source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Medical%20humanities
Medical humanities is an interdisciplinary field of medicine which includes the humanities (philosophy of medicine, medical ethics and bioethics, history of medicine, literary studies and religion), social science (psychology, medical sociology, medical anthropology, cultural studies, health geography) and the arts (literature, theater, film, and visual arts) and their application to medical education and practice. Medical humanities uses interdisciplinary research to explore experiences of health and illness, often focusing on subjective, hidden, or invisible experience. This interdisciplinary strength has given the field a noted diversity and encouraged creative 'epistemological innovation'. Medical humanities is sometimes conflated with health humanities which also broadly links health and social care disciplines with the arts and humanities. Definitions Medical humanities can be defined as an interdisciplinary, and increasingly international endeavor that draws on the creative and intellectual strengths of diverse disciplines, including literature, art, creative writing, drama, film, music, philosophy, ethical decision making, anthropology, and history, in pursuit of medical educational goals. The humanistic sciences are relevant when multiple people’s perspectives on issues are compiled together to answer questions or even create questions. The arts can provide additional perspective to the sciences. Critical medical humanities is an approach which argues that the arts and humanities have more to offer to healthcare than simply improving medical education. It proposes that the arts and humanities offer different ways of thinking about human history, culture, behaviour and experience which can be used to dissect, critique and influence healthcare practices and priorities. The arts Medical books, pictures, and diagrams help medical students build an appreciation for anything in the medical field from the human body to diseases. The medical humanities can as
https://en.wikipedia.org/wiki/BioBlitz
A BioBlitz, also written without capitals as bioblitz, is an intense period of biological surveying in an attempt to record all the living species within a designated area. Groups of scientists, naturalists, and volunteers conduct an intensive field study over a continuous time period (e.g., usually 24 hours). There is a public component to many BioBlitzes, with the goal of getting the public interested in biodiversity. To encourage more public participation, these BioBlitzes are often held in urban parks or nature reserves close to cities. Research into the best practices for a successful BioBlitz has found that collaboration with local natural history museums can improve public participation. As well, BioBlitzes have been shown to be a successful tool in teaching post-secondary students about biodiversity. Features A BioBlitz has different opportunities and benefits than a traditional, scientific field study. Some of these potential benefits include: Enjoyment – Instead of a highly structured and measured field survey, this sort of event has the atmosphere of a festival. The short time frame makes the search more exciting. Local – The concept of biodiversity tends to be associated with coral reefs or tropical rainforests. A BioBlitz offers the chance for people to visit a nearby setting and see that local parks have biodiversity and are important to conserve. Science – These one-day events gather basic taxonomic information on some groups of species. Meet the Scientists – A BioBlitz encourages people to meet working scientists and ask them questions. Identifying rare and unique species/groups – When volunteers and scientists work together, they are able to identify uncommon or special habitats for protection and management and, in some cases, rare species may be uncovered. Documenting species occurrence – BioBlitzes do not provide a complete species inventory for a site, but they provide a species list which makes a basis for a more complete inventory and will of
https://en.wikipedia.org/wiki/Cardinality%20of%20the%20continuum
In set theory, the cardinality of the continuum is the cardinality or "size" of the set of real numbers , sometimes called the continuum. It is an infinite cardinal number and is denoted by (lowercase Fraktur "c") or . The real numbers are more numerous than the natural numbers . Moreover, has the same number of elements as the power set of Symbolically, if the cardinality of is denoted as , the cardinality of the continuum is This was proven by Georg Cantor in his uncountability proof of 1874, part of his groundbreaking study of different infinities. The inequality was later stated more simply in his diagonal argument in 1891. Cantor defined cardinality in terms of bijective functions: two sets have the same cardinality if, and only if, there exists a bijective function between them. Between any two real numbers a < b, no matter how close they are to each other, there are always infinitely many other real numbers, and Cantor showed that they are as many as those contained in the whole set of real numbers. In other words, the open interval (a,b) is equinumerous with This is also true for several other infinite sets, such as any n-dimensional Euclidean space (see space filling curve). That is, The smallest infinite cardinal number is (aleph-null). The second smallest is (aleph-one). The continuum hypothesis, which asserts that there are no sets whose cardinality is strictly between and means that . The truth or falsity of this hypothesis is undecidable and cannot be proven within the widely used Zermelo–Fraenkel set theory with axiom of choice (ZFC). Properties Uncountability Georg Cantor introduced the concept of cardinality to compare the sizes of infinite sets. He famously showed that the set of real numbers is uncountably infinite. That is, is strictly greater than the cardinality of the natural numbers, : In practice, this means that there are strictly more real numbers than there are integers. Cantor proved this statement in several different
https://en.wikipedia.org/wiki/Shear%20modulus
In materials science, shear modulus or modulus of rigidity, denoted by G, or sometimes S or μ, is a measure of the elastic shear stiffness of a material and is defined as the ratio of shear stress to the shear strain: where = shear stress is the force which acts is the area on which the force acts = shear strain. In engineering , elsewhere is the transverse displacement is the initial length of the area. The derived SI unit of shear modulus is the pascal (Pa), although it is usually expressed in gigapascals (GPa) or in thousand pounds per square inch (ksi). Its dimensional form is M1L−1T−2, replacing force by mass times acceleration. Explanation The shear modulus is one of several quantities for measuring the stiffness of materials. All of them arise in the generalized Hooke's law: Young's modulus E describes the material's strain response to uniaxial stress in the direction of this stress (like pulling on the ends of a wire or putting a weight on top of a column, with the wire getting longer and the column losing height), the Poisson's ratio ν describes the response in the directions orthogonal to this uniaxial stress (the wire getting thinner and the column thicker), the bulk modulus K describes the material's response to (uniform) hydrostatic pressure (like the pressure at the bottom of the ocean or a deep swimming pool), the shear modulus G describes the material's response to shear stress (like cutting it with dull scissors). These moduli are not independent, and for isotropic materials they are connected via the equations The shear modulus is concerned with the deformation of a solid when it experiences a force parallel to one of its surfaces while its opposite face experiences an opposing force (such as friction). In the case of an object shaped like a rectangular prism, it will deform into a parallelepiped. Anisotropic materials such as wood, paper and also essentially all single crystals exhibit differing material response to stress or st
https://en.wikipedia.org/wiki/Mass%20flow%20meter
A mass flow meter, also known as an inertial flow meter, is a device that measures mass flow rate of a fluid traveling through a tube. The mass flow rate is the mass of the fluid traveling past a fixed point per unit time. The mass flow meter does not measure the volume per unit time (e.g. cubic meters per second) passing through the device; it measures the mass per unit time (e.g. kilograms per second) flowing through the device. Volumetric flow rate is the mass flow rate divided by the fluid density. If the density is constant, then the relationship is simple. If the fluid has varying density, then the relationship is not simple. For example, the density of the fluid may change with temperature, pressure, or composition. The fluid may also be a combination of phases such as a fluid with entrained bubbles. Actual density can be determined due to dependency of sound velocity on the controlled liquid concentration. Operating principle of a Coriolis flow meter There are two basic configurations of Coriolis flow meter: the curved tube flow meter and the straight tube flow meter. This article discusses the curved tube design. The animations on the right do not represent an actually existing Coriolis flow meter design. The purpose of the animations is to illustrate the operating principle, and to show the connection with rotation. Fluid is being pumped through the mass flow meter. When there is mass flow, the tube twists slightly. The arm through which fluid flows away from the axis of rotation must exert a force on the fluid, to increase its angular momentum, so it bends backwards. The arm through which fluid is pushed back to the axis of rotation must exert a force on the fluid to decrease the fluid's angular momentum again, hence that arm will bend forward. In other words, the inlet arm (containing an outwards directed flow), is lagging behind the overall rotation, the part which in rest is parallel to the axis is now skewed, and the outlet arm (containing an inwa
https://en.wikipedia.org/wiki/Neil%20Robertson%20%28mathematician%29
George Neil Robertson (born November 30, 1938) is a mathematician working mainly in topological graph theory, currently a distinguished professor emeritus at the Ohio State University. Education Robertson earned his B.Sc. from Brandon College in 1959, and his Ph.D. in 1969 at the University of Waterloo under his doctoral advisor William Tutte. Biography In 1969, Robertson joined the faculty of the Ohio State University, where he was promoted to Associate Professor in 1972 and Professor in 1984. He was a consultant with Bell Communications Research from 1984 to 1996. He has held visiting faculty positions in many institutions, most extensively at Princeton University from 1996 to 2001, and at Victoria University of Wellington, New Zealand, in 2002. He also holds an adjunct position at King Abdulaziz University in Saudi Arabia. Research Robertson is known for his work in graph theory, and particularly for a long series of papers co-authored with Paul Seymour and published over a span of many years, in which they proved the Robertson–Seymour theorem (formerly Wagner's Conjecture). This states that families of graphs closed under the graph minor operation may be characterized by a finite set of forbidden minors. As part of this work, Robertson and Seymour also proved the graph structure theorem describing the graphs in these families. Additional major results in Robertson's research include the following: In 1964, Robertson discovered the Robertson graph, the smallest possible 4-regular graph with girth five. In 1994, with Seymour and Robin Thomas, Robertson extended the number of colors for which the Hadwiger conjecture relating graph coloring to graph minors is known to be true. As of 2012 this remains the strongest known result on this conjecture. In 1996, Robertson, Seymour, Thomas, and Daniel P. Sanders published a new proof of the four color theorem, confirming the Appel–Haken proof which until then had been disputed. Their proof also leads to an efficient a
https://en.wikipedia.org/wiki/Paul%20Seymour%20%28mathematician%29
Paul D. Seymour (born 26 July 1950) is a British mathematician known for his work in discrete mathematics, especially graph theory. He (with others) was responsible for important progress on regular matroids and totally unimodular matrices, the four colour theorem, linkless embeddings, graph minors and structure, the perfect graph conjecture, the Hadwiger conjecture, claw-free graphs, χ-boundedness, and the Erdős–Hajnal conjecture. Many of his recent papers are available from his website. Seymour is currently the Albert Baldwin Dod Professor of Mathematics at Princeton University. He won a Sloan Fellowship in 1983, and the Ostrowski Prize in 2003; and (sometimes with others) won the Fulkerson Prize in 1979, 1994, 2006 and 2009, and the Pólya Prize in 1983 and 2004. He received an honorary doctorate from the University of Waterloo in 2008, one from the Technical University of Denmark in 2013, and one from the École normale supérieure de Lyon in 2022. He was an invited speaker in the 1986 International Congress of Mathematicians and a plenary speaker in the 1994 International Congress of Mathematicians. He became a Fellow of the Royal Society in 2022. Early life Seymour was born in Plymouth, Devon, England. He was a day student at Plymouth College, and then studied at Exeter College, Oxford, gaining a BA degree in 1971, and D.Phil in 1975. Career From 1974 to 1976 he was a college research fellow at University College of Swansea, and then returned to Oxford for 1976–1980 as a Junior Research Fellow at Merton College, Oxford, with the year 1978–79 at University of Waterloo. He became an associate and then a full professor at Ohio State University, Columbus, Ohio, between 1980 and 1983, where he began research with Neil Robertson, a fruitful collaboration that continued for many years. From 1983 until 1996, he was at Bellcore (Bell Communications Research), Morristown, New Jersey (now Telcordia Technologies). He was also an adjunct professor at Rutgers University f
https://en.wikipedia.org/wiki/Series%20expansion
In mathematics, a series expansion is a technique that expresses a function as an infinite sum, or series, of simpler functions. It is a method for calculating a function that cannot be expressed by just elementary operators (addition, subtraction, multiplication and division). The resulting so-called series often can be limited to a finite number of terms, thus yielding an approximation of the function. The fewer terms of the sequence are used, the simpler this approximation will be. Often, the resulting inaccuracy (i.e., the partial sum of the omitted terms) can be described by an equation involving Big O notation (see also asymptotic expansion). The series expansion on an open interval will also be an approximation for non-analytic functions. Types of series expansions There are several kinds of series expansions, listed below. Taylor series A Taylor series is a power series based on a function's derivatives at a single point. More specifically, if a function is infinitely differentiable around a point , then the Taylor series of f around this point is given by under the convention . The Maclaurin series of f is its Taylor series about . Laurent series A Laurent series is a generalization of the Taylor series, allowing terms with negative exponents; it takes the form and converges in an annulus. In particular, a Laurent series can be used to examine the behavior of a complex function near a singularity by considering the series expansion on an annulus centered at the singularity. Dirichlet series A general Dirichlet series is a series of the form One important special case of this is the ordinary Dirichlet series Used in number theory. Fourier series A Fourier series is an expansion of periodic functions as a sum of many sine and cosine functions. More specifically, the Fourier series of a function of period is given by the expressionwhere the coefficients are given by the formulae Other series In acoustics, e.g., the fundamental tone and
https://en.wikipedia.org/wiki/Charmin
Charmin ( ) is an American brand of toilet paper manufactured by Procter & Gamble. History The Charmin name was first created on April 19, 1928, by the Hoberg Paper Company in Green Bay, Wisconsin. In 1950, Hoberg changed its name to Charmin Paper Company and continued to produce bath tissue, paper napkins, and other paper products. Procter & Gamble (P&G) acquired Charmin Paper Company in 1957. Charmin Ultra was originally called White Cloud until 1993. In 2008, P&G sold the European operations and product line to SCA, where it was renamed to Cushelle. Advertising Originally, the manufacturer wanted to emphasize the product's softness, but did not know how to convey the idea of that physical sensation on television. The company's advertising agency suggested that shoppers be encouraged to squeeze the product in stores like a grocery shopper would squeeze a tomato to assess its softness, but there was some concern that retailers would object to customers manhandling their merchandise and thus damaging it before purchase. The problem was solved with the concept that the handling would be actively discouraged by a comic antagonistic retailer in the advertisements. In an advertising campaign that lasted over twenty years, American advertisements featured actor Dick Wilson, playing the fictional grocer Mr. George Whipple. Mr. Whipple told his customers: "Please don't squeeze the Charmin!", emphasizing its softness in more than 500 advertisements between 1964 and 1985, and later returning in 1999–2000. The country song "Don' Squeeze My Sharmon", which was a minor hit for Charlie Walker in 1967, was inspired by the ad campaign for Charmin. Mascots In 1928, the logo mascot was a female silhouette, supplemented by a baby in 1953, replacing the woman by 1956. In advertisements, Mr. Whipple was eventually replaced with "The Charmin Bear", created by D'Arcy Masius Benton & Bowles in Britain and introduced to the United States in 2000. The original bear was not 3D-animate
https://en.wikipedia.org/wiki/False%20flag
A false flag operation is an act committed with the intent of disguising the actual source of responsibility and pinning blame on another party. The term "false flag" originated in the 16th century as an expression meaning an intentional misrepresentation of someone's allegiance. The term was famously used to describe a ruse in naval warfare whereby a vessel flew the flag of a neutral or enemy country in order to hide its true identity. The tactic was originally used by pirates and privateers to deceive other ships into allowing them to move closer before attacking them. It later was deemed an acceptable practice during naval warfare according to international maritime laws, provided the attacking vessel displayed its true flag once an attack had begun. The term today extends to include countries that organize attacks on themselves and make the attacks appear to be by enemy nations or terrorists, thus giving the nation that was supposedly attacked a pretext for domestic repression or foreign military aggression. Similarly deceptive activities carried out during peacetime by individuals or nongovernmental organizations have been called false flag operations, but the more common legal term is a "frameup", "stitch up", or "setup". Use in warfare In land warfare, such operations are generally deemed acceptable under certain circumstances, such as to deceive enemies, provided the deception is not perfidious and that all such deceptions are discarded before opening fire upon the enemy. Similarly, in naval warfare such a deception is considered permissible, provided the false flag is lowered and the true flag raised before engaging in battle. Auxiliary cruisers operated in such a fashion in both World Wars, as did Q-ships, while merchant vessels were encouraged to use false flags for protection. Such masquerades promoted confusion not just of the enemy but of historical accounts. In 1914 the Battle of Trindade was fought between the British auxiliary cruiser RMS Carmani
https://en.wikipedia.org/wiki/Stereotype%20%28UML%29
A stereotype is one of three types of extensibility mechanisms in the Unified Modeling Language (UML), the other two being tags and constraints. They allow designers to extend the vocabulary of UML in order to create new model elements, derived from existing ones, but that have specific properties that are suitable for a particular domain or otherwise specialized usage. The nomenclature is derived from the original meaning of stereotype, used in printing. For example, when modeling a network you might need to have symbols for representing routers and hubs. By using stereotyped nodes you can make these things appear as primitive building blocks. Graphically, a stereotype is rendered as a name enclosed by guillemets (« » or, if guillemets proper are unavailable, << >>) and placed above the name of another element. In addition or alternatively it may be indicated by a specific icon. The icon image may even replace the entire UML symbol. For instance, in a class diagram stereotypes can be used to classify method behavior, e.g. with «constructor» and «getter» and refine the classifier itself, e.g. with «interface». One alternative to stereotypes, suggested by Peter Coad in his book Java Modeling in Color with UML: Enterprise Components and Process is the use of colored archetypes. The archetypes indicated by different-colored UML boxes can be used in combination with stereotypes. This added definition of meaning indicates the role that the UML object plays within the larger software system. Stereotype attributes From version 2.0 the previously independent tagged value is considered to be a stereotype attribute. The name tagged value is still kept. Each stereotype has zero or more tag definitions, and all stereotyped UML elements have the corresponding number of tagged values. UML-defined stereotypes Become In UML, become is a keyword for a specific UML stereotype, and applies to a dependency (modeled as a dashed arrow). Become shows that the source modeling el
https://en.wikipedia.org/wiki/R%C3%B6ssler%20attractor
The Rössler attractor is the attractor for the Rössler system, a system of three non-linear ordinary differential equations originally studied by Otto Rössler in the 1970s. These differential equations define a continuous-time dynamical system that exhibits chaotic dynamics associated with the fractal properties of the attractor. Rössler interpreted it as a formalization of a taffy-pulling machine. Some properties of the Rössler system can be deduced via linear methods such as eigenvectors, but the main features of the system require non-linear methods such as Poincaré maps and bifurcation diagrams. The original Rössler paper states the Rössler attractor was intended to behave similarly to the Lorenz attractor, but also be easier to analyze qualitatively. An orbit within the attractor follows an outward spiral close to the plane around an unstable fixed point. Once the graph spirals out enough, a second fixed point influences the graph, causing a rise and twist in the -dimension. In the time domain, it becomes apparent that although each variable is oscillating within a fixed range of values, the oscillations are chaotic. This attractor has some similarities to the Lorenz attractor, but is simpler and has only one manifold. Otto Rössler designed the Rössler attractor in 1976, but the originally theoretical equations were later found to be useful in modeling equilibrium in chemical reactions. Definition The defining equations of the Rössler system are: Rössler studied the chaotic attractor with , , and , though properties of , , and have been more commonly used since. Another line of the parameter space was investigated using the topological analysis. It corresponds to , , and was chosen as the bifurcation parameter. How Rössler discovered this set of equations was investigated by Letellier and Messager. Stability analysis Some of the Rössler attractor's elegance is due to two of its equations being linear; setting , allows examination of the behavior on th
https://en.wikipedia.org/wiki/Incidence%20geometry
In mathematics, incidence geometry is the study of incidence structures. A geometric structure such as the Euclidean plane is a complicated object that involves concepts such as length, angles, continuity, betweenness, and incidence. An incidence structure is what is obtained when all other concepts are removed and all that remains is the data about which points lie on which lines. Even with this severe limitation, theorems can be proved and interesting facts emerge concerning this structure. Such fundamental results remain valid when additional concepts are added to form a richer geometry. It sometimes happens that authors blur the distinction between a study and the objects of that study, so it is not surprising to find that some authors refer to incidence structures as incidence geometries. Incidence structures arise naturally and have been studied in various areas of mathematics. Consequently, there are different terminologies to describe these objects. In graph theory they are called hypergraphs, and in combinatorial design theory they are called block designs. Besides the difference in terminology, each area approaches the subject differently and is interested in questions about these objects relevant to that discipline. Using geometric language, as is done in incidence geometry, shapes the topics and examples that are normally presented. It is, however, possible to translate the results from one discipline into the terminology of another, but this often leads to awkward and convoluted statements that do not appear to be natural outgrowths of the topics. In the examples selected for this article we use only those with a natural geometric flavor. A special case that has generated much interest deals with finite sets of points in the Euclidean plane and what can be said about the number and types of (straight) lines they determine. Some results of this situation can extend to more general settings since only incidence properties are considered. Incidence stru
https://en.wikipedia.org/wiki/Sir%20Dystic
Josh Buchbinder, better known as Sir Dystic, has been a member of Cult of the Dead Cow (cDc) since May 1997, and is the author of Back Orifice. He has also written several other hacker tools, including SMBRelay, NetE, and NBName. Sir Dystic has appeared at multiple hacker conventions, both as a member of panels and speaking on his own. He has also been interviewed on several television and radio programs and in an award-winning short film about hacker culture in general and cDc in particular. Dystic's pseudonym is taken from a somewhat obscure 1930s bondage comic character named "Sir Dystic D'Arcy." According to the cDc's Sir Dystic, his namesake "tried to do evil things but always bungles it and ends up doing good inadvertently." Software Back Orifice Back Orifice (often shortened to BO) is a controversial computer program designed for remote system administration. It enables a user to control a computer running the Microsoft Windows operating system from a remote location. The name is a pun on Microsoft BackOffice Server software. The program debuted at DEF CON 6 on August 1, 1998. It was the brainchild of Sir Dystic, a member of the U.S. hacker organization Cult of the Dead Cow. According to the group, its purpose was to demonstrate the lack of security in Microsoft's operating system Windows 98. According to Sir Dystic, "BO was supposed to be a statement about the fact that people feel secure and safe, although there are wide, gaping holes in both the operating system they're using and the means of defense they're using against hostile code. I mean, that was my message and BO2K really has a different message." Vnunet.com reported Sir Dystic's claim that this message was privately commended by employees of Microsoft. SMBRelay & SMBRelay2 SMBRelay and SMBRelay2 are computer programs that can be used to carry out SMB man in the middle (mitm) attacks on Windows machines. They were written by Sir Dystic and released 21 March 2001 at the @lantacon convention in
https://en.wikipedia.org/wiki/Allyl%20isothiocyanate
Allyl isothiocyanate (AITC) is a naturally occurring unsaturated isothiocyanate. The colorless oil is responsible for the pungent taste of Cruciferous vegetables such as mustard, radish, horseradish, and wasabi. This pungency and the lachrymatory effect of AITC are mediated through the TRPA1 and TRPV1 ion channels. It is slightly soluble in water, but more soluble in most organic solvents. Biosynthesis and biological functions Allyl isothiocyanate can be obtained from the seeds of black mustard (Brassica nigra) or brown Indian mustard (Brassica juncea). When these mustard seeds are broken, the enzyme myrosinase is released and acts on a glucosinolate known as sinigrin to give allyl isothiocyanate. This serves the plant as a defense against herbivores; since it is harmful to the plant itself , it is stored in the harmless form of the glucosinolate, separate from the myrosinase enzyme. When an animal chews the plant, the allyl isothiocyanate is released, repelling the animal. Human appreciation of the pungent is learnt, perhaps wrongly for some, as all condiments above mentioned are nephrotoxic. This compound has recently been shown to strongly repel fire ants (Solenopsis invicta). AITC vapor is also used as an antimicrobial and shelf life extender in food packaging. Commercial and other applications Allyl isothiocyanate is produced commercially by the reaction of allyl chloride and potassium thiocyanate: CH2=CHCH2Cl + KSCN → CH2=CHCH2NCS + KCl The product obtained in this fashion is sometimes known as synthetic mustard oil. Allyl isothiocyanate can also be liberated by dry distillation of the seeds. The product obtained in this fashion is known as volatile oil of mustard and is usually around 92% pure. It is used principally as a flavoring agent in foods. Synthetic allyl isothiocyanate is used as an insecticide, as an anti-mold agent bacteriocide, and nematicide, and is used in certain cases for crop protection. It is also used in fire alarms for the d
https://en.wikipedia.org/wiki/Enlightenment%20Foundation%20Libraries
The Enlightenment Foundation Libraries (EFL) are a set of graphics libraries that grew out of the development of Enlightenment, a window manager and Wayland compositor. The project's focus is to make the EFL a flexible yet powerful and easy to use set of tools to extend the capabilities of both the Enlightenment window manager and other software projects based on the EFL. The libraries are meant to be portable and optimized to be functional even on mobile devices such as smart phones and tablets. The libraries were created for version 0.17 of the window manager. EFL is developed by Enlightenment.org with some sponsorship from Samsung, ProFUSION and Free.fr. EFL is free and open source software. Core components Evas Evas is the EFL canvas library, for creating areas, or windows, that applications can draw on in an X Window System. The EFL uses hardware-acceleration where possible to allow it to work faster, but is also designed to work on lower-end hardware, falling back to lower color and quality for graphics if necessary. Unlike most canvas libraries, it is primarily image-based (as opposed to vector-based) and fully state-aware (the vast majority of canvases are stateless, requiring the programmer to keep track of state). Edje Edje is a library that attempts to separate the user interface from the application. It allows applications to be skinnable, so that it is possible to change the GUI of an application without changing the application itself. Edje-based applications use files which contain the specifications for the GUI layout that is to be used. Edje themes are contained using EET generated files. Ecore Ecore is an event abstraction, and modular convenience library, intended to simplify a number of common tasks. It is modular, so applications need only call the minimal required libraries for a job. Ecore simplifies working with X, Evas, and also a few other things, such as network communications and threads. Embryo Embryo implements a scripting la
https://en.wikipedia.org/wiki/Theodor%20Fritsch
Theodor Fritsch (born Emil Theodor Fritsche; 28 October 1852 – 8 September 1933) was a German publisher and journalist. His antisemitic writings did much to influence popular German opinion against Jews in the late 19th and early 20th centuries. His writings also appeared under the pen names Thomas Frey, Fritz Thor, and Ferdinand Roderich-Stoltheim. He is not to be confused with his son, also Theodor Fritsch (1895–1946), likewise a bookseller and member of the SA. Life Fritsch was born Emil Theodor Fritsche, the sixth of seven children to Johann Friedrich Fritsche, a farmer in the village of Wiesenena (present-day Wiedemar) in the Prussian province of Saxony, and his wife August Wilhelmine, née Ohme. Four of his siblings died in childhood. He attended vocational school (Realschule) in Delitzsch where he learned casting and machine building. He then undertook study at the Royal Trade Academy (Königliche Gewerbeakademie) in Berlin, graduating as a technician in 1875. In the same year Fritsche found employment in a Berlin machine shop. He gained independence in 1879 through the founding of a technical bureau associated with a publishing firm. In 1880 he founded the Deutscher Müllerbund (Miller's League) which issued the publication Der Deutsche Müller (The German Miller). In 1905 he founded the "Saxon Small Business Association." He devoted himself to this organization and to the interests of crafts and small businesses (Mittelstand), as well as to the spread of antisemitic propaganda. When he changed his name to Fritsch is unclear. Publishing Fritsch created an early discussion forum, "Antisemitic Correspondence" in 1885 for antisemites of various political persuasions. In 1887 he sent several editions to Friedrich Nietzsche but was brusquely dismissed. Nietzsche sent Fritsch a letter in which he thanked him to be permitted "to cast a glance at the muddle of principles that lie at the heart of this strange movement", but requested not to be sent again such writi
https://en.wikipedia.org/wiki/Mike%20%26%20Mike
Mike & Mike (formerly Mike & Mike in the Morning) was an American sports-talk radio show that was hosted by Mike Greenberg and Mike Golic on ESPN networks from 2000–2017. The show aired on ESPN Radio, and was simulcast on television, first on ESPNews starting in 2004, and later moving to ESPN2 in 2006. The show primarily focused on the day's biggest sports topics and the humorous banter between the Mikes. It acted as the morning show for both the radio and television sides of the production. Outside of a few radio stations that are able to move or decline carriage of the show for their own local morning productions (or for daytime-only operations, may not be able to carry), Mike & Mike was effectively a compulsory element of the ESPN Radio schedule, which all affiliates of the network were required to carry. On May 7, 2007, the show moved from its longtime radio studio home to the television studio used for Sunday NFL Countdown and Baseball Tonight, and began broadcasting in high-definition in 2007 as well. A daily "best-of" show aired daily on ESPN2 and a weekly radio recap aired Saturday mornings at 6:00 a.m. to 7:00 a.m. and then moved to 5 a.m. ET before being discontinued in October 2009. The radio version of "best-of" returned in February 2010 in the 5am timeslot. In addition, there was a "best-of" podcast distributed every weekday as well. The show reaired on ESPNEWS immediately after the live simulcast. On March 6, 2015, the duo celebrated 15 years of doing the show together. Mike & Mike were inducted into the NAB Broadcasting Hall of Fame on April 19, 2016. On May 16, 2017, and after reports of acrimony between the hosts, it was announced that the show would be replaced by a new morning drive show hosted by Golic and Trey Wingo, with Greenberg moving to the main ESPN channel, where he hosts a morning show called Get Up!, which premiered on April 2, 2018. Greenberg's final day as co-host was November 17, 2017. On November 27, 2017, Mike & Mikes successo
https://en.wikipedia.org/wiki/Electronic%20Frontier%20Canada
Electronic Frontier Canada (EFC) was a Canadian on-line civil rights organization founded to ensure that the principles embodied in the Canadian Charter of Rights and Freedoms remain protected as new computing, communications, and information technologies are introduced into Canadian society. As of 2005, the organization is no longer active. EFC was founded in January, 1994 and later became incorporated under the Canada Corporations Act as a Federal non-profit corporation. The letters patent was submitted December 29, 1994, and recorded on January 18, 1995. EFC is not formally affiliated with the Electronic Frontier Foundation (EFF), which is based in San Francisco, although it shares many of their goals about which the groups communicate from time to time. EFC is focused on issues directly affecting Canadians, whereas the EFF has a clear American focus. Briefly, EFC's mandate is to conduct research into issues and promote public awareness in Canada regarding the application of the Charter of Rights and Freedoms to new computer, communication, and information technologies, such as the Internet. The aim is protect freedom of expression and the right to privacy in cyberspace. As of 2011, has included a submission to the Canadian government concerning the Internet Service Provider wiretapping legislation reforms known as the Lawful Access proposals, and intervention in the BMG Canada Inc. and others v. Doe and others file-sharing case, where an Ontario Court refused to allow the Canadian Recording Industry Association and several major record labels from obtaining the subscriber information of ISP customers alleged to have been infringing copyright. The EFC appears to have been inactive since 2004 (based on the last updates to their website). Similar Organizations OpenMedia.ca Online Rights Canada External links Foundations based in Canada Politics and technology Computer law organizations Internet privacy organizations Privacy organizations Organizations es
https://en.wikipedia.org/wiki/Network%20planning%20and%20design
Network planning and design is an iterative process, encompassing topological design, network-synthesis, and network-realization, and is aimed at ensuring that a new telecommunications network or service meets the needs of the subscriber and operator. The process can be tailored according to each new network or service. A network planning methodology A traditional network planning methodology in the context of business decisions involves five layers of planning, namely: need assessment and resource assessment short-term network planning IT resource long-term and medium-term network planning operations and maintenance. Each of these layers incorporates plans for different time horizons, i.e. the business planning layer determines the planning that the operator must perform to ensure that the network will perform as required for its intended life-span. The Operations and Maintenance layer, however, examines how the network will run on a day-to-day basis. The network planning process begins with the acquisition of external information. This includes: forecasts of how the new network/service will operate; the economic information concerning costs, and the technical details of the network’s capabilities. Planning a new network/service involves implementing the new system across the first four layers of the OSI Reference Model. Choices must be made for the protocols and transmission technologies. The network planning process involves three main steps: Topological design: This stage involves determining where to place the components and how to connect them. The (topological) optimization methods that can be used in this stage come from an area of mathematics called graph theory. These methods involve determining the costs of transmission and the cost of switching, and thereby determining the optimum connection matrix and location of switches and concentrators. Network-synthesis: This stage involves determining the size of the components used, subject
https://en.wikipedia.org/wiki/The%20Herd%20with%20Colin%20Cowherd
The Herd with Colin Cowherd is an American sports talk radio show hosted by Colin Cowherd on Fox Sports Radio and Fox Sports 1. The show features commentary on the day's sports news, perspective on other news stories, and interviews with celebrities, sports analysts and sports figures. History KFXX AM, ESPN Radio & ESPNU (2001-2015) The Herd first aired on KFXX AM in 2001. The show joined ESPN Radio in 2004, rebranding as The Herd With Colin Cowherd, and four years later in 2008 would later be simulcast on ESPNU and ESPNews. During its run on ESPN, Cowherd was joined by on-air by producers Vincent Kates, David Fisch and Tom Wassell, and guest hosted by personalities such as Doug Gottlieb. ESPN Radio SportsCenter updates during the show were performed by Dan Davis. The show was heavily sponsored by Subway, with the guest caller line being dubbed the "Subway Fresh Take Hotline". On his March 5, 2010 show, Colin Cowherd announced that Amanda Gifford would be leaving The Herd to become a "suit". Additionally, the show was cut back one hour, airing three hours, from 10:00 a.m. to 1:00 p.m. Fox Sports Radio & FS1 (2015-Present) Following controversial statements regarding the level of intelligence needed to understand the game of baseball and the education level of players from countries like the Dominican Republic, The Herd pulled from ESPN Radio and ESPNU on July 24, 2015, as Cowherd exited the network. After Cowherd joined Fox Sports, The Herd moved to the Premiere Networks-distributed Fox Sports Radio network, airing from 12:00 to 3:00 p.m. ET. Its television simulcast also moved to FS1. Fox Sports 1 airs a daily highlight show, The Best Thing I Herd, while a weekly highlight show, The Best Thing I Herd This Week, is posted on the program's YouTube channel. On April 25, 2018, co-host Kristine Leahy announced her departure from the show to host her own program on FS1. Her final episode was April 26, 2018. Following her departure, Joy Taylor became the full-time c
https://en.wikipedia.org/wiki/Symmetric%20graph
In the mathematical field of graph theory, a graph is symmetric (or arc-transitive) if, given any two pairs of adjacent vertices and of , there is an automorphism such that and In other words, a graph is symmetric if its automorphism group acts transitively on ordered pairs of adjacent vertices (that is, upon edges considered as having a direction). Such a graph is sometimes also called -transitive or flag-transitive. By definition (ignoring and ), a symmetric graph without isolated vertices must also be vertex-transitive. Since the definition above maps one edge to another, a symmetric graph must also be edge-transitive. However, an edge-transitive graph need not be symmetric, since might map to , but not to . Star graphs are a simple example of being edge-transitive without being vertex-transitive or symmetric. As a further example, semi-symmetric graphs are edge-transitive and regular, but not vertex-transitive. Every connected symmetric graph must thus be both vertex-transitive and edge-transitive, and the converse is true for graphs of odd degree. However, for even degree, there exist connected graphs which are vertex-transitive and edge-transitive, but not symmetric. Such graphs are called half-transitive. The smallest connected half-transitive graph is Holt's graph, with degree 4 and 27 vertices. Confusingly, some authors use the term "symmetric graph" to mean a graph which is vertex-transitive and edge-transitive, rather than an arc-transitive graph. Such a definition would include half-transitive graphs, which are excluded under the definition above. A distance-transitive graph is one where instead of considering pairs of adjacent vertices (i.e. vertices a distance of 1 apart), the definition covers two pairs of vertices, each the same distance apart. Such graphs are automatically symmetric, by definition. A is defined to be a sequence of vertices, such that any two consecutive vertices in the sequence are adjacent, and with any repeated
https://en.wikipedia.org/wiki/Desargues%20graph
In the mathematical field of graph theory, the Desargues graph is a distance-transitive, cubic graph with 20 vertices and 30 edges. It is named after Girard Desargues, arises from several different combinatorial constructions, has a high level of symmetry, is the only known non-planar cubic partial cube, and has been applied in chemical databases. The name "Desargues graph" has also been used to refer to a ten-vertex graph, the complement of the Petersen graph, which can also be formed as the bipartite half of the 20-vertex Desargues graph. Constructions There are several different ways of constructing the Desargues graph: It is the generalized Petersen graph . To form the Desargues graph in this way, connect ten of the vertices into a regular decagon, and connect the other ten vertices into a ten-pointed star that connects pairs of vertices at distance three in a second decagon. The Desargues graph consists of the 20 edges of these two polygons together with an additional 10 edges connecting points of one decagon to the corresponding points of the other. It is the Levi graph of the Desargues configuration. This configuration consists of ten points and ten lines describing two perspective triangles, their center of perspectivity, and their axis of perspectivity. The Desargues graph has one vertex for each point, one vertex for each line, and one edge for every incident point-line pair. Desargues' theorem, named after 17th-century French mathematician Gérard Desargues, describes a set of points and lines forming this configuration, and the configuration and the graph take their name from it. It is the bipartite double cover of the Petersen graph, formed by replacing each Petersen graph vertex by a pair of vertices and each Petersen graph edge by a pair of crossed edges. It is the bipartite Kneser graph . Its vertices can be labeled by the ten two-element subsets and the ten three-element subsets of a five-element set, with an edge connecting two vertices when one o
https://en.wikipedia.org/wiki/Drawing%20Hands
Drawing Hands is a lithograph by the Dutch artist M. C. Escher first printed in January 1948. It depicts a sheet of paper, out of which two hands rise, in the paradoxical act of drawing one another into existence. This is one of the most obvious examples of Escher's common use of paradox. It is referenced in the book Gödel, Escher, Bach, by Douglas Hofstadter, who calls it an example of a strange loop. It is used in Structure and Interpretation of Computer Programs by Harold Abelson and Gerald Jay Sussman as an allegory for the eval and apply functions of programming language interpreters in computer science, which feed each other. Drawing Hands has been referenced and copied many times by artists in different ways. In tech culture, robot hands draw or build each other, or a human hand and robot hand draw each other.
https://en.wikipedia.org/wiki/Hille%E2%80%93Yosida%20theorem
In functional analysis, the Hille–Yosida theorem characterizes the generators of strongly continuous one-parameter semigroups of linear operators on Banach spaces. It is sometimes stated for the special case of contraction semigroups, with the general case being called the Feller–Miyadera–Phillips theorem (after William Feller, Isao Miyadera, and Ralph Phillips). The contraction semigroup case is widely used in the theory of Markov processes. In other scenarios, the closely related Lumer–Phillips theorem is often more useful in determining whether a given operator generates a strongly continuous contraction semigroup. The theorem is named after the mathematicians Einar Hille and Kōsaku Yosida who independently discovered the result around 1948. Formal definitions If X is a Banach space, a one-parameter semigroup of operators on X is a family of operators indexed on the non-negative real numbers {T(t)} t ∈ [0, ∞) such that The semigroup is said to be strongly continuous, also called a (C0) semigroup, if and only if the mapping is continuous for all x ∈ X, where [0, ∞) has the usual topology and X has the norm topology. The infinitesimal generator of a one-parameter semigroup T is an operator A defined on a possibly proper subspace of X as follows: The domain of A is the set of x ∈ X such that has a limit as h approaches 0 from the right. The value of Ax is the value of the above limit. In other words, Ax is the right-derivative at 0 of the function The infinitesimal generator of a strongly continuous one-parameter semigroup is a closed linear operator defined on a dense linear subspace of X. The Hille–Yosida theorem provides a necessary and sufficient condition for a closed linear operator A on a Banach space to be the infinitesimal generator of a strongly continuous one-parameter semigroup. Statement of the theorem Let A be a linear operator defined on a linear subspace D(A) of the Banach space X, ω a real number, and M > 0. Then A generates a strongly
https://en.wikipedia.org/wiki/Hendra%20virus
Hendra virus (Hendra henipavirus) is a zoonotic virus found solely in Australia. First isolated in 1994, the virus has since been connected to numerous outbreaks of disease in domestic horses and seven human cases. Hendra virus belongs to the genus Henipavirus, which also contains the zoonotic Nipah virus. The reservoir species of Hendra virus are four species of bat within the genus Pteropus native to Australia. Pathology Flying foxes experimentally infected with the Hendra virus develop a viraemia and shed the virus in their urine, faeces and saliva for approximately one week. There is no other indication of an illness in them. Symptoms of Hendra virus infection of humans may be respiratory, including hemorrhage and edema of the lungs, or in some cases viral meningitis. In horses, infection usually causes one or more of pulmonary oedema, congestion and neurological signs. Ephrin B2 has been identified as the main receptor for the henipaviruses. Transmission Flying foxes have been identified as the reservoir host of Hendra virus. A seroprevalence of 47% is found in the flying foxes, suggesting an endemic infection of the bat population throughout Australia. Horses become infected with Hendra after exposure to bodily fluid from an infected flying fox. This often happens in the form of urine, feces, or masticated fruit covered in the flying fox's saliva when horses graze below roosting sites. In 2021 a new variant of Hendra virus named "Hendra virus genotype 2" (HeV-g2) was identified in two flying fox species in Australia. It shares 84% sequence homology to other published Hendra virus genomes. This variant has been identified in at least two horses that showed signs of Hendra virus infection. Prevention, detection and treatment Three main approaches are currently followed to reduce the risk to humans. Vaccine for horses. In November 2012, a vaccine became available for horses. The vaccine is to be used in horses only, since, according to CSIRO veterinary path
https://en.wikipedia.org/wiki/Nipah%20virus
Nipah virus is a bat-borne, zoonotic virus that causes Nipah virus infection in humans and other animals, a disease with a very high mortality rate (40-75%). Numerous disease outbreaks caused by Nipah virus have occurred in North East Africa and Southeast Asia. Nipah virus belongs to the genus Henipavirus along with the Hendra virus, which has also caused disease outbreaks. Virology Like other henipaviruses, the Nipah virus genome is a single (non-segmented) negative-sense, single-stranded RNA of over 18 kb, which is substantially longer than that of other paramyxoviruses. The enveloped virus particles are variable in shape, and can be filamentous or spherical; they contain a helical nucleocapsid. Six structural proteins are generated: N (nucleocapsid), P (phosphoprotein), M (matrix), F (fusion), G (glycoprotein) and L (RNA polymerase). The P open reading frame also encodes three nonstructural proteins, C, V and W. There are two envelope glycoproteins. The G glycoprotein ectodomain assembles as a homotetramer to form the viral anti-receptor or attachment protein, which binds to the receptor on the host cell. Each strand in the ectodomain consists of four distinct regions: at the N-terminal and connecting to the viral surface is the helical stalk, followed by the beta-sandwich neck domain, the linker region and finally, at the C-terminal, four heads which contain host cell receptor binding domains. Each head consists of a beta-propeller structure with six blades. There are three unique folding patterns of the heads, resulting in a 2-up/2-down configuration where two heads are positioned distal to the virus and two heads are proximal. Due to the folding patterns and subsequent arrangement of the heads, only one of the four heads is positioned with its binding site accessible to associate with the host B2/B3 receptor. The G protein head domain is also highly antigenic, inducing head-specific antibodies in primate models. As such, it is a prime target for vaccine dev
https://en.wikipedia.org/wiki/Keratoconjunctivitis
Keratoconjunctivitis is inflammation ("-itis") of the cornea and conjunctiva. When only the cornea is inflamed, it is called keratitis; when only the conjunctiva is inflamed, it is called conjunctivitis. Causes There are several potential causes of the inflammation: Keratoconjunctivitis sicca is used when the inflammation is due to dryness. ("Sicca" means "dryness" in medical contexts.) It occurs with 20% of rheumatoid arthritis patients. The term "vernal keratoconjunctivitis" (VKC) is used to refer to keratoconjunctivitis occurring in spring, and is usually considered to be due to allergens. "Atopic keratoconjunctivitis" is one manifestation of atopy. "Epidemic keratoconjunctivitis" is caused by an adenovirus infection. "Infectious bovine keratoconjunctivitis" (IBK) is a disease affecting cattle caused by the bacteria Moraxella bovis. "Pink eye in sheep and goat" is another infectious keratoconjunctivitis of veterinary concern, mostly caused by Chlamydophila pecorum. "Superior limbic keratoconjunctivitis" is thought to be caused by mechanical trauma. "Keratoconjunctivitis photoelectrica" (arc eye) means inflammation caused by photoelectric UV light. It is a type of ultraviolet keratitis. Such UV exposure can be caused by arc welding without wearing protective eye glass, or by high altitude exposure from sunlight reflected from snow ("snow blindness"). The inflammation will only appear after about 6 to 12 hours. It can be treated by rest, as the inflammation usually heals after 24–48 hours. Proper eye protection should be worn to prevent keratoconjunctivitis photoelectrica.
https://en.wikipedia.org/wiki/Fancy%20pigeon
Fancy pigeon refers to any breed of domestic pigeon, which is a domesticated form of the wild rock dove (Columba livia). They are bred by pigeon fanciers for various traits relating to size, shape, color, and behavior, and often exhibited at pigeon shows, fairs and other livestock exhibits. There are about 800 pigeon breeds; considering all regional varieties all over the world there may be 1100 breeds. The European list of fancy pigeons alone names about 500 breeds. No other domestic animal has branched out into such a variety of forms and colours. Charles Darwin is known to have crossbred fancy pigeons, particularly the Ice Pigeon, to study variation within species, this work coming three years before his groundbreaking publication, On the Origin of Species. Pigeon showing Pigeon fanciers from many countries exhibit their birds at local, inter-state or national shows and compete against one another for prizes. One typical country show in Australia in 2008 had hundreds of pigeons on display and prizes for the winners. In England, the Philoperisteron Society conducted annual shows in the mid 1800s. There were also a London Columbarian Society. The extensive variations in the breeds attracted the attention of Charles Darwin and played a major role in developing ideas on evolution. Some fanciers organize exhibitions exclusively for pigeons; one held in Blackpool run by the Royal Pigeon Racing Association is annually attended by about 25,000 people and generates around £80,000 profit, which is donated to charity. The largest pigeon show is held in Nuremberg: the German National Pigeon Show, which had over 33,500 pigeons at the 2006 show. In the United States, there are hundreds of local, state and national pigeon clubs that sponsor shows. The largest shows are the National Young Bird Show, held in Louisville, Kentucky in October, and the National Pigeon Association's Grand National, held in a different city each year and usually in January. Major breed familie
https://en.wikipedia.org/wiki/Hill%27s%20muscle%20model
In biomechanics, Hill's muscle model refers to the 3-element model consisting of a contractile element (CE) in series with a lightly-damped elastic spring element (SE) and in parallel with lightly-damped elastic parallel element (PE). Within this model, the estimated force-velocity relation for the CE element is usually modeled by what is commonly called Hill's equation, which was based on careful experiments involving tetanized muscle contraction where various muscle loads and associated velocities were measured. They were derived by the famous physiologist Archibald Vivian Hill, who by 1938 when he introduced this model and equation had already won the Nobel Prize for Physiology. He continued to publish in this area through 1970. There are many forms of the basic "Hill-based" or "Hill-type" models, with hundreds of publications having used this model structure for experimental and simulation studies. Most major musculoskeletal simulation packages make use of this model. AV Hill's force-velocity equation for tetanized muscle This is a popular state equation applicable to skeletal muscle that has been stimulated to show Tetanic contraction. It relates tension to velocity with regard to the internal thermodynamics. The equation is where is the tension (or load) in the muscle is the velocity of contraction is the maximum isometric tension (or load) generated in the muscle coefficient of shortening heat is the maximum velocity, when Although Hill's equation looks very much like the van der Waals equation, the former has units of energy dissipation, while the latter has units of energy. Hill's equation demonstrates that the relationship between F and v is hyperbolic. Therefore, the higher the load applied to the muscle, the lower the contraction velocity. Similarly, the higher the contraction velocity, the lower the tension in the muscle. This hyperbolic form has been found to fit the empirical constant only during isotonic contractions near resting
https://en.wikipedia.org/wiki/Nasal%20septum%20deviation
Nasal septum deviation is a physical disorder of the nose, involving a displacement of the nasal septum. Some displacement is common, affecting 80% of people, mostly without their knowledge. Signs and symptoms The nasal septum is the bone and cartilage in the nose that separates the nasal cavity into the two nostrils. The cartilage is called the quadrangular cartilage and the bones comprising the septum include the maxillary crest, vomer, and the perpendicular plate of the ethmoid. Normally, the septum lies centrally, and thus the nasal passages are symmetrical. A deviated septum is an abnormal condition in which the top of the cartilaginous ridge leans to the left or the right, causing obstruction of the affected nasal passage. It is common for nasal septa to depart from the exact centerline; the septum is only considered deviated if the shift is substantial or causes problems. By itself, a deviated septum can go undetected for years and thus be without any need for correction. Symptoms of a deviated septum include infections of the sinus and sleep apnea, snoring, repetitive sneezing, facial pain, nosebleeds, mouth breathing, difficulty with breathing and mild to severe loss of the ability to smell. Only more severe cases of a deviated septum will cause symptoms of difficulty breathing and require treatment. Causes It is most frequently caused by impact trauma, such as by a blow to the face. It can also be a congenital disorder, caused by compression of the nose during childbirth. Deviated septum is associated with genetic connective tissue disorders such as Marfan syndrome, homocystinuria and Ehlers–Danlos syndrome. Diagnosis Nasal septum deviation is the most common cause of nasal obstruction. A history of trauma to the nose is often present including trauma from the process of birth or microfractures. A medical professional, such as an otorhinolaryngologist (ears, nose, and throat doctor), typically makes the diagnosis after taking a thorough history from
https://en.wikipedia.org/wiki/Gabor%20filter
In image processing, a Gabor filter, named after Dennis Gabor, who first proposed it as a 1D filter. The Gabor filter was first generalized to 2D by Gösta Granlund, by adding a reference direction. The Gabor filter is a linear filter used for texture analysis, which essentially means that it analyzes whether there is any specific frequency content in the image in specific directions in a localized region around the point or region of analysis. Frequency and orientation representations of Gabor filters are claimed by many contemporary vision scientists to be similar to those of the human visual system. They have been found to be particularly appropriate for texture representation and discrimination. In the spatial domain, a 2D Gabor filter is a Gaussian kernel function modulated by a sinusoidal plane wave (see Gabor transform). Some authors claim that simple cells in the visual cortex of mammalian brains can be modeled by Gabor functions. Thus, image analysis with Gabor filters is thought by some to be similar to perception in the human visual system. Definition Its impulse response is defined by a sinusoidal wave (a plane wave for 2D Gabor filters) multiplied by a Gaussian function. Because of the multiplication-convolution property (Convolution theorem), the Fourier transform of a Gabor filter's impulse response is the convolution of the Fourier transform of the harmonic function (sinusoidal function) and the Fourier transform of the Gaussian function. The filter has a real and an imaginary component representing orthogonal directions. The two components may be formed into a complex number or used individually. Complex Real Imaginary where and . In this equation, represents the wavelength of the sinusoidal factor, represents the orientation of the normal to the parallel stripes of a Gabor function, is the phase offset, is the sigma/standard deviation of the Gaussian envelope and is the spatial aspect ratio, and specifies the ellipticity of the sup
https://en.wikipedia.org/wiki/Reaction%20quotient
In chemical thermodynamics, the reaction quotient (Qr or just Q) is a dimensionless quantity that provides a measurement of the relative amounts of products and reactants present in a reaction mixture for a reaction with well-defined overall stoichiometry, at a particular point in time. Mathematically, it is defined as the ratio of the activities (or molar concentrations) of the product species over those of the reactant species involved in the chemical reaction, taking stoichiometric coefficients of the reaction into account as exponents of the concentrations. In equilibrium, the reaction quotient is constant over time and is equal to the equilibrium constant. A general chemical reaction in which α moles of a reactant A and β moles of a reactant B react to give ρ moles of a product R and σ moles of a product S can be written as \it \alpha\,\rm A{} + \it \beta\,\rm B{} <=> \it \rho\,\rm R{} + \it \sigma\,\rm S{}. The reaction is written as an equilibrium even though in many cases it may appear that all of the reactants on one side have been converted to the other side. When any initial mixture of A, B, R, and S is made, and the reaction is allowed to proceed (either in the forward or reverse direction), the reaction quotient Qr, as a function of time t, is defined as where {X}t denotes the instantaneous activity of a species X at time t. A compact general definition is where Пj denotes the product across all j-indexed variables, aj(t) is the activity of species j at time t, and νj is the stoichiometric number (the stoichiometric coefficient multiplied by +1 for products and –1 for starting materials). Relationship to K (the equilibrium constant) As the reaction proceeds with the passage of time, the species' activities, and hence the reaction quotient, change in a way that reduces the free energy of the chemical system. The direction of the change is governed by the Gibbs free energy of reaction by the relation , where K is a constant independent of initi
https://en.wikipedia.org/wiki/Physics%20First
Physics First is an educational program in the United States, that teaches a basic physics course in the ninth grade (usually 14-year-olds), rather than the biology course which is more standard in public schools. This course relies on the limited math skills that the students have from pre-algebra and algebra I. With these skills students study a broad subset of the introductory physics canon with an emphasis on topics which can be experienced kinesthetically or without deep mathematical reasoning. Furthermore, teaching physics first is better suited for English Language Learners, who would be overwhelmed by the substantial vocabulary requirements of Biology. Physics First began as an organized movement among educators around 1990, and has been slowly catching on throughout the United States. The most prominent movement championing Physics First is Leon Lederman's ARISE (American Renaissance in Science Education). Many proponents of Physics First argue that turning this order around lays the foundations for better understanding of chemistry, which in turn will lead to more comprehension of biology. Due to the tangible nature of most introductory physics experiments, Physics First also lends itself well to an introduction to inquiry-based science education, where students are encouraged to probe the workings of the world in which they live. The majority of high schools which have implemented "physics first" do so by way of offering two separate classes, at two separate levels: simple physics concepts in 9th grade, followed by more advanced physics courses in 11th or 12th grade. In schools with this curriculum, nearly all 9th grade students take a "Physical Science", or "Introduction to Physics Concepts" course. These courses focus on concepts that can be studied with skills from pre-algebra and algebra I. With these ideas in place, students then can be exposed to ideas with more physics related content in chemistry, and other science electives. After th
https://en.wikipedia.org/wiki/Controlled%20ecological%20life-support%20system
Controlled (or closed) ecological life-support systems (acronym CELSS) are a self-supporting life support system for space stations and colonies typically through controlled closed ecological systems, such as the BioHome, BIOS-3, Biosphere 2, Mars Desert Research Station, and Yuegong-1. Original concept CELSS was first pioneered by the Soviet Union during the famed "Space Race" in the 1950s–60s. Originated by Konstantin Tsiolkovsky and furthered by V.I. Vernadsky, the first forays into this science were the use of closed, unmanned ecosystems, expanding into the research facility known as the BIOS-3. Then in 1965, manned experiments began in the BIOS-3. Rationale Human presence in space, thus far, has been limited to our own Earth–Moon system. Also, everything that astronauts would need in the way of life support (air, water, and food) has been brought with them. This may be economical for short missions of spacecraft, but it is not the most viable solution when dealing with the life support systems of a long-term craft (such as a generation ship) or a settlement. The aim of CELSS is to create a regenerative environment that can support and maintain human life via agricultural means. Components of CELSS Air revitalization In non-CELSS environments, air replenishment and processing typically consists of stored air tanks and scrubbers. The drawback to this method lies in the fact that upon depletion the tanks would have to be refilled; the scrubbers would also require replacement after they become ineffective. There is also the issue of processing toxic fumes, which come from the synthetic materials used in the construction of habitats. Therefore, the issue of how air quality is maintained requires attention; in experiments, it was found that the plants also removed volatile organic compounds offgassed by synthetic materials used thus far to build and maintain all man-made habitats. In CELSS, air is initially supplied by external supply, but is maintained by
https://en.wikipedia.org/wiki/OpenServer
Xinuos OpenServer, previously SCO UNIX and SCO Open Desktop (SCO ODT), is a closed source computer operating system developed by Santa Cruz Operation (SCO), later acquired by SCO Group, and now owned by Xinuos. Early versions of OpenServer were based on UNIX System V, while the later OpenServer 10 is based on FreeBSD 10. However, OpenServer 10 has not received any updates since 2018 and is no longer marketed on Xinuos's website, while OpenServer 5 Definitive and 6 Definitive are still supported. History SCO UNIX/SCO Open Desktop SCO UNIX was the successor to the Santa Cruz Operation's variant of Microsoft Xenix, derived from UNIX System V Release 3.2 with an infusion of Xenix device drivers and utilities. SCO UNIX System V/386 Release 3.2.0 was released in 1989, as the commercial successor to SCO Xenix. The base operating system did not include TCP/IP networking or X Window System graphics; these were available as optional extra-cost add-on packages. Shortly after the release of this bare OS, SCO shipped an integrated product under the name of SCO Open Desktop, or ODT. 1994 saw the release of SCO MPX, an add-on SMP package. At the same time, AT&T completed its merge of Xenix, BSD, SunOS, and UNIX System V Release 3 features into UNIX System V Release 4. SCO UNIX remained based on System V Release 3, but eventually added home-grown versions of most of the features of Release 4. The 1992 releases of SCO UNIX 3.2v4.0 and Open Desktop 2.0 added support for long file names and symbolic links. The next major version, OpenServer Release 5.0.0, released in 1995, added support for ELF executables and dynamically linked shared objects, and made many kernel structures dynamic. SCO OpenServer SCO OpenServer 5, released in 1995, would become SCO's primary product and serve as the basis for products like PizzaNet (the first Internet-based food delivery system done in partnership with Pizza Hut) and SCO Global Access, an Internet gateway server based on Open Desktop Lite. Due
https://en.wikipedia.org/wiki/Fish%20stocks
Fish stocks are subpopulations of a particular species of fish, for which intrinsic parameters (growth, recruitment, mortality and fishing mortality) are traditionally regarded as the significant factors determining the stock's population dynamics, while extrinsic factors (immigration and emigration) are traditionally ignored. Concepts The stock concept All species have geographic limits to their distribution, which are determined by their tolerance to environmental conditions, and their ability to compete successfully with other species. In marine environments this may be less evident than on land because there are fewer topographical boundaries, however, discontinuities still exist, produced for example by mesoscale and sub-mesoscale circulations that minimize long-distance dispersal of fish larvae. For fish, it is rare for an individual to reproduce randomly with all other individuals of that species within its biological range. There is a tendency to form a structured series of discrete populations which have a degree of reproductive isolation from each other in space, in time, or in both. This isolation is reflected in the development between sub-populations of genetic differences, morphological variations and exposure to different chemical regimes and parasitic species. Sub-populations also respond to fishing in such a way that fishing on one population appears to have no effect on the population dynamics of a neighbouring population. The currently accepted definition of a stock in fisheries science, is that of Begg et al. (1999), “…[a “stock”] describes characteristics of semi-discrete groups of fish with some definable attributes which are of interest to fishery managers.” Stock identification is a field of fisheries science which aims to identify these subpopulations, based on a number of techniques.This concept is applied in sustainable development goal14 where target 14.4 is measured a fish stock sustainability indicator 14.4.1. Straddling stock
https://en.wikipedia.org/wiki/Grandmother%20hypothesis
The grandmother hypothesis is a hypothesis to explain the existence of menopause in human life history by identifying the adaptive value of extended kin networking. It builds on the previously postulated "mother hypothesis" which states that as mothers age, the costs of reproducing become greater, and energy devoted to those activities would be better spent helping her offspring in their reproductive efforts. It suggests that by redirecting their energy onto those of their offspring, grandmothers can better ensure the survival of their genes through younger generations. By providing sustenance and support to their kin, grandmothers not only ensure that their genetic interests are met, but they also enhance their social networks which could translate into better immediate resource acquisition. This effect could extend past kin into larger community networks and benefit wider group fitness. Background One explanation to this was presented by G.C. Williams who was the first to posit that menopause might be an adaptation. Williams suggested that at some point it became more advantageous for women to redirect reproductive efforts into increased support of existing offspring. Since a female's dependent offspring would die as soon as she did, he argued, older mothers should stop producing new offspring and focus on those existing. In so doing, they would avoid the age-related risks associated with reproduction and thereby eliminate a potential threat to the continued survival of current offspring. The evolutionary reasoning behind this is driven by related theories. Kin selection Kin selection provides the framework for an adaptive strategy by which altruistic behavior is bestowed on closely related individuals because easily identifiable markers exist to indicate them as likely to reciprocate. Kin selection is implicit in theories regarding the successful propagation of genetic material through reproduction, as helping an individual more likely to share one's genetic
https://en.wikipedia.org/wiki/Merge%20%28software%29
Merge is a software system which allows a user to run DOS/Windows 3.1 on SCO UNIX, in an 8086 virtual machine. History Merge was originally developed to run DOS under UNIX System V Release 2 on an AT&T 6300 Plus personal computer. Development of the virtual machine began in late 1984, and AT&T announced the availability of the machine on 9 October 1985, referring to the bundled Merge software as Simultask. (The PC 6300 Plus shipped with MS-DOS in 1985 though, because its Unix System V distribution was not ready until the end of March 1986.) Merge was developed by engineers at Locus Computing Corporation, with collaboration from AT&T hardware and software engineers, particularly on aspects of the system that were specific to the 6300 Plus (in contrast to a standard IBM PC/AT). The AT&T 6300 Plus contained an Intel 80286 processor, which did not include the support for 8086 virtual machines (virtual 8086 mode) found in the 80386 and later processors in the x86 family. On the 80286, the DOS program had to run in real mode. The 6300 Plus was designed with special hardware on the bus that would suppress and capture bus cycles from the DOS program if they were directed toward addresses not assigned for direct access by the DOS virtual machine. Various system registers, such as the programmable interrupt controller (PIC), and the video controller, had to be emulated in software for the DOS process, and a watchdog timer was implemented to recover from DOS programs that would clear the interrupt flag and then hang for too long. The hardware used the non-maskable interrupt (NMI) to take control back to the emulation code. Later, Merge was enhanced to make use of the virtual 8086 mode provided by the 80386 processor; that version was offered with Microport SVR3 starting in 1987, and subsequently with SCO Unix. There was also a Merge/286 version that ran on an unmodified PC/AT (without any special I/O trapping hardware); it ran as long as the PC program was reasonably well-b
https://en.wikipedia.org/wiki/Gum%20karaya
Gum karaya or gum sterculia, also known as Indian gum tragacanth, is a vegetable gum produced as an exudate by trees of the genus Sterculia. Chemically, gum karaya is an acid polysaccharide composed of the sugars galactose, rhamnose and galacturonic acid. It is used as a thickener and emulsifier in foods, as a laxative, and as a denture adhesive. It is also used to adulterate Gum tragacanth due to their similar physical characteristics. As a food additive it has E number E416. Gum karaya can be obtained from the tree Sterculia urens. It is a valuable substance and is traditionally tapped by cutting or peeling back the bark, or by making deep gashes at the base of the trunk with an axe. These crude methods of extraction often resulted in the death of the tree, but it has been found that application of the plant growth regulator ethephon stimulates the production of gum, and when used in carefully controlled amounts, increases gum yield and enhances healing of the wounds and survival of the tree.
https://en.wikipedia.org/wiki/Ross%20River%20virus
Ross River virus (RRV) is a small encapsulated single-strand RNA Alphavirus endemic to Australia, Papua New Guinea and other islands in the South Pacific. It is responsible for a type of mosquito-borne non-lethal but extremely debilitating tropical disease known as Ross River fever, previously termed "epidemic polyarthritis". There is no known cure, and it can last in the system of the host for up to 20 years. The virus is suspected to be enzootic in populations of various native Australian mammals, and has been found on occasion in horses. Classification and morphology Taxonomically, Ross River virus belongs to the virus genus Alphavirus, which is part of the family Togaviridae. The alphaviruses are a group of small enveloped single-strand positive-sense RNA viruses. RRV belongs to a subgroup of "Old World" (Eurasian-African-Australasian) alphaviruses, and is considered closely related to Sagiyama virus. The virions (virus particles) themselves contain their genome in a protein capsid 700 Å in diameter. They are characterised by the presence of two glycoproteins (E1 and E2) embedded as trimeric dimers in a host-derived lipid envelope. Because RRV is transmitted by mosquitos, it is considered an arbovirus, a non-taxonomic term for viruses borne by arthropod vectors. History In 1928, an outbreak of acute febrile arthritis was recorded in Narrandera and Hay in New South Wales, Australia. In 1943, several outbreaks of arthralgia and arthritis were described in the Northern Territory, Queensland and the Schouten Islands, off the northern coast of Papua New Guinea. The name "epidemic polyarthritis" was coined for the disease. In 1956, an epidemic occurred in the Murray Valley which was compared to "acute viral polyarthritis" caused by Chikungunya virus. The Australian disease seemed to progress in milder fashion. In 1956, serological testing suggested an unknown new species of alphavirus (group A arbovirus) was the likely culprit. In July and August 1956 and 1957,
https://en.wikipedia.org/wiki/Congolese%20spotted%20lion
A Congolese spotted lion, also known by the portmanteau lijagulep, is the hybrid of a male lion and female jaguar-leopard (a jagulep or lepjag). Several lijaguleps have been bred, but only one appears to have been exhibited as a Congolese spotted lion. It was most likely given that name by a showman because the public were more interested in exotic captured animals than in captive-bred hybrids. The story The Times (April 15, 1908) pg. 6: A Strange Animal From The Congo: Mr. J. D. Hamlyn, the animal dealer of St. George St.,E., who obtained two or three new monkeys from the Congo, has just received from the same region a very curious feline animal nearly as large as an adult lioness, which it resembles in build, but irregularly spotted. There is no trace of a mane or ruff, nor is the tail tufted as in the lion. The general hue is tawny, but with a rufous tinge, reminding one of the coat of a cheetah rather than of the leopard, and the inner sides of the limbs are yellowish white, with dark spots. The markings on the upper surface differ greatly in size and character; on the hind limbs they are large; toward the forequarters and head they diminish in size, but increase greatly in number, and the face is so to speak, strippled with black, except on the nose. There is a black mark on each side of the lower jaw, and a black stripe on the posterior side of each ear; and along the spine, from the root of the tail to about the centre of the back is a row of dark markings, somewhat like disconnected links of a chain. The hue of the tail for the greater part of its length corresponds to that of the body, but the terminal portion is banded with black and white. The animal, a female, is in excellent condition and fairly quiet. The obvious suggestion is that the animal is a wild-bred hybrid, with a lioness for dam and a spotted cat for sire. Lion-tiger hybrids were bred in this country by Atkins, the proprietor of a famous travelling menagerie; among Continental breeders Carl H
https://en.wikipedia.org/wiki/Bereitschaftspotential
In neurology, the Bereitschaftspotential or BP (German for "readiness potential"), also called the pre-motor potential or readiness potential (RP), is a measure of activity in the motor cortex and supplementary motor area of the brain leading up to voluntary muscle movement. The BP is a manifestation of cortical contribution to the pre-motor planning of volitional movement. It was first recorded and reported in 1964 by Hans Helmut Kornhuber and Lüder Deecke at the University of Freiburg in Germany. In 1965 the full publication appeared after many control experiments. Discovery In the spring of 1964 Hans Helmut Kornhuber (then docent and chief physician at the department of neurology, head Professor Richard Jung, university hospital Freiburg im Breisgau) and Lüder Deecke (his doctoral student) went for lunch to the 'Gasthaus zum Schwanen' at the foot of the Schlossberg hill in Freiburg. Sitting alone in the beautiful garden they discussed their frustration with the passive brain research prevailing worldwide and their desire to investigate self-initiated action of the brain and the will. Consequently, they decided to look for cerebral potentials in man related to volitional acts and to take voluntary movement as their research paradigm. The possibility to do research on electrical brain potentials preceding voluntary movements came with the advent of the 'computer of average transients' (CAT computer), invented by Manfred Clynes, the first still simple instrument available at that time in the Freiburg laboratory. In the electroencephalogram (EEG) little is to be seen preceding actions, except of an inconstant diminution of the α- (or μ-) rhythm. The young researchers stored the electroencephalogram and electromyogram of self-initiated movements (fast finger flexions) on tape and analyzed the cerebral potentials preceding movements time-reversed with the start of the movement as the trigger, literally turning the tape over for analysis since they had no reversal p
https://en.wikipedia.org/wiki/Yakalo
The yakalo is a cross of the yak (Bos grunniens) and the American bison (Bison bison, known as a buffalo in North America). It was produced by hybridisation experiments in the 1920s, when crosses were made between yak bulls and both pure bison cows and bison-cattle hybrid cows. As with many other inter-specific crosses, only female hybrids were found to be fertile (Haldane's rule). Few of the hybrids survived, and the experiments were discontinued in 1928. See also Beefalo Dzo Żubroń Footnotes Bovid hybrids Intergeneric hybrids
https://en.wikipedia.org/wiki/File%20synchronization
File synchronization (or syncing) in computing is the process of ensuring that computer files in two or more locations are updated via certain rules. In one-way file synchronization, also called mirroring, updated files are copied from a source location to one or more target locations, but no files are copied back to the source location. In two-way file synchronization, updated files are copied in both directions, usually with the purpose of keeping the two locations identical to each other. In this article, the term synchronization refers exclusively to two-way file synchronization. File synchronization is commonly used for home backups on external hard drives or updating for transport on USB flash drives. BitTorrent Sync, Dropbox, SKYSITE, Nextcloud, OneDrive, Google Drive and iCloud are prominent products. Some backup software also support real-time file sync. The automatic process prevents copying already identical files and thus can be faster and save much time versus a manual copy, and is less error prone. However this suffers from the limit that the synchronized files must physically fit in the portable storage device. Synchronization software that only keeps a list of files and the changed files eliminates this problem (e.g. the "snapshot" feature in Beyond Compare or the "package" feature in Synchronize It!). It is especially useful for mobile workers, or others that work on multiple computers. It is possible to synchronize multiple locations by synchronizing them one pair at a time. The Unison Manual describes how to do this: If you need to do this, the most reliable way to set things up is to organize the machines into a "star topology," with one machine designated as the "hub" and the rest as "spokes," and with each spoke machine synchronizing only with the hub. The big advantage of the star topology is that it eliminates the possibility of confusing "spurious conflicts" arising from the fact that a separate archive is maintained by Unison for every
https://en.wikipedia.org/wiki/Quentin%20Stafford-Fraser
James Quentin Stafford-Fraser is a computer scientist and entrepreneur based in Cambridge, England. He was one of the team that created the first webcam, the Trojan room coffee pot. Quentin pointed a camera at the coffee pot and wrote the XCoffee client program which allowed the image of the pot to be displayed on a workstation screen. When web browsers gained the ability to display images, the system was modified to make the coffee pot images available over HTTP and thus became the first webcam. Quentin wrote the original VNC client (viewer) and server for the Windows operating system, while at the Olivetti Research Laboratory. He is a regular public speaker and his work has attracted significant media coverage. Quentin is also a part-time Senior Research Associate at the University of Cambridge Computer Lab. In 2013 he was a member of the winning team on Christmas University Challenge, representing Gonville & Caius College, Cambridge. Companies founded Quentin has founded or co-founded various companies and other organisations including: Newnham Research (now DisplayLink) Exbiblio The Ndiyo project Telemarq Ltd (of which he is currently CEO) Earlier history Quentin was educated at Haileybury before studying Computer Science at the University of Cambridge and in 1989 became the first Cambridge college Computer Officer, at his old college, Gonville and Caius College, before joining the Systems Research Group in the university's Computer Lab. Quentin is credited with operating the first web-server in the University of Cambridge, in 1992. He created the Brightboard Interactive whiteboard project at Xerox EuroPARC in Cambridge, as part of his Ph.D. thesis.
https://en.wikipedia.org/wiki/Elderly%20care
Elderly care, or simply eldercare (also known in parts of the English-speaking world as aged care), serves the needs of old adults. It encompasses assisted living, adult daycare, long-term care, nursing homes (often called residential care), hospice care, and home care. Elderly care emphasizes the social and personal requirements of senior citizens who wish to age with dignity while needing assistance with daily activities and with healthcare. Much elderly care is unpaid. Elderly care includes a broad range of practices and institutions, as there is a wide variety of elderly care needs and cultural perspectives on the elderly throughout the world. Cultural and geographic differences The form of care provided for older adults varies greatly by country and even region, and is changing rapidly. Older people worldwide consume the most health spending of any age group. There is also an increasingly large proportion of older people worldwide, especially in developing nations with continued pressure to limit fertility and shrink families. Traditionally, care for older adults has been the responsibility of family members and was provided within the extended family home. Increasingly in modern societies, care is now provided by state or charitable institutions. The reasons for this change include shrinking families, longer life expectancy and geographical dispersion of families. Although these changes have affected European and North American countries first, they are now increasingly affecting Asian countries. In most western countries, care facilities for older adults are residential family care homes, freestanding assisted living facilities, nursing homes, and continuing care retirement communities (CCRCs). A family care home is a residential home with support and supervisory personnel by an agency, organization, or individual that provides room and board, personal care and habilitation services in a family environment for at least two and no more than six persons.
https://en.wikipedia.org/wiki/Vark
Vark (also varak Waraq or warq) is a fine filigree foil sheet of pure metal, typically silver but sometimes gold, used to decorate South Asian sweets and food. The silver and gold are edible, though flavorless. Vark is made by pounding silver into sheets less than one micrometre (μm) thick, typically 0.2 μm-0.8 μm. The silver sheets are typically packed between layers of paper for support; this paper is peeled away before use. It is fragile and breaks into smaller pieces if handled with direct skin contact. Leaf that is 0.2 μm thick tends to stick to skin if handled directly. Vark sheets are laid or rolled over some South Asian sweets, confectionery, dry fruits and spices. It is also placed onto mounds of saffron rice on platters. For safety and ethical reasons, the government of India has issued food safety and product standards guidelines for manufacturers of silver foil. History Etymology Varaka means cloth, cloak or a thing that covers something else. Vark is sometimes spelled Varaq, varq, vark, varkh, varakh, varkha, or waraq (, ). In Persian, varaqa (borrowed from Arabic waraq), means a sheet, leaf or foil. Product Manufacturing Vark is made by placing the pure metal dust between parchment sheets, then pounding the sheets until the metal dust molds into a foil, usually less than one micrometre (μm) thick, typically 0.2 μm-0.8 μm. The sheets are typically packed with paper for support; this paper is peeled away before use. it generally takes 2 hours to pound the silver particles into foils. Particles were traditionally manually pounded between the layers of ox gut or cow hide. It is easier to separate the silver leaf from the animal tissue than to separate it from the paper. Due to the concerns of the vegetarian population of India, manufacturers have switched to the modern technologies that have evolved for the production of silver leaves in India, Germany, Russia and China. Modern technologies include beating over sheets of black special treated pap
https://en.wikipedia.org/wiki/Ideographic%20Research%20Group
The Ideographic Research Group (IRG), formerly called the Ideographic Rapporteur Group, is a subgroup of the ISO/IEC Joint Technical Committee, responsible for developing aspects of The Unicode Standard pertaining to CJK unified ideographs.The IRG is composed of representatives from the Unicode Consortium, as well as experts from China, Japan, South Korea, Vietnam, and other regions that have historically used Chinese characters, as well as experts. The group holds two meetings every year lasting 4-5 days each, subsequently reporting its activities to its parent ISO/IEC JTC 1/SC 2 (WG2) committee. History The precursor to the IRG was the CJK Joint Research Group (CJK-JRG), established in 1990. In October 1993, this group was re-established with its present initials as a subgroup of WG2. In June 2019, the subgroup acquired its current name. The IRG rapporteur from 1993 to 2004 was Zhang Zhoucai (), who had been convenor and chief editor of CJK-JRG from 1990 to 1993. Since 2004, the IRG rapporteur has been Hong Kong Polytechnic University professor Lu Qin () In June 2018, the title of "rapporteur" was changed to "convenor". Overview The IRG is responsible for reviewing proposals to add new CJK unified ideographs to the Universal Multiple-Octet Coded Character Set (ISO/IEC 10646), and equivalently the Unicode Standard, and submitting consolidated proposals for sets of unified ideographs to WG2, which are then processed for encoding in the respective standards by SC2 and the Unicode Technical Committee. National and liaison bodies represented in IRG include China, Hong Kong and Macau, Japan, North and South Korea, Singapore, the Taipei Computer Association as representatives on Taiwan, the United Kingdom, Vietnam, and the Unicode Consortium. As of Unicode version 15.1, the IRG has been responsible for submitting the following blocks of CJK unified and compatibility ideographs for encoding: CJK Unified Ideographs and CJK Compatibility Ideographs (version 1.0) CJ
https://en.wikipedia.org/wiki/Reticulocytosis
Reticulocytosis is a condition where there is an increase in reticulocytes, immature red blood cells. It is commonly seen in anemia. They are seen on blood films when the bone marrow is highly active in an attempt to replace red blood cell loss such as in haemolytic anaemia or haemorrhage. External links Histology Abnormal clinical and laboratory findings for RBCs
https://en.wikipedia.org/wiki/SECG
In cryptography, the Standards for Efficient Cryptography Group (SECG) is an international consortium founded by Certicom in 1998. The group exists to develop commercial standards for efficient and interoperable cryptography based on elliptic curve cryptography (ECC). Links and documents SECG home page SEC 1: Elliptic Curve Cryptography (Version 1.0 - Superseded by Version 2.0) SEC 1: Elliptic Curve Cryptography (Version 2.0) SEC 2: Recommended Elliptic Curve Domain Parameters (Version 1.0 - Superseded by Version 2.0 SEC 2: Recommended Elliptic Curve Domain Parameters (Version 2.0) Certicom Patent Letter See also Elliptic curve cryptography Cryptography organizations Cryptography standards
https://en.wikipedia.org/wiki/Kubuntu
Kubuntu ( ) is an official flavor of the Ubuntu operating system that uses the KDE Plasma Desktop instead of the GNOME desktop environment. As part of the Ubuntu project, Kubuntu uses the same underlying systems. Kubuntu shares the same repositories as Ubuntu and is released regularly on the same schedule as Ubuntu. Kubuntu was sponsored by Canonical Ltd. until 2012, and then directly by Blue Systems. Now, employees of Blue Systems contribute upstream to KDE and Debian, and Kubuntu development is led by community contributors. During the changeover, Kubuntu retained the use of Ubuntu project servers and existing developers. Name "Kubuntu" is a registered trademark held by Canonical. It is derived from the name Ubuntu, prefixing a K to represent the KDE platform that Kubuntu is built upon (following a widespread naming convention of prefixing K to the name of any software released for use on KDE platforms), as well as the KDE community. is a Bantu term translating roughly to 'humanity'. Since Bantu grammar involves prefixes to form noun classes, and the prefix has the meaning 'toward' in Bemba, is therefore also a meaningful Bemba word or phrase translating to 'toward humanity'. Reportedly, the same word, by coincidence, also takes the meaning of 'free' (in the sense of 'without payment') in Kirundi. Comparison with Ubuntu Kubuntu typically differs from Ubuntu in graphical applications and tools: History Development started back in December 2004 at the Ubuntu Mataró Conference in Mataró, Spain when a Canonical employee Andreas Mueller, from Gnoppix, had the idea to make an Ubuntu KDE variant and got the approval from Mark Shuttleworth to start the first Ubuntu variant, called Kubuntu. On the same evening Chris Halls from the OpenOffice.org project and Jonathan Riddell from KDE started volunteering on the newborn project. Shortly after Ubuntu was started, Mark Shuttleworth stated in an interview that he recognized the need for KDE-based distribution in order
https://en.wikipedia.org/wiki/Protected%20Extensible%20Authentication%20Protocol
PEAP is also an acronym for Personal Egress Air Packs. The Protected Extensible Authentication Protocol, also known as Protected EAP or simply PEAP, is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel. The purpose was to correct deficiencies in EAP; EAP assumed a protected communication channel, such as that provided by physical security, so facilities for protection of the EAP conversation were not provided. PEAP was jointly developed by Cisco Systems, Microsoft, and RSA Security. PEAPv0 was the version included with Microsoft Windows XP and was nominally defined in draft-kamath-pppext-peapv0-00. PEAPv1 and PEAPv2 were defined in different versions of draft-josefsson-pppext-eap-tls-eap. PEAPv1 was defined in draft-josefsson-pppext-eap-tls-eap-00 through draft-josefsson-pppext-eap-tls-eap-05, and PEAPv2 was defined in versions beginning with draft-josefsson-pppext-eap-tls-eap-06. The protocol only specifies chaining multiple EAP mechanisms and not any specific method. However, use of the EAP-MSCHAPv2 and EAP-GTC methods are the most commonly supported. Overview PEAP is similar in design to EAP-TTLS, requiring only a server-side PKI certificate to create a secure TLS tunnel to protect user authentication, and uses server-side public key certificates to authenticate the server. It then creates an encrypted TLS tunnel between the client and the authentication server. In most configurations, the keys for this encryption are transported using the server's public key. The ensuing exchange of authentication information inside the tunnel to authenticate the client is then encrypted and user credentials are safe from eavesdropping. As of May 2005, there were two PEAP sub-types certified for the updated WPA and WPA2 standard. They are: PEAPv0/EAP-MSCHAPv2 PEAPv1/EAP-GTC PEAPv0 and PEAPv1 both refer to the outer authentication method and are the mechanisms that create t
https://en.wikipedia.org/wiki/Cystovirus
Cystovirus is a genus of double-stranded RNA viruses which infects bacteria. It is the only genus in the family Cystoviridae. The name of the group cysto derives from Greek kystis which means bladder or sack. There are seven species in this genus. Discovery Pseudomonas virus phi6 was the first virus in this family to be discovered and was initially characterized in 1973 by Anne Vidaver at the University of Nebraska. She found that when she cultured the bacterial strain Pseudomonas phaseolicola HB1OY with halo blight infected bean straw, cytopathic effects were detected in cultured lawns, indicating that there was a lytic microbe or bacteriophage present. In 1999, phi7–14 were identified by the laboratory of Leonard Mindich at the Public Health Research Institute associated with New York University. They did this by culturing various leaves in Lysogeny Broth and then plating the broth on lawns of Pseudomonas syringae pv phaseolicola. They were able to identify viral plaques from this and then subsequently sequence their genomes. Microbiology Structure Cystovirus particles are enveloped, with icosahedral and spherical geometries, and T=13, T=2 symmetry. The virion diameter is around 85 nm. Cystoviruses are distinguished by their outer layer protein and lipid envelope. No other bacteriophage has any lipid in its outer coat, though the Tectiviridae and the Corticoviridae have lipids within their capsids. Genome Cystoviruses have a tripartite double-stranded RNA genome which is approximately 14 kbp in total length. The genome is linear and segmented, and labeled as large (L) 6.4 kbp, medium (M) 4 kbp, and small (S) 2.9 kb in length. The genome codes for twelve proteins. Life cycle Cytoviruses enter the bacteria by adsorption on its pilus and then membrane fusion. Viral replication is cytoplasmic. Replication follows the double-stranded RNA virus replication model. Double-stranded RNA virus transcription is the method of transcription. The progeny viruses are
https://en.wikipedia.org/wiki/Birnaviridae
Birnaviridae is a family of double-stranded RNA viruses. Salmonid fish, birds and insects serve as natural hosts. There are currently 11 species in this family, divided among seven genera. Diseases associated with this family include infectious pancreatic necrosis in salmonid fish, which causes significant losses to the aquaculture industry, with chronic infection in adult salmonid fish and acute viral disease in young salmonid fish. Structure Viruses in family Birnaviridae are non-enveloped, with icosahedral single-shelled geometries, and T=13 symmetry. The diameter is around 70 nm. Genome The genome is composed of linear, bi-segmented, double-stranded RNA. It is around 5.9–6.9 kbp in length and codes for five to six proteins. Birnaviruses encode the following proteins: RNA-directed RNA polymerase (VP1), which lacks the highly conserved Gly-Asp-Asp (GDD) sequence, a component of the proposed catalytic site of this enzyme family that exists in the conserved motif VI of the palm domain of other RNA-directed RNA polymerases. The large RNA segment, segment A, of birnaviruses codes for a polyprotein (N-VP2-VP4-VP3-C) that is processed into the major structural proteins of the virion: VP2, VP3 (a minor structural component of the virus), and into the putative protease VP4. VP4 protein is involved in generating VP2 and VP3. recombinant VP3 is more immunogenic than recombinant VP2. Infectious pancreatic necrosis virus (IPNV), a birnavirus, is an important pathogen in fish farms. Analyses of viral proteins showed that VP2 is the major structural and immunogenic polypeptide of the virus. All neutralizing monoclonal antibodies are specific to VP2 and bind to continuous or discontinuous epitopes. The variable domain of VP2 and the 20 adjacent amino acids of the conserved C-terminal are probably the most important in inducing an immune response for the protection of animals. Non structural protein VP5 is found in RNA segment A. The function of this small viral protein is
https://en.wikipedia.org/wiki/Metaviridae
Metaviridae is a family of viruses which exist as Ty3-gypsy LTR retrotransposons in a eukaryotic host's genome. They are closely related to retroviruses: members of the family Metaviridae share many genomic elements with retroviruses, including length, organization, and genes themselves. This includes genes that encode reverse transcriptase, integrase, and capsid proteins. The reverse transcriptase and integrase proteins are needed for the retrotransposon activity of the virus. In some cases, virus-like particles can be formed from capsid proteins. Some assembled virus-like particles of members of the family Metaviridae can penetrate and infect previously uninfected cells. An example of this is the gypsy, a retroelement found in the Drosophila melanogaster genome. The ability to infect other cells is determined by the presence of the retroviral env genes which encode coat proteins. Metaviridae is a family of retrotransposons found in all eukaryotes known and studied. Viruses of this family proliferate through intermediates called virus-like particles known for their ability to induce mutations and genome sequencing. Members of the family Metaviridae are often referred to as LTR-retrotransposons of the Ty3-gypsy family. Among the members are only species that produce intracellular particles, the collection of these particles is heterogeneous. Extracellular particles are surrounded by oval nuclei and are called virions. In many systems, virions are characterized biochemically. Genomes of retrotransposons in this family are positive strand RNAs. In addition to the RNA genome, some cellular RNAs can be randomly associated with particles, including specific tRNAs, in case of virus replication prepared by tRNAs. Particle fractions from cells are heterogeneous relative to maturation and are therefore associated with intermediate transcriptions and reverse transcription products in addition to genomic RNA. When it comes to virion producing members, it appears that the viri
https://en.wikipedia.org/wiki/Barnaviridae
Barnaviridae is a family of non-enveloped, positive-strand RNA viruses. Cultivated mushrooms serve as natural hosts. The family has one genus, Barnavirus, which contains one species: Mushroom bacilliform virus. Diseases associated with this family includes La France disease. Structure Viruses in Barnaviridae are non-enveloped, with icosahedral and Bacilliform geometries, and T=1 symmetry. These viruses are about 50 nm long. Genome Genomes are linear, around 4kb in length. The genome has 4 open reading frames. Genomic RNA serves as both the genome and viral messenger RNA. ORF2 is a polyprotein which is possibly auto-cleaved by the ORF2 viral protease. ORF3 encodes the RNA dependent RNA polymerase and may be translated by ribosomal frameshifting as an ORF2-ORF3 polyprotein. The single capsid protein (ORF4) is translated from a subgenomic RNA. Life cycle Viral replication is cytoplasmic. Entry into the host cell is achieved by penetration into the host cell and passing it down. Replication follows the positive stranded RNA virus replication model. Positive stranded RNA virus transcription is the method of transcription. The virus is released horizontal via mycelium and basidiospores. Cultivated mushroom, Agaricus bisporus, serves as the natural host.
https://en.wikipedia.org/wiki/Bromoviridae
Bromoviridae is a family of viruses. Plants serve as natural hosts. There are six genera in the family. Taxonomy The following genera are assigned to the family: Alfamovirus Anulavirus Bromovirus Cucumovirus Ilarvirus Oleavirus Structure Viruses in the family Bromoviridae are non-enveloped, with icosahedral and bacilliform geometries. The diameter is around 26-35 nm. Genomes are linear and segmented, tripartite. Life cycle Viral replication is cytoplasmic, and is lysogenic. Entry into the host cell is achieved by penetration into the host cell. Replication follows the positive stranded RNA virus replication model. Positive stranded rna virus transcription, using the internal initiation model of subgenomic rna transcription is the method of transcription. The virus exits the host cell by tubule-guided viral movement. Plants serve as the natural host. Transmission routes are mechanical and contact.
https://en.wikipedia.org/wiki/Caliciviridae
The Caliciviridae are a family of "small round structured" viruses, members of Class IV of the Baltimore scheme. Caliciviridae bear resemblance to enlarged picornavirus and was formerly a separate genus within the picornaviridae. They are positive-sense, single-stranded RNA which is not segmented. Thirteen species are placed in this family, divided among eleven genera. Diseases associated with this family include feline calicivirus (respiratory disease), rabbit hemorrhagic disease virus (often fatal hepatitis), and Norwalk group of viruses (gastroenteritis). Caliciviruses naturally infect vertebrates, and have been found in a number of organisms such as humans, cattle, pigs, cats, chickens, reptiles, dolphins and amphibians. The caliciviruses have a simple construction and are not enveloped. The capsid appears hexagonal/spherical and has icosahedral symmetry (T=1 or T=3) with a diameter of 35–39 nm. Caliciviruses are not very well studied because until recently, they could not be grown in culture, and they have a very narrow host range and no suitable animal model. However, the recent application of modern genomic technologies has led to an increased understanding of the virus family. A recent isolate from rhesus monkeys—Tulane virus—can be grown in culture, and this system promises to increase understanding of these viruses. Etymology Calici- comes from the Latin word Calyx and the Greek word kalyx. The words mean a cup or chalice, a Calix. This comes from the strains having visible cup-shaped depressions. Taxonomy The following genera are recognized: Bavovirus Lagovirus Minovirus Nacovirus Nebovirus Norovirus Recovirus Salovirus Sapovirus Valovirus Vesivirus A number of other caliciviruses remain unclassified, including the chicken calicivirus. Virology All viruses in this family possess a nonsegmented, polyadenylated, positive-sense, single-strand RNA genome around 7.5–8.5 kilobases in length, enclosed in an icosahedral capsid of 27–40 nanomete
https://en.wikipedia.org/wiki/Closteroviridae
Closteroviridae is a family of viruses. Plants serve as natural hosts. There are four genera and 59 species in this family, seven of which are unassigned to a genus. Diseases associated with this family include: yellowing and necrosis, particularly affecting the phloem. Taxonomy Genome type and transmission vector are two of the most important traits used for classification. Ampeloviruses and Closteroviruses have monopartite genomes and are transmitted by pseudococcid mealybugs (and soft scale insects) and aphids respectively. While Criniviruses are bipartite and transmitted by whiteflies. Genera: Ampelovirus Closterovirus Crinivirus Velarivirus Unassigned species: Actinidia virus 1 Alligatorweed stunting virus Blueberry virus A Megakespama mosaic virus Mint vein banding-associated virus Olive leaf yellowing-associated virus Persimmon virus B Structure Viruses in the family Closteroviridae are non-enveloped, with flexuous and filamentous geometries. The diameter is around 10–13 nm, with a length of 950–2200 nm. Genomes are linear and non-segmented, bipartite, around 20kb in length. Life cycle Viral replication is cytoplasmic. Entry into the host cell is achieved by penetration into the host cell. Replication follows the positive stranded RNA virus replication model. Positive stranded rna virus transcription is the method of transcription. The virus exits the host cell by tubule-guided viral movement. Plants serve as the natural host. Transmission routes are mechanical.
https://en.wikipedia.org/wiki/Hepeviridae
Hepeviridae is a family of viruses. Human, pig, wild boar, sheep, cow, camel, monkey, some rodents, bats and chickens serve as natural hosts. There are two genera in the family. Diseases associated with this family include: hepatitis; high mortality rate during pregnancy; and avian hepatitis E virus is the cause of hepatitis-splenomegaly (HS) syndrome among chickens. Taxonomy The following genera are assigned to the family: Orthohepevirus Piscihepevirus A third genus has been proposed — Insecthepevirus. This proposed genus contains one species — Sogatella furcifera hepe-like virus. A species — Crustacea hepe-like virus 1, has been isolated from a prawn (Macrobrachium rosenbergii). Structure Viruses in the family Hepeviridae are non-enveloped, with icosahedral and spherical geometries, and T=1 symmetry. The diameter is around 32-34 nm. Genomes are linear and non-segmented, around 7.2kb in length. The genome has three open reading frames. Evolution This has been studied by examining the ORF1 and the capsid proteins. The ORF1 protein appears to be related to members of the Alphatetraviridae - a member of the "Alpha-like" super-group of viruses - while the capsid protein is related to that of the chicken astrovirus capsid - a member of the "Picorna-like" supergroup. This suggests that a recombination event at some point in the past between at least two distinct viruses gave rise to the ancestor of this family. This recombination event occurred at the junction of the structural and non structural proteins. Life cycle Entry into the host cell is achieved by attachment of the virus to host receptors, which mediates clathrin-mediated endocytosis. Replication follows the positive stranded RNA virus replication model. Positive stranded rna virus transcription is the method of transcription. Translation takes place by leaky scanning. Human, pig, wild boar, monkey, cow, sheep, camel some rodents, bat and chicken serve as the natural host. Transmission routes are zoonosi
https://en.wikipedia.org/wiki/Fiersviridae
Fiersviridae is a family of positive-strand RNA viruses which infect prokaryotes. Bacteria serve as the natural host. They are small viruses with linear, positive-sense, single-stranded RNA genomes that encode four proteins. All phages of this family require bacterial pili to attach to and infect cells. The family has 185 genera, most discovered by metagenomics. In 2020, the family was renamed from Leviviridae to its current name. Structure Viruses in Fiersviridae are non-enveloped, with icosahedral and spherical geometries, and T=3 symmetry. Their virion diameter is around 26 nm. Genome Fiersviruses have a positive-sense, single-stranded RNA genome. It is linear and non-segmented and around 4kb in length. The genome encodes four proteins, which are the coat, replicase, maturation, and lysis protein. Life cycle Entry into the host cell is achieved by adsorption into the host cell. Replication follows the positive-strand RNA virus replication model. Positive-strand RNA virus transcription is the method of transcription. Translation takes place by suppression of termination. The virus exits the host cell by bacteria lysis. Bacteria serve as the natural host. Taxonomy Fiersviridae contains 185 genera. Two notable genera are Emesvirus, which contains bacteriophage MS2, and Qubevirus, which contains bacteriophage Qbeta.
https://en.wikipedia.org/wiki/Comparison%20of%20platform%20virtualization%20software
Platform virtualization software, specifically emulators and hypervisors, are software packages that emulate the whole physical computer machine, often providing multiple virtual machines on one physical platform. The table below compares basic information about platform virtualization hypervisors. General Features Providing any virtual environment usually requires some overhead of some type or another. Native usually means that the virtualization technique does not do any CPU level virtualization (like Bochs), which executes code more slowly than when it is directly executed by a CPU. Some other products such as VMware and Virtual PC use similar approaches to Bochs and QEMU, however they use a number of advanced techniques to shortcut most of the calls directly to the CPU (similar to the process that JIT compiler uses) to bring the speed to near native in most cases. However, some products such as coLinux, Xen, z/VM (in real mode) do not suffer the cost of CPU-level slowdowns as the CPU-level instructions are not proxied or executing against an emulated architecture since the guest OS or hardware is providing the environment for the applications to run under. However access to many of the other resources on the system, such as devices and memory may be proxied or emulated in order to broker those shared services out to all the guests, which may cause some slow downs as compared to running outside of virtualization. OS-level virtualization is described as "native" speed, however some groups have found overhead as high as 3% for some operations, but generally figures come under 1%, so long as secondary effects do not appear. See for a paper comparing performance of paravirtualization approaches (e.g. Xen) with OS-level virtualization Requires patches/recompiling. Exceptional for lightweight, paravirtualized, single-user VM/CMS interactive shell: largest customers run several thousand users on even single prior models. For multiprogramming OSes like Linux
https://en.wikipedia.org/wiki/Nodaviridae
Nodaviridae is a family of nonenveloped positive-strand RNA viruses. Vertebrates and invertebrates serve as natural hosts. Diseases associated with this family include: viral encephalopathy and retinopathy in fish. There are nine species in the family, assigned to two genera. History The name of the family is derived from the Japanese village of Nodamura, Iwate Prefecture where Nodamura virus was first isolated from Culex tritaeniorhynchus mosquitoes. Virology Structure The virus is not enveloped and has an icosahedral capsid (triangulation number = 3) ranging from 29 to 35 nm in diameter. The capsid is constructed of 32 capsomers. Genome The genome is linear, positive sense, bipartite (composed of two segments – RNA1 and RNA2) single stranded RNA consisting of 4500 nucleotides with a 5’ terminal methylated cap and a non-polyadenylated 3’ terminal. RNA1, which is ~3.1 kilobases in length, encodes a protein that has multiple functional domains: a mitochondrial targeting domain, a transmembrane domain, an RNA-dependent RNA polymerase (RdRp) domain, a self-interaction domain and an RNA capping domain. In addition, RNA1 encodes a subgenomic RNA3 that encodes protein B2, an RNA silencing inhibitor. RNA2 encodes protein α, a viral capsid protein precursor, which is auto-cleaved into two mature proteins, a 38 kDa β protein and a 5 kDa γ protein, at a conserved Asn/Ala site during virus assembly. Life cycle Viral replication is cytoplasmic. Entry into the host cell is achieved by penetration into the host cell. Replication follows the positive stranded RNA virus replication model. Positive stranded RNA virus transcription, using the internal initiation model of subgenomic RNA transcription is the method of transcription. Vertebrates and invertebrates serve as the natural host. Transmission routes are contact and contamination. Taxonomy The members of the genus Alphanodavirus were originally isolated from insects while those of the genus Betanodavirus were isolate
https://en.wikipedia.org/wiki/Potyviridae
Potyviridae is a family of positive-strand RNA viruses that encompasses more than 30% of known plant viruses, many of which are of great agricultural significance. The family has 12 genera and 235 species, three of which are unassigned to a genus. Structure Potyvirid virions are nonenveloped, flexuous filamentous, rod-shaped particles. The diameter is around 11–20 nm, with a length of 650–950 nm. Genome Genomes are linear and usually nonsegmented, around 8–12kb in length, consisting of positive-sense RNA, which is surrounded by a protein coat made up of a single viral encoded protein called a capsid. All induce the formation of virus inclusion bodies called cylindrical inclusions (‘pinwheels’) in their hosts. These consist of a single protein (about 70 kDa) made in their hosts from a single viral genome product. Member viruses encode large polypeptides that are cleaved into mature proteins. In 5'–3' order these proteins are P1 (a serine protease): 83 kDa HC (a protease): 51 kDa P3: 34 kDa 6K1: 5 kDa Cl (helicase): 71 kDa 6K2: 6 kDa VPg (the 5' binding protein): 20 kDa NIa-Pro (a protease): 27 kDa NIb (RNA dependent RNA polymerase): 57 kDa Capsid protein: 34 kDa There may be some variation in the number of the proteins depending on the genera and species. For instance some genera lack P1, some virus of the genus Ipomovirus lack HC and have a P1 tandem. Pretty interesting sweet potato potyviral ORF (PISPO), alkylation B (AlkB), and inosine triphosphate pyrophosphatase (known as ITPase or HAM1) are protein domains identified in atypical members. Life cycle Viral replication is cytoplasmic. Entry into the host cell is achieved by penetration. Replication follows the positive-stranded RNA virus replication model. Positive-stranded RNA virus transcription is the method of transcription. Translation takes place by −1 ribosomal frameshifting. The virus exits the host cell by tubule-guided viral movement. Plants serve as the natural host. The virus is tran
https://en.wikipedia.org/wiki/Tombusviridae
Tombusviridae is a family of single-stranded positive sense RNA plant viruses. There are three subfamilies, 17 genera, and 95 species in this family. The name is derived from Tomato bushy stunt virus (TBSV). Genome All viruses in the family have a non-segmented (monopartite) linear genome, with the exception of Dianthoviruses, whose genome is bipartite. The genome is approximately 4.6–4.8kb in length, lacks a 5' cap and a poly(A) tail, and it encodes 4–6 ORFs. The polymerase encodes an amber stop codon which is the site of a readthrough event within ORF1, producing two products necessary for replication. There is no helicase encoded by the virus. Structure The RNA is encapsulated in an icosahedral (T=3) capsid, composed of 180 units of a single coat protein 27–42K in size; the virion measures 28–35 nm in diameter, and it is not enveloped. Life cycle Viral replication is cytoplasmic, and is lysogenic. Entry into the host cell is achieved by penetration into the host cell. Replication follows the positive stranded RNA virus replication model. Positive stranded RNA virus transcription, using the premature termination model of subgenomic RNA transcription is the method of transcription. Translation takes place by leaky scanning, −1 ribosomal frameshifting, viral initiation, and suppression of termination. The virus exits the host cell by tubule-guided viral movement. Plants serve as the natural host. Transmission routes are mechanical, seed borne, and contact. Viruses in this family are primarily soil-borne, some transmitted by fungal species of the order Chytridiales, others by no known vector. Virions may spread by water, root growth into infected soil, contact between plants, pollen, or seed, depending on the virus species. These viruses may be successfully transmitted by grafting or mechanical inoculation, and both the virion and the genetic material alone are infective. Replication Members of Tombusviridae replicate in the cytoplasm, by use of negative str
https://en.wikipedia.org/wiki/Ostrich%20algorithm
In computer science, the ostrich algorithm is a strategy of ignoring potential problems on the basis that they may be exceedingly rare. It is named after the ostrich effect which is defined as "to stick one's head in the sand and pretend there is no problem". It is used when it is more cost-effective to allow the problem to occur than to attempt its prevention. Use with deadlocks This approach may be used in dealing with deadlocks in concurrent programming if they are believed to be very rare and the cost of detection or prevention is high. A set of processes is deadlocked if each process in the set is waiting for an event that only another process in the set can cause. The ostrich algorithm pretends there is no problem and is reasonable to use if deadlocks occur very rarely and the cost of their prevention would be high. The UNIX and Windows operating systems take this approach. Although using the ostrich algorithm is one of the methods of dealing with deadlocks, other effective methods exist such as dynamic avoidance, banker's algorithm, detection and recovery, and prevention. See also Crash-only software End-to-end principle
https://en.wikipedia.org/wiki/Advanced%20Dungeons%20%26%20Dragons%3A%20Heroes%20of%20the%20Lance
Advanced Dungeons & Dragons: Heroes of the Lance is a video game released in 1988 for various home computer systems and consoles. The game is based on the first Dragonlance campaign module for the Dungeons & Dragons fantasy role-playing game, Dragons of Despair, and the first Dragonlance novel Dragons of Autumn Twilight. Heroes of the Lance focuses on the journey of eight heroes through the ruined city of Xak Tsaroth, where they must face the ancient dragon Khisanth and retrieve the relic, the Disks of Mishakal. Gameplay Heroes of the Lance is a side-scrolling action game. Even if it is a faithful representation of a portion of the novel Dragons of Autumn Twilight, it was a departure from the role-playing game module Dragons of Despair the book itself is based on. The eight heroes from the Dragonlance series are assembled for the quest, but only one is visible on the screen at a time; when the on-screen hero dies, the next in line appears. Heroes of the Lance uses Dungeons & Dragons game statistics, with character statistics taken exactly from the rule books. Three characters have special abilities (healing magic, wizard magic, and trap removal), but the other five merely act as "lives" for the player as in traditional action-platforming games. Plot Characters The eight heroes that make up the party are: Goldmoon, a princess who brandishes the Blue Crystal Staff, an artifact whose powers she seeks to fully understand. Sturm Brightblade, a powerful and solemn knight. Caramon Majere, A warrior who makes up for his lack of intelligence with pure strength and fighting prowess. Raistlin Majere, Caramon's twin brother; a sly and brilliant, but frail, mage. Tanis Half-Elven, the 'natural leader' of the heroes, and good with a bow. Tasslehoff Burrfoot, a kender pickpocket. He fights with a sling weapon known as a . Riverwind, Goldmoon's betrothed. He is a noble and wise warrior. Flint Fireforge, a grizzled dwarven warrior. Development Heroes of the Lance was based on
https://en.wikipedia.org/wiki/Lunar%20Pool
Lunar Pool (known as in Japan) is a sports video game. It was developed by Compile for the Nintendo Entertainment System and MSX. The game combines pool (pocket billiards) with aspects of miniature golf. The object is to knock each ball into a pocket using a cue ball. The game offers sixty levels, and the friction of the table is adjustable (thus the lunar reference in the title, along with Moon-related background imagery within the game). The game was re-released for the Wii on the North American Virtual Console on October 22, 2007. Gameplay Lunar Pool is played in boards of different shapes. The player has to shoot the cue ball to knock other colored balls into the pockets. One life is lost whenever the player either fails to pocket a ball on three consecutive shots or pockets the cue ball. Completing a level awards one extra life, or two if the player has pocketed at least one ball on every shot. The value of each ball is determined by its number and the displayed "Rate" value, which starts at 1 and increases after every shot in which the player pockets at least one ball. Failing to do so resets the Rate to 1. Bonus points are awarded for completing a level without a miss. The game ends after all lives are lost or 60 levels have been completed, whichever occurs first. Modes Lunar Pool can either be played alone, against another player, or against the computer. If the game is played against another player or the computer, players take turns shooting the cue ball. If one player fails to knock at least one of the colored balls into a pocket, or pockets their own cue ball, then it becomes the opponent's turn. The game includes an adjustable friction setting, which determines the rate at which balls slow down after being hit. Legacy In the Mexican soap opera María la del Barrio, José María (Roberto Blandón) plays Lunar Pool on the NES.
https://en.wikipedia.org/wiki/Extensible%20Authentication%20Protocol
Extensible Authentication Protocol (EAP) is an authentication framework frequently used in network and internet connections. It is defined in , which made obsolete, and is updated by . EAP is an authentication framework for providing the transport and usage of material and parameters generated by EAP methods. There are many methods defined by RFCs, and a number of vendor-specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines the information from the interface and the formats. Each protocol that uses EAP defines a way to encapsulate by the user EAP messages within that protocol's messages. EAP is in wide use. For example, in IEEE 802.11 (WiFi) the WPA and WPA2 standards have adopted IEEE 802.1X (with various EAP types) as the canonical authentication mechanism. Methods EAP is an authentication framework, not a specific authentication mechanism. It provides some common functions and negotiation of authentication methods called EAP methods. There are currently about 40 different methods defined. Methods defined in IETF RFCs include EAP-MD5, EAP-POTP, EAP-GTC, EAP-TLS, EAP-IKEv2, EAP-SIM, EAP-AKA, and EAP-AKA'. Additionally, a number of vendor-specific methods and new proposals exist. Commonly used modern methods capable of operating in wireless networks include EAP-TLS, EAP-SIM, EAP-AKA, LEAP and EAP-TTLS. Requirements for EAP methods used in wireless LAN authentication are described in . The list of type and packets codes used in EAP is available from the IANA EAP Registry. The standard also describes the conditions under which the AAA key management requirements described in can be satisfied. Lightweight Extensible Authentication Protocol (LEAP) The Lightweight Extensible Authentication Protocol (LEAP) method was developed by Cisco Systems prior to the IEEE ratification of the 802.11i security standard. Cisco distributed the protocol through the CCX (Cisco Certified Extensions) as part of getting 802.1X and dynamic WEP ad
https://en.wikipedia.org/wiki/Smart%20Bitrate%20Control
Smart Bitrate Control, commonly referred to as SBC, was a technique for achieving greatly improved video compression efficiency using the DivX 3.11 Alpha video codec or Microsoft's proprietary MPEG4v2 video codec and the Nandub video encoder. SBC relied on two main technologies to achieve this improved efficiency: Multipass encoding and Variable Keyframe Intervals (VKI). SBC ceased to be commonly used after XviD and DivX development progressed to a point where they incorporated the same features that SBC pioneered and could offer even more efficient video compression without the need for a specialized application. Files created by SBC are compatible with DivX 3.11 Alpha and can be decoded by most codecs that support ISO MPEG4 video. Technical details The DivX 3.11 Alpha codec allowed a user to control three aspects of the encoding process: the average bitrate, keyframe interval, and whether the codec preserved smoother motion or more detailed images. DivX attempted to encode an entire movie at an average bitrate the user specified, varying the quality of the video in order to achieve the target bitrate. This meant that a simple section of video, such as a still image, would look very good, but complex video, such as an action scene, would look very bad. DivX's keyframe placement was also very simplistic, it would place keyframes only on the interval that the user selected, every 300 frames (10 seconds at 30 frame/s) by default. Nandub's multipass encoding encoded the video twice; in the first pass it would analyze the video (and write information to a log file), in the second it would actually produce the output file. Instead of varying the image quality to achieve an average bitrate, this allowed SBC to vary the bitrate to achieve an average quality, using higher bitrate for more complex scenes and lower bitrate for simpler scenes. VKI would place keyframes only where needed, such as at scene changes, rather than at a fixed interval. This significantly improved b
https://en.wikipedia.org/wiki/Smart%20Battery%20System
Smart Battery System (SBS) is a specification for managing a smart battery, usually for a portable computer. It allows operating systems to perform power management operations via a smart battery charger based on remaining estimated run times by determining accurate state of charge readings. Through this communication, the system also controls the battery charge rate. Communication is carried over an SMBus two-wire communication bus. The specification originated with the Duracell and Intel companies in 1994, but was later adopted by several battery and semiconductor makers. The Smart Battery System defines the SMBus connection, the data that can be sent over the connection (Smart Battery Data or SBD), the Smart Battery Charger, and a computer BIOS interface for control. In principle, any battery operated product can use SBS. A special integrated circuit in the battery pack (called a fuel gauge or battery management system) monitors the battery and reports information to the SMBus. This information might include battery type, model number, manufacturer, characteristics, charge/discharge rate, predicted remaining capacity, an almost-discharged alarm so that the PC or other device can shut down gracefully, and temperature and voltage to provide safe fast-charging. See also List of battery types Power Management Bus (PMBus)
https://en.wikipedia.org/wiki/Samuel%20S.%20Wagstaff%20Jr.
Samuel Standfield Wagstaff Jr. (born 21 February 1945) is an American mathematician and computer scientist, whose research interests are in the areas of cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms. He is currently a professor of computer science and mathematics at Purdue University who coordinates the Cunningham project, a project to factor numbers of the form bn ± 1, since 1983. He has authored/coauthored over 50 research papers and four books. He has an Erdős number of 1. Wagstaff received his Bachelor of Science in 1966 from Massachusetts Institute of Technology. His doctoral dissertation was titled, On Infinite Matroids, PhD in 1970 from Cornell University. Wagstaff was one of the founding faculty of Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue, and its precursor, the Computer Operations, Audit, and Security Technology (COAST) Laboratory. Selected publications with John Brillhart, D. H. Lehmer, John L. Selfridge, Bryant Tuckerman: Factorization of bn ± 1, b = 2,3,5,6,7,10,11,12 up to high powers, American Mathematical Society, 1983, 3rd edition 2002 as electronic book, Online text Cryptanalysis of number theoretic ciphers, CRC Press 2002 with Carlos J. Moreno: Sums of Squares of Integers, CRC Press 2005 The Joy of Factoring, Student Mathematical Library (American Mathematical Society) 2013 Wagstaff The Cunningham Project, Fields Institute, pdf file =
https://en.wikipedia.org/wiki/Morph%20%28TV%20series%29
Morph is a British series of clay stop-motion comedy animations, named after the main character, who is a small Plasticine man, who speaks an unintelligible language and lives on a tabletop, his bedroom being a small wooden box. The character was initially seen interacting with Tony Hart, beginning in 1977, on several of his British television programmes, notably Take Hart, Hartbeat and SMart. History Morph was produced for the BBC by Aardman Animations, later famous for the "Sledgehammer" music video, Wallace and Gromit, and Shaun the Sheep. Morph appears mainly in one-minute "shorts" interspersed throughout the Take Hart show. These are connected to the main show by having Hart deliver a line or two to Morph, who replies in gibberish but with meaningful gestures. Later on, Morph is joined by the cream-coloured Chas, who is much more troublesome and mischievous. Morph can change shape. He becomes spheres in order to move around and extrudes into cylinders to pass to different levels of his environment. He can also mimic other objects or creatures. Morph lives in a wooden microscope box on an artist's desk. He and Chas both love to eat cake, as seen in many of the shorts. Most appearances of Morph revolve around his friendship and rivalry with Chas, with each often playing tricks on the other and laughing at each other's misfortune. While Morph's nature is that of an innocent, curious character, Chas is much more mischievous and prone to bad behaviour. After Hart's shows ended, Morph and Chas appeared in shorts on the Children's BBC's successor programme SMart from 1994 to 2005. Some of the early plasticine models of Morph were destroyed in a fire at the warehouse where they were being stored on 10 October 2005. Morph's 30th birthday was celebrated in 2007 by creator Peter Lord and celebrity fan and comedian Phill Jupitus at events for the Encounters Film Festival in Bristol. In March 2009, shortly after Hart's death, a flashmob of Morph characters w
https://en.wikipedia.org/wiki/Double%20hashing
Double hashing is a computer programming technique used in conjunction with open addressing in hash tables to resolve hash collisions, by using a secondary hash of the key as an offset when a collision occurs. Double hashing with open addressing is a classical data structure on a table . The double hashing technique uses one hash value as an index into the table and then repeatedly steps forward an interval until the desired value is located, an empty location is reached, or the entire table has been searched; but this interval is set by a second, independent hash function. Unlike the alternative collision-resolution methods of linear probing and quadratic probing, the interval depends on the data, so that values mapping to the same location have different bucket sequences; this minimizes repeated collisions and the effects of clustering. Given two random, uniform, and independent hash functions and , the th location in the bucket sequence for value in a hash table of buckets is: Generally, and are selected from a set of universal hash functions; is selected to have a range of and to have a range of . Double hashing approximates a random distribution; more precisely, pair-wise independent hash functions yield a probability of that any pair of keys will follow the same bucket sequence. Selection of h2(k) The secondary hash function should have several characteristics: it should never yield an index of zero it should cycle through the whole table it should be very fast to compute it should be pair-wise independent of The distribution characteristics of are irrelevant. It is analogous to a random-number generator. All be relatively prime to |T|. In practice: If division hashing is used for both functions, the divisors are chosen as primes. If the T is a power of 2, the first and last requirements are usually satisfied by making always return an odd number. This has the side effect of doubling the chance of collision due to one wasted bit. Analysi
https://en.wikipedia.org/wiki/International%20Plant%20Protection%20Convention
The International Plant Protection Convention (IPPC) is a 1951 multilateral treaty overseen by the United Nations Food and Agriculture Organization that aims to secure coordinated, effective action to prevent and to control the introduction and spread of pests of plants and plant products. The Convention extends beyond the protection of cultivated plants to the protection of natural flora and plant products. It also takes into consideration both direct and indirect damage by pests, so it includes weeds. IPPC promulgates International Standards for Phytosanitary Measures (ISPMs). The Convention created a governing body consisting of each party, known as the Commission on Phytosanitary Measures, which oversees the implementation of the convention (see ). As of August 2017, the convention has 183 parties, being 180 United Nations member states and the Cook Islands, Niue, and the European Union. The convention is recognized by the World Trade Organization's (WTO) Agreement on the Application of Sanitary and Phytosanitary Measures (the SPS Agreement) as the only international standard setting body for plant health. Goals While the IPPC's primary focus is on plants and plant products moving in international trade, the convention also covers research materials, biological control organisms, germplasm banks, containment facilities, food aid, emergency aid and anything else that can act as a vector for the spread of plant pests – for example, containers, packaging materials, soil, vehicles, vessels and machinery. The IPPC was created by member countries of the Food and Agriculture Organization (UN FAO). The IPPC places emphasis on three core areas: international standard setting, information exchange and capacity development for the implementation of the IPPC and associated international phytosanitary standards. The Secretariat of the IPPC is housed at FAO headquarters in Rome, Italy, and is responsible for the coordination of core activities under the IPPC work program
https://en.wikipedia.org/wiki/Test%20plan
A test plan is a document detailing the objectives, resources, and processes for a specific test session for a software or hardware product. The plan typically contains a detailed understanding of the eventual workflow. Test plans A test plan documents the strategy that will be used to verify and ensure that a product or system meets its design specifications and other requirements. A test plan is usually prepared by or with significant input from test engineers. Depending on the product and the responsibility of the organization to which the test plan applies, a test plan may include a strategy for one or more of the following: Design verification or compliance test – to be performed during the development or approval stages of the product, typically on a small sample of units. Manufacturing test or production test – to be performed during preparation or assembly of the product in an ongoing manner for purposes of performance verification and quality control. Acceptance test or commissioning test – to be performed at the time of delivery or installation of the product. Service and repair test – to be performed as required over the service life of the product. Regression test – to be performed on an existing operational product, to verify that existing functionality was not negatively affected when other aspects of the environment were changed (e.g., upgrading the platform on which an existing application runs). A complex system may have a high-level test plan to address the overall requirements and supporting test plans to address the design details of subsystems and components. Test plan document formats can be as varied as the products and organizations to which they apply. There are three major elements that should be described in the test plan: test coverage, test methods, and test responsibilities. These are also used in a formal test strategy. Test coverage Test coverage in the test plan states what requirements will be verified during what stag
https://en.wikipedia.org/wiki/Novel%20food
A novel food is a type of food that does not have a significant history of consumption or is produced by a method that has not previously been used for food. Designer food Designer food is a type of novel food that has not existed on any regional or global consumer market before. Instead it has been "designed" using biotechnological / bioengineering methods (e.g. genetically modified food) or "enhanced" using engineered additives. Examples like designer egg, designer milk, designer grains, probiotics, and enrichment with micro- and macronutrients and designer proteins have been cited. The enhancement process is called food fortification or nutrification. Designer novel food often comes with sometimes unproven health claims ("superfoods"). Designer food is distinguished from food design, the aesthetic arrangement of food items for marketing purposes. European Union Novel foods or novel food ingredients have no history of "significant" consumption in the European Union prior to 15 May 1997. Any food or food ingredient that falls within this definition must be authorised according to the Novel Food legislation, Regulation (EC) No 258/97 of the European Parliament and of the Council. Applicants can consult the guidance document compiled by the European Commission, which highlights the scientific information and the safety assessment report required in each case. The Novel Food regulation stipulates that foods and food ingredients falling within the scope of this regulation must not: present a danger for the consumer; mislead the consumer; or differ from foods or food ingredients which they are intended to replace to such an extent that their normal consumption would be nutritionally disadvantageous for the consumer. There are two possible routes for authorization under the Novel Food legislation: a full application and a simplified application. The simplified application route is only applicable where the EU member national competent authority, e.g. Food Standard
https://en.wikipedia.org/wiki/Earnings%20per%20share
Earnings per share (EPS) is the monetary value of earnings per outstanding share of common stock for a company. It is a key measure of corporate profitability and is commonly used to price stocks. In the United States, the Financial Accounting Standards Board (FASB) requires EPS information for the four major categories of the income statement: continuing operations, discontinued operations, extraordinary items, and net income. Calculation Preferred stock rights have precedence over common stock. Therefore, dividends on preferred shares are subtracted before calculating the EPS. When preferred shares are cumulative (i.e. dividends accumulate as payable if unpaid in the given accounting year), annual dividends are deducted whether or not they have been declared. Dividends in arrears are not relevant when calculating EPS. Basic formula Earnings per share = Net income formula Earnings per share = Continuing operations formula Earnings per share = Diluted earnings per share Diluted earnings per share (diluted EPS) is a company's earnings per share calculated using fully diluted shares outstanding (i.e. including the impact of stock option grants and convertible bonds). Diluted EPS indicates a "worst case" scenario, one that reflects the issuance of stock for all outstanding options, warrants and convertible securities that would reduce earnings per share. Calculations Calculations of diluted EPS vary. Morningstar reports diluted EPS "Earnings/Share $", which is net income minus preferred stock dividends divided by the weighted average of common stock shares outstanding over the past year; this is adjusted for dilutive shares. Some data sources may simplify this calculation by using the number of shares outstanding at the end of a reporting period. The methods of simplifying EPS calculations and eliminating inappropriate assumptions include replacing primary EPS with basic EPS, eliminating the treasury stock method of accounting from fully diluted EPS, eliminati
https://en.wikipedia.org/wiki/Vessel%20emergency%20codes
In addition to distress signals like Mayday and pan-pan, most vessels, especially passenger ships, use some emergency signals to alert the crew on board. In some cases, the signals may alert the passengers to danger, but, in others, the objective is to conceal the emergency from unaffected passengers so as to avoid panic or undue alarm. Signals can be in the form of blasts on alarm bells, sounds on the ship's whistle or code names paged over the PA system. Alpha, Alpha, Alpha is the code for a medical emergency aboard Royal Caribbean ships. Alpha Team, Alpha Team, Alpha Team is the code for a fire emergency aboard Carnival Cruise Line ships. Assemble at Muster Stations (General Emergency Signal), seven short blasts followed by one long blast of the ships horn and internal alarm bell system. Bravo, Bravo, Bravo is used by many cruise lines to alert crew to a fire or other serious incident on board without alarming passengers. Operation Brightstar designates a medical emergency, such as cardiac or stroke on Carnival and Disney Cruise Line vessels. It can only be requested to be announced by one of the medical team or an officer with advanced medical training. The spoken word Brightstar over the PA, sometimes supplemented by a group signal on the pager system will alert the medical team including all doctors and nurses to attend the location. The ventilation officer (VO) is also alerted during a Brightstar. The VO will start the power to the cooling in the morgue (presuming it is not already in use) as a precaution. Charlie, Charlie, Charlie is the code for a security threat aboard Royal Caribbean ships and the code for upcoming helicopter winch operations aboard c-bed accommodation vessels. Code Blue usually means a medical emergency. Delta, Delta, Delta is the code for a possible bio-hazard among some cruise lines. More commonly used to alert crew to hull damage on board some lines as well. Echo, Echo, Echo is the code for a possible collision with another ship or t
https://en.wikipedia.org/wiki/Za%27atar
Za'atar ( ; , ) is a culinary herb or family of herbs. It is also the name of a spice mixture that includes the herb along with toasted sesame seeds, dried sumac, often salt, as well as other spices. As a family of related Middle Eastern herbs, it contains plants from the genera Origanum (oregano), Calamintha (basil thyme), Thymus (typically Thymus vulgaris, i.e., thyme), and Satureja (savory) plants. The name za'atar alone most properly applies to Origanum syriacum, considered in biblical scholarship to be the ezov of the Hebrew Bible, often translated as hyssop but distinct from modern Hyssopus officinalis. Used in Levantine cuisine, both the herb and spice mixture are popular throughout the Mediterranean region of the Middle East. Etymology According to Ignace J. Gelb, an Akkadian language word that can be read sarsar may refer to a spice plant. This word could be attested in the Syriac satre, and Arabic za'atar (or sa'tar), possibly the source of Latin Satureia. Satureia (Satureja) is a common name for Satureja thymbra, a species of savory whose other common and ethnic names include, "Persian za'atar", "za'atar rumi" (Roman hyssop), and "za'atar franji" (European hyssop). In the Modern Hebrew language, za'atar is used as an Arabic loanword. Thymus capitatus (also called Satureja capitata) is a species of wild thyme found throughout the hills of the Levant and Mediterranean Middle East. Thyme is said to be a plant "powerfully associated with Palestine", and the spice mixture za'atar is common fare there. Thymbra spicata, a plant native to Greece and to Palestine and has been cultivated in North America by Syrian, Palestinian, and Lebanese immigrants for use in their za'atar preparations since the 1940s. Another species identified as "wild za'atar" (Arabic: za'atar barri) is Origanum vulgare, commonly known as European oregano, oregano, pot marjoram, wild marjoram, winter marjoram, or wintersweet. This species is also extremely common in Lebanon, Syria, Is
https://en.wikipedia.org/wiki/Chermoula
Chermoula (Berber: tacermult or tacermilt, ) or charmoula is a marinade and relish used in Algerian, Libyan, Moroccan and Tunisian cooking. It is traditionally used to flavor fish or seafood, but it can be used on other meats or vegetables. It is somewhat similar to the Latin American chimichurri. Ingredients Common ingredients include garlic, cumin, coriander, oil, lemon juice, and salt. Regional variations may also include preserved lemons, onion, ground chili peppers, black pepper, saffron, and other herbs. Varieties Chermoula recipes vary widely by region. In Sfax, Tunisia, chermoula is often served with cured salted fish during Eid al-Fitr. This regional variety is composed of dried dark raisin purée mixed with onions cooked in olive oil and spices such as cloves, cumin, chili, black pepper, and cinnamon. A Moroccan version comprises dried parsley, cumin, paprika, and salt and pepper. The Libyan version of charmoula is served as a side dish in the summer; It contains olives, tuna and a variety of green herbs. See also List of Middle Eastern dishes Harissa Tunisian cuisine Moroccan cuisine North African cuisine List of African dishes
https://en.wikipedia.org/wiki/Thermochromism
Thermochromism is the property of substances to change color due to a change in temperature. A mood ring is an excellent example of this phenomenon, but thermochromism also has more practical uses, such as baby bottles which change to a different color when cool enough to drink, or kettles which change color when water is at or near boiling point. Thermochromism is one of several types of chromism. Organic materials Thermochromatic liquid crystals The two common approaches are based on liquid crystals and leuco dyes. Liquid crystals are used in precision applications, as their responses can be engineered to accurate temperatures, but their color range is limited by their principle of operation. Leuco dyes allow wider range of colors to be used, but their response temperatures are more difficult to set with accuracy. Some liquid crystals are capable of displaying different colors at different temperatures. This change is dependent on selective reflection of certain wavelengths by the crystallic structure of the material, as it changes between the low-temperature crystallic phase, through anisotropic chiral or twisted nematic phase, to the high-temperature isotropic liquid phase. Only the nematic mesophase has thermochromic properties; this restricts the effective temperature range of the material. The twisted nematic phase has the molecules oriented in layers with regularly changing orientation, which gives them periodic spacing. The light passing through the crystal undergoes Bragg diffraction on these layers, and the wavelength with the greatest constructive interference is reflected back, which is perceived as a spectral color. A change in the crystal temperature can result in a change of spacing between the layers and therefore in the reflected wavelength. The color of the thermochromic liquid crystal can therefore continuously range from non-reflective (black) through the spectral colors to black again, depending on the temperature. Typically, the high
https://en.wikipedia.org/wiki/Opsonin
Opsonins are extracellular proteins that, when bound to substances or cells, induce phagocytes to phagocytose the substances or cells with the opsonins bound. Thus, opsonins act as tags to label things in the body that should be phagocytosed (i.e. eaten) by phagocytes (cells that specialise in phagocytosis, i.e. cellular eating). Different types of things ("targets") can be tagged by opsonins for phagocytosis, including: pathogens (such as bacteria), cancer cells, aged cells, dead or dying cells (such as apoptotic cells), excess synapses, or protein aggregates (such as amyloid plaques). Opsonins help clear pathogens, as well as dead, dying and diseased cells. Opsonins were discovered and named "opsonins" in 1904 by Wright and Douglas, who found that incubating bacteria with blood plasma enabled phagocytes to phagocytose (and thereby destroy) the bacteria. They concluded that: “We have here conclusive proof that the blood fluids modify the bacteria in a manner which renders them a ready prey to the phagocytes. We may speak of this as an “opsonic” effect (opsono - I cater for; I prepare victuals for), and we may employ the term “opsonins” to designate the elements in the blood fluids which produce this effect.” Subsequent research found two main types of opsonin in blood that opsonised bacteria: complement proteins and antibodies. However, there are now known to be at least 50 proteins that act as opsonins for pathogens or other targets. Mechanisms Opsonins induce phagocytosis of targets by binding the targets (e.g. bacteria) and then also binding phagocytic receptors on phagocytes. Thus, opsonins act as bridging molecules between the target and the phagocyte, bringing them into contact, and then usually activating the phagocytic receptor to induce engulfment of the target by the phagocyte. All cell membranes have negative charges (zeta potential) which makes it difficult for two cells to come close together. When opsonins bind to their targets they boost the kin
https://en.wikipedia.org/wiki/Anethole
Anethole (also known as anise camphor) is an organic compound that is widely used as a flavoring substance. It is a derivative of the aromatic compound allylbenzene and occurs widely in plants in essential oils. It is in the class of phenylpropanoid organic compounds. It contributes a large component of the odor and flavor of anise and fennel (both in the botanical family Apiaceae), anise myrtle (Myrtaceae), liquorice (Fabaceae), magnolia blossoms, and star anise (Schisandraceae). Closely related to anethole is its isomer estragole, which is abundant in tarragon (Asteraceae) and basil (Lamiaceae),and has a flavor reminiscent of anise. It is a colorless, fragrant, mildly volatile liquid. Anethole is only slightly soluble in water but exhibits high solubility in ethanol. This trait causes certain anise-flavored liqueurs to become opaque when diluted with water; the ouzo effect. Structure and production Anethole is an aromatic, unsaturated ether related to lignols. It exists as both cis–trans isomers (see also E–Z notation), involving the double bond outside the ring. The more abundant isomer, and the one preferred for use, is the trans or E isomer. Like related compounds, anethole is poorly soluble in water. Historically, this property was used to detect adulteration in samples. Most anethole is obtained from turpentine-like extracts from trees. Of only minor commercial significance, anethole can also be isolated from essential oils. Currently Banwari Chemicals Pvt Ltd situated in Bhiwadi, Rajasthan, India is the leading manufacturer of anethole. It is prepared commercially from 4-methoxypropiophenone, which is prepared from anisole. Uses Flavoring Anethole is distinctly sweet, measuring 13 times sweeter than sugar. It is perceived as being pleasant to the taste even at higher concentrations. It is used in alcoholic drinks ouzo, rakı, anisette and absinthe, among others. It is also used in seasoning and confectionery applications, such as German Lebkuchen, ora
https://en.wikipedia.org/wiki/Smart%20key
A smart key is an electronic access and authorization system that is available either as standard equipment, or as an option in several car designs. It was first developed by Siemens in 1995 and introduced by Mercedes-Benz under the name "Keyless-Go" in 1998 on the W220 S-Class, after the design patent was filed by Daimler-Benz on May 17, 1997. Operation The smart key allows the driver to keep the key fob pocketed when unlocking, locking and starting the vehicle. The key is identified via one of several antennas in the car's bodywork and a radio pulse generator in the key housing. Depending on the system, the vehicle is automatically unlocked when a button or sensor on the door handle or trunk release is pressed. Vehicles with a smart-key system have a mechanical backup, usually in the form of a spare key blade supplied with the vehicle. Some manufacturers hide the backup lock behind a cover for styling. Vehicles with a smart-key system can disengage the immobilizer and activate the ignition without inserting a key in the ignition, provided the driver has the key inside the car. On most vehicles, this is done by pressing a starter button or twisting an ignition switch. When leaving a vehicle that is equipped with a smart-key system, the vehicle is locked by either pressing a button on a door handle, touching a capacitive area on a door handle, or simply walking away from the vehicle. The method of locking varies across models. Some vehicles automatically adjust settings based on the smart key used to unlock the car. User preferences such as seat positions, steering wheel position, exterior mirror settings, climate control (e.g. temperature) settings, and stereo presets are popular adjustments. Some models, such as the Ford Escape, even have settings to prevent the vehicle from exceeding a maximum speed if it has been started with a certain key. Insurance standard In 2005, the UK motor insurance research expert Thatcham introduced a standard for keyless entry,
https://en.wikipedia.org/wiki/Weierstrass%20factorization%20theorem
In mathematics, and particularly in the field of complex analysis, the Weierstrass factorization theorem asserts that every entire function can be represented as a (possibly infinite) product involving its zeroes. The theorem may be viewed as an extension of the fundamental theorem of algebra, which asserts that every polynomial may be factored into linear factors, one for each root. The theorem, which is named for Karl Weierstrass, is closely related to a second result that every sequence tending to infinity has an associated entire function with zeroes at precisely the points of that sequence. A generalization of the theorem extends it to meromorphic functions and allows one to consider a given meromorphic function as a product of three factors: terms depending on the function's zeros and poles, and an associated non-zero holomorphic function. Motivation It is clear that any finite set of points in the complex plane has an associated polynomial whose zeroes are precisely at the points of that set. The converse is a consequences of the fundamental theorem of algebra: any polynomial function in the complex plane has a factorization where is a non-zero constant and is the set of zeroes of . The two forms of the Weierstrass factorization theorem can be thought of as extensions of the above to entire functions. The necessity of additional terms in the product is demonstrated when one considers where the sequence is not finite. It can never define an entire function, because the infinite product does not converge. Thus one cannot, in general, define an entire function from a sequence of prescribed zeroes or represent an entire function by its zeroes using the expressions yielded by the fundamental theorem of algebra. A necessary condition for convergence of the infinite product in question is that for each z, the factors must approach 1 as . So it stands to reason that one should seek a function that could be 0 at a prescribed point, yet remain near 1
https://en.wikipedia.org/wiki/Vendange%20tardive
Vendange tardive ("VT") means "late harvest" in French. The phrase refers to a style of dessert wine where the grapes are allowed to hang on the vine until they start to dehydrate. This process, called passerillage, concentrates the sugars in the juice and changes the flavours within it. The name is sometimes written as the plural form, vendanges tardives, referring to the fact that several runs through the vineyard are often necessary to produce such wines. In other countries such as Germany or Austria the term Spätlese is used to describe wine using the same making process. Alsace wines were the first to be described as vendange tardive but the term is now used in other regions of France. Since 1984, the term has been legally defined in Alsace and may only be applied to wines that exceed a minimum must weight and pass blind tasting by the INAO. Sélection de Grains Nobles ("SGN") is an even sweeter category, for grapes affected by noble rot. Vendange tardive is also an official wine designation in Luxembourg. Hugel's Law Jean Hugel first described a wine as vendange tardive after the long hot summer of 1976. He drafted rules for vendange tardive wine that were eventually accepted by the INAO on 1 March 1984, and known unofficially as Hugel's Law in recognition of his crusade. The minimum sugar levels were increased in 2001. The criteria are : A declaration to the INAO in advance of the intention to harvest late and the vineyards specified. A physical check of the grapes and of the quality of the juice. A minimum must weight equivalent to 15.3% potential alcohol for Gewurztraminer and Pinot gris, and 14% potential alcohol for Riesling and Muscat. For Sélection de Grains Nobles, the minimums are 18.2% and 16.4%, respectively. No chaptalisation nor acidification. The wine certified by INAO officials. The wine may not be released without a blind tasting by the INAO, at least 18 months after it is made. Between 1981 and 1989, the number of producers rose from 11 to
https://en.wikipedia.org/wiki/Young%20symmetrizer
In mathematics, a Young symmetrizer is an element of the group algebra of the symmetric group, constructed in such a way that, for the homomorphism from the group algebra to the endomorphisms of a vector space obtained from the action of on by permutation of indices, the image of the endomorphism determined by that element corresponds to an irreducible representation of the symmetric group over the complex numbers. A similar construction works over any field, and the resulting representations are called Specht modules. The Young symmetrizer is named after British mathematician Alfred Young. Definition Given a finite symmetric group Sn and specific Young tableau λ corresponding to a numbered partition of n, and consider the action of given by permuting the boxes of . Define two permutation subgroups and of Sn as follows: and Corresponding to these two subgroups, define two vectors in the group algebra as and where is the unit vector corresponding to g, and is the sign of the permutation. The product is the Young symmetrizer corresponding to the Young tableau λ. Each Young symmetrizer corresponds to an irreducible representation of the symmetric group, and every irreducible representation can be obtained from a corresponding Young symmetrizer. (If we replace the complex numbers by more general fields the corresponding representations will not be irreducible in general.) Construction Let V be any vector space over the complex numbers. Consider then the tensor product vector space (n times). Let Sn act on this tensor product space by permuting the indices. One then has a natural group algebra representation on (i.e. is a right module). Given a partition λ of n, so that , then the image of is For instance, if , and , with the canonical Young tableau . Then the corresponding is given by For any product vector of we then have Thus the set of all clearly spans and since the span we obtain , where we wrote informally . Notice also how t
https://en.wikipedia.org/wiki/Mini%E2%80%93mental%20state%20examination
The mini–mental state examination (MMSE) or Folstein test is a 30-point questionnaire that is used extensively in clinical and research settings to measure cognitive impairment. It is commonly used in medicine and allied health to screen for dementia. It is also used to estimate the severity and progression of cognitive impairment and to follow the course of cognitive changes in an individual over time; thus making it an effective way to document an individual's response to treatment. The MMSE's purpose has been not, on its own, to provide a diagnosis for any particular nosological entity. Administration of the test takes between 5 and 10 minutes and examines functions including registration (repeating named prompts), attention and calculation, recall, language, ability to follow simple commands and orientation. It was originally introduced by Folstein et al. in 1975, in order to differentiate organic from functional psychiatric patients but is very similar to, or even directly incorporates, tests which were in use previous to its publication. This test is not a mental status examination. The standard MMSE form which is currently published by Psychological Assessment Resources is based on its original 1975 conceptualization, with minor subsequent modifications by the authors. Advantages to the MMSE include requiring no specialized equipment or training for administration, and has both validity and reliability for the diagnosis and longitudinal assessment of Alzheimer's disease. Due to its short administration period and ease of use, it is useful for cognitive assessment in the clinician's office space or at the bedside. Disadvantages to the utilization of the MMSE is that it is affected by demographic factors; age and education exert the greatest effect. The most frequently noted disadvantage of the MMSE relates to its lack of sensitivity to mild cognitive impairment and its failure to adequately discriminate patients with mild Alzheimer's disease from normal pati
https://en.wikipedia.org/wiki/Heawood%20conjecture
In graph theory, the Heawood conjecture or Ringel–Youngs theorem gives a lower bound for the number of colors that are necessary for graph coloring on a surface of a given genus. For surfaces of genus 0, 1, 2, 3, 4, 5, 6, 7, ..., the required number of colors is 4, 7, 8, 9, 10, 11, 12, 12, .... , the chromatic number or Heawood number. The conjecture was formulated in 1890 by Percy John Heawood and proven in 1968 by Gerhard Ringel and Ted Youngs. One case, the non-orientable Klein bottle, proved an exception to the general formula. An entirely different approach was needed for the much older problem of finding the number of colors needed for the plane or sphere, solved in 1976 as the four color theorem by Haken and Appel. On the sphere the lower bound is easy, whereas for higher genera the upper bound is easy and was proved in Heawood's original short paper that contained the conjecture. In other words, Ringel, Youngs and others had to construct extreme examples for every genus g = 1,2,3,.... If g = 12s + k, the genera fall into 12 cases according as k = 0,1,2,3,4,5,6,7,8,9,10,11. To simplify, suppose that case k has been established if only a finite number of g's of the form 12s + k are in doubt. Then the years in which the twelve cases were settled and by whom are the following: 1954, Ringel: case 5 1961, Ringel: cases 3,7,10 1963, Terry, Welch, Youngs: cases 0,4 1964, Gustin, Youngs: case 1 1965, Gustin: case 9 1966, Youngs: case 6 1967, Ringel, Youngs: cases 2,8,11 The last seven sporadic exceptions were settled as follows: 1967, Mayer: cases 18, 20, 23 1968, Ringel, Youngs: cases 30, 35, 47, 59, and the conjecture was proved. Formal statement Percy John Heawood conjectured in 1890 that for a given genus g > 0, the minimum number of colors necessary to color all graphs drawn on an orientable surface of that genus (or equivalently to color the regions of any partition of the surface into simply connected regions) is given by where is the floor function. Re
https://en.wikipedia.org/wiki/Matt%20Mullenweg
Matthew Charles Mullenweg (born January 11, 1984) is an American entrepreneur and web developer living in Houston. He is known for developing and founding the free and open-source web software WordPress, and its parent company Automattic. After dropping out of the University of Houston, he worked at CNET Networks from 2004 to 2006 until he quit and founded Automattic, an internet company whose brands include WordPress.com, Akismet, Gravatar, VaultPress, IntenseDebate, Crowdsignal, and Tumblr. Early life and education Mullenweg was born in Houston, Texas, and attended the High School for the Performing and Visual Arts where he studied jazz saxophone. He studied at the University of Houston, majoring in political science, before he dropped out in 2004 to pursue a job at CNET Networks. Mullenweg was raised Catholic. Career In January 2003, Mullenweg and Mike Little started WordPress as a fork of b2. They were soon joined by original b2 developer Michel Valdrighi. Mullenweg was 19 years old, and a freshman at the University of Houston at the time. In March 2004, he co-founded the Global Multimedia Protocols Group (GMPG) with Eric Meyer and Tantek Çelik. GMPG wrote the first of the Microformats. In April 2004, with fellow WordPress developers, they launched Ping-O-Matic, a hub for notifying or "pinging" blog search engines, like Technorati, about blog updates. The following month, WordPress competitor Movable Type announced a radical price change, driving thousands of users to seek another blogging platform; this is widely seen as the tipping point in WordPress's popularity. In October 2004, he was recruited by CNET to work on WordPress for them and help them with blogs and new media offerings. He dropped out of college and moved to San Francisco from Houston, Texas, the following month. Mullenweg announced bbPress in December, Mullenweg and the WordPress team released WordPress 1.5 "Strayhorn" in February 2005, which had over 900,000 downloads. The release introduc
https://en.wikipedia.org/wiki/RL%20circuit
A resistor–inductor circuit (RL circuit), or RL filter or RL network, is an electric circuit composed of resistors and inductors driven by a voltage or current source. A first-order RL circuit is composed of one resistor and one inductor, either in series driven by a voltage source or in parallel driven by a current source. It is one of the simplest analogue infinite impulse response electronic filters. Introduction The fundamental passive linear circuit elements are the resistor (R), capacitor (C) and inductor (L). These circuit elements can be combined to form an electrical circuit in four distinct ways: the RC circuit, the RL circuit, the LC circuit and the RLC circuit, with the abbreviations indicating which components are used. These circuits exhibit important types of behaviour that are fundamental to analogue electronics. In particular, they are able to act as passive filters. In practice, however, capacitors (and RC circuits) are usually preferred to inductors since they can be more easily manufactured and are generally physically smaller, particularly for higher values of components. Both RC and RL circuits form a single-pole filter. Depending on whether the reactive element (C or L) is in series with the load, or parallel with the load will dictate whether the filter is low-pass or high-pass. Frequently RL circuits are used as DC power supplies for RF amplifiers, where the inductor is used to pass DC bias current and block the RF getting back into the power supply. Complex impedance The complex impedance (in ohms) of an inductor with inductance (in henrys) is The complex frequency is a complex number, where represents the imaginary unit: , is the exponential decay constant (in radians per second), and is the angular frequency (in radians per second). Eigenfunctions The complex-valued eigenfunctions of any linear time-invariant (LTI) system are of the following forms: From Euler's formula, the real-part of these eigenfunctions are expo
https://en.wikipedia.org/wiki/Boarding%20pass
A boarding pass or boarding card is a document provided by an airline during airport check-in, giving a passenger permission to enter the restricted area of an airport (also known as the airside portion of the airport) and to board the airplane for a particular flight. At a minimum, it identifies the passenger, the flight number, the date, and scheduled time for departure. A boarding pass may also indicate details of the perks a passenger is entitled to (e.g., lounge access, priority boarding) and is thus presented at the entrance of such facilities to show eligibility. In some cases, flyers can check in online and print the boarding passes themselves. There are also codes that can be saved to an electronic device or from the airline's app that are scanned during boarding. A boarding pass may be required for a passenger to enter a secure area of an airport. Generally, a passenger with an electronic ticket will only need a boarding pass. If a passenger has a paper airline ticket, that ticket (or flight coupon) may be required to be attached to the boarding pass for the passenger to board the aircraft. For "connecting flights", a boarding pass is required for each new leg (distinguished by a different flight number), regardless of whether a different aircraft is boarded or not. The paper boarding pass (and ticket, if any), or portions thereof, are sometimes collected and counted for cross-check of passenger counts by gate agents, but more frequently are scanned (via barcode or magnetic strip) and returned to the passengers in their entirety. The standards for bar codes and magnetic stripes on boarding passes are published by the IATA. The bar code standard (Bar Coded Boarding Pass) defines the 2D bar code printed on paper boarding passes or sent to mobile phones for electronic boarding passes. The magnetic stripe standard (ATB2) expired in 2010. Most airports and airlines have automatic readers that will verify the validity of the boarding pass at the jetwa
https://en.wikipedia.org/wiki/Traffic%20policing%20%28communications%29
In communications, traffic policing is the process of monitoring network traffic for compliance with a traffic contract and taking steps to enforce that contract. Traffic sources which are aware of a traffic contract may apply traffic shaping to ensure their output stays within the contract and is thus not discarded. Traffic exceeding a traffic contract may be discarded immediately, marked as non-compliant, or left as-is, depending on administrative policy and the characteristics of the excess traffic. Effects The recipient of traffic that has been policed will observe packet loss distributed throughout periods when incoming traffic exceeded the contract. If the source does not limit its sending rate (for example, through a feedback mechanism), this will continue, and may appear to the recipient as if link errors or some other disruption is causing random packet loss. The received traffic, which has experienced policing en route, will typically comply with the contract, although jitter may be introduced by elements in the network downstream of the policer. With reliable protocols, such as TCP as opposed to UDP, the dropped packets will not be acknowledged by the receiver, and therefore will be resent by the emitter, thus generating more traffic. Impact on congestion-controlled sources Sources with feedback-based congestion control mechanisms (for example TCP) typically adapt rapidly to static policing, converging on a rate just below the policed sustained rate. Co-operative policing mechanisms, such as packet-based discard facilitate more rapid convergence, higher stability and more efficient resource sharing. As a result, it may be hard for endpoints to distinguish TCP traffic that has been merely policed from TCP traffic that has been shaped. Impact in the case of ATM Where cell-level dropping is enforced (as opposed to that achieved through packet-based policing) the impact is particularly severe on longer packets. Since cells are typically much shorter
https://en.wikipedia.org/wiki/Domain%20privacy
Domain privacy (often called Whois privacy) is a service offered by a number of domain name registrars. A user buys privacy from the company, who in turn replaces the user's information in the WHOIS with the information of a forwarding service (for email and sometimes postal mail, it is done by a proxy server). Level of anonymity Registrars typically collect personal information to provide the service. Some registrars take little persuasion to release the so-called 'private' information to the world, requiring only a phone request or a cease and desist letter. Others, however, handle privacy with more precaution, using measures including hosting domain names offshore and accepting cryptocurrencies for payment so that the registrar has no knowledge of the domain name owner's personal information (which would otherwise be transmitted with credit card transactions). It is debatable whether or not this practice is at odds with the domain registration requirement of the Internet Corporation for Assigned Names and Numbers (ICANN). Privacy by default Some top-level domains have privacy caveats: .al: No information about the owner is disclosed. .at, .co.at, .or.at: Since May 21, 2010, contact data (defined as phone number, fax number, e-mail address) is hidden by the registrar and must be explicitly made public. .ca: Since June 10, 2008, the Canadian Internet Registration Authority no longer posts registration details of individuals associated with .ca domains. .ch and .li : Since 1st January 2021 Whois information is private by default and can be obtained only in limited cases .de: Since May 25, 2018, the German Internet Registration Authority denic put extensive changes into force for the Whois Lookup Service. With a few exceptions, third parties can no longer access domain ownership data. .eu: If the registrant is a natural person, only the e-mail address is shown in the public whois records unless specified otherwise. .fi: Individual persons' data is not publis
https://en.wikipedia.org/wiki/Metabolic%20engineering
Metabolic engineering is the practice of optimizing genetic and regulatory processes within cells to increase the cell's production of a certain substance. These processes are chemical networks that use a series of biochemical reactions and enzymes that allow cells to convert raw materials into molecules necessary for the cell's survival. Metabolic engineering specifically seeks to mathematically model these networks, calculate a yield of useful products, and pin point parts of the network that constrain the production of these products. Genetic engineering techniques can then be used to modify the network in order to relieve these constraints. Once again this modified network can be modeled to calculate the new product yield. The ultimate goal of metabolic engineering is to be able to use these organisms to produce valuable substances on an industrial scale in a cost-effective manner. Current examples include producing beer, wine, cheese, pharmaceuticals, and other biotechnology products. Some of the common strategies used for metabolic engineering are (1) overexpressing the gene encoding the rate-limiting enzyme of the biosynthetic pathway, (2) blocking the competing metabolic pathways, (3) heterologous gene expression, and (4) enzyme engineering. Since cells use these metabolic networks for their survival, changes can have drastic effects on the cells' viability. Therefore, trade-offs in metabolic engineering arise between the cells ability to produce the desired substance and its natural survival needs. Therefore, instead of directly deleting and/or overexpressing the genes that encode for metabolic enzymes, the current focus is to target the regulatory networks in a cell to efficiently engineer the metabolism. History and applications In the past, to increase the productivity of a desired metabolite, a microorganism was genetically modified by chemically induced mutation, and the mutant strain that overexpressed the desired metabolite was then chosen. Ho
https://en.wikipedia.org/wiki/Cis-3-Hexen-1-ol
cis-3-Hexen-1-ol, also known as (Z)-3-hexen-1-ol and leaf alcohol, is a colorless oily liquid with an intense grassy-green odor of freshly cut green grass and leaves. It is produced in small amounts by most plants and it acts as an attractant to many predatory insects. cis-3-Hexen-1-ol is a very important aroma compound that is used in fruit and vegetable flavors and in perfumes. The yearly production is about 30 tonnes. cis-3-Hexen-1-ol is an alcohol and its esters are also important flavor and fragrance raw materials. The related aldehyde cis-3-hexenal (leaf aldehyde) has a similar and even stronger smell but is relatively unstable and isomerizes into the conjugated trans-2-hexenal. This compound has been recognized as a semiochemical involved in mechanisms and behaviors of attraction in diverse animals such as insects and mammals. However, there is no scientific evidence of its aphrodisiac effects in humans. The popular Mexican alcoholic beverage, mezcal, is found to have enhanced concentrations of this compound when a maguey worm is served in the glass. Human odor perception A pair of two single-nucleotide polymorphisms, both in the gene for the OR2J3 odor receptor, strongly reduce sensitivity to this odorant.
https://en.wikipedia.org/wiki/Dessin%20d%27enfant
In mathematics, a dessin d'enfant is a type of graph embedding used to study Riemann surfaces and to provide combinatorial invariants for the action of the absolute Galois group of the rational numbers. The name of these embeddings is French for a "child's drawing"; its plural is either dessins d'enfant, "child's drawings", or dessins d'enfants, "children's drawings". A dessin d'enfant is a graph, with its vertices colored alternately black and white, embedded in an oriented surface that, in many cases, is simply a plane. For the coloring to exist, the graph must be bipartite. The faces of the embedding are required be topological disks. The surface and the embedding may be described combinatorially using a rotation system, a cyclic order of the edges surrounding each vertex of the graph that describes the order in which the edges would be crossed by a path that travels clockwise on the surface in a small loop around the vertex. Any dessin can provide the surface it is embedded in with a structure as a Riemann surface. It is natural to ask which Riemann surfaces arise in this way. The answer is provided by Belyi's theorem, which states that the Riemann surfaces that can be described by dessins are precisely those that can be defined as algebraic curves over the field of algebraic numbers. The absolute Galois group transforms these particular curves into each other, and thereby also transforms the underlying dessins. For a more detailed treatment of this subject, see or . History 19th century Early proto-forms of dessins d'enfants appeared as early as 1856 in the icosian calculus of William Rowan Hamilton; in modern terms, these are Hamiltonian paths on the icosahedral graph. Recognizable modern dessins d'enfants and Belyi functions were used by Felix Klein. Klein called these diagrams Linienzüge (German, plural of Linienzug "line-track", also used as a term for polygon); he used a white circle for the preimage of 0 and a '+' for the preimage of 1, rather than
https://en.wikipedia.org/wiki/Menstrual%20synchrony
Menstrual synchrony, also called the McClintock effect, or the Wellesley effect, is a contested process whereby women who begin living together in close proximity would experience their menstrual cycle onsets (the onset of menstruation or menses) becoming more synchronized together in time than when previously living apart. "For example, the distribution of onsets of seven female lifeguards was scattered at the beginning of the summer, but after 3 months spent together, the onset of all seven cycles fell within a 4-day period." Martha McClintock's 1971 paper, published in Nature, says that menstrual cycle synchronization happens when the menstrual cycle onsets of two or more women become closer together in time than they were several months earlier. After the initial studies, several papers were published reporting methodological flaws in studies reporting menstrual synchrony including McClintock's study. In addition, other studies were published that failed to find synchrony. The proposed mechanisms have also received scientific criticism. Reviews in 2006 and 2013 concluded that menstrual synchrony likely does not exist. Overview Original study by Martha McClintock Martha McClintock published the first study on menstrual synchrony among women living together in dormitories at Wellesley College, a women's liberal arts college in Massachusetts, US. Proposed causes McClintock hypothesized that pheromones could cause menstrual cycle synchronization. However, other mechanisms have been proposed, most prominently synchronization with lunar phases. Efforts to replicate McClintock's results No scientific evidence supports the lunar hypothesis, and doubt has been cast on pheromone mechanisms. After the initial studies reporting menstrual synchrony began to appear in the scientific literature, other researchers began reporting the failure to find menstrual synchrony. These studies were followed by critiques of the methods used in early studies, which argued that bias