source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/%CE%95-quadratic%20form | In mathematics, specifically the theory of quadratic forms, an ε-quadratic form is a generalization of quadratic forms to skew-symmetric settings and to *-rings; , accordingly for symmetric or skew-symmetric. They are also called -quadratic forms, particularly in the context of surgery theory.
There is the related notion of ε-symmetric forms, which generalizes symmetric forms, skew-symmetric forms (= symplectic forms), Hermitian forms, and skew-Hermitian forms. More briefly, one may refer to quadratic, skew-quadratic, symmetric, and skew-symmetric forms, where "skew" means (−) and the * (involution) is implied.
The theory is 2-local: away from 2, ε-quadratic forms are equivalent to ε-symmetric forms: half the symmetrization map (below) gives an explicit isomorphism.
Definition
ε-symmetric forms and ε-quadratic forms are defined as follows.
Given a module M over a *-ring R, let B(M) be the space of bilinear forms on M, and let be the "conjugate transpose" involution . Since multiplication by −1 is also an involution and commutes with linear maps, −T is also an involution. Thus we can write and εT is an involution, either T or −T (ε can be more general than ±1; see below). Define the ε-symmetric forms as the invariants of εT, and the ε-quadratic forms are the coinvariants.
As an exact sequence,
As kernel and cokernel,
The notation Qε(M), Qε(M) follows the standard notation MG, MG for the invariants and coinvariants for a group action, here of the order 2 group (an involution).
Composition of the inclusion and quotient maps (but not ) as yields a map Qε(M) → Qε(M): every ε-symmetric form determines an ε-quadratic form.
Symmetrization
Conversely, one can define a reverse homomorphism , called the symmetrization map (since it yields a symmetric form) by taking any lift of a quadratic form and multiplying it by . This is a symmetric form because , so it is in the kernel. More precisely, . The map is well-defined by the same equation: choosing a different lift |
https://en.wikipedia.org/wiki/John%20Doyle%20%28engineer%29 | John Comstock Doyle is the John G Braun Professor of Control and Dynamical Systems, Electrical Engineering, and BioEngineering at the California Institute of Technology. He is known for his work in control theory and his current research interests are in theoretical foundations for complex networks in engineering, biology, and multiscale physics.
Education
He earned a B.S. and an M.S. in electrical engineering from the Massachusetts Institute of Technology in 1977 and a Ph.D. in Mathematics from the University of California, Berkeley, in 1984 with his thesis titled Matrix interpolation theory and optimal control.
Work
Doyle's early work was in the mathematics of robust control, linear-quadratic-Gaussian control robustness, (structured) singular value analysis, and H-infinity methods. He has co-authored books and software toolboxes, and a control analysis tool for high performance commercial and military aerospace systems, as well as other industrial systems.
Awards
Doyle earned the IEEE W.R.G. Baker Prize Paper Award (1991), the IEEE Automatic Control Transactions Axelby Award twice, and the AACC Schuck award. He also has been awarded the AACC Donald P. Eckman Award, the 2004 IEEE Control Systems Award and the Centennial Outstanding Young Engineer Award. |
https://en.wikipedia.org/wiki/Damon%20Baird | Damon S. Baird is a fictional character in the Gears of War franchise. He first appeared in the first and eponymous video game of the series as a supporting character. He has since appeared in every mainline installment of the Gears franchise, and is featured as the main protagonist of the spin-off title, Gears of War: Judgment. He is voiced by Fred Tatasciore in all video game appearances.
Within the series, Baird is a soldier who enlisted with the Coalition of Ordered Governments ("COG"), a supranational and intergovernmental human military collective since Emergence Day, to fight a race of subterranean reptilian hominids known as the Locust Horde in their genocidal war against humanity on the planet Sera. He is depicted as a polymath who is an expert in several technical, mechanical, and scientific fields. Baird is known for his abrasive, wise-cracking personality, which often puts him at odds with series protagonist Marcus Fenix. While Baird is considered a fan favorite among many series fans, he has proven to be a divisive character among video game journalists.
Creation and development
Baird is named after a childhood friend of Cliff Bleszinski, who helped create the franchise and served as Design Director of Epic Games. At one point during the first game's development, the roles of Baird and his close friend Augustus Cole were entirely reversed, with English soccer player David Beckham serving as the archetype and visual cue for Baird as a sports star character. Baird's original visual inspiration was based on Denis Leary. One of Baird's trademark accessories are a pair of goggles, which later in the series becomes a source of inspiration for Delmont "Del" Walker, who is also adept in electronics and robotics.
Baird was chosen as the lead character of Gears of War: Judgment due to his status as a fan favorite character from the original trilogy who never had the spotlight. Lead level designer for Judgment Jim Brown thought of Baird as an interesting chara |
https://en.wikipedia.org/wiki/Davidson%20Seamount | Davidson Seamount is a seamount (underwater volcano) located off the coast of Central California, southwest of Monterey and west of San Simeon. At long and wide, it is one of the largest known seamounts in the world. From base to crest, the seamount is tall, yet its summit is still below the sea surface. The seamount is biologically diverse, with 237 species and 27 types of deep-sea coral having been identified.
Discovered during the mapping of California's coast in 1933, Davidson Seamount is named after geographer George Davidson of the United States Coast and Geodetic Survey. Studied only sparsely for decades, NOAA expeditions to the seamount in 2002 and 2006 cast light upon its unique deep-sea coral ecosystem. Davidson Seamount is populated by a dense population of large, ancient corals, some of which are over 100 years of age. The data gathered during the studies fueled the making of Davidson Seamount into a part of the Monterey Bay National Marine Sanctuary in 2009.
Geology
A seamount such as Davidson is an underwater volcano; this one rises above the surrounding ocean floor. Although there are over 30,000 seamounts in the Pacific Ocean alone, only about 0.1% of them have been explored. The aqueous environment of the seamount means that it behaves differently from volcanoes on land. Its surface is composed mostly of blocky lava flows, although some pillow lava, which is the typical lava type of a seamount, prevails at the deeper flank. The summit is composed of layered deposits of volcanic ash and pyroclastic material. These rocks indicate mildly explosive eruptions of gas-rich lava near the summit of the volcano. The base of Davidson is probably buried in a deep layer of muds.
At long and wide, Davidson Seamount is impressively large. If it were on land, it would dominate the landscape in a way similar to how Mount Shasta dominates the horizon of northern California. Put in perspective, the size of the seamount is enough to fill Monterey Bay from t |
https://en.wikipedia.org/wiki/Zariski%27s%20connectedness%20theorem | In algebraic geometry, Zariski's connectedness theorem (due to Oscar Zariski) says that under certain conditions the fibers of a morphism of varieties are connected. It is an extension of Zariski's main theorem to the case when the morphism of varieties need not be birational.
Zariski's connectedness theorem gives a rigorous version of the "principle of degeneration" introduced by Federigo Enriques, which says roughly that a limit of absolutely irreducible cycles is absolutely connected.
Statement
Suppose that f is a proper surjective morphism of varieties from X to Y such that the function field of Y is separably closed in that of X. Then Zariski's connectedness theorem says that the inverse image of any normal point of Y is connected. An alternative version says that if f is proper and f* OX = OY, then f is surjective and the inverse image of any point of Y is connected. |
https://en.wikipedia.org/wiki/Muscarinic%20acetylcholine%20receptor%20M5 | {{DISPLAYTITLE:Muscarinic acetylcholine receptor M5}}
The human muscarinic acetylcholine receptor M5, encoded by the gene, is a member of the G protein-coupled receptor superfamily of integral membrane proteins. It is coupled to Gq protein. Binding of the endogenous ligand acetylcholine to the M5 receptor triggers a number of cellular responses such as adenylate cyclase inhibition, phosphoinositide degradation, and potassium channel modulation. Muscarinic receptors mediate many of the effects of acetylcholine in the central and peripheral nervous system. The clinical implications of this receptor have not been fully explored; however, stimulation of this receptor is known to effectively decrease cyclic AMP levels and downregulate the activity of protein kinase A (PKA).
Ligands
No highly selective agonists or antagonists for the M5 receptor have been discovered as of 2018, but several non-selective muscarinic agonists and antagonists have significant affinity for M5.
The lack of selective M5 receptor ligands is one of the main reasons that the medical community has such a limited understanding of the M5 receptors effects as the possibility that any and/or all effects of non-selective ligands may be due to interactions with other receptors can not be ruled out. Some data may be obtained by observing which effects are common among semi-selective ligands (ex. a ligand of M1 and M5, a ligand of M2 and M5, and a ligand of M3 and M5), but until both a selective agonist and a selective antagonist of the M5 receptor are developed this data must be considered merely theoretical.
Agonists
Milameline ((E)-1,2,5,6-Tetrahydro-1-methyl-3-pyridinecarboxaldehyde-O-methyloxime, CAS# 139886-32-1)
Sabcomeline
Positive allosteric modulators
ML-380
ML-326
VU-0238429: EC50 = 1.16 μM; >30-fold selectivity versus M1 and M3, inactive at M2 and M4.
Negative allosteric modulators
ML375
VU6008667
Antagonists
VU-0488130 (ML381)
Xanomeline
Diphenhydramine
See also
Muscarinic a |
https://en.wikipedia.org/wiki/Interdata | Interdata, Inc., was a computer company, founded in 1966 by a former Electronic Associates engineer, Daniel Sinnott, and was based in Oceanport, New Jersey. The company produced a line of 16- and 32-bit minicomputers that were loosely based on the IBM 360 instruction set architecture but at a cheaper price. In 1974, it produced one of the first 32-bit minicomputers, the Interdata 7/32. The company then used the parallel processing approach, where multiple tasks were performed at the same time, making real-time computing a reality.
Some real-time applications Interdata computers were used for included: Core Protection Calculator, used in some later Combustion Engineering designed nuclear power plants; lottery systems manufactured by GTech; the NexRad weather radar system. Many companies used them for internal high speed laboratory data capture, such as United Technologies Research Center in East Hartford, Connecticut wind tunnel, General Electric R&D in Schenectady, New York, and Perkin-Elmer in Connecticut (which later acquired Interdata).
The operating system for the 16-bit computers was called OS/16, and for the 32-bit computers OS/32. The assembly language could generate series independent object code. Later, as with Gould, SEL, Modcomp and other real time competitors, they offered a 32-bit time sharing system called MTM (Mutli Terminal Monitor).
Acquisitions
In 1973, it was purchased by Perkin-Elmer Corporation, a Connecticut-based producer of scientific instruments for $63.6 million. Interdata was already making $19 million in annual sales but this merger made Perkin-Elmer's annual sales rise to over $200 million. Interdata then became the basis for Perkin-Elmer's Data Systems Group. In 1985, the computing division of Perkin-Elmer was spun off as Concurrent Computer Corporation.
List of products
Interdata Model 1 – 1970
Interdata Model 3 – 1967
Interdata 4 (autoload, floating point)
Interdata 5 (list processing, microcoded automatic I/O channel)
In |
https://en.wikipedia.org/wiki/Master%20production%20schedule | A master production schedule (MPS) is a plan for individual commodities to be produced in each time period such as production, staffing, inventory, etc. It is usually linked to manufacturing where the plan indicates when and how much of each product will be demanded. This plan quantifies significant processes, parts, and other resources in order to optimize production, to identify bottlenecks, and to anticipate needs and completed goods. Since a MPS drives much factory activity, its accuracy and viability dramatically affect profitability. Typical MPSs are created by software with user tweaking.
Due to software limitations, but especially the intense work required by the "master production schedulers", schedules do not include every aspect of production, but only key elements that have proven their control effectivity, such as forecast demand, production costs, inventory costs, lead time, working hours, capacity, inventory levels, available storage, and parts supply. The choice of what to model varies among companies and factories. The MPS is a statement of what the company expects to produce and purchase (i.e. quantity to be produced, staffing levels, dates, available to promise, projected balance).
The MPS translates the customer demand (sales orders, PIR’s), into a build plan using planned orders in a true component scheduling environment. Using MPS helps avoid shortages, costly expediting, last minute scheduling, and inefficient allocation of resources. Working with MPS allows businesses to consolidate planned parts, produce master schedules and forecasts for any level of the Bill of Material (BOM) for any type of part.
How an MPS works
By using many variables as inputs the MPS will generate a set of outputs used for decision making. Inputs may include forecast demand, production costs, inventory money, customer needs, inventory progress, supply, lot size, production lead time, and capacity. Inputs may be automatically generated by an ERP system that link |
https://en.wikipedia.org/wiki/JBPM | jBPM (Java Business Process Model) is an open-source workflow engine written in Java that can execute business processes described in BPMN 2.0 (or its own process definition language jPDL in earlier versions). jBPM is a toolkit for building business applications to help automate business processes and decisions. It's sponsored by Red Hat, part of the JBoss community and closely related to the Drools and OptaPlanner projects in the KIE group. It is released under the ASL (or LGPL in earlier versions) by the JBoss company.
Overview
In essence, jBPM takes graphical process descriptions as input. A process is composed of tasks that are connected with sequence flows. Processes represent an execution flow. The graphical diagram (flow chart) of a process is used as the basis for the communication between non-technical users and developers.
Each execution of a process definition is called a "process instance". jBPM manages the process instances. Some activities are automatic like sending an e-mail or invoking a service. Some activities act as wait states, like for example human tasks or waiting for an external service to return results. jBPM will manage and persist the state of the process instances at all times.
jBPM is based on the Process Virtual Machine (PVM) which is the JBoss community's foundation to support multiple process languages natively. The JBoss community currently focuses on using the BPMN 2.0 specification for defining business processes.
jBPM also provides various tools, both for developers (Eclipse) and end users (web-based) to create, deploy, execute and manage business processes throughout their life cycle.
Capabilities
jBPM originates from BPM (Business Process Management) but it has evolved to enable users to pick their own path in business automation. It provides various capabilities that simplify and externalize business logic into reusable assets such as cases, processes, decision tables and more.
Business processes (BPMN 2.0)
Case m |
https://en.wikipedia.org/wiki/Ionotropic%20effect | An ionotropic effect is the effect of a transmitter substance or hormone that activates or deactivates ionotropic receptors (ligand-gated ion channels). The effect can be either positive or negative, specifically a depolarization or a hyperpolarization respectively. This term is commonly confused with an inotropic effect, which refers to a change in the force of contraction (e.g. in heart muscle) produced by transmitter substances or hormones.
Examples
This term could be used to describe the action of acetylcholine on nicotinic receptors, glutamate on NMDA receptors or GABA on GABAa receptors. |
https://en.wikipedia.org/wiki/Biointerface | A biointerface is the region of contact between a biomolecule, cell, biological tissue or living organism or organic material considered living with another biomaterial or inorganic/organic material. The motivation for biointerface science stems from the urgent need to increase the understanding of interactions between biomolecules and surfaces. The behavior of complex macromolecular systems at materials interfaces are important in the fields of biology, biotechnology, diagnostics, and medicine. Biointerface science is a multidisciplinary field in which biochemists who synthesize novel classes of biomolecules (peptide nucleic acids, peptidomimetics, aptamers, ribozymes, and engineered proteins) cooperate with scientists who have developed the tools to position biomolecules with molecular precision (proximal probe methods, nano-and micro contact methods, e-beam and X-ray lithography, and bottom up self-assembly methods), scientists who have developed new spectroscopic techniques to interrogate these molecules at the solid-liquid interface, and people who integrate these into functional devices (applied physicists, analytical chemists and bioengineers). Well-designed biointerfaces would facilitate desirable interactions by providing optimized surfaces where biological matter can interact with other inorganic or organic materials, such as by promoting cell and tissue adhesion onto a surface.
Topics of interest include, but are not limited to:
Neural interfaces
Cells in engineered microenvironments and regenerative medicine
Computational and modeling approaches to biointerfaces
Membranes and membrane-based biosensing
Peptides, carbohydrates and DNA at biointerfaces
Pathogenesis and pathogen detection
Molecularly designed interfaces
Nanotube/nanoparticle interfaces
Related fields for biointerfaces are biomineralization, biosensors, medical implants, and so forth.
Nanostructure interfaces
Nanotechnology is a rapidly growing field that has allowed for the crea |
https://en.wikipedia.org/wiki/Jacobi%E2%80%93Anger%20expansion | In mathematics, the Jacobi–Anger expansion (or Jacobi–Anger identity) is an expansion of exponentials of trigonometric functions in the basis of their harmonics. It is useful in physics (for example, to convert between plane waves and cylindrical waves), and in signal processing (to describe FM signals). This identity is named after the 19th-century mathematicians Carl Jacobi and Carl Theodor Anger.
The most general identity is given by:
where is the -th Bessel function of the first kind and is the imaginary unit,
Substituting by , we also get:
Using the relation valid for integer , the expansion becomes:
Real-valued expressions
The following real-valued variations are often useful as well:
See also
Plane wave expansion
Notes |
https://en.wikipedia.org/wiki/Endothelial%20lipase | Endothelial lipase (LIPG) is a form of lipase secreted by vascular endothelial cells in tissues with high metabolic rates and vascularization, such as the liver, lung, kidney, and thyroid gland. The LIPG enzyme is a vital component to many biological processes. These processes include lipoprotein metabolism, cytokine expression, and lipid composition in cells. Unlike the lipases that hydrolyze Triglycerides, endothelial lipase primarily hydrolyzes phospholipids. Due to the hydrolysis specificity, endothelial lipase contributes to multiple vital systems within the body. On the contrary to the beneficial roles that LIPG plays within the body, endothelial lipase is thought to play a potential role in cancer and inflammation. Knowledge obtained in vitro and in vivo suggest the relations to these conditions, but human interaction knowledge lacks due to the recent discovery of endothelial lipase. Endothelial lipase was first characterized in 1999. The two independent research groups which are notable for this discovery cloned the endothelial lipase gene and identified the novel lipase secreted from endothelial cells. The anti-Atherosclerosis opportunity through alleviating plaque blockage and prospective ability to raise High-density lipoprotein (HDL) have gained endothelial lipase recognition.
Discovery
In 1999, the identification of endothelial lipase was independently discovered by two research groups.
The first group at Rhone-Poulenc Rorer cloned and characterized a new member of the triacylglyerol (TG) family. When this novel endothelial lipase was over-expressed in mice, the concentrations of HDL Cholesterol and apolipoprotein A-I in plasma decreased.
A second group at Stanford University independently cloned this same endothelial lipase from human umbilical vein endothelial cells, human coronary artery endothelial cells and rodent endothelial-like yolk sacs. Suppression subtractive hybridization was used to isolate the genes. The genes were then compared and |
https://en.wikipedia.org/wiki/Distinction%20bias | Distinction bias, a concept of decision theory, is the tendency to view two options as more distinctive when evaluating them simultaneously than when evaluating them separately.
One writer has presented what he called "a simplistic view" of distinction bias: When asked if someone would like an apple, they may say "Yes". So, an apple is placed before them and they begin to eat it and are happy. But what if two apples were placed on the table - one was the one they would have happily eaten and the other which is slightly fresher looking. The individual will choose the fresher apple and eat it and be happy but if asked, "would you have enjoyed eating that other apple", they would likely say "No". Even though in the alternate, no-choice reality they were perfectly happy with the apple. Moreover, if presented with five apples on a table, they might examine each apple so that they would be sure they had the best one, even though the time spent making that decision would be wasted. The reason for this is that distinction bias causes individuals to "over-examine and over-value the differences between things as we scrutinize them."
Hsee and Zhang
The concept of the distinction bias was advanced by Christopher K. Hsee and Jiao Zhang of the University of Chicago as an explanation for differences in evaluations of options between joint evaluation mode and separate evaluation mode (2004). Evaluation mode is a contextual feature in decision making. Joint evaluation mode is when options are evaluated simultaneously, and separate evaluation mode is when each option is evaluated in isolation (e.g., Hsee, 1998; Hsee & Leclerc, 1998). Research shows that evaluation mode affects the evaluation of options, such that options presented simultaneously are evaluated differently from the same options presented separately.
Hsee and Zhang (2004) offered a number of potential explanations for this change in preferences from joint evaluation to separate evaluation, including the distinction |
https://en.wikipedia.org/wiki/Scandosorbus%20intermedia | Scandosorbus intermedia or, formerly, Sorbus intermedia, the Swedish whitebeam, is a species of whitebeam found in southern Sweden, with scattered occurrences in Estonia, Latvia, easternmost Denmark (Bornholm), the far southwest of Finland, and northern Poland.
Description
It is a medium-sized deciduous tree growing to tall with a stout trunk usually up to , but sometimes as much as in diameter, and grey bark; the crown is dome-shaped, with stout horizontal branches. The leaves are green above, and densely hairy with pale grey-white hairs beneath, long and broad, with four to seven oval lobes on each side of the leaf, broadest near the middle, rounded at the apex, and finely serrated margins. The autumn colour is dull yellowish to grey-brown. The flowers are diameter, with five white petals and 20 yellowish-white stamens; they are produced in corymbs diameter in late spring. The fruit is an oval pome long and in diameter, orange-red to red, maturing in mid autumn. The fruit is dryish, and eaten by thrushes and waxwings, which disperse the seeds.
Sorbus intermedia is a triple hybrid between S. aucuparia, S. torminalis, and either S. aria or one of its close relatives. It is closely related to Sorbus hybrida (Finnish whitebeam), another species of hybrid origin, which differs in having the leaves more deeply lobed, with the basal two pairs cut right to the midrib as separate leaflets. Both are tetraploid apomictic species which breed true without pollination.
Habitat, cultivation and uses
In the Nordic countries, the tree typically grows in forests, pastures or forest edges.
It is widely grown as an ornamental tree in northern Europe, valued for its tolerance of urban street conditions; it is very commonly used in avenues and urban parks. It is frequently naturalised in the British Isles. In recent years, much new planting of "Swedish whitebeam" has actually been of the related Sorbus mougeotii (Vosges whitebeam), another apomictic species from further |
https://en.wikipedia.org/wiki/Smart%20Data%20Compression | Smart Data Compression is a compressed GIS dataset format developed by ESRI. It stores all types of feature data and attribute information together as a core data structure. The SDC format is used in ESRI products such as ArcGIS StreetMap, ArcIMS Route Server, RouteMAP IMS, ArcGIS Business Analyst, and the ArcMobile SDK.
Compression ratios range from 8x to 20x depending on the data source and structure. SDC data is optimized for rapid map display, accurate routing, and high-performance geocoding.
Smart Data Compression is a proprietary format. The FAQ for ESRI's RouteServer IMS notes that additional datasets for that application must be prepared by an ESRI subsidiary at additional cost.
The SDC technology was developed by Software Technologies, ESRI partner in Russia.
Tele Atlas and NAVTEQ provide North American commercial street datasets in SDC format. This data was prepared using the Data Development Kit Pro (DDK Pro), which ESRI licenses to select vendors.
The term Smart Data and idea was coined and created by Dr. James A Rodgers professor at Indiana University of Pennsylvania and James A George, Circa "Smart Data Enterprise Performance Optimization Strategy"
Notes
Data compression |
https://en.wikipedia.org/wiki/Hedlundia%20hybrida | Hedlundia hybrida, the oakleaf mountain ash, Swedish service-tree or Finnish whitebeam, is a species of whitebeam native to Norway, eastern Sweden, south-western Finland, and locally in Latvia.
Description
Hedlundia hybrida is a medium-sized deciduous tree growing to 10–15 m tall with a stout trunk up to 60 cm in diameter, and grey bark. The crown is columnar or conic in young trees, becoming rounded with age, with branches angled upwards. The leaves are green above, and densely hairy with white hairs beneath. 7–12 cm long and 5–8 cm broad, the leaves are lobed, with six to nine oval lobes on each side of the leaf. These lobes are broadest near the base with the two basal pairs of lobes cut right to the midrib as separate leaflets, rounded at the apex, with finely serrated margins. The autumn colour is dull rusty brown. The flowers are 20 mm in diameter, with five white petals and 20 yellowish-white stamens; they are produced in corymbs 6–11 cm in diameter in late spring. The fruit is a globose pome 12–15 mm in diameter, bright red, maturing in mid-autumn. The fruit is succulent, and eaten by thrushes and waxwings, which disperse the seeds.
Taxonomy
It is a tetraploid species of hybrid origin between the European rowan (Sorbus aucuparia) and the Swedish whitebeam (Scandosorbus intermedia), the latter being a tetraploid triple hybrid between S. aucuparia, the wild service tree (Torminalis glaberrima), and the common whitebeam (Aria edulis) or one of its close relatives. S. intermedia differs from H. hybrida in having the leaves less deeply lobed with no separate leaflets. Closely related Hedlundia meinichii is a triploid or tetraploid species of hybrid origin between H. hybrida and S. aucuparia and differs in having the basal four to six pairs of lobes cut right to the midrib as separate leaflets. All three polyploid species are apomictic species which breed true without pollination.
Cultivation
Hedlundia hybrida is grown as an ornamental tree in northern Europe, |
https://en.wikipedia.org/wiki/Oral%20microbiology | Oral microbiology is the study of the microorganisms (microbiota) of the oral cavity and their interactions between oral microorganisms or with the host. The environment present in the human mouth is suited to the growth of characteristic microorganisms found there. It provides a source of water and nutrients, as well as a moderate temperature. Resident microbes of the mouth adhere to the teeth and gums to resist mechanical flushing from the mouth to stomach where acid-sensitive microbes are destroyed by hydrochloric acid.
Anaerobic bacteria in the oral cavity include: Actinomyces, Arachnia (Propionibacterium propionicus), Bacteroides, Bifidobacterium, Eubacterium, Fusobacterium, Lactobacillus, Leptotrichia, Peptococcus, Peptostreptococcus, Propionibacterium, Selenomonas, Treponema, and Veillonella. The most commonly found protists are Entamoeba gingivalis and Trichomonas tenax. Genera of fungi that are frequently found in the mouth include Candida, Cladosporium, Aspergillus, Fusarium, Glomus, Alternaria, Penicillium, and Cryptococcus, among others. Bacteria accumulate on both the hard and soft oral tissues in biofilms. Bacterial adhesion is particularly important for oral bacteria.
Oral bacteria have evolved mechanisms to sense their environment and evade or modify the host. Bacteria occupy the ecological niche provided by both the tooth surface and mucosal epithelium. Factors of note that have been found to affect the microbial colonization of the oral cavity include the pH, oxygen concentration and its availability at specific oral surfaces, mechanical forces acting upon oral surfaces, salivary and fluid flow through the oral cavity, and age. However, a highly efficient innate host defense system constantly monitors the bacterial colonization and prevents bacterial invasion of local tissues. A dynamic equilibrium exists between dental plaque bacteria and the innate host defense system. Of particular interest is the role of oral microorganisms in the two m |
https://en.wikipedia.org/wiki/Lexipedia | Lexipedia is an online visual semantic network with dictionary and thesaurus reference functionality built on Vantage Learning's Multilingual ConceptNet. Lexipedia presents words with their semantic relationships displayed in an animated visual word web. Lexipedia contains an expanded version of the English Wordnet and supports six languages; English, Dutch, French, German, Italian, Spanish languages. |
https://en.wikipedia.org/wiki/Wolfram%20Demonstrations%20Project | The Wolfram Demonstrations Project is an organized, open-source collection of small (or medium-sized) interactive programmes called Demonstrations, which are meant to visually and interactively represent ideas from a range of fields. It is hosted by Wolfram Research, whose stated goal is to bring computational exploration to a large population. At its launch, it contained 1300 demonstrations but has grown to over 10,000. The site won a Parents' Choice Award in 2008.
Technology
The Demonstrations run in Mathematica 6 or above and in Wolfram CDF Player which is a free modified version of Wolfram's Mathematica and available for Windows, Linux and macOS and can operate as a web browser plugin.
They typically consist of a very direct user interface to a graphic or visualization, which dynamically recomputes in response to user actions such as moving a slider, clicking a button, or dragging a piece of graphics. Each Demonstration also has a brief description of the concept.
Demonstrations can be embedded into any website or blog. Each Demonstration page includes a snippet of JavaScript code in the Share section of the sidebar.
Topics
The website is organized by topic: for example, science, mathematics, computer science, art, biology, and finance. They cover a variety of levels, from elementary school mathematics to much more advanced topics such as quantum mechanics and models of biological organisms. The site is aimed at both educators and students, as well as researchers who wish to present their ideas to the broadest possible audience.
Process
Wolfram Research's staff organizes and edits the Demonstrations, which may be created by any user of Mathematica, then freely published and freely downloaded. The Demonstrations are open-source, which means that they not only demonstrate the concept itself but also show how to implement it.
Alternatives
The use of the web to transmit small interactive programs is reminiscent of Sun's Java applets, Adobe's Flash, and the o |
https://en.wikipedia.org/wiki/Receptor%20theory | Receptor theory is the application of receptor models to explain drug behavior. Pharmacological receptor models preceded accurate knowledge of receptors by many years. John Newport Langley and Paul Ehrlich introduced the concept that receptors can mediate drug action at the beginning of the 20th century. Alfred Joseph Clark was the first to quantify drug-induced biological responses (specifically, f-mediated receptor activation). So far, nearly all of the quantitative theoretical modelling of receptor function has centred on ligand-gated ion channels and G protein-coupled receptors.
History
The receptor concept
In 1901, Langley challenged the dominant hypothesis that drugs act at nerve endings by demonstrating that nicotine acted at sympathetic ganglia even after the degeneration of the severed preganglionic nerve endings. In 1905 he introduced the concept of a receptive substance on the surface of skeletal muscle that mediated the action of a drug. Langley postulated that these receptive substances were different in different species (citing the fact that nicotine-induced muscle paralysis in mammals was absent in crayfish). Around the same time, Ehrlich was trying to understand the basis of selectivity of agents. He theorized that selectivity was the basis of a preferential distribution of lead and dyes in different body tissues. However, he later modified the theory in order to explain immune reactions and the selectivity of the immune response. Thinking that selectivity was derived from interaction with the tissues themselves, Ehrlich envisaged molecules extending from cells that the body could use to distinguish and mount an immune response to foreign objects. However, it was only after Ahlquist demonstrated the differential effects of adrenaline on two distinct receptor populations, that the theory of receptor-mediated drug interactions gained acceptance.
Nature of receptor–drug interactions
Receptor occupancy model
The receptor occupancy model, which descr |
https://en.wikipedia.org/wiki/Grothendieck%27s%20connectedness%20theorem | In mathematics, Grothendieck's connectedness theorem , states that if A is a complete Noetherian local ring whose spectrum is k-connected and f is in the maximal ideal, then Spec(A/fA) is (k − 1)-connected. Here a Noetherian scheme is called k-connected if its dimension is greater than k and the complement of every closed subset of dimension less than k is connected.
It is a local analogue of Bertini's theorem.
See also
Zariski connectedness theorem
Fulton–Hansen connectedness theorem |
https://en.wikipedia.org/wiki/Peter%20Winkler | Peter Mann Winkler is a research mathematician, author of more than 125 research papers in mathematics and patent holder in a broad range of applications, ranging from cryptography to marine navigation. His research areas include discrete mathematics, theory of computation and probability theory.
He is currently a professor of mathematics and computer science at Dartmouth College.
Peter Winkler studied mathematics at Harvard University and later received his PhD in 1975 from Yale University under the supervision of Angus McIntyre. He has also served as an assistant professor at Stanford, full professor and chair at Emory and as a mathematics research director at Bell Labs and Lucent Technologies. He was visiting professor at the Technische Universität Darmstadt.
He has published three books on mathematical puzzles: Mathematical Puzzles: A connoisseur's collection (A K Peters, 2004, ), Mathematical Mind-Benders (A K Peters, 2007, ), and Mathematical Puzzles (A K Peters, 2021, ). And he is widely considered to be a pre eminent scholar in this domain. He was the Visiting Distinguished Chair for Public Dissemination of Mathematics at the National Museum of Mathematics (MoMath), gave topical talks at the Gathering 4 Gardner conferences, and wrote novel papers related to some of these puzzles.
Winkler's book Bridge at the Enigma Club was a runner up for the 2011 Master Point Press Book Of The Year award.
Also in 2011, Winkler received the David P. Robbins Prize of the Mathematical Association of America as coauthor of one of two papers in the American Mathematical Monthly.
Paul Erdős anecdote
According to a story included in Chapter One of "The Man Who Loved Only Numbers / The Story of Paul Erdös and the Search for Mathematical Truth", Paul Erdős attended the bar mitzvah celebration for Peter Winkler's twins, and Winkler's mother-in-law tried to throw Erdős out. [Quote:]"Erdös came to my twins' bar mitzvah, notebook in hand," said Peter Winkler, a colleague of Grah |
https://en.wikipedia.org/wiki/Pest%20Management%20Regulatory%20Agency | The Pest Management Regulatory Agency (PMRA) is the Canadian government agency responsible for the regulation of pest control products in Canada under the federal authority of the Pest Control Products Act and Regulations. The agency is a branch that reports to Parliament through Health Canada. The PMRA is responsible for providing access to pest management tools while minimizing the risks to human health and the environment by “using modern evidence-based scientific approaches to pesticide regulation, in an open and transparent manner”. Their main activity areas include: new product evaluation, post market review and compliance and enforcement.
The PMRA works with provincial, territorial and federal departments in Canada to help refine and strengthen pesticide regulation across the country. Outside of Canada, the Agency works closely with international organizations such as the United States Environmental Protection Agency (EPA), the North American Free Trade Agreement Technical Working Group, the European Union, and the Organisation for Economic Co-operation and Development (OECD). They work to align the processes used to regulate pest control products and uphold the protection of health and the environment.
As of April 2017, the agency has approximately 400 employees. Over 75% of PMRA’s employees are scientists, with specializations in toxicology, environmental science, biology and chemistry. Other employees include policy, regulations, communications and administration. The PMRA's headquarters is in the Sir Charles Tupper Building in Ottawa, ON.
History
In 1990, the Pesticides Registration Review Team was tasked with developing recommendations to improve the federal pesticide regulatory system. The Review Team consulted with Canadians across the country proposing a major reform to the federal pest management regulatory system. Proposed reforms from the Review Team were to establish a multi-stakeholder advisory council and the federal/provincial/territorial c |
https://en.wikipedia.org/wiki/Post%20canonical%20system | A Post canonical system, also known as a Post production system, as created by Emil Post, is a string-manipulation system that starts with finitely-many strings and repeatedly transforms them by applying a finite set j of specified rules of a certain form, thus generating a formal language. Today they are mainly of historical relevance because every Post canonical system can be reduced to a string rewriting system (semi-Thue system), which is a simpler formulation. Both formalisms are Turing complete.
Definition
A Post canonical system is a triplet (A,I,R), where
A is a finite alphabet, and finite (possibly empty) strings on A are called words.
I is a finite set of initial words.
R is a finite set of string-transforming rules (called production rules), each rule being of the following form:
where each and is a specified fixed word, and each $ and $' is a variable standing for an arbitrary word. The strings before and after the arrow in a production rule are called the rule's antecedents and consequent, respectively. It is required that each $' in the consequent be one of the $s in the antecedents of that rule, and that each antecedent and consequent contain at least one variable.
In many contexts, each production rule has only one antecedent, thus taking the simpler form
The formal language generated by a Post canonical system is the set whose elements are the initial words together with all words obtainable from them by repeated application of the production rules. Such sets are recursively enumerable languages and every recursively enumerable language is the restriction of some such set to a sub-alphabet of A.
Example (well-formed bracket expressions)
Alphabet: {[, ]}
Initial word: []
Production rules:
(1) $ → [$]
(2) $ → $$
(3) $1$2 → $1[]$2
Derivation of a few words in the language of well-formed bracket expressions:
[] initial word
[][] by (2)
[[][]] by (1)
|
https://en.wikipedia.org/wiki/Cancer%20immunology | Cancer immunology is an interdisciplinary branch of biology and a sub-discipline of immunology that is concerned with understanding the role of the immune system in the progression and development of cancer; the most well known application is cancer immunotherapy, which utilises the immune system as a treatment for cancer. Cancer immunosurveillance and immunoediting are based on protection against development of tumors in animal systems and (ii) identification of targets for immune recognition of human cancer.
Definition
Cancer immunology is an interdisciplinary branch of biology concerned with the role of the immune system in the progression and development of cancer; the most well known application is cancer immunotherapy, where the immune system is used to treat cancer. Cancer immunosurveillance is a theory formulated in 1957 by Burnet and Thomas, who proposed that lymphocytes act as sentinels in recognizing and eliminating continuously arising, nascent transformed cells. Cancer immunosurveillance appears to be an important host protection process that decreases cancer rates through inhibition of carcinogenesis and maintaining of regular cellular homeostasis. It has also been suggested that immunosurveillance primarily functions as a component of a more general process of cancer immunoediting.
Tumor antigens
Tumors may express tumor antigens that are recognized by the immune system and may induce an immune response. These tumor antigens are either TSA (Tumor-specific antigen) or TAA (Tumor-associated antigen).
Tumor-specific
Tumor-specific antigens (TSA) are antigens that only occur in tumor cells. TSAs can be products of oncoviruses like E6 and E7 proteins of human papillomavirus, occurring in cervical carcinoma, or EBNA-1 protein of EBV, occurring in Burkitt's lymphoma cells. Another example of TSAs are abnormal products of mutated oncogenes (e.g. Ras protein) and anti-oncogenes (e.g. p53).
Tumor-associated antigens
Tumor-associated antigens (TAA) are pr |
https://en.wikipedia.org/wiki/Advanced%20Stirling%20radioisotope%20generator | The advanced Stirling radioisotope generator (ASRG) is a radioisotope power system first developed at NASA's Glenn Research Center. It uses a Stirling power conversion technology to convert radioactive-decay heat into electricity for use on spacecraft. The energy conversion process used by an ASRG is significantly more efficient than previous radioisotope systems, using one quarter of the plutonium-238 to produce the same amount of power.
Despite termination of the ASRG flight development contract in 2013, NASA continues a small investment testing by private companies. Flight-ready Stirling-based units are not expected before 2028.
Development
Development was undertaken in 2000 under joint sponsorship by the United States Department of Energy (DoE), Lockheed Martin Space Systems, and the Stirling Research Laboratory at NASA's Glenn Research Center (GRC) for potential future space missions.
In 2012, NASA chose a solar-powered mission (InSight) for the Discovery 12 interplanetary mission, negating the need for a radioisotope power system for the 2018 launch.
The DOE cancelled the Lockheed contract in late 2013, after the cost had risen to over $260 million, $110 million more than originally expected. It was also decided to make use of remaining program hardware in constructing and testing a second engineering unit (for testing and research), which was completed in August 2014 in a close-out phase and shipped to GRC. Testing done in 2015 showed power fluctuations after just 175 hr of operation, becoming more frequent and larger in magnitude.
NASA also needed more funding for continued plutonium-238 production (which will be used in existing MMRTGs for long-range probes in the meantime) and decided to use the savings from the ASRG cancellation to do so rather than take funding from science missions.
Despite termination of the ASRG flight development contract, NASA continues a small investment testing Stirling converter technologies developed by Sunpower Inc. and I |
https://en.wikipedia.org/wiki/Packet%20generator | A packet generator or packet builder is a type of software that generates random packets or allows the user to construct detailed custom packets. Depending on the network medium and operating system, packet generators utilize raw sockets, NDIS function calls, or direct access to the network adapter kernel-mode driver.
This is useful for testing implementations of IP stacks for bugs and security vulnerabilities.
Comparison
General Information
See also
Packet crafting
Packet analyzer
Packetsquare
Network analyzers
Packets (information technology) |
https://en.wikipedia.org/wiki/List%20of%20ethnic%20sports%20team%20and%20mascot%20names | Many sports teams are named for an ethnic group or similar category of people. Though these names typically refer to a group native to the area in which the sports team is based, many teams take their names from groups which are known for their strength (such as Spartans or Vikings), despite not being located near the historic homes of these groups.
Professional teams
American
Allen Americans (ECHL) – Allen, Texas, USA
Houston Texans (National Football League) – Houston, Texas, USA
New York Knicks (NBA), the name "Knick" is a shortened version of the word "Knickerbocker", a term which comes from a pseudonym used by Washington Irving in his book, A History of New York. The term was used to refer to the descendants of the original Dutch settlers of New York. Later, by extension, the term was used to describe New Yorkers in general.
New York Yankees (Major League Baseball) – New York City, New York, USA
Rochester Americans (American Hockey League) – Rochester, New York, USA
Tri-City Americans (Western Hockey League) – Kennewick, Washington, USA
Bavarians
FC Bayern Munich (Association football) – Munich, Germany
Boers
Indios del Bóer ("Indians of the Boer") (Baseball) - Managua, Nicaragua
Canadian
Canadians in general
Vancouver Canucks (National Hockey League) – Vancouver, British Columbia
French Canadians
Les Canadiennes de Montréal (Canadian Women's Hockey League) – Montreal, Quebec, Canada
Montreal Canadiens (National Hockey League) – Montreal, Quebec, Canada
Celtic/Irish
Boston Celtics (NBA) – Boston, Massachusetts, USA
Celta de Vigo – Galician football team whose name reflects Celtic people.
Celtic FC – Scottish football team whose name reflects Celtic people, both Scottish and Irish.
Hibernian FC – Scottish football club reflecting Irish origins.
London Irish (Premiership Rugby) – Brentford, Greater London, England
Cornish
London Cornish (Rugby Union) – London, England
Cossacks
Vinnytski Haidamaky (Ukrainian Hockey Championship) |
https://en.wikipedia.org/wiki/OpenSocial | OpenSocial is a public specification that defines a component hosting environment (container) and a set of common application programming interfaces (APIs) for web applications. Initially, it was designed for social network applications. It was developed by Google along with MySpace and several other social networks. Recently, it has been adopted as a general use runtime environment for allowing untrusted and partially trusted components from third parties to run in an existing web application. The OpenSocial Foundation moved to integrate or support numerous other Open Web technologies. This includes OAuth and OAuth 2.0, Activity Streams, and Portable Contacts, among others.
It was released on November 1, 2007.
Applications implementing the OpenSocial APIs are interoperable with any social network system that supports them. At launch, OpenSocial took a one-size-fits-all approach to development. As it became more robust and the user-base expanded, OpenSocial modularized the platform to allow developers to only include the parts of the platform it needed.
On December 16, 2014, the W3C issued a press release, "OpenSocial Foundation Moving Standards Work to W3C Social Web Activity", stating that OpenSocial would no longer exist as a separate entity, and encouraging the OpenSocial community to continue development work through the W3C Social Web Activity in the Social Web Working Group and Social Interest Group. The OpenSocial Foundation stated that "the community will have a better chance of realizing an open social web through discussions at a single organization, and the OpenSocial Foundation board believes that working as an integrated part of W3C will help reach more communities that will benefit from open social standards."
Structure
Based on HTML and JavaScript, as well as the Google Gadgets framework, OpenSocial includes multiple APIs for social software applications to access data and core functions on participating social networks. Each API addresses a dif |
https://en.wikipedia.org/wiki/Die%20shrink | The term die shrink (sometimes optical shrink or process shrink) refers to the scaling of metal–oxide–semiconductor (MOS) devices. The act of shrinking a die creates a somewhat identical circuit using a more advanced fabrication process, usually involving an advance of lithographic nodes. This reduces overall costs for a chip company, as the absence of major architectural changes to the processor lowers research and development costs while at the same time allowing more processor dies to be manufactured on the same piece of silicon wafer, resulting in less cost per product sold.
Die shrinks are the key to lower prices and higher performance at semiconductor companies such as Samsung, Intel, TSMC, and SK Hynix, and fabless manufacturers such as AMD (including the former ATI), NVIDIA and MediaTek.
Details
Examples in the 2000s include the downscaling of the PlayStation 2's Emotion Engine processor from Sony and Toshiba (from 180 nm CMOS in 2000 to 90 nm CMOS in 2003), the codenamed Cedar Mill Pentium 4 processors (from 90 nm CMOS to 65 nm CMOS) and Penryn Core 2 processors (from 65 nm CMOS to 45 nm CMOS), the codenamed Brisbane Athlon 64 X2 processors (from 90 nm SOI to 65 nm SOI), various generations of GPUs from both ATI and NVIDIA, and various generations of RAM and flash memory chips from Samsung, Toshiba and SK Hynix. In January 2010, Intel released Clarkdale Core i5 and Core i7 processors fabricated with a 32 nm process, down from a previous 45 nm process used in older iterations of the Nehalem processor microarchitecture. Intel, in particular, formerly focused on leveraging die shrinks to improve product performance at a regular cadence through its Tick-Tock model. In this business model, every new microarchitecture (tock) is followed by a die shrink (tick) to improve performance with the same microarchitecture.
Die shrinks are beneficial to end-users as shrinking a die reduces the current used by each transistor switching on or off in semiconductor device |
https://en.wikipedia.org/wiki/Wine%20tasting%20descriptors | The use of wine tasting descriptors allows the taster to qualitatively relate the aromas and flavors that the taster experiences and can be used in assessing the overall quality of wine. Wine writers differentiate wine tasters from casual enthusiasts; tasters attempt to give an objective description of the wine's taste (often taking a systematic approach to tasting), casual enthusiasts appreciate wine but pause their examination sooner than tasters. The primary source of a person's ability to taste wine is derived from their olfactory senses. A taster's own personal experiences play a significant role in conceptualizing what they are tasting and attaching a description to that perception. The individual nature of tasting means that descriptors may be perceived differently among various tasters.
The following is an incomplete list of wine tasting descriptors and a common meaning of the terms. These terms and usage are from Karen MacNeil's 2001 edition of The Wine Bible unless otherwise noted.
A–C
Acidic: A wine with a noticeable sense of acidity. It's detected by the mouth watering sensation.
Aftertaste: The taste left on the palate after wine has been swallowed. "Finish" is a synonym.
Alcoholic: A wine that has an unbalanced presence of too much alcohol.
Aroma: The smell of a wine. The term is generally applied to younger wines, while bouquet is reserved for more aged wines.
Astringent: An overly tannic white wine.
Autolytic: Aroma of "yeasty" or acacia-like floweriness commonly associated with wines that have been aged sur lie.
Baked: A wine with a high alcohol content that gives the perception of stewed or baked fruit flavors. May indicate a wine from grapes that were exposed to the heat of the sun after harvesting.
Balanced: A wine that incorporates all its main components—tannins, acid, sweetness, and alcohol—in a manner where no one single component stands out.
Big: A wine with intense flavor, or high in alcohol.
Bitter: An unpleasant perception of |
https://en.wikipedia.org/wiki/Thirteen%20%28House%29 | Remy "Thirteen" Hadley, M.D., is a fictional character on the Fox medical drama House, portrayed by Olivia Wilde. She is part of the new diagnostic team assembled by Dr. Gregory House after the disbanding of his previous team in the third-season finale. The character's nickname derives from the episode "The Right Stuff", when she is assigned the number during a competition for her position at the Princeton-Plainsboro Teaching Hospital.
The show depicts Thirteen as a secretive character who does not divulge personal information; her surname was not used on the show until the fourth season's penultimate episode "House's Head", nor her given name until the fifth-season episode "Emancipation". Instead, several of the character's traits are implied before they are depicted as true. In the season four episode "You Don't Want to Know", Thirteen tells House that her mother died from Huntington's disease; a test she performs several episodes later confirms she carries the gene. After hints were given regarding her character's sexuality, Wilde confirmed that her character is indeed bisexual. This is confirmed by Eric Foreman in the episode "Don't Ever Change".
Characterization
Thirteen is reluctant to reveal information about herself and is extremely secretive. During House's new team member selection process in the fourth season, she simply lets her fellow applicants refer to her as "Thirteen" rather than her real name, and constantly deflects curious prodding from both House and Amber Volakis about her personal life and past. Amber admits to feeling threatened by how Thirteen's unusually secretive nature is fascinating to the prying House, who in season seven tells Thirteen she has the best "game face" he has ever seen. In the episode "Lockdown" Thirteen spends the episode engaged in a game of truth or dare with James Wilson, but at the end it is implied that everything she has said has been a lie.
Although his meddling with her personal affairs and insatiable curiosity |
https://en.wikipedia.org/wiki/XDNA%20%28multi-graphics%29 | The xDNA technology is a technology designed by Diamond Multimedia, allowing motherboards which are not certified for ATI CrossFire (for instance, nForce 500/600 series motherboards designed by Nvidia) to install multiple ATI Radeon video cards (up to four) as a CrossFire setup and operate in rendering modes which are exclusively made for CrossFire setups. Diamond Multimedia will provide optimized Catalyst drivers and middleware for the platform in a single package.
See also
SLI |
https://en.wikipedia.org/wiki/Eriodictyol | Eriodictyol is a bitter-masking flavanone, a flavonoid extracted from yerba santa (Eriodictyon californicum), a plant native to North America. Eriodictyol is one of the four flavanones identified in this plant as having taste-modifying properties, the other three being homoeriodictyol, its sodium salt, and sterubin.
Eriodictyol was also found in the twigs of Millettia duchesnei, in Eupatorium arnottianum, and its glycosides (eriocitrin) in lemons and rose hips (Rosa canina). |
https://en.wikipedia.org/wiki/Homoeriodictyol | Homoeriodictyol is a bitter-masking flavanone extracted from Yerba Santa (Eriodictyon californicum) a plant growing in America.
Homoeriodictyol (3`-methoxy-4`,5,7-trihydroxyflavanone) is one of the 4 flavanones identified by Symrise in this plant eliciting taste-modifying property: homoeriodictyol sodium salt, eriodictyol and sterubin. Homoeriodictyol Sodium salt elicited the most potent bitter-masking activity by reducing from 10 to 40% the bitterness of salicin, amarogentin, paracetamol and quinine. However no bitter-masking activity was detected with bitter linoleic acid emulsions. According to Symrise's scientists homoeriodictyol sodium salt seems to be a taste-modifier with large potential in food applications and pharmaceuticals.
Structural relatives investigation based on eriodictyol and homoeriodictyol, found 2,4-Dihydroxybenzoic acid vanillylamide to elicits bitter-masking activity. At 0.1g/L, this vanillin derivative, was able to reduce the bitterness of a 0.5g/L caffeine solution by about 30%. |
https://en.wikipedia.org/wiki/Fail2ban | Fail2ban is an intrusion prevention software framework. Written in the Python programming language, it is designed to prevent brute-force attacks. It is able to run on POSIX systems that have an interface to a packet-control system or firewall installed locally, such as iptables or TCP Wrapper.
Functionality
Fail2ban operates by monitoring log files (e.g. , , etc.) for selected entries and running scripts based on them. Most commonly this is used to block selected IP addresses that may belong to hosts that are trying to breach the system's security. It can ban any host IP address that makes too many login attempts or performs any other unwanted action within a time frame defined by the administrator. It includes support for both IPv4 and IPv6. Optionally longer bans can be custom-configured for "recidivist" abusers that keep coming back. Fail2ban is typically set up to unban a blocked host within a certain period, so as to not "lock out" any genuine connections that may have been temporarily misconfigured. However, an unban time of several minutes is usually enough to stop a network connection being flooded by malicious connections, as well as reducing the likelihood of a successful dictionary attack.
Fail2ban can perform multiple actions whenever an abusive IP address is detected: update Netfilter/iptables or PF firewall rules, TCP Wrapper's table, to reject an abuser's IP address; email notifications; or any user-defined action that can be carried out by a Python script.
The standard configuration ships with filters for Apache, Lighttpd, sshd, vsftpd, qmail, Postfix and Courier Mail Server. Filters are defined by Python regexes, which may be conveniently customized by an administrator familiar with regular expressions. A combination of a filter and an action is known as a "jail" and is what causes a malicious host to be blocked from accessing specified network services. As well as the examples that are distributed with the software, a "jail" may be created fo |
https://en.wikipedia.org/wiki/Sterubin | Sterubin (7-methoxy-3',4',5-trihydroxyflavanone) is a bitter-masking flavanone extracted from Yerba Santa (Eriodictyon californicum) a plant growing in America.
Sterubin is one of the four flavanones identified by Symrise in this plant which elicit taste-modifying properties. The others are homoeriodictyol, its sodium salt, and eriodictyol.
Recent research has demonstrated some neuroprotective properties of Sterubin in vitro, but more research is needed before it can be considered a true drug candidate. |
https://en.wikipedia.org/wiki/Bag-of-words%20model | The bag-of-words model is a model of text represented as an unordered collection of words. It is used in natural language processing and information retrieval (IR). It disregards grammar and word order but keeps multiplicity. The bag-of-words model has also been used for computer vision.
The bag-of-words model is commonly used in methods of document classification where the (frequency of) occurrence of each word is used as a feature for training a classifier.
An early reference to "bag of words" in a linguistic context can be found in Zellig Harris's 1954 article on Distributional Structure.
The Bag-of-words model is one example of a Vector space model.
Example implementation
The following models a text document using bag-of-words. Here are two simple text documents:
(1) John likes to watch movies. Mary likes movies too.
(2) Mary also likes to watch football games.
Based on these two text documents, a list is constructed as follows for each document:
"John","likes","to","watch","movies","Mary","likes","movies","too"
"Mary","also","likes","to","watch","football","games"
Representing each bag-of-words as a JSON object, and attributing to the respective JavaScript variable:
BoW1 = {"John":1,"likes":2,"to":1,"watch":1,"movies":2,"Mary":1,"too":1};
BoW2 = {"Mary":1,"also":1,"likes":1,"to":1,"watch":1,"football":1,"games":1};
Each key is the word, and each value is the number of occurrences of that word in the given text document.
The order of elements is free, so, for example {"too":1,"Mary":1,"movies":2,"John":1,"watch":1,"likes":2,"to":1} is also equivalent to BoW1. It is also what we expect from a strict JSON object representation.
Note: if another document is like a union of these two,
(3) John likes to watch movies. Mary likes movies too. Mary also likes to watch football games.
its JavaScript representation will be:
BoW3 = {"John":1,"likes":3,"to":2,"watch":2,"movies":2,"Mary":2,"too":1,"also":1,"football":1,"games":1};
So, as we see in the bag alge |
https://en.wikipedia.org/wiki/Open-loop%20model | In game theory, an open-loop model is the one where players cannot observe the play of their opponents, as opposed to a closed-loop model, where all past play is common knowledge. The solution to an open-loop model is called "open-loop equilibrium".
Open loop models are more tractable, which is why they are sometimes preferred to closed-loop models even when the latter is a better description of reality. |
https://en.wikipedia.org/wiki/Metal%20electrode%20leadless%20face | Metal electrode leadless face (MELF) is a type of leadless cylindrical electronic surface mount device that is metallized at its ends. MELF devices are usually diodes and resistors.
The EN 140401-803 and JEDEC DO-213 standards describe multiple MELF components.
Handling difficulties
Because of their cylindrical shape and small size, in some cases these components can easily roll off the workbench or circuit board before they have been soldered into place. As such, there is a joke which suggests an alternate meaning for the acronym: Most End up Lying on the Floor. Additionally, MELF components are sometimes called a "roll away" package.
During automated SMT pick-and-place, this happens mostly if the mechanical pressure of the SMD placer nozzle is too low. If the MELF components are placed into the solder paste with enough pressure, then this problem can be minimized. Care must be taken with glass diodes which are less mechanically robust than resistors and other MELF components.
Also, when building up PCBs via manual assembly using tweezers (e.g., for prototyping) then the pressure at the end of tweezers can often cause a MELF component to slip and shoot out the ends, thereby making their placement more difficult, compared to other flat component packages.
Another reason for the nickname of MELF components is that most production engineers do not like to use MELF nozzles on a SMT pick-and-place machine. For them it is waste of time to change from flat nozzles to MELF nozzles. For MICRO-MELF and MINI-MELF most SMD placers are able to use flat chip nozzles if the vacuum is high enough; i.e., higher than for flat chip components. For MELFs with the case size of 0207 or less, it is recommended to use the original MELF nozzle supplied with the SMT machine. Each supplier of such SMD pick-and-place machines offers these types of nozzles.
In order to overcome some of the difficulties encountered when mounting these devices, there are also variants with square electro |
https://en.wikipedia.org/wiki/Salivatory%20nuclei | The salivatory nuclei are two parasympathetic general visceral efferent cranial nerve nuclei - the superior salivatory nucleus and the inferior salivatory nucleus - that innervate the salivary glands. Both are located in the pontine tegmentum of the brainstem.
The superior salivatory nucleus is a nucleus of the facial nerve (cranial nerve VII). It innervates the submandibular and sublingual salivary glands (as well as a number of other glands of the head). Its fibres synapse at the pterygopalatine ganglion, and submandibular ganglion.
The inferior salivatory nucleus is a nucleus of the glossopharyngeal nerve (cranial nerve IX). It innervates the parotid gland. Its fibres synapse at the otic ganglion.
Superior salivatory nucleus
The superior salivatory nucleus (or nucleus salivatorius superior) is a visceral motor cranial nerve nucleus of the facial nerve (CN VII). It is located in the pontine tegmentum. It projects pre-ganglionic visceral motor parasympathetic efferents (via CN VII) to the pterygopalatine ganglion, and submandibular ganglion.
The term "lacrimal nucleus" is sometimes used to refer to a portion of the superior salivatory nucleus.
Efferents
Preganglionic fibers en route to the pterygopalatine ganglion (destined to ultimately innervate the lacrimal gland and the mucosal glands of the nose, palate, and pharynx) subsequently form the greater petrosal nerve, whereas those en route to the submandibular ganglion (destined to ultimately innervate the submandibular and sublingual salivary glands) subsequently form the chorda tympani.
Afferents
The nucleus receives cortical stimuli from the nucleus of solitary tract via the dorsal longitudinal fasciculus and reflex connections.
Inferior salivatory nucleus
The inferior salivatory nucleus (or nucleus salivatorius inferior) is a cluster of neurons in the pontine tegmentum (i.e. dorsal part of the pons), just superior to its junction with the medulla. It is the general visceral efferent (GVE) component of |
https://en.wikipedia.org/wiki/Audio%20mining | Audio mining is a technique by which the content of an audio signal can be automatically analyzed and searched. It is most commonly used in the field of automatic speech recognition, where the analysis tries to identify any speech within the audio. The term ‘audio mining’ is sometimes used interchangeably with audio indexing, phonetic searching, phonetic indexing, speech indexing, audio analytics, speech analytics, word spotting, and information retrieval. Audio indexing, however, is mostly used to describe the pre-process of audio mining, in which the audio file is broken down into a searchable index of words.
History
Academic research on audio mining began in the late 1970s in schools like Carnegie Mellon University, Columbia University, the Georgia Institute of Technology, and the University of Texas. Audio data indexing and retrieval began to receive attention and demand in the early 1990s, when multimedia content started to develop and the volume of audio content significantly increased.
Before audio mining became the mainstream method, written transcripts of audio content were created and manually analyzed.
Process
Audio mining is typically split into four components: audio indexing, speech processing and recognition systems, feature extraction and audio classification. The audio will typically be processed by a speech recognition system in order to identify word or phoneme units that are likely to occur in the spoken content. This information may either be used immediately in pre-defined searches for keywords or phrases (a real-time "word spotting" system), or the output of the speech recognizer may be stored in an index file. One or more audio mining index files can then be loaded at a later date in order to run searches for keywords or phrases.
The results of a search will normally be in terms of hits, which are regions within files that are good matches for the chosen keywords. The user may then be able to listen to the audio corresponding to these hits |
https://en.wikipedia.org/wiki/Inter-protocol%20exploitation | Inter-protocol exploitation is a class of security vulnerabilities that takes advantage of interactions between two communication protocols, for example the protocols used in the Internet. It is commonly discussed in the context of the Hypertext Transfer Protocol (HTTP). This attack uses the potential of the two different protocols meaningfully communicating commands and data.
It was popularized in 2007 and publicly described in research of the same year. The general class of attacks that it refers to has been known since at least 1994 (see the Security Considerations section of RFC 1738).
Internet Protocol implementations allow for the possibility of encapsulating exploit code to compromise a remote program that uses a different protocol. Inter-protocol exploitation can utilize inter-protocol communication to establish the preconditions for launching an inter-protocol exploit. For example, this process could negotiate the initial authentication communication for a vulnerability in password parsing. Inter-protocol exploitation is where one protocol attacks a service running a different protocol. This is a legacy problem because the specifications of the protocols did not take into consideration an attack of this type.
Technical details
The two protocols involved in the vulnerability are termed the carrier and target. The carrier encapsulates the commands and/or data. The target protocol is used for communication to the intended victim service. Inter-protocol communication will be successful if the carrier protocol can encapsulate the commands and/or data sufficiently to meaningfully communicate to the target service.
Two preconditions need to be met for successful communication across protocols: encapsulation and error tolerance. The carrier protocol must encapsulate the data and commands in a manner that the target protocol can understand. It is highly likely that the resulting data stream with induce parsing errors in the target protocol.
The target protocol |
https://en.wikipedia.org/wiki/Wake%20turbulence%20category | Wake turbulence categories and wake turbulence groups are defined by the International Civil Aviation Organization for the purpose of separating aircraft in flight, due to wake turbulence.
Wake turbulence categories
Since 2020, there are four categories, based on maximum certificated take-off mass:
Light (L) — aircraft types of 7,000 kg or less.
Medium (M) — aircraft types more than 7,000 kg but less than 136,000 kg; and
Heavy (H) — all aircraft types of 136 000 kg or more, with the exception of aircraft types in Super (J) category; and
Super (J) — aircraft types specified as such in ICAO Doc 8643, Aircraft Type Designators.
As of 2023, the only aircraft in Category J is the Airbus A380, with an MTOW of ). Before its destruction, the single Antonov An-225 (MTOW of ) was classified by the FAA as Super, although it is classified by ICAO as Heavy. The Antonov An-225 and the Antonov An-124 Ruslan are classified by the UK Civil Aviation Authority as Super, although they are classified by ICAO as Heavy.
Most wide-body aircraft are classified as Heavy. Not all aircraft variants of the same type have the same wake turbulence category. The narrow-bodied Boeing 707-100 is Medium but the 707-300 is Heavy.
Radio communication
The word "super" or "heavy" should be included by super or heavy aircraft immediately after the aircraft call-sign in initial radio contact with air traffic service (ATS) units, to warn ATS and other aircraft that they should leave additional separation to avoid this wake turbulence.
Distance-based separation minima
Distance-based separation minima for approach and departure are given by ICAO as follows:
Time-based separation minima
For landing aircraft, time-based separation minima are as follows:
HEAVY aircraft landing behind SUPER aircraft — 2 minutes
MEDIUM aircraft landing behind SUPER aircraft — 3 minutes
MEDIUM aircraft landing behind HEAVY aircraft — 2 minutes
LIGHT aircraft landing behind SUPER aircraft — 4 minutes
LIGHT aircra |
https://en.wikipedia.org/wiki/VNIR | The visible and near-infrared (VNIR) portion of the electromagnetic spectrum has wavelengths between approximately 400 and 1100 nanometers (nm). It combines the full visible spectrum with an adjacent portion of the infrared spectrum up to the water absorption band between 1400 and 1500 nm.
Some definitions also include the short-wavelength infrared band from 1400 nm up to the water absorption band at 2500 nm.
VNIR multi-spectral image cameras have wide applications in remote sensing and imaging spectroscopy. Hyperspectral Imaging Satellite carried two payloads, among which one was working on the spectral range of VNIR.
See also
Advanced Spaceborne Thermal Emission and Reflection Radiometer
Airborne Real-time Cueing Hyperspectral Enhanced Reconnaissance
Mars Reconnaissance Orbiter
Near infrared spectroscopy |
https://en.wikipedia.org/wiki/Electromagnetic%20absorption%20by%20water | The absorption of electromagnetic radiation by water depends on the state of the water.
The absorption in the gas phase occurs in three regions of the spectrum. Rotational transitions are responsible for absorption in the microwave and far-infrared, vibrational transitions in the mid-infrared and near-infrared. Vibrational bands have rotational fine structure. Electronic transitions occur in the vacuum ultraviolet regions.
Liquid water has no rotational spectrum but does absorb in the microwave region. Its weak absorption in the visible spectrum results in the pale blue color of water.
Overview
The water molecule, in the gaseous state, has three types of transition that can give rise to absorption of electromagnetic radiation:
Rotational transitions, in which the molecule gains a quantum of rotational energy. Atmospheric water vapour at ambient temperature and pressure gives rise to absorption in the far-infrared region of the spectrum, from about 200 cm−1 (50 μm) to longer wavelengths towards the microwave region.
Vibrational transitions in which a molecule gains a quantum of vibrational energy. The fundamental transitions give rise to absorption in the mid-infrared in the regions around 1650 cm−1 (μ band, 6 μm) and 3500 cm−1 (so-called X band, 2.9 μm)
Electronic transitions in which a molecule is promoted to an excited electronic state. The lowest energy transition of this type is in the vacuum ultraviolet region.
In reality, vibrations of molecules in the gaseous state are accompanied by rotational transitions, giving rise to a vibration-rotation spectrum. Furthermore, vibrational overtones and combination bands occur in the near-infrared region. The HITRAN spectroscopy database lists more than 37,000 spectral lines for gaseous H216O, ranging from the microwave region to the visible spectrum.
In liquid water the rotational transitions are effectively quenched, but absorption bands are affected by hydrogen bonding. In crystalline ice the vibrational spec |
https://en.wikipedia.org/wiki/Coats%20of%20arms%20of%20the%20Holy%20Roman%20Empire | Over its long history, the Holy Roman Empire used many different heraldic forms, representing its numerous internal divisions.
Imperial coat of arms
Coats of arms of Holy Roman Emperors
The Reichsadler ("Imperial Eagle") was the heraldic eagle, derived from the Roman eagle standard, used by the Holy Roman Emperors and in modern coats of arms of Germany, including those of the Second German Empire (1871–1918), the Weimar Republic (1919–1933) and the "Third Reich" (Nazi Germany, 1933–1945). The same design has remained in use by the Federal Republic of Germany since 1945, but under a different name, now called Bundesadler ("Union Eagle" or "Federal Eagle", from German "Bund", genitive form "Bundes" meaning 'Union' or 'Federation', and "Adler" meaning 'Eagle').
Quaternion Eagle
One rendition of the coat of the empire was the "Quaternion Eagle" (so named after the imperial quaternions) printed by David de Negker of Augsburg, after a 1510 woodcut by Hans Burgkmair. It showed a selection of 56 shields of various Imperial States in groups of four on the feathers of a double-headed eagle supporting, in place of a shield, Christ on the Cross. The top, larger shields, are those of the seven Prince Electors, the ecclesiastical: Trier, Cologne and Mainz as well as of the titular "Prefect of Rome" on the right wing; the secular: Bohemia, Electorate of the Palatinate, Saxony and Brandenburg on the left. The depiction also appeared on the Imperial Eagle beaker.
Holy Roman Emperors
Direct attestations of imperial coats of arms become available in the later 13th century.
Past emperors are given attributed arms in 13th-century sources. Thus, Otto IV is given the first known depiction of a double-headed Reichsadler in the Chronica Majora (). Henry VI is given a (single-headed) Reichsadler in the Codex Manesse ().
Frederick II of Hohenstaufen (Emperor 1220–1250) did not use coats of arms in any of his seals. He did use the imperial eagle on some of his coins, but not displa |
https://en.wikipedia.org/wiki/Virodhamine | Virodhamine (O-arachidonoyl ethanolamine; O-AEA) is an endocannabinoid and a nonclassic eicosanoid, derived from arachidonic acid. O-Arachidonoyl ethanolamine is arachidonic acid and ethanolamine joined by an ester linkage, the opposite of the amide linkage found in anandamide. Based on this opposite orientation, the molecule was named virodhamine from the Sanskrit word virodha, which means opposition. It acts as an antagonist of the CB1 receptor and agonist of the CB2 receptor. Concentrations of virodhamine in the human hippocampus are similar to those of anandamide, but they are 2- to 9-fold higher in peripheral tissues that express CB2. Virodhamine lowers body temperature in mice, demonstrating cannabinoid activity in vivo.
See also
Anandamide
Oleamide |
https://en.wikipedia.org/wiki/Chronotype | A chronotype is the behavioral manifestation of underlying circadian rhythm's myriad of physical processes. A person's chronotype is the propensity for the individual to sleep at a particular time during a 24-hour period. Eveningness (delayed sleep period; most active and alert in the evening) and morningness (advanced sleep period; most active and alert in the morning) are the two extremes with most individuals having some flexibility in the timing of their sleep period. However, across development there are changes in the propensity of the sleep period with pre-pubescent children preferring an advanced sleep period, adolescents preferring a delayed sleep period and many elderly preferring an advanced sleep period.
The causes and regulation of chronotypes, including developmental change, individual propensity for a specific chronotype, and flexible versus fixed chronotypes have yet to be determined. However, research is beginning to shed light on these questions, such as the relationship between age and chronotype. There are candidate genes (called CLOCK genes) that exist in most cells in the body and brain, referred to as the circadian system that regulate physiological phenomena (hormone levels, metabolic function, body temperature, cognitive faculties, and sleeping). With the exception of the most extreme and rigid chronotypes, regulation is likely due to gene-environment interactions. Important environmental cues (zeitgebers) include light, feeding, social behavior, and work and school schedules. Additional research has proposed an evolutionary link between chronotype and nighttime vigilance in ancestral societies.
Humans are normally diurnal creatures, that is to say they are active in the daytime. As with most other diurnal animals, human activity-rest patterns are endogenously controlled by biological clocks with a circadian (~24-hour) period. Chronotypes have also been investigated in other species, such as fruit flies and mice.
Normal variation in chron |
https://en.wikipedia.org/wiki/Paslode%20Impulse | Paslode Impulse is a trademarked name for a cordless nail gun manufactured by Paslode. Cordless nail guns do not need an air compressor. Instead they use what Paslode calls a "fuel cell", but is actually a very small two stroke engine which fires one ignition stroke for each nail driven, and reloads itself from a small metal can filled with pressurized flammable gas (a mixture of 1-butene and propane). It has a battery pack and a high-voltage power supply, to deliver a spark.
The combustion chamber is in two parts and is normally open to the atmosphere. When the contact tip is pushed onto a piece of work, the lower piston chamber (which also serves as the piston bore) is pushed into the upper part, sealing it. Simultaneously, a metered amount of fuel is squirted into the chamber from the fuel container. When the trigger is pulled, a spark plug ignites the fuel charge, pushing the piston and connected drive pin to the bottom of the chamber and driving a nail. A small amount of combustion gas is briefly stored in a side chamber and is used to push the piston back into the ready position after the nail is driven.
After the contact tip is lifted from the work, the combustion chamber opens and a small fan blows away the exhaust gas. Pressing the contact tip to the work without pulling the trigger uses one of the metered fuel charges. The unburned fuel is then blown away by the exhaust fan when the contact tip is removed from the work. These are best used in finish-nailing situations, which are where these tools are most common.
Paslode Impulse nail guns are available as framing and finish nailers using a variety of nail types and lengths. They are well known by tradesmen for the smell of emitted exhaust gas, which some may find offensive. The fuel is a mixture of 1-butene and propane. The fuel cells are designed to last for 1,000 rounds each, which makes them desirable for heavy duty projects where thousands of nails or staples are needed. |
https://en.wikipedia.org/wiki/Ecotoxicity | Ecotoxicity, the subject of study in the field of ecotoxicology (a portmanteau of ecology and toxicology), refers to the biological, chemical or physical stressors that affect ecosystems. Such stressors could occur in the natural environment at densities, concentrations, or levels high enough to disrupt natural biochemical and physiological behavior and interactions. This ultimately affects all living organisms that comprise an ecosystem.
Ecotoxicology has been defined as a branch of toxicology that focuses on the study of toxic effects, caused by natural or synthetic pollutants. These pollutants affect animals (including humans), vegetation, and microbes, in an intrinsic way.
Acute vs. chronic ecotoxicity
According to Barrie Peake in their paper “Impact of Pharmaceuticals on the Environment.”, The ecotoxicity of chemicals can be described based on the amount of exposure to any hazardous materials. There are two categories of ecotoxicity founded off of this description: acute toxins and chronic toxins (Peake, 2016). Acute ecotoxicity refers to the detrimental effects resulting from a hazardous exposure for no more than 15 days. Acute ecotoxicity is the direct result from the interaction of a chemical hazard with cell membranes of an organism (Peake, 2016). This interaction often leads to cell or tissue damage or death. Chronic ecotoxicity on the other hand are the detrimental effects resulting from a hazardous exposure of 15 days, to possibly years (Peake, 2016). Chronic ecotoxicity is often associated with “particular drug–receptor actions that initiate a particular pharmacological response in an aquatic or terrestrial organism.” (Peake, 2016). Due to this interaction, chronic ecotoxicity is usually not lethal in the way that acute ecotoxicity is. However, chronic ecotoxicity decreases cellular biochemical functions. This often results in alterations to psychological or behavioral responses of the organism to environmental stimuli (Peake, 2016).
Common environ |
https://en.wikipedia.org/wiki/I-CubeX | I-CubeX comprises a system of sensors, actuators and interfaces that are configured by a personal computer. Using MIDI,
Bluetooth or the Universal Serial Bus (USB) as the basis for all communication, the complexity is managed behind a variety of software tools, including an end-user configuration editor, Max (software) plugins, and a C++ Application Programming Interface (API), which allows applications to be developed in Mac OS X, Linux and Windows operating systems.
Usage is primarily focused on allowing exploration and construction of alternative physical computer interaction systems, but have most notably been adopted by music enthusiasts, as they greatly simplify musical instrument mods and creation of novel electronic musical instruments, MIDI controllers and audio control surfaces (such as presented at NIME), e.g. for electronic music generation, and visual artists, as they greatly simplify interactive installation art and electronic art (such as presented at Ars Electronica and SIGGRAPH). In both cases, it is extensively used for teaching. It allows the construction of complex interactive systems out of simpler components. I-CubeX is designed and produced by Infusion Systems.
History
I-CubeX arose out of a research project in 1995 directed by Axel Mulder at the Department of Kinesiology, Simon Fraser University to address the need for better tools for artists to create interactive art and for musicians to more easily create or modify musical instruments. It was inspired by projects such as STEIM's Sensorlab. While I-CubeX helped opening up access to technology for artists interested in sensor technology, it in itself inspired others to create new technology.
The field evolved into physical computing and it was followed by the creation of a number of other generic platforms for applying sensor technology in the (performing) arts such as Arduino, as well as the development of very application specific sensors for human interfacing and human interface devi |
https://en.wikipedia.org/wiki/Influence%20of%20the%20IBM%20PC%20on%20the%20personal%20computer%20market | Following the introduction of the IBM Personal Computer, or IBM PC, many other personal computer architectures became extinct within just a few years. It led to a wave of IBM PC compatible systems being released.
Before the IBM PC's introduction
Before the IBM PC was introduced, the personal computer market was dominated by systems using the 6502 and Z80 8-bit microprocessors, such as the TRS 80, Commodore PET, and Apple II series, which used proprietary operating systems, and by computers running CP/M. After IBM introduced the IBM PC, it was not until 1984 that IBM PC and clones became the dominant computers. In 1983, Byte forecast that by 1990, IBM would command only 11% of business computer sales. Commodore was predicted to hold a slim lead in a highly competitive market, at 11.9%.
Around 1978, several 16-bit CPUs became available. Examples included the Data General mN601, the Fairchild 9440, the Ferranti F100-L, the General Instrument CP1600 and CP1610, the National Semiconductor INS8900, Panafacom's MN1610, Texas Instruments' TMS9900, and, most notably, the Intel 8086. These new processors were expensive to incorporate in personal computers, as they used a 16-bit data bus and needed rare (and thus expensive) 16-bit peripheral and support chips.
More than 50 new business-oriented personal computer systems came on the market in the year before IBM released the IBM PC. Very few of them used a 16- or 32-bit microprocessor, as 8-bit systems were generally believed by the vendors to be perfectly adequate, and the Intel 8086 was too expensive to use.
Some of the main manufacturers selling 8-bit business systems during this period were:
Acorn Computers
Apple Computer Inc.
Atari Inc.
Commodore International
Cromemco
Digital Equipment Corporation
Durango Systems Inc.
Hewlett-Packard
InterSystems
Morrow Designs
North Star Computers
Ohio Scientific
Olivetti
Processor Technology
Sharp
South West Technical Products Corporation
Tandy Corporation
Zeni |
https://en.wikipedia.org/wiki/Secarecytosis | Secarecytosis is a process involved in the development of a bird's lung cells, before the bird hatches from its egg. It is the processes of cell cutting during attenuation of the tubular epithelium of the developing avian lung. The word secarecytosis is derived from the Latin word secare which means "to cut".
Secarecytosis differs from holocrine and apocrine secretory mechanisms in that it occurs only during development and that portions of cells, complete with their organelles, are lost. It has three documented phenotypes. These are:
formation of a double cell membrane and separation between the two membranes;
formation of large vacuoles in the supranuclear cytoplasm, their subsequent fusion with each other and with the lateral cell membranes thus separating the apical portion;
formation of many tiny vesicles that fuse with each other and the cell membrane thus severing portions of the cell.
The process was initially described in the domestic chicken but it has also been shown to occur in the ostrich. |
https://en.wikipedia.org/wiki/Journal%20of%20Physics%20D | Journal of Physics D: Applied Physics is a peer-reviewed scientific journal published by IOP Publishing, a subsidiary of the Institute of Physics in the United Kingdom. It was established in 1968 from the division of the earlier title, Proceedings of the Physical Society. It has a broad coverage, including five main focus areas: magnetism; photonics and semiconductors; plasmas and plasma-surface interactions; applied surfaces and interfaces; structure and properties of matter and renewable energy/sustainability. The current editor-in-chief is Huiyun Liu (University College London).
Abstracting and indexing
Journal of Physics D is abstracted and indexed in:
According to the Journal Citation Reports, the journal has a 2022 impact factor of 3.4. |
https://en.wikipedia.org/wiki/Ei%20Compendex | Ei Compendex is an engineering bibliographic database published by Elsevier.
The name "Compendex" stands for COMPuterized ENgineering inDEX.
It covers scientific literature pertaining to engineering materials.
It started in 1884 under the name Engineering Index (Ei) and its first electronic bulletin was issued in 1967.
Elsevier purchased the parent company Engineering Information in 1998.
Coverage
Ei Compendex currently contains over 20 million records as of December 2020 and references over 5,000 international sources including journals, conferences and trade publications. Approximately 1,000,000 new records are added to the database annually from over 190 disciplines within the engineering field. Coverage is updated every week and covers the years 1970 to the present.
Coverage of engineering subjects include nuclear technology, bioengineering, transportation, chemical and process engineering, light and optical technology, agricultural engineering and food technology, computers and data processing, applied physics, electronics and communications, control, civil, mechanical, materials, petroleum, aerospace and automotive engineering as well as multiple subtopics within all these and other major engineering fields.
See also
List of academic databases and search engines |
https://en.wikipedia.org/wiki/Physical%20Biology | Physical Biology is a peer-reviewed scientific journal published by IOP Publishing covering a range of fields that bridge the biological and physical sciences, including biophysics, systems biology, population dynamics, etc. The editor-in-chief is Greg Huber (Chan-Zuckerberg Biohub, San Francisco).
The journal is indexed in ISI Web of Science/Science Citation Index, PubMed, MEDLINE, Inspec, Scopus, BIOSIS Previews/Biological Abstracts, EMBASE, EMBiology, and Current Awareness in Biological Sciences.
External links
Physical Biology
IOP Publishing
Physics journals
IOP Publishing academic journals
Biology journals
Biophysics journals
Bimonthly journals |
https://en.wikipedia.org/wiki/Paradol | Paradol is the active flavor constituent of the seeds of Guinea pepper (Aframomum melegueta or grains of paradise). It is also found in ginger. Paradol has been found to have antioxidant and antitumor promoting effects in a mouse model.
It is used in flavors as an essential oil to give spiciness.
See also
Gingerol
Shogaol |
https://en.wikipedia.org/wiki/Excess%20mortality | In epidemiology, the excess deaths or excess mortality is a measure of the increase in the number deaths during a time period and/or in a certain group, as compared to the expected value or statistical trend during a reference period (typically of five years) or in a reference population. It may typically be measured in percentage points, or in number of deaths per time unit.
A short period of excess mortality that is followed by a compensating period of mortality deficit (i.e., fewer deaths than expected, because those people have died at a younger age) is quite common, and is also known as "harvesting". Mortality deficit in a particular time period can be caused by deaths displaced to an earlier time (due to harvesting by an event in the past) or deaths displaced to a future time (due to lives being saved, also called "avoided mortality").
Mortality displacement is the occurrence of deaths at an earlier time than they would have otherwise occurred, meaning the deaths are displaced from the future into the present, resulting in a changed life expectancy.
As opposed to number of registered fatalities of a certain death cause, such as a specific virus, a temporary excess mortality, and the mortality displacement, are measures that reflect many combined causes. The dominant reason may be events such as heat waves, cold spells, epidemics and pandemics (especially influenza pandemics), famine or war, and allows for estimates of the mortality caused by those events combined with other indirect health effects. Excess mortality is also studied for certain groups of people, such as elder, men, unemployed, etcetera.
Heat waves
During heat waves, for instance, there are often additional deaths observed in the population, affecting especially older adults and those who are sick. After some periods with excess mortality, however, there has also been observed a decrease in overall mortality during the subsequent weeks. Such short-term forward shift in mortality rate is also |
https://en.wikipedia.org/wiki/Journal%20of%20Physics%3A%20Conference%20Series | Journal of Physics: Conference Series (JPCS) is a peer-reviewed, open-access publication from IOP Publishing providing readers with the latest developments in physics presented at international conferences.
It forms part of the IOP Conference Series, a collection of open access publications specialising in proceedings publication. Other titles in this series are IOP Conference Series: Materials Science and Engineering and IOP Conference Series: Earth and Environmental Science.
It is indexed in Inspec, Scopus, INSPIRE-HEP, MathSciNet, ISI Proceedings, Chemical Abstracts, NASA Astrophysics Data System, INIS (International Nuclear Information System), and VINITI Abstracts Journal (Referativnyi Zhurnal). The journal has secure long-term archiving policies via LOCKSS and Portico.
In February 2022, IOP Publishing retracted 232 articles from Journal of Physics: Conference Series, for reasons including plagiarism, lack of actual peer review, and citation manipulation. Later, in September of that year, they retracted another 494 articles for having apparently been produced by a paper mill.
External links
Journal of Physics: Conference Series
IOP Conference Series
IOP Publishing |
https://en.wikipedia.org/wiki/Polygodial | Polygodial is chemical compound found in dorrigo pepper, mountain pepper, horopito, canelo, paracress, water-pepper, and Dendrodoris limbata.
Chemically it is a drimane-type sesquiterpene dialdehyde of formula C15H22O2.
It elicits a warm and pungent flavour.
The in vitro biological activity of polygodial has been reported in the scientific literature to include antifungal and antimicrobial activities, antihyperalgesia, potent attachment-inhibitory activity, insect antifeedant activity, antinociception, vasorelaxing action in vessels of rabbit and guinea pig, anti-inflammatory and antiallergic activities.
Polygodial’s primary antifungal action is as a nonionic surfactant, disrupting the lipid-protein interface of integral proteins nonspecifically, denaturing their functional conformation. It is also likely that polygodial permeates by passive diffusion across the plasma membrane, and once inside the cells may react with a variety of intracellular compounds.
It is also an insecticide with antifeedant properties, which causes insects to starve. |
https://en.wikipedia.org/wiki/Shogaol | Shogaols are pungent constituents of ginger similar in chemical structure to gingerol. The most common of the group is [6]-shogaol. Like zingerone, it is produced when ginger is dried or cooked. Moreover, shogaol (and gingerol) are converted to other constituents when heat is applied over time, which is why ginger loses its spiciness as it is cooked.
The name shogaol is derived from the Japanese name for ginger (生姜、shōga).
Shogaol is rated 160,000 SHU on the Scoville scale. When compared to other pungent compounds, shogaol is moderately more pungent than piperine, but less than capsaicin.
Shogaols group
[4]-Shogaol, [8]-shogaol, [10]-shogaol, and [12]-shogaol (all found in ginger) together constitute the group shogaols. There also exist in ginger cultivars methylated shogaols: methyl [6]-shogaol and methyl [8]-shogaol, respectively.
Shogaols are artifacts formed during storage or through excess heat, probably created by a dehydration reaction of the gingerols. The ratio of shogaols to gingerols sometimes is taken as an indication of product quality.
Synthesis
A possible synthesis starts with a Claisen condensation of vanillin and acetone, producing dehydrozingerone. Afterwards the product reacts in an aldol condensation with hexanal in tetrahydrofurane to 6-dehydroshogaol and 6-dehydrogingerol. Latter can be hydrogenated to [6]-gingerol by a catalyst. In the last step hydrochloric acid is added to get the desired [6]-shogaol. |
https://en.wikipedia.org/wiki/Multiple%20of%20the%20median | A multiple of the median (MoM) is a measure of how far an individual test result deviates from the median. MoM is commonly used to report the results of medical screening tests, particularly where the results of the individual tests are highly variable.
MoM was originally used as a method to normalize data from participating laboratories of Alpha-fetoprotein (AFP) so that individual test results could be compared. 35 years later, it is the established standard for reporting maternal serum screening results.
An MoM for a test result for a patient can be determined by the following:
As an example, Alpha-fetoprotein (AFP) testing is used to screen for a neural tube defect (NTD) during the second trimester of pregnancy. If the median AFP result at 16 weeks of gestation is 30 ng/mL and a pregnant woman's AFP result at that same gestational age is 60 ng/mL, then her MoM is equal to 60/30 = 2.0. In other words, her AFP result is 2 times higher than median. |
https://en.wikipedia.org/wiki/Sinalbin | Sinalbin is a glucosinolate found in the seeds of white mustard, Sinapis alba, and in many wild plant species. In contrast to mustard from black mustard (Brassica nigra) seeds which contain sinigrin, mustard from white mustard seeds has only a weakly pungent taste.
Sinalbin is metabolised to form the mustard oil 4-hydroxybenzyl isothiocyanate by the enzyme myrosinase. The less sharp taste of white mustard is because 4-hydroxybenzyl isothiocyanate is unstable and degrades to 4-hydroxybenzyl alcohol and a thiocyanate ion, which are not pungent. The half-life of the isothiocyanate depends on the pH of the solution – the longest time is 321 minutes at pH 3, and the shortest is 6 minutes at pH 6.5. Glucobrassicin is a structurally related glucosinolate that likewise yields a non-pungent isothiocyanate due to reaction with water. |
https://en.wikipedia.org/wiki/Gluconasturtiin | Gluconasturtiin or phenethyl glucosinolate is one of the most widely distributed glucosinolates in the cruciferous vegetables, mainly in the roots, and is probably one of the plant compounds responsible for the natural pest-inhibiting properties of growing crucifers, such as cabbage, mustard or rape, in rotation with other crops. This effect of gluconasturtiin is due to its degradation by the plant enzyme myrosinase into phenethyl isothiocyanate, which is toxic to many organisms.
Gluconasturtiin is named from its occurrence in watercress (Nasturtium officinale). Among the vegetables, it is also found in horseradish (Armoracia rusticana) along with sinigrin. Both compounds elicit a pungent taste.
Occurrence
The compound was first reported in 1899, after its isolation from watercress, Nasturtium officinale, and the cress Barbarea verna. Gluconasturtiin is now known to occur widely in other brassica families including Brassicaceae and Resedaceae.
In one investigation of horseradish roots, sinigrin represented 83% and gluconasturtiin 11% of the extracted glucosinolates.
Synthesis
Biosynthesis
Gluconasturtiin is biosynthesised from the amino acid phenylalanine in a multi-step pathway.
Laboratory synthesis
The first laboratory synthesis served to confirm the compound's structure. Later work allowed many glucosinolates including this phenethyl derivative to be made. These processes are more efficient than isolating pure materials from the plants in which they are naturally found.
Function
The natural role of glucosinolates are as plant defense compounds. The enzyme myrosinase removes the glucose group in gluconasturiin to give an intermediate which spontaneously rearranges to phenethyl isothiocyanate. This is a reactive material which is toxic to many insect predators and its production is triggered when the plant is damaged. This effect has been called the mustard oil bomb. At concentrations typically found in foods, the glucosinolates are not toxic to humans and |
https://en.wikipedia.org/wiki/Calculus%20Made%20Easy | Calculus Made Easy is a book on infinitesimal calculus originally published in 1910 by Silvanus P. Thompson, considered a classic and elegant introduction to the subject. The original text continues to be available as of 2008 from Macmillan and Co., but a 1998 update by Martin Gardner is available from St. Martin's Press which provides an introduction; three preliminary chapters explaining functions, limits, and derivatives; an appendix of recreational calculus problems; and notes for modern readers. Gardner changes "fifth form boys" to the more American sounding (and gender neutral) "high school students," updates many now obsolescent mathematical notations or terms, and uses American decimal dollars and cents in currency examples.
Calculus Made Easy ignores the use of limits with its epsilon-delta definition, replacing it with a method of approximating (to arbitrary precision) directly to the correct answer in the infinitesimal spirit of Leibniz, now formally justified in modern nonstandard analysis and smooth infinitesimal analysis.
The original text is now in the public domain under US copyright law (although Macmillan's copyright under UK law is reproduced in the 2008 edition from St. Martin's Press). It can be freely accessed on Project Gutenberg.
Further reading
Nature, Vol. 86, No. 2158 (March 9, 1911), p. 41. . A review of the first edition. Internet Archive; Google Books.
Carl Linderholm, College Mathematics Journal, Vol. 31, No. 1 (January, 2000), pp. 77-79. A review of Silvanus P. Thompson, revised by Martin Gardner, Calculus Made Easy (St. Martin's Press, 1998).
External links
Silvanus P. Thompson, Calculus Made Easy: Being a Very-Simplest Introduction to Those Beautiful Methods of Reckoning which Are Generally Called by the Terrifying Names of the Differential Calculus and the Integral Calculus (New York: MacMillan Company, 2nd Ed., 1914). Also available as the (London: MacMillan and Co., Limited, 2nd Ed., 1914) printing, which isn't publishe |
https://en.wikipedia.org/wiki/Particle%20size | Particle size is a notion introduced for comparing dimensions of solid particles (flecks), liquid particles (droplets), or gaseous particles (bubbles). The notion of particle size applies to particles in colloids, in ecology, in granular material (whether airborne or not), and to particles that form a granular material (see also grain size).
Measurement
There are several methods for measuring particle size and particle size distribution. Some of them are based on light, other on ultrasound, or electric field, or gravity, or centrifugation. The use of sieves is a common measurement technique, however this process can be more susceptible to human error and is time consuming. Technology such as dynamic image analysis (DIA) can make particle size distribution analyses much easier. This approach can be seen in instruments like Retsch Technology's CAMSIZER or the Sympatec QICPIC series of instruments. They still lack the capability of inline measurements for real time monitoring in production environments. Therefore, inline imaging devices like the SOPAT system are most efficient.
Machine learning algorithms are used to increase the performance of particle size measurement. This line of research can yield low-cost and real time particle size analysis.
In all methods the size is an indirect measure, obtained by a model that transforms, in abstract way, the real particle shape into a simple and standardized shape, like a sphere (the most usual) or a cuboid (when minimum bounding box is used), where the size parameter (ex. diameter of sphere) makes sense. Exception is the mathematical morphology approach, where no shape hypothesis is necessary.
Definition of the particle size for an ensemble (collection) of particles presents another problem. Real systems are practically always polydisperse, which means that the particles in an ensemble have different sizes. The notion of particle size distribution reflects this polydispersity. There is often a need for a certain avera |
https://en.wikipedia.org/wiki/Richard%20Seed | Richard Griffith Seed (1928 – 2013) was an American physicist and entrepreneur best known for forcing a national debate on human cloning in the late 1990s.
Life and career
Seed was born in Chicago and graduated from Oak Park and River Forest High School in Illinois before attending Harvard University, earning his undergraduate degree there in 1949. He later received a master's degree, as well as a Ph.D. in physics from Harvard in 1953. His interests soon shifted to the new frontier of biomedicine. In the 1970s Seed co-founded a company that commercialized a technique for transferring embryos in cattle. Later, he and his brother, Chicago surgeon Randolph Seed, started another company, Fertility & Genetics Research Inc., to help infertile women conceive children using the same technique. These efforts to transplant a human embryo from one woman to an infertile surrogate mother were published in 1984. The cumbersome procedure involved flushing embryos out of the uterus of the egg donor—and was soon eclipsed by in-vitro fertilization. Ultimately the venture failed.
On December 5, 1997, Seed announced that he planned to clone a human being before any federal laws could be enacted to ban the process. Seed's announcement added fuel to the raging ethical debate on human cloning that had been sparked by Ian Wilmut's creation of Dolly the sheep, the first clone obtained from adult cells. Seed's plans were to use the same technique used by the Scottish team. Seed's announcement went against President Clinton's 1997 proposal for a voluntary private moratorium against human cloning. In the media frenzy that followed, the story of a 69-year-old eccentric, and maverick scientist emerged, but Seed possessed impressive credentials and was not dismissed immediately. While virtually no mainstream scientist believed Seed would succeed, there began a subtle shift in attitudes after Seed made his announcement.
Retired at the time of his announcement to clone the first human, Seed was |
https://en.wikipedia.org/wiki/SSS%2A | SSS* is a search algorithm, introduced by George Stockman in 1979, that conducts a state space search traversing a game tree in a best-first fashion similar to that of the A* search algorithm.
SSS* is based on the notion of solution trees. Informally, a solution tree can be formed from any arbitrary game tree by pruning the number of branches at each MAX node to one. Such a tree represents a complete strategy for MAX, since it specifies exactly one MAX action for every possible sequence of moves made by the opponent. Given a game tree, SSS* searches through the space of partial solution trees, gradually analyzing larger and larger subtrees, eventually producing a single solution tree with the same root and Minimax value as the original game tree. SSS* never examines a node that alpha–beta pruning would prune, and may prune some branches that alpha–beta would not. Stockman speculated that SSS* may therefore be a better general algorithm than alpha–beta. However, Igor Roizen and Judea Pearl have shown that the savings in the number of positions that SSS* evaluates relative to alpha/beta is limited and generally not enough to compensate for the increase in other resources (e.g., the storing and sorting of a list of nodes made necessary by the best-first nature of the algorithm). However, Aske Plaat, Jonathan Schaeffer, Wim Pijls and Arie de Bruin have shown that a sequence of null-window alpha–beta calls is equivalent to SSS* (i.e., it expands the same nodes in the same order) when alpha–beta is used with a transposition table, as is the case in all game-playing programs for chess, checkers, etc. Now the storing and sorting of the OPEN list were no longer necessary. This allowed the implementation of (an algorithm equivalent to) SSS* in tournament quality game-playing programs. Experiments showed that it did indeed perform better than Alpha–Beta in practice, but that it did not beat NegaScout.
The reformulation of a best-first algorithm as a sequence of depth-first c |
https://en.wikipedia.org/wiki/5-Methyltetrahydropteroyltriglutamate%E2%80%94homocysteine%20S-methyltransferase | In enzymology, a 5-methyltetrahydropteroyltriglutamate—homocysteine S-methyltransferase () is an enzyme that catalyzes the chemical reaction
5-methyltetrahydropteroyltri-L-glutamate + L-homocysteine tetrahydropteroyltri-L-glutamate + L-methionine
Thus, the two substrates of this enzyme are 5-methyltetrahydropteroyltri-L-glutamate and L-homocysteine, whereas its two products are tetrahydropteroyltri-L-glutamate and L-methionine. This enzyme participates in methionine metabolism. It has 2 cofactors: orthophosphate, and zinc.
Nomenclature
This enzyme belongs to the family of transferases, specifically those transferring one-carbon group methyltransferases. The systematic name of this enzyme class is 5-methyltetrahydropteroyltri-L-glutamate:L-homocysteine S-methyltransferase. Other names in common use include tetrahydropteroyltriglutamate methyltransferase, homocysteine methylase, methyltransferase, tetrahydropteroylglutamate-homocysteine transmethylase, methyltetrahydropteroylpolyglutamate:homocysteine methyltransferase, cobalamin-independent methionine synthase, methionine synthase (cobalamin-independent), and MetE.
Structure
The enzyme from Escherichia coli consists of two alpha8-beta8 (TIM) barrels positioned face to face and thought to have evolved by gene duplication. The active site lies between the tops of the two barrels, the N-terminal barrel binds 5-methyltetrahydropteroyltri-L-glutamic acid and the C-terminal barrel binds homocysteine. Homocysteine is coordinated to a zinc ion, as initially suggested by spectroscopy and mutagenesis . |
https://en.wikipedia.org/wiki/Photothermal%20spectroscopy | Photothermal spectroscopy is a group of high sensitivity spectroscopy techniques used to measure optical absorption and thermal characteristics of a sample. The basis of photothermal spectroscopy is the change in thermal state of the sample resulting from the absorption of radiation. Light absorbed and not lost by emission results in heating. The heat raises temperature thereby influencing the thermodynamic properties of the sample or of a suitable material adjacent to it. Measurement of the temperature, pressure, or density changes that occur due to optical absorption are ultimately the basis for the photothermal spectroscopic measurements.
As with photoacoustic spectroscopy, photothermal spectroscopy is an indirect method for measuring optical absorption, because it is not based on the direct measure of the light which is involved in the absorption. In another sense, however, photothermal (and photoacoustic) methods measure directly the absorption, rather than e.g. calculate it from the transmission, as is the case of more usual (transmission) spectroscopic techniques. And it is this fact that gives the technique its high sensitivity, because in transmission techniques the absorbance is calculated as the difference between total light impinging on the sample and the transmitted (plus reflected, plus scattered) light, with the usual problems of accuracy when one deals with small differences between large numbers, if the absorption is small. In photothermal spectroscopies, instead, the signal is essentially proportional to the absorption, and is zero when there is zero true absorption, even in the presence of reflection or scattering.
There are several methods and techniques used in photothermal spectroscopy. Each of these has a name indicating the specific physical effect measured.
Photothermal lens spectroscopy (PTS or TLS) measures the thermal blooming that occurs when a beam of light heats a transparent sample. It is typically applied for measuring minute qua |
https://en.wikipedia.org/wiki/GSTT1 | Glutathione S-transferase theta-1 is an enzyme that in humans is encoded by the GSTT1 gene.
Glutathione S-transferase (GST) theta 1 (GSTT1) is a member of a superfamily of proteins that catalyze the conjugation of reduced glutathione to a variety of electrophilic and hydrophobic compounds. Human GSTs can be divided into five main classes: alpha, mu, pi, theta, and zeta. The theta class includes GSTT1 and GSTT2. The GSTT1 and GSTT2 share 55% amino acid sequence identity and both of them were claimed to have an important role in human carcinogenesis. The GSTT1 gene is located approximately 50kb away from the GSTT2 gene. The GSTT1 and GSTT2 genes have a similar structure, being composed of five exons with identical exon/intron boundaries. |
https://en.wikipedia.org/wiki/Protein-glutamate%20O-methyltransferase | In enzymology, a protein-glutamate O-methyltransferase () is an enzyme that catalyzes the chemical reaction
S-adenosyl-L-methionine + protein L-glutamate S-adenosyl-L-homocysteine + protein L-glutamate methyl ester
Thus, the two substrates of this enzyme are S-adenosyl methionine and protein L-glutamic acid, whereas its two products are S-adenosylhomocysteine and protein L-glutamate methyl ester.
This enzyme belongs to the family of transferases, specifically those transferring one-carbon group methyltransferases. The systematic name of this enzyme class is S-adenosyl-L-methionine:protein-L-glutamate O-methyltransferase. Other names in common use include methyl-accepting chemotaxis protein O-methyltransferase, S-adenosylmethionine-glutamyl methyltransferase, methyl-accepting chemotaxis protein methyltransferase II, S-adenosylmethionine:protein-carboxyl O-methyltransferase, protein methylase II, MCP methyltransferase I, MCP methyltransferase II, protein O-methyltransferase, protein(aspartate)methyltransferase, protein(carboxyl)methyltransferase, protein carboxyl-methylase, protein carboxyl-O-methyltransferase, protein carboxylmethyltransferase II, protein carboxymethylase, protein carboxymethyltransferase, and protein methyltransferase II. This enzyme participates in bacterial chemotaxis - general and bacterial chemotaxis - organism-specific.
CheR proteins are part of the chemotaxis signaling mechanism which methylates the chemotaxis receptor at specific glutamate residues. Methyl transfer from the ubiquitous S-adenosyl-L-methionine (AdoMet/SAM) to either nitrogen, oxygen or carbon atoms is frequently employed in diverse organisms ranging from bacteria to plants and mammals. The reaction is catalysed by methyltransferases (Mtases) and modifies DNA, RNA, proteins and small molecules, such as catechol for regulatory purposes. The various aspects of the role of DNA methylation in prokaryotic restriction-modification systems and in a number of cellular processes i |
https://en.wikipedia.org/wiki/Protein-S-isoprenylcysteine%20O-methyltransferase | The isoprenylcysteine o-methyltransferase () carries out carboxyl methylation of cleaved eukaryotic proteins that terminate in a CaaX motif. In Saccharomyces cerevisiae (Baker's yeast) this methylation is carried out by Ste14p, an integral endoplasmic reticulum membrane protein. Ste14p is the founding member of the isoprenylcysteine carboxyl methyltransferase (ICMT) family, whose members share significant sequence homology.
The enzyme catalyzes the chemical reaction
S-adenosyl-L-methionine + protein C-terminal S-farnesyl-L-cysteine S-adenosyl-L-homocysteine + protein C-terminal S-farnesyl-L-cysteine methyl ester
Thus, the two substrates of this enzyme are S-adenosyl methionine and protein C-terminal S-farnesyl-L-cysteine, whereas its two products are S-adenosylhomocysteine and protein C-terminal S-farnesyl-L-cysteine methyl ester. |
https://en.wikipedia.org/wiki/Israeli%20Transverse%20Mercator | Israeli Transverse Mercator (ITM), also known as the New Israel Grid (NIG; Reshet Yisra'el Ha-Ḥadasha) is the new geographic coordinate system for Israel. The name is derived from the transverse Mercator projection it uses and the fact that it is optimized for Israel. ITM has replaced the old coordinate system Israeli Cassini Soldner (ICS), also known as the Old Israel Grid (OIG). It became
the official grid for Israel in 1998.
The need for a new grid
ITM replaced the Old Israel Grid (OIG) (), also known as the Israel Cassini Soldner (ICS), which was based on the Cassini-Soldner projection. ICS in turn was a simple modification of the Palestine grid used during the British mandate. The central meridian in the new projection, as in the old one, crosses through Jerusalem. The new grid has two main advantages. One is that the Transverse Mercator projection is better for navigation than Cassini-Soldner. The other is that ICS was based on a 19th-century reference ellipsoid (approximation of the shape of the Earth) and this was replaced by a more accurate approximation.
Additional information on the creation of the new grid is available in Hebrew.
Examples
An ITM coordinate is generally given as a pair of six digit numbers (excluding any digits behind a decimal point which may be used in very precise surveying). The first number is always the Easting and the second is the Northing. The easting and northing are in metres from the false origin.
The ITM coordinate for the Western Wall at Jerusalem is 222286 632556, which means
E 222286 m
N 631556 m
The first figure is the easting and means that the location is 222,286 meters east from the false origin (along the X axis). The second figure is the northing and puts the location 631,556 meters north of the false origin (along the Y axis). Also notice how the easting in this example is indicated with an “E” and likewise an “N” for the northing.
The table below shows the same coordinate in 3 different grids:
Grid Para |
https://en.wikipedia.org/wiki/Bipolar%20transistor%20biasing | Bipolar transistors must be properly biased to operate correctly. In circuits made with individual devices (discrete circuits), biasing networks consisting of resistors are commonly employed. Much more elaborate biasing arrangements are used in integrated circuits, for example, bandgap voltage references and current mirrors. The voltage divider configuration achieves the correct voltages by the use of resistors in certain patterns. By selecting the proper resistor values, stable current levels can be achieved that vary only little over temperature and with transistor properties such as β.
The operating point of a device, also known as bias point, quiescent point, or Q-point, is the point on the output characteristics that shows the DC collector–emitter voltage (Vce) and the collector current (Ic) with no input signal applied.
Bias circuit requirements
A bias network is selected to stabilize the operating point of the transistor, by reducing the following effects of device variability, temperature, and voltage changes:
The gain of a transistor can vary significantly between different batches, which results in widely different operating points for sequential units in serial production or after replacement of a transistor.
Due to the Early effect, the current gain is affected by the collector–emitter voltage.
Both gain and base–emitter voltage depend on the temperature.
The leakage current also increases with temperature.
A bias circuit may be composed of only resistors, or may include elements such as temperature-dependent resistors, diodes, or additional voltage sources, depending on the range of operating conditions expected.
Signal requirements
For analog operation of a class-A amplifier, the Q-point is placed so the transistor stays in active mode (does not shift to operation in the saturation region or cut-off region) across the input signal's range. Often, the Q-point is established near the center of the active region of a transistor characteristic t |
https://en.wikipedia.org/wiki/S-matrix%20theory | S-matrix theory was a proposal for replacing local quantum field theory as the basic principle of elementary particle physics.
It avoided the notion of space and time by replacing it with abstract mathematical properties of the S-matrix. In S-matrix theory, the S-matrix relates the infinite past to the infinite future in one step, without being decomposable into intermediate steps corresponding to time-slices.
This program was very influential in the 1960s, because it was a plausible substitute for quantum field theory, which was plagued with the zero interaction phenomenon at strong coupling. Applied to the strong interaction, it led to the development of string theory.
S-matrix theory was largely abandoned by physicists in the 1970s, as quantum chromodynamics was recognized to solve the problems of strong interactions within the framework of field theory. But in the guise of string theory, S-matrix theory is still a popular approach to the problem of quantum gravity.
The S-matrix theory is related to the holographic principle and the AdS/CFT correspondence by a flat space limit. The analog of the S-matrix relations in AdS space is the boundary conformal theory.
The most lasting legacy of the theory is string theory. Other notable achievements are the Froissart bound, and the prediction of the pomeron.
History
S-matrix theory was proposed as a principle of particle interactions by Werner Heisenberg in 1943, following John Archibald Wheeler's 1937 introduction of the S-matrix.
It was developed heavily by Geoffrey Chew, Steven Frautschi, Stanley Mandelstam, Vladimir Gribov, and Tullio Regge. Some aspects of the theory were promoted by Lev Landau in the Soviet Union, and by Murray Gell-Mann in the United States.
Basic principles
The basic principles are:
Relativity: The S-matrix is a representation of the Poincaré group;
Unitarity: ;
Analyticity: integral relations and singularity conditions.
The basic analyticity principles were also called analyticit |
https://en.wikipedia.org/wiki/Phosphatidylinositol%20transfer%20protein | Phosphatidylinositol transfer protein (PITP) or priming in exocytosis protein 3 (PEP3) is a ubiquitous cytosolic domain involved in transport of phospholipids from their site of synthesis in the endoplasmic reticulum and Golgi to other
cell membranes.
Biological function
PITP has been also shown to be an essential component of the polyphosphoinositide synthesis machinery and is hence required for proper signalling by epidermal growth factor and f-Met-Leu-Phe, as well as for exocytosis. The role of PITP in polyphosphoinositide synthesis may also explain its involvement in intracellular vesicular traffic.
Structure and evolution
Along with the structurally unrelated Sec14p family (found in ), this family can bind/exchange one molecule of phosphatidylinositol (PI) or phosphatidylcholine (PC) and thus aids their transfer between different membrane compartments. There are three sub-families - all share an N-terminal PITP-like domain, whose sequence is highly conserved. It is described as consisting of three regions. The N-terminal region is thought to bind the lipid and contains two helices and an eight-stranded, mostly antiparallel beta-sheet. An intervening loop region, which is thought to play a role in protein-protein interactions, separates this from the C-terminal region, which exhibits the greatest sequence variation and may be involved in membrane binding. This motif marks PITP as part of the larger SRPBCC (START/RHOalphaC/PITP/Bet v1/CoxG/CalC) domain superfamily.
PITP alpha (UniProt ) has a 16-fold greater affinity for PI than PC. Together with PITP beta (UniProt ), it is expressed ubiquitously in all tissues.
Human proteins
The family of human phosphatidylinositol transfer proteins has several members:
Phosphatidylinositol transfer protein, alpha (PITPNA)
Phosphatidylinositol transfer protein, beta (PITPNB)
Phosphatidylinositol transfer protein, cytoplasmic 1 (PITPNC)
Phosphatidylinositol transfer protein, membrane-associated 1 (PITPNM1)
Phosphatidylinos |
https://en.wikipedia.org/wiki/IEEE%20Heinrich%20Hertz%20Medal | The IEEE Heinrich Hertz Medal was a science award presented by the IEEE for outstanding achievements in the field of electromagnetic waves. The medal was named in honour of German physicist Heinrich Hertz, and was first proposed in 1986 by IEEE Region 8 (Germany) as a centennial recognition of Hertz's work on electromagnetic radiation theory from 1886 to 1891. The medal was first awarded in 1988, and was presented annually until 2001. It was officially discontinued in November 2009.
Recipients
1988: Hans-Georg Unger (Technical University at Brunswick, Germany) for outstanding merits in radio-frequency science, particularly the theory of dielectric wave guides and their application in modern wide-band communication.
1989: Nathan Marcuvitz (Polytechnic University of New York, United States) for fundamental theoretical and experimental contributions to the engineering formulation of electromagnetic field theory.
1990: John D. Kraus (Ohio State University, United States) for pioneering work in radio astronomy and the development of the helical antenna and the corner reflector antenna.
1991: Leopold B. Felsen (Polytechnic University of New York, United States) for highly original and significant developments in the theories of propagation, diffraction and dispersion of electromagnetic waves.
1992: James R. Wait (University of Arizona, United States) for fundamental contributions to electromagnetic theory, to the study of propagation of Hertzian waves through the atmosphere, ionosphere and the Earth, and to their applications in communications, navigation and geophysical exploration.
1993: Kenneth Budden (Cavendish Laboratory, University of Cambridge, United Kingdom) for major original contributions to the theory of electromagnetic waves in ionized media with applications to terrestrial and space communications.
1994: Ronald N. Bracewell (Stanford University, United States) for pioneering work in antenna aperture synthesis and image reconstruction as applied to radioast |
https://en.wikipedia.org/wiki/Epi-lipoxin | Epi-lipoxins are trihydroxy (i.e. containing 3 hydroxyl residues) metabolites of arachidonic acid. They are 15R-epimers of their lipoxin counterparts; that is, the epi-lipoxins, 15-epi-lipoxin A4 (15-epi-LxA4) and 15-epi-lipoxin B4 (15-epi-LXB4), differ from their respective lipoxin A4 (LxA4) and lipoxin B4 (LxB4) epimers in that their 15-hydroxy residue has R rather than S chirality. Formulae for these lipoxins (Lx) are:
LxA4: 5S,6R,15S-trihydroxy-7E,9E,11Z,13E-ETE
LxB4: 5S,14R,15S-trihydroxy-6E,8Z,10E,12E-ETE
15-epi-LxA4: 5S,6R,15R-trihydroxy-7E,9E,11Z,13E-eicosatetraenoic acid
15-epi-LxB4: 5S,14R,15R-trihydroxy-6E,8Z,10E,12E-eicosatrienoic acid
The two-epi-Lx's as well as the two lx's are nonclassic eicosanoids that, like other members of the specialized pro-resolving mediators class of autocoids, form during and act to resolve inflammatory responses. Synthesis of the lipoxins typically involves a lipoxygenase enzyme which acts to add a 15S-hydroxyl residue to the lipoxin precursor, arachidonic acid, whereas synthesis of the epi-lipoxins involves aspirin-pretreated cyclooxygenase 2 or a cytochrome P450 enzyme which adds a 15R-hydroxyl residue to arachidonic acid. In acknowledgement of the role played by aspirin-treated cyclooxygenase 2 in forming these products, the epi-lipoxins are sometimes termed ATL which stands for Aspirin-Triggered Lipoxins.
The counter-regulatory role of the epi-lipoxins in serving as stop signals for diverse inflammation responses is detailed at the lipoxin site.
See also
Lipoxins
Specialized pro-resolving mediators |
https://en.wikipedia.org/wiki/Fluorenylmethyloxycarbonyl%20chloride | Fluorenylmethyloxycarbonyl chloride (Fmoc-Cl) is a chloroformate ester. It is used to introduce the fluorenylmethyloxycarbonyl protecting group as the Fmoc carbamate.
Preparation
This compound may be prepared by reacting 9-fluorenylmethanol with phosgene: |
https://en.wikipedia.org/wiki/Edwin%20Spanier | Edwin Henry Spanier (August 8, 1921 – October 11, 1996) was an American mathematician at the University of California at Berkeley, working in algebraic topology. He co-invented Spanier–Whitehead duality and Alexander–Spanier cohomology, and wrote what was for a long time the standard textbook on algebraic topology .
Spanier attended the University of Minnesota, graduating in 1941. During World War II, he served in the United States Army Signal Corps. He received his Ph.D. degree from the University of Michigan in 1947 for the thesis Cohomology Theory for General Spaces written under the direction of Norman Steenrod. After spending a year as a research fellow at the Institute for Advanced Study in Princeton, New Jersey, in 1948 he was appointed to the faculty of the University of Chicago, and then a professor at UC Berkeley in 1959. He had 17 doctoral students, including Morris Hirsch and Elon Lages Lima.
Publications |
https://en.wikipedia.org/wiki/CBL%20%28gene%29 | Cbl (named after Casitas B-lineage Lymphoma) is a mammalian gene encoding the protein CBL which is an E3 ubiquitin-protein ligase involved in cell signalling and protein ubiquitination. Mutations to this gene have been implicated in a number of human cancers, particularly acute myeloid leukaemia.
Discovery
In 1989 a virally encoded portion of the chromosomal mouse Cbl gene was the first member of the Cbl family to be discovered and was named v-Cbl to distinguish it from normal mouse c-Cbl. The virus used in the experiment was a mouse-tropic strain of Murine leukemia virus isolated from the brain of a mouse captured at Lake Casitas, California known as Cas-Br-M, and was found to have excised approximately a third of the original c-Cbl gene from a mouse into which it was injected. Sequencing revealed that the portion carried by the retrovirus encoded a tyrosine kinase binding domain, and that this was the oncogenic form as retroviruses carrying full-length c-Cbl did not induce tumor formation. The resultant transformed retrovirus was found to consistently induce a type of pre-B lymphoma, known as Casitas B-lineage lymphoma, in infected mice.
Structure
Full length c-Cbl has been found to consist of several regions encoding for functionally distinct protein domains:
N-terminal tyrosine kinase binding domain (TKB domain): determines the protein which it can bind to
RING finger domain motif: recruits enzymes involved in ubiquitination
Proline-rich region: the site of interaction between Cbl and cytosolic proteins involved in Cbl's adaptor functions
C-terminal ubiquitin-associated domain (UBA domain): the site of ubiquitin binding
This domain structure and the tyrosine and serine-rich content of the protein product is typical of an "adaptor molecule" used in cell signalling pathways.
Homologues
Three mammalian homologues have been characterized, which all differ in their ability to function as adaptor proteins due to the differing lengths of their C-terminal UBA |
https://en.wikipedia.org/wiki/Reprojection%20error | The reprojection error is a geometric error corresponding to the image distance between a projected point and a measured one, mostly occurred in old camera and phones. It is used to quantify how closely an estimate of a 3D point recreates the point's true projection . More precisely, let be the projection matrix of a camera and be the image projection of , i.e. . The reprojection error of is given by , where denotes the Euclidean distance between the image points represented by vectors and .
Minimizing the reprojection error can be used for estimating the error from point correspondences between two images. Suppose we are given 2D to 2D point imperfect correspondences . We wish to find a homography and pairs of perfectly matched points and , i.e. points that satisfy that minimize the reprojection error function given by
So the correspondences can be interpreted as imperfect images of a world point and the reprojection error quantifies their deviation from the true image projections
Consequences of reprojection error
There are many consequences of reprojection errors, such as
White or black lines that resemble hair in the photo, more frequently on patterned objects than others.
White or black bars covering most part of the photo.
some part of the photo may appear darker, brighter, or distorted.
The photo appear entirely black or white. |
https://en.wikipedia.org/wiki/Rook%20polynomial | In combinatorial mathematics, a rook polynomial is a generating polynomial of the number of ways to place non-attacking rooks on a board that looks like a checkerboard; that is, no two rooks may be in the same row or column. The board is any subset of the squares of a rectangular board with m rows and n columns; we think of it as the squares in which one is allowed to put a rook. The board is the ordinary chessboard if all squares are allowed and m = n = 8 and a chessboard of any size if all squares are allowed and m = n. The coefficient of x k in the rook polynomial RB(x) is the number of ways k rooks, none of which attacks another, can be arranged in the squares of B. The rooks are arranged in such a way that there is no pair of rooks in the same row or column. In this sense, an arrangement is the positioning of rooks on a static, immovable board; the arrangement will not be different if the board is rotated or reflected while keeping the squares stationary. The polynomial also remains the same if rows are interchanged or columns are interchanged.
The term "rook polynomial" was coined by John Riordan.
Despite the name's derivation from chess, the impetus for studying rook polynomials is their connection with counting permutations (or partial permutations) with restricted positions. A board B that is a subset of the n × n chessboard corresponds to permutations of n objects, which we may take to be the numbers 1, 2, ..., n, such that the number aj in the j-th position in the permutation must be the column number of an allowed square in row j of B. Famous examples include the number of ways to place n non-attacking rooks on:
an entire n × n chessboard, which is an elementary combinatorial problem;
the same board with its diagonal squares forbidden; this is the derangement or "hat-check" problem (this is a particular case of the problème des rencontres);
the same board without the squares on its diagonal and immediately above its diagonal (and without the bot |
https://en.wikipedia.org/wiki/NSP1%20%28rotavirus%29 | NSP1 (NS53), the product of rotavirus gene 5, is a nonstructural RNA-binding protein that contains a cysteine-rich region and is a component of early replication intermediates. RNA-folding predictions suggest that this region of the NSP1 mRNA can interact with itself, producing a stem-loop structure similar to that found near the 5'-terminus of the NSP1 mRNA.
The carboxyl-half of the rotavirus nonstructural protein NSP1 is not required for virus replication.
NSP1 could play a role in host range restriction.
The cysteine-rich region of NSP1 is not considered essential for genome segment reassortment with heterologous virus.
NSP1 interacts with IRF3 in the infected cell. NSP1 is an antagonist of the IFN-signaling pathway.
Interferon regulatory factor 3 (IRF3) is a key transcription factor involved in the induction of interferon (IFN) in response to viral infection. NSP1 binds to and targets IRF3 for proteasome degradation early post-infection. IRF3 degradation is dependent on the presence of NSP1 and the integrity of the N-terminal zinc-binding domain, coupled with the regulated stability of IRF3 and NSP1 by the proteasome, collectively support the hypothesis that NSP1 is an E3 ubiquitin ligase.
NSP1 could mediates the degradation of IRF3, IRF5, and IRF7 by recognizing a common element of IRF proteins, thereby allowing NSP1 to act as a broad-spectrum antagonist of IRF function.
NSP1 also inhibits activation of NFkappaB
NSP1 inhibits cellular apoptosis by directly interacting p85 subunit of PI3K and thus activating PI3K/Akt survival pathway during early stages of rotavirus infection. |
https://en.wikipedia.org/wiki/NSP2%20%28rotavirus%29 | NSP2 (NS35), is a rotavirus nonstructural RNA-binding protein that accumulates in cytoplasmic inclusions (viroplasms) and is required for genome replication. NSP2 is closely associated in vivo with the viral replicase. The non-structural protein NSP5 plays a role in the structure of viroplasms mediated by its interaction with NSP2. |
https://en.wikipedia.org/wiki/History%20of%20Linux | Linux began in 1991 as a personal project by Finnish student Linus Torvalds to create a new free operating system kernel. The resulting Linux kernel has been marked by constant growth throughout its history. Since the initial release of its source code in 1991, it has grown from a small number of C files under a license prohibiting commercial distribution to the 4.15 version in 2018 with more than 23.3 million lines of source code, not counting comments, under the GNU General Public License v2.
Events leading to creation
After AT&T had dropped out of the Multics project, the Unix operating system was conceived and implemented by Ken Thompson and Dennis Ritchie (both of AT&T Bell Laboratories) in 1969 and first released in 1970. Later they rewrote it in a new programming language, C, to make it portable. The availability and portability of Unix caused it to be widely adopted, copied and modified by academic institutions and businesses.
In 1977, the Berkeley Software Distribution (BSD) was developed by the Computer Systems Research Group (CSRG) from UC Berkeley, based on the 6th edition of Unix from AT&T. Since BSD contained Unix code that AT&T owned, AT&T filed a lawsuit (USL v. BSDi) in the early 1990s against the University of California. This strongly limited the development and adoption of BSD.
Onyx Systems began selling early microcomputer-based Unix workstations in 1980. Later, Sun Microsystems, founded as a spin-off of a student project at Stanford University, also began selling Unix-based desktop workstations in 1982. While Sun workstations didn't utilize commodity PC hardware like Linux was later developed for, it represented the first successful commercial attempt at distributing a primarily single-user microcomputer that ran a Unix operating system.
In 1983, Richard Stallman started the GNU project with the goal of creating a free UNIX-like operating system. As part of this work, he wrote the GNU General Public License (GPL). By the early 1990s, there |
https://en.wikipedia.org/wiki/Recombinase-mediated%20cassette%20exchange | RMCE (recombinase-mediated cassette exchange) is a procedure in reverse genetics allowing the systematic, repeated modification of higher eukaryotic genomes by targeted integration, based on the features of site-specific recombination processes (SSRs). For RMCE, this is achieved by the clean exchange of a preexisting gene cassette for an analogous cassette carrying the "gene of interest" (GOI).
The genetic modification of mammalian cells is a standard procedure for the production of correctly modified proteins with pharmaceutical relevance. To be successful, the transfer and expression of the transgene has to be highly efficient and should have a largely predictable outcome. Current developments in the field of gene therapy are based on the same principles. Traditional procedures used for transfer of GOIs are not sufficiently reliable, mostly because the relevant epigenetic influences have not been sufficiently explored: transgenes integrate into chromosomes with low efficiency and at loci that provide only sub-optimal conditions for their expression. As a consequence the newly introduced information may not be realized (expressed), the gene(s) may be lost and/or re-insert and they may render the target cells in unstable state. It is exactly this point where RMCE enters the field. The procedure was introduced in 1994 and it uses the tools yeasts and bacteriophages have evolved for the efficient replication of important genetic information:
General principles
Most yeast strains contain circular, plasmid-like DNAs called "two-micron circles". The persistence of these entities is granted by a recombinase called "flippase" or "Flp". Four monomers of this enzyme associate with two identical short (48 bp) target sites, called FRT ("flip-recombinase targets"), resulting in their crossover. The outcome of such a process depends on the relative orientation of the participating FRTs leading to
the inversion of a sequence that is flanked by two identical but inversely o |
https://en.wikipedia.org/wiki/Automated%20airport%20weather%20station | Airport weather stations are automated sensor suites which are designed to serve aviation and meteorological operations, weather forecasting and climatology. Automated airport weather stations have become part of the backbone of weather observing in the United States and Canada and are becoming increasingly more prevalent worldwide due to their efficiency and cost-savings.
System types within the United States
In the United States, there are several varieties of automated weather stations that have somewhat subtle but important differences. These include the automated weather observing system (AWOS) and the automated surface observing system (ASOS).
Automated weather observing system (AWOS)
The automated weather observing system (AWOS) units are mostly operated, maintained and controlled by state or local governments and other non-federal entities and are certified under the FAA non-federal AWOS Program. The FAA completed an upgrade of the 230 FAA owned AWOS and former automated weather sensor systems (AWSS) systems to the AWOS-C configuration in 2017. The AWOS-C is the most up-to-date FAA owned AWOS facility and can generate METAR/SPECI formatted aviation weather reports. The AWOS-C is functionally equivalent to the ASOS. FAA owned AWOS-C units in Alaska are typically classified as AWOS-C IIIP units while all other AWOS-C units are typically classified as AWOS III P/T units.
AWOS systems disseminate weather data in a variety of ways:
A computer-generated voice message which is broadcast via radio frequency to pilots in the vicinity of an airport. The message is updated at least once per minute, and this is the only mandatory form of weather reporting for an AWOS.
Optionally, a computer-generated voice message, available over a telephone dial-up modem service. The message is updated at least once per minute.
Optionally (but frequently done), AWOS messages may be transmitted to the FAA for national dissemination via computer. These messages are currently in M |
https://en.wikipedia.org/wiki/NSP5%20%28rotavirus%29 | NSP5 (nonstructural protein 5) encoded by genome segment 11 of group A rotaviruses. In virus-infected cells NSP5 accumulates in the viroplasms. NSP5 has been shown to be autophosphorylated.
Interaction of NSP5 with NSP2 was also demonstrated. In rotavirus-infected cells, the non-structural proteins NSP5 and NSP2 localize in complexes called viroplasms, where replication and assembly occur and they can drive the formation of viroplasm-like structures in the absence of other rotaviral proteins and rotavirus replication.
There is no atomic-resolution structure of NSP5 determined as of June 2019. However, the low resolution three-dimensional structure of the NSP2-NSP5 assembly has been observed by cryo-EM. NSP5 occupies the same site as RNA when binding to NSP2. The EM data from this 2006 study has not been published. |
https://en.wikipedia.org/wiki/Caveolin%201 | Caveolin-1 is a protein that in humans is encoded by the CAV1 gene.
Function
The scaffolding protein encoded by this gene is the main component of the caveolae plasma membranes found in most cell types. The protein links integrin subunits to the tyrosine kinase FYN, an initiating step in coupling integrins to the Ras-ERK pathway and promoting cell cycle progression. The gene is a tumor suppressor gene candidate and a negative regulator of the Ras-p42/44 MAP kinase cascade. CAV1 and CAV2 are located next to each other on chromosome 7 and express colocalizing proteins that form a stable hetero-oligomeric complex. By using alternative initiation codons in the same reading frame, two isoforms (alpha and beta) are encoded by a single transcript from this gene.
Interactions
Caveolin 1 has been shown to interact with heterotrimeric G proteins,
Src tyrosine kinases (Src, Lyn) and H-Ras,
cholesterol,
TGF beta receptor 1,
endothelial NOS,
androgen receptor,
amyloid precursor protein,
gap junction protein, alpha 1,
nitric oxide synthase 2A, epidermal growth factor receptor, endothelin receptor type B, PDGFRB, PDGFRA, PTGS2, TRAF2, estrogen receptor alpha, caveolin 2, PLD2, Bruton's tyrosine kinase, and SCP2. All these interactions are through a caveolin-scaffolding domain (CSD) within caveolin-1 molecule. Molecules that interact with caveolin-1 contain caveolin-binding motifs (CBM).
See also
Caveolin |
https://en.wikipedia.org/wiki/ModSecurity | ModSecurity, sometimes called Modsec, is an open-source web application firewall (WAF). Originally designed as a module for the Apache HTTP Server, it has evolved to provide an array of Hypertext Transfer Protocol request and response filtering capabilities along with other security features across a number of different platforms including Apache HTTP Server, Microsoft IIS and Nginx. It is free software released under the Apache license 2.0.
The platform provides a rule configuration language known as 'SecRules' for real-time monitoring, logging, and filtering of Hypertext Transfer Protocol communications based on user-defined rules.
Although not its only configuration, ModSecurity is most commonly deployed to provide protections against generic classes of vulnerabilities using the OWASP ModSecurity Core Rule Set (CRS). This is an open-source set of rules written in ModSecurity's SecRules language. The project is part of OWASP, the Open Web Application Security Project. Several other rule sets are also available.
To detect threats, the ModSecurity engine is deployed embedded within the webserver or as a proxy server in front of a web application. This allows the engine to scan incoming and outgoing HTTP communications to the endpoint. Dependent on the rule configuration the engine will decide how communications should be handled which includes the capability to pass, drop, redirect, return a given status code, execute a script, and more.
History
ModSecurity was first developed by Ivan Ristić, who wrote the module with the end goal of monitoring application traffic on the Apache HTTP Server. The first version was released in November 2002 which supported Apache HTTP Server 1.3.x. Starting in 2004 Ivan created Thinking Stone to continue work on the project full-time. While working on the version 2.0 rewrite Thinking Stone was bought by Breach Security, an American-Israeli security company, in September 2006. Ivan stayed on continuing the development of version 2. |
https://en.wikipedia.org/wiki/Tag%20URI%20scheme | The tag URI scheme is a uniform resource identifier (URI) scheme for unique identifiers called tags, defined by RFC 4151 in October 2005.
The RFC identifies four requirements for tags:
Identifiers are likely to be unique across space and time, and come from a practically inexhaustible supply.
Identifiers are relatively convenient for humans to mint (create), read, type, remember etc.
No central registration is necessary, at least for holders of domain names or email addresses; and there is negligible cost to mint each new identifier.
The identifiers are independent of any particular resolution scheme.
Tags are used extensively in YAML.
Format
The general syntax of a tag URI is:
"tag:" authorityName "," YYYY-MM-DD-date ":" specific [ "#" fragment ]
In this syntax, the authorityName is either a domain name or an email address,
and the date is in the YYYY-MM-DD format, such as 2017-01-01. Thus, a specific tag is tied to a specific domain name or email address at a specific point of time. It is required that the "tagging entity" creating the tag be in control of the specified domain or email address as of 00:00 UTC on the specified date. This requirement makes each tag globally and persistently unique. The authority name alone would not suffice for global uniqueness, since the ownership of domains and email addresses is subject to change.
The date used in a tag may be a past date, provided the tagging entity controlled the authority name on that past date. An entity which acquires control of an authority name immediately after a period when it was unassigned is allowed to mint tags as if it controlled the authority name during the unassigned period, provided the entity has evidence that the name was unassigned. The date used in a newly-minted tag may not be a date in the future.
The date may be abbreviated; the month and day default to 01, but tags which have defaulted month and day values are reckoned as different from tags where the 01 value is specified. |
https://en.wikipedia.org/wiki/Electron%20cooling | Electron cooling is a method to shrink the emittance (size, divergence, and energy spread) of a charged particle beam without removing particles from the beam. Since the number of particles remains unchanged and the space coordinates and their derivatives (angles) are reduced, this means that the phase space occupied by the stored particles is compressed. It is equivalent to reducing the temperature of the beam. See also stochastic cooling.
The method was invented by Gersh Budker at INP, Novosibirsk, in 1966 for the purpose of increasing luminosity of hadron colliders. It was first tested in 1974 with 68 MeV protons at NAP-M storage ring at INP.
It is used at both operating ion colliders: the Relativistic Heavy Ion Collider and in the Low Energy Ion Ring at CERN.
Basically, electron cooling works as follows:
A beam of dense quasi-monoenergetic electrons is produced and merged with the ion beam to be cooled.
The velocity of the electrons is made equal to the average velocity of the ions.
The ions undergo Coulomb scattering in the electron “gas” and exchange momentum with the electrons. Thermodynamic equilibrium is reached when the particles have the same momentum, which requires that the much lighter electrons have much higher velocities. Thus, thermal energy is transferred from the ions to the electrons.
The electron beam is finally bent away from the ion beam.
See also
Stochastic cooling
Particle beam cooling |
https://en.wikipedia.org/wiki/End%20correction | Whenever a wave forms through a medium/object (organ pipe) with a closed/open end, there is a chance of error in the formation of the wave, i.e. it may not actually start from the opening of the object but instead before the opening, thus resulting on an error when studying it theoretically. Hence an end correction is sometimes required to appropriately study its properties. The end correction depends on the radius of the object.
An acoustic pipe, such as an organ pipe, marimba, or flute resonates at a specific pitch or frequency. Longer pipes resonate at lower frequencies, producing lower-pitched sounds. The details of acoustic resonance are taught in many elementary physics classes. In an ideal tube, the wavelength of the sound produced is directly proportional to the length of the tube. A tube which is open at one end and closed at the other produces sound with a wavelength equal to four times the length of the tube. A tube which is open at both ends produces sound whose wavelength is just twice the length of the tube. Thus, when a Boomwhacker with two open ends is capped at one end, the pitch produced by the tube goes down by one octave.
The analysis above applies only to an ideal tube, of zero diameter. When designing an organ or Boomwhacker, the diameter of the tube must be taken into account. In acoustics, end correction is a short distance applied or added to the actual length of a resonance pipe, in order to calculate the precise resonant frequency of the pipe. The pitch of a real tube is lower than the pitch predicted by the simple theory. A finite diameter pipe appears to be acoustically somewhat longer than its physical length.
A theoretical basis for computation of the end correction is the radiation acoustic impedance of a circular piston. This impedance represents the ratio of acoustic pressure at the piston, divided by the flow rate induced by it. The air speed is typically assumed to be uniform across the tube end. This is a good approximation, |
https://en.wikipedia.org/wiki/ANSI%20ASC%20X9.95%20Standard | The ANSI X9.95 standard for trusted timestamps expands on the widely used - Internet X.509 Public Key Infrastructure Time-Stamp Protocol by adding data-level security requirements that can ensure data integrity against a reliable time source that is provable to any third party. Applicable to both unsigned and digitally signed data, this newer standard has been used by financial institutions and regulatory bodies to create trustworthy timestamps that cannot be altered without detection and to sustain an evidentiary trail of authenticity. Timestamps based on the X9.95 standard can be used to provide:
authenticity: trusted, non-refutable time when data was digitally signed
integrity: protection of the timestamp from tampering without detection
timeliness: proof that the time of the digital signature was in fact the actual time
an evidentiary trail of authenticity for legal sufficiency
A superset of the IETF's RFC 3161 protocol, the X9.95 standard includes definitions for specific data objects, message protocols, and trusted timestamp methods, such as digital signature, MAC, linked token, linked-and-signature and transient-key methods. X9.95 compliance can be achieved via several technological approaches, such as transient-key cryptography. Several vendors market X9.95-compliant systems.
Definitions
In an X9.95 trusted timestamp scheme, there are five entities: the time source entity, the Time Stamp Authority, the requestor, the verifier, and a relying party.
Time source entity - Most countries have an official source of time and this has been codified over the last hundred years through any number of Mutual Recognition Agreement's and Legal Metrological Agreements (see http://www.oiml.org for more information on Legal Metrology). Why this is important is now that the Internet has made it possible to reach directly into the laboratory that operates the official source of time for that jurisdiction, the many layers of "middlemen” who stood between the end-use |
https://en.wikipedia.org/wiki/Nucleic%20acid%20analogue | Nucleic acid analogues are compounds which are analogous (structurally similar) to naturally occurring RNA and DNA, used in medicine and in molecular biology research.
Nucleic acids are chains of nucleotides, which are composed of three parts: a phosphate backbone, a pentose sugar, either ribose or deoxyribose, and one of four nucleobases.
An analogue may have any of these altered. Typically the analogue nucleobases confer, among other things, different base pairing and base stacking properties. Examples include universal bases, which can pair with all four canonical bases, and phosphate-sugar backbone analogues such as PNA, which affect the properties of the chain (PNA can even form a triple helix).
Nucleic acid analogues are also called Xeno Nucleic Acid and represent one of the main pillars of xenobiology, the design of new-to-nature forms of life based on alternative biochemistries.
Artificial nucleic acids include peptide nucleic acid (PNA), Morpholino and locked nucleic acid (LNA), as well as glycol nucleic acid (GNA), threose nucleic acid (TNA) and hexitol nucleic acids (HNA). Each of these is distinguished from naturally occurring DNA or RNA by changes to the backbone of the molecule.
In May 2014, researchers announced that they had successfully introduced two new artificial nucleotides into bacterial DNA, and by including individual artificial nucleotides in the culture media, were able to passage the bacteria 24 times; they did not create mRNA or proteins able to use the artificial nucleotides. The artificial nucleotides featured 2 fused aromatic rings.
Medicine
Several nucleoside analogues are used as antiviral or anticancer agents. The viral polymerase incorporates these compounds with non-canonical bases. These compounds are activated in the cells by being converted into nucleotides, they are administered as nucleosides since charged nucleotides cannot easily cross cell membranes.
Molecular biology
Nucleic acid analogues are used in molecular b |
https://en.wikipedia.org/wiki/IAC%20Video%20Wall | The IAC Video Wall, located in the Frank Gehry-designed headquarters for IAC in Chelsea, Manhattan, New York City, is one of the largest high-resolution video walls in the world, wide and high. The installation features the world’s largest high-resolution video wall, built by Prysm, using their proprietary Laser Phosphor Display (LPD) technology, a new display technology that uses low-power, solid–state lasers. The two walls will deliver more than 50 million pixels combined. The large-scale projection wall is visible from the West Side Highway/11th Avenue to tens of thousands of commuters each day, building brand awareness for IAC's online businesses.
Brand-specific modules designed and conceived by Trollback + Company represent the essence of each brand, incorporating a range of 2D, 3D and live action elements. The modules are based on a theme reflecting the consumer experience associated with IAC’s online businesses, such as ‘I Date’, ‘I Travel” and ‘I Shop’, a concept conceived by Bruce Mau of Bruce Mau Design. The ‘I Date’ module uses the main romantic icon, flowers, and creates a sensual sequence with dramatic details of the time-lapse flowers opening. The simple concept for ‘I Shop’ was to illustrate the enormous quantity and diversity of products available from IAC’s retail websites, using the scale of the display to create an immense sense of depth and infinite choice of merchandise.
Two of the modules incorporate dynamic data from the web. ‘I Experience’ parses a daily xml feed that is programmed to visualize the movement of current music events across the USA, linking locations and forming connections between venues. ‘I Explore’ creates an endless loop of current news.
Emphasizing the public nature of the wall, creative director Jason Koxvold conceived two time-keeping modules that use innovative graphics to represent the progression. In one, graphic bars animate across the whole length of the wall, rendering a strong physicality of the passing of tim |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.