source
stringlengths 31
227
| text
stringlengths 9
2k
|
|---|---|
https://en.wikipedia.org/wiki/Front%20panel
|
A front panel was used on early electronic computers to display and allow the alteration of the state of the machine's internal registers and memory. The front panel usually consisted of arrays of indicator lamps, digit and symbol displays, toggle switches, dials, and push buttons mounted on a sheet metal face plate. In early machines, CRTs might also be present (as an oscilloscope, or, for example, to mirror the contents of Williams–Kilburn tube memory). Prior to the development of CRT system consoles,
many computers such as the IBM 1620 had console typewriters.
Usually the contents of one or more hardware registers would be represented by a row of lights, allowing the contents to be read directly when the machine was stopped. The switches allowed direct entry of data and address values into registers or memory.
Details
On some machines, certain lights and switches were reserved for use under program control. These were often referred to as sense indicators, sense lights and sense switches. For example, the original Fortran compiler for the IBM 704 contained specific statements for testing and manipulation of the 704's sense lights and switches. These switches were often used by the program to control optional behavior, for example information might be printed only if a particular sense switch was set.
Operating systems made for computers with blinkenlights, for example, RSTS/E and RSX-11, would frequently have an idle task blink the panel lights in some recognizable fashion. System programmers often became very familiar with these light patterns and could tell from them how busy the system was and, sometimes, exactly what it was doing at the moment. The Master Control Program for the Burroughs Corporation B6700 mainframe would display a large block-letter "B" when the system was idle.
Switches and lights required little additional logic circuitry and usually no software support, important when logic hardware components were costly and software often limit
|
https://en.wikipedia.org/wiki/History%20of%20neuroscience
|
From the ancient Egyptian mummifications to 18th-century scientific research on "globules" and neurons, there is evidence of neuroscience practice throughout the early periods of history. The early civilizations lacked adequate means to obtain knowledge about the human brain. Their assumptions about the inner workings of the mind, therefore, were not accurate. Early views on the function of the brain regarded it to be a form of "cranial stuffing" of sorts. In ancient Egypt, from the late Middle Kingdom onwards, in preparation for mummification, the brain was regularly removed, for it was the heart that was assumed to be the seat of intelligence. According to Herodotus, during the first step of mummification: "The most perfect practice is to extract as much of the brain as possible with an iron hook, and what the hook cannot reach is mixed with drugs." Over the next five thousand years, this view came to be reversed; the brain is now known to be the seat of intelligence, although colloquial variations of the former remain as in "memorizing something by heart".
Antiquity
The earliest reference to the brain occurs in the Edwin Smith Surgical Papyrus, written in the 17th century BC. The hieroglyph for brain, occurring eight times in this papyrus, describes the symptoms, diagnosis, and prognosis of two patients, wounded in the head, who had compound fractures of the skull. The assessments of the author (a battlefield surgeon) of the papyrus allude to ancient Egyptians having a vague recognition of the effects of head trauma. While the symptoms are well written and detailed, the absence of a medical precedent is apparent. The author of the passage notes "the pulsations of the exposed brain" and compared the surface of the brain to the rippling surface of copper slag (which indeed has a gyral-sulcal pattern). The laterality of injury was related to the laterality of symptom, and both aphasia ("he speaks not to thee") and seizures ("he shudders exceedingly") after head in
|
https://en.wikipedia.org/wiki/Metric%20connection
|
In mathematics, a metric connection is a connection in a vector bundle E equipped with a bundle metric; that is, a metric for which the inner product of any two vectors will remain the same when those vectors are parallel transported along any curve. This is equivalent to:
A connection for which the covariant derivatives of the metric on E vanish.
A principal connection on the bundle of orthonormal frames of E.
A special case of a metric connection is a Riemannian connection; there exists a unique such connection which is torsion free, the Levi-Civita connection. In this case, the bundle E is the tangent bundle TM of a manifold, and the metric on E is induced by a Riemannian metric on M.
Another special case of a metric connection is a Yang–Mills connection, which satisfies the Yang–Mills equations of motion. Most of the machinery of defining a connection and its curvature can be worked through without requiring any compatibility with the bundle metric. However, once one does require compatibility, this metric connection defines an inner product, Hodge star (which additionally needs a choice of orientation), and Laplacian, which are required to formulate the Yang–Mills equations.
Definition
Let be any local sections of the vector bundle E, and let X be a vector field on the base space M of the bundle. Let define a bundle metric, that is, a metric on the vector fibers of E. Then, a connection D on E is a metric connection if:
Here d is the ordinary differential of a scalar function. The covariant derivative can be extended so that it acts as a map on E-valued differential forms on the base space:
One defines for a function , and
where is a local smooth section for the vector bundle and is a (scalar-valued) p-form. The above definitions also apply to local smooth frames as well as local sections.
Metric versus dual pairing
The bundle metric imposed on E should not be confused with the natural pairing of a vector space and its dual, which is intrinsi
|
https://en.wikipedia.org/wiki/Hypotheses%20non%20fingo
|
Hypotheses non fingo (Latin for "I frame no hypotheses", or "I contrive no hypotheses") is a phrase used by Isaac Newton in an essay, "General Scholium", which was appended to the second (1713) edition of the Principia.
Original remark
A 1999 translation of the Principia presents Newton's remark as follows:
Later commentary
The 19th-century philosopher of science William Whewell qualified this statement, saying that, "it was by such a use of hypotheses, that both Newton himself and Kepler, on whose discoveries those of Newton were based, made their discoveries". Whewell stated:What is requisite is, that the hypothesis should be close to the facts, and not connected with them by other arbitrary and untried facts; and that the philosopher should be ready to resign it as soon as the facts refuse to confirm it.
Later, Imre Lakatos asserted that such a resignation should not be too rushed.
See also
Action at a distance
Primum movens
|
https://en.wikipedia.org/wiki/Riesz%20sequence
|
In mathematics, a sequence of vectors (xn) in a Hilbert space is called a Riesz sequence if there exist constants such that
for all sequences of scalars (an) in the ℓp space ℓ2. A Riesz sequence is called a Riesz basis if
.
Alternatively, one can define the Riesz basis as a family of the form , where is an orthonormal basis for and is a bounded bijective operator.
Paley-Wiener criterion
Let be an orthonormal basis for a Hilbert space and let be "close" to in the sense that
for some constant , , and arbitrary scalars . Then is a Riesz basis for . Hence, Riesz bases need not be orthonormal.
Theorems
If H is a finite-dimensional space, then every basis of H is a Riesz basis.
Let be in the Lp space L2(R), let
and let denote the Fourier transform of . Define constants c and C with . Then the following are equivalent:
The first of the above conditions is the definition for () to form a Riesz basis for the space it spans.
See also
Orthonormal basis
Hilbert space
Frame of a vector space
|
https://en.wikipedia.org/wiki/List%20of%20Malaysian%20flags
|
This is a list of flags used in Malaysia.
National flags
Monarch
Military
Law Enforcement Flags
Administrative divisions
States
Federal territories
A common flag for the three federal territories was adopted by the Ministry of the Federal Territories on 20 August 2006. The flag is to be used and flown on matters and ceremonies that involve all the federal territories as a whole. An example is in national sporting events; the unified contingent of the territories would be under this common flag. However, the usage of the individual territorial flags would be given preference in events relating to individual territories.
City, district, provincial and municipal
For flags of districts, towns, and cities in Malaysia, look for the article for each state's flag where said location is in. Below is a gallery of the flags of several Malaysian state capitals.
Order of precedence
Per government protocol, if a display contains the Jalur Gemilang and all the state flags of Malaysia:
The Jalur Gemilang shall take precedence before the state flags;
The state flags shall be ordered by the date the state's incumbent ruler takes the throne;
The Federal Territory flag comes last
Political flags
University flags
Historical
Sultanate flags
Colonial and national flags
State flags
Proposed Flags
See also
Armorial of Malaysia
|
https://en.wikipedia.org/wiki/Chemostat
|
A chemostat (from chemical environment is static) is a bioreactor to which fresh medium is continuously added, while culture liquid containing left over nutrients, metabolic end products and microorganisms is continuously removed at the same rate to keep the culture volume constant. By changing the rate with which medium is added to the bioreactor the specific growth rate of the microorganism can be easily controlled within limits.
Operation
Steady state
One of the most important features of chemostats is that microorganisms can be grown in a physiological steady state under constant environmental conditions. In this steady state, growth occurs at a constant specific growth rate and all culture parameters remain constant (culture volume, dissolved oxygen concentration, nutrient and product concentrations, pH, cell density, etc.). In addition, environmental conditions can be controlled by the experimenter. Microorganisms growing in chemostats usually reach a steady state because of a negative feedback between growth rate and nutrient consumption: if a low number of cells are present in the bioreactor, the cells can grow at growth rates higher than the dilution rate as they consume little nutrient so growth is less limited by the addition of limiting nutrient with the inflowing fresh medium. The limiting nutrient is a nutrient essential for growth, present in the medium at a limiting concentration (all other nutrients are usually supplied in surplus). However, the higher the number of cells becomes, the more nutrient is consumed, lowering the concentration of the limiting nutrient. In turn, this will reduce the specific growth rate of the cells, which will lead to a decline in the number of cells as they keep being removed from the system with the outflow. This results in a steady state. Due to self-regulation, the steady state is stable. This enables the experimenter to control the specific growth rate of the microorganisms by changing the speed of the pump feedin
|
https://en.wikipedia.org/wiki/PAX6
|
Paired box protein Pax-6, also known as aniridia type II protein (AN2) or oculorhombin, is a protein that in humans is encoded by the PAX6 gene.
Function
PAX6 is a member of the Pax gene family which is responsible for carrying the genetic information that will encode the Pax-6 protein. It acts as a "master control" gene for the development of eyes and other sensory organs, certain neural and epidermal tissues as well as other homologous structures, usually derived from ectodermal tissues. However, it has been recognized that a suite of genes is necessary for eye development, and therefore the term of "master control" gene may be inaccurate. Pax-6 is expressed as a transcription factor when neural ectoderm receives a combination of weak Sonic hedgehog (SHH) and strong TGF-Beta signaling gradients. Expression is first seen in the forebrain, hindbrain, head ectoderm and spinal cord followed by later expression in midbrain. This transcription factor is most noted for its use in the interspecifically induced expression of ectopic eyes and is of medical importance because heterozygous mutants produce a wide spectrum of ocular defects such as aniridia in humans.
Pax6 serves as a regulator in the coordination and pattern formation required for differentiation and proliferation to successfully take place, ensuring that the processes of neurogenesis and oculogenesis are carried out successfully. As a transcription factor, Pax6 acts at the molecular level in the signaling and formation of the central nervous system. The characteristic paired DNA binding domain of Pax6 utilizes two DNA-binding domains, the paired domain (PD), and the paired-type homeodomain (HD). These domains function separately via utilization by Pax6 to carry out molecular signaling that regulates specific functions of Pax6. An example of this lies in HD's regulatory involvement in the formation of the lens and retina throughout oculogenesis contrasted by the molecular mechanisms of control exhibited
|
https://en.wikipedia.org/wiki/Pelvic%20brim
|
The pelvic brim is the edge of the pelvic inlet. It is an approximately Mickey Mouse head-shaped line passing through the prominence of the sacrum, the arcuate and pectineal lines, and the upper margin of the pubic symphysis.
Structure
The pelvic brim is an approximately Mickey Mouse head-shaped line passing through the prominence of the sacrum, the arcuate and pectineal lines, and the upper margin of the pubic symphysis.
The pelvic brim is obtusely pointed in front, diverging on either side, and encroached upon behind by the projection forward of the promontory of the sacrum.
The oblique plane passing approximately through the pelvic brim divides the internal part of the pelvis (pelvic cavity) into the false or greater pelvis and the true or lesser pelvis. The false pelvis, which is above that plane, is sometimes considered to be a part of the abdominal cavity, rather than a part of the pelvic cavity. In this case, the pelvic cavity coincides with the true pelvis, which is below the above-mentioned plane.
The urinary bladder lies just above the anterior pelvic brim. The sigmoid colon also passes close to the pelvic brim.
Clinical significance
The pelvic brim may be a site of compression of structures that pass through the pelvic inlet. This can include the femoral nerves, which may occur during abdominal surgery.
See also
Linea terminalis
Pelvis justo major
Pelvic inlet
Additional images
|
https://en.wikipedia.org/wiki/Access%20control%20matrix
|
In computer science, an access control matrix or access matrix is an abstract, formal security model of protection state in computer systems, that characterizes the rights of each subject with respect to every object in the system. It was first introduced by Butler W. Lampson in 1971.
An access matrix can be envisioned as a rectangular array of cells, with one row per subject and one column per object. The entry in a cell – that is, the entry for a particular subject-object pair – indicates the access mode that the subject is permitted to exercise on the object. Each column is equivalent to an access control list for the object; and each row is equivalent to an access profile for the subject.
Definition
According to the model, the protection state of a computer system can be abstracted as a set of objects , that is the set of entities that needs to be protected (e.g. processes, files, memory pages) and a set of subjects , that consists of all active entities (e.g. users, processes). Further there exists a set of rights of the form , where , and . A right thereby specifies the kind of access a subject is allowed to process object.
Example
In this matrix example there exist two processes, two assets, a file, and a device. The first process is the owner of asset 1, has the ability to execute asset 2, read the file, and write some information to the device, while the second process is the owner of asset 2 and can read asset 1.
Utility
Because it does not define the granularity of protection mechanisms, the Access Control Matrix can be used as a model of the static access permissions in any type of access control system. It does not model the rules by which permissions can change in any particular system, and therefore only gives an incomplete description of the system's access control security policy.
An Access Control Matrix should be thought of only as an abstract model of permissions at a given point in time; a literal implementation of it as a two-dimensional
|
https://en.wikipedia.org/wiki/WebML
|
WebML (Web Modeling Language) is a visual notation and a methodology for designing complex data-intensive Web applications. It provides graphical, yet formal, specifications, embodied in a complete design process, which can be assisted by visual design tools.
In 2013 WebML has been extended to cover a wider spectrum of front-end interfaces, thus resulting in the Interaction Flow Modeling Language (IFML), adopted as a standard by the Object Management Group (OMG).
This method has five models: structure, derivation, composition, navigation, and presentation. These models are developed in an iterative process.
Concepts
WebML enables designers to express the core features of a site at a high level without committing to detailed architectural details. WebML concepts are associated with an intuitive graphic representation, which can be easily supported by CASE tools and effectively communicated to the non-technical members of the site development team (e.g., with the graphic designers and the content producers). WebML also supports an XML syntax, which instead can be fed to software generators for automatically producing the implementation of a Web site. The specification of a site in WebML consists of four orthogonal perspectives:
Structural Model: it expresses the data content of the site, in terms of the relevant entities and relationships. WebML does not propose yet another language for data modeling, but is compatible with classical notations like the E/R model, the ODMG object-oriented model, and UML class diagrams.
Hypertext Model: it describes one or more hypertexts that can be published in the site. Each different hypertext defines a so-called site view. Site view descriptions in turn consist of two sub-models.
Composition Model: it specifies which pages compose the hypertext, and which content units make up a page.
Navigation Model: it expresses how pages and content units are linked to form the hypertext. Links are either non-contextual, when they connect s
|
https://en.wikipedia.org/wiki/Pubic%20arch
|
The pubic arch, also referred to as the ischiopubic arch, is part of the pelvis. It is formed by the convergence of the inferior rami of the ischium and pubis on either side, below the pubic symphysis. The angle at which they converge is known as the subpubic angle.
Function
The pubic arch is one of three notches (the one in front) that separate the eminences of the lower circumference of the true pelvis.
Clinical significance
Subpubic angle
The subpubic angle (or pubic angle) is the angle in the human body as the apex of the pubic arch, formed by the convergence of the inferior rami of the ischium and pubis on either side. The subpubic angle is important in forensic anthropology, in determining the sex of someone from skeletal remains. A subpubic angle of 50–82 degrees indicates a male; an angle of 90 degrees indicates a female. Other sources operate with 50–60 degrees for males and 70–90 degrees in females. Women have wider hips, and thus a greater subpubic angle, in order to allow for child birth.
Intrapubic angle
|
https://en.wikipedia.org/wiki/Ocean%20fertilization
|
Ocean fertilization or ocean nourishment is a type of technology for carbon dioxide removal from the ocean based on the purposeful introduction of plant nutrients to the upper ocean to increase marine food production and to remove carbon dioxide from the atmosphere. Ocean nutrient fertilization, for example iron fertilization, could stimulate photosynthesis in phytoplankton. The phytoplankton would convert the ocean's dissolved carbon dioxide into carbohydrate, some of which would sink into the deeper ocean before oxidizing. More than a dozen open-sea experiments confirmed that adding iron to the ocean increases photosynthesis in phytoplankton by up to 30 times.
This is one of the more well-researched carbon dioxide removal (CDR) approaches, however this approach would only sequester carbon on a timescale of 10-100 years dependent on ocean mixing times. While surface ocean acidity may decrease as a result of nutrient fertilization, when the sinking organic matter remineralizes, deep ocean acidity will increase. A 2021 report on CDR indicates that there is medium-high confidence that the technique could be efficient and scalable at low cost, with medium environmental risks. One of the key risks of nutrient fertilization is nutrient robbing, a process by which excess nutrients used in one location for enhanced primary productivity, as in a fertilization context, are then unavailable for normal productivity downstream. This could result in ecosystem impacts far outside the original site of fertilization.
A number of techniques, including fertilization by the micronutrient iron (called iron fertilization) or with nitrogen and phosphorus (both macronutrients), have been proposed. But research in the early 2020s suggested that it could only permanently sequester a small amount of carbon. Therefore, there is no major future in its role to sequester carbon.
Rationale
The marine food chain is based on photosynthesis by marine phytoplankton that combine carbon with in
|
https://en.wikipedia.org/wiki/Pazend
|
Pazend () or Pazand (; ) is one of the writing systems used for the Middle Persian language. It was based on the Avestan alphabet, a phonetic alphabet originally used to write Avestan, the language of the Avesta, the primary sacred texts of Zoroastrianism.
Pazend's principal use was for writing the commentaries (Zend) on and/or translations of the Avesta. The word "Pazend" ultimately derives from the Avestan words paiti zainti, which can be translated as either "for commentary purposes" or "according to understanding" (phonetically).
Pazend had the following characteristics, both of which are to be contrasted with Pahlavi, which is one of the other systems used to write Middle Persian:
Pazend was a variant of the Avestan alphabet (Din dabireh), which was a phonetic alphabet. In contrast, Pahlavi script was only an abjad.
Pazend did not have ideograms. In contrast, ideograms were an identifying feature of the Pahlavi system, and these huzvarishn were words borrowed from Semitic languages such as Aramaic that continued to be spelled as in Aramaic (in Pahlavi script) but were pronounced as the corresponding word in Persian.
In combination with its religious purpose, these features constituted a "sanctification" of written Middle Persian. The use of the Avestan alphabet to write Middle Persian required the addition of one symbol to the Avestan alphabet: This character, to represent the phoneme of Middle Persian, had not previously been needed.
Following the fall of the Sassanids, after which Zoroastrianism came to be gradually supplanted by Islam, Pazend lost its purpose and soon ceased to be used for original composition. In the late 11th or early 12th century, Indian Zoroastrians (the Parsis) began translating Avestan or Middle Persian texts into Sanskrit and Gujarati. Some Middle Persian texts were also transcribed into the Avestan alphabet. The latter process, being a form of interpretation, was known as 'pa-zand'. "Pazand texts, transcribed phonetically, re
|
https://en.wikipedia.org/wiki/Index%20of%20biotechnology%20articles
|
Biotechnology is a technology based on biology, especially when used in agriculture, food science, and medicine.
Of the many different definitions available, the one formulated by the UN Convention on Biological Diversity is one of the broadest:
"Biotechnology means any technological application that uses biological systems, living organisms, or derivatives thereof, to make or modify products or processes for specific use." (Article 2. Use of Terms)
More about Biotechnology...
This page provides an alphabetical list of articles and other pages (including categories, lists, etc.) about biotechnology.
A
Agrobacterium -- Affymetrix -- Alcoholic beverages -- :Category:Alcoholic beverages -- Amgen -- Antibiotic -- Artificial selection
B
Biochemical engineering -- Biochip -- Biodiesel -- Bioengineering -- Biofuel -- Biogas -- Biogen Idec -- Bioindicator -- Bioinformatics -- :Category:Bioinformatics -- Bioleaching -- Biological agent -- Biological warfare -- Bioluminescence -- Biomimetics -- Bionanotechnology -- Bionics --Biopharmacology -- Biophotonics -- Bioreactor -- Bioremediation -- Biostimulation -- Biosynthesis -- Biotechnology -- :Category:Biotechnology -- :Category:Biotechnology companies -- :Category:Biotechnology products -- Bt corn
C
Cancer immunotherapy -- Cell therapy -- Chimera (genetics) -- Chinese hamster -- Chinese Hamster Ovary cell -- Chiron Corp. -- Cloning -- Compost -- Composting -- Convention on Biological Diversity -- Chromatography
D
Directive on the patentability of biotechnological inventions -- DNA microarray -- Dwarfing
E
Enzymes -- Electroporation -- Environmental biotechnology -- Eugenics
F
Fermentation -- :Category:Fermented foods
G
Gene knockout -- Gene therapy -- Genentech -- Genetic engineering -- Genetically modified crops --Genetically modified food -- Genetically modified food controversies -- Genetically modified organisms -- Genetics -- Genomics -- Genzyme -- Global Knowledge Center on Crop Biotechnology - Glycomic
|
https://en.wikipedia.org/wiki/Shridhar%20Chillal
|
Shridhar Chillal (born 29 January 1937) is an Indian man from the city of Pune, who held the world record for the longest fingernails ever reached on a single hand, with a combined length of 909.6 centimeters (358.1 inches). Chillal's longest single nail is his thumbnail, measuring 197.8 centimeters (77.87 inches). He stopped cutting his nails in 1952.
Although proud of his record-breaking nails, Chillal has faced increasing difficulties due to the weight of his finger nails, including disfigurement of his fingers and loss of function in his left hand. He claims that nerve damage to his left arm from the nails' immense weight has also caused deafness in his left ear.
Chillal has appeared in films and television displaying his nails, such as Jackass 2.5.
On 11 July 2018, Chillal had his fingernails cut with a power tool at the Ripley's Believe It or Not! museum in New York City, where the nails will be put on display. A technician wearing protective gear cut the nails during a "nail clipping ceremony".
See also
Lee Redmond, who held the record for the longest fingernails on both hands.
|
https://en.wikipedia.org/wiki/Body%20of%20femur
|
In human anatomy, the body of femur (or shaft of femur) is the almost cylindrical, long part of the femur. It is a little broader above than in the center, broadest and somewhat flattened from before backward below. It is slightly arched, so as to be convex in front, and concave behind, where it is strengthened by a prominent longitudinal ridge, the linea aspera.
It presents for examination three borders, separating three surfaces.
Of the borders, one, the linea aspera, is posterior, one is medial, and the other, lateral.
Borders
The borders of the femur are the linea aspera, a medial border, and a lateral border.
Linea aspera border
The linea aspera is a prominent longitudinal ridge or crest, on the middle third of the bone, presenting a medial and a lateral lip, and a narrow rough, intermediate line.
Above, the linea aspera is prolonged by three ridges.
The lateral ridge termed the gluteal tuberosity is very rough, and runs almost vertically upward to the base of the greater trochanter. It gives attachment to part of the gluteus maximus: its upper part is often elongated into a roughened crest, on which a more or less well-marked, rounded tubercle, the third trochanter, is occasionally developed.
The intermediate ridge or pectineal line is continued to the base of the lesser trochanter and gives attachment to the pectineus; the medial ridge is lost in the intertrochanteric line; between these two a portion of the iliacus is inserted.
Below, the linea aspera is prolonged into two ridges, enclosing between them a triangular area, the popliteal surface, upon which the popliteal artery rests.
Of these two ridges, the lateral is the more prominent, and descends to the summit of the lateral condyle.
The medial is less marked, especially at its upper part, where it is crossed by the femoral artery.
It ends below at the summit of the medial condyle, in a small tubercle, the adductor tubercle, which affords insertion to the tendon of the adductor magnus.
From t
|
https://en.wikipedia.org/wiki/Rude%20Dog
|
Rude Dog is a fictional animated white dog originally created by artist Brad McMahon while under contract to Sun Sportswear in the 1980s as part of a line of surfing- and skateboarding-related clothing. As of 30 August 2015, Rude Dog was once again trademarked, this time in the name of original series/character creator Brad McMahon. McMahon also created Rude Dog's gang of canine misfits known as "the Dweebs", as well as Seymour, Rude Dog's nemesis.
Sun Sportswear projects
Rude Dog and the Dweebs
Adult animated series revival
On April 28, 2022, it was announced Rude Dog will be revived as an adult animated series.
Reception
In 2014, listing it among 12 1980s cartoons that did not deserve remembrance, io9 characterized the series as "an animated atrocity", noting that the series appeared to glorify the "rudeness" that was the main character's defining characteristic.
|
https://en.wikipedia.org/wiki/Lower%20extremity%20of%20femur
|
The lower extremity of femur (or distal extremity) is the lower end of the femur (thigh bone) in human and other animals, closer to the knee. It is larger than the upper extremity of femur, is somewhat cuboid in form, but its transverse diameter is greater than its antero-posterior; it consists of two oblong eminences known as the lateral condyle and medial condyle.
Condyles
Anteriorly, the condyles are slightly prominent and are separated by a smooth shallow articular depression called the patella surface. Posteriorly, they project considerably and a deep notch, the intercondylar fossa of femur, is present between them.
The lateral condyle is the more prominent and is the broader both in its antero-posterior and transverse diameters, the medial condyle is the longer and, when the femur is held with its body perpendicular, projects to a lower level.
When, however, the femur is in its natural oblique position the lower surfaces of the two condyles lie practically in the same horizontal plane.
The condyles are not quite parallel with one another; the long axis of the lateral is almost directly antero-posterior, but that of the medial runs backward and medialward.
Their opposed surfaces are small, rough, and concave, and form the walls of the intercondylar fossa.
This fossa is limited above by a ridge, the intercondyloid line, and below by the central part of the posterior margin of the patellar surface.
The posterior cruciate ligament of the knee joint is attached to the lower and front part of the medial wall of the fossa and the anterior cruciate ligament to an impression on the upper and back part of its lateral wall.
Epicondyles
Each condyle is surmounted by an elevation, the epicondyle.
The medial epicondyle is a large convex eminence to which the medial collateral ligament of the knee-joint is attached.
At its upper part is the adductor tubercle, and behind it is a rough impression which gives origin to the medial head of the gastrocnemius.
The late
|
https://en.wikipedia.org/wiki/Wing%20of%20ilium
|
The wing (ala) of ilium is the large expanded portion of the ilium, the bone which bounds the greater pelvis laterally. It presents for examination two surfaces—an external and an internal—a crest, and two borders—an anterior and a posterior.
External surface
The external surface, known as the dorsum ossis ilium, is directed backward and lateralward behind, and downward and lateralward in front.
It is smooth, convex in front, deeply concave behind; bounded above by the crest, below by the upper border of the acetabulum, in front and behind by the anterior and posterior borders.
This surface is crossed in an arched direction by three lines—the posterior, anterior, and inferior gluteal lines.
The posterior gluteal line (superior curved line), the shortest of the three, begins at the crest, about 5 cm in front of its posterior extremity; it is at first distinctly marked, but as it passes downward to the upper part of the greater sciatic notch, where it ends, it becomes less distinct, and is often altogether lost.
Behind this line is a narrow semilunar surface, the upper part of which is rough and gives origin to a portion of the gluteus maximus; the lower part is smooth and has no muscular fibers attached to it.
The anterior gluteal line (middle curved line), the longest of the three, begins at the crest, about 4 cm behind its anterior extremity, and, taking a curved direction downward and backward, ends at the upper part of the greater sciatic notch.
The space between the anterior and posterior gluteal lines and the crest is concave, and gives origin to the gluteus medius.
Near the middle of this line a nutrient foramen is often seen.
The inferior gluteal line (inferior curved line), the least distinct of the three, begins in front at the notch on the anterior border, and, curving backward and downward, ends near the middle of the greater sciatic notch.
The surface of bone included between the anterior and inferior gluteal lines is concave from above downwar
|
https://en.wikipedia.org/wiki/Extension%20%28telephone%29
|
In residential telephony, an extension telephone is an additional telephone wired to the same telephone line as another. In middle 20th century telephone jargon, the first telephone on a line was a "Main Station" and subsequent ones "Extensions" or even called as intercom. Such extension phones allow making or receiving calls in different rooms, for example in a home, but any incoming call would ring all extensions and any one extension being in use would cause the line to be busy for all users. Some telephones intended for use as extensions have built in intercom features; a key telephone system for a small business may offer two to five lines, lamps indicating lines already in use, the ability to place calls on 'hold' and an intercom on each of the multiple extensions.
In business telephony, a telephone extension may refer to a phone on an internal telephone line attached to a private branch exchange (PBX) or Centrex system. The PBX operates much as a community switchboard does for a geographic telephone numbering plan and allows multiple lines inside the office to connect without each phone requiring a separate outside line. In these systems, one usually has to dial a number (typically 9 in North America, 0 in Europe) to tell the PBX to connect with an outside landline (also called DDCO, or Direct Dial Central Office) to dial an external number. Within the PBX, the user merely dials the extension number to reach any other user directly. For inbound calls, a switchboard operator or automated attendant may request the number of the desired extension or the call may be completed with direct inbound dialing, if outside numbers are assigned to individual extensions.
An off-premises extension, where a worker at a remote location employs a telephone configured to appear as if it were an extension located at the main business site, may be created in analog telephony by using a leased line to connect the extension to the main enterprise system. Voice over IP makes th
|
https://en.wikipedia.org/wiki/Bicomplex%20number
|
In abstract algebra, a bicomplex number is a pair of complex numbers constructed by the Cayley–Dickson process that defines the bicomplex conjugate , and the product of two bicomplex numbers as
Then the bicomplex norm is given by
a quadratic form in the first component.
The bicomplex numbers form a commutative algebra over C of dimension two, which is isomorphic to the direct sum of algebras .
The product of two bicomplex numbers yields a quadratic form value that is the product of the individual quadratic forms of the numbers:
a verification of this property of the quadratic form of a product refers to the Brahmagupta–Fibonacci identity. This property of the quadratic form of a bicomplex number indicates that these numbers form a composition algebra. In fact, bicomplex numbers arise at the binarion level of the Cayley–Dickson construction based on with norm z2.
The general bicomplex number can be represented by the matrix , which has determinant . Thus, the composing property of the quadratic form concurs with the composing property of the determinant.
Bicomplex numbers feature two distinct imaginary units. Multiplication being associative and commutative, the product of these imaginary units must have positive one for its square. Such an element as this product has been called a hyperbolic unit.
As a real algebra
Bicomplex numbers form an algebra over C of dimension two, and since C is of dimension two over R, the bicomplex numbers are an algebra over R of dimension four. In fact the real algebra is older than the complex one; it was labelled tessarines in 1848 while the complex algebra was not introduced until 1892.
A basis for the tessarine 4-algebra over R specifies z = 1 and z = −i, giving the matrices
, which multiply according to the table given. When the identity matrix is identified with 1, then a tessarine t = w + z j .
History
The subject of multiple imaginary units was examined in the 1840s. In a long series "On quaternions, or on a new
|
https://en.wikipedia.org/wiki/U.S.%20Poultry%20%26%20Egg%20Association
|
The U.S. Poultry & Egg Association is an American industry trade group located in Tucker, Georgia that "represents its poultry and egg members through research, education, communications and technical services."
Founded in 1947, it is the world's largest and most active poultry organization. Billed as an "All Feather" association, membership includes producers and processors of broilers, turkeys, ducks, eggs, and breeding stock, as well as allied companies.
It currently has affiliations in 26 states and member companies worldwide. They also sponsor the International Poultry Expo.
The group posts position papers on topics related to poultry and egg production, including controversial and timely topics such as factory farming, genetically modified organisms, induced molting for egg-laying chickens, regulatory efforts, and avian influenza.
External links
U.S. Poultry & Egg Association
International Poultry Expo
Food technology organizations
Food industry trade groups
Egg organizations
Poultry organizations
Companies based in Tucker, Georgia
Tucker, Georgia
|
https://en.wikipedia.org/wiki/Vesicular%20monoamine%20transporter%202
|
The solute carrier family 18 member 2 (SLC18A2) also known as vesicular monoamine transporter 2 (VMAT2) is a protein that in humans is encoded by the SLC18A2 gene. SLC18A2 is an integral membrane protein that transports monoamines—particularly neurotransmitters such as dopamine, norepinephrine, serotonin, and histamine—from cellular cytosol into synaptic vesicles. In nigrostriatal pathway and mesolimbic pathway dopamine-releasing neurons, SLC18A2 function is also necessary for the vesicular release of the neurotransmitter GABA.
Binding sites and ligands
SLC18A2 is believed to possess at least two distinct binding sites, which are characterized by tetrabenazine (TBZ) and reserpine binding to the transporter. Amphetamine (TBZ site) and methamphetamine (reserpine site) bind at distinct sites on SLC18A2 to inhibit its function. SLC18A2 inhibitors like tetrabenazine and reserpine reduce the concentration of monoamine neurotransmitters in the synaptic cleft by inhibiting uptake through SLC18A2; the inhibition of SLC18A2 uptake by these drugs prevents the storage of neurotransmitters in synaptic vesicles and reduces the quantity of neurotransmitters that are released through exocytosis. Although many substituted amphetamines induce the release of neurotransmitters from vesicles through SLC18A2 while inhibiting uptake through SLC18A2, they may facilitate the release of monoamine neurotransmitters into the synaptic cleft by simultaneously reversing the direction of transport through the primary plasma membrane transport proteins for monoamines (i.e., the dopamine transporter, norepinephrine transporter, and serotonin transporter) in monoamine neurons. Other SLC18A2 inhibitors such as GZ-793A inhibit the reinforcing effects of methamphetamine, but without producing stimulant or reinforcing effects themselves.
Researchers have found that inhibiting the dopamine transporter (but not SLC18A2) will block the effects of amphetamine and cocaine; while, in another experiment, obse
|
https://en.wikipedia.org/wiki/9-Pin%20Protocol
|
The Sony 9-Pin Protocol or P1 protocol is a two-way communications protocol to control advanced video recorders. Sony introduced this protocol to control reel-to-reel type C video tape recorders (VTR) as well as videocassette recorders (VCR). It uses an DE-9 D-Sub connector with 9 pins (hence the name), where bi-directional communication takes place over a four wire cable according to the RS-422 standard.
While nowadays all post-production editing is done with a non-linear editing system, in those days editing was done linearly, using online editing. Editing machines relied heavily on the 9-Pin Protocol to remotely control automatic players and recorders.
Many modern hard disk recorders and solid-state drive recorders can still emulate a 1982 Sony BVW-75 Betacam tape recorder.
Sony's standard also specifies a pinout:
This 9-pin RS-422 pinout has become a de facto standard, used by most brands in the broadcast industry. In the new millennium, RS-422 is slowly phased out in favor of Ethernet for control functions. However its simple way to perform troubleshooting means it will stay around for a long time.
In broadcast automation the Video Disk Control Protocol (VDCP) use the 9-Pin Protocol to playout broadcast programming schedules.
External links
Sony 9-Pin Remote Protocol (Archived)
Copy of Sony 9-Pin Remote Protocol
Brainboxes serial port 9-pin protocol support
Drastic support of 9-pin protocol
Blackmagic Decklink (a video capture/generation card) support of 9-pin protocol
Blackmagic Hyperdeck (an SSD recorder) support of 9-pin protocol
Ross Kiva (a presentation server) RS-422 9-pin connector
JLCooper
Grass Valley K2 Summit (a media server) RS-422 connections
|
https://en.wikipedia.org/wiki/External%20ray
|
An external ray is a curve that runs from infinity toward a Julia or Mandelbrot set.
Although this curve is only rarely a half-line (ray) it is called a ray because it is an image of a ray.
External rays are used in complex analysis, particularly in complex dynamics and geometric function theory.
History
External rays were introduced in Douady and Hubbard's study of the Mandelbrot set
Types
Criteria for classification :
plane : parameter or dynamic
map
bifurcation of dynamic rays
Stretching
landing
plane
External rays of (connected) Julia sets on dynamical plane are often called dynamic rays.
External rays of the Mandelbrot set (and similar one-dimensional connectedness loci) on parameter plane are called parameter rays.
bifurcation
Dynamic ray can be:
bifurcated = branched = broken
smooth = unbranched = unbroken
When the filled Julia set is connected, there are no branching external rays. When the Julia set is not connected then some external rays branch.
stretching
Stretching rays were introduced by Branner and Hubbard:
"The notion of stretching rays is a generalization of that of external rays for the Mandelbrot set to higher degree polynomials."
landing
Every rational parameter ray of the Mandelbrot set lands at a single parameter.
Maps
Polynomials
Dynamical plane = z-plane
External rays are associated to a compact, full, connected subset of the complex plane as :
the images of radial rays under the Riemann map of the complement of
the gradient lines of the Green's function of
field lines of Douady-Hubbard potential
an integral curve of the gradient vector field of the Green's function on neighborhood of infinity
External rays together with equipotential lines of Douady-Hubbard potential ( level sets) form a new polar coordinate system for exterior ( complement ) of .
In other words the external rays define vertical foliation which is orthogonal to horizontal foliation defined by the level sets of potential.
Uniformization
|
https://en.wikipedia.org/wiki/Ranked%20lists%20of%20country%20subdivisions
|
Ranked lists of country subdivisions.
Economics
List of country subdivisions by GDP
List of country subdivisions by GDP over 100 billion US dollars
List of governments in Canada by annual expenditures
List of Romanian counties by foreign trade
List of Ukrainian oblasts and territories by salary
Geography
List of Brazilian states by highest point
Population
List of federal subjects of Russia by population
List of South African provinces by population density
List of U.S. states by population density
See also
International rankings by country
country subdivisions
|
https://en.wikipedia.org/wiki/Arithmetica%20Universalis
|
Arithmetica Universalis ("Universal Arithmetic") is a mathematics text by Isaac Newton. Written in Latin, it was edited and published by William Whiston, Newton's successor as Lucasian Professor of Mathematics at the University of Cambridge. The Arithmetica was based on Newton's lecture notes.
Whiston's original edition was published in 1707. It was translated into English by Joseph Raphson, who published it in 1720 as the Universal Arithmetick. John Machin published a second Latin edition in 1722.
None of these editions credit Newton as author; Newton was unhappy with the publication of the Arithmetica, and so refused to have his name appear. In fact, when Whiston's edition was published, Newton was so upset he considered purchasing all of the copies so he could destroy them.
The Arithmetica touches on algebraic notation, arithmetic, the relationship between geometry and algebra, and the solution of equations. Newton also applied Descartes' rule of signs to imaginary roots. He also offered, without proof, a rule to determine the number of imaginary roots of polynomial equations. A rigorous proof of Newton's counting formula for equations up to and including the fifth degree was published by James Joseph Sylvester in 1864.
|
https://en.wikipedia.org/wiki/Deborah%20M.%20Gordon
|
Deborah M. Gordon (born December 30, 1955) is a biologist, appointed as a professor in the Department of Biology at Stanford University.
Major research
Gordon studies ant colony behavior and ecology, with a particular focus on red harvester ants. She focuses on the developing behavior of colonies, even as individual ants change functions within their own lifetimes.
Gordon's fieldwork includes a long-term study of ant colonies in Arizona. She is the author of numerous articles and papers as well as the book Ants at Work for the general public, and she was profiled in The New York Times Magazine in 1999.
In 2012, she found that the foraging behavior of red harvester ants matches the TCP congestion control algorithm.
Education
Gordon received a Ph.D. in zoology from Duke in 1983, an M.Sc. in Biology from Stanford in 1977 and a bachelor's degree from Oberlin College, where she majored in French.
She was a junior fellow of the Harvard Society of Fellows.
Awards and recognition
In 1993, Gordon was named a Stanford MacNamara Fellow. In 1995 Gordon received an award for teaching excellence from the Phi Beta Kappa Northern California Association. In 2001 Gordon was awarded a Guggenheim fellowship from the John Simon Guggenheim Memorial Foundation. In 2003, Gordon was invited to speak at a TED conference. She is also an adviser to the Microbes Mind Forum.
Bibliography
|
https://en.wikipedia.org/wiki/Truth%20predicate
|
In formal theories of truth, a truth predicate is a fundamental concept based on the sentences of a formal language as interpreted logically. That is, it formalizes the concept that is normally expressed by saying that a sentence, statement or idea "is true."
Languages which allow a truth predicate
Based on "Chomsky Definition", a language is assumed to be a countable set of sentences, each of finite length, and constructed out of a countable set of symbols. A theory of syntax is assumed to introduce symbols, and rules to construct well-formed sentences. A language is called fully interpreted if meanings are attached to its sentences so that they all are either true or false.
A fully interpreted language L which does not have a truth predicate can be extended to a fully interpreted language Ľ
that contains a truth predicate T, i.e., the sentence A ↔ T(⌈A⌉) is true for every sentence A of Ľ, where T(⌈A⌉) stands for "the sentence (denoted by) A is true". The main tools to prove this result are ordinary and transfinite induction, recursion methods, and ZF set theory (cf.
and ).
See also
Pluralist theory of truth
|
https://en.wikipedia.org/wiki/Soil%20ecology
|
Soil ecology is the study of the interactions among soil organisms, and between biotic and abiotic aspects of the soil environment. It is particularly concerned with the cycling of nutrients, formation and stabilization of the pore structure, the spread and vitality of pathogens, and the biodiversity of this rich biological community.
Overview
Soil is made up of a multitude of physical, chemical, and biological entities, with many interactions occurring among them. Soil is a variable mixture of broken and weathered minerals and decaying organic matter. Together with the proper amounts of air and water, it supplies, in part, sustenance for plants as well as mechanical support.
The diversity and abundance of soil life exceeds that of any other ecosystem. Plant establishment, competitiveness, and growth is governed largely by the ecology below-ground, so understanding this system is an essential component of plant sciences and terrestrial ecology.
Features of the ecosystem
Moisture is a major limiting factor on land. Terrestrial organisms are constantly confronted with the problem of dehydration. Transpiration or evaporation of water from plant surfaces is an energy dissipating process unique to the terrestrial environment.
Temperature variations and extremes are more pronounced in the air than in the water medium.
On the other hand, the rapid circulation of air throughout the globe results in a ready mixing and remarkably constant content of oxygen and carbon dioxide.
Although soil offers solid support, air does not. Strong skeletons have been evolved in both land plants and animals and also special means of locomotion have been evolved in the latter.
Land, unlike the ocean, is not continuous; there are important geographical barriers to free movement.
The nature of the substrate, although important in water is especially vital in terrestrial environment. Soil, not air, is the source of highly variable nutrients; it is a highly developed ecological subsystem.
|
https://en.wikipedia.org/wiki/Typicity
|
Typicity (French typicité, Italian tipicità) is a term in wine tasting used to describe the degree to which a wine reflects its varietal origins and thus demonstrates the signature characteristics of the grape from which it was produced, e.g., how much a Merlot wine “tastes like a Merlot”. It is an important component in judging wine competition when wines of the same variety are judged against each other.
In some countries, such as Austria, typicity is used as part of a qualitative hierarchy that takes into consideration soil, climate and vintage. A similar concept to the French terroir, though slightly less controversial, Austrian Qualitätswein (literally "quality wine") is tested for typicity with the classification printed on the wine label.
As a concept, typicity relies on both historical precedent and a sentiment of what the present-day majority view how a certain variety should “taste”. This can be considered a subjective and unreliable way to measure wine, opening the door to elitism with what has been criticized by some, such as Sean Thackrey, as viticultural racism.
|
https://en.wikipedia.org/wiki/Homestake%20experiment
|
The Homestake experiment (sometimes referred to as the Davis experiment or Solar Neutrino Experiment and in original literature called Brookhaven Solar Neutrino Experiment or Brookhaven 37Cl (Chlorine) Experiment ) was an experiment headed by astrophysicists Raymond Davis, Jr. and John N. Bahcall in the late 1960s. Its purpose was to collect and count neutrinos emitted by nuclear fusion taking place in the Sun. Bahcall performed the theoretical calculations and Davis designed the experiment. After Bahcall calculated the rate at which the detector should capture neutrinos, Davis's experiment turned up only one third of this figure. The experiment was the first to successfully detect and count solar neutrinos, and the discrepancy in results created the solar neutrino problem. The experiment operated continuously from 1970 until 1994. The University of Pennsylvania took it over in 1984. The discrepancy between the predicted and measured rates of neutrino detection was later found to be due to neutrino "flavour" oscillations.
Methodology
The experiment took place in the Homestake Gold Mine in Lead, South Dakota. Davis placed a 380 cubic meter (100,000 gallon) tank of perchloroethylene, a common dry-cleaning fluid, 1,478 meters (4,850 feet) underground. A big target deep underground was needed to prevent interference from cosmic rays, taking into account the very small probability of a successful neutrino capture, and, therefore, very low effect rate even with the huge mass of the target. Perchloroethylene was chosen because it is rich in chlorine. Upon interaction with an electron neutrino, a 37Cl atom transforms into a radioactive isotope of 37Ar, which can then be extracted and counted. The reaction of the neutrino capture is
The reaction threshold is 0.814 MeV, i.e. the neutrino should have at least this energy to be captured by the 37Cl nucleus.
Because 37Ar has a half-life of 35 days, every few weeks, Davis bubbled helium through the tank to collect the argon th
|
https://en.wikipedia.org/wiki/VAXmate
|
VAXmate was an IBM PC/AT compatible personal computer introduced by Digital Equipment Corporation in September, 1986. The replacement to the Rainbow 100, in its standard form it was the first commercial diskless personal computer.
OS and files
The operating system and files could be served from a VAX/VMS server running the company's VAX/VMS Services for MS-DOS software, which went through several name changes, finally becoming Pathworks. Alternatively an optional expansion box containing either 20 MB or 40 MB hard disk could be purchased which allowed it to operate as a more conventional stand-alone PC.
Original specifications
The basic system contained an 8 MHz Intel 80286 CPU with 1 Mbyte of RAM, a 1.2 MB RX33 5¼-inch floppy disk drive, a 14-inch (diagonal) amber or green monochrome CRT and a thinwire Ethernet interface all contained in the system unit. It was also provided with a parallel printer port and a serial communications port. A separate mouse and LK250 keyboard was used with the device.
As well as the expansion box, an 80287 numeric coprocessor could be ordered as an option, and the memory could be expanded by 2 MB with another option to 3 MB. In North America, an internal modem was also available.
DECstation
It was superseded by the DECstation 200 and 300 in January 1989.
|
https://en.wikipedia.org/wiki/JXplorer
|
JXplorer is a free, open-source client for browsing Lightweight Directory Access Protocol (LDAP) servers and LDAP Data Interchange Format (LDIF) files. It is released under an Apache-equivalent license. JXplorer is written in Java and is platform independent, configurable, and has been translated into a number of languages. In total, as of 2018, JXplorer has been downloaded over 2 million times from SourceForge and is bundled with several Linux distributions.
Several common Linux distributions include JXplorer Software for LDAP server administration. The software also runs on BSD-variants, AIX, HP-UX, OS X, Solaris, Windows (2000, XP) and z/OS.
Key features are:
SSL, SASL and GSSAPI
DSML
LDIF
Localisation (currently available in German, French, Japanese, Traditional Chinese, Simplified Chinese, Hungarian);
Optional LDAP filter constructor GUI; extensible architecture
The primary authors and maintainers are Chris Betts and Trudi Ersvaer, originally both working in the CA (then Computer Associates) Directory (now CA Directory) software lab in Melbourne, Australia. Version 3.3, the '10th Anniversary Edition' was released in July 2012.
See also
List of LDAP software
|
https://en.wikipedia.org/wiki/Network%20Device%20Control%20Protocol
|
Network Device Control Protocol (NDCP) was designed by Laurent Grumbach who at the time was an engineer with Harris Broadcast. Previous to that he had worked for Louth Automation which was acquired by Harris. NDCP was designed to be a network based protocol instead of the traditional serial connection protocols to Broadcast devices. NDCP was an XML compliant protocol and loosely based on the concepts of SOAP. The intent was that vendors would standardize their Broadcast devices on a single protocol instead of each vendor offering proprietary protocols for their devices. The use of a network based protocol would also allow the devices to be remote from the controlling application and not limited by the connection length of an RS422 serial line.
External links
Harris Corporation Launches New, Network-Based Automation Protocol for Controlling Broadcast Audio and Video Devices
RDD 38:2016 - SMPTE Registered Disclosure Docs - Networked Device Control Protocol — Message Data Structure and Method of Communication
Network protocols
|
https://en.wikipedia.org/wiki/Michel%20Jouvet
|
Michel Valentin Marcel Jouvet (16 November 1925 – 3 October 2017) was a French neuroscientist and medical researcher.
His works, and those of his team, have brought about the discovery of paradoxical sleep (a term he coined) and to its individualisation as the third state of functioning of the brain (1959), to the discovery of its phylogenesis, of its ontogenesis and its main mechanisms. Jouvet was the researcher who first developed the analeptic drug Modafinil.
Career
Jouvet was Professor of Experimental Medicine at the University of Lyon. He was Director of the Research Unit INSERM U 52 (Molecular Onirology) and of the Associated Unit UA 1195 of the CNRS (states of vigilance neurobiology). He spent one year in the laboratory of Horace Magoun in Long Beach, California in 1955. He then undertook research in both experimental neurophysiology at the Faculty of Medicine of Lyon and clinical neurophysiology at the Neurological Hospital of Lyon.
He described the electroencephalogram signs of cerebral death in 1959, and in 1961 categorized sleep into two different states: telencephalic (slow wave) sleep and rhombencephalic sleep (paradoxical sleep, known as REM sleep in English-language writings on the subject). He mapped the areas of the brain that are responsible for REM.
His review "Paradoxical sleep mechanisms" was published in the journal Sleep in 1994. In The Paradox of Sleep (MIT Press, 1999) Jouvet proposed the speculative theory that the purpose of dreaming is a kind of iterative neurological programming that works to preserve an individual's psychological heredity, the basis of personality. He also wrote a novel, The Castle of Dreams.
In 1959, Jouvet conducted several experiments on cats regarding muscle atonia (paralysis) during REM sleep. Jouvet demonstrated that the generation of REM sleep depends on an intact pontine tegmentum and that REM atonia is due to an inhibition of motor centres in the medulla oblongata. Cats with lesions around the locus coer
|
https://en.wikipedia.org/wiki/Glycoconjugate
|
Glycoconjugates are the classification family for carbohydrates – referred to as glycans – which are covalently linked with chemical species such as proteins, peptides, lipids, and other compounds. Glycoconjugates are formed in processes termed glycosylation.
Glycoconjugates are very important compounds in biology and consist of many different categories such as glycoproteins, glycopeptides, peptidoglycans, glycolipids, glycosides, and lipopolysaccharides. They are involved in cell–cell interactions, including cell–cell recognition; in cell–matrix interactions; in detoxification processes.
Generally, the carbohydrate part(s) play an integral role in the function of a glycoconjugate; prominent examples of this are neural cell adhesion molecule (NCAM) and blood proteins where fine details in the carbohydrate structure determine cell binding (or not) or lifetime in circulation.
Although the important molecular species DNA, RNA, ATP, cAMP, cGMP, NADH, NADPH, and coenzyme A all contain a carbohydrate part, generally they are not considered as glycoconjugates.
Glycocojugates is covalent linking of carbohydrates antigens to protein scaffolds with goal of achieving a long term immunological response in body. Immunization with glycoconjugates successfully induced long term immune memory against carbohydrates antigens. Glycoconjugate vaccines was introduced since the 1990s have yielded effective results against influenza and meningococcus.
In 2021 glycoRNAs were observed for the first time.
|
https://en.wikipedia.org/wiki/Fumed%20silica
|
Fumed silica (CAS number 112945-52-5), also known as pyrogenic silica because it is produced in a flame, consists of microscopic droplets of amorphous silica fused into branched, chainlike, three-dimensional secondary particles which then agglomerate into tertiary particles. The resulting powder has an extremely low bulk density and high surface area. Its three-dimensional structure results in viscosity-increasing, thixotropic behavior when used as a thickener or reinforcing filler.
Properties
Fumed silica has a very strong thickening effect. Primary particle size is 5–50 nm. The particles are non-porous and have a surface area of 50–600 m2/g. The density is 160–190 kg/m3.
Production
Fumed silica is made from flame pyrolysis of silicon tetrachloride or from quartz sand vaporized in a 3000 °C electric arc. Major global producers are Evonik (who sells it under the name Aerosil), Cabot Corporation (Cab-O-Sil), Wacker Chemie (HDK), Dow Corning, Heraeus (Zandosil), Tokuyama Corporation (Reolosil), OCI (Konasil), Orisil (Orisil) and Xunyuchem(XYSIL).
Applications
Fumed silica serves as a universal thickening agent and an anticaking agent (free-flow agent) in powders. Like silica gel, it serves as a desiccant. It is used in cosmetics for its light-diffusing properties. It is used as a light abrasive, in products like toothpaste. Other uses include filler in silicone elastomer and viscosity adjustment in paints, coatings, printing inks, adhesives and unsaturated polyester resins. Fumed silica readily forms a network structure within bitumen and enhances its elasticity.
Health issues
Fumed silica is not listed as a carcinogen by OSHA, IARC, or NTP. Due to its fineness and thinness, fumed silica can easily become airborne, making it an inhalation hazard, capable of causing irritation.
See also
Hydrophobic silica
Precipitated silica
Nanoparticles
|
https://en.wikipedia.org/wiki/Macadamia%20oil
|
Macadamia oil (or macadamia nut oil) is the non-volatile oil collected from the nuts of the macadamia (Macadamia integrifolia), a native Australian plant. It is used in food as a frying or salad oil, and in cosmetic formulations as an emollient or fragrance fixative.
Description
Fruits
Macadamia integrifolia is an Australian tree with holly-like leaves that grows well in a moist organic soil and can withstand temperatures as low as −4.4 °C (24 °F). Seedlings bear in 5–7 years. The fruit is borne in a case enclosing an extremely hard spherical nut. The kernel is whitish, sweet and eaten raw or roasted. The flowers are white to cream and the leaves are in whorls of three. Propagation is by seed, grafting or air layering. It is grown commercially.
Common names of the trees are the Australian nut or the Queensland nut. Species that are “smooth shelled macadamia” are called Macadamia integrifolia and “rough shelled macadamia” are called Macadamia tetraphylla. Macadamia ternifolia is also the name used for M. integrifolia. Macadamia integrifolia is native to Australia where it grows in rain forests and close to streams. Macadamia tetraphylla is native to Southeastern Queensland and Northeastern New South Wales.
Oil
The oil content ranges from 65% to 75% and sugar content ranges from 6% to 8%. These factors result in variable colors and texture when the nuts are roasted under the same conditions.
Macadamia oil is liquid at room temperature. The refined oil is clear, lightly amber-colored with a slightly nutty smell. It has a specific gravity of 900–920 and a flash point of over 300 °C (572 °F).
Oil accumulation does not commence until the nuts are fully grown and the shell hardens. It accumulates rapidly in the kernel during late summer when the reducing sugar content decreases. The composition of mature, roasted and salted macadamia nuts is shown. As with many oil seeds, the protein is low in methionine. Fresh kernels contain up to 4.6% sugar, mostly non-reducing
|
https://en.wikipedia.org/wiki/Oil%27s%20Well
|
Oil's Well (a pun on "all's well") is a video game published by Sierra On-Line in 1983. The game was written for the Atari 8-bit family by Thomas J. Mitchell. Oil's Well is similar to the 1982 arcade game Anteater, re-themed to be about drilling for oil instead of a hungry insectivore. Ports were released in 1983 for the Apple II and Commodore 64, in 1984 for ColecoVision and the IBM PC (as a self-booting disk), then in 1985 for MSX and the Sharp X1. A version with improved visuals and without Mitchell's involvement was released for MS-DOS in 1990.
Gameplay
The player collects oil for a drilling operation by moving the drill head through a maze using four directional control buttons. The drill bit is trailed by a pipeline connecting it to the base. Subterranean creatures populate the maze; the head can destroy the creatures, but the pipeline is vulnerable. As the player traverses the maze, the pipe grows longer, but pressing a button quickly retracts the head. There are 8 levels to play through.
Reception
Dave Stone reviewed the game for Computer Gaming World, and stated that "The action's well-paced, the difficulty progressive. While getting to a higher level is somewhat dependent on getting the right breaks — good eye-hand coordination, timing, and strategy are essential."
Ahoy! stated that while the Commodore version's graphics and sounds were only "serviceable; gameplay is, in my experience, unique ... Recommended". InfoWorld called the IBM PCjr version "a clever, basic game".
The U.S. gaming magazine Computer Games awarded Oil's Well the 1984 Golden Floppy Award for Excellence, in the category of "Maze Game of the Year."
Legacy
Despite already being a clone of Anteater, several additional clones borrowed the theme of Oil's Well: Pipeline Run for the Commodore 64 in 1990 and Oilmania for the Atari ST in 1991.
|
https://en.wikipedia.org/wiki/Taunting
|
A taunt is a battle cry, sarcastic remark, gesture, or insult intended to demoralize the recipient, or to anger them and encourage reactionary behaviors without thinking. Taunting can exist as a form of social competition to gain control of the target's cultural capital (i.e., status). In sociological theory, the control of the three social capitals is used to produce an advantage in the social hierarchy, so as to enforce one's own position in relation to others. Taunting is committed by either directly or indirectly encouraging others to taunt the target. The target may give a response in kind to maintain status, as in fighting words and trash-talk.
Taunts are also a genre of folklore.
Verbal taunts
The act of taunting can be learned by observation and improvisation. It usually follows linear thought, correlating or building in some manner to the target of taunting. Things such as the victim's appearance, intelligence, mannerisms, education, background, past offences, etc. can otherwise be insulted. When used in this manner, the effectiveness of a taunt at provoking a response varies depending on how the specific insult relates to its victim (or their sense of self), to what level of offence they regard the taunt, and how well the victim can control their emotions when responding.
In the Eastern U.S. and modern Britain the chant "Nyah nyah nyah nyah nyah nyah", sung to the tune of "Bye, baby Bunting" is insult among children. In the American South this is often used as "Nanny nanny boo-boo" and repeated with words such as "You ca-an't catch me". In Hebrew, the taunt is "Na na, banana" or "Na-na-na banana" (means the same as in English). In French, the taunt uses syllables often rendered "Nananananère," and Swedish-speaking children use the phrase "Du kan inte ta mig" ("You cannot catch me"). In Croatia, children sing in that tune: "Ulovi me, ulovi me, kupit ću ti novine. Novine su skupe, poljubi me u dupe.", which means: "Catch me, catch me, [if you do that] I'l
|
https://en.wikipedia.org/wiki/Omnicare
|
Omnicare is an American company working in the health-care industry. It was established in April 1981 as a spinoff of healthcare businesses from Chemed and W. R. Grace and Company. It is currently a pharmacy specializing in nursing homes. In 2015, Omnicare was acquired by CVS Health.
Controversy
In 2012, the Federal Trade Commission (FTC) sued Omnicare to block its hostile takeover of its rival PharMerica under federal anti-trust law. The FTC alleged that the acquisition would boost drug costs and inflate Medicare expenditures by consolidating the industry and reducing price competition. PharMerica owned 97 long-term-care pharmacies, while Omnicare owned approximately 200. The merger would have given Omnicare a 57% market share versus two percent for its nearest, non-PharMerica rival. Because of the FTC opposition, the takeover was terminated.
In November 2009, Omnicare paid to the federal government to settle five "qui tam" (whistleblower) lawsuits and government charges that the company had paid or solicited a variety of kickbacks. The company admitted no wrongdoing. The charges included allegations that Omnicare solicited and received kickbacks from a pharmaceutical manufacturer Johnson & Johnson, in exchange for agreeing to recommend that physicians prescribe Risperdal, a Johnson & Johnson antipsychotic drug, to nursing home patients.
Starting in 2006, healthcare entrepreneur Adam B. Resnick sued Omnicare, a major supplier of drugs to nursing homes, under the False Claims Act, as well as the parties to the company's illegal kickback schemes. Omnicare allegedly paid kickbacks to nursing home operators to secure business, which constitutes Medicare and Medicaid fraud. Omnicare allegedly had paid $50 million to the owners (Leonard Grunstein and Rubin Schron) of the Mariner Health Care Inc. and SavaSeniorCare Administrative Services LLC nursing home chains in exchange for the right to continue providing pharmacy services to the nursing homes.
In 2010, Omnic
|
https://en.wikipedia.org/wiki/Non-dairy%20creamer
|
A non-dairy creamer, commonly also called tea whitener or coffee whitener or else just creamer, is a liquid or granular product intended to substitute for milk or cream as an additive to coffee, tea, hot chocolate or other beverages. They do not contain lactose and therefore are commonly described as being non-dairy products, although many contain casein, a milk-derived protein.
Dry granular products do not need to be refrigerated and can be used and stored in locations which do not have a refrigerator. Liquid non-dairy creamers should be tightly capped and refrigerated after opening. Some non-dairy creamers contain sweeteners and flavors, such as vanilla, hazelnut or Irish cream. As with other processed food products, low calorie and low fat versions are available for non-dairy creamers.
History
Holton "Rex" Diamond, an employee of Rich Products, performed experiments from 1943 to 1945 with using a form of soybean protein" to make a "soy cream" that would not form curds when mixed with coffee. Diamond's experiments are the first English-language reference to a non-dairy creamer for coffee. Frank S. Mitchell, another Rich Products Corp. employee, and Diamond developed a non-dairy whipped topping for their employer in 1946. Mitchell also developed a non-dairy coffee creamer, Perx, which was successful in the market.
In 1950, Melvin Morse and Dick Borne of Presto Foods developed "Mocha Mix Coffee Creamer", which was the first commercial non-dairy creamer and the first product with the term “coffee creamer” in the name. Another early commercial powdered creamer was "Pream", first marketed in 1952 and made from dehydrated cream and sugar. It did not dissolve easily because of the protein in the milk.
Six years later, in 1958, the Carnation Company developed a product that easily dissolved in hot liquid because it replaced most of the milk fat with vegetable oil, and reduced the milk protein. The new product was marketed under the Carnation label with the brand nam
|
https://en.wikipedia.org/wiki/Omega%20oxidation
|
Omega oxidation (ω-oxidation) is a process of fatty acid metabolism in some species of animals. It is an alternative pathway to beta oxidation that, instead of involving the β carbon, involves the oxidation of the ω carbon (the carbon most distant from the carboxyl group of the fatty acid). The process is normally a minor catabolic pathway for medium-chain fatty acids (10-12 carbon atoms), but becomes more important when β oxidation is defective.
In vertebrates, the enzymes for ω oxidation are located in the smooth ER of liver and kidney cells, instead of in the mitochondria as with β oxidation. The steps of the process are as follows:
After these three steps, either end of the fatty acid can be attached to coenzyme A. The molecule can then enter the mitochondrion and undergo β oxidation. The final products after successive oxidations include succinic acid, which can enter the citric acid cycle, and adipic acid.
The first step in ω-oxidation, i.e. addition of a hydroxy residue to the omega carbon of short, intermediate, and long chain unsaturated or saturated fatty acids, can serve to produce or inactivate signaling molecules. In humans, a subset of Cytochrome P450 (CYP450) microsome-bound ω-hydroxylases (termed Cytochrome P450 omega hydroxylases) metabolize arachidonic acid (also known as eicosatetraenoic acid) to 20-hydroxyeicosatetraenoic acid (20-HETE). 20-HETE possesses a range of activities in animal and cellular model systems, e.g. it constricts blood vessels, alters the kidney's reabsorption of salt and water, and promotes the growth of cancer cells; genetic studies in humans suggest that 20-HETE contributes to hypertension, myocardial infarction, and brain stroke (see 20-Hydroxyeicosatetraenoic acid). Among the CYP450 superfamily, members of the CYP4A and CYP4F subfamilies viz., CYP4A11, CYP4F2, CYP4F3, are considered the predominant cytochrome P450 enzymes responsible in most tissues for forming 20-HETE. CYP2U1 and CYP4Z1 contribute to 20-HETE product
|
https://en.wikipedia.org/wiki/Gaussian%20grid
|
A Gaussian grid is used in the earth sciences as a gridded horizontal coordinate system for scientific modeling on a sphere (i.e., the approximate shape of the Earth). The grid is rectangular, with a set number of orthogonal coordinates (usually latitude and longitude).
At a given latitude (or parallel), the gridpoints are equally spaced. On the contrary along a longitude (or meridian) the gridpoints are unequally spaced. The spacing between grid points is defined by Gaussian quadrature. By contrast, in the "normal" geographic latitude-longitude grid, gridpoints are equally spaced along both latitudes and longitudes. Gaussian grids also have no grid points at the poles.
In a regular Gaussian grid, the number of gridpoints along the longitudes is constant, usually double the number along the latitudes. In a reduced (or thinned) Gaussian grid, the number of gridpoints in the rows decreases towards the poles, which keeps the gridpoint separation approximately constant across the sphere.
Examples of Gaussian grids
CCCma global climate models of climate change
[96×48]
[128×64]
European Centre for Medium-Range Weather Forecasts
192×96
320×160
512×256
640×320
800×400
1024×512
1600×800
2048×1024
2560×1280
Features for ERA-40 grids
See also
Global climate model
Spectral method
Spherical harmonics
|
https://en.wikipedia.org/wiki/Sound%20Blaster%20Live%21
|
Sound Blaster Live! is a PCI add-on sound card from Creative Technology Limited for PCs. Moving from ISA to PCI allowed the card to dispense with onboard memory, storing digital samples in the computer's main memory and then accessing them in real time over the bus. This allowed for a much wider selection of, and longer playing, samples. It also included higher quality sound output at all levels, quadrophonic output, and a new MIDI synthesizer with 64 sampled voices. The Live! was introduced in August 1998 and variations on the design remained Creative's primary sound card line into the early 2000's.
Overview
Sound Blaster Live! (August 1998) saw the introduction of the EMU10K1 audio processor. Manufactured in a 0.35 µm 3-metal-layer CMOS process, it is a 2.44 million transistor ASIC rated at 1000 MIPS. The EMU10K1 featured hardware acceleration for DirectSound and EAX 1.0 and 2.0 (environmental audio extensions), along with a high-quality 64-voice MIDI sample-based synthesizer and an integrated FX8010 DSP chip for real-time digital audio effects.
A major design change from its predecessor (the EMU8000) was that the EMU10K1 used system memory, accessed over the PCI bus, for the wavetable samples, rather than using expensive on-board memory. This was possible at this point because systems were being equipped with far more RAM than previously, and PCI offered far faster and more efficient data transfer than the old ISA bus.
The integrated FX8010 was a 32-bit programmable processor with 1 kilobyte of instruction memory. It provided real-time postprocessing effects (such as reverb, flanging, or chorus). This capability let users select a pre-defined listening environment from a control-panel application (concert hall, theater, headphones, etc.) It also provided hardware-acceleration for EAX, Creative's environmental audio technology. The Effect algorithms were created by a development system that integrated into Microsoft Developer Studio. The effects were written i
|
https://en.wikipedia.org/wiki/Sound%20Blaster%20Audigy
|
Sound Blaster Audigy is a product line of sound cards from Creative Technology. The flagship model of the Audigy family used the EMU10K2 audio DSP, an improved version of the SB-Live's EMU10K1, while the value/SE editions were built with a less-expensive audio controller.
The Audigy family is available for PCs with a PCI or PCI Express slot, or a USB port.
First generation
The Audigy cards equipped with EMU10K2 (CA0100 chip) could process up to 4 EAX environments simultaneously with its on-chip DSP and native EAX 3.0 ADVANCED HD support, and supported from stereo up to 5.1-channel output. The audio processor could mix up to 64 DirectSound3D sound channels in hardware, up from Live!'s 32 channels.
Creative Labs advertised the Audigy as a 24-bit sound card, a controversial marketing claim for a product that did not support end-to-end playback of 24-bit/96 kHz audio streams. The Audigy and Live shared a similar architectural limitation: the audio transport (DMA engine) was fixed to 16-bit sample precision at 48 kHz. So despite its 24-bit/96 kHz high-resolution DACs, the Audigy's DSP could only process 16-bit/48 kHz audio sources. This fact was not immediately obvious in Creative's literature, and was difficult to ascertain even upon examination of the Audigy's spec sheets. (A resulting class-action settlement with Creative later awarded US customers a 35% discount on Creative products, up to a maximum discount of $65.)
Aside from the lack of an end-to-end path for 24-bit audio, Dolby Digital (AC-3) and DTS passthrough (to the S/PDIF digital out) had issues that have never been resolved.
Audigy card supports the professional ASIO 1 driver interface natively, making it possible to obtain low latencies from Virtual Studio Technology (VST) instruments. Some versions of Audigy featured an external break out box with connectors for S/PDIF, MIDI, IEEE 1394, analog and optical signals. The ASIO and break out box features were an attempt to tap into the "home studio" ma
|
https://en.wikipedia.org/wiki/Sound%20Blaster%2016
|
The Sound Blaster 16 is a series of sound cards by Creative Technology, first released in June 1992 for PCs with an ISA or PCI slot. It was the successor to the Sound Blaster Pro series of sound cards and introduced CD-quality digital audio to the Sound Blaster line. For optional wavetable synthesis, the Sound Blaster 16 also added an expansion-header for add-on MIDI-daughterboards, called a Wave Blaster connector, and a game port for optional connection with external MIDI sound modules.
The Sound Blaster 16 retained the Pro's OPL-3 support for FM synthesis, and was mostly compatible with software written for the older Sound Blaster and Sound Blaster Pro sound cards. The SB16's MPU-401 emulation was limited to UART (dumb) mode only, but it was sufficient for most MIDI software. When a daughterboard, such as the Wave Blaster, Roland SCB-7, Roland SCB-55, Yamaha DB50XG, Yamaha DB60XG was installed on the Sound Blaster, the Wave Blaster behaved like a standard MIDI device, accessible to any MPU-401 compatible MIDI software.
The Sound Blaster 16 was hugely popular. Creative's audio revenue grew from US$40 million per year to nearly US$1 billion following the launch of the Sound Blaster 16 and related products. Rich Sorkin was General Manager of the global business during this time, responsible for product planning, product management, marketing and OEM sales. Due to its popularity and wide support, the Sound Blaster 16 is emulated in a variety of virtualization and/or emulation programs, such as DOSBox, QEMU, Bochs, VMware and VirtualBox, with varying degrees of faithfulness and compatibility.
Features
The ASP or CSP chip added some new features to the Sound Blaster line, such as hardware-assisted speech synthesis (through the TextAssist software), QSound audio spatialization technology for digital (PCM) wave playback, and PCM audio compression and decompression. Software needed to be written to leverage its unique abilities, yet the offered capabilities lacked compe
|
https://en.wikipedia.org/wiki/Sound%20Blaster%20AWE64
|
Sound Blaster Advanced Wave Effects 64 ISA sound card from Creative Technology. It is an add-on board for PCs. The card was launched in November 1996.
Overview
The Sound Blaster AWE64 is significantly smaller than its predecessor, the Sound Blaster AWE32. It offers a similar feature set, but also has a few notable improvements.
AWE64 has support for greater polyphony than the AWE32. Unfortunately, these additional voices are achieved via software-based processing on the system CPU. The technology, called WaveGuide, synthesizes the instrument sounds rather than using stored instrument patches like the hardware voices. This not only demands more processing power from the host system, but also is not of equal quality to available SoundFonts. The inability to adjust synthesis parameters, unlike with the hardware portion of the AWE64, also limited the WaveGuide function's usefulness.
Another improvement comes from better on-board circuitry that increases the signal-to-noise ratio and overall signal quality compared to the frequently quite noisy AWE32 and Sound Blaster 16 boards. This improvement is most notable with the AWE64 Gold, because of its superior gold plated RCA connector outputs. The improvement also comes from increased integration of components on AWE64 compared to its predecessors. Increased integration means the board can be simpler and trace routing to components is reduced, decreasing the amount of noise-inducing signal travel. This also made it possible to reduce the size of AWE64's board noticeably, compared to AWE32.
The Sound Blaster AWE32 boards allowed sample RAM expansion through the installation of 30-pin fast-page DRAM SIMMs. These SIMMs were commodity items during the time of AWE32 and AWE64, because they were used for many other applications, including plain system RAM. As such, Creative had no control over their sale. So, with the AWE64, Creative moved to proprietary RAM expansion modules which only they manufactured and sold. These memor
|
https://en.wikipedia.org/wiki/Sound%20Blaster%20AWE32
|
The Sound Blaster AWE32 is an ISA sound card from Creative Technology. It is an expansion board for PCs and is part of the Sound Blaster family of products. The Sound Blaster AWE32, introduced in March 1994, was a near full-length ISA sound card, measuring 14 inches (356 mm) in length, due to the number of features included.
Sound Blaster AWE32
Backward compatibility
The AWE32's digital audio section was basically an entire Sound Blaster 16, and as such, was compatible with Creative's earlier Sound Blaster 2.0 (minus the C/MS audio chips.) Its specifications included 16-bit 44.1 kHz AD/DA conversion with real-time on-board compression / decompression and the Yamaha OPL3 FM synthesizer chip. However, compatibility was not always perfect and there were situations where various bugs could arise in games. Many of the Sound Blaster AWE32 cards had codecs that supported bass, treble, and gain adjustments through Creative's included mixer software. There were many variants and revisions of the AWE32, however, with numerous variations in audio chipset, amplifier selection and design, and supported features. For example, the Sound Blaster AWE32 boards that utilize the VIBRA chip do not have bass and treble adjustments.
MIDI capability
The Sound Blaster AWE32 included two distinct audio sections; one being the Creative digital audio section with their audio codec and optional CSP/ASP chip socket, and the second being the E-mu MIDI synthesizer section. The synthesizer section consisted of the EMU8000 synthesizer and effects processor chip, 1 MB EMU8011 sample ROM, and a variable amount of RAM (none on the SB32, 512 KB on the AWE32; RAM was expandable to 28 MB on both cards). These chips comprised a powerful and flexible sample-based synthesis system, based on E-mu's high-end sampler systems such as the E-mu Emulator III and E-mu Proteus. The effects processor generated various effects (i.e. reverb and chorus) and environments on MIDI output, similar to the later EAX standar
|
https://en.wikipedia.org/wiki/Ewald%20summation
|
Ewald summation, named after Paul Peter Ewald, is a method for computing long-range interactions (e.g. electrostatic interactions) in periodic systems. It was first developed as the method for calculating the electrostatic energies of ionic crystals, and is now commonly used for calculating long-range interactions in computational chemistry. Ewald summation is a special case of the Poisson summation formula, replacing the summation of interaction energies in real space with an equivalent summation in Fourier space. In this method, the long-range interaction is divided into two parts: a short-range contribution, and a long-range contribution which does not have a singularity. The short-range contribution is calculated in real space, whereas the long-range contribution is calculated using a Fourier transform. The advantage of this method is the rapid convergence of the energy compared with that of a direct summation. This means that the method has high accuracy and reasonable speed when computing long-range interactions, and it is thus the de facto standard method for calculating long-range interactions in periodic systems. The method requires charge neutrality of the molecular system to accurately calculate the total Coulombic interaction. A study of the truncation errors introduced in the energy and force calculations of disordered point-charge systems is provided by Kolafa and Perram.
Derivation
Ewald summation rewrites the interaction potential as the sum of two terms,
where represents the short-range term whose sum quickly converges in real space and represents the long-range term whose sum quickly converges in Fourier (reciprocal) space. The long-ranged part should be finite for all arguments (most notably r = 0) but may have any convenient mathematical form, most typically a Gaussian distribution. The method assumes that the short-range part can be summed easily; hence, the problem becomes the summation of the long-range term. Due to the use of the Fourie
|
https://en.wikipedia.org/wiki/Skypix
|
Skypix is the name of a markup language used to encode graphics content such as changeable fonts, mouse-controlled actions, animations and sound to bulletin board system. The system was written by Michael Cox on the Amiga in 1987, and first hosted on the Atredes BBS system, which was later renamed Skyline. Skypix allowed BBS sysops to create interactive BBS systems with graphics, fonts, mouse-controlled actions, animations and sound.
Skypix used an extension of the ANSI graphics system that added new instructions. The graphics were normally created using Skypaint, which could generate Skypix files directly from a familiar-looking paint program. The files could be placed in the system and any Skypix-enabled terminal program would notice the encoding and recreate the graphics.
The underlying BBS software could be programmed in the ARexx language (a variant of REXX for the Amiga). This resulted in an enthusiastic group of Skypix hobbyists.
Skypix was available only on the Amiga computer, hosted on the Skyline BBS and accessed using the Skyterm terminal emulator. Skypix support was later implemented in JR-Comm by Johnathan Radigan. At one time over a thousand Skyline systems were operating the world over. Amiga inventor Jay Miner himself ran a Skyline system for a time.
With the terminal program JR-Comm, other BBS software programs started to support Skypix. C-Net Amiga Pro BBS Software was one of them. Today there are several of these boards still alive using Telnet. One of these boards still offers Skypix graphics when using JR-Comm.
|
https://en.wikipedia.org/wiki/Alternating%20permutation
|
In combinatorial mathematics, an alternating permutation (or zigzag permutation) of the set {1, 2, 3, ..., n} is a permutation (arrangement) of those numbers so that each entry is alternately greater or less than the preceding entry. For example, the five alternating permutations of {1, 2, 3, 4} are:
1, 3, 2, 4 because 1 < 3 > 2 < 4,
1, 4, 2, 3 because 1 < 4 > 2 < 3,
2, 3, 1, 4 because 2 < 3 > 1 < 4,
2, 4, 1, 3 because 2 < 4 > 1 < 3, and
3, 4, 1, 2 because 3 < 4 > 1 < 2.
This type of permutation was first studied by Désiré André in the 19th century.
Different authors use the term alternating permutation slightly differently: some require that the second entry in an alternating permutation should be larger than the first (as in the examples above), others require that the alternation should be reversed (so that the second entry is smaller than the first, then the third larger than the second, and so on), while others call both types by the name alternating permutation.
The determination of the number An of alternating permutations of the set {1, ..., n} is called André's problem. The numbers An are known as Euler numbers, zigzag numbers, or up/down numbers. When n is even the number An is known as a secant number, while if n is odd it is known as a tangent number. These latter names come from the study of the generating function for the sequence.
Definitions
A permutation is said to be alternating if its entries alternately rise and descend. Thus, each entry other than the first and the last should be either larger or smaller than both of its neighbors. Some authors use the term alternating to refer only to the "up-down" permutations for which , calling the "down-up" permutations that satisfy by the name reverse alternating. Other authors reverse this convention, or use the word "alternating" to refer to both up-down and down-up permutations.
There is a simple one-to-one correspondence
|
https://en.wikipedia.org/wiki/Toxicity%20class
|
Toxicity class refers to a classification system for pesticides that has been created by a national or international government-related or -sponsored organization. It addresses the acute toxicity of agents such as soil fumigants, fungicides, herbicides, insecticides, miticides, molluscicides, nematicides, or rodenticides.
General considerations
Assignment to a toxicity class is based typically on results of acute toxicity studies such as the determination of values in animal experiments, notably rodents, via oral, inhaled, or external application. The experimental design measures the acute death rate of an agent. The toxicity class generally does not address issues of other potential harm of the agent, such as bioaccumulation, issues of carcinogenicity, teratogenicity, mutagenic effects, or the impact on reproduction.
Regulating agencies may require that packaging of the agent be labeled with a signal word, a specific warning label to indicate the level of toxicity.
By jurisdiction
World Health Organization
The World Health Organization (WHO) names four toxicity classes:
Class I – a: extremely hazardous
Class I – b: highly hazardous
Class II: moderately hazardous
Class III: slightly hazardous
The system is based on LD50 determination in rats, thus an oral solid agent with an LD50 at 5 mg or less/kg bodyweight is Class Ia, at 5–50 mg/kg is Class Ib, LD50 at 50–2000 mg/kg is Class II, and at LD50 at the concentration more than 2000 mg/kg is classified as Class III. Values may differ for liquid oral agents and dermal agents.
European Union
There are eight toxicity classes in the European Union's classification system, which is regulated by Directive 67/548/EEC:
Class I: very toxic
Class II: toxic
Class III: harmful
Class IV : corrosive
Class V : irritant
Class VI : sensitizing
Class VII : carcinogenic
Class VIII : mutagenic
Very toxic and toxic substances are marked by the European toxicity symbol.
India
The Indian standardized system of toxicity l
|
https://en.wikipedia.org/wiki/Ball%20screw
|
A ball screw (or ballscrew) is a mechanical linear actuator that translates rotational motion to linear motion with little friction. A threaded shaft provides a helical raceway for ball bearings which act as a precision screw. As well as being able to apply or withstand high thrust loads, they can do so with minimum internal friction. They are made to close tolerances and are therefore suitable for use in situations in which high precision is necessary. The ball assembly acts as the nut while the threaded shaft is the screw.
In contrast to conventional leadscrews, ball screws tend to be rather bulky, due to the need to have a mechanism to recirculate the balls.
History
The ball screw was invented independently by H.M. Stevenson and D. Glenn who were issued in 1898 patents 601,451 and 610,044 respectively.
Early precise screwshafts were produced by starting with a low-precision screwshaft, and then lapping the shaft with several spring-loaded nut laps. By rearranging and inverting the nut laps, the lengthwise errors of the nuts and shaft were averaged. Then, the very repeatable shaft's pitch is measured against a distance standard. A similar process is sometimes used today to produce reference standard screw shafts, or master manufacturing screw shafts.
Design
Low friction in ball screws yields high mechanical efficiency compared to alternatives. A typical ball screw may be 90 percent efficient, versus 20 to 25 percent efficiency of an Acme lead screw of equal size. Lack of sliding friction between the nut and screw lends itself to extended lifespan of the screw assembly (especially in no-backlash systems), reducing downtime for maintenance and parts replacement, while also decreasing demand for lubrication. This, combined with their overall performance benefits and reduced power requirements, may offset the initial costs of using ball screws.
Ball screws may also reduce or eliminate backlash common in lead screw and nut combinations. The balls may be p
|
https://en.wikipedia.org/wiki/United%20States%20Army%20Aviation%20and%20Missile%20Center
|
The U.S. Army Combat Capabilities Development Command Aviation & Missile Center (AvMC), formerly known as the U.S. Army Aviation and Missile Research, Development and Engineering Center (AMRDEC), a part of the U.S. Army Research, Development, and Engineering Command (RDECOM) — now DEVCOM, is primarily a civilian organization tasked to provide research, development and engineering technology and services to support U.S. Army aviation and missile platforms. AvMC conducts research, promotes development, engineering and simulation laboratories and facilities used to develop and improve aviation and missile components, subsystems and systems.
AvMC's offices are located at the Redstone Arsenal Army post in Madison County, Alabama.
AvMC employs over 11,000 government, civilian employees and contractors.
Locations
DEVCOM Aviation & Missile Center is currently headquartered at the Redstone Arsenal in Huntsville, Alabama. DEVCOM Aviation & Missile Center has over 1.9 million square feet of laboratory space that is devoted to improving sensors and electronics, propulsion system, aerodynamic structures, modeling and simulation, life cycle software development, and technical testing.
Other laboratories are found at Joint Base Langley-Eustis and Hampton, Virginia as well as Moffett Field in California where Army and NASA aviation facilities, such as instrumented test ranges and wind tunnels, are used.
Personnel devoted to aviation sustainment and engineering are located in Corpus Christi, Texas, and serve as liaison engineers around the globe.
History
Early beginnings
AvMC traces its origins back to October 1948 when the chief of ordnance designated Redstone Arsenal as the center for research and development in the field of rockets. A year later, the secretary of the Army approved the transfer of the Ordnance Research and Development Division sub-office (Rocket) at Fort Bliss, Texas, to Redstone Arsenal. Among those transferred were Dr. Wernher von Braun and his team of
|
https://en.wikipedia.org/wiki/Lacrimal%20apparatus
|
The lacrimal apparatus is the physiological system containing the orbital structures for tear production and drainage. It consists of:
The lacrimal gland, which secretes the tears, and its excretory ducts, which convey the fluid to the surface of the human eye; it is a j-shaped serous gland located in lacrimal fossa.
The lacrimal canaliculi, the lacrimal sac, and the nasolacrimal duct, by which the fluid is conveyed into the cavity of the nose, emptying anterioinferiorly to the inferior nasal conchae from the nasolacrimal duct.
The innervation of the lacrimal apparatus, which involves both a sympathetic supply through the carotid plexus of nerves around the internal carotid artery, and parasympathetically from the lacrimal nucleus of the facial nerve.
The blood supply to the lacrimal gland is provided by the ophthalmic artery with its branch - the lacrimal artery, while the venous blood is drained from this region via the superior ophthalmic vein. The lacrimal system is made up of a secretory system, which produces tears, and an excretory system, which drains the tears. The lacrimal gland is primarily responsible for producing emotional or reflexive tears. As tears are produced, some fluid evaporates between blinks, and some is drained through the lacrimal punctum. The tears that are drained through the punctum will eventually be drained through the nose. Any excess fluid that did not go into the punctum will fall over the eyelid, which produces tears that are cried.
|
https://en.wikipedia.org/wiki/Lacrimal%20sac
|
The lacrimal sac or lachrymal sac is the upper dilated end of the nasolacrimal duct, and is lodged in a deep groove formed by the lacrimal bone and frontal process of the maxilla. It connects the lacrimal canaliculi, which drain tears from the eye's surface, and the nasolacrimal duct, which conveys this fluid into the nasal cavity. Lacrimal sac occlusion leads to dacryocystitis.
Structure
It is oval in form and measures from 12 to 15 mm. in length; its upper end is closed and rounded; its lower is continued into the nasolacrimal duct.
Its superficial surface is covered by a fibrous expansion derived from the medial palpebral ligament, and its deep surface is crossed by the lacrimal part of the orbicularis oculi, which is attached to the crest on the lacrimal bone.
Histology
Like the nasolacrimal duct, the sac is lined by stratified columnar epithelium with mucus-secreting goblet cells, with surrounding connective tissue. The Lacrimal Sac also drains the eye of debris and microbes.
Function
It serves as a reservoir for overflow of tears, in which the lacrimal sac pumps inward and outward driven by the orbicularis muscle during blinking.
Imaging
The lacrimal sac can be imaged by dacrocystography, in which radiocontrast is injected, followed by X-ray imaging.
Additional images
See also
Lacrimal apparatus
|
https://en.wikipedia.org/wiki/Human%20genetic%20variation
|
Human genetic variation is the genetic differences in and among populations. There may be multiple variants of any given gene in the human population (alleles), a situation called polymorphism.
No two humans are genetically identical. Even monozygotic twins (who develop from one zygote) have infrequent genetic differences due to mutations occurring during development and gene copy-number variation. Differences between individuals, even closely related individuals, are the key to techniques such as genetic fingerprinting.
The human genome has a total length of approximately 3.2 billion base pairs (bp) across 46 chromosomes of DNA as well as slightly under 17,000 bp DNA in cellular mitochondria. In 2015, the typical difference between an individual's genome and the reference genome was estimated at 20 million base pairs (or 0.6% of the total). As of 2017, there were a total of 324 million known variants from sequenced human genomes.
Comparatively speaking, humans are a genetically homogeneous species. Although a small number of genetic variants are found more frequently in certain geographic regions or in people with ancestry from those regions, this variation accounts for a small portion (~15%) of human genome variability. The majority of variation exists within the members of each human population. For comparison, rhesus macaques exhibit 2.5-fold greater DNA sequence diversity compared to humans.
The lack of discontinuities in genetic distances between human populations, absence of discrete branches in the human species, and striking homogeneity of human beings globally, imply that there is no scientific basis for inferring races or subspecies in humans, and for most traits, there is much more variation within populations than between them.
Despite this, modern genetic studies have found substantial average genetic differences across human populations in traits such as skin colour, bodily dimensions, lactose and starch digestion, high altitude adaptions, and pr
|
https://en.wikipedia.org/wiki/Network%20load%20balancing
|
Network load balancing is the ability to balance traffic across two or more WAN links without using complex routing protocols like BGP.
This capability balances network sessions like Web, email, etc. over multiple connections in order to spread out the amount of bandwidth used by each LAN user, thus increasing the total amount of bandwidth available. For example, a user has a single WAN connection to the Internet operating at 1.5 Mbit/s. They wish to add a second broadband (cable, DSL, wireless, etc.) connection operating at 2.5 Mbit/s. This would provide them with a total of 4 Mbit/s of bandwidth when balancing sessions.
Session balancing does just that, it balances sessions across each WAN link. When Web browsers connect to the Internet, they commonly open multiple sessions, one for the text, another for an image, another for some other image, etc. These sessions can be balanced across the available connections. An FTP application only uses a single session so it is not balanced; however if a secondary FTP connection is made, then it may be balanced so that the traffic is distributed across two of the various connections and thus provides an overall increase in throughput.
Additionally, network load balancing is commonly used to provide network redundancy so that in the event of a WAN link outage, access to network resources is still available via the secondary link(s). Redundancy is a key requirement for business continuity plans and generally used in conjunction with critical applications like VPNs and VoIP.
Finally, most network load balancing systems also incorporate the ability to balance both outbound and inbound traffic. Inbound load balancing is generally performed via dynamic DNS which can either be built into the system, or provided by an external service or system. Having the dynamic DNS service within the system is generally thought to be better from a cost savings and overall control point of view.
Microsoft NLB
Microsoft has also purch
|
https://en.wikipedia.org/wiki/Microinjection
|
Microinjection is the use of a glass micropipette to inject a liquid substance at a microscopic or borderline macroscopic level. The target is often a living cell but may also include intercellular space. Microinjection is a simple mechanical process usually involving an inverted microscope with a magnification power of around 200x (though sometimes it is performed using a dissecting stereo microscope at 40–50x or a traditional compound upright microscope at similar power to an inverted model).
For processes such as cellular or pronuclear injection the target cell is positioned under the microscope and two micromanipulators—one holding the pipette and one holding a microcapillary needle usually between 0.5 and 5 µm in diameter (larger if injecting stem cells into an embryo)—are used to penetrate the cell membrane and/or the nuclear envelope. In this way the process can be used to introduce a vector into a single cell. Microinjection can also be used in the cloning of organisms, in the study of cell biology and viruses, and for treating male subfertility through intracytoplasmic sperm injection (ICSI, ).
History
The use of microinjection as a biological procedure began in the early twentieth century, although even through the 1970s it was not commonly used. By the 1990s, its use had escalated significantly and it is now considered a common laboratory technique, along with vesicle fusion, electroporation, chemical transfection, and viral transduction, for introducing a small amount of a substance into a small target.
Basic types
There are two basic types of microinjection systems. The first is called a constant flow system and the second is called a pulsed flow system. In a constant flow system, which is relatively simple and inexpensive though clumsy and outdated, a constant flow of a sample is delivered from a micropipette and the amount of the sample which is injected is determined by how long the needle remains in the cell. This system typically requires
|
https://en.wikipedia.org/wiki/Tree%20of%20Life%20Web%20Project
|
The Tree of Life Web Project is an Internet project providing information about the diversity and phylogeny of life on Earth.
This collaborative peer reviewed project began in 1995, and is written by biologists from around the world. The site has not been updated since 2011, however the pages are still accessible.
The pages are linked hierarchically, in the form of the branching evolutionary tree of life, organized cladistically. Each page contains information about one particular group of organisms and is organized according to a branched tree-like form, thus showing hypothetical relationships between different groups of organisms.
In 2009 the project ran into funding problems from the University of Arizona. Pages and Treehouses submitted took a considerably longer time to be approved as they were being reviewed by a small group of volunteers, and apparently, around 2011, all activities ended.
History
The idea of this project started in the late 1980s. David Maddison was working on a computer program MacClade during his PhD research. This is an application that gives insight into species' phylogenetic trees. He wanted to extend this program with a feature that allowed the user to browse through phylogenetic trees and zoom into other lower or higher taxa.
Hence, this association was not unique in a stand-alone application. The researchers came up with the idea to export the application into the World Wide Web and this was realized in 1995. From 1996 to 2011, over 300 biologists from around the globe added taxa web pages into the phylogeny browser.
Quality
To ensure the quality of ToL project, the board made use of peer-review. The pages that were reviewed were sent to two or three researchers that specialized in the particular subject. It is possible to visit the personal page of the author. If this is not accessible then the institution is always at the footnote. The entire tree structure that contained 35,960 species until the website's demise, is available
|
https://en.wikipedia.org/wiki/Bburago
|
Bburago is a manufacturing company of toys and die-cast scale model cars formerly based in Italy. The company was based in Burago di Molgora, where all products were made from 1974 to 2005. At the height of its popularity, Bburago's main competitors were Politoys and Maisto, the latter of which was to become dominant in the 1:18 market segment around 2000.
In 2006, Hong Kong-based May Cheong Group (owner of the Maisto and later Polistil brands) acquired rights to the "Bburago" brand, taking over the manufacturing operations, which were then shifted to China.
Martoys
The company was founded as "Martoys" by the Besana brothers, Ugo, Martino, and Mario, who sold their first well-known brand Mebetoys to Mattel. In the initial years of the company, only models in 1:24 scale were produced. In 1976, after only two years, the Besana brothers renamed the brand "Bburago", with two 'B's at the beginning of the name signifying the surname of the founders as well as the city of Burago di Molgora where the company was based. It is said that the change came to being due to a possible confusion with the classic toy maker Marx Toys, where the 'X' in the logo was often not noticed, thus the company sometimes being referred to as 'Mar Toys'.
Models
According to the 1975 catalog, there were only nine basic models in the Martoys line-up, though most of these were offered in at least a couple of versions. These models were: Renault Alpine (and Alpine rally), Porsche 911 (S, Carrera RS, and "Polizei"), Fiat 127 (plain, "vigili urbani", and rally), Lancia Stratos (Marlboro or Alitalia), Range Rover (plain and airport fire), Renault 5, BMW 3.0 CS, Lancia Beta, and Audi 80GT. While Mebetoys produced models in 1:43 scale, Martoys however, focused on larger toys in 1:24 and 1:18 scales.
In that catalog, the Audi, BMW, Lancia Beta, Renault 5 and Range Rover were portrayed with photographs of real vehicles, not the models, so there is some doubt about whether all of the proposed line was
|
https://en.wikipedia.org/wiki/Curiously%20recurring%20template%20pattern
|
The curiously recurring template pattern (CRTP) is an idiom, originally in C++, in which a class X derives from a class template instantiation using X itself as a template argument. More generally it is known as F-bound polymorphism, and it is a form of F-bounded quantification.
History
The technique was formalized in 1989 as "F-bounded quantification." The name "CRTP" was independently coined by Jim Coplien in 1995, who had observed it in some of the earliest C++ template code
as well as in code examples that Timothy Budd created in his multiparadigm language Leda. It is sometimes called "Upside-Down Inheritance" due to the way it allows class hierarchies to be extended by substituting different base classes.
The Microsoft Implementation of CRTP in Active Template Library (ATL) was independently discovered, also in 1995, by Jan Falkin, who accidentally derived a base class from a derived class. Christian Beaumont first saw Jan's code and initially thought it could not possibly compile in the Microsoft compiler available at the time. Following the revelation that it did indeed work, Christian based the entire ATL and Windows Template Library (WTL) design on this mistake.
General form
// The Curiously Recurring Template Pattern (CRTP)
template <class T>
class Base
{
// methods within Base can use template to access members of Derived
};
class Derived : public Base<Derived>
{
// ...
};
Some use cases for this pattern are static polymorphism and other metaprogramming techniques such as those described by Andrei Alexandrescu in Modern C++ Design.
It also figures prominently in the C++ implementation of the Data, Context, and Interaction paradigm.
In addition, CRTP is used by the C++ standard library to implement the std::enable_shared_from_this functionality.
Static polymorphism
Typically, the base class template will take advantage of the fact that member function bodies (definitions) are not instantiated until long after their declarations, and will u
|
https://en.wikipedia.org/wiki/Capstone%20%28cryptography%29
|
Capstone is a United States government long-term project to develop cryptography standards for public and government use. Capstone was authorized by the Computer Security Act of 1987, driven by the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA); the project began in 1993.
Project
The initiative involved four standard algorithms: a data encryption algorithm called Skipjack, along with the Clipper chip that included the Skipjack algorithm, a digital signature algorithm, Digital Signature Algorithm (DSA), a hash function, SHA-1, and a key exchange protocol. Capstone's first implementation was in the Fortezza PCMCIA card. All Capstone components were designed to provide 80-bit security.
The initiative encountered massive resistance from the cryptographic community, and eventually the US government abandoned the effort. The main reasons for this resistance were concerns about Skipjack's design, which was classified, and the use of key escrow in the Clipper chip.
|
https://en.wikipedia.org/wiki/RSVP-TE
|
Resource Reservation Protocol - Traffic Engineering (RSVP-TE) is an extension of the Resource Reservation Protocol (RSVP) for traffic engineering. It supports the reservation of resources across an IP network. Applications running on IP end systems can use RSVP to indicate to other nodes the nature (bandwidth, jitter, maximum burst, and so forth) of the packet streams they want to receive. RSVP runs on both IPv4 and IPv6.
RSVP-TE generally allows the establishment of Multiprotocol Label Switching (MPLS) label-switched paths (LSPs), taking into consideration network constraint parameters such as available bandwidth and explicit hops.
History
, the Internet Engineering Task Force (IETF) MPLS working group deprecated Constraint-based Routing Label Distribution Protocol (CR-LDP) and decided to focus purely on RSVP-TE. Operational overhead of RSVP-TE compared to the more widely deployed Label Distribution Protocol (LDP) will generally be higher. This is a classic trade-off between complexity and optimality in the use of technologies in telecommunications networks.
Standards
- RSVP-TE: Extensions to RSVP for LSP Tunnels
- The Multiprotocol Label Switching (MPLS) Working Group decision on MPLS signaling protocols
- Fast Reroute Extensions to RSVP-TE for LSP Tunnels
- Exclude Routes - Extension to Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)
- Crankback Signaling Extensions for MPLS and GMPLS RSVP-TE
- Inter-Domain MPLS and GMPLS Traffic Engineering—Resource Reservation Protocol-Traffic Engineering (RSVP-TE) Extensions
- Encoding of Attributes for Multiprotocol Label Switching (MPLS) Label Switched Path (LSP) Establishment Using Resource ReserVation Protocol-Traffic Engineering (RSVP-TE)
- Node Behavior upon Originating and Receiving Resource Reservation Protocol (RSVP) Path Error Messages
- Generalized MPLS (GMPLS) Protocol Extensions for Multi-Layer and Multi-Region Networks (MLN/MRN)
|
https://en.wikipedia.org/wiki/Grassmann%E2%80%93Cayley%20algebra
|
In mathematics, a Grassmann–Cayley algebra is the exterior algebra with an additional product, which may be called the shuffle product or the regressive product.
It is the most general structure in which projective properties are expressed in a coordinate-free way.
The technique is based on work by German mathematician Hermann Grassmann on exterior algebra, and subsequently by British mathematician Arthur Cayley's work on matrices and linear algebra.
It is a form of modeling algebra for use in projective geometry.
The technique uses subspaces as basic elements of computation, a formalism which allows the translation of synthetic geometric statements into invariant algebraic statements. This can create a useful framework for the modeling of conics and quadrics among other forms, and in tensor mathematics. It also has a number of applications in robotics, particularly for the kinematical analysis of manipulators.
|
https://en.wikipedia.org/wiki/PAX3
|
The PAX3 (paired box gene 3) gene encodes a member of the paired box or PAX family of transcription factors. The PAX family consists of nine human (PAX1-PAX9) and nine mouse (Pax1-Pax9) members arranged into four subfamilies. Human PAX3 and mouse Pax3 are present in a subfamily along with the highly homologous human PAX7 and mouse Pax7 genes. The human PAX3 gene is located in the 2q36.1 chromosomal region, and contains 10 exons within a 100 kb region.
Transcript splicing
Alternative splicing and processing generates multiple PAX3 isoforms that have been detected at the mRNA level. PAX3e is the longest isoform and consists of 10 exons that encode a 505 amino acid protein. In other mammalian species, including mouse, the longest mRNAs correspond to the human PAX3c and PAX3d isoforms, which consist of the first 8 or 9 exons of the PAX3 gene, respectively. Shorter PAX3 isoforms include mRNAs that skip exon 8 (PAX3g and PAX3h) and mRNAs containing 4 or 5 exons (PAX3a and PAX3b). In limited studies comparing isoform expression, PAX3d is expressed at the highest levels. From a functional standpoint, PAX3c, PAX3d, and PAX3h stimulate activities such as cell growth whereas PAX3e and PAX3g inhibit these activities, and PAX3a and PAX3b show no activity or inhibit these endpoints.
A common alternative splice affecting the PAX3 mRNA involves the sequence CAG at the 5’ end of exon 3. This splice either includes or excludes these three bases, thus resulting in the presence or absence of a glutamine residue in the paired box motif. Limited sequencing studies of full-length human cDNAs identified this splicing event as a variant of the PAX3d isoform, and this spliced isoform has been separately termed the PAX3i isoform. The Q+ and Q- isoforms of PAX3 are generally co-expressed in cells. At the functional level, the Q+ isoform shows similar or less DNA binding and transcriptional activation than the Q- isoform.
Protein structure and function
PAX3 encodes a transcription factor
|
https://en.wikipedia.org/wiki/Shellfish%20poisoning
|
Shellfish poisoning includes four syndromes that share some common features and are primarily associated with bivalve molluscs (such as mussels, clams, oysters and scallops.) As filter feeders, these shellfish may accumulate toxins produced by microscopic algae, such as cyanobacteria, diatoms and dinoflagellates.
Syndromes
The syndromes are:
Amnesic shellfish poisoning (ASP)
Diarrheal shellfish poisoning (DSP)
Neurotoxic shellfish poisoning (NSP)
Paralytic shellfish poisoning (PSP)
See also
Cyanotoxin
Gonyaulax
|
https://en.wikipedia.org/wiki/Product%20structure%20modeling
|
Product structure is a hierarchical decomposition of a product, typically known as the bill of materials (BOM).
As business becomes more responsive to unique consumer tastes and derivative products grow to meet the unique configurations, BOM management can become unmanageable. For manufacturers, a bill of materials (BOM) is a critical product information record that lists the raw materials, assemblies, components, parts and the quantities of each needed to manufacture a product.
Advanced modeling techniques are necessary to cope with configurable products where changing a small part of a product can have multiple impacts on other product structure models. Concepts within this entry are in capital letters in order to indicate these concepts.
Several concepts are related to the subject of product structure modeling. All these concepts are discussed in this section. These concepts are divided into two main aspects. First the product breakdown is discussed which involves all the physical aspects of a product. Second, different views at the product structure are indicated.
Product breakdown
Figure 1 illustrates the concepts that are important to the structure of a product. This is a meta-data model, which can be used for modeling the instances in a specific case of product structuring.
The core of the product structure is illustrated by the product components (items) and their relationships. Thus, this involves the linking between items related to the product.
The assembly can consist of subassemblies and parts, whereas subassemblies can also consist of other subassemblies or part. Thus, this is typically hierarchically ordered. These concepts are generalized into the concept of item. This classification is overlapping, because a subassembly could be a part in another assembly configuration.
Due to differentiation and variation of items several concepts must be indicated into the product breakdown structure. Three concepts are involved in this differentiation, namely
|
https://en.wikipedia.org/wiki/Patrick%20Suppes
|
Patrick Colonel Suppes (; March 17, 1922 – November 17, 2014) was an American philosopher who made significant contributions to philosophy of science, the theory of measurement, the foundations of quantum mechanics, decision theory, psychology and educational technology. He was the Lucie Stern Professor of Philosophy Emeritus at Stanford University and until January 2010 was the Director of the Education Program for Gifted Youth also at Stanford.
Early life and career
Suppes was born on March 17, 1922, in Tulsa, Oklahoma. He grew up as an only child, later with a half brother George who was born in 1943 after Patrick had entered the army. His grandfather, C. E. Suppes, had moved to Oklahoma from Ohio. Suppes' father and grandfather were independent oil men. His mother died when he was a young boy. He was raised by his stepmother, who married his father before he was six years old. His parents did not have much formal education.
Suppes began college at the University of Oklahoma in 1939, but transferred to the University of Chicago in his second year, citing boredom with intellectual life in Oklahoma as his primary motivation. In his third year, at the insistence of his family, Suppes attended the University of Tulsa, majoring in physics, before entering the Army Reserves in 1942. In 1943 he returned to the University of Chicago and graduated with a B.S. in meteorology, and was stationed shortly thereafter at the Solomon Islands to serve during World War II.
Suppes was discharged from the Army Air Force in 1946. In January 1947 he entered Columbia University as a graduate student in philosophy as a student of Ernest Nagel and received a PhD in 1950. In 1952 he went to Stanford University, and from 1959 to 1992 he was the director of the Institute for Mathematical Studies in the Social Sciences (IMSSS). He would subsequently become the Lucie Stern Professor of Philosophy, Emeritus, at Stanford.
Work
Computer-aided learning
In the 1960s Suppes and Richard C. Atk
|
https://en.wikipedia.org/wiki/Nexans
|
Nexans S.A. is a global company in the cable and optical fibre industry headquartered in Paris, France.
The group is active in four main business areas: buildings and territories (construction, local infrastructure, smart cities / grids, e-mobility), high voltage and projects (offshore wind farms, subsea interconnections, land high voltage), data and telecoms (telecom networks), data transmission, FTTx, LAN cabling, renewable energies, petroleum, railways and rolling stock, aeronautical and automation.
It is the world's second largest manufacturer of cables after Prysmian S.p.A. In 2017, the Group had industrial presence in 34 countries with over 26,000 employees and sales of around €6.4 billion. Nexans was founded in 2000 as a business unit of the telecommunications firm Alcatel after its acquisition of a number of companies in the cable sector. It was spun out and listed on the Paris stock exchange the following year. It is currently listed on Euronext Paris, Compartment A. Nexans will supply and install HVDC cables for EuroAsia Interconnector, the longest and the deepest HVDC subsea cable project ever, with bi-pole cables of 2x900km.
History
1897 - Foundation of la Société Française des Câbles Électriques, Système Berthoud, Borel et Cie.
1912 - Acquisition of the company by Alcatel.
1917 - The company is renamed Compagnie générale des câbles de Lyon.
1986 - Câbles de Lyon becomes Alcatel Câbles.
1996 - Alcatel Câbles merges with Alcatel.
2000 - Alcatel Câbles and Components become Nexans.
2001 - Nexans is listed on Paris Stock Exchange.
2008 - Nexans acquires Madeco, in the cable industry in South America.
2012 - Nexans acquires AmerCable, an American company specialized in power cables based in El Dorado, Arkansas for 275 million dollars. The group also acquires a Chinese company Shandong Yanggu Cable Group.
2019 - Nexans shuts down the Hanover factory - it continues operation into 2020
2020 - Nexans shuts down the Chester NY factory and exits
|
https://en.wikipedia.org/wiki/Laser%20Focus%20World
|
Laser Focus World is a monthly magazine published by Endeavor Business Media covering laser, photonics and optoelectronics technologies, applications, and markets. Many qualified professionals in those fields receive it free of charge; it is also possible to subscribe to the magazine.
History and profile
Laser Focus World has been published since 1965. It is published on a monthly basis and owned by Endeavor Business Media. The headquarters of the magazine is in Nashua, New Hampshire. Approximately 80,000 qualified subscribers receive the publication and can track daily photonics news and read original features at the magazine's website. There is also an annual buyer's guide.
The magazine is the recipient of the 2011 Folio Awards.
Notes
External links
Laser Focus World website.
1965 establishments in Oklahoma
Business magazines published in the United States
Monthly magazines published in the United States
Laser awards and associations
Magazines established in 1965
Magazines published in Oklahoma
Mass media in Tulsa, Oklahoma
Science and technology magazines published in the United States
|
https://en.wikipedia.org/wiki/Operation%20Europe%3A%20Path%20to%20Victory
|
Operation Europe: Path to Victory, released in Japan as , is a combat strategy video game for multiple platforms where one or two players can compete in World War II action. The MS-DOS version of the game was only released to North America.
Gameplay
The object of the game is to fulfill any one of the military objectives for either the Axis or the Allied forces. Players engage in modern warfare around Western Europe, Eastern Europe, Central Europe, and North Africa. This game uses abstract numbers and figures in the map view and saves the concrete illustrations of soldiers only when they lock horns on the battlefield or in an urban setting. Urban settings give a traditional 1930s view of housing and office buildings that provide extra protection for units that are guarding them. However, there are massive numbers to crunch and the lack of graphics help enhance the number crunching ability of game's artificial intelligence.
As a way to utilize the Nobunaga's Ambition video game engine while simulating modern warfare, each general's statistics are completely randomized by a roulette system. 84 different characters are used for generals, including those from the American television show Combat!. Examples of non-fictional characters include Adolf Hitler, Josef Stalin and Walter Bedell Smith.
Weapons are automatically replenished at the end of each scenario. Units cannot be built from scratch; they must be requested from the head of the brigade instead.
The Japanese version of the game has four game modes: Campaign, demonstration, one player game and two-player game. In the Campaign mode, the player can only play the Germans. Starting this mode with the invasion of France, the German army continues fighting in Africa, and so on, ending with Berlin defense. Officers gain experience in every scenario, retaining it after winning the battle. The troops are often replaced by the same type (one of: Infantry, Artillery, Howitzers and Reactive Artillery, Tanks and Self-Prope
|
https://en.wikipedia.org/wiki/The%20Untouchables%20%28video%20game%29
|
The Untouchables is a video game released by Ocean Software in 1989 on ZX Spectrum, Amstrad CPC, Commodore 64, MSX, Atari ST, Amiga, DOS, NES, and SNES. It is based on the film The Untouchables.
Gameplay
A side-scrolling based loosely on the movie, the game plays out some of the more significant parts of the film. Set in Chicago, the primary goal of the game is to take down Al Capone's henchmen and eventually detain Capone.
Reception
Electronic Gaming Monthly gave the Super NES version a 5.8 out of 10, commenting that "This title would have been better if it were Super Scope compatible, for it is a bit difficult to use the pad during the shooting sequences."
The reviewer from Crash called the game "Great stuff. Ocean have brought Chicago to life. Atmospheric title tune (128k), beautifully detailed graphics and challenging gameplay add up to one addictive mean game!"
Sinclair User commented that "The Untouchables is a cracking conversion. Easily one of the most successful and accurate movie licenses to date."
Paul Rand of Computer and Video Games stated that "The Untouchables is a well thought out package which will find a niche in most people's software collections [...] those who buy it won't be disappointed."
The Games Machine added that "The six levels are all trigger-pumping fun, with suitable graphics to give an authentic Twenties feel, and some nice touches [...] It all make The Untouchables a winner."
|
https://en.wikipedia.org/wiki/Wally%20Bear%20and%20the%20NO%21%20Gang
|
Wally Bear and the NO! Gang is an educational Nintendo Entertainment System game that was released in 1992 exclusively for a North American audience. It was not licensed by Nintendo. The game teaches children to say no to potentially harmful drugs like tobacco, alcohol and marijuana. Wally Bear and the NO! Gang was designed in cooperation with, and endorsed by, the American Medical Association and the National Clearinghouse for Alcohol and Drug Information.
Wally Bear characters
Wally Bear and related characters were originally conceived by Walter J. Marsh, founder of Foglesville, Pennsylvania Edutainment, Inc. The company was founded in April 1990, and a trademark for "Wally Bear and the No Gang" was established in September of that year. A newer character, Recycleman, was trademarked in November, 1991.
Long after the release of this NES game, and separate from it, Wally Bear and related characters are still used by the National Clearinghouse for Alcohol and Drug Information in publications, for the purposes of substance abuse awareness and prevention, and the promotion of general health.
Game development
Wally Bear and the NO! Gang was developed by American Game Cartridges. Due to financial problems at AGC by 1991, the rights to distribute it were purchased by American Video Entertainment. Wally Bear and the NO! Gang was originally going to be titled Wally Bear and the Just Say No Team, but due to an existing trademark of the phrase "Just Say No", it was renamed during development.
Game plot
Wally Bear's uncle, Gary Grizzly, has planned a party for Wally and the NO! Gang. At Wally's house, his parents tell him to go invite the rest of his friends to the party, and to reach his uncle Gary's house before dark. They give him parting advice to stay away from drugs.
Wally skateboards everywhere he goes in the game on his way to Gary Grizzly's house. The game is a side-scroller, and levels vary from suburban streets, subway cars, industrial areas, demon fortress
|
https://en.wikipedia.org/wiki/Semi-log%20plot
|
In science and engineering, a semi-log plot/graph or semi-logarithmic plot/graph has one axis on a logarithmic scale, the other on a linear scale. It is useful for data with exponential relationships, where one variable covers a large range of values, or to zoom in and visualize that - what seems to be a straight line in the beginning - is in fact the slow start of a logarithmic curve that is about to spike and changes are much bigger than thought initially.
All equations of the form form straight lines when plotted semi-logarithmically, since taking logs of both sides gives
This is a line with slope and vertical intercept. The logarithmic scale is usually labeled in base 10; occasionally in base 2:
A log–linear (sometimes log–lin) plot has the logarithmic scale on the y-axis, and a linear scale on the x-axis; a linear–log (sometimes lin–log) is the opposite. The naming is output–input (y–x), the opposite order from (x, y).
On a semi-log plot the spacing of the scale on the y-axis (or x-axis) is proportional to the logarithm of the number, not the number itself. It is equivalent to converting the y values (or x values) to their log, and plotting the data on linear scales. A log–log plot uses the logarithmic scale for both axes, and hence is not a semi-log plot.
Equations
The equation of a line on a linear–log plot, where the abscissa axis is scaled logarithmically (with a logarithmic base of n), would be
The equation for a line on a log–linear plot, with an ordinate axis logarithmically scaled (with a logarithmic base of n), would be:
Finding the function from the semi–log plot
Linear–log plot
On a linear–log plot, pick some fixed point (x0, F0), where F0 is shorthand for F(x0), somewhere on the straight line in the above graph, and further some other arbitrary point (x1, F1) on the same graph. The slope formula of the plot is:
which leads to
or
which means that
In other words, F is proportional to the logarithm of x times the slope of th
|
https://en.wikipedia.org/wiki/Wavefront%20coding
|
In optics and signal processing, wavefront coding refers to the use of a phase modulating element in conjunction with deconvolution to extend the depth of field of a digital imaging system such as a video camera.
Wavefront coding falls under the broad category of computational photography as a technique to enhance the depth of field.
Encoding
The wavefront of a light wave passing through the camera system is modulated using optical elements that introduce a spatially varying optical path length. The modulating elements must be placed at or near the plane of the aperture stop or pupil so that the same modulation is introduced for all field angles across the field-of-view. This modulation corresponds to a change in complex argument of the pupil function of such an imaging device, and it can be engineered with different goals in mind: e.g. extending the depth of focus.
Linear phase mask
Wavefront coding with linear phase masks works by creating an optical transfer function that encodes distance information.
Cubic phase mask
Wavefront Coding with cubic phase masks works to blur the image uniformly using a cubic shaped waveplate so that the intermediate image, the optical transfer function, is out of focus by a constant amount. Digital image processing then removes the blur and introduces noise depending upon the physical characteristics of the processor. Dynamic range is sacrificed to extend the depth of field depending upon the type of filter used. It can also correct optical aberration.
The mask was developed by using the ambiguity function and the stationary phase method
History
The technique was pioneered by radar engineer Edward Dowski and his thesis adviser Thomas Cathey at the University of Colorado in the United States in the 1990s. The University filed a patent on the invention. Cathey, Dowski and Merc Mercure founded a company to commercialize the method called CDM-Optics, and licensed the invention from the University. The company was acquired in
|
https://en.wikipedia.org/wiki/Hybrid%20zone
|
A hybrid zone exists where the ranges of two interbreeding species or diverged intraspecific lineages meet and cross-fertilize. Hybrid zones can form in situ due to the evolution of a new lineage but generally they result from secondary contact of the parental forms after a period of geographic isolation, which allowed their differentiation (or speciation). Hybrid zones are useful in studying the genetics of speciation as they can provide natural examples of differentiation and (sometimes) gene flow between populations that are at some point between representing a single species and representing multiple species in reproductive isolation.
Definition
Hybrid zones are areas where the hybrid offspring of two divergent taxa (species, subspecies or genetic "forms") are prevalent and there is a cline in the genetic composition of populations from one taxon to the other. The two (or more) genetically differentiated species or lineages contributing to formation of a hybrid zone are regarded as parental forms. Precise definitions of hybrid zones vary; some insist on increased variability of fitness within the zone, others that hybrids be identifiably different from parental forms and others that they represent secondary contact alone. The widths of such zones can vary from tens of metres to hundreds of kilometres. The shape of the zones (clines) can be gradual or stepped. Additionally, hybrid zones may be ephemeral or long-lasting.
Some hybrid zones can be seen as presenting a paradox for the biological definition of a species, usually given as "a population of actually or potentially interbreeding individuals that produce fertile offspring" under what has become known as the Biological Species Concept. Under this definition, both parental forms could be argued to be the same species if they produce fertile offspring at least some of the time. However, the two parental populations or species often remain identifiably distinct, conforming to an alternative, and presently p
|
https://en.wikipedia.org/wiki/Breath%20mark
|
A breath mark or luftpause is a symbol used in musical notation. It directs the performer of the music passage to take a breath (for wind instruments and vocalists) or to make a slight pause (for non-wind instruments). This pause is normally intended to shorten the duration of the preceding note and not to alter the tempo; in this function it can be thought of as a grace rest. It is usually placed above the staff and at the ends of phrases. Its function is analogous to the comma in several written languages. Indeed, a common notation for the breath mark looks very similar to a written comma.
|
https://en.wikipedia.org/wiki/Lacunary%20value
|
In complex analysis, a subfield of mathematics, a lacunary value or gap of a complex-valued function defined on a subset of the complex plane is a complex number which is not in the image of the function.
More specifically, given a subset X of the complex plane C and a function f : X → C, a complex number z is called a lacunary value of f if z ∉ image(f).
Note, for example, that 0 is the only lacunary value of the complex exponential function. The two Picard theorems limit the number of possible lacunary values of certain types of holomorphic functions.
|
https://en.wikipedia.org/wiki/Leibniz%20operator
|
In abstract algebraic logic, a branch of mathematical logic, the Leibniz operator is a tool used to classify deductive systems, which have a precise technical definition and capture a large number of logics. The Leibniz operator was introduced by Wim Blok and Don Pigozzi, two of the founders of the field, as a means to abstract the well-known Lindenbaum–Tarski process, that leads to the association of Boolean algebras to classical propositional calculus, and make it applicable to as wide a variety of sentential logics as possible. It is an operator that assigns to a given theory of a given sentential logic, perceived as a term algebra with a consequence operation on its universe, the largest congruence on the algebra that is compatible with the theory.
Formulation
In this article, we introduce the Leibniz operator in the special case of classical propositional calculus, then we abstract it to the general notion applied to an arbitrary sentential logic and, finally, we summarize some of the most important consequences of its use in the theory of abstract algebraic logic.
Let
denote the classical propositional calculus. According to the classical
Lindenbaum–Tarski process, given a theory
of ,
if
denotes the binary relation on the set of formulas
of , defined by
if and only if
where denotes the usual
classical propositional equivalence connective, then
turns out to be a congruence
on the formula algebra. Furthermore, the quotient
is a Boolean algebra
and every Boolean algebra may be formed in this way.
Thus, the variety of Boolean algebras, which is,
in algebraic logic terminology, the
equivalent algebraic semantics (algebraic counterpart)
of classical propositional calculus, is the class of
all algebras formed by taking appropriate quotients
of term algebras by those special kinds of
congruences.
Notice that the condition
that defines
is equivalent to the
condition
for every formula : if and only if .
Passing now to an arbitrary sent
|
https://en.wikipedia.org/wiki/Knuth%20Prize
|
The Donald E. Knuth Prize is a prize for outstanding contributions to the foundations of computer science, named after the American computer scientist Donald E. Knuth.
History
The Knuth Prize has been awarded since 1996 and includes an award of US$5,000. The prize is awarded by ACM SIGACT and by IEEE Computer Society's Technical Committee on the Mathematical Foundations of Computing. Prizes are awarded in alternating years at the ACM Symposium on Theory of Computing and at the IEEE Symposium on Foundations of Computer Science, which are among the most prestigious conferences in theoretical computer science. The recipient of the Knuth Prize delivers a lecture at the conference.
For instance, David S. Johnson "used his Knuth Prize lecture to push for practical applications for algorithms."
In contrast with the Gödel Prize, which recognizes outstanding papers, the Knuth Prize is awarded to individuals for their overall impact in the field.
Winners
Since the prize was instituted in 1996, it has been awarded to the following individuals, with the citation for each award quoted (not always in full):
Selection Committees
See also
List of computer science awards
|
https://en.wikipedia.org/wiki/JUICE%20%28software%29
|
JUICE is a widely used non-commercial software package for editing and analysing phytosociological data.
It was developed at the Masaryk University in Brno, Czech Republic in 1998, and is fully described in English manual. It makes use of the previously-developed TURBOVEG software for entering and storing such data) and it offers a quite powerful tool for vegetation data analysis, including:
creation of synoptic tables
determination of diagnostic species according to their fidelity
calculation of Ellenberg indicator values for relevés, various indices of alpha and beta diversity
classification of relevés using TWINSPAN or cluster analysis
expert system for vegetation classification based on COCKTAIL method etc.
See also
Phytosociology
Phytogeography
Biogeography
External links
Tichy, L. 2002. JUICE, software for vegetation classification. J. Veg. Sci. 13: 451-453. (Basic scientific article on the program).
Uses in scientific journals
Pyšek P., Jarošík V., Chytrý M., Kropáč Z., Tichý L. & Wild J. 2005. Alien plants in temperate weed communities: prehistoric and recent invaders occupy different habitats. Ecology 86: 772–785.
Ewald, J A critique for phytosociology Journal of Vegetation Science (April 2003) 14(2)291-296
Science software
Botany
Biogeography
Ecological data
|
https://en.wikipedia.org/wiki/Debt%20service%20coverage%20ratio
|
The debt service coverage ratio (DSCR), known as "debt coverage ratio" (DCR), is a financial metric used to assess an entity's ability to generate enough cash to cover its debt service obligations. These obligations include interest, principal, and lease payments. The DSCR is calculated by dividing the operating income available for debt service by the total amount of debt service due.
A higher DSCR indicates that an entity has a greater ability to service its debts, making it easier for it to obtain loans. Banks and lenders often use a minimum DSCR ratio as a condition in the covenant, and a breach can sometimes be considered an act of default.
Uses
In corporate finance, DSCR refers to the amount of cash flow available to meet annual interest and principal payments on debt, including sinking fund payments.
In personal finance, DSCR refers to a ratio used by bank loan officers in determining debt servicing ability.
In commercial real estate finance, DSCR is the primary measure to determine if a property will be able to sustain its debt based on cash flow. In the late 1990s and early 2000s banks typically required a DSCR of at least 1.2, but more aggressive banks would accept lower ratios, a risky practice that contributed to the Financial crisis of 2007–2010. A DSCR over 1 means that (in theory, as calculated to bank standards and assumptions) the entity generates sufficient cash flow to pay its debt obligations. A DSCR below 1.0 indicates that there is not enough cash flow to cover loan payments. In certain industries where non-recourse project finance is used, a Debt Service Reserve Account is commonly used to ensure that loan repayment can be met even in periods with DSCR<1.0
Calculation
In general, it is calculated by:
where:
To calculate an entity's debt coverage ratio, you first need to determine the entity's net operating income (NOI). NOI is the difference between gross revenue and operating expenses. NOI is meant to reflect the true income of an en
|
https://en.wikipedia.org/wiki/Oh%20Mummy
|
Oh Mummy is a video game for the Amstrad CPC models of home computer. It was developed by Gem Software and published by Amsoft in 1984. It was often included in the free bundles of software that came with the computer. The gameplay is similar to that of the 1981 arcade game Amidar.
Gameplay
The object of the game is to unveil all of the treasure within each level (or pyramid) of the game whilst avoiding the mummies. Each level consists of a two-dimensional board. In contrast with Pac-Man, when the player's character walks around, footprints are left behind. By surrounding an area of the maze with footprints, its content is revealed, which is either a scroll, a mummy, a key, a tomb or nothing at all. In order to complete a level, it is necessary to unveil the key and a tombstone. The scroll enables the player to kill/eat one mummy on the level. If a mummy is unveiled, it follows the player to the next level. The difficulty and speed of the game increases as the player progresses through the levels.
The game is primarily for one player but has a limited multiplayer mode in which players can alternate taking a turn to play each level. Whilst, even at the time, it was considered simple in terms of gameplay, graphics and sound, it was for many people one of the better and more addictive early offerings for the Amstrad.
The music played during gameplay is based on the children's song "The Streets of Cairo, or the Poor Little Country Maid".
Ports
The game was also released for the MSX, ZX Spectrum, the Amstrad CPC 464, Tatung Einstein and Camputers Lynx. The ZX Spectrum version was given away in one of several introductory software packs for the computer, this particular pack also including Crazy Golf, Alien Destroyer, Punchy, Treasure Island and Disco Dan. The game was also unofficially ported to the Sega Genesis and Mattel Intelevision.
|
https://en.wikipedia.org/wiki/Gamelan%20notation
|
Notation plays a relatively minor role in the oral traditions of Indonesian gamelan but, in Java and Bali, several systems of gamelan notation were devised beginning at the end of the 19th century, initially for archival purposes.
Kepatihan
Kepatihan is a type of cipher musical notation that was devised for the notation of the Indonesian gamelan.
History
The system was devised around 1900 at the Kepatihan (the Grand Vizier's compound) in Surakarta, and was based upon the Galin-Paris-Chevé system, imported in the nineteenth century by Christian missionaries to allow the notation of hymns. It superseded several other notation systems of Javanese origin devised around the same time.
Notation
The pitches of the seven-tone pélog tuning system are designated by the numbers 1, 2, 3, 4, 5, 6, and 7; while the five-tone slendro pitches are notated as 1, 2, 3, 5, and 6. The octaves are noted by dots above and below the numbers, as in Chinese jianpu, although of course the pitches do not correspond. A dot over a note indicates the octave above, and a dot below a note represents the octave below. Two dots over a note indicate a note two octaves higher than standard, and so on.
Depending on the tuning of the individual gamelan, it is often possible to hear the pitches 1, 2, 3, 5, and 6 of slendro as an anhemitonic pentatonic scale, do-re-mi-sol-la. However, in the pélog system pitches are simply numbered from low to high 1–7 and there is no question of interpreting these sounds diatonically. As the pélog scale is essentially a five-note scale, the notes 4 and 7 function similarly to 'accidentals' in Western terms: a 4 may serve as a 'sharp' or raised 3 (common in patet lima or nem) or as a 'flat' or lowered 5 (usual in patet barang). Similarly 7 functions as a 'flat' 1 in patet lima or nem; 1 in patet barang may function as a 'sharp' 7, but is more often interpreted as a temporary change of pathet.
By default, kepatihan notes are assumed all to have the same duration. D
|
https://en.wikipedia.org/wiki/Ramblin%27%20Wreck
|
The Ramblin' Wreck from Georgia Tech is the 1930 Ford Model A Sport coupe that serves as the official mascot of the student body at the Georgia Institute of Technology. The Wreck is present at all major sporting events and student body functions. Its most noticeable role is leading the football team into Bobby Dodd Stadium at Historic Grant Field, a duty which the Wreck has performed since 1961. The Ramblin' Wreck is mechanically and financially maintained on campus by students in Ramblin' Reck Club.
The first mechanical Wreck was a 1914 Ford Model T owned by Dean Floyd Field. Until the current Wreck was donated to the school in 1961, most of the early Ramblin' Wrecks were owned by students, faculty or alumni. The modern Wreck has donned a number of different paint jobs and has had several restorations and modifications made to it. These changes were made by various individuals and organizations over the years, including Bobby Dodd and Georgia Tech Alumnus Pete George, who worked at the Ford plant in Hapeville, Georgia. The upkeep of the Wreck has been the sole responsibility of Ramblin' Reck Club and the Wreck driver since 1987.
The Ramblin' Wreck has been the target of several pranks perpetrated by rival schools; the University of Tennessee once provided the Wreck with an unsolicited new paint job, and the University of Georgia has stolen the Wreck on at least two occasions. Several replica or "false" Wrecks are owned by alumni, or are used for display and do not run. The official Ramblin' Wreck is considered the only "true" Wreck, and no backups or replacements exist.
History
The term "Ramblin' Wreck" has been used to refer to students and alumni of Georgia Tech much longer than the car that now bears the name has been in existence. The expression has its origins in the late 19th century and was used originally to refer to the makeshift motorized vehicles constructed by Georgia Tech engineers employed in projects in the jungles of Central America. The Wrecks
|
https://en.wikipedia.org/wiki/Pericline
|
Pericline also refers to a doubly plunging anticline or syncline.
Pericline is a form of albite exhibiting elongate prismatic crystals.
Pericline twinning is a type of crystal twinning which show fine parallel twin laminae typically found in the alkali feldspars microcline. The twinning results from a structural transformation between high temperature and low temperature forms.
|
https://en.wikipedia.org/wiki/KCOP-TV
|
KCOP-TV (channel 13) is a television station in Los Angeles, California, United States, serving as the West Coast flagship of MyNetworkTV. It is owned and operated by Fox Television Stations alongside Fox outlet KTTV (channel 11). Both stations share studios at the Fox Television Center located in West Los Angeles, while KCOP-TV's transmitter is located atop Mount Wilson.
History
Early history
Channel 13 first signed on the air on September 17, 1948, as KLAC-TV (standing for Los Angeles, California), and adopted the moniker "Lucky 13". It was originally co-owned with local radio station KLAC (570 AM). Operating as an independent station early on, it began running some programming from the DuMont Television Network in 1949 after KTLA (channel 5) ended its affiliation with the network after a one-year tenure. One of KLAC-TV's earlier stars was veteran actress Betty White, who starred in Al Jarvis's Make-Believe Ballroom (later Hollywood on Television) from 1949 to 1952, and then her own sitcom, Life with Elizabeth from 1952 to 1956. Television personality Regis Philbin and actor/director Leonard Nimoy once worked behind the scenes at channel 13, and Oscar Levant had his own show on the station from 1958 to 1960.
On December 23, 1953, the now-defunct Copley Press (publishers of the San Diego Union-Tribune) purchased KLAC-TV and changed its call letters to the current KCOP, which reflected their ownership. A Bing Crosby-led group purchased the station in June 1957. In 1959, the NAFI Corporation, which would later merge with Chris-Craft Boats to become Chris-Craft Industries, bought channel 13. NAFI/Chris-Craft would be channel 13's longest-tenured owner, running it for over 40 years.
For most of its first 46 years on the air, channel 13 was a typical general entertainment independent station. It was usually the third or fourth highest-rated independent in Southern California, trading the #3 spot with KHJ-TV (channel 9, now KCAL-TV). The station carried Operation Pr
|
https://en.wikipedia.org/wiki/Molecular%20logic%20gate
|
A molecular logic gate is a molecule that performs a logical operation based on one or more physical or chemical inputs and a single output. The field has advanced from simple logic systems based on a single chemical or physical input to molecules capable of combinatorial and sequential operations such as arithmetic operations (i.e. moleculators and memory storage algorithms). Molecular logic gates work with input signals based on chemical processes and with output signals based on spectroscopic phenomena.
Logic gates are the fundamental building blocks of electrical circuits. They can be used to construct digital architectures with varying degrees of complexity by a cascade of a few to several million logic gates. Logic gates are essentially physical devices that produce a singular binary output after performing logical operations based on Boolean functions on one or more binary inputs. The concept of molecular logic gates, extending the applicability of logic gates to molecules, aims to convert chemical systems into computational units. Over the past three decades, the field has evolved to realize several practical applications in molecular electronics, biosensing, DNA computing, nanorobotics, and cell imaging, among others.
Working principle
For logic gates with a single input, there are four possible output patterns. When the input is 0, the output can be either a 0 or 1. When the input is 1, the output can again be 0 or 1. The four output bit patterns that can arise corresponds to a specific logic type: PASS 0, YES, NOT, and PASS 1. PASS 0 always outputs 0, whatever the input. PASS 1 always outputs 1, whatever the input. YES outputs a 1 when the input is 1, and NOT is the inverse of YES – it outputs a 0 when the input is 1.
AND, OR, XOR, NAND, NOR, XNOR, and INH are two-input logic gates. The AND, OR, and XOR gates are fundamental logic gates, and the NAND, NOR, and XNOR gates are complementary to AND, OR, and XOR gates, respectively. An INHIBIT (INH) gat
|
https://en.wikipedia.org/wiki/Nepenthes%20campanulata
|
Nepenthes campanulata (; from Late Latin campānulātus "bell-shaped"), the bell-shaped pitcher-plant, is a tropical pitcher plant native to Borneo. It has also been reported from Palawan, the Philippines, though further field work is needed to confirm this identification.
Forest fires destroyed the only known population of N. campanulata in 1983 and it was uncertain whether the species had survived elsewhere or was in fact extinct. It was rediscovered in 1997, several hundred kilometres from the type locality. Nepenthes campanulata is listed as Vulnerable on the 2014 IUCN Red List of Threatened Species.
Nepenthes campanulata has no known natural hybrids. No infraspecific taxa have been described.
Discovery and naming
Nepenthes campanulata was first collected on 9 September 1957, on Mount Ilas Bungaan by A.J.G. 'Doc' Kostermans, the head of the Botanical Division of the Forestry Research Institute at Bogor, on the same expedition in which he collected the type material of N. mapuluensis. Kostermans wrote the following account of his discovery:
I was working for the Forestry Department at that time in Sangkulirang and when I had finished I wanted to find out about a flowering rock, Ilas Bungaan, upriver. After 10 days walking I saw the yellowish rock for the first time. When we were there we discovered that the yellow colour was that of the leaves of a Nepenthes completely covering the steep face of the 50 m high rock. We cut a tree that fell to the rock and acted as a ladder and climbed up. The Nepenthes was not in flower or fruit, but we found caves in the rock and in the caves a couple of boat-like coffins with sculptured dog-head ends which contained decapitated skeletons.
Nepenthes campanulata was described by Shigeo Kurata in 1973 based on a single specimen, Kostermans 13764, deposited at the herbarium of the Singapore Botanic Gardens. An isotype labelled "spec. nov.!" is held at the Museum National d'Histoire Naturelle in Paris. Two more isotypes are depos
|
https://en.wikipedia.org/wiki/Haasiophis
|
Haasiophis, consisting of the sole species Haasiophis terrasanctus, is an extinct genus of snakes with hind limbs. It is one of three genera of Cenomanian snakes known to have possessed hindlimbs.
Etymology
The genus was named in honor of the late paleontologist Georg Haas, who first began work in the fossils of Ein Yabrud and started the description of the genus before he died, plus the Greek "ophis", for snake . The specific names is from the Latin "terrasanctus" meaning "of the holy land".
Specimen material
H. terrasanctus is known from a single fossil discovered at Ein Yabrud in the Judean hills, near Ramallah, 20 km north of Jerusalem, in the central West Bank. This site also produced the type and only specimen for the sister genus Pachyrhachis. This site is a limestone carbonate which deposited in a low-energy marine platform environment. The only known specimen of H. terrasanctus, housed in the collections of the Hebrew University of Jerusalem as specimen HUJ-Pal. EJ 695., measures 88 cm, missing only the tip of the tail, and is considered a small snake.
Skull
The skull is well preserved though slightly compressed. In the type description the cranium is described as showing a mix of basal characters, like those found in pipe snakes, and advanced traits found in macrostomatans. The cranium shows a small premaxilla which bears no teeth, while the maxilla, palatine, pterygoid, and dentar bones host 73-75 teeth. The preorbital area of the skull, being small and slender, is similar to the preorbital area of pythonine snakes. The contact between the prefrontal and frontal bones of the skull are very similar to ones found in the sister genus Pachyrhachis and the unrelated Dinilysia. Due to the tail of the specimen being missing, the total vertebrae is 199, plus fragments of a 200th, with the rib cage extending from the 5th to the 154th vertebrae. Lymphapophyses (forked 'cloacal' ribs) are found beginning on the 155th vertebrae and continuing to the 160th. Th
|
https://en.wikipedia.org/wiki/Pachyrhachis
|
Pachyrhachis (from , 'thick' and , 'spine') is an extinct genus of snake with well developed hind legs known from fossils discovered in Ein Yabrud, near Ramallah, in the central West Bank. It is a relatively small snake, measuring more than long at maximum. Pachyrhachis appears to have been an ancient marine snake; the fossils occur in a marine limestone deposit, and the thickened bone of the ribs and vertebrae would have functioned as ballast to decrease the buoyancy of the animal, allowing it to dive beneath the ancient Cretaceous seas that it once inhabited.
Pachyrhachis is one of three genera of Cenomanian snakes with hindlimbs. Although many modern pythons and boas still retain remnants of legs, in the form of small spurs, the tiny legs of Pachyrhachis included a hip, knee, and ankle joint. Pachyrhachis was originally described by Haas (1979, 1980) who noted it had a puzzling melange of snake and lizard features; its status as an early snake was later confirmed (Caldwell and Lee 1997).
The position of Pachyrhachis within snakes has been debated (e.g. Lee and Scanlon 2002; Rieppel et al. 2003). Pachyrhachis is among the oldest known snakes and retains well-developed hind limbs, suggesting it represented a transitional form linking snakes to marine lizards (Lee and Scanlon 2002), though other studies place Pachyrhachis within the modern snake radiation Macrostomata (Zaher & Rieppel, 1999).
See also
Other known fossil snakes with legs:
Eupodophis
Haasiophis
Najash
|
https://en.wikipedia.org/wiki/Extremal%20optimization
|
Extremal optimization (EO) is an optimization heuristic inspired by the Bak–Sneppen model of self-organized criticality from the field of statistical physics. This heuristic was designed initially to address combinatorial optimization problems such as the travelling salesman problem and spin glasses, although the technique has been demonstrated to function in optimization domains.
Relation to self-organized criticality
Self-organized criticality (SOC) is a statistical physics concept to describe a class of dynamical systems that have a critical point as an attractor. Specifically, these are non-equilibrium systems that evolve through avalanches of change and dissipations that reach up to the highest scales of the system. SOC is said to govern the dynamics behind some natural systems that have these burst-like phenomena including landscape formation, earthquakes, evolution, and the granular dynamics of rice and sand piles. Of special interest here is the Bak–Sneppen model of SOC, which is able to describe evolution via punctuated equilibrium (extinction events) – thus modelling evolution as a self-organised critical process.
Relation to computational complexity
Another piece in the puzzle is work on computational complexity, specifically that critical points have been shown to exist in NP-complete problems, where near-optimum solutions are widely dispersed and separated by barriers in the search space causing local search algorithms to get stuck or severely hampered. It was the evolutionary self-organised criticality model by Bak and Sneppen and the observation of critical points in combinatorial optimisation problems that lead to the development of Extremal Optimization by Stefan Boettcher and Allon Percus.
The technique
EO was designed as a local search algorithm for combinatorial optimization problems. Unlike genetic algorithms, which work with a population of candidate solutions, EO evolves a single solution and makes local modifications to the worst comp
|
https://en.wikipedia.org/wiki/Mu%20wave
|
The sensorimotor mu rhythm, also known as mu wave, comb or wicket rhythms or arciform rhythms, are synchronized patterns of electrical activity involving large numbers of neurons, probably of the pyramidal type, in the part of the brain that controls voluntary movement. These patterns as measured by electroencephalography (EEG), magnetoencephalography (MEG), or electrocorticography (ECoG), repeat at a frequency of 7.5–12.5 (and primarily 9–11) Hz, and are most prominent when the body is physically at rest. Unlike the alpha wave, which occurs at a similar frequency over the resting visual cortex at the back of the scalp, the mu rhythm is found over the motor cortex, in a band approximately from ear to ear. People suppress mu rhythms when they perform motor actions or, with practice, when they visualize performing motor actions. This suppression is called desynchronization of the wave because EEG wave forms are caused by large numbers of neurons firing in synchrony. The mu rhythm is even suppressed when one observes another person performing a motor action or an abstract motion with biological characteristics. Researchers such as V. S. Ramachandran and colleagues have suggested that this is a sign that the mirror neuron system is involved in mu rhythm suppression, although others disagree.
The mu rhythm is of interest to a variety of scholars. Scientists who study neural development are interested in the details of the development of the mu rhythm in infancy and childhood and its role in learning. Since a group of researchers believe that autism spectrum disorder (ASD) is strongly influenced by an altered mirror neuron system and that mu rhythm suppression is a downstream indication of mirror neuron activity, many of these scientists have kindled a more popular interest in investigating the mu wave in people with ASD. Assorted investigators are also in the process of using mu rhythms to develop a new technology: the brain–computer interface (BCI). With the emergence
|
https://en.wikipedia.org/wiki/Ecological%20indicator
|
Ecological indicators are used to communicate information about ecosystems and the impact human activity has on ecosystems to groups such as the public or government policy makers. Ecosystems are complex and ecological indicators can help describe them in simpler terms that can be understood and used by non-scientists to make management decisions. For example, the number of different beetle taxa found in a field can be used as an indicator of biodiversity.
Many different types of indicators have been developed. They can be used to reflect a variety of aspects of ecosystems, including biological, chemical and physical. Due to this variety, the development and selection of ecological indicators is a complex process.
Using ecological indicators is a pragmatic approach since direct documentation of changes in ecosystems as related to management measures, is cost and time intensive. For example, it would be expensive and time-consuming to count every bird, plant and animal in a newly restored wetland to see if the restoration was a success. Instead, a few indicator species can be monitored to determine the success of the restoration.
"It is difficult and often even impossible to characterize the functioning of a complex system, such as an eco-agrosystem, by means of direct measurements. The size of the system, the complexity of the interactions involved, or the difficulty and cost of the measurements needed are often crippling"
The terms ecological indicator and environmental indicator are often used interchangeably. However, ecological indicators are actually a sub-set of environmental indicators. Generally, environmental indicators provide information on pressures on the environment, environmental conditions and societal responses. Ecological indicators refer only to ecological processes; however, sustainability indicators are seen as increasingly important for managing humanity's coupled human-environmental systems.
Ecological indicators play an important ro
|
https://en.wikipedia.org/wiki/Gynecologic%20pathology
|
Gynecologic pathology is the medical pathology subspecialty dealing with the study and diagnosis of disease involving the female genital tract. A physician who practices gynecologic pathology is a gynecologic pathologist. The term originates from the Greek gyno-(gynaikos) meaning "woman" and the suffix -ology, meaning "study of".
Gynecologic pathologists specialize in the tissue-based diagnosis of diseases of the female reproductive system. This includes neoplastic diseases of the vulva, vagina, cervix, endometrium, fallopian tube, uterus, and ovary, as well as non-neoplastic diseases of these structures.
In the United States, gynecologic pathology training typically involves obtaining a medical doctorate, followed by residency in anatomic pathology or combined anatomic and clinical pathology certified by the American Board of Pathology. Fellowship training in surgical pathology or gynecologic pathology are additional credentials toward a career as a gynecological pathologist.
See also
Gynecological pathology, including diseases of the female genital tract and the placenta
Anatomic pathology
Cytopathology
|
https://en.wikipedia.org/wiki/MIDI%20tuning%20standard
|
MIDI Tuning Standard (MTS) is a specification of precise musical pitch agreed to by the MIDI Manufacturers Association in the MIDI protocol. MTS allows for both a bulk tuning dump message, giving a tuning for each of 128 notes, and a tuning message for individual notes as they are played.
Frequency values
If ƒ is a frequency, then the corresponding frequency data value d may be computed by
The quantity log2 (ƒ / 440 Hz) is the number of octaves above the 440-Hz concert A (it is negative if the frequency is below that pitch). Multiplying it by 12 gives the number of semitones above that frequency. Adding 69 gives the number of semitones above the C five octaves below middle C.
Since 440 Hz is a widely used standard concert A (e.g. USA, UK), and since that is represented in MIDI terms by the integer 69 (nine semitones above middle C, which is 60), this gives a real number which expresses pitch in a manner consistent with MIDI and integer notation, known as the MIDI note number.
Converting from MIDI note number (d) to frequency (f) is given by the following formula:
Frequency Data Format
The frequency data format allows for the precise notation of frequencies that differ from equal temperament.
"Frequency data shall be defined in [units] which are fractions of a semitone. The frequency range starts at MIDI note 0, C = 8.1758 Hz, and extends above MIDI note 127, G = 12543.854 Hz. The first byte of the frequency data word specifies the highest equal-tempered semitone not exceeding the frequency. The next two bytes (14 bits) specify the fraction of 100 cents above the semitone at which the frequency lies. Effective resolution = 100 cents / 214 = .0061 cents."
This higher resolution allows a logarithmic representation of pitch in which the semitone is divided into 1282 = 214 = 16384 parts, which means the octave is divided into 196608 (logarithmically) equal parts. These parts are exactly 100/16384 cents (approximately 0.0061 cents) in size, which is far below the
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.