source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Intranet%20Design%20Annual | The Intranet Design Annual is a yearly intranet design contest with 10 winners. The contest focuses on usability. The contest was created by Kara Pernice in 2001, and is organised by Nielsen Norman Group who each year publishes a report with detailed case studies on the awarded intranets.
See also
Intranet
Usability |
https://en.wikipedia.org/wiki/Saint-Venant%27s%20theorem | In solid mechanics, it is common to analyze the properties of beams with constant cross section. Saint-Venant's theorem states that the simply connected cross section with maximal torsional rigidity is a circle. It is named after the French mathematician Adhémar Jean Claude Barré de Saint-Venant.
Given a simply connected domain D in the plane with area A, the radius and the area of its greatest inscribed circle, the torsional rigidity P
of D is defined by
Here the supremum is taken over all the continuously differentiable functions vanishing on the boundary of D. The existence of this supremum is a consequence of Poincaré inequality.
Saint-Venant conjectured in 1856 that
of all domains D of equal area A the circular one has the greatest torsional rigidity, that is
A rigorous proof of this inequality was not given until 1948 by Pólya. Another proof was given by Davenport and reported in. A more general proof and an estimate
is given by Makai.
Notes
Elasticity (physics)
Eponymous theorems of physics
Calculus of variations
Inequalities |
https://en.wikipedia.org/wiki/Domain-driven%20design | Domain-driven design (DDD) is a major software design approach, focusing on modeling software to match a domain according to input from that domain's experts.
Under domain-driven design, the structure and language of software code (class names, class methods, class variables) should match the business domain. For example: if software processes loan applications, it might have classes like "loan application", "customers", and methods such as "accept offer" and "withdraw".
Domain-driven design is predicated on the following goals:
placing the project's primary focus on the core domain and domain logic;
basing complex designs on a model of the domain;
initiating a creative collaboration between technical and domain experts to iteratively refine a conceptual model that addresses particular domain problems.
Critics of domain-driven design argue that developers must typically implement a great deal of isolation and encapsulation to maintain the model as a pure and helpful construct. While domain-driven design provides benefits such as maintainability, Microsoft recommends it only for complex domains where the model provides clear benefits in formulating a common understanding of the domain.
The term was coined by Eric Evans in his book of the same title published in 2003.
Overview
Domain-driven design articulates a number of high-level concepts and practices.
Of primary importance is a domain of the software, the subject area to which the user applies a program. Software's developers build a domain model: a system of abstractions that describes selected aspects of a domain and can be used to solve problems related to that domain.
These aspects of domain-driven design aim to foster a common language shared by domain experts, users, and developers—the ubiquitous language. The ubiquitous language is used in the domain model and for describing system requirements.
Ubiquitous language is one of the pillars of DDD together with strategic design and tactical design.
|
https://en.wikipedia.org/wiki/Current%20Issues%20in%20Molecular%20Biology | Current Issues in Molecular Biology (CIMB) is a peer-reviewed open access journal publishing review articles and minireviews in all areas of molecular biology and molecular microbiology. According to the Journal Citation Reports, the journal has an impact factor of 2.976. It was originally published by Caister Academic Press when it was established in 1999, but has been published by MDPI since 2021. |
https://en.wikipedia.org/wiki/Benyvirus | Benyvirus is a genus of viruses, in the family Benyviridae. Plants serve as natural hosts. There are four species in this genus. Diseases associated with this genus include: BNYVV: rhizomania.
Taxonomy
Beet necrotic yellow vein virus (ICTVdB Virus Code: 00.088.0.01.001)
Beet soil-borne mosaic virus (ICTVdB Virus Code: 00.088.0.01.002)
Burdock mottle virus (ICTVdB Virus Code: 00.088.0.01.004)
Rice stripe necrosis virus, isolates of which are known as RSNV, (ICTVdB Virus Code: 00.088.0.01.003), a rod-shaped virus containing just six open reading frames in its genome. A pathogen of rice plants, it may cause chlorosis, necrosis, and malformation.
Structure
Viruses in the genus Benyvirus are non-enveloped, with rod-shaped geometries. The diameter is around 20 nm, with a length of 85–390 nm. Genomes are linear and segmented, around 6.7kb in length.
Life cycle
Viral replication is cytoplasmic. Entry into the host cell is achieved by penetration into the host cell. Replication follows the positive stranded RNA virus replication model. Positive stranded RNA virus transcription is the method of transcription. The virus exits the host cell by tripartite non-tubule guided viral movement.
Plant serve as the natural host. The virus is transmitted via a vector (protozoan). Transmission routes are vector. |
https://en.wikipedia.org/wiki/Theodore%20Holmes%20Bullock | Theodore Holmes Bullock (16 May 1915 – 20 December 2005) is one of the founding fathers of neuroethology. During a career spanning nearly seven decades, this American academic was esteemed both as a pioneering and influential neuroscientist, examining the physiology and evolution of the nervous system across organizational levels, and as a champion of the comparative approach, studying species from nearly all major animal groups—coelenterates, annelids, arthropods, echinoderms, molluscs, and chordates.
Bullock discovered the pit organ in pit vipers and electroreceptors in weakly electric fish, as well as other electrosensory animals. His work on the jamming avoidance response in electric fish (work later carried on by Walter Heiligenberg) is an excellent example of how motor programs are integrated with incoming sensory information when generating a behavior pattern in response to a stimulus.
Bullock appealed to the scientific community to look beyond established paradigms in neuroscience, as well as to consider the ecology of an animal when endeavoring to understand its nervous system. As he once wrote, “Neuroscience is part of biology, more specifically of zoology, and it suffers tunnel vision unless continuous with ethology, ecology, and evolution”.
In his quest to go beyond a descriptive account of the nervous system, Bullock studied many different and
unrelated, species. He believed that this "comparative approach" would reveal both general principles of the nervous system, and offer insights into which nervous system properties (anatomical, physiological, and chemical) were relevant to observed differences in species-specific traits, as well as which specific traits were relevant to observed differences in nervous systems. His resulting discoveries helped explain various properties of nervous systems. In one influential review he wrote, “Comparative neuroscience is likely to reach insights so novel as to constitute revolutions in understanding the structur |
https://en.wikipedia.org/wiki/TootsieToy | Tootsietoy is a manufacturer of die cast toy cars and other toy vehicles which was originally based in Chicago, Illinois. Though the Tootsietoy name has been used since the 1920s, the company's origins date from about 1890. An enduring marque, toys with the Tootsietoy name were consistently popular from the 1930s through the 1990s.
Diecasting origins
Tootsietoy had its beginnings in the two diecasting companies of the Dowst and the Shure Brothers who were established near the same time in the 1890s. The Dowst brothers originally established a trade paper called the National Laundry Journal and later purchased a linotype machine to cast metal buttons and cuff links related to the laundry business.
Meanwhile, the Tootsietoy brand also had origins in a range of miniature cars in the form of charms, pins, cuff links and the like, introduced circa 1901 by the Chicago based Cosmo Company owned by the Shure Bros. which bought Dowst in 1926. The name, however, remained Dowst Manufacturing Co. The first actual model car from the company was produced between 1909 and 1911. One was a closed limousine which was followed by a 1915 Ford Model T open tourer.
Pre-War toys
By the early 1920s the name 'tootsie' was being used as a brand name and "Tootsietoy" was registered as a trade mark in 1924. The 'Tootsie' moniker apparently came from one of the Dowst Brothers' granddaughters, whose name was "Toots". Tootsietoy made metal prizes for Cracker Jack boxes, and this success in the 1930s may also have led to Dowst providing cast pieces for the game Monopoly. The company also produced a large assortment of die-cast dollhouse furniture.
In the 1920s trains, cars, trucks, military vehicles, aircraft, pistols and a variety of other toys were manufactured by Dowst. Vehicles often had white rubber tires which over time become brittle and often have not survived play-wear and time. One of the unique offerings were a set of 1932 Graham diecast cars - Tootsietoy offered a Graham sedan, tow |
https://en.wikipedia.org/wiki/Foundational%20Questions%20Institute | The Foundational Questions Institute, styled FQxI (formerly FQXi), is an organization that provides grants to "catalyze, support, and disseminate research on questions at the foundations of physics and cosmology." It was founded in 2005 by cosmologists Max Tegmark and Anthony Aguirre,.
It has run multiple worldwide grant competitions (in 2006, 2008, 2010, 2013, 2015, 2017 and 2019), the first of which provided US$2M to 30 projects. It also runs frequent essay contests open to the general public with $40,000 in prizes awarded by a jury panel and the best texts published in book format.
FQxI is an independent, philanthropically funded non-profit organization, run by scientists for scientists.
The $6.2 million seed funding was donated by the John Templeton Foundation, whose goal is to reconcile science and religion. Tegmark has stated that the money came with "no strings attached"; The Boston Globe stated FQxI is run by "two well-respected researchers who say they are not religious. The institute's scientific advisory board is also filled with top scientists." Critics of the John Templeton Foundation such as Sean Carroll have also stated they were satisfied that the FQxI is independent.
Notable members
FQXi members include
Scott Aaronson
Anthony Aguirre
Yakir Aharonov
John Carlos Baez
Julian Barbour
John D. Barrow
Jacob Biamonte
Raphael Bousso
Sean Carroll
David Chalmers
Paul Davies
David Deutsch
George F. R. Ellis
Nicolas Gisin
Brian Greene
Sabine Hossenfelder
Robert Lawrence Kuhn
Seth Lloyd
Roger Penrose
Lisa Randall
Martin Rees
Carlo Rovelli
Lee Smolin
Leonard Susskind
Gerard 't Hooft
Max Tegmark
Vlatko Vedral
Steven Weinberg
Frank Wilczek
Stephen Wolfram
Anton Zeilinger
Wojciech Zurek
Among others |
https://en.wikipedia.org/wiki/Great%20ellipse | A great ellipse is an ellipse passing through two points on a spheroid and having the same center as that of the spheroid. Equivalently, it is an ellipse on the surface of a spheroid and centered on the origin, or the curve formed by intersecting the spheroid by a plane through its center.
For points that are separated by less than about a quarter of the circumference of the earth, about , the length of the great ellipse connecting the points is close (within one part in 500,000) to the geodesic distance.
The great ellipse therefore is sometimes proposed as a suitable route for marine navigation.
The great ellipse is special case of an earth section path.
Introduction
Assume that the spheroid, an ellipsoid of revolution, has an equatorial radius and polar semi-axis . Define the flattening , the eccentricity , and the second eccentricity . Consider two points: at (geographic) latitude and longitude and at latitude and longitude . The connecting great ellipse (from to ) has length and has azimuths and at the two endpoints.
There are various ways to map an ellipsoid into a sphere of radius in such a way as to map the great ellipse into a great circle, allowing the methods of great-circle navigation to be used:
The ellipsoid can be stretched in a direction parallel to the axis of rotation; this maps a point of latitude on the ellipsoid to a point on the sphere with latitude , the parametric latitude.
A point on the ellipsoid can mapped radially onto the sphere along the line connecting it with the center of the ellipsoid; this maps a point of latitude on the ellipsoid to a point on the sphere with latitude , the geocentric latitude.
The ellipsoid can be stretched into a prolate ellipsoid with polar semi-axis and then mapped radially onto the sphere; this preserves the latitude—the latitude on the sphere is , the geographic latitude.
The last method gives an easy way to generate a succession of way-points on the great ellipse connecting two known po |
https://en.wikipedia.org/wiki/Phenol-soluble%20modulin | Phenol-soluble modulins (PSMs) are a family of small proteins, that carry out a variety of functions, including acting as toxins, assisting in biofilm formation, and colony spreading. PSMs are produced by Staphylococcus bacteria including Methicillin-resistant Staphylococcus aureus (MRSA), and Staphylococcus epidermidis. Many PSMs are encoded within the core genome and can play an important virulence factor. PSMs were first discovered in S. epidermidis by Seymour Klebanoff and via hot-phenol extraction and were described as a pro-inflammatory complex of three peptides. Since their initial discovery, numerous roles of PSMs have been identified. However, due in part to the small size of many PSMs, they have largely gone unnoticed until recent years.
Although PSMs are present in every Staphylococcal species, there is still diversity. Staphylococcus aureus encodes eight different PSMs, PSMα 1-4, PSMβ 1-2, PSMγ (Also known as δ-toxin in S. aureus), and PSM-mec. While Staphylococcus epidermidis encodes one PSMα, PSMβ 1-2, PSMγ, and PSM-mec. In addition S. epidermidis encodes two unique PSMs, PSMδ and PSMε.
PSM-mec is one of the most widely encoded PSM among Staphylococcal species. Which may be in part due to PSM-mec being encoded on the mecI mobile genetic element.
Structure and location
As the PSM classes are closely related there are many conserved aspects. However each PSM class plays a different role, as such there are some distinctive features for each. Generally PSMs are encoded on the core genome of staphylococcal species however some, such as PSM-mec, are encoded on mobile genetic elements. PSMs are generally separated into one of two classes α-type PSMs and β-type PSMs, which are based upon characteristics of the two most well studied PSMs PSMα and PSMβ.
PSMα
PSMα forms an amphipathic α-helix structure that composes the entire length of the peptide. These peptides are relatively short, being composed of only 20-25 amino acids. With regards to charge, α-typ |
https://en.wikipedia.org/wiki/Variability%20hypothesis | The variability hypothesis, also known as the greater male variability hypothesis, is the hypothesis that males generally display greater variability in traits than females do.
It has often been discussed in relation to human cognitive ability, where some studies appear to show that males are more likely than females to have either very high or very low IQ test scores. In this context, there is controversy over whether such sex-based differences in the variability of intelligence exist, and if so, whether they are caused by genetic differences, environmental conditioning, or a mixture of both.
Sex-differences in variability have been observed in many abilities and traits – including physical, psychological and genetic ones – across a wide range of sexually dimorphic species.
History
The notion of greater male variability—at least in respect to physical characteristics—can be traced back to the writings of Charles Darwin. When he expounded his theory of sexual selection in The Descent of Man and Selection in Relation to Sex, Darwin cites some observations made by his contemporaries. For example, he highlights findings from the Novara Expedition of 1861–1867 where "a vast number of measurements of various parts of the body in different races were made, and the men were found in almost every case to present a greater range of variation than the women" (p. 275). To Darwin, the evidence from the medical community at the time, which suggested a greater prevalence of physical abnormalities among men than women, was also indicative of men's greater physical variability.
Although Darwin was curious about sex differences in variability throughout the animal kingdom, variability in humans was not a chief concern of his research. The first scholar to carry out a detailed empirical investigation on the question of human sex differences in variability in both physical and mental faculties, was the sexologist Havelock Ellis. In his 1894 publication Man and Woman: A Study of Hu |
https://en.wikipedia.org/wiki/UDPCast | UDPcast is a file transfer tool that can send data simultaneously to many destinations on a LAN. This can for instance be used to install entire classrooms of PCs at once. The advantage of UDPcast over using other methods (nfs, ftp, whatever) is that UDPcast uses the User Datagram Protocol's multicast abilities: it won't take longer to install 15 machines than it would to install just 2.
By default this protocol operates on the UDP port 9000. This default behaviour can be changed during the boot stage.
See also
List of disk cloning software
External links
Free system software
Free backup software
Free software programmed in Perl
Cross-platform software
Disk cloning
Computer networking |
https://en.wikipedia.org/wiki/Clonal%20interference | Clonal interference is a phenomenon in evolutionary biology, related to the population genetics of organisms with significant linkage disequilibrium, especially asexually reproducing organisms. The idea of clonal interference was introduced by American geneticist Hermann Joseph Muller in 1932. It explains why beneficial mutations can take a long time to get fixated or even disappear in asexually reproducing populations. As the name suggests, clonal interference occurs in an asexual lineage ("clone") with a beneficial mutation. This mutation would be likely to get fixed if it occurred alone, but it may fail to be fixed, or even be lost, if another beneficial-mutation lineage arises in the same population; the multiple clones interfere with each other.
Mechanism of clonal interference
Whenever a beneficial mutation arises in a population, for example mutation A, the carrier of the mutation obtains a higher fitness compared to members of the population without mutation A by means of natural selection. In the absence of genetic recombination (i.e. in asexually reproducing organisms) this beneficial mutation is only present in the clones of the cell in which the mutation arose. Because of this, the relative frequency of mutation A only increases slowly over time. In large asexually reproducing populations, it can take a long time before the mutation is fixated. In this time, another beneficial mutation, for example mutation B, can arise independently in another individual of the population. Mutation B also increases the fitness of the carrier. In this context, mutation A is often referred to as the ‘original mutation’, whereas mutation B is referred to as the ‘alternative’ or ‘interfering’ mutation.
In sexually reproducing populations, both carriers of mutations A and B have a higher fitness and therefore a bigger chance to survive and to produce offspring. When a carrier of mutation A produces offspring with a carrier of mutation B, the more-fit genotype AB can arise |
https://en.wikipedia.org/wiki/Chorismate%20lyase | The enzyme chorismate lyase () catalyzes the first step in ubiquinone biosynthesis, the removal of pyruvate from chorismate, to yield 4-hydroxybenzoate in Escherichia coli and other Gram-negative bacteria. It belongs to the family of lyases, specifically the oxo-acid-lyases, which cleave carbon-carbon bonds. The systematic name of this enzyme class is chorismate pyruvate-lyase (4-hydroxybenzoate-forming). Other names in common use include CL, CPL, and UbiC.
This enzyme catalyses the chemical reaction:
chorismate 4-hydroxybenzoate + pyruvate
Its activity does not require metal cofactors.
Activity
Catalytic activity
This enzyme has an optimum pH at 7.5
Enzymatic activity
Inhibited by:
Vanillate
4-hydroxybenzaldehyde
3-carboxylmethylaminmethyl-4-hydroxybenzoic acid
4HB - ubiC is inhibited by the product of the reaction, which scientists believe serves as a control mechanism for the pathway
Pathway
The pathway used is called the ubiquinone biosynthesis pathway, it catalyzes the first step in the biosynthesis of ubiquinone in E. coli. Ubiquinone is a lipid-soluble electron-transporting coenzyme. They are essential electron carriers in prokaryotes and are essential in aerobic organisms to achieve ATP synthesis.
Nomenclature
There are several different names for chorismate lyase. It is also called chorismate pyruvate lyase (4-hydroxybenzoate-forming) and it is also abbreviated several different ways: CPL, CL, and ubiC. It is sometimes referred to as ubiC, because that is the gene name. This enzyme belongs to the class lyases; more specifically the ox-acid-lyase or the carbon-carbon-lyases.
Taxonomic lineage:
bacteria → proteobacteria → gammaproteobacteria → enterobacteriales → enterobacteriaceae → escherichia → Escherichia coli
Structure
This enzyme is a monomer. Its secondary structure contains helixes, turns, and beta-strands. It has a mass of 18,777 daltons and its sequence is 165 amino acids long.
Binding sites
position: 35(M)
position: 77(R |
https://en.wikipedia.org/wiki/Indole-3-glycerol-phosphate%20synthase | The enzyme indole-3-glycerol-phosphate synthase (IGPS) () catalyzes the chemical reaction
1-(2-carboxyphenylamino)-1-deoxy-D-ribulose 5-phosphate 1-C-(indol-3-yl)-glycerol 3-phosphate + CO2 + H2O
This enzyme belongs to the family of lyases, to be specific, the carboxy-lyases, which cleave carbon-carbon bonds. The systematic name of this enzyme class is 1-(2-carboxyphenylamino)-1-deoxy-D-ribulose-5-phosphate carboxy-lyase [cyclizing 1-C-(indol-3-yl)glycerol-3-phosphate-forming]. Other names in common use include indoleglycerol phosphate synthetase, indoleglycerol phosphate synthase, indole-3-glycerophosphate synthase, 1-(2-carboxyphenylamino)-1-deoxy-D-ribulose-5-phosphate, and carboxy-lyase (cyclizing). This enzyme participates in phenylalanine, tyrosine and tryptophan biosynthesis and two-component system - general. It employs one cofactor, pyruvate.
Structural studies
In some bacteria, IGPS is a single chain enzyme. In others, such as Escherichia coli, it is the N-terminal domain of a bifunctional enzyme that also catalyses N-(5'-phosphoribosyl)anthranilate isomerase () (PRAI) activity, the third step of tryptophan biosynthesis. In fungi, IGPS is the central domain of a trifunctional enzyme that contains a PRAI C-terminal domain and a glutamine amidotransferase () (GATase) N-terminal domain.
A structure of the IGPS domain of the bifunctional enzyme from the mesophilic bacterium E. coli (eIGPS) has been compared with the monomeric indole-3-glycerol phosphate synthase from the hyperthermophilic archaeon Sulfolobus solfataricus (sIGPS). Both are single-domain (beta/alpha)8 barrel proteins, with one (eIGPS) or two (sIGPS) additional helices inserted before the first beta strand.
As of late 2007, 11 structures have been solved for this class of enzymes, with PDB accession codes , , , , , , , , , , and . |
https://en.wikipedia.org/wiki/Certified%20wireless%20network%20administrator | The Certified Wireless Network Administrator (CWNA) is a foundation level certification from the CWNP that measures the ability to administer any wireless LAN. A wide range of topics focusing on the 802.11 wireless LAN technology are covered in the coursework and exam, which is vendor neutral.
Certification track
The Certified Wireless Network Administrator (CWNA) is a foundation level wireless certification for the Certified Wireless Network Professional (CWNP) program. The CWNP next offers three professional level certifications: Certified Wireless Security Professional (CWSP), Certified Wireless Analysis Professional (CWAP) and Certified Wireless Design Professional (CWDP). A candidate can only achieve the expert level CWNE certification after earning the CWNA, CWSP, CWAP and CWDP certifications. A candidate no longer has to pass an exam for the expert level Certified Wireless Network Expert (CWNE) certification. In addition to passing the CWNA, CWSP, CWAP and CWDP a candidate must also provide: 3 professional endorsements, 3 years of documented enterprise Wi-Fi experience, 2 other current valid networking certifications and documentation of 3 enterprise Wi-Fi projects the candidate has participated in or led.
CWNA requirements
The main subject areas covered by the CWNA are as follows:
Radio Technologies
Antenna Concepts
Wireless LAN hardware and software
Network Design Installation and Management
Wireless Standards and Organization
802.11 Network Architecture
Wireless LAN Security
Troubleshooting
How to perform site surveys
These subjects are covered at an introductory level in the CWNA coursework and examination. The other certifications specialize in one or more of these subjects.
Recertification
The CWNA certification is valid for three years. The certification may be renewed by retaking the CWNA exam or by passing one of the 3 professional level certification exams (CWSP, CWAP or CWDP).
See also
Professional certification (Computer technology) |
https://en.wikipedia.org/wiki/Arginine%E2%80%94tRNA%20ligase | In enzymology, an arginine—tRNA ligase () is an enzyme that catalyzes the chemical reaction
ATP + L-arginine + tRNAArg AMP + diphosphate + L-arginyl-tRNAArg
The 3 substrates of this enzyme are ATP, L-arginine, and tRNA(Arg), whereas its 3 products are AMP, diphosphate, and L-arginyl-tRNA(Arg).
This enzyme belongs to the family of ligases, to be specific those forming carbon-oxygen bonds in aminoacyl-tRNA and related compounds. The systematic name of this enzyme class is L-arginine:tRNAArg ligase (AMP-forming). Other names in common use include arginyl-tRNA synthetase, arginyl-transfer ribonucleate synthetase, arginyl-transfer RNA synthetase, arginyl transfer ribonucleic acid synthetase, arginine-tRNA synthetase, and arginine translase. This enzyme participates in arginine and proline metabolism and aminoacyl-trna biosynthesis.
It contains a conserved domain at the N terminus called arginyl tRNA synthetase N terminal domain or additional domain 1 (Add-1). This domain is about 140 residues long and it has been suggested that it is involved in tRNA recognition.
Structural studies
As of late 2007, 4 structures have been solved for this class of enzymes, with PDB accession codes , , , and . |
https://en.wikipedia.org/wiki/Immobilized%20whole%20cell | The immobilized whole cell system is an alternative to enzyme immobilization. Unlike enzyme immobilization, where the enzyme is attached to a solid support (such as calcium alginate or activated PVA or activated PEI), in immobilized whole cell systems, the target cell is immobilized. Such methods may be implemented when the enzymes required are difficult or expensive to extract, an example being intracellular enzymes. Also, if a series of enzymes are required in the reaction; whole cell immobilization may be used for convenience. This is only done on a commercial basis when the need for the product is more justified.
Multiple enzymes may be introduced into the reaction, thus eliminating the need for immobilization of multiple enzymes. Furthermore, intracellular enzymes need not be extracted prior to the reaction; they may be used directly. However, some enzymes may be used for the metabolic needs of the cell, leading to reduced yield of the cell. |
https://en.wikipedia.org/wiki/Biotin%20carboxylase | In enzymology, a biotin carboxylase () is an enzyme that catalyzes the chemical reaction
ATP + biotin-carboxyl-carrier protein + CO2 ADP + phosphate + carboxybiotin-carboxyl-carrier protein
The three substrates of this enzyme are ATP, biotin-carboxyl-carrier protein (BCCP), and CO2, whereas its three products are ADP, phosphate, and carboxybiotin-carboxyl-carrier protein.
The systematic name of this enzyme class is biotin-carboxyl-carrier-protein:carbon-dioxide ligase (ADP-forming). This enzyme is also called biotin carboxylase (component of acetyl CoA carboxylase). This enzyme participates in fatty acid biosynthesis. This enzyme participates in fatty acid biosynthesis by providing one of the catalytic functions of the Acetyl-CoA carboxylase complex. As previously mentioned, after the carboxybiotin product is formed, the carboxyltransferase unit of the complex will transfer the activated carboxy group from BCCP to Acetyl-CoA, forming a malonate analog known as malonyl-CoA. Malonyl-CoA serves as the primary carbon donor in fatty acid biosynthesis, followed by a series of reduction and dehydration reactions to remove the acyl group.
Reaction pathway
Biotin carboxylases are a conserved enzyme present within biotin-dependent carboxylase complexes such as acetyl-CoA carboxylase. How biotin carboxylase functions is, within the relevant carboxylase complex, there is a biotin carboxyl-carrier protein which is covalently linked to biotin via a Lys-residue. Both biotin carboxylase activity as well as the BCCP within the carboxylase complex are highly conserved among this enzyme class. The main source of variation for carboxylases arises from the carboxyltransferase component, as the molecule to which the carboxyl group is transferred (from biotin) dictates the necessary specificity component to catalyze this transfer.
The structure of biotin carboxylase heavily influences the reaction pathway the enzyme catalyzes, so discussion of this reaction pathway must also touc |
https://en.wikipedia.org/wiki/Chondritic%20uniform%20reservoir | The CHondritic Uniform Reservoir (CHUR) is a scientific model in astrophysics and geochemistry for the mean chemical composition of the part of the Solar Nebula from which, during the formation of the Solar System, chondrites formed. This hypothetical chemical reservoir is thought to have been similar in composition to the current photosphere of the Sun.
When the Sun formed from its protostar, around 4.56 billion years ago, the solar wind blew all gas particles from the central part of the Solar Nebula. In this way most lighter volatiles (e.g. hydrogen, helium, oxygen, carbon dioxide), that had not yet condensed in the inner, warmer regions of the nebula, were lost. This fractionation process is the reason why the terrestrial planets and asteroid belt are relatively enriched in heavy elements in respect to the Sun or the gas planets.
Certain type of meteorites, CI-chondrites, have chemical compositions that are almost identical to the solar photosphere, except for the abundances of volatiles. Because the Sun contains 99.86% of the mass of the Solar System, they are considered to have the same composition as the solar nebula (with the exception of volatile loss) and are therefore representative of the material from which the terrestrial planets, including the Earth, were formed.
See also
Chondrite
Nebular hypothesis
Astrophysics
Geochemistry |
https://en.wikipedia.org/wiki/Bus%20functional%20model | A Bus Functional Model or BFM (also known as a Transaction Verification Model or TVM) is a non-synthesizable software model of an integrated circuit component having one or more external buses. The emphasis of the model is on simulating system bus transactions prior to building and testing the actual hardware. BFMs are usually defined as tasks in Hardware description languages (HDLs), which apply stimuli to the design under verification via complex waveforms and protocols. A BFM is typically implemented using hardware description languages such as Verilog, VHDL, SystemC, or SystemVerilog.
Typically, BFMs offer a two-sided interface: One interface side drives and samples low-level signals according to the bus protocol. On its other side, tasks are available to create and respond to bus transactions. BFMs are often used as reusable building blocks to create simulation test benches, in which the bus interface ports of a design under test are connected to appropriate BFMs.
Another common application of BFMs is the provision of substitute models for IP components: Instead of a netlist or RTL design of an IP component, a 3rd party IP supplier might provide only a BFM suitable for verification purposes. The actual IP component in the form of a gate-level netlist can be directly provided to the foundry by the IP provider.
In the past, BFM were treated as a non-synthesizable entity, however recently BFMs are becoming available as synthesizable models as well.
Transaction Verification Models
BFMs are sometimes referred to as TVMs or Transaction Verification Models. This is to emphasize that bus operations of the model have been bundled into atomic bus transactions to make it easier to issue and view bus transactions. Visualizations of the bus transactions modeled by TVMs are similar to the output of a protocol analyzer or bus sniffer. |
https://en.wikipedia.org/wiki/Formate%E2%80%93tetrahydrofolate%20ligase | In enzymology, a formate—tetrahydrofolate ligase () is an enzyme that catalyzes the chemical reaction
ATP + formate + tetrahydrofolate ADP + phosphate + 10-formyltetrahydrofolate
The 3 substrates of this enzyme are ATP, formate, and tetrahydrofolate, whereas its 3 products are ADP, phosphate, and 10-formyltetrahydrofolate.
This enzyme belongs to the family of ligases, specifically those forming generic carbon-nitrogen bonds. This enzyme participates in glyoxylate and dicarboxylate metabolism and one carbon pool by folate.
In eukaryotes the FTHFS activity is expressed by a multifunctional enzyme, C-1-tetrahydrofolate synthase (C1-THF synthase), which also catalyses the dehydrogenase and cyclohydrolase activities. Two forms of C1-THF syntheses are known, one is located in the mitochondrial matrix, while the second one is cytoplasmic. In both forms the FTHFS domain consists of about 600 amino acid residues and is located in the C-terminal section of C1-THF synthase. In prokaryotes FTHFS activity is expressed by a monofunctional homotetrameric enzyme of about 560 amino acid residues.
Nomenclature
The systematic name of this enzyme class is formate:tetrahydrofolate ligase (ADP-forming). Other names in common use include:
formyltetrahydrofolate synthetase,
10-formyltetrahydrofolate synthetase,
tetrahydrofolic formylase, and
tetrahydrofolate formylase.
Examples
Human genes encoding formate-tetrahydrofolate ligases include:
MTHFD1 – cytoplasmic
MTHFD1L – mitochondrial
Structural studies
As of late 2007, 3 structures have been solved for this class of enzymes, with PDB accession codes , , and .
The crystal structure of N(10)-formyltetrahydrofolate synthetase from Moorella thermoacetica shows that the subunit is composed of three domains organised around three mixed beta-sheets. There are two cavities between adjacent domains. One of them was identified as the nucleotide binding site by homology modelling. The large domain contains a seven-stranded beta |
https://en.wikipedia.org/wiki/Phenylalanine%E2%80%94tRNA%20ligase | In enzymology, a phenylalanine—tRNA ligase () is an enzyme that catalyzes the chemical reaction
ATP + L-phenylalanine + tRNAPhe AMP + diphosphate + L-phenylalanyl-tRNAPhe
The 3 substrates of this enzyme are ATP, L-phenylalanine, and tRNAPhe, whereas its 3 products are AMP, diphosphate, and L-phenylalanyl-tRNAPhe.
This enzyme belongs to the family of ligases, to be specific those forming carbon-oxygen bonds in aminoacyl-tRNA and related compounds. The systematic name of this enzyme class is L-phenylalanine:tRNAPhe ligase (AMP-forming). Other names in common use include phenylalanyl-tRNA synthetase, phenylalanyl-transfer ribonucleate synthetase, phenylalanine-tRNA synthetase, phenylalanyl-transfer RNA synthetase, phenylalanyl-tRNA ligase, phenylalanyl-transfer RNA ligase, L-phenylalanyl-tRNA synthetase, and phenylalanine translase. This enzyme participates in phenylalanine, tyrosine and tryptophan biosynthesis and aminoacyl-tRNA biosynthesis.
Phenylalanine-tRNA synthetase (PheRS) is known to be among the most complex enzymes of the aaRS (Aminoacyl-tRNA synthetase) family. Bacterial and mitochondrial PheRSs share a ferredoxin-fold anticodon binding (FDX-ACB) domain, which represents a canonical double split alpha+beta motif having no insertions. The FDX-ACB domain displays a typical RNA recognition fold (RRM) formed by the four-stranded antiparallel beta sheet, with two helices packed against it.
Structural studies
As of late 2007, 10 structures have been solved for this class of enzymes, with PDB accession codes , , , , , , , , , and . |
https://en.wikipedia.org/wiki/Phosphoribosylaminoimidazolesuccinocarboxamide%20synthase | In molecular biology, the protein domain SAICAR synthase is an enzyme which catalyses a reaction to create SAICAR. In enzymology, this enzyme is also known as phosphoribosylaminoimidazolesuccinocarboxamide synthase (). It is an enzyme that catalyzes the chemical reaction
ATP + 5-amino-1-(5-phospho-D-ribosyl)imidazole-4-carboxylate + L-aspartate ADP + phosphate + (S)-2-[5-amino-1-(5-phospho-D-ribosyl)imidazole-4-carboxamido]succinate
The 3 substrates of this enzyme are ATP, 5-amino-1-(5-phospho-D-ribosyl)imidazole-4-carboxylate, and L-aspartate, whereas its 3 products are ADP, phosphate, and (S)-2-[5-amino-1-(5-phospho-D-ribosyl)imidazole-4-carboxamido]succinate.
This enzyme belongs to the family of ligases, to be specific those forming carbon-nitrogen bonds as acid-D-amino-acid ligases (peptide synthases). The systematic name of this enzyme class is 5-amino-1-(5-phospho-D-ribosyl)imidazole-4-carboxylate:L-aspartate ligase (ADP-forming). This enzyme participates in purine metabolism.
This particular protein family is of huge importance as it is found in all three domains of life. It is the seventh step in the pathway of purine biosynthesis. Purines are vital to all cells as they are involved in energy metabolism and DNA synthesis. Furthermore, they are of specific interest to scientific researchers as the study of the purine biosynthesis pathway could lead to the development of chemotherapeutic drugs. This is because most cancers lack a salvage pathway for adenine nucleotides and rely entirely on the SAICAR pathway.
Protein domain
This protein domain is found in eukaryotes, bacteria and archaea. It is vital for living organisms since it catalyses a step in the purine biosynthesis pathway which aids energy metabolism and DNA synthesis.
Protein domain function
In bacteria and plants this protein domain only catalyses the synthesis of SAICAR. However, in mammals it also catalyses phosphoribosylaminoimidazole carboxylase (AIRC) activity.
Protein domain struct |
https://en.wikipedia.org/wiki/European%20Business%20Register%20Network | The European Business Register Network (EBR Network) is a network of trade registers kept by the registration authorities of several European countries, managed by the European Business Registry Association. The EBR was developed as a part of the fully integrated approach of the European Commission in the legislation designed to achieve regulations to promote transparent financial markets and to facilitate free movement of companies. The EBR has served as a starting point of the Business Register Interoperability Throughout Europe (BRITE) project which developed an interoperability solution BRIS for Business Registers to interact across the European Union. BRIS makes it possible to obtain comparable, official company information from the countries connected to the network.
The EBR is at the moment composed of 26 partners and delivers company information from 25 European countries.
Amongst others the European Business registers contains remarks about:
legal name of a company
Registered office
people representing the company (Managing Director, Board of Directors, holders of Proxy)
subscribed capital if any.
Many scams circulate offering inclusion in the European Business register against payment of a hidden fee, these do not refer to the official register though; inclusion in the European Business Register is free of charge and mostly automatically done by registering a company within one of the partnering countries.
See also
List of company registers
OpenCorporates |
https://en.wikipedia.org/wiki/Soft%20Magnetic%20Materials%20Conference | The Soft Magnetic Materials Conference, commonly referred to as SMM, is an international conference devoted to all kinds of soft magnetic materials with the emphasis on industrial and applications aspects.
Format and purpose
The SMM is held for three days, every two years, often at the beginning of September in a European country. Each time the SMM has a different logo.
In SMM18 (organised by Wolfson Centre for Magnetics there were 260 participants from over 30 countries. There were 306 scientific papers presented, out of which around 200 are peer reviewed and will be published in Journal of Magnetism and Magnetic Materials, Elsevier at the beginning of 2008.
In the past the SMM proceedings have also been published in IEEE Transactions on Magnetics
or other peer reviewed journals.
The SMM is the largest international conference devoted to soft magnetic materials. It has active participation of the academic world as well as of industry, with a high scientific level of contributed and invited communications.
The main aim of the SMM is to bring together engineers and scientists from universities, research institutions and industry who are active in research, development and industrial applications of the materials. The programme of the conference includes invited lectures by academic and industrial experts, oral presentations and poster sessions for regular contributions.
Scope
Typical topics of the SMM are:
Basic magnetisation processes including domain studies and Barkhausen noise
Magnetisation characterisation and measurement techniques
Losses, magnetostriction and B-H properties
Non-oriented and grain-oriented electrical steels
Novel and special magnetic materials
Fe-Ni, Fe-Co, amorphous and nanocrystalline alloys
Composites, powder cores and ferrites
Power applications (e.g. motors, transformers and actuators)
Sensors, high frequency and electronic applications
Modelling, simulation or prediction of material and device performance
Design of ele |
https://en.wikipedia.org/wiki/Molecular%20descriptor | Molecular descriptors play a fundamental role in chemistry, pharmaceutical sciences, environmental protection policy, and health researches, as well as in quality control, being the way molecules, thought of as real bodies, are transformed into numbers, allowing some mathematical treatment of the chemical information contained in the molecule. This was defined by Todeschini and Consonni as:
"The molecular descriptor is the final result of a logic and mathematical procedure which transforms chemical information encoded within a symbolic representation of a molecule into a useful number or the result of some standardized experiment."
By this definition, the molecular descriptors are divided into two main categories: experimental measurements, such as log P, molar refractivity, dipole moment, polarizability, and, in general, additive physico-chemical properties, and theoretical molecular descriptors, which are derived from a symbolic representation of the molecule and can be further classified according to the different types of molecular representation.
The main classes of theoretical molecular descriptors are: 1) 0D-descriptors (i.e. constitutional descriptors, count descriptors), 2) 1D-descriptors (i.e. list of structural fragments, fingerprints),3) 2D-descriptors (i.e. graph invariants),4) 3D-descriptors (such as, for example, 3D-MoRSE descriptors, WHIM descriptors, GETAWAY descriptors, quantum-chemical descriptors, size, steric, surface and volume descriptors),5) 4D-descriptors (such as those derived from GRID or CoMFA methods, Volsurf).
Invariance properties of molecular descriptors
The invariance properties of molecular descriptors can be defined as the ability of the algorithm for their calculation to give a descriptor value that is independent of the particular characteristics of the molecular representation, such as atom numbering or labeling, spatial reference frame, molecular conformations, etc. Invariance to molecular numbering or labeling is assumed |
https://en.wikipedia.org/wiki/Virtual%20actor | A virtual human, virtual persona, or digital clone is the creation or re-creation of a human being in image and voice using computer-generated imagery and sound, that is often indistinguishable from the real actor.
The idea of a virtual actor was first portrayed in the 1981 film Looker, wherein models had their bodies scanned digitally to create 3D computer generated images of the models, and then animating said images for use in TV commercials. Two 1992 books used this concept: Fools by Pat Cadigan, and Et Tu, Babe by Mark Leyner.
In general, virtual humans employed in movies are known as synthespians, virtual actors, vactors, cyberstars, or "silicentric" actors. There are several legal ramifications for the digital cloning of human actors, relating to copyright and personality rights. People who have already been digitally cloned as simulations include Bill Clinton, Marilyn Monroe, Fred Astaire, Ed Sullivan, Elvis Presley, Bruce Lee, Audrey Hepburn, Anna Marie Goddard, and George Burns.
By 2002, Arnold Schwarzenegger, Jim Carrey, Kate Mulgrew, Michelle Pfeiffer, Denzel Washington, Gillian Anderson, and David Duchovny had all had their heads laser scanned to create digital computer models thereof.
Early history
Early computer-generated animated faces include the 1985 film Tony de Peltrie and the music video for Mick Jagger's song "Hard Woman" (from She's the Boss). The first actual human beings to be digitally duplicated were Marilyn Monroe and Humphrey Bogart in a March 1987 film "Rendez-vous in Montreal" created by Nadia Magnenat Thalmann and Daniel Thalmann for the 100th anniversary of the Engineering Institute of Canada. The film was created by six people over a year, and had Monroe and Bogart meeting in a café in Montreal, Quebec, Canada. The characters were rendered in three dimensions, and were capable of speaking, showing emotion, and shaking hands.
In 1987, the Kleiser-Walczak Construction Company (now Synthespian Studios), founded by Jeff Kleiser |
https://en.wikipedia.org/wiki/Sodium%20alum | Sodium aluminium sulfate is the inorganic compound with the chemical formula NaAl(SO4)2·12H2O (sometimes written Na2SO4·Al2(SO4)3·24H2O). Also known as soda alum, sodium alum, or SAS, this white solid is used in the manufacture of baking powder and as a food additive. Its official mineral name is alum-Na (IMA symbol: Aum-Na).
Properties
Like its potassium analog, sodium aluminum sulfate crystallizes as the dodecahydrate in the classical cubic alum structure.
Sodium alum is very soluble in water, and is extremely difficult to purify. In the preparation of this salt, it is preferable to mix the component solutions in the cold, and to evaporate them at a temperature not exceeding 60 °C. 100 parts of water dissolve 110 parts of sodium alum at 0 °C, and 51 parts at 16 °C.
Production and natural occurrence
Sodium aluminum sulfate is produced by combining sodium sulfate and aluminium sulfate. An estimated 3000 ton/y (2003) are produced worldwide.
The dodecahydrate is known in mineralogy as alum-(Na). Two other rare mineral forms are known: mendozite (undecahydrate) and tamarugite (hexahydrate).
Uses
In the US, some brands combine sodium aluminum sulfate with sodium bicarbonate and monocalcium phosphate in formulations of double acting baking powder. Kawahara et al. 1994 noted that aluminum is “a suspected risk factor in Alzheimer's disease” and that “aluminum directly influences the process of Alzheimer′s disease”.
Sodium alum is also used as an acidity regulator in food, with E number E521.
Sodium alum is also a common mordant for the preparation of hematoxylin solutions for staining cell nuclei in histopathology.
It is also used as a flocculant in water treatment and disinfection, but its relatively crude, caustic action makes it more suitable for industrial applications. |
https://en.wikipedia.org/wiki/Myotonin-protein%20kinase | Myotonin-protein kinase (MT-PK) also known as myotonic dystrophy protein kinase (MDPK) or dystrophia myotonica protein kinase (DMPK) is an enzyme that in humans is encoded by the DMPK gene.
The dmpk gene product is a Ser/Thr protein kinase homologous to the MRCK p21-activated kinases and Rho kinase family. Data obtained by using antibodies that detect specific isoforms of DMPK indicate that the most abundant isoform of DMPK is an 80-kDa protein expressed almost exclusively in smooth, skeletal, and cardiac muscles. This kinase exists both as a membrane-associated and as a soluble form in human left ventricular samples. The different C termini of DMPK that arise from alternative splicing determine its localization to the endoplasmic reticulum, mitochondria, or cytosol in transfected COS-1 cells. Among the substrates for DMPK proposed by in vitro studies are phospholemman, the dihydropyridine receptor, and the myosin phosphatase targeting subunit. However, an in vivo demonstration of the phosphorylation of these substrates by DMPK remains to be established, and a link between these substrates and the clinical manifestations of myotonic dystrophy (DM) is unclear.
Function
Myotonin-protein kinase is a serine-threonine kinase that is closely related to other kinases that interact with members of the Rho family of small GTPases. Substrates for this enzyme include myogenin, the beta-subunit of the L-type calcium channels, and phospholemman. Although the specific function of this protein is unknown, it appears to play an important role in muscle, heart, and brain cells. This protein may be involved in communication within cells. It also appears to regulate the production and function of important structures inside muscle cells by interacting with other proteins. For example, myotonic dystrophy protein kinase has been shown to turn off (inhibit) part of a muscle protein called myosin phosphatase. Myosin phosphatase is an enzyme that plays a role in muscle tensing (contrac |
https://en.wikipedia.org/wiki/Nonhypotenuse%20number | In mathematics, a nonhypotenuse number is a natural number whose square cannot be written as the sum of two nonzero squares. The name stems from the fact that an edge of length equal to a nonhypotenuse number cannot form the hypotenuse of a right angle triangle with integer sides.
The numbers 1, 2, 3 and 4 are all nonhypotenuse numbers. The number 5, however, is not a nonhypotenuse number as 52 equals 32 + 42.
The first fifty nonhypotenuse numbers are:
1, 2, 3, 4, 6, 7, 8, 9, 11, 12, 14, 16, 18, 19, 21, 22, 23, 24, 27, 28, 31, 32, 33, 36, 38, 42, 43, 44, 46, 47, 48, 49, 54, 56, 57, 59, 62, 63, 64, 66, 67, 69, 71, 72, 76, 77, 79, 81, 83, 84
Although nonhypotenuse numbers are common among small integers, they become more-and-more sparse for larger numbers. Yet, there are infinitely many nonhypotenuse numbers, and the number of nonhypotenuse numbers not exceeding a value x scales asymptotically with x/.
The nonhypotenuse numbers are those numbers that have no prime factors of the form 4k+1. Equivalently, they are the number that cannot be expressed in the form where K, m, and n are all positive integers. A number whose prime factors are not of the form 4k+1 cannot be the hypotenuse of a primitive integer right triangle (one for which the sides do not have a nontrivial common divisor), but may still be the hypotenuse of a non-primitive triangle.
The nonhypotenuse numbers have been applied to prove the existence of addition chains that compute the first square numbers using only additions.
See also
Pythagorean theorem
Landau-Ramanujan constant
Fermat's theorem on sums of two squares |
https://en.wikipedia.org/wiki/Major%20histocompatibility%20complex%2C%20class%20II%2C%20DQ%20alpha%201 | Major histocompatibility complex, class II, DQ alpha 1, also known as HLA-DQA1, is a human gene present on short arm of chromosome 6 (6p21.3) and also denotes the genetic locus which contains this gene. The protein encoded by this gene is one of two proteins that are required to form the DQ heterodimer, a cell surface receptor essential to the function of the immune system.
Function
HLA-DQA1 belongs to the HLA class II alpha chain paralogues. This class II molecule is a heterodimer consisting of an alpha (DQA) and a beta chain (DQB), both anchored in the membrane. It plays a central role in the immune system by presenting peptides derived from extracellular proteins. Class II molecules are expressed in antigen-presenting cells (APC: B lymphocytes, dendritic cells, macrophages).
Gene structure and polymorphisms
The alpha chain contains 5 exons. Exon one encodes the leader peptide, exons 2 and 3 encode the two extracellular protein domains, exon 4 encodes the transmembrane domain and the cytoplasmic tail. Within the DQ molecule both the alpha chain and the beta chain contain the polymorphisms specifying the peptide binding specificities, resulting in up to 4 different molecules. Typing for these polymorphisms is routinely done for bone marrow transplantation.
Alleles
DQ1
There are four commonly encountered DQA1 alleles: DQA1*0101, *0102, *0103, *0104. These alleles are always found in haplotypes with HLA-DQB1*05 (DQ5) and HLA-DQB1*06 (DQ6). DQ1 is a serotype, rare among serotypes for human class II antigens, in that the antibodies to DQ1 react to the alpha chain of HLA DQ, these DQA1 allele gene products.
Other
The other DQA1 alleles have no defined serotype. There are 5 groups, DQA1*02, *03, *04, *05, *06. DQA1 within these groups are either invariant or produce the same α-chain subunit. DQA1*02 and DQA1*06 contain only one allele. DQA1*03 has three alleles which each produce nearly identical α3. For DQA1*05, the DQA1*0501 and DQA1*0505 produce identical α5. |
https://en.wikipedia.org/wiki/NCK1 | Cytoplasmic protein NCK1 is a protein that in humans is encoded by the NCK1 gene.
Gene
The Nck (non-catalytic region of tyrosine kinase adaptor protein 1) belongs to the adaptor family of proteins. The nck gene was initially isolated from a human melanoma cDNA library using a monoclonal antibody produced against the human melanoma-associated antigen. The Nck family has two known members in human cells (Nck-1/Nckalpha and NcK2/NcKbeta), two in mouse cells (mNckalpha and mNckbeta/Grb4) and one in drosophila (Dock means dreadlocks-ortholog).
The two murine gene products exhibit 68% amino acid identity to one another, with most of the sequence variation being located to the linker regions between the SH3 and SH2 domains, and are 96% identical to their human counterparts. While human nck-1 gene has been localised to the 3q21 locus of chromosome 3, the nck-2 gene can be found on chromosome 2 at the 2q12 locus.
Function
The protein encoded by this gene is one of the signaling and transforming proteins containing Src homology 2 and 3 (SH2 and SH3) domains. It is located in the cytoplasm and is an adaptor protein involved in transducing signals from receptor tyrosine kinases to downstream signal recipients such as RAS.
Nck1 has been linked to glucose tolerance and insulin signaling within certain tissues, namely the liver, in obese mice. A deletion of the protein also causes a decrease of ER stress signaling within these obese cells, which is normally increased by the excessive fat. This stress causes expression of the unfolded protein response pathway, which leads to a decrease in glucose tolerance and inactivation of insulin signaling in certain cell types. This renewed glucose tolerance and insulin signaling is caused by the inhibition of the unfolded protein response pathway, particularly the protein IRE1alpha, and its subsequent phosphorylation of IRS-1 that causes insulin signaling to be blocked. IRE1alpha is involved with the JNK pathway that is responsibl |
https://en.wikipedia.org/wiki/NetWare%20Link%20Services%20Protocol | NetWare Link Services Protocol (NLSP) is a routing protocol for Internetwork Packet Exchange based on the Intermediate-System-to-Intermediate-System (IS-IS) protocol developed by the International Organization for Standardization (ISO). NLSP enables NetWare servers to exchange routing and service information without the high broadcast overhead generated by Routing Information Protocol and Service Advertising Protocol. Instead of periodically retransmitting its information every few minutes like RIP and SAP, NLSP only transmits every two hours, or when there is a change in a route or service, making it much more suitable for use over a wide area network.
See also
IS-IS
Routing Information Protocol
Service Advertising Protocol
NetWare |
https://en.wikipedia.org/wiki/NCSim | Incisive is a suite of tools from Cadence Design Systems related to the design and verification of ASICs, SoCs, and FPGAs. Incisive is commonly referred to by the name NCSim in reference to the core simulation engine. In the late 1990s, the tool suite was known as ldv (logic design and verification).
Depending on the design requirements, Incisive has many different bundling options of the following tools:
See also
List of HDL simulators
Electronic design automation software
Logic design |
https://en.wikipedia.org/wiki/Reminiscence%20therapy | Reminiscence therapy is used to counsel and support older people, and is an intervention technique with brain-injured patients and those who appear to have "Alzheimer's and other forms of cognitive disease."
A 2018 AARP article about a standalone demonstration project named Glenner Town Square focused on those who seem to have Alzheimer's or some (other) form of dementia. Glenner's goal is described as "capture the years between 1953 and 1961 so that project participants are calmly back in a time period to recollect ages 10 to 30, when "our strongest memories are formed."
Reminiscence therapy is defined by the American Psychological Association (APA) as "the use of life histories – written, oral, or both – to improve psychological well-being. The therapy is often used with older people." This form of therapeutic intervention respects the life and experiences of the individual with the aim to help the patient maintain good mental health.
The majority of research on reminiscence therapy has been done with the elderly community, especially those suffering from depression, although a few studies have looked at other elderly samples.
Research and implementation has been tried in several areas with diverse cultures
such as Japan, United Kingdom, USA.
Reminiscence
Reminiscence has been described as “the volitional or non-volitional act or process of recollecting memories of oneself in the past”. In other words, it involves the recalling and re-experiencing of one's life events. This involves having an intact autobiographical memory in order to be able to recall certain life events.The meaningfulness of the reminiscence process depends on how meaningful the memories being recalled are. Different ways to make these memories more meaningful are to ask questions which suggest the importance of the event as well as using historical materials from ones past.
Reminiscence serves different psychological functions, including the taxonomy presented by Webster. Webster's Re |
https://en.wikipedia.org/wiki/Magnetofossil | Magnetofossils are the fossil remains of magnetic particles produced by magnetotactic bacteria (magnetobacteria) and preserved in the geologic record. The oldest definitive magnetofossils formed of the mineral magnetite come from the Cretaceous chalk beds of southern England, while magnetofossil reports, not considered to be robust, extend on Earth to the 1.9-billion-year-old Gunflint Chert; they may include the four-billion-year-old Martian meteorite ALH84001.
Magnetotactic organisms are prokaryotic, with only one example of giant-magnetofossils, likely produced by eukaryotic organisms, having been reported. Magnetotactic bacteria, the source of the magnetofossils, are magnetite (Fe3O4) or greigite (Fe3S4) producing bacteria found in both freshwater and marine environments. These magnetite bearing magnetotatic bacteria are found in the oxic-anoxic transition zone where conditions are such that oxygen levels are less than those found in the atmosphere (microaerophilic). Compared to the magnetite producing magnetotactic bacteria and subsequent magnetofossils, little is known about the environments in which greigite magnetofossils are created and the magnetic properties of the preserved greigite particles.
Existence of magnetotactic bacteria was first suggested in the 1960s, when Salvatore Bellini of the University of Pavia discovered bacteria in a bog that appeared to align themselves with the magnetic field lines of the Earth. Following this discovery researchers began to think of the effect of magnetotactic bacteria on the fossil record and magnetization of sedimentary layers.
Most of the research concentrated on marine environments, although it has been suggested that these magnetofossils can be found in terrestrial sediments (derived from terrestrial sources). These magnetofossils can be found throughout the sedimentary record, and therefore are influenced by deposition rate. Episodes of high sedimentation, not correlating with an increase in magnetobacteri |
https://en.wikipedia.org/wiki/Chrysanthemum%20bonsai | Chrysanthemum bonsai (, ) is a Japanese art form using cultivation techniques to produce, in containers, chrysanthemum flowers that mimic the shape and scale of full size trees, called bonsai.
Cultivation and care
Bonsai cultivation and care requires techniques and tools that are specialized to support the growth and maintenance of the flowers in small containers. There are several cultivated varieties of chrysanthemum that possess the ability to be trained into many of the traditional bonsai styles associated with woody trunked trees and shrubs. But since chrysanthemum rarely grow to be old enough to have wood, deadwood bonsai techniques may also be used.
Chrysanthemums are perennials, and while it is possible to keep a chrysanthemum bonsai alive for a number of years (old wood), it is more likely that the bonsai will be 'finished' after all the blooms have faded.
The chrysanthemum bonsai artist must complete all design work in fewer than ten months. Most chrysanthemum bonsai artists in the northern latitudes of the United States start the training of their bonsai in April, and are finished by the middle of September.
Traditionally in Japan the Chrysanthemum exhibitions showcase the different bonsai forms. This takes place in autumn around the months of October and November.
Styles
Various bonsai styles exist, such as the cascade style, the clinging to a rock style, and the forest style.
See also
List of species used in bonsai |
https://en.wikipedia.org/wiki/International%20Workshop%20on%201%20%26%202%20Dimensional%20Magnetic%20Measurement%20and%20Testing | International Workshop on 1 & 2 Dimensional Magnetic Measurement and Testing (commonly referred to as 1&2DM or even 2DM) - international meeting devoted to problems in one- and two-directional magnetisation of ferromagnetic materials.
Link to the next workshop
Scope
Basic problems, magnetisation processes, domain structures, Barkhausen noise
Aspects of industrial testing and standardisation
Power loss, polarisation, magnetostriction and anisotropy measurement
Magnetisation systems and sensors for 1 and 2D measurements
High frequency related aspects
B and H vector relationships and their interpretation
Relevance to applications (e.g., electrical machines, transformers, etc.).
Modelling of magnetic properties of materials, relevance of microstructures
From the 8th 1&2DM the technical papers written in English are published in Przegląd Elektrotechniczny (which in Polish means Electric Review) issued in Warsaw, Poland.
Przegląd Elektrotechniczny is one of the oldest European periodicals (since 1919), which is still being in print. From the 12th edition full conference papers have been published on the International Journal of Applied Electromagnetics and Mechanics-IJAEM, (IOS Press, Amsterdam, the Netherlands).
International Steering Committee
Prof Carlo Ragusa (chair), Italy
Dr Johannes Sievert (past Chair), Germany
Dr Phil Anderson, United Kingdom
Dr Carlo Appino, Italy
Prof Luc Dupré, Belgium.
Prof Masato Enokizono, Japan
Dr Fausto Fiorillo, Italy
Dr Nicolas Galopin, France
Dr Jeremy Hall, United Kingdom
Prof Yongjian Li, China
Prof Anthony J. Moses, United Kingdom
Prof Helmut Pfützner, Austria
Mr Stefan Siebert, Germany
Prof Marian Soiński, Poland
Prof Derac Son, Korea
Mr Kiyoshi Wajima, Japan
Dr Xing Zhou, China
Prof Jian Guo Zhu, Australia
1&2DM Workshops
1&2DM is usually held in September. The years are chosen as to alternate with the Soft Magnetic Materials Conference:
17th - Lüdenscheid, Germany - 2024
16th - Cardiff, United Ki |
https://en.wikipedia.org/wiki/Virginia%20Coast%20Reserve%20Long-Term%20Ecological%20Research | The Virginia Coast Reserve Long-Term Ecological Research (VCR/LTER) project is funded by the National Science Foundation. The VCR/LTER project's research activities focus on the mosaic of transitions and steady-state systems that comprise the barrier-island/lagoon/mainland landscape of the Eastern Shore of Virginia. Research is conducted in mainland marshes, the lagoon system behind the barrier islands, and on the islands themselves, particularly Hog Island. The VCR/LTER began operation in 1987. It initially focused on geophysical controls (e.g., storms) on coastal ecosystems. In 1992-1994 it broadened that focus to address the concept of ecological state change, which was linked in 1994-2000 to relationships between free surfaces (land, sea, freshwater table). More recent work (2000-2006), added a hypsometric perspective, which provides an alternate way of examining ecological patterns on the coastal landscape. It makes extensive use of the Virginia Coast Reserve of The Nature Conservancy.
The VCR/LTER is a member of the Long Term Ecological Research Network, and is administered by the Department of Environmental Sciences of the University of Virginia. Its field research headquarters is at the Anheuser-Busch Coastal Research Center of the University of Virginia in Oyster, Virginia. The research site received new funding from the National Science Foundation in 2018 which will allow the research team of Karen McGlathery, Michael Pace, Patricia Wiberg, John Porter, and to continue research projects into the impact of climate change on coastal barrier oceans. |
https://en.wikipedia.org/wiki/Anheuser%E2%80%93Busch%20Coastal%20Research%20Center | The Anheuser–Busch Coastal Research Center is a biological field station located in Oyster, Virginia that is operated by the University of Virginia. It is a member of the Organization of Biological Field Stations (OBFS). It serves as the research home for the Virginia Coast Reserve Long-Term Ecological Research Program. A new $2.5 million laboratory and housing facility was dedicated in on August 26, 2006.
The Center is located within the Virginia Coast Reserve, a biosphere reserve operated by the Nature Conservancy. |
https://en.wikipedia.org/wiki/Alexis%20Lemaire | Alexis Lemaire (born 1980) is a mental calculation world record holder. He holds a Ph.D. in Computer Science related to artificial intelligence from the University of Reims. He is also the owner of world records for mentally calculating the 13th root of 100-digit numbers and 200-digit numbers.
On 10 May 2002, he calculated the 13th root of a 100-digit number in 13.55 seconds, beating the record held by Willem Klein (88.8 seconds) and the somewhat less official record of Gert Mittring (39 seconds). On 23 November 2004, Mittring tried to beat Lemaire's record, but his time of 11.8 seconds was not counted as official, as one organization's rules had decided to stop recognizing records for root extraction of random numbers due to the difficulty of standardizing the challenge. Less than a month later (17 December 2004) Lemaire beat his own record, with a time of 3.625 seconds— this included the time it took him to read the number, calculate its root, and recount the answer. He found the 13th root of the 100-digit number which is 45,792,573.
Following this achievement, Lemaire gave up trying to improve his performance at calculating roots of 100-digit numbers, and moved on to 200-digit numbers with many attempts as described on the rules page (see 13th root ). Like an athlete, he trains his brain daily for this task. On 6 April 2005, he calculated the 13th root of a 200-digit number in 8 minutes 33 seconds.
By 30 July 2007, Alexis got his time down to 77.99 seconds at the Museum of the History of Science, Oxford and by 15 November his time was further decreased to 72.4 seconds.
His latest achievement came on 10 December 2007, where he mentally extracted the 13th root of a random 200-digit number in 70.2 seconds.
The so-called 'mathlete' produced the answer of 2,407,899,883,032,220 at London's Science Museum.
A computer was used to produce the random 200-digit number, from which he tried to extract the 13th root. The museum's curator of mathematics, Jane Wess, said, "H |
https://en.wikipedia.org/wiki/Ignatievka%20Cave | Ignatievka Cave (Ignateva cave, Ignatievskaya cave, , also known as Yamazy-Tash) is a large limestone cave on the banks of the Sim River, a tributary of the Belaya river in the southern Ural Mountains of Russia. In 1980 a parietal wall painting of a female figure was discovered. The twenty-eight red dots between her legs are believed to represent the female menstrual cycle.
The cave also contains microliths, remains of animals and more cave paintings, as well as a stratum of Iron Age settlement. Although some sources associate the paintings to the Upper Paleolithic, the age of the drawings continues to be debated. The radiocarbon dating of the charcoal drawings has resulted in more recent numbers, between 6,000 and 8,000 years ago. The attempt to date the red pigment of the female figure yielded no result. In this respect, the age of the drawings remains unclear so far.
Ignateva Cave can be freely visited although it is best to travel via the small village of , which is off the main road past Sim, Chelyabinsk Oblast, heading eastwards, about . The track to the cave is very rough and has not been improved for years. The cave mouth is about above the small river backwater and reached by a metal ladder. On entering the cave visitors must stoop low as the ceiling lowers quickly to about in height, and then it increases again to or more. Part of the inner cave can only be reached by crawling through a very narrow space about in height but this provides views of some of the better red ochre markings. The local guide from Serpiyevka noted that the cave was not lived in (there were no fire markings), but hypothesized that it was a sacred site mainly used for religious ceremonies and adulthood rites from the markings.
The Kapova cave is located some from the Ignatievka cave. |
https://en.wikipedia.org/wiki/Business%20continuance%20volume | In disk arrays, a business continuance volume (BCV) is EMC Corporation's term for an independently addressable copy of a data volume, that uses advanced mirroring technique for business continuity purposes.
Use
BCVs can be detached from the active data storage at a point in time and mounted on non-critical servers to facilitate offline backup or parallel computing. Once offline processes are completed, these BCVs can be either:
discarded
re-attached (re-synchronized) to the production data again
used as a source to recover the production data
Types
There are two types of BCVs:
A clone BCV is a traditional method, and uses one-to-one separate physical storage (splitable disk mirror)
least impact on production performance
high cost of the additional storage
persistent usage
A snapshot BCV, that uses copy on write algorithm on the production volume
uses only a small additional storage, that only holds the changes made to the production volume
lower cost of the additional storage
reads and writes impact performance of production storage
once snapshot storage fills up, the snapshot becomes invalid and unusable
short-term usage |
https://en.wikipedia.org/wiki/IP-XACT | IP-XACT, also known as IEEE 1685, is an XML format that defines and describes individual, re-usable electronic circuit designs (individual pieces of intellectual property, or IPs) to facilitate their use in creating integrated circuits (i.e. microchips). IP-XACT was created by the SPIRIT Consortium as a standard to enable automated configuration and integration through tools and evolving into an IEEE standard.
The goals of the standard are
to ensure delivery of compatible component descriptions, such as IPs, from multiple component vendors,
to enable exchanging complex component libraries between electronic design automation (EDA) tools for SoC design (design environments),
to describe configurable components using metadata, and
to enable the provision of EDA vendor-neutral scripts for component creation and configuration (generators, configurators).
Approved as IEEE 1685-2009 on December 9, 2009, published on February 18, 2010.
Superseded by IEEE 1685-2014. IEEE 1685-2009 was adopted as IEC 62014-4:2015. In June 2023, the supplemental material for standard IEEE 1685-2022 IP-XACT was approved by Accellera.
Overview
Conformance checks for eXtensible Markup Language (XML) data designed to describe electronic systems are formulated by this standard. The meta-data forms that are standardized include components, systems, bus interfaces and connections, abstractions of those buses, and details of the components including address maps, register and field descriptions, and file set descriptions for use in automating design, verification, documentation, and use flows for electronic systems. A set of XML schemas of the form described by the World Wide Web Consortium (W3C(R)) and a set of semantic consistency rules (SCRs) are included. A generator interface that is portable across tool environments is provided. The specified combination of methodology-independent meta-data and the tool-independent mechanism for accessing that data provides for portability of design d |
https://en.wikipedia.org/wiki/Rotating%20wheel%20space%20station | A rotating wheel space station, also known as a von Braun wheel, is a concept for a hypothetical wheel-shaped space station. Originally proposed by Konstantin Tsiolkovsky in 1903, the idea was expanded by Herman Potočnik in 1929.
Specifications
This type of station rotates about its axis, creating an environment of artificial gravity. Occupants of the station would experience centrifugal acceleration, according to the following equation:
where is the angular velocity of the station, is its radius, and is linear acceleration at any point along its perimeter.
In theory, the station could be configured to simulate the gravitational acceleration of Earth (9.81 m/s2), allowing for human long stays in space without the drawbacks of microgravity.
History
Both scientists and science fiction writers have thought about the concept of a rotating wheel space station since the beginning of the 20th century. Konstantin Tsiolkovsky wrote about using rotation to create an artificial gravity in space in 1903. Herman Potočnik introduced a spinning wheel station with a 30-meter diameter in his Problem der Befahrung des Weltraums (The Problem of Space Travel). He even suggested it be placed in a geostationary orbit.
In the 1950s, Wernher von Braun and Willy Ley, writing in Colliers Magazine, updated the idea, in part as a way to stage spacecraft headed for Mars. They envisioned a rotating wheel with a diameter of 76 meters (250 feet). The 3-deck wheel would revolve at 3 RPM to provide artificial one-third gravity. It was envisaged as having a crew of 80.
In 1959, a NASA committee opined that such a space station was the next logical step after the Mercury program. The Stanford torus, proposed by NASA in 1975, is an enormous version of the same concept, that could harbor an entire city.
NASA has never attempted to build a rotating wheel space station, for several reasons. First, such a station would be very difficult to construct, given the limited lifting capability avail |
https://en.wikipedia.org/wiki/Deep%20dorsal%20vein%20of%20clitoris | The deep dorsal vein of clitoris is a vein which drains to the vesical plexus. |
https://en.wikipedia.org/wiki/Robert%20N.%20Klein%20II | Robert Nicholas "Bob" Klein II is a stem cell advocate. He initiated California Proposition 71, which succeeded in establishing the California Institute for Regenerative Medicine, of which Klein was the chairman of the governing board.
Before getting involved in stem cell advocacy, he was a housing developer and lawyer. He lives in Portola Valley, California and works in Palo Alto, where he used to live.
Stem cell advocacy
He was a chief author of Proposition 71 and was the chair of the Yes on 71 campaign. He donated $3 million to the cause, the largest donation, and ran the campaign from the Klein Financial Corporation.
After the election, Proposition 71 became Article XXXV of the California Constitution and the Yes on 71 campaign became the California Research and Cures Coalition, a stem cell advocacy organization. Klein was the head of that organization until he took the position at the California Institute for Regenerative Medicine, the organization created by the ballot initiative. In 2005, he was named as one of TIME Magazine's 100 Most Influential People; and, that same year Scientific American named Klein one of “The Scientific American 50” as a leader shaping the future of science. Klein was honored at the 2010 BIO International Convention as the second annual Biotech Humanitarian. Also, in 2010, Klein received the 2010 Research!America Gordon and Llura Gund Leadership Award for his advocacy of stem cell and diabetes research.
In 2020, the original funding for the Institute for Regenerative Medicine had run out, so Klein spearheaded another initiative to fund it, known as Proposition 14.
Early career
Klein has a Bachelor of Arts in History with Honors from Stanford University and a Juris Doctor from Stanford University Law School, 1970. Additional education includes: Executive Summer Finance Program at Stanford University Business School and an internship with the United Nations Economic and Social Council in Switzerland on Economic Development Pol |
https://en.wikipedia.org/wiki/Mesaxon | In neurobiology, a mesaxon is a pair of parallel plasma membranes of a Schwann cell. It marks the point of edge-to-edge contact by the Schwann cell encircling the axon. A single Schwann cell of the peripheral nervous system will wrap around and support only one individual axon (then myelinated; ratio of 1:1), while the oligodendrocytes found in the central nervous system can wrap around and support 5-8 axons. Thin unmyelinated axons are often bundled, with several unmyelinated axons to a single mesaxon (and several such groups to a single Schwann cell).
The outer mesaxon (Terminologia histologica: Mesaxon externum) is the connection of the outer cell membrane to the compact myelin sheath. The inner mesaxon (Terminologia histologica: Mesaxon internum) is the connection between the myelin sheath and the inner part of the cell membrane of the Schwann cell, which is directly opposite the axolemma, i.e. the cell membrane of the nerve fibre ensheathed by the Schwann cell. |
https://en.wikipedia.org/wiki/SCAA%20Family | SCAA Family is a group of mascots for the Hong Kong First Division League football team South China ("SCAA"). They were officially created and released to the public on 20 September 2007. There are in total 10 members, of which 8 are named. Ballman and Greenman are the main characters.
Characters
Ballman
Name in Chinese: 波南
D.O.B.: 1 November
Jersey Number: 10 (Home Jersey)
Favourite food: Banana
Ballman's head is a burning football whose hair is on fire. He represents the fans' unstoppable love on football and the joy from watching football matches. He also symbolizes the SCAA players' attitude on the field and the spirit of fighting until the end.
Ballman has many real-life interactions with SCAA Fans. He has his own online blog, which was opened on 11 October 2007.
TVB artist Wong Cho Lam dubs the voice for Ballman in Ballman Blog's videos.
Greenman
Name in Chinese: 草南
D.O.B.: 11 January
Jersey Number: 9 (Away Jersey)
Favourite food: Juice
Greenman is a good friend of Ballman and they are buddies in football field. Greenball was born from the grass and he is fresh, pure, young, energetic and full of vitality. He symbolizes the youth players of SCAA, who are full of energy and aim at becoming the next football stars of the future.
Greenman's debut show-up was during the "Ballman & Greenman Show-up Party" held in Times Square on 26 November 2007.
Greenman made his voice debut in Ballman Blog's video on 31 December 2007, featuring in the New Year song of Ballman. However, the voice might only be made by Wong Cho Lam, the voice maker of Ballman.
Whistle Sir
Name in Chinese: 哨子sir
Whistle Sir is a just and fair referee. He loves running.
Yellow & Red Card Brothers
Name in Chinese: 紅黃牌兄弟
Yellow & Red Card Brothers a followers of Whistle Sir and they never reject Whistle Sir's decisions.
Mr. Scoreboard
Name in Chinese: 顯示牌先生
Mr. Scoreboard is very sensitive to numbers and he is good at resources allocation.
Dr. First-Aid-Kid
Name in Chinese: Dr |
https://en.wikipedia.org/wiki/1984%20Rajneeshee%20bioterror%20attack | In 1984, 751 people suffered food poisoning in The Dalles, Oregon, United States, due to the deliberate contamination of salad bars at ten local restaurants with Salmonella. A group of prominent followers of Rajneesh (later known as Osho) led by Ma Anand Sheela had hoped to incapacitate the voting population of the city so that their own candidates would win the 1984 Wasco County elections. The incident was the first and is still the single largest bioterrorist attack in U.S. history.
Rajneesh's followers had previously gained political control of Antelope, Oregon, as they were based in the nearby intentional community of Rajneeshpuram, and they now sought election to two of the three seats on the Wasco County Circuit Court that were up for election in November 1984. Some Rajneeshpuram officials feared that they would not get enough votes, so they decided to incapacitate voters in The Dalles, the largest population center in Wasco County. The chosen biological agent was Salmonella enterica Typhimurium, which was first delivered through glasses of water to two county commissioners and then at salad bars and in salad dressing.
As a result of the attack, 751 people contracted salmonellosis, 45 of whom were hospitalized, but none died. An initial investigation by the Oregon Health Authority and the Centers for Disease Control did not rule out deliberate contamination, and the agents and contamination were confirmed a year later, on February 28, 1985. Congressman James H. Weaver gave a speech in the U.S. House of Representatives in which he "accused the Rajneeshees of sprinkling Salmonella culture on salad bar ingredients in eight restaurants".
At a press conference in September 1985, Rajneesh accused several of his followers of participation in this and other crimes, including an aborted plan in 1985 to assassinate a United States Attorney, and he asked state and federal authorities to investigate. Oregon Attorney General David B. Frohnmayer set up an inter-agency ta |
https://en.wikipedia.org/wiki/Advances%20in%20Ecological%20Research | Advances in Ecological Research is a peer-reviewed scientific journal that was established in 1962 and is published by Academic Press. It was originally published every two years, but began to be published annually starting with the fourth volume. As of 2004, two volumes are published per year. The first editor-in-chief was J. B. Cragg, while the current editors are David A. Bohan and Alex J. Dumbrell. Past editors include Guy Woodward. The journal covers all aspects of ecology.
Abstracting and indexing
The journal is abstracted and indexed in the Science Citation Index, The Zoological Record, and BIOSIS Previews. According to the Journal Citation Reports, the journal has a 2021 impact factor of 5.182. |
https://en.wikipedia.org/wiki/Chirp%20spread%20spectrum | In digital communications, chirp spread spectrum (CSS) is a spread spectrum technique that uses wideband linear frequency modulated chirp pulses to encode information. A chirp is a sinusoidal signal whose frequency increases or decreases over time (often with a polynomial expression for the relationship between time and frequency).
Overview
As with other spread spectrum methods, chirp spread spectrum uses its entire allocated bandwidth to broadcast a signal, making it robust to channel noise. Further, because the chirps utilize a broad band of the spectrum, chirp spread spectrum is also resistant to multi-path fading even when operating at very low power. However, it is unlike direct-sequence spread spectrum (DSSS) or frequency-hopping spread spectrum (FHSS) in that it does not add any pseudo-random elements to the signal to help distinguish it from noise on the channel, instead relying on the linear nature of the chirp pulse. Additionally, chirp spread spectrum is resistant to the Doppler effect, which is typical in mobile radio applications.
Uses
Chirp spread spectrum was originally designed to compete with ultra-wideband for precision ranging and low-rate wireless networks in the 2.45 GHz band. However, since the release of IEEE 802.15.4a (also known as IEEE 802.15.4a-2007), it is no longer actively being considered by the IEEE for standardization in the area of precision ranging.
Chirp spread spectrum is ideal for applications requiring low power usage and needing relatively low data rates (1 Mbit/s or less). In particular, IEEE 802.15.4a specifies CSS as a technique for use in low-rate wireless personal area networks (LR-WPAN). However, whereas IEEE 802.15.4-2006 standard specifies that WPANs encompass an area of 10 m or less, IEEE 802.15.4a-2007, specifies CSS as a physical layer to be used when longer ranges and devices moving at high speeds are part of your network. Nanotron's CSS implementation was actually seen to work at a range of 570 meters b |
https://en.wikipedia.org/wiki/Cav2.1 | {{DISPLAYTITLE:Cav2.1}}
Cav2.1, also called the P/Q voltage-dependent calcium channel, is a calcium channel found mainly in the brain. Specifically, it is found on the presynaptic terminals of neurons in the brain and cerebellum. Cav2.1 plays an important role in controlling the release of neurotransmitters between neurons. It is composed of multiple subunits, including alpha-1, beta, alpha-2/delta, and gamma subunits. The alpha-1 subunit is the pore-forming subunit, meaning that the calcium ions flow through it. Different kinds of calcium channels have different isoforms (versions) of the alpha-1 subunit. Cav2.1 has the alpha-1A subunit, which is encoded by the CACNA1A gene. Mutations in CACNA1A have been associated with various neurologic disorders, including familial hemiplegic migraine, episodic ataxia type 2, and spinocerebellar ataxia type 6.
Function
"Voltage-dependent calcium channels mediate the entry of calcium ions into excitable cells, and are also involved in a variety of calcium-dependent processes, including muscle contraction, hormone or neurotransmitter release, and gene expression. Calcium channels are multisubunit complexes composed of alpha-1, beta, alpha-2/delta, and gamma subunits. The channel activity is directed by the pore-forming alpha-1 subunit, whereas, the others act as auxiliary subunits regulating this activity. The distinctive properties of the calcium channel types are related primarily to the expression of a variety of alpha-1 isoforms, alpha-1A, B, C, D, E, and S. This gene encodes the alpha-1A subunit, which is predominantly expressed in neuronal tissue."
Clinical significance
Mutations in the CACNA1A gene are associated with multiple neurologic disorders, many of which are episodic, such as familial hemiplegic migraine, movement disorders such as episodic ataxia, and epilepsy with multiple seizure types.
"This gene also exhibits polymorphic variation due to (CAG)n-repeats. Multiple transcript variants encoding different |
https://en.wikipedia.org/wiki/External%20lamina | External lamina is a structure similar to basal lamina that surrounds the sarcolemma of muscle cells. It is secreted by myocytes and consists primarily of Collagen type IV, laminin and perlecan (heparan sulfate proteoglycan). Nerve cells, including perineurial cells and Schwann cells also have an external lamina-like protective coating.
Adipocytes also have an external lamina. |
https://en.wikipedia.org/wiki/FCGR2A | Low affinity immunoglobulin gamma Fc region receptor II-a is a protein that in humans is encoded by the FCGR2A gene.
Interactions
FCGR2A has been shown to interact with PIK3R1 and Syk.
See also
CD32 |
https://en.wikipedia.org/wiki/Lift%20%28web%20framework%29 | Lift is a free and open-source web framework that is designed for the Scala programming language. It was originally created by David Pollak who was dissatisfied with certain aspects of the Ruby on Rails framework. Lift was launched as an open source project on 26 February 2007 under the Apache License 2.0. A commercially popular web platform often cited as being developed using Lift is Foursquare.
Design goals and overview
Lift is an expressive framework for writing web applications. It draws upon concepts from peer frameworks such as Grails, Ruby on Rails, Seaside, Wicket and Django. It favors convention over configuration in the style of Ruby on Rails, although it does not prescribe the model–view–controller (MVC) architectural pattern. Rather, Lift is chiefly modeled upon the so-called "View First" (designer friendly) approach to web page development inspired by the Wicket framework. Lift is also designed to be a high-performance, scalable web framework by leveraging Scala actors to support more concurrent requests than is possible with a thread-per-request server.
As Scala program code executes within the Java virtual machine (JVM), any existing Java library and web container can be used in running Lift applications. Lift web applications are thus packaged as WAR files and deployed on any servlet 2.4 engine (for example, Tomcat 5.5.xx, Jetty 6.0, etc.). Lift programmers may use the standard Scala/Java development toolchain including IDEs such as Eclipse, NetBeans and IDEA. Dynamic web content is authored via templates using standard HTML5 or XHTML editors. Lift applications also benefit from native support for advanced web development techniques such as Comet and Ajax.
The main characteristics of Lift applications are:
Resistant to common vulnerabilities including many of the OWASP.
Fast to build, concise and easy to maintain.
High performance and scale in the real world to handle big traffic levels.
Interactive like a desktop application.
History
The stable |
https://en.wikipedia.org/wiki/Monte%20Carlo%20method%20for%20photon%20transport | Modeling photon propagation with Monte Carlo methods is a flexible yet rigorous approach to simulate photon transport. In the method, local rules of photon transport are expressed as probability distributions which describe the step size of photon movement between sites of photon-matter interaction and the angles of deflection in a photon's trajectory when a scattering event occurs. This is equivalent to modeling photon transport analytically by the radiative transfer equation (RTE), which describes the motion of photons using a differential equation. However, closed-form solutions of the RTE are often not possible; for some geometries, the diffusion approximation can be used to simplify the RTE, although this, in turn, introduces many inaccuracies, especially near sources and boundaries. In contrast, Monte Carlo simulations can be made arbitrarily accurate by increasing the number of photons traced. For example, see the movie, where a Monte Carlo simulation of a pencil beam incident on a semi-infinite medium models both the initial ballistic photon flow and the later diffuse propagation.
The Monte Carlo method is necessarily statistical and therefore requires significant computation time to achieve precision. In addition Monte Carlo simulations can keep track of multiple physical quantities simultaneously, with any desired spatial and temporal resolution. This flexibility makes Monte Carlo modeling a powerful tool. Thus, while computationally inefficient, Monte Carlo methods are often considered the standard for simulated measurements of photon transport for many biomedical applications.
Biomedical applications of Monte Carlo methods
Biomedical imaging
The optical properties of biological tissue offer an approach to biomedical imaging. There are many endogenous contrasts, including absorption from blood and melanin and scattering from nerve cells and cancer cell nuclei. In addition, fluorescent probes can be targeted to many different tissues. Microsco |
https://en.wikipedia.org/wiki/Integrated%20reception%20system | An integrated reception system (IRS) provides broadcast signals from multiple sources (typically terrestrial television, FM radio, DAB digital radio and satellite TV) to multiple outlets, via a single aerial cluster and signal booster-distributor. The most obvious use for such a system is in communal housing blocks, where one aerial cluster can replace many aerials serving individual dwellings (e.g. flats or apartments). The predecessor to IRS was MATV- master aerial television- which provided communal housing with terrestrial TV signals only. Because the booster-distributor boxes within such systems usually need replacing to cope with digital terrestrial TV signals, many landlords are opting to replace the entire system with IRS at the time of digital terrestrial TV switchover, thereby reducing the clutter of (in particular) satellite TV dishes which have appeared on many communal housing blocks since the 1990s.
Unfortunately, because satellite transmissions use extremely high broadcast frequencies, they tend to "leak" from long cables, so IRS requires installation of very high quality cabling, in addition to the aerial cluster and sophisticated booster-distributor box. To cover the high cost of installation and maintenance of such a sensitive system, the annual charge levied by landlords for communal aerial provision is likely to increase substantially. |
https://en.wikipedia.org/wiki/Mannahatta%20Project | The Mannahatta Project is a Wildlife Conservation Society research project in historical ecology led by landscape ecologist Eric W. Sanderson that principally ran for 10 years, from 1999-2009, reconstructing the island at the point of first contact between the Dutch ship Halve Maen and the Lenape in 1609. The work culminated in the publication of Mannahatta: A Natural History of New York City in 2009, and has subsequently developed as the Welikia Project and in influence on other environmental initiatives.
Project and book
The project has explored the great biodiversity and ecological complexity through a historical geographic information system based on georeferencing of the British Headquarters Map of 1782 and the Randel Farm Maps made for the Commissioners' Plan of 1811, while also detailing the formative impact of Native American use of fire in ecosystems. It culminated in 2009 for the 400th anniversary with the publication of the book Mannahatta: A Natural History of New York City, which also includes a speculative look forward to the effect of climate change on New York City and hopeful human adaptations in the year 2409. An exhibition at the Museum of the City of New York was held the same year.
Sanderson estimates that in 1609 the landmass of the land now called Manhattan contained 66 miles of rivers and streams, numerous fishable tidal inlets, 70 kinds of trees, "627 species of plants, 85 species of fish, 32 species of reptiles and amphibians, 233 species of birds and 24 species of mammals." Additionally, Sanderson describes the 1609 landscape as one tended to by the Lenape peoples with geological evidence suggesting the indigenous peoples leveled forests and fields of grasslands, potentially engaged in small scale farming.
Later phase and influence
A follow-up project for 3 years was the Welikia Project ("my good home" in Lenape), examining the whole geography of New York City, which ran from 2010-2013. A planned sequel book is tentatively titled The |
https://en.wikipedia.org/wiki/Secure%20messaging | Secure messaging is a server-based approach to protect sensitive data when sent beyond the corporate borders, and it provides compliance with industry regulations such as HIPAA, GLBA and SOX. Advantages over classical secure e-mail are that confidential and authenticated exchanges can be started immediately by any internet user worldwide since there is no requirement to install any software nor to obtain or to distribute cryptographic keys beforehand. Secure messages provide non-repudiation as the recipients (similar to online banking) are personally identified and transactions are logged by the secure email platform.
Functionality
Secure messaging works as an online messaging service. Firstly, users enroll in a secure messaging platform. Then, the user logs into their account by typing in their username and password (or strong authentication) similar to a web-based email account. Out of a message center, the messages can be sent over a secure SSL-connection or via other equally protecting methods to any recipient. If the recipient is contacted for the first time, a message unlock code (see below MUC) is needed to authenticate the recipient. Alternatively, secure messaging can be used out of any standard email program without installing software.
Secure delivery
Secure messaging possesses different types of delivery: secured web interface, S/MIME or PGP encrypted communication or TLS secured connections to email domains, or individual email clients. One single secure message can be sent to different recipients with different types of secure delivery that the sender does not have to worry about.
Trust management
Secure messaging relies on a web of trust. This method synthesizes the authentication approach of web of trust, known from PGP, with the advantages of hierarchical structures, known from centralized PKI systems. Those combined with certificates provide a high quality of electronic identities. This approach focuses on the user and allows for immediate an |
https://en.wikipedia.org/wiki/Stretching%20field | In applied mathematics, stretching fields provide the local deformation of an infinitesimal circular fluid element over a finite time interval ∆t. The logarithm of the stretching (after first dividing by ∆t) gives the finite-time Lyapunov exponent λ for separation of nearby fluid elements at each point in a flow. For periodic two-dimensional flows, stretching fields have been shown to be closely related to the mixing of a passive scalar concentration field. Until recently, however, the extension of these ideas to systems that are non-periodic or weakly turbulent has been possible only in numerical simulations.
Dynamical systems |
https://en.wikipedia.org/wiki/Context%20tree%20weighting | The context tree weighting method (CTW) is a lossless compression and prediction algorithm by . The CTW algorithm is among the very few such algorithms that offer both theoretical guarantees and good practical performance (see, e.g. ).
The CTW algorithm is an “ensemble method”, mixing the predictions of many underlying variable order Markov models, where each such model is constructed using zero-order conditional probability estimators. |
https://en.wikipedia.org/wiki/Fauna%20Hawaiiensis | Fauna Hawaiiensis or the Zoology of the Sandwich (Hawaiian) Isles is a three-volume work,
published between 1899 and 1913, on the fauna of Hawaii. It was edited by David Sharp.
External links
Fauna Hawaiiensis digital version at the Bishop Museum
Zoological literature
Natural history of Hawaii |
https://en.wikipedia.org/wiki/A-equivalence | In mathematics, -equivalence, sometimes called right-left equivalence, is an equivalence relation between map germs.
Let and be two manifolds, and let be two smooth map germs. We say that and are -equivalent if there exist diffeomorphism germs and such that
In other words, two map germs are -equivalent if one can be taken onto the other by a diffeomorphic change of co-ordinates in the source (i.e. ) and the target (i.e. ).
Let denote the space of smooth map germs Let be the group of diffeomorphism germs and
be the group of diffeomorphism germs The group acts on in the natural way: Under this action we see that the map germs are -equivalent if, and only if, lies in the orbit of , i.e. (or vice versa).
A map germ is called stable if its orbit under the action of is open relative to the Whitney topology. Since is an infinite dimensional space metric topology is no longer trivial. Whitney topology compares the differences in successive derivatives and gives a notion of proximity within the infinite dimensional space. A base for the open sets of the topology in question is given by taking -jets for every and taking open neighbourhoods in the ordinary Euclidean sense. Open sets in the topology are then unions of
these base sets.
Consider the orbit of some map germ The map germ is called simple if there are only finitely many other orbits in a neighbourhood of each of its points. Vladimir Arnold has shown that the only simple singular map germs for are the infinite sequence (), the infinite sequence (), and
See also
K-equivalence (contact equivalence) |
https://en.wikipedia.org/wiki/2%2C6-Dichlorobenzonitrile | 2,6-Dichlorobenzonitrile (DCBN or dichlobenil) is an organic compound with the chemical formula C6H3Cl2CN. It is a white solid that is soluble in organic solvents. It is widely used as an herbicide.
Mechanism of action
It has herbicidal properties killing young seedlings of both monocot and dicot species. DCBN interferes with cellulose synthesis. DCBN adapted cell walls use minimal amounts of cellulose, instead relying on Ca2+-bridge pectates.
Safety
In 1971 in the U.S. State of California, their department of agriculture reported, "Dichlobenil kills the roots of many species, but not all; further, the killing does not extend much beyond the portion actually soaked."
In 1996, the University of California's Statewide Integrated Pest Management Project reported: Dosages were difficult to control... and as a result soaking or spraying methods are no longer used. The current application method involves applying metam-sodium products in foam carriers (similar to shaving cream).
The U.S. Food & Drug Administration (FDA, a major operational division of the U.S. Department of Health & Human Services) mentions "dichlobenil" in a report entitled "Herbicidal suppression of bracken and effects on forage production."
The U.S. Department of Energy - Bonneville Power Administration has reported "high potential" for dichlobenil to enter groundwater.
Residue
According to the US Environmental Protection Agency,
Inland Fisheries Ireland has reported, "The dichlobenil residue in water almost completely dissipates in 5 to 6 months."
U.S. FDA reports on pesticide residue.
Toxicity and environment
Since 1995, the U.S. National Institutes of Health has warned about potential damage to humans during indoor usage (see products listed, below): Leave all windows open and fans operating... Put all pets outdoors, and take yourself any your family away from treated areas for at least the length of time prescribed on the label. In 2006, the University of Hertfordshire repo |
https://en.wikipedia.org/wiki/NCI-Nature%20Pathway%20Interaction%20Database | The Pathway Interaction Database (PID) is a free biomedical database of human cellular signaling pathways. The database contains information about the molecular interactions and reactions that take place in cells, with a particular focus on processes that might be relevant to cancer research and treatment. The database was established as collaboration between the U.S. National Cancer Institute, NIH and Nature Publishing Group in 2005 and was launched in November 2006. In September 2012, active curation was stopped and the PID data are now available in the Network Data Exchange, NDEx.
Database content
As of November 2007, the database contained 59 pathways (comprising 3309 molecular interactions) curated by the NCI-Nature editorial team. New pathways are added each month. The database also contains 254 pathways (comprising 3003 interactions) imported from the June 2004 edition of the BioCarta pathway database.
The NCI-Nature curated data is gathered from published research literature and reviewed by expert scientists before publication. Evidence codes are assigned to each molecular interaction, which allows users to evaluate the reliability of the interactions or to search for interactions identified by particular experimental techniques.
Data output and download
The database content can be viewed in self-contained, pre-defined pathways. The database can also dynamically generate interaction networks to visualize the results of database searches. Pathways and dynamically generated networks are displayed in GIF and SVG images and can be downloaded as XML (including the standard pathway interchange format, BioPAX). The entire database is also available for download.
See also
Reactome
KEGG
Human Protein Reference Database
Cancer Genome Project |
https://en.wikipedia.org/wiki/Minor%20allele%20frequency | Minor allele frequency (MAF) is the frequency at which the second most common allele occurs in a given population. They play a surprising role in heritability since MAF variants which occur only once, known as "singletons", drive an enormous amount of selection.
Single nucleotide polymorphisms (SNPs) with a minor allele frequency of 0.05 (5%) or greater were targeted by the HapMap project.
MAF is widely used in population genetics studies because it provides information to differentiate between common and rare variants in the population.
As an example, a 2015 study sequenced the whole genomes of Sardinian individuals. The authors classified the variants found in the study in three classes according to their MAF. It was observed that rare variants (MAF < 0.05) appeared more frequently in coding regions than common variants (MAF > 0.05) in this population.
Interpreting MAF data
1. Introduce the reference of a SNP of interest, as an example: rs429358, in a database (dbSNP or other).
2. Find MAF/MinorAlleleCount link. MAF/MinorAlleleCount: C=0.1506/754 (1000 Genomes, where number of genomes sampled = N = 2504); where C is the minor allele for that particular locus; 0.1506 is the frequency of the C allele (MAF), i.e. 15% within the 1000 Genomes database; and 754 is the number of times this SNP has been observed in the population of the study.
See also
Allele frequency |
https://en.wikipedia.org/wiki/Plus%20Magazine | Plus Magazine is an online popular mathematics magazine run under the Millennium Mathematics Project at the University of Cambridge.
Plus contains:
feature articles on all aspects of mathematics;
reviews of popular maths books and events;
a news section;
mathematical puzzles and games;
interviews with people in maths related careers;
Plus Podcast – Maths on the Move
History
Plus was initially named PASS Maths (Public Awareness and Schools Support for Maths) in 1997, when it was a project of the Interactive Courseware Research and Development Group, based jointly at the University of Cambridge and Keele University. Plus is now part of the Millennium Mathematics Project, a long term national initiative based in Cambridge and active across the UK and internationally.
Authors of articles in Plus include Stephen Hawking and Marcus du Sautoy.
Plus won the 2001 Webby for Best Science Site on the Web, and has been described as "an excellent site put together by those with a real love for the subject". In 2006 the Millennium Mathematics Project, of which Plus is a part, won the Queen's Anniversary Prize for Higher Education. |
https://en.wikipedia.org/wiki/Apparent%20oxygen%20utilisation | In freshwater or marine systems apparent oxygen utilization (AOU) is the difference between oxygen gas solubility (i.e. the concentration at saturation) and the measured oxygen concentration in water with the same physical and chemical properties.
General influences
Differences in O2 solubility and measured concentration (AOU) typically occur when biological activity, ocean circulation, or ocean mixing act to change the ambient concentration of oxygen. For example, primary production liberates oxygen and increases its concentration, while respiration consumes it and decreases its concentration.
Consequently, the AOU of a water sample represents the sum of the biological activity that the sample has experienced since it was last in equilibrium with the atmosphere. In shallow water systems (e.g. lakes), the full water column is generally in close contact with the atmosphere, and oxygen concentrations are typically close to saturation, and AOU values are near zero. In deep water systems (e.g. oceans), water can be out of contact with the atmosphere for extremely long periods of time (years, decades, centuries) and large positive AOU values are typical. On occasion, where near-surface primary production has raised oxygen concentrations above saturation, negative AOU values are possible (i.e. oxygen has not been utilized to below saturation concentrations).
O2 trends and AOU in the ocean
O2 concentrations in the ocean have decreased since the 1980s. Part of this decrease is due to increased ocean heat content (OHC) from global warming decreasing O2 solubility. As solubility in surface oceans decreases, O2 out gasses to the atmosphere. Increased AOU is likely also contributing to declining ocean O2 concentrations. Changes in AOU in the ocean could be caused by multiple forcings, such as changes in subduction rates, changes in water mass boundaries, initial O2 from water mass formation, biochemical consumption of O2, or changes in eddy mixing. Based on observations, |
https://en.wikipedia.org/wiki/Nordic%20swan | The Nordic Ecolabel or Nordic swan is the official sustainability ecolabel for products from the Nordic countries. It was introduced by the Nordic Council of Ministers in 1989. The logo is based on the logo of the Nordic Council adopted in 1984 which symbolises trust, integrity and freedom. The Nordic Swan covers 67 different product groups, from hand soap to furniture to hotels.
The Nordic Swan is a voluntary license system in which the applicant agrees to follow criteria set outlined by the Nordic Ecolabelling. These criteria include environmental, quality and health arguments. The criteria levels promote products and services belonging to the most environmentally sound and take into account factors such as free trade and proportionality (cost vs. benefits).
Companies using the Nordic Swan label for their products must verify compliance, using samples from independent laboratories, certificates and control visits. The label is usually valid for three years, after which the criteria are revised and the company must reapply for a license.
The Nordic Ecolabel first appeared in the United States through a small offering of Nordic products. KCK Industries and ABENA introduced Bambo Nature, an environmentally friendly baby diaper. The success of this offering has led to the expansion of the Nordic Swan in the U.S.
Norway and Sweden implemented the Nordic swan in 1989, Finland in 1990, Iceland in 1991 and Denmark in 1998. |
https://en.wikipedia.org/wiki/Protected%20computer |
Protected computers is a term used in Title 18, Section 1030 of the United States Code, (the Computer Fraud and Abuse Act) which prohibits a number of different kinds of conduct, generally involving unauthorized access to, or damage to the data stored on, "protected computers". The statute, as amended by the National Information Infrastructure Protection Act of 1996, defines "protected computers" (formerly known as "federal interest computers") as:
a computer—
(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or
(B) which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.
The law prohibits unauthorized obtaining of "information from any protected computer if the conduct involved an interstate or foreign communication," and makes it a felony to intentionally transmit malware to a protected computer if more than $5000 in damage (such as to the integrity of data) were to result.
Scope
The US Justice Department explains:
In the 1994 amendments (of the National Information Infrastructure Act), the reach of this subsection (E. Subsection 1030(a)(5)) was broadened by replacing the term "federal interest computer" with the term "computer used in interstate commerce or communications." The latter term is broader because the old definition of "federal interest computer" in 18 U.S.C. § 1030(e)(2)(B) covered a computer "which is one of two or more computers used in committing the offense, not all of which are located in the same State." This meant that a hacker who attacked other computers in the same state was not subject to |
https://en.wikipedia.org/wiki/Carleman%20matrix | In mathematics, a Carleman matrix is a matrix used to convert function composition into matrix multiplication. It is often used in iteration theory to find the continuous iteration of functions which cannot be iterated by pattern recognition alone. Other uses of Carleman matrices occur in the theory of probability generating functions, and Markov chains.
Definition
The Carleman matrix of an infinitely differentiable function is defined as:
so as to satisfy the (Taylor series) equation:
For instance, the computation of by
simply amounts to the dot-product of row 1 of with a column vector .
The entries of in the next row give the 2nd power of :
and also, in order to have the zeroth power of in , we adopt the row 0 containing zeros everywhere except the first position, such that
Thus, the dot product of with the column vector yields the column vector
Generalization
A generalization of the Carleman matrix of a function can be defined around any point, such as:
or where . This allows the matrix power to be related as:
General Series
Another way to generalize it even further is think about a general series in the following way:
Let be a series approximation of , where is a basis of the space containing
We can define , therefore we have , now we can prove that , if we assume that is also a basis for and .
Let be such that where .
Now
Comparing the first and the last term, and from being a base for , and it follows that
Examples
If we set we have the Carleman matrix
If is an orthonormal basis for a Hilbert Space with a defined inner product , we can set and will be . If we have the analogous for Fourier Series, namely
Properties
Carleman matrices satisfy the fundamental relationship
which makes the Carleman matrix M a (direct) representation of . Here the term denotes the composition of functions .
Other properties include:
, where is an iterated function and
, where is the inverse function (if the Carleman matrix is invertib |
https://en.wikipedia.org/wiki/Ukrainian%20Physicists%27%20Tournament%20for%20University%20Students | Ukrainian Physicists' Tournament for University Students (, commonly abbreviated as СТФ) is a creative team competition of university students targeted to realize their potential through solving complicated scientific problems and defending their research projects in a scientific discussion, called Physics Fight. Is a part of International Physicists' Tournament.
The look-and-feel of the competition has a lot of common with the IYPT. The problems are known in a long time before the competition, are fully original and are proposed by the Organizing Committee after open selection and discussion.
However, the teams are expected to provide researches at a significantly higher level than secondary school students do, and the jurors are expected to be much more critical about the consistence of methods, approaches and results.
History
Physicists' Tournaments for University Students were created as a continuation of school Tournaments of Young Physicists for more experienced participants. The first Open Physicists' Tournament for University Students was held in Odesa in October 2001. The following tournament received the status of All-Ukrainian, and since then the tournaments are held every academic year. Sometimes tournaments take place in fall, sometimes in spring, so each calendar year there are 0 to 2 tournaments.
Since 2005, foreign teams started participating in the tournament: first from Russia, then from the Netherlands. It was therefore decided to organize the International Physicists' Tournament. The first International Physicists' Tournament was held in Kyiv in 2009. Since then, Ukrainian Physicists' Tournament for University Students became a step in the selection for the International Physicists' Tournament.
Organization
Teams receive a list of 17 research problems and have a few months to solve them. Generally, solving these problems includes conducting experiments, constructing theoretical models, literature analysis. Each team consists of 4-6 students |
https://en.wikipedia.org/wiki/Virtual%20machine%20lifecycle%20management | Virtual machine lifecycle management is the class of management that looks at the life cycle of a virtual machine from the viewpoint of the application vs one focused on roles within an organization. A number of major software vendors, including Microsoft and Novell, have begun to release software products aiming at simplifying the administration of larger virtual machine deployments.
Environmental characteristics
Virtualized environments are fundamentally different from physical environments in architecture and capabilities. The flexibility they provide is derived from three fundamental characteristics:
Time: Over time, the topology of the environment changes with machines coming online and others going offline.
Motion: Unlike physical servers, virtual machines easily relocate around the data-center.
Transparency: With no physical presence, virtual machines cannot be seen, identified, touched or often, missed.
Effects
These characteristics come together to define all the benefits of virtualization, from cost-savings to disaster recovery. However, they also change the nature of management of the infrastructure itself. The emerging space of Virtual Machine Lifecycle Management is the result of the time, motion and transparency qualities of virtual environments. This need cuts across software development and operations, encompassing all segments of the ITIL framework:
Service Strategy – As virtualization extends from a transparent back-end alternative to a full infrastructure offering within the organization, Virtual Machine Lifecycle Management provides the granular controls to enable wholly new delivery models, from short-term provisioning to outsourced virtual machine hosting.
Service Design – When designing the virtual infrastructure services, administrators consider both the structure of the individual virtual machine given to the customer as well as the interactions between all of the virtual machines in the environment, as they come online, move, and exp |
https://en.wikipedia.org/wiki/Outline%20of%20human%20anatomy | The following outline is provided as an overview of and topical guide to human anatomy:
Human anatomy – scientific study of the morphology of the adult human. It is subdivided into gross anatomy and microscopic anatomy. Gross anatomy (also called topographical anatomy, regional anatomy, or anthropotomy) is the study of anatomical structures that can be seen by unaided vision. Microscopic anatomy is the study of minute anatomical structures assisted with microscopes, and includes histology (the study of the organization of tissues), and cytology (the study of cells).
Essence of human anatomy
Human body
Anatomy
Branches of human anatomy
Gross anatomy- systemic or region-wise study of human body parts and organs. Gross anatomy encompasses cadaveric anatomy and osteology
Microscopic anatomy/histology
Cell biology (Cytology) & cytogenetics
Surface anatomy
Radiological anatomy
Developmental anatomy/embryology
Anatomy of the human body
The following list of human anatomical structures is based on the Terminologia Anatomica, the international standard for anatomical nomenclature. While the order is standardized, the hierarchical relationships in the TA are somewhat vague, and thus are open to interpretation.
General anatomy
Parts of human body
Head
Ear
Face
Forehead
Cheek
Chin
Eye
Nose
Nostril
Mouth
Lip
Tongue
Tooth
Neck
Torso
Thorax
Abdomen
Pelvis
Back
Pectoral girdle
Shoulder
Arm
Axilla
Elbow
Forearm
Wrist
Hand
Finger
Thumb
Palm
Lower limb
Pelvic girdle
Leg
Buttocks
Hip
Thigh
Knee
Calf
Foot
Ankle
Heel
Toe
Big toe
Sole
Cavities
Cranial cavity
Spinal cavity
Thoracic cavity
Abdominopelvic cavity
Abdominal cavity
Pelvic cavity
Planes, lines, and regions
Regions of head
Regions of neck
Anterior and lateral thoracic regions
Abdominal regions
Regions of back
Perineal regions
Regions of upper limb
Regions of lower limb
Bones
General terms
Bony part
Cortical bone
Compact bone
Spongy bone
Cartilaginous part
Membranous part
Periosteum
Perichondrium
Axial skele |
https://en.wikipedia.org/wiki/3-dehydroquinate%20dehydratase | The enzyme 3-dehydroquinate dehydratase () catalyzes the chemical reaction
3-dehydroquinate 3-dehydroshikimate + H2O
This enzyme belongs to the family of lyases, specifically the hydro-lyases, which cleave carbon-oxygen bonds. This enzyme participates in phenylalanine, tyrosine and tryptophan biosynthesis.
Discovery
The shikimate pathway was determined to be a major biosynthetic route for the production of aromatic amino acids through the research of Bernhard Davis and David Sprinson.
Role in the shikimate pathway
3-Dehydroquinate Dehydratase is an enzyme that catalyzes the third step of the shikimate pathway. The shikimate pathway is a biosynthetic pathway that allows plants, fungi, and bacteria to produce aromatic amino acids. Mammals do not have this pathway, meaning that they must obtain these essential amino acids through their diet. Aromatic Amino acids include Phenylalanine, Tyrosine, and Tryptophan.
This enzyme dehydrates 3-Dehydroquinate, converting it to 3-Dehydroshikimate, as indicated in the adjacent diagram. This is the third step in the Shikimate pathway. It belongs to the family of lyases, specifically the hydro-lyases, which cleave carbon-oxygen bonds. The systematic name of this enzyme class is 3-dehydroquinate hydro-lyase (3-dehydroshikimate-forming). This enzyme is one of the few examples of convergent evolution. The two separate versions of this enzyme have different amino acid sequences.
3-Dehydroquinate dehydratase is also commonly referred to as Dehydroquinate dehydratase and DHQD. Other names include 3-dehydroquinate hydrolase, DHQase, 3-dehydroquinase, 5-dehydroquinase, dehydroquinase, 5-dehydroquinate dehydratase, 5-dehydroquinate hydro-lyase, and 3-dehydroquinate hydro-lyase.
Evolutionary origins
Purposes of the products
The aromatic amino acids produced by the shikimate acid pathway are used by higher plants as protein building blocks and as precursors for several secondary metabolites. Examples of such secondary metabol |
https://en.wikipedia.org/wiki/James%20R.%20Goodman | James Richard "Jim" Goodman (born July 16, 1944) retired as professor of computer science at the University of Auckland in Auckland, New Zealand, and emeritus professor at the University of Wisconsin–Madison.
Education and research
Goodman received a PhD from the University of California, Berkeley in 1980. He joined the faculty at the University of Wisconsin–Madison the same year as an assistant professor of computer science.
Goodman's research is focused mainly on computer architecture. His current interests are primarily focused on support for Transactional Memory. Goodman's seminal 1983 paper, "Using cache memory to reduce processor-memory traffic", was the first to describe snooping cache coherence protocols and to identify the phenomenon of cache being able to conserve the memory bandwidth.
Goodman is the co-author of A Programmer's View of Computer Architecture , a highly acclaimed book on computer architecture, and co-authored with Andrew Tanenbaum Structured Computer Organization . In 2007, he was named a Fellow of the IEEE "for contributions to shared-memory multiprocessor system design". In 2010, he was named a Fellow of the Association for Computing Machinery "for contributions to parallel processor and memory system design." In 2013, he received the Eckert–Mauchly Award for "breakthroughs in architecture of shared-memory multiprocessors".
Personal
Goodman was born in 1944 in Topeka, Kansas. Because of his expertise in the field of computer science, he has been interviewed several times as an expert on TV shows such as Campbell Live. |
https://en.wikipedia.org/wiki/Bluebugging | Bluebugging is a form of Bluetooth attack often caused by a lack of awareness. It was developed after the onset of bluejacking and bluesnarfing. Similar to bluesnarfing, bluebugging accesses and uses all phone features but is limited by the transmitting power of class 2 Bluetooth radios, normally capping its range at 10–15 meters. However, the operational range can be increased with the use of a directional antenna.
History
Bluebugging was developed by the German researcher Martin Herfurt in 2004, one year after the advent of bluejacking. Initially a threat against laptops with Bluetooth capability, it later targeted mobile phones and PDAs.
Bluebugging manipulates a target phone into compromising its security, this to create a backdoor attack before returning control of the phone to its owner. Once control of a phone has been established, it is used to call back the hacker who is then able to listen in to conversations, hence the name "bugging". The Bluebug program also has the capability to create a call forwarding application whereby the hacker receives calls intended for the target phone.
A further development of Bluebugging has allowed for the control of target phones through Bluetooth phone headsets, It achieves this by pretending to be the headset and thereby "tricking" the phone into obeying call commands. Not only can a hacker receive calls intended for the target phone, he can send messages, read phonebooks, and examine calendars.
See also
IEEE 802.15
Near-field communication
Personal area network |
https://en.wikipedia.org/wiki/BCAR1 | Breast cancer anti-estrogen resistance protein 1 is a protein that in humans is encoded by the BCAR1 gene.
Gene
BCAR1 is localized on chromosome 16 on region q, on the negative strand and it consists of seven exons. Eight different gene isoforms have been identified that share the same sequence starting from the second exon onwards but are characterized by different starting sites. The longest isoform is called BCAR1-iso1 (RefSeq NM_001170714.1) and is 916 amino acids long, the other shorter isoforms start with an alternative first exon.
Function
BCAR1 is a ubiquitously expressed adaptor molecule originally identified as the major substrate of v-Src and v-Crk . p130Cas/BCAR1 belongs to the Cas family of adaptor proteins and can act as a docking protein for several signalling partners. Due to its ability to associate with multiple signaling partners, p130Cas/BCAR1 contributes to the regulation to a variety of signaling pathways leading to cell adhesion, migration, invasion, apoptosis, hypoxia and mechanical forces. p130Cas/BCAR1 plays a role in cell transformation and cancer progression and alterations of p130Cas/BCAR1 expression and the resulting activation of selective signalling are determinants for the occurrence of different types of human tumors.
Due to the capacity of p130Cas/BCAR1, as an adaptor protein, to interact with multiple partners and to be regulated by phosphorylation and dephosphorylation, its expression and phosphorylation can lead to a wide range of functional consequences. Among the regulators of p130Cas/BCAR1 tyrosine phosphorylation, receptor tyrosine kinases (RTKs) and integrins play a prominent role. RTK-dependent p130Cas/BCAR1 tyrosine phosphorylation and the subsequent binding with specific downstream signaling molecule modulate cell processes such as actin cytoskeleton remodeling, cell adhesion, proliferation, migration, invasion and survival. Integrin-mediated p130Cas/BCAR1 phosphorylation upon adhesion to extracellular matrix (E |
https://en.wikipedia.org/wiki/Actin%2C%20cytoplasmic%202 | Actin, cytoplasmic 2, or gamma-actin is a protein that in humans is encoded by the ACTG1 gene. Gamma-actin is widely expressed in cellular cytoskeletons of many tissues; in adult striated muscle cells, gamma-actin is localized to Z-discs and costamere structures, which are responsible for force transduction and transmission in muscle cells. Mutations in ACTG1 have been associated with nonsyndromic hearing loss and Baraitser-Winter syndrome, as well as susceptibility of adolescent patients to vincristine toxicity.
Structure
Human gamma-actin is 41.8 kDa in molecular weight and 375 amino acids in length. Actins are highly conserved proteins that are involved in various types of cell motility, and maintenance of the cytoskeleton. In vertebrates, three main groups of actin paralogs, alpha, beta, and gamma, have been identified.
The alpha actins are found in muscle tissues and are a major constituent of the sarcomere contractile apparatus. The beta and gamma actins co-exist in most cell types as components of the cytoskeleton, and as mediators of internal cell motility. Actin, gamma 1, encoded by this gene, is found in non-muscle cells in the cytoplasm, and in muscle cells at costamere structures, or transverse points of cell-cell adhesion that run perpendicular to the long axis of myocytes.
Function
In myocytes, sarcomeres adhere to the sarcolemma via costameres, which align at Z-discs and M-lines. The two primary cytoskeletal components of costameres are desmin intermediate filaments and gamma-actin microfilaments. It has been shown that gamma-actin interacting with another costameric protein dystrophin is critical for costameres forming mechanically strong links between the cytoskeleton and the sarcolemmal membrane. Additional studies have shown that gamma-actin colocalizes with alpha-actinin and GFP-labeled gamma actin localized to Z-discs, whereas GFP-alpha-actin localized to pointed ends of thin filaments, indicating that gamma actin specifically localizes t |
https://en.wikipedia.org/wiki/Power-off%20testing | Power-off testing is often necessary to test the printed circuit assembly (PCA) board due to uncertainty as to the nature of the failure. When the PCA can be further damaged by applying power it is necessary to use power off test techniques to safely examine it. Power off testing includes analog signature analysis, ohmmeter, LCR Meter and optical inspection. This type of testing also lends itself well to troubleshooting circuit boards without the aid of supporting documentation such as schematics.
Typical equipment
Analog signature analysis*
Huntron Tracker*
Automated optical inspection
LCR meter
Machine vision
Ohmmeter
Printed circuit board manufacturing
Nondestructive testing
Hardware testing
Electricity |
https://en.wikipedia.org/wiki/Escagraph | The term "escagraph" was first used in the 1980s by Dr. Larry R. Smith to identify and describe the many forms, past and present, of writing on food and letters as food. The term is a concatenation of esca (from Latin meaning "victuals" or "things to be eaten") and graph (after the Greek meaning: "mark" or the infinitive verb "to write").
History
Research has identified examples of escagraphs as far back as Ancient Egypt and the Roman Empire, primarily bread with words stamped into them prior to baking. Use of escagraphs waned a bit during periods of early Christianity to the 19th century, though some interesting examples exist in bread assizes and sotelties.
Examples
Sweet
Most forms of escagraphs today are sweet, either molded into or drawn onto the surface of the food. Cakes with "Happy Birthday" are extremely common. Heart-shaped candies with mottoes on them have been produced since about 1901 and are often shared at Valentine's Day. Many chocolate bars bear the name of their maker imprinted on their surface.
Lawful
Only a few lawful examples remain, since the bread assizes of the 15th century. However, the United States Department of Agriculture does mark certain meat products with certifications and grades in an edible ink.
Moveable type
From alphabet cookies to cereal to pasta, letters and moveable type are very common even today. Throughout the western world, cookies shaped as letters are made both as edible toys and ostensibly to help children learn their letters. Many manufacturers provide alphabet pasta letters (and numbers) in both ready-to-eat and dry forms.
See also |
https://en.wikipedia.org/wiki/Isogenous%20group | An isogenous group (lat. "equal origin") is a cluster of up to eight chondrocytes found in hyaline and elastic cartilage.
Formation
Chondrocytes develop in the embryo from mesenchymal progenitor cells through a process known as chondrogenesis. A chondrocyte can then undergo mitosis to form an isogenous group within its lacuna.
Function
Isogenous groups differentiate into individual chondrocytes where they continue to produce and deposit extracellular matrix (ECM), lengthening the cartilage and increasing its diameter. This is termed interstitial growth and is one of only two ways cartilage can grow.
See also
Endochondral ossification
Hyaline |
https://en.wikipedia.org/wiki/Symmetrical%20double-sided%20two-way%20ranging | In radio technology, symmetrical double-sided two-way ranging (SDS-TWR) is a ranging method that uses two delays that naturally occur in signal transmission to determine the range between two stations:
Signal propagation delay between two wireless devices
Processing delay of acknowledgements within a wireless device
This method is called symmetrical double-sided two-way ranging, because:
It is symmetrical in that the measurements from station A to station B are a mirror-image of the measurements from station B to station A (ABA to BAB).
It is double-sided in that only two stations are used for ranging measurement – station A and station B.
It is two-way in that a data packet (called a test packet) and an ACK packet is used.
Signal propagation delay
A special type of packet (test packets) is transmitted from station A (node A) to station B (node B). As time the packet travels through space per meter is known (from physical laws), the difference in time from when it was sent from the transmitter and received at the receiver can be calculated. This time delay is known as the signal propagation delay.
Processing delay
Station A now expects an acknowledgement from Station B. A station takes a known amount of time to process the incoming test packet, generate an acknowledgement (ack packet), and prepare it for transmission. The sum of time taken to process this acknowledgement is known as processing delay.
Calculating the range
The acknowledgement sent back to station A includes in its header those two delay values – the signal propagation delay and the processing delay. A further signal propagation delay can be calculated by Station A on the received acknowledgement, even as this delay was calculated on the test packet. These three values can then be used by an algorithm to calculate the range between these two stations.
Verifying the range calculation
To verify that the range calculation was accurate, the same procedure is repeated by station B sendin |
https://en.wikipedia.org/wiki/FISEC | The Food Industry Students European Council (FISEC) was the student association of the European Federation of Food Science and Technology, for students studying food science, food technology and related courses at a European university.
FISEC was a non-profit, apolitical and independent association, which tries to help students to meet and learn from one another through international events.
FISEC's roles
1. Help students to meet and in that way to become more internationally minded.
2. Create opportunities for the students to meet and learn from one another through our organized events.
3. To expand educational and job possibilities for all our members and to achieve personal development.
4. Continuous development of communication and cooperation between students, universities and companies.
Executive committee
The Executive Committee consists of a President, Vice-President, Treasurer and Secretary.
FISEC's events
FISEC is holding two annual conferences, the General Assembly and the Food Convention.
FISEC's history
1989, May: The First Food Convention takes place at ENSIA, Massy, France.
1989, November: Starting point for the work between students of the ENSIA and the ESB, Porto, Portugal.
1990, May 5: As a result of that cooperation FISEC is founded at the ESB in Porto by the following six universities: University of Reading, UK; University of Milan, Italy; Wageningen University, Netherlands; ESB Porto, Portugal; ENSIA, Massy and ENSBANA, Dijon, France.
1991: The Technical University of Berlin joined FISEC during this year . The last General Assembly was held in Nancy, France and the Food Convention was in Brussels, Belgium. A decision was taken for the next Food Convention to be in Berlin, Germany.
Through the years sometimes the separate FISEC teams have lost traces but it never stopped functioning and the students from the various universities across Europe have found their ways to gather.
1998: FISEC's official meeting gathers many new members |
https://en.wikipedia.org/wiki/Outline%20of%20nuclear%20technology | The following outline is provided as an overview of and topical guide to nuclear technology:
Nuclear technology – involves the reactions of atomic nuclei. Among the notable nuclear technologies are nuclear power, nuclear medicine, and nuclear weapons. It has found applications from smoke detectors to nuclear reactors, and from gun sights to nuclear weapons.
Essence of nuclear technology
Atomic nucleus
Branches of nuclear technology
Nuclear engineering
History of nuclear technology
History of nuclear power
History of nuclear weapons
Nuclear material
Nuclear fuel
Fertile material
Thorium
Uranium
Enriched uranium
Depleted uranium
Plutonium
Deuterium
Tritium
Nuclear power
Nuclear power –
List of nuclear power stations
Nuclear reactor technology
Fusion power
Inertial fusion power plant
Reactor types
List of nuclear reactors
Advanced gas-cooled reactor
Boiling water reactor
Fast breeder reactor
Fast neutron reactor
Gas-cooled fast reactor
Generation IV reactor
Integral Fast Reactor
Lead-cooled fast reactor
Liquid-metal-cooled reactor
Magnox reactor
Molten salt reactor
Pebble bed reactor
Pressurized water reactor
Sodium-cooled fast reactor
Supercritical water reactor
Very high temperature reactor
Radioisotope thermoelectric generator
Radioactive waste
Future energy development
Nuclear propulsion
Nuclear thermal rocket
Polywell
Nuclear decommissioning
Nuclear power phase-out
Civilian nuclear accidents
List of civilian nuclear accidents
List of civilian radiation accidents
Nuclear medicine
Nuclear medicine –
BNCT
Brachytherapy
Gamma (Anger) Camera
PET
Proton therapy
Radiation therapy
SPECT
Tomotherapy
Nuclear weapons
Nuclear weapons –
Nuclear explosion
Effects of nuclear explosions
Types of nuclear weapons
Strategic nuclear weapon
ICBM
SLBM
Tactical nuclear weapons
List of nuclear weapons
Nuclear weapons systems
Nuclear weapons delivery (missiles, etc.)
Nuclear weapon design
Nuclear weapons proliferat |
https://en.wikipedia.org/wiki/Territorial%20matrix | The territorial matrix is the tissue surrounding chondrocytes (cells which produce cartilage) in cartilage. Chondrocytes are inactive cartilage cells, so they don't make cartilage components. The territorial matrix is basophilic (attracts basic compounds and dyes due to its anionic/acidic nature), because there is a higher concentration of proteoglycans, so it will color darker when it's colored and viewed under a microscope. In other words, it stains metachromatically (dyes change color upon binding) due to the presence of proteoglycans (compound molecules composed of proteins and sugars). |
https://en.wikipedia.org/wiki/International%20Wine%20and%20Spirit%20Competition | The International Wine & Spirit Competition is an annual wine and spirit competition founded in 1969 by the German/British oenologist Anton Massel. Each year the competition receives entries from over 90 countries worldwide. The awards given by the competition are considered as high honors in the industry. The judging occurs annually, in London. Only brands that pay the entry fee of £159 per category are judged, and two or four bottles of each entry must be supplied, depending on the category entered.
Depending on the points out of 100 awarded, submitted drinks can receive gold outstanding (for spirits only), gold, silver, or bronze awards, and there are no limitations on how many of each which can be awarded. There is also an extensive range of trophies each year.
Judging
The judging process consists of blind tasting and panel discussion. Entries are judged by panels drawn from 250 specialists from around the world.
Judging processes
The competition has its own purpose built premises including temperature controlled cellars, tasting rooms and regular staff. In 2019, IWSC wine judging moved to London for the first time. The competition has its own storage facilities and cellaring for over 30,000 bottles.
It takes over six months to judge all the entries as they are sorted into over 1,500 categories. The categories divide the entries by several factors: region or area; variety, style, or type; vintage or age; and similar characteristics.
The competition makes use of over 250 specialist judges from all over the world. Many are Masters of Wine, Master Sommelier, some are winemakers or distillers, others are trade specialists, each judging in their special field.
IWSC's Annual Award Ceremony
The competition culminates in London in Autumn with the annual awards presentation and dinner, at the Roundhouse (previously the annual banquet was held at the City of London Guildhall).
Presidents/Industry Champion
A President/Industry Champion is selected annually from inf |
https://en.wikipedia.org/wiki/Dominance-based%20rough%20set%20approach | The dominance-based rough set approach (DRSA) is an extension of rough set theory for multi-criteria decision analysis (MCDA), introduced by Greco, Matarazzo and Słowiński. The main change compared to the classical rough sets is the substitution for the indiscernibility relation by a dominance relation, which permits one to deal with inconsistencies typical to consideration of criteria and preference-ordered decision classes.
Multicriteria classification (sorting)
Multicriteria classification (sorting) is one of the problems considered within MCDA and can be stated as follows: given a set of objects evaluated by a set of criteria (attributes with preference-order domains), assign these objects to some pre-defined and preference-ordered decision classes, such that each object is assigned to exactly one class. Due to the preference ordering, improvement of evaluations of an object on the criteria should not worsen its class assignment. The sorting problem is very similar to the problem of classification, however, in the latter, the objects are evaluated by regular attributes and the decision classes are not necessarily preference ordered. The problem of multicriteria classification is also referred to as ordinal classification problem with monotonicity constraints and often appears in real-life application when ordinal and monotone properties follow from the domain knowledge about the problem.
As an illustrative example, consider the problem of evaluation in a high school. The director of the school wants to assign students (objects) to three classes: bad, medium and good (notice that class good is preferred to medium and medium is preferred to bad). Each student is described by three criteria: level in Physics, Mathematics and Literature, each taking one of three possible values bad, medium and good. Criteria are preference-ordered and improving the level from one of the subjects should not result in worse global evaluation (class).
As a more serious example, con |
https://en.wikipedia.org/wiki/Grzegorczyk%20hierarchy | The Grzegorczyk hierarchy (, ), named after the Polish logician Andrzej Grzegorczyk, is a hierarchy of functions used in computability theory. Every function in the Grzegorczyk hierarchy is a primitive recursive function, and every primitive recursive function appears in the hierarchy at some level. The hierarchy deals with the rate at which the values of the functions grow; intuitively, functions in lower levels of the hierarchy grow slower than functions in the higher levels.
Definition
First we introduce an infinite set of functions, denoted Ei for some natural number i. We define and . I.e., E0 is the addition function, and E1 is a unary function which squares its argument and adds two. Then, for each n greater than 2, we define , i.e. the x-th iterate of evaluated at 2.
From these functions we define the Grzegorczyk hierarchy. , the n-th set in the hierarchy, contains the following functions:
Ek for k < n
the zero function (Z(x) = 0);
the successor function (S(x) = x + 1);
the projection functions ();
the (generalized) compositions of functions in the set (if h, g1, g2, ... and gm are in , then is as well); and
the results of limited (primitive) recursion applied to functions in the set, (if g, h and j are in and for all t and , and further and , then f is in as well).
In other words, is the closure of set with respect to function composition and limited recursion (as defined above).
Properties
These sets clearly form the hierarchy
because they are closures over the 's and .
They are strict subsets. In other words
because the hyper operation is in but not in .
includes functions such as x+1, x+2, ...
provides all addition functions, such as x+y, 4x, ...
provides all multiplication functions, such as xy, x4
provides all exponentiation functions, such as xy, 222x, and is exactly the elementary recursive functions.
provides all tetration functions, and so on.
Notably, both the function and the characteristic function of the p |
https://en.wikipedia.org/wiki/Loss%20of%20United%20Kingdom%20child%20benefit%20data%20%282007%29 | The loss of United Kingdom child benefit data was a data breach incident in October 2007, when two computer discs owned by HM Revenue and Customs containing data relating to child benefit went missing. The incident was announced by the Chancellor of the Exchequer, Alistair Darling, on 20 November 2007. The two discs contained the personal details of all families in the United Kingdom (UK) claiming child benefit, of which takeup in the UK is near 100%.
The loss
The discs were sent by junior staff at HM Revenue and Customs (HMRC) based at Waterview Park in Washington, Tyne and Wear, to the National Audit Office (NAO), as unrecorded internal mail via TNT on 18 October. On 24 October the NAO complained to HMRC that they had not received the data. On 8 November, senior officials in HMRC were informed of the loss, with Chancellor of the Exchequer, Alistair Darling being informed on 10 November. On 20 November Darling announced:
The lost data was thought to concern approximately 25 million people in the UK (nearly half of the country's population). The personal data on the missing discs was reported to include names and addresses of parents and children and dates of birth of the children, together with the National Insurance numbers and bank or building society details of their parents.
The "password protection" in question is that provided by WinZip version 8. This is a weak, proprietary scheme (unnamed encryption and hash algorithms) with well-known attacks. Anyone competent in computing would be able to break this protection by downloading readily-available tools. WinZip version 9 introduced AES encryption, which would have been secure and only breakable by correctly knowing the passphrase.
In a list of frequently asked questions, on the BBC News website a breakdown of the loss was reported as being:
7.25 million claimants
15.5 million children, including some who no longer qualify but whose family is claiming for a younger child
2.25 million 'alternative |
https://en.wikipedia.org/wiki/Oracle%20Clusterware | Oracle Clusterware is the cross-platform cluster software required to run the Real Application Clusters (RAC) option for Oracle Database. It provides the basic clustering services at the operating-system level that enable Oracle Database software to run in clustering mode. In earlier versions of Oracle (release 9i and earlier), RAC required a vendor-supplied clusterware like Sun Cluster or Veritas Cluster Server (except when running on Linux or on Microsoft Windows).
Oracle Clusterware Components
Oracle Clusterware is the software which enables the nodes to communicate with each other, allowing them to form the cluster of nodes which behaves as a single logical server. Oracle Clusterware is run by Cluster Ready Services (CRS) consisting of two key components: Oracle Cluster Registry (OCR), which records and maintains the cluster and node membership information; voting disk, which polls for consistent heartbeat information from all the nodes when the cluster is running, and acts as a tiebreaker during communication failures.
The CRS service has four components, each handling a variety of functions: Cluster Ready Services daemon (CRSd), Oracle Cluster Synchronization Service Daemon (OCSSd), Event Volume Manager Daemon (EVMd), and Oracle Process Clusterware Daemon (OPROCd). Failure or death of the CRS daemon can cause node failure, which triggers automatic reboots of the nodes to avoid the corruption of data (due to the possible failure of communication between the nodes), also known as fencing. The CRS daemon runs as "root" (super user) on UNIX platforms and runs as a service on Windows platforms.
CRSd
The following functions are provided by the Oracle Cluster Ready Services daemon (CRSd):
CRS is installed and run from a different ORACLE_HOME known as ORA_CRS_HOME, which is independent of ORACLE_HOME.
CRSd manages the resources like starting and stopping the services and failing-over the application resources. It spawns separate processes to manage ap |
https://en.wikipedia.org/wiki/Urgent%20computing | Urgent computing is prioritized and immediate access on supercomputers and grids for emergency computations such as severe weather prediction during matters of immediate concern.
Applications that provide decision makers with information during critical emergencies cannot waste time waiting in job queues and need access to computational resources as soon as possible. |
https://en.wikipedia.org/wiki/DP%20code | DP is a free software package for physicists implementing ab initio linear-response TDDFT (time-dependent density functional theory) in frequency-reciprocal space and on a plane wave basis set.
It allows to calculate both dielectric spectra, such as EELS (electron energy-loss spectroscopy), IXSS (inelastic X-ray scattering spectroscopy) and CIXS (coherent inelastic X-ray scattering spectroscopy), and also optical spectra, e.g. optical absorption, reflectivity, refraction index.
The systems range from periodic/crystalline solids, to surfaces, clusters, molecules and atoms made of insulators, semiconductors and metal elements. It implements the RPA (random phase approximation), the TDLDA or ALDA (adiabatic local-density approximation) plus other non-local approximations, including or neglecting local-field effects. It is distributed under the scientific software open-source academic for free license.
See also
ABINIT
EXC code
YAMBO code
PWscf
Quantum chemistry computer programs |
https://en.wikipedia.org/wiki/Neural%20backpropagation | Neural backpropagation is the phenomenon in which, after the action potential of a neuron creates a voltage spike down the axon (normal propagation), another impulse is generated from the soma and propagates towards the apical portions of the dendritic arbor or dendrites (from which much of the original input current originated). In addition to active backpropagation of the action potential, there is also passive electrotonic spread. While there is ample evidence to prove the existence of backpropagating action potentials, the function of such action potentials and the extent to which they invade the most distal dendrites remain highly controversial.
Mechanism
When the graded excitatory postsynaptic potentials (EPSPs) depolarize the soma to spike threshold at the axon hillock, first, the axon experiences a propagating impulse through the electrical properties of its voltage-gated sodium and voltage-gated potassium channels. An action potential occurs in the axon first as research illustrates that sodium channels at the dendrites exhibit a higher threshold than those on the membrane of the axon (Rapp et al., 1996). Moreover, the voltage-gated sodium channels on the dendritic membranes having a higher threshold helps prevent them triggering an action potential from synaptic input. Instead, only when the soma depolarizes enough from accumulating graded potentials and firing an axonal action potential will these channels be activated to propagate a signal traveling backwards (Rapp et al. 1996). Generally, EPSPs from synaptic activation are not large enough to activate the dendritic voltage-gated calcium channels (usually on the order of a couple milliamperes each) so backpropagation is typically believed to happen only when the cell is activated to fire an action potential. These sodium channels on the dendrites are abundant in certain types of neurons, especially mitral and pyramidal cells, and quickly inactivate. Initially, it was thought that an action poten |
https://en.wikipedia.org/wiki/Laboratory%20of%20Tree-Ring%20Research | The Laboratory of Tree-Ring Research (LTRR) was established in 1937 by A.E. Douglass, founder of the modern science of dendrochronology. The LTRR is a research unit in the College of Science at the University of Arizona in Tucson. Since its founding, visiting scholars and faculty at the lab have done notable work in the areas of climate change, fire history, ecology, archeology and hydrology. |
https://en.wikipedia.org/wiki/Video%20Acceleration%20API | Video Acceleration API (VA-API) is an open source application programming interface that allows applications such as VLC media player or GStreamer to use hardware video acceleration capabilities, usually provided by the graphics processing unit (GPU). It is implemented by the free and open-source library , combined with a hardware-specific driver, usually provided together with the GPU driver.
VA-API video decode/encode interface is platform and window system independent but is primarily targeted at Direct Rendering Infrastructure (DRI) in X Window System on Unix-like operating systems (including Linux, FreeBSD, Solaris), and Android, however it can potentially also be used with direct framebuffer and graphics sub-systems for video output. Accelerated processing includes support for video decoding, video encoding, subpicture blending, and rendering.
The VA-API specification was originally designed by Intel for its GMA (Graphics Media Accelerator) series of GPU hardware with the specific purpose of eventually replacing the XvMC standard as the default Unix multi-platform equivalent of Microsoft Windows DirectX Video Acceleration (DxVA) API, but today the API is no longer limited to Intel-specific hardware or GPUs. Other hardware and manufacturers can freely use this open standard API for hardware accelerated video processing with their own hardware without paying a royalty fee.
Overview
The main motivation for VA-API is to enable hardware-accelerated video decode at various entry-points (VLD, IDCT, motion compensation, deblocking) for the prevailing coding standards today (MPEG-2, MPEG-4 ASP/H.263, MPEG-4 AVC/H.264, H.265/HEVC, and VC-1/WMV3). Extending XvMC was considered, but due to its original design for MPEG-2 MotionComp only, it made more sense to design an interface from scratch that can fully expose the video decode capabilities in today's GPUs.
Supported hardware and drivers
As of 2022, VA-API is natively supported by:
Intel Quick Sync open-source dr |
https://en.wikipedia.org/wiki/Ultrahyperbolic%20equation | In the mathematical field of differential equations, the ultrahyperbolic equation is a partial differential equation (PDE) for an unknown scalar function of variables of the form
More generally, if is any quadratic form in variables with signature , then any PDE whose principal part is is said to be ultrahyperbolic. Any such equation can be put in the form above by means of a change of variables.
The ultrahyperbolic equation has been studied from a number of viewpoints. On the one hand, it resembles the classical wave equation. This has led to a number of developments concerning its characteristics, one of which is due to Fritz John: the John equation.
In 2008, Walter Craig and Steven Weinstein proved that under a nonlocal constraint, the initial value problem is well-posed for initial data given on a codimension-one hypersurface. And later, in 2022, a research team at the University of Michigan extended the conditions for solving ultrahyperbolic wave equations to complex-time (kime), demonstrated space-kime dynamics, and showed data science applications using tensor-based linear modeling of functional magnetic resonance imaging data.
The equation has also been studied from the point of view of symmetric spaces, and elliptic differential operators. In particular, the ultrahyperbolic equation satisfies an analog of the mean value theorem for harmonic functions.
Notes |
https://en.wikipedia.org/wiki/Nucleolin | Nucleolin is a protein that in humans is encoded by the NCL gene.
Gene
The human NCL gene is located on chromosome 2 and consists of 14 exons with 13 introns and spans approximately 11kb. Intron 11 of the NCL gene encodes a small nucleolar RNA, termed U20.
Function
Nucleolin is the major nucleolar protein of growing eukaryotic cells. It is found associated with intranucleolar chromatin and pre-ribosomal particles. It induces chromatin decondensation by binding to histone H1. It is thought to play a role in pre-rRNA transcription and ribosome assembly. May play a role in the process of transcriptional elongation. Binds RNA oligonucleotides with 5'-UUAGGG-3' repeats more tightly than the telomeric single-stranded DNA 5'-TTAGGG-3' repeats.
Nucleolin is also able to act as a transcriptional coactivator with Chicken Ovalbumin Upstream Promoter Transcription Factor II (COUP-TFII).
Clinical significance
Midkine and pleiotrophin bind to cell-surface nucleolin as a low affinity receptor. This binding can inhibit HIV infection.
Nucleolin at the cell surface is the receptor for the respiratory syncytial virus (RSV) fusion protein. Interference with the nucleolinRSV fusion protein interaction has been shown to be therapeutic against RSV infection in cell cultures and animal models.
Interactions
Nucleolin has been shown to interact with:
MTDH,
CSNK2A2,
Centaurin, alpha 1,
HuR,
NPM1,
P53,
PPP1CB,
S100A11,
Sjogren syndrome antigen B,
TOP1, and
Telomerase reverse transcriptase. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.