source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Angle%20of%20list
The angle of list is the degree to which a vessel heels (leans or tilts) to either port or starboard at equilibrium—with no external forces acting upon it. If a listing ship goes beyond the point where a righting moment will keep it afloat, it will capsize and potentially sink. Listing is caused by the off-centerline distribution of weight aboard due to uneven loading or to flooding. By contrast, roll is the dynamic movement from side to side caused by waves. See also Angle of loll Heeling (sailing) Capsizing Metacentric height Ship stability Ship motions
https://en.wikipedia.org/wiki/Fibrobacter%20succinogenes
Fibrobacter succinogenes is a cellulolytic bacterium species in the genus Fibrobacter. It is present in the rumen of cattle. F. succinogenes is a gram negative, rod-shaped, obligate anaerobe that is a major contributor to cellulose digestion. Since its discovery in the 1950s, it has been studied for its role in herbivore digestion and cellulose fermentation, which can be utilized in biofuel production. History Fibrobacter succinogenes was isolated in 1954 by M.P. Bryant and R.N. Doetsch from bovine rumen at the University of Maryland. They isolated 8 different strains – S23, S61, S85, S111, S121, C2, M13, and M34, all of which belonged to one species – Bacteroides succinogenes. This species would later be renamed Fibrobacter succinogenes. S85 would soon become a model strain for research, and it continues to be representative of wild type species. Genome The genome of F. succinogenes is 3.84 Megabasepairs and is predicted to consist of 3085 open reading frames. Many of these genes encode for carbohydrate binding molecules, glycoside hydrolases, and other enzymes. Thirty-one genes are identified as cellulases. The genome also encodes for a number of proteins capable of breaking down sugars, but it lacks the machinery to transport and use all the products except for those derived from cellulose. Relationship to other bacteria Phylogenetic studies based RpoC and Gyrase B protein sequences, indicate that Fibrobacter succinogenes is closely related to the species from the phyla Bacteroidetes and Chlorobi. Fibrobacter succinogenes and the species from these two other phyla also branch in the same position based upon conserved signature indels in a number of important proteins. Lastly and most importantly, comparative genomic studies have identified two conserved signature indels (a 5-7 amino acid insert in the RpoC protein and a 13-16 amino acid insertion in serine hydroxymethyltransferase) and one signature protein (PG00081) that are uniquely shared by Fibrob
https://en.wikipedia.org/wiki/ISO/IEC%202022
ISO/IEC 2022 Information technology—Character code structure and extension techniques, is an ISO/IEC standard in the field of character encoding. It is equivalent to the ECMA standard ECMA-35, the ANSI standard ANSI X3.41 and the Japanese Industrial Standard JIS X 0202. Originating in 1971, it was most recently revised in 1994. ISO 2022 specifies a general structure which character encodings can conform to, dedicating particular ranges of bytes (0x00–1F and 0x7F–9F) to be used for non-printing control codes for formatting and in-band instructions (such as line breaks or formatting instructions for text terminals), rather than graphical characters. It also specifies a syntax for escape sequences, multiple-byte sequences beginning with the control code, which can likewise be used for in-band instructions. Specific sets of control codes and escape sequences designed to be used with ISO 2022 include ISO/IEC 6429, portions of which are implemented by ANSI.SYS and terminal emulators. ISO 2022 itself also defines particular control codes and escape sequences which can be used for switching between different coded character sets (for example, between ASCII and the Japanese JIS X 0208) so as to use multiple in a single document, effectively combining them into a single stateful encoding (a feature less important since the advent of Unicode). It is designed to be usable in both 8-bit environments and 7-bit environments (those where only seven bits are usable in a byte, such as e-mail without 8BITMIME). Encodings and conformance Writing systems with relatively few characters, such as Greek, Cyrillic, Arabic, or Hebrew, as well as forms of the Latin alphabet using diacritics or letters absent in the ISO Basic Latin alphabet, have historically been represented on computers with different 8-bit, single byte, extended ASCII encodings. Some of these, such as the ISO 8859 series, conform to ISO 2022, while others such as DOS code page 437 do not, usually due to not reserving the
https://en.wikipedia.org/wiki/Session%20ID
In computer science, a session identifier, session ID or session token is a piece of data that is used in network communications (often over HTTPS) to identify a session, a series of related message exchanges. Session identifiers become necessary in cases where the communications infrastructure uses a stateless protocol such as HTTP. For example, a buyer who visits a seller's website wants to collect a number of articles in a virtual shopping cart and then finalize the shopping by going to the site's checkout page. This typically involves an ongoing communication where several webpages are requested by the client and sent back to them by the server. In such a situation, it is vital to keep track of the current state of the shopper's cart, and a session ID is one way to achieve that goal. A session ID is typically granted to a visitor on their first visit to a site. It is different from a user ID in that sessions are typically short-lived (they expire after a preset time of inactivity which may be minutes or hours) and may become invalid after a certain goal has been met (for example, once the buyer has finalized their order, they cannot use the same session ID to add more items). As session IDs are often used to identify a user that has logged into a website, they can be used by an attacker to hijack the session and obtain potential privileges. A session ID is usually a randomly generated string to decrease the probability of obtaining a valid one by means of a brute-force search. Many servers perform additional verification of the client, in case the attacker has obtained the session ID. Locking a session ID to the client's IP address is a simple and effective measure as long as the attacker cannot connect to the server from the same address, but can conversely cause problems for a client if the client has multiple routes to the server (e.g. redundant internet connections) and the client's IP address undergoes Network Address Translation. Examples of the names t
https://en.wikipedia.org/wiki/Function%20%28mathematics%29
In mathematics, a function from a set to a set assigns to each element of exactly one element of . The set is called the domain of the function and the set is called the codomain of the function. Functions were originally the idealization of how a varying quantity depends on another quantity. For example, the position of a planet is a function of time. Historically, the concept was elaborated with the infinitesimal calculus at the end of the 17th century, and, until the 19th century, the functions that were considered were differentiable (that is, they had a high degree of regularity). The concept of a function was formalized at the end of the 19th century in terms of set theory, and this greatly enlarged the domains of application of the concept. A function is most often denoted by letters such as , and , and the value of a function at an element of its domain is denoted by ; the numerical value resulting from the function evaluation at a particular input value is denoted by replacing with this value; for example, the value of at is denoted by . When the function is not named and is represented by an expression , the value of the function at, say, may be denoted by . For example, the value at of the function that maps to may be denoted by (which results in A function is uniquely represented by the set of all pairs , called the graph of the function, a popular means of illustrating the function. When the domain and the codomain are sets of real numbers, each such pair may be thought of as the Cartesian coordinates of a point in the plane. Functions are widely used in science, engineering, and in most fields of mathematics. It has been said that functions are "the central objects of investigation" in most fields of mathematics. Definition A function from a set to a set is an assignment of an element of to each element of . The set is called the domain of the function and the set is called the codomain of the function. A function, its doma
https://en.wikipedia.org/wiki/N-vector
The n-vector representation (also called geodetic normal or ellipsoid normal vector) is a three-parameter non-singular representation well-suited for replacing geodetic coordinates (latitude and longitude) for horizontal position representation in mathematical calculations and computer algorithms. Geometrically, the n-vector for a given position on an ellipsoid is the outward-pointing unit vector that is normal in that position to the ellipsoid. For representing horizontal positions on Earth, the ellipsoid is a reference ellipsoid and the vector is decomposed in an Earth-centered Earth-fixed coordinate system. It behaves smoothly at all Earth positions, and it holds the mathematical one-to-one property. More in general, the concept can be applied to representing positions on the boundary of a strictly convex bounded subset of k-dimensional Euclidean space, provided that that boundary is a differentiable manifold. In this general case, the n-vector consists of k parameters. General properties A normal vector to a strictly convex surface can be used to uniquely define a surface position. n-vector is an outward-pointing normal vector with unit length used as a position representation. For most applications the surface is the reference ellipsoid of the Earth, and thus n-vector is used to represent a horizontal position. Hence, the angle between n-vector and the equatorial plane corresponds to geodetic latitude, as shown in the figure. A surface position has two degrees of freedom, and thus two parameters are sufficient to represent any position on the surface. On the reference ellipsoid, latitude and longitude are common parameters for this purpose, but like all two-parameter representations, they have singularities. This is similar to orientation, which has three degrees of freedom, but all three-parameter representations have singularities. In both cases the singularities are avoided by adding an extra parameter, i.e. to use n-vector (three parameters) to rep
https://en.wikipedia.org/wiki/Keyboard%20protector
A keyboard protector or keyboard cover is a device which is placed on top of a computer keyboard in order to reduce contact with the environment. Keyboards are susceptible to corrosion damage from liquid spills and build up of dust and debris, requiring frequent cleaning and maintenance. The protector serves as a barrier to eliminate ingress from these materials. Composition A keyboard protector is usually made from plastic, polyurethane or silicone. It is in the form of a flexible sheet, moulded to fit the key profiles and arrangements on the keyboard. Working principle A keyboard protector is placed on top of a keyboard, acting as a physical barrier to the environment. When a key is depressed, the protector material deforms with the key, allowing full key travel and tactile feedback. Some models of have the sides of the protector extend to the underside of the keyboard, which are secured with adhesive tape. When dirty, the protector can be removed and cleaned. Advantages and inconvenience Computer users who are unfamiliar with keyboard protectors may take some time to become accustomed, since the keystrokes are dampened and the force needed to depress the keys is different. These factors may also affect their typing speed and accuracy. Some applications can be a disadvantage, for example laptops and luggables. On laptops, the computer may not close properly with the protector fitted, and can transfer dirt and debris to the display. Compatibility Since there are several major types of keyboards in the market, some with different layouts, the compatibility of keyboard protectors is also important in order to have the keyboard fully and well protected. Different keyboards will often feature slightly different key spacing or arrangement, leading to ill-fitting protectors.
https://en.wikipedia.org/wiki/Human%20Resource%20Machine
Human Resource Machine is a visual programming-based puzzle video game developed by Tomorrow Corporation. The game was released for Microsoft Windows, OS X and Wii U in 2015, being additionally released for Linux in March 2016, for iOS in June 2016, for Android in December 2016 and for the Nintendo Switch in March 2017. Human Resource Machine uses the concept of a corporate office worker assigned to perform tasks that involve moving objects between an inbox, an outbox, and to and from storage areas as a metaphor for assembly language concepts. The player works through some forty puzzles in constructing a program to complete a specific task. A sequel, 7 Billion Humans, was released on August 23, 2018. Gameplay The game includes approximately 40 programming puzzles, each considered one "year" of the player's avatar tenure in a corporate structure. In each puzzle, the player creates a list of instructions from rudimentary commands to control the movements of their avatar on an overhead view of an office; the office includes two conveyor belts, one an inbox that sends in either an integer or a single alphabetic character represented as a small box, the other an outbox to receive these. The office floor typically also includes a number of marked number spaces that can hold one box each. For each puzzle, the player is told of a specific task, such as adding two numbers as they come in on the inbox, or sorting a zero-terminated string of characters, delivering these results in the proper order to the outbox. The player uses simple commands to create a list of instructions to perform the given task. Such commands include picking up the first item at the inbox, placing the item the avatar is currently carrying at the outbox, copying the carried item to a marked square, performing addition or subtraction of the carried item with the item at the marked square, and making decisions based on the value of the carried item such as if it is zero or negative. As such, these mimi
https://en.wikipedia.org/wiki/Otonality%20and%20utonality
Otonality and utonality are terms introduced by Harry Partch to describe chords whose pitch classes are the harmonics or subharmonics of a given fixed tone (identity), respectively. For example: , , ,... or , , ,.... Definition An otonality is a collection of pitches which can be expressed in ratios, expressing their relationship to the fixed tone, that have equal denominators and consecutive numerators. For example, , , and (just major chord) form an otonality because they can be written as , , . This in turn can be written as an extended ratio 4:5:6. Every otonality is therefore composed of members of a harmonic series. Similarly, the ratios of a utonality share the same numerator and have consecutive denominators. , , , and () form a utonality, sometimes written as , or as . Every utonality is therefore composed of members of a subharmonic series. This term is used extensively by Harry Partch in Genesis of a Music. An otonality corresponds to an arithmetic series of frequencies, or lengths of a vibrating string. Brass instruments naturally produce otonalities, and indeed otonalities are inherent in the harmonics of a single fundamental tone. Tuvan Khoomei singers produce otonalities with their vocal tracts. Utonality is the opposite, corresponding to a subharmonic series of frequencies, or an arithmetic series of wavelengths (the inverse of frequency). The arithmetical proportion "may be considered as a demonstration of utonality ('minor tonality')." If otonality and utonality are defined broadly, every just intonation chord is both an otonality and a utonality. For example, the minor triad in root position is made up of the 10th, 12th and 15th harmonics, and , and meets the definition of otonal. A better, narrower definition requires that the harmonic (or subharmonic) series members be adjacent. Thus 4:5:6 is an otonality, but 10:12:15 is not. (Alternate voicings of 4:5:6, such as 5:6:8, 3:4:5:6, etc. would presumably also be otonalities.) Under this d
https://en.wikipedia.org/wiki/Hukuchivirus
Hukuchivirus is a genus of double-stranded DNA viruses that infect thermophilic bacteria. The genus was previously named Gammasphaerolipovirus. Taxonomy The genus contains the following species: Hukuchivirus IN93 Hukuchivirus P23-77 Morphology The virus particle, called a virion, of viruses in the genus has a capsid that is icosahedral in shape. The capsid contains an internal lipid membrane between the capsid and the genome, which is in the center of the virion.
https://en.wikipedia.org/wiki/Bertrand%E2%80%93Diguet%E2%80%93Puiseux%20theorem
In the mathematical study of the differential geometry of surfaces, the Bertrand–Diguet–Puiseux theorem expresses the Gaussian curvature of a surface in terms of the circumference of a geodesic circle, or the area of a geodesic disc. The theorem is named for Joseph Bertrand, Victor Puiseux, and Charles François Diguet. Let p be a point on a smooth surface M. The geodesic circle of radius r centered at p is the set of all points whose geodesic distance from p is equal to r. Let C(r) denote the circumference of this circle, and A(r) denote the area of the disc contained within the circle. The Bertrand–Diguet–Puiseux theorem asserts that The theorem is closely related to the Gauss–Bonnet theorem.
https://en.wikipedia.org/wiki/Zero-configuration%20networking
Zero-configuration networking (zeroconf) is a set of technologies that automatically creates a usable computer network based on the Internet Protocol Suite (TCP/IP) when computers or network peripherals are interconnected. It does not require manual operator intervention or special configuration servers. Without zeroconf, a network administrator must set up network services, such as Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), or configure each computer's network settings manually. Zeroconf is built on three core technologies: automatic assignment of numeric network addresses for networked devices, automatic distribution and resolution of computer hostnames, and automatic location of network services, such as printing devices. Background Computer networks use numeric network addresses to identify communications endpoints in a network of participating devices. This is similar to the telephone network which assigns a string of digits to identify each telephone. In modern networking protocols, information to be transmitted is divided into a series of network packets. Every packet contains the source and destination addresses for the transmission. Network routers examine these addresses to determine the best network path in forwarding the data packet at each step toward its destination. Similarly to telephones being labeled with their telephone number, it was a common practice in early networks to attach an address label to networked devices. The dynamic nature of modern networks, especially residential networks in which devices are powered up only when needed, desire dynamic address assignment mechanisms that do not require user involvement for initialization and management. These systems automatically give themselves common names chosen either by the equipment manufacturer, such as a brand and model number or chosen by users for identifying their equipment. The names and addresses are then automatically entered into a directory service.
https://en.wikipedia.org/wiki/Solvated%20electron
A solvated electron is a free electron in (solvated in) a solution, and is the smallest possible anion. Solvated electrons occur widely. Often, discussions of solvated electrons focus on their solutions in ammonia, which are stable for days, but solvated electrons also occur in water and other solvents in fact, in any solvent that mediates outer-sphere electron transfer. The solvated electron is responsible for a great deal of radiation chemistry. Ammonia solutions Liquid ammonia will dissolve all of the alkali metals and other electropositive metals such as Ca, Sr, Ba, Eu, and Yb (also Mg using an electrolytic process), giving characteristic blue solutions. For alkali metals in liquid ammonia, the solution is blue when dilute and copper-colored when more concentrated (> 3 molar). These solutions conduct electricity. The blue colour of the solution is due to ammoniated electrons, which absorb energy in the visible region of light. The diffusivity of the solvated electron in liquid ammonia can be determined using potential-step chronoamperometry. Solvated electrons in ammonia are the anions of salts called electrides. Na + 6 NH3 → [Na(NH3)6]+e− The reaction is reversible: evaporation of the ammonia solution produces a film of metallic sodium. Case study: Li in NH3 A lithium–ammonia solution at −60 °C is saturated at about 15 mol% metal (MPM). When the concentration is increased in this range electrical conductivity increases from 10−2 to 104 Ω−1cm−1 (larger than liquid mercury). At around 8 MPM, a "transition to the metallic state" (TMS) takes place (also called a "metal-to-nonmetal transition" (MNMT)). At 4 MPM a liquid-liquid phase separation takes place: the less dense gold-colored phase becomes immiscible from a denser blue phase. Above 8 MPM the solution is bronze/gold-colored. In the same concentration range the overall density decreases by 30%. Other solvents Alkali metals also dissolve in some small primary amines, such as methylamine and ethylami
https://en.wikipedia.org/wiki/Peter%20Stoica
Peter (Petre) Stoica (born 1949) is a researcher and educator in the field of signal processing and its applications to radar/sonar, communications and bio-medicine. He is a professor of Signals and Systems Modeling at Uppsala University in Sweden, and a Member of the Royal Swedish Academy of Engineering Sciences, the United States National Academy of Engineering (International Member), the Romanian Academy (Honorary Member), the European Academy of Sciences, and the Royal Society of Sciences. He is also a Fellow of IEEE, EURASIP, IETI, and the Royal Statistical Society. He is known for his theoretical contributions to system identification and modeling, spectral analysis, array signal processing, space-time coding, and waveform design for active sensing. His practical contributions include the areas of wireless communications, microwave imaging for breast cancer detection, radar/sonar systems, acoustic source mapping, landmine and explosive detection, and magnetic resonance spectroscopy and imaging. His books on System Identification, Spectral Analysis, and Space-Time Coding for Wireless Communications have been used in both undergraduate and graduate courses and are highly cited (his works rank in the top 1% by citations for the field of engineering). He has been included on the ISI list of the 250 most highly cited researchers in engineering in the world. Selected awards The IEEE ASSP Senior Award, 1989 Honorary doctorate from the Faculty of Science and Mathematics at Uppsala University, Sweden 1993 The Shannon-Nyquist Technical Achievement Award of the IEEE Signal Processing Society, 1996 The IEEE W.R.G. Baker Award, 2000 The IEEE Third Millennium Medal, 2000 The EURASIP Individual Technical Achievement Award, 2002 The Bjorkenska Prize, 2004 The IEE Achievement Medal, 2005 The Wiener Society Award of the IEEE Signal Processing Society, 2006 The Barry Carlton Award of the IEEE Aerospace and Electronic Systems Society, 2008 The IEEE Signal Proc
https://en.wikipedia.org/wiki/Octenyl%20succinic%20acid%20modified%20gum%20arabic
Octenyl succinic acid modified gum Arabic is known to the FAO as a food additive. It has E number E423, and is a chemical modification of gum arabic. Synopsis It is a free flowing powder at STP, and has off-white to light tan colour. It has functionality as an emulsifier and is freely soluble in water.
https://en.wikipedia.org/wiki/ATP%3Aguanido%20phosphotransferase%20family
In molecular biology, the ATP:guanido phosphotransferase family is a family of structurally and functionally related enzymes, that reversibly catalyse the transfer of phosphate between ATP and various phosphagens. The enzymes belonging to this family include: Glycocyamine kinase (), which catalyses the transfer of phosphate from ATP to guanidoacetate. Arginine kinase (), which catalyses the transfer of phosphate from ATP to arginine. Taurocyamine kinase (), an annelid-specific enzyme that catalyses the transfer of phosphate from ATP to taurocyamine. Lombricine kinase (), an annelid-specific enzyme that catalyses the transfer of phosphate from ATP to lombricine. Smc74, a cercaria-specific enzyme from Schistosoma mansoni. Creatine kinase () (CK), which catalyses the reversible transfer of high energy phosphate from ATP to creatine, generating phosphocreatine and ADP. Creatine kinase plays an important role in energy metabolism of vertebrates. There are at least four different, but very closely related, forms of CK. Two isozymes, M (muscle) and B (brain), are cytosolic, while the other two are mitochondrial. In sea urchins there is a flagellar isozyme, which consists of the triplication of a CK-domain. A cysteine residue is implicated in the catalytic activity of these enzymes and the region around this active site residue is highly conserved. ATP:guanido phosphotransferases contain a C-terminal catalytic domain which consists of a duplication where the common core consists of two beta-alpha-beta2-alpha repeats. The substrate binding site is located in the cleft between N and C-terminal domains, but most of the catalytic residues are found in the larger C-terminal domain. They also contain an N-terminal domain which has an all-alpha fold consisting of an irregular array of 6 short helices.
https://en.wikipedia.org/wiki/European%20Journal%20of%20Ecology
The European Journal of Ecology is an English-language, biannual, scientific journal founded in 2015. It publishes original, peer-reviewed papers (in categories like research articles, reviews, forum articles, policy directions) referring to any branches of ecology. All articles are open access for readers and authors are also free from any publication fees or page charges. The journal provides a fair publication forum not only for experienced scientists, but also for beginners. Therefore, free language-correction services are provided for authors from non-English speaking regions. Reviewers are required to provide helpful and detailed advice, comments, and constructive criticism.
https://en.wikipedia.org/wiki/Wetness%20indicator
A wetness indicator is a common feature in many disposable diapers and toilet training pants. It is a feature that reacts to exposure of liquid as a way to discourage the wearer to urinate in the training pants, or as an indicator a caregiver that a diaper needs changing. Types "Fade when wet" is a feature in most training pants that has small graphics which fade as a reaction to liquid, specifically urine. "Feel wet" is a feature used in some training pants that lets the wearer know when they are wet by feeling. Nowadays few training pants use this feature. "Color Change When Wet" is a feature in most modern baby and adult diapers that has a yellow stripe or graphics that goes from the front to the back of the diaper that which turns blue after a minute or two as a reaction of liquid, during the transition when the indicator is activated the indicator fades or turns an amber color before turning blue, over time the indicator becomes less yellow and more blue as the diaper gets used more often to let the wearer or the caregiver know when the diaper needs to be changed. History In 1978, Kimberly-Clark introduced Kleenex Super Dry diapers with "wetness indicators" in the form of a design that fades and lightens as the inside of the diaper becomes wetter. (The Kleenex Super Dry line was later superseded by Kimberley-Clark's higher-end "Huggies" line.) In 2000, Huggies introduced and started integrating their new "Learning Designs" feature into all Huggies Pull-Ups training pants. These were small designs on the Pull-Up that use a special ink that fades when exposed to wetness, with an intent to let the wearer know when the wearer is wet or dry and as an incentive for urinating in the toilet instead of in the Pull-Up. But on March 2, 2005, the original Huggies Pull-Ups are now known as Learning Designs. Learning Designs Pull-Ups also have a small star picture on the inside that is digested on, that is also printed on certain ink that evaporates when exposed to fece
https://en.wikipedia.org/wiki/Phototube
A phototube or photoelectric cell is a type of gas-filled or vacuum tube that is sensitive to light. Such a tube is more correctly called a 'photoemissive cell' to distinguish it from photovoltaic or photoconductive cells. Phototubes were previously more widely used but are now replaced in many applications by solid state photodetectors. The photomultiplier tube is one of the most sensitive light detectors, and is still widely used in physics research. Operating principles Phototubes operate according to the photoelectric effect: Incoming photons strike a photocathode, knocking electrons out of its surface, which are attracted to an anode. Thus current is dependent on the frequency and intensity of incoming photons. Unlike photomultiplier tubes, no amplification takes place, so the current through the device is typically of the order of a few microamperes. The light wavelength range over which the device is sensitive depends on the material used for the photoemissive cathode. A caesium-antimony cathode gives a device that is very sensitive in the violet to ultra-violet region with sensitivity falling off to blindness to red light. Caesium on oxidised silver gives a cathode that is most sensitive to infra-red to red light, falling off towards blue, where the sensitivity is low but not zero. Vacuum devices have a near constant anode current for a given level of illumination relative to anode voltage. Gas-filled devices are more sensitive, but the frequency response to modulated illumination falls off at lower frequencies compared to the vacuum devices. The frequency response of vacuum devices is generally limited by the transit time of the electrons from cathode to anode. Applications One major application of the phototube was the reading of optical sound tracks for projected films. Phototubes were used in a variety of light-sensing applications until some were superseded by photoresistors and photodiodes.
https://en.wikipedia.org/wiki/Fixed-point%20iteration
In numerical analysis, fixed-point iteration is a method of computing fixed points of a function. More specifically, given a function defined on the real numbers with real values and given a point in the domain of , the fixed-point iteration is which gives rise to the sequence of iterated function applications which is hoped to converge to a point . If is continuous, then one can prove that the obtained is a fixed point of , i.e., More generally, the function can be defined on any metric space with values in that same space. Examples A first simple and useful example is the Babylonian method for computing the square root of , which consists in taking , i.e. the mean value of and , to approach the limit (from whatever starting point ). This is a special case of Newton's method quoted below. The fixed-point iteration converges to the unique fixed point of the function for any starting point This example does satisfy (at the latest after the first iteration step) the assumptions of the Banach fixed-point theorem. Hence, the error after n steps satisfies (where we can take , if we start from .) When the error is less than a multiple of for some constant , we say that we have linear convergence. The Banach fixed-point theorem allows one to obtain fixed-point iterations with linear convergence. The requirement that is continuous is important, as the following example shows. The iteration converges to 0 for all values of . However, 0 is not a fixed point of the function as this function is not continuous at , and in fact has no fixed points. Attracting fixed points An attracting fixed point of a function is a fixed point of with a neighborhood of "close enough" points around such that for any value of in , the fixed-point iteration sequence is contained in and converges to . The basin of attraction of is the largest such neighborhood . The natural cosine function ("natural" means in radians, not degrees or other units) has exactly one f
https://en.wikipedia.org/wiki/Hermite%E2%80%93Hadamard%20inequality
In mathematics, the Hermite–Hadamard inequality, named after Charles Hermite and Jacques Hadamard and sometimes also called Hadamard's inequality, states that if a function ƒ : [a, b] → R is convex, then the following chain of inequalities hold: The inequality has been generalized to higher dimensions: if is a bounded, convex domain and is a positive convex function, then where is a constant depending only on the dimension. A corollary on Vandermonde-type integrals Suppose that , and choose distinct values from . Let be convex, and let denote the "integral starting at " operator; that is, . Then Equality holds for all iff is linear, and for all iff is constant, in the sense that The result follows from induction on .
https://en.wikipedia.org/wiki/Lactifluus%20volemus
Lactifluus volemus, formerly known as Lactarius volemus, and commonly known as the weeping milk cap or bradley, is a species of fungus in the family Russulaceae. It is widely distributed in the northern hemisphere, in temperate regions of Europe, North America and Asia as well as some subtropical and tropical regions of Central America and Asia. A mycorrhizal fungus, its fruit bodies grow on the ground at the base of various species of trees from summer to autumn, either individually or in groups. It is valued as an edible mushroom, and is sold in markets in Asia. Several other Lactifluus mushrooms resemble L. volemus, such as the closely related edible species L. corrugis, but these can be distinguished by differences in distribution, visible morphology, and microscopic characteristics. L. volemus produces a white spore print and has roughly spherical spores about 7–8 micrometres in diameter. The colour of the L. volemus mushroom varies from apricot to tawny, and the cap may be up to 11 cm ( in) wide. The pale golden yellow gills on the underside of the cap are closely spaced and sometimes forked. One of the mushroom's most distinctive features is the large amount of latex ("milk") that it exudes when the gills are damaged, leading to the common names weeping milk cap and voluminous-latex milky. It also has a distinctive fishy smell, which does not affect the taste. The fruit bodies have been chemically analysed and found to contain several sterols related to ergosterol, some of which are unique to this species. The mushroom also contains a natural rubber that has been chemically characterized. Phylogenetic analysis suggests that Lactifluus volemus represents several species or subspecies, rather than a single taxon. Taxonomy and naming The first mention of Lactifluus volemus in the scientific literature was in Carl Linnaeus's 1753 Species Plantarum, under the name Agaricus lactifluus. In 1821, Swedish mycologist Elias Magnus Fries called it Agaricus volemus in
https://en.wikipedia.org/wiki/Rotating%20unbalance
Rotating unbalance is the uneven distribution of mass around an axis of rotation. A rotating mass, or rotor, is said to be out of balance when its center of mass (inertia axis) is out of alignment with the center of rotation (geometric axis). Unbalance causes a moment which gives the rotor a wobbling movement characteristic of vibration of rotating structures. Causes of unbalance Distortion from stress Routine manufacturing processes can cause stress on metal components. Without stress relief, the rotor will distort itself to adjust. Thermal distortion Thermal distortion often occurs with parts exposed to increased temperatures. Metals are able to expand when in contact with heat, so exposure to warmer temperatures can cause either the entire piece of machinery to expand, or just certain parts, causing distortion. Buildups and deposits Rotating parts involved in material handling almost always accumulate buildup. Moreover, when exposed to oil, these parts can be very easily distorted. Without adhering to a maintenance routine or implementing an inspection process, oil can seep into the parts, causing unbalance. By design In some cases, vibration is desired, and a rotor is deliberately unbalanced to serve as a vibrator. An example of this is an aircraft's stick shaker. Effects of unbalance Vibration Noise Decreased life of bearings Unsafe work conditions Reduced machine life Increased maintenance Units used to express unbalance In terms of the mass eccentricity : µm, mm, cm, ...; µin, mil, in, ... In terms of mass at a given radius: µg, mg, g, kg, ...; moz, oz, ... In terms of mass × radius moment (mR): mg-mm, g-mm, mg-cm, g-cm, kg-mm, ...; oz-in, g-in, ... Types of balance Static balance A static balance (sometimes called a force balance) occurs when the inertial axis of a rotating mass is displaced from and parallel to the axis of rotation. Static unbalances can occur more frequently in disk-shaped rotors because the thin geometric profil
https://en.wikipedia.org/wiki/Bill%20Moog
William Moog (August 15, 1915–1997) is known for inventing the electrohydraulic servo valve in 1951. He founded Moog Inc., which makes actuators for aircraft. He was born in New Jersey. His cousin was Robert Moog, one of the leading pioneers of the modern synthesizer. Moog was married and had three daughters.
https://en.wikipedia.org/wiki/Email%20encryption
Email encryption is encryption of email messages to protect the content from being read by entities other than the intended recipients. Email encryption may also include authentication. Email is prone to the disclosure of information. Most emails are encrypted during transmission, but they are stored in clear text, making them readable by third parties such as email providers. By default, popular email services such as Gmail and Outlook do not enable end-to-end encryption. By means of some available tools, persons other than the designated recipients can read the email contents. Email encryption can rely on public-key cryptography, in which users can each publish a public key that others can use to encrypt messages to them, while keeping secret a private key they can use to decrypt such messages or to digitally encrypt and sign messages they send. Encryption protocols With the original design of email protocol, the communication between email servers was in plain text, which posed a huge security risk. Over the years, various mechanisms have been proposed to encrypt the communication between email servers. Encryption may occur at the transport level (aka "hop by hop") or end-to-end. Transport layer encryption is often easier to set up and use; end-to-end encryption provides stronger defenses, but can be more difficult to set up and use. Transport-level encryption One of the most commonly used email encryption extensions is STARTTLS. It is a TLS (SSL) layer over the plaintext communication, allowing email servers to upgrade their plaintext communication to encrypted communication. Assuming that the email servers on both the sender and the recipient side support encrypted communication, an eavesdropper snooping on the communication between the mail servers cannot use a sniffer to see the email contents. Similar STARTTLS extensions exist for the communication between an email client and the email server (see IMAP4 and POP3, as stated by RFC 2595). STARTTLS may be
https://en.wikipedia.org/wiki/Post-translational%20modification
Post-translational modification (PTM) is the covalent process of changing proteins following protein biosynthesis. PTMs may involve enzymes or occur spontaneously. Proteins are created by ribosomes translating mRNA into polypeptide chains, which may then change to form the mature protein product. PTMs are important components in cell signalling, as for example when prohormones are converted to hormones. Post-translational modifications can occur on the amino acid side chains or at the protein's C- or N- termini. They can expand the chemical set of the 22 amino acids by changing an existing functional group or adding a new one such as phosphate. Phosphorylation is highly effective for controlling the enzyme activity and is the most common change after translation. Many eukaryotic and prokaryotic proteins also have carbohydrate molecules attached to them in a process called glycosylation, which can promote protein folding and improve stability as well as serving regulatory functions. Attachment of lipid molecules, known as lipidation, often targets a protein or part of a protein attached to the cell membrane. Other forms of post-translational modification consist of cleaving peptide bonds, as in processing a propeptide to a mature form or removing the initiator methionine residue. The formation of disulfide bonds from cysteine residues may also be referred to as a post-translational modification. For instance, the peptide hormone insulin is cut twice after disulfide bonds are formed, and a propeptide is removed from the middle of the chain; the resulting protein consists of two polypeptide chains connected by disulfide bonds. Some types of post-translational modification are consequences of oxidative stress. Carbonylation is one example that targets the modified protein for degradation and can result in the formation of protein aggregates. Specific amino acid modifications can be used as biomarkers indicating oxidative damage. Sites that often undergo post-transl
https://en.wikipedia.org/wiki/Damped%20Lyman-alpha%20system
Damped Lyman alpha systems or Damped Lyman alpha absorption systems is a term used by astronomers for concentrations of neutral hydrogen gas that are detected in the spectra of quasars – a class of distant Active Galactic Nuclei. They are defined to be systems where the column density (density projected along the line of sight to the quasar) of hydrogen is larger than 2 x 1020 atoms/cm2. The observed spectra consist of neutral hydrogen Lyman alpha absorption lines which are broadened by radiation damping. These systems can be observed in quantity at relatively high redshifts of 2–4, when they contained most of the neutral hydrogen in the universe. They are believed to be associated with the early stages of galaxy formation, as the high neutral hydrogen column densities of DLAs are also typical of sightlines in the Milky Way, and other nearby galaxies. Since they are observed in absorption rather than emissions by their stars, they offer the opportunity to study the dynamics of the gas in early galaxies directly. See also Lyman-alpha blob Lyman-alpha emitter Lyman-alpha forest Lyman-break galaxy
https://en.wikipedia.org/wiki/Slip%20line%20field
In materials science and soil mechanics, a slip line field or slip line field theory is a technique often used to analyze the stresses and forces involved in the major deformation of metals or soils. In essence, in some problems including plane strain and plane stress elastic-plastic problems, elastic part of the material prevent unrestrained plastic flow but in many metal-forming processes, such as rolling, drawing, gorging, etc., large unrestricted plastic flows occur except for many small elastic zones. In effect we are concerned with a rigid-plastic material under condition of plane strain. it turns out that the simplest way of solving stress equations is to express them in terms of a coordinate system that is along potential slip (or failure) surfaces. It is for this reason that this type of analysis is termed slip line analysis or the theory of slip line fields in the literature. History The slip-line theory was co-developed by Hilda Geiringer in the early 1930s. She developed the Geiringer equations, which simplify the process of calculating the deformation.
https://en.wikipedia.org/wiki/Artificial%20Intelligence%20System
Artificial Intelligence System (AIS) was a volunteer computing project undertaken by Intelligence Realm, Inc. with the long-term goal of simulating the human brain in real time, complete with artificial consciousness and artificial general intelligence. They claimed to have found, in research, the "mechanisms of knowledge representation in the brain which is equivalent to finding artificial intelligence", before moving into the developmental phase. History The project's initial goal was recreating the largest brain simulation to date, performed by neuroscientist Eugene M. Izhikevich of The Neurosciences Institute in San Diego, California. Izhikevich simulated 1 second of activity of 100 billion neurons (the estimated number of neurons in the human brain) in 50 days using a cluster of 27 3-gigahertz processors. He extrapolated that a real-time simulation of the brain could not be achieved before 2016. The project aimed to disprove this prediction. Artificial Intelligence System announced on On Sep 5, 2007 that they will use the Berkeley Open Infrastructure for Network Computing (BOINC) software to perform intensive calculations. On July 12, 2008, the first phase of the project had been completed by reaching the 100 billion neuron mark. The project then continued to simulate neurons while they completed the development of other related applications. Application description the application is a brain network test system that reenacts biophysical sensory cells characterized as numerical models and use the Hodgkin–Huxley model to portray the properties of brain cells the rundown of models will keep developing and will ultimately arrive at many models the test system gets information from XML records that contain cell properties which portray behavior the test system will process the framework's way of behaving over the long haul calculation results will be saved in records Conclusion Artificial Intelligence System had successfully simulated over 700 billio
https://en.wikipedia.org/wiki/Quick%20clay
Quick clay, also known as Leda clay and Champlain Sea clay in Canada, is any of several distinctively sensitive glaciomarine clays found in Canada, Norway, Russia, Sweden, Finland, the United States and other locations around the world. The clay is so unstable that when a mass of quick clay is subjected to sufficient stress, the material behavior may drastically change from that of a particulate material to that of a watery fluid. Landslides occur because of the sudden soil liquefaction caused by external sollicitations such as vibrations induced by an earthquake, or massive rainfalls. Quick clay main deposits Quick clay is found only in countries close to the north pole, such as Russia; Canada; Norway; Sweden; and Finland; and in Alaska, United States; since they were glaciated during the Pleistocene epoch. In Canada, the clay is associated primarily with the Pleistocene-era Champlain Sea, in the modern Ottawa Valley, the St. Lawrence Valley, and the Saguenay River regions. Quick clay has been the underlying cause of many deadly landslides. In Canada alone, it has been associated with more than 250 mapped landslides. Some of these are ancient, and may have been triggered by earthquakes. Clay colloids stability Quick clay has a remolded strength which is much less than its strength upon initial loading. This is caused by its highly unstable clay particle structure. Quick clay is originally deposited in a marine environment. Clay mineral particles are always negatively charged because of the presence of permanent negative charges and pH dependent charges at their surface. Because of the need to respect electro-neutrality and a net zero electrical charge balance, these negative electrical charges are always compensated by the positive charges born by cations (such as Na+) adsorbed onto the surface of the clay, or present in the clay pore water. Exchangeable cations are present in the clay minerals interlayers and on the external basal planes of clay platelets. Ca
https://en.wikipedia.org/wiki/Flock%20%28birds%29
A flock is a gathering of individual birds to forage or travel collectively. Avian flocks are typically associated with migration. Flocking also offers foraging benefits and protection from predators, although flocking can have costs for individual members. Flocks are often defined as groups consisting of individuals from the same species. However, mixed flocks consisting of two or more species are also common. Avian species that tend to flock together are typically similar in taxonomy and share morphological characteristics such as size and shape. Mixed flocks offer increased protection against predators, which is particularly important in closed habitats such as forests where early warning calls play a vital importance in the early recognition of danger. The result is the formation of many mixed-species feeding flocks. Mixed flocks While mixed flocks are typically thought to be composed of two different species, it is specifically the two different behaviours of the species that compose a mixed flock. Within a mixed flock there can be two different behavioural characteristics: sally and gleaner. Sallies are individuals that act as guards of the flock and consume prey in the air during flight. On the other hand, gleaners are those that consume prey living within vegetation. Studies have shown that as resources in the aerial environment increase, the flock will possess more sallies than gleaners. This has been shown to occur during forest fires in which insects have been flushed from vegetation, however this can also be done by the gleaners. When gleaners obtain meals from vegetation it causes the other prey within the vegetation to be flushed out into the aerial environment. It is through this specific behaviour of feeding among vegetation that the gleaners indirectly increase the foraging rate of the sallies. Those birds that are more rare and therefore less abundant in an environment are more likely to perform in this mixed flock behaviour. Despite the fact
https://en.wikipedia.org/wiki/Without%20loss%20of%20generality
Without loss of generality (often abbreviated to WOLOG, WLOG or w.l.o.g.; less commonly stated as without any loss of generality or with no loss of generality) is a frequently used expression in mathematics. The term is used to indicate the assumption that follows is chosen arbitrarily, narrowing the premise to a particular case, but does not affect the validity of the proof in general. The other cases are sufficiently similar to the one presented that proving them follows by essentially the same logic. As a result, once a proof is given for the particular case, it is trivial to adapt it to prove the conclusion in all other cases. In many scenarios, the use of "without loss of generality" is made possible by the presence of symmetry. For example, if some property P(x,y) of real numbers is known to be symmetric in x and y, namely that P(x,y) is equivalent to P(y,x), then in proving that P(x,y) holds for every x and y, one may assume "without loss of generality" that x ≤ y. There is no loss of generality in this assumption, since once the case x ≤ y ⇒ P(x,y) has been proved, the other case follows by interchanging x and y : y ≤ x ⇒ P(y,x), and by symmetry of P, this implies P(x,y), thereby showing that P(x,y) holds for all cases. On the other hand, if neither such a symmetry nor another form of equivalence can be established, then the use of "without loss of generality" is incorrect and can amount to an instance of proof by example – a logical fallacy of proving a claim by proving a non-representative example. Example Consider the following theorem (which is a case of the pigeonhole principle): A proof: The above argument works because the exact same reasoning could be applied if the alternative assumption, namely, that the first object is blue, were made, or, similarly, that the words 'red' and 'blue' can be freely exchanged in the wording of the proof. As a result, the use of "without loss of generality" is valid in this case. See also Up to Mat
https://en.wikipedia.org/wiki/48%20%28number%29
48 (forty-eight) is the natural number following 47 and preceding 49. It is one third of a gross, or four dozens. In mathematics Forty-eight is the double factorial of 6, a highly composite number. Like all other multiples of 6, it is a semiperfect number. 48 is the second 17-gonal number. 48 is the smallest number with exactly ten divisors, and the first multiple of 12 not to be a sum of twin primes. The Sum of Odd Anti-Factors of 48 = number * (n/2) where n is an Odd number. So, 48 is an Odd Anti-Factor Hemiperfect Number. Other such numbers include 6048, 38688, 82132, 975312, etc. Odd Anti-Factors of 48 = 5, 19 Sum of Odd Anti-Factors = 5 + 19 = 24 = 48 * 1/2 There are 11 solutions to the equation φ(x) = 48, namely 65, 104, 105, 112, 130, 140, 144, 156, 168, 180 and 210. This is more than any integer below 48, making 48 a highly totient number. Since the greatest prime factor of 482 + 1 = 2305 is 461, which is clearly more than twice 48, 48 is a Størmer number. 48 is a Harshad number in base 10. It has 24, 2, 12, and 4 as factors. In science The atomic number of cadmium. The number of Ptolemaic constellations. The number of symmetries of a cube. Astronomy Messier object M48, a magnitude 5.5 open cluster in the constellation Hydra. The New General Catalogue object NGC 48, a barred spiral galaxy in the constellation Andromeda. In religion The prophecies of 48 Jewish prophets and 7 prophetesses were recorded in the Tanakh for posterity. According to the Mishnah, Torah wisdom is acquired via 48 ways (Pirkei Avoth 6:6). In Buddhism, Amitabha Buddha had made 48 great vows and promises to provide ultimate salvation to countless beings through countless eons, with benefits said to be available merely by thinking about his name with Nianfo practice. He is thus hailed as "King of Buddhas" through such skillful compassion and became a popular and formal refuge figure in Pureland Buddhism. In music Johann Sebastian Bach's Well-Tempered Clavier is informa
https://en.wikipedia.org/wiki/Coir
Coir (), also called coconut fibre, is a natural fibre extracted from the outer husk of coconut, and used in products such as floor mats, doormats, brushes, and mattresses. Coir is the fibrous material found between the hard, internal shell and the outer coat of a coconut. Other uses of brown coir (made from ripe coconut) are in upholstery padding, sacking and horticulture. White coir, harvested from unripe coconuts, is used for making finer brushes, string, rope and fishing nets. It has the advantage of not sinking, so can be used in long lengths in deep water without the added weight dragging down boats and buoys. Coir must not be confused with coir pith, which is the powdery and spongy material resulting from the processing of the coir fibre. Coir fibre is locally named 'coprah' in some countries, adding to confusion. Pith is chemically similar to coir, but contains much shorter fibers. The name coco peat may refer either to coir or the pith or a mixture, as both have good water-retaining properties as a substitute for peat. History The name coir comes from கயிறு (kayiru), കയർ (kayar), the Tamil and Malayalam words respectively for cord or rope (traditionally, a kind of rope is made from the coconut fibre). Ropes and cordage have been made from coconut fibre since ancient times. The Austronesian peoples, who first domesticated coconuts, used coconut fibre extensively for ropes and sennit in building houses and lashed-lug plank boats in their voyages in both the Pacific and the Indian Oceans. Later Indian and Arab navigators who sailed the seas to Malaya, China, and the Persian Gulf centuries ago also used coir for their ship ropes. Arab writers of the 11th century AD referred to the extensive use of coir for ship ropes and rigging. A coir industry in the UK was recorded before the second half of the 19th century. During 1840, Captain Widely, in co-operation with Captain Logan and Thomas Treloar, founded the known carpet firms of Treloar and Sons in Ludgate
https://en.wikipedia.org/wiki/Norton%20Safe%20Web
Norton Safe Web (sometimes abbreviated NSW) is a service developed by Symantec Corporation that is designed to help users identify malicious websites. Safe Web delivers information about websites based on automated analysis and user feedback. The software debuted as a public beta in 2008, and is now included in current versions of Norton Internet Security and Norton 360. A limited, standalone version of Safe Web, known as Safe Web Lite, is available as a freeware. Safe Web operates as a web browser plugin, and requires Internet Explorer 6 or Firefox 3 or later. The 2012 release of Safe Web Lite added Google Chrome support. Function In addition to actively crawling and analyzing web sites, Norton Safe Web relies on feedback from users and Norton Community participants. When a drive-by download occurs at a web site, the suspicious URL is automatically reported to Norton Safe Web for analysis. The reported site is rated as unsafe if the analysis confirms that the download is malicious. To ensure that its site rating accurately reflects the current state of a site, Norton Safe Web performs frequent re-analysis of Web sites. Norton Safe Web employs a site rating aging algorithm which estimates how often the safety of a particular Web site will change. Some of the factors used in this analysis include the site's rating history, the site's reputation and associations, the number and types of threats detected on the site, the number of submissions received from Norton clients, and site traffic. In other words, unsafe sites that are more likely to have been cleaned up are re-analyzed often while those that might take longer to remove detected threats are re-analyzed less frequently. User reviews are also accepted, with contributors ranked by reputation. Should a site owner dispute the ranking of their site, they can submit a request for re-evaluation after completing a validation process. Critics Norton Safe Web is complained about by many users/web administrators as we
https://en.wikipedia.org/wiki/Compaq%20Deskpro%20386
The Deskpro 386 is a line of desktop computers in Compaq's Deskpro range of IBM PC compatibles. The computers feature Intel's 32-bit 80386 microprocessor. Introduced in September 1986, the Deskpro 386 is the first implementation of the 80386 processor in a computer system for sale to the public. It also marks the first time that a major component of the IBM Personal Computer de facto standard was updated by a company other than IBM themselves—in this case, upgrading from the 80286 processor of the Personal Computer/AT. The initial models of the Deskpro 386 were developed by a team of 250 people, led by Gary Stimac. It was released to high praise in the technology press and widespread adoption in enterprise and scientific engineering. Compaq continued releasing updated models of the Deskpro 386 as newer revisions of the 386 chip were introduced by Intel. Specifications The Deskpro 386 line features the Industry Standard Architecture (ISA) bus identical to that of the IBM Personal Computer/AT. While the Personal Computer/AT has an 16-bit Intel 80286 microprocessor, the Deskpro 386 features Intel's then-cutting-edge 32-bit 80386 processor. The initial three models in the Deskpro 386 line—the Deskpro 386 Model 40, the Deskpro 386 Model 70, and the Deskpro 386 Model 130—differ only in the amount of storage in the included hard disk drives and in the number of ISA expansion slots on their motherboards. The models otherwise all come with at least 1 MiB of RAM and a 16-MHz Intel 80386 microprocessor. The Model 40 is equipped with a 40 MB ESDI hard drive and features six ISA expansion slots—three eight-bit slots and three sixteen-bit slots. The Models 70 and 130 are equipped with 70 MB and 130 MB ESDI hard drives, respectively; both feature five expansion slots—three eight-bit slots and two sixteen-bit slots. Externally, the design of the Deskpro 386's case is identical to that of its predecessors, the original 8088-equipped Deskpro and the 80286-equipped Deskpro 286. Ea
https://en.wikipedia.org/wiki/Teleadministration
Teleadministration is based on the concept that documents in electronic format have legal value. Administrative informatics is not new, but for many years it was merely Information Technology applied to legal documents, that is, the reproduction of paper-based legal documents into electronic file systems. Instead, Teleadministration turns this approach into its head. It is based on research conducted in 1978, the year when, at a conference promoted by the Court of Cassation, Giovanni Duni launched the then-futuristic idea that an electronic document could have legal value. 1978 was also the year in which the first research on digital signatures (RSA) was published in the United States, yet it would take more than twenty-five years for jurists and mathematicians to start working together. For many years, and even before 1978, IT helped Public Administration but kept a “safe distance”, assuming that the ‘sacred nature’ of the Law demanded the use of pen and paper. Information Technology merely managed and filed copies of legal documents: it was known as “parallel IT”, since it was an accessory to the activity with formal value, the one based on pen and paper. Thus, the logical, legal and material premise of Teleadministration is the conferment of legal value to IT documents. Origins and terminology In Italy, the linguistic expression teleamministrazione was first used in 1991 at the Roman ‘La Sapienza’ university, during a conference organised by the Court of Cassation, in which it was said that: «the new system of administrative information technology is called “teleadministration” because all the work of the Public Administration will be carried out through devices, that could also be computers, linked to the central server through a network.» Teleadministration was indeed considered a type of teleworking. With Teleadministration, administrative procedures become electronic administrative procedures and, more specifically, those that are initiated by a party
https://en.wikipedia.org/wiki/Concurrency%20and%20Coordination%20Runtime
Concurrency and Coordination Runtime (CCR) is an asynchronous programming library based on .NET Framework from Microsoft distributed with Microsoft Robotics Developer Studio (MRDS). Even though it comes with MRDS, it is not limited to modelling robotic behavior but can be used to express asynchronous behavior in any application. CCR runtime includes a Dispatcher class that implements a Thread pool, with a fixed number of threads, all of which can execute simultaneously. Each dispatcher includes a queue (called DispatcherQueue) of delegates, which represent the entry point to a procedure (called work item) that can be executed asynchronously. The work items are then distributed across the threads for execution. A dispatcher object also contains a generic Port which is a queue where the result of the asynchronous execution of a work item is put. Each work item can be associated with a ReceiverTask object which consumes the result for further processing. An Arbiter manages the ReceiverTask and invokes them when the result they are expecting is ready and put on the Port queue. In May 2010, the CCR was made available along with the entire Robotics Developer Studio in one package, for free. Microsoft Robotics Developer Studio 2008 R3. CCR was last updated in RDS R4 in 2012. It is no longer under development. Asynchronous programming is now supported in Visual Studio languages such as C# through built-in language features. See also Parallel Extensions Joins Microsoft Robotics Developer Studio
https://en.wikipedia.org/wiki/Sex%20effects%20of%20water%20pollution
Sex is influenced by water pollutants that are encountered in everyday life. These sources of water can range from the simplicity of a water fountain to the entirety of the oceans. The pollutants within the water range from endocrine disruptor chemicals (EDCs) in birth control to Bisphenol A (BPA). Foreign substances such as chemical pollutants that cause an alteration of sex have been found in growing prevalence in the circulating waters of the world. These pollutants have affected not only humans, but also animals in contact with the pollutants. Endocrine disruptor chemicals Endocrine disruptor chemicals (EDCs) are a type of chemical that directly influences sex hormones. They have acquired these names due to the fact that they are anti-estrogens and anti-androgens. By inhibiting the function of these hormones, fertility decreases, and an imbalance of such hormones has been shown to cause feminizing effects in males. This is not only a human issue, but has become increasingly noticeable in fish populations worldwide. Scientists believe that these chemicals present in the water supply leads to increasing feminizing effects in male fish. Estrogens accumulate in body fat and tissue, and because of the cycle of the food chain, the artificial estrogens/EDCs bioaccumulate as they rise up the different levels of the food chain. EDCs are present in the environment, whether naturally or artificially. Although the EDCs from birth control are obviously causing a great effect on the humans, it turns out that, in the United States, the estrogens given to livestock are even more prevalent. Pollutants and their source of origin Pharmaceuticals Sex-altering pollutants come from many sources. One source that is becoming more visible is water pollution through pharmaceuticals. Pharmaceutical products may contain microscopic pollutants that imitate the chemical structure of hormones found in living organisms. These compounds are called Endocrine Disrupting Chemicals. They usual
https://en.wikipedia.org/wiki/Karen%20Yeats
Karen Amanda Yeats (born 1980) is a Canadian mathematician and mathematical physicist whose research connects combinatorics to quantum field theory. She holds the Canada Research Chair in Combinatorics in Quantum Field Theory at the University of Waterloo. Biography Yeats is from Halifax, Nova Scotia. As an undergraduate at the University of Waterloo, she won an honourable mention for the 2003 Morgan Prize for her research in number theory, the theory of Lie groups, and non-standard models of arithmetic. She graduated in 2003, and went to Boston University for graduate school, where she completed her Ph.D. in 2008. Her dissertation, Growth Estimates for Dyson-Schwinger Equations, was supervised by Dirk Kreimer. In 2016 she was awarded a Humboldt Fellowship to visit Kreimer at the Humboldt University of Berlin. Yeats is the author of the books Rearranging Dyson–Schwinger Equations (Memoirs of the American Mathematical Society, 2011) and A Combinatorial Perspective on Quantum Field Theory (Springer, 2017).
https://en.wikipedia.org/wiki/Dip%20reader
A DIP reader (Document Insertion Processor) is an electronic device for reading an electronically encoded card that is inserted and then removed from the device. A typical dip reader is used for reading credit cards where the data are either encoded on a magnetic stripe or an internal computer chip. The magnetic stripe on a card is typically read as the card is extracted. If the card is a smart card, then the data transfer typically takes place when the card is fully inserted. In this case, the card is held while data transfer is taking place.
https://en.wikipedia.org/wiki/Spike%20sorting
Spike sorting is a class of techniques used in the analysis of electrophysiological data. Spike sorting algorithms use the shape(s) of waveforms collected with one or more electrodes in the brain to distinguish the activity of one or more neurons from background electrical noise. Neurons produce action potentials that are referred to as 'spikes' in laboratory jargon. Frequently this term is used for electrical signals recorded in the vicinity of individual neurons with a microelectrode (exception: 'spikes' in EEG recordings). In these recordings action potentials appear as sharp spikes (deviations from the baseline). These extracellular electrodes pick up all the components constituting the field at the point of its contact. This includes the component due to the synaptic currents and the action potentials. The synaptic currents have slower time course and the spikes have faster time course. They are thus easily separated by filtering: highpass for spikes and low pass for the synaptic mechanisms. The component of the field due to the synaptic mechanism is referred to as the local field potential (LFP). Spike sorting refers to the process of assigning spikes to different neurons. The background to this is that the exact time course of a spike event as recorded by the electrode depends on the size and shape of the neuron, the position of the recording electrode relative to the neuron, etc. These electrodes, positioned outside of the cells in the tissue, however, often 'see' the spikes generated by several neurons in their vicinity. Since the spike shapes are unique and quite reproducible for each neuron they can be used to distinguish spikes produced by different neurons, i.e. to separate the activity produced by each. Technically this is often achieved based on different sizes of the spikes (simple but inaccurate version) or more sophisticated analyses which make use of the entire waveform of the spikes. The techniques often use tools such as principal components
https://en.wikipedia.org/wiki/International%20Bibliography%20of%20the%20Social%20Sciences
The International Bibliography of the Social Sciences (IBSS) is a bibliography for social science and interdisciplinary research. The database focuses on the social science disciplines of anthropology, economics, politics and sociology, and related interdisciplinary subjects, such as development studies, human geography and environment and gender studies. It was established in 1951 and prepared by the Fondation Nationale des Sciences Politiques in Paris. Production was transferred to the London School of Economics in 1989, and then to ProQuest in 2010.
https://en.wikipedia.org/wiki/Nova%20%28American%20TV%20program%29
Nova (stylized as NOVΛ) is an American popular science television program produced by WGBH in Boston, Massachusetts, since 1974. It is broadcast on PBS in the United States, and in more than 100 other countries. The program has won many major television awards. Nova often includes interviews with scientists doing research in the subject areas covered and occasionally includes footage of a particular discovery. Some episodes have focused on the history of science. Examples of topics covered include the following: Colditz Castle, the Drake equation, elementary particles, the 1980 eruption of Mount St. Helens, Fermat's Last Theorem, the AIDS epidemic, global warming, moissanite, Project Jennifer, storm chasing, Unterseeboot 869, Vinland, Tarim mummies, and the COVID-19 pandemic. The Nova programs have been praised for their pacing, writing, and editing. Websites that accompany the segments have also won awards. Episodes History Nova was first aired on March 3, 1974. The show was created by Michael Ambrosino, inspired by the BBC 2 television series Horizon, which Ambrosino had seen while working in the UK. In the early years, many Nova episodes were either co-productions with the BBC Horizon team, or other documentaries originating outside of the United States, with the narration re-voiced in American English. Of the first 50 programs, only 19 were original WGBH productions, and the first Nova episode, "The Making of a Natural History Film", was originally an episode of Horizon that premiered in 1972. The practice continues to this day. All the producers and associate producers for the original Nova teams came from either England (with experience on the Horizon series), Los Angeles or New York. Ambrosino was succeeded as executive producer by John Angier, John Mansfield, and Paula S. Apsell, acting as senior executive producer. Reception Rob Owen of Pittsburgh Post-Gazette wrote, "Fascinating and gripping." Alex Strachan of Calgary Herald wrote,"TV for people w
https://en.wikipedia.org/wiki/University%20of%20Toronto%20Department%20of%20Mathematics
The University of Toronto Department of Mathematics is an academic department within the Faculty of Arts and Science at the University of Toronto. It is located at the university's main campus at the Bahen Centre for Information Technology. The University of Toronto was ranked first in Canada for Mathematics in 2018 by the QS World University Rankings, the Times Higher Education World University Rankings, and the Maclean's University Rankings. History For most of the second half of the 19th century, the University of Toronto was the only English-language university in Canada to offer programs with specializations, one being in mathematics and natural philosophy. The university launched its mathematics program in 1877, which became a model for the rest of Canada during the first half of the 20th century. The Mathematical and Physical Society was founded in 1882 as a mathematics student society. In the early 20th century, the department became the first in North American to explore the field of actuarial science. At the same time, the University of Toronto's mathematics department increasingly took the lead on mathematical research in Canada. Faculty member John Charles Fields, appointed professor in 1902, was perhaps the most important in developing research at Toronto. Fields organized the 1924 International Congress of Mathematicians held in Toronto, and would later found the Fields Medal. Fields's student, Samuel Beatty, was the first mathematics Ph.D. in Canada, obtaining his degree in 1915 (Beatty would later serve as head of the mathematics department and first president of the Canadian Mathematical Society in 1945). In the next twenty years, Toronto was to produce eight doctorates in mathematics, two of them women. The Department's competitive mathematics team, consisting of Irving Kaplansky, Nathan Mendelsohn and John Coleman, won first place in the first year of the William Lowell Putnam Mathematical Competition in 1938. While competition rules prevente
https://en.wikipedia.org/wiki/Higgs%20sector
In particle physics, the Higgs sector is the collection of quantum fields and/or particles that are responsible for the Higgs mechanism, i.e. for the spontaneous symmetry breaking of the Higgs field. The word "sector" refers to a subgroup of the total set of fields and particles. See also Higgs boson Hidden sector
https://en.wikipedia.org/wiki/Bacon%20jam
Bacon jam is a bacon-based relish, similar to the Austrian starter Verhackertes. It is made through a process of slow cooking the bacon, along with onions, vinegar, brown sugar and spices, before mixing in a food processor. In 2015, Martin and Suzie Cowley of Wales claimed to have invented Bacon Jam, however, Chef Mike Oraschewsky stated they started making Bacon Jams since 2013. Bacon jam, like fruit jams, requires a certain level of sugars to be officially labelled 'jam'. Recipe Bacon jam is made by slow cooking a combination of bacon, onions, brown sugar and vinegar, then placing the mixture in a food processor and putting it into jars. Variations on this recipe include altering the cooking time between two and six hours, and adding other ingredients such as maple syrup, garlic, a variety of spices and bourbon. Ingredients: 1 lb. bacon, cut into 1" pieces 1 onion, finely chopped 4 shallots, minced 2 cloves garlic, minced 1/2 c. brown sugar 1/4 c. maple syrup 1/3 c. apple cider vinegar 1 tsp. chili powder Verhackert Without the sweeteners the recipe bears some similarity to the Austrian dish, Verhackert. Verhackert is a spread of minced bacon, combined with garlic and salt. A traditional dish, the preparation of bacon takes place over two months, which includes freezing the meat two to three times. Once the meat is ready, it is minced with the other ingredients and pressed into a terrine. Verhackert is served cold with bread as an appetizer. Notable producers Skillet Street Food, a gourmet burger van in Seattle. The Bacon Jams, a gourmet food producer in the Philadelphia area, which sells at festivals and nationwide online. Martin and Suzie Cowley, who run a fine food business in Rhondda, South Wales, introduced a variant of bacon jam containing Jack Daniel's in 2015. See also List of spreads
https://en.wikipedia.org/wiki/Q-category
In mathematics, a Q-category or almost quotient category is a category that is a "milder version of a Grothendieck site." A Q-category is a coreflective subcategory. The Q stands for a quotient. The concept of Q-categories was introduced by Alexander Rosenberg in 1988. The motivation for the notion was its use in noncommutative algebraic geometry; in this formalism, noncommutative spaces are defined as sheaves on Q-categories. Definition A Q-category is defined by the formula where is the left adjoint in a pair of adjoint functors and is a full and faithful functor. Examples The category of presheaves over any Q-category is itself a Q-category. For any category, one can define the Q-category of cones. There is a Q-category of sieves.
https://en.wikipedia.org/wiki/Scale%20of%20chords
A scale of chords may be used to set or read an angle in the absence of a protractor. To draw an angle, compasses describe an arc from origin with a radius taken from the 60 mark. The required angle is copied from the scale by the compasses, and an arc of this radius drawn from the sixty mark so it intersects the first arc. The line drawn from this point to the origin will be at the target angle. Mathematics A chord is a line drawn between two points on the circumference of a circle. Look at the centre point of this line. For a circle of radius , each half will be so the chord will be . The line of chords scale represents each of these values linearly on a scale running from 0 to 60. Availability It appears on Gunter's scale and the Foster Serle dialing scales. The commercial company Stanley marketed a metal version (Stanley 60R Line of Chords Rule) in 2015. See also Ptolemy's table of chords
https://en.wikipedia.org/wiki/James%20F.%20Gibbons
James F. "Jim" Gibbons (born September 19, 1931) is an American professor and academic administrator. He is credited (together with William Shockley) with starting the semiconductor device fabrication laboratory at Stanford University that enabled the semiconductor industry and created Silicon Valley. Gibbons is also credited for inventing Tutored Video Instruction, which is widely used at Stanford University and its Stanford Instructional Television Network. The Tutored Video Instruction is used to educate engineers and non students who are in need via SERA Learning Technologies (which Gibbons founded). Gibbons was elected a member of the National Academy of Engineering in 1974 for leadership as a teacher, author, and researcher in semiconductor electronics. Early life James F. Gibbons was born in Leavenworth, Kansas on September 19, 1931, to Clifford and Mary Gibbons. His father was a guard at United States Penitentiary, Leavenworth, until Gibbons was about eight years old. At that time, his father was transferred to a minimum security prison in Texarkana, Texas. Gibbons spent his middle and high school years there, until he went off to college. Higher education Gibbons left Texas to pursue his undergraduate degree in electrical engineering at Northwestern University chosen due to receiving a partial scholarship from Northwestern, Northwestern's proximity to Chicago and the jazz music scene there (Gibbons played trombone and was also pondering a possible musical career), and also due to Northwestern's co-op requirement. Gibbons co-oped at Tungstal, where he worked on vacuum tubes being used in televisions. In 1953, after five years (due to the mandatory co-op), Gibbons finished his B.S. degree in Electrical Engineering at Northwestern University in 1953. He also earned a National Science Foundation fellowship from his efforts at Northwestern, which was able to be used at any school across the United States. After discussions with his Northwestern advisor
https://en.wikipedia.org/wiki/Quokkapox%20virus
Quokkapox virus (QPV), also known as quokka poxvirus, marsupial papillomavirus, or marsupialpox virus, is a dsDNA virus that causes quokkapox. It is unclear whether this virus is its own species or a member of another species. It primarily infects the quokka, which is one of only four macropodid marsupials to get pox lesions. The lesions can mainly be seen on the tail, and can be up to in diameter. Because the quokka host primarily lives on isolated islands in Western Australia, the range of the virus is limited as well. It was first described in 1972 from samples taken on Rottnest Island.
https://en.wikipedia.org/wiki/Idealizer
In abstract algebra, the idealizer of a subsemigroup T of a semigroup S is the largest subsemigroup of S in which T is an ideal. Such an idealizer is given by In ring theory, if A is an additive subgroup of a ring R, then (defined in the multiplicative semigroup of R) is the largest subring of R in which A is a two-sided ideal. In Lie algebra, if L is a Lie ring (or Lie algebra) with Lie product [x,y], and S is an additive subgroup of L, then the set is classically called the normalizer of S, however it is apparent that this set is actually the Lie ring equivalent of the idealizer. It is not necessary to specify that [S,r] ⊆ S, because anticommutativity of the Lie product causes [s,r] = −[r,s] ∈ S. The Lie "normalizer" of S is the largest subring of L in which S is a Lie ideal. Comments Often, when right or left ideals are the additive subgroups of R of interest, the idealizer is defined more simply by taking advantage of the fact that multiplication by ring elements is already absorbed on one side. Explicitly, if T is a right ideal, or if L is a left ideal. In commutative algebra, the idealizer is related to a more general construction. Given a commutative ring R, and given two subsets A and B of a right R-module M, the conductor or transporter is given by . In terms of this conductor notation, an additive subgroup B of R has idealizer . When A and B are ideals of R, the conductor is part of the structure of the residuated lattice of ideals of R. Examples The multiplier algebra M(A) of a C*-algebra A is isomorphic to the idealizer of π(A) where π is any faithful nondegenerate representation of A on a Hilbert space H. Notes
https://en.wikipedia.org/wiki/Java%20Desktop%20System
Java Desktop System, briefly known as OpenSolaris Desktop, is a legacy desktop environment developed first by Sun Microsystems and then by Oracle Corporation after the 2010 Oracle acquisition of Sun. Java Desktop System is available for Solaris and was once available for Linux. The Linux version was discontinued after Solaris was released as open source software in 2005. Java Desktop System aims to provide a system familiar to the average computer user with a full suite of office productivity software such as an office suite, a web browser, email, calendaring, and instant messaging. Despite being known as the Java Desktop System, it is not actually written in Java. Rather, it is built around a modified version of GNOME along with other common free software projects, which are written mostly in C and C++. The name reflected Sun's promotion of the product as an outlet for corporate users to deploy software written for the Java platform. Versions Sun first bundled a preview release of GNOME 1.4 on a separate CD for Solaris 8. JDS version 2 included: Java GNOME (using the Blueprint theme) StarOffice Mozilla Evolution MP3 and CD player Java Media Framework's Java Media Player Gaim multi-service instant messaging RealPlayer JDS Release 2 was available for Solaris and for the SuSE-based Linux distribution. JDS Release 3 was released in 2005. It was included with Solaris 10 — upon installation of Solaris, one has the choice of using either the CDE or JDS. It was based on GNOME 2.6 and available only for the Solaris 10 platform. OpenSolaris Desktop OpenSolaris received its own version of the Java Desktop System. OpenSolaris Desktop was tied to the OpenSolaris operating system, and did not have its own release schedule. OpenSolaris Desktop 01 (released October 28, 2005) was based on GNOME 2.10 and OpenSolaris Desktop 02 (released December 23, 2005) was based on GNOME 2.12. The last version was released with the release of OpenSolaris 2009.6, and was based on Gnome 2.
https://en.wikipedia.org/wiki/Masked-man%20fallacy
In philosophical logic, the masked-man fallacy (also known as the intensional fallacy or epistemic fallacy) is committed when one makes an illicit use of Leibniz's law in an argument. Leibniz's law states that if A and B are the same object, then A and B are indiscernible (that is, they have all the same properties). By modus tollens, this means that if one object has a certain property, while another object does not have the same property, the two objects cannot be identical. The fallacy is "epistemic" because it posits an immediate identity between a subject's knowledge of an object with the object itself, failing to recognize that Leibniz's Law is not capable of accounting for intensional contexts. Examples The name of the fallacy comes from the example: Premise 1: I know who Flint is. Premise 2: I do not know who the masked man is. Conclusion: Therefore, Flint is not the masked man. The premises may be true and the conclusion false if Flint is the masked man and the speaker does not know that. Thus the argument is a fallacious one. In symbolic form, the above arguments are Premise 1: I know who X is. Premise 2: I do not know who Y is. Conclusion: Therefore, X is not Y. Note, however, that this syllogism happens in the reasoning by the speaker "I"; Therefore, in the formal modal logic form, it'll be Premise 1: The speaker believes he knows who X is. Premise 2: The speaker believes he does not know who Y is. Conclusion: Therefore, the speaker believes X is not Y. Premise 1 is a very strong one, as it's logically equivalent to . It's very likely that this is a false belief: is likely a false proposition, as the ignorance on the proposition doesn't imply the negation of it is true. Another example: Premise 1: Lois Lane thinks Superman can fly. Premise 2: Lois Lane thinks Clark Kent cannot fly. Conclusion: Therefore Superman and Clark Kent are not the same person. Expressed in doxastic logic, the above syllogism is: Premise 1: Premise 2: C
https://en.wikipedia.org/wiki/Arab%20Institute%20for%20Training%20and%20Research%20in%20Statistics
The Arab Institute for Statistics (), formally the Arab Institute for Training and Research in Statistics (AITRS) () is an intergovernmental statistical institute serving the National Statistical Offices in all Arab League countries established in 1971 by the United Nations Development Programme (UNDP) under the name "Regional Institute for training and Research in Statistics for the Near East". Board of trustees The Board of Trustees is composed of the heads of the national statistical offices in all Arab League countries. They meet once per year. See also Arab League Arab Fund for Economic and Social Development (AFESD) Bloudan Conference (1937) Council of Arab Economic Unity (CAEU) General Union of Chambers of Commerce, Industry and Agriculture for Arab Countries International Confederation of Arab Trade Unions List of national and international statistical services External links Arab Institute for Training and Research in Statistics (official site). The League of Arab States United Nations Statistics Division SESRIC - Statistical, Economic and Social Research and Training Centre for Islamic Countries FAO Regional Office for Near East and North Africa Arab League International research institutes for mathematics Statistics education
https://en.wikipedia.org/wiki/Hartle%E2%80%93Thorne%20metric
The Hartle–Thorne metric is a spacetime metric in general relativity that describes the exterior of a slowly and rigidly rotating, stationary and axially symmetric body. It is an approximate solution of the vacuum Einstein equations. The metric was found by James Hartle and Kip Thorne in the 1960s to study the spacetime outside neutron stars, white dwarfs and supermassive stars. It can be shown that it is an approximation to the Kerr metric (which describes a rotating black hole) when the quadrupole moment is set as , which is the correct value for a black hole but not, in general, for other astrophysical objects. Metric Up to second order in the angular momentum , mass and quadrupole moment , the metric in spherical coordinates is given by where See also Kerr metric
https://en.wikipedia.org/wiki/Marcel%20Vogel
Marcel Joseph Vogel (April 14, 1917 – February 12, 1991) was a research scientist working at the IBM San Jose Research Center for 27 years. He is sometimes referred to as Dr. Vogel, although this title was based on an honorary degree, not a Ph.D. Later in his career, he became interested in various theories of quartz crystals and other occult and esoteric fields of study. Mainstream scientific work It is claimed that Vogel started his research into luminescence while he was still in his teens. This research eventually led him to publish his thesis, Luminescence in Liquids and Solids and Their Practical Application, in collaboration with University of Chicago's Dr. Peter Pringsheim in 1943. Two years after the publication, Vogel incorporated his own company, Vogel Luminescence, in San Francisco. For the next decade the firm developed a variety of new products: fluorescent crayons, tags for insecticides, a black light inspection kit to determine the secret trackways of rodents in cellars from their urine and the psychedelic colors popular in "new age" posters. In 1957, Vogel Luminescence was sold to Ultra Violet Products and Vogel joined IBM as a full-time research scientist. He retired from IBM in 1984. In 1977 and 1978, Vogel participated in experiments with the Markovich Tesla Electrical Power Source, referred to as MTEPS, that was built by Peter T. Markovich. He received 32 patents for his inventions up through his tenure at IBM. Among these was the magnetic coating for the 24" hard disk drive systems still in use. His areas of expertise, besides luminescence, were phosphor technology, magnetics and liquid crystal systems. At Vogel's February 14, 1991 funeral, IBM researcher and Sacramento, California physician Bernard McGinity, M.D. said of him, "He made his mark because of the brilliance of his mind, his prolific ideas, and his seemingly limitless creativity." Esoteric and occult studies Crystals Vogel was a proponent of crystal healing, and believed cut
https://en.wikipedia.org/wiki/Biodiversity%20of%20Assam
The biodiversity of Assam (), a state in North-East India, makes it a biological hotspot with many rare and endemic plant and animal species. The greatest success in recent years has been the conservation of the Indian rhinoceros at the Kaziranga National Park, but a rapid increase in human population in Assam threatens many plants and animals and their natural habitats. The rhinoceros, tiger, deer or chital / futukihorina (Axis axis), swamp deer or dolhorina (Cervus duvauceli duvauceli), clouded leopard (Neofelis nebulosa), hoolock gibbon, pygmy hog or nol-gahori (Porcula salvania), hispid hare, golden langur (Trachypithecus geei), golden cat, giant civet, binturong, hog badger, porcupine, and civet are found in Assam. Moreover, there are abundant numbers of Gangetic dolphins, mongooses, giant squirrels and pythons. The largest population of wild water buffalo anywhere is in Assam. The major birds in Assam include the blue-throated barbet or hetuluka (Megalaima asiatica), white-winged wood duck or deuhnah (Asarcornis scultulata), Pallas's fish eagle or kuruwa (Haliaeetus leucoryphus), great pied hornbill or rajdhonesh (Buceros bicornis homrai), Himalayan golden-backed three-toed wood-pecker or barhoituka (Dinopium shorii shorii), and migratory pelican. Assam is also known for orchids and for valuable plant species and forest products. Protected areas in Assam There are several protections in Assam, including several national parks, in particular in the Brahmaputra Valley. National parks Manas National Park (560 km2) Kaziranga National Park (320 km2) Orang National Park (110 km2) Nameri National Park (90 km2) Dibru-Saikhowa National Park (490 km2) Wildlife sanctuaries Garampani Wildlife Sanctuary Laokhowa Wildlife Sanctuary Bornadi Wildlife Sanctuary Chakrashila Wildlife Sanctuary Bura Chapori Wildlife Sanctuary Pani Dihing Wildlife Sanctuary Hollongapar Wildlife Sanctuary Pobitora Wildlife Sanctuary Sonai Rupai Wildlife Sanctuary Bherjan-Bora
https://en.wikipedia.org/wiki/Herbrand%20Award
The Herbrand Award for Distinguished Contributions to Automated Reasoning is an award given by the Conference on Automated Deduction (CADE), Inc., (although it predates the formal incorporation of CADE) to honour persons or groups for important contributions to the field of automated deduction. The award is named after the French scientist Jacques Herbrand and given at most once per CADE or International Joint Conference on Automated Reasoning (IJCAR). It comes with a prize of US$1,000. Anyone can be nominated, the award is awarded after a vote among CADE trustees and former recipients, usually with input from the CADE/IJCAR programme committee. Recipients Past award recipients are: 1990s Larry Wos (1992) Woody Bledsoe (1994) John Alan Robinson (1996) Wu Wenjun (1997) Gérard Huet (1998) Robert S. Boyer and J Strother Moore (1999) 2000s William W. McCune (2000) Donald W. Loveland (2001) Mark E. Stickel (2002). Peter B. Andrews (2003) Harald Ganzinger (2004) Martin Davis (2005) Wolfgang Bibel (2006) Alan Bundy (2007) Edmund M. Clarke (2008) Deepak Kapur (2009) 2010s David Plaisted (2010) Nachum Dershowitz (2011) Melvin Fitting (2012) C. Greg Nelson (2013) Robert L. Constable (2014) Andrei Voronkov (2015) Zohar Manna and Richard Waldinger (2016) Lawrence C. Paulson (2017) Bruno Buchberger (2018) Nikolaj Bjørner and Leonardo de Moura (2019) 2020s Franz Baader (2020) Tobias Nipkow (2021) Natarajan Shankar (2022) See also List of computer science awards Jacques Herbrand Prize — by the French Academy of Sciences, for mathematics and physics
https://en.wikipedia.org/wiki/Any-angle%20path%20planning
Any-angle path planning algorithms are pathfinding algorithms that search for a Euclidean shortest path between two points on a grid map while allowing the turns in the path to have any angle. The result is a path that cuts directly through open areas and has relatively few turns. More traditional pathfinding algorithms such as A* either lack in performance or produce jagged, indirect paths. Background Real-world and many game maps have open areas that are most efficiently traversed in a direct way. Traditional algorithms are ill-equipped to solve these problems: A* with an 8-connected discrete grid graph (2D; 26 for the 3D triple cubic graph) is very fast, but only looks at paths in 45-degree increments. This behavior gives on average 8% extra path length in 2D and 13% in 3D. A quick post-smoothing step can be used to straighten (thus shorten) the jagged output, but the result is not guaranteed to be optimal as it does not look at all the possible paths. (More specifically, they cannot change what side of a blocked cell is traversed.) The advantage is that all optimizations of grid A* like jump point search will apply. A visibility graph with all the grid points can be searched with A* for the optimal solution in 2D space. However, the performance is problematic since the number of edges in a graph with vertices is . Such a graph does not always provide an optimal solution in 3D space. An any-angle path planning algorithm aims to produce optimal or near-optimal solutions while taking less time than the basic visibility graph approach. Fast any-angle algorithms take roughly the same time as a grid-based solution to compute. Definitions Taut path A path where every heading change in the path “wraps” tightly around some obstacle. For a uniform grid, only taut paths can be optimal. Single-source A path-finding problem that seeks to find the shortest path to all parts from the graph, starting from one vertex. Algorithms A*-based So far, five main any-angle
https://en.wikipedia.org/wiki/TechGig.com
TechGig.com is a competitive programming and technology community website owned by Times Internet. Overview TechGig was founded in 2010 by Times Business Solutions(A Division of Times Internet) as technology community website on competitive programming, technology jobs, webinars and tech news. Programmers can take up skill tests and mock interviews in C, C++, C#, Java, .Net, MySQL, Linux, Unix, Ajax, Python, LAMP, JSON and other technologies. TechGig launched a recruitment platform where companies can hire candidates based on their test results. The usual contest formats are – coding, MCQs, skill tests, whitepapers, and business case studies. As of July 2018, it has an active community of 2.5 million developers. Competitive programming Code Gladiators is an annual coding competition started in 2014 to identify the best coders in India. Themes of the 2018 contest were Artificial Intelligence, Machine Learning, Alexa, Big Data, Blockchain, Cloud Computing, E-commerce, Mobility, and Internet of Things. The total bounty for 2018 contest was INR 7.5 million. Geek Goddess is a coding contest for women programmers. The themes of 2018 contest were UI, IoT and Data Science with a total prize money of INR 0.75 Million. Virtual Campus League is an Inter–college coding contest to identify the best programmers & tech enthusiast students across India. Records In 2017, TechGig Code Gladiators has been declared as the largest programming event by the Guinness World Records. The Guinness officials stated that TechGig had 81,641 unique submissions from programmers and the previous record was set in 2012 by Baidu which had 30,634 entrants. The Code Gladiators competition had won the Limca Book National Record twice - for their 2015 and 2016 editions.
https://en.wikipedia.org/wiki/Olle%20H%C3%A4ggstr%C3%B6m
Olle Häggström (born 4 October 1967) is a professor of mathematical statistics at Chalmers University of Technology. Häggström earned his doctorate in 1994 at Chalmers University of Technology with Jeffrey Steif as supervisor. He became an associate professor in the same university in 1997, and professor of mathematical statistics at University of Gothenburg in 2000. In 2002 he was back at Chalmers University of Technology as professor. He mainly researches on probability theory such as Markov chains, percolation theory and other models in statistical mechanics. Awards and honors Olle Häggström has received a number of awards and prizes. These include: 2004 – Elected member 1506 of the Royal Swedish Academy of Sciences, in the Mathematics class. 2005 – Awarded the Rollo Davidson Prize. 2006 – Elected member of Royal Society of Arts and Sciences in Gothenburg. 2010 – Elected member 1581 of the Royal Swedish Academy of Engineering Sciences (IVA), in the 7:th division: VII Basic and Interdisciplinary Engineering Sciences. Here Be Dragons In 2016, Häggström published (via Oxford University Press) Here Be Dragons: Science, Technology and the Future of Humanity, an attempt to draft a road map of potential dangers that could be associated with various emerging technologies: "There is no denying that advances in science and technology have brought us prosperity and improved our lives tremendously... but there is a flip side: some of the advances that may lie ahead of us can actually make us worse off." On human enhancement, Häggström argues that any enhancement, from growth hormones to cognitive enhancement, can encourage an "arms race" in which everyone is compelled to participate for fear of falling behind: "It is hard to imagine the US silently sitting still and watching a cognitive enhancement development that can turn China into the world’s military overlords." On geoengineering, Häggström discusses a proposed form of geoengineering that involves continuously
https://en.wikipedia.org/wiki/Finite%20volume%20method%20for%20three-dimensional%20diffusion%20problem
Finite volume method (FVM) is a numerical method. FVM in computational fluid dynamics is used to solve the partial differential equation which arises from the physical conservation law by using discretisation. Convection is always followed by diffusion and hence where convection is considered we have to consider combine effect of convection and diffusion. But in places where fluid flow plays a non-considerable role we can neglect the convective effect of the flow. In this case we have to consider more simplistic case of only diffusion. The general equation for steady convection-diffusion can be easily derived from the general transport equation for property by deleting transient. General transport equation is defined as: …………………………………………….1 Where, is a conservative form of all fluid flow, is density, is a net rate of flow of out of fluid element represents convective term, is a transient term, is a rate of change of due to diffusion, is a rate of increase of due to source. Due to steady state condition transient term becomes zero and due to absence of convection convective term becomes zero, therefore steady state three- dimensional convection and diffusion equation becomes: ………………………………………………………….2 Therefore, …………………………………………………………………….3 Flow should also satisfy continuity equation therefore, ………………………………………………………………………………………………………4 To solve the problem we will follow following general steps Grid formation: 1. Divide the domain into discrete control volume. 2. Place the nodal point between end points defining the physical boundaries. Boundaries/ faces of the control volume are created midway between adjacent nodes. 3. Set up the control volume near the edge of domain such that physical as well as control volume boundaries will coincide with each other. 4. Considering a general nodal point P accompanied by six neighboring nodal point ‘E’ (which represent east), ‘W’ (which represent west), ‘N’ (which represent north), ‘S’ (which re
https://en.wikipedia.org/wiki/Ashish%20Arora
Ashish Arora is an Indian structural biologist and a senior scientist at Central Drug Research Institute. He did his postgraduate studies at Rajasthan University and post-doctoral work at the Max Planck Institute for Biophysical Chemistry, Goettingen, and University of Virginia, Charlottesville, VA, before joining the Central Drug Research Institute in 2002. He is known for his studies on Protein NMR Spectroscopy and the pathogenesis of diseases such as tuberculosis and visceral leishmaniasis, commonly known as Kala Azar and has delivered invited speeches at various seminars. The Department of Biotechnology of the Government of India awarded him the National Bioscience Award for Career Development, one of the highest Indian science awards, for his contributions to biosciences, in 2011. He is also a recipient of the 2010 Prof. B. K. Bachhawat Memorial Young Scientist Award of the National Academy of Sciences, India. Selected bibliography
https://en.wikipedia.org/wiki/Asymmetry%20of%20the%20Intertropical%20Convergence%20Zone
There are a number of explanations of the asymmetry of the Intertropical Convergence Zone (ITCZ), known by sailors as the Doldrums. Asymmetrical distribution of continents The ITCZ would be expected to overlie the geographic equator according to symmetric solar radiation. However, the ITCZ is mostly perennial in the northern hemisphere and in the eastern Pacific and Atlantic Oceans. It was originally explained by the asymmetrical distribution of continents. However, the distribution of land and ocean is severely asymmetric in the Indian Ocean, yet the ITCZ moves back and forth there between the southern and northern hemispheres. Continents surround the Indian Ocean and monsoons prevail. Where the thermocline is deeper indicates that there is a weaker interaction between atmosphere and ocean. Due to the relatively small scale and deep thermocline in the Indian Ocean, there will be less asymmetric effects. In the middle latitude Pacific and Atlantic Ocean, because of the large scale easterly wind system and the western continents boundaries, the thermocline is definitely shallower in eastern part. Thus, the asymmetry is obvious in the eastern Pacific and Atlantic Ocean. There are two factors that are acknowledged by oceanographers and meteorologists: the interactions between ocean and atmosphere and the geometries of the continents. Asymmetric SST Distribution According to observations, the Sea Surface Temperature (SST) of ITCZ in the Northern Hemisphere is higher than the same latitude in the Southern Hemisphere. The asymmetry of ITCZ is triggered by the asymmetric SST distribution, which has been verified by General Circulation Model (GCM). Wind-evaporation-SST mechanism What is more, because the Cross Equator SST Gradient (CESG) is southward, the cross equator northward wind, which decelerates trade winds north of the equator and accelerates those south of the equator due to Coriolis force, is originated. Thus the evaporation of the northern tropics is weakened,
https://en.wikipedia.org/wiki/KERNAL
KERNAL is Commodore's name for the ROM-resident operating system core in its 8-bit home computers; from the original PET of 1977, followed by the extended but related versions used in its successors: the VIC-20, Commodore 64, Plus/4, Commodore 16, and Commodore 128. Description The Commodore 8-bit machines' KERNAL consists of the low-level, close-to-the-hardware OS routines roughly equivalent to the BIOS in IBM PC compatibles (in contrast to the BASIC interpreter routines, also located in ROM) as well as higher-level, device-independent I/O functionality, and is user-callable via a jump table in RAM whose central (oldest) part, for reasons of backwards compatibility, remains largely identical throughout the whole 8-bit series. The KERNAL ROM occupies the last 8 KB of the 8-bit CPU's 64 KB address space ($E000–$FFFF). The jump table can be modified to point to user-written routines, for example to integrate a fast loader so that its fast replacement routines are used system-wide, or replacing the system text output routine with one that works in bitmapped mode rather than character mode. This use of a jump table was new to small computers at the time. The Adventure International games published for the VIC-20 on cartridge are an example of software that uses the KERNAL. Because they only use the jump table, the games can be memory dumped to disk, loaded into a Commodore 64, and run without modification. The KERNAL was initially written for the Commodore PET by John Feagans, who introduced the idea of separating the BASIC routines from the operating system. It was further developed by several people, notably Robert Russell, who added many of the features for the VIC-20 and the C64. Example A simple, yet characteristic, example of using the KERNAL is given by the following 6502 assembly language subroutine (written in ca65 assembler format/syntax): CHROUT = $ffd2 ; CHROUT is the address of the character output routine CR = $0d
https://en.wikipedia.org/wiki/RSCS
Remote Spooling Communications Subsystem or RSCS is a subsystem ("virtual machine" in VM terminology) of IBM's VM/370 operating system which accepts files transmitted to it from local or remote system and users and transmits them to destination local or remote users and systems. RSCS also transmits commands and messages among users and systems. RSCS is the software that powered the world’s largest network (or network of networks) prior to the Internet and directly influenced both internet development and user acceptance of networking between independently managed organizations. RSCS was developed by Edson Hendricks and T.C. Hartmann. Both as an IBM product and as an IBM internal network, it later became known as VNET. The network interfaces continued to be called the RSCS compatible protocols and were used to interconnect with IBM systems other than VM systems (typically MVS) and non-IBM computers. The history of this program, and its influence on IBM and the IBM user community, is described in contemporaneous accounts and interviews by Melinda Varian. Technical goals and innovations are described by Creasy and by Hendricks and Hartmann in seminal papers. Among academic users, the same software was employed by BITNET and related networks worldwide. Background RSCS arose because people throughout IBM recognized a need to exchange files. Hendricks’s solution was CPREMOTE, which he completed by mid-1969. CPREMOTE was the first example of a “service virtual machine” and was motivated partly by the desire to prove the usefulness of that concept. In 1971, Norman L. Rasmussen, Manager of IBM’s Cambridge Scientific Center (CSC), asked Hendricks to find a way for the CSC machine to communicate with machines at IBM’s other Scientific Centers. CPREMOTE had taught Hendricks so much about how a communications facility would be used and what function was needed in such a facility, that he decided to discard it and begin again with a new design. After additional iterat
https://en.wikipedia.org/wiki/Glycogenin-1
Glycogenin-1 is an enzyme that is involved in the biosynthesis of glycogen. It is capable of self-glucosylation, forming an oligosaccharide primer that serves as a substrate for glycogen synthase. This is done through an inter-subunit mechanism. It also plays a role in glycogen metabolism regulation. Recombinant human glycogenin-1 was expressed in E. coli and purified using conventional chromatography techniques. Glycogen metabolism Glycogen is a multi-branched polysaccharide. It is primary means of glucose storage in animal cells. In the human body, the two main tissues which store glycogen are liver and skeletal muscle. Glycogen is typically more concentrated in the liver, but because humans have much more muscle mass, our muscles store about three quarters of the total glycogen in our body. Location of glycogen The function of liver glycogen is to maintain glucose homeostasis, generating glucose via glycogenolysis to compensate for the decrease of glucose levels that can occur between meals. Thanks to the presence of the glucose-6-phosphatase enzyme, the hepatocytes are capable of turning glycogen to glucose, releasing it into blood to prevent hypoglycemia. In skeletal muscle, glycogen is used as an energy source for muscle contraction during exercise. The different functions of glycogen in muscle or liver make the regulation mechanisms of its metabolism differ in each tissue. These mechanisms are based mainly on the differences on structure and on the regulation of the enzymes that catalyze synthesis, glycogen synthase (GS), and degradation, glycogen phosphorylase (GF). Glycogen synthesis Glycogenin is the initiator of the glycogen biosynthesis. This protein is a glycosyl transferase that have the ability of autoglycosilation using UDP-glucose, which helps in the growth of itself until forming an oligosaccharide made by 8 glucoses. Glycogenin is an oligomer, and it's capable of interacting with several proteins. In recent years, a family of proteins ha
https://en.wikipedia.org/wiki/Parsytec
Isra Vision Parsytec AG is a company of Isra Vision, founded in 1985 as Parsytec (parallel system technology) in Aachen, Germany. Parsytec became known in the late 1980s and early 1990s as a manufacturer of transputer-based parallel systems. Products ranged from a single transputer plug-in board for the IBM PC up to large massively-parallel systems with thousands of transputers (or processors, respectively) such as the Parsytec GC. Some sources call the latter ultracomputer sized, scalable multicomputers (smC). As part of the ISRA VISION AG, today the company focuses on solutions in the machine vision and industrial image procession sector. The ISRA Parsytec products are used for quality and surface inspection especially in the metal and paper industries. History In 1985, Parsytec was founded by Falk-Dietrich Kübler, Gerhard H. Peise, and Bernd Wolff in Aachen, Germany, with an 800000 DM grant from Federal Ministry for Research and Technology (BMFT). In contrast to SUPRENUM, Parsytec directly aimed their systems (pattern recognition) at industrial applications such as surface inspection. Therefore, they not only had a substantial market share in the European academia but they could also win many industrial customers. This included many customers outside Germany. In 1988, export accounted for roughly a third of Parsytec's turnover. Turnover figures were: nil in 1985, 1.5M DM in 1986, 5.2M DM in 1988, 9M DM in 1989, and 15M DM in 1990, 17M USD in 1991. In order to focus Parsytec on research and development, ParaCom was founded to take care of the sales and marketing side of the business. Parsytec/ParaCom's headquarters were maintained in Aachen (Germany), however they had subsidiary sales offices in Chemnitz (Germany), Southampton (United Kingdom), Chicago (USA), St Petersburg (Russia) and Moscow (Russia). In Japan, the machines were sold by Matsushita. Between 1988 and 1994, Parsytec built quite an impressive range of transputer based computers having its pe
https://en.wikipedia.org/wiki/Destroyers%20II
Destroyers II is a set of miniatures for Villains and Vigilantes published by Castle Creations. Contents Destroyers II is a set of three 25mm metal figures containing the supervillains Ratman, Shapeshifter, and Behemoth. Reception W.G. Armintrout reviewed Destroyers II in Space Gamer No. 66. Armintrout commented that "Behemoth would be a great accessory for any collection. Shapeshifter and Ratman, while not of display quality, are good enough for game use. These figures are much better than they look in their pack - don't overlook this set."
https://en.wikipedia.org/wiki/PooPrints
PooPrints is a commercial service that uses DNA profiling of feces to assist with pet waste management. DNA is first collected by a cheek swab, and registered online at the DNA World Pet Registry. According to a 2012 report from Minnesota station WCCO-TV, it is "a first of its kind company". It is a division of BioPet Laboratories, located in Knoxville, Tennessee. It was started in 2008.
https://en.wikipedia.org/wiki/Numerical%20continuation
Numerical continuation is a method of computing approximate solutions of a system of parameterized nonlinear equations, The parameter is usually a real scalar, and the solution an n-vector. For a fixed parameter value , maps Euclidean n-space into itself. Often the original mapping is from a Banach space into itself, and the Euclidean n-space is a finite-dimensional Banach space. A steady state, or fixed point, of a parameterized family of flows or maps are of this form, and by discretizing trajectories of a flow or iterating a map, periodic orbits and heteroclinic orbits can also be posed as a solution of . Other forms In some nonlinear systems, parameters are explicit. In others they are implicit, and the system of nonlinear equations is written where is an n-vector, and its image is an n-1 vector. This formulation, without an explicit parameter space is not usually suitable for the formulations in the following sections, because they refer to parameterized autonomous nonlinear dynamical systems of the form: However, in an algebraic system there is no distinction between unknowns and the parameters. Periodic motions A periodic motion is a closed curve in phase space. That is, for some period , The textbook example of a periodic motion is the undamped pendulum. If the phase space is periodic in one or more coordinates, say , with a vector , then there is a second kind of periodic motions defined by for every integer . The first step in writing an implicit system for a periodic motion is to move the period from the boundary conditions to the ODE: The second step is to add an additional equation, a phase constraint, that can be thought of as determining the period. This is necessary because any solution of the above boundary value problem can be shifted in time by an arbitrary amount (time does not appear in the defining equations—the dynamical system is called autonomous). There are several choices for the phase constraint. If is a know
https://en.wikipedia.org/wiki/Rochelle%20Gutierrez
Rochelle Gutierrez is a professor of education at the University of Illinois at Urbana–Champaign. Her main focus is changing the way in which mathematics is taught to the minority and the effects of race, class and language on teaching and learning. Early life and education Gutierrez is from San Jose, California. She attended Stanford University and received her bachelor’s degree in human biology in 1990. She then moved to the University of Chicago, where she earned a master’s degree in social sciences and a PhD in education. Her doctoral research was centered on equity in teaching mathematics. Career Gutierrez has been working at the University of Illinois at Urbana–Champaign since 1996. Her main focus is on how intersectionality can play a role when learning mathematics. Some of her research is based on how to better teach underprivileged students mathematics and how teachers and professors can better assist the students. Gutierrez has also researched how mathematics can impact a student's power and place in society. On a website, Campus Reform, she is quoted as saying, "On many levels, mathematics itself operates as Whiteness. Who gets credit for doing and developing mathematics, who is capable in mathematics, and who is seen as part of the mathematical community is generally viewed as White". Awards In 2010 she was given the Outstanding Faculty Award for Service at UIUC. In 2011 Gutierrez received the Association of Mathematics Teacher Educators award, which is an organization who recognize teachers who are dedicated in improving Mathematical education. In 2016 she was awarded the Iris M. Carl Equity and Leadership Award (TODOS Mathematics). In 2017 Gutierrez received the Social Justice Award, which is given to those who spend of their time helping minorities. For the school year 2018-2019 Gutierrez received the Outstanding Undergraduate Teaching Award at the University of Illinois-Urbana.
https://en.wikipedia.org/wiki/Cystolith
Cystolith (Gr. "cavity" and "stone") is a botanical term for outgrowths of the epidermal cell wall, usually of calcium carbonate, formed in a cellulose matrix in special cells called lithocysts, generally in the leaf of plants. Cystoliths are present in certain families, including in many genera of Acanthaceae. Plants in the family Urticaceae, known as stinging nettles, also form leaf cystoliths, but only during their later flowering and seed setting stages. Other examples include Cannabis and other plants in the family Cannabaceae, which produce leaf and flower cystoliths, and Ficus elastica, the Indian rubber plant of the family Moraceae. From a 1987 article on cystolith development and structure:
https://en.wikipedia.org/wiki/TreeDL
Tree Description Language (TreeDL) is a computer language for description of strictly-typed tree data structures and operations on them. The main use of TreeDL is in the development of language-oriented tools (compilers, translators, etc.) for the description of a structure of abstract syntax trees. Tree description can be used as a documentation of interface between parser and other subsystems; a source for generation of data types representing a tree in target programming languages; a source for generation of various support code: visitors, walkers, factories, etc. TreeDL can be used with any parser generator that allows custom actions during parsing (for example, ANTLR, JavaCC). Language overview Tree description lists the node types allowed in a tree. Node types support single inheritance. Node types have children and attributes. Children must be of defined node type. Attributes may be of primitive type (numeric, string, boolean), enum type or node type. Attributes are used to store literals during tree construction and additional information gathered during tree analysis (for example, links between reference and definition, to represent higher-order abstract syntax). Operations over a tree are defined as multimethods. Advantages of this approach are described in the article Treecc: An Aspect-Oriented Approach to Writing Compilers Tree descriptions support inheritance to allow modularity and reuse of base language tree descriptions for language extensions. See also ANTLR - parser generator that offers a different approach to tree processing: tree grammars. SableCC - parser generator that generates strictly-typed abstract syntax trees. External links old TreeDL home Programming languages Domain-specific knowledge representation languages
https://en.wikipedia.org/wiki/TRIPOS
TRIPOS (TRIvial Portable Operating System) is a computer operating system. Development started in 1976 at the Computer Laboratory of Cambridge University and it was headed by Dr. Martin Richards. The first version appeared in January 1978 and it originally ran on a PDP-11. Later it was ported to the Computer Automation LSI4 and the Data General Nova. Work on a Motorola 68000 version started in 1981 at the University of Bath. MetaComCo acquired the rights to the 68000 version and continued development until TRIPOS was chosen by Commodore in March 1985 to form part of an operating system for their new Amiga computer; it was also used at Cambridge as part of the Cambridge Distributed Computing System. Students in the Computer Science department at Cambridge affectionately refer to TRIPOS as the Terribly Reliable, Incredibly Portable Operating System. The name TRIPOS also refers to the Tripos system of undergraduate courses and examinations, which is unique to Cambridge University. Influences on the Amiga computer In July 1985, the Amiga was introduced, incorporating TRIPOS in the AmigaDOS module of AmigaOS. AmigaDOS included a command-line interface and the Amiga File System. The entire AmigaDOS module was originally written in BCPL (an ancestor of the C programming language), the same language used to write TRIPOS. AmigaDOS would later be rewritten in C from AmigaOS 2.x onwards, retaining backwards compatibility with 1.x up until AmigaOS 4 (completely rewritten in C) when AmigaDOS abandoned its BCPL legacy. Features TRIPOS provided features such as pre-emptive multi-tasking (using strict-priority scheduling), a hierarchical file system and multiple command line interpreters. The most important TRIPOS concepts have been the non-memory-management approach (meaning no checks are performed to stop programs from using unallocated memory) and message passing by means of passing pointers instead of copying message contents. Those two concepts together allowed for sendi
https://en.wikipedia.org/wiki/Stumpery
A stumpery is a garden feature similar to a rockery but made from parts of dead trees. This can take the form of whole stumps, logs, pieces of bark or even worked timber such as railway sleepers or floorboards. The pieces are arranged artistically and plants, typically ferns, mosses and lichens are encouraged to grow around or on them. They provide a feature for the garden and a habitat for several types of wildlife. The first stumpery was built in 1856 at Biddulph Grange and they remained popular in Victorian Britain. A stumpery traditionally consists of tree stumps arranged upside-down or on their sides to show the root structure but logs, driftwood or large pieces of bark can also be used. The stumps can be used individually or attached together to form a structure such as a wall or arch. Stumperies can vary in size from a handful of logs to large displays containing dozens of full tree stumps. The use of storm-damaged or diseased trees is not uncommon and can save the landowner the cost of their removal. Where tree stumps are unavailable a more modern, angular look can be achieved by using railway sleepers or old oak floorboards and some companies sell waste timber or driftwood specifically for the purpose of constructing stumperies. Plants such as ferns, mosses and lichens are often encouraged to grow around and on the stumpery. Stumperies provide a home for wildlife and have been known to host stag beetles, toads and small mammals. Stumperies have been described as "Victorian horticultural oddities" and were popular features of 19th-century gardens. The reasons for their popularity vary but it may be a result of the Romantic Movement which emphasised the beauty of nature. Their popularity may also be attributed to the increasing popularity of ferns as garden plants at the time. Ferns were very fashionable and hundreds of new species were introduced to Britain from around the world. The stumpery made an ideal habitat for these shade-loving plant
https://en.wikipedia.org/wiki/Overload%20%28video%20game%29
Overload is a 3D first-person shooter video game developed and released by Revival Productions for Windows, macOS and Linux on May 31, 2018. A version for PlayStation 4 was released on October 16. It features six degrees of freedom movement in a 3D environment with zero gravity, allowing the player to move and rotate in any direction. The game is set primarily on the moons of Saturn, where facilities have sent out distress signals about the mining robots turning hostile. The game, which has been described as a 'spiritual successor' to the video games Descent and Descent II, received generally favorable reviews on release. Gameplay The gameplay of the game is similar to the Descent series. The player is tasked with controlling a gunship in zero gravity inside a variety of mining facilities and cave areas, fighting hostile worker robots (called autonomous operators in the game) and finding possible survivors in cryostasis tubes. Every level has an objective to complete, with most levels carrying over the traditional goal of destroying the reactor powering the facility and escaping before the reactor meltdown destroys the entire facility. Levels may also feature alternative objectives, such as destroying every hostile robot in a level, destroying a boss or simply finding and reaching the exit. The game in its core is a first-person shooter with a fully three-dimensional environment, but with six degrees of freedom movement in zero gravity, allowing the player to move and rotate in any direction, which demands spatial awareness skills from the players. The enemy robots share a similar movement model. To assist in navigating around the level, the player can call up a Holo-Guide, a holographic bot that can lead the player to a destination (similar to the Guide-Bot of Descent II), and a fully three-dimensionally rendered automap, based on a similar feature seen in Descent, showing the areas of the level that the player has already discovered or spotted. In order to pr
https://en.wikipedia.org/wiki/Skeleton%20%28category%20theory%29
In mathematics, a skeleton of a category is a subcategory that, roughly speaking, does not contain any extraneous isomorphisms. In a certain sense, the skeleton of a category is the "smallest" equivalent category, which captures all "categorical properties" of the original. In fact, two categories are equivalent if and only if they have isomorphic skeletons. A category is called skeletal if isomorphic objects are necessarily identical. Definition A skeleton of a category C is an equivalent category D in which no two distinct objects are isomorphic. It is generally considered to be a subcategory. In detail, a skeleton of C is a category D such that: D is a subcategory of C: every object of D is an object of C for every pair of objects d1 and d2 of D, the morphisms in D are morphisms in C, i.e. and the identities and compositions in D are the restrictions of those in C. The inclusion of D in C is full, meaning that for every pair of objects d1 and d2 of D we strengthen the above subset relation to an equality: The inclusion of D in C is essentially surjective: Every C-object is isomorphic to some D-object. D is skeletal: No two distinct D-objects are isomorphic. Existence and uniqueness It is a basic fact that every small category has a skeleton; more generally, every accessible category has a skeleton. (This is equivalent to the axiom of choice.) Also, although a category may have many distinct skeletons, any two skeletons are isomorphic as categories, so up to isomorphism of categories, the skeleton of a category is unique. The importance of skeletons comes from the fact that they are (up to isomorphism of categories), canonical representatives of the equivalence classes of categories under the equivalence relation of equivalence of categories. This follows from the fact that any skeleton of a category C is equivalent to C, and that two categories are equivalent if and only if they have isomorphic skeletons. Examples The category Set of all sets h
https://en.wikipedia.org/wiki/O-minimal%20theory
In mathematical logic, and more specifically in model theory, an infinite structure (M,<,...) that is totally ordered by < is called an o-minimal structure if and only if every definable subset X ⊆ M (with parameters taken from M) is a finite union of intervals and points. O-minimality can be regarded as a weak form of quantifier elimination. A structure M is o-minimal if and only if every formula with one free variable and parameters in M is equivalent to a quantifier-free formula involving only the ordering, also with parameters in M. This is analogous to the minimal structures, which are exactly the analogous property down to equality. A theory T is an o-minimal theory if every model of T is o-minimal. It is known that the complete theory T of an o-minimal structure is an o-minimal theory. This result is remarkable because, in contrast, the complete theory of a minimal structure need not be a strongly minimal theory, that is, there may be an elementarily equivalent structure that is not minimal. Set-theoretic definition O-minimal structures can be defined without recourse to model theory. Here we define a structure on a nonempty set M in a set-theoretic manner, as a sequence S = (Sn), n = 0,1,2,... such that Sn is a boolean algebra of subsets of Mn if A ∈ Sn then M × A and A ×M are in Sn+1 the set {(x1,...,xn) ∈ Mn : x1 = xn} is in Sn if A ∈ Sn+1 and π : Mn+1 → Mn is the projection map on the first n coordinates, then π(A) ∈ Sn. If M has a dense linear order without endpoints on it, say <, then a structure S on M is called o-minimal if it satisfies the extra axioms <li>the set  < (={(x,y) ∈ M2 : x < y}) is in S2 <li>the sets in S1 are precisely the finite unions of intervals and points. The "o" stands for "order", since any o-minimal structure requires an ordering on the underlying set. Model theoretic definition O-minimal structures originated in model theory and so have a simpler — but equivalent — definition using the language of model theory. S
https://en.wikipedia.org/wiki/Quasi-empiricism%20in%20mathematics
Quasi-empiricism in mathematics is the attempt in the philosophy of mathematics to direct philosophers' attention to mathematical practice, in particular, relations with physics, social sciences, and computational mathematics, rather than solely to issues in the foundations of mathematics. Of concern to this discussion are several topics: the relationship of empiricism (see Penelope Maddy) with mathematics, issues related to realism, the importance of culture, necessity of application, etc. Primary arguments A primary argument with respect to quasi-empiricism is that whilst mathematics and physics are frequently considered to be closely linked fields of study, this may reflect human cognitive bias. It is claimed that, despite rigorous application of appropriate empirical methods or mathematical practice in either field, this would nonetheless be insufficient to disprove alternate approaches. Eugene Wigner (1960) noted that this culture need not be restricted to mathematics, physics, or even humans. He stated further that "The miracle of the appropriateness of the language of mathematics for the formulation of the laws of physics is a wonderful gift which we neither understand nor deserve. We should be grateful for it and hope that it will remain valid in future research and that it will extend, for better or for worse, to our pleasure, even though perhaps also to our bafflement, to wide branches of learning." Wigner used several examples to demonstrate why 'bafflement' is an appropriate description, such as showing how mathematics adds to situational knowledge in ways that are either not possible otherwise or are so outside normal thought to be of little notice. The predictive ability, in the sense of describing potential phenomena prior to observation of such, which can be supported by a mathematical system would be another example. Following up on Wigner, Richard Hamming (1980) wrote about applications of mathematics as a central theme to this topic and suggest
https://en.wikipedia.org/wiki/SCOBY
Symbiotic culture of bacteria and yeast (SCOBY) is a culinary symbiotic fermentation culture (starter) consisting of lactic acid bacteria (LAB), acetic acid bacteria (AAB), and yeast which arises in the preparation of sour foods and beverages such as kombucha. Beer and wine also undergo fermentation with yeast, but the lactic acid bacteria and acetic acid bacteria components unique to SCOBY are usually viewed as a source of spoilage rather than a desired addition. Both LAB and AAB enter on the surface of barley and malt in beer fermentation and grapes in wine fermentation; LAB lowers the pH of the beer/wine while AAB takes the ethanol produced from the yeast and oxidizes it further into vinegar, resulting in a sour taste and smell. AAB are also responsible for the formation of the cellulose SCOBY. In its most common form, SCOBY is a gelatinous, cellulose-based biofilm or microbial mat found floating at the container's air-liquid interface. This bacterial cellulose mat is sometimes called a pellicle. SCOBY pellicles, like sourdough starters, can serve the purpose of continuing the fermentation process into a new vessel and reproducing the desired product. This can be attributed to SCOBY's ability to house not only the symbiotic growth, but a small amount of the previous media and product due to its ability to absorb water. SCOBYs can vary greatly in cell density within the biofilm due to fermentation conditions, leading to possible variations in the end product; numerous studies are currently taking place to determine the optimal ratio of SCOBY, if any, to liquid culture to ensure highest product consistency, as there are no standard operating procedures in place. Further information such as the organisms and culture conditions necessary to ferment and form a SCOBY, biofilm characteristics, and applications in foods and beverages with specific emphasis in kombucha can be found below. Co-culture composition and conditions Based on the desired product of the SCOBY,
https://en.wikipedia.org/wiki/Drugs%20%26%20Aging
Drugs & Aging is a monthly peer-reviewed medical journal published by Springer Nature under their Adis International imprint. It contains primarily review articles covering optimum use of drug therapies in older adults. Abstracting and indexing The journal is abstracted and indexed in: According to the Journal Citation Reports, the journal has a 2022 impact factor of 2.8.
https://en.wikipedia.org/wiki/786%20%28number%29
786 (seven hundred [and] eighty-six) is the natural number following 785 and preceding 787. In mathematics 786 is: a sphenic number. a Harshad number in bases 4, 5, 7, 14 and 16. the aliquot sum of 510. part of the 321329-aliquot tree. The complete aliquot sequence starting at 498 is: 498, 510, 786, 798, 1122, 1470, 2634, 2646, 4194, 4932, 7626, 8502, 9978, 9990, 17370, 28026, 35136, 67226, 33616, 37808, 40312, 35288, 37072, 45264, 79728, 146448, 281166, 281178, 363942, 424638, 526338, 722961, 321329, 1, 0 50 can be partitioned into powers of two in 786 different ways . 786 might be the largest n for which the value of the central binomial coefficient is not divisible by an odd prime squared. If there is a larger such number, it would have to be at least 157450 (see ). Area code 786 is a United States telephone area code in Miami-Dade County. As an overlay area code, it shares the same geographic numbering plan area with other codes for a larger pool of telephone numbers. In other fields 80786 - 7th generation x86 like Athlon and Intel Pentium 4 The USSD code 786, typically dialed as ##786# or *#786#, opens the RTN dialog on some cell phones. "RTN" is 786 when dialed on an E.161 telephone pad. In the New General Catalogue, NGC786 is a magnitude 13.5 spiral galaxy in the constellation Aries. Additionally, 786 Bredichina is an asteroid. In juggling, 786 as fourhanded Siteswap is also known as French threecount. In Islam, 786 is often used to represent the Arabic phrase Bismillah. In films The number is often featured in films, mostly due to its auspiciousness in Islamic culture. Vijay Verma's (Amitabh Bachchan) coolie number in the 1975 Hindi film Deewaar. Raja's (Rajnikanth) coolie number in the 1981 Tamil film Thee, a remake of Deewaar. Iqbal Khan's (Amitabh Bachchan) coolie number in the 1983 Hindi film Coolie. Bachchan has indicated that he believes the number is auspicious, as he survived a serious injury while wearing this number during the shoot
https://en.wikipedia.org/wiki/Harmony%20%28operating%20system%29
Harmony is an experimental computer operating system (OS) developed at the National Research Council Canada in Ottawa. It is a second-generation message passing system that was also used as the basis for several research projects, including robotics sensing and graphical workstation development. Harmony was actively developed throughout the 1980s and into the mid-1990s. History Harmony was a successor to the Thoth system developed at the University of Waterloo. Work on Harmony began at roughly the same time as that on the Verex kernel developed at the University of British Columbia. David Cheriton was involved in both Thoth and Verex, and would later go on to develop the V System at Stanford University. Harmony's principal developers included W. Morven Gentleman, Stephen A. MacKay, Darlene A. Stewart, and Marceli Wein. Early ports of the system existed for a variety of Motorola 68000-based computers, including ones using the VMEbus and Multibus backplanes and in particular the Multibus-based Chorus multiprocessor system at Waterloo. Other hosts included the Atari 520 or 1040 ST. A port also existed for the Digital Equipment Corporation VAX. Harmony achieved formal verification in 1995. Features Harmony was designed as a real-time operating system (RTOS) for robot control. It is a multitasking, multiprocessing system. It is not multi-user. Harmony provided a runtime system (environment) only; development took place on a separate system, originally an Apple Macintosh. For each processor in the system, an image is created that combines Harmony with the one multitask program for that processor at link time, an exception being a case where the kernel is programmed into a read-only memory (ROM). Although the term did not appear in the original papers, Harmony was later referred to as a microkernel. A key in Harmony is its use of the term task, which in Harmony is defined as the "unit of sequential and synchronous execution" and "the unit of resource ownership". It is
https://en.wikipedia.org/wiki/John%20Henry%20Bell
John Henry Bell (1832 – 9 September 1906) was a British medical doctor and researcher who is best known for contributing to the study of anthrax. Early life and education John Henry Bell was born in Bradford, in the northern wool-manufacturing region of England, in 1832 to Scottish parents. After leaving school aged 14, he studied medicine with a local doctor on a six-year apprenticeship. He attended Leeds Medical School, where he worked as an assistant to one of the lecturers. He completed his exams after only two years of study instead of the usual three years, passing with distinction. Career In 1857, Bell became a member of the Royal College of Surgeons of England. He was also elected to the Hey Society, and served as its president. While he was in Leeds, he became one of the first people to describe miners' nystagmus. After his time in Leeds, Bell returned to Bradford to establish his medical practice, and became one of the founders of the Royal Eye and Ear Hospital, where he worked for 40 years. In 1878, Bell was involved in a post-mortem investigation of three woolsorters who had died of "blood poisoning". Bell believed that the deaths could not have been caused by any fibres, dust or hair from the wool they worked with, as woolsorters did not experience more frequent coughs than other groups, and also inhalation of such materials does not lead to sudden death. Instead, Bell believed that the deaths were caused by a "septic poison" from the decaying animal wool. A friend who had recently visited European bacteriological laboratories introduced him to the idea that the "woolsorters' disease" was caused by an infection from the animal, which Robert Koch had discovered in 1877 to be anthrax bacillus. Bell subsequently inoculated animals with blood from a person who had died of woolsorters' disease. All the animals died from infection and Bell showed that all of the dead animals had anthrax bacillus in their blood. Following this discovery, Bell recommend
https://en.wikipedia.org/wiki/Brain%20damage
Neurotrauma, brain damage or brain injury (BI) is the destruction or degeneration of brain cells. Brain injuries occur due to a wide range of internal and external factors. In general, brain damage refers to significant, undiscriminating trauma-induced damage. A common category with the greatest number of injuries is traumatic brain injury (TBI) following physical trauma or head injury from an outside source, and the term acquired brain injury (ABI) is used in appropriate circles to differentiate brain injuries occurring after birth from injury, from a genetic disorder (GBI), or from a congenital disorder (CBI). Primary and secondary brain injuries identify the processes involved, while focal and diffuse brain injury describe the severity and localization. Recent research has demonstrated that neuroplasticity, which allows the brain to reorganize itself by forming new neural connections throughout life, provides for rearrangement of its workings. This allows the brain to compensate for injury and disease. Signs and symptoms Symptoms of brain injuries vary based on the severity of the injury or how much of the brain is affected. The three categories used for classifying the severity of brain injuries are mild, moderate or severe. Severity of injuries Mild brain injuries Symptoms of a mild brain injury include headaches, confusions, tinnitus, fatigue, changes in sleep patterns, mood or behavior. Other symptoms include trouble with memory, concentration, attention or thinking. Mental fatigue is a common debilitating experience and may not be linked by the patient to the original (minor) incident. Moderate/severe brain injuries Cognitive symptoms include confusion, aggressiveness, abnormal behavior, slurred speech, and coma or other disorders of consciousness. Physical symptoms include headaches that worsen or do not go away, vomiting or nausea, convulsions, brain pulsation, abnormal dilation of the eyes, inability to awaken from sleep, weakness in extremities a
https://en.wikipedia.org/wiki/Neural%20cryptography
Neural cryptography is a branch of cryptography dedicated to analyzing the application of stochastic algorithms, especially artificial neural network algorithms, for use in encryption and cryptanalysis. Definition Artificial neural networks are well known for their ability to selectively explore the solution space of a given problem. This feature finds a natural niche of application in the field of cryptanalysis. At the same time, neural networks offer a new approach to attack ciphering algorithms based on the principle that any function could be reproduced by a neural network, which is a powerful proven computational tool that can be used to find the inverse-function of any cryptographic algorithm. The ideas of mutual learning, self learning, and stochastic behavior of neural networks and similar algorithms can be used for different aspects of cryptography, like public-key cryptography, solving the key distribution problem using neural network mutual synchronization, hashing or generation of pseudo-random numbers. Another idea is the ability of a neural network to separate space in non-linear pieces using "bias". It gives different probabilities of activating the neural network or not. This is very useful in the case of Cryptanalysis. Two names are used to design the same domain of research: Neuro-Cryptography and Neural Cryptography. The first work that it is known on this topic can be traced back to 1995 in an IT Master Thesis. Applications In 1995, Sebastien Dourlens applied neural networks to cryptanalyze DES by allowing the networks to learn how to invert the S-tables of the DES. The bias in DES studied through Differential Cryptanalysis by Adi Shamir is highlighted. The experiment shows about 50% of the key bits can be found, allowing the complete key to be found in a short time. Hardware application with multi micro-controllers have been proposed due to the easy implementation of multilayer neural networks in hardware. One example of a public-key
https://en.wikipedia.org/wiki/Canary%20trap
A canary trap is a method for exposing an information leak by giving different versions of a sensitive document to each of several suspects and seeing which version gets leaked. It could be one false statement, to see whether sensitive information gets out to other people as well. Special attention is paid to the quality of the prose of the unique language, in the hopes that the suspect will repeat it verbatim in the leak, thereby identifying the version of the document. The term was coined by Tom Clancy in his novel Patriot Games, although Clancy did not invent the technique. The actual method (usually referred to as a barium meal test in espionage circles) has been used by intelligence agencies for many years. The fictional character Jack Ryan describes the technique he devised for identifying the sources of leaked classified documents: Each summary paragraph has six different versions, and the mixture of those paragraphs is unique to each numbered copy of the paper. There are over a thousand possible permutations, but only ninety-six numbered copies of the actual document. The reason the summary paragraphs are so lurid is to entice a reporter to quote them verbatim in the public media. If he quotes something from two or three of those paragraphs, we know which copy he saw and, therefore, who leaked it. A refinement of this technique uses a thesaurus program to shuffle through synonyms, thus making every copy of the document unique. Known canary trap cases Following the troubled production of Star Trek: The Motion Picture in the late 1970s, Paramount Pictures effectively replaced Gene Roddenberry as producer of further movies in the franchise with Harve Bennett. Roddenberry was retained as an "executive consultant", due to the high regard the series' fans held him in; while he had little real authority he was still kept involved in the creative process. The fans often complained about particular plot developments proposed for the films, such as the death of S
https://en.wikipedia.org/wiki/Acoustic%20suspension
Acoustic suspension (also known as air suspension, a closed box, or a sealed box) is a method of loudspeaker cabinet design and utilisation that uses one or more loudspeaker drivers mounted in a sealed box or cabinet. Acoustic suspension systems reduce bass distortion that can be caused by stiff motor suspensions in conventional loudspeakers. A compact acoustic suspension loudspeaker was described in 1954 by Edgar Villchur, and it was brought to commercial production by Villchur and Henry Kloss with the founding of Acoustic Research in Cambridge, Massachusetts. In 1960, Villchur reiterated that: The first aim of the acoustic suspension design, over and above uniformity of frequency response, compactness, and extension of response into the low-bass range, is to reduce significantly the level of bass distortion that had previously been tolerated in loudspeakers. This is accomplished by substituting an air-spring for a mechanical one. Subsequently, the theory of closed-box loudspeakers was extensively described by Small. Speaker cabinets with acoustic suspension can provide well-controlled bass response, especially in comparison with an equivalently-sized speaker enclosure that has a bass reflex port or vent. The bass vent boosts low-frequency output, but with the tradeoff of introducing phase delay and accuracy problems in reproducing transient signals. Sealed boxes are generally less efficient than a bass-reflex cabinet for the same low-frequency cut-off and cabinet volume, so a sealed-box speaker cabinet will need more electrical power to deliver the same amount of acoustic low-frequency bass output. Theory The acoustic suspension woofer uses the elastic cushion of air within a sealed enclosure to provide the restoring force for the woofer diaphragm. The cushion of air acts like a compression spring. Because the air in the cabinet serves to control the woofer's excursion, the physical stiffness of the driver can be reduced. Unlike the stiff physical suspension b
https://en.wikipedia.org/wiki/Wild%20Field%20%28wilderness%20reserve%29
Wild Field ( Dikoe pole) is a 300 ha (740 ac) nature reserve near the city of Tula in Tula Oblast in the European part of Russia, approximately 250 km (150 mi) south of Moscow. It was established in 2012 by Russian scientists Sergey Zimov and Nikita Zimov as a companion to Pleistocene Park in Siberia. Unlike Pleistocene Park, Wild Field’s primary purpose is not scientific research but public outreach, i.e. it will provide a model of what an unregulated steppe ecosystem looked like before the advent of humans. It is situated near a federal road and a railway station and is accessible to the general public. The reserve Wild Field comprises 300 ha (740 ac) of which at first 150 ha were fenced off and stocked with animals. In 2017 the fenced area was increased to 280 hectares. The area of the reserve will be increased to 500 ha in 2018–2019. For the future, plans call for a continuous increase of the area in relation to the increasing population of animals in the reserve. Animals Introduced between 2012 and 2015 were Bashkir horses (a strain of Equus ferus caballus), from a feral herd in the southern part of the Ural Mountains, Altai maral/Altai wapiti (Cervus canadensis sibiricus), Edilbaevskaya sheep (a strain of Ovis orientalis aries), Roe deer (Capreolus spec.), Kalmykian cattle (a strain of Bos primigenius taurus), Domestic yaks (Bos mutus grunniens), both polled and unpolled. The total number of large herbivores in Wild Field Park numbered around 150 in April 2015. In 2016, several wild boars (Sus scrofa) and a female elk[BE]/moose[AE] (Alces alces) entered the reserve through special one-way entrances built into the fences. Several young wild boar/domestic pig hybrids (Sus scrofa × domesticus) have also been purchased to be released into the park upon maturing. In 2017, four reindeer (Rangifer tarandus) and 73 domestic Pridonskaya goats (a strain of Capra aegagrus hircus) were added. A herd of 20 plains bison (Bison bison bison) which was to
https://en.wikipedia.org/wiki/Fouling%20community
Fouling communities are communities of organisms found on artificial surfaces like the sides of docks, marinas, harbors, and boats. Settlement panels made from a variety of substances have been used to monitor settlement patterns and to examine several community processes (e.g., succession, recruitment, predation, competition, and invasion resistance). These communities are characterized by the presence of a variety of sessile organisms including ascidians, bryozoans, mussels, tube building polychaetes, sea anemones, sponges, barnacles, and more. Common predators on and around fouling communities include small crabs, starfish, fish, limpets, chitons, other gastropods, and a variety of worms. Ecology Fouling communities follow a distinct succession pattern in a natural environment. Environmental impact Impacts on Humans Fouling communities can have a negative economic impact on humans, by damaging the bottom of boats, docks, and other marine human-made structures. This effect is known as Biofouling, and has been combated by Anti-fouling paint, which is now known to introduce toxic metals to the marine environment. Fouling communities have a variety of species, and many of these are filter feeders, meaning that organisms in the fouling community can also improve water clarity. Invasive Species Fouling communities do grow on natural structures, however these communities are largely made up of native species, whereas the communities growing on man-made structures have larger populations of invasive species. This difference between the species diversity across human structures and natural substrate is likely dependent on human pollution, which is known to weaken native species and create a community and environment dominated by non-indigenous species. These largely non-indigenous species communities living on docks and boats usually have a higher resistance to anthropogenic disturbances. This effect is sorely felt in untouched native marine communities, as non
https://en.wikipedia.org/wiki/Methylene%20blue
Methylthioninium chloride, commonly called methylene blue, is a salt used as a dye and as a medication. As a medication, it is mainly used to treat methemoglobinemia by chemically reducing the ferric iron in hemoglobin to ferrous iron. Specifically, it is used to treat methemoglobin levels that are greater than 30% or in which there are symptoms despite oxygen therapy. It has previously been used for treating cyanide poisoning and urinary tract infections, but this use is no longer recommended. Methylene blue is typically given by injection into a vein. Common side effects include headache and vomiting. While use during pregnancy may harm the baby, not using it in methemoglobinemia is likely more dangerous. Methylene blue was first prepared in 1876, by Heinrich Caro. It is on the World Health Organization's List of Essential Medicines. Uses Methemoglobinemia Methylene blue is employed as a medication for the treatment of methemoglobinemia, which can arise from ingestion of certain pharmaceuticals, toxins, or broad beans in those susceptible. Normally, through the NADH- or NADPH-dependent methemoglobin reductase enzymes, methemoglobin is reduced back to hemoglobin. When large amounts of methemoglobin occur secondary to toxins, methemoglobin reductases are overwhelmed. Methylene blue, when injected intravenously as an antidote, is itself first reduced to leucomethylene blue, which then reduces the heme group from methemoglobin to hemoglobin. Methylene blue can reduce the half life of methemoglobin from hours to minutes. At high doses, however, methylene blue actually induces methemoglobinemia, reversing this pathway. Methylphen Cyanide poisoning Since its reduction potential is similar to that of oxygen and can be reduced by components of the electron transport chain, large doses of methylene blue are sometimes used as an antidote to potassium cyanide poisoning, a method first successfully tested in 1933 by Dr. Matilda Moldenhauer Brooks in San Francisco, alth
https://en.wikipedia.org/wiki/List%20of%20Mon%C3%A9gasque%20flags
The following is a list of Flags and Banners used in The Principality of Monaco. for more information about the National Flag, see the Flag of Monaco National flags Royal flags Municipal flags Historical flags Yacht clubs See also Flag of Monaco Coat of arms of Monaco
https://en.wikipedia.org/wiki/Mir-399%20microRNA%20precursor%20family
mir-399 is a microRNA that was identified in both Arabidopsis thaliana and Oryza sativa computationally and was later experimentally verified. mir-399 is thought to target mRNAs coding for a phosphate transporter. The mature sequence is excised from the 3' arm of the hairpin. There are multiple copies of MIR399 in each plant genome, for example A. thaliana contains six microRNA precursors that all give rise to an almost identical mature miR-399 sequence.
https://en.wikipedia.org/wiki/Muromonab-CD3
Muromonab-CD3 (trade name Orthoclone OKT3, marketed by Janssen-Cilag) is an immunosuppressant drug given to reduce acute rejection in patients with organ transplants. It is a monoclonal antibody targeted at the CD3 receptor, a membrane protein on the surface of T cells. It was the first monoclonal antibody to be approved for clinical use in humans. History Muromonab-CD3 was approved by the U.S. Food and Drug Administration (FDA) in 1986, making it the first monoclonal antibody to be approved anywhere as a drug for humans. In the European Communities, it was the first drug to be approved under the directive 87/22/EWG, a precursor of the European Medicines Agency (EMEA) centralised approval system in the European Union. This process included an assessment by the Committee for Proprietary Medicinal Products (CPMP, now CHMP), and a subsequent approval by the national health agencies; in Germany, for example, in 1988 by the Paul Ehrlich Institute in Frankfurt. However, the manufacturer of muromonab-CD3 has voluntarily withdrawn it from the United States market in 2010 due to numerous side-effects, better-tolerated alternatives and declining usage. Indications Muromonab-CD3 is approved for the therapy of acute, glucocorticoid-resistant rejection of allogeneic renal, heart and liver transplants. Unlike the monoclonal antibodies basiliximab and daclizumab, it is not approved for prophylaxis of transplant rejection, although a 1996 review has found it to be safe for that purpose. It has also been investigated for use in treating T-cell acute lymphoblastic leukemia. Pharmacodynamics and chemistry T cells recognise antigens primarily via the T cell receptor (TCR). CD3 is one of the proteins that make up the TCR complex. The TCR transduces the signal for the T cell to proliferate and attack the antigen. Muromonab-CD3 is a murine (mouse) monoclonal IgG2a antibody which was created using hybridoma technology. It binds to the T cell receptor-CD3-complex (specifically the CD3
https://en.wikipedia.org/wiki/Cryogenic%20Low-Energy%20Astrophysics%20with%20Neon
The Cryogenic Low-Energy Astrophysics with Noble liquids (CLEAN) experiment by the DEAP/CLEAN collaboration is searching for dark matter using noble gases at the SNOLAB underground facility. CLEAN has studied neon and argon in the MicroCLEAN prototype, and running the MiniCLEAN detector to test a multi-ton design. Design Dark matter searches in isolated noble gas scintillators with xenon and argon have set limits on WIMP interactions, such as recent cross sections from LUX and XENON. Particles scattering in the target emit photons detected by PMTs, identified via pulse shape discrimination developed on DEAP results. Shielding reduces the cosmic and radiation background. Neon has been studied as a clear, dense, low-background scintillator. CLEAN can use neon or argon and plans runs with both to study nuclear mass dependence of any WIMP signals. Status The MiniCLEAN detector will operate with argon in 2014. It will have 500 kg of noble cryogen in a spherical steel vessel with 92 PMTs shielded in a water tank with muon rejection.
https://en.wikipedia.org/wiki/Ocean%20Observatories%20Initiative
The Ocean Observatories Initiative (OOI) is a National Science Foundation (NSF) Major Research Facility composed of a network of science-driven ocean observing platforms and sensors (ocean observatories) in the Atlantic and Pacific Oceans. This networked infrastructure measures physical, chemical, geological, and biological variables from the seafloor to the sea surface and overlying atmosphere, providing an integrated data collection system on coastal, regional and global scales. OOI's goal is to deliver data and data products for a 25-year-plus time period, enabling a better understanding of ocean environments and critical ocean issues. History As early as 1987, the ocean sciences community began discussions about the science, design concepts, and engineering of ocean research observatories, leading to the formation of the International Ocean Network (ION) in 1993. The ION national committee was formed in 1995 and later expanded into the Dynamics of Earth and Ocean Systems (DEOS) committee, tasked with providing a focus for exploratory planning for an ocean observatory network. In 2003 the Pew Oceans Commission recommended changes designed to improve society's use and stewardship of, and impact on, the coastal and global ocean. Momentum for research-oriented ocean observing built with two National Research Council (NRC) studies in 2000 and 2003 ("Illuminating the Hidden Planet: The Future of Seafloor Observatory Science" and "Enabling Ocean Research in the 21st Century" ), and a series of community workshops. In 2000, the National Science Board (NSB) approved the OOI as a potential Major Research Equipment and Facilities Construction project for inclusion in a future National Science Foundation budget, which allowed for focused planning efforts. In 2004, the NSF Division of Ocean Sciences (NSF OCE) established the OOI Project Office under the Ocean Research Interactive Observatory Network (ORION) to coordinate further OOI planning between two independent but c
https://en.wikipedia.org/wiki/National%20Food%20Chain%20Safety%20Office
National Food Chain Safety Office (Nébih/NFCSO) is the integrated food safety authority of Hungary, established on 15 March 2012. History The roots of NFCSO are dated back to the first officially organized animal health service founded by the Animal Health Act VII/1888. The focus of the service has shifted from animal health to food security, then food safety according to the historical needs of Hungary. Sustainability issues and investigation of cases related to economic frauds in the food chain has appeared in the 21st century. NFCSO is the direct legal successor of the Central Agricultural Office (CAO) and the Hungarian Food Safety Office. The CAO was the first food chain control authority in Hungary as the general legal successor of the Plant and Soil Protection Services, the Central Service of Plant and Soil Protection, the Animal Health and Food Control Stations, the National Institute for Agricultural Quality Control, the National Forestry Service, the Agricultural Budget Office, the National Wine Qualification Institute, the Institute of Veterinary Vaccine-, Medicine- and Feed Control, the National Animal Health Institute and the National Food Control Institute, which institutions had worked independently before 1 January 2007. Responsibilities From 2012 NFCSO is responsible for the control of the whole food chain from farm to fork, including soil protection, agricultural production, forestry, food processing, retail and catering. Besides this, the most significant suppliers of the food chain are also registered by NFCSO (for instance private laboratories, input material suppliers). The National Food Chain Safety Office operates the food chain laboratory system and the national reference laboratory network. Most of NFCSO's directorates pursue academic activities ranging from life sciences to social sciences. The institution operates two external university departments together with the University of Veterinary Medicine, Budapest and Hungarian Universit
https://en.wikipedia.org/wiki/Doug%20Turner%20%28Mozilla%29
Doug Turner is the ex-Director of Engineering at Mozilla Corporation and long-time contributor to Mozilla. The Mozilla Foundation hired Turner in December 2004 to work full-time on mobile projects such as Minimo and Mozilla Joey. He was the Foundation's 12th hire. Turner was previously employed by Netscape before the creation of the Mozilla Foundation. Doug Turner invented Geolocation on the Web, Device Orientation on the web, and is a leader in device access. Doug Turner invented Simple Push Notifications. Push Notification are a way for application developers to send messages to their web applications. Doug Turner was the maintainer of the now-defunct Minimo project and worked on its successor Firefox for mobile. Doug Turner led the effort to rewrite the Firefox Mobile browser in order to improve performance, responsiveness, and memory usage. Doug Turner left Mozilla in September 2016.