source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Ibogaine | Ibogaine is a naturally occurring psychoactive substance found in plants in the family Apocynaceae such as Tabernanthe iboga, Voacanga africana, and Tabernaemontana undulata. It is a psychedelic with dissociative properties.
Preliminary research indicates that it may help counter drug addiction. However, its use has been associated with serious side effects and death. Between the years 1990 and 2008, a total of 19 fatalities temporally associated with the ingestion of ibogaine were reported, from which six subjects died of acute heart failure or cardiopulmonary arrest. The total number of subjects who have used it without major side effects during this period remains unknown. It is used as an alternative medicine treatment for drug addiction in some countries. Its prohibition in other countries has slowed scientific research. Ibogaine is also used to facilitate psychological introspection and spiritual exploration. Various derivatives of ibogaine designed to lack psychedelic properties (such as 18-MC) are under clinical trials which have shown them to be neither psychedelic nor psychoactive and to have acceptable safety profiles in humans.
The psychoactivity of the root bark of the iboga tree (Tabernanthe iboga), from which ibogaine is extracted, was first discovered by the Pygmy tribes of Central Africa, who passed the knowledge to the Bwiti tribe of Gabon. French explorers in turn learned of it from the Bwiti tribe and brought ibogaine back to Europe in 1899–1900, where it was subsequently marketed in France as a stimulant under the trade name Lambarène. Ibogaine-containing preparations are used for medicinal and ritual purposes within the African spiritual traditions of the Bwiti, who claim to have learned it from the Pygmy peoples. Although ibogaine's anti-addictive properties were first widely promoted in 1962 by Howard Lotsof, its Western medical use predates that by at least a century.
Additionally, the U.S. Central Intelligence Agency (CIA) studied the ef |
https://en.wikipedia.org/wiki/Cursor%20%28databases%29 | In computer science, a database cursor is a mechanism that enables traversal over the records in a database. Cursors facilitate subsequent processing in conjunction with the traversal, such as retrieval, addition and removal of database records. The database cursor characteristic of traversal makes cursors akin to the programming language concept of iterator.
Cursors are used by database programmers to process individual rows returned by database system queries. Cursors enable manipulation of whole result sets at once. In this scenario, a cursor enables the sequential processing of rows in a result set.
In SQL procedures, a cursor makes it possible to define a result set (a set of data rows) and perform complex logic on a row by row basis. By using the same mechanics, a SQL procedure can also define a result set and return it directly to the caller of the SQL procedure or to a client application.
A cursor can be viewed as a pointer to one row in a set of rows. The cursor can only reference one row at a time, but can move to other rows of the result set as needed.
Usage
To use cursors in SQL procedures, you need to do the following:
Declare a cursor that defines a result set
Open the cursor to establish the result set
Fetch the data into local variables as needed from the cursor, one row at a time
Close the cursor when done
To work with cursors you must use the following SQL statements
This section introduces the ways the SQL:2003 standard defines how to use cursors in applications in embedded SQL. Not all application bindings for relational database systems adhere to that standard, and some (such as CLI or JDBC) use a different interface.
A programmer makes a cursor known to the DBMS by using a DECLARE ... CURSOR statement and assigning the cursor a (compulsory) name:
DECLARE cursor_name CURSOR IS SELECT ... FROM ...
Before code can access the data, it must open the cursor with the OPEN statement. Directly following a successful opening, the cursor is |
https://en.wikipedia.org/wiki/Disinhibition | Disinhibition, also referred to as behavioral disinhibition, is medically recognized as an orientation towards immediate gratification, leading to impulsive behaviour driven by current thoughts, feelings, and external stimuli, without regard for past learning or consideration for future consequences. It is one of five pathological personality trait domains in certain psychiatric disorders. In psychology, it is defined as a lack of restraint manifested in disregard of social conventions, impulsivity, and poor risk assessment. Hypersexuality, hyperphagia, and aggressive outbursts are indicative of disinhibited instinctual drives.
Certain psychoactive substances that have effects on the limbic system of the brain may induce disinhibition.
Clinical concept
Disinhibition in psychology is defined as a lack of inhibitory control manifested in several ways, affecting motor, instinctual, emotional, cognitive, and perceptual aspects with signs and symptoms, such as impulsivity, disregard for others and social norms, aggressive outbursts, misconduct, and oppositional behaviors, disinhibited instinctual drives including risk-taking behaviors and hypersexuality.
Brain injury
Disinhibition is a common symptom following brain injury, or lesions, particularly to the frontal lobe and primarily to the orbitofrontal cortex. The neuropsychiatric sequelae following brain injuries could include diffuse cognitive impairment, with more prominent deficits in the rate of information processing, attention, memory, cognitive flexibility, and problem-solving. Prominent impulsivity, affective instability, and disinhibition are seen frequently, secondary to injury to frontal, temporal, and limbic areas. In association with the typical cognitive deficits, these sequelae characterize the frequently noted "personality changes" in TBI (Traumatic Brain Injury) patients.
Disinhibition syndromes, in brain injuries and insults including brain tumors, strokes and epilepsy range from mildly inappropr |
https://en.wikipedia.org/wiki/Two-photon%20excitation%20microscopy | Two-photon excitation microscopy (TPEF or 2PEF) is a fluorescence imaging technique that is particularly well-suited to image scattering living tissue of up to about one millimeter in thickness. Unlike traditional fluorescence microscopy, where the excitation wavelength is shorter than the emission wavelength, two-photon excitation requires simultaneous excitation by two photons with longer wavelength than the emitted light. The laser is focused onto a specific location in the tissue and scanned across the sample to sequentially produce the image. Due to the non-linearity of two-photon excitation, mainly fluorophores in the micrometer-sized focus of the laser beam are excited, which results in the spatial resolution of the image. This contrasts with confocal microscopy, where the spatial resolution is produced by the interaction of excitation focus and the confined detection with a pinhole.
Two-photon excitation microscopy typically uses near-infrared (NIR) excitation light which can also excite fluorescent dyes. Using infrared light minimizes scattering in the tissue because infrared light is scattered less in typical biological tissues. Due to the multiphoton absorption, the background signal is strongly suppressed. Both effects lead to an increased penetration depth for this technique. Two-photon excitation can be a superior alternative to confocal microscopy due to its deeper tissue penetration, efficient light detection, and reduced photobleaching.
Concept
Two-photon excitation employs two-photon absorption, a concept first described by Maria Goeppert Mayer (1906–1972) in her doctoral dissertation in 1931, and first observed in 1961 in a CaF2:Eu2+ crystal using laser excitation by Wolfgang Kaiser. Isaac Abella showed in 1962 in caesium vapor that two-photon excitation of single atoms is possible.
Two-photon excitation fluorescence microscopy has similarities to other confocal laser microscopy techniques such as laser scanning confocal microscopy and Raman m |
https://en.wikipedia.org/wiki/Eastern%20equine%20encephalitis | Eastern equine encephalitis (EEE), commonly called Triple E or sleeping sickness (not to be confused with African trypanosomiasis), is a disease caused by a zoonotic mosquito-vectored Togavirus that is present in North, Central, and South America, and the Caribbean. EEE was first recognized in Massachusetts, United States, in 1831, when 75 horses died mysteriously of viral encephalitis.
Epizootics in horses have continued to occur regularly in the United States. It can also be identified in donkeys and zebras. Due to the rarity of the disease, its occurrence can cause economic impact beyond the cost of horses and poultry. EEE is found today in the eastern part of the United States and is often associated with coastal plains. It can most commonly be found in East Coast and Gulf Coast states. In Florida, about one to two human cases are reported a year, although over 60 cases of equine encephalitis are reported. In years in which conditions are favorable for the disease, the number of equine cases is over 200. Diagnosing equine encephalitis is challenging because many of the symptoms are shared with other illnesses and patients can be asymptomatic. Confirmations may require a sample of cerebral spinal fluid or brain tissue, although CT scans and MRI scans are used to detect encephalitis. This could be an indication that the need to test for EEE is necessary. If a biopsy of the cerebral spinal fluid is taken, it is sent to a specialized laboratory for testing.
Eastern equine encephalitis virus (EEEV) is closely related to Venezuelan equine encephalitis virus and western equine encephalitis virus.
Signs and symptoms
The incubation period for Eastern equine encephalitis virus (EEEV) disease ranges from 4 to 10 days. The illness can progress either systematically or encephalitically, depending on the person's age. Encephalitic disease involves swelling of the brain and can be asymptomatic, while the systemic illness occurs very abruptly. Those with the systemic illnes |
https://en.wikipedia.org/wiki/Mastoiditis | Mastoiditis is the result of an infection that extends to the air cells of the skull behind the ear. Specifically, it is an inflammation of the mucosal lining of the mastoid antrum and mastoid air cell system inside the mastoid process. The mastoid process is the portion of the temporal bone of the skull that is behind the ear. The mastoid process contains open, air-containing spaces. Mastoiditis is usually caused by untreated acute otitis media (middle ear infection) and used to be a leading cause of child mortality. With the development of antibiotics, however, mastoiditis has become quite rare in developed countries where surgical treatment is now much less frequent and more conservative, unlike former times.
There is no evidence that the drop in antibiotic prescribing for otitis media has increased the incidence of mastoiditis, raising the possibility that the drop in reported cases is due to a confounding factor such as childhood immunizations against Haemophilus and Streptococcus. Untreated, the infection can spread to surrounding structures, including the brain, causing serious complications. While the use of antibiotics has reduced the incidence of mastoiditis, the risk of masked mastoiditis, a subclinical infection without the typical findings of mastoiditis has increased with the inappropriate use of antibiotics and the emergence of multidrug-resistant bacteria.
Signs and symptoms
Some common symptoms and signs of mastoiditis include pain, tenderness, and swelling in the mastoid region. There may be ear pain (otalgia), and the ear or mastoid region may be red (erythematous). Fever or headaches may also be present. Infants usually show nonspecific symptoms, including anorexia, diarrhea, or irritability. Drainage from the ear occurs in more serious cases often manifests as brown discharge on the pillowcase upon waking.
Pathophysiology
The pathophysiology of mastoiditis is straightforward: bacteria spread from the middle ear to the mastoid air cells, wh |
https://en.wikipedia.org/wiki/Bradymetabolism | Bradymetabolism refers to organisms with a high active metabolism and a considerably slower resting metabolism. Bradymetabolic animals can often undergo dramatic changes in metabolic speed, according to food availability and temperature. Many bradymetabolic creatures in deserts and in areas that experience extreme winters are capable of "shutting down" their metabolisms to approach near-death states, until favorable conditions return
(see hibernation and estivation).
Several variants of bradymetabolism exists. In mammals, the animals normally have a fairly high metabolism, only dropping to low levels in times of little food. In most reptiles, the normal metabolic rate is quite low, but can be raised when needed, typically in short bursts of activity in connection with capturing prey.
Etymology
The term is from Greek brady (βραδύ) "slow" and metaballein (μεταβάλλειν) "turn quickly."
See also
ectotherm
homeotherm
bradyaerobic
tachyaerobic
tachymetabolic
Notes
Animal physiology
Thermoregulation |
https://en.wikipedia.org/wiki/Cyclically%20reduced%20word | In mathematics, cyclically reduced word is a concept of combinatorial group theory.
Let F(X) be a free group. Then a word w in F(X) is said to be cyclically reduced if and only if every cyclic permutation of the word is reduced.
Properties
Every cyclic shift and the inverse of a cyclically reduced word are cyclically reduced again.
Every word is conjugate to a cyclically reduced word. The cyclically reduced words are minimal-length representatives of the conjugacy classes in the free group. This representative is not uniquely determined, but it is unique up to cyclic shifts (since every cyclic shift is a conjugate element). |
https://en.wikipedia.org/wiki/Pathosystem | A pathosystem is a subsystem of an ecosystem and is defined by the phenomenon of parasitism. A plant pathosystem is one in which the host species is a plant. The parasite is any species in which the individual spends a significant part of its lifespan inhabiting one host individual and obtaining nutrients from it. The parasite may thus be an insect, mite, nematode, parasitic Angiosperm, fungus, bacterium, mycoplasma, virus or viroid. Other consumers, however, such as mammalian and avian herbivores, which graze populations of plants, are normally considered to be outside the conceptual boundaries of the plant pathosystem.
A host has the property of resistance to a parasite. And a parasite has the property of parasitic ability on a host. Parasitism is the interaction of these two properties. The main feature of the pathosystem concept is that it concerns parasitism, and it is not concerned with the study of either the host or parasite on its own. Another feature of the pathosystem concept is that the parasitism is studied in terms of populations, at the higher levels and in ecologic aspects of the system. The pathosystem concept is also multidisciplinary. It brings together various crop science disciplines such as entomology, nematology, plant pathology, and plant breeding. It also applies to wild populations and to agricultural, horticultural, and forest crops, and to tropical, subtropical, as well as both subsistence and commercial farming.
In a wild plant pathosystem, both the host and the parasite populations exhibit genetic diversity and genetic flexibility. Conversely, in a crop pathosystem, the host population normally exhibits genetic uniformity and genetic inflexibility (i.e., clones, pure lines, hybrid varieties), and the parasite population assumes a comparable uniformity. This distinction means that a wild pathosystem can respond to selection pressures, but that a crop pathosystem does not. It also means that a system of locking (see below) can function |
https://en.wikipedia.org/wiki/Potassium%20nitrite | Potassium nitrite (distinct from potassium nitrate) is the inorganic compound with the chemical formula . It is an ionic salt of potassium ions K+ and nitrite ions NO2−, which forms a white or slightly yellow, hygroscopic crystalline powder that is soluble in water.
It is a strong oxidizer and may accelerate the combustion of other materials. Like other nitrite salts such as sodium nitrite, potassium nitrite is toxic if swallowed, and laboratory tests suggest that it may be mutagenic or teratogenic. Gloves and safety glasses are usually used when handling potassium nitrite.
Discovery
Nitrite is present at trace levels in soil, natural waters, plant and animal tissues, and fertilizer. The pure form of nitrite was first made by the Swedish chemist Carl Wilhelm Scheele working in the laboratory of his pharmacy in the market town of Köping. He heated potassium nitrate at red heat for half an hour and obtained what he recognized as a new “salt.” The two compounds (potassium nitrate and nitrite) were characterized by Péligot and the reaction was established as:
2KNO3 ->[\Delta T] 2KNO2 + O2
Production
Potassium nitrite can be obtained by the reduction of potassium nitrate. The production of potassium nitrite by absorption of nitrogen oxides in potassium hydroxide or potassium carbonate is not employed on a large scale because of the high price of these alkalies. Furthermore, the fact that potassium nitrite is highly soluble in water makes the solid difficult to recover.
Reactions
The mixing of cyanamide and KNO2 produces changes from white solids to yellow liquid and then to orange solid, forming cyanogen and ammonia gases. No external energy is used and the reactions are carried out with a small amount of O2.
Potassium nitrite forms potassium nitrate when heated in the presence of oxygen from 550 °C to 790 °C. The rate of reaction increases with temperature, but the extent of reaction decreases. At 550 °C and 600 °C the reaction is continuous and eventually goes to |
https://en.wikipedia.org/wiki/Augmentative%20and%20alternative%20communication | Augmentative and alternative communication (AAC) encompasses the communication methods used to supplement or replace speech or writing for those with impairments in the production or comprehension of spoken or written language. AAC is used by those with a wide range of speech and language impairments, including congenital impairments such as cerebral palsy, intellectual impairment and autism, and acquired conditions such as amyotrophic lateral sclerosis and Parkinson's disease. AAC can be a permanent addition to a person's communication or a temporary aid. Stephen Hawking, probably the best-known user of AAC, had amyotrophic lateral sclerosis, and communicated through a speech-generating device.
Modern use of AAC began in the 1950s with systems for those who had lost the ability to speak following surgical procedures. During the 1960s and 1970s, spurred by an increasing commitment in the West towards the inclusion of disabled individuals in mainstream society and emphasis on them developing the skills required for independence, the use of manual sign language and then graphic symbol communication grew greatly. It was not until the 1980s that AAC began to emerge as a field in its own right. Rapid progress in technology, including microcomputers and speech synthesis, paved the way for communication devices with speech output, and multiple options for access to communication for those with physical disabilities.
AAC systems are diverse: unaided communication uses no equipment and includes signing and body language, while aided approaches use external tools. Aided communication methods can range from paper and pencil to communication books or boards to speech generating devices (SGDs) or devices producing written output. The elements of communication used in AAC include gestures, photographs, pictures, line drawings, letters and words, which can be used alone or in combination. Body parts, pointers, adapted mice, or eye tracking can be used to select target symbols d |
https://en.wikipedia.org/wiki/Heterothermy | Heterothermy or heterothermia (from Greek ἕτερος heteros "other" and θέρμη thermē "heat") is a physiological term for animals that vary between self-regulating their body temperature, and allowing the surrounding environment to affect it. In other words, they exhibit characteristics of both poikilothermy and homeothermy.
Definition
Heterothermic animals are those that can switch between poikilothermic and homeothermic strategies. These changes in strategies typically occur on a daily basis or on an annual basis. More often than not, it is used as a way to dissociate the fluctuating metabolic rates seen in some small mammals and birds (e.g. bats and hummingbirds), from those of traditional cold blooded animals. In many bat species, body temperature and metabolic rate are elevated only during activity. When at rest, these animals reduce their metabolisms drastically, which results in their body temperature dropping to that of the surrounding environment. This makes them homeothermic when active, and poikilothermic when at rest. This phenomenon has been termed 'daily torpor' and was intensively studied in the Djungarian hamster. During the hibernation season, this animal shows strongly reduced metabolism each day during the rest phase while it reverts to endothermic metabolism during its active phase, leading to normal euthermic body temperatures (around 38 °C).
Larger mammals (e.g. ground squirrels) and bats show multi-day torpor bouts during hibernation (up to several weeks) in winter. During these multi-day torpor bouts, body temperature drops to ~1 °C above ambient temperature and metabolism may drop to about 1% of the normal endothermic metabolic rate. Even in these deep hibernators, the long periods of torpor is interrupted by bouts of endothermic metabolism, called arousals (typically lasting between 4–20 hours). These metabolic arousals cause body temperature to return to euthermic levels 35-37 °C. Most of the energy spent during hibernation is spent in arous |
https://en.wikipedia.org/wiki/P%C3%A9ter%20Frankl | Péter Frankl (born 26 March 1953 in Kaposvár, Somogy County, Hungary) is a mathematician, street performer, columnist and educator, active in Japan. Frankl studied mathematics at Eötvös Loránd University in Budapest and submitted his PhD thesis while still an undergraduate. He holds a PhD degree from the University Paris Diderot as well. He has lived in Japan since 1988, where he is a well-known personality and often appears in the media. He keeps travelling around Japan performing (juggling and giving public lectures on various topics). Frankl won a gold medal at the International Mathematical Olympiad in 1971. He has seven joint papers with Paul Erdős, and eleven joint papers with Ronald Graham. His research is in combinatorics, especially in extremal combinatorics. He is the author of the union-closed sets conjecture.
Personality
Both of his parents were survivors of concentration camps and taught him "The only things you own are in your heart and brain". So he became a mathematician. Frankl often lectures about racial discrimination.
Adolescence and abilities
He could multiply two digit numbers when he was four years old. Frankl speaks 12 languages (Hungarian, English, Russian, Swedish, French, Spanish, Polish, German, Japanese, Chinese, Thai, Korean) and lectured mathematics in many countries in these languages. He has travelled to more than 100 countries.
Activities
Frankl learnt juggling from Ronald Graham. He and Vojtěch Rödl solved a $1000 problem of Paul Erdős. Zsolt Baranyai helped Frankl to get a scholarship in France, where he became a CNRS research fellow.
For 1984 to 1990, Frankl and Akiyama worked hard organizing a Japanese mathematical Olympiad team, and as a consequence the Japanese team is now a regular participant of the International Mathematical Olympiad.
Since 1998, he is an external member of the Hungarian Academy of Sciences.
He authored more than thirty books in Japanese, and with László Babai, he wrote the manuscript of a book on " |
https://en.wikipedia.org/wiki/ResKnife | ResKnife is an open-source resource editor for the Apple Macintosh platform. It supports reading and writing resource maps to any fork (data, resource or otherwise) and has basic template-based and hexadecimal editing functionality. ResKnife can export resource data to flat files and supports third-party plug-in editors.
See also
ResEdit
External links
- (Source code and documentation)
ResKnife at CNet Downloads (PPC Binary Download)
ResKnife Lion Compile (OSX 10.7 (Lion) compatible version)
C++ software
Objective-C software
MacOS-only free software
Programming tools |
https://en.wikipedia.org/wiki/Master%20of%20Mathematics | A Master of Mathematics (or MMath) degree is a specific advanced integrated Master's degree for courses in the field of mathematics.
United Kingdom
In the United Kingdom, the MMath is the internationally recognized standard qualification after a four-year course in mathematics at a university.
The MMath programme was set up by most leading universities after the Neumann Report in 1992. It is classed as a level 7 qualification in the Frameworks of Higher Education Qualifications of UK Degree-Awarding Bodies. The UCAS course codes for the MMath degrees start at G100 upwards, most courses taking the codes G101 - G104.
Universities which offer MMath degrees include:
Aberystwyth University
University of Bath
University of Bristol (MSci)
Brunel University
University of Birmingham (MSci)
Cardiff University
University of Cambridge
City University London
University of Central Lancashire
University of Dundee
University of Durham
University of East Anglia
University of Edinburgh
University of Essex
University of Exeter
University of Glasgow
Heriot-Watt University
University of Hull
University of Keele
University of Kent
Lancaster University
University of Leeds
University of Leicester
University of Lincoln
University of Liverpool
Liverpool Hope University
Loughborough University
University of Manchester
Manchester Metropolitan University
Middlesex University (from 2014)
Newcastle University
Northumbria University
University of Nottingham
Nottingham Trent University
Open University (until 2007)
Oxford Brookes University
University of Oxford
University of Plymouth
University of Portsmouth
University of Reading
University of St Andrews
University of Sheffield
University of Southampton
University of Strathclyde
University of Surrey
University of Sussex
Swansea University
University of Warwick
University of York
Notes
Canada
In Canada, the MMath is a graduate degree offered by the University of Waterloo. The length of the MMath degree program is typically between one and two ye |
https://en.wikipedia.org/wiki/Subcloning | In molecular biology, subcloning is a technique used to move a particular DNA sequence from a parent vector to a destination vector.
Subcloning is not to be confused with molecular cloning, a related technique.
Procedure
Restriction enzymes are used to excise the gene of interest (the insert) from the parent. The insert is purified in order to isolate it from other DNA molecules. A common purification method is gel isolation. The number of copies of the gene is then amplified using polymerase chain reaction (PCR).
Simultaneously, the same restriction enzymes are used to digest (cut) the destination. The idea behind using the same restriction enzymes is to create complementary sticky ends, which will facilitate ligation later on. A phosphatase, commonly calf-intestinal alkaline phosphatase (CIAP), is also added to prevent self-ligation of the destination vector. The digested destination vector is isolated/purified.
The insert and the destination vector are then mixed together with DNA ligase. A typical molar ratio of insert genes to destination vectors is 3:1; by increasing the insert concentration, self-ligation is further decreased. After letting the reaction mixture sit for a set amount of time at a specific temperature (dependent upon the size of the strands being ligated; for more information see DNA ligase), the insert should become successfully incorporated into the destination plasmid.
Amplification of product plasmid
The plasmid is often transformed into a bacterium like E. coli. Ideally when the bacterium divides the plasmid should also be replicated. In the best case scenario, each bacterial cell should have several copies of the plasmid. After a good number of bacterial colonies have grown, they can be miniprepped to harvest the plasmid DNA.
Selection
In order to ensure growth of only transformed bacteria (which carry the desired plasmids to be harvested), a marker gene is used in the destination vector for selection. Typical marker g |
https://en.wikipedia.org/wiki/KJZZ-TV | KJZZ-TV (channel 14) is an independent television station in Salt Lake City, Utah, United States. It is owned by Sinclair Broadcast Group alongside CBS affiliate KUTV (channel 2) and MyNetworkTV affiliate KMYU (channel 12) in St. George. The stations share studios on South Main Street in downtown Salt Lake City, while KJZZ-TV's transmitter is located on Farnsworth Peak in the Oquirrh Mountains, southwest of Salt Lake City. KJZZ-TV is the ATSC 3.0 (Next Gen TV) host station for the Salt Lake City market; in turn, other stations broadcast its subchannels on its behalf.
The station went on the air as KXIV in 1989. It functioned as the second independent station for the Salt Lake City area. In 1993, Larry H. Miller, the then-owner of the Utah Jazz of the NBA, purchased the station and renamed it KJZZ-TV; it also became the new TV home of the basketball team for 16 seasons. During Miller's ownership, the station affiliated for five years with UPN, with the station's decision not to renew leading to accusations of racism against management; in the latter years, operations and programming were outsourced in turn to two other Salt Lake stations. Sinclair purchased KJZZ-TV from the Miller family in 2016. The station airs syndicated programming and local newscasts from KUTV.
In 2023, pre-season and regular season Jazz games will return to the station under a new rights agreement between current Jazz owner Ryan Smith and Sinclair.
History
"Real TV"
An original construction permit was granted by the Federal Communications Commission (FCC) on December 6, 1984, to American Television of Utah, Inc., a subsidiary of Salt Lake City-based American Stores Company, for a full-power television station on UHF channel 14 to serve Salt Lake City and the surrounding area. American Stores had filed for the construction permit in 1979; its original intention for the station was to broadcast subscription television programming, as it would eventually do on a microwave distribution system k |
https://en.wikipedia.org/wiki/Cycloheximide | Cycloheximide is a naturally occurring fungicide produced by the bacterium Streptomyces griseus. Cycloheximide exerts its effects by interfering with the translocation step in protein synthesis (movement of two tRNA molecules and mRNA in relation to the ribosome), thus blocking eukaryotic translational elongation. Cycloheximide is widely used in biomedical research to inhibit protein synthesis in eukaryotic cells studied in vitro (i.e. outside of organisms). It is inexpensive and works rapidly. Its effects are rapidly reversed by simply removing it from the culture medium.
Due to significant toxic side effects, including DNA damage, teratogenesis, and other reproductive effects (including birth defects and toxicity to sperm), cycloheximide is generally used only in in vitro research applications, and is not suitable for human use as a therapeutic compound. Although it has been used as a fungicide in agricultural applications, this application is now decreasing as the health risks have become better understood.
Because cycloheximide rapidly breaks down in a basic environment, decontamination of work surfaces and containers can be achieved by washing with a non-harmful alkali solution such as soapy water or aqueous sodium bicarbonate.
It is classified as an extremely hazardous substance in the United States as defined in Section 302 of the U.S. Emergency Planning and Community Right-to-Know Act (42 U.S.C. 11002), and is subject to strict reporting requirements by facilities which produce, store, or use it in significant quantities.
Discovery
Cycloheximide was reported in 1946 by Alma Joslyn Whiffen-Barksdale at the Upjohn Company.
Experimental applications
Cycloheximide can be used as an experimental tool in molecular biology to determine the half-life of a protein. Treating cells with cycloheximide in a time-course experiment followed by western blotting of the cell lysates for the protein of interest can show differences in protein half-life. Cycloheximide |
https://en.wikipedia.org/wiki/Requirements%20management | Requirements management is the process of documenting, analyzing, tracing, prioritizing and agreeing on requirements and then controlling change and communicating to relevant stakeholders. It is a continuous process throughout a project. A requirement is a capability to which a project outcome (product or service) should conform.
Overview
The purpose of requirements management is to ensure that an organization documents, verifies, and meets the needs and expectations of its customers and internal or external stakeholders. Requirements management begins with the analysis and elicitation of the objectives and constraints of the organization. Requirements management further includes supporting planning for requirements, integrating requirements and the organization for working with them (attributes for requirements), as well as relationships with other information delivering against requirements, and changes for these.
The traceability thus established is used in managing requirements to report back fulfilment of company and stakeholder interests in terms of compliance, completeness, coverage, and consistency. Traceabilities also support change management as part of requirements management in understanding the impacts of changes through requirements or other related elements (e.g., functional impacts through relations to functional architecture), and facilitating introducing these changes.
Requirements management involves communication between the project team members and stakeholders, and adjustment to requirements changes throughout the course of the project. To prevent one class of requirements from overriding another, constant communication among members of the development team is critical. For example, in software development for internal applications, the business has such strong needs that it may ignore user requirements, or believe that in creating use cases, the user requirements are being taken care of.
Traceability
Requirements traceability is concerne |
https://en.wikipedia.org/wiki/Virtual%20routing%20and%20forwarding | In IP-based computer networks, virtual routing and forwarding (VRF) is a technology that allows multiple instances of a routing table to co-exist within the same router at the same time. One or more logical or physical interfaces may have a VRF and these VRFs do not share routes. Therefore, the packets are only forwarded between interfaces on the same VRF. VRFs are the TCP/IP layer 3 equivalent of a VLAN. Because the routing instances are independent, the same or overlapping IP addresses can be used without conflicting with each other. Network functionality is improved because network paths can be segmented without requiring multiple routers.
Simple implementation
The simplest form of VRF implementation is VRF-Lite. In this implementation, each router within the network participates in the virtual routing environment in a peer-based fashion. While simple to deploy and appropriate for small to medium enterprises and shared data centers, VRF Lite does not scale to the size required by global enterprises or large carriers, as there is the need to implement each VRF instance on every router, including intermediate routers. VRFs were initially introduced in combination with Multiprotocol Label Switching (MPLS), but VRF proved to be so useful that it eventually evolved to live independent of MPLS. This is the historical explanation of the term VRF Lite: usage of VRFs without MPLS.
Full implementation
The scaling limitations of VRF Lite are resolved by the implementation of IP VPNs. In this implementation, a core backbone network is responsible for the transmission of data across the wide area between VRF instances at each edge location. IP VPNs have been traditionally deployed by carriers to provide a shared wide-area backbone network for multiple customers. They are also appropriate in the large enterprise, multi-tenant and shared data center environments.
In a typical deployment, customer edge (CE) routers handle local routing in a traditional fashion and dissemi |
https://en.wikipedia.org/wiki/Hypsochromic%20shift | In spectroscopy, hypsochromic shift () is a change of spectral band position in the absorption, reflectance, transmittance, or emission spectrum of a molecule to a shorter wavelength (higher frequency). Because the blue color in the visible spectrum has a shorter wavelength than most other colors, this effect is also commonly called a blue shift. It should not be confused with a bathochromic shift, which is the opposite process – the molecule's spectra are changed to a longer wavelength (lower frequency).
Hypsochromic shifts can occur because of a change in environmental conditions: for example, a change in solvent polarity will result in solvatochromism. A series of structurally related molecules in a substitution series can also show a hypsochromic shift. Hypsochromic shift is a phenomenon seen in molecular spectra, not atomic spectra - it is thus more common to speak of the movement of the peaks in the spectrum rather than lines.
where is the wavelength of the spectral peak of interest and
For example, β-acylpyrrole will show a hypsochromic shift of 30-40 nm in comparison with α-acylpyrroles.
See also
Bathochromic shift, a change in band position to a longer wavelength (lower frequency).
Spectroscopy
Chromism |
https://en.wikipedia.org/wiki/Bathochromic%20shift | In spectroscopy, bathochromic shift (; hence less common alternate spelling "bathychromic") is a change of spectral band position in the absorption, reflectance, transmittance, or emission spectrum of a molecule to a longer wavelength (lower frequency). Because the red color in the visible spectrum has a longer wavelength than most other colors, the effect is also commonly called a red shift.
Hypsochromic shift is a change to shorter wavelength (higher frequency).
Conditions
It can occur because of a change in environmental conditions: for example, a change in solvent polarity will result in solvatochromism.
A series of structurally-related molecules in a substitution series can also show a bathochromic shift. Bathochromic shift is a phenomenon seen in molecular spectra, not atomic spectra; it is thus more common to speak of the movement of the peaks in the spectrum rather than lines.
where is the wavelength of the spectral peak of interest and
Detection
Bathochromic shift is typically demonstrated using a spectrophotometer, colorimeter, or spectroradiometer.
See also
Chromism
Solvatochromism
Spectroscopy |
https://en.wikipedia.org/wiki/Hank%20%28unit%20of%20measure%29 | In the textile industry, a hank is a coiled or wrapped unit of yarn or twine, as opposed to other materials like thread or rope, as well as other forms such as ball, cone, bobbin (cylinder-like structure) spool, etc. This is often the best form for use with hand looms, compared to the cone form needed for power looms. Hanks come in varying lengths depending on the type of material and the manufacturer. For instance, a hank of linen is often , and a hank of cotton or silk is .
While hanks may differ by manufacturer and by product, a skein is usually considered 1/6th of a hank (either by weight or by length). One source identifies a skein of stranded cotton as being , of tapestry wool as being , and crewel wool as being .
In yarns for handcrafts such as knitting or crochet, hanks are not a fixed length but are sold in units by weight, most commonly 50 grams. Depending on the thickness of the strand as well as the inherent density of the material, hanks can range widely in yardage per 50 gram unit; for example, 440 yards for a lace weight mohair, to 60 yards for a chunky weight cotton. Special treatments to the materials that add cost, such as mercerisation or labor-intensive hand-painting of colors, can influence a manufacturer's desired length per unit as well. Knitters and crocheters rewind the hanks into balls or centre-pull skeins prior to use, in order to prevent the yarn from becoming tangled.
In the meat industry, a sheep, lamb or hog sausage casing is sold by the hank. This unit of measure equals . |
https://en.wikipedia.org/wiki/Data%20General%20Eclipse | The Data General Eclipse line of computers by Data General were 16-bit minicomputers released in early 1974 and sold until 1988. The Eclipse was based on many of the same concepts as the Data General Nova, but included support for virtual memory and multitasking more suitable to the small office than the lab. It was also packaged differently for this reason, in a floor-standing case the size of a small refrigerator. The Eclipse series was supplanted by the 32-bit Data General Eclipse MV/8000 in 1980.
Description
The Data General Nova was intended to outperform the PDP-8 while being less expensive, and in a similar fashion, the Eclipse was meant to compete against the larger PDP-11 computers. It kept the simple register architecture of the Nova but added a stack pointer which the Nova lacked. The stack pointer was added back to the later Nova 3 machines in 1975 and also used on the later 32-bit Data General Eclipse MV/8000. The AOS operating system was quite sophisticated, advanced compared to the PDP-11 offerings, with access control lists (ACLs) for file protection.
Production problems with the Eclipse led to a rash of lawsuits in the late 1970s, after new versions of the machine were pre-ordered by many DG customers and then never arrived. After over a year of waiting, some decided to sue the company, while others simply cancelled their orders and went elsewhere. It appeared that the Eclipse was originally intended to replace the Nova outright, also evidenced by the fact that the Nova 3 series released at the same time was phased out the next year. However, strong continuing demand resulted in the Nova 4, perhaps as a result of the continuing problems with the Eclipse.
Facts
The original Cray-1 system used an Eclipse to act as a Maintenance and Control Unit (MCU). It was configured with two Ampex CRTs, an 80 MB Ampex disk drive, a thermal printer, and a 9-track tape drive. Its primary purpose was to download an image of either the Cray Operating System or cu |
https://en.wikipedia.org/wiki/LTP%20induction | The induction of NMDA receptor-dependent long-term potentiation (LTP) in chemical synapses in the brain occurs via a fairly straightforward mechanism. A substantial and rapid rise in calcium ion concentration inside the postsynaptic cell (or more specifically, within the dendritic spine) is most possibly all that is required to induce LTP. But the mechanism of calcium delivery to the postsynaptic cell in inducing LTP is more complicated.
The role of the AMPA receptor
The AMPA receptor (AMPAR) is the engine that drives excitatory postsynaptic potentials (EPSPs). While some forms of the AMPAR can conduct calcium, most AMPARs found in the neocortex do not. The AMPAR, upon binding two glutamate molecules, undergoes a conformational change that resembles the opening of a clam shell. This conformational change opens an ion channel within the AMPAR protein structure that allows sodium ions to flow into the cell and potassium ions to flow out (i.e. it is a mixed cation-conducting channel). The Na+ and K+ permeabilities of the AMPAR channel are roughly equal, so when this channel is open the resulting change in membrane potential tends towards zero (a bit more than halfway between the equilibrium potentials EK and ENa). This balance point is reached at around 0 mV (i.e. the reversal potential of the EPSP current is roughly 0 mV). However, the postsynaptic membrane potential will not change by more than a few millivolts from resting potential with a single presynaptic release of glutamate, because not many AMPAR channels open. The lifetime of the glutamate in the synaptic cleft is too short to allow more than a brief opening of the AMPAR channel, thus causing only a small depolarization. The open AMPAR channel is often considered to be non-calcium permeable, but this is only an approximation as AMPARs with certain subunit compositions will allow calcium through, albeit at different levels and frequency to NMDARs.
Historically, the most widely used experimental means of ind |
https://en.wikipedia.org/wiki/Phase%20plane | In applied mathematics, in particular the context of nonlinear system analysis, a phase plane is a visual display of certain characteristics of certain kinds of differential equations; a coordinate plane with axes being the values of the two state variables, say (x, y), or (q, p) etc. (any pair of variables). It is a two-dimensional case of the general n-dimensional phase space.
The phase plane method refers to graphically determining the existence of limit cycles in the solutions of the differential equation.
The solutions to the differential equation are a family of functions. Graphically, this can be plotted in the phase plane like a two-dimensional vector field. Vectors representing the derivatives of the points with respect to a parameter (say time t), that is (dx/dt, dy/dt), at representative points are drawn. With enough of these arrows in place the system behaviour over the regions of plane in analysis can be visualized and limit cycles can be easily identified.
The entire field is the phase portrait, a particular path taken along a flow line (i.e. a path always tangent to the vectors) is a phase path. The flows in the vector field indicate the time-evolution of the system the differential equation describes.
In this way, phase planes are useful in visualizing the behaviour of physical systems; in particular, of oscillatory systems such as predator-prey models (see Lotka–Volterra equations). In these models the phase paths can "spiral in" towards zero, "spiral out" towards infinity, or reach neutrally stable situations called centres where the path traced out can be either circular, elliptical, or ovoid, or some variant thereof. This is useful in determining if the dynamics are stable or not.
Other examples of oscillatory systems are certain chemical reactions with multiple steps, some of which involve dynamic equilibria rather than reactions that go to completion. In such cases one can model the rise and fall of reactant and product concentration (or |
https://en.wikipedia.org/wiki/New%20York%20State%20Mathematics%20League | The New York State Mathematics League (NYSML) competition was originally held in 1973 and has been held annually in a different location each year since. It was founded by Alfred Kalfus. The American Regions Math League competition is based on the format of the NYSML competition. The current iteration contains four sections: the team round, power question, individual round, and a relay. These are done in competition in that order. All of these rounds are done without a calculator. Each individual team can have up to fifteen students, which is the usual amount per team. Like ARML, it has banned the user of calculators beginning in the 2009 contest.
Competition Format
There are four sections in the current iteration, done so in a day:
A team round where a team collaborates to solve ten questions in twenty minutes. There is a possible 50 points to earn here.
A power question where a team has an hour to complete ten questions which requires proofs and explanations for a possible 50 points.
An individual round, where each team member has five groups of two questions to answer, with each group of questions taking ten minutes, totaling fifty minutes for ten questions for a possible 150 points.
A relay round, where teams are broken up into five groups of three if possible. There are three problems, with each member giving their answer back to the next member until it hits the third member, who can rise at 3 minutes for a correct answer to get 5 points, or rise at the time limit of 6 minutes for a correct answer to get 3 points. The maximum is fifty points.
This brings the total maximum for points to 300.
Past NYSML Competition Sites
Past NYSML Winners
Past NYSML Individual Winners (a.k.a. the Curt Boddie Award)
External links
NYSML Homepage
https://artofproblemsolving.com/wiki/index.php/New_York_State_Math_League
https://web.archive.org/web/20230000000000*/NYSML.com
Mathematics competitions |
https://en.wikipedia.org/wiki/Flight%20zone | The flight zone of an animal is the area surrounding an animal that if encroached upon by a potential predator or threat, including humans, will cause alarm and escape behavior. The flight zone is determined by the animal's flight distance, sometimes called flight initiation distance (FID) which extends horizontally from the animal and sometimes vertically. It may also be termed escape distance, alert distance, flush distance, and escape flight distance.
Swiss zoologist Heini Hediger distinguished between flight distance (run boundary), critical distance (attack boundary), personal distance (distance separating members of non-contact species, as a pair of swans), and social distance (intraspecies communication distance).
Flight distance can be used as a measure of the willingness of an animal to take risks. Escape theory predicts that the probability of fleeing and flight distance increase as predation risk increases and decrease as escape cost increases. Flight initiation distance is one measure of animals' fear responses to humans.
In a study comparing 56 bird species with long flight distances, it was found these had declining populations in Europe. This indicates that standardized measures of flight distance can provide reliable information about the population consequences of risk-taking behaviour by individuals and the susceptibility of different species to increased levels of disturbance by humans. A further study analyzing 75 flight initiation distance studies of 212 species found that larger species are more tolerant of humans.
When the flight zone of a group of bulls was invaded by a mechanical trolley, the bulls moved away and maintained a constant distance between themselves and the trolley. This indicates animals sometimes maintain a flight zone around inanimate objects.
The flight initiation distance is being used as a tool in wildlife management. By studying flight zones, wildlife managers are able to reduce the impact of humans by creating buff |
https://en.wikipedia.org/wiki/Codebase | In software development, a codebase (or code base) is a collection of source code used to build a particular software system, application, or software component. Typically, a codebase includes only human-written source code system files; thus, a codebase usually does not include source code files generated by tools (generated files) or binary library files (object files), as they can be built from the human-written source code. However, it generally does include configuration and property files, as they are the data necessary for the build.
A codebase is typically stored in a source control repository in a version control system. A source code repository is a place where large amounts of source code are kept, either publicly or privately. Source code repositories are used most basically for backups and versioning, and on multi-developer projects to handle various source code versions and to provide aid in resolving conflicts that arise from developers submitting overlapping modifications.
Subversion, Git and Mercurial are examples of popular tools used to handle this workflow, which are common in open source projects.
For smaller projects, its code may be kept as a non-managed set of files (even the Linux kernel was maintained as a set of files for many years).
Distinct and monolithic codebases
Multiple projects can have separate, distinct codebases, or can have a single, shared or . This is particularly the case for related projects, such as those developed within the same company. In more detail, a monolithic codebase typically entails a single repository (all the code in one place), and often a common build system or common libraries. Whether the codebase is shared or split does not depend on the system architecture and actual build results; thus, a monolithic codebase, which is related to the actual development, does not entail a monolithic system, which is related to software architecture or a single monolithic binary. As a result, a monolithic codebase m |
https://en.wikipedia.org/wiki/Rayleigh%E2%80%93Ritz%20method | The Rayleigh–Ritz method is a direct numerical method of approximating eigenvalues, originated in the context of solving physical boundary value problems and named after Lord Rayleigh and Walther Ritz.
It is used in all applications that involve approximating eigenvalues and eigenvectors, often under different names. In quantum mechanics, where a system of particles is described using a Hamiltonian, the Ritz method uses trial wave functions to approximate the ground state eigenfunction with the lowest energy. In the finite element method context, mathematically the same algorithm is commonly called the Ritz-Galerkin method. The Rayleigh–Ritz method or Ritz method terminology is typical in mechanical and structural engineering to approximate the eigenmodes and resonant frequencies of a structure.
Naming and attribution
The name Rayleigh–Ritz is being debated vs. the Ritz method after Walther Ritz, since the numerical procedure has been published by Walther Ritz in 1908-1909. According to A. W. Leissa, Lord Rayleigh wrote a paper congratulating Ritz on his work in 1911, but stating that he himself had used Ritz's method in many places in his book and in another publication. This statement, although later disputed, and the fact that the method in the trivial case of a single vector results in the Rayleigh quotient make the arguable misnomer persist. According to S. Ilanko, citing Richard Courant, both Lord Rayleigh and Walther Ritz independently conceived the idea of utilizing the equivalence between boundary value problems of partial differential equations on the one hand and problems of the calculus of variations on the other hand for numerical calculation of the solutions, by substituting for the variational problems simpler approximating extremum problems in which a finite number of parameters need to be determined; see the article Ritz method for details. Ironically for the debate, the modern justification of the algorithm drops the calculus of variations in f |
https://en.wikipedia.org/wiki/IBM%20OS/6 | OS/6 (Office System/6 or System 6) is a standalone word processor made by IBM's Office Products Division (OPD), introduced in January, 1977. OS/6 was superseded by the IBM Displaywriter in 1980.
Overview
The intended configuration is a console with a keyboard, a small, approximately 9" CRT character display and either a daisy wheel or IBM 46/40 ink jet printer, renamed the IBM 6640. Documents are stored on 8-inch floppy diskettes and magnetic stripe card, which is exchangeable with IBM's previous generation of Mag Card Selectrics. The display is pre-WYSIWYG, so special symbols embedded in the displayed text mark formatting information the user can edit. Navigation is pre-mouse and uses arrow keys.
In an age before PCs, when typing was still done primarily only by clerical staff, the OS/6 was intended for what IBM envisioned as centralized word processing centers at large organizations. It includes features like mail merge, very high print quality with many formatting options and printers that can feed envelopes or sheets from two drawers, usually referred to within IBM as letterhead and second sheet. Data from Office System/6 can be migrated to IBM 5110 and 5120 with third-party applications.
Internally, the OS/6 uses an IBM proprietary 16-bit single-chip microprocessor called the OPD Mini Processor. This processor is a single-chip FET microprocessor designed by Richard Vrba. It had a 16-bit little-endian instruction set built on an 8-bit internal architecture. Sixteen general-purpose registers, implemented as a 32-byte window in memory that operated as a stack, could be used as instruction operands or for indirect references to operands in memory.
History
Development on OS/6 was done in the "Rio" project at IBM's Austin, Texas facilities. A proposed video display upgrade for the Selectric Mag Card II had been rejected. Instead, it was announced in 1977 that Mag Card II users would be able to add a communications option to link up with System 6.
In a 1977 pres |
https://en.wikipedia.org/wiki/English%20draughts | English draughts (British English) or checkers (American English), also called straight checkers or simply draughts, is a form of the strategy board game checkers (or draughts). It is played on an 8×8 checkerboard with 12 pieces per side. The pieces move and capture diagonally forward, until they reach the opposite end of the board, when they are crowned and can thereafter move and capture both backward and forward.
As in all forms of draughts, English draughts is played by two opponents, alternating turns on opposite sides of the board. The pieces are traditionally black, red, or white. Enemy pieces are captured by jumping over them.
The 8×8 variant of draughts was weakly solved in 2007 by a team of Canadian computer scientists led by Jonathan Schaeffer. From the standard starting position, both players can guarantee a draw with perfect play.
Pieces
Though pieces are traditionally made of wood, now many are made of plastic, though other materials may be used. Pieces are typically flat and cylindrical. They are invariably split into one darker and one lighter colour. Traditionally and in tournaments, these colours are red and white, but black and red are common in the United States, as well as dark- and light-stained wooden pieces. The darker-coloured side is commonly referred to as "Black"; the lighter-coloured side, "White".
There are two classes of pieces: men and kings. Men are single pieces. Kings consist of two men of the same colour, stacked one on top of the other. The bottom piece is referred to as crowned. Some sets have pieces with a crown molded, engraved or painted on one side, allowing the player to simply turn the piece over or to place the crown-side up on the crowned man, further differentiating kings from men. Pieces are often manufactured with indentations to aid stacking.
Rules
Starting position
Each player starts with 12 men on the dark squares of the three rows closest to that player's side (see diagram). The row closest to each play |
https://en.wikipedia.org/wiki/FrameNet | FrameNet is a group of online lexical databases based upon the theory of meaning known as Frame semantics, developed by linguist Charles J. Fillmore. The project's fundamental notion is simple: most words' meanings may be best understood in terms of a semantic frame, which is a description of a certain kind of event, connection, or item and its actors.
As an illustration, the act of cooking usually requires the following: a cook, the food being cooked, a container to hold the food while it is being cooked, and a heating instrument. Within FrameNet, this act is represented by a frame named , and its components (, , , and ), are referred to as frame elements (FEs). The frame also lists a number of words that represent it, known as lexical units (LUs), like fry, bake, boil, and broil.
Other frames are simpler. For example, only has an agent or cause, a theme—something that is placed—and the location where it is placed. Some frames are more complex, like , which contains more FEs (offender, injury, injured party, avenger, and punishment). As in the examples of and below, FrameNet's role is to define the frames and annotate sentences to demonstrate how the FEs fit syntactically around the word that elicits the frame.
Concepts
Frames
A frame is a schematic representation of a situation involving various participants, props, and other conceptual roles. Examples of frame names are and . A frame in FrameNet contains a textual description of what it represents (a frame definition), associated frame elements, lexical units, example sentences, and frame-to-frame relations.
Frame elements
Frame elements (FE) provide additional information to the semantic structure of a sentence. Each frame has a number of core and non-core FEs which can be thought of as semantic roles. Core FEs are essential to the meaning of the frame while non-core FEs are generally descriptive (such as time, place, manner, etc.) For example:
The only core FE of the frame is called ; non-core FEs |
https://en.wikipedia.org/wiki/Steady%20state%20%28chemistry%29 | In chemistry, a steady state is a situation in which all state variables are constant in spite of ongoing processes that strive to change them. For an entire system to be at steady state, i.e. for all state variables of a system to be constant, there must be a flow through the system (compare mass balance). A simple example of such a system is the case of a bathtub with the tap running but with the drain unplugged: after a certain time, the water flows in and out at the same rate, so the water level (the state variable Volume) stabilizes and the system is in a steady state.
The steady state concept is different from chemical equilibrium. Although both may create a situation where a concentration does not change, in a system at chemical equilibrium, the net reaction rate is zero (products transform into reactants at the same rate as reactants transform into products), while no such limitation exists in the steady state concept. Indeed, there does not have to be a reaction at all for a steady state to develop.
The term steady state is also used to describe a situation where some, but not all, of the state variables of a system are constant. For such a steady state to develop, the system does not have to be a flow system. Therefore, such a steady state can develop in a closed system where a series of chemical reactions take place. Literature in chemical kinetics usually refers to this case, calling it steady state approximation.
In simple systems the steady state is approached by state variables gradually decreasing or increasing until they reach their steady state value. In more complex systems state variables might fluctuate around the theoretical steady state either forever (a limit cycle) or gradually coming closer and closer. It theoretically takes an infinite time to reach steady state, just as it takes an infinite time to reach chemical equilibrium.
Both concepts are, however, frequently used approximations because of the substantial mathematical simplifica |
https://en.wikipedia.org/wiki/Snappy%20%28compression%29 | Snappy (previously known as Zippy) is a fast data compression and decompression library written in C++ by Google based on ideas from LZ77 and open-sourced in 2011. It does not aim for maximum compression, or compatibility with any other compression library; instead, it aims for very high speeds and reasonable compression. Compression speed is 250 MB/s and decompression speed is 500 MB/s using a single core of a circa 2011 "Westmere" 2.26 GHz Core i7 processor running in 64-bit mode. The compression ratio is 20–100% lower than gzip.
Snappy is widely used in Google projects like Bigtable, MapReduce and in compressing data for Google's internal RPC systems. It can be used in open-source projects like MariaDB ColumnStore, Cassandra, Couchbase, Hadoop, LevelDB, MongoDB, RocksDB, Lucene, Spark, and InfluxDB. Decompression is tested to detect any errors in the compressed stream. Snappy does not use inline assembler (except some optimizations) and is portable.
Stream format
Snappy encoding is not bit-oriented, but byte-oriented (only whole bytes are emitted or consumed from a stream). The format uses no entropy encoder, like Huffman coding or arithmetic coding.
The first bytes of the stream are the length of uncompressed data, stored as a little-endian varint, which allows for use of a variable-length code. The lower seven bits of each byte are used for data and the high bit is a flag to indicate the end of the length field.
The remaining bytes in the stream are encoded using one of four element types. The element type is encoded in the lower two bits of the first byte (tag byte) of the element:
00 – Literal – uncompressed data; upper 6 bits are used to store length (len-1) of data. Lengths larger than 60 are stored in a 1-4 byte integer indicated by a 6 bit length of 60 (1 byte) to 63 (4 bytes).
01 – Copy with length stored as 3 bits and offset stored as 11 bits; one byte after tag byte is used for part of offset;
10 – Copy with length stored as 6 bits of tag byte |
https://en.wikipedia.org/wiki/List%20of%20vaccine%20topics | This is a list of vaccine-related topics.
A vaccine is a biological preparation that improves immunity to a particular disease. A vaccine typically contains an agent that resembles a disease-causing microorganism, and is often made from weakened or killed forms of the microbe or its toxins. The agent stimulates the body's immune system to recognize the agent as foreign, destroy it, and "remember" it, so that the immune system can more easily recognize and destroy any of these microorganisms that it later encounters.
Human vaccines
Viral diseases
Bacterial diseases
Vaccines under research
Viral diseases
Adenovirus vaccine
COVID-19 vaccine (Part of today's pandemic since 2019)
Coxsackie B virus vaccine
Cytomegalovirus vaccine
Chikungunya vaccine
Eastern Equine encephalitis virus vaccine for humans
Enterovirus 71 vaccine
Epstein–Barr vaccine
H5N1 vaccine
Hepatitis C vaccine
HIV vaccine
HTLV-1 T-lymphotropic leukemia vaccine for humans
Marburg virus disease vaccine
MERS vaccine
Nipah virus vaccine
Norovirus vaccine
Respiratory syncytial virus vaccine
SARS vaccine
West Nile virus vaccine for humans
Zika fever vaccine
Bacterial diseases
Caries vaccine
Gonorrhea vaccine
Ehrlichiosis vaccine
Helicobacter pylori vaccine
Leprosy vaccine
Lyme disease vaccine
Staphylococcus aureus vaccine
Streptococcus pyogenes vaccine
Syphilis vaccine
Tularemia vaccine
Yersinia pestis vaccine
Parasitic diseases
Chagas disease vaccine
Hookworm vaccine
Leishmaniasis vaccine
Malaria vaccine
Onchocerciasis river blindness vaccine for humans
Schistosomiasis vaccine
Trypanosomiasis vaccine
Non-infectious diseases
Alzheimer's disease amyloid protein vaccine
Breast cancer vaccine
Ovarian cancer vaccine
Prostate cancer vaccine
Talimogene laherparepvec (T-VEC), - Herpes virus engineered to produce immune-boosting molecule
Other
Heroin vaccine
Vaccine components
Adjuvant
List of vaccine ingredients
Preservative
Thiomersal
Vaccine types
Vaccin |
https://en.wikipedia.org/wiki/Wool%20alien | The term wool alien is used for any plant species whose occurrence at a particular site is due to transportation there as a result of the making of wool products. The most common source of wool aliens is when a plant, seed, or bur attaches to the wool of a sheep or other wool-producing animal prior to shearing. After the animal is shorn and the raw wool is transported to a refinery mill, the impurities are discarded along with the attached seed, which then successfully germinates. Wool aliens are typically found on waste ground near woollen mills. Wool cleanings have also been used as soil conditioners in orchards and fields, which may also contain wool alien species.
Stork's-bills (Erodium) are particularly prone to appearing as wool aliens in Britain. |
https://en.wikipedia.org/wiki/High-dynamic-range%20rendering | High-dynamic-range rendering (HDRR or HDR rendering), also known as high-dynamic-range lighting, is the rendering of computer graphics scenes by using lighting calculations done in high dynamic range (HDR). This allows preservation of details that may be lost due to limiting contrast ratios. Video games and computer-generated movies and special effects benefit from this as it creates more realistic scenes than with more simplistic lighting models.
Graphics processor company Nvidia summarizes the motivation for HDR in three points: bright things can be really bright, dark things can be really dark, and details can be seen in both.
History
The use of high-dynamic-range imaging (HDRI) in computer graphics was introduced by Greg Ward in 1985 with his open-source Radiance rendering and lighting simulation software which created the first file format to retain a high-dynamic-range image. HDRI languished for more than a decade, held back by limited computing power, storage, and capture methods. Not until recently has the technology to put HDRI into practical use been developed.
In 1990, Nakame, et al., presented a lighting model for driving simulators that highlighted the need for high-dynamic-range processing in realistic simulations.
In 1995, Greg Spencer presented Physically-based glare effects for digital images at SIGGRAPH, providing a quantitative model for flare and blooming in the human eye.
In 1997, Paul Debevec presented Recovering high dynamic range radiance maps from photographs at SIGGRAPH, and the following year presented Rendering synthetic objects into real scenes. These two papers laid the framework for creating HDR light probes of a location, and then using this probe to light a rendered scene.
HDRI and HDRL (high-dynamic-range image-based lighting) have, ever since, been used in many situations in 3D scenes in which inserting a 3D object into a real environment requires the light probe data to provide realistic lighting solutions.
In gaming appli |
https://en.wikipedia.org/wiki/Shuttle%20Inc. | Shuttle Inc. () (TAIEX:2405) is a Taiwan-based manufacturer of motherboards, barebone computers, complete PC systems and monitors. Throughout the last 10 years, Shuttle has been one of the world's top 10 motherboard manufacturers, and gained fame in 2001 with the introduction of the Shuttle SV24, one of the world's first commercially successful small form factor computers. Shuttle XPC small form factor computers tend to be popular among PC enthusiasts and hobbyists, although in 2004 Shuttle started a campaign to become a brand name recognized by mainstream PC consumers.
Shuttle XPC desktop systems are based on same PC platform as the XPC barebone (case+motherboard+power supply) Shuttle manufactures. More recently, the differentiation between Shuttle barebones and Shuttle systems has become greater, with the launch of system exclusive models such as the M-series and X-series.
History
1983 – Shuttle was initially incorporated in Taiwan by David and Simon Yu under the name Holco (浩鑫), and commences trading of computer motherboards.
1984 – Holco begins manufacturing motherboards in its Taoyuan County (now Taoyuan City), Taiwan factory.
1988 – Holco establishes its first overseas branch office, in Fremont, California.
1990 – Holco subsidiary Shuttle Computer Handel is established in Elmshorn, Germany to serve European market.
1994 – Introduces Shuttle RiscPC 4475, a desktop based on DEC Alpha 64-bit microprocessor and Microsoft Windows NT for Alpha.
1995 – Shuttle reaches #5 motherboard manufacturer worldwide in terms of volume.
1997 – Holco officially changes its name to Shuttle Inc.
2000 – Goes public on TAIEX stock market under symbol 2405.
2001 – Introduces Shuttle SV24, a compact all-aluminum computer using desktop components.
2002 – SV24 evolves into XPC line of small form factor barebones computers, including models for Intel's Pentium 4 and AMD's Athlon.
2003 – 8 different XPCs introduced, including models featuring chipsets from Nvidia, Intel, SiS, |
https://en.wikipedia.org/wiki/Meyer%27s%20theorem | In number theory, Meyer's theorem on quadratic forms states that an indefinite quadratic form Q in five or more variables over the field of rational numbers nontrivially represents zero. In other words, if the equation:
Q(x) = 0
has a non-zero real solution, then it has a non-zero rational solution (the converse is obvious). By clearing the denominators, an integral solution x may also be found.
Meyer's theorem is usually deduced from the Hasse–Minkowski theorem (which was proved later) and the following statement:
A rational quadratic form in five or more variables represents zero over the field Qp of the p-adic numbers for all p.
Meyer's theorem is best possible with respect to the number of variables: there are indefinite rational quadratic forms Q in four variables which do not represent zero. One family of examples is given by:
Q(x1,x2,x3,x4) = x12 + x22 − p(x32 + x42),
where p is a prime number that is congruent to 3 modulo 4. This can be proved by the method of infinite descent using the fact that if the sum of two perfect squares is divisible by such a p then each summand is divisible by p.
See also
Lattice (group)
Oppenheim conjecture |
https://en.wikipedia.org/wiki/Bait%20fish | Bait fish (or baitfish) are small-sized fish caught and used by anglers as bait to attract larger predatory fish, particularly game fish. Baitfish species are typically those that are common and breed rapidly, making them easy to catch and in abundant supply.
Overview
Examples of marine bait fish are anchovies, gudgeon, halfbeaks such as ballyhoo, and scad. Some larger fish such as menhaden, flying fish or ladyfish may be considered bait fish in some circles, depending on the size of the gamefish being pursued.
Freshwater bait fish include minnows from the carp family (Cyprinidae), sucker family (Catostomidae), topminnows from the killifish suborder (Cyprinodontoidei), shad family (Clupeidae), sculpin of the order Scorpaeniformes and sunfish family (Centrarchidae), excluding black basses and crappies.
Bait fish can be contrasted with forage fish. Bait fish is a term used particularly by recreational fishermen, although commercial fisherman also catch fish to bait longlines and traps. Forage fish is a fisheries term, and is used in that context. Forage fish are small fish that are preyed on in the wild by larger predators for food. The predators can be other larger fish, seabirds and marine mammals. Bait fish, by contrast, are fish that are caught by humans to use as bait for other fish. The terms also overlap in the sense that most bait fish are also forage fish, and most forage fish can also be used as bait fish.
Baitfish can be attracted either via scent, or by using light which actually works by attracting zooplankton, a primary food source for many baitfish, which are then drawn to the light.
Bait fish can also be contrasted with feeder fish. Feeder fish is a term used particularly in the context of fish aquariums. It refers essentially the same concept, small fish that are eaten by larger fish, but adapted for use in a different context.
Bait fish are consumed by larger, aquatic predators. Swimming in ocean water with bait fish can be dangerous, as these |
https://en.wikipedia.org/wiki/Mathematical%20Olympiad%20Program | The Mathematical Olympiad Program (abbreviated MOP; formerly called the Mathematical Olympiad Summer Program, abbreviated MOSP) is an intensive summer program held at Carnegie Mellon University. The main purpose of MOP, held since 1974, is to select and train the six members of the U.S. team for the International Mathematical Olympiad (IMO).
Selection Process
Students qualify for the program by taking the United States of America Mathematical Olympiad (USAMO). The top twelve American scorers from all grades form the "black" group. The approximately eighteen next highest American scorers among students from 11th grade and under form the "blue" group.
In 2004, the program was expanded to include approximately thirty of the highest-scoring American freshmen and sophomores each year, the "red" group; this was later split into two, forming the "green" group, which consists of approximately fifteen of the highest-scoring freshmen and sophomores who have qualified through the USAMO, and the "red" group, which consists of those who have qualified through the USAJMO. The colorful designations of these groups were adapted from Karate. Also, with the new system the black group includes more or less only the IMO team, which is not necessarily all USAMO winners.
Until 2011, only black group MOPpers were eligible for the selection to the USA IMO team, determined by combining USAMO results with results of a similar competition called the Team Selection Test (TST). From 2011, a new competition called the Team Selection Test Selection Test (TSTST) was established; this competition is open for any of the participants of MOP, and along with results from the USAMO, determines the students who take the TSTs. This ultimately, along with the USAMO and MOP competitions, determines the IMO team.
Canadians are allowed to take the USAMO, but are not allowed to participate in MOP unless they are U.S. residents. Occasionally, when Canadians are amongst the USAMO winners, top scoring honora |
https://en.wikipedia.org/wiki/Nintendo%20thumb | Nintendo thumb, also known as gamer's thumb and similar names, is a form of repetitive strain injury (RSI) caused by excessive playing video games with the traditional Nintendo controller. This injury mainly occurs due to repeated thumb movements while playing video games. The symptoms are blistering, paraesthesia (a tingling or burning feeling in the skin), and swelling of the thumbs, though any finger can be affected. This can lead to stress on tendons, nerves, and ligaments in the hands, and further onto lateral epicondylitis ("tennis elbow"), tendinitis (severe swelling of the tendon), bursitis (inflammation of the fluid-filled sac around joints), and carpal tunnel syndrome (compression of the median nerve at the wrist). Similar injuries can occur with other gaming systems, such as PlayStation thumb from playing Sony PlayStation. The general recommendation for the treatment is to rest and stop the repetitive motion of the affected finger (usually the thumb). In more severe and painful cases, using NSAIDs is also recommended.
Other less localized injuries in the shoulder, knee, and Achilles tendon have also been noted to arise from playing Nintendo Wii. Some of the symptoms can be described by De Quervain syndrome (degeneration of tendons that control the movement of the thumb).
Background
Few case reports of symptoms including stiff and painful joints and limited range of motion in the wrist after frequent Atari 2600 use were published in the late 1970s and early 1980s. Nintendo thumb specifically was first highlighted after portable handheld Nintendo games consoles were released in 1989, with reported cases of RSI appearing primarily in children. Later, the controllers for the Sony PlayStation and PlayStation 2 were noted as causing the condition.
In 1987, an 11-year-old boy reported to the Children's Hospital of Philadelphia complaining of his finger being contracted, flexed, and being unable to relax it back to its baseline position. After medical investi |
https://en.wikipedia.org/wiki/Jensen%20Huang | Jen-Hsun "Jensen" Huang (; born February 17, 1963) is an American businessman, electrical engineer, and the co-founder, president and CEO of Nvidia Corporation.
Early life
Huang was born in Tainan, Taiwan. His family first moved to Thailand when he was five years old, then emigrated to the United States around four to five years later, in 1973. When he was ten years old, he lived in the boys dormitory with his brother at Oneida Baptist Institute while attending Oneida Elementary school in Oneida, Kentucky. His family later settled in Oregon, where he graduated from Aloha High School just outside Portland.
Jensen received his undergraduate degree in electrical engineering from Oregon State University in 1984, and his master's degree in electrical engineering from Stanford University in 1992.
Career
After college he was a director at LSI Logic and a microprocessor designer at Advanced Micro Devices, Inc. (AMD). At 30 years old in 1993, Huang co-founded Nvidia and is the CEO and president.
He owns 3.6% of Nvidia's stock, which went public in 1999.
He earned as CEO in 2007, ranking him as the 61st highest paid U.S. CEO by Forbes.
As of June 19, 2023, Huang's net worth is according to the Bloomberg Billionaires Index.
Philanthropy
In 2022 Huang donated to his alma mater, Oregon State University, as a portion of a donation towards the creation of a supercomputing institute on campus.
Huang gave his other alma mater Stanford University to build the Jen-Hsun Huang School of Engineering Center. The building is the second of four that make up Stanford's Science and Engineering Quad. It was designed by Bora Architects of Portland, Oregon and completed in 2010. Huang gave his alma mater Oneida Baptist Institute to build Huang Hall, a new girls' dormitory and classroom building. It was designed by CMW Architects of Lexington, Kentucky.
In 2007, Huang was the recipient of the Silicon Valley Education Foundation's Pioneer Business Leader Award for his work in bot |
https://en.wikipedia.org/wiki/Trajectory%20optimization | Trajectory optimization is the process of designing a trajectory that minimizes (or maximizes) some measure of performance while satisfying a set of constraints. Generally speaking, trajectory optimization is a technique for computing an open-loop solution to an optimal control problem. It is often used for systems where computing the full closed-loop solution is not required, impractical or impossible. If a trajectory optimization problem can be solved at a rate given by the inverse of the Lipschitz constant, then it can be used iteratively to generate a closed-loop solution in the sense of Caratheodory. If only the first step of the trajectory is executed for an infinite-horizon problem, then this is known as Model Predictive Control (MPC).
Although the idea of trajectory optimization has been around for hundreds of years (calculus of variations, brachystochrone problem), it only became practical for real-world problems with the advent of the computer. Many of the original applications of trajectory optimization were in the aerospace industry, computing rocket and missile launch trajectories. More recently, trajectory optimization has also been used in a wide variety of industrial process and robotics applications.
History
Trajectory optimization first showed up in 1697, with the introduction of the Brachystochrone problem: find the shape of a wire such that a bead sliding along it will move between two points in the minimum time. The interesting thing about this problem is that it is optimizing over a curve (the shape of the wire), rather than a single number. The most famous of the solutions was computed using calculus of variations.
In the 1950s, the digital computer started to make trajectory optimization practical for solving real-world problems. The first optimal control approaches grew out of the calculus of variations, based on the research of Gilbert Ames Bliss and Bryson in America, and Pontryagin in Russia. Pontryagin's maximum principle is of part |
https://en.wikipedia.org/wiki/KUSI-TV | KUSI-TV (channel 51) is an independent television station in San Diego, California, United States. It is owned by Nexstar Media Group alongside Fox affiliate KSWB-TV (channel 69). KUSI-TV's studios are located on Viewridge Avenue (near I-15) in the Kearny Mesa section of San Diego, and its transmitter is located southeast of Spring Valley. The station operates translator K03JB-D in Temecula (part of the Los Angeles market).
After a 15-year dispute over permit ownership that almost derailed the launch of the station on multiple occasions, KUSI began broadcasting in 1982 as a partnership between United States International University and McKinnon Broadcasting Company. It was the first independent station built in San Diego proper. Financial and accreditation problems at USIU led to the sale of its stake to McKinnon in 1990, with McKinnon exercising veto power to block any sale to another entity. McKinnon then started KUSI's news department, which has since grown to produce newscasts throughout the day. In 2023, McKinnon sold KUSI to Nexstar.
History
15 years of fighting
The construction permit for a channel 51 television station in San Diego was first issued on June 23, 1965, to Jack O. Gross, who had previously founded KFMB-TV channel 8, as KJOG-TV. The permit was issued after applications by Gross and California Western University of San Diego were filed the year before; Gross proposed a conventional independent station, while the private university planned a station with a "high educational and cultural content". In October 1967, with the station still unbuilt, California Western filed to have the station transferred to it, stating that Gross was refusing to abide by an agreement reached that April to sell the station to CWU for $16,000 in expenses. However, a complication arose when Gross informed the Federal Communications Commission (FCC) that he had reached another deal to sell the station to the Broadmoor Broadcasting Corporation, owned by Michael and Dan |
https://en.wikipedia.org/wiki/Farina%20%28food%29 | Farina is a form of milled wheat popular in the United States. It is often cooked as a hot breakfast cereal, or porridge. The word farina comes from the Latin word for "meal" or "flour".
Farina may also be cooked like polenta and farofa, which are made with ground corn and ground cassava, respectively. Farina with milk and sugar is sometimes used for making creams for layered cakes. Farina can be used as a substitute for bread crumbs in sweet and meat pies (to absorb excess water). It can also be used to prevent dough from sticking to baking surfaces via the baking process, leaving residual farina on the bottom of the final product.
Farina is a carbohydrate-rich food. When enriched with iron, it can be a significant source of dietary iron, especially for vegetarian diets. Popular brands offer up to 50% of the recommended daily value of iron in a single serving. In commercially available farina, the bran and most of the germ are removed. Cream of Wheat, Malt-O-Meal, and Farina Mills are popular brand names of breakfast cereal. To augment its mild taste, popular add-ins to cooked farina include brown or granular sugar, maple syrup, honey, molasses, fruit, nuts, cinnamon, butter, grated chocolate, jams, milk, and salt.
See also
Wheatena
Semolina
List of porridges |
https://en.wikipedia.org/wiki/Qrpff | qrpff is a Perl script created by Keith Winstein and Marc Horowitz of the MIT SIPB. It performs DeCSS in six or seven lines. The name itself is an encoding of "decss" in rot-13. The algorithm was rewritten 77 times to condense it down to six lines.
In fact, two versions of qrpff exist: a short version (6 lines) and a fast version (7 lines). Both appear below.
Short:
#!/usr/bin/perl
# 472-byte qrpff, Keith Winstein and Marc Horowitz <sipb-iap-dvd@mit.edu>
# MPEG 2 PS VOB file -> descrambled output on stdout.
# usage: perl -I <k1>:<k2>:<k3>:<k4>:<k5> qrpff
# where k1..k5 are the title key bytes in least to most-significant order
s''$/=\2048;while(<>){G=29;R=142;if((@a=unqT="C*",_)[20]&48){D=89;_=unqb24,qT,@
b=map{ord qB8,unqb8,qT,_^$a[--D]}@INC;s/...$/1$&/;Q=unqV,qb25,_;H=73;O=$b[4]<<9
|256|$b[3];Q=Q>>8^(P=(E=255)&(Q>>12^Q>>4^Q/8^Q))<<17,O=O>>8^(E&(F=(S=O>>14&7^O)
^S*8^S<<6))<<9,_=(map{U=_%16orE^=R^=110&(S=(unqT,"\xb\ntd\xbz\x14d")[_/16%8]);E
^=(72,@z=(64,72,G^=12*(U-2?0:S&17)),H^=_%64?12:0,@z)[_%8]}(16..271))[_]^((D>>=8
)+=P+(~F&E))for@a[128..$#a]}print+qT,@a}';s/[D-HO-U_]/\$$&/g;s/q/pack+/g;eval
Fast:
#!/usr/bin/perl -w
# 531-byte qrpff-fast, Keith Winstein and Marc Horowitz <sipb-iap-dvd@mit.edu>
# MPEG 2 PS VOB file on stdin -> descrambled output on stdout
# arguments: title key bytes in least to most-significant order
$_='while(read+STDIN,$_,2048){$a=29;$b=73;$c=142;$t=255;@t=map{$_%16or$t^=$c^=(
$m=(11,10,116,100,11,122,20,100)[$_/16%8])&110;$t^=(72,@z=(64,72,$a^=12*($_%16
-2?0:$m&17)),$b^=$_%64?12:0,@z)[$_%8]}(16..271);if((@a=unx"C*",$_)[20]&48){$h
=5;$_=unxb24,join"",@b=map{xB8,unxb8,chr($_^$a[--$h+84])}@ARGV;s/...$/1$&/;$
d=unxV,xb25,$_;$e=256|(ord$b[4])<<9|ord$b[3];$d=$d>>8^($f=$t&($d>>12^$d>>4^
$d^$d/8))<<17,$e=$e>>8^($t&($g=($q=$e>>14&7^$e)^$q*8^$q<<6))<<9,$_=$t[$_]^
(($h>>=8)+=$f+(~$g&$t))for@a[128..$#a]}print+x"C*",@a}';s/x/pack+/g;eval
The fast version is actually fast enough to decode a movie in real-time.
qrpff and related memorabilia was so |
https://en.wikipedia.org/wiki/Cyberchondria | Cyberchondria, otherwise known as compucondria, is the unfounded escalation of concerns about common symptomology based on review of search results and literature online. Articles in popular media position cyberchondria anywhere from temporary neurotic excess to adjunct hypochondria. Cyberchondria is a growing concern among many healthcare practitioners as patients can now research any and all symptoms of a rare disease, illness or condition, and manifest a state of medical anxiety.
Derivation and use
The term "cyberchondria" is a portmanteau neologism derived from the terms cyber- and hypochondria. (The term "hypochondrium" derives from Greek and literally means the region below the "cartilage" or "breast bone.") Researchers at Harris Interactive clarified the etymology of cyberchondria, and state in studies and interviews that the term is not necessarily intended to be pejorative.
A review in the British Medical Journal publication Journal of Neurology, Neurosurgery, and Psychiatry from 2003 says cyberchondria was used in 2001 in an article in the United Kingdom newspaper The Independent to describe "the excessive use of internet health sites to fuel health anxiety." The BBC also used cyberchondria in April, 2001. The BMJ review also cites the 1997 book from Elaine Showalter, who writes the internet is a new way to spread "pathogenic ideas" like Gulf War syndrome and myalgic encephalomyelitis. Patients with cyberchondria and patients of general hypochondriasis often are convinced they have disorders "with common or ambiguous symptoms."
Studies
Online search behaviors and their influences
The first systematic study of cyberchondria, reported in November 2008, was performed by Microsoft researchers Ryen White and Eric Horvitz, who conducted a large-scale study that included several phases of analysis. White and Horvitz defined cyberchondria as the “unfounded escalation of concerns about common symptomatology, based on the review of search results and literatur |
https://en.wikipedia.org/wiki/Nonvolatile%20BIOS%20memory | Nonvolatile BIOS memory refers to a small memory on PC motherboards that is used to store BIOS settings. It is traditionally called CMOS RAM because it uses a volatile, low-power complementary metal–oxide–semiconductor (CMOS) SRAM (such as the Motorola MC146818 or similar) powered by a small "CMOS" battery when system and standby power is off. It is referred to as non-volatile memory or NVRAM because, after the system loses power, it does retain state by virtue of the CMOS battery. The typical NVRAM capacity is 256 bytes.
The CMOS RAM and the real-time clock have been integrated as a part of the southbridge chipset and it may not be a standalone chip on modern motherboards. In turn, the southbridge have been integrated into a single Platform Controller Hub.
Today's UEFI motherboards use NVRAM to store configuration data (NVRAM is a part of the UEFI flash ROM), but by many OEMs' design, the UEFI settings are still lost if the CMOS battery fails.
CMOS battery
The memory battery (aka motherboard, CMOS, real-time clock (RTC), clock battery) is generally a CR2032 lithium coin cell. This cell battery has an estimated life of three years when power supply unit (PSU) is unplugged or when the PSU power switch is turned off. This battery type, unlike the lithium-ion battery, is not rechargeable and trying to do so may result in an explosion. Motherboards have circuitry preventing batteries from being charged and discharged when a motherboard is powered on. Other common battery cell types can last significantly longer or shorter periods, such as the smaller CR2016 which will generally last about 40% less time than CR2032. Higher temperatures and longer power-off time will shorten battery cell life. When replacing the battery cell, the system time and CMOS BIOS settings may revert to default values. Unwanted BIOS reset may be avoided by replacing the battery cell with the PSU power switch turned on and plugged into an electric wall socket. On ATX motherboards, the PSU will |
https://en.wikipedia.org/wiki/Domestication%20of%20vertebrates | The domestication of vertebrates is the mutual relationship between vertebrate animals including birds and mammals, and the humans who have influence on their care and reproduction.
Charles Darwin recognized a small number of traits that made domesticated species different from their wild ancestors. He was also the first to recognize the difference between conscious selective breeding (i.e. artificial selection) in which humans directly select for desirable traits, and unconscious selection where traits evolve as a by-product of natural selection or from selection on other traits. There is a genetic difference between domestic and wild populations. There is also a genetic difference between the domestication traits that researchers believe to have been essential at the early stages of domestication, and the improvement traits that have appeared since the split between wild and domestic populations. Domestication traits are generally fixed within all domesticates, and were selected during the initial episode of domestication of that animal or plant, whereas improvement traits are present only in a portion of domesticates, though they may be fixed in individual breeds or regional populations.
Domestication should not be confused with taming. Taming is the conditioned behavioral modification of a wild-born animal when its natural avoidance of humans is reduced and it accepts the presence of humans, but domestication is the permanent genetic modification of a bred lineage that leads to an inherited predisposition toward humans. Certain animal species, and certain individuals within those species, make better candidates for domestication than others because they exhibit certain behavioral characteristics: (1) the size and organization of their social structure; (2) the availability and the degree of selectivity in their choice of mates; (3) the ease and speed with which the parents bond with their young, and the maturity and mobility of the young at birth; (4) the degr |
https://en.wikipedia.org/wiki/Solidarity | Solidarity or solidarism is an awareness of shared interests, objectives, standards, and sympathies creating a psychological sense of unity of groups or classes. Solidarity does not reject individuals and sees individuals as the basis of society. It refers to the ties in a society that bind people together as one. The term is generally employed in sociology and the other social sciences as well as in philosophy and bioethics. It is a significant concept in Catholic social teaching and in Christian democratic political ideology.
What forms the basis of solidarity, and how it is implemented, vary between societies. In Global South societies it may be mainly based on kinship and shared values while Global North societies accumulate a variety of theories as to what contributes to a sense of solidarity or social cohesion.
Solidarity is also one of six principles of the Charter of Fundamental Rights of the European Union and December 20 of each year is International Human Solidarity Day recognized as an international observance. Solidarity is not mentioned in the European Convention on Human Rights nor in the United Nations' Universal Declaration of Human Rights and has hence lesser legal meaning when compared to basic rights.
Concepts of solidarity are mentioned in the Universal Declaration on Bioethics and Human Rights, but not defined clearly. As biotechnology and biomedical enhancement research and production increase, the need for distinct definition of solidarity within healthcare system frameworks is important.
Discourse
Émile Durkheim
According to Émile Durkheim, the types of social solidarity correlate with types of society. Durkheim introduced the terms mechanical and organic solidarity as part of his theory of the development of societies in The Division of Labour in Society (1893). In a society exhibiting mechanical solidarity, its cohesion and integration comes from the homogeneity of individuals—people feel connected through similar work, educational a |
https://en.wikipedia.org/wiki/Climate%20change%20mitigation | Climate change mitigation is action to limit climate change by reducing emissions of greenhouse gases or removing those gases from the atmosphere. The recent rise in global average temperature is mostly due to emissions from unabated burning of fossil fuels such as coal, oil, and natural gas. Mitigation can reduce emissions by transitioning to sustainable energy sources, conserving energy, and increasing efficiency. It is possible to remove carbon dioxide () from the atmosphere by enlarging forests, restoring wetlands and using other natural and technical processes. Experts call these processes carbon sequestration. Governments and companies have pledged to reduce emissions to prevent dangerous climate change in line with international negotiations to limit warming by reducing emissions.
Solar energy and wind power have the greatest potential for mitigation at the lowest cost compared to a range of other options. The availability of sunshine and wind is variable. But it is possible to deal with this through energy storage and improved electrical grids. These include long-distance electricity transmission, demand management and diversification of renewables. It is possible to reduce emissions from infrastructure that directly burns fossil fuels, such as vehicles and heating appliances, by electrifying the infrastructure. If the electricity comes from renewable sources instead of fossil fuels this will reduce emissions. Using heat pumps and electric vehicles can improve energy efficiency. If industrial processes must create carbon dioxide, carbon capture and storage can reduce net emissions.
Greenhouse gas emissions from agriculture include methane as well as nitrous oxide. It is possible to cut emissions from agriculture by reducing food waste, switching to a more plant-based diet, by protecting ecosystems and by improving farming processes. Changing energy sources, industrial processes and farming methods can reduce emissions. So can changes in demand, for instanc |
https://en.wikipedia.org/wiki/Weak%20convergence%20%28Hilbert%20space%29 | In mathematics, weak convergence in a Hilbert space is convergence of a sequence of points in the weak topology.
Definition
A sequence of points in a Hilbert space H is said to converge weakly to a point x in H if
for all y in H. Here, is understood to be the inner product on the Hilbert space. The notation
is sometimes used to denote this kind of convergence.
Properties
If a sequence converges strongly (that is, if it converges in norm), then it converges weakly as well.
Since every closed and bounded set is weakly relatively compact (its closure in the weak topology is compact), every bounded sequence in a Hilbert space H contains a weakly convergent subsequence. Note that closed and bounded sets are not in general weakly compact in Hilbert spaces (consider the set consisting of an orthonormal basis in an infinitely dimensional Hilbert space which is closed and bounded but not weakly compact since it doesn't contain 0). However, bounded and weakly closed sets are weakly compact so as a consequence every convex bounded closed set is weakly compact.
As a consequence of the principle of uniform boundedness, every weakly convergent sequence is bounded.
The norm is (sequentially) weakly lower-semicontinuous: if converges weakly to x, then
and this inequality is strict whenever the convergence is not strong. For example, infinite orthonormal sequences converge weakly to zero, as demonstrated below.
If weakly and , then strongly:
If the Hilbert space is finite-dimensional, i.e. a Euclidean space, then weak and strong convergence are equivalent.
Example
The Hilbert space is the space of the square-integrable functions on the interval equipped with the inner product defined by
(see Lp space). The sequence of functions defined by
converges weakly to the zero function in , as the integral
tends to zero for any square-integrable function on when goes to infinity, which is by Riemann–Lebesgue lemma, i.e.
Although has an increasing number of 0's in |
https://en.wikipedia.org/wiki/Erythrosine | Erythrosine, also known as Red No. 3, is an organoiodine compound, specifically a derivative of fluorone. It is a pink dye which is primarily used for food coloring. It is the disodium salt of 2,4,5,7-tetraiodofluorescein. Its maximum absorbance is at 530 nm in an aqueous solution, and it is subject to photodegradation.
Uses
It is used as a:
food coloring
printing ink
biological stain
dental plaque disclosing agent
radiopaque medium
sensitizer for orthochromatic photographic films
Visible light photoredox catalyst
Erythrosine is commonly used in sweets such as some candies and popsicles, and even more widely used in cake-decorating gels. It is also used to color pistachio shells. As a food additive, it has the E number E127.
Regulation and prevalence
Erythrosine is banned as a food additive in the European Union, Japan, China, the United Kingdom, Australia, New Zealand, and California. Erythrosine can be used in colored food and ingested drugs in the U.S. without any restriction; however, its use is banned in cosmetics and topical drugs. It is less commonly used in the United States because Allura Red AC (Red #40) is generally used instead. The lake variant is also banned from use in the United States.
The European Food Safety Authority only allows erythrosine in processed cherries and pet foods.
United States
As a result of efforts begun in the 1970s, in 1990 the U.S. Food and Drug Administration (FDA) instituted a partial ban on erythrosine, citing research that high doses cause cancer in rats. A 1990 study concluded that "chronic erythrosine ingestion may promote thyroid tumor formation in rats via chronic stimulation of the thyroid by TSH." with 4% of total daily dietary intake consisting of erythrosine B. A series of toxicology tests combined with a review of other reported studies concluded that erythrosine is non-genotoxic and any increase in tumors is caused by a non-genotoxic mechanism.
In June 2008, the Center for Science in the Public Int |
https://en.wikipedia.org/wiki/Crystallinity | Crystallinity refers to the degree of structural order in a solid. In a crystal, the atoms or molecules are arranged in a regular, periodic manner. The degree of crystallinity has a big influence on hardness, density, transparency and diffusion. In an ideal gas, the relative positions of the atoms or molecules are completely random. Amorphous materials, such as liquids and glasses, represent an intermediate case, having order over short distances (a few atomic or molecular spacings) but not over longer distances.
Many materials, such as glass-ceramics and some polymers, can be prepared in such a way as to produce a mixture of crystalline and amorphous regions. In such cases, crystallinity is usually specified as a percentage of the volume of the material that is crystalline. Even within materials that are completely crystalline, however, the degree of structural perfection can vary. For instance, most metallic alloys are crystalline, but they usually comprise many independent crystalline regions (grains or crystallites) in various orientations separated by grain boundaries; furthermore, they contain other crystallographic defects (notably dislocations) that reduce the degree of structural perfection. The most highly perfect crystals are silicon boules produced for semiconductor electronics; these are large single crystals (so they have no grain boundaries), are nearly free of dislocations, and have precisely controlled concentrations of defect atoms.
Crystallinity can be measured using x-ray crystallography, but calorimetric techniques are also commonly used.
Rock crystallinity
Geologists describe four qualitative levels of crystallinity:
holocrystalline rocks are completely crystalline;
hypocrystalline rocks are partially crystalline, with crystals embedded in an amorphous or glassy matrix;
hypohyaline rocks are partially glassy;
holohyaline rocks (such as obsidian) are completely glassy. |
https://en.wikipedia.org/wiki/Audio%20converter | An audio converter is a device or software that converts an audio signal from one format to another.
Hardware audio converters include analog-to-digital converters (ADCs), which convert analog audio to uncompressed digital form (e.g., PCM), and their reciprocal partners, digital-to-analog converters (DACs), which convert uncompressed digital audio to analog form. ADCs and DACs are usually components of hardware products. For example, sound cards and capture cards both include ADCs to allow a computer to record audio. Sound cards also feature DACs for audio playback.
Some audio conversion functions can be performed by software or by specialized hardware. For example, an audio transcoder converts from one compressed audio format to another (e.g., MP3 to AAC) by means of two audio codecs: One for decoding (uncompressing) the source and one for encoding (compressing) the destination file or stream.
See also
Audio file format
Comparison of audio coding formats
List of audio conversion software
Audio software
Digital signal processing |
https://en.wikipedia.org/wiki/Guerrilla%20gardening | Guerrilla gardening is the act of gardening – raising food, plants, or flowers – on land that the gardeners do not have the legal rights to cultivate, such as abandoned sites, areas that are not being cared for, or private property. It encompasses a diverse range of people and motivations, ranging from gardeners who spill over their legal boundaries to gardeners with a political purpose, who seek to provoke change by using guerrilla gardening as a form of protest or direct action. This practice has implications for land rights and land reform; aiming to promote re-consideration of land ownership in order to assign a new purpose or reclaim land that is perceived to be in neglect or misused. Some gardeners work at night, in relative secrecy, in an effort to make the area more useful or attractive, while others garden during the day for publicity.
History
Two of the earliest celebrated guerrilla gardeners were Gerrard Winstanley, of the Diggers in Surrey, England (1649), and John "Appleseed" Chapman in Ohio, USA (1801).
The earliest recorded use of the term guerrilla gardening was by Liz Christy and her Green Guerrilla group in 1973 in the Bowery Houston area of New York. They transformed a derelict private lot into a garden. The space is still cared for by volunteers but now enjoys the protection of the city's parks department.
Guerrilla gardening takes place in many parts of the world—more than thirty countries are documented and evidence can be found online in numerous guerrilla gardening social networking groups and in the Community pages of GuerrillaGardening.org. The term bewildering has been used as a synonym for guerrilla gardening by Australian gardener Bob Crombie.
Examples
International Sunflower Guerrilla Gardening Day
Since 2007, May 1 has been celebrated as an annual International Sunflower Guerrilla Day, in which guerrilla gardeners plant sunflowers in their neighborhoods.
Australia
Guerrilla gardening is prominent in Melbourne where most of th |
https://en.wikipedia.org/wiki/Retraction%20%28topology%29 | In topology, a branch of mathematics, a retraction is a continuous mapping from a topological space into a subspace that preserves the position of all points in that subspace. The subspace is then called a retract of the original space. A deformation retraction is a mapping that captures the idea of continuously shrinking a space into a subspace.
An absolute neighborhood retract (ANR) is a particularly well-behaved type of topological space. For example, every topological manifold is an ANR. Every ANR has the homotopy type of a very simple topological space, a CW complex.
Definitions
Retract
Let X be a topological space and A a subspace of X. Then a continuous map
is a retraction if the restriction of r to A is the identity map on A; that is, for all a in A. Equivalently, denoting by
the inclusion, a retraction is a continuous map r such that
that is, the composition of r with the inclusion is the identity of A. Note that, by definition, a retraction maps X onto A. A subspace A is called a retract of X if such a retraction exists. For instance, any non-empty space retracts to a point in the obvious way (the constant map yields a retraction). If X is Hausdorff, then A must be a closed subset of X.
If is a retraction, then the composition ι∘r is an idempotent continuous map from X to X. Conversely, given any idempotent continuous map we obtain a retraction onto the image of s by restricting the codomain.
Deformation retract and strong deformation retract
A continuous map
is a deformation retraction of a space X onto a subspace A if, for every x in X and a in A,
In other words, a deformation retraction is a homotopy between a retraction and the identity map on X. The subspace A is called a deformation retract of X. A deformation retraction is a special case of a homotopy equivalence.
A retract need not be a deformation retract. For instance, having a single point as a deformation retract of a space X would imply that X is path connected (and in fact that |
https://en.wikipedia.org/wiki/Plextor | Plextor (styled PLEXTOR) (; ) is a Taiwanese (formerly Japanese) consumer electronics brand, best known for solid-state drives and optical disc drives.
Company
The brand name Plextor was used for all products manufactured by the Electronic Equipment Division and Printing Equipment Division of the Japanese company Plextor Inc., which was a 100%-owned subsidiary company of Shinano Kenshi Corp., also a Japanese company. The brand was formerly known as TEXEL, under which name it introduced its first CD-ROM optical disc drive in 1989. The brand has been used for flash memory products, Blu-ray players and burners, DVD-ROM burners, CD-ROM burners, DVD and CD media, network hard disks, portable hard disks, digital video recorders, and floppy disk drives.
The brand Plextor was in 2010 licensed to Philips & Lite-On Digital Solutions Corporation, a subsidiary company of Lite-On Technology Corporation. Therefore, all the Plextor products since then, especially SSDs, are of a Taiwanese, not a Japanese brand. However, the Japanese company Plextor Inc., who originated this brand name, continues, and sells new products under other brands such as PLEXLOGGER and PLEXTALK.
Products
In an effort to strengthen its storage leader position, Plextor introduced its first-ever solid state drives, the M1 SSD series available in 64 GB and 128 GB capacities. Soon after its M1 release, Plextor released the M2 Series 128 GB, and 256 GB, available in 64, using SATA 6 Gbit/s interface, which they claimed to be the first SATA 3 SSD available at the time.
In October 2011, Plextor announced the limited edition M2P Series which boast significant increase in speed performance from its M2 Series. Notably, Plextor introduced "ironclad" five-year warranty for its SSD, making them one of the few manufacturers to do so. In addition to the five-year warranty, Plextor introduced its exclusive TrueSpeed Technology with the M2P series. True Speed Technology is designed to maintain high speed in the real-wor |
https://en.wikipedia.org/wiki/Coastal%20morphodynamics | Coastal morphodynamics (i.e. the dynamics of beach morphology) refers to the study of the interaction and adjustment of the seafloor topography and fluid hydrodynamic processes, seafloor morphologies and sequences of change dynamics involving the motion of sediment. Hydrodynamic processes include those of waves, tides and wind-induced currents.
While hydrodynamic processes respond instantaneously to morphological change, morphological change requires the redistribution of sediment. As sediment takes a finite time to move, there is a lag in the morphological response to hydrodynamic forcing. Sediment can therefore be considered to be a time-dependent coupling mechanism. Since the boundary conditions of hydrodynamic forcing change regularly, this may mean that the beach never attains equilibrium. Morphodynamic processes exhibit positive and negative feedbacks (such that beaches can, over different timescales, be considered to be both self-forcing and self-organised systems), nonlinearities and threshold behaviour.
This systems approach to the coast was first developed by Wright and Thom in 1977 and finalized by Wright and Short in 1984. According to their dynamic and morphological characteristics, exposed sandy beaches can be classified into several morphodynamic types (Wright and Short, 1984; Short, 1996). There is a large scale of morphodynamic states, this scale ranges from the "dissipative state" to the "reflective extremes".
Dissipative beaches are flat, have fine sand, incorporating waves that tend to break far from the intertidal zone and dissipate force progressively along wide surf zones. Dissipative beaches are wide and flat in profile, with a wide shoaling and surf zone, composed of finer sediment, and characterised by spilling breakers.
Reflective beaches are steep, and are known for their coarse sand; they have no surf zone, and the waves break brusquely on the intertidal zone. Reflective beaches are typically steep in profile with a narrow shoal |
https://en.wikipedia.org/wiki/Synaptonemal%20complex | The synaptonemal complex (SC) is a protein structure that forms between homologous chromosomes (two pairs of sister chromatids) during meiosis and is thought to mediate synapsis and recombination during prophase I during meiosis in eukaryotes. It is currently thought that the SC functions primarily as a scaffold to allow interacting chromatids to complete their crossover activities.
Composition
The synaptonemal complex is a tripartite structure consisting of two parallel lateral regions and a central element. This "tripartite structure" is seen during the pachytene stage of the first meiotic prophase, both in males and in females during gametogenesis. Previous to the pachytene stage, during leptonema, the lateral elements begin to form and they initiate and complete their pairing during the zygotene stage. After pachynema ends, the SC usually becomes disassembled and can no longer be identified.
In humans, three specific components of the synaptonemal complex have been characterized: SC protein-1 (SYCP1), SC protein-2 (SYCP2), and SC protein-3 (SYCP3). The SYCP1 gene is on chromosome 1p13; the SYCP2 gene is on chromosome 20q13.33; and the gene for SYCP3 is on chromosome 12q.
The synaptonemal complex was described by Montrose J. Moses in 1956 in primary spermatocytes of crayfish and by D. Fawcett in spermatocytes of pigeon, cat and man. As seen with the electron microscope, the synaptonemal complex is formed by two "lateral elements", mainly formed by SYCP3 and secondarily by SYCP2, a "central element" that contains at least two additional proteins and the amino terminal region of SYCP1, and a "central region" spanned between the two lateral elements, that contains the "transverse filaments" composed mainly by the protein SYCP1.
The SCs can be seen with the light microscope using silver staining or with immunofluorescence techniques that label the proteins SYCP3 or SYCP2.
Assembly and disassembly
Formation of the SC usually reflects the pairing or "synapsis" o |
https://en.wikipedia.org/wiki/Metro%20Ethernet | A metropolitan-area Ethernet, Ethernet MAN, or metro Ethernet network is a metropolitan area network (MAN) that is based on Ethernet standards. It is commonly used to connect subscribers to a larger service network or for internet access. Businesses can also use metropolitan-area Ethernet to connect their own offices to each other.
An Ethernet interface is typically more economical than a synchronous digital hierarchy (SONET/SDH) or plesiochronous digital hierarchy (PDH) interface of the same bandwidth. Another distinct advantage of an Ethernet-based access network is that it can be easily connected to the customer network, due to the prevalent use of Ethernet in corporate and residential networks.
A typical service provider's network is a collection of switches and routers connected through optical fiber. The topology could be a ring, hub-and-spoke (star), or full or partial mesh. The network will also have a hierarchy: core, distribution (aggregation), and access. The core in most cases is an existing IP/MPLS backbone but may migrate to newer forms of Ethernet transport in the form of 10 Gbit/s, 40 Gbit/s, or 100 Gbit/s speeds or even possibly 400 Gbit/s to Terabit Ethernet network in the future.
Ethernet on the MAN can be used as pure Ethernet, Ethernet over SDH, Ethernet over Multiprotocol Label Switching (MPLS), or Ethernet over DWDM. Ethernet-based deployments with no other underlying transport are cheaper but are harder to implement in a resilient and scalable manner, which has limited its use to small-scale or experimental deployments. SDH-based deployments are useful when there is an existing SDH infrastructure already in place; its main shortcoming is the loss of flexibility in bandwidth management due to the rigid hierarchy imposed by the SDH network. MPLS-based deployments are costly but highly reliable and scalable and are typically used by large service providers.
Metropolitan area networks
Familiar network domains are likely to exist regardless of |
https://en.wikipedia.org/wiki/Barber%27s%20pole | A barber's pole is a type of sign used by barbers to signify the place or shop where they perform their craft. The trade sign is, by a tradition dating back to the Middle Ages, a staff or pole with a helix of colored stripes (often red and white in many countries, but usually red, white and blue in Japan and the United States). The pole may be stationary or may rotate, often with the aid of an electric motor.
A "barber's pole" with a helical stripe is a familiar sight, and is used as a secondary metaphor to describe objects in many other contexts. For example, if the shaft or tower of a lighthouse has been painted with a helical stripe as a daymark, the lighthouse could be described as having been painted in "barber's pole" colors.
Origin in barbering and surgery
During medieval times, barbers performed surgery on customers, as well as tooth extractions. The original pole had a brass wash basin at the top (representing the vessel in which leeches were kept) and bottom (representing the basin that received the blood). The pole itself represents the staff that the patient gripped during the procedure to encourage blood flow and the twined pole motif is likely related to the staff of the Greek god of speed and commerce Hermes, aka the Caduceus, evidenced for example by early physician van Helmont's description of himself as "Francis Mercurius Van Helmont, A Philosopher by that one in whom are all things, A Wandering Hermite.
At the Council of Tours in 1163, the clergy was banned from the practice of surgery. From then, physicians were clearly separated from the surgeons and barbers. Later, the role of the barbers was defined by the College de Saint-Côme et Saint-Damien, established by Jean Pitard in Paris circa 1210, as academic surgeons of the long robe and barber surgeons of the short robe.
In Renaissance-era Amsterdam, the surgeons used the colored stripes to indicate that they were prepared to bleed their patients (red), set bones or pull teeth (white), or gi |
https://en.wikipedia.org/wiki/313%20%28number%29 | 313 (three hundred [and] thirteen) is the natural number following 312 and preceding 314.
Additionally, 313 is:
a prime number
a twin prime with 311
a centered square number
a full reptend prime (and the smallest number which is a full reptend prime in base 10 but not in base 2 to 9)
a Pythagorean prime
a regular prime
a palindromic prime in both decimal and binary.
a truncatable prime
a weakly prime in base 5
a happy number
an Armstrong number - in base 4 ( 3×42 + 1×41 + 3×40 = 33 + 13 + 33 )
an index of a prime Lucas number. |
https://en.wikipedia.org/wiki/Aftertaste | Aftertaste is the taste intensity of a food or beverage that is perceived immediately after that food or beverage is removed from the mouth. The aftertastes of different foods and beverages can vary by intensity and over time, but the unifying feature of aftertaste is that it is perceived after a food or beverage is either swallowed or spat out. The neurobiological mechanisms of taste (and aftertaste) signal transduction from the taste receptors in the mouth to the brain have not yet been fully understood. However, the primary taste processing area located in the insula has been observed to be involved in aftertaste perception.
Temporal taste perception
Characteristics of a food's aftertaste are quality, intensity, and duration. Quality describes the actual taste of a food and intensity conveys the magnitude of that taste. Duration describes how long a food's aftertaste sensation lasts. Foods that have lingering aftertastes typically have long sensation durations.
Because taste perception is unique to every person, descriptors for taste quality and intensity have been standardized, particularly for use in scientific studies. For taste quality, foods can be described by the commonly used terms "sweet", "sour", "salty", "bitter", "umami", or "no taste". Description of aftertaste perception relies heavily upon the use of these words to convey the taste that is being sensed after a food has been removed from the mouth.
The description of taste intensity is also subject to variability among individuals. Variations of the Borg Category Ratio Scale or other similar metrics are often used to assess the intensities of foods. The scales typically have categories that range from either zero or one through ten (or sometimes beyond ten) that describe the taste intensity of a food. A score of zero or one would correspond to unnoticeable or weak taste intensities, while a higher score would correspond to moderate or strong taste intensities. It is the prolonged moderate or stro |
https://en.wikipedia.org/wiki/Laser%20snow | Laser snow is the precipitation through a chemical reaction, condensation and coagulation process, of clustered atoms or molecules, induced by passing a laser beam through certain gasses. It was first observed by Tam, Moe and Happer in 1975, and has since been noted in a number of gases. |
https://en.wikipedia.org/wiki/Basis%20set%20%28chemistry%29 | In theoretical and computational chemistry, a basis set is a set of functions (called basis functions) that is used to represent the electronic wave function in the Hartree–Fock method or density-functional theory in order to turn the partial differential equations of the model into algebraic equations suitable for efficient implementation on a computer.
The use of basis sets is equivalent to the use of an approximate resolution of the identity: the orbitals are expanded within the basis set as a linear combination of the basis functions , where the expansion coefficients are given by .
The basis set can either be composed of atomic orbitals (yielding the linear combination of atomic orbitals approach), which is the usual choice within the quantum chemistry community; plane waves which are typically used within the solid state community, or real-space approaches. Several types of atomic orbitals can be used: Gaussian-type orbitals, Slater-type orbitals, or numerical atomic orbitals. Out of the three, Gaussian-type orbitals are by far the most often used, as they allow efficient implementations of post-Hartree–Fock methods.
Introduction
In modern computational chemistry, quantum chemical calculations are performed using a finite set of basis functions. When the finite basis is expanded towards an (infinite) complete set of functions, calculations using such a basis set are said to approach the complete basis set (CBS) limit. In this context, basis function and atomic orbital are sometimes used interchangeably, although the basis functions are usually not true atomic orbitals.
Within the basis set, the wavefunction is represented as a vector, the components of which correspond to coefficients of the basis functions in the linear expansion. In such a basis, one-electron operators correspond to matrices (a.k.a. rank two tensors), whereas two-electron operators are rank four tensors.
When molecular calculations are performed, it is common to use a basis composed |
https://en.wikipedia.org/wiki/NScripter | , officially abbreviated as Nscr, also known under its production title Scripter4, is a game engine developed by Naoki Takahashi between 1999 and 2018 functioning with its own script language which facilitates the creation of both visual and sound novels. The SDK is only available for Windows. From version 2.82, NScripter supports both Japanese characters - these are two bytes long - and any single-byte character; before that, it only supported Japanese characters. This engine was very popular in Japan because of its simplicity and because it was free for amateur game makers. Additionally, there are forks available to extend NScripter's capabilities to display characters from another language, run a game on other platforms, etc.
NScripter
NScripter's development ranged from to ; it was first called by its production title Scripter4 because it was the successor to Scripter3, Naoki Takahashi's previous engine. was the date of the release of the final version of NScripter.
Characteristics
The script is executed by the engine in an interpreter. The syntax is very simple, similar to the BASIC language. The functions needed to create visual novels and sound novels, such as displaying text, sprites and CG, playing music and handling choices, are built into the engine as a basic API. As a result, game creation is simplified by the ability to write a script that calls these functions directly.
In order to meet specific needs, it is possible to use a method called 'system customisation' which modifies the behaviour of the engine itself in order to add features such as a save system, complex effects not provided in the basic API, or video management. To do this, external DLLs can be used. These functions can be used to create simulation games, etc.
On the other hand, before version 2.92, object-oriented elements were not incorporated into the software and NScripter did not handle parallelism at all. The statement was used to try to do structured programming within NSc |
https://en.wikipedia.org/wiki/Signal%20lamp | A signal lamp (sometimes called an Aldis lamp or a Morse lamp) is a visual signaling device for optical communication by flashes of a lamp, typically using Morse code. The idea of flashing dots and dashes from a lantern was first put into practice by Captain Philip Howard Colomb, of the Royal Navy, in 1867. Colomb's design used limelight for illumination, and his original code was not the same as Morse code. During World War I, German signalers used optical Morse transmitters called , with a range of up to 8 km (5 miles) at night, using red filters for undetected communications.
Modern signal lamps produce a focused pulse of light, either by opening and closing shutters mounted in front of the lamp, or by tilting a concave mirror. They continue to be used to the present day on naval vessels and for aviation light signals in air traffic control towers, as a backup device in case of a complete failure of an aircraft's radio.
History
Signal lamps were pioneered by the Royal Navy in the late 19th century. They were the second generation of signalling in the Royal Navy, after the flag signals most famously used to spread Nelson's rallying-cry, "England expects that every man will do his duty", before the Battle of Trafalgar.
The idea of flashing dots and dashes from a lantern was first put into practice by Captain, later Vice Admiral, Philip Howard Colomb, of the Royal Navy, in 1867. Colomb's design used limelight for illumination. His original code was not identical to Morse code, but the latter was subsequently adopted.
Another signalling lamp was the Begbie lamp, a kerosene lamp with a lens to focus the light over a long distance.
During the trench warfare of World War I when wire communications were often cut, German signals used three types of optical Morse transmitters, called , the intermediate type for distances of up to 4 km (2.5 miles) in daylight and of up to 8 km (5 miles) at night, using red filters for undetected communications.
In 1944 Arthur Cyri |
https://en.wikipedia.org/wiki/Gegenbauer%20polynomials | In mathematics, Gegenbauer polynomials or ultraspherical polynomials C(x) are orthogonal polynomials on the interval [−1,1] with respect to the weight function (1 − x2)α–1/2. They generalize Legendre polynomials and Chebyshev polynomials, and are special cases of Jacobi polynomials. They are named after Leopold Gegenbauer.
Characterizations
A variety of characterizations of the Gegenbauer polynomials are available.
The polynomials can be defined in terms of their generating function :
The polynomials satisfy the recurrence relation :
Gegenbauer polynomials are particular solutions of the Gegenbauer differential equation :
When α = 1/2, the equation reduces to the Legendre equation, and the Gegenbauer polynomials reduce to the Legendre polynomials.
When α = 1, the equation reduces to the Chebyshev differential equation, and the Gegenbauer polynomials reduce to the Chebyshev polynomials of the second kind.
They are given as Gaussian hypergeometric series in certain cases where the series is in fact finite:
(Abramowitz & Stegun p. 561). Here (2α)n is the rising factorial. Explicitly,
From this it is also easy to obtain the value at unit argument:
They are special cases of the Jacobi polynomials :
in which represents the rising factorial of .
One therefore also has the Rodrigues formula
Orthogonality and normalization
For a fixed α > -1/2, the polynomials are orthogonal on [−1, 1] with respect to the weighting function (Abramowitz & Stegun p. 774)
To wit, for n ≠ m,
They are normalized by
Applications
The Gegenbauer polynomials appear naturally as extensions of Legendre polynomials in the context of potential theory and harmonic analysis. The Newtonian potential in Rn has the expansion, valid with α = (n − 2)/2,
When n = 3, this gives the Legendre polynomial expansion of the gravitational potential. Similar expressions are available for the expansion of the Poisson kernel in a ball .
It follows that the quantities are spherical harmonics, |
https://en.wikipedia.org/wiki/Atresia | Atresia is a condition in which an orifice or passage in the body is (usually abnormally) closed or absent.
Examples of atresia include:
Aural atresia (anotia), a congenital deformity where the ear canal is underdeveloped.
Biliary atresia, a condition in newborns in which the common bile duct between the liver and the small intestine is blocked or absent.
Congenital bronchial atresia, a rare congenital abnormality
Choanal atresia, blockage of the back of the nasal passage, usually by abnormal bony or soft tissue.
Esophageal atresia, which affects the alimentary tract and causes the esophagus to end before connecting normally to the stomach.
Follicular atresia, degeneration and resorption of the ovarian follicles.
Imperforate anus, malformation of the opening between the rectum and anus.
Intestinal atresia, malformation of the intestine, usually resulting from a vascular accident in utero.
Microtia: see above, Aural atresia (anotia).
Ovarian follicle atresia, the degeneration and subsequent resorption of one or more immature ovarian follicles.
Potter sequence, congenital decreased size of the kidney leading to absolutely no functionality of the kidney, usually related to a single kidney.
Pulmonary atresia, malformation of the pulmonary valve in which the valve orifice fails to develop.
Renal agenesis, only having one kidney.
Tricuspid atresia, a form of congenital heart disease whereby there is a complete absence of the tricuspid valve, and consequently an absence of the right atrioventricular connection.
Vaginal atresia, a congenital occlusion of the vagina or subsequent adhesion of the walls of the vagina, resulting in its occlusion. |
https://en.wikipedia.org/wiki/Sooty%20mold | Sooty mold (also spelled sooty mould) is a collective term for different Ascomycete fungi, which includes many genera, commonly Cladosporium and Alternaria. It grows on plants and their fruit, but also environmental objects, like fences, garden furniture, stones, and even cars. The mold benefits from either a sugary exudate produced by the plant or fruit, or honeydew-secreting insects or sap suckers the plant may be infested by.
Sooty mold itself does little if any harm to the plant. Treatment is indicated when the mold is combined with insect infestation.
Description
Sooty mold is a collective, self-descriptive term for a number of different fungi; it is a black, powdery coating adhering to plants and their fruit or environmental objects.
Biology
The ecology of the different species, their interactions, relationship to the host are little understood. A chance observation of a Microcyclospora tardicrescens inhibiting the growth of the fruit pathogen Colletotrichum fioriniae in dual culture tests, yielded trichothecolone acetate and its (S)-7-hydroxy derivative as active principles for the interaction between M. tardicrescens and C. fioriniae.
Common genera of sooty mold fungi found are Aethaloderma, Capnodium, Cladosporium, Euantennaria, Scorias, and Trichomerium.
Other genera causing sooty molds are Alternaria, Cladosporium, Aureobasidium, Antennariella, Limacinula, Scorias, Meliola, and Capnodium.
Sooty mold grows particularly well on plants that produce a sugary exudate, if they are infested by honeydew secreting insects such as aphids, scales and the whitefly, or when infested by insects that suck sap from the host plant.
Plants commonly affected
Sooty mold is commonly seen on the leaves of ornamental plants such as azaleas, gardenias, camellias, crepe myrtles, Mangifera and laurels. Karuka is affected by sooty mold caused by Meliola juttingii. Plants located under pecan or hickory trees are particularly susceptible to sooty mold, because honeydew-sec |
https://en.wikipedia.org/wiki/Global%20motion%20compensation | Global motion compensation (GMC) is a motion compensation technique used in video compression to reduce the bitrate required to encode video. It is most commonly used in MPEG-4 ASP, such as with the DivX and Xvid codecs.
Operation
Global motion compensation describes the motion in a scene based on a single affine transform instruction. The reference frame is panned, rotated and zoomed in accordance to GMC warp points to create a prediction of how the following frame will look. Since this operation works on individual pixels (rather than blocks), it is capable of creating predictions that are not possible using block-based approaches.
Each macroblock in such a frame can be compensated using global motion (no further motion information is then signalled) or, alternatively, local motion (as if GMC were off). This choice, while costing an additional bit per macroblock, can improve prediction quality and therefore reduce residual.
Because the transforms used in global motion compensation are only added to the encoding stream when used, they do not have a constant bitrate overhead. A predicted frame which uses GMC is called an S-frame (sprite frame) while a predicted frame encoded without GMC is called either a P-frame, if it was predicted purely by previous (past) frames, or a B-frame if it was predicted jointly with past and future frames (an unpredicted frame encoded as a whole image is referred to as an I-frame).
Implementations
DivX offers 1 warp-point GMC encoding: This enables easier hardware support in DivX certified and non-certified devices.
But as 1 warp-point GMC limits the global transform to panning operation only (since panning can be described using blocks), this implementation rarely improves video quality.
Xvid offers 3 warp-point GMC encoding: As a result, it currently has no hardware support.
Criticism
GMC failed to meet expectations of dramatic improvements in motion compensation, and as a result it was omitted from the H.264/MPEG-4 AVC specifi |
https://en.wikipedia.org/wiki/Jazelle | Jazelle DBX (direct bytecode execution) is an extension that allows some ARM processors to execute Java bytecode in hardware as a third execution state alongside the existing ARM and Thumb modes. Jazelle functionality was specified in the ARMv5TEJ architecture and the first processor with Jazelle technology was the ARM926EJ-S. Jazelle is denoted by a "J" appended to the CPU name, except for post-v5 cores where it is required (albeit only in trivial form) for architecture conformance.
Jazelle RCT (Runtime Compilation Target) is a different technology based on ThumbEE mode; it supports ahead-of-time (AOT) and just-in-time (JIT) compilation with Java and other execution environments.
The most prominent use of Jazelle DBX is by manufacturers of mobile phones to increase the execution speed of Java ME games and applications. A Jazelle-aware Java virtual machine (JVM) will attempt to run Java bytecode in hardware, while returning to the software for more complicated, or lesser-used bytecode operations. ARM claims that approximately 95% of bytecode in typical program usage ends up being directly processed in the hardware.
The published specifications are very incomplete, being only sufficient for writing operating system code that can support a JVM that uses Jazelle. The declared intent is that only the JVM software needs to (or is allowed to) depend on the hardware interface details. This tight binding facilitates that the hardware and JVM can evolve together without affecting other software. In effect, this gives ARM Holdings considerable control over which JVMs are able to exploit Jazelle. It also prevents open source JVMs from using Jazelle. These issues do not apply to the ARMv7 ThumbEE environment, the nominal successor to Jazelle DBX.
Implementation
The Jazelle extension uses low-level binary translation, implemented as an extra stage between the fetch and decode stages in the processor instruction pipeline. Recognised bytecodes are converted into a stri |
https://en.wikipedia.org/wiki/ScienceDirect | ScienceDirect is a website that provides access to a large bibliographic database of scientific and medical publications of the Dutch publisher Elsevier. It hosts over 18 million pieces of content from more than 4,000 academic journals and 30,000 e-books of this publisher. The access to the full-text requires subscription, while the bibliographic metadata is free to read. ScienceDirect is operated by Elsevier. It was launched in March 1997.
Usage
The journals are grouped into four main sections:
Physical Sciences and Engineering
Life Sciences
Health Sciences
Social Sciences and Humanities.
Article abstracts are freely available, and access to their full texts (in PDF and, for newer publications, also HTML) generally requires a subscription or pay-per-view purchase unless the content is freely available in open access.
Subscriptions to the overall offering hosted on ScienceDirect, rather than to specific titles it carries, are usually acquired through a so called big deal. The other big five have similar offers.
ScienceDirect also competes for audience with other large aggregators and hosts of scholarly communication content such as academic social network ResearchGate and open access repository arXiv, as well as with fully open access publishing venues and mega journals like PLOS.
ScienceDirect also carries Cell.
See also
List of academic databases and search engines
Scopus |
https://en.wikipedia.org/wiki/Peer%20to%20Peer%20Remote%20Copy | Peer to Peer Remote Copy or PPRC is a protocol to replicate a storage volume to another control unit in a remote site. Synchronous PPRC causes each write to the primary volume to be performed to the secondary as well, and the I/O is only considered complete when update to both primary and secondary have completed. Asynchronous PPRC will flag tracks on the primary to be duplicated to the secondary when time permits.
PPRC is also the name IBM calls their implementation of the protocol for their storage hardware. Other vendors have their own implementation. For example, the HDS implementation is called TrueCopy. EMC also provides a similar capability on their VPLEX platforms called "MirrorView".
PPRC can be used to provide very fast data recovery due to failure of the primary site.
In IBM zSeries computers with two direct access storage device (DASD) control units connected through dedicated connections, PPRC is the protocol used to mirror a DASD volume in one control unit (the primary) to a DASD volume in the other control unit (the secondary).
In the IBM SAN Volume Controller PPRC is used to mirror a virtualized storage volume to remote (or the same) cluster.
PPRC is also referred to as Metro Mirror when comparing to Global Mirror.
See also
Storage replication
Hitachi TrueCopy
Extended Remote Copy
Global Mirror
Copy Services
Norton Ghost
EMC SRDF (Symmetrix Remote Data Facility)
Microsoft Windows Server 2016 Storage Replica
IBM mainframe technology
Storage software |
https://en.wikipedia.org/wiki/Borel%20equivalence%20relation | In mathematics, a Borel equivalence relation on a Polish space X is an equivalence relation on X that is a Borel subset of X × X (in the product topology).
Given Borel equivalence relations E and F on Polish spaces X and Y respectively, one says that E is Borel reducible to F, in symbols E ≤B F, if and only if there is a Borel function
Θ : X → Y
such that for all x,x' ∈ X, one has
x E x' ⇔ Θ(x) F Θ(x').
Conceptually, if E is Borel reducible to F, then E is "not more complicated" than F, and the quotient space X/E has a lesser or equal "Borel cardinality" than Y/F, where "Borel cardinality" is like cardinality except for a definability restriction on the witnessing mapping.
Kuratowski's theorem
A measure space X is called a standard Borel space if it is Borel-isomorphic to a Borel subset of a Polish space. Kuratowski's theorem then states that two standard Borel spaces X and Y are Borel-isomorphic iff |X| = |Y|.
See also |
https://en.wikipedia.org/wiki/Local%20oscillator | In electronics, a local oscillator (LO) is an electronic oscillator used with a mixer to change the frequency of a signal. This frequency conversion process, also called heterodyning, produces the sum and difference frequencies from the frequency of the local oscillator and frequency of the input signal. Processing a signal at a fixed frequency gives a radio receiver improved performance.
In many receivers, the function of local oscillator and mixer is combined in one stage called a "converter" - this reduces the space, cost, and power consumption by combining both functions into one active device.
Applications
Local oscillators are used in the superheterodyne receiver, the most common type of radio receiver circuit. They are also used in many other communications circuits such as modems, cable television set top boxes, frequency division multiplexing systems used in telephone trunklines, microwave relay systems, telemetry systems, atomic clocks, radio telescopes, and military electronic countermeasure (antijamming) systems.
In satellite television reception, the microwave frequencies used from the satellite down to the receiving antenna are converted to lower frequencies by a local oscillator and mixer mounted at the antenna. This allows the received signals to be sent over a length of cable that would otherwise have unacceptable signal loss at the original reception frequency. In this application, the local oscillator is of a fixed frequency and the down-converted signal frequency is variable.
Performance requirements
Application of local oscillators in a receiver design requires care to ensure no spurious signals are radiated. Such signals can cause interference in the operation of other receivers.
The performance of a signal processing system depends on the characteristics of the local oscillator. The local oscillator must produce a stable frequency with low harmonics. Stability must take into account temperature, voltage, and mechanical drift as factors |
https://en.wikipedia.org/wiki/Reversible%20inhibition%20of%20sperm%20under%20guidance | Reversible inhibition of sperm under guidance (RISUG), formerly referred to as the synthetic polymer styrene maleic anhydride (SMA), is the development name of a male contraceptive injection developed at IIT Kharagpur in India by the team of Dr. Sujoy K. Guha.
RISUG has been patented in India, China, Bangladesh, and the United States. Phase III clinical trials were underway in India, and were slowed by insufficient volunteers.
Beginning in 2011, a contraceptive product based on RISUG, Vasalgel, was under development in the US by Parsemus Foundation. In 2023, the patent for Vasalgel was acquired by NEXT Life Sciences, Inc., which plans to bring the technology to market under the name Plan A for Men.
Development
Sujoy K. Guha developed RISUG after years of developing other inventions. He originally wanted to create an artificial heart that could pump blood using a strong electrical pulse. Using the 13-chamber model of a cockroach heart, he designed a softer pumping mechanism that would theoretically be safe to use in humans. As India's population grew throughout the 1970s, Guha modified his heart pump design to create a water pump that could work off of differences in ionic charges between salt water and fresh water in water treatment facilities. This filtration system did not require electricity and could potentially help large groups of people have access to clean water. India, however, decided that the population problem would be better served by developing more effective contraception. So Guha again modified his design to work safely inside the body, specifically inside the male genitalia. The non-toxic polymer of RISUG also uses differences in the charges of the semen to rupture the sperm as it flows through the vas deferens.
Intellectual property rights to RISUG in the United States were acquired between 2010 and 2012 by the Parsemus Foundation, a not-for-profit organization, which has branded it as "Vasalgel". Vasalgel, which has a slightly different formu |
https://en.wikipedia.org/wiki/Male%20contraceptive | Male contraceptives, also known as male birth control, are methods of preventing pregnancy by leveraging male physiology. Globally, the most common forms of male contraceptives include condoms, vasectomy, and withdrawal. Men are largely limited to these forms of contraception, and combined, male contraceptives make up less than one-third of total contraceptive use.
Novel forms of male contraception are in clinical and nonclinical stages of research and development, however, none have reached regulatory approval for widespread use. Studies of men indicate that around half of survey populations are interested using a novel contraceptive method, and they display interest in a wide variety of contraceptive methods including hormonal and non-hormonal pills, gels, and implants.
Currently available methods
Vasectomy
Vasectomy is surgical procedure for permanent male sterilization usually performed in a physician's office in an outpatient procedure. During the procedure, the vasa deferentia of a patient are severed, and then tied or sealed to prevent the transport of sperm through the reproductive tract and thereby causing a pregnancy. Vasectomy is an effective procedure, with less than 0.15% of partners becoming pregnant within the first 12 months after the procedure. Vasectomy is also a widely reliable and safe method of contraception, and complications are both rare and minor. However, due to the presence of sperm retained beyond the blocked vasa deferentia, vasectomies are not initially effective and the remaining sperm must be cleared through ejaculation and / or time. Vasectomies can be reversed, though rates of successful reversal are variable, and the procedure is often costly.
Condoms
A condom is a sheathed barrier device that is rolled onto an erect penis before intercourse and retains ejaculated semen, thereby preventing pregnancy. Condoms are marginally effective when compared to vasectomy or modern methods of contraception for women, and have a typical-u |
https://en.wikipedia.org/wiki/American%20Council%20of%20Learned%20Societies | The American Council of Learned Societies (ACLS) is a private, nonprofit federation of 75 scholarly organizations in the humanities and related social sciences founded in 1919. It is best known for its fellowship competitions which provide a range of opportunities for scholars in the humanities and related social sciences at all career stages, from graduate students to distinguished professors to independent scholars, working with a number of disciplines and methodologies in the U.S. and abroad.
Background
The federation was created in 1919 to represent the United States in the Union Académique Internationale (International Union of Academies). The founders of ACLS, representatives of 13 learned societies, believed that a federation of scholarly organizations (dedicated to excellence in research, and most with open membership) was the best combination of U.S. democracy and intellectual aspirations. According to the council's constitution, its mission was advancing humanistic studies and social sciences and maintaining and strengthening national societies dedicated to those studies.
Advancing scholarship in the humanities
Since its founding, ACLS has provided the humanities and related social sciences with leadership, opportunities for innovation, and national and international representation. The council's many activities have at their core the practice of scholarly self-governance. Central to ACLS throughout its history have been its programs of fellowships and grants aiding research. ACLS made its first grants, totaling $4,500, in 1926; in 2012, ACLS awarded over $15 million in fellowship stipends and other awards to more than 320 scholars in the United States and abroad. All ACLS awards are made through rigorous peer review by specially appointed committees of scholars from throughout the United States and, in some programs, abroad. During the late 1950s, the council encouraged Hans Wehr in his writing of the first English edition of his Dictionary of Modern Wr |
https://en.wikipedia.org/wiki/Cephalic%20vein | In human anatomy, the cephalic vein is a superficial vein in the arm. It originates from the radial end of the dorsal venous network of hand, and ascends along the radial (lateral) side of the arm before emptying into the axillary vein. At the elbow, it communicates with the basilic vein via the median cubital vein.
Anatomy
The cephalic vein is situated within the superficial fascia along the anterolateral surface of the biceps.
Origin
The cephalic vein forms over the anatomical snuffbox at the radial end of the dorsal venous network of hand.
Course and relations
From its origin, it ascends up the lateral aspect of the radius.
Near the shoulder, the cephalic vein passes between the deltoid and pectoralis major muscles (deltopectoral groove) through the clavipectoral triangle, where it empties into the axillary vein.
Anastomoses
It communicates with the basilic vein via the median cubital vein at the elbow.
Clinical significance
The cephalic vein is often visible through the skin, and its location in the deltopectoral groove is fairly consistent, making this site a good candidate for venous access. Permanent pacemaker leads are often placed in the cephalic vein in the deltopectoral groove. The vein may be used for intravenous access, as large bore cannula may be easily placed. However, the cannulation of a vein as close to the radial nerve as the cephalic vein can sometimes lead to nerve damage.
History
Ordinarily the term cephalic refers to anatomy of the head. When the Persian Muslim physician Ibn Sīnā's Canon was translated into medieval Latin, cephalic was mistakenly chosen to render the Arabic term al-kífal, meaning "outer".
Additional images
See also
Basilic vein
Median cubital vein |
https://en.wikipedia.org/wiki/Er%3AYAG%20laser | An Er:YAG laser (erbium-doped yttrium aluminium garnet laser, erbium YAG laser) is a solid-state laser whose active laser medium is erbium-doped yttrium aluminium garnet (Er:Y3Al5O12). Er:YAG lasers typically emit light with a wavelength of 2940 nm, which is infrared light.
Applications
The output of an Er:YAG laser is strongly absorbed by water. As a result, they are widely used for medical procedures in which deep penetration of tissues is not desired.
Erbium-YAG lasers have been used for laser resurfacing of human skin. Example uses include treating acne scarring, deep rhytides, and melasma. In addition to being absorbed by water, the output of Er:YAG lasers is also absorbed by hydroxyapatite, which makes it a good laser for cutting bone as well as soft tissue. Bone surgery applications have been found in oral surgery, dentistry, implant dentistry, and otolaryngology. Er:YAG lasers are safer for the removal of warts than carbon dioxide lasers, because human papillomavirus (HPV) DNA is not found in the laser plume. Er:YAG lasers can be used in laser aided cataract surgery but owing to its water absorbable nature Nd:YAG is preferred more.
Erbium YAG dental lasers are effective for removing tooth decay atraumatically, often without the need for local anesthetic to numb the tooth. Eliminating the vibration of the dental drill removes the risk of causing microfractures in the tooth. When used initially at low power settings, the laser energy has a sedative effect on the nerve, resulting in the ability to subsequently increase the power without creating the sensation of pain in the tooth. |
https://en.wikipedia.org/wiki/Microcytic%20anemia | Microcytic anaemia is any of several types of anemia characterized by smaller than normal red blood cells (called microcytes). The normal mean corpuscular volume (abbreviated to MCV on full blood count results, and also known as mean cell volume) is approximately 80–100 fL. When the MCV is <80 fL, the red cells are described as microcytic and when >100 fL, macrocytic (the latter occurs in macrocytic anemia). The MCV is the average red blood cell size.
In microcytic anemia, the red blood cells (erythrocytes) contain less hemoglobin and are usually also hypochromic, meaning that the red blood cells appear paler than usual. This can be reflected by a low mean corpuscular hemoglobin concentration (MCHC), a measure representing the amount of hemoglobin per unit volume of fluid inside the cell; normally about 320–360 g/L or 32–36 g/dL. Typically, therefore, anemia of this category is described as "microcytic, hypochromic anemia".
Causes
Typical causes of microcytic anemia include:
Childhood
Iron deficiency anemia by far the most common cause of anemia in general and of microcytic anemia in particular
Thalassemia
Adulthood
Iron deficiency anemia
Thalassemia
Anemia of chronic disease
Rare hereditary causes of microcytic anemia include sideroblastic anemia and other X-linked anemias, hereditary hypotransferrinemia, hereditary aceruloplasminemia, erythropoietic protoporphyria, iron-refractory iron deficiency anemia, and other thalassemic mutations (such as hemoglobin E and hemoglobin Lepore syndrome).
Rare acquired causes of microcytic anemia include lead poisoning, zinc deficiency, copper deficiency, alcohol, and certain medications.
Other causes that are typically thought of as causing normocytic anemia or macrocytic anemia must also be considered, as the presence of two or more causes of anemia can distort the typical picture.
Iron-Deficiency Anemia
Nearly half of all anemia cases are due to iron deficiency as it is the most common nutritional disorder. Alth |
https://en.wikipedia.org/wiki/Moving-knife%20procedure | In the mathematics of social science, and especially game theory, a moving-knife procedure is a type of solution to the fair division problem. The canonical example is the division of a cake using a knife.
The simplest example is a moving-knife equivalent of the I cut, you choose scheme, first described by A.K.Austin as a prelude to his own procedure:
One player moves the knife across the cake, conventionally from left to right.
The cake is cut when either player calls "stop".
If each player calls stop when he or she perceives the knife to be at the 50-50 point, then the first player to call stop will produce an envy-free division if the caller gets the left piece and the other player gets the right piece.
(This procedure is not necessarily efficient.)
Generalizing this scheme to more than two players cannot be done by a discrete procedure without sacrificing envy-freeness.
Examples of moving-knife procedures include
The Stromquist moving-knives procedure
The Austin moving-knife procedures
The Levmore–Cook moving-knives procedure
The Robertson–Webb rotating-knife procedure
The Dubins–Spanier moving-knife procedure
The Webb moving-knife procedure |
https://en.wikipedia.org/wiki/Virtual%20IP%20address | A virtual IP address (VIP or VIPA) is an IP address that does not correspond to a physical network interface. Uses for VIPs include network address translation (especially, one-to-many NAT), fault-tolerance, and mobility.
Usage
For one-to-many NAT, a VIP address is advertised from the NAT device (often a router), and incoming data packets destined to that VIP address are routed to different actual IP addresses (with address translation). These VIP addresses have several variations and implementation scenarios, including Common Address Redundancy Protocol (CARP) and Proxy ARP. In addition, if there are multiple actual IP addresses, load balancing can be performed as part of NAT.
VIP addresses are also used for connection redundancy by providing alternative fail-over options for one machine. For this to work, the host has to run an interior gateway protocol like Open Shortest Path First (OSPF), and appear as a router to the rest of the network. It advertises virtual links connected via itself to all of its actual network interfaces. If one network interface fails, normal OSPF topology reconvergence will cause traffic to be sent via another interface.
A VIP address can be used to provide nearly unlimited mobility. For example, if an application has an IP address on a physical subnet, that application can be moved only to a host on that same subnet. VIP addresses can be advertised on their own subnet, so its application can be moved anywhere on the reachable network without changing addresses.
See also
Anycast, single IP bound simultaneously to many, potentially geographically disparate, NICs
IP network multipathing (IPMP), Solaris virtual IP implementation for fault-tolerance and load balancing
VLAN
Notes |
https://en.wikipedia.org/wiki/Envy-free%20cake-cutting | An envy-free cake-cutting is a kind of fair cake-cutting. It is a division of a heterogeneous resource ("cake") that satisfies the envy-free criterion, namely, that every partner feels that their allocated share is at least as good as any other share, according to their own subjective valuation.
When there are only two partners, the problem is easy and was solved in antiquity by the divide and choose protocol. When there are three or more partners, the problem becomes much more challenging.
Two major variants of the problem have been studied:
Connected pieces, e.g. if the cake is a 1-dimensional interval then each partner must receive a single sub-interval. If there are partners, only cuts are needed.
General pieces, e.g. if the cake is a 1-dimensional interval then each partner can receive a union of disjoint sub-intervals.
Short history
Modern research into the fair cake-cutting problem started in the 1940s. The first fairness criterion studied was proportional division, and a procedure for n partners was soon found.
The stronger criterion of envy-freeness was introduced into the cake-cutting problem by George Gamow and Marvin Stern in 1950s.
A procedure for three partners and general pieces was found in 1960. A procedure for three partners and connected pieces was found only in 1980.
Envy-free division for four or more partners had been an open problem until the 1990s, when three procedures for general pieces and a procedure for connected pieces were published. All these procedures are unbounded - they may require a number of steps which is not bounded in advance. The procedure for connected pieces may even require an infinite number of steps.
Two lower bounds on the run-time complexity of envy-freeness were published in the 2000s.
For general pieces, the lower bound is Ω(n2).
For connected pieces the lower bound is infinity – there is provably no finite protocol for three or more partners.
In the 2010s, several approximation procedures and proce |
https://en.wikipedia.org/wiki/Bankruptcy%20problem | A bankruptcy problem, also called a claims problem, is a problem of distributing a homogeneous divisible good (such as money) among people with different claims. The focus is on the case where the amount is insufficient to satisfy all the claims.
The canonical application is a bankrupt firm that is to be liquidated. The firm owes different amounts of money to different creditors, but the total worth of the company's assets is smaller than its total debt. The problem is how to divide the scarce existing money among the creditors.
Another application would be the division of an estate amongst several heirs, particularly when the estate cannot meet all the deceased's commitments.
A third application is tax assessment. One can consider the claimants as taxpayers, the claims as the incomes, and the endowment as the total after-tax income. Determining the allocation of total after-tax income is equivalent to determining the allocation of tax payments.
Definitions
The amount available to divide is denoted by (=Estate or Endowment). There are n claimants. Each claimant i has a claim denoted by .
It is assumed that , that is, the total claims are (weakly) larger than the estate.
A division rule is a function that maps a problem instance to a vector such that and for all i. That is: each claimant receives at most its claim, and the sum of allocations is exactly the estate E.
Generalizations
There are generalized variants in which the total claims might be smaller than the estate. In these generalized variants, is not assumed and is not required.
Another generalization, inspired by realistic bankruptcy problems, is to add an exogeneous priority ordering among the claimants, that may be different even for claimants with identical claims. This problem is called a claims problem with priorities. Another variant is called a claims problem with weights.
Rules
There are various rules for solving bankruptcy problems in practice.
The proportional rule divide |
https://en.wikipedia.org/wiki/Mark%20Dean%20%28computer%20scientist%29 | Mark E. Dean (born March 2, 1957) is an American inventor and computer engineer. He developed the ISA bus, and he led a design team for making a one-gigahertz computer processor chip. He holds three of nine PC patents for being the co-creator of the IBM personal computer released in 1981. In 1995, Dean was named the first ever African-American IBM Fellow.
Dean was elected as a member into the National Academy of Engineering in 2001 for innovative and pioneering contributions to personal computer development.
In 2000, Mark discussed a hand held device that would be able to display media content, like a digital newspaper. In August 2011, Dean stated that he uses a tablet computer instead of a PC in his blog.
Early life
Dean was born in Jefferson City, Tennessee. Dean displayed an affinity for technology and invention at a young age. His father, James, worked with electrical equipment for turbines and spillways. James would often bring Mark with him on work trips, introducing him to engineering. When Mark was young, he and his dad constructed a tractor from scratch. In middle school, Mark had made up his mind on becoming a computer engineer. Dean attended Jefferson City High School in Tennessee, where he excelled in both academics and athletics. While in high school, during the 1970s, Mark built his own personal computer.
Recognition
Dean is the first African-American to become an IBM Fellow, which is the highest level of technical excellence at the company. In 1997, he was inducted into the National Inventors Hall of Fame. He was elected to the National Academy of Engineering in 2001. In 1997, Dean was awarded the Black Engineer of the Year Presidents Award. From August 2018 to July 2019, Dean was the interim dean of the UT's Tickle College of Engineering.
As of April 26, 2019, April 25 is now officially Mark Dean Day in Knox County, Tennessee.
Career
Mark graduated with a bachelor's degree in electrical engineering during 1979. Soon after, Mark got a job at |
https://en.wikipedia.org/wiki/Number%20density | The number density (symbol: n or ρN) is an intensive quantity used to describe the degree of concentration of countable objects (particles, molecules, phonons, cells, galaxies, etc.) in physical space: three-dimensional volumetric number density, two-dimensional areal number density, or one-dimensional linear number density. Population density is an example of areal number density. The term number concentration (symbol: lowercase n, or C, to avoid confusion with amount of substance indicated by uppercase N) is sometimes used in chemistry for the same quantity, particularly when comparing with other concentrations.
Definition
Volume number density is the number of specified objects per unit volume:
where N is the total number of objects in a volume V.
Here it is assumed that N is large enough that rounding of the count to the nearest integer does not introduce much of an error, however V is chosen to be small enough that the resulting n does not depend much on the size or shape of the volume V because of large-scale features.
Area number density is the number of specified objects per unit area, A:
Similarly, linear number density is the number of specified objects per unit length, L:
Column number density is a kind of areal density, the number or count of a substance per unit area, obtained integrating volumetric number density along a vertical path:
It's related to column mass density, with the volumetric number density replaced by the volume mass density.
Units
In SI units, number density is measured in m−3, although cm−3 is often used. However, these units are not quite practical when dealing with atoms or molecules of gases, liquids or solids at room temperature and atmospheric pressure, because the resulting numbers are extremely large (on the order of 1020). Using the number density of an ideal gas at and as a yardstick: is often introduced as a unit of number density, for any substances at any conditions (not necessarily limited to an ideal gas at |
https://en.wikipedia.org/wiki/ISO%2019092-2 | ISO 19092 Financial Services - Biometrics - Part 2: Message syntax and cryptographic requirements is an ISO standard that describes the techniques, protocols, cryptographic requirements, and syntax for using biometrics as an identification and verification mechanism in a wide variety of security applications in the financial industry. This standard provides support for policy based matching decisions for remote authentication and allows biometrics to be used securely with the ISO 8583 retail transaction messaging standard. A secure review and audit event journal syntax is provided that allows many of the security controls specified in ISO 19092-1 to be implemented.
Cryptography standards
19092-2 |
https://en.wikipedia.org/wiki/Maceration%20%28bone%29 | Maceration is a bone preparation technique whereby a clean skeleton is obtained from a vertebrate carcass by leaving it to decompose inside a closed container at near-constant temperature. This may be done as part of a forensic investigation, as a recovered body is too badly decomposed for a meaningful autopsy, but with enough flesh or skin remaining as to obscure macroscopically visible evidence, such as cut-marks. In most cases, maceration is done on the carcass of an animal for educational purposes.
Description
Maceration is a form of controlled putrefaction, a stage of decomposition in which the proteins of the body's cells are broken down and consumed by bacteria in anaerobic conditions. The temperature is usually maintained at a constant optimal temperature in an incubator. Maceration generates very strong and distasteful odors, and is therefore usually done in a closed container in a ventilated area.
Maceration is an alternative to the Dermestes method in which skin beetles are used to clean the flesh off of the corpse, a method which is used with corpses of small mammals, birds, reptiles, and amphibians, because these animals' bones tend to fall apart in many tiny parts. Maceration is an unsuitable method to clean the bones of a fish, as they have a poorly articulated, pliable skeleton.
Process
In the process of maceration, the carcass is first skinned and defleshed by hand as much as is practical, and all internal organs are removed. In this process, extra care is taken when removing the eyeballs, ears and jugular muscles, because some bones are shallow and brittle, such as the thickened external acoustic opening of many mammals. The tongue is usually left in place, because of its attachment to the hyoid bone. Severed parts of the carcass are sometimes kept in nylon pantyhose. Water is then put in a container and maintained a constant temperature, usually 35 °C though not warmer than 50 °C. Washing powder with enzymes (like Biotex) may be added, as |
https://en.wikipedia.org/wiki/Information%20flow%20%28information%20theory%29 | Information flow in an information theoretical context is the transfer of information from a variable to a variable in a given process. Not all flows may be desirable; for example, a system should not leak any confidential information (partially or not) to public observers—as it is a violation of privacy on an individual level, or might cause major loss on a corporate level.
Introduction
Securing the data manipulated by computing systems has been a challenge in the past years. Several methods to limit the information disclosure exist today, such as access control lists, firewalls, and cryptography. However, although these methods do impose limits on the information that is released by a system, they provide no guarantees about information propagation. For example, access control lists of file systems prevent unauthorized file access, but they do not control how the data is used afterwards. Similarly, cryptography provides a means to exchange information privately across a non-secure channel, but no
guarantees about the confidentiality of the data are given once it is decrypted.
In low level information flow analysis, each variable is usually assigned a security level. The basic model comprises two distinct levels: low and high, meaning, respectively, publicly observable information, and secret information. To ensure confidentiality, flowing information from high to low variables should not be allowed. On the other hand, to ensure integrity, flows to high variables should be restricted.
More generally, the security levels can be viewed as a lattice with information flowing only upwards in the lattice.
For example, considering two security levels and (low and high), if , flows from to , from to , and to would be allowed, while flows from to would not.
Throughout this article, the following notation is used:
variable (low) shall denote a publicly observable variable
variable (high) shall denote a secret variable
Where and are the only two securi |
https://en.wikipedia.org/wiki/Central%20binomial%20coefficient | In mathematics the nth central binomial coefficient is the particular binomial coefficient
They are called central since they show up exactly in the middle of the even-numbered rows in Pascal's triangle. The first few central binomial coefficients starting at n = 0 are:
, , , , , , 924, 3432, 12870, 48620, ...;
Combinatorial interpretations and other properties
The central binomial coefficient is the number of arrangements where there are an equal number of two types of objects. For example, when , the binomial coefficient is equal to 6, and there are six arrangements of two copies of A and two copies of B: AABB, ABAB, ABBA, BAAB, BABA, BBAA.
The same central binomial coefficient is also the number of words of length 2n made up of A and B where there are never more B than A at any point as one reads from left to right. For example, when , there are six words of length 4 in which each prefix has at least as many copies of A as of B: AAAA, AAAB, AABA, AABB, ABAA, ABAB.
The number of factors of 2 in is equal to the number of 1s in the binary representation of n. As a consequence, 1 is the only odd central binomial coefficient.
Generating function
The ordinary generating function for the central binomial coefficients is
This can be proved using the binomial series and the relation
where is a generalized binomial coefficient.
The central binomial coefficients have exponential generating function
where I0 is a modified Bessel function of the first kind.
The generating function of the squares of the central binomial coefficients can be written in terms of the complete elliptic integral of the first kind:
Asymptotic growth
Simple bounds that immediately follow from are
The asymptotic behavior can be described more precisely:
Related sequences
The closely related Catalan numbers Cn are given by:
A slight generalization of central binomial coefficients is to take them as
, with appropriate real numbers n, where is the gamma function and is the |
https://en.wikipedia.org/wiki/Pascal%27s%20rule | In mathematics, Pascal's rule (or Pascal's formula) is a combinatorial identity about binomial coefficients. It states that for positive natural numbers n and k,
where is a binomial coefficient; one interpretation of the coefficient of the term in the expansion of . There is no restriction on the relative sizes of and , since, if the value of the binomial coefficient is zero and the identity remains valid.
Pascal's rule can also be viewed as a statement that the formula
solves the linear two-dimensional difference equation
over the natural numbers. Thus, Pascal's rule is also a statement about a formula for the numbers appearing in Pascal's triangle.
Pascal's rule can also be generalized to apply to multinomial coefficients.
Combinatorial proof
Pascal's rule has an intuitive combinatorial meaning, that is clearly expressed in this counting proof.
Proof. Recall that equals the number of subsets with k elements from a set with n elements. Suppose one particular element is uniquely labeled X in a set with n elements.
To construct a subset of k elements containing X, include X and choose k − 1 elements from the remaining n − 1 elements in the set. There are such subsets.
To construct a subset of k elements not containing X, choose k elements from the remaining n − 1 elements in the set. There are such subsets.
Every subset of k elements either contains X or not. The total number of subsets with k elements in a set of n elements is the sum of the number of subsets containing X and the number of subsets that do not contain X, .
This equals ; therefore, .
Algebraic proof
Alternatively, the algebraic derivation of the binomial case follows.
Generalization
Pascal's rule can be generalized to multinomial coefficients. For any integer p such that , and ,
where is the coefficient of the term in the expansion of .
The algebraic derivation for this general case is as follows. Let p be an integer such that , and . Then
See also
Pascal's triangle
|
https://en.wikipedia.org/wiki/Spherically%20symmetric%20spacetime | In physics, spherically symmetric spacetimes are commonly used to obtain analytic and numerical solutions to Einstein's field equations in the presence of radially moving matter or energy. Because spherically symmetric spacetimes are by definition irrotational, they are not realistic models of black holes in nature. However, their metrics are considerably simpler than those of rotating spacetimes, making them much easier to analyze.
Spherically symmetric models are not entirely inappropriate: many of them have Penrose diagrams similar to those of rotating spacetimes, and these typically have qualitative features (such as Cauchy horizons) that are unaffected by rotation. One such application is the study of mass inflation due to counter-moving streams of infalling matter in the interior of a black hole.
Formal definition
A spherically symmetric spacetime is a spacetime whose isometry group contains a subgroup which is isomorphic to the rotation group SO(3) and the orbits of this group are 2-spheres (ordinary 2-dimensional spheres in 3-dimensional Euclidean space). The isometries are then interpreted as rotations and a spherically symmetric spacetime is often described as one whose metric is "invariant under rotations". The spacetime metric induces a metric on each orbit 2-sphere (and this induced metric must be a multiple of the metric of a 2-sphere). Conventionally, the metric on the 2-sphere is written in polar coordinates as
,
and so the full metric includes a term proportional to this.
Spherical symmetry is a characteristic feature of many solutions of Einstein's field equations of general relativity, especially the Schwarzschild solution and the Reissner–Nordström solution. A spherically symmetric spacetime can be characterised in another way, namely, by using the notion of Killing vector fields, which, in a very precise sense, preserve the metric. The isometries referred to above are actually local flow diffeomorphisms of Killing vector fields and thus |
https://en.wikipedia.org/wiki/Lazy%20Jones | Lazy Jones is a platform game for the Commodore 64, ZX Spectrum, MSX and Tatung Einstein. It was written by David Whittaker and released by Terminal Software in 1984. The Spectrum version was ported by Simon Cobb.
Lazy Jones is a collection of fifteen sub-games. The game takes place inside a hotel with three floors, connected by an elevator. The character is a lazy hotel employee who does not much care for his work, but prefers to sneak into the rooms to play video games instead.
Gameplay
The main screen in Lazy Jones is the hotel interior. There, the character can use the elevator to travel freely between the three floors, but he must watch out for enemies: the current hotel manager on the top floor, the ghost of the previous manager on the bottom floor, and a haunted cleaning cart on the middle floor. The enemies only walk around and do not pursue the character, but contact with them is fatal.
Each floor has six rooms, three on each side of the elevator. Each room can be entered once. Inside most rooms is a video game, which the character immediately begins playing. As well as the video games, there is the hotel bar, a bed, a cleaning closet and a toilet. The bar works like a video game, but the other rooms are useless decorations (intentionally added, because Whittaker had run out of ideas for new games).
When all rooms have been visited, the game starts over again, but increasingly faster each time.
The sub-games are generally simplified versions of 1970s and 1980s video games, such as Space Invaders, Frogger, Snake, H.E.R.O., Breakout or Chuckie Egg. Their plots and gameplay are very simple, and in most of them the player simply must avoid incoming enemies long enough to score many points. In some, the player must shoot enemies to score points.
Each sub-game has a time limit. In some sub-games it is possible to "die", thus ending the sub-game prematurely, while others only end after the time limit expires. But this also depends on the portrayed game vers |
https://en.wikipedia.org/wiki/TILLING%20%28molecular%20biology%29 | TILLING (Targeting Induced Local Lesions in Genomes) is a method in molecular biology that allows directed identification of mutations in a specific gene. TILLING was introduced in 2000, using the model plant Arabidopsis thaliana, and expanded on into other uses and methodologies by a small group of scientists including Luca Comai. TILLING has since been used as a reverse genetics method in other organisms such as zebrafish, maize, wheat, rice, soybean, tomato and lettuce.
Overview
The method combines a standard and efficient technique of mutagenesis using a chemical mutagen such as ethyl methanesulfonate (EMS) with a sensitive DNA screening-technique that identifies single base mutations (also called point mutations) in a target gene. The TILLING method relies on the formation of DNA heteroduplexes that are formed when multiple alleles are amplified by PCR and are then heated and slowly cooled. A “bubble” forms at the mismatch of the two DNA strands, which is then cleaved by a single stranded nuclease. The products are then separated by size on several different platforms (see below).
Mismatches may be due to induced mutation, heterozygosity within an individual, or natural variation between individuals.
EcoTILLING is a method that uses TILLING techniques to look for natural mutations in individuals, usually for population genetics analysis. DEcoTILLING is a modification of TILLING and EcoTILLING which uses an inexpensive method to identify fragments. Since the advent of NGS sequencing technologies, TILLING-by-sequencing has been developed based on Illumina sequencing of target genes amplified from multidimensionally pooled templates to identify possible single-nucleotide changes.
Single strand cleavage enzymes
There are several sources for single strand nucleases. The first widely used enzyme was mung bean nuclease, but this nuclease has been shown to have high non-specific activity, and only works at low pH, which can degrade PCR products and dye-la |
https://en.wikipedia.org/wiki/Sentence%20%28mathematical%20logic%29 | In mathematical logic, a sentence (or closed formula) of a predicate logic is a Boolean-valued well-formed formula with no free variables. A sentence can be viewed as expressing a proposition, something that must be true or false. The restriction of having no free variables is needed to make sure that sentences can have concrete, fixed truth values: as the free variables of a (general) formula can range over several values, the truth value of such a formula may vary.
Sentences without any logical connectives or quantifiers in them are known as atomic sentences; by analogy to atomic formula. Sentences are then built up out of atomic formulas by applying connectives and quantifiers.
A set of sentences is called a theory; thus, individual sentences may be called theorems. To properly evaluate the truth (or falsehood) of a sentence, one must make reference to an interpretation of the theory. For first-order theories, interpretations are commonly called structures. Given a structure or interpretation, a sentence will have a fixed truth value. A theory is satisfiable when it is possible to present an interpretation in which all of its sentences are true. The study of algorithms to automatically discover interpretations of theories that render all sentences as being true is known as the satisfiability modulo theories problem.
Example
For the interpretation of formulas, consider these structures: the positive real numbers, the real numbers, and complex numbers. The following example in first-order logic
a sentence. This sentence means that for every y, there is an x such that This sentence is true for positive real numbers, false for real numbers, and true for complex numbers.
However, the formula
is a sentence because of the presence of the free variable y. For real numbers, this formula is true if we substitute (arbitrarily) but is false if
It is the presence of a free variable, rather than the inconstant truth value, that is important; for example, |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.