedia.org/wiki/Optical%20wireless | Optical wireless is the combined use of "optical" (optical fibre) and "wireless" (radio frequency) communication to provide telecommunication to clusters of end points which are geographically distant. The high capacity optical fibre is used to span the longest distances. A lower cost wireless link carries the signal for the last mile to nearby users.
See also
4.5G / 5G |
https://en.wikipedia.org/wiki/Alloplastic%20adaptation | Alloplastic adaptation (from the Greek word "allos", meaning "other") is a form of adaptation where the subject attempts to change the environment when faced with a difficult situation. Criminality, mental illness, and activism can all be classified as categories of alloplastic adaptation.
The concept of alloplastic adaptation was developed by Sigmund Freud, Sándor Ferenczi, and Franz Alexander. They proposed that when an individual was presented with a stressful situation, he could react in one of two ways:
Autoplastic adaptation: The subject tries to change himself, i.e. the internal environment.
Alloplastic adaptation: The subject tries to change the situation, i.e. the external environment.
Origins and development
'These terms are possibly due to Ferenczi, who used them in a paper on "The Phenomenon of Hysterical Materialization" (1919,24). But he there appears to attribute them to Freud' (who may have used them previously in private correspondence or conversation). Ferenczi linked 'the purely "autoplastic" tricks of the hysteric...[to] the bodily performances of "artists" and actors'.
Freud's only public use of the terms was in his paper "The Loss of Reality in Neurosis and Psychosis" (1924), where he points out that 'expedient, normal behaviour leads to work being carried out on the external world; it does not stop, as in psychosis, at effecting internal changes. It is no longer autoplastic but alloplastic '.
A few years later, in his paper on "The Neurotic Character" (1930), Alexander described 'a type of neurosis in which...the patient's entire life consists of actions not adapted to reality but rather aimed at relieving unconscious tensions'. Alexander considered that 'neurotic characters of this type are more easily accessible to psychoanalysis than patients with symptom neuroses...[due] to the fact that in the latter the patient has regressed from alloplasticity to autoplasticity; after successful analysis he must pluck up courage to take action i |
https://en.wikipedia.org/wiki/Autoplastic%20adaptation | Autoplastic adaptation (from the Greek word auto) is a form of adaptation where the subject attempts to change itself when faced with a difficult situation.
The concept of autoplastic adaptation was developed by Sigmund Freud, Sándor Ferenczi, and Franz Alexander. They proposed that when an individual was presented with a stressful situation, he could react in one of two ways:
Autoplastic adaptation: The subject tries to change himself, i.e. the internal environment.
Alloplastic adaptation: The subject tries to change the situation, i.e. the external environment.
Autoplasticity, hysteria and evolution
'Hysterical individuals appear to be turned inward. Their symptoms, instead of presenting actions directed outward (alloplastic activities), are mere internal innervations (autoplastic activities)'.
Freud, with 'his single-minded Lamarckianism', speculated that behind 'Lamarck's idea of "need"' was the 'power of unconscious ideas over one's own body, of which we see remnants in hysteria, in short, "the omnipotence of thought"'.
As a result, among his immediate followers, 'Insight into this regressive nature of the phenomenon of conversion may be taken as a starting-point for speculation about the archaic origin of the capacity for autoplastic conversion...according to which evolution took place through the autoplastic adaptation of the body to the demands of the environment'.
Cross-cultural autoplasticity
'Cross-cultural helpers have debated what has been called the autoplastic/alloplastic dilemma: how much should clients be encouraged to adapt to a given situation and how much...to change? Most Western helping modalities have a strong autoplastic bias; clients are encouraged to abandon traditional beliefs...to fit into a dominant society's mainstream'.
The analytic relationship is sometimes seen in similar terms: 'the two practitioners in treatment are engaged in an unending struggle between changing the other and effecting internal change..."autoplastic" a |
https://en.wikipedia.org/wiki/The%20History%20and%20Present%20State%20of%20Electricity | The History and Present State of Electricity (1767), by eighteenth-century British polymath Joseph Priestley, is a survey of the study of electricity up until 1766, as well as a description of experiments by Priestley himself.
Background
Priestley became interested in electricity while he was teaching at Warrington Academy. Friends introduced him to the major British experimenters in the field: John Canton, William Watson, and Benjamin Franklin. These men encouraged Priestley to perform the experiments he was writing about in his history; they believed that he could better describe the experiments if he had performed them himself. In the process of replicating others' experiments, however, Priestley became intrigued by the still unanswered questions regarding electricity and was prompted to design and undertake his own experiments.
Priestley possessed an electrical machine designed by Edward Nairne. With his brother Timothy he designed and constructed his own machines (see Timothy Priestley#Scientific apparatus).
Contents
The first half of the 700-page book is a history of the study of electricity. It is parted into ten periods, starting with early experiments "prior to those of Mr. Hawkesbee", finishing with variable experiments and discoveries made after Franklin's own experiments. The book takes Franklin's work into focus, which was criticised by contemporary scholars, especially in France and Germany.
The second and more influential half contents a description of contemporary theories about electricity and suggestions for future research. Priestley also wrote about the construction and use of electrical machines, basic electrical experiments and "practical maxims for the usw of young elecricians". In the second edition, Priestley added some of his own discoveries, such as the conductivity of charcoal. This discovery overturned what he termed "one of the earliest and universally received maxims of electricity," that only water and metals could conduct electri |
https://en.wikipedia.org/wiki/Automated%20X-ray%20inspection | Automated inspection (AXI) is a technology based on the same principles as automated optical inspection (AOI). It uses as its source, instead of visible light, to automatically inspect features, which are typically hidden from view.
Automated X-ray inspection is used in a wide range of industries and applications, predominantly with two major goals:
Process optimization, i.e. the results of the inspection are used to optimize following processing steps,
Anomaly detection, i.e. the result of the inspection serve as a criterion to reject a part (for scrap or re-work).
Whilst AOI is mainly associated with electronics manufacturing (due to widespread use in PCB manufacturing), AXI has a much wider range of applications. It ranges from the quality check of alloy wheels to the detection of bone fragments in processed meat. Wherever large numbers of very similar items are produced according to a defined standard, automatic inspection using advanced image processing and pattern recognition software (Computer vision) has become a useful tool to ensure quality and improve yield in processing and manufacturing.
Principle of Operation
While optical inspection produces full color images of the surface of the object, x-ray inspection transmits x-rays through the object and records gray scale images of the shadows cast. The image is then processed by image processing software that detects the position and size/ shape of expected features (for process optimization) or presence/ absence of unexpected/ unintended objects or features (for anomaly detection).
X-rays are generated by an x-ray tube, usually located directly above or below the object under inspection. A detector located the opposite side of the object records an image of the x-rays transmitted through the object. The detector either converts the x-rays first into visible light which is imaged by an optical camera, or detects directly using an x-ray sensor array. The object under inspection may be imaged at highe |
https://en.wikipedia.org/wiki/5DX | The 5DX was an automated X-ray inspection robot, which belonged to the set of automated test equipment robots and industrial robots utilizing machine vision. The 5DX was manufactured by Hewlett Packard, then later Agilent Technologies when HP was split into Hewlett Packard and Agilent Technologies in 1999. The 5DX performed a non-destructive structural test using laminography (tomography) to take 3D images of an assembled printed circuit board using 8-bit grayscale to indicate solder thickness. It was used in the assembled printed circuit board (PCB) electronics manufacturing industry to provide process feedback to a surface mount technology assembly line, as well as defect capture.
The 5DX was one of several tools used by many companies in the electronics manufacturing services sector to provide a means of inspecting both the visible and hidden solder connections between the printed circuit boards and components attached to those printed circuit boards. These solder connections (also known as solder joints) are referred to as PCB interconnects.
5DX technology
The 5DX used a gantry robot to move the assembled printed circuit board underneath an source to be able to image the components' joints that require inspection. The positioning of board was guided with the use of Computer Aided Design (CAD) data, which represented the outer layers of a printed circuit board's electrical design.
The 5DX system used classical laminography to create an x-ray image “slice”, or image plane that will be distinct from other image planes on the object to be imaged. A slice will remove obstructions above or below the plane of focus so that only the regions of interest remain.
X-Ray systems that use methods such as laminography ( or the now more commonly used tomography ) are marketed as “3D” x-ray systems. X-Ray systems that do not use these methods and only produce a transmissive shadow image are marketed as “2D” systems.
Classical laminography is based on a relative moti |
https://en.wikipedia.org/wiki/Regular%20matroid | In mathematics, a regular matroid is a matroid that can be represented over all fields.
Definition
A matroid is defined to be a family of subsets of a finite set, satisfying certain axioms. The sets in the family are called "independent sets". One of the ways of constructing a matroid is to select a finite set of vectors in a vector space, and to define a subset of the vectors to be independent in the matroid when it is linearly independent in the vector space. Every family of sets constructed in this way is a matroid, but not every matroid can be constructed in this way, and the vector spaces over different fields lead to different sets of matroids that can be constructed from them.
A matroid is regular when, for every field , can be represented by a system of vectors over .
Properties
If a matroid is regular, so is its dual matroid, and so is every one of its minors. Every direct sum of regular matroids remains regular.
Every graphic matroid (and every co-graphic matroid) is regular. Conversely, every regular matroid may be constructed by combining graphic matroids, co-graphic matroids, and a certain ten-element matroid that is neither graphic nor co-graphic, using an operation for combining matroids that generalizes the clique-sum operation on graphs.
The number of bases in a regular matroid may be computed as the determinant of an associated matrix, generalizing Kirchhoff's matrix-tree theorem for graphic matroids.
Characterizations
The uniform matroid (the four-point line) is not regular: it cannot be realized over the two-element finite field GF(2), so it is not a binary matroid, although it can be realized over all other fields. The matroid of the Fano plane (a rank-three matroid in which seven of the triples of points are dependent) and its dual are also not regular: they can be realized over GF(2), and over all fields of characteristic two, but not over any other fields than those. As showed, these three examples are fundamental to the theory of r |
https://en.wikipedia.org/wiki/Bolaamphiphile | Bolaamphiphiles (also known as bolaform surfactants,
bolaphiles, or alpha-omega-type surfactants) are amphiphilic molecules that have hydrophilic groups at both ends of a sufficiently long hydrophobic hydrocarbon chain. Compared to single-headed amphiphiles, the introduction of a second head-group generally induces a higher solubility in water, an increase in the critical micelle concentration (cmc), and a decrease in aggregation number. The aggregate morphologies of bolaamphiphiles include spheres, cylinders, disks, and vesicles. Bolaamphiphiles are also known to form helical structures that can form monolayer microtubular self-assemblies. |
https://en.wikipedia.org/wiki/Abram%20Ilyich%20Fet | Abram Fet () (5 December 1924 — 30 July 2009) was a Russian mathematician, Soviet dissident, philosopher, Samizdat translator and writer. He used various pseudonyms for Samizdat, like N. A. Klenov, A.B. Nazyvayev, D.A. Rassudin, S.T. Karneyev, etc. If published, his translations were usually issued under the name of A.I. Fedorov, which reproduced Fet's own initials and sometimes under the names of real people who agreed to publish Fet's translations under their names.
Biography
Abram Fet was born on 5 December 1924 in Odessa into a family of Ilya Fet and Revekka Nikolayevskaya. Ilya Fet was a medical doctor; he was born and grew in Rovno and studied medicine in Paris. Revekka was a housewife; she grew in Odessa. Fet's father often changed jobs, moving with his family over Ukraine looking for places where to escape starvation, and the children had to change schools. In 1936, the family settled in Odessa. There Abram Fet finished high school at the age of 15 and entered the Odessa Institute of Communications Engineering. He had hardly finished the first year when the Second World War broke out. Fet's family was evacuated to Siberia, to the Tomsk region. In 1941, Fet entered the Mathematics Department of Tomsk University, where he was admitted to the second year of studies. At that time, many professors evacuated from European Russia were teaching at the local university, among them Petr Rashchevsky who advised him in 1946 to continue his education in Moscow University. There Fet attended the seminars of Gelfand, Pontryagin, and Novikov and started to specialize in topology on advice of Vilenkin, under supervision of Lazar Lusternik.
In December 1948, Fet defended his Candidate Thesis named "A Homology Ring of Closed Curve Space on a Sphere", which was recognized as an outstanding contribution by the mathematicians of Moscow University. After graduation, he started working in Tomsk University as a junior lecturer and then an associate professor of the Calculus Depa |
https://en.wikipedia.org/wiki/Hodulcine | Hodulcine (or hoduloside) are glycosides (dammarane-type triterpenes) which are isolated from the leaves of Hovenia dulcis Thunb. (Rhamnaceae) also known as Japanese Raisin Tree.
Several glycosides homologue have been found in this plant and although hoduloside 1 exhibits the highest anti-sweet activity, it is less potent than gymnemic acid 1.
See also
Gymnemic acid
Lactisole
Ziziphin |
https://en.wikipedia.org/wiki/List%20of%20Intel%20CPU%20microarchitectures | The following is a partial list of Intel CPU microarchitectures. The list is incomplete. Additional details can be found in Intel's Tick–tock model and Process–architecture–optimization model.
x86 microarchitectures
16-bit
8086 first x86 processor; initially a temporary substitute for the iAPX 432 to compete with Motorola, Zilog, and National Semiconductor and to top the successful Z80. 8088 version, with an 8-bit bus, used in the original IBM Personal Computer.
186 included a DMA controller, interrupt controller, timers, and chip select logic. A small number of additional instructions. The 80188 was a version with an 8-bit bus.
286 first x86 processor with protected mode including segmentation based virtual memory management. Performance improved by a factor of 3 to 4 over 8086. Included instructions relating to protected mode.
32-bit (IA-32)
i386 first 32-bit x86 processor. Introduced paging on top of segmentation which is the most commonly used memory protection technology in modern operating systems ever since. Many additional powerful and valuable new instructions.
i486 Intel's second generation of 32-bit x86 processors, introduced built-in floating point unit (FPU), 8 KB on-chip L1 cache, and pipelining. Faster per MHz than the 386. Small number of new instructions.
P5 original Pentium microprocessors, first x86 processor with super-scalar architecture and branch prediction.
P6 used in Pentium Pro, Pentium II, Pentium II Xeon, Pentium III, and Pentium III Xeon microprocessors. First x86 processor to support SIMD instruction with XMM register implemented, RISC μop decode scheme, integrated register renaming and out-of-order execution. Some important new instructions, including conditional moves, which allow the avoidance of costly branch instructions. Added 36-bit physical memory addressing, "Physical Address Extension (PAE)".
Pentium M: updated version of Pentium III's P6 microarchitecture designed from the ground up for mobile computing and firs |
https://en.wikipedia.org/wiki/Ziziphin | Ziziphin, a triterpene glycoside which exhibits taste-modifying properties, has been isolated from the leaves of Ziziphus jujuba (Rhamnaceae).
Among ziziphin's known homologues found in this plant, it is the most anti-sweet. However, its anti-sweet activity is less effective than gymnemic acid 1, another anti-sweet compound glycoside isolated from the leaves of Gymnema sylvestre (Asclepiadaceae).
Ziziphin reduces perceived sweetness of most of the carbohydrates (e.g. glucose, fructose), bulk sweeteners, intense sweeteners (natural: steviol glycoside – artificial: sodium saccharin and aspartame) and sweet amino acids (e.g. glycine). However, it has no effect on the perception of the other tastes, bitterness, sourness and saltiness.
See also
Hodulcine
Lactisole
Gymnemic acid |
https://en.wikipedia.org/wiki/IEC%2062379 | IEC 62379 is a control engineering standard for the common control interface for networked digital audio and video products. IEC 62379 uses Simple Network Management Protocol to communicate control and monitoring information.
It is a family of standards that specifies a control framework for networked audio and video equipment and is published by the International Electrotechnical Commission. It has been designed to provide a means for entering a common set of management commands to control the transmission across the network as well as other functions within the interfaced equipment.
Organization
The parts within this standard include:
Part 1: General,
Part 2: Audio,
Part 3: Video,
Part 4: Data,
Part 5: Transmission over networks,
Part 6: Packet transfer service,
Part 7: Measurement (for EBU ECN-IPM Group)
Part one is common to all equipment that conforms to IEC 62379 and a preview of the published document can be downloaded from the IEC web store here, a section of the International Electrotechnical Commission web site. More information is available at the project group web site.
History
2 October 2008
Part 2, Audio has now been published and a preview can be downloaded from the IEC web store, a section the International Electrotechnical Commission web site.
31 August 2011
A first edition of Part 3, Video has been submitted to the IEC International Electrotechnical Commission technical committee for the commencement of the standardization process for this part.
It contains the video MIB required by Part 7.
Part 7, Measurement, has been submitted to the IEC International Electrotechnical Commission technical committee for the commencement of the standardization process for this part.
This part specifies those aspects that are specific to the measurement requirements of the EBU ECN-IPM Group, a member of the Expert Communities Networks. An associated document EBU TECH 3345 has recently been published by the EBU European Broadcasting Union.
16 December |
https://en.wikipedia.org/wiki/Arabicodium | Arabicodium is a genus of green algae in the family Codiaceae. |
https://en.wikipedia.org/wiki/Food%20sampling | Food sampling is a process used to check that a food is safe and that it does not contain harmful contaminants, or that it contains only permitted additives at acceptable levels, or that it contains the right levels of key ingredients and its label declarations are correct, or to know the levels of nutrients present.
A food sample is carried out by subjecting the product to physical analysis. Analysis may be undertaken by or on behalf of a manufacturer regarding their own product, or for official food law enforcement or control purposes, or for research or public information.
To undertake any analysis, unless the whole amount of food to be considered is very small so that the food can be used for testing in its entirety, it is usually necessary for a portion of it to be taken (e.g. a small quantity from a full production batch, or a portion of what is on sale in a shop) – this process is known as food sampling.
In most cases with food to be analysed there are two levels of sampling – the first being selection of a portion from the whole, which is then submitted to a laboratory for testing, and the second being the laboratory's taking of the individual amounts necessary for individual tests that may be applied. It is the former that is ‘food sampling’: the latter is analytical laboratory ‘sub-sampling’, often relying upon initial homogenisation of the entire submitted sample.
Where it is intended that the results of any analysis to relate to the food as a whole it is crucially important that the sample is representative of that whole – and the results of any analysis can only be meaningful if the sampling is undertaken effectively. This is true whether the ‘whole’ is a manufacturer's entire production batch, or where it is a single item but too large to all be used for the test.
Factors relevant in considering the representativeness of a sample include the homogeneity of the food, the relative sizes of the sample to be taken and the whole, the potential |
https://en.wikipedia.org/wiki/Apache%20CouchDB | Apache CouchDB is an open-source document-oriented NoSQL database, implemented in Erlang.
CouchDB uses multiple formats and protocols to store, transfer, and process its data. It uses JSON to store data, JavaScript as its query language using MapReduce, and HTTP for an API.
CouchDB was first released in 2005 and later became an Apache Software Foundation project in 2008.
Unlike a relational database, a CouchDB database does not store data and relationships in tables. Instead, each database is a collection of independent documents. Each document maintains its own data and self-contained schema. An application may access multiple databases, such as one stored on a user's mobile phone and another on a server. Document metadata contains revision information, making it possible to merge any differences that may have occurred while the databases were disconnected.
CouchDB implements a form of multiversion concurrency control (MVCC) so it does not lock the database file during writes. Conflicts are left to the application to resolve. Resolving a conflict generally involves first merging data into one of the documents, then deleting the stale one.
Other features include document-level ACID semantics with eventual consistency, (incremental) MapReduce, and (incremental) replication. One of CouchDB's distinguishing features is multi-master replication, which allows it to scale across machines to build high-performance systems. A built-in Web application called Fauxton (formerly Futon) helps with administration.
History
Couch is an acronym for cluster of unreliable commodity hardware.
The CouchDB project was created in April 2005 by Damien Katz, a former Lotus Notes developer at IBM. He self-funded the project for almost two years and released it as an open-source project under the GNU General Public License.
In February 2008, it became an Apache Incubator project and was offered under the Apache License instead. A few months after, it graduated to a top-level project |
https://en.wikipedia.org/wiki/Comparison%20of%20digital%20audio%20editors | The following tables compare general and technical information among a number of digital audio editors and multitrack recording software.
Digital Audio Workstations
Basic general information about the software: creator/company, license/price etc.
Wave editors
Basic general information about the software: creator/company, license/price etc.
Support
Plugin support
The plugin types the software can run natively (without emulation).
File format support
The various file types the software can read/write.
Notes
See also
List of music software
Notes
Audio engineering
Audio editors
Sound recording |
https://en.wikipedia.org/wiki/Volari%20V3 | The Volari V3 is a video card manufactured by XGI Technology.
History
The V3 was introduced on September 15, 2003. It is a budget option, available with an 8x Accelerated Graphics Port interface from Walton Chaintech Corporation. It is similar in performance to the ATI Radeon 9200 SE, but is generally lower-priced. |
https://en.wikipedia.org/wiki/Volari%20V5 | On September 15, 2003 XGI Technology Inc introduced the Volari V5. The V5 is a video card and was available with an Accelerated Graphics Port (AGP) 8x interface in Taiwan. It is similar in terms of clock speed to the Radeon 9600 Pro and the GeForce FX 5600. |
https://en.wikipedia.org/wiki/Provider%20router | In Multiprotocol Label Switching (MPLS), a P router or provider router is a label switch router (LSR) that functions as a transit router of the core network. The P router is typically connected to one or more PE routers.
Here's one scenario: A customer who has facilities in LA and Atlanta wants to connect these sites over an MPLS VPN provided by AT&T. To do this, the customer would purchase a link from the on-site CE router to the PE router in AT&T's central office in LA and would also do the same thing in Atlanta. The PE routers would connect over AT&T's backbone routers (P routers) to enable the two CE routers in LA and Atlanta to communicate over the MPLS network.
See also
Customer edge router
Provider edge router |
https://en.wikipedia.org/wiki/Hadrosaurus%20Foulkii%20Leidy%20Site | The Hadrosaurus foulkii Leidy Site is a historic paleontological site in Haddonfield, Camden County, New Jersey. Now set in state-owned parkland, it is where the first relatively complete set of dinosaur bones were discovered in 1838, and then fully excavated by William Parker Foulke in 1858. The dinosaur was later named Hadrosaurus foulkii by Joseph Leidy. The site, designated a National Historic Landmark in 1994, is now a small park known as "Hadrosaurus Park" and is accessed at the eastern end of Maple Avenue in northern Haddonfield.
History
William Parker Foulke, an attorney and amateur paleontologist affiliated with Philadelphia's Academy of Natural Sciences, was vacationing in Haddonfield in 1858, when he was alerted to the discovery in 1838 of large bones on the farm of Joseph Hopkins. Hopkins and farm workers had been quarrying marl when they uncovered bones resembling vertebrae. Foulke proceeded to direct a careful excavation in the area surrounding Hopkins' marl pit, turning the finds over to Dr. Joseph Leidy for analysis. Foulke unearthed 35 of an estimated 80 bones from the Hadrosaurus, which is believed to have been herbivorous, 7 meters in length, and weigh 2.5 tons. It lived during the Cretaceous period, 73 million years ago. Leidy published an analysis in 1865, and oversaw the creation of a reconstructed skeleton of the creature found in 1868. This reconstruction, put on public display at the Academy, brought the find a wider public audience.
The site lingered in obscurity until 1984 when a local Boy Scout from Troop 65, Christopher Brees, as part of an Eagle Scout project researched the site and generated publicity, eventually leading to the species being designated the official dinosaur of New Jersey.
See also
List of National Historic Landmarks in New Jersey
National Register of Historic Places listings in Camden County, New Jersey |
https://en.wikipedia.org/wiki/Border%20tartan | Border tartan, sometimes known as Borders tartan, Northumbrian tartan, Northumberland tartan, shepherds' plaid, shepherds' check, Border drab, or Border check, is a design used in woven fabrics historically associated with the Anglo-Scottish Border, particularly with the Scottish Borders and Northumberland. Possibly the most identifiable Border tartan garment of the region is the maud, made popular from the 1820s by fashionable Border Scots such as Sir Walter Scott, James Hogg, Henry Scott Riddell and Robert Burns.
The modern Border tartan is a crossweave of small dark and light checks, much plainer than the more elaborate Scottish tartans. Traditionally, the yarn for the light squares was simply untreated sheep's wool and the darker yarn was the same wool dyed with simple vegetable dyes, such as alder bark or water flag, or the untreated wool of a black sheep.
Modern Border Tartans are almost invariably a bold black and white check, but historically the light squares were the yellowish colour of untreated wool, with the dark squares any of a range of dark greys, blues, greens or browns; hence the alternative name of "Border drab". At a distance the checks blend together making the fabric ideal camouflage for stalking game. This style of tartan is one of the oldest in existence as fragments of similar tartans have been found in Great Britain and Jutland.
One similar fragment was discovered in an earthenware pot filled with silver coins, at the Antonine Wall in Falkirk, Scotland. This fragment, known as the Falkirk tartan or Falkirk sett, is currently the earliest check fragment found in the British Isles and dates back to Roman Britain times (around the 3rd century AD). It is actually more a tweed than a tartan in weaving style. It is now kept in the National Museum of Scotland. The Celts were said by Roman scholars to wear bright stripes, which some have suggested are actually descriptions of the brighter variants of tartan.
Another similar tartan was found on |
https://en.wikipedia.org/wiki/Tekka | Tekka is a miso-condiment that consists of a number of root vegetables (Greater Burdock roots, carrots, Ginger root, and Lotus root) which have been stir-fried and boiled to a concentrated powder. Traditional preparation time used to be 16 hours (on a low fire), yet speedier preparation is possible. |
https://en.wikipedia.org/wiki/Indoor%20positioning%20system | An indoor positioning system (IPS) is a network of devices used to locate people or objects where GPS and other satellite technologies lack precision or fail entirely, such as inside multistory buildings, airports, alleys, parking garages, and underground locations.
A large variety of techniques and devices are used to provide indoor positioning ranging from reconfigured devices already deployed such as smartphones, WiFi and Bluetooth antennas, digital cameras, and clocks; to purpose built installations with relays and beacons strategically placed throughout a defined space. Lights, radio waves, magnetic fields, acoustic signals, and behavioral analytics are all used in IPS networks. IPS can achieve position accuracy of 2 cm, which is on par with RTK enabled GNSS receivers that can achieve 2 cm accuracy outdoors.
IPS use different technologies, including distance measurement to nearby anchor nodes (nodes with known fixed positions, e.g. WiFi / LiFi access points, Bluetooth beacons or Ultra-Wideband beacons), magnetic positioning, dead reckoning. They either actively locate mobile devices and tags or provide ambient location or environmental context for devices to get sensed.
The localized nature of an IPS has resulted in design fragmentation, with systems making use of various optical, radio, or even acoustic
technologies.
IPS has broad applications in commercial, military, retail, and inventory tracking industries. There are several commercial systems on the market, but no standards for an IPS system. Instead each installation is tailored to spatial dimensions, building materials, accuracy needs, and budget constraints.
For smoothing to compensate for stochastic (unpredictable) errors there must be a sound method for reducing the error budget significantly. The system might include information from other systems to cope for physical ambiguity and to enable error compensation.
Detecting the device's orientation (often referred to as the compass direction in order |
https://en.wikipedia.org/wiki/Material%20point%20method | The material point method (MPM) is a numerical technique used to simulate the behavior of solids, liquids, gases, and any other continuum material. Especially, it is a robust spatial discretization method for simulating multi-phase (solid-fluid-gas) interactions. In the MPM, a continuum body is described by a number of small Lagrangian elements referred to as 'material points'. These material points are surrounded by a background mesh/grid that is used to calculate terms such as the deformation gradient. Unlike other mesh-based methods like the finite element method, finite volume method or finite difference method, the MPM is not a mesh based method and is instead categorized as a meshless/meshfree or continuum-based particle method, examples of which are smoothed particle hydrodynamics and peridynamics. Despite the presence of a background mesh, the MPM does not encounter the drawbacks of mesh-based methods (high deformation tangling, advection errors etc.) which makes it a promising and powerful tool in computational mechanics.
The MPM was originally proposed, as an extension of a similar method known as FLIP (a further extension of a method called PIC) to computational solid dynamics, in the early 1990 by Professors Deborah L. Sulsky, Zhen Chen and Howard L. Schreyer at University of New Mexico. After this initial development, the MPM has been further developed both in the national labs as well as the University of New Mexico, Oregon State University, University of Utah and more across the US and the world. Recently the number of institutions researching the MPM has been growing with added popularity and awareness coming from various sources such as the MPM's use in the Disney film Frozen.
The algorithm
An MPM simulation consists of the following stages:
(Prior to the time integration phase)
Initialization of grid and material points.
A geometry is discretized into a collection of material points, each with its own material properties and initial condition |
https://en.wikipedia.org/wiki/Full%20spectral%20imaging | Full spectral imaging (FSI) is a form of imaging spectroscopy and is the successor to hyperspectral imaging. Full spectral imaging was developed to improve the capabilities of remote sensing including Earth remote sensing.
Data acquisition
Whereas hyperspectral imaging acquires data as many contiguous spectral bands, full spectral imaging acquires data as spectral curves. A significant advantage of FSI over hyperspectral imaging is a significant reduction in data rate and volume. FSI extracts and saves only the information that is in the raw data. The information is contained in the shape of the spectral curves. The rate at which data is produced by an FSI system is proportional to the amount of information in the scene/image.
Applications
Full spectral imaging, along with empirical reflectance retrieval and autonomous remote sensing are the components of the new systems for remote sensing and the successor to the Landsat series of satellites of the Landsat program. |
https://en.wikipedia.org/wiki/Posterior%20spinal%20veins | Posterior spinal veins are small veins which receive blood from the dorsal spinal cord. |
https://en.wikipedia.org/wiki/Hop%20%28software%29 | Hop is a Lisp-like programming language by Manuel Serrano for web 2.0 and also the name of the web broker (server and proxy) that implements this language. It is written in Bigloo Scheme. It is a project funded by INRIA.
Language design
Hop is a stratified language, which means that a single program file contains instructions for both the server and the client. The server executes CPU demanding computations and operations that require system privileges for accessing files or other resources. The clients (of which there may be many such as browsers, cell phones, etc.) are dedicated to executing actions related to the programming of the graphical user interfaces.
(define-service (server-date) ;1
(current-date)) ;2
(<HTML> ;4
(<BUTTON> ;5
:onclick ~(with-hop ($server-date) ;6
(lambda (h) (alert h))) ;7
"Server time")) ;8
The code snippet above illustrates a few concepts.
The 8 lines of code define a complete program. Lines 1 and 2 result in a service definition on the server. Lines 4 through 8 result in an HTML page complete with javascript functions. It instructs a client (browser) to display a button with the label "Server time" and to send a request to the server when the user clicks on the button. Hop automatically generates all the instructions needed for the communication between the client and the server.
Hop is based on Scheme. Therefore a Hop program is essentially a list of words and/or lists that start and end with parentheses. For example "(HTML content)". "HTML" is the function name and "content" is the function parameter.
Function names in Hop may contain characters other than letters and numbers. For example "<HTML>" is a valid name. Therefore the syntax of Hop looks very similar to HTML (by design). The Hop expression "(<HTML> content)" is similar to the HTML exp |
https://en.wikipedia.org/wiki/Burst%20dimming | Burst dimming is a method to control dimming of cold cathode fluorescent lamps (CCFLs) and LEDs by using pulse width modulation (PWM) at approximately 100-300 Hz which is supposed to be above the noticeable flicker limit for the human eye.
This technique is sometimes used with TFT displays to control backlighting. An alternative dimming method is to control lamp current. |
https://en.wikipedia.org/wiki/Edholm%27s%20law | Edholm's law, proposed by and named after Phil Edholm, refers to the observation that the three categories of telecommunication, namely wireless (mobile), nomadic (wireless without mobility) and wired networks (fixed), are in lockstep and gradually converging. Edholm's law also holds that data rates for these telecommunications categories increase on similar exponential curves, with the slower rates trailing the faster ones by a predictable time lag. Edholm's law predicts that the bandwidth and data rates double every 18 months, which has proven to be true since the 1970s. The trend is evident in the cases of Internet, cellular (mobile), wireless LAN and wireless personal area networks.
Concept
Edholm's law was proposed by Phil Edholm of Nortel Networks. He observed that telecommunication bandwidth (including Internet access bandwidth) was doubling every 18 months, since the late 1970s through to the early 2000s. This is similar to Moore's law, which predicts an exponential rate of growth for transistor counts. He also found that there was a gradual convergence between wired (e.g. Ethernet), nomadic (e.g. modem and Wi-Fi) and wireless networks (e.g. cellular networks). The name "Edholm's law" was coined by his colleague, John H. Yoakum, who presented it at a 2004 Internet telephony press conference.
Slower communications channels like cellphones and radio modems were predicted to eclipse the capacity of early Ethernet, due to developments in the standards known as UMTS and MIMO, which boosted bandwidth by maximizing antenna usage. Extrapolating forward indicates a convergence between the rates of nomadic and wireless technologies around 2030. In addition, wireless technology could end wireline communication if the cost of the latter's infrastructure remains high.
Underlying factors
In 2009, Renuka P. Jindal observed the bandwidths of online communication networks rising from bits per second to terabits per second, doubling every 18 months, as predicted by Edholm' |
https://en.wikipedia.org/wiki/Frequency%20coordination | Frequency Coordination is a technical and regulatory process that removes or mitigates radio-frequency interference between different radio systems that operate on the same frequency.
Normally frequency coordination is a function of an administration, such as a governmental spectrum regulator, as part of a formal regulatory process under the procedures of the Radio Regulations (an intergovernmental treaty text that regulates the radio frequency spectrum).
Before an administrations lets an operator operate a new radio communications network, it must undergo coordination in the following steps:
Inform other operators about the plans
Receive comments if appropriate
Conduct technical discussions with priority networks
Agree on technical and operational parameters
Gain international recognition and protection on the Master International Frequency Register
Bring the network into use
This coordination ensures that:
All administrations know the technical plans of other administrations.
All operators (satellite and terrestrial) can determine if unacceptable interference to existing and planned “priority” networks is likely, and have an opportunity to:
Object
Discuss and review
Reach technical and operational sharing agreements
Coordination is thus closely bound to date of protection or priority, defined by the date when the International Telecommunication Union receives complete coordination data. New planned networks must coordinate with all networks with an earlier date of protection but are protected against all networks with a later date of protection. Planned (but not implemented) networks acquire status under this procedure, but time limits ensure that protection does not last forever if networks are not implemented.
Congress Authorizes FCC
In 1982, the United States Congress provided the FCC with the authority to use frequency coordinators:
Assist in developing and managing spectrum
Recommend appropriate frequencies (designated under Part 90).
|
https://en.wikipedia.org/wiki/RAF%20Ash | Royal Air Force Ash or more simply RAF Ash (formerly RAF Sandwich) was a Royal Air Force underground control centre and radar station situated near the village of Woodnesborough, Kent, England.
History
RAF Sandwich
RAF Sandwich was originally a Ground Controlled Interception (GCI) site situated in Ash Road, Sandwich. However, after the Second World War the area was chosen for one of a chain of ROTOR air defence radar stations and the site was relocated to an underground bunker 1.5 miles to the southwest in Marshborough Road, Ash. The site later closed on 1 October 1958 and was sold on 22 March 1965.
RAF Ash
In 1980 the site was re-acquired by the RAF for the development of Improved UK Air Defence Ground Environment (IUKADGE) and became operational as RAF Ash on 6 January 1986. It closed as an RAF station in 1995. The Ministry of Defence sold the site on 24 July 1998.
Post-closure
The site is now used as a secure data centre by The Bunker, an Internet hosting company. |
https://en.wikipedia.org/wiki/Withdrawal%20time | Withdrawal time, as relating to veterinary medicine, is defined as the time required after administration of a drug to a dairy cow needed to assure that drug residues in the marketable milk is below a determined maximum residue limit (MRL). This term is often used more broadly to describe the time needed after drug administration to any food animal where drug residue may be found in marketed meats, eggs, organs, or other edible products.
Notes
Further reading
Concordet, D and P.L. Toutain (1997) "The withdrawal time estimation of veterinary drugs revisited" Journal of Veterinary Pharmacology and Therapeutics 20 (5), 380–386.
Eiichi, Kokue. (2006) "On a new withdrawal time of veterinary drugs under Positive List System" Journal of Livestock Medicine 516, 363–365. Journal Code:X0028A.
Fisch, R.D. (2000) "Withdrawal time estimation of veterinary drugs: extending the range of statistical methods" Journal of Veterinary Pharmacology and Therapeutics 23 (3), 159–162.
Veterinary medicine |
https://en.wikipedia.org/wiki/Voltage-gated%20proton%20channel | Voltage-gated proton channels are ion channels that have the unique property of opening with depolarization, but in a strongly pH-sensitive manner. The result is that these channels open only when the electrochemical gradient is outward, such that their opening will only allow protons to leave cells. Their function thus appears to be acid extrusion from cells.
Another important function occurs in phagocytes (e.g. eosinophils, neutrophils, and macrophages) during the respiratory burst. When bacteria or other microbes are engulfed by phagocytes, the enzyme NADPH oxidase assembles in the membrane and begins to produce reactive oxygen species (ROS) that help kill bacteria. NADPH oxidase is electrogenic, moving electrons across the membrane, and proton channels open to allow proton flux to balance the electron movement electrically.
The functional expression of Hv1 in phagocytes has been well characterized in mammals, and recently in zebrafish, suggesting its important roles in the immune cells of mammals and non-mammalian vertebrates.
A group of small molecule inhibitors of the Hv1 channel are shown as chemotherapeutics and anti-inflammatory agents.
When activated, the voltage-gated proton channel HV1 can allow up to 100,000 hydrogen ions across the membrane each second. Whereas most voltage-gated ion channels contain a central pore that is surrounding by alpha helices and the voltage-sensing domain (VSD), voltage-gated hydrogen channels contain no central pore, so their voltage-sensing regions (VSD) carry out the job of bringing acidic protons across the membrane. Because the relative H+ concentrations on each side of the membrane result in a pH gradient, these voltage-gated hydrogen channels only carry outward current, meaning they are used to move acidic protons out of the membrane. As a result, the opening of voltage-gated hydrogen channels usually hyperpolarize the cell membrane, or makes the membrane potential more negative.
A recent discovery has shown that t |
https://en.wikipedia.org/wiki/Standing%20crop | A standing crop is the total biomass of the living organisms present in a given environment. This includes both natural ecosystems and agriculture.
See also
Net Primary Production
Standing State
Bibliography
Boudouresque CF (1973) Les peuplements sciaphiles ; Recherches de bionomie analytique, structurale et expérimentale sur les peuplements benthiques sciaphiles de Méditerranée occidentale (fraction algale). Bulletin du Muséum d'histoire naturelle, 33, 147, PDF, 80 pages.
Campbell, Reece, Urry, Cain, et al. (2011) 9th ed. Biology. Benjamin Cummings. pg 1221
Fausch, K. D., Hawkes, C. L., & Parsons, M. G. (1988). Models that predict standing crop of stream fish from habitat variables: 1950-85 (http://www.treesearch.fs.fed.us/pubs/8730 résumé]).
Jenkins, R. M. (1968). The influence of some environmental factors on standing crop and harvest of fishes in US reservoirs. |
https://en.wikipedia.org/wiki/A%20Directory%20of%20Important%20Wetlands%20in%20Australia | A Directory of Important Wetlands in Australia (DIWA) is a list of wetlands of national importance to Australia published by the Department of Climate Change, Energy, the Environment and Water. Intended to augment the list of wetlands of international importance under the Ramsar Convention, it was formerly published in report form, but is now essentially an online publication. Wetlands that appear in the Directory are commonly referred to as "DIWA wetlands" or "Directory wetlands".
Criteria for determining wetland importance
Using criteria agreed in 1994, a wetland can be considered “nationally important” if it satisfies at least one of the following criteria:
It is a good example of a wetland type occurring within a biogeographic region in Australia.
It is a wetland which plays an important ecological or hydrological role in the natural functioning of a major wetland system/complex.
It is a wetland which is important as the habitat for animal taxa at a vulnerable stage in their life cycles, or provides a refuge when adverse conditions such as drought prevail.
The wetland supports 1% or more of the national populations of any native plant or animal taxa.
The wetland supports native plant or animal taxa or communities which are considered endangered or vulnerable at the national level.
The wetland is of outstanding historical or cultural significance.
Types of wetlands
The directory uses a classification system consisting of the following three categories (i.e. A, B and C) which are further sub-divided into a total of 40 different wetland types:
A. Marine and Coastal Zone wetlands, which consists of 12 wetland types
B. Inland wetlands, which consists of 19 wetland types
C. Human-made wetlands, which consists of 9 wetland types.
See also
List of Ramsar sites in Australia
Wetland classification |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.