source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Posthitis
Posthitis is the inflammation of the foreskin (prepuce) of the penis. It is characterised by swelling and redness on the skin and it may be accompanied by a malodorous discharge. The term posthitis comes from the Greek "posthe", meaning foreskin, and "-itis", meaning inflammation. Causes Posthitis can have infectious causes such as bacteria or fungi, or non-infectious causes such as contact dermatitis or psoriasis. The inflammation may be caused by irritants in the environment. Common causative organisms include candida, chlamydia, and gonorrhea. The cause must be properly diagnosed before a treatment can be prescribed. A common risk factor is diabetes. Posthitis can lead to phimosis, the tightening of the foreskin which makes it difficult to retract over the glans. Posthitis can also lead to superficial ulcerations and diseases of the inguinal lymph nodes. Prevention Hygiene, in particular the regular cleaning of the glans, is generally considered sufficient to prevent infection and inflammation of the foreskin. Full retraction of the foreskin may not be possible in boys younger than about ten years and some may not be able to fully retract their foreskin for cleaning until their late teens. Treatment If contact dermatitis is suspected, soaps and other external irritants should be discontinued and a latex allergy should be investigated. The treatment depends on identification of the cause. Irritants in the environment should be removed. Antibiotics and antifungals can be used to treat the infection, but good hygiene such as keeping the area dry is essential to stop recurrence, however excessive washing with soap can cause contact dermatitis. If infection is sexually transmitted, sexual partners should be notified and treated. Posthitis and balanitis (inflammation of the glans penis) usually occur together as balanoposthitis. Circumcision can prevent balanoposthitis, though balanitis can still occur separately.
https://en.wikipedia.org/wiki/BID/60
BID/60, also called Singlet, was a British encryption machine. It was used by the British intelligence services from around 1949 or 1950 onwards. The system is a rotor machine, and would appear to have used 10 rotors. There are some apparent similarities between this machine and the US / NATO KL-7 device. In 2005, a Singlet machine was exhibited in the Enigma and Friends display at the Bletchley Park museum.
https://en.wikipedia.org/wiki/Flash%20%28tattoo%29
Tattoo flash is any tattoo design that is pre-prepared for customers to avoid the need for custom designs, or as a starting point for custom work. Tattoo flash was designed for rapid tattooing and used in "street shops"—tattoo shops that handle a large volume of standardized tattoos for walk-in customers. Pieces of flash are traditionally drawn or printed on paper, and displayed for walk-in customers in binders or on the walls of tattoo shops. In the 21st century they may also be advertised online and on social media. History The term "flash" is derived from the traveling carnival and circus trade in the late 1800s: an attraction needed to be eye-catching to draw in the crowd, and that visual appeal was called flash. Tattoo artists working at those carnivals would hang up their designs in front of their booths to catch people's attention, so they adopted "flash" as a term for this artwork. Traveling tattoo artists developed sketchbooks of designs that were easy to transport and show to potential customers. The development of electric tattoo machines in the 1890s enabled faster and more precise tattooing. More tattoo artists started to work from shops as a full-time profession. To fulfill increased demand for tattoos, especially sailor tattoos, artists bought and sold sets of pre-drawn designs. These "flash" designs were on larger sheets of paper than sketchbook pages, intended to be framed and hung on walls. Many of these designs were relatively simple — with black outlines, limited colors, and limited shading — to enable quick work. Skilled professional tattoo artists sold flash to other artists, who were seeking out quality designs to advertise to potential customers. This process of selling and buying attractive sets of designs helped shape American traditional tattooing into a more consistent genre. Many common flash designs are still in this "old school" style. For example, Lew Alberts (1880–1954), known as Lew the Jew, was a prolific tattoo artist who cre
https://en.wikipedia.org/wiki/Dependency%20inversion%20principle
In object-oriented design, the dependency inversion principle is a specific methodology for loosely coupled software modules. When following this principle, the conventional dependency relationships established from high-level, policy-setting modules to low-level, dependency modules are reversed, thus rendering high-level modules independent of the low-level module implementation details. The principle states: By dictating that high-level and low-level objects must depend on the same abstraction, this design principle the way some people may think about object-oriented programming. The idea behind points A and B of this principle is that when designing the interaction between a high-level module and a low-level one, the interaction should be thought of as an abstract interaction between them. This not only has implications on the design of the high-level module, but also on the low-level one: the low-level one should be designed with the interaction in mind and it may be necessary to change its usage interface. In many cases, thinking about the interaction in itself as an abstract concept allows the coupling of the components to be reduced without introducing additional coding patterns, allowing only a lighter and less implementation-dependent interaction schema. When the discovered abstract interaction schema(s) between two modules is/are generic and generalization makes sense, this design principle also leads to the following dependency inversion coding pattern. Traditional layers pattern In conventional application architecture, lower-level components (e.g., Utility Layer) are designed to be consumed by higher-level components (e.g., Policy Layer) which enable increasingly complex systems to be built. In this composition, higher-level components depend directly upon lower-level components to achieve some task. This dependency upon lower-level components limits the reuse opportunities of the higher-level components. The goal of the dependency inversion pat
https://en.wikipedia.org/wiki/Canderel
Canderel is a brand of artificial sweetener made mainly from aspartame. Canderel is marketed by The Merisant Company, a global corporation with headquarters in Chicago, Illinois, also Switzerland, Mexico, United Kingdom, and Australia. Canderel was first marketed in France in 1979. The name "Canderel" is a combination of candi (or sugar cane) and airelles - the French word for bilberries. "Canderel granular" ingredients: maltodextrin, aspartame, acesulfame potassium, flavouring. "Canderel tablets" ingredients: lactose, aspartame, acesulfame potassium, leucine, cross-linked CMC, flavouring. Canderel is said to be interchangeable with sugar in a 1 to 10 mass ratio. Aspartame-containing products made by NutraSweet / Merisant Canderel - sold in Asia, Europe, the Middle East and Africa, and Mexico. It is the leading aspartame-based sweetener in France (where it was launched in 1979) and the United Kingdom (since 1983). Equal - first sold in the United States in 1982, this brand is also sold in Australia and India. EqualSweet - sold in Argentina NutraSweet - used as an ingredient in many processed foods, drinks and tablets, in 1997 it also began to be marketed as a table sweetener in the United States. See also Aspartame Aspartame controversy Sugar substitute
https://en.wikipedia.org/wiki/Infiltrometer
An infiltrometer is a device used to measure the rate of water infiltration into soil or other porous media. Commonly used infiltrometers are single-ring and double-ring infiltrometers, and also disc permeameters. Single ring A single-ring infiltrometer involves driving a ring into the soil and supplying water in the ring either at constant head or falling head condition. Constant head refers to condition where the amount of water in the ring is always held constant. Because infiltration capacity is the maximum infiltration rate, and if infiltration rate exceeds the infiltration capacity, runoff will be the consequence, therefore maintaining constant head means the rate of water supplied corresponds to the infiltration capacity. The supplying of water is done with a Mariotte's bottle. Falling head refers to condition where water is supplied in the ring, and the water is allowed to drop with time. The operator records how much water goes into the soil for a given time period. The rate of which water goes into the soil is related to the soil's hydraulic conductivity. Double ring A double ring infiltrometer requires two rings: an inner and outer ring. The purpose is to create a one-dimensional flow of water from the inner ring, as the analysis of data is simplified. If water is flowing in one-dimension at steady state condition, and a unit gradient is present in the underlying soil, the infiltration rate is approximately equal to the saturated hydraulic conductivity. An inner ring is driven into the ground, and a second bigger ring around that to help control the flow of water through the first ring. Water is supplied either with a constant or falling head condition, and the operator records how much water infiltrates from the inner ring into the soil over a given time period. The ASTM standard method specifies inner and outer rings of 30 and 60 cm diameters, respectively. Issues There are several challenges related to the use of ring infiltrometers: The pounding
https://en.wikipedia.org/wiki/GCHQ%20Bude
GCHQ Bude, also known as GCHQ Composite Signals Organisation Station Morwenstow, abbreviated to GCHQ CSO Morwenstow, is a UK Government satellite ground station and eavesdropping centre located on the north Cornwall coast at Cleave Camp, between the small villages of Morwenstow and Coombe. It is operated by the British signals intelligence service, officially known as the Government Communications Headquarters, commonly abbreviated GCHQ. It is located on part of the site of the former World War II airfield, RAF Cleave. History The site of GCHQ Bude is in Morwenstow, the northernmost parish of Cornwall. During World War II, the location was developed for and used by the Royal Air Force (RAF). RAF Cleave was conceived as housing target and target support aircraft for firing ranges along the north Cornwall coast, and land was acquired from Cleave Manor. In 1939, it became home to two flights of (1AAC). In 1943, No. 639 Squadron was established on the site for the remainder of the war. The airfield was put under maintenance in April 1945, staying under government ownership. Satellite interception In the early 1960s, developments occurred which appear to have prompted the establishment of the facility now known as GCHQ Bude. In 1962, a satellite receiving station for the commercial communication satellites of Intelsat was established at Goonhilly Downs, just over a hundred kilometres south-southwest of Morwenstow. The downstream link from the Intelsat satellites could easily be intercepted by placing receiver dishes nearby in the satellites' 'footprint'. For that, the land at Cleave was allotted to the Ministry of Public Buildings and Works in 1967, and construction of the satellite interception station began in 1969. Two dishes appeared first, followed by smaller dishes in the ensuing years. The station was originally signposted as 'CSOS Morwenstow', with 'CSOS' standing for Composite Signals Organisation Station. In 2001, a third large dish appeared, a
https://en.wikipedia.org/wiki/Infiltration%20%28hydrology%29
Infiltration is the process by which water on the ground surface enters the soil. It is commonly used in both hydrology and soil sciences. The infiltration capacity is defined as the maximum rate of infiltration. It is most often measured in meters per day but can also be measured in other units of distance over time if necessary.  The infiltration capacity decreases as the soil moisture content of soils surface layers increases. If the precipitation rate exceeds the infiltration rate, runoff will usually occur unless there is some physical barrier. Infiltrometers, parameters and rainfall simulators are all devices that can be used to measure infiltration rates. Infiltration is caused by multiple factors including; gravity, capillary forces, adsorption, and osmosis. Many soil characteristics can also play a role in determining the rate at which infiltration occurs. Factors that affect infiltration Precipitation Precipitation can impact infiltration in many ways. The amount, type, and duration of precipitation all have an impact. Rainfall leads to faster infiltration rates than any other precipitation event, such as snow or sleet. In terms of amount, the more precipitation that occurs, the more infiltration will occur until the ground reaches saturation, at which point the infiltration capacity is reached. The duration of rainfall impacts the infiltration capacity as well. Initially when the precipitation event first starts the infiltration is occurring rapidly as the soil is unsaturated, but as time continues the infiltration rate slows as the soil becomes more saturated. This relationship between rainfall and infiltration capacity also determines how much runoff will occur. If rainfall occurs at a rate faster than the infiltration capacity runoff will occur. Soil characteristics The porosity of soils is critical in determining the infiltration capacity. Soils that have smaller pore sizes, such as clay, have lower infiltration capacity and slower infiltration
https://en.wikipedia.org/wiki/Numberlink
Numberlink is a type of logic puzzle involving finding paths to connect numbers in a grid. Rules The player has to pair up all the matching numbers on the grid with single continuous lines (or paths). The lines cannot branch off or cross over each other, and the numbers have to fall at the end of each line (i.e., not in the middle). It is considered that a problem is well-designed only if it has a unique solution and all the cells in the grid are filled, although some Numberlink designers do not stipulate this. History In 1897, a slightly different form of the puzzle was printed in the Brooklyn Daily Eagle, in a column by Sam Loyd. Another early, printed version of Number Link can be found in Henry Ernest Dudeney's book Amusements in mathematics (1917) as a puzzle for motorists (puzzle no. 252). This puzzle type was popularized in Japan by Nikoli as Arukone (アルコネ, Alphabet Connection) and Nanbarinku (ナンバーリンク, Number Link). The only difference between Arukone and Nanbarinku is that in Arukone the clues are letter pairs (as in Dudeney's puzzle), while in Nanbarinku the clues are number pairs. , three books consisting entirely of Numberlink puzzles have been published by Nikoli. Versions of this known as Wire Storm, Flow Free and Alphabet Connection have been released as apps for iOS, Android and Windows Phone. Computational complexity As a computational problem, finding a solution to a given Numberlink puzzle is NP-complete. NP-completeness is maintained even if "zig-zag" paths are allowed. Informally, this means paths may have "unnecessary bends" in them (see the reference for a more technical explanation). See also List of Nikoli puzzle types
https://en.wikipedia.org/wiki/ABC%20model%20of%20flower%20development
The ABC model of flower development is a scientific model of the process by which flowering plants produce a pattern of gene expression in meristems that leads to the appearance of an organ oriented towards sexual reproduction, a flower. There are three physiological developments that must occur in order for this to take place: firstly, the plant must pass from sexual immaturity into a sexually mature state (i.e. a transition towards flowering); secondly, the transformation of the apical meristem's function from a vegetative meristem into a floral meristem or inflorescence; and finally the growth of the flower's individual organs. The latter phase has been modelled using the ABC model, which aims to describe the biological basis of the process from the perspective of molecular and developmental genetics. An external stimulus is required in order to trigger the differentiation of the meristem into a flower meristem. This stimulus will activate mitotic cell division in the apical meristem, particularly on its sides where new primordia are formed. This same stimulus will also cause the meristem to follow a developmental pattern that will lead to the growth of floral meristems as opposed to vegetative meristems. The main difference between these two types of meristem, apart from the obvious disparity between the objective organ, is the verticillate (or whorled) phyllotaxis, that is, the absence of stem elongation among the successive whorls or verticils of the primordium. These verticils follow an acropetal development, giving rise to sepals, petals, stamens and carpels. Another difference from vegetative axillary meristems is that the floral meristem is "determined", which means that, once differentiated, its cells will no longer divide. The identity of the organs present in the four floral verticils is a consequence of the interaction of at least three types of gene products, each with distinct functions. According to the ABC model, functions A and C are required in
https://en.wikipedia.org/wiki/Robert%20M.%20Solovay
Robert Martin Solovay (born December 15, 1938) is an American mathematician specializing in set theory. Biography Solovay earned his Ph.D. from the University of Chicago in 1964 under the direction of Saunders Mac Lane, with a dissertation on A Functorial Form of the Differentiable Riemann–Roch theorem. Solovay has spent his career at the University of California at Berkeley, where his Ph.D. students include W. Hugh Woodin and Matthew Foreman. Work Solovay's theorems include: Solovay's theorem showing that, if one assumes the existence of an inaccessible cardinal, then the statement "every set of real numbers is Lebesgue measurable" is consistent with Zermelo–Fraenkel set theory without the axiom of choice; Isolating the notion of 0#; Proving that the existence of a real-valued measurable cardinal is equiconsistent with the existence of a measurable cardinal; Proving that if is a strong limit singular cardinal, greater than a strongly compact cardinal then holds; Proving that if is an uncountable regular cardinal, and is a stationary set, then can be decomposed into the union of disjoint stationary sets; With Stanley Tennenbaum, developing the method of iterated forcing and showing the consistency of Suslin's hypothesis; With Donald A. Martin, showed the consistency of Martin's axiom with arbitrarily large cardinality of the continuum; Outside of set theory, developing (with Volker Strassen) the Solovay–Strassen primality test, used to identify large natural numbers that are prime with high probability. This method has had implications for cryptography; Regarding the P versus NP problem, he proved with T. P. Baker and J. Gill that relativizing arguments cannot prove . Proving that GL (the normal modal logic which has the instances of the schema as additional axioms) completely axiomatizes the logic of the provability predicate of Peano arithmetic; With Alexei Kitaev, proving that a finite set of quantum gates can efficiently approximate an arbitra
https://en.wikipedia.org/wiki/Needlestick%20injury
A needlestick injury is the penetration of the skin by a hypodermic needle or other sharp object that has been in contact with blood, tissue or other body fluids before the exposure. Even though the acute physiological effects of a needlestick injury are generally negligible, these injuries can lead to transmission of blood-borne diseases, placing those exposed at increased risk of infection from disease-causing pathogens, such as the hepatitis B virus (HBV), hepatitis C virus (HCV), and human immunodeficiency virus (HIV). Among healthcare workers and laboratory personnel worldwide, more than 25 blood-borne virus infections have been reported to have been caused by needlestick injuries. In addition to needlestick injuries, transmission of these viruses can also occur as a result of contamination of the mucous membranes, such as those of the eyes, with blood or body fluids, but needlestick injuries make up more than 80% of all percutaneous exposure incidents in the United States. Various other occupations are also at increased risk of needlestick injury, including law enforcement, laborers, tattoo artists, food preparers, and agricultural workers. Increasing recognition of the unique occupational hazard posed by needlestick injuries, as well as the development of efficacious interventions to minimize the largely preventable occupational risk, encouraged legislative regulation in the US, causing a decline in needlestick injuries among healthcare workers. Health effects While needlestick injuries have the potential to transmit bacteria, protozoa, viruses and prions, the risk of contracting hepatitis B, hepatitis C, and HIV is the highest. The World Health Organization estimated that in 2000, 66,000 hepatitis B, 16,000 hepatitis C, and 1,000 HIV infections were caused by needlestick injuries. In places with higher rates of blood-borne diseases in the general population, healthcare workers are more susceptible to contracting these diseases from a needlestick injury.
https://en.wikipedia.org/wiki/Organ%20printing
Organ printing utilizes techniques similar to conventional 3D printing where a computer model is fed into a printer that lays down successive layers of plastics or wax until a 3D object is produced. In the case of organ printing, the material being used by the printer is a biocompatible plastic. The biocompatible plastic forms a scaffold that acts as the skeleton for the organ that is being printed. As the plastic is being laid down, it is also seeded with human cells from the patient's organ that is being printed for. After printing, the organ is transferred to an incubation chamber to give the cells time to grow. After a sufficient amount of time, the organ is implanted into the patient. To many researchers the ultimate goal of organ printing is to create organs that can be fully integrated into the human body. Successful organ printing has the potential to impact several industries, notably artificial organs organ transplants, pharmaceutical research, and the training of physicians and surgeons. History The field of organ printing stemmed from research in the area of stereolithography, the basis for the practice of 3D printing that was invented in 1984. In this early era of 3D printing, it was not possible to create lasting objects because of the material used for the printing process was not durable. 3D printing was instead used as a way to model potential end products that would eventually be made from different materials under more traditional techniques. In the beginning of the 1990s, nanocomposites were developed that allowed 3D printed objects to be more durable, permitting 3D printed objects to be used for more than just models. It was around this time that those in the medical field began considering 3D printing as an avenue for generating artificial organs. By the late 1990s, medical researchers were searching for biocompatible materials that could be used in 3D printing. The concept of bioprinting was first demonstrated in 1988. At this time, a resea
https://en.wikipedia.org/wiki/Royal%20College%20of%20Surgeons
The Royal College of Surgeons is an ancient college (a form of corporation) established in England to regulate the activity of surgeons. Derivative organisations survive in many present and former members of the Commonwealth. These organisations are now also responsible for training surgeons and setting their examinations. History The earliest form of the Royal College of Surgeons was the "Guild of Surgeons Within the City of London" founded in the 14th century. There was dispute between the surgeons and barber surgeons until an agreement was signed between them in 1493, giving the fellowship of surgeons the power of incorporation. The Guild of Barbers of Dublin received a Royal Charter of Henry VI in 1446, making it the earliest Royal Medical incorporation in Britain or Ireland. This was followed in 1505 by the incorporation of the Barber Surgeons of Edinburgh as a Craft Guild of Edinburgh. This body was granted a royal charter in 1506 by King James IV of Scotland. It was followed by the Royal College of Physicians and Surgeons of Glasgow, granted a charter by King by James VI in 1599, as the Glasgow Faculty. The union in London was formalised further in 1540 by King Henry VIII of England between the Worshipful Company of Barbers (incorporated 1462) and the Guild of Surgeons to form the Company of Barber-Surgeons. In 1745 the surgeons broke away from the barbers to form the Company of Surgeons. In 1800 the Company was granted a Royal Charter to become the Royal College of Surgeons in London. A further charter in 1843 granted it the present title of the Royal College of Surgeons of England. In 2010 Professor Eilis McGovern became President of the Royal College of Surgeons in Ireland and thereby the first female President of any Royal College of Surgeons in the world. Organisations Royal College of Surgeons of Edinburgh (incorporated 1505 as a Guild of Barber-Surgeons by the city, Royal Charter 1506) Royal College of Surgeons of England (incorporated 1493, charter
https://en.wikipedia.org/wiki/Inflatable%20movie%20screen
An inflatable movie screen is an inflatable framework with an attached projection screen. Inflatable screens are used for outdoor movies, film festivals, drive-in theaters, sports, social, fundraising and other events requiring outdoor projection. Design The projection frame is made from PVC-coated fabric layers joined by high-frequency welding or mechanical sewing. The projection surface can be made of PVC or spandex, with the latter providing for rear projection capabilities. The projection surface can be detachable for ease of care. The frame is inflated with a high-pressure air blower. Larger frames may require a three-phase blower. For bigger screens, the blower typically continues to operate, ensuring the screen remains fully inflated. For consumer market and smaller screen sizes, the screen is sealed and does not require a constantly operating air blower. Screens can be held upright with help of a supporting structure (A-frame or inflatable legs) or with the system of straps and counterweights. In comparison to traditional and heavy steel constructions, inflatable screens can be set up in a few hours or less, with the smallest screens taking one minute to inflate. This can be useful for environments where wind may be a factor. This is one of the major drawbacks of an inflatable screen. Even a small wind can make these fly like a kite without proper anchoring. Inflatable screens can be deflated quickly adding to their safety. Inflatable screens are lightweight and highly portable compared to other structures used to support screens like a truss or scaffold. A screen usually fits on a single pallet. A truss or steel system takes up an entire truck. Inflatable screens reach sizes up to . Another big disadvantage of inflatable screens is the noise created by the continuous blowers. See also Video projector LCD projector DLP projector Drive-in theater List of inflatable manufactured goods Outdoor cinema
https://en.wikipedia.org/wiki/Pay%20for%20performance%20%28healthcare%29
In the healthcare industry, pay for performance (P4P), also known as "value-based purchasing", is a payment model that offers financial incentives to physicians, hospitals, medical groups, and other healthcare providers for meeting certain performance measures. Clinical outcomes, such as longer survival, are difficult to measure, so pay for performance systems usually evaluate process quality and efficiency, such as measuring blood pressure, lowering blood pressure, or counseling patients to stop smoking. This model also penalizes health care providers for poor outcomes, medical errors, or increased costs. Integrated delivery systems where insurers and providers share in the cost are intended to help align incentives for value-based care. Professional societies in the United States have given qualified approval to incentive programs, but express concern with the validity of quality indicators, patient and physician autonomy and privacy, and increased administrative burdens. Studies and trends Pay for performance systems link compensation to measures of work quality or goals. Current methods of healthcare payment may actually reward less-safe care, since some insurance companies will not pay for new practices to reduce errors, while physicians and hospitals can bill for additional services that are needed when patients are injured by mistakes. However, early studies showed little gain in quality for the money spent, as well as evidence suggesting unintended consequences, like the avoidance of high-risk patients, when payment was linked to outcome improvements. The 2006 Institute of Medicine report Preventing Medication Errors recommended "incentives...so that profitability of hospitals, clinics, pharmacies, insurance companies, and manufacturers (are) aligned with patient safety goals;...(to) strengthen the business case for quality and safety." A second Institute of Medicine report Rewarding Provider Performance: Aligning Incentives in Medicare (September 2006)
https://en.wikipedia.org/wiki/Radial%20recurrent%20artery
The radial recurrent artery arises from the radial artery immediately below the elbow. It ascends between the branches of the radial nerve, lying on the supinator muscle and then between the brachioradialis muscle and the brachialis muscle, supplying these muscles and the elbow-joint, and anastomosing with the terminal part of the profunda brachii. Additional images
https://en.wikipedia.org/wiki/List%20of%20U.S.%20state%20horses
Twelve U.S. states have designated a horse breed as the official "state horse", two have a horse breed as their "state animal", one has an official "state pony", and one has a "honorary state equine". The first state horse was designated in Vermont in 1961. The most recent state horse designations occurred in 2023 when Virginia designated the Chincoteague Pony as its state pony and in 2022 when Oklahoma declared the American Quarter Horse as its state horse. There have been proposals to designate a state horse in Oregon as well as in Arizona (where an ongoing campaign sought to designate the Colonial Spanish Horse as the state horse prior to the state centennial in 2012), but neither proposal is yet successful. In one state, North Dakota, the state horse is officially designated the "honorary state equine." Two additional states have not designated a specific state horse, but have designed a horse or horse breed as its official state animals: the horse in New Jersey and the Morgan horse breed in Vermont. Some breeds, such as the American Quarter Horse in Texas and the Morgan horse in Vermont and Massachusetts, were named as the state horse because of the close connection between the history of the breed and the state. Others, including the Tennessee Walking Horse and the Missouri Fox Trotter, include the state in the official breed name. School children have lobbied for the cause of some state horses, such as the Colonial Spanish Horse being named the state horse of North Carolina due to the presence of the Spanish-descended Banker horses in the Outer Banks, while others have been brought to official status through the lobbying efforts of their breed registries. Official state horses are one of many state symbols officially designated by states. Each state has its own flag and state seal, and many states also designate other symbols, including animals, plants, and foods. Such items usually are designated because of their ties to the culture or history of that part
https://en.wikipedia.org/wiki/Epson%20Robots
EPSON Robots is the robotics design and manufacturing department of Japanese corporation Seiko Epson, the brand-name watch and computer printer producer. Epson started the production of robots in 1980. Epson manufactures Cartesian, SCARA and 6-axis industrial robots for factory automation. Cleanroom and ESD compliant models are available. They offer PC-based controllers and integrated vision systems utilizing Epson's own vision processing technology. Epson has a 30-year heritage and there are more than 30,000 Epson robots installed in manufacturing industries around the world. Epson uses a standardized PC-based controller for 6-axis robots, SCARA, and Linear Module needs. A move that simplifies support and reduces learning time. Epson SCARA Robots Epson offers four different lines of SCARA robots including the T-Series, G-Series, RS-Series, and LS-Series . The performance and features offered for each series of robot is determined by the intended purpose and needs of the robot. The T- Series robot is a high performance alternative to slide robots for pick-and-place operations. The G-Series offers a wide variety of robots in regards to the size, arm design, payload application, and more. The RS-Series offers two SCARA robots that are mounted from above and have the ability to move the second axis under the first axis. The LS-Series features several low cost and high performance robots that come in a variety of sizes.
https://en.wikipedia.org/wiki/SNOMED%20CT
SNOMED CT or SNOMED Clinical Terms is a systematically organized computer-processable collection of medical terms providing codes, terms, synonyms and definitions used in clinical documentation and reporting. SNOMED CT is considered to be the most comprehensive, multilingual clinical healthcare terminology in the world. The primary purpose of SNOMED CT is to encode the meanings that are used in health information and to support the effective clinical recording of data with the aim of improving patient care. SNOMED CT provides the core general terminology for electronic health records. SNOMED CT comprehensive coverage includes: clinical findings, symptoms, diagnoses, procedures, body structures, organisms and other etiologies, substances, pharmaceuticals, devices and specimens. SNOMED CT is maintained and distributed by SNOMED International, an international non-profit standards development organization, located in London, UK. SNOMED International is the trading name of the International Health Terminology Standards Development Organisation (IHTSDO), established in 2007. SNOMED CT provides for consistent information interchange and is fundamental to an interoperable electronic health record. It provides a consistent means to index, store, retrieve, and aggregate clinical data across specialties and sites of care. It also helps in organizing the content of electronic health records systems by reducing the variability in the way data are captured, encoded and used for clinical care of patients and research. SNOMED CT can be used to directly record clinical details of individuals in electronic patient records. It also provides the user with a number of linkages to clinical care pathways, shared care plans and other knowledge resources, in order to facilitate informed decision-making, and to support long-term patient care. The availability of free automatic coding tools and services, which can return a ranked list of SNOMED CT descriptors to encode any clinical report,
https://en.wikipedia.org/wiki/Antimycin%20A
Antimycin A (more exactly Antimycin A1b) is a secondary metabolite produced by Streptomyces bacteria and a member of a group of related compounds called antimycins. Antimycin A is classified as an extremely hazardous substance in the United States, as defined in Section 302 of the U.S. Emergency Planning and Community Right-to-Know Act (42 U.S.C. 11002), and is subject to strict reporting requirements by facilities which produce, store, or use it in significant quantities. Use Antimycin A is the active ingredient in Fintrol, a chemical piscicide (fish poison) used in fisheries management. Antimycin A was first discovered in 1945 and registered for use as a fish toxicant in 1960. Fintrol ® is the only currently registered product containing Antimycin A and is classified as a restricted use pesticide because of its aquatic toxicity and requirement for highly specialized training in order to use it. In 1993, several toxicology studies were submitted to the United States Environmental Protection Agency yielding its toxicity. Fintrol is used primarily by federal and state governments in order to eliminate invasive species in an area where resident species are threatened. Antimycin A is added drop-wise in order to reach a concentration of 25 parts per billion. These drip stations are typically used upstream in an area that is accessible to boats and traffic. In deeper bodies of water, a pump mechanism is used to disperse Antimycin A through a perforated hose stretching the length of the water column. In aquaculture, Antimycin A is used as an agent to enhance catfish production via selective killing small and more sensitive species. When Antimycin A is added at 25 ppb it provides a complete kill. However at 10 ppb, Antimycin A is used as a selective killing agent to kill smaller or more sensitive species that may reduce the yield of commercial farming. Products Containing Antimycin A can be registered providing they follow risk mitigation procedures. To date
https://en.wikipedia.org/wiki/Drift%20fence
A drift fence is any long, continuous fence used to control the movement of animals in a particular open range, or to collect animals for research. Drift fences were used in the Texas Panhandle from 1882 to 1887 to control "cattle drift"—the winter migration of livestock to warmer territory. Long sections of barbed wire fence were built by ranchers to keep the cattle from moving to the southern part of the state. This fence was disastrous for the animals during the winter of 1886–1887. Deep snow covered the grasslands, and the fence prevented the herds from migrating to greener pastures. As a result, the cattle froze to death along the fences. Some 75 percent perished during the winter. See also Charles Goodnight Fence Cutting Wars
https://en.wikipedia.org/wiki/Bishop%E2%80%93Cannings%20theorem
The Bishop–Cannings theorem is a theorem in evolutionary game theory. It states that (i) all members of a mixed evolutionarily stable strategy (ESS) have the same payoff (Theorem 2), and (ii) that none of these can also be a pure ESS (from their Theorem 3). The usefulness of the results comes from the fact that they can be used to directly find ESSes algebraically, rather than simulating the game and solving it by iteration. The logic of (i) also applies to Nash equilibria (all strategies in the support of a mixed strategy receive the same payoff). The theorem was formulated by Tim Bishop and Chris Cannings at Sheffield University, who published it in 1978. A review is given by John Maynard Smith in Evolution and the Theory of Games, with proof in the appendix. Notes Evolutionary game theory Biological theorems Economics theorems
https://en.wikipedia.org/wiki/Nanotechnology%20in%20fiction
The use of nanotechnology in fiction has attracted scholarly attention. The first use of the distinguishing concepts of nanotechnology was "There's Plenty of Room at the Bottom", a talk given by physicist Richard Feynman in 1959. K. Eric Drexler's 1986 book Engines of Creation introduced the general public to the concept of nanotechnology. Since then, nanotechnology has been used frequently in a diverse range of fiction, often as a justification for unusual or far-fetched occurrences featured in speculative fiction. Notable examples Literature In 1931, Boris Zhitkov wrote a short story called Microhands (Микроруки), where the narrator builds for himself a pair of microscopic remote manipulators, and uses them for fine tasks like eye surgery. When he attempts to build even smaller manipulators to be manipulated by the first pair, the story goes into detail about the problem of regular materials behaving differently on a microscopic scale. In his 1956 short story The Next Tenants, Arthur C. Clarke describes tiny machines that operate at the micrometre scale – although not strictly nanoscale (billionth of a meter), they are the first fictional example of the concepts now associated with nanotechnology. A concept similar to nanotechnology, called "micromechanical devices", was described in Lem's 1959 novel Eden These devices were used by the aliens as "seeds" to grow a wall around the human spaceship. <ref> Doktryna nieingerencji, In: Marek Oramus, Bogowie Lema</ref> Stanislaw Lem's 1964 novel The Invincible involves the discovery of an artificial ecosystem of minuscule robots, although like in Clarke's story they are larger than what is strictly meant by the term 'nanotechnology'. Robert Silverberg's 1969 short story How It Was when the Past Went Away describes nanotechnology being used in the construction of stereo loudspeakers, with a thousand speakers per inch. The 1984 novel Peace on Earth by Stanislaw Lem tells about small bacteria-sized nanorobots lookin
https://en.wikipedia.org/wiki/Sabicu%20wood
Sabicu wood or sabicu is the wood of at least two species of the genus Lysiloma. Lysiloma sabicu (L.) Benth. occurs sparingly in the Bahamas, Jamaica, Haiti and the Dominican Republic, and Cuba. It was named by George Bentham (1800-1884) from a Cuban specimen examined in 1854. Bentham went on to identify a second species, Lysiloma latisiliquum (L.) Benth., which grows best in the Bahamas. The latter is commonly known as 'wild tamarind' or 'false tamarind'. The wood of both species is similar, being mid-brown in colour, sometimes with a reddish hue, heavy (specific gravity of 0.40-0.75) hard and durable. Some timber is well figured, but most relatively plain. The wood has been used in construction, shipbuilding and in furniture making, although its weight is a distinct drawback for the latter purpose. The stairs of The Crystal Palace in London, in which The Great Exhibition of 1851 was held, were made of sabicu due to its durability. Despite the enormous traffic that passed over them, the wood at the end was found to be little affected by wear. There is some confusion in the published literature between L. sabicu and L. latisiliquum, although there is little doubt that the former was the most important commercial species. There is also confusion with other Bahamian species colloquially known as 'tamarind', several of which were also called sabicu. The most common of these are Peltophorum adnatum Griseb. and Cojoba arborea (L.) Britton & Rose. At various times their wood has also been called 'horseflesh mahogany'. The Economic Botany Collection at the Royal Botanic Gardens, Kew, London, contains specimens of wood from all these species collected at various times in the 19th and early 20th centuries. The labelling evinces considerable confusion, but it seems likely that 'horseflesh mahogany' properly applies to Peltophorum and Cojoba, while sabicu applies to Lysiloma.
https://en.wikipedia.org/wiki/Center%20for%20Evolutionary%20Psychology
Center for Evolutionary Psychology (CEP) is a research center co-founded and co-directed by John Tooby and Leda Cosmides and is affiliated with the University of California, Santa Barbara. The center is meant to provide research support and comprehensive training in the field of evolutionary psychology. The goals of the center are to facilitate the discovery of the adaptations that characterize the species-wide architecture of the human mind and brain and to explore how socio-cultural phenomena can be explained with reference to these adaptations. The extramural board of the center are made up of Irven DeVore, Paul Ekman, Michael Gazzaniga, Steven Pinker and Roger Shepard. See also Leda Cosmides Evolutionary psychology John Tooby External links University of California, Santa Barbara Evolutionary psychology Research institutes in California
https://en.wikipedia.org/wiki/%C3%89cole%20nationale%20sup%C3%A9rieure%20des%20industries%20agricoles%20et%20alimentaires
The École Nationale Supérieure des Industries Agricoles et Alimentaires, or ENSIA, was a French grande école of agriculture, located in Massy, near Paris. It was affiliated to the Ministry of Agriculture. The school was founded in 1893 and merged into AgroParisTech in 2006. After initial training in food science and engineering, students are able to contribute to research / production project and development of the food industries. The ENSIA graduate has the know-how in industrial processes, food product, quality and management. Research at ENSIA is strongly associated with teams from national scientific research institutes (INRA, CNRS, CIRAD, CEMAGREF, ...) and universities. ENSIA also develops partnerships with various food companies. Initial training : Received Master's degree (Food Science Engineer Diploma) in food engineering Received Master's degree (Food Science Engineer Diploma) in food engineering specialized in Mediterranean and tropical agro-products. Received Master of Science in Mediterranean and tropical food science and technology Asian-European master's degree programme in food science and technology (taught in English in SEA). PhD programmes Food science Food process engineering Biology and microbiology Continuous education Professional master's degree 350 students 100 graduate students conducting research 50 teachers-researchers 70 technical and administrative staff
https://en.wikipedia.org/wiki/Regular%20singular%20point
In mathematics, in the theory of ordinary differential equations in the complex plane , the points of are classified into ordinary points, at which the equation's coefficients are analytic functions, and singular points, at which some coefficient has a singularity. Then amongst singular points, an important distinction is made between a regular singular point, where the growth of solutions is bounded (in any small sector) by an algebraic function, and an irregular singular point, where the full solution set requires functions with higher growth rates. This distinction occurs, for example, between the hypergeometric equation, with three regular singular points, and the Bessel equation which is in a sense a limiting case, but where the analytic properties are substantially different. Formal definitions More precisely, consider an ordinary linear differential equation of -th order with meromorphic functions. The equation should be studied on the Riemann sphere to include the point at infinity as a possible singular point. A Möbius transformation may be applied to move ∞ into the finite part of the complex plane if required, see example on Bessel differential equation below. Then the Frobenius method based on the indicial equation may be applied to find possible solutions that are power series times complex powers near any given in the complex plane where need not be an integer; this function may exist, therefore, only thanks to a branch cut extending out from , or on a Riemann surface of some punctured disc around . This presents no difficulty for an ordinary point (Lazarus Fuchs 1866). When is a regular singular point, which by definition means that has a pole of order at most at , the Frobenius method also can be made to work and provide independent solutions near . Otherwise the point is an irregular singularity. In that case the monodromy group relating solutions by analytic continuation has less to say in general, and the solutions are harder to st
https://en.wikipedia.org/wiki/Do%20not%20feed%20the%20animals
The prohibition "do not feed the animals" reflects a policy forbidding the artificial feeding of wild or feral animals. Signs displaying this message are commonly found in zoos, circuses, animal theme parks, aquariums, national parks, parks, public spaces, farms, and other places where people come into contact with wildlife. In some cases there are laws to enforce such no-feeding policies. Feeding wild animals can significantly change their behavior. Feeding or leaving unattended food to large animals, such as bears, can lead them to aggressively seek out food from people, sometimes resulting in injury. Feeding can also alter animal behavior so that animals routinely travel in larger groups, which can make disease transmission between animals more likely. In public spaces, the congregation of animals caused by feeding can result in them being considered pests. In zoos, giving food to the animals is discouraged due to the strict dietary controls in place. More generally, artificial feeding can result in, for example, vitamin deficiencies and dietary mineral deficiencies. Outside zoos, a concern is that the increase in local concentrated wildlife population due to artificial feeding can promote the transfer of disease among animals or between animals and humans. Sign example gallery Zoos Zoos generally discourage visitors from giving any food to the animals. Some zoos, particularly petting zoos, do the opposite and actively encourage people to get involved with the feeding of the animals. This, however, is strictly monitored and usually involves set food available from the zookeepers or vending machines, as well as a careful choice of which animals to feed, and the provision of hand-washing facilities to avoid spreading disease. Domestic animals such as sheep and goats are often permitted to be fed, as are giraffes. National and state parks In national parks and state parks, feeding animals can result in malnourishment due to inappropriate diet and in disruptio
https://en.wikipedia.org/wiki/Luminosity%20distance
Luminosity distance DL is defined in terms of the relationship between the absolute magnitude M and apparent magnitude m of an astronomical object. which gives: where DL is measured in parsecs. For nearby objects (say, in the Milky Way) the luminosity distance gives a good approximation to the natural notion of distance in Euclidean space. The relation is less clear for distant objects like quasars far beyond the Milky Way since the apparent magnitude is affected by spacetime curvature, redshift, and time dilation. Calculating the relation between the apparent and actual luminosity of an object requires taking all of these factors into account. The object's actual luminosity is determined using the inverse-square law and the proportions of the object's apparent distance and luminosity distance. Another way to express the luminosity distance is through the flux-luminosity relationship, where is flux (W·m−2), and is luminosity (W). From this the luminosity distance (in meters) can be expressed as: The luminosity distance is related to the "comoving transverse distance" by and with the angular diameter distance by the Etherington's reciprocity theorem: where z is the redshift. is a factor that allows calculation of the comoving distance between two objects with the same redshift but at different positions of the sky; if the two objects are separated by an angle , the comoving distance between them would be . In a spatially flat universe, the comoving transverse distance is exactly equal to the radial comoving distance , i.e. the comoving distance from ourselves to the object. See also Distance measure Distance modulus Notes External links Ned Wright's Javascript Cosmology Calculator iCosmos: Cosmology Calculator (With Graph Generation ) Observational astronomy Physical quantities
https://en.wikipedia.org/wiki/Nicolaas%20Govert%20de%20Bruijn
Nicolaas Govert "Dick" de Bruijn (; 9 July 1918 – 17 February 2012) was a Dutch mathematician, noted for his many contributions in the fields of analysis, number theory, combinatorics and logic. Biography De Bruijn was born in The Hague where he attended elementary school between 1924 and 1930 and secondary school until 1934. He started studies in mathematics at Leiden University in 1936 but his studies were interrupted by the outbreak of World War II in 1939. He became a full-time Assistant in the Department of Mathematics of the Technological University of Delft in September 1939 while continuing his studies. He completed his undergraduate studies at the University of Leiden in 1941. He received his PhD in 1943 from the Vrije Universiteit Amsterdam with a thesis entitled "Over modulaire vormen van meer veranderlijken" advised by Jurjen Ferdinand Koksma. From June 1944 he was a Scientific Associate working in Philips Research Laboratories in Eindhoven. He married Elizabeth de Groot on 30 August 1944. The couple had four children: Jorina Aleida (born 19 January 1947), Frans Willem (born 13 April 1948), Elisabeth (born 24 November 1950), and Judith Elizabeth (born 31 March 1963). De Bruijn started his academic career at the University of Amsterdam, where he was Professor of Mathematics from 1952 to 1960. In 1960 he moved to the Technical University Eindhoven where he was Professor of Mathematics until his retirement in 1984. Among his graduate students were Johannes Runnenburg (1960), Antonius Levelt (1961), S. Ackermans (1964), Jozef Beenakker (1966), W. van der Meiden (1967), Matheus Hautus (1970), Robert Nederpelt Lazarom (1973), Lambert van Benthem Jutting (1977), A. Janssen (1979), Diederik van Daalen (1980), and Harmannus Balsters (1986). In 1957 he was appointed member of the Royal Netherlands Academy of Arts and Sciences. He was Knighted with the Order of the Netherlands Lion. Work De Bruijn covered many areas of mathematics. He is especially noted f
https://en.wikipedia.org/wiki/Entrance%20pupil
In an optical system, the entrance pupil is the optical image of the physical aperture stop, as 'seen' through the front (the object side) of the lens system. The corresponding image of the aperture as seen through the back of the lens system is called the exit pupil. If there is no lens in front of the aperture (as in a pinhole camera), the entrance pupil's location and size are identical to those of the aperture. Optical elements in front of the aperture will produce a magnified or diminished image that is displaced from the location of the physical aperture. The entrance pupil is usually a virtual image: it lies behind the first optical surface of the system. The entrance pupil is a useful concept for determining the size of the cone of rays that an optical system will accept. Once the size and the location of the entrance pupil of an optical system is determined, the maximum cone of rays that the system will accept from a given object plane is determined solely by the size of the entrance pupil and its distance from the object plane, without any need to consider ray refraction by the optics. In photography, the size of the entrance pupil (rather than the size of the physical aperture stop) is used to calibrate the opening and closing of the diaphragm aperture. The f-number ("relative aperture"), N, is defined by N = f / EN, where f is the focal length and EN is the diameter of the entrance pupil. Increasing the focal length of a lens (i.e., zooming in) will usually cause the f-number to increase, and the entrance pupil location to move further back along the optical axis. The center of the entrance pupil is the vertex of a camera's angle of view and consequently its center of perspective, perspective point, view point, projection center or no-parallax point. This point is important in panoramic photography without digital image processing, because the camera must be rotated around the center of the entrance pupil to avoid parallax errors in the final, stitch
https://en.wikipedia.org/wiki/Francesco%20Paolo%20Cantelli
Francesco Paolo Cantelli (20 December 187521 July 1966) was an Italian mathematician. He made contributions to celestial mechanics, probability theory, and actuarial science. Biography Cantelli was born in Palermo. He received his doctorate in mathematics in 1899 from the University of Palermo with a thesis on celestial mechanics and continued his interest in astronomy by working until 1903 at Palermo Astronomical Observatory (osservatorio astronomico cittadino), which was under the direction of Annibale Riccò. Cantelli's early papers were on problems in astronomy and celestial mechanics. From 1903 to 1923 Cantelli worked at the Istituto di Previdenza della Cassa Depositi e Prestiti (Pension Fund for the Government Deposits and Loans Bank). During these years he did research on the mathematics of finance theory and actuarial science, as well as the probability theory. Cantelli's later work was all on probability theory. Borel–Cantelli lemma, Cantelli's inequality and the Glivenko–Cantelli theorem are result of his work in this field. In 1916–1917 he made contributions to the theory of stochastic convergence. In 1923 he resigned his actuarial position when he was appointed professor of actuarial mathematics at the University of Catania. From there, he went to the University of Naples, where he worked as a professor and then in 1931 to the Sapienza University of Rome where he remained until his retirement in 1951. He died in Rome. Cantelli made fundamental contributions to the foundations of probability theory and to the clarification of different types of probabilistic convergence. He also made seminal contributions to actuarial science. He was the founder of the Istituto Italiano degli Attuari for the applications of mathematics and probability to economics. Cantelli was the editor of the Giornale dell'Istituto Italiano degli Attuari (GIIA) from 1930 to 1958. Works Sull'adattamento delle curve ad una serie di misure o di osservazioni, Palermo, 1905 Genesi e
https://en.wikipedia.org/wiki/Sister%20Mary%20Joseph%20nodule
In medicine, the Sister Mary Joseph nodule (sometimes Sister Mary Joseph node or Sister Mary Joseph sign) refers to a palpable nodule bulging into the umbilicus as a result of metastasis of a malignant cancer in the pelvis or abdomen. Sister Mary Joseph nodules can be painful to palpation. A periumbilical mass is not always a Sister Mary Joseph nodule. Other conditions that can cause a palpable periumbilical mass include umbilical hernia, infection, and endometriosis. Medical imaging, such as abdominal ultrasound, may be used to distinguish a Sister Mary Joseph nodule from another kind of mass. Gastrointestinal malignancies account for about half of underlying sources (most commonly gastric cancer, colonic cancer or pancreatic cancer, mostly of the tail and body of the pancreas), and men are even more likely to have an underlying cancer of the gastrointestinal tract. Gynecological cancers account for about 1 in 4 cases (primarily ovarian cancer and also uterine cancer). Nodules will also, rarely, originate from appendix cancer spillage and pseudomyxoma peritonei. Unknown primary tumors and rarely, urinary or respiratory tract malignancies can cause umbilical metastases. How exactly the metastases reach the umbilicus remains largely unknown. Proposed mechanisms for the spread of cancer cells to the umbilicus include direct transperitoneal spread, via the lymphatics which run alongside the obliterated umbilical vein, hematogenous spread, or via remnant structures such as the falciform ligament, median umbilical ligament, or a remnant of the vitelline duct. Sister Mary Joseph nodule is associated with multiple peritoneal metastases and a poor prognosis. History Sister Mary Joseph Dempsey (born Julia Dempsey) was a Catholic nun and surgical assistant of William J. Mayo at St. Mary's Hospital in Rochester, Minnesota from 1890 to 1915. She drew Mayo's attention to the phenomenon, and he published an article about it in 1928. The eponymous term Sister Mary Joseph nodul
https://en.wikipedia.org/wiki/Magic%20Cap
Magic Cap (short for Magic Communicating Applications Platform) is a discontinued object-oriented operating system for PDAs developed by General Magic. Tony Fadell was a contributor to the platform, and Darin Adler was an architect. Its graphical user interface incorporates a room metaphor, where the user navigates between rooms to perform tasks, such as going to a home office to perform word processing, or to a file room to clean up the system files. Automation is based on mobile agents but not an office assistant. Several electronic companies came to market with Magic Cap devices, including the Sony Magic Link and the Motorola Envoy, both released in 1994. None of these devices were commercial successes. Mobile agents The Magic Cap operating system includes a new mobile agent technology named Telescript. Conceptually, the agents carry work orders, travel to a Place outside of the handheld device, complete their work, and then return to the device with the results. When the Magic Cap devices were delivered, the only Place for agents to travel was the PersonaLink service provided by AT&T. The agents had little access to functionality, because each agent had to be strictly authorized and its scope of inquiry was limited to the software modules installed on the PersonaLink servers. The payload carried by these agents was also hampered by the slow dial-up modem speed of 2400 bit/s. The authentication and authorization system of the mobile agents in Telescript created a high coupling between the device and the target Place. As a result, deployment of agent-based technology was incredibly difficult, and never reached fruition before the PersonaLink service was shut down. See also Apple Newton Microsoft Bob Danger Hiptop
https://en.wikipedia.org/wiki/Point%20accepted%20mutation
A point accepted mutation — also known as a PAM — is the replacement of a single amino acid in the primary structure of a protein with another single amino acid, which is accepted by the processes of natural selection. This definition does not include all point mutations in the DNA of an organism. In particular, silent mutations are not point accepted mutations, nor are mutations that are lethal or that are rejected by natural selection in other ways. A PAM matrix is a matrix where each column and row represents one of the twenty standard amino acids. In bioinformatics, PAM matrices are sometimes used as substitution matrices to score sequence alignments for proteins. Each entry in a PAM matrix indicates the likelihood of the amino acid of that row being replaced with the amino acid of that column through a series of one or more point accepted mutations during a specified evolutionary interval, rather than these two amino acids being aligned due to chance. Different PAM matrices correspond to different lengths of time in the evolution of the protein sequence. Biological background The genetic instructions of every replicating cell in a living organism are contained within its DNA. Throughout the cell's lifetime, this information is transcribed and replicated by cellular mechanisms to produce proteins or to provide instructions for daughter cells during cell division, and the possibility exists that the DNA may be altered during these processes. This is known as a mutation. At the molecular level, there are regulatory systems that correct most — but not all — of these changes to the DNA before it is replicated. One of the possible mutations that occurs is the replacement of a single nucleotide, known as a point mutation. If a point mutation occurs within an expressed region of a gene, an exon, then this will change the codon specifying a particular amino acid in the protein produced by that gene. Despite the redundancy in the genetic code, there is a possibility t
https://en.wikipedia.org/wiki/Program-specific%20information
Program-specific information (PSI) is metadata about a program (channel) and part of an MPEG transport stream. The PSI data as defined by ISO/IEC 13818-1 (MPEG-2 Part 1: Systems) includes four tables: PAT (Program Association Table) CAT (Conditional Access Table) PMT (Program Mapping Table) NIT (Network Information Table) The MPEG-2 specification does not specify the format of the CAT and NIT. PSI is carried in the form of a table structure. Each table structure is broken into sections. Each section can span multiple transport stream packets. On the other hand, a transport stream packet can also contain multiple sections with same PID. Adaptation field also occurs in TS packets carrying PSI data. The PSI data will never be scrambled so that the decoder at the receiving end can easily identify the properties of the stream. The sections comprising the PAT and CAT tables are associated with predefined PIDs (Packet Identifier) as explained in their respective descriptions below. There may be multiple independent PMT sections in a stream; each section is given a unique user-defined PID and maps a program number to the metadata describing that program and the streams within it. PMT section PIDs are defined in the PAT, and are the only PIDs defined there. The streams themselves are contained in PES packets with user-defined PIDs specified in the PMT. PSI structure Table Sections Descriptor PAT (Program Association Table) The program association table (PAT) lists all programs available in the transport stream. Each of the listed programs is identified by a 16-bit value called program_number. Each of the programs listed in PAT has an associated value of PID for its PMT. The value 0x0000 for program_number is reserved to specify the PID where to look for network information table. If such a program is not present in PAT the default PID value (0x0010) shall be used for NIT. TS packets containing PAT information always have PID 0x0000. The PAT is assigned PID 0
https://en.wikipedia.org/wiki/Smoluchowski%20coagulation%20equation
In statistical physics, the Smoluchowski coagulation equation is a population balance equation introduced by Marian Smoluchowski in a seminal 1916 publication, describing the time evolution of the number density of particles as they coagulate (in this context "clumping together") to size x at time t. Simultaneous coagulation (or aggregation) is encountered in processes involving polymerization, coalescence of aerosols, emulsication, flocculation. Equation The distribution of particle size changes in time according to the interrelation of all particles of the system. Therefore, the Smoluchowski coagulation equation is an integrodifferential equation of the particle-size distribution. In the case when the sizes of the coagulated particles are continuous variables, the equation involves an integral: If dy is interpreted as a discrete measure, i.e. when particles join in discrete sizes, then the discrete form of the equation is a summation: There exists a unique solution for a chosen kernel function. Coagulation kernel The operator, K, is known as the coagulation kernel and describes the rate at which particles of size coagulate with particles of size . Analytic solutions to the equation exist when the kernel takes one of three simple forms: known as the constant, additive, and multiplicative kernels respectively. For the case it could be mathematically proven that the solution of Smoluchowski coagulation equations have asymptotically the dynamic scaling property. This self-similar behaviour is closely related to scale invariance which can be a characteristic feature of a phase transition. However, in most practical applications the kernel takes on a significantly more complex form. For example, the free-molecular kernel which describes collisions in a dilute gas-phase system, Some coagulation kernels account for a specific fractal dimension of the clusters, as in the diffusion-limited aggregation: or Reaction-limited aggregation: where are
https://en.wikipedia.org/wiki/Winter%20sowing
Winter sowing is a method of starting seeds outdoors in winter. This is generally done with seeds that require a period of cold stratification. The method takes advantage of natural temperatures, rather than artificially refrigerating seeds. Winter sowing involves sowing seeds in a miniature greenhouse outside during winter, allowing them to germinate in spring. Users of this method have had success in most hardiness zones. Advantages There are many advantages to winter sowing: It is simple to do. It's efficient. You do not have to run grow lights for weeks at a time when starting seeds indoors. You don't need to worry about having leggy seedlings because they are planted and grown outdoors. There is no need to harden off the seedlings as they are already acclimated to outdoor conditions. They are ready to plant whenever the outside temperature has sufficiently warmed. Saves space indoors for plants that need to be started prior to planting outside. It allows someone who doesn't have the room, a grow light setup, nor the window space available indoors to start seeds successfully. Prevents seeds from being washed away or eaten. It gives you something to do gardening-wise during winter/early spring. Containers for winter sowing Anything that is translucent enough to allow light to pass through and that can be made to have drainage holes, a lid, and a ventilation hole(s) can be used for winter sowing. Options include, but are not limited to, plastic jugs, water or soda bottles, take out containers, disposable foil pans with plastic covers, clamshell containers, disposable beverage cups, plastic tubs, and plastic totes.
https://en.wikipedia.org/wiki/Cryptographic%20Service%20Provider
In Microsoft Windows, a Cryptographic Service Provider (CSP) is a software library that implements the Microsoft CryptoAPI (CAPI). CSPs implement encoding and decoding functions, which computer application programs may use, for example, to implement strong user authentication or for secure email. CSPs are independent modules that can be used by different applications. A user program calls CryptoAPI functions and these are redirected to CSPs functions. Since CSPs are responsible for implementing cryptographic algorithms and standards, applications do not need to be concerned about security details. Furthermore, one application can define which CSP it is going to use on its calls to CryptoAPI. In fact, all cryptographic activity is implemented in CSPs. CryptoAPI only works as a bridge between the application and the CSP. CSPs are implemented basically as a special type of DLL with special restrictions on loading and use. Every CSP must be digitally signed by Microsoft and the signature is verified when Windows loads the CSP. In addition, after being loaded, Windows periodically re-scans the CSP to detect tampering, either by malicious software such as computer viruses or by the user him/herself trying to circumvent restrictions (for example on cryptographic key length) that might be built into the CSP's code. To obtain a signature, non-Microsoft CSP developers must supply paperwork to Microsoft promising to obey various legal restrictions and giving valid contact information. Microsoft did not charge any fees to supply these signatures. For development and testing purposes, a CSP developer can configure Windows to recognize the developer's own signatures instead of Microsoft's, but this is a somewhat complex and obscure operation unsuitable for nontechnical end users. The CAPI/CSP architecture had its origins in the era of restrictive US government controls on the export of cryptography. Microsoft's default or "base" CSP then included with Windows was li
https://en.wikipedia.org/wiki/Kaplan%E2%80%93Meier%20estimator
The Kaplan–Meier estimator, also known as the product limit estimator, is a non-parametric statistic used to estimate the survival function from lifetime data. In medical research, it is often used to measure the fraction of patients living for a certain amount of time after treatment. In other fields, Kaplan–Meier estimators may be used to measure the length of time people remain unemployed after a job loss, the time-to-failure of machine parts, or how long fleshy fruits remain on plants before they are removed by frugivores. The estimator is named after Edward L. Kaplan and Paul Meier, who each submitted similar manuscripts to the Journal of the American Statistical Association. The journal editor, John Tukey, convinced them to combine their work into one paper, which has been cited more than 61,800 times since its publication in 1958. The estimator of the survival function (the probability that life is longer than ) is given by: with a time when at least one event happened, di the number of events (e.g., deaths) that happened at time , and the individuals known to have survived (have not yet had an event or been censored) up to time . Basic concepts A plot of the Kaplan–Meier estimator is a series of declining horizontal steps which, with a large enough sample size, approaches the true survival function for that population. The value of the survival function between successive distinct sampled observations ("clicks") is assumed to be constant. An important advantage of the Kaplan–Meier curve is that the method can take into account some types of censored data, particularly right-censoring, which occurs if a patient withdraws from a study, is lost to follow-up, or is alive without event occurrence at last follow-up. On the plot, small vertical tick-marks state individual patients whose survival times have been right-censored. When no truncation or censoring occurs, the Kaplan–Meier curve is the complement of the empirical distribution function. In me
https://en.wikipedia.org/wiki/Santa%20Claus%20machine
A Santa Claus machine, named after the folkloric Santa Claus, is a hypothetical machine that is capable of creating any required object or structure out of any given material. It is most often referenced by futurists and science fiction writers when discussing hypothetical projects of enormous scale, such as a Dyson sphere. These types of future constructions would be too large for many civilizations to build directly, so they would need a series of machines to intelligently build the machine with little or no direct control. Origin The term was coined by Theodore Taylor in 1978: It's possible to imagine a machine that could scoop up material – rocks from the Moon or rocks from asteroids – process them inside and produce just about any product: washing machines or teacups or automobiles or starships. Once such a machine exists it could gather sunlight and materials that it's sitting on, and produce on call whatever product anybody wants to name, as long as somebody knows how to make it and those instructions can be given to the machine. Discussion A mature Santa Claus machine requires significant advances in technology to be possible, including the ability to take any collection of matter and reconfigure it into any other type of matter. Scientifically, it requires two parts: a disassembler and an assembler. One form of disassembler would consist of an ionizing chamber, which heats the input matter to 43,000 °F (24,000 °C). Once all the molecular bonds are broken and the electrons ripped off, each atomic nucleus would be moved through a magnetic field, where its path would curve in proportion to its charge/mass ratio, as per mass spectrometry. The separated ions would be captured by a linear array of cold traps to provide reservoirs of each element. The assembler would use these reservoirs as input to some kind of additive layer manufacturing device (also known as 3D printers and rapid prototype machines). Many of these printers are commercially available to
https://en.wikipedia.org/wiki/Pneumocystosis
Pneumocystosis is a fungal infection that most often presents as Pneumocystis pneumonia in people with HIV/AIDS or poor immunity. It usually causes cough, difficulty breathing and fever, and can lead to respiratory failure. Involvement outside the lungs is rare but, can occur as a disseminated type affecting lymph nodes, spleen, liver, bone marrow, eyes, kidneys, thyroid, gastrointestinal tract or other organs. If occurring in the skin, it usually presents as nodular growths in the ear canals or underarms. It is caused by Pneumocystis jirovecii, a fungus which is usually breathed in and found in the lungs of healthy people without causing disease, until the person's immune system becomes weakened. Diagnosis is by identifying the organism from a sample of fluid from affected lungs or a biopsy. Prevention in high risk people, and treatment in those affected is usually with trimethoprim/sulfamethoxazole (co-trimoxazole). The prevalence is unknown. Less than 3% of cases do not involve the lungs. The first cases of pneumocystosis affecting lungs were described in premature infants in Europe following the Second World War. Signs and symptoms Pneumocystosis is generally an infection in the lungs. Involvement outside the lungs is rare but, can occur as a disseminated type affecting lymph nodes, bone marrow, liver or spleen. It may also affect skin, eyes, kidneys, thyroid, heart, adrenals and gastrointestinal tract. Lungs When the lungs are affected there is usually a dry cough, difficulty breathing and fever, usually present for longer than four weeks. There may be chest pain, shivering or tiredness. The oxygen saturation is low. The lungs may fail to function. Eyes Pneumocystosis in eyes may appear as a single or multiple (up to 50) yellow-white plaques in the eye's choroid layer or just beneath the retina. Vision is usually not affected and it is typically found by chance. Skin If occurring in the skin, pneumocystosis most often presents as nodular growths in the
https://en.wikipedia.org/wiki/Phase%20angle%20%28astronomy%29
In observational astronomy, phase angle is the angle between the light incident onto an observed object and the light reflected from the object. In the context of astronomical observations, this is usually the angle Sun-object-observer. For terrestrial observations, "Sun–object–Earth" is often nearly the same thing as "Sun–object–observer", since the difference depends on the parallax, which in the case of observations of the Moon can be as much as 1°, or two full Moon diameters. With the development of space travel, as well as in hypothetical observations from other points in space, the notion of phase angle became independent of Sun and Earth. The etymology of the term is related to the notion of planetary phases, since the brightness of an object and its appearance as a "phase" is the function of the phase angle. The phase angle varies from 0° to 180°. The value of 0° corresponds to the position where the illuminator, the observer, and the object are collinear (all lying along the same line), with the illuminator and the observer on the same side of the object. The value of 180° is the position where the object is between the illuminator and the observer, known as inferior conjunction. Values less than 90° represent backscattering; values greater than 90° represent forward scattering. For some objects, such as the Moon (see lunar phases), Venus and Mercury the phase angle (as seen from the Earth) covers the full 0–180° range. The superior planets cover shorter ranges. For example, for Mars the maximum phase angle is about 45°. For Jupiter, the maximum is 11.1° and for Saturn 6°. The brightness of an object is a function of the phase angle, which is generally smooth, except for the so-called opposition spike near 0°, which does not affect gas giants or bodies with pronounced atmospheres, and when the object becomes fainter as the angle approaches 180°. This relationship is referred to as the phase curve. See also Illumination angle Incidence angle (optics)
https://en.wikipedia.org/wiki/Superficial%20fibular%20nerve
The superficial fibular nerve (also known as superficial peroneal nerve) is a mixed (motor and sensory) nerve that provides motor innervation to the fibularis longus and fibularis brevis muscles, and sensory innervation to skin over the antero-lateral aspect of the leg along with the greater part of the dorsum of the foot (with the exception of the first web space, which is innervated by the deep fibular nerve). Structure Lateral side of the leg The superficial fibular nerve is the main nerve of the lateral compartment of the leg. It begins at the lateral side of the neck of fibula, and runs through the fibularis longus and fibularis brevis muscles. In the middle third of the leg, it descends between the fibularis longus and fibularis brevis, and then reaches the anterior border of the fibularis brevis to enter the groove between the fibularis brevis and the extensor digitorum longus under the deep fascia of leg. It becomes superficial at the junction of upper two-thirds and lower one-thirds of the leg by piercing the deep fascia. The superficial fibular nerve gives off several branches in the leg. Muscular branches to fibularis longus and fibularis brevis Cutaneous branches supply the skin over the lower one-third of the lateral side of the leg and greater part of the dorsum of the foot except for areas that are supplied by the saphenous nerve (medial side of the leg), the sural nerve (lateral side of the foot), the deep fibular nerve (first webbed space of the dorsum of the foot), the medial, and the lateral plantar nerves (plantar surface of the foot). Foot At the junction between the upper two-thirds and lower one-thirds of the leg, the superficial fibular nerve is divided into medial dorsal cutaneous nerve (medial branch) and intermediate dorsal cutaneous nerve (lateral branch). The medial branch crosses the ankle and divides into two dorsal digital nerves—one for the medial side of the big toe, and the other for the adjoining sides of the second and t
https://en.wikipedia.org/wiki/Cauchy%20formula%20for%20repeated%20integration
The Cauchy formula for repeated integration, named after Augustin-Louis Cauchy, allows one to compress n antiderivatives of a function into a single integral (cf. Cauchy's formula). Scalar case Let f be a continuous function on the real line. Then the nth repeated integral of f with base-point a, is given by single integration Proof A proof is given by induction. The base case with n=1 is trivial, since it is equivalent to: Now, suppose this is true for n, and let us prove it for n+1. Firstly, using the Leibniz integral rule, note that Then, applying the induction hypothesis, It has been shown that this statement holds true for the base case . If the statement is true for , then it has been shown that the statement holds true for . Thus this statement has been proven true for all positive integers. This completes the proof. Generalizations and applications The Cauchy formula is generalized to non-integer parameters by the Riemann-Liouville integral, where is replaced by , and the factorial is replaced by the gamma function. The two formulas agree when . Both the Cauchy formula and the Riemann-Liouville integral are generalized to arbitrary dimension by the Riesz potential. In fractional calculus, these formulae can be used to construct a differintegral, allowing one to differentiate or integrate a fractional number of times. Differentiating a fractional number of times can be accomplished by fractional integration, then differentiating the result.
https://en.wikipedia.org/wiki/Ultrahydrophobicity
In chemistry and materials science, ultrahydrophobic (or superhydrophobic) surfaces are highly hydrophobic, i.e., extremely difficult to wet. The contact angles of a water droplet on an ultrahydrophobic material exceed 150°. This is also referred to as the lotus effect, after the superhydrophobic leaves of the lotus plant. A droplet striking these kinds of surfaces can fully rebound like an elastic ball. Interactions of bouncing drops can be further reduced using special superhydrophobic surfaces that promote symmetry breaking, pancake bouncing or waterbowl bouncing. Theory In 1805, Thomas Young defined the contact angle θ by analysing the forces acting on a fluid droplet resting on a smooth solid surface surrounded by a gas. where = Interfacial tension between the solid and gas = Interfacial tension between the solid and liquid = Interfacial tension between the liquid and gas θ can be measured using a contact angle goniometer. Wenzel determined that when the liquid is in intimate contact with a microstructured surface, θ will change to θW* where r is the ratio of the actual area to the projected area. Wenzel's equation shows that microstructuring a surface amplifies the natural tendency of the surface. A hydrophobic surface (one that has an original contact angle greater than 90°) becomes more hydrophobic when microstructured – its new contact angle becomes greater than the original. However, a hydrophilic surface (one that has an original contact angle less than 90°) becomes more hydrophilic when microstructured – its new contact angle becomes less than the original. Cassie and Baxter found that if the liquid is suspended on the tops of microstructures, θ will change to θCB* where φ is the area fraction of the solid that touches the liquid. Liquid in the Cassie-Baxter state is more mobile than in the Wenzel state. It can be predicted whether the Wenzel or Cassie-Baxter state should exist by calculating the new contact angle with both equations. By a m
https://en.wikipedia.org/wiki/Invertebrate%20zoology
Invertebrate zoology is the subdiscipline of zoology that consists of the study of invertebrates, animals without a backbone (a structure which is found only in fish, amphibians, reptiles, birds and mammals). Invertebrates are a vast and very diverse group of animals that includes sponges, echinoderms, tunicates, numerous different phyla of worms, molluscs, arthropods and many additional phyla. Single-celled organisms or protists are usually not included within the same group as invertebrates. Subdivisions Invertebrates represent 97% of all named animal species, and because of that fact, this subdivision of zoology has many further subdivisions, including but not limited to: Arthropodology - the study of arthropods, which includes Arachnology - the study of spiders and other arachnids Entomology - the study of insects Carcinology - the study of crustaceans Myriapodology - the study of centipedes, millipedes, and other myriapods Cnidariology - the study of Cnidaria Helminthology - the study of parasitic worms. Malacology - the study of mollusks, which includes Conchology - the study of Mollusk shells. Limacology - the study of slugs. Teuthology - the study of cephalopods. Invertebrate paleontology - the study of fossil invertebrates These divisions are sometimes further divided into more specific specialties. For example, within arachnology, acarology is the study of mites and ticks; within entomology, lepidoptery is the study of butterflies and moths, myrmecology is the study of ants and so on. Marine invertebrates are all those invertebrates that exist in marine habitats. History Early Modern Era In the early modern period starting in the late 16th century, invertebrate zoology saw growth in the number of publications made and improvement in the experimental practices associated with the field. (Insects are one of the most diverse groups of organisms on Earth. They play important roles in ecosystems, including pollination, natural enemies, saprophytes, and
https://en.wikipedia.org/wiki/Zero%20moment%20point
The zero moment point (also referred to as zero-tilting moment point) is a concept related to the dynamics and control of legged locomotion, e.g., for humanoid or quadrupedal robots. It specifies the point with respect to which reaction forces at the contacts between the feet and the ground do not produce any moment in the horizontal direction, i.e., the point where the sum of horizontal inertia and gravity forces is zero. The concept assumes the contact area is planar and has sufficiently high friction to keep the feet from sliding. Introduction This concept was introduced to the legged locomotion community in January 1968 by Miomir Vukobratović and Davor Juričić at The Third All-Union Congress of Theoretical and Applied Mechanics in Moscow. The term "zero moment point" itself was coined in works that followed between 1970 and 1972, and was widely and successfully reproduced in works from robotics groups around the world. The zero moment point is an important concept in the motion planning for biped robots. Since they have only two points of contact with the floor and they are supposed to walk, “run” or “jump” (in the motion context), their motion has to be planned concerning the dynamical stability of their whole body. This is not an easy task, especially because the upper body of the robot (torso) has larger mass and inertia than the legs which are supposed to support and move the robot. This can be compared to the problem of balancing an inverted pendulum. The trajectory of a walking robot is planned using the angular momentum equation to ensure that the generated joint trajectories guarantee the dynamical postural stability of the robot, which usually is quantified by the distance of the zero moment point in the boundaries of a predefined stability region. The position of the zero moment point is affected by the referred mass and inertia of the robot's torso, since its motion generally requires large angle torques to maintain a satisfactory dynamical postu
https://en.wikipedia.org/wiki/%28n-p%29%20reaction
The (n-p) reaction, or (n,p) reaction, is an example of a nuclear reaction. It is the reaction which occurs when a neutron enters a nucleus and a proton leaves the nucleus simultaneously. For example, sulfur-32 (32S) undergoes an (n,p) nuclear reaction when bombarded with neutrons, thus forming phosphorus-32 (32P). The nuclide nitrogen-14 (14N) can also undergo an (n,p) nuclear reaction to produce carbon-14 (14C). This nuclear reaction 14N (n,p) 14C continually happens in the Earth's atmosphere, forming equilibrium amounts of the radionuclide 14C. Most (n,p) reactions have threshold neutron energies below which the reaction cannot take place as a result of the charged particle in the exit channel requiring energy (usually more than a MeV) to overcome the Coulomb barrier experienced by the emitted proton. The (n,p) nuclear reaction 14N (n,p) 14C is an exception to this rule, and is exothermic – it can take place at all incident neutron energies. The 14N (n,p) 14C nuclear reaction is responsible for most of the radiation dose delivered to the human body by thermal neutrons – these thermal neutrons are absorbed by the nitrogen 14N in proteins, causing a proton to be emitted; the emitted proton deposits its kinetic energy over a very short distance in the body tissue, thereby depositing radiation dose.
https://en.wikipedia.org/wiki/Peptostreptococcus
Peptostreptococcus is a genus of anaerobic, Gram-positive, non-spore forming bacteria. The cells are small, spherical, and can occur in short chains, in pairs or individually. They typically move using cilia. Peptostreptococcus are slow-growing bacteria with increasing resistance to antimicrobial drugs. Peptostreptococcus is a normal inhabitant of the healthy lower reproductive tract of women. Pathogenesis Peptostreptococcus species are commensal organisms in humans, living predominantly in the mouth, skin, gastrointestinal, vagina and urinary tracts, and are members of the gut microbiota. Under immunosuppressed or traumatic conditions these organisms can become pathogenic, as well as septicemic, harming their host. Peptostreptococcus can cause brain, liver, breast, and lung abscesses, as well as generalized necrotizing soft tissue infections. They participate in mixed anaerobic infections, a term which is used to describe infections that are caused by multiple bacteria that do not require or may even be harmed by oxygen. Peptostreptococcus species are susceptible to beta-lactam antibiotics. They are isolated with high frequency from all specimen sources. Anaerobic gram-positive cocci such as Peptostreptococcus are the second most frequently recovered anaerobes and account for approximately one quarter of anaerobic isolates found. Most often Anaerobic gram-positive cocci are usually recovered mixed in with other anaerobic or aerobic bacteria from various infections at different sites of the human body. This contributes to the difficulty of isolating Peptostreptococcus organisms. Infections Peptostreptococcus species that are found in clinical infections were once part of the genus formerly known as Peptococcus. Peptostreptococcus is the only genus among anaerobic gram-positive cocci that is encountered in clinical infections. As such, Peptostreptococcus species are viewed as being clinically significant anaerobic cocci. Other similar clinically significant ana
https://en.wikipedia.org/wiki/Maxwell%20stress%20tensor
The Maxwell stress tensor (named after James Clerk Maxwell) is a symmetric second-order tensor used in classical electromagnetism to represent the interaction between electromagnetic forces and mechanical momentum. In simple situations, such as a point charge moving freely in a homogeneous magnetic field, it is easy to calculate the forces on the charge from the Lorentz force law. When the situation becomes more complicated, this ordinary procedure can become impractically difficult, with equations spanning multiple lines. It is therefore convenient to collect many of these terms in the Maxwell stress tensor, and to use tensor arithmetic to find the answer to the problem at hand. In the relativistic formulation of electromagnetism, the Maxwell's tensor appears as a part of the electromagnetic stress–energy tensor which is the electromagnetic component of the total stress–energy tensor. The latter describes the density and flux of energy and momentum in spacetime. Motivation As outlined below, the electromagnetic force is written in terms of and . Using vector calculus and Maxwell's equations, symmetry is sought for in the terms containing and , and introducing the Maxwell stress tensor simplifies the result. in the above relation for conservation of momentum, is the momentum flux density and plays a role similar to in Poynting's theorem. The above derivation assumes complete knowledge of both and (both free and bounded charges and currents). For the case of nonlinear materials (such as magnetic iron with a BH-curve), the nonlinear Maxwell stress tensor must be used. Equation In physics, the Maxwell stress tensor is the stress tensor of an electromagnetic field. As derived above in SI units, it is given by: , where is the electric constant and is the magnetic constant, is the electric field, is the magnetic field and is Kronecker's delta. In Gaussian cgs unit, it is given by: , where is the magnetizing field. An alternative way of expressing this
https://en.wikipedia.org/wiki/Generator%20%28mathematics%29
In mathematics and physics, the term generator or generating set may refer to any of a number of related concepts. The underlying concept in each case is that of a smaller set of objects, together with a set of operations that can be applied to it, that result in the creation of a larger collection of objects, called the generated set. The larger set is then said to be generated by the smaller set. It is commonly the case that the generating set has a simpler set of properties than the generated set, thus making it easier to discuss and examine. It is usually the case that properties of the generating set are in some way preserved by the act of generation; likewise, the properties of the generated set are often reflected in the generating set. List of generators A list of examples of generating sets follow. Generating set or spanning set of a vector space: a set that spans the vector space Generating set of a group: A subset of a group that is not contained in any subgroup of the group other than the entire group Generating set of a ring: A subset S of a ring A generates A if the only subring of A containing S is A Generating set of an ideal in a ring Generating set of a module A generator, in category theory, is an object that can be used to distinguish morphisms In topology, a collection of sets that generate the topology is called a subbase Generating set of a topological algebra: S is a generating set of a topological algebra A if the smallest closed subalgebra of A containing S is A Differential equations In the study of differential equations, and commonly those occurring in physics, one has the idea of a set of infinitesimal displacements that can be extended to obtain a manifold, or at least, a local part of it, by means of integration. The general concept is of using the exponential map to take the vectors in the tangent space and extend them, as geodesics, to an open set surrounding the tangent point. In this case, it is not unusual to cal
https://en.wikipedia.org/wiki/Deoxyribonucleotide
A deoxyribonucleotide is a nucleotide that contains deoxyribose. They are the monomeric units of the informational biopolymer, deoxyribonucleic acid (DNA). Each deoxyribonucleotide comprises three parts: a deoxyribose sugar (monosaccharide), a nitrogenous base, and one phosphoryl group. The nitrogenous bases are either purines or pyrimidines, heterocycles whose structures support the specific base-pairing interactions that allow nucleic acids to carry information. The base is always bonded to the 1'-carbon of the deoxyribose, an analog of ribose in which the hydroxyl group of the 2'-carbon is replaced with a hydrogen atom. The third component, the phosphoryl group, attaches to the deoxyribose monomer via the hydroxyl group on the 5'-carbon of the sugar. When deoxyribonucleotides polymerize to form DNA, the phosphate group from one nucleotide will bond to the 3' carbon on another nucleotide, forming a phosphodiester bond via dehydration synthesis. New nucleotides are always added to the 3' carbon of the last nucleotide, so synthesis always proceeds from 5' to 3'. Deoxyribonucleoside Just as a nucleoside can be considered as a nucleotide without a phosphate group, so too a deoxyribonucleoside is a deoxyribonucleotide without a phosphate. An example is deoxycytidine.
https://en.wikipedia.org/wiki/Network%20flow%20problem
In combinatorial optimization, network flow problems are a class of computational problems in which the input is a flow network (a graph with numerical capacities on its edges), and the goal is to construct a flow, numerical values on each edge that respect the capacity constraints and that have incoming flow equal to outgoing flow at all vertices except for certain designated terminals. Specific types of network flow problems include: The maximum flow problem, in which the goal is to maximize the total amount of flow out of the source terminals and into the sink terminals The minimum-cost flow problem, in which the edges have costs as well as capacities and the goal is to achieve a given amount of flow (or a maximum flow) that has the minimum possible cost The multi-commodity flow problem, in which one must construct multiple flows for different commodities whose total flow amounts together respect the capacities Nowhere-zero flow, a type of flow studied in combinatorics in which the flow amounts are restricted to a finite set of nonzero values The max-flow min-cut theorem equates the value of a maximum flow to the value of a minimum cut, a partition of the vertices of the flow network that minimizes the total capacity of edges crossing from one side of the partition to the other. Approximate max-flow min-cut theorems provide an extension of this result to multi-commodity flow problems. The Gomory–Hu tree of an undirected flow network provides a concise representation of all minimum cuts between different pairs of terminal vertices. Algorithms for constructing flows include Dinic's algorithm, a strongly polynomial algorithm for maximum flow The Edmonds–Karp algorithm, a faster strongly polynomial algorithm for maximum flow The Ford–Fulkerson algorithm, a greedy algorithm for maximum flow that is not in general strongly polynomial The network simplex algorithm, a method based on linear programming but specialized for network flow The out-of-kilter algorithm for m
https://en.wikipedia.org/wiki/Integral%20symbol
The integral symbol: is used to denote integrals and antiderivatives in mathematics, especially in calculus. History The notation was introduced by the German mathematician Gottfried Wilhelm Leibniz in 1675 in his private writings; it first appeared publicly in the article "" (On a hidden geometry and analysis of indivisibles and infinites), published in Acta Eruditorum in June 1686. The symbol was based on the ſ (long s) character and was chosen because Leibniz thought of the integral as an infinite sum of infinitesimal summands. Typography in Unicode and LaTeX Fundamental symbol The integral symbol is in Unicode and \int in LaTeX. In HTML, it is written as &#x222b; (hexadecimal), &#8747; (decimal) and &int; (named entity). The original IBM PC code page 437 character set included a couple of characters ⌠ and ⌡ (codes 244 and 245 respectively) to build the integral symbol. These were deprecated in subsequent MS-DOS code pages, but they still remain in Unicode (U+2320 and U+2321 respectively) for compatibility. The ∫ symbol is very similar to, but not to be confused with, the letter ʃ ("esh"). Extensions of the symbol Related symbols include: Typography in other languages In other languages, the shape of the integral symbol differs slightly from the shape commonly seen in English-language textbooks. While the English integral symbol leans to the right, the German symbol (used throughout Central Europe) is upright, and the Russian variant leans slightly to the left to occupy less horizontal space. Another difference is in the placement of limits for definite integrals. Generally, in English-language books, limits go to the right of the integral symbol: By contrast, in German and Russian texts, the limits are placed above and below the integral symbol, and, as a result, the notation requires larger line spacing, but is more compact horizontally, especially when longer expressions are used in the limits: See also Capital sigma notation Capital
https://en.wikipedia.org/wiki/Wizardry%20III%3A%20Legacy%20of%20Llylgamyn
Wizardry III: Legacy of Llylgamyn (originally known as Wizardry: Legacy of Llylgamyn - The Third Scenario) is the third scenario in the Wizardry series of role-playing video games. It was published in 1983 by Sir-Tech. Plot The City of Llylgamyn is threatened by the violent forces of nature. Earthquakes and volcanic rumblings endanger everyone. Only by seeking the dragon L'Kbreth can the city be saved. Gameplay Legacy of Llylgamyn is another six-level dungeon crawl, although the dungeon is a volcano so the party journeys upwards rather than downwards. The gameplay and the spells are identical to the first two scenarios. Parties of up to six characters can adventure at one time. Characters have to be imported from either Wizardry: Proving Grounds of the Mad Overlord or Wizardry II: The Knight of Diamonds. However, since the game is set years later, the characters are actually the descendants of the original characters. They keep the same name and class, can select a new alignment (class permitting), and are reset to level one. Development Wizardry III is the first adventure game with a window manager, released before the first games on the Macintosh. The game was delayed by a year for using the technology. Llylgamyn was originally a typo, it was supposed to be spelled with only one L. Reception Softline in 1983 praised Llylgamyn, stating that it "wasn't written; it was composed ... The dungeon feels like a living, breathing entity", and concluding that the game "is the best Wizardry yet". Robert Reams reviewed the game for Computer Gaming World, and stated that "The Legacy of Llylgamyn is an example of the maturing and improvement of an already excellent product. This new adventure will challenge all who accept this quest and will leave you looking for the two sequels which follow in its path." Philip L. Wing reviewed Legacy of Llylgamyn in The Space Gamer No. 72. Wing commented that "Wizardry III: Legacy of Llylgamyn is the best scenario of the series yet.
https://en.wikipedia.org/wiki/Knowledge-based%20processor
Knowledge-based processors (KBPs) are used for processing packets in computer networks. Knowledge-based processors are designed with the goal of increased performance of the IPv6 network. By contributing to the buildout of the IPv6 network, KBPs provide the means to an improved and secure networking system. Standards All networks are required to perform the following functions: IPv4/IPv6 multilayer packet/flow classification Policy-based routing and Policy enforcement (QoS) Longest Prefix Match (CIDR) Differentiated Services (DiffServ) IP Security (IPSec) Server Load Balancing Transaction verification All of the above functions must occur at high speeds in advanced networks. Knowledge-based processors contain embedded databases that store information required to process packets that travel through a network at wired speeds. Knowledge based processors are a new addition to intelligent networking that allow these functions to occur at high speeds and at the same time provide for lower power consumption. Knowledge-based processors currently target the 3rd layer of the 7 layer OSI model which is devoted to packet processing. Advantages The advantages that knowledge based processors offer are the ability to execute multiple simultaneous decision making processes for a range of network-aware processing functions. These include routing, Quality of Service (QOS), access control for both security and billing, as well as the forwarding of voice/video packets. These functions improve the performance of advanced Internet applications in IPv6 networks such as VOD (Video on demand), VoIP (voice over Internet protocol), and streaming of video and audio. Knowledge-based processors use a variety of techniques to improve network functioning such as parallel processing, deep pipelining and advanced power management techniques. Improvements in each of these areas allows for existing components to carry on their functions at wired speeds more efficiently thus improving
https://en.wikipedia.org/wiki/Johnny%20Castaway
Johnny Castaway is a screensaver released in 1992 by Sierra On-Line/Dynamix, and marketed under the Screen Antics brand as "the world's first story-telling screen saver". The screensaver depicts a man, Johnny Castaway, stranded on a very small island with a single palm tree. It follows a story which is slowly revealed through time. While Johnny fishes, builds sand castles, and jogs on a regular basis, other events are seen less frequently, such as a mermaid or Lilliputian pirates coming to the island, or a seagull swooping down to steal his shorts while he is bathing. Much like the castaways of Gilligan's Island, Johnny repeatedly comes close to being rescued, but ultimately remains on the island as a result of various unfortunate accidents. "Johnny Castaway" includes Easter eggs for a number of United States holidays such as Halloween, Christmas and Independence Day. During these holidays, the scenes are played out as usual except for some detail representing that holiday or event. During the last week of the year, for example, the palm tree will sport a "Happy New Year" banner, and on Halloween a jack-o'-lantern can be seen in the sand. The screensaver can be manipulated into showing these features by adjusting the computer clock to correspond with the date of the event. The Johnny Castaway screensaver was distributed on a 3½-inch floppy disk and required a computer with a 386SX processor and Windows 3.1 as its operating system. Today, it is widely available on the internet, but as it relies on outdated 16-bit software components, it will only work on older versions of the Microsoft Windows operating system, although workarounds exist for getting the screensaver to run on Windows 64-bit, Mac OS X and Linux. Character design was done by Shawn Bird while he was at Dynamix. The program had been developed at Jeff Tunnell Productions, the eponymous company of the original founder of Dynamix. According to Ken Williams, the screensaver was one of several products by
https://en.wikipedia.org/wiki/Chromosomal%20fragile%20site
A chromosomal fragile site is a specific heritable point on a chromosome that tends to form a gap or constriction and may tend to break when the cell is exposed to partial replication stress. Based on their frequency, fragile sites are classified as "common" or "rare". To date, more than 120 fragile sites have been identified in the human genome. Common fragile sites are considered part of normal chromosome structure and are present in all (or nearly all) individuals in a population. Under normal conditions, most common fragile sites are not prone to spontaneous breaks. Common fragile sites are of interest in cancer studies because they are frequently affected in cancer and they can be found in healthy individuals. Sites FRA3B (harboring the FHIT gene) and FRA16D (harboring the WWOX gene) are two well known examples and have been a major focus of research. Rare fragile sites are found in less than 5% of the population, and are often composed of two- or three-nucleotide repeats. They are often susceptible to spontaneous breakage during replication, frequently affecting neighboring genes. Clinically, the most important rare fragile site is FRAXA in the FMR1 gene, which is associated with the fragile X syndrome, the most common cause of hereditary intellectual disability. For a database of fragile sites in human chromosomes, see Rare fragile sites Classification Rare fragile sites (RFSs) are classified into two sub-groups based on the compounds that elicit breakage: folate-sensitive groups (for examples, see ), and nonfolate-sensitive groups, which are induced by bromodeoxyuridine (BrdU) or distamycin A, an antibiotic that preferentially binds to AT-pairs of DNA. The folate-sensitive group is characterized by an expansion of CGG repeats, while the nonfolate-sensitive group contains many AT-rich minisatellite repeats. Mechanisms of instability The CGG and AT-rich repeats characteristic of RFSs can form hairpins and other non-B DNA structures that block replic
https://en.wikipedia.org/wiki/Selectable%20marker
A selectable marker is a gene introduced into a cell, especially a bacterium or to cells in culture, that confers a trait suitable for artificial selection. They are a type of reporter gene used in laboratory microbiology, molecular biology, and genetic engineering to indicate the success of a transfection or other procedure meant to introduce foreign DNA into a cell. Selectable markers are often antibiotic resistance genes (An antibiotic resistance marker is a gene that produces a protein that provides cells expressing this protein with resistance to an antibiotic.). Bacteria that have been subjected to a procedure to introduce foreign DNA are grown on a medium containing an antibiotic, and those bacterial colonies that can grow have successfully taken up and expressed the introduced genetic material. Normally the genes encoding resistance to antibiotics such as ampicillin, chloramphenicol, tetracycline or kanamycin, etc., are considered useful selectable markers for E. coli. Modus operandi The non-recombinants are separated from recombinants; i.e., a r-DNA is introduced in bacteria, some bacteria are successfully transformed some remain non-transformed. When grown on medium containing ampicillin, bacteria die due to lack of ampicillin resistance. The position is later noted on nitrocellulose paper and separated out to move them to nutrient medium for mass production of required product. An alternative to a selectable marker is a screenable marker which can also be denoted as a reporter gene, which allows the researcher to distinguish between wanted and unwanted cells, e.g. between blue and white colonies. These wanted or unwanted cells are simply un-transformed cells that were unable to take up the gene during the experiment. Positive and Negative For molecular biology research different types of markers may be used based on the selection sought. These include: Positive or selection markers are selectable markers that confer selective advantage to the host organ
https://en.wikipedia.org/wiki/Multiplexed%20Analogue%20Components
Multiplexed Analogue Components (MAC) was an analog television standard where luminance and chrominance components were transmitted separately. This was an evolution from older color TV systems (such as PAL or SECAM) where there was interference between chrominance and luminance. MAC was originally proposed in the 1980s for use on a Europe-wide terrestrial HDTV system. Terrestrial transmission tests were conducted in France, although the system was never used for that purpose. Various variants were developed, collectively known as the "MAC/packet" family. In 1985 MAC was recommended for satellite and cable broadcasts by the European Broadcasting Union (EBU), with specific variants for each medium. C-MAC/packet was intended for Direct Broadcast Satellite (DBS), D-MAC/packet for wide-band cable, and D2-MAC/packet for both for DBS and narrow-band cable. History MAC was originally developed by the Independent Broadcasting Authority in the early 1980, as a system for delivering high quality pictures via direct broadcast satellites, that would be independent of European countries' choice of terrestrial colour-coding standard. In 1982, MAC was adopted as the transmission format for the UK's forthcoming DBS television services, eventually provided by British Satellite Broadcasting. The following year, MAC was adopted by the EBU as the standard for all DBS broadcasts. By 1986, despite there being two variants (D-MAC and D2-MAC) favoured by different countries, an EU Directive imposed MAC on the national DBS broadcasters. The justification was to provide a stepping stone from analogue formats (PAL and SECAM) the future HD and digital television, placing european TV manufacturers in a privileged position to provide the equipment required. However, the Astra satellite system was also starting up at this time (the first satellite, Astra 1A, was launched in 1989), operating outside of the EU's MAC requirements, due to being a non-DBS satellite. Despite further pressure
https://en.wikipedia.org/wiki/Hyperbolic%20group
In group theory, more precisely in geometric group theory, a hyperbolic group, also known as a word hyperbolic group or Gromov hyperbolic group, is a finitely generated group equipped with a word metric satisfying certain properties abstracted from classical hyperbolic geometry. The notion of a hyperbolic group was introduced and developed by . The inspiration came from various existing mathematical theories: hyperbolic geometry but also low-dimensional topology (in particular the results of Max Dehn concerning the fundamental group of a hyperbolic Riemann surface, and more complex phenomena in three-dimensional topology), and combinatorial group theory. In a very influential (over 1000 citations ) chapter from 1987, Gromov proposed a wide-ranging research program. Ideas and foundational material in the theory of hyperbolic groups also stem from the work of George Mostow, William Thurston, James W. Cannon, Eliyahu Rips, and many others. Definition Let be a finitely generated group, and be its Cayley graph with respect to some finite set of generators. The set is endowed with its graph metric (in which edges are of length one and the distance between two vertices is the minimal number of edges in a path connecting them) which turns it into a length space. The group is then said to be hyperbolic if is a hyperbolic space in the sense of Gromov. Shortly, this means that there exists a such that any geodesic triangle in is -thin, as illustrated in the figure on the right (the space is then said to be -hyperbolic). A priori this definition depends on the choice of a finite generating set . That this is not the case follows from the two following facts: the Cayley graphs corresponding to two finite generating sets are always quasi-isometric one to the other; any geodesic space which is quasi-isometric to a geodesic Gromov-hyperbolic space is itself Gromov-hyperbolic. Thus we can legitimately speak of a finitely generated group being hyperbolic without refer
https://en.wikipedia.org/wiki/Sonochemistry
In chemistry, the study of sonochemistry is concerned with understanding the effect of ultrasound in forming acoustic cavitation in liquids, resulting in the initiation or enhancement of the chemical activity in the solution. Therefore, the chemical effects of ultrasound do not come from a direct interaction of the ultrasonic sound wave with the molecules in the solution. History The influence of sonic waves travelling through liquids was first reported by Robert Williams Wood (1868–1955) and Alfred Lee Loomis (1887–1975) in 1927. The experiment was about the frequency of the energy that it took for sonic waves to "penetrate" the barrier of water. He came to the conclusion that sound does travel faster in water, but because of the water's density compared to earth's atmosphere it was incredibly hard to get the sonic waves to couple their energy into the water. Due to the sudden density change, much of the energy is lost, similar to shining a flashlight towards a piece of glass; some of the light is transmitted into the glass, but much of it is lost to reflection outwards. Similarly with an air-water interface, almost all of the sound is reflected off the water, instead of being transmitted into it. After much research they decided that the best way to disperse sound into the water was to create bubbles at the same time as the sound. Another issue was the ratio of the amount of time it took for the lower frequency waves to penetrate the bubbles walls and access the water around the bubble, compared to the time from that point to the point on the other end of the body of water. But despite the revolutionary ideas of this article it was left mostly unnoticed. Sonochemistry experienced a renaissance in the 1980s with the advent of inexpensive and reliable generators of high-intensity ultrasound, most based around piezoelectric elements. Physical principles Sound waves propagating through a liquid at ultrasonic frequencies have wavelengths many times longer than the
https://en.wikipedia.org/wiki/Chlortoluron
Chlortoluron or chlorotoluron are the common names for an organic compound of the phenylurea class of herbicides used to control broadleaf and annual grass weeds in cereal crops. History In 1952, chemists at E. I. du Pont de Nemours and Company patented a series of aryl urea derivatives as herbicides. Several compounds covered by this patent were commercialized as herbicides: monuron (4-chlorophenyl), diuron (3,4-dichlorophenyl) and chlortoluron, the 3-chloro-4-methylphenyl example. Subsequently, over thirty related urea analogs with the same mechanism of action reached the market worldwide. Synthesis As described in the du Pont patent, the starting material is a substituted aryl amine, an aniline, which is treated with phosgene to form its isocyanate derivative. This is subsequently reacted with dimethylamine to give the final product. Aryl-NH2 + COCl2 → Aryl-NCO Aryl-NCO + NH(CH3)2 → Aryl-NHCON(CH3)2 Mechanism of action The phenylurea class of herbicides including chlortoluron are inhibitors of photosynthesis. They block the QB plastoquinone binding site of photosystem II, preventing electron flow from QA to QB. This interrupts the photosynthetic electron transport chain and kills the plant. Usage Chlortoluron was first licensed for use in the European Union in 1994 and this has been extended, currently until October 2021. It is now mainly used in mixture with other herbicides including diflufenican and pendimethalin. It can be used to control broadleaf weeds and grasses including Alopecurus myosuroides, Anthemis arvensis, Atriplex prostrata, Calendula spp., Convolvulaceae spp., Galeopsis spp., Lamium spp., Papaver rhoeas, Paspalum distichum, Poa annua, Solanaceae spp., Stellaria media and Veronica spp. It is mainly used in cereal crops including wheat and barley.
https://en.wikipedia.org/wiki/Average%20propensity%20to%20consume
Average propensity to consume (APC) (as well as the marginal propensity to consume) is a concept developed by John Maynard Keynes to analyze the consumption function, which is a formula where total consumption expenditures (C) of a household consist of autonomous consumption (Ca) and income (Y) (or disposable income (Yd)) multiplied by marginal propensity to consume (c1 or MPC). According to Keynes, the individual's real income determines saving and consumption decisions. Consumption function: The average propensity to consume is referred to as the percentage of income spent on goods and services. It is the proportion of income that is consumed and it is calculated by dividing total consumption expenditure (C) by total income (Y): It can be also explained as spending on every monetary unit of income. Moreover, Keynes's theory claims that wealthier people spend less of their income on consumption than less wealthy people. This is caused by autonomous consumption as everyone needs to eat and get dressed, so they buy a certain amount of food and clothes or pay rent, they all spend some amount of money on these necessities. So the ratio is falling with higher income and wealth. This is why it seems like the poor consume more than the rich. But they only need to spent larger amount of their income on consumption because they have less money available. Average propensity to consume is not as significant as the marginal propensity to consume (MPC) which represents an additional change in consumer spending as a result of an additional change in household income per monetary unit and it is calculated as derivative of consumption function with respect to income (ratio of change in consumption to change in income). It is used for calculating multiplier in aggregate expenditures model. Characteristics of APC Average propensity to consume is decreasing Since autonomous consumption in positive (Ca>0), the ratio of APC falls with increase in disposable income because w
https://en.wikipedia.org/wiki/SUBST
In computing, SUBST is a command on the DOS, IBM OS/2, Microsoft Windows and ReactOS operating systems used for substituting paths on physical and logical drives as virtual drives. Overview In MS-DOS, the SUBST command was added with the release of MS-DOS 3.1. The command is similar to floating drives, a more general concept in operating systems of Digital Research origin, including CP/M-86 2.x, Personal CP/M-86 2.x, Concurrent DOS, Multiuser DOS, System Manager 7, REAL/32, as well as DOS Plus and DR DOS (up to 6.0). DR DOS 6.0 includes an implementation of the command. The command is also available in FreeDOS and PTS-DOS. The Windows SUBST command is available in supported versions of the command line interpreter cmd.exe. In Windows NT, SUBST uses DefineDosDevice() to create the disk mappings. The JOIN command is the "opposite" of SUBST, because JOIN will take a drive letter and make it appear as a directory. Some versions of MS-DOS COMMAND.COM support the undocumented internal TRUENAME command which can display the "true name" of a file, i.e. the fully qualified name with drive, path, and extension, which is found possibly by name only via the PATH environment variable, or through SUBST, JOIN and ASSIGN filesystem mappings. Syntax This is the command syntax in Windows XP to associate a path with a drive letter: SUBST [drive1: [drive2:]path] SUBST drive1: /D Parameters drive1: – Specify a virtual drive to which to assign a path. [drive2:]path – Specify a physical drive and path to assign to a virtual drive. /D – Delete a substituted (virtual) drive. Examples Mapping a drive This means that, for example, to map C:'s root to X:, the following command would be used at the command-line interface: C:\>SUBST X: C:\ Upon doing this, a new drive called X: would appear under the My Computer virtual folder in Windows Explorer. Unmapping a drive To unmap drive X: again, the following command needs to by typed at the command prompt: C:\>SUBST X: /D Custom labe
https://en.wikipedia.org/wiki/Tairus
Tairus (, a portmanteau of Тайско (Thai) and Русский (Russian)) is a synthetic gemstone manufacturer. It was formed in 1989 as part of Mikhail Gorbachev's perestroika initiative to establish a joint venture between the Russian Academy of Sciences and Tairus Created Gems Co Ltd. of Bangkok, Thailand. Today Tairus is a major supplier of hydrothermally grown gemstones to the jewellery industry. Later, Tairus became a privately held enterprise, operating out of its Bangkok distribution hub under the trade name Tairus, owned by Tairus Created Gems Co Ltd. of Bangkok, Thailand. In the beginning, the team was led by the scientist and developer of the hydrothermal process, the late Alexander Lebedev, whose name was kept secret by the Soviet regime for many years, and Walter Barshai, who was appointed to be the Chairman of the Board of the Joint Venture Tairus. Their objective was to grow and to supply emeralds, rubies, sapphires, alexandrite and other gems to the jewelry industry. The driving force was late Academician Nikolai Dobretsov, former President of the Siberian Branch of the Russian Academy of Sciences. Tairus has achieved many scientific breakthroughs. For example, the development of the hydrothermally grown corundum, aquamarine and the development of a revolutionary process of horizontal crystallization for growing corundum (ruby), chrysoberyl and alexandrite. After many years of development, scientists at Tairus had succeeded to commercially grow emeralds in a laboratory environment that resemble in color and have gemological properties that “overlap natural emeralds from various localities, especially those of low alkali-bearing stones from Colombia” (The Journal of Gemmology, 2006, Vol. 30, Nos 1/2, 59-74). Products The following are synthetic gemstones that were developed by Tairus scientists; they are alternately referred to as Tairus stones (e.g. "Tairus Ruby"). Floating zone ruby, synthesized in 1991 (no longer in production) Hydrothermal ruby, synthe
https://en.wikipedia.org/wiki/Dukes%27%20disease
Dukes' disease, named after Clement Dukes, also known as fourth disease or Filatov-Dukes' disease (after Nil Filatov), is an exanthem. It is distinguished from measles or forms of rubella, though it was considered as a form of viral rash. Although Dukes identified it as a separate entity, it is thought not to be different from scarlet fever caused by exotoxin-producing Streptococcus pyogenes after Keith Powell proposed equating it with the condition currently known as staphylococcal scalded skin syndrome in 1979. It was never associated with a specific pathogen, and the terminology is no longer in use. However, a mysterious rash of unknown cause in school children often gives rise to the question of whether it could be Dukes' disease. Signs and symptoms Signs and symptoms may include fever, nausea, vomiting, and diarrhea, along with typical viral symptoms of sensitivity to light, enlarged lymph nodes, sore throat, and possibly brain inflammation. The rash may appear at any time during the illness. It is usually generalised. The rash consists of erythematous maculopapules with areas of confluence. They may be urticarial, vesicular, or sometimes petechial. The palms and soles may be involved. The eruptions are more common in children than in adults. Usually, the rash fades without pigmentation or scaling. Diagnosis
https://en.wikipedia.org/wiki/LANtastic
LANtastic is a peer-to-peer local area network (LAN) operating system for DOS and Microsoft Windows (and formerly OS/2). The New York Times described the network, which permits machines to function both as servers and as workstations, as allowing computers, "to share printers and other devices." InformationWeek pointed out that "these peer-to-peer networking solutions, such as Webcorp's Web and Artisoft's LANtastic, definitely aren't powerful, but they can act as 'starter' local area networks" yet added that even Fortune-sized companies find them useful. LANtastic supports Ethernet, ARCNET and Token Ring adapters as well as its original twisted-pair adapter at . Overview Lantastic networks use NetBIOS. Its multi-platform support allows a LANtastic client station to access any combination of Windows or DOS operating systems, and its interconnectivity allows sharing of files, printers, CD-ROMs and applications throughout an enterprise. LANtastic was especially popular before Windows 95 arrived with built-in networking and was nearly as popular as the market leader Novell at the time. The New York Times described the network, which permits machines to function both as servers and as workstations, as allowing computers "to share printers and other devices. History LANtastic was originally developed by Artisoft, Inc. in Tucson, Arizona, the first company to offer peer-to-peer networking. Several foreign-language versions were released in 1992. By mid 1994, Microsoft's Windows for Workgroups was "eating into" LANtastic's lead (as was Novell). Artisoft bought TeleVantage, and renamed the latter Artisoft TeleVantage. Artisoft subsequently bought Vertical Communications (September, 2004), and renamed itself (January, 2005) to be Vertical Communications. Following the release of TeleVantage, Lantastic and Artisoft's other legacy products were acquired by SpartaCom Technologies in 2000. SpartaCom was later acquired by PC Micro. LANtastic 8.01 was released in 2006.
https://en.wikipedia.org/wiki/Lawrence%20Paulson
Lawrence Charles Paulson (born 1955) is an American computer scientist. He is a Professor of Computational Logic at the University of Cambridge Computer Laboratory and a Fellow of Clare College, Cambridge. Education Paulson graduated from the California Institute of Technology in 1977, and obtained his PhD in Computer Science from Stanford University in 1981 for research on programming languages and compiler-compilers supervised by John L. Hennessy. Research Paulson came to the University of Cambridge in 1983 and became a Fellow of Clare College, Cambridge in 1987. He is best known for the cornerstone text on the programming language ML, ML for the Working Programmer. His research is based around the interactive theorem prover Isabelle, which he introduced in 1986. He has worked on the verification of cryptographic protocols using inductive definitions, and he has also formalised the constructible universe of Kurt Gödel. Recently he has built a new theorem prover, MetiTarski, for real-valued special functions. Paulson teaches an undergraduate lecture course in the Computer Science Tripos, entitled Logic and Proof which covers automated theorem proving and related methods. (He used to teach Foundations of Computer Science which introduces functional programming, but this course was taken over by Alan Mycroft and Amanda Prorok in 2017, and then Anil Madhavapeddy and Amanda Prorok in 2019.) Awards and honours Paulson was elected a Fellow of the Royal Society (FRS) in 2017, a Fellow of the Association for Computing Machinery in 2008 and a Distinguished Affiliated Professor for Logic in Informatics at the Technical University of Munich. Personal life Paulson has two children by his first wife, Dr Susan Mary Paulson, who died in 2010. Since 2012, he has been married to Dr Elena Tchougounova.
https://en.wikipedia.org/wiki/Abnormal%20basal%20metabolic%20rate
Abnormal basal metabolic rate refers to a high or low basal metabolic rate (BMR). It has numerous causes, both physiological (part of the body's normal function) and pathological (associated with disease). Causes Physiological An abnormal basal metabolic rate is not necessarily indicative of disease; a number of physiological factors can alter the BMR by influencing cellular metabolic activity. For instance, males are more likely than females to have a high BMR, and in women, the BMR may rise to abnormal levels during pregnancy or lactation. An individual's BMR varies greatly with age: infants and children typically have a high BMR, required for growth, while the elderly have a low BMR. Tall, thin people have a higher BMR than their shorter counterparts, even with the same weight, due to the greater surface area of their skin. The metabolic rate also decreases during sleep and increases in exercise, and individuals who exercise regularly have a higher BMR than those who are sedentary. Environmental temperature also has an effect: the BMR is increased in both heat and cold. Pathological A common pathological cause for a high BMR is fever, since a rise in body temperature increases the rate of cellular metabolic reactions. It is estimated that for every degree Fahrenheit of rise in body temperature, the BMR increases by 7 percent. Thyroid disease also has a marked effect on BMR, since thyroid hormones regulate the rate of cellular metabolism. Hyperthyroidism—in which there is an increase in the production of thyroid hormones—leads to a high BMR, while hypothyroidism—in which thyroid hormones are depleted—causes a low BMR. Prolonged periods of abnormal nutrition cause an adaptive change in BMR; this helps the body to maintain a stable body weight in response to the change in food supply. In prolonged malnutrition, the BMR declines, while in prolonged overnutrition, the BMR is increased. Cancer sometimes causes an increase in BMR, perhaps because the cancer cells t
https://en.wikipedia.org/wiki/Sony%20BMG%20copy%20protection%20rootkit%20scandal
The Sony BMG CD copy protection scandal concerns the copy protection measures included by Sony BMG on compact discs in 2005. When inserted into a computer, the CDs installed one of two pieces of software that provided a form of digital rights management (DRM) by modifying the operating system to interfere with CD copying. Neither program could easily be uninstalled, and they created vulnerabilities that were exploited by unrelated malware. One of the programs would install and "phone home" with reports on the user's private listening habits, even if the user refused its end-user license agreement (EULA), while the other was not mentioned in the EULA at all. Both programs contained code from several pieces of copylefted free software in an apparent infringement of copyright, and configured the operating system to hide the software's existence, leading to both programs being classified as rootkits. Sony BMG initially denied that the rootkits were harmful. It then released an uninstaller for one of the programs that merely made the program's files visible while also installing additional software that could not be easily removed, collected an email address from the user and introduced further security vulnerabilities. Following public outcry, government investigations and class-action lawsuits in 2005 and 2006, Sony BMG partially addressed the scandal with consumer settlements, a recall of about 10% of the affected CDs and the suspension of CD copy-protection efforts in early 2007. Background In August 2000, statements by Sony Pictures Entertainment U.S. senior vice president Steve Heckler foreshadowed the events of late 2005. Heckler told attendees at the Americas Conference on Information Systems: "The industry will take whatever steps it needs to protect itself and protect its revenue streams ... It will not lose that revenue stream, no matter what ... Sony is going to take aggressive steps to stop this. We will develop technology that transcends the individual u
https://en.wikipedia.org/wiki/Linear%20integrated%20circuit
A linear integrated circuit or analog chip is a set of miniature electronic analog circuits formed on a single piece of semiconductor material. Description The voltage and current at specified points in the circuits of analog chips vary continuously over time. In contrast, digital chips only assign meaning to voltages or currents at discrete levels. In addition to transistors, analog chips often include a larger number of passive elements (capacitors, resistors, and inductors) than digital chips. Inductors tend to be avoided because of their large physical size, and difficulties incorporating them into monolithic semiconductor ICs. Certain circuits such as gyrators can often act as equivalents of inductors, while constructed only from transistors and capacitors. Analog chips may also contain digital logic elements to replace some analog functions, or to allow the chip to communicate with a microprocessor. For this reason, and since logic is commonly implemented using CMOS technology, these chips typically use BiCMOS processes, as implemented by companies such as Freescale, Texas Instruments, STMicroelectronics, and others. This is known as "mixed signal processing", and allows a designer to incorporate more functions into a single chip. Some of the benefits of this mixed technology include load protection, reduced parts count, and higher reliability. Purely analog chips in information processing have been mostly replaced with digital chips. Analog chips are still required for wideband signals, high-power applications, and transducer interfaces. Research and industry in this specialty continues to grow and prosper. Some examples of long-lived and well-known analog chips are the 741 operational amplifier, and the 555 timer IC. Power supply chips are also considered to be analog chips. Their main purpose is to produce a well-regulated output voltage supply for other chips in the system. Since all electronic systems require electrical power, power supply ICs (power
https://en.wikipedia.org/wiki/Message%20Handling%20System
Message Handling System (MHS) is an important early email protocol developed by Action Technologies, Inc. (ATI) in 1986. Novell licensed it in 1988 then later bought it. Email clients A wide variety of email clients used MHS, including: Para-Mail - Paradox Development introduced version 2.0 along with Novell at Comdex 1986. DaVinci Email - The first Microsoft Windows-based email client used MHS natively. Pegasus Mail - A free mail client, this used MHS its native protocol. ExpressIT! and ExpressIT! 2000 - Infinite Technologies' MHS compliant email clients. FirstMail - A cut-down version of Pegasus Mail, bundled with some versions of NetWare. Futurus TEAM - Early groupware package offering an MHS compliant email client. MacAccess - An Apple Macintosh MHS-based email client. Role as a gateway MHS was a very 'open' system, and this, with Novell's encouragement, made it popular in the early 1990s as a 'glue' between not only the proprietary email systems of the day such as PROFS, SNADS, MCI, 3+Mail, cc:Mail, Para-Mail and Microsoft Mail, but also the competing standards-based SMTP and X.400. However, by 1996 it was very clear that SMTP over the Internet would take over this role. Work-alike products A compatible family of products from Infinite Technologies (now Captaris) and marketed under the name Connect2 were also very widely used as part of MHS-based email networks. Decline Novell became increasingly less supportive after their 1994 purchase of WordPerfect as they worked to transform WordPerfect Office into GroupWise. At about the same time, confidence in the future of X.400 collapsed and SMTP email across the public internet became the compelling choice for mail between unrelated organisations, replacing MHS's former "glue" role.
https://en.wikipedia.org/wiki/Generalist%20and%20specialist%20species
A generalist species is able to thrive in a wide variety of environmental conditions and can make use of a variety of different resources (for example, a heterotroph with a varied diet). A specialist species can thrive only in a narrow range of environmental conditions or has a limited diet. Most organisms do not all fit neatly into either group, however. Some species are highly specialized (the most extreme case being monophagous, eating one specific type of food), others less so, and some can tolerate many different environments. In other words, there is a continuum from highly specialized to broadly generalist species. Description Omnivores are usually generalists. Herbivores are often specialists, but those that eat a variety of plants may be considered generalists. A well-known example of a specialist animal is the monophagous koala, which subsists almost entirely on eucalyptus leaves. The raccoon is a generalist, because it has a natural range that includes most of North and Central America, and it is omnivorous, eating berries, insects such as butterflies, eggs, and various small animals. The distinction between generalists and specialists is not limited to animals. For example, some plants require a narrow range of temperatures, soil conditions and precipitation to survive while others can tolerate a broader range of conditions. A cactus could be considered a specialist species. It will die during winters at high latitudes or if it receives too much water. When body weight is controlled for, specialist feeders such as insectivores and frugivores have larger home ranges than generalists like some folivores (leaf-eaters), whose food-source is less abundant; they need a bigger area for foraging. An example comes from the research of Tim Clutton-Brock, who found that the black-and-white colobus, a folivore generalist, needs a home range of only 15 ha. On the other hand, the more specialized red colobus monkey has a home range of 70 ha, which it requires to
https://en.wikipedia.org/wiki/Phosphorene
Phosphorene is a two-dimensional material consisting of phosphorus. It consists of a single layer of black phosphorus, the most stable allotrope of phosphorus. Phosphorene is analogous to graphene (single layer graphite). Among two-dimensional materials, phosphorene is a competitor to graphene because it has a nonzero fundamental band gap that can be modulated by strain and the number of layers in a stack. Phosphorene was first isolated in 2014 by mechanical exfoliation. Liquid exfoliation is a promising method for scalable phosphorene production. History In 1914 black phosphorus, a layered, semiconducting allotrope of phosphorus, was synthesized. This allotrope exhibits high carrier mobility. In 2014, several groups isolated single-layer phosphorene, a monolayer of black phosphorus. It attracted renewed attention because of its potential in optoelectronics and electronics due to its band gap, which can be tuned via modifying its thickness, anisotropic photoelectronic properties and carrier mobility. Phosphorene was initially prepared using mechanical cleavage, a commonly used technique in graphene production. In 2023, alloys of arsenic-phosporene displayed higher hole mobility than pure phosphorene and were also magnetic. Synthesis Synthesis of phosphorene is a significant challenge. Currently, there are two main ways of phosphorene production: scotch-tape-based microcleavage and liquid exfoliation, while several other methods are being developed as well. Phosphorene production from plasma etching has also been reported. In scotch-tape-based microcleavage, phosphorene is mechanically exfoliated from a bulk of black phosphorus crystal using scotch-tape. Phosphorene is then transferred on a Si/SiO2 substrate, where it is then cleaned with acetone, isopropyl alcohol and methanol to remove any scotch tape residue. The sample is then heated to 180 °C to remove solvent residue. In the liquid exfoliation method, first reported by Brent et al. in 2014 and modified
https://en.wikipedia.org/wiki/Slingbox
The Slingbox was a TV streaming media device made by Sling Media that encoded local video for transmission over the Internet to a remote device (sometimes called placeshifting). It allowed users to remotely view and control their cable, satellite, or digital video recorder (DVR) system at home from a remote Internet-connected personal computer, smartphone, or tablet as if they were at home. On November 9, 2020, Sling Media announced that all Slingboxes had been discontinued, and that the Slingbox servers would close on November 9, 2022, making all devices "inoperable". History The Slingbox was first developed in 2002 by two Californian brothers, Blake and Jason Krikorian, who were avid sports fans. They supported the San Francisco Giants, a Major League Baseball team whose games were broadcast regularly by their local TV station. However, when travelling away from their home state, they found they were unable to watch their favorite team because their games were not carried by television stations in other parts of the United States and could not be found for free online. The first edition of the Slingbox came to market in late 2005. Future Slingbox hardware is getting a second life thanks to the Open source Slinger project, written in Python. Technology Hardware The traditional Slingbox embeds a video encoding chip to do real-time encoding of a video and audio stream into the SMPTE 421M / VC-1 format that can be transmitted over the Internet via the ASF streaming format. Later Slingboxes also support Apple's HTTP Live Streaming, which requires support for H.264. The Slingboxes up until the Fourth Generation (or Next Generation Slingbox) used a Texas Instruments chipset. Current generation Slingboxes and OEM products are built around a ViXS chipset. Control of the hosting video device, usually a set top box, is done through an IR blaster, which, on older Slingboxes, required the use of an IR blaster dongle. Current generation Slingboxes have built in IR blaste
https://en.wikipedia.org/wiki/Domination%20analysis
Domination analysis of an approximation algorithm is a way to estimate its performance, introduced by Glover and Punnen in 1997. Unlike the classical approximation ratio analysis, which compares the numerical quality of a calculated solution with that of an optimal solution, domination analysis involves examining the rank of the calculated solution in the sorted order of all possible solutions. In this style of analysis, an algorithm is said to have dominance number or domination number K, if there exists a subset of K different solutions to the problem among which the algorithm's output is the best. Domination analysis can also be expressed using a domination ratio, which is the fraction of the solution space that is no better than the given solution; this number always lies within the interval [0,1], with larger numbers indicating better solutions. Domination analysis is most commonly applied to problems for which the total number of possible solutions is known and for which exact solution is difficult. For instance, in the Traveling salesman problem, there are (n-1)! possible solutions for a problem instance with n cities. If an algorithm can be shown to have dominance number close to (n-1)!, or equivalently to have domination ratio close to 1, then it can be taken as preferable to an algorithm with lower dominance number. If it is possible to efficiently find random samples of a problem's solution space, as it is in the Traveling salesman problem, then it is straightforward for a randomized algorithm to find a solution that with high probability has high domination ratio: simply construct a set of samples and select the best solution from among them. (See, e.g., Orlin and Sharma.) The dominance number described here should not be confused with the domination number of a graph, which refers to the number of vertices in the smallest dominating set of the graph. Recently, a growing number of articles in which domination analysis has been applied to assess the
https://en.wikipedia.org/wiki/Delayed%20milestone
A delayed milestone, which is also known as a developmental delay, refers to a situation where a child does not reach a particular developmental milestone at the expected age. Developmental milestones refer to a collection of indicators that a child is anticipated to reach as they grow older. Each age group has its distinct set of milestones, representing behaviors that develop gradually and serve as foundational building blocks for growth and ongoing learning. These behavioral milestones fall into various categories of child development stages, including: Adaptive skills: Activities of daily living, such as putting on clothes, eating, and washing independently. Cognition and intellect: Involves thinking, solving problems, making judgements and comprehension. Emotional expression: Includes facial movements, such as a smile when happy, or an action, such as giving a gift to express gratitude Language: Being able to communicate verbally with speech and/or nonverbally with gesture Motor coordination: Encompasses both gross and fine motor skills, such as jumping and drawing. Sensory: Vision, hearing, touch, taste, smell Social interaction: Involves the ability to initiate contact with peers and engage in group play. Epidemiology Developmental delay is prevalent in approximately 1-3% of children under the age of 5 worldwide. According to a systematic analysis done for a conducted study in 2016, there are approximately 52.9 million children worldwide under the age of 5 that are affected by some type of developmental delay or delayed milestone. For example, the prevalence of autism spectrum disorders was estimated to be 2.64%. 95% of the children with these delayed milestones live in countries with low to middle income and have very limited availability of healthcare resources. There is a risk of having a delayed milestone if a child live in an under-resourced nation. Causes Delayed milestones can manifest as early as infancy and develop later in early school
https://en.wikipedia.org/wiki/Service%20Advertising%20Protocol
The Service Advertising Protocol (SAP) is included in the Internetwork Packet Exchange (IPX) protocol. SAP makes the process of adding and removing services on an IPX internetwork dynamic. SAP was maintained by Novell. As servers are booted up, they may advertise their services using SAP; when they are brought down, they use SAP to indicate that their services will no longer be available. IPX network servers may use SAP to identify themselves by name and service type. All entities that use SAP must broadcast a name and Service Type that (together) are unique throughout the entire IPX internetwork. This policy is enforced by system administrators and application developers. SAP Service Types Further reading Novell NetWare Network protocols
https://en.wikipedia.org/wiki/IBM%20LU6.2
Logical Unit 6.2 is an IBM-originated communications protocol specification dating from 1974, and is part of IBM's Systems Network Architecture (SNA). A device-independent SNA protocol, it is used for peer-to-peer communications between two systems, for example, between a computer and a device (e.g. terminal or printer), or between computers. LU6.2 is used by many of IBM's products, including Common Programming Interface for Communications Intersystem Communications (CICS ISC), and Information Management System, and also many non-IBM products. In 1986, Bruce Compton, Manager of Office Systems and Technology with General Electric, said: LU 6.2 means I don't have to write the software communications interfaces. If I have one office server in a DEC environment, and another in a Wang environment… I can use the LU 6.2 standard to pass files between those devices, and I don't have to worry about things like block checking and clock. Some examples of non-IBM products which implemented the SNA stack including LU6.2 are: Microsoft Host Integration Server, and NetWare for SAA. APPC is a protocol used with LU6.2 architecture. APPC is often used to refer to the LU6.2 architecture or to specific LU6.2 features. LU6.2-compliant devices operate as peers within the network and can perform multiple simultaneous transactions over the network. LU6.2 devices can also detect and correct errors. The LU6.2 definition provides a common API for communicating with and controlling compliant devices. Although the concepts were the same on all platforms, the actual API implementation often varied on each IBM platform which implemented it. Other vendors also implemented LU6.2 in their own products and with their own APIs. IBM later defined the Common Programming Interface for Communications (CPIC) API which would eventually become widely implemented. CPIC allowed for the authoring of multi-platform code. Adoption was slow but steady. As of November 1987, of 207 large US companies interviewe
https://en.wikipedia.org/wiki/Bredt%27s%20rule
In organic chemistry, Bredt's rule is an empirical observation that states that a double bond cannot be placed at the bridgehead of a bridged ring system, unless the rings are large enough. The rule is named after Julius Bredt, who first discussed it in 1902 and codified it in 1924. It primarily relates to bridgeheads with carbon-carbon and carbon-nitrogen double bonds. For example, two of the following isomers of norbornene violate Bredt's rule, which makes them too unstable to prepare: In the figure, the bridgehead atoms involved in Bredt's rule violation are highlighted in red. Bredt's rule is a consequence of the fact that having a double bond on a bridgehead, carbons from which three bonds radiate and which the rings share a single covalent bond, would be equivalent to having a trans double bond on a ring, which is not stable for small rings (fewer than eight atoms) due to a combination of ring strain, and angle strain (nonplanar alkene). The p orbitals of the bridgehead atom and adjacent atoms are orthogonal and thus are not aligned properly for the formation of pi bonds. Fawcett quantified the rule by defining S as the number of non-bridgehead atoms in a ring system, and postulated that stability required S ≥ 9 in bicyclic systems and S ≥ 11 in tricyclic systems. There has been an active research program to seek compounds inconsistent with the rule, and for bicyclic systems a limit of S ≥ 7 is now established with several such compounds having been prepared. The above norbornene system has S = 5 and so they are not preparable. Bredt's rule can be useful for predicting which isomer is obtained from an elimination reaction in a bridged ring system. It can also be applied to reaction mechanisms that go via carbocations and, to a lesser degree, via free radicals, because these intermediates, like carbon atoms involved in a double bond, prefer to have a planar geometry with 120 degree angles and sp2 hybridization. The rule also allows the rationalisation
https://en.wikipedia.org/wiki/Diaper%20Genie
Diaper Genie is a baby diaper disposal system. It consists of a large plastic container with a plastic lid. The system seals diapers individually in a scented film to protect against germs and odors. By opening the lid on the top of the canister, a soiled diaper may be inserted into the "mouth" of the container. After inserting the diaper, the lid is replaced and twisted three full rotations to seal the diaper inside. When the container is filled with dirty diapers, it can be emptied by unlatching the bottom of the canister, where the diapers fall out still individually sealed. The resulting string of sealed diapers is colloquially known as a "diaper sausage". The product was initially a creation of British inventors (currently marketed under the name "Sangenic" by Mayborn in the UK), and was brought to prominence in the US in the mid-1990s. Diaper Genie is a brand of Playtex Products, Inc., which bought the Diaper Genie business from Mondial Industries L.P. in 1999.
https://en.wikipedia.org/wiki/Conjugate%20variables%20%28thermodynamics%29
In thermodynamics, the internal energy of a system is expressed in terms of pairs of conjugate variables such as temperature and entropy, pressure and volume, or chemical potential and particle number. In fact, all thermodynamic potentials are expressed in terms of conjugate pairs. The product of two quantities that are conjugate has units of energy or sometimes power. For a mechanical system, a small increment of energy is the product of a force times a small displacement. A similar situation exists in thermodynamics. An increment in the energy of a thermodynamic system can be expressed as the sum of the products of certain generalized "forces" that, when unbalanced, cause certain generalized "displacements", and the product of the two is the energy transferred as a result. These forces and their associated displacements are called conjugate variables. The thermodynamic force is always an intensive variable and the displacement is always an extensive variable, yielding an extensive energy transfer. The intensive (force) variable is the derivative of the internal energy with respect to the extensive (displacement) variable, while all other extensive variables are held constant. The thermodynamic square can be used as a tool to recall and derive some of the thermodynamic potentials based on conjugate variables. In the above description, the product of two conjugate variables yields an energy. In other words, the conjugate pairs are conjugate with respect to energy. In general, conjugate pairs can be defined with respect to any thermodynamic state function. Conjugate pairs with respect to entropy are often used, in which the product of the conjugate pairs yields an entropy. Such conjugate pairs are particularly useful in the analysis of irreversible processes, as exemplified in the derivation of the Onsager reciprocal relations. Overview Just as a small increment of energy in a mechanical system is the product of a force times a small displacement, so an incremen
https://en.wikipedia.org/wiki/6b/8b%20encoding
In telecommunications, 6b/8b is a line code that expands 6-bit codes to 8-bit symbols for the purposes of maintaining DC-balance in a communications system. The 6b/8b encoding is a balanced code -- each 8-bit output symbol contains 4 zero bits and 4 one bits. So the code can, like a parity bit, detect all single-bit errors. The number of 8-bit patterns with 4 bits set is the binomial coefficient = 70. Further excluding the patterns 11110000 and 00001111, this allows 68 coded patterns: 64 data codes, plus 4 additional control codes. Coding rules The 64 possible 6-bit input codes can be classified according to their disparity, the number of 1 bits minus the number of 0 bits: The 6-bit input codes are mapped to 8-bit output symbols as follows: The 20 6-bit codes with disparity 0 are prefixed with 10Example: 000111 → 10000111Example: 101010 → 10101010 The 15 6-bit codes with disparity +2, other than 001111, are prefixed with 00Example: 010111 → 00010111 The 15 6-bit codes with disparity −2, other than 110000, are prefixed with 11Example: 101000 → 11101000 The remaining 20 codes: 12 with disparity ±4, 2 with disparity ±6, 001111, 110000, and the 4 control codes, are assigned to codes beginning with 01 as follows: No data symbol contains more than four consecutive matching bits, and because the patterns 11110000 and 00001111 are excluded, no data symbol begins or ends with more than three identical bits. Thus, the longest run of identical bits that will be produced is 6. (I.e. this is a (0,5) RLL code, with a worst-case running disparity of +3 to −3.) Any occurrence of 6 consecutive identical bits constitutes a comma sequence or sync mark or syncword; it identifies the symbol boundaries precisely. Those 6 bits straddle the inter-symbol boundary with exactly 3 of those identical bits at the end of one symbol, and 3 of those identical bits at the start of the following next symbol. See also 8b/10b encoding, another fixed-table system with a higher code rat
https://en.wikipedia.org/wiki/Tartar%20Guided%20Missile%20Fire%20Control%20System
The Tartar Guided Missile Fire Control System is an air defense system developed by the United States Navy to defend warships from air attack. Since its introduction the system has been improved and sold to several United States allies. Description The Tartar Guided Missile Fire Control System is a component of the overall Tartar Weapons System. It consists of the target illuminators and associated computer systems needed to fire a missile once a target has been identified. It operates in conjunction with the weapon direction systems (WDS), the ship's long-range air search radars, and the guided missile launch system (GMLS) to engage air targets. The Tartar FCS receives target designation information from the WDS. The system then acquires and tracks the target, positions the missile launcher, programs the missile with intercept data, and lets the WDS know that it is ready to fire. Once the missile is fired, the FCS provides CW illumination of the target and postfiring evaluation. There are two major families of Tartar FCS: the Mk. 74 and the Mk. 92. The latter is used on the and the former is used everywhere else. Each Mk 74 includes the AN/SPG-51, a director Mk 73, a computer system, and associated consoles. The Mk. 92 contains a combined antenna system (CAS), a separate track illumination radar (STIR), weapon control consoles, a computer complex, and ancillary equipment. Deployment It was installed on numerous US cruiser and destroyers in the 1960s through early 1990s such as the s, s, s and the s. It is also in use in other countries such as the fleet escorts of the French Navy Kersaint, Bouvet, Du Chayla and Dupetit-Thouars, and was also in use on and . RIM-66B Standard Starting in the middle 1960s a new family of guided missiles referred to as the Standard missiles were developed to replace the poor performing missiles used by existing fire control systems. The RIM-66A/B Standard replaced the earlier RIM-24C Tartar used by the system. The new missile m
https://en.wikipedia.org/wiki/Tethering
Tethering or phone-as-modem (PAM) is the sharing of a mobile device's Internet connection with other connected computers. Connection of a mobile device with other devices can be done over wireless LAN (Wi-Fi), over Bluetooth or by physical connection using a cable, for example through USB. If tethering is done over WLAN, the feature may be branded as a personal hotspot or mobile hotspot, which allows the device to serve as a portable router. Mobile hotspots may be protected by a PIN or password. The Internet-connected mobile device can act as a portable wireless access point and router for devices connected to it. Mobile device's OS support Many mobile devices are equipped with software to offer tethered Internet access. Windows Mobile 6.5, Windows Phone 7, Android (starting from version 2.2), and iOS 3.0 (or later) offer tethering over a Bluetooth PAN or a USB connection. Tethering over Wi-Fi, also known as Personal Hotspot, is available on iOS starting with iOS 4.2.5 (or later) on iPhone 4 or iPad (3rd gen), certain Windows Mobile 6.5 devices like the HTC HD2, Windows Phone 7, 8 and 8.1 devices (varies by manufacturer and model), and certain Android phones (varies widely depending on carrier, manufacturer, and software version). For IPv4 networks, the tethering normally works via NAT on the handset's existing data connection, so from the network point of view, there is just one device with a single IPv4 network address, though it is technically possible to attempt to identify multiple machines. On some mobile network operators, this feature is contractually unavailable by default, and may be activated only by paying to add a tethering package to a data plan or choosing a data plan that includes tethering. This is done primarily because with a computer sharing the network connection, there is typically substantially more network traffic. Some network-provided devices have carrier-specific software that may deny the inbuilt tethering ability normally available
https://en.wikipedia.org/wiki/Pseudopeptidoglycan
Pseudopeptidoglycan (also known as pseudomurein; PPG hereafter) is a major cell wall component of some Archaea that differs from bacterial peptidoglycan in chemical structure, but resembles bacterial peptidoglycan in function and physical structure. Pseudopeptidoglycan, in general, is only present in a few methanogenic archaea. The basic components are N-acetylglucosamine and N-acetyltalosaminuronic acid (bacterial peptidoglycan containing N-acetylmuramic acid instead), which are linked by β-1,3-glycosidic bonds. Lysozyme, a host defense mechanism present in human secretions (e.g. saliva and tears) breaks β-1,4-glycosidic bonds to degrade peptidoglycan. However, because pseudopeptidoglycan has β-1,3-glycosidic bonds, lysozyme is ineffective. It was thought from these large differences in cell wall chemistry that archaeal cell walls and bacterial cell walls have not evolved from a common ancestor but are only the result of a convergent evolution, but recent structural work has revealed deeper homology. No archaeal enzymes are known that cleave the β-1,3-glycosidic bonds in pseudopeptidoglycan, but it can be degraded by pseudomurein endoisopeptidase encoded by two prophages. The pseudomurein endoisopeptidases function by cleaving the peptide links between adjacent pseudopeptidoglycan strands. Structure Pseudopeptidoglycan is composed of two sugars, N-acetylglucosamine and N-acetyltalosaminuronic acid. These sugars are made of different amino acids, and the peptide cross-links within pseudopeptidoglycan are formed with different amino acids. The peptide bond is formed between the lysine of a N-acetyltalosaminuronic acid and a glutamine of a parallel N-acetyltalosaminuronic acid. Pseudopeptidoglycan, like peptidoglycan in bacteria, forms a mesh-like layer outside of the plasma membrane of the archaea. Function Only a few methanogenic archaea have cell walls composed of pseudopeptidoglycan. This component functions much like peptidoglycan in a bacterial cell. Pseu
https://en.wikipedia.org/wiki/Animal-made%20art
Animal-made art consists of works by non-human animals, that have been considered by humans to be artistic, including visual works, music, photography and videography. Some of these are created naturally by animals, often as courtship displays, while others are created with human involvement. There have been debates about the copyright status of these works, with the United States Copyright Office stating in 2014 that works created by animals cannot be copyrighted. Painting Donkey A painting partially made by Lolo the donkey, (Sunset Over the Adriatic) was exhibited at the 1910 Salon des Indépendants attributed to the 'excessivist' Genoan painter Joachim-Raphaël Boronali, an invention of writer and critic Roland Dorgelès, who painted much of the painting. It sold for 400 francs and was donated by Dorgelès to the Orphelinat des Arts. The painting forms part of the permanent collection at l'Espace culturel Paul Bédu (Milly-la-Forêt). Primates During the late 1950s biologists began to study the nature of art in humans. Theories were proposed based on observations of non-human primate paintings. Hundreds of such paintings were cataloged by Desmond Morris. Morris and his associate Tyler Harris interpreted these canvas paintings as indications of an intrinsic motivation toward abstract creativity, as expressed through an exploration of the visual field and color. Many of these painters progressed over time by expanding or contracting the area of paint coverage, the horizontal or vertical stroke relationships, and even the development of content. Such paintings were exhibited in many modern art museums during the late 1950s and early 1960s. The cultural and scientific interest in these paintings diminished steadily and little note is taken today. The most successful chimpanzee artist is Congo (1954–1964). Morris offered him a pencil and paper at two years of age, and by the age of four, Congo had made 400 drawings and paintings. His style has been described as "l
https://en.wikipedia.org/wiki/Cliffy%20the%20Clown
Cliffy Sobier (June 25, 1891 - September, 1984), known professionally as Cliffy the Clown was an American clown beginning in 1949. The clown debuted on an ABC-TV show called Super Circus. The family oriented show aired on Sunday afternoons for an hour. Cliffy's sidekicks on the show were Scampy and Nicky, both clowns. Cliffy was the head of the group. He had a bald head, oversized shoes, and a red nose. Unfortunately, the TV series had to move to New York City in 1955, leaving Cliffy the clown both disheartened and unemployed. Cliffy became the official mascot of Kellogg's Sugar Smacks in 1953. He served as the sweetened puffed wheat breakfast cereal's mascot until 1956, when replaced by a rival mascot named Smaxey, a seal dressed in a sailor suit.
https://en.wikipedia.org/wiki/IDEF1X
Integration DEFinition for information modeling (IDEF1X) is a data modeling language for the development of semantic data models. IDEF1X is used to produce a graphical information model which represents the structure and semantics of information within an environment or system. IDEF1X permits the construction of semantic data models which may serve to support the management of data as a resource, the integration of information systems, and the building of computer databases. This standard is part of the IDEF family of modeling languages in the field of software engineering. Overview A data modeling technique is used to model data in a standard, consistent and predictable manner in order to manage it as a resource. It can be used in projects requiring a standard means of defining and analyzing the data resources within an organization. Such projects include the incorporation of a data modeling technique into a methodology, managing data as a resource, integrating information systems, or designing computer databases. The primary objectives of the IDEF1X standard are to provide: Means for completely understanding and analyzing an organization's data resources Common means of representing and communicating the complexity of data A technique for presenting an overall view of the data required to run an enterprise Means for defining an application-independent view of data which can be validated by users and transformed into a physical database design A technique for deriving an integrated data definition from existing data resources. A principal objective of IDEF1X is to support integration. The approach to integration focuses on the capture, management, and use of a single semantic definition of the data resource referred to as a “conceptual schema.” The “conceptual schema” provides a single integrated definition of the data within an enterprise which is not biased toward any single application of data and is independent of how the data is physically stored o
https://en.wikipedia.org/wiki/Maxime%20B%C3%B4cher
Maxime Bôcher (August 28, 1867 – September 12, 1918) was an American mathematician who published about 100 papers on differential equations, series, and algebra. He also wrote elementary texts such as Trigonometry and Analytic Geometry. Bôcher's theorem, Bôcher's equation, and the Bôcher Memorial Prize are named after him. Life Bôcher was born in Boston, Massachusetts. His parents were Caroline Little and Ferdinand Bôcher. Maxime's father was professor of modern languages at the Massachusetts Institute of Technology when Maxime was born, and became Professor of French at Harvard University in 1872. Bôcher received an excellent education from his parents and from a number of public and private schools in Massachusetts. He graduated from the Cambridge Latin School in 1883. He received his first degree from Harvard in 1888. At Harvard, he studied a wide range of topics, including mathematics, Latin, chemistry, philosophy, zoology, geography, geology, meteorology, Roman art, and music. Bôcher was awarded many prestigious prizes, which allowed him to travel to Europe to do research. The University of Göttingen was then the leading mathematics university, and he attended there lectures by Felix Klein, Arthur Moritz Schoenflies, Hermann Schwarz, Issai Schur and Woldemar Voigt. He was awarded a doctorate in 1891 for his dissertation Über die Reihenentwicklungen der Potentialtheorie (German for "On the Development of the Potential Function into Series"); he was encouraged to study this topic by Klein. He received a Göttingen university prize for this work. Bocher was elected to the American Academy of Arts and Sciences in 1899, the United States National Academy of Sciences in 1909, and the American Philosophical Society in 1916. In Göttingen he met Marie Niemann, and they were married in July 1891. They had three children, Helen, Esther, and Frederick. He returned with his wife to Harvard where he was appointed as an instructor. In 1894 he was promoted to assistant p
https://en.wikipedia.org/wiki/Netvibes
Netvibes is a French company that offers web services. History The company was founded by Tariq Krim and Florent Frémont in 2005. In August 2006, Netvibes closed a funding round of €12 million led by Accel Partners in London along with Index Ventures. Since May 2008, Freddy Mini is the Chief Executive Officer of Netvibes. On February 9, 2012 Dassault Systèmes announced the acquisition of Netvibes for an undisclosed amount. Activities Brand monitoring – to track clients, customers and competitors across media sources all in one place, analyze live results with third party reporting tools, and provide media monitoring dashboards for brand clients. E-reputation management – to visualize real-time online conversations and social activity online feeds, and track new trending topics. Product marketing – to create interactive product microsites, with drag-and-drop publishing interface. Community portals – to engage online communities Personalized workspaces – to gather all essential company updates to support specific divisions (e.g. sales, marketing, human resources) and localizations. The software is a multi-lingual Ajax-based start page or web portal. It is organized into tabs, with each tab containing user-defined modules. Built-in Netvibes modules include an RSS/Atom feed reader, local weather forecasts, a calendar supporting iCal, bookmarks, notes, to-do lists, multiple searches, support for POP3, IMAP4 email as well as several webmail providers including Gmail, Yahoo! Mail, Hotmail, and AOL Mail, Box.net web storage, Delicious, Meebo, Flickr photos, podcast support with a built-in audio player, and several others. A page can be personalized further through the use of existing themes or by creating personal theme. Customized tabs, feeds and modules can be shared with others individually or via the Netvibes Ecosystem. For privacy reasons, only modules with publicly available content can be shared.
https://en.wikipedia.org/wiki/Chondrin
Chondrin is a bluish-white gelatin-like substance, being a protein-carbohydrate complex and can be obtained by boiling cartilage in water. The cartilage is a connective tissue that contains cells embedded in a matrix of chondrin. Chondrin is made up of two proteins chondroalbunoid and chondromucoid. See also Chondroitin External links Charles Darwin - Insectivorous Plants Page 56 Animal products Edible thickening agents Proteins
https://en.wikipedia.org/wiki/Szil%C3%A1rd%20petition
The Szilárd petition, drafted and circulated in July 1945 by scientist Leo Szilard, was signed by 70 scientists working on the Manhattan Project in Oak Ridge, Tennessee, and the Metallurgical Laboratory in Chicago, Illinois. It asked President Harry S. Truman to inform Japan of the terms of surrender demanded by the allies, and allow Japan to either accept or refuse these terms, before America used atomic weapons. However, the petition never made it through the chain of command to President Truman. It was not declassified and made public until 1961. Later, in 1946, Szilárd jointly with Albert Einstein, created the Emergency Committee of Atomic Scientists that counted among its board, Linus Pauling (Nobel Peace Prize in 1962). Background The petition was preceded by the Franck Report, written by the Committee on the Social and Political Implications of the Atomic Bomb, of which James Franck was the chair. Szilárd and Met Lab colleague Glenn T. Seaborg co-wrote the report, which argued that political security in a post-nuclear world would rely upon international exchange and ownership of atomic information, and that in order to avoid a nuclear arms race and preserve goodwill towards the United States, Japan must be given proper warning ahead of the dropping of the bomb. Unlike the Franck Report, which by and large focused on the politics of using the atomic bomb and the possibility of international collaboration, the Szilárd Petition was a moral plea. Its signatories, foreseeing an age of rapid nuclear expansion, warned that, should the United States drop the bomb to end the war in the Pacific theater, they would "bear the responsibility of opening the door to an era of devastation on an unimaginable scale." They feared that, in using the bomb, the United States would lose moral authority to bring the subsequent nuclear arms race under control. More than 50 of the initial signatories worked in the Chicago branch of the Manhattan Project. After much disagreement
https://en.wikipedia.org/wiki/Geographic%20tongue
Geographic tongue, also known by several other terms, is a condition of the mucous membrane of the tongue, usually on the dorsal surface. It is a common condition, affecting approximately 2–3% of the general population. It is characterized by areas of smooth, red depapillation (loss of lingual papillae) which migrate over time. The name comes from the map-like appearance of the tongue, with the patches resembling the islands of an archipelago. The cause is unknown, but the condition is entirely benign (importantly, it does not represent oral cancer), and there is no curative treatment. Uncommonly, geographic tongue may cause a burning sensation on the tongue, for which various treatments have been described with little formal evidence of efficacy. Signs and symptoms In health, the dorsal surface of the tongue is covered in tuft-like projections called lingual papillae (some of which are associated with taste buds), which give the tongue an irregular surface texture and a white-pink color. Geographic tongue is characterized by areas of atrophy and depapillation (loss of papillae), leaving an erythematous (darker red) and smoother surface than the unaffected areas. The depapillated areas are usually well-demarcated, and bordered by a slightly raised, white, yellow or grey, serpiginous (snaking) peripheral zone. A lesion of geographic tongue may start as a white patch before the depapillation occurs. In certain cases there may be only one lesion, but this is uncommon; the lesions will typically occur in multiple locations on the tongue and coalesce over time to form the typical map-like appearance. The lesions usually change in shape and size, and migrate to other areas, sometimes within hours. The condition may affect only part of the tongue, with a predilection for the tip and the sides of the tongue, or the entire dorsal surface at any one time. The condition goes through periods of remission and relapse. Loss of the white peripheral zone is thought to signify per
https://en.wikipedia.org/wiki/Trichostatin%20A
Trichostatin A (TSA) is an organic compound that serves as an antifungal antibiotic and selectively inhibits the class I and II mammalian histone deacetylase (HDAC) families of enzymes, but not class III HDACs (i.e., sirtuins). However, there are recent reports of the interactions of this molecule with Sirt 6 protein. TSA inhibits the eukaryotic cell cycle during the beginning of the growth stage. TSA can be used to alter gene expression by interfering with the removal of acetyl groups from histones (histone deacetylases, HDAC) and therefore altering the ability of DNA transcription factors to access the DNA molecules inside chromatin. It is a member of a larger class of histone deacetylase inhibitors (HDIs or HDACIs) that have a broad spectrum of epigenetic activities. Thus, TSA has some potential as an anti-cancer drug. One suggested mechanism is that TSA promotes the expression of apoptosis-related genes, leading to cancerous cells surviving at lower rates, thus slowing the progression of cancer. Other mechanisms may include the activity of HDIs to induce cell differentiation, thus acting to "mature" some of the de-differentiated cells found in tumors. HDIs have multiple effects on non-histone effector molecules, so the anti-cancer mechanisms are truly not understood at this time. TSA inhibits HDACs 1, 3, 4, 6 and 10 with IC50 values around 20 nM. TSA represses IL (interleukin)-1β/LPS (lipopolysaccharide)/IFNγ (interferon γ)-induced nitric oxide synthase 2 (NOS2) expression in murine macrophage-like cells but increases LPS-stimulated NOS2 expression in murine N9 and primary rat microglial cells. Vorinostat is structurally related to trichostatin A and used to treat cutaneous T cell lymphoma. See also Histone deacetylase inhibitor Vorinostat (SAHA)
https://en.wikipedia.org/wiki/Lola%20%28computing%29
Lola is designed to be a simple hardware description language for describing synchronous, digital circuits. Niklaus Wirth developed the language to teach digital design on field-programmable gate arrays (FPGAs) to computer science students while a professor at ETH Zurich. The purpose of Lola is to statically describe the structure and function of hardware components and of the connections between them. A Lola text is composed of declarations and statements. It describes digital electronics hardware on the logic gate level in the form of signal assignments. Signals are combined using operators and assigned to other signals. Signals and the respective assignments can be grouped together into data types. An instance of a type is a hardware component. Types can be composed of instances of other types, thereby supporting a hierarchical design style and they can be generic, e.g., parametrizable with the word width of a circuit. All of the concepts mentioned above are demonstrated in the following example of a circuit for adding binary data. First, a fundamental building block () is defined, then this is used to declare a cascade of word-width 8, and finally the s are connected to each other. The defined in this example can serve as a building block on a higher level of the design hierarchy. MODULE Adder; TYPE Cell; (* Composite Type *) IN x,y,ci:BIT; (* input signals *) OUT z,co:BIT; (* output signals *) BEGIN z:=x-y-ci; co:=x*y+x*ci+y*ci; END Cell; CONST N:=8; IN X,Y:[N]BIT; ci:BIT; (* input signals *) OUT Z:[N]BIT; co:BIT; (* output signals *) VAR S:[N]Cell; (* composite type instances *) BEGIN S.0(X.0, Y.0, ci); (* inputs in cell 0 *) FOR i:=1..N-1 DO S.i(X.i,Y.i,S[i-1].co); (* inputs in cell i *) END; FOR i:=0..N-1 DO Z.i:=S.i.z; END; co:=S.7.co; END Adder. Wirth describes Lola from a user's perspective in his book Digital Circuit Design. A complementary view on the details of the Lola compiler's implementation can be found in Wirth'
https://en.wikipedia.org/wiki/Outline%20of%20actuarial%20science
The following outline is provided as an overview of and topical guide to actuarial science: Actuarial science – discipline that applies mathematical and statistical methods to assess risk in the insurance and finance industries. What type of thing is actuarial science? Actuarial science can be described as all of the following: An academic discipline – A branch of science – An applied science – A subdiscipline of statistics – Essence of actuarial science Actuarial science Actuary Actuarial notation Fields in which actuarial science is applied Mathematical finance Insurance, especially: Life insurance Health insurance Human resource consulting History of actuarial science History of actuarial science General actuarial science concepts Insurance Health insurance Life Insurance Life insurance Life insurer Insurable interest Insurable risk Annuity Life annuity Perpetuity New Business Strain Zillmerisation Financial reinsurance Net premium valuation Gross premium valuation Embedded value European Embedded Value Stochastic modelling Asset liability modelling Non-life Insurance Property insurance Casualty insurance Vehicle insurance Ruin theory Stochastic modelling Risk and capital management in non-life insurance Reinsurance Reinsurance Financial reinsurance Reinsurance Actuarial Premium Reinsurer Investments & Asset Management Dividend yield PE ratio Bond valuation Yield to maturity Cost of capital Net asset value Derivatives Mathematics of Finance Financial mathematics Interest Time value of money Discounting Present value Future value Net present value Internal rate of return Yield curve Yield to maturity Effective annual rate (EAR) Annual percentage rate (APR) Mortality Force of mortality Life table Pensions Pensions Stochastic modelling Other Enterprise risk management Fictional actuaries Persons influential in the field of actuarial science List of actuaries See also In