source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/MAJC | MAJC (Microprocessor Architecture for Java Computing) was a Sun Microsystems multi-core, multithreaded, very long instruction word (VLIW) microprocessor design from the mid-to-late 1990s. Originally called the UltraJava processor, the MAJC processor was targeted at running Java programs, whose "late compiling" allowed Sun to make several favourable design decisions. The processor was released into two commercial graphical cards from Sun. Lessons learned regarding multi-threads on a multi-core processor provided a basis for later OpenSPARC implementations such as the UltraSPARC T1.
Design elements
Move instruction scheduling to the compiler
Like other VLIW designs, notably Intel's IA-64 (Itanium), MAJC attempted to improve performance by moving several expensive operations out of the processor and into the related compilers. In general, VLIW designs attempt to eliminate the instruction scheduler, which often represents a relatively large amount of the overall processor's transistor budget. With this portion of the CPU removed to software, those transistors can be used for other purposes, often to add additional functional units to process more instructions at once, or to increase the amount of cache memory to reduce the amount of time spent waiting for data to arrive from the much slower main memory. Although MAJC shared these general concepts, it was unlike other VLIW designs, and processors in general, in a number of specific details.
Generalized functional units
Most processors include a number of separate "subprocessors" known as functional units that are tuned to operating on a particular type of data. For instance, a modern CPU typically has two or three functional units dedicated to processing integer data and logic instructions, known as ALUs, while other units handle floating-point numbers, the FPUs, or multimedia data, SIMD. MAJC instead used a single multi-purpose functional unit which could process any sort of data. In theory this approach meant t |
https://en.wikipedia.org/wiki/The%20Geography%20of%20Thought | The Geography of Thought: How Asians and Westerners Think Differently...and Why is a book by social psychologist Richard Nisbett that was published by Free Press in 2003. By analyzing the differences between Asia and the West, it argues that cultural differences affect people's thought processes more significantly than believed.
Thesis
In the book, Nisbett demonstrates that "people actually think about—and even see—the world differently because of differing ecologies, social structures, philosophies, and educational systems that date back to ancient Greece and China". At its core, the book assumes that human behavior is not “hard-wired” but a function of culture.
The book proposes that the passion for strong ontology and scientific rationality based on forward chaining from axioms is essentially a "Western" phenomenon. Ancient Greece's passion for abstract categories into which the entire world can be taxonomically arranged, he claims, is prototypically Western, as is the notion of causality.
In other words, he claims that the law of the excluded middle is not applied in Chinese thought, and that a different standard applies. This has been described by other thinkers as being hermeneutic reasonableness.
Implications
There are several implications to Nisbett's theory. For instance, in law, Eastern and Western cultures assign different priorities to, and roles of, the law in society. The ratio of lawyers to engineers is forty times higher in the US than in Japan. Moreover, the role of US lawyers is, generally, to handle legal confrontations, and the aim is demands for justice with a clear winner and loser based upon universal principles of justice that apply equally to everyone. In contrast, Eastern lawyers are more often used as intermediaries to reduce hostilities, and reach a compromise; the principles they operate by are more flexible and circumstantial.
Another aspect where there is great divergence between these two systems of thought concerns human rights. |
https://en.wikipedia.org/wiki/Median%20filter | The median filter is a non-linear digital filtering technique, often used to remove noise from an image or signal. Such noise reduction is a typical pre-processing step to improve the results of later processing (for example, edge detection on an image). Median filtering is very widely used in digital image processing because, under certain conditions, it preserves edges while removing noise (but see the discussion below), also having applications in signal processing.
Algorithm description
The main idea of the median filter is to run through the signal entry by entry, replacing each entry with the median of neighboring entries. The pattern of neighbors is called the "window", which slides, entry by entry, over the entire signal. For one-dimensional signals, the most obvious window is just the first few preceding and following entries, whereas for two-dimensional (or higher-dimensional) data the window must include all entries within a given radius or ellipsoidal region (i.e. the median filter is not a separable filter).
Worked one-dimensional example
To demonstrate, using a window size of three with one entry immediately preceding and following each entry, a median filter will be applied to the following simple one-dimensional signal:
x = (2, 3, 80, 6, 2, 3).
So, the median filtered output signal y will be:
y1 = med(2, 3, 80) = 3, (already 2, 3, and 80 are in the increasing order so no need to arrange them)
y2 = med(3, 80, 6) = med(3, 6, 80) = 6, (3, 80, and 6 are rearranged to find the median)
y3 = med(80, 6, 2) = med(2, 6, 80) = 6,
y4 = med(6, 2, 3) = med(2, 3, 6) = 3,
i.e. y = (3, 6, 6, 3).
Boundary issues
When implementing a median filter, the boundaries of the signal must be handled with special care, as there are not enough entries to fill an entire window. There are several schemes that have different properties that might be preferred in particular circumstances:
When calculating the median of a value near the boundary, missing values are f |
https://en.wikipedia.org/wiki/Intermediate%20film%20system | The intermediate film system was a television process in which motion picture film was processed almost immediately after it was exposed in a camera, then scanned by a television scanner, and transmitted over the air. This system was used principally in Britain and Germany where television cameras were not sensitive enough to use reflected light, but could transmit a suitable image when a bright light was shone through motion picture film directly into the camera lens. John Logie Baird began developing the process in 1932, borrowing the idea of Georg Oskar Schubert from his licensees in Germany, where it was demonstrated by Fernseh AG in 1932 and used for broadcasting in 1934. The BBC used Baird's version of the process during the first three months of its then-"high-definition" television service from November 1936 through January 1937, and German television used it during broadcasts of the 1936 Summer Olympics. In both cases, intermediate film cameras alternated with newly introduced direct television cameras.
The exposed film, either 35mm or 17.5mm (35mm split in half, to save expense), travelled in a continuous band from the camera, usually atop a remote broadcast vehicle, into a machine that developed and fixed the image. The film was then run through a flying spot scanner (so called because it moved a focused beam of light back and forth across the image), and electronically converted from a negative to a positive image. Depending on the equipment, the time from camera to scanner could be a minute or less. An optical soundtrack was recorded onto the film, between the perforations and the edge of the film, at the same time the image was taken to keep the sound and image in synchronization.
The intermediate film system, with its expensive film usage and relatively immobile cameras, did have the advantage that it left a filmed record of the programme which could be rerun at a different time, with a better image quality than the later kinescope films, which were |
https://en.wikipedia.org/wiki/MacMach | MacMach is a computer operating system from the early 1990s, developed by Carnegie Mellon University. Architecturally, it consists of Berkeley Software Distribution (BSD) 4.3 code running on the Mach microkernel, with the Apple Macintosh System 7 running experimentally as a Mach task. The entire system runs on Macintoshes based on the Motorola 68000 series (68k) family of microprocessors. Its license requires the user to have an AT&T UNIX license, and includes Apple, Inc.'s restriction against further redistribution.
See also
MkLinux
MachTen
A/UX
NeXTSTEP |
https://en.wikipedia.org/wiki/Einstein%20synchronisation | Einstein synchronisation (or Poincaré–Einstein synchronisation) is a convention for synchronising clocks at different places by means of signal exchanges. This synchronisation method was used by telegraphers in the middle 19th century, but was popularized by Henri Poincaré and Albert Einstein, who applied it to light signals and recognized its fundamental role in relativity theory. Its principal value is for clocks within a single inertial frame.
Einstein
According to Albert Einstein's prescription from 1905, a light signal is sent at time from clock 1 to clock 2 and immediately back, e.g. by means of a mirror. Its arrival time back at clock 1 is . This synchronisation convention sets clock 2 so that the time of signal reflection is defined to be
The same synchronisation is achieved by transporting a third clock from clock 1 to clock 2 "slowly" (that is, considering the limit as the transport velocity goes to zero). The literature discusses many other thought experiments for clock synchronisation giving the same result.
The problem is whether this synchronisation does really succeed in assigning a time label to any event in a consistent way. To that end one should find conditions under which:
If point (a) holds then it makes sense to say that clocks are synchronised. Given (a), if (b1)–(b3) hold then the synchronisation allows us to build a global time function . The slices . are called "simultaneity slices".
Einstein (1905) did not recognize the possibility of reducing (a) and (b1)–(b3) to easily verifiable physical properties of light propagation (see below). Instead he just wrote "We assume that this definition of synchronism is free from contradictions, and possible for any number of points; and that the following (that is b2–b3) relations are universally valid."
Max von Laue was the first to study the problem of the consistency of Einstein's synchronisation. Ludwik Silberstein presented a similar study although he left most of his claims as an exercise |
https://en.wikipedia.org/wiki/Control%20bus | In computer architecture,
a control bus is part of the system bus and is used by CPUs for communicating with other devices within the computer. While the address bus carries the information about the device with which the CPU is communicating and the data bus carries the actual data being processed, the control bus carries commands from the CPU and returns status signals from the devices. For example, if the data is being read or written to the device the appropriate line (read or write) will be active (logic one).
Lines
The number and type of lines in a control bus varies but there are basic lines common to all microprocessors, such as:
Read (). A single line that when active (logic zero) indicates the device is being read by the CPU.
Write (). A single line that when active (logic zero) indicates the device is being written by the CPU.
Byte enable (). A group of lines that indicate the size of the data (8, 16, 32, 64 bytes).
The RD and WR signals of the control bus control the reading or writing of RAM, avoiding bus contention on the data bus.
Additional lines are microprocessor-dependent, such as:
Transfer ACK ("acknowledgement"). Delivers information that the data was acknowledged (read) by the device.
Bus request (BR, BREQ, or BRQ). Indicates a device is requesting the use of the (data) bus.
Bus grant (BG or BGRT). Indicates the CPU has granted access to the bus.
Interrupt request (IRQ). A device with lower priority is requesting access to the CPU.
Clock signals. The signal on this line is used to synchronize data between the CPU and a device.
Reset. If this line is active, the CPU will perform a hard reboot.
Systems that have more than one bus master have additional control bus signals that control which bus master drives the address bus, avoiding bus contention on the address bus.
See also
Address bus
Data bus
Bus mastering |
https://en.wikipedia.org/wiki/Nepheloid%20layer | A nepheloid layer or nepheloid zone is a layer of water in the deep ocean basin, above the ocean floor, that contains significant amounts of suspended sediment. It is from 200 to 1000 m thick. The name comes from Greek: nephos, "cloud". The particles in the layer may come from the upper ocean layers and from stripping the sediments from the ocean floor by currents. Its thickness depends on bottom current velocity and is a result of balance between gravitational settling of particles and turbulence of the current. The formation mechanisms of nepheloid layers may vary, but primarily depend on deep ocean convection. Nepheloid layers can impact the accuracy of instruments when measuring bathymetry as well as affect the types of marine life in an area. There are several significant examples of nepheloid layers across the globe, including within the Gulf of Mexico and the Porcupine Bank.
Formation mechanisms
A surface nepheloid layer (SNL) may be created, due to particle flotation, while intermediate nepheloid layers (INL) may be formed at the slopes of the ocean bed due to the dynamics of internal waves. These intermediate nepheloid layers are derived from bottom nepheloid layers (BNL) after the layers become detached and spread along isopycnal surfaces.
Open ocean convection has a prominent effect on the distribution of nepheloid layers and their ability to form in certain areas of the ocean, such as the northern Atlantic Ocean and the northwestern Mediterranean Sea. Nepheloid layers are more likely to form based on patterns of deep ocean circulation that directly affect the abyssal plain. This is largely through the disruption of accumulated sediments in areas that deep ocean currents interact with. Convection currents that disturb areas of the ocean floor such as those that circulate via ocean gyres also affect the concentration and relative sizes of the suspended sediments, and by extension the area's corresponding biotic activity.
Impacts
Bathymetry
The existe |
https://en.wikipedia.org/wiki/Minni%20ritchi | Minni ritchi is a type of reddish-brown bark that continuously peels in small curly flakes, leaving the tree looking like it has a coat of red curly hair. Brooker and Kleinig (1990) formally described it as a bark type in which "the outer rich, red-brown smooth bark splits both longitudinally and horizontally, the free edges rolling back without completely detaching to expose new green bark beneath".
A number of species of Acacia and Eucalyptus have minni ritchi bark, including:
Acacia curranii
Acacia cyperophylla (creekline miniritchie)
Acacia delibrata
Acacia gracillima
Acacia grasbyi (miniritchie)
Acacia monticola
Acacia rhodophloia
Acacia trachycarpa
Eucalyptus caesia (gungurru, 'Silver Princess')
Eucalyptus crucis (narrow-leaved silver mallee)
Eucalyptus minniritchi
Eucalyptus orbifolia |
https://en.wikipedia.org/wiki/Flag%20of%20Calgary | The official flag of Calgary features a cowboy hat and the letter "C" on a red field, with white strips on the top and bottom of the field. The flag was adopted in 1983 as a result of a contest. Gwynneth Llewellyn and Yvonne Fritz, a former Legislative Assembly of Alberta member, created the design.
The previous design of the flag was a field of white, with a red vertical band on the left third. Within the red band was the city's coat of arms. The white portion of the flag featured the text "Calgary" with maple leaves of the Flag of Canada above and below the text.
Design and symbolism
First flag
Calgary's first flag featured a white field, with a red vertical band spanning the leftmost third of the flag. In the red band was a black letter "C" spanning the circumference of a vertically counterchanged version of the city's coat of arms, with the left half being white on black on red and the right half being black directly on the white. The "C" was half the height of the flag. To the right of the band was the text "Calgary" in all capital letters and a black, sans-serif font. Maple leaves like the one found on the Canadian national flag can be found above and below the text.
Second flag
The red field symbolizes the uniforms of the North-West Mounted Police. The flag's red and white colour scheme symbolizes hospitality and spirit. The white strips are both the height of the flag. The large "C" is the height of the flag and symbolizes the city's centennial, character, culture, charm, and the harmony between the city and its citizens. The "C" features a small outer ring around the circumference of the C. The Calgary White Hat located within the "C" symbolizes the history of rodeo within Calgary. It was deliberately placed inside the "C" to symbolize the people living inside the city.
Due to its colour scheme and use of a cowboy hat, the flag has been jokingly compared to the logo of the Arby's restaurant chain.
History
A contest was organized by the Centennial |
https://en.wikipedia.org/wiki/Plumb%20bob | A plumb bob, plumb bob level, or plummet, is a weight, usually with a pointed tip on the bottom, suspended from a string and used as a vertical direction as a reference line, or plumb-line. It is a precursor to the spirit level and used to establish a vertical datum. It is typically made of stone, wood, or lead, but can also be made of other metals. If it is used for decoration, it may be made of bone or ivory.
The instrument has been used since at least the time of ancient Egypt to ensure that constructions are "plumb", or vertical. It is also used in surveying, to establish the nadir (opposite of zenith) with respect to gravity of a point in space. It is used with a variety of instruments (including levels, theodolites, and steel tapes) to set the instrument exactly over a fixed survey marker or to transcribe positions onto the ground for placing a marker.
Etymology
The plumb in plumb bob derives from Latin plumbum ('lead'), the material once used for the weighted bob at the end. The adjective plumb developed by extension, as did the noun aplomb, from the notion of "standing upright".
Use
Until the modern age, plumb bobs were used on most tall structures to provide vertical datum lines for the building measurements. A section of the scaffolding would hold a plumb line, which was centered over a datum mark on the floor. As the building proceeded upward, the plumb line would also be taken higher, still centered on the datum. Many cathedral spires, domes and towers still have brass datum marks inlaid into their floors, which signify the center of the structure above.
A plumb bob and line alone can determine only a vertical reference. However, if they are mounted on a suitable scale the instrument may also be used as an inclinometer to measure angles to the vertical.
Ancient Egyptians used a plumb line attached to the top outer part of a tool resembling a letter E; when placed against a wall, the plumb line would indicate a vertical line. An A-frame level wit |
https://en.wikipedia.org/wiki/Wishbone%20%28computer%20bus%29 | The Wishbone Bus is an open source hardware computer bus intended to let the parts of an integrated circuit communicate with each other. The aim is to allow the connection of differing cores to each other inside of a chip. The Wishbone Bus is used by many designs in the OpenCores project.
Wishbone is intended as a "logic bus". It does not specify electrical information or the bus topology. Instead, the specification is written in terms of "signals", clock cycles, and high and low levels.
This ambiguity is intentional. Wishbone is made to let designers combine several designs written in Verilog, VHDL or some other logic-description language for electronic design automation (EDA). Wishbone provides a standard way for designers to combine these hardware logic designs (called "cores").
Wishbone is defined to have 8, 16, 32, and 64-bit buses. All signals are synchronous to a single clock but some slave responses must be generated combinatorially for maximum performance. Wishbone permits addition of a "tag bus" to describe the data. But reset, simple addressed reads and writes, movement of blocks of data, and indivisible bus cycles all work without tags.
Wishbone is open source. To prevent preemption of its technologies by aggressive patenting, the Wishbone specification includes examples of prior art, to prove its concepts are in the public domain.
A device does not conform to the Wishbone specification unless it includes a data sheet that describes what it does, bus width, utilization, etc. Promoting reuse of a design requires the data sheet. Making a design reusable in turn makes it easier to share with others.
The Simple Bus Architecture is a simplified version of the Wishbone specification.
Wishbone topologies
Wishbone adapts well to common topologies such as point-to-point, many-to-many (i.e. the classic bus system), hierarchical, or even switched fabrics such as crossbar switches. In the more exotic topologies, Wishbone requires a bus controller or arbiter, |
https://en.wikipedia.org/wiki/Celgene | Celgene Corporation is a pharmaceutical company that makes cancer and immunology drugs. Its major product is Revlimid (lenalidomide), which is used in the treatment of multiple myeloma, and also in certain anemias. The company is incorporated in Delaware, headquartered in Summit, New Jersey, and a subsidiary of Bristol Myers Squibb (BMS).
History
Celgene was originally a unit of Celanese. In 1986, Celanese completed the corporate spin-off of Celgene following the merger of Celanese with American Hoechst.
In August 2000, Celgene acquired Signal Pharmaceuticals, Inc., a privately held company that developed pharmaceuticals to regulate disease-related genes. Signal Pharmaceuticals was rebranded as Celgene Research San Diego.
In December 2002, Celgene acquired Anthrogenesis, a privately held New Jersey-based biotherapeutics company and cord blood banking business, which is developing technology for the recovery of stem cells from placental tissues following the completion of full-term successful pregnancies. Anthrogenesis was rebranded as Celgene Cellular Therapeutics.
In 2006, Celgene certified McKesson Specialty, a specialty pharmacy, as one of a group of pharmacies contracted to launch lenalidomide (Revlimid). As a specialty drug, lenalidomide is only available through the a distribution network consisting of specialty pharmacies contracted by the company.
In March 2008, Celgene acquired Pharmion Corporation for $2.9 billion.
In January 2010, Celgene acquired Gloucester Pharmaceuticals.
In June 2010, Celgene agreed to acquire Abraxis BioScience. It purchased the biotechnology company for $2.9 billion in its expansion into drugs that attack solid tumors. Abraxis produced Abraxane, the cancer-fighting drug that can be given in high doses.
In November 2011, Celgene relocated its United Kingdom headquarters from Windsor, Berkshire, to Stockley Park, near Heathrow airport which is also the home of GlaxoSmithKline's UK operations.
In January 2012, Celgene agreed t |
https://en.wikipedia.org/wiki/Treadle | A treadle (from , "to tread") is a mechanism operated with a pedal for converting reciprocating motion into rotating motion. Along with cranks, treadmills, and treadwheels, treadles allow human and animal machine power in the absence of electricity.
Before the widespread availability of electric power, treadles were widely used to power a range of machines. They may still be used as a matter of preference or in environments where electric power is not available.
Operation and uses
A treadle is operated by pressing down on its pedal with one or both feet, causing a rocking motion. This movement can then be stored as rotational motion via a crankshaft driving a flywheel. Alternatively, energy can be stored in a spring as in the pole lathe.
Treadles were once used extensively to power most machines including lathes, rotating or reciprocating saws, spinning wheels, looms, and sewing machines. The last use was popularized by Elias Howe and Isaac Singer in the eponymous Singer sewing machines. Today the use of treadle-powered machines is mostly relegated to hobbyists and historical re-enactors, as well as in areas of the developing world where other forms of power remain unavailable.
See also
Bicycle pedal
Treadle bicycle
Treadle pump
Sewing machine
Mechanical engineering |
https://en.wikipedia.org/wiki/Cadaeic%20Cadenza | "Cadaeic Cadenza" is a 1996 short story by Mike Keith. It is an example of constrained writing, a story with restrictions on how it can be written. It is also one of the most prodigious examples of piphilology, being written in "pilish". The word "cadaeic" is the alphabetical equivalent of 3.141593, the first six decimal digits of pi when rounded, where each digit is replaced by the Nth letter of the alphabet; a cadenza is a solo passage in music.
In addition to the main restriction, the author attempts to mimic portions, or entire works, of different types and pieces of literature ("The Raven", "Jabberwocky", the lyrics of Yes, "The Love Song of J. Alfred Prufrock", Rubaiyat, Hamlet, and Carl Sandburg's Grass) in story, structure, and rhyme.
The limitations
When the number of letters in each word is written out they form the first 3835 digits of pi.
{|style="border: none; text-align: center;"
|-
|One||/||A||Poem||/||A||Raven||/||Midnights||so||dreary,||tired||and||weary,
|-
|3 ||.||1||4 || ||1||5 || ||9 ||2 ||6 ||5 ||3 ||5
|}
While in this example each word is the same number of letters as the next digit of pi (and ten letters for the digit 0), some sections use words of more than ten letters as a one followed by another digit:
{|style="border: none; text-align: center;"
|-
|And||fear||overcame||my||being||–||the||fear||of||"forevermore".
|-
|3 ||4 ||8 ||2 ||5 || ||3 ||4 ||2 ||11
|}
where 11 represents two consecutive digit "1"s in pi.
Taking "A" as 1, "B" as 2, "C" as 3, etc., the name of the piece itself is based on pi, as "Cadaeic" is the first 7 digits of pi, when rounded to that number of significant digits.
C a d a e i c
3.1 4 1 5 9 3
Near a Raven
The first part of Cadaeic Cadenza is slightly changed from an earlier version, "Near a Raven", which was a retelling of Edgar Allan Poe's "The Raven".
See also
Six nines in pi (handled at the start of chapter 2, "Change") |
https://en.wikipedia.org/wiki/Cecil%20C.%20Rousseau | Cecil Clyde Rousseau, Jr. (January 13, 1938 Philadelphia - April 10, 2020 Memphis) was a mathematician and author who specialized in graph theory and combinatorics. He was a professor at The University of Memphis starting in 1970 until retiring in 2008, and was involved with USAMO in many capacities, including serving as chair.
Rousseau received his Ph.D. in Physics in 1968 from Texas A&M University.
He has an Erdős number of 1, and is Erdős' 5th most common co-author, with 35 joint papers. He also frequently collaborated with Memphis faculty Ralph Faudree and Dick Schelp.
In 2012, Rousseau received the Paul Erdős Award from the World Federation of National Mathematics Competitions.
To his students and colleagues, he was known affectionately as C²R. |
https://en.wikipedia.org/wiki/Trusted%20Information%20Systems | Trusted Information Systems (TIS) was a computer security research and development company during the 1980s and 1990s, performing computer and communications (information) security research for organizations such as NSA, DARPA, ARL, AFRL, SPAWAR, and others.
History
TIS was founded in 1983 by NSA veteran Steve Walker, and at various times employed notable information security experts including David Elliott Bell, Martha Branstad, John Pescatore, Marv Schaefer, Steve Crocker, Marcus Ranum, Wei Xu, John Williams, Steve Lipner and Carl Ellison. TIS was headquartered in Glenwood, Maryland, in a rural location. The company was started in Walker's basement on Shady Lane in Glenwood, MD. As the company grew, rather than move to Baltimore or the Washington D.C. suburbs, a small office building was constructed on land next to Walker's new home on Route 97.
Products
TIS projects included as the following:
Trusted Xenix, the first commercially available B2 operating system;
Trusted Mach, a research project that influenced DTOS and eventually SELinux;
Domain and Type Enforcement (DTE) which likewise influenced SELinux;
FWTK Firewall Toolkit (the first open source firewall software) in 1993;
First whitehouse.gov e-mail server was hosted at TIS headquarters from June 1 of 1993 to January 20 of 1995;
Gauntlet Firewall in 1994, one of the first commercial firewall products, with broad range of Internet Standards, including S/MIME, SNMP, DNS, DNSSEC, and many others. This Firewall became the inception of the third generation firewall;
IP Security (IPSec) product in late 1994, known as the first IPSec VPN commercial product in IT history;
Encryption Recovery technology integrated with IPSEC, ISAKMP, IKE, and RSA.
TIS's operating system work directly affected BSD/OS, which the Gauntlet Firewall and IPSec was based on, as well as Linux, FreeBSD, HP UX, Sun OS, Darwin, and others.
Post company
The company went public in 1996
and soon afterwards attempted to acquire |
https://en.wikipedia.org/wiki/Multiple%20Myeloma%20Research%20Foundation | The Multiple Myeloma Research Foundation (MMRF) is a charitable organization dedicated to multiple myeloma, an incurable blood cancer. The MMRF runs as if it were a for-profit business, expecting high returns from the money the organization raises from donors.
History
MMRF was founded in 1998 by twin sisters Kathy Giusti and Karen Andrews, following Kathy's diagnosis with multiple myeloma. Giusti, a pharmaceutical company executive and Harvard Business School Alum, wanted to encourage researchers to develop treatments for multiple myeloma by using business models rather than academic models of drug development.
About The MMRF
MMRF is a private funder of multiple myeloma research, having raised over $120 million since its inception to contribute funding to more than 120 laboratories worldwide. MMRF funding contributes to diverse research strategies to yield long-, mid-, and short-term results in an effort to deliver better treatments to patients faster: basic science programs to better understand the disease and identify new druggable targets through genomics and proteomics research; validation programs to prioritize new compounds and combinations based on key targets; and clinical trials conducted at a number of myeloma centers.
In 2009, the MMRF funded research into 30 compounds at the pre-clinical stage. By 2013 it had raised more than $250 million and its work has helped gain approval of six new drugs to treat the disease.
See also
Multiple Myeloma Research Consortium
Notes
External links
Multiple Myeloma Research Foundation
Biomedical research foundations
Cancer charities in the United States
Charities based in Connecticut
Immune system disorders
Norwalk, Connecticut
1998 establishments in the United States
Organizations established in 1998
Medical and health organizations based in Connecticut |
https://en.wikipedia.org/wiki/List%20of%20Euclidean%20uniform%20tilings | This table shows the 11 convex uniform tilings (regular and semiregular) of the Euclidean plane, and their dual tilings.
There are three regular and eight semiregular tilings in the plane. The semiregular tilings form new tilings from their duals, each made from one type of irregular face.
John Conway called these uniform duals Catalan tilings, in parallel to the Catalan solid polyhedra.
Uniform tilings are listed by their vertex configuration, the sequence of faces that exist on each vertex. For example 4.8.8 means one square and two octagons on a vertex.
These 11 uniform tilings have 32 different uniform colorings. A uniform coloring allows identical sided polygons at a vertex to be colored differently, while still maintaining vertex-uniformity and transformational congruence between vertices. (Note: Some of the tiling images shown below are not color-uniform)
In addition to the 11 convex uniform tilings, there are also 14 known nonconvex tilings, using star polygons, and reverse orientation vertex configurations. A further 28 uniform tilings are known using apeirogons. If zigzags are also allowed, there are 23 more known uniform tilings and 10 more known families depending on a parameter: in 8 cases the parameter is continuous, and in the other 2 it is discrete. The set is not known to be complete.
Laves tilings
In the 1987 book, Tilings and Patterns, Branko Grünbaum calls the vertex-uniform tilings Archimedean, in parallel to the Archimedean solids. Their dual tilings are called Laves tilings in honor of crystallographer Fritz Laves. They're also called Shubnikov–Laves tilings after Aleksei Shubnikov. John Conway called the uniform duals Catalan tilings, in parallel to the Catalan solid polyhedra.
The Laves tilings have vertices at the centers of the regular polygons, and edges connecting centers of regular polygons that share an edge. The tiles of the Laves tilings are called planigons. This includes the 3 regular tiles (triangle, square and hexagon) and |
https://en.wikipedia.org/wiki/Cajeput%20tree | Cajeput tree is a common name used for certain classification of tree that has a white spongy bark that is flexible and can easily flake off the trunk. The Cajeput tree is of the genus Melaleuca, native to Australia and is commonly known in North America as the tea tree. The name "Cajeput tree" is primarily used for the species M. cajuputi, M. leucadendra, M. linariifolia, M. viridiflora and M. quinquenervia. Other names for these trees are the paperbark tree, punk tree, or the white bottle brush tree. Similar subtropical trees from the eucalyptus family are evergreens with pointed leaves and white, red or green flowers.
Invasive species in Florida
Melaleuca quinquenervia is considered an invasive species in swampy areas of Florida in the U.S. It was introduced into the United States both as an ornamental tree and to control erosion in swamps.
Uses of the Cajeput tree
The various parts of the Cajeput tree, specifically M. leucadendra, has many known uses.
Its flaky bark can be utilised for weaving. It is also used to caulk boats, making them waterproof. Aborigines of Australia often used the cajeput tree bark for shields, canoes, roofing material and timber.
Its fruits are known to be used as food seasoning in Southeast Asia, where this species is found locally.
The cajeput trees are a source of cajeput oil in Southeast Asia, an essential oil that is extracted from the leaves and twigs of the tree. Cajeput oil is primarily used in aromatherapy as an expectorant, painkiller, antifungal oil and skin mite reducer. The oil is produced by steam distillation of the Melaleuca leucadendra and Melaleuca quinquenervia species. A similar essential oil known as tea tree oil is extracted from the species Melaleuca alternifolia, a native of Australia. Melaleuca pollen can be an allergen and tea tree oil may cause allergic reactions for some people. Cajeput trees grown in Australia are well known for having powerful therapeutic properties. Compared to other countries, |
https://en.wikipedia.org/wiki/Affinity%20laws | The affinity laws (also known as the "Fan Laws" or "Pump Laws") for pumps/fans are used in hydraulics, hydronics and/or HVAC to express the relationship between variables involved in pump or fan performance (such as head, volumetric flow rate, shaft speed) and power. They apply to pumps, fans, and hydraulic turbines. In these rotary implements, the affinity laws apply both to centrifugal and axial flows.
The laws are derived using the Buckingham π theorem. The affinity laws are useful as they allow prediction of the head discharge characteristic of a pump or fan from a known characteristic measured at a different speed or impeller diameter. The only requirement is that the two pumps or fans are dynamically similar, that is, the ratios of the fluid forced are the same. It is also required that the two impellers' speed or diameter are running at the same efficiency.
Law 1. With impeller diameter (D) held constant:
Law 1a. Flow is proportional to shaft speed:
Law 1b. Pressure or Head is proportional to the square of shaft speed:
Law 1c. Power is proportional to the cube of shaft speed:
Law 2. With shaft speed (N) held constant:
Law 2a. Flow is proportional to the impeller diameter:
Law 2b. Pressure or Head is proportional to the square of the impeller diameter:
Law 2c. Power is proportional to the cube of the impeller diameter (assuming constant shaft speed):
where
is the volumetric flow rate (e.g. CFM, GPM or L/s)
is the impeller diameter (e.g. in or mm)
is the shaft rotational speed (e.g. rpm)
is the pressure or head developed by the fan/pump (e.g. psi or Pascal)
is the shaft power (e.g. W).
These laws assume that the pump/fan efficiency remains constant i.e. , which is rarely exactly true, but can be a good approximation when used over appropriate frequency or diameter ranges (i.e., a fan will not move anywhere near 1000 times as much air when spun at 1000 times its designed operating speed, but the air movement may be increased by |
https://en.wikipedia.org/wiki/ZoneAlarm | ZoneAlarm is an internet security software company that provides consumer antivirus and firewall products. ZoneAlarm was developed by Zone Labs, whose CEOs were Kevin Nickel, Mouad Abid and Shahin and the Company was acquired in March 2004 by Check Point. ZoneAlarm's firewall security products include an inbound intrusion detection system, as well as the ability to control which programs can open outbound connections.
Technical description
In ZoneAlarm, program access is controlled by way of "zones", into which all network connections are divided. The "trusted zone" which generally includes the user's local area network can share resources such as files and printers. The "Internet zone" includes everything without the trusted zone. The user can grant permissions (trusted zone client, trusted zone server, Internet zone client, Internet zone server) to programs before they attempt to access the Internet (e.g. before the first use) or ZoneAlarm will ask the user to grant permissions on the first access attempt.
"True Vector Internet Monitor", also known as "TrueVector Security Engine", is a Windows service that is the core of ZoneAlarm. In the processes list its Image Name is "vsmon.exe". This monitors internet traffic and generates alerts for disallowed access. "Operating System Firewall" (OSFirewall) monitors programs and generates alerts when they perform suspicious behaviors. The OSFirewall is useful in preventing rootkits and other spyware. "SmartDefense Advisor" is the name ZoneAlarm give to a service available in all versions that helps the user with certain types of alert, using a database of trusted program signatures to provide the user with advice on allowing or denying Internet access in response to program requests.
The current free version of Zonealarm has an ad for the paid version that pops up every time you turn on your computer after a short delay.
Awards and certifications
Both the free and Pro editions of ZoneAlarm Firewall were designated as |
https://en.wikipedia.org/wiki/Gravitometer | Gravitometer may refer to:
Gravimeter, an instrument for measuring the local gravitational field
Hydrometer, referred to in pipeline work as a gravitometer
Gravimetry |
https://en.wikipedia.org/wiki/MachTen | MachTen is a Unix-like operating system from Tenon Intersystems. It is based on 4.4BSD and the Mach kernel, and features the X Window System and GNU programming tools. It runs only as a classic Mac OS application program (in a virtual machine) on Macintosh computers.
MachTen development started in 1989, culminating in the first release in 1991. The Professional MachTen branch, intended for Motorola 68000-based Macintoshes, ended with release 2.3. The Power MachTen branch, which is Power Macintosh compatible, lacks some of the features of Professional MachTen (including true virtual and protected memory models), but takes full advantage of the PowerPC processor and is compatible with Mac OS 9 through its final version, 4.1.4. MachTen is no longer developed, and is functionally superseded by macOS.
See also
A/UX
MacMach
macOS
NeXTSTEP
External links
Floodgap's Power MachTen Hacking Page
Berkeley Software Distribution
Mach (kernel)
Microkernel-based operating systems
Microkernels
Unix emulators |
https://en.wikipedia.org/wiki/Image%20stitching | Image stitching or photo stitching is the process of combining multiple photographic images with overlapping fields of view to produce a segmented panorama or high-resolution image. Commonly performed through the use of computer software, most approaches to image stitching require nearly exact overlaps between images and identical exposures to produce seamless results, although some stitching algorithms actually benefit from differently exposed images by doing high-dynamic-range imaging in regions of overlap. Some digital cameras can stitch their photos internally.
Applications
Image stitching is widely used in modern applications, such as the following:
Document mosaicing
Image stabilization feature in camcorders that use frame-rate image alignment
High-resolution photomosaics in digital maps and satellite imagery
Medical imaging
Multiple-image super-resolution imaging
Video stitching
Object insertion
Process
The image stitching process can be divided into three main components: image registration, calibration, and blending.
Image stitching algorithms
In order to estimate image alignment, algorithms are needed to determine the appropriate mathematical model relating pixel coordinates in one image to pixel coordinates in another. Algorithms that combine direct pixel-to-pixel comparisons with gradient descent (and other optimization techniques) can be used to estimate these parameters.
Distinctive features can be found in each image and then efficiently matched to rapidly establish correspondences between pairs of images. When multiple images exist in a panorama, techniques have been developed to compute a globally consistent set of alignments and to efficiently discover which images overlap one another.
A final compositing surface onto which to warp or projectively transform and place all of the aligned images is needed, as are algorithms to seamlessly blend the overlapping images, even in the presence of parallax, lens distortion, scene motion, and exposure |
https://en.wikipedia.org/wiki/Interference%20%28communication%29 | In telecommunications, an interference is that which modifies a signal in a disruptive manner, as it travels along a communication channel between its source and receiver. The term is often used to refer to the addition of unwanted signals to a useful signal. Common examples include:
Electromagnetic interference (EMI)
Co-channel interference (CCI), also known as crosstalk
Adjacent-channel interference (ACI)
Intersymbol interference (ISI)
Inter-carrier interference (ICI), caused by doppler shift in OFDM modulation (multitone modulation).
Common-mode interference (CMI)
Conducted interference
Noise is a form of interference but not all interference is noise.
Radio resource management aims at reducing and controlling the co-channel and adjacent-channel interference.
Interference alignment
A solution to interference problems in wireless communication networks is interference alignment, which was crystallized by Syed Ali Jafar at the University of California, Irvine. A specialized application was previously studied by Yitzhak Birk and Tomer Kol for an index coding problem in 1998. For interference management in wireless communication, interference alignment was originally introduced by Mohammad Ali Maddah-Ali, Abolfazl S. Motahari, and Amir Keyvan Khandani, at the University of Waterloo, for communication over wireless X channels. Interference alignment was eventually established as a general principle by Jafar and Viveck R. Cadambe in 2008, when they introduced "a mechanism to align an arbitrarily large number of interferers, leading to the surprising conclusion that wireless networks are not essentially interference limited." This led to the adoption of interference alignment in the design of wireless networks.
Jafar explained:
According to New York University senior researcher Paul Horn:
See also
Distortion
Inter-flow interference
Intra-flow interference
Meaconing
Signal-to-interference ratio (SIR)
Signal-to-noise plus interference (SNIR) |
https://en.wikipedia.org/wiki/William%20Astbury | William Thomas Astbury FRS (25 February 1898 – 4 June 1961) was an English physicist and molecular biologist who made pioneering X-ray diffraction studies of biological molecules. His work on keratin provided the foundation for Linus Pauling's discovery of the alpha helix. He also studied the structure for DNA in 1937 and made the first step in the elucidation of its structure.
Early life
Astbury was the fourth child of seven, born in Longton, Stoke-on-Trent. His father, William Edwin Astbury, was a potter and provided comfortably for his family. Astbury also had a younger brother, Norman, with whom he shared a love of music.
Astbury might well have become a potter but, luckily, won a scholarship to Longton High School, where his interests were shaped by the Headmaster and second master, both chemists. After becoming head boy and winning the Duke of Sutherland's gold medal, Astbury won the only local scholarship available and went up to Jesus College, Cambridge.
After two terms at Cambridge, his studies were interrupted by service during the First World War. A poor medical rating following appendectomy resulted in his posting in 1917 to Cork, Ireland with the Royal Army Medical Corps. He later returned to Cambridge and finished his last year with a specialization in physics.
Academic career
After graduating from Cambridge, Astbury worked with William Bragg, first at University College London and then, in 1923, at the Davy-Faraday Laboratory at the Royal Institution in London. Fellow students included many eminent scientists, including Kathleen Lonsdale and J. D. Bernal and others. Astbury showed great enthusiasm for his studies and published papers in the journal Classic Crystallography, such as on the structure of tartaric acid.
In 1928, Astbury was appointed Lecturer in Textile Physics at the University of Leeds. He remained at Leeds for the remainder of his career, being appointed Reader in Textile Physics in 1937 and Professor of Biomolecular Structure i |
https://en.wikipedia.org/wiki/Apprehension%20%28understanding%29 | In psychology, apprehension (Lat. ad, "to"; prehendere, "to seize") is a term applied to a model of consciousness in which nothing is affirmed or denied of the object in question, but the mind is merely aware of ("seizes") it.
"Judgment" (says Reid, ed. Hamilton, i. p. 414) "is an act of the mind, specifically different from simple apprehension or the bare conception of a thing". "Simple apprehension or conception can neither be true nor false." This distinction provides for the large class of mental acts in which we are simply aware of, or "take in" a number of familiar objects, about which we in general make no judgment, unless our attention is suddenly called by a new feature. Or again, two alternatives may be apprehended without any resultant judgment as to their respective merits.
Similarly, G.F. Stout stated that while we have a very vivid idea of a character or an incident in a work of fiction, we can hardly be said in any real sense to have any belief or to make any judgment as to its existence or truth. With this mental state may be compared the purely aesthetic contemplation of music, wherein apart from, say, a false note, the faculty of judgment is for the time inoperative. To these examples may be added the fact that one can fully understand an argument in all its bearings, without in any way judging its validity. Without going into the question fully, it may be pointed out that the distinction between judgment and apprehension is relative. In every kind of thought, there is judgment of some sort in a greater or less degree of prominence.
Judgment and thought are in fact psychologically distinguishable merely as different, though correlative, activities of consciousness. Professor Stout further investigates the phenomena of apprehension, and comes to the conclusion that "it is possible to distinguish and identify a whole without apprehending any of its constituent details." On the other hand, if the attention focuses itself for a time on the apprehend |
https://en.wikipedia.org/wiki/Acoustic%20ecology | Acoustic ecology, sometimes called ecoacoustics or soundscape studies, is a discipline studying the relationship, mediated through sound, between human beings and their environment. Acoustic ecology studies started in the late 1960s with R. Murray Schafer a musician, composer and former professor of communication studies at Simon Fraser University (Vancouver, British Columbia, Canada) with the help of his team there as part of the World Soundscape Project. The original WSP team included Barry Truax and Hildegard Westerkamp, Bruce Davies and Peter Huse, among others. The first study produced by the WSP was titled The Vancouver Soundscape. This innovative study raised the interest of researchers and artists worldwide, creating enormous growth in the field of acoustic ecology. In 1993, the members of the by now large and active international acoustic ecology community formed the World Forum for Acoustic Ecology.
The radio art of Schafer and his colleague, has found expression in many different fields.While most have taken some inspiration from Schafer's writings, in recent years there have also been divergences from the initial ideas. The expanded expressions of acoustic ecology are increasing due to the sonic impacts of road and airport construction that affect the soundscapes in and around cities where the human population is more dense. There has also been a broadening of bioacoustics (the use of sound by animals) to consider the subjective and objective responses of animals to human noise, with ocean noise capturing the most attention. Acoustic ecology can also be informative of changes in the climate or other environmental changes since every day we listen to sounds in the world to identify their source such as bird, car, plane, wind, water. But we don't listen those sounds as a network , a mesh of relationships that form an ecology. Acoustic ecology finds expression in many different fields that characterize a soundscape, which are biophony, geophony, and anthro |
https://en.wikipedia.org/wiki/Inbreeding%20depression | Inbreeding depression is the reduced biological fitness which has the potential to result from inbreeding (the breeding of related individuals). Biological fitness refers to an organism's ability to survive and perpetuate its genetic material. Inbreeding depression is often the result of a population bottleneck. In general, the higher the genetic variation or gene pool within a breeding population, the less likely it is to suffer from inbreeding depression, though inbreeding and outbreeding depression can simultaneously occur.
Inbreeding depression seems to be present in most groups of organisms, but varies across mating systems. Hermaphroditic species often exhibit lower degrees of inbreeding depression than outcrossing species, as repeated generations of selfing is thought to purge deleterious alleles from populations. For example, the outcrossing nematode (roundworm) Caenorhabditis remanei has been demonstrated to suffer severely from inbreeding depression, unlike its hermaphroditic relative C. elegans, which experiences outbreeding depression.
Mechanisms
Inbreeding (i.e., breeding between closely related individuals) results in more recessive traits manifesting themselves, as the genomes of pair-mates are more similar. Recessive traits can only occur in an offspring if present in both parents' genomes. The more genetically similar the parents are, the more often recessive traits appear in their offspring. This normally has a positive effect, as most genes are undergoing purifying selection (the homozygous state is favored). However, for very closely related individuals, there is an increased likelihood of homozygous deleterious genes in the offspring which can result in unfit individuals. For the alleles that confer an advantage in the heterozygous and/or homozygous-dominant state, the fitness of the homozygous-recessive state may even be zero (meaning sterile or unviable offspring).
An example of inbreeding depression is shown to the right. In this case, a |
https://en.wikipedia.org/wiki/List%20of%20information%20graphics%20software | This is a list of software to create any kind of information graphics:
either includes the ability to create one or more infographics from a provided data set
either it is provided specifically for information visualization
Vector graphics
Vector graphics software can be used for manual graphing or for editing the output of another program. Please see:
:Category:Vector graphics editors
Comparison of vector graphics editors
A few online editors using vector graphics for specific needs have been created. This kind of creative interfaces work well together with data visualization tools like the ones above.
See also
:Category:Diagramming software
Comparison of numerical-analysis software
List of graphical methods |
https://en.wikipedia.org/wiki/Equity%20value | Equity value is the value of a company available to owners or shareholders. It is the enterprise value plus all cash and cash equivalents, short and long-term investments, and less all short-term debt, long-term debt and minority interests.
Equity value accounts for all the ownership interest in a firm including the value of unexercised stock options and securities convertible to equity.
From a mergers and acquisitions to an academic perspective, equity value differs from market capitalization or market value in that it incorporates all equity interests in a firm whereas market capitalization or market value only reflects those common shares currently outstanding.
Calculating equity value
Equity value can be calculated in two ways, either the intrinsic value method, or the fair market value method. The intrinsic value method is calculated as follows:
Equity Value =
Market capitalization
+ Amount that in-the-money stock options are in the money
+ Value of equity issued from in-the-money convertible securities
- Proceeds from the conversion of convertible securities
The fair market value method is as follows:
Equity Value =
Market capitalization
+ fair value of all stock options (in the money and out of the money), calculated using the Black–Scholes formula or a similar method
+ Value of convertible securities in excess of what the same securities would be valued without the conversion attribute
The fair market value method more accurately captures the value of out of the money securities. |
https://en.wikipedia.org/wiki/Mechanotransduction | In cellular biology, mechanotransduction (mechano + transduction) is any of various mechanisms by which cells convert mechanical stimulus into electrochemical activity. This form of sensory transduction is responsible for a number of senses and physiological processes in the body, including proprioception, touch, balance, and hearing. The basic mechanism of mechanotransduction involves converting mechanical signals into electrical or chemical signals.
In this process, a mechanically gated ion channel makes it possible for sound, pressure, or movement to cause a change in the excitability of specialized sensory cells and sensory neurons. The stimulation of a mechanoreceptor causes mechanically sensitive ion channels to open and produce a transduction current that changes the membrane potential of the cell. Typically the mechanical stimulus gets filtered in the conveying medium before reaching the site of mechanotransduction. Cellular responses to mechanotransduction are variable and give rise to a variety of changes and sensations. Broader issues involved include molecular biomechanics.
Single-molecule biomechanics studies of proteins and DNA, and mechanochemical coupling in molecular motors have demonstrated the critical importance of molecular mechanics as a new frontier in bioengineering and life sciences. Protein domains, connected by intrinsically disordered flexible linker domains, induce long-range allostery via protein domain dynamics.
The resultant dynamic modes cannot be generally predicted from static structures of either the entire protein or individual domains. They can however be inferred by comparing different structures of a protein (as in Database of Molecular Motions). They can also be suggested by sampling in extensive molecular dynamics trajectories and principal component analysis, or they can be directly observed using spectra
measured by neutron spin echo spectroscopy. Current findings indicate that the mechanotransduction channel in hair c |
https://en.wikipedia.org/wiki/Barebone%20computer | A barebone computer is a partially assembled platform or an unassembled kit of computer parts allowing more customization and lower costs than a retail computer system. They are available for desktop computer, notebook (see barebook) and server purposes, and in nearly any form factor. Manufacturers are also able to produce systems of a specialized or non-standard form factor, since the system is sold as a pre-built unit, with the motherboard and power supply already installed.
Components
Assembling a barebone computer by hand is usually less expensive than buying a pre-configured computer from a retailer, and may save time and labor compared with building a system from scratch. A typical barebone desktop system consists of a CPU, a computer case (or tower), with a pre-fitted motherboard and power supply. If not already provided, the purchaser of such a platform only has to equip it with a RAM, and optionally a hard drive (in some cases, an operating system is/can be installed to a lower-cost flash drive instead). Additional input/output devices may be required depending on their needs. Sometimes, it is necessary to install an operating system if the one built into the motherboard is deemed insufficient (or not present at all). An audio adapter or network adapter may be added but this is less common as recent motherboards often already contain capable solutions.
Peripherals, such as a keyboard, mouse and monitor, almost always must be acquired separately. Barebone systems sometimes include a graphics processor or RAM, but rarely any mass storage media (hard drives), operating system or other software. Sometimes PCs with everything a normal desktop PC has except Microsoft Windows operating systems are sold as a barebone computer, but may include free software such as Linux. Refurbished and used computers may also be repackaged as barebone computers, as many computers returned for refurbishing may have missing, broken, or obsolete parts such as hard drives and peri |
https://en.wikipedia.org/wiki/False%20light | In US law, false light is a tort concerning privacy that is similar to the tort of defamation. The privacy laws in the United States include a non-public person's right to protection from publicity that creates an untrue or misleading impression about them. That right is balanced against the First Amendment right of free speech.
False light differs from defamation primarily in being intended "to protect the plaintiff's mental or emotional well-being", rather than to protect a plaintiff's reputation as is the case with the tort of defamation and in being about the impression created rather than being about veracity. If a publication of information is false, then a tort of defamation might have occurred. If that communication is not technically false but is still misleading, then a tort of false light might have occurred.
False light privacy claims often arise under the same facts as defamation cases, and therefore not all states recognize false light actions. There is a subtle difference in the way courts view the legal theories—false light cases are about damage to a person's personal feelings or dignity, whereas defamation is about damage to a person's reputation.
The specific elements of the tort of false light vary considerably, even among those jurisdictions which do recognize this tort. Generally, these elements consist of the following:
A publication by the defendant about the plaintiff;
made with actual malice if the plaintiff is a public figure;
which places the plaintiff in a false light;
and that would be highly offensive (i.e., embarrassing to reasonable persons).
Some U.S. state courts have ruled that false light lawsuits brought under their states' laws must be rewritten as defamation lawsuits; these courts generally base their opinion on the premises that a) any publication or statement giving rise to a false-light claim will also give rise to a defamation claim, such that the set of statements creating false light is necessarily, although |
https://en.wikipedia.org/wiki/Netsukuku | Netsukuku is an experimental peer-to-peer routing system, developed by the FreakNet MediaLab in 2005, created to build up a distributed network, anonymous and censorship-free, fully independent but not necessarily separated from the Internet, without the support of any server, ISP and no central authority.
Netsukuku is designed to handle up to 2128 nodes without any servers or central systems, with minimal CPU and memory resources. This mesh network can be built using existing network infrastructure components such as Wi-Fi.
The project has been in slow development since 2005, never abandoning a beta state. It has also never been tested on large scale.
Operation
As of December 2011, the latest theoretical work on Netsukuku could be found in the author's master thesis Scalable Mesh Networks and the Address Space Balancing problem. The following description takes into account only the basic concepts of the theory.
Netsukuku uses a custom routing protocol called QSPN (Quantum Shortest Path Netsukuku) that strives to be efficient and not taxing on the computational capabilities of each node. The current version of the protocol is QSPNv2. It adopts a hierarchical structure. 256 nodes are grouped inside a gnode (group node), 256 gnodes are grouped in a single ggnode (group of group nodes), 256 ggnodes are grouped in a single gggnode, and so on. This offers a set of advantages main documentation. The protocol relies on the fact that the nodes are not mobile and that the network structure does not change quickly, as several minutes may be required before a change in the network is propagated. However, a node that joins the network is immediately able to communicate using the routes of its neighbors. When a node joins the mesh network, Netsukuku automatically adapts and all other nodes come to know the fastest and most efficient routes to communicate with the newcomer. Each node has no more privileges or restrictions than the other nodes.
The domain name system (DNS) |
https://en.wikipedia.org/wiki/Carbol%20fuchsin | Carbol fuchsin, carbol-fuchsin, carbolfuchsin, or Castellani's paint (CAS ) is a mixture of phenol and basic fuchsin that is used in bacterial staining procedures. It is commonly used in the staining of mycobacteria because it has an affinity for the mycolic acids found in their cell membranes.
It is a component of Ziehl–Neelsen stain, a differential stain.
Carbol fuchsin is used as the primary stain dye to detect acid-fast bacteria because it is more soluble in the cells' wall lipids than in the acid alcohol. If the bacteria is acid-fast the bacteria will retain the initial red color of the dye because they are able to resist the destaining by acid alcohol (0.4–1% HCl in 70% EtOH). Additionally, it can be used for the staining of bacterial spores.
Carbol-fuchsin is also used as a topical antiseptic and antifungal. |
https://en.wikipedia.org/wiki/Sony%20eVilla | The Sony eVilla was a discontinued Internet appliance from Sony. After 18 months of development, it was released to the public on June 14, 2001 for $499 USD. With the additional $21.95 USD monthly fee, users could access the Internet, send and receive e-mail, play audio and video, and save files to Sony's Memory Stick.
After less than three months in the market, Sony discontinued the product on September 13, 2001. Customers received full refunds for the product and the monthly subscription fee. Spokesman John Dolak remarked that "[the] product did not meet our expectations, it did not operate as planned."
Sony entered the Internet appliance market as other manufacturers were getting out, canceling their plans, and discontinuing their offerings. By the time the Sony eVilla shipped, only 150,000 internet appliance devices had shipped within the past year. In addition, many customers could not justify the purchase of an inherently limited internet appliance when other manufacturers were offering more capable personal computers for the same price.
Hardware and software
The Sony eVilla was powered by a 266 MHz Geode GX 1 CPU, with 64 MiB DRAM, and 24 MiB flash memory. It weighed 31.5 pounds (14.3 kg) and measured 11.81 × 16.18 × 15.82 inches (30 × 41.1 x 40.2 cm).
There was no hard disk, but the system could read and write to Sony's Memory Stick cards. The included keyboard and mouse were connected by two PS/2 ports, and additional devices could be connected with two USB ports. A 56K V.90 modem was built into the case, which also housed an unused Ethernet port.
The display was a portrait-style 15 inch (38 cm) Sony Trinitron, with 800×1024 pixel resolution.
The system used the BeIA 1.0 operating system from Be Inc., and supported Java applications, Macromedia Flash animations, and some Microsoft Office file formats. Also included was RealNetworks's RealPlayer.
One of the major drawbacks of the eVilla was the inability to save pictures and media from internet site |
https://en.wikipedia.org/wiki/Paltalk | Paltalk is a proprietary video group chat service that enables users to communicate by video, Internet chat, or voice. It offers chat rooms and the ability for users to create their own public virtual chat room. Paltalk Desktop is available on macOS and Windows, and Paltalk Video Chat App is available for Android and iOS. While basic services are free of charge and basic software is free to download, fee-based memberships and paid upgrades to more capable versions are offered by AVM Software, the creators of Paltalk.
Paltalk had 5.5 million unique users in 2013. An infographic created by the company in 2015 revealed that they had surpassed 100 million users.
Software
Paltalk's main application is "Paltalk Messenger for PCs". They also offered PaltalkExpress, a free web-based Adobe Flash and Java application which could be accessed via an Internet browser. As of December 22, 2016 this program has been discontinued due to its falling support and removal from Google Chrome.
Paltalk has native apps available for Android and iOS which allow users to publish webcam, audio chat, and text chat groups or in private sessions.
Both the mobile and desktop versions of Paltalk allow users to create chat rooms where they can text, voice, and video chat. These chat rooms can host hundreds and in some cases thousands of chatters in one conversion. Paltalk users can also have private video chat sessions with up to 15 other.
Awards and recognition
2007: AlwaysOn 100 top Companies
2007: NET Editor's pick
2005: The Pulver 100
Patent protection
Paltalk filed a series of patent lawsuits against video game developers claiming they were infringing U.S. patents 5,822,523 and 6,226,686 "Server-group messaging system for interactive applications", patents they purchased from the now-defunct company HearMe in 2002. Paltalk first brought a case against Microsoft in 2006, claiming Halo and Xbox Live violated its patent rights, and later settled out of court.
In 2009, Paltalk then mo |
https://en.wikipedia.org/wiki/Hirzebruch%E2%80%93Riemann%E2%80%93Roch%20theorem | In mathematics, the Hirzebruch–Riemann–Roch theorem, named after Friedrich Hirzebruch, Bernhard Riemann, and Gustav Roch, is Hirzebruch's 1954 result generalizing the classical Riemann–Roch theorem on Riemann surfaces to all complex algebraic varieties of higher dimensions. The result paved the way for the Grothendieck–Hirzebruch–Riemann–Roch theorem proved about three years later.
Statement of Hirzebruch–Riemann–Roch theorem
The Hirzebruch–Riemann–Roch theorem applies to any holomorphic vector bundle E on a compact complex manifold X, to calculate the holomorphic Euler characteristic of E in sheaf cohomology, namely the alternating sum
of the dimensions as complex vector spaces, where n is the complex dimension of X.
Hirzebruch's theorem states that χ(X, E) is computable in terms of the Chern classes ck(E) of E, and the Todd classes of the holomorphic tangent bundle of X. These all lie in the cohomology ring of X; by use of the fundamental class (or, in other words, integration over X) we can obtain numbers from classes in The Hirzebruch formula asserts that
where the sum is taken over all relevant j (so 0 ≤ j ≤ n), using the Chern character ch(E) in cohomology. In other words, the products are formed in the cohomology ring of all the 'matching' degrees that add up to 2n. Formulated differently, it gives the equality
where is the Todd class of the tangent bundle of X.
Significant special cases are when E is a complex line bundle, and when X is an algebraic surface (Noether's formula). Weil's Riemann–Roch theorem for vector bundles on curves, and the Riemann–Roch theorem for algebraic surfaces (see below), are included in its scope. The formula also expresses in a precise way the vague notion that the Todd classes are in some sense reciprocals of characteristic classes.
Riemann Roch theorem for curves
For curves, the Hirzebruch–Riemann–Roch theorem is essentially the classical Riemann–Roch theorem. To see this, recall that for each divisor D on a curve t |
https://en.wikipedia.org/wiki/Golden%20mean%20%28philosophy%29 | The golden mean or golden middle way is the desirable middle between two extremes, one of excess and the other of deficiency. It appeared in Greek thought at least as early as the Delphic maxim "nothing in excess", which was discussed in Plato's Philebus. Aristotle analyzed the golden mean in the Nicomachean Ethics Book II: That virtues of character can be described as means. It was subsequently emphasized in Aristotelian virtue ethics.
For example, in the Aristotelian view, courage is a virtue, but if taken to excess would manifest as recklessness, and, in deficiency, cowardice.
History
Western philosophy
Crete
The earliest representation of this idea in culture is probably in the mythological Cretan tale of Daedalus and Icarus. Daedalus, a famous artist of his time, built feathered wings for himself and his son so that they might escape the clutches of King Minos. Daedalus warns his beloved son whom he loved so much to "fly the middle course", between the sea spray and the sun's heat. Icarus did not heed his father; he flew up and up until the sun melted the wax off his wings. For not heeding the middle course, he fell into the sea and drowned.
Delphi
Another early elaboration is the Doric saying carved on the front of the temple at Delphi: "Nothing in excess" ("Μηδὲν ἄγαν").
Cleobulus
To Cleobulus is attributed the maxim: Μέτρον ἄριστον ("Moderation is best")
Socrates
Socrates teaches that a man must know "how to choose the mean and avoid the extremes on either side, as far as possible."
In education, Socrates asks us to consider the effect of either an exclusive devotion to gymnastics or an exclusive devotion to music. It either "produced a temper of hardness and ferocity, (or) the other of softness and effeminacy." Having both qualities, he believed, produces harmony; i.e., beauty and goodness.
Plato
Proportion's relation to beauty and goodness is stressed throughout Plato's dialogues, particularly in the Republic and Philebus. He writes (Phlb. 6 |
https://en.wikipedia.org/wiki/Nonimaging%20optics | Nonimaging optics (also called anidolic optics) is the branch of optics concerned with the optimal transfer of light radiation between a source and a target. Unlike traditional imaging optics, the techniques involved do not attempt to form an image of the source; instead an optimized optical system for optimal radiative transfer from a source to a target is desired.
Applications
The two design problems that nonimaging optics solves better than imaging optics are:
solar energy concentration: maximizing the amount of energy applied to a receiver, typically a solar cell or a thermal receiver
illumination: controlling the distribution of light, typically so it is "evenly" spread over some areas and completely blocked from other areas
Typical variables to be optimized at the target include the total radiant flux, the angular distribution of optical radiation, and the spatial distribution of optical radiation. These variables on the target side of the optical system often must be optimized while simultaneously considering the collection efficiency of the optical system at the source.
Solar energy concentration
For a given concentration, nonimaging optics provide the widest possible acceptance angles and, therefore, are the most appropriate for use in solar concentration as, for example, in concentrated photovoltaics. When compared to "traditional" imaging optics (such as parabolic reflectors or fresnel lenses), the main advantages of nonimaging optics for concentrating solar energy are:
wider acceptance angles resulting in higher tolerances (and therefore higher efficiencies) for:
less precise tracking
imperfectly manufactured optics
imperfectly assembled components
movements of the system due to wind
finite stiffness of the supporting structure
deformation due to aging
capture of circumsolar radiation
other imperfections in the system
higher solar concentrations
smaller solar cells (in concentrated photovoltaics)
higher temperatures (in concentrated solar thermal)
|
https://en.wikipedia.org/wiki/Sinigrin | Sinigrin or allyl glucosinolate is a glucosinolate that belongs to the family of glucosides found in some plants of the family Brassicaceae such as Brussels sprouts, broccoli, and the seeds of black mustard (Brassica nigra). Whenever sinigrin-containing plant tissue is crushed or otherwise damaged, the enzyme myrosinase degrades sinigrin to a mustard oil (allyl isothiocyanate), which is responsible for the pungent taste of mustard and horseradish. Seeds of white mustard, Sinapis alba, give a less pungent mustard because this species contains a different glucosinolate, sinalbin.
Occurrence
The compound was first reported in 1839, after its isolation from black mustard Brassica nigra, also known as Sinapis nigra, after which it was named. Sinigrin is now known to occur widely in other brassica families including Brassicaceae and Capparaceae.
Structure
The chemical structure of sinigrin had been established by 1930. This showed that it is a glucose derivative with β-D-glucopyranose configuration. It was unclear whether the C=N bond was in the Z (or syn) form, with sulfur and oxygen substituents on the same side of the double bond, or the alternative E form in which they are on opposite sides. The matter was settled by X-ray crystallography of its potassium salt in 1963. It is now known that all natural glucosinolates are of Z form.
Synthesis
Biosynthesis
Sinigrin is biosynthesised from the amino acid methionine in a multi-step pathway.
Laboratory synthesis
The first laboratory syntheses of sinigrin was published in 1965. Later work provided a more efficient route.
Function
The natural role of glucosinolates are as plant defense compounds. The enzyme myrosinase removes the glucose group in sinigrin to give an intermediate which spontaneously rearranges to allyl isothiocyanate, the compound responsible for the pungent taste of Dijon mustard. This is a reactive material which is toxic to many insect predators and its production is triggered when the plant is damag |
https://en.wikipedia.org/wiki/Sec61 | Sec61, termed SecYEG in prokaryotes, is a membrane protein complex found in all domains of life. As the core component of the translocon, it transports proteins to the endoplasmic reticulum in eukaryotes and out of the cell in prokaryotes. It is a doughnut-shaped pore through the membrane with 3 different subunits (heterotrimeric), SecY (α), SecE (γ), and SecG (β). It has a region called the plug that blocks transport into or out of the ER. This plug is displaced when the hydrophobic region of a nascent polypeptide interacts with another region of Sec61 called the seam, allowing translocation of the polypeptide into the ER lumen.
Although SecY and SecE are conserved in all three domains of life, bacterial SecG is only weakly homologous with eukaryotic Sec61β. The eukaryotic Sec61β is however homologous to the archaeal "SecG", leading some authors to refer to the archaeal complex as SecYEβ instead of SecYEG. (All three components of the archaeal complex are closer to their eukaryotic homologues than to their bacterial ones, but the old two-empire names have become convention.)
Structure
Much of the knowledge on the structure of the SecY/Sec61α pore comes from an X-ray crystallography structure of its archaeal version. The large SecY subunit consists of two halves, trans-membrane segments 1-5 and trans-membrane segments 6-10. They are linked at the extracellular side by a loop between trans-membrane segments 5 and 6. SecY can open laterally at the front (lateral gate). SecE is a single spanning membrane protein in most species. It sits at the back of SecY, wrapping around the two halves of SecY. Secβ (SecG) is not essential. Its sits on the side of SecY and makes only few contacts with it. In a side view, the channel has an hourglass shape, with a cytoplasmic funnel that is empty, and an extracellular funnel that is filled with a little helix, called the plug. In the middle of the membrane is a construction, formed from a pore ring of four hydrophobic amino acids |
https://en.wikipedia.org/wiki/Horizontal%20scan%20rate | Horizontal scan rate, or horizontal frequency, usually expressed in kilohertz, is the number of times per second that a raster-scan video system transmits or displays a complete horizontal line, as opposed to vertical scan rate, the number of times per second that an entire screenful of image data is transmitted or displayed.
Cathode ray tubes
Within a cathode-ray tube (CRT), the horizontal scan rate is how many times in a second that the electron beam moves from the left side of the display to the right and back. The number of horizontal lines displayed per second can be roughly derived from this number multiplied by the vertical scan rate.
The horizontal scan frequencies of a CRT include some intervals that occur during the vertical blanking interval, so the horizontal scan rate does not directly correlate to visible display lines unless the quantity of unseen lines are also known.
The horizontal scan rate is one of the primary figures determining the resolution capability of a CRT, since it is determined by how quickly the electromagnetic deflection system can reverse the current flowing in the deflection coil in order to move the electron beam from one side of the display to the other. Reversing the current more quickly requires higher voltages, which require more expensive electrical components.
In analog television systems the horizontal frequency is between 15.625 kHz and 15.750 kHz.
Other technologies
While other display technologies such as liquid-crystal displays do not have the specific electrical characteristics that constrain horizontal scan rates on CRTs, there is still a horizontal scan rate characteristic in the signals that drive these displays. |
https://en.wikipedia.org/wiki/National%20Longitudinal%20Surveys | The National Longitudinal Surveys (NLS) are a set of surveys sponsored by the Bureau of Labor Statistics (BLS) of the U.S. Department of Labor. These surveys have gathered information at multiple points in time on the labor market experiences and other significant life events of several groups of men and women. Each of the NLS samples consists of several thousand individuals, many of whom have been surveyed over several decades.
Surveys
The National Longitudinal Survey of Youth 1997 (NLSY97) began in 1997 with 8,984 men and women born in 1980-84 (ages 12–17 in 1997). Sample members were interviewed annually from 1997 to 2011 and biennially thereafter. The 2015 interview was conducted with 7,103 men and women ages 30–36. Data are available from Round 1 (1997–98) to Round 17 (2015–16).
The National Longitudinal Survey of Youth 1979 (NLSY79) began in 1979 with 12,686 men and women born in 1957-64 (ages 14–22 in 1979). Sample members were interviewed annually from 1979-1994 and biennially thereafter. Oversamples of military and economically disadvantaged, nonblack/non-Hispanic respondents were dropped in 1985 and 1991, leaving a sample size of 9,964. The 2014 interview (Round 26) was conducted with 7,071 men and women ages 49–58.
The NLSY79 Children and Young Adults (NLSCYA) began in 1986 with children born to female NLSY79 respondents. Biennial data collection consists of interviews with the mothers and interviews with the children themselves; from 1994 onward, children turning age 15 and older during the survey year have been administered a Young Adult questionnaire that is similar to the NLSY79 questionnaire. In 2014, 276 children (ages 0–14) and 5,735 young adults (ages 15–42) were interviewed. To date, about 10,500 children have been interviewed in at least one survey round.
The National Longitudinal Surveys of Young Women and Mature Women (NLSW) comprised two separate surveys. The Young Women's survey began in 1968 with 5,159 women born in 1943-53 (ages 14–2 |
https://en.wikipedia.org/wiki/Languages%20used%20on%20the%20Internet | Slightly over half of the homepages of the most visited websites on the World Wide Web are in English, with varying amounts of information available in many other languages. Other top languages are Spanish, Russian, Persian, French, German and Japanese.
Of the more than 7,000 existing languages, only a few hundred are recognized as being in use for Web pages on the World Wide Web.
Languages used
There is debate over the most-used languages on the Internet. A 2009 UNESCO report monitoring the languages of websites for 12 years, from 1996 to 2008, found a steady year-on-year decline in the percentage of webpages in English, from 75 percent in 1998 to 45 percent in 2005. The authors found that English remained at 45 percent of content for 2005 to the end of the study but believe this was due to the bias of search engines indexing more English-language content rather than a true stabilization of the percentage of content in English on the World Wide Web.
The number of non-English web pages is rapidly expanding. The use of English online increased by around 281 percent from 2001 to 2011, a lower rate of growth than that of Spanish (743 percent), Chinese (1,277 percent), Russian (1,826 percent) or Arabic (2,501 percent) over the same period.
According to a 2000 study, the international auxiliary language Esperanto ranked 40 out of all languages in search engine queries, also ranking 27 out of all languages that rely on the Latin script.
Usage statistics of content languages for websites
W3Techs estimated percentages of the top 10 million websites on the World Wide Web using various content languages as of 16 October 2023:
All other languages are used in less than 0.1% of websites. Even including all languages, percentages may not sum to 100% because some websites contain multiple content languages.
The figures from the W3Techs study are based on the one million most visited websites (i.e., approximately 0.27 percent of all websites according to December 2011 figur |
https://en.wikipedia.org/wiki/Energy%20%28signal%20processing%29 | In signal processing, the energy of a continuous-time signal x(t) is defined as the area under the squared magnitude of the considered signal i.e., mathematically
Unit of will be (unit of signal)2.
And the energy of a discrete-time signal x(n) is defined mathematically as
Relationship to energy in physics
Energy in this context is not, strictly speaking, the same as the conventional notion of energy in physics and the other sciences. The two concepts are, however, closely related, and it is possible to convert from one to the other:
where Z represents the magnitude, in appropriate units of measure, of the load driven by the signal.
For example, if x(t) represents the potential (in volts) of an electrical signal propagating across a transmission line, then Z would represent the characteristic impedance (in ohms) of the transmission line. The units of measure for the signal energy would appear as volt2·seconds, which is not dimensionally correct for energy in the sense of the physical sciences. After dividing by Z, however, the dimensions of E would become volt2·seconds per ohm,
which is equivalent to joules, the SI unit for energy as defined in the physical sciences.
Spectral energy density
Similarly, the spectral energy density of signal x(t) is
where X(f) is the Fourier transform of x(t).
For example, if x(t) represents the magnitude of the electric field component (in volts per meter) of an optical signal propagating through free space, then the dimensions of X(f) would become volt·seconds per meter and would represent the signal's spectral energy density (in volts2·second2 per meter2) as a function of frequency f (in hertz). Again, these units of measure are not dimensionally correct in the true sense of energy density as defined in physics. Dividing by Zo, the characteristic impedance of free space (in ohms), the dimensions become joule-seconds per meter2 or, equivalently, joules per meter2 per hertz, which is dimensionally correct in SI |
https://en.wikipedia.org/wiki/Internet%20traffic%20engineering | Internet traffic engineering is defined as that aspect of Internet network engineering dealing with the issue of performance evaluation and performance optimization of operational IP networks. Traffic engineering encompasses the application of technology and scientific principles to the measurement, characterization, modeling, and control of Internet traffic [RFC-2702, AWD2].
Enhancing the performance of an operational network, at both traffic and resource levels, are major objectives of Internet engineering. This is accomplished by addressing traffic performance requirements, while utilizing network economically and reliably. Traffic oriented performance includes packet transfer delay, packet delay variation, packet loss, and throughput.
An important objective of Internet traffic engineering is to facilitate reliable network operations [RFC-2702]. This can be done by providing mechanisms that network integrity and by embracing policies emphasizing survivability. This results in a minimization of the network to service outages arising from errors, faults and failures occurring within the infrastructure.
The Internet exists in order to transfer information from nodes to destination nodes. Accordingly, one of the most crucial functions performed by the Internet is the routing of traffic ingress nodes to egress nodes.
Ultimately, it is the performance of the network as seen by network services that is truly paramount. This crucial function should be considered throughout the development of engineering mechanisms and policies. The characteristics visible to end users are the emergent properties of the network, which are characteristics of the network when viewed as a whole. A goal of the service provider, therefore, is to enhance the properties of the network while taking economic considerations into account.
The importance of the above observation regarding the properties of networks is that special care must be taken when choosing network performance metrics to |
https://en.wikipedia.org/wiki/Miura%20fold | The is a method of folding a flat surface such as a sheet of paper into a smaller area. The fold is named for its inventor, Japanese astrophysicist Kōryō Miura.
The crease patterns of the Miura fold form a tessellation of the surface by parallelograms. In one direction, the creases lie along straight lines, with each parallelogram forming the mirror reflection of its neighbor across each crease. In the other direction, the creases zigzag, and each parallelogram is the translation of its neighbor across the crease. Each of the zigzag paths of creases consists solely of mountain folds or of valley folds, with mountains alternating with valleys from one zigzag path to the next. Each of the straight paths of creases alternates between mountain and valley folds.
The Miura fold is related to the Kresling fold, the Yoshimura fold and the Hexagonal fold, and can be framed as a generalization of these folds.
The Miura fold is a form of rigid origami, meaning that the fold can be carried out by a continuous motion in which, at each step, each parallelogram is completely flat. This property allows it to be used to fold surfaces made of rigid materials, making it distinct from the Kresling fold and Yoshimura fold which cannot be rigidly folded and require panel deformations to compress to a compact state. For instance, large solar panel arrays for space satellites in the Japanese space program have been Miura folded before launch and then spread out in space. A folded Miura fold can be packed into a compact shape, its thickness reflecting only the thickness of the folded material. Folded material can be unpacked in one motion by pulling on its opposite ends, and likewise folded by pushing the two ends together. In the solar array application, this property reduces the number of motors required to unfold this shape, reducing weight and complexity.
Applications
The 1996 Space Flyer Unit deployed the 2D Array from a Miura folded configuration.
The inflatable membrane stru |
https://en.wikipedia.org/wiki/Model%20category | In mathematics, particularly in homotopy theory, a model category is a category with distinguished classes of morphisms ('arrows') called 'weak equivalences', 'fibrations' and 'cofibrations' satisfying certain axioms relating them. These abstract from the category of topological spaces or of chain complexes (derived category theory). The concept was introduced by .
In recent decades, the language of model categories has been used in some parts of algebraic K-theory and algebraic geometry, where homotopy-theoretic approaches led to deep results.
Motivation
Model categories can provide a natural setting for homotopy theory: the category of topological spaces is a model category, with the homotopy corresponding to the usual theory. Similarly, objects that are thought of as spaces often admit a model category structure, such as the category of simplicial sets.
Another model category is the category of chain complexes of R-modules for a commutative ring R. Homotopy theory in this context is homological algebra. Homology can then be viewed as a type of homotopy, allowing generalizations of homology to other objects, such as groups and R-algebras, one of the first major applications of the theory. Because of the above example regarding homology, the study of closed model categories is sometimes thought of as homotopical algebra.
Formal definition
The definition given initially by Quillen was that of a closed model category, the assumptions of which seemed strong at the time, motivating others to weaken some of the assumptions to define a model category. In practice the distinction has not proven significant and most recent authors (e.g., Mark Hovey and Philip Hirschhorn) work with closed model categories and simply drop the adjective 'closed'.
The definition has been separated to that of a model structure on a category and then further categorical conditions on that category, the necessity of which may seem unmotivated at first but becomes important later. The follo |
https://en.wikipedia.org/wiki/Forbush%20decrease | A Forbush decrease is a rapid decrease in the observed galactic cosmic ray intensity following a coronal mass ejection (CME). It occurs due to the magnetic field of the plasma solar wind sweeping some of the galactic cosmic rays away from Earth. The term Forbush decrease was named after the American physicist Scott E. Forbush, who studied cosmic rays in the 1930s and 1940s.
Observation
The Forbush decrease is usually observable by particle detectors on Earth within a few days after the CME, and the decrease takes place over the course of a few hours. Over the following several days, the galactic cosmic ray intensity returns to normal. Forbush decreases have also been observed by humans on Mir and the International Space Station (ISS), at other locations in the inner heliosphere such as the Solar Orbiter spacecraft, and at Mars with the Mars Science Laboratory rover's Radiation assessment detector and the MAVEN orbiter, as well as in the outer solar system by instruments onboard Pioneer 10 and 11 and Voyager 1 and 2, even past the orbit of Neptune.
The magnitude of a Forbush decrease depends on three factors:
the size of the CME
the strength of the magnetic fields in the CME
the proximity of the CME to the Earth
A Forbush decrease is sometimes defined as being a decrease of at least 10% of galactic cosmic rays on Earth, but ranges from about 3% to 20%. The amplitude is also highly dependent on the energy of cosmic rays that is observed by the specific instrument, where lower energies typically show larger decreases. Reductions of 30% or more have been recorded aboard the ISS.
The overall rate of Forbush decreases tends to follow the 11-year sunspot cycle. It is more difficult to shield astronauts from galactic cosmic rays than from solar wind, so future astronauts might benefit most from radiation shielding during solar minima, when the suppressive effect of CMEs is less frequent.
Effects on the atmosphere
A 2009 peer reviewed article found that low clouds c |
https://en.wikipedia.org/wiki/Crypsis | In ecology, crypsis is the ability of an animal or a plant to avoid observation or detection by other animals. It may be a predation strategy or an antipredator adaptation. Methods include camouflage, nocturnality, subterranean lifestyle and mimicry. Crypsis can involve visual, olfactory (with pheromones) or auditory concealment. When it is visual, the term cryptic coloration, effectively a synonym for animal camouflage, is sometimes used, but many different methods of camouflage are employed by animals or plants.
Overview
There is a strong evolutionary pressure for animals to blend into their environment or conceal their shape, for prey animals to avoid predators and for predators to be able to avoid detection by prey. Exceptions include large herbivores without natural enemies, brilliantly colored birds that rely on flight to escape predators, and venomous or otherwise powerfully armed animals with warning coloration. Cryptic animals include the tawny frogmouth (feather patterning resembles bark), the tuatara (hides in burrows all day; nocturnal), some jellyfish (transparent), the leafy sea dragon, and the flounder (covers itself in sediment).
Methods
Methods of crypsis include (visual) camouflage, nocturnality, and subterranean lifestyle. Camouflage can be achieved by a wide variety of methods, from disruptive coloration to transparency and some forms of mimicry, even in habitats like the open sea where there is no background.
As a strategy, crypsis is used by predators against prey and by prey against predators.
Crypsis also applies to eggs and pheromone production. Crypsis can in principle involve visual, olfactory, or auditory camouflage.
Visual
Many animals have evolved so that they visually resemble their surroundings by using any of the many methods of natural camouflage that may match the color and texture of the surroundings (cryptic coloration) and/or break up the visual outline of the animal itself (disruptive coloration). Such animals, like the |
https://en.wikipedia.org/wiki/Brutus%20Buckeye | Brutus Buckeye is the athletics mascot of Ohio State University. Brutus made his debut in 1965, with periodic updates to design and wardrobe occurring in the years since. As a member of the spirit squad, Brutus Buckeye travels to many events around the university and often makes appearances around Columbus.
History
Ohio State students Ray Bourhis and Sally Huber decided Ohio State needed a mascot in 1965 and convinced the athletic council to study the matter. At the time, mascots were generally animals brought into the stadium or arena. A buck deer was contemplated, but, because bringing live animals as mascots was common at the time, this was rejected as impossible. Instead, the buckeye was selected, as the buckeye is the official state tree of Ohio. A simple papier-mâché nut was constructed by students, worn over the head and torso, with legs sticking out. It made its appearance at the Minnesota vs. Ohio State homecoming football game on October 30, 1965. The heavy papier-mâché nut did not last and it was soon replaced by a fiberglass shell. On November 21, 1965, The Columbus Dispatch reported that judges picked Brutus Buckeye to be the new mascot's name after a campus-wide "Name the Buckeye" contest. The winning name was the idea of then Ohio State student Kerry J. Reed, 21. "Block O" agreed to care for Brutus in December.
In the early 2000s, the Brutus costume was stolen before a game. The mascot was forced to wear the old costume.
Brutus has a buckeye head and block O hat, scarlet and grey shirt emblazoned "Brutus" and "00", red pants with an Ohio State towel hanging over the front, and high white socks with black shoes. Male and female students both serve as Brutus Buckeye.
Appearances
Brutus Buckeye appears in ESPN This Is SportsCenter advertisements eating lunch and performing aerobics with Richard Simmons.
Brutus appears strapped to the back of a truck in Home Depot commercials advertising Glidden paint.
Brutus appears in the NCAA Football |
https://en.wikipedia.org/wiki/Windows%20Media%20Center | Windows Media Center (WMC) is a digital video recorder and media player created by Microsoft. Media Center was first introduced to Windows in 2002 on Windows XP Media Center Edition (MCE). It was included in Home Premium and Ultimate editions of Windows Vista, as well as all editions of Windows 7 except Starter and Home Basic. It was also available on Windows 8 Pro and Windows 8.1 Pro as a paid add-on, before being discontinued in Windows 10, although it can reportedly be unofficially reinstalled using a series of Command Prompt commands.
Media Center can play slideshows, videos and music from local hard drives, optical drives and network locations. Users can stream television programs and films through selected services such as Netflix. Content can be played back on computer monitors or on television sets through the use of devices called Windows Media Center Extenders. It is also possible to watch and pause live TV. Up to six TV tuners on a tuner card are supported simultaneously. Both standard- and high-definition unencrypted video are supported through DVB-T and ATSC standards. It is possible to view encrypted cable television channels by using an internal or external tuner that supported CableCARD.
Shortly after Windows 7's 2009 release, Microsoft disbanded the Media Center development team, thus abandoning any further software developments. Consequently, the Media Center interface remained unchanged for Windows 8 and 8.1 users. In May 2015, Microsoft announced that Windows Media Center would be discontinued on Windows 10, and that it would be removed when upgrading; but stated that those upgrading from a version of Windows that included the Media Center application would receive the paid Windows DVD Player app for free to maintain DVD playback functionality.
Version history
Windows XP Media Center Edition
Windows Media Center, codenamed "Freestyle", was first included with Windows XP Media Center Edition.
Windows Vista
A new version of the WMC was inc |
https://en.wikipedia.org/wiki/Harmonic%20balance | Harmonic balance is a method used to calculate the steady-state response of nonlinear differential equations, and is mostly applied to nonlinear electrical circuits.
It is a frequency domain method for calculating the steady state, as opposed to the various time-domain steady-state methods. The name "harmonic balance" is descriptive of the method, which starts with Kirchhoff's Current Law written in the frequency domain and a chosen number of harmonics. A sinusoidal signal applied to a nonlinear component in a system will generate harmonics of the fundamental frequency. Effectively the method assumes a linear combination of sinusoids can represent the solution, then balances current and voltage sinusoids to satisfy Kirchhoff's law. The method is commonly used to simulate circuits which include nonlinear elements, and is most applicable to systems with feedback in which limit cycles occur.
Microwave circuits were the original application for harmonic balance methods in electrical engineering. Microwave circuits were well-suited because, historically, microwave circuits consist of many linear components which can be directly represented in the frequency domain, plus a few nonlinear components. System sizes were typically small. For more general circuits, the method was considered impractical for all but these very small circuits until the mid-1990s, when Krylov subspace methods were applied to the problem.
The application of preconditioned Krylov subspace methods allowed much larger systems to be solved, both in the size of the circuit and in the number of harmonics. This made practical the present-day use of harmonic balance methods to analyze radio-frequency integrated circuits (RFICs).
Example
Consider the differential equation . We use the ansatz solution , and plugging in, we obtain
Then by matching the terms, we have
,
which yields approximate period .
For a more exact approximation, we use ansatz solution . Plugging these in and matching the , ter |
https://en.wikipedia.org/wiki/Fluent%20%28artificial%20intelligence%29 | In artificial intelligence, a fluent is a condition that can change over time. In logical approaches to reasoning about actions, fluents can be represented in first-order logic by predicates having an argument that depends on time. For example, the condition "the box is on the table", if it can change over time, cannot be represented by ; a third argument is necessary to the predicate to specify the time: means that the box is on the table at time . This representation of fluents is modified in the situation calculus by using the sequence of the past actions in place of the current time.
A fluent can also be represented by a function, dropping the time argument. For example, that the box is on the table can be represented by , where is a function and not a predicate. In first-order logic, converting predicates to functions is called reification; for this reason, fluents represented by functions are said to be reified. When using reified fluents, a separate predicate is necessary to tell when a fluent is actually true or not. For example, means that the box is actually on the table at time , where the predicate is the one that tells when fluents are true. This representation of fluents is used in the event calculus, in the fluent calculus, and in the features and fluents logics.
Some fluents can be represented as functions in a different way. For example, the position of a box can be represented by a function whose value is the object the box is standing on at time . Conditions that can be represented in this way are called functional fluents. Statements about the values of such functions can be given in first-order logic with equality using literals such as . Some fluents are represented this way in the situation calculus.
Naive physics
From a historical point of view, fluents were introduced in the context of qualitative reasoning. The idea is to describe a process model not with mathematical equations but with natural language. That means an action is |
https://en.wikipedia.org/wiki/Event%20calculus | The event calculus is a logical language for representing and reasoning about events and their effects first presented by Robert Kowalski and Marek Sergot in 1986. It was extended by Murray Shanahan and Rob Miller in the 1990s. Similar to other languages for reasoning about change, the event calculus represents the effects of actions on fluents. However, events can also be external to the system. In the event calculus, one can specify the value of fluents at some given time points, the events that take place at given time points, and their effects.
Fluents and events
In the event calculus, fluents are reified. This means that they are not formalized by means of predicates but by means of functions. A separate predicate is used to tell which fluents hold at a given time point. For example, means that the box is on the table at time ; in this formula, is a predicate while is a function.
Events are also represented as terms. The effects of events are given using the predicates and . In particular, means that,
if the event represented by the term is executed at time ,
then the fluent will be true after .
The predicate has a similar meaning, with the only difference
being that will be false after .
Domain-independent axioms
Like other languages for representing actions, the event calculus formalizes the correct evolution of the fluent via formulae telling the value of each fluent after an arbitrary action has been performed. The event calculus solves the frame problem in a way that is similar to the successor state axioms of the situation calculus: a fluent is true at time if and only if it has been made true in the past and has not been made false in the meantime.
This formula means that the fluent represented by the term is true at time if:
an event has taken place: ;
this took place in the past: ;
this event has the fluent as an effect: ;
the fluent has not been made false in the meantime:
A similar formula is used to formalize the opp |
https://en.wikipedia.org/wiki/Embedded%20value | The Embedded Value (EV) of a life insurance company is the present value of future profits plus adjusted net asset value. It is a construct from the field of actuarial science which allows insurance companies to be valued.
Background
Life insurance policies are long-term contracts, where the policyholder pays a premium to be covered against a possible future event (such as the death of the policyholder).
Future income for the insurer consists of premiums paid by policyholders whilst future outgoings comprise claims paid to policyholders as well as various expenses. The difference, combined with income on and release of statutory reserves, represents future profit.
Net asset value is the difference between the total assets and liabilities of an insurance company.
For companies, the net asset value is usually calculated at book value. This needs to be adjusted to market values for EV purposes. Furthermore, this value may be discounted to reflect the "lock in" of some of the assets by their nature. (An example of such a lock-in would be assets held within the with-profits fund)
Value of the insurer
EV measures the value of the insurer by adding today's value of the existing business (i.e. future profits) to the market value of net assets (i.e. accumulated past profits).
It is a conservative measure of the insurer's value in the sense that it only considers future profits from existing policies and so ignores the possibility that the insurer may sell new policies in future. It also excludes goodwill. As a result, the insurer is worth more than its EV.
Formula
Embedded Value is calculated as follows:
EV = PVFP + ANAV
where
EV = Embedded Value
PVFP = present value of future profits
ANAV = adjusted net asset value
Improvements
European embedded value (EEV) is a variation of EV which was set up by the CFO Forum which allows for a more formalised method of choosing the parameters and doing the calculations, to enable greater transparency and comparability.
Market |
https://en.wikipedia.org/wiki/Plastochron | As the tip of a plant shoot grows, new leaves are produced at regular time intervals if temperature is held constant. This time interval is termed the plastochron (or plastochrone). The plastochrone index and the leaf plastochron index are ways of measuring the age of a plant dependent on morphological traits rather than on chronological age. Use of these indices removes differences caused by germination, developmental differences and exponential growth.
Definitions
The spatial pattern of the arrangement of leaves is called phyllotaxy whereas the time between successive leaf initiation events is called the plastochron and the rate of emergence from the apical bud is the phyllochron.
Plastochron ratio
In 1951, F. J. Richards introduced the idea of the plastochron ratio and developed a system of equations to describe mathematically a centric representation using three parameters: plastochron ratio, divergence angle, and the angle of the cone tangential to the apex in the area being considered.
Emerging phyllodes or leaf variants experience a sudden change from a high humidity environment to a more arid one. There are other changes they encounter such as variations in light level, photoperiod and the gaseous content of the air. |
https://en.wikipedia.org/wiki/List%20of%20the%20largest%20software%20companies | Many lists exist that provide an overview of large software companies, often called "independent software vendors" ("ISVs"), in the world. The lists differ by methodology of composition and consequently show substantial differences in both the listed companies and the ranking of those companies.
Legend
Forbes Global 2000
The Forbes Global 2000 is an annual ranking of the top 2000 public companies in the world by Forbes magazine, based on a mix of four metrics: sales, profit, assets and market value. The Forbes list for software companies includes only pure play (or nearly pure play) software companies and excludes manufacturers, consumer electronics companies, conglomerates, IT consulting firms, and computer services companies even if they have large software divisions.
The top 50 companies in terms of market capitalization in the 2019 Forbes list for the "Software & Programming" industry are listed in the following table:
All values listed in the table are in billion US$.
See also
List of largest technology companies by revenue
List of largest manufacturing companies by revenue
List of largest United States–based employers globally
List of largest employers
Economy of the United States |
https://en.wikipedia.org/wiki/Launch%20control%20%28automotive%29 | Launch control is an electronic aid to assist drivers of both racing and street cars to accelerate from a standing start. Motorcycles have been variously fitted with mechanical and electronic devices for both street and race.
Popular automobiles with launch control include the BMW M series, certain marques of the Volkswagen Group with Direct-Shift Gearbox (most notably the Bugatti Veyron), Porsche 911 (sport+ mode), Panamera Turbo, Alfa Romeo with TCT gearbox and certain General Motors products. Mitsubishi also incorporated launch control into their Twin Clutch SST gearbox, on its "S-Sport" mode, but the mode is only available in the Evolution X MR and MR Touring (USDM). The Jaguar F-Type includes launch control. The Nissan GT-R has electronics to control launch but the company does not use the term "launch control" since some owners have equated the term with turning off the stability control to launch the car, which may void the warranty of the drivetrain. One version of Nissan GT-R allows user to launch the car by turning the Traction Control to "R" mode.
Operation
Launch control operates by using an electronic accelerator and a computer program. The software controls acceleration based on engine specifications to make the car accelerate smoothly and as fast as possible, avoiding spinning of the drive wheels, engine failure due to over-revving and clutch and gearbox problems. Looking more in depth, launch control holds the engines RPM at a set number allowing for the car to build power before the computer or operator disengages the clutch. In racing cars, this feature is only available at the start of the race, when the car is stationary in the starting grid. After the car is running at a certain speed, the software is disabled.
Aftermarket launch control
Two-Step Rev Limiting
Modern vehicles are increasingly becoming equipped with launch control features available straight from the factory. However, if a vehicle doesn’t come equipped with such features, |
https://en.wikipedia.org/wiki/User%20Location%20Service | In computing, User Location Service was a standards-based protocol for directory services and presence information, first submitted as a draft to the IETF in February 1996.
Client software supporting ULS included early versions of Microsoft Netmeeting, Intel Video Phone and FreeWebFone. Netmeeting had depreciated ULS in favour of Internet Locator Service by 1997 and FreeWebFone no longer exists.
A ULS server provides directory services and presence lookup for clients. At one stage, public ULS servers were made available by Microsoft and others, but these have largely been abandoned.
ULS typically runs on the TCP port 522.
See also
Internet Locator Service
LDAP
External links
Microsoft Technet: Netmeeting
Freewebfone User Location Server
Microsoft NetMeeting Overview
ULS Internet-Draft submitted to the IETF by Microsoft in 1996
Network protocols |
https://en.wikipedia.org/wiki/Disaccharidase | Disaccharidases are glycoside hydrolases, enzymes that break down certain types of sugars called disaccharides into simpler sugars called monosaccharides. In the human body, disaccharidases are made mostly in an area of the small intestine's wall called the brush border, making them members of the group of "brush border enzymes".
A genetic defect in one of these enzymes will cause a disaccharide intolerance, such as lactose intolerance or sucrose intolerance.
Examples of disaccharidases
Lactase (breaks down lactose into glucose and galactose)
Maltase (breaks down maltose into 2 glucoses)
Sucrase (breaks down sucrose into glucose and fructose)
Trehalase (breaks down trehalose into 2 glucoses)
For a thorough scientific overview of small-intestinal disaccharidases, one can consult chapter 75 of OMMBID. For more online resources and references, see inborn error of metabolism. |
https://en.wikipedia.org/wiki/Minichromosome | A minichromosome is a small chromatin-like structure resembling a chromosome and consisting of centromeres, telomeres and replication origins but little additional genetic material. They replicate autonomously in the cell during cellular division. Minichromosomes may be created by natural processes as chromosomal aberrations or by genetic engineering.
Structure
Minichromosomes can be either linear or circular pieces of DNA. By minimizing the amount of unnecessary genetic information on the chromosome and including the basic components necessary for DNA replication (centromere, telomeres, and replication sequences), molecular biologists aim to construct a chromosomal platform which can be utilized to insert or present new genes into a host cell.
Production
Producing minichromosomes by genetic engineering techniques involves two primary methods, the de novo (bottom-up) and the top-down approach.
De novo
The minimum constituent parts of a chromosome (centromere, telomeres, and DNA replication sequences) are assembled by using molecular cloning techniques to construct the desired chromosomal contents in vitro. Next, the desired contents of the minichromosome must be transformed into a host which is capable of assembling the components (typically yeast or mammalian cells) into a functional chromosome. This approach has been attempted for the introduction of minichromosomes into maize for the possibility of genetic engineering, but success has been limited and questionable. In general, the de novo approach is more difficult than the top-down method due to species incompatibility issues and the heterochromatic nature of centromeric regions.
Top-down
This method utilizes the mechanism of telomere-mediated chromosomal truncation (TMCT). This process is the generation of truncation by selective transformation of telomeric sequences into a host genome. This insertion causes the generation of more telomeric sequences and eventual truncation. The newly synthesized trunca |
https://en.wikipedia.org/wiki/Racing%20flags | Racing flags are traditionally used in auto racing and similar motorsports to indicate track conditions and to communicate important messages to drivers. Typically, the starter, sometimes the grand marshal of a race, waves the flags atop a flag stand near the start/finish line. Track marshals are also stationed at observation posts along the race track in order to communicate both local and course-wide conditions to drivers. Alternatively, some race tracks employ lights to supplement the primary flag at the start/finish line.
Summary
While there is no universal system of racing flags across all of motorsports, most series have standardized them, with some flags carrying over between series. For example, the chequered flag is commonly used across all of motorsport to signify the end of a session (practice, qualifying, or race), while the penalty flags differ from series to series. FIA-sanctioned championship flags are the most commonly used internationally (outside of North America) as they cover championships such as Formula 1, the FIA World Endurance Championship and WTCC, and are adopted (and sometimes adapted) by many more motorsport governing bodies across the world such as, for example, the MSA.
Status flags
Status flags are used to inform all drivers of the general status of the course during a race. In addition, the green, yellow, and red flags described below may be augmented or replaced by lights at various points around the circuit.
Green flag
The solid green flag is usually displayed by the starter to indicate the start of a race. During a race, it is displayed at the end of a caution period or a temporary delay to indicate that the race is restarting. The waving of a green flag is almost universally supplemented with the illumination of green lights (resembling traffic lights) at various intervals around the course, particularly on ovals.
If the race is not under caution or delayed, it is said to be under green-flag conditions. However, the flag |
https://en.wikipedia.org/wiki/Disk%20staging | Disk staging is using disks as an additional, temporary stage of backup process before finally storing backup to tape. Backups stay on disk typically for a day or a week, before being copied to tape in a background process and deleted afterwards.
The process of disk staging is controlled by the same software that performs actual backups, which is different from virtual tape library where intermediate disk usage is hidden from main backup software. Both techniques are known as D2D2T (disk-to-disk-to-tape).
Restoring data
Data is restored from disk if possible. But if the data exists only on tape it is restored directly (no backward-staging on restore).
Reasons
Reasons behind using D2D2T:
increase performance of small, random-access restores: disk has much faster random access than tape
increase overall backup/restore performance: although disk and a tape have similar streaming throughput, you can easily scale disk throughput by the means of striping (and tape-striping is a much less established technique)
increase utilization of tape drives: tape shoe-shining effect is eliminated when staging (note that it may still happen on tape restores)
See also
Backup
Virtual tape library |
https://en.wikipedia.org/wiki/Tomita%E2%80%93Takesaki%20theory | In the theory of von Neumann algebras, a part of the mathematical field of functional analysis, Tomita–Takesaki theory is a method for constructing modular automorphisms of von Neumann algebras from the polar decomposition of a certain involution. It is essential for the theory of type III factors, and has led to a good structure theory for these previously intractable objects.
The theory was introduced by , but his work was hard to follow and mostly unpublished, and little notice was taken of it until wrote an account of Tomita's theory.
Modular automorphisms of a state
Suppose that M is a von Neumann algebra acting on a Hilbert space H, and Ω is a cyclic and separating vector of H of norm 1. (Cyclic means that MΩ is dense in H, and separating means that the map from M to MΩ is injective.) We write for the vector state of M, so that H is constructed from using the Gelfand–Naimark–Segal construction. Since Ω is separating, is faithful.
We can define a (not necessarily bounded) antilinear operator S0 on H with dense domain MΩ by setting for all m in M, and similarly we can define a (not necessarily bounded) antilinear operator F0 on H with dense domain M'Ω by setting for m in M′, where M′ is the commutant of M.
These operators are closable, and we denote their closures by S and F = S*. They have polar decompositions
where is an antilinear isometry of H called the modular conjugation and is a positive (hence, self-adjoint) and densely defined operator called the modular operator.
Commutation theorem
The main result of Tomita–Takesaki theory states that:
for all t and that
the commutant of M.
There is a 1-parameter group of modular automorphisms of M associated with the state , defined by .
The modular conjugation operator J and the 1-parameter unitary group satisfy
and
The Connes cocycle
The modular automorphism group of a von Neumann algebra M depends on the choice of state φ. Connes discovered that changing the state does not change |
https://en.wikipedia.org/wiki/Hot%20cathode | In vacuum tubes and gas-filled tubes, a hot cathode or thermionic cathode is a cathode electrode which is heated to make it emit electrons due to thermionic emission. This is in contrast to a cold cathode, which does not have a heating element. The heating element is usually an electrical filament heated by a separate electric current passing through it. Hot cathodes typically achieve much higher power density than cold cathodes, emitting significantly more electrons from the same surface area. Cold cathodes rely on field electron emission or secondary electron emission from positive ion bombardment, and do not require heating. There are two types of hot cathode. In a directly heated cathode, the filament is the cathode and emits the electrons. In an indirectly heated cathode, the filament or heater heats a separate metal cathode electrode which emits the electrons.
From the 1920s to the 1960s, a wide variety of electronic devices used hot-cathode vacuum tubes. Today, hot cathodes are used as the source of electrons in fluorescent lamps, vacuum tubes, and the electron guns used in cathode ray tubes and laboratory equipment such as electron microscopes.
Description
A cathode electrode in a vacuum tube or other vacuum system is a metal surface which emits electrons into the evacuated space of the tube. Since the negatively charged electrons are attracted to the positive nuclei of the metal atoms, they normally stay inside the metal and require energy to leave it. This energy is called the work function of the metal. In a hot cathode, the cathode surface is induced to emit electrons by heating it with a filament, a thin wire of refractory metal like tungsten with current flowing through it. The cathode is heated to a temperature that causes electrons to be 'boiled off' of its surface into the evacuated space in the tube, a process called thermionic emission.
There are two types of hot cathodes:
Directly heated cathode In this type, the filament itself is |
https://en.wikipedia.org/wiki/Shrimp%20paste | Shrimp paste or prawn sauce is a fermented condiment commonly used in Southeast Asian and Southern Chinese cuisines. It is primarily made from finely crushed shrimp or krill mixed with salt, and then fermented for several weeks. They are either sold in their wet form or are sun-dried and either cut into rectangular blocks or sold in bulk. It is an essential ingredient in many curries, sauces and sambal. Shrimp paste can be found in many meals in Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand, and Vietnam. It is often an ingredient in dip for fish or vegetables.
History
Shrimp paste originated in continental Southeast Asia, probably among the Cham and Mon people, from where it spread southwards to insular Southeast Asia.
In Java, fermented shrimp paste (trasi or terasi), as mentioned in two ancient Sundanese scriptures, Carita Purwaka Caruban Nagari and Mertasinga, had been around before sixth century. According to Carita Purwaka Caruban Nagari, Cirebon had angered the King of Galuh Kingdom after they stopped paying a tribute (in the forms of shrimp paste and salt, their regional products) to him. In Mertasinga, it was mentioned that Cirebon was attacked by Galuh Kingdom because they stopped sending trasi to the king.
Shrimp paste was one of Java's most popular exports bought by traders from neighboring islands and abroad. According to Purwaka Caruban Nagari, Chinese Muslim explorer, Zheng He of Yunnan, used to buy trasi from Cirebon and brought it back to his homeland. He was the one who introduced trasi to China, a foreign condiment which later became popular and inspired locals to make their own version.
In 1707, William Dampier described trasi in his book "A New Voyage Round the World"; "A composition of a strong odor, but it became a very tasty meal for the indigenous people." Dampier described it further as a mixture of shrimp and small fish made into a kind of soft pickle with salt and water, and then the dough was pack |
https://en.wikipedia.org/wiki/Planck%20postulate | The Planck postulate (or Planck's postulate), one of the fundamental principles of quantum mechanics, is the postulate that the energy of oscillators in a black body is quantized, and is given by
,
where is an integer (1, 2, 3, ...), is Planck's constant, and (the Greek letter nu, not the Latin letter v) is the frequency of the oscillator.
The postulate was introduced by Max Planck in his derivation of his law of black body radiation in 1900. This assumption allowed Planck to derive a formula for the entire spectrum of the radiation emitted by a black body. Planck was unable to justify this assumption based on classical physics; he considered quantization as being purely a mathematical trick, rather than (as is now known) a fundamental change in the understanding of the world. In other words, Planck then contemplated virtual oscillators.
In 1905, Albert Einstein adapted the Planck postulate to explain the photoelectric effect, but Einstein proposed that the energy of photons themselves was quantized (with photon energy given by the Planck–Einstein relation), and that quantization was not merely a feature of microscopic oscillators. Planck's postulate was further applied to understanding the Compton effect, and was applied by Niels Bohr to explain the emission spectrum of the hydrogen atom and derive the correct value of the Rydberg constant.
Notes |
https://en.wikipedia.org/wiki/CAD%20data%20exchange | CAD data exchange is a method of drawing data exchange used to translate between different computer-aided design (CAD) authoring systems or between CAD and other downstream CAx systems.
Many companies use different CAD systems and exchange CAD data file format with suppliers, customers, and subcontractors. Such formats are often proprietary. Transfer of data is necessary so that, for example, one organization can be developing a CAD model, while another performs analysis work on the same model; at the same time a third organization is responsible for manufacturing the product.
Since the 1980s, a range of different CAD technologies have emerged. They differ in their application aims, user interfaces, performance levels, and in data structures and data file formats. For interoperability purposes a requirement of accuracy in the data exchange process is of paramount importance and robust exchange mechanisms are needed.
The exchange process targets primarily the geometric information of the CAD data but it can also target other aspects such as metadata, knowledge, manufacturing information, tolerances and assembly structure.
There are three options available for CAD data exchange: direct model translation, neutral file exchange and third-party translators.
CAD data content
Although initially targeted for the geometric information (wire frame, surfaces, solids and drawings) of a product, nowadays there are other pieces of information that can be retrieved from a CAD file:
Metadata – non-graphical attributes, e.g.:
part or detail numbers
author of the drawing
revision level, file path on the computer or network storage
system, the release information, etc.
Design intent data – e.g. history trees, formulas, rules, guidelines
Application data – e.g. Numerical Control tool paths, Geometric dimensioning and tolerancing (GD&T), process planning and assembly structure
The different types of product information targeted by the exchange process may vary throughout th |
https://en.wikipedia.org/wiki/Quickselect | In computer science, quickselect is a selection algorithm to find the kth smallest element in an unordered list, also known as the kth order statistic. Like the related quicksort sorting algorithm, it was developed by Tony Hoare, and thus is also known as Hoare's selection algorithm. Like quicksort, it is efficient in practice and has good average-case performance, but has poor worst-case performance. Quickselect and its variants are the selection algorithms most often used in efficient real-world implementations.
Quickselect uses the same overall approach as quicksort, choosing one element as a pivot and partitioning the data in two based on the pivot, accordingly as less than or greater than the pivot. However, instead of recursing into both sides, as in quicksort, quickselect only recurses into one side – the side with the element it is searching for. This reduces the average complexity from to , with a worst case of .
As with quicksort, quickselect is generally implemented as an in-place algorithm, and beyond selecting the th element, it also partially sorts the data. See selection algorithm for further discussion of the connection with sorting.
Algorithm
In quicksort, there is a subprocedure called partition that can, in linear time, group a list (ranging from indices left to right) into two parts: those less than a certain element, and those greater than or equal to the element. Here is pseudocode that performs a partition about the element list[pivotIndex]:
function partition(list, left, right, pivotIndex) is
pivotValue := list[pivotIndex]
swap list[pivotIndex] and list[right] // Move pivot to end
storeIndex := left
for i from left to right − 1 do
if list[i] < pivotValue then
swap list[storeIndex] and list[i]
increment storeIndex
swap list[right] and list[storeIndex] // Move pivot to its final place
return storeIndex
This is known as the Lomuto partition scheme, which is simpler but le |
https://en.wikipedia.org/wiki/Honeydew%20%28melon%29 | The honeydew melon is one of the two main cultivar types in Cucumis melo Inodorus Group. It is characterized by the smooth rind and lack of musky odor. The other main type in the Inodorus Group is the wrinkle-rind casaba melon.
Characteristics
A honeydew has a round to slightly oval shape, typically long. It generally ranges in weight from . The flesh is usually pale green in color, while the smooth peel ranges from greenish to yellow. Like most fruit, honeydew has seeds. The inner flesh is eaten, often for dessert, and honeydew is commonly found in supermarkets across the world alongside cantaloupe melons and watermelons. In California, honeydew is in season from August until October.
This fruit grows best in semiarid climates and is harvested based on maturity, not size. Maturity can be hard to judge, but it is based upon the ground color ranging from greenish white (immature) to creamy yellow (mature). Quality is also determined by the honeydew having a nearly spherical shape with a surface free of scars or defects. A honeydew should also feel heavy for its size and have a waxy rather than a fuzzy surface. This reflects the integrity and quality of its flesh as the weight can be attributed to the high water content of the ripened fruit. A lack of fuzz distinguishes a ripened honeydew from an unripened one as it is a sign of growth still having been underway when harvested.
Nutrition
The honeydew is 90% water, 9% carbohydrates, 0.1% fat, and 0.5% protein. Like most melons, it is an excellent source of vitamin C, with one cup containing 56% of the recommended daily value. The honeydew is also a good source of vitamin B thiamine, as well as other B vitamins and the mineral potassium. In addition, it is low in calories compared to many other high potassium fruits such as bananas, with only 36 calories per 100g. However, the honeydew contains only negligible amounts of most other vitamins and minerals.
Origin and alternate names
"Honeydew" is the American na |
https://en.wikipedia.org/wiki/Capitalization%20rate | Capitalization rate (or "cap rate") is a real estate valuation measure used to compare different real estate investments. Although there are many variations, the cap rate is generally calculated as the ratio between the annual rental income produced by a real estate asset to its current market value. Most variations depend on the definition of the annual rental income and whether it is gross or net of annual costs, and whether the annual rental income is the actual amount received (initial yields), or the potential rental income that could be received if the asset was optimally rented (ERV yield).
Basic formula
The rate is calculated in a simple fashion as follows:
Some investors may calculate the cap rate differently.
In instances where the purchase or market value is unknown, investors can determine the capitalization rate using a different equation based upon historical risk premiums, as follows:
Explanatory examples
For example, if a building is purchased for sale price and it produces in positive net operating income (the amount left over after fixed costs and variable costs are subtracted from gross lease income) during one year, then:
= 0.10 = 10%
The asset's capitalization rate is ten percent; one-tenth of the building's cost is paid by the year's net proceeds.
If the owner bought the building twenty years ago for that is now worth , his cap rate is
= 0.25 = 25%.
The investor must take into account the opportunity cost of keeping their money tied up in this investment. By keeping this building, they are losing the opportunity of investing (by selling the building at its market value and investing the proceeds). This is why the current value of the investment, not the actual initial investment, should be used in the cap rate calculation. Thus, for the owner of the building who bought it twenty years ago for , the real cap rate is twenty-five percent, not fifty percent, and they have invested, not .
As another example of why the current value |
https://en.wikipedia.org/wiki/Ring%20King | Ring King, known as in Japan and Europe, is an arcade boxing game. It was published in 1985 by Woodplace in Japan and Europe, and by Data East in North America.
Gameplay
The game continues the series' theme of comical sports as the player takes the role of a boxer who makes his way from his debut to become a world champion. Ring King, though perhaps unintentionally, is standard of the boxing creations of its era, via providing quirky monikers for opponents the player encounters; in its arcade release, these number eight (8): Violence Jo (this entry level fighter is the champion, in the NES version), Brown Pants, White Wolf, Bomba Vern, Beat Brown, Blue Warker (reigning champion, in the arcade version), Green Hante and Onetta Yank. Assuming the player wins the championship, arcade play continues cycling through only the last of the afore-listed three (Blue Warker, Green Hante, Onetta Yank).
The player can choose from several different types of punches and defensive maneuvers, along with unique special attacks. The player revives their stamina during the round interval by pressing the button rapidly. In the Nintendo port, the boxer's abilities are determined by three different stats; punch, stamina, and speed. The player can improve these stats using the power points gained after each match. Performing well in matches allows the player to create more powerful boxers. The player can save their game progress by recording a password, and two players can face off against each other in the two-player mode. Though the game is rudimentary, it is possible to counter-punch, and missing with too many punches causes the boxer's stamina to decrease.
Special attacks
The biggest characteristic of the game is the comical set of special attacks. These moves are activated when the player presses the attack button at the right timing and at the right distance. The attacks have the capability to instantly knock out the opponent, but being countered before a special attack causes an |
https://en.wikipedia.org/wiki/Octahedral%20symmetry | A regular octahedron has 24 rotational (or orientation-preserving) symmetries, and 48 symmetries altogether. These include transformations that combine a reflection and a rotation. A cube has the same set of symmetries, since it is the polyhedron that is dual to an octahedron.
The group of orientation-preserving symmetries is S4, the symmetric group or the group of permutations of four objects, since there is exactly one such symmetry for each permutation of the four diagonals of the cube.
Details
Chiral and full (or achiral) octahedral symmetry are the discrete point symmetries (or equivalently, symmetries on the sphere) with the largest symmetry groups compatible with translational symmetry. They are among the crystallographic point groups of the cubic crystal system.
As the hyperoctahedral group of dimension 3 the full octahedral group is the wreath product ,and a natural way to identify its elements is as pairs with and .But as it is also the direct product , one can simply identify the elements of tetrahedral subgroup Td as and their inversions as .
So e.g. the identity is represented as and the inversion as .
is represented as and as .
A rotoreflection is a combination of rotation and reflection.
Chiral octahedral symmetry
O, 432, or [4,3]+ of order 24, is chiral octahedral symmetry or rotational octahedral symmetry . This group is like chiral tetrahedral symmetry T, but the C2 axes are now C4 axes, and additionally there are 6 C2 axes, through the midpoints of the edges of the cube. Td and O are isomorphic as abstract groups: they both correspond to S4, the symmetric group on 4 objects. Td is the union of T and the set obtained by combining each element of O \ T with inversion. O is the rotation group of the cube and the regular octahedron.
Full octahedral symmetry
Oh, *432, [4,3], or m3m of order 48 - achiral octahedral symmetry or full octahedral symmetry. This group has the same rotation axes as O, but with mirror planes, comprising bo |
https://en.wikipedia.org/wiki/Total%20body%20irradiation | Total body irradiation (TBI) is a form of radiotherapy used primarily as part of the preparative regimen for haematopoietic stem cell (or bone marrow) transplantation. As the name implies, TBI involves irradiation of the entire body, though in modern practice the lungs are often partially shielded to lower the risk of radiation-induced lung injury. Total body irradiation in the setting of bone marrow transplantation serves to destroy or suppress the recipient's immune system, preventing immunologic rejection of transplanted donor bone marrow or blood stem cells. Additionally, high doses of total body irradiation can eradicate residual cancer cells in the transplant recipient, increasing the likelihood that the transplant will be successful.
Dosage
Doses of total body irradiation used in bone marrow transplantation typically range from 10 to >12 Gy. For reference, an unfractionated (i.e. single exposure) dose of 4.5 Gy is fatal in 50% of exposed individuals without aggressive medical care. The 10-12 Gy is typically delivered across multiple fractions to minimise toxicities to the patient.
Early research in bone marrow transplantation by E. Donnall Thomas and colleagues demonstrated that this process of splitting TBI into multiple smaller doses resulted in lower toxicity and better outcomes than delivering a single, large dose. The time interval between fractions allows other normal tissues some time to repair some of the damage caused. However, the dosing is still high enough that the ultimate result is the destruction of both the patient's bone marrow (allowing donor marrow to engraft) and any residual cancer cells. Non-myeloablative bone marrow transplantation uses lower doses of total body irradiation, typically about 2 Gy, which do not destroy the host bone marrow but do suppress the host immune system sufficiently to promote donor engraftment.
Usage in other cancers
In addition to its use in bone marrow transplantation, total body irradiation has been explore |
https://en.wikipedia.org/wiki/Research%20Unix | The term "Research Unix" refers to early versions of the Unix operating system for DEC PDP-7, PDP-11, VAX and Interdata 7/32 and 8/32 computers, developed in the Bell Labs Computing Sciences Research Center (CSRC).
History
The term Research Unix first appeared in the Bell System Technical Journal (Vol. 57, No. 6, Pt. 2 Jul/Aug 1978) to distinguish it from other versions internal to Bell Labs (such as PWB/UNIX and MERT) whose code-base had diverged from the primary CSRC version. However, that term was little-used until Version 8 Unix, but has been retroactively applied to earlier versions as well. Prior to V8, the operating system was most commonly called simply UNIX (in caps) or the UNIX Time-Sharing System.
AT&T licensed Version 5 to educational institutions, and Version 6 also to commercial sites. Schools paid $200 and others $20,000, discouraging most commercial use, but Version 6 was the most widely used version into the 1980s. Research Unix versions are often referred to by the edition of the manual that describes them, because early versions and the last few were never officially released outside of Bell Labs, and grew organically. So, the first Research Unix would be the First Edition, and the last the Tenth Edition. Another common way of referring to them is as "Version x Unix" or "Vx Unix", where x is the manual edition. All modern editions of Unix—excepting Unix-like implementations such as Coherent, Minix, and Linux—derive from the 7th Edition.
Starting with the 8th Edition, versions of Research Unix had a close relationship to BSD. This began by using 4.1cBSD as the basis for the 8th Edition. In a Usenet post from 2000, Dennis Ritchie described these later versions of Research Unix as being closer to BSD than they were to UNIX System V, which also included some BSD code:
Versions
Legacy
In 2002, Caldera International released Unix V1, V2, V3, V4, V5, V6, V7 on PDP-11 and Unix 32V on VAX as FOSS under a permissive BSD-like software license.
In 20 |
https://en.wikipedia.org/wiki/Interdata%207/32%20and%208/32 | The Model 7/32 and Model 8/32 were 32-bit minicomputers introduced by Perkin-Elmer after they acquired Interdata, Inc., in 1973. Interdata computers are primarily remembered for being the first 32-bit minicomputers under $10,000. The 8/32 was a more powerful machine than the 7/32, with the notable feature of allowing user-programmable microcode to be employed.
The Model 7/32 provided fullword data processing power and direct memory addressing up to 1 million bytes through the use of 32-bit general registers and a comprehensive instruction set.
Background
After the commercial success of the microcoded, mainframe IBM 360-series of computers, startup companies arrived on the scene to scale microcode technology to the smaller minicomputers. Among these companies were Prime Computer, Microdata, and Interdata. Interdata used microcode to define an architecture that was heavily influenced by the IBM 360 instruction set. The DOS-type real-time serial/multitasking operating system was called OS/32.
Differences between the 7/32 and 8/32
General register sets – The 7/32 has 2 sets while the 8/32 can have either 2 or 8.
I/O priority levels – The 7/32 has none but the 8/32 can have up to 3.
Writeable control store – The 7/32 does not have one and the 8/32 does.
On average the 8/32 is 2.5x faster than the 7/32.
Usage
The 7/32 and 8/32 became the computers of choice in large scale embedded systems, such as FFT machines used in real-time seismic analysis, CAT scanners, and flight simulator systems. They were also often used as non-IBM peripherals in IBM networks, serving the role of HASP workstations and spooling systems, so called RJE (Remote Job Entry) stations. For example, the computers behind the first Space Shuttle simulator consisted of thirty-six 32-bit minis inputting and/or outputting data to networked mainframe computers (both IBM and Univac), all in real-time.
The 8/32 was used in the Lunar and Planetary Laboratory, Department of Planetary Sciences at the Univers |
https://en.wikipedia.org/wiki/Stomach%20oil | Stomach oil is the light oil composed of neutral dietary lipids found in the proventriculus (fore-gut) of birds in the order Procellariiformes. All albatrosses, procellarids (gadfly petrels and shearwaters) and northern and austral storm petrels use the oil. The only Procellariiformes that do not are the diving petrels.
The chemical make up of stomach oil varies from species to species and between individuals, but almost always contains both wax esters and triglycerides. Other compounds found in stomach oil include glycerol ethers, pristane and squalene. Stomach oil has low viscosity and will solidify into a hard wax if allowed to cool.
It was once thought that stomach oil was a secretion of the proventriculus, but it is now known to be a residue of the diet created by digestion of the prey items such as krill, squid, copepods and fish. It is thought to serve several functions for Procellariiformes, primarily as an energy store; its calorific value is around 40 MJ/kg (9.6 kcal per gram), which is only slightly lower than the value for diesel oil. For this reason a great deal more energy can be stored in oil form as opposed to undigested prey. This can be a real advantage for species that range over huge distances to provide food for hungry chicks, or as a store for lean times when ranging across the sea looking for patchy areas of prey.
Surface nesting petrels and albatross can eject this oil out of their mouths (not nostrils, as has sometimes been suggested) towards attacking predators or conspecific rivals. This oil can be deadly to birds, as it can cause matting of the feathers leading to the loss of flight or water repellency. Against threatening mammals (including humans) it is not outright dangerous, but due to its extremely offensive smell it is usually highly repulsive and liable to spoil a predator's hunting success for quite some time. The smell of the hydrophobic oil cannot be removed with water, and can persist (e.g. on clothing) for months or even |
https://en.wikipedia.org/wiki/Cryomodule | A cryomodule is a section of a modern particle accelerator composed of superconducting RF (SRF) acceleration cavities, which need very low operating temperatures, often around 2 Kelvin). The cryomodule is a complex, state-of-the-art supercooled component in which particle beams are accelerated for scientific research. The superconducting cavities are cooled with liquid helium.
A cryomodule section of an accelerator is composed of superconducting cavities that accelerate the beam, also including a magnetic lattice that provides focusing and steering.
Design considerations
SRF cavities tend to be thin-walled structures immersed in a bath of liquid helium having temperatures of 1.6 K to 4.5 K. Careful engineering is required to insulate the helium bath from the room-temperature external environment. This is accomplished by:
A vacuum chamber surrounding the cold components to eliminate convective heat transfer by gases.
Multi-layer insulation wrapped around cold components. This insulation is composed of dozens of alternating layers of aluminized mylar and thin fiberglass sheet, which reflects infrared radiation that shines through the vacuum insulation from the 300 K exterior walls.
Low thermal conductivity mechanical connections between the cold mass and the room temperature vacuum vessel. These connections are required, for example, to support the mass of the helium vessel inside the vacuum vessel and to connect the apertures in the SRF cavity to the accelerator beamline. Both types of connections transition from internal cryogenic temperatures to room temperature at the vacuum vessel boundary. The thermal conductivity of these parts is minimized by having small cross sectional area and being composed of low thermal conductivity material, such as stainless steel for the vacuum beampipe and fiber reinforced epoxies (G10) for mechanical support. The vacuum beampipe also requires good electrical conductivity on its interior surface to propagate the image cur |
https://en.wikipedia.org/wiki/Japanese%20fire-bellied%20newt | The Japanese fire-bellied newt or Japanese fire-bellied salamander (Cynops pyrrhogaster) is a species of newt endemic to Japan. The skin on its upper body is dark and its lower regions bright red, although coloration varies with age, genetics, and region. Adults are long. To deter predators, Japanese fire-bellied newts contain high levels of tetrodotoxin, a neurotoxin accumulated mainly from their diet.
The species is found on many Japanese islands, including Honshu, Shikoku, and Kyushu. Their habitats include both natural and artificial bodies of water, as well as forests and grasslands. They breed from spring to the beginning of summer, both sexes producing pheromones when ready to mate. Eggs are laid separately, hatching after about three weeks. They grow from larval to juvenile form in between five and six months. Juveniles eat soil-dwelling prey, and adults eat a wide variety of insects, tadpoles, and the eggs of their own species. They have several adaptations to avoid predators, although which they use depends on where they live. Several aspects of their biology have been studied, including their ability to regrow missing body parts.
The Japanese fire-bellied newt first diverged from its closest relative in the Middle Miocene, before splitting into four distinct varieties, each with a mostly separate range, although all four are formally recognized as composing a single species. Currently, their population is declining, and they face threats from disease and the pet trade. They can be successfully kept in captivity.
Etymology and taxonomy
The species was first scientifically described by German zoologist Heinrich Boie in 1826 as Molge pyrrhogaster, based on specimens brought from Japan to Europe. He compared it to the smooth newt, saying he would have mistaken the former for the latter, had he not known it was from Japan. None of the specimens he studied were fully mature. Pyrrhogaster is derived from Greek, () and (). Salamandra subcristata was describ |
https://en.wikipedia.org/wiki/Plectasin | Plectasin is an antibiotic protein from the mushroom Pseudoplectania nigrella. It was initially discovered in 2005 and commercialised by Novozymes. Plectasin belongs to the antimicrobial peptide class called fungal defensins, which is also present in invertebrates such as flies and mussels.
Clinical trials
Pre-clinical tests in mice have shown promising results in that multiresistant bacteria have problems mutating resistance against plectasin, which acts by directly binding the bacterial cell-wall precursor Lipid II.
At the end of 2008, Novozymes signed a global licensing agreement with Sanofi-Aventis for the further development and marketing of NZ2114, a derivative of plectasin, as a treatment for gram-positive bacterial infections, e.g. Streptococcus and Staphylococcus which are resistant to all existing antibiotics. |
https://en.wikipedia.org/wiki/Resource%20construction%20set | The resource construction set (GEM RCS) is a GUI builder for GEM applications. It was written by Digital Research.
RCS was widely used on the Atari ST, Atari STe, Atari TT, Atari MEGA ST, Atari MEGA STE and Atari Falcon platforms.
Example
Files of the Atari Development Kit
Resource file
runtime binary
0000: 000000E2 00E200E2 00E20000 002400E1 ...â.â.â.â...$.á
0010: 000002AA 00130003 00000000 00000000 ...ª............
0020: 000002B6 20446573 6B200020 46696C65 ...¶ Desk . File
0030: 20002020 43726169 6773204D 656E7500 . Craigs Menu.
0040: 2D2D2D2D 2D2D2D2D 2D2D2D2D 2D2D2D2D ----------------
0050: 2D2D2D2D 00202044 65736B20 41636365 ----. Desk Acce
0060: 73736F72 79203120 20002020 4465736B ssory 1 . Desk
0070: 20416363 6573736F 72792032 20200020 Accessory 2 .
0080: 20446573 6B204163 63657373 6F727920 Desk Accessory
0090: 33202000 20204465 736B2041 63636573 3 . Desk Acces
00A0: 736F7279 20342020 00202044 65736B20 sory 4 . Desk
00B0: 41636365 73736F72 79203520 20002020 Accessory 5 .
00C0: 4465736B 20416363 6573736F 72792036 Desk Accessory 6
00D0: 20200020 20517569 74202020 20202020 . Quit
00E0: 0000FFFF 00010005 00190000 00000000 ..ÿÿ............
00F0: 00000000 00000050 00190005 00020002 .......P........
0100: 00140000 00000000 11000000 00000050 ...............P
0110: 02010001 00030004 00190000 00000000 ................
0120: 00000002 0000000C 03010004 FFFFFFFF ............ÿÿÿÿ
0130: 00200000 00000000 00240000 00000006 . .......$......
0140: 03010002 FFFFFFFF 00200000 00000000 ....ÿÿÿÿ. ......
0150: 002B0006 00000006 03010000 0006000F .+..............
0160: 00190000 00000000 00000000 03010050 ...............P
0170: 0013000F 0007000E 00140000 000000FF ...............ÿ
0180: 11000002 00000014 00080008 FFFFFFFF ............ÿÿÿÿ
0190: 001C0000 00000000 00320000 00000014 .........2......
01A0: 00010009 FFFFFFFF 001C0000 00080000 ....ÿÿÿÿ........
01B0: 00400000 00010014 0001000A FFFFFFFF .@..........ÿÿÿÿ
01C0: 001C00 |
https://en.wikipedia.org/wiki/Formula%20game | A formula game is an artificial game represented by a fully quantified Boolean formula. Players' turns alternate and the space of possible moves is denoted by bound variables. If a variable is universally quantified, the formula following it has the same truth value as the formula beginning with the universal quantifier regardless of the move taken. If a variable is existentially quantified, the formula following it has the same truth value as the formula beginning with the existential quantifier for at least one move available at the turn. Turns alternate, and a player loses if he cannot move at his turn. In computational complexity theory, the language FORMULA-GAME is defined as all formulas such that Player 1 has a winning strategy in the game represented by . FORMULA-GAME is PSPACE-complete. |
https://en.wikipedia.org/wiki/Koala%27s%20March | Koala's March () is a bite-sized cookie snack with a sweet filling. Made by Lotte, the product was first released in Japan in March 1984. In May 1990, the products were released in the United States. Originally, the snacks used the name "Koala Yummies" in the United States. But currently, the snacks use the name "Koala's March" in the same country (a translation of the Japanese title).
Koala's March is in the shape of a koala with a picture of a koala on the outside of the cookie doing various activities. The filling comes in various flavors, such as honey, vanilla, cafe latte and banana including frozen banana. The two most common flavors are strawberry and chocolate, and are two of the flavors available in the U.S., along with white chocolate and matcha creme-filled chocolate cookies. The snack also comes in pineapple flavor, though it is rarer than the other flavors. Koala's March supports the Australian conservation group Australian Koala Foundation.
They also have cards, naming the different types of "koalas".
See also
Hello Panda
Teddy Grahams
Tiny Teddy
External links
Koala's March USA website (archived)
Koara no Māchi section on Lotte's website
Products introduced in 1984
2008 Chinese milk scandal
Brand name cookies
Fictional koalas
Food recalls
Japanese brand foods
Japanese snack food
Lotte (conglomerate) products |
https://en.wikipedia.org/wiki/%E2%86%93 | The arrow symbol ↓ may refer to:
The downward direction, a relative direction
The keyboard cursor control key, an arrow key
A downwards arrow, a Unicode arrow symbol
Logical NOR, operator which produces a result that is the negation of logical OR
An undefined object, in mathematical well-definition
A comma category, in category theory
Down (game theory), a mathematical game
The ingressive sound, in phonetics
An APL function
"Decreased" (and similar meanings), in medical notation
The precipitation of an insoluble solid, in chemical notation
See also
Down sign (disambiguation)
Arrow (disambiguation)
↑ (disambiguation)
→ (disambiguation)
← (disambiguation)
Logic symbols |
https://en.wikipedia.org/wiki/Nadir | The nadir is the direction pointing directly below a particular location; that is, it is one of two vertical directions at a specified location, orthogonal to a horizontal flat surface.
The direction opposite of the nadir is the zenith.
Definitions
Space science
Since the concept of being below is itself somewhat vague, scientists define the nadir in more rigorous terms. Specifically, in astronomy, geophysics and related sciences (e.g., meteorology), the nadir at a given point is the local vertical direction pointing in the direction of the force of gravity at that location.
The term can also be used to represent the lowest point that a celestial object reaches along its apparent daily path around a given point of observation (i.e. the object's lower culmination). This can be used to describe the position of the Sun, but it is only technically accurate for one latitude at a time and only possible at the low latitudes. The Sun is said to be at the nadir at a location when it is at the zenith at the location's antipode and is 90° below the horizon.
Nadir also refers to the downward-facing viewing geometry of an orbiting satellite, such as is employed during remote sensing of the atmosphere, as well as when an astronaut faces the Earth while performing a spacewalk. A nadir image is a satellite image or aerial photo of the Earth taken vertically. A satellite ground track represents its orbit projected to nadir on to Earth's surface.
Medicine
Generally in medicine, nadir is used to indicate the progression to the lowest point of a clinical symptom (e.g. fever patterns) or a laboratory count. In oncology, the term nadir is used to represent the lowest level of a blood cell count while a patient is undergoing chemotherapy. A diagnosis of neutropenic nadir after chemotherapy typically lasts 7–10 days.
Figurative usage
The word is also used figuratively to mean a low point, such as with a person's spirits, the quality of an activity or profession, or the nadir of Amer |
https://en.wikipedia.org/wiki/Upper%20set | In mathematics, an upper set (also called an upward closed set, an upset, or an isotone set in X) of a partially ordered set is a subset with the following property: if s is in S and if x in X is larger than s (that is, if ), then x is in S. In other words, this means that any x element of X that is to some element of S is necessarily also an element of S.
The term lower set (also called a downward closed set, down set, decreasing set, initial segment, or semi-ideal) is defined similarly as being a subset S of X with the property that any element x of X that is to some element of S is necessarily also an element of S.
Definition
Let be a preordered set.
An in (also called an , an , or an set) is a subset that is "closed under going up", in the sense that
for all and all if then
The dual notion is a (also called a , , , , or ), which is a subset that is "closed under going down", in the sense that
for all and all if then
The terms or are sometimes used as synonyms for lower set. This choice of terminology fails to reflect the notion of an ideal of a lattice because a lower set of a lattice is not necessarily a sublattice.
Properties
Every partially ordered set is an upper set of itself.
The intersection and the union of any family of upper sets is again an upper set.
The complement of any upper set is a lower set, and vice versa.
Given a partially ordered set the family of upper sets of ordered with the inclusion relation is a complete lattice, the upper set lattice.
Given an arbitrary subset of a partially ordered set the smallest upper set containing is denoted using an up arrow as (see upper closure and lower closure).
Dually, the smallest lower set containing is denoted using a down arrow as
A lower set is called principal if it is of the form where is an element of
Every lower set of a finite partially ordered set is equal to the smallest lower set containing all maximal elements of
where denotes the set c |
https://en.wikipedia.org/wiki/LliureX | LliureX () is a project of the Generalitat Valenciana with the goal of introducing new ICTs based on free software in the Valencian Community education system.
It is a Linux distribution that is used on over 110,000 PCs in schools in the Valencia region.
Originally it was based on Debian but since version 7.09 it is based on Ubuntu and since version 19 on KDE neon.
Awards
LliureX was awarded the Open Awards 2019 at the OpenExpo conference for its innovation in the field of education. |
https://en.wikipedia.org/wiki/Potassium%20sorbate | Potassium sorbate is the potassium salt of sorbic acid, chemical formula CH3CH=CH−CH=CH−CO2K. It is a white salt that is very soluble in water (58.2% at 20 °C). It is primarily used as a food preservative (E number 202). Potassium sorbate is effective in a variety of applications including food, wine, and personal-care products. While sorbic acid occurs naturally in rowan and hippophae berries, virtually all of the world's supply of sorbic acid, from which potassium sorbate is derived, is manufactured synthetically.
Production
Potassium sorbate is produced industrially by neutralizing sorbic acid with potassium hydroxide. The precursor sorbic acid is produced in a two-step process via the condensation of crotonaldehyde and ketene.
Uses
Potassium sorbate is used to inhibit molds and yeasts in many foods, such as cheese, wine, yogurt, dried meats, apple cider, dehydrated fruits, soft drinks and fruit drinks, and baked goods. It is used in the preparation of items such as hotcake syrup and milkshakes served by fast-food restaurants such as McDonald's. It can also be found in the ingredients list of many dried fruit products. In addition, herbal dietary supplement products generally contain potassium sorbate, which acts to prevent mold and microbes and to increase shelf life. It is used in quantities at which no adverse health effects are known, over short periods of time. Labeling of this preservative on ingredient statements reads as "potassium sorbate" or "E202". Also, it is used in many personal-care products to inhibit the development of microorganisms for shelf stability. Some manufacturers are using this preservative as a replacement for parabens. Tube feeding of potassium sorbate reduces the gastric burden of pathogenic bacteria.
Also known as "wine stabilizer", potassium sorbate produces sorbic acid when added to wine. It serves two purposes. When active fermentation has ceased and the wine is racked for the final time after clearing, potassium sorbate |
https://en.wikipedia.org/wiki/Tetrahedral%20symmetry | A regular tetrahedron has 12 rotational (or orientation-preserving) symmetries, and a symmetry order of 24 including transformations that combine a reflection and a rotation.
The group of all (not necessarily orientation preserving) symmetries is isomorphic to the group S4, the symmetric group of permutations of four objects, since there is exactly one such symmetry for each permutation of the vertices of the tetrahedron. The set of orientation-preserving symmetries forms a group referred to as the alternating subgroup A4 of S4.
Details
Chiral and full (or achiral tetrahedral symmetry and pyritohedral symmetry) are discrete point symmetries (or equivalently, symmetries on the sphere). They are among the crystallographic point groups of the cubic crystal system.
Seen in stereographic projection the edges of the tetrakis hexahedron form 6 circles (or centrally radial lines) in the plane. Each of these 6 circles represent a mirror line in tetrahedral symmetry. The intersection of these circles meet at order 2 and 3 gyration points.
Chiral tetrahedral symmetry
T, 332, [3,3]+, or 23, of order 12 – chiral or rotational tetrahedral symmetry. There are three orthogonal 2-fold rotation axes, like chiral dihedral symmetry D2 or 222, with in addition four 3-fold axes, centered between the three orthogonal directions. This group is isomorphic to A4, the alternating group on 4 elements; in fact it is the group of even permutations of the four 3-fold axes: e, (123), (132), (124), (142), (134), (143), (234), (243), (12)(34), (13)(24), (14)(23).
The conjugacy classes of T are:
identity
4 × rotation by 120° clockwise (seen from a vertex): (234), (143), (412), (321)
4 × rotation by 120° counterclockwise (ditto)
3 × rotation by 180°
The rotations by 180°, together with the identity, form a normal subgroup of type Dih2, with quotient group of type Z3. The three elements of the latter are the identity, "clockwise rotation", and "anti-clockwise rotation", corresponding to permuta |
https://en.wikipedia.org/wiki/FlexRay | FlexRay is an automotive network communications protocol developed by the FlexRay Consortium to govern on-board automotive computing. It is designed to be faster and more reliable than CAN and TTP, but it is also more expensive. The FlexRay consortium disbanded in 2009, but the FlexRay standard is now a set of ISO standards, ISO 17458-1 to 17458-5.
FlexRay is a communication bus designed to ensure high data rates, fault tolerance, operating on a time cycle, split into static and dynamic segments for event-triggered and time-triggered communications.
Features
FlexRay supports data rates up to , explicitly supports both star and bus physical topologies, and can have two independent data channels for fault-tolerance (communication can continue with reduced bandwidth if one channel is inoperative). The bus operates on a time cycle, divided into two parts: the static segment and the dynamic segment. The static segment is preallocated into slices for individual communication types, providing stronger determinism than its predecessor CAN. The dynamic segment operates more like CAN, with nodes taking control of the bus as available, allowing event-triggered behavior.
Consortium
The FlexRay Consortium was made up of the following core members:
Freescale Semiconductor
Bosch
NXP Semiconductors
BMW
Volkswagen
Daimler
General Motors
There were also Premium Associate and Associate members of FlexRay consortium. By September 2009, there were 28 premium associate members and more than 60 associate members. At the end of 2009, the consortium disbanded.
Commercial deployment
The first series production vehicle with FlexRay was at the end of 2006 in the BMW X5 (E70), enabling a new and fast adaptive damping system. Full use of FlexRay was introduced in 2008 in the new BMW 7 Series (F01).
Vehicles
Audi A4 (B9) (2015–)
Audi A5 (F5) (2016–)
Audi A6 (C7) (2011-2018)
Audi A7
Audi A8 (D4) (2010–2017)
Audi Q7 (2015-)
Audi TT Mk3 (2014–)
Audi R8 (2015–)
Bentley Flying Spur (201 |
https://en.wikipedia.org/wiki/Flour%20bleaching%20agent | Flour bleaching agent is the agent added to fresh milled grains to whiten the flour by removing the yellow colour pigment called xanthophyll. It whitens the flour, which is used in the baking industry.
Overview
Usual flour bleaching agents are:
Organic peroxides (benzoyl peroxide)
Calcium peroxide
Chlorine
Chlorine dioxide
Azodicarbonamide
Nitrogen dioxide
Atmospheric oxygen, used during natural aging of flour
Use of chlorine, bromates, and peroxides is not allowed in the European Union.
Bleached flour improves the structure-forming capacity, allowing the use of dough formulas with lower proportions of flour and higher proportions of sugar . In biscuit making, use of chlorinated flour reduces the spread of the dough, and provides a "tighter" surface. The changes of functional properties of the flour proteins are likely to be caused by their oxidation.
In countries where bleached flour is prohibited, microwaving plain flour produces similar chemical changes to the bleaching process. This improves the final texture of baked goods made to recipes intended for bleached flours.
See also
Chorleywood bread process – another bread making process that increases volume
Flour treatment agent
Graham flour – an early unbleached whole-grain flour
Maida flour – a commonly bleached flour in India |
https://en.wikipedia.org/wiki/Azodicarbonamide | Azodicarbonamide, ADCA, ADA, or azo(bis)formamide, is a chemical compound with the molecular formula . It is a yellow to orange-red, odorless, crystalline powder. It is sometimes called a 'yoga mat' chemical because of its widespread use in foamed plastics. It was first described by John Bryden in 1959.
Synthesis
It is prepared in two steps via treatment of urea with hydrazine to form biurea, as described in this idealized equation:
Oxidation with chlorine or chromic acid yields azodicarbonamide:
Applications
Blowing agent
The principal use of azodicarbonamide is in the production of foamed plastics as a blowing agent. The thermal decomposition of azodicarbonamide produces nitrogen, carbon monoxide, carbon dioxide, and ammonia gases, which are trapped in the polymer as bubbles to form a foamed article.
Azodicarbonamide is used in plastics, synthetic leather, and other industries and can be pure or modified. Modification affects the reaction temperatures. Pure azodicarbonamide generally reacts around 200 °C. In the plastic, leather, and other industries, modified azodicarbonamide (average decomposition temperature 170 °C) contains additives that accelerate the reaction or react at lower temperatures.
An example of the use of azodicarbonamide as a blowing agent is found in the manufacture of vinyl (PVC) and EVA-PE foams, where it forms bubbles upon breaking down into gas at high temperature. Vinyl foam is springy and does not slip on smooth surfaces. It is useful for carpet underlay and floor mats. Commercial yoga mats made of vinyl foam have been available since the 1980s; the first mats were cut from carpet underlay.
Food additive
As a food additive, azodicarbonamide is used as a flour bleaching agent and a dough conditioner. It reacts with moist flour as an oxidizing agent. The main reaction product is biurea, which is stable during baking. Secondary reaction products include semicarbazide and ethyl carbamate. It is known by the E number E927. Many restauran |
https://en.wikipedia.org/wiki/Chillingham%20cattle | Chillingham cattle, also known as Chillingham wild cattle, are a breed of cattle that live in a large enclosed park at Chillingham Castle, Northumberland, England. In summer 2022 the cattle numbers 138 animals with approximately equal numbers of males and females The herd has remained remarkably genetically isolated for hundreds of years, surviving despite inbreeding depression due to the small population. There is also a small reserve herd of about 20 animals located on Crown Estate land near Fochabers, North East Scotland.
Description of cattle
The Chillingham cattle are related to White Park cattle, in the sense that the Chillingham herd has contributed to the White Park, though there has been no gene flow the other way. Chillingham cattle are small, with upright horns in both males and females. Bulls weigh around , cows about . They are white with coloured ears (they may also have some colour on feet, nose and around the eyes). In the case of Chillingham cattle, the ear-colour is red – in most White Park animals the ears are black (which is genetically dominant over red in cattle). Chillingham cattle are of generally primitive conformation while White Parks are of classical British beef conformation.
A brief review of academic studies on the Chillingham cattle is available.
Description of the Northumberland habitat
To many visitors, the most striking element of the historic habitat at Chillingham is the widespread occurrence of large oak trees amongst grassland (wood pasture), providing a glimpse of Britain as many think it appeared in medieval times. However, most of these trees were only planted in the 1780s - early 19th century, and the truly ancient trees of the park are the streamside alder trees, which were probably coppiced in the mid-18th century. They were probably hundreds of years old even then and the stems now growing are themselves around 250 years old. A diversity of plants and animals find a habitat here, due to the absence of the intensi |
https://en.wikipedia.org/wiki/S%C3%A9minaire%20Nicolas%20Bourbaki | The Séminaire Nicolas Bourbaki (Bourbaki Seminar) is a series of seminars (in fact public lectures with printed notes distributed) that has been held in Paris since 1948. It is one of the major institutions of contemporary mathematics, and a barometer of mathematical achievement, fashion, and reputation. It is named after Nicolas Bourbaki, a group of French and other mathematicians of variable membership.
The Poincaré Seminars are a series of talks on physics inspired by the Bourbaki seminars on mathematics.
1948/49 series
Henri Cartan, Les travaux de Koszul, I (Lie algebra cohomology)
Claude Chabauty, Le théorème de Minkowski-Hlawka (Minkowski-Hlawka theorem)
Claude Chevalley, L'hypothèse de Riemann pour les corps de fonctions algébriques de caractéristique p, I, d'après Weil (local zeta-function)
Roger Godement, Groupe complexe unimodulaire, I : Les représentations unitaires irréductibles du groupe complexe unimodulaire, d'après Gelfand et Neumark (representation theory of the complex special linear group)
Léo Kaloujnine, Sur la structure de p-groupes de Sylow des groupes symétriques finis et de quelques généralisations infinies de ces groupes (Sylow theorems, symmetric groups, infinite group theory)
Pierre Samuel, (birational geometry)
Jean Braconnier, Sur les suites de composition d'un groupe et la tour des groupes d'automorphismes d'un groupe fini, d'après H. Wielandt (finite groups)
Henri Cartan, Les travaux de Koszul, II (see 1)
Claude Chevalley, L'hypothèse de Riemann pour les groupes de fonctions algébriques de caractéristique p, II, d'après Weil (see 3)
Luc Gauthier, (see 6)
Laurent Schwartz, Sur un mémoire de Petrowsky : "Über das Cauchysche Problem für ein System linearer partieller Differentialgleichungen im gebiete nichtanalytischen Funktionen" (partial differential equations)
Henri Cartan, Les travaux de Koszul, III (see 1)
Roger Godement, Groupe complexe unimodulaire, II : La transformation de Fourier dans le groupe complexe un |
https://en.wikipedia.org/wiki/Cajeput%20oil | Cajuput oil is a volatile oil obtained by distillation from the leaves of the myrtaceous trees Melaleuca leucadendra, Melaleuca cajuputi, and probably other Melaleuca species. The trees yielding the oil are found throughout Maritime Southeast Asia and over the hotter parts of the Australian continent. The majority of the oil is produced on the Indonesian island of Sulawesi. The name "cajeput" is derived from its Malay name, or "white wood".
Production and uses
The oil is prepared from of cajeput leaves and twigs macerated in water, and steam distilled after fermenting for a night. The resulting oil is extremely pungent, flammable, and has the odor of a mixture of turpentine, eucalyptus and camphor. It consists mainly of cineol (see terpenes), from which cajuputene, having a hyacinth-like odor, can be obtained by distillation with phosphorus pentoxide. It is a typical volatile oil, and is used internally in doses of 2 to 3 minims, for the same purposes as clove oil.
Topical uses
If successful, pain management using cajeput oil may work by causing surface warmth and irritation through the help of a chemical called cineole, which is employed topically as a counterirritant. It is an ingredient in some liniments for sore muscles, such as Tiger Balm. It is also used as an ingredient in inhalants or decongestants and topical pain remedies. With regard to direct application, cajeput oil can be applied to large areas of skin (after completing a patch test), minor wounds, scratches, and rashes.
Potential side effects
Like other essential oils, cajeput oil may cause skin rashes, redness, irritation, burning, and hives when applied directly to the skin in its pure form.
For fish
Cajeput is used for the treatment of bacterial or fungal infections in fish. Common brand names containing Cajeput are Melafix and Bettafix. Melafix is a stronger concentration and Bettafix is a lower concentration that makes it harder to overdose smaller fish, especially bettas. It is most c |
https://en.wikipedia.org/wiki/Trading%20blows | Trading blows or trading licks is an endurance test in which the participants (usually two boys or young men) take turns, alternating between administering a blow to an opponent and assuming the agreed exposed position (e.g. bending over an object or grabbing the ankles) to endure the next one, using the same implement (e.g. a fraternity paddle), until only the winner can still bring himself to endure the gradually increasing pain in the progressively tormented target part of their anatomy (usually the posterior, in which case it is a form of spanking or the cheeks), which in the interest of fairness should be covered by a common uniform. This can be anything from regular jeans or pants, underwear, and finally, bared (naked) buttocks. As the blows are not given by the same person but by the parties themselves, the strongest-armed one actually has an unfair (but not always decisive) physical advantage.
Such rather macho displays of willpower, restraining the instinct to avoid pain, can serve various purposes, including:
a physical punishment, especially for quarreling, possibly the origin of the practice (this ritualized alternative to a more disabling or even lethal duel should also make its participants realize the futility of physical aggression)
a motivation test, especially as part of an initiation process, such as hazing
an obedience test, as in certain paddle games (possibly really an excuse for the rather sadistic amusement of the seniors)
a duel, either personal or as champions representing similar, especially rivaling, groups; in certain fraternities, refusing such a challenge may result in exclusion from the membership, even for an alumnus
as a game, either to 'proudly' display one's tenacity (often to impress some audience) or in the pursuit of a sadist and/or masochistic, erotic or pain-addicted, kick.
as a sexual fetish
Another game with the same name is often played among boys or young men, where two people agree on a place to hit the other (e.g. th |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.