source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Polynomial%20decomposition | In mathematics, a polynomial decomposition expresses a polynomial f as the functional composition of polynomials g and h, where g and h have degree greater than 1; it is an algebraic functional decomposition. Algorithms are known for decomposing univariate polynomials in polynomial time.
Polynomials which are decomposable in this way are composite polynomials; those which are not are indecomposable polynomials or sometimes prime polynomials (not to be confused with irreducible polynomials, which cannot be factored into products of polynomials). The degree of a composite polynomial is always a composite number, the product of the degrees of the composed polynomials.
The rest of this article discusses only univariate polynomials; algorithms also exist for multivariate polynomials of arbitrary degree.
Examples
In the simplest case, one of the polynomials is a monomial. For example,
decomposes into
since
using the ring operator symbol ∘ to denote function composition.
Less trivially,
Uniqueness
A polynomial may have distinct decompositions into indecomposable polynomials where where for some . The restriction in the definition to polynomials of degree greater than one excludes the infinitely many decompositions possible with linear polynomials.
Joseph Ritt proved that , and the degrees of the components are the same up to linear transformations, but possibly in different order; this is Ritt's polynomial decomposition theorem. For example, .
Applications
A polynomial decomposition may enable more efficient evaluation of a polynomial. For example,
can be calculated with 3 multiplications and 3 additions using the decomposition, while Horner's method would require 7 multiplications and 8 additions.
A polynomial decomposition enables calculation of symbolic roots using radicals, even for some irreducible polynomials. This technique is used in many computer algebra systems. For example, using the decomposition
the roots of this irreducible polynomial can b |
https://en.wikipedia.org/wiki/Live%20distributed%20object | Live distributed object (also abbreviated as live object) refers to a running instance of a distributed multi-party (or peer-to-peer) protocol, viewed from the object-oriented perspective, as an entity that has a distinct identity, may encapsulate internal state and threads of execution, and that exhibits a well-defined externally visible behavior.
Key concepts
The key programming language concepts, as applied to live distributed objects, are defined as follows:
Identity. The identity of a live distributed object is determined by the same factors that differentiate between instances of the same distributed protocol. The object consists of a group of software components physically executing on some set of physical machines and engaged in mutual communication, each executing the distributed protocol code with the same set of essential parameters, such as the name of a multicast group, the identifier of a publish-subscribe topic, the identity of a membership service, etc. Thus, for example, publish-subscribe channels and multicast groups are examples of live distributed objects: for each channel or group, there exists a single instance of a distributed protocol running among all computers sending, forwarding, or receiving the data published in the channel or multicast within the group. In this case, the object's identity is determined by the identifier of the channel or group, qualified with the identity of the distributed system that provides, controls, and manages the given channel or group. In the case of multicast, the identity of the system might be determined, for example, by the address of the membership service (the entity that manages the membership of the multicast group).
Proxies (replicas). The proxy or a replica of a live object is one of the software component instances involved in executing the live object's distributed protocol. The object can thus be alternatively defined as a group of proxies engaged in communication, jointly maintaining some dist |
https://en.wikipedia.org/wiki/Esophageal%20plexus | The esophageal plexus (oesophageal plexus in British-English) is formed by nerve fibers from two sources, branches of the vagus nerve, and visceral branches of the sympathetic trunk. The esophageal plexus and the cardiac plexus contain the same types of fibers and are both considered thoracic autonomic plexus.
Parasympathetic fibers
The vagus nerve delivers two fiber types to the esophageal plexus:
Parasympathetic preganglionic fibers - These fibers have their cell bodies located in the dorsal motor nucleus of the vagus and they will synapse on the terminal ganglia in the walls of the esophagus.
Afferent fibers - These fibers are primarily concerned with autonomic reflexes and they have their cell bodies in the inferior ganglion of the vagus.
These vagal fibers in the esophageal plexus reform to make the anterior vagal trunk (left vagus) and the posterior vagal trunk (right vagus). Anterior and posterior being terms in relation to the esophagus, a mnemonic for which is 'LARP': Left becomes Anterior, Right becomes Posterior.
Sympathetic fibers
The visceral branches of the sympathetic trunk also deliver two fiber types to the esophageal plexus:
Sympathetic postganglionic fibers - The cell bodies of these fibers are located in the sympathetic chain ganglia . The cell bodies of the preganglionic fibers, the first neuron of this two neuron chain, are located in the intermediolateral cell column (IMLCC) of the thoracic spinal cord.
Afferent fibers - These fibers are primarily concerned with pain and have cell bodies located in the dorsal root ganglion.
Additional images
See also
Esophagus
Cardiac plexus
Thoracic autonomic plexus |
https://en.wikipedia.org/wiki/Plants%20of%20the%20World%20Online | Plants of the World Online (POWO) is an online database published by the Royal Botanic Gardens, Kew. It was launched in March 2017 with the ultimate aim being "to enable users to access information on all the world's known seed-bearing plants by 2020". The initial focus was on tropical African Floras, particularly Flora Zambesiaca, Flora of West Tropical Africa and Flora of Tropical East Africa.
The database uses the same taxonomical source as Kew's World Checklist of Selected Plant Families, which is the International Plant Names Index, and the World Checklist of Vascular Plants (WCVP). POWO contains 1,423,000 global plant names, 200,300 detailed descriptions, and 374,900 images.
See also
Australian Plant Name Index
Convention on Biological Diversity
eMonocot
Tropicos
World Flora Online |
https://en.wikipedia.org/wiki/Constructive%20quantum%20field%20theory | In mathematical physics, constructive quantum field theory is the field devoted to showing that quantum field theory can be defined in terms of precise mathematical structures. This demonstration requires new mathematics, in a sense analogous to classical real analysis, putting calculus on a mathematically rigorous foundation. Weak, strong, and electromagnetic forces of nature are believed to have their natural description in terms of quantum fields.
Attempts to put quantum field theory on a basis of completely defined concepts have involved most branches of mathematics, including functional analysis, differential equations, probability theory, representation theory, geometry, and topology. It is known that a quantum field is inherently hard to handle using conventional mathematical techniques like explicit estimates. This is because a quantum field has the general nature of an operator-valued distribution, a type of object from mathematical analysis. The existence theorems for quantum fields can be expected to be very difficult to find, if indeed they are possible at all.
One discovery of the theory that can be related in non-technical terms, is that the dimension d of the spacetime involved is crucial. Notable work in the field by James Glimm and Arthur Jaffe showed that with d < 4 many examples can be found. Along with work of their students, coworkers, and others, constructive field theory resulted in a mathematical foundation and exact interpretation to what previously was only a set of recipes, also in the case d < 4.
Theoretical physicists had given these rules the name "renormalization," but most physicists had been skeptical about whether they could be turned into a mathematical theory. Today one of the most important open problems, both in theoretical physics and in mathematics, is to establish similar results for gauge theory in the realistic case d = 4.
The traditional basis of constructive quantum field theory is the set of Wightman axioms. Os |
https://en.wikipedia.org/wiki/Atlas%20%28anatomy%29 | In anatomy, the atlas (C1) is the most superior (first) cervical vertebra of the spine and is located in the neck.
The bone is named for Atlas of Greek mythology, for just as Atlas bore the weight of the heavens, the first cervical vertebra supports the head. However, the term atlas was first used by the ancient Romans for the seventh cervical vertebra (C7) due to its suitability for supporting burdens. In Greek mythology, Atlas was condemned to bear the weight of the heavens as punishment for rebelling against Zeus. Ancient depictions of Atlas show the globe of the heavens resting at the base of his neck, on C7. Sometime around 1522, anatomists decided to call the first cervical vertebra the atlas. Scholars believe that by switching the designation atlas from the seventh to the first cervical vertebra Renaissance anatomists were commenting that the point of man’s burden had shifted from his shoulders to his head--that man’s true burden was not a physical load, but rather, his mind.
The atlas is the topmost vertebra and the axis (the vertebra below it) forms the joint connecting the skull and spine. The atlas and axis are specialized to allow a greater range of motion than normal vertebrae. They are responsible for the nodding and rotation movements of the head.
The atlanto-occipital joint allows the head to nod up and down on the vertebral column. The dens acts as a pivot that allows the atlas and attached head to rotate on the axis, side to side.
The atlas's chief peculiarity is that it has no body, which has fused with the next vertebra. It is ring-like and consists of an anterior and a posterior arch and two lateral masses.
The atlas and axis are important neurologically because the brainstem extends down to the axis.
Structure
Anterior arch
The anterior arch forms about one-fifth of the ring: its anterior surface is convex, and presents at its center the anterior tubercle for the attachment of the Longus colli muscles and the anterior longitudinal ligam |
https://en.wikipedia.org/wiki/Artificial%20intelligence%20in%20government | Artificial intelligence (AI) has a range of uses in government. It can be used to further public policy objectives (in areas such as emergency services, health and welfare), as well as assist the public to interact with the government (through the use of virtual assistants, for example). According to the Harvard Business Review, "Applications of artificial intelligence to the public sector are broad and growing, with early experiments taking place around the world." Hila Mehr from the Ash Center for Democratic Governance and Innovation at Harvard University notes that AI in government is not new, with postal services using machine methods in the late 1990s to recognise handwriting on envelopes to automatically route letters. The use of AI in government comes with significant benefits, including efficiencies resulting in cost savings (for instance by reducing the number of front office staff), and reducing the opportunities for corruption. However, it also carries risks.
Uses of AI in government
The potential uses of AI in government are wide and varied, with Deloitte considering that "Cognitive technologies could eventually revolutionize every facet of government operations". Mehr suggests that six types of government problems are appropriate for AI applications:
Resource allocation - such as where administrative support is required to complete tasks more quickly.
Large datasets - where these are too large for employees to work efficiently and multiple datasets could be combined to provide greater insights.
Experts shortage - including where basic questions could be answered and niche issues can be learned.
Predictable scenario - historical data makes the situation predictable.
Procedural - repetitive tasks where inputs or outputs have a binary answer.
Diverse data - where data takes a variety of forms (such as visual and linguistic) and needs to be summarised regularly.
Mehr states that "While applications of AI in government work have not kept pace with |
https://en.wikipedia.org/wiki/Singapore%20Food%20Agency | The Singapore Food Agency (SFA) is a statutory board under the Ministry of Sustainability and the Environment that oversees food safety and security in Singapore.
History
The agency was first announced on 26 July 2018 as a consolidation of all food-related functions of the Singapore government, which had previously been carried out by the Agri-Food and Veterinary Authority of Singapore (AVA), National Environment Agency (NEA) and the Health Sciences Authority (HSA). As part of this move, the National Centre for Food Science (NCFS) was established to consolidate the food laboratory capabilities that were formerly distributed across the different statutory boards. Concurrently, the AVA was to be abolished, with its non-food plant and animal-related functions to be transferred to the National Parks Board (NParks).
The agency was launched on 1 April 2019 by Minister for the Environment and Water Resources Masagos Zulkifli. Part of its mission will be to increase Singapore's home-grown food production capacity; the government has set a target to produce 30% of its food needs locally by 2030, up from 10% in 2019.
Singapore was ranked 1st on the Global Food Security Index in 2019. |
https://en.wikipedia.org/wiki/Johnny%20DC | Johnny DC is a character that DC Comics has used at various times as a mascot for its lines of comic books, and occasionally as a metafictional character who comments on the comics in which he appears.
History
The character originally appeared in various Silver Age DC Comics advertisements, and was used to promote DC's entire line of comics. He had a cartoonish face, wore a mortarboard, had stick figure lines for his arms and legs, and a body that consisted of the DC Comics logo.
In the late 1980s, Johnny DC hosted a DC promo page called "DCI with Johnny DC" which appeared in many comics of the era. Like Marvel's "Bullpen Bulletins"—and DC's previous incarnation, the late 1970s/early 1980s Daily Planet feature—"DCI with Johnny DC" featured miscellaneous DC news items, often spotlighting certain books or creators, and also included a partial checklist of current DC titles.
In the mid-1990s, Johnny DC appeared in the satirical special Sergio Aragonés Destroys DC. He's shown as having become disillusioned with the modern direction of DC's superhero comics, criticizing the various members of the Justice League and accusing them of having changed for the worse, before turning into a "psychotic and badly-drawn" pastiche of 1990s comic book anti-heroes in an attempt to destroy the heroes, only to be defeated when Batman tricks him into saying his name backwards à la Mr. Mxyzptlk.
In 2004, Johnny DC was revived and redesigned, as a mostly-silhouette cartoonish child. His name is now used as the name of DC Comics' imprint of comics marketed primarily to children, approximately ages 8–13. The line consists primarily of books based on Warner Bros. and Cartoon Network animated TV series. These have included series that began as animated features (e.g. Scooby-Doo and Looney Tunes) and those based on DC Comics superheroes (Krypto the Superdog, The Batman Strikes!, Teen Titans Go!, Legion of Super Heroes in the 31st Century, Justice League Unlimited and Super Friends, based on |
https://en.wikipedia.org/wiki/Destination%20sign | A destination sign (North American English) or destination indicator/destination blind (British English) is a sign mounted on the front, side or rear of a public transport vehicle, such as a bus, tram/streetcar or light rail vehicle, that displays the vehicle's route number and destination, or the route's number and name on transit systems using route names. The main such sign, mounted on the front of the vehicle, usually located above (or at the top of) the windshield, is often called the headsign, most likely from the fact that these signs are located on the front, or head, end of the vehicle. Depending on the type of the sign, it might also display intermediate points on the current route, or a road that comprises a significant amount of the route, especially if the route is particularly long and its final terminus by itself is not very helpful in determining where the vehicle is going.
Technology types
Several different types of technology have been used for destination signs, from simple rigid placards held in place by a frame or clips, to rollsigns, to various types of computerized, and more recently electronically controlled signs, such as flip-dot, LCD or LED displays. All of these can still be found in use today, but most transit-vehicle destination signs now in use in North America and Europe are electronic signs. In the US, the Americans with Disabilities Act of 1990 specifies certain design criteria for transit-vehicle destination signs, such as maximum and minimum character height-to-width ratio and contrast level, to ensure the signs are sufficiently readable to visually impaired persons. In the 2010s, LED signs have replaced flip-dot signs as the most common type of destination sign in new buses and rail transit vehicles.
Rollsign
For many decades, the most common type of multiple-option destination sign was the rollsign (or bus blind, curtain sign, destination blind, or tram scroll): a roll of flexible material with pre-printed route number/letter |
https://en.wikipedia.org/wiki/Quasi-quotation | Quasi-quotation or Quine quotation is a linguistic device in formal languages that facilitates rigorous and terse formulation of general rules about linguistic expressions while properly observing the use–mention distinction. It was introduced by the philosopher and logician Willard Van Orman Quine in his book Mathematical Logic, originally published in 1940. Put simply, quasi-quotation enables one to introduce symbols that stand for a linguistic expression in a given instance and are used as that linguistic expression in a different instance.
For example, one can use quasi-quotation to illustrate an instance of substitutional quantification, like the following:
"Snow is white" is true if and only if snow is white.
Therefore, there is some sequence of symbols that makes the following sentence true when every instance of φ is replaced by that sequence of symbols: "φ" is true if and only if φ.
Quasi-quotation is used to indicate (usually in more complex formulas) that the φ and "φ" in this sentence are related things, that one is the iteration of the other in a metalanguage. Quine introduced quasiquotes because he wished to avoid the use of variables, and work only with closed sentences (expressions not containing any free variables). However, he still needed to be able to talk about sentences with arbitrary predicates in them, and thus, the quasiquotes provided the mechanism to make such statements. Quine had hoped that, by avoiding variables and schemata, he would minimize confusion for the readers, as well as staying closer to the language that mathematicians actually use.
Quasi-quotation is sometimes denoted using the symbols ⌜ and ⌝ (unicode U+231C, U+231D), or double square brackets, ⟦ ⟧ ("Oxford brackets"), instead of ordinary quotation marks.
How it works
Quasi-quotation is particularly useful for stating formation rules for formal languages. Suppose, for example, that one wants to define the well-formed formulas (wffs) of a new formal language, L, |
https://en.wikipedia.org/wiki/Dinoterb | Dinoterb is a chemical compound used as an herbicide. It is an uncoupler. |
https://en.wikipedia.org/wiki/Nitrophily | Nitrophily is a botanical term that indicates a preference of certain plant species for a habitat rich in nitrate. This term was first introduced by George Fuller during the 1930s. The word is a contraction of the Greek words νἰτρον (nitron) meaning "saltpetre" and φίλος (philos) meaning "friendly".
Nitrophily is traditionally expressed as a score between 1 (not nitrophilous at all) and 10 (extremely nitrophilous) according to the Ellenberg N Index. Alternatively, the response of leaf area to nitrogen supply is a relatively simple method to produce a proxy for the nitrophily. Mostly the nitrophily is consistent with the nitrate availability, where the lowest values occur with plants that grow in peat bogs (such as Drosera- and Erica-species), while the highest values occur with plants that grow on fresh organic waste such as dung piles, waste heaps and strandlines (such as Chenopodium-, and Urtica-species). |
https://en.wikipedia.org/wiki/Bacteriophage%20scaffolding%20proteins | In molecular biology, bacteriophage scaffolding proteins are proteins involved in bacteriophage assembly.
The assembly of a macromolecular structure proceeds via a specific pathway of ordered events and involves conformational changes in the proteins as they join the assembly. The assembly process is aided by scaffolding proteins, which act as chaperones. In bacteriophage, scaffolding proteins B and D are responsible for procapsid formation. 240 copies of protein D form the external scaffold, while 60 copies of protein B form the internal scaffold. The role of scaffolding protein D is in the production of viral single-stranded RNA. |
https://en.wikipedia.org/wiki/Maltase-glucoamylase | Maltase-glucoamylase, intestinal is an enzyme that in humans is encoded by the MGAM gene.
Maltase-glucoamylase is an alpha-glucosidase digestive enzyme. It consists of two subunits with differing substrate specificity. Recombinant enzyme studies have shown that its N-terminal catalytic domain has highest activity against maltose, while the C-terminal domain has a broader substrate specificity and activity against glucose oligomers. In the small intestine, this enzyme works in synergy with sucrase-isomaltase and alpha-amylase to digest the full range of dietary starches.
Gene
The MGAM gene –– which is located on chromosome 7q34 –– codes for the protein Maltase-Glucoamylase. An alternative name for Maltase-Glucoamylase is glucan 1,4-alpha-glycosidase.
Tissue distribution
Maltase-glucoamylase is a membrane-bound enzyme located in the intestinal walls. This lining of the intestine forms brush border in which food has to pass in order for the intestines to absorb the food.
Enzymatic mechanism
This enzyme is a part of a family of enzymes called glycoside hydrolase family 31 (GH31). This is due to the digestive mechanism of the enzyme. GH31 enzymes undergo what is known as the Koshland double displacement mechanism in which a glycosylation and deglycosylation step occurs, resulting in the retention of the overall configuration of the anomeric center.
Structure
N-terminal maltase
The N-terminal maltase-glucoamylase enzymatic unit is in turn composed of 5 specific protein domains. The first of the 5 protein domains consist of a P-type trefoil domain containing a cysteine rich domain. Second is an N-terminal beta-sandwich domain, identified via two antiparallel beta pleated sheets. The third and largest domain consists of a catalytic (beta/alpha) barrel type domain containing two inserted loops. The fourth and 5th domains are C-terminal domains, similar to the N-terminal beta-sandwich domain. The N-terminal Maltase-glucoamylase does not have the +2/+3 sugar bind |
https://en.wikipedia.org/wiki/Mesquite%20flour | Mesquite flour is made from the dried and ground pods of the mesquite (some Prosopis spp.), a tree that grows throughout Mexico and the southwestern US in arid and drought-prone climates. The flour made from the long, beige-colored seedpods has a sweet, slightly nutty flavor and can be used in a wide variety of applications. It has a high-protein, low-glycemic content and can serve as a gluten-free replacement for flours that contain gluten.
In the past, indigenous Americans relied on mesquite pods as an important food source. The bean pods of the mesquite tree are dried and ground into a flour. This flour is rich in dietary fiber (25%) and protein (13%), and it is low in fat (around 3%). It also contains significant quantities of calcium, magnesium, potassium, iron, zinc, and the amino acid lysine. |
https://en.wikipedia.org/wiki/Glycoside%20hydrolase%20family%2028 | In molecular biology, glycoside hydrolase family 28 is a family of glycoside hydrolases , which are a widespread group of enzymes that hydrolyse the glycosidic bond between two or more carbohydrates, or between a carbohydrate and a non-carbohydrate moiety. A classification system for glycoside hydrolases, based on sequence similarity, has led to the definition of >100 different families. This classification is available on the CAZy web site, and also discussed at CAZypedia, an online encyclopedia of carbohydrate active enzymes.
Glycoside hydrolase family 28 CAZY GH_28 comprises enzymes with several known activities; polygalacturonase (); exo-polygalacturonase (); exo-polygalacturonase (); rhamnogalacturonase (EC not defined).
Polygalacturonase (PG) (pectinase) catalyzes the random hydrolysis of 1,4-alpha-D-galactosiduronic linkages in pectate and other galacturonans. In fruit, polygalacturonase plays an important role in cell wall metabolism during ripening. In plant bacterial pathogens such as Erwinia carotovora or Ralstonia solanacearum (Pseudomonas solanacearum) and fungal pathogens such as Aspergillus niger, polygalacturonase is involved in maceration and soft-rotting of plant tissue. Exo-poly-alpha-D-galacturonosidase () (exoPG) hydrolyzes peptic acid from the non-reducing end, releasing digalacturonate. PG and exoPG share a few regions of sequence similarity, and belong to family 28 of the glycosyl hydrolases. |
https://en.wikipedia.org/wiki/Evisceration%20%28autotomy%29 | Evisceration is a method of autotomy involving the ejection of internal organs used by animals as a defensive strategy. Sea cucumbers (Holothuroidea) eject parts of the gut in order to scare and defend against potential predators such as crabs and fish. The organs are regenerated in a few days by cells in the interior of the sea cucumber.
Description
When stressed, the sea cucumber faces away from the attacker and contracts its body wall muscles sharply. This causes the wall of the cloaca to tear and the anus to gape. The evisceration process in Eupentacta quinquesemita proceeds as follows:
Three main structures weaken over a period of about 1–3 minutes, become soft and transparent, and eventually separate from their attachments. These are the basal part of the tentacles, the attachment points of the introvert retractor muscles to the longitudinal muscles (there are 10 of these), and the junction of intestine and cloaca. The softening is a state-transformation of the collagen components in the tissue.
Parts eviscerated include the gut, associated haemal vessels, tentacles, and introvert (the dexterous anterior extensible portion of the body wall). The gut tears away from the mesenteries that suspend it within the coelomic cavity.
Most of the gonad stays behind. Only strands of gonad tangled in the gut are eviscerated. The paired respiratory trees and cloaca also remain (although they may be expelled in other species)
The introvert changes from being firm and opaque to being soft and translucent. The body-wall muscles contract and the increased pressure forces coelomic fluid and viscera into the introvert. It enlarges like a balloon and soon ruptures, expelling the fluid and viscera.
This takes about 20 minutes, with final detachment of the tentacles and introvert sometimes taking as long as 12 hours.
The anterior rupture seals, at first by muscular contraction and then by healing as a plug of connective-tissue.
Function
During evisceration in some species, |
https://en.wikipedia.org/wiki/Cultural%20selection%20theory | Cultural selection theory is the study of cultural change modelled on theories of evolutionary biology. Cultural selection theory has so far never been a separate discipline. However it has been proposed that
human culture exhibits key Darwinian evolutionary properties, and "the structure of a science of cultural evolution should share fundamental features with the structure of the science of biological evolution".
In addition to Darwin's work the term historically covers a diverse range of theories from both the sciences and the humanities including those of Lamark, politics and economics e.g. Bagehot, anthropology e.g. Edward B. Tylor, literature e.g. Ferdinand Brunetière, evolutionary ethics e.g. Leslie Stephen, sociology e.g. Albert Keller, anthropology e.g. Bronislaw Malinowski, Biosciences e.g.
Alex Mesoudi, geography e.g.
Richard Ormrod, sociobiology and biodiversity e.g. E.O. Wilson, computer programming e.g. Richard Brodie, and other fields e.g. Neoevolutionism, and Evolutionary archaeology.
Outline
Crozier suggests that Cultural Selection emerges from three bases: Social contagion theory, Evolutionary epistemology, and Memetics.
This theory is an extension of memetics. In memetics, memes, much like biology's genes, are informational units passed through generations of culture. However, unlike memetics, cultural selection theory moves past these isolated "memes" to encompass selection processes, including continuous and quantitative parameters. Two other approaches to cultural selection theory are social contagion and evolutionary epistemology.
Social contagion theory’s epidemiological approach construes social entities as analogous to parasites that are transmitted virally through a population of biological organisms. Evolutionary epistemology's focus lies in causally connecting evolutionary biology and rationality by generating explanations for why traits for rational behaviour or thought patterns would have been selected for in a species’ evolut |
https://en.wikipedia.org/wiki/Smart%20camera | A smart camera (sensor) or intelligent camera (sensor) or (smart) vision sensor or intelligent vision sensor or smart optical sensor or intelligent optical sensor or smart visual sensor or intelligent visual sensor is a machine vision system which, in addition to image capture circuitry, is capable of extracting application-specific information from the captured images, along with generating event descriptions or making decisions that are used in an intelligent and automated system. A smart camera is a self-contained, standalone vision system with built-in image sensor in the housing of an industrial video camera. The vision system and the image sensor can be integrated into one single piece of hardware known as intelligent image sensor or smart image sensor. It contains all necessary communication interfaces, e.g. Ethernet, as well as industry-proof 24V I/O lines for connection to a PLC, actuators, relays or pneumatic valves,
and can be either static or mobile.
It is not necessarily larger than an industrial or surveillance camera. A capability in machine vision generally means a degree of development such that these capabilities are ready for use on individual applications. This architecture has the advantage of a more compact volume compared to PC-based vision systems and often achieves lower cost, at the expense of a somewhat simpler (or omitted) user interface. Smart cameras are also referred to by the more general term smart sensors.
History
The first publication of the term smart camera was in 1975 as according to Belbachir et al. In 1976, the General Electric's Electronic Systems Division indicated requirements of two industrial firms for smart cameras in a report for National Technical Information Service. Authors affiliated in HRL Laboratories defined a smart camera as "a camera that could process its pictures before recording them" in 1976. One of the first mentions of smart optical sensors appeared in a concept evaluation for satellites by NASA and Gen |
https://en.wikipedia.org/wiki/ENEC%20Mark | ENEC is the high quality European mark for electrical products that demonstrates compliance with European safety standards.
ENEC Description
ENEC is an abbreviation for "European Norms Electrical Certification".
These four letters are part of the registered trademark that demonstrate that a product has been certified by one of the national certification institutes in Europe. Today, there are 25 certification institutes (also called certification bodies) who are signatories of the agreement.
Apart from the mark itself, there are also two digits numbers that indicate which certification body has issued the ENEC certification.
The ENEC agreement was originally started with a view to providing manufacturing of luminaires with a joint European certification mark to replace all the different national marks. In 1999, the agreement was expanded to include:
Lighting
Components for lamp holders
IT
Electric office equipment
Safety isolating transformers
Isolating transformers and separating transformers
Power supply units
Switches
ENEC is a product certification type 5. In particular, this scheme includes factory inspection at the manufacturer's premises.
Established since 2010, ENEC is trying to be the standard for safety reassurance in the European Market.
The application of the ENEC Mark to an electrical product ensures that it complies with the relevant European safety standards and has to be accepted by all member states. Monitoring of product and production provides safety assurance for the lifetime of the ENEC certification.
Household appliances, electronic equipment, lighting
Compliance with the EU low-voltage-directive
Reduced license costs
Evidence in case of product liability claims
Obtaining the ENEC certificate
Testing and certification according to European standards. Product manufacturing monitored by an accredited inspection division like Electrosuisse SEV, Nemko, MIRTEC S.A, TSE or an equivalent partner organization for foreign production faci |
https://en.wikipedia.org/wiki/Kontron | Kontron AG is a German-based multinational company which designs and manufactures embedded computer modules, boards and systems.
Kontron AG serves original equipment manufacturers, system integrators and application providers of different market segments (amongst others: Industrial automation, communications, transportation, energy, avionics, medical, infotainment, and military). Kontron develops, manufactures and sells its products worldwide. Kontron is a premier member of the Intel Embedded Alliance.
The corporate group is headquartered in Augsburg and consists of the Kontron Europe GmbH (Ismaning, Augsburg, Deggendorf, and Saarbrücken). Other locations are in San Diego, Fremont, California, Montreal, Plzeň, Toulon, Bangalore, Taipei, Tokyo and Beijing. Kontron acquired Dolch in 2005.
At a trade show called Embedded World in 2007, Kontron introduced a product called the UGM-M72 using a "Universal Graphics Module".
The card used the M72S from ATI Technologies, and was 84 x 95 mm.
A version 1.1 of UGM was published in July 2008,
and Advanced Micro Devices (AMD, the parent company of ATI) announced it would support the UGM in August 2008.
A web site promoting the module was co-sponsored by XGI Technology until the Great Recession in 2009.
In August 2017 Kontron was merged into Austria-based S&T Group.
In September 2023, it was announced Kontron had acquired the Bucharest-headquartered software producer, Altimate. The company specialises in urban and interurban mobility solutions involving urban traffic control, automated fare collection, tolling solutions, and traffic violations. |
https://en.wikipedia.org/wiki/Ubuntu%20JeOS | Ubuntu JeOS (pronounced "juice") is a discontinued variant of Ubuntu that is described as "an efficient variant ... configured specifically for virtual appliances." It is a concept for what an operating system should look like in the context of a virtual appliance. JeOS stands for "Just enough Operating System." JeOS has been replaced by Ubuntu Core, which is now an officially supported minimal variant of Ubuntu.
Its first release was Ubuntu JeOS 7.10, and since the release of Ubuntu 8.10 it has been included as an option as part of the standard Ubuntu Server Edition.
Supported platforms
The latest version of JeOS is optimized for virtualization technologies by VMware, Inc. and the Linux Kernel-based Virtual Machine.
Specifications
Specifications for version 8.10 and above include:
Part of the standard Ubuntu Server ISO image
Less than 380 MB installed footprint
Specialized server kernel
Intended for VMware ESX, VMware Server, libvirt and KVM
128 MB minimum memory
No graphical environment preloaded
See also
SUSE Linux Enterprise JeOS
OpenSolaris JeOS
List of Ubuntu-based distributions
Ubuntu Certified Professional |
https://en.wikipedia.org/wiki/Dark%20%28broadcasting%29 | In broadcasting, a dark television station or silent radio station is one that has gone off the air for an indefinite period of time. Usually unlike dead air (broadcasting only silence), a station that is dark or silent does not even transmit a carrier signal.
U.S. law
Transmitter operations
According to the U.S. Federal Communications Commission (FCC), a radio or television station is considered to have gone dark or silent if it is to be off the air for thirty days or longer. Prior to the Telecommunications Act of 1996, a "dark" station was required to surrender its broadcast license to the FCC, leaving it vulnerable to another party applying for it while its current owner was making efforts to get it back on the air. Following the 1996 landmark legislation, a licensee is no longer required to surrender the license while dark. Instead, the licensee may apply for a "Notification of Suspension of Operations/Request for Silent STA" (FCC Form 0386), stating the reason why the station has gone silent.
A service can go dark for any number of reasons, including financial resources being too drained to continue effective operation of the service as being of benefit to its community of license; abandonment for a different channel or to go cable-only; complicated technical adjustments involving radio antenna repair, requiring the broadcast tower to be de-energized for the work to be done; structure fire or natural disaster that has rendered the facility inoperable; if unowned by the station, the loss of a leasehold on either the tower or the land for the transmitter, usually by sale to another party; or technical adjustments that would make it prohibitively expensive to perform the work and carry on the normal operations of the station in question.
The service is not required to notify the FCC of silence if the period of silence is less than ten days. If the period of silence is to last at least ten days but less than thirty days, the licensee must notify the FCC in |
https://en.wikipedia.org/wiki/Maurice%20Sion | Maurice Sion (17 October 1927, Skopje – 17 April 2018, Vancouver) was an American and Canadian mathematician, specializing in measure theory and game theory. He is known for Sion's minimax theorem.
Biography
Sion received from New York University his B.A. in 1947 and his M.A. in 1948. He received from the University of California, Berkeley in 1951 his Ph.D. under the supervision of Anthony Morse with thesis On the existence of functions having given partial derivatives on Whitney's curve. Sion was a member of the mathematics faculty at U.C. Berkeley until 1960, when he immigrated to Canada with his wife Emilie and his two children born in the U.S.A. (His two younger children were born in Canada.) From 1960 until he retired in 1989, Maurice Sion was a professor of mathematics at the University of British Columbia. For two academic years from 1957 to 1959 and in the autumn of 1962 he was at the Institute for Advanced Study. He wrote several books on mathematics and served for many years as the head of the University of British Columbia's mathematics department. In 1957 he was the coauthor with Philip Wolfe of a paper with an example of a zero-sum game without a minimax value. Sion was an Invited Speaker at the International Congress of Mathematicians (ICM) in 1970 in Nice and was appointed the Main Organizer for the ICM held in Vancouver in 1974. In 2012 he was elected a Fellow of the American Mathematical Society.
Sion was fluent in Spanish, Italian, French, and English.
He was predeceased by his youngest child. Upon his death he was survived by his widow, three children, and six grandchildren.
Selected publications
Articles
with R. C. Willmott:
Books |
https://en.wikipedia.org/wiki/Parallel%20Walk%20Test | The Parallel Walk Test is a quick and simple quantitative measuring tool for balance during walking and could be a useful tool in clinical settings for assessing balance before and after treatments and to discriminate high fall risk potential.
Description
The test takes 3-5 minutes and consists of walking 6 meters between 2 parallel lines measured 8”, 12” and 15” across in width. The test is scored based on number of stepping errors, i.e. stepping on a line (+1) or stepping over a line (+2), where a higher score denotes decrease performance and total time to perform walk. A warm-up walk of 20m can be performed as well as 1 practice walk.
Lateral movement
It was created to address the significance lateral movement, during walking, has to balance and fall risk and is based on research that indicated increased lateral movement during walking corresponds to decrease dynamic stability. Saunders, et.al., proposed in 1953 an inverted pendulum model to describe normal and pathological walking. They described six "determinants" of walking that control the body's center of gravity, they reasoned that normal walking controls the center of gravity while pathological walking will demonstrate excessive movement of the center of gravity. One of the "determinants" is the lateral movement of the pelvis and excessive movement at the pelvis can be corrected by the position of the foot and leg. Using the inverted pendulum model, MacKinnon and Winter found, to make sure balance was preserved, the center of mass should pass medial to the supporting foot. Current research has shown that testing balance function under narrow stance conditions provides adequate difficulty to help reveal insufficiency in balance control that could increase the risk of falls and that differences between fallers and non-fallers were most pronounced for measures related to lateral stability. Instability during walking is primarily in the mediolateral direction and decrease in mediolateral stability ha |
https://en.wikipedia.org/wiki/Changaa | Changaa or Chang'aa is a traditional home-brewed spirit, popular in Kenya. It is made by fermentation and distillation from grains like millet, maize and sorghum, and is very potent.
Regulation
After being illegal in Kenya for many years, the Kenyan government legalised the traditional home-brewed spirit in 2010, in an effort to take business away from establishments where toxic chemicals are added to the brew to make it stronger. Under the new law, chang'aa must be manufactured, distributed and sold in glass bottles, and retailers must display health warning signs. Sale to individuals under age 18 is still prohibited, as is sale through automatic vending machines. Anyone making or selling adulterated chang'aa risks penalties of five million shillings, five years in jail, or both. Chang'aa is usually much cheaper and stronger than other alcoholic drinks, making it the beverage of choice for many.
Production and distribution
Its production and distribution in urban slums has to some extent continued to be controlled in many cases by criminal gangs like the Mungiki who run protection cartels for illicit brewers. However, in the rest of the country production is still under traditional brewers. Illegally brewed chang'aa could be purchased for around US$0.20 to $0.40 per glass.
Health issues
The drink is sometimes adulterated by adding substances like jet fuel, embalming fluid or battery acid, which has the effect of giving the beverage more 'kick'. Drinkers have suffered blindness or death due to methanol poisoning. The water used to make the drink in illegal breweries is also often below acceptable health standards and sometimes contaminated with sewage.
Origin of name
The spirit's name, Chang'aa, means literally "kill me quick."
The name Chang'aa was adopted in the 1950s when Oyuga Muganda, an AP in Kisumu, once narrated the story in the presence of Tom Omuga how Pelele (aka Woraj) got its name as Chang'aa.
Women from the Kano area of Kisumu used to ferry fr |
https://en.wikipedia.org/wiki/Epigenetic%20controls%20in%20ciliates | Epigenetic controls in ciliates is about the unique characteristic of Ciliates, which is that they possess two kinds of nuclei (this phenomenon is called nuclear dimorphism): a micronucleus used for inheritance, and a macronucleus, which controls the metabolism. The micronucleus contains the entirety of the genome whereas the macronucleus only contains the DNA necessary for vegetative growth. The macronucleus divides via amitosis, whereas the micronucleus undergoes typical mitosis. During sexual development a new macronucleus is formed from the meiosis of the micronucleus, where the removal of transposons occurs. On the division or reproduction of ciliates, the two nuclei are under several epigenetic controls. |
https://en.wikipedia.org/wiki/Cube-connected%20cycles | In graph theory, the cube-connected cycles is an undirected cubic graph, formed by replacing each vertex of a hypercube graph by a cycle. It was introduced by for use as a network topology in parallel computing.
Definition
The cube-connected cycles of order n (denoted CCCn) can be defined as a graph formed from a set of n2n nodes, indexed by pairs of numbers (x, y) where 0 ≤ x < 2n and 0 ≤ y < n. Each such node is connected to three neighbors: , , and , where "⊕" denotes the bitwise exclusive or operation on binary numbers.
This graph can also be interpreted as the result of replacing each vertex of an n-dimensional hypercube graph by an n-vertex cycle. The hypercube graph vertices are indexed by the numbers x, and the positions within each cycle by the numbers y.
Properties
The cube-connected cycles of order n is the Cayley graph of a
group that acts on binary words of length n by rotation and flipping bits of the word. The generators used to form this Cayley graph from the group are the group elements that act by rotating the word one position left, rotating it one position right, or flipping its first bit. Because it is a Cayley graph, it is vertex-transitive: there is a symmetry of the graph mapping any vertex to any other vertex.
The diameter of the cube-connected cycles of order n is for any n ≥ 4; the farthest point from (x, y) is (2n − x − 1, (y + n/2) mod n). showed that the crossing number of CCCn is ((1/20) + o(1)) 4n.
According to the Lovász conjecture, the cube-connected cycle graph should always contain a Hamiltonian cycle, and this is now known to be true. More generally, although these graphs are not pancyclic, they contain cycles of all but a bounded number of possible even lengths, and when n is odd they also contain many of the possible odd lengths of cycles.
Parallel processing application
Cube-connected cycles were investigated by , who applied these graphs as the interconnection pattern of a network connecting the processors i |
https://en.wikipedia.org/wiki/HP%209845C | The HP 9845C from Hewlett Packard was one of the first desktop computers to be equipped with a color display and light pen for design and illustration work. It was used to create the color war room graphics in the 1983 movie WarGames.
Features
The attached HP 98770A color display enabled the color graphics with its own CPU and separate power supply, a vector generator based on the AMD2900 bit-slice architecture, graphics memory with three planes of each, the connection interface to the mainframe consists of a direct data bus attachment, and a light-pen logic. were available.
The system is a big-endian 16-bit architecture with roots in the which were one of the first 16-bit microprocessors created.
The display showed 8 soft keys on the lower end of the screen, 39 alignment controllers behind a door enabled fine tuning of color convergence.
The speed of the builtin BASIC language was accomplished by implementing time critical parts of it in CPU microcode.
A builtin tape cartridge device with a capacity of 217 kB and transfer speed of 1440 bytes/s enabled storage of data.
Average access time for the unit is 6s and a rewind end to end takes 20s. The directory is stored in r/w memory to enable quick access.
See also
HP 9800 series HP desktop computer product line
HP DC100 - DC100 tape format and drive
LDS-1 (Line Drawing System-1) |
https://en.wikipedia.org/wiki/Buffer%20credits | Buffer credits, also called buffer-to-buffer credits (BBC) are used as a flow control method by Fibre Channel technology and represent the number of frames a port can store.
Each time a port transmits a frame that port's BB Credit is decremented by one; for each R_RDY received, that port's BB Credit is incremented by one. If the BB Credit is zero the corresponding node cannot transmit until an R_RDY is received back.
The benefits of a large data buffer are particularly evident in long-distance applications, when operating at higher data rates (2 Gbit/s, 4 Gbit/s), or in systems with a heavily loaded PCI bus.
See also
Fibre Channel
Host adapter
Fibre Channel |
https://en.wikipedia.org/wiki/Cumyl%20alcohol | Cumyl alcohol, also called 4-isopropylbenzyl alcohol, is a liquid, hydroxy functional, aromatic organic chemical with formula C10H14O. It has the CAS Registry Number of 536-60-7 and the IUPAC name of (4-propan-2-ylphenyl)methanol. It is REACH registered with the EC number of 208-640-4.
Uses
The most common use is as a food additive to add flavor. The material also has insect repellent properties.
Manufacture
Hydrogenation of cuminal can produce cumyl alcohol.
Other
Cumyl alcohol is an undesired side reaction product when LDPE is crosslinked. LDPE is used as a plastic electric insulator for electrical power cables. The cumyl alcohol reduces the insulating properties.
Alternative names
Main sources of information.
p-Cymen-7-ol
4-isopropylbenzyl alcohol
Cumic alcohol
Cuminol
Cuminyl alcohol
(4-Isopropylphenyl)methanol
Cuminic alcohol
Toxicology
The toxicity of the material has been studied and is reasonably well understood. |
https://en.wikipedia.org/wiki/Dust%20solution | In general relativity, a dust solution is a fluid solution, a type of exact solution of the Einstein field equation, in which the gravitational field is produced entirely by the mass, momentum, and stress density of a perfect fluid that has positive mass density but vanishing pressure. Dust solutions are an important special case of fluid solutions in general relativity.
Dust model
A pressureless perfect fluid can be interpreted as a model of a configuration of dust particles that locally move in concert and interact with each other only gravitationally, from which the name is derived. For this reason, dust models are often employed in cosmology as models of a toy universe, in which the dust particles are considered as highly idealized models of galaxies, clusters, or superclusters. In astrophysics, dust models have been employed as models of gravitational collapse.
Dust solutions can also be used to model finite rotating disks of dust grains; some examples are listed below. If superimposed somehow on a stellar model comprising a ball of fluid surrounded by vacuum, a dust solution could be used to model an accretion disk around a massive object; however, no such exact solutions that model rotating accretion disks are yet known due to the extreme mathematical difficulty of constructing them.
Mathematical definition
The stress–energy tensor of a relativistic pressureless fluid can be written in the simple form
Here
the world lines of the dust particles are the integral curves of the four-velocity ,
the matter density is given by the scalar function .
Eigenvalues
Because the stress-energy tensor is a rank-one matrix, a short computation shows that the characteristic polynomial
of the Einstein tensor in a dust solution will have the form
Multiplying out this product, we find that the coefficients must satisfy the following three algebraically independent (and invariant) conditions:
Using Newton's identities, in terms of the sums of the powers of the ro |
https://en.wikipedia.org/wiki/One%20gene%E2%80%93one%20enzyme%20hypothesis | The one gene–one enzyme hypothesis is the idea that genes act through the production of enzymes, with each gene responsible for producing a single enzyme that in turn affects a single step in a metabolic pathway. The concept was proposed by George Beadle and Edward Tatum in an influential 1941 paper on genetic mutations in the mold Neurospora crassa, and subsequently was dubbed the "one gene–one enzyme hypothesis" by their collaborator Norman Horowitz. In 2004, Horowitz reminisced that "these experiments founded the science of what Beadle and Tatum called 'biochemical genetics.' In actuality they proved to be the opening gun in what became molecular genetics and all the developments that have followed from that." The development of the one gene–one enzyme hypothesis is often considered the first significant result in what came to be called molecular biology. Although it has been extremely influential, the hypothesis was recognized soon after its proposal to be an oversimplification. Even the subsequent reformulation of the "one gene–one polypeptide" hypothesis is now considered too simple to describe the relationship between genes and proteins.
Origin
Although some instances of errors in metabolism following Mendelian inheritance patterns were known earlier, beginning with the 1902 identification by Archibald Garrod of alkaptonuria as a Mendelian recessive trait, for the most part genetics could not be applied to metabolism through the late 1930s. Another of the exceptions was the work of Boris Ephrussi and George Beadle, two geneticists working on the eye color pigments of Drosophila melanogaster fruit flies in the Caltech laboratory of Thomas Hunt Morgan. In the mid-1930s they found that genes affecting eye color appeared to be serially dependent, and that the normal red eyes of Drosophila were the result of pigments that went through a series of transformations; different eye color gene mutations disrupted the transformations at a different points in t |
https://en.wikipedia.org/wiki/Sunwise | In Scottish folklore, sunwise, deosil or sunward (clockwise) was considered the “prosperous course”, turning from east to west in the direction of the sun. The opposite course, anticlockwise, was known as widdershins (Lowland Scots), or tuathal (Scottish Gaelic). In the Northern Hemisphere, "sunwise" and "clockwise" run in the same direction, because sundials were used to tell time, and their features were transferred to clock faces. Another influence may have been the right-handed bias in many cultures.
Irish culture
During the days of Gaelic Ireland and of the Irish clans, the Psalter known as was used as both a rallying cry and protector in battle by the Chiefs of Clan O'Donnell. Before a battle it was customary for a chosen monk or holy man (usually attached to the Clan McGroarty and who was in a state of grace) to wear the Cathach and the cumdach, or book shrine, around his neck and then walk three times sunwise around the warriors of Clan O'Donnell.
According to folklorist Kevin Danaher, on St. John's Eve in Ulster and Connaught, it was customary to light a bonfire at sunset and to walk sunwise around the fire while praying the rosary. Those who could not afford a rosary would keep tally by holding a small pebble during each prayer and throwing it into the bonfire as each prayer was completed.
Scottish culture
This is descriptive of the ceremony observed by the druids, of walking round their temples by the south, in the course of their directions, always keeping their temples on their right. This course (diasil or deiseal) was deemed propitious, while the contrary course is perceived as fatal, or at least unpropitious. From this ancient superstition are derived several Gaelic customs which were still observed around the turn of the twentieth century, such as drinking over the left thumb, as Toland expresses it, or according to the course of the sun.
Martin Martin says:
"Deosil" and other spellings
Wicca uses the spelling deosil, which violates the Gaeli |
https://en.wikipedia.org/wiki/Filar%20micrometer | A filar micrometer is a specialized eyepiece used in astronomical telescopes for astrometry measurements, in microscopes for specimen measurements, and in alignment and surveying telescopes for measuring angles and distances on nearby objects. "Filar" derives from the Latin filum ("thread"). It refers to the fine threads or wires used in the device.
Construction and use
A typical filar micrometer consists of a reticle that has two fine parallel wires or threads that can be moved by the observer using a micrometer screw mechanism. The wires are placed in the focal image plane of the eyepiece so they remain sharply superimposed over the object under observation, while the micrometer motion moves the wires across the focal plane. Other designs employ a fixed reticle, against which one wire or a second reticle moves. By rotating the eyepiece assembly in the eyetube, the measurement axis can be aligned to match the orientation of the two points of observation.
At one time, it was common to use spider silk as a thread.
By placing one wire over one point of interest and moving the other to a second point, the distance between the two wires can be measured with the micrometer portion of the instrument. Given this precise distance measurement at the image plane, a trigonometric calculation with the objective focal length yields the angular distance between the two points seen in a telescope. In a microscope, a similar calculation yields the spatial distance between two points on a specimen.
In an alignment telescope, the precise micrometric measurement of the eyepiece image directly indicates the real distance of a nearby observed point from the line of sight. This absolute measurement is independent of the distance to the object, due to the telecentricity principle.
A common use of filar micrometers in astronomical telescopes was measuring the distance between double stars.
Filar micrometers are little used in modern astronomy, having been replaced by digital phot |
https://en.wikipedia.org/wiki/Macroprogramming | In computer science, macroprogramming is a programming paradigm
aimed at expressing the macroscopic, global behaviour of an entire system of agents or computing devices.
In macroprogramming, the local programs for the individual components of a distributed system are compiled or interpreted from a macro-program typically expressed by a system-level perspective or in terms of the intended global goal.
The aim of macroprogramming approaches is to support expressing the macroscopic interactive behaviour of a whole distributed system of computing devices or agents in a single program.
It has not to be confused with macros, the mechanism often found in programming languages (like C or Scala) to express substitution rules for program pieces.
Macroprogramming originated in the context of wireless sensor network programming
and found renewed interest in the context of the Internet of Things and swarm robotics.
Macroprogramming shares similar goals (related to programming a system by a global perspective) with multitier programming, choreographic programming, and aggregate computing.
Context and motivation
Programming distributed systems, multi-agent systems, and collectives of software agents (e.g., robotic swarms) is difficult, for many issues (like communication, concurrency, and failure) have to be properly considered. In particular, a general recurrent problem is how to induce the intended global behaviour by defining the behaviour of the individual components or agents involved. The problem can be addressed through learning approaches, such as multi-agent reinforcement learning, or by manually defining the control program driving each component. However, addressing the problem by a fully individual (or (single-node) perspective may be error-prone, because it is generally difficult to foresee the overall behaviour emerging from complex networks of activities and interactions (cf. complex systems and emergence. Therefore, researchers have started investigated ways |
https://en.wikipedia.org/wiki/Console%20%28computer%20games%29 | A console is a command line interface where the personal computer game's settings and variables can be edited while the game is running. Consoles also usually display a log of warnings, errors, and other messages produced during the program's execution. Typically it can be toggled on or off and appears over the normal game view.
The console is normally accessed by pressing the backtick key ` (frequently also called the ~ key; normally located below the ESC key) on QWERTY keyboards or the ² on AZERTY keyboards, and is usually hidden by default. In most cases it cannot be accessed unless enabled by either specifying a command-line argument when launching the game or by changing one of the game's configuration files.
History
A classic console is a box that scrolls down from the top of the screen. This style was made popular with Quake (1996). There are other forms of console:
Quake III Arena has one or two consoles, depending on the platform the game was released for. The first is the internal console, which exists on all platforms. The second is an external console, created via the Windows API. The console printing function directs to both, likewise, both consoles can also have text input to them. The external console is used for dedicated servers and to log startup of the engine. Finally, the external console is also used to show errors and display debugging output should the game crash.
Dark Engine's console shows output up to 4 lines in length and is accessed by pressing 3 particular keys at the same time.
Lithtech's console has no output and is used mainly for entering cheat codes.
ARK: Survival Evolved is an open world action and adventure survival video game is by Studio Wildcard. A lot of ARK commands will require the ‘Enable Cheats‘ command to be used before going further, as well as the Enable Cheats for Player command. It is an absolute must to use this before using to any other command.
A single-line variant can be seen in games from The Sims serie |
https://en.wikipedia.org/wiki/Eclipse%20Metro | Metro is a high-performance, extensible, easy-to-use web service stack. Although historically an open-source part of the GlassFish application server, it can also be used in a stand-alone configuration. Components of Metro include: JAXB RI, JAX-WS RI, SAAJ RI, StAX (SJSXP implementation) and WSIT. Originally available under the CDDL and GPLv2 with classpath exception, it is now available under
History
Originally, the Glassfish project developed two semi-independent projects:
JAX-WS RI, the Reference implementation of the JAX-WS specification
WSIT, a Java implementation of some of the WS-* and an enhanced support for interoperability with the .NET Framework. It is based on JAX-WS RI as "Web Service layer".
In June 2007, it was decided to bundle these two components as a single component named Metro.
Features
Metro compares well with other web service frameworks in terms of functionality. Codehaus started a comparison which compared Apache Axis 1.x, Axis 2.x, Celtix, Glue, JBossWS, Xfire 1.2 and JAX-WS RI + WSIT (the bundle was not yet named Metro at that time). This was later updated by the ASF to replace Celtix with CXF and to include OracleAS 10g.
Metro includes JAXB RI, JAX-WS RI, SAAJ RI, SJSXP, and WSIT, along with libraries that those components depend on, such as xmlstreambuffer, mimepull, etc.
Its features include:
Basic Profile 1.1 Compliant
Easily Create Services from POJOs
RPC-Encoding
Spring Support
REST Support
Soap 1.1/1.2
Streaming XML (StAX based)
WSDL 1.1 ->Code (Client)/(Server)
Server and Client-side Asynchrony
Supported WS-* Standards
Supported Transport protocols include:
HTTP
JMS
SMTP/POP3
TCP
In-VM
Metro augments the JAX-WS environment with advanced features such as trusted, end-to-end security; optimized transport (MTOM, Fast Infoset), reliable messaging, and transactional behavior for SOAP web services.
Market share
Metro is bundled with Java SE 6 in order to allow consumers of Java SE 6 to consume Web Services.
Met |
https://en.wikipedia.org/wiki/Priority%20effect | In ecology, a priority effect refers to the impact that a particular species can have on community development as a result of its prior arrival at a site. There are two basic types of priority effects: inhibitory and facilitative. An inhibitory priority effect occurs when a species that arrives first at a site negatively affects a species that arrives later by reducing the availability of space or resources. In contrast, a facilitative priority effect occurs when a species that arrives first at a site alters abiotic or biotic conditions in ways that positively affect a species that arrives later. Inhibitory priority effects have been documented more frequently than facilitative priority effects. Studies indicate that both abiotic (e.g. resource availability) and biotic (e.g. predation) factors can affect the strength of priority effects. Priority effects are a central and pervasive element of ecological community development that have significant implications for natural systems and ecological restoration efforts.
Theoretical foundation
Community succession theory
Early in the 20th century, Frederic Clements and other plant ecologists suggested that ecological communities develop in a linear, directional manner towards a final, stable end-point: the climax community. Clements indicated that a site's climax community would reflect local climate. He conceptualised the climax community as a "superorganism" that followed a defined developmental sequence.
Early ecological succession theory maintained that the directional shifts from one stage of succession to the next were induced by the plants themselves. In this sense, succession theory implicitly recognised priority effects; the prior arrival of certain species had important impacts on future community composition. At the same time, the climax concept implied that species shifts were predetermined. This implies that a given species would always appear at the same point during the development of the climax community |
https://en.wikipedia.org/wiki/Coherent%20risk%20measure | In the fields of actuarial science and financial economics there are a number of ways that risk can be defined; to clarify the concept theoreticians have described a number of properties that a risk measure might or might not have. A coherent risk measure is a function that satisfies properties of monotonicity, sub-additivity, homogeneity, and translational invariance.
Properties
Consider a random outcome viewed as an element of a linear space of measurable functions, defined on an appropriate probability space. A functional → is said to be coherent risk measure for if it satisfies the following properties:
Normalized
That is, the risk when holding no assets is zero.
Monotonicity
That is, if portfolio always has better values than portfolio under almost all scenarios then the risk of should be less than the risk of . E.g. If is an in the money call option (or otherwise) on a stock, and is also an in the money call option with a lower strike price.
In financial risk management, monotonicity implies a portfolio with greater future returns has less risk.
Sub-additivity
Indeed, the risk of two portfolios together cannot get any worse than adding the two risks separately: this is the diversification principle.
In financial risk management, sub-additivity implies diversification is beneficial. The sub-additivity principle is sometimes also seen as problematic.
Positive homogeneity
Loosely speaking, if you double your portfolio then you double your risk.
In financial risk management, positive homogeneity implies the risk of a position is proportional to its size.
Translation invariance
If is a deterministic portfolio with guaranteed return and then
The portfolio is just adding cash to your portfolio . In particular, if then .
In financial risk management, translation invariance implies that the addition of a sure amount of capital reduces the risk by the same amount.
Convex risk measures
The notion of coherence has been subsequently rela |
https://en.wikipedia.org/wiki/ELLA%20%28programming%20language%29 | ELLA is a hardware description language and support toolset, developed in the United Kingdom by the Royal Signals and Radar Establishment (RSRE) during the 1980s and 1990s, which also developed the compiler for the programming language, ALGOL 68RS, used to write ELLA.
ELLA has tools to perform:
Design transformation
Symbolic simulations
Formal verification
ELLA is a winner of the 1989 Queen's Award for Technological Achievement.
Sample
Sample originally from ftp://ftp.dra.hmg.gb/pub/ella, public release.
Code for matrix multiplication hardware design verification:
MAC ZIP = ([INT n]TYPE t: vector1 vector2) -> [n][2]t:
[INT k = 1..n](vector1[k], vector2[k]).
MAC TRANSPOSE = ([INT n][INT m]TYPE t: matrix) -> [m][n]t:
[INT i = 1..m] [INT j = 1..n] matrix[j][i].
MAC INNER_PRODUCT{FN * = [2]TYPE t -> TYPE s, FN + = [2]s -> s}
= ([INT n][2]t: vector) -> s:
IF n = 1 THEN *vector[1]
ELSE *vector[1] + INNER_PRODUCT {*,+} vector[2..n]
FI.
MAC MATRIX_MULT {FN * = [2]TYPE t->TYPE s, FN + = [2]s->s} =
([INT n][INT m]t: matrix1, [m][INT p]t: matrix2) -> [n][p]s:
BEGIN
LET transposed_matrix2 = TRANSPOSE matrix2.
OUTPUT [INT i = 1..n][INT j = 1..p]
INNER_PRODUCT{*,+}ZIP(matrix1[i],transposed_matrix2[j])
END.
TYPE element = NEW elt/(1..20),
product = NEW prd/(1..1200).
FN PLUS = (product: integer1 integer2) -> product:
ARITH integer1 + integer2.
FN MULT = (element: integer1 integer2) -> product:
ARITH integer1 * integer2.
FN MULT_234 = ([2][3]element:matrix1, [3][4]element:matrix2) ->
[2][4]product:
MATRIX_MULT{MULT,PLUS}(matrix1, matrix2).
FN TEST = () -> [2][4]product:
( LET m1 = ((elt/2, elt/1, elt/1),
(elt/3, elt/6, elt/9)),
m2 = ((elt/6, elt/1, elt/3, elt/4),
(elt/9, elt/2, elt/8, elt/3),
(elt/6, elt/4, elt/1, elt/2)).
OUTPUT
MULT_234 (m1, m2)
).
COM test: just displaysignal MOC |
https://en.wikipedia.org/wiki/Electronic%20design%20automation | Electronic design automation (EDA), also referred to as electronic computer-aided design (ECAD), is a category of software tools for designing electronic systems such as integrated circuits and printed circuit boards. The tools work together in a design flow that chip designers use to design and analyze entire semiconductor chips. Since a modern semiconductor chip can have billions of components, EDA tools are essential for their design; this article in particular describes EDA specifically with respect to integrated circuits (ICs).
History
Early days
The earliest electronic design automation is attributed to IBM with the documentation of its 700 series computers in the 1950s.
Prior to the development of EDA, integrated circuits were designed by hand and manually laid out. Some advanced shops used geometric software to generate tapes for a Gerber photoplotter, responsible for generating a monochromatic exposure image, but even those copied digital recordings of mechanically drawn components. The process was fundamentally graphic, with the translation from electronics to graphics done manually; the best-known company from this era was Calma, whose GDSII format is still in use today. By the mid-1970s, developers started to automate circuit design in addition to drafting and the first placement and routing tools were developed; as this occurred, the proceedings of the Design Automation Conference catalogued the large majority of the developments of the time.
The next era began following the publication of "Introduction to VLSI Systems" by Carver Mead and Lynn Conway in 1980; considered the standard textbook for chip design. The result was an increase in the complexity of the chips that could be designed, with improved access to design verification tools that used logic simulation. The chips were easier to lay out and more likely to function correctly, since their designs could be simulated more thoroughly prior to construction. Although the languages and tools h |
https://en.wikipedia.org/wiki/61%20%28number%29 | 61 (sixty-one) is the natural number following 60 and preceding 62.
In mathematics
61 is the 18th prime number, and a twin prime with 59. It is the sum of two consecutive squares, It is also a centered decagonal number, a centered hexagonal number, and a centered square number.
61 is the fourth cuban prime of the form where , and the forth Pillai prime since is divisible by 61, but 61 is not one more than a multiple of 8. It is also a Keith number, as it recurs in a Fibonacci-like sequence started from its base 10 digits: 6, 1, 7, 8, 15, 23, 38, 61, ...
61 is a unique prime in base 14, since no other prime has a 6-digit period in base 14, and palindromic in bases 6 (1416) and 60 (1160). It is the sixth up/down or Euler zigzag number.
61 is the smallest proper prime, a prime which ends in the digit 1 in decimal and whose reciprocal in base-10 has a repeating sequence of length where each digit (0, 1, ..., 9) appears in the repeating sequence the same number of times as does each other digit (namely, times).
In the list of Fortunate numbers, 61 occurs thrice, since adding 61 to either the tenth, twelfth or seventeenth primorial gives a prime number (namely 6,469,693,291; 7,420,738,134,871; and 1,922,760,350,154,212,639,131).
61 is the exponent of the ninth Mersenne prime, and the next candidate exponent for a potential fifth double Mersenne prime:
The exotic sphere is the last odd-dimensional sphere to contain a unique smooth structure; , and are the only other such spheres.
In science
The chemical element with the atomic number 61 is promethium.
Astronomy
Messier object M61, a magnitude 10.5 galaxy in the constellation Virgo
The New General Catalogue object NGC 61, a double spiral galaxy in the constellation Cetus
61 Ursae Majoris is located about 31.1 light-years from the Sun.
61 Cygni was christened the "Flying Star" in 1792 by Giuseppe Piazzi (1746–1826) for its unusually large proper motion.
In other fields
Sixty-one is:
The number of the |
https://en.wikipedia.org/wiki/Future%20of%20Marine%20Animal%20Populations | The Future of Marine Animal Populations (FMAP) project was one of the core projects of the international Census of Marine Life (2000–2010). FMAP's mission was to describe and synthesize globally changing patterns of species abundance, distribution, and diversity, and to model the effects of fishing, climate change and other key variables on those patterns. This work was done across ocean realms and with an emphasis on understanding past changes and predicting future scenarios.
History
FMAP emerged from a workshop held at Dalhousie University in 2002 and was funded from 2003 to 2010 by the Alfred P. Sloan Foundation. The project was led by Ransom A. Myers from 2002 to 2007 and from 2007 to 2010 was under the direction of Boris Worm, Heike Lotze and Ian Jonsen in the Biology Department at Dalhousie University.
Core research topics
Marine animals: Spatial distribution and movement of marine animal. FMAP team members analyzed electronic tracking data for large marine animals in combination with environmental data to better understand how environmental change may influence the movement of animals and consequently patterns in their distribution. In addition to gaining mechanistic knowledge of movement behaviours and patterns, maps were created of species' seasonal distributions, inferred from the tracking data.
Marine biodiversity: Global patterns on marine biodiversity. FMAP researchers overlaid spatial diversity patterns for different species groups, searching for local hotspots and coldspots, regional overlap between different groups and global spatial gradients in marine diversity. Overlaying standardized species richness patterns for diverse animal groups enabled description of taxon-specific and cross-taxa patterns as well as driving factors. The work of FMAP also aimed to understand the underlying processes and causes of such patterns and the factors that may deter them.
Marine ecosystems: Long term changes in marine ecosystems. FMAP team members compiled data |
https://en.wikipedia.org/wiki/Inquisitor%20%28hardware%20testing%20software%29 | Inquisitor is a software suite used for hardware diagnostics, stress testing, certification and benchmarking platform. It is available in three formats:
Standalone – As a package to be installed into existing Linux installation; such practice is somewhat limited in available tests.
Live – Distributed as a Linux live CD distribution; system under test should be booted from it; this way one particular system can be tested thoroughly.
Enterprise – A most advanced format; multiple systems can be tested simultaneously by booting from network using PXE, in fully controlled environment; all testing progress and results are collected on central server to be analyzed by testing operator.
Released under the terms of version 3 of the GNU General Public License, Inquisitor is free software.
History
Inquisitor started in early 2004 as a closed project developed by Mikhail Yakshin at ALT Linux for MaxSelect, a Russian hardware vendor. First versions were closed-source, although some effort was made to open some of its components. Versions 1 and 2 were fully developed in-house and were fully adopted by MaxSelect and its multiple branches. These versions concentrated on server-based enterprise testing and were optimized mostly for notebook hardware.
In 2005, a special abridged version of Inquisitor suite was developed for distribution on Live CDs. These Live CDs were supplied with MaxSelect products, so every buyer can stress test their newly bought hardware to ensure it runs stable.
In August, 2007, all legal complications were solved and Inquisitor was announced as an open source platform. This platform can be used to implement various Linux-based solutions that deal with hardware testing, monitoring and benchmarking. As of July, 2008, version 3.0 is released into public.
Version 3.1 made it to beta, but the distribution was discontinued before this beta was finalized.
Tests
Minimal steps that can be undertaken for purposes of testing or benchmarking are called "tests" i |
https://en.wikipedia.org/wiki/Geriatric%20rheumatology | Geriatric rheumatology is the branch of medicine that studies rheumatologic disorders in elderly (joints, muscles & other structures around the joints). Sometimes it is called Gerontorheumatology.
Origin
The geriatric rheumatology clinic provides evaluation and management services to patients with various musculoskeletal and soft tissue disorders. Evaluation of the elderly patient is often complex due to the many comorbid conditions encountered in this population often compounded by cognitive disorders, functional decline, polypharmacy and limited social supports.
Training & education programs
During training physicians observe and participate in the diagnosis and management of various rheumatologic conditions which contribute to elderly functional decline including connective tissue disorders, crystal diseases, osteoarthritis and other soft tissue disorders. They also learn to differentiate these various clinical conditions, gain an understanding of the various treatment options available, as well as learn how to work with a multidisciplinary team of health professionals.
Some Departments of Medicine offer a three-year combined Geriatric-Rheumatology Fellowship, which is composed of a year of clinical geriatrics and training in clinical epidemiology and health services research, a year of clinical rheumatology and an opportunity to explore scholarly geriatric-rheumatology research projects in the third year.
Many books and resources are available dedicated to geriatric rheumatology.
Many geriatricians and rheumatologists are dedicated to this new subspecialty. Some internal medicine departments have established a separate geriatric rheumatology clinics.
Organisation & societies
International Society of Geriatric Rheumatology was established to help advancing research in the area of geriatric rheumatology and improve the quality of management of rheumatologic disorders in elderly. |
https://en.wikipedia.org/wiki/Internal%20jugular%20vein | The internal jugular vein is a paired jugular vein that collects blood from the brain and the superficial parts of the face and neck. This vein runs in the carotid sheath with the common carotid artery and vagus nerve.
It begins in the posterior compartment of the jugular foramen, at the base of the skull. It is somewhat dilated at its origin, which is called the superior bulb.
This vein also has a common trunk into which drains the anterior branch of the retromandibular vein, the facial vein, and the lingual vein.
It runs down the side of the neck in a vertical direction, being at one end lateral to the internal carotid artery, and then lateral to the common carotid artery, and at the root of the neck, it unites with the subclavian vein to form the brachiocephalic vein (innominate vein); a little above its termination is a second dilation, the inferior bulb.
Above, it lies upon the rectus capitis lateralis, behind the internal carotid artery and the nerves passing through the jugular foramen. Lower down, the vein and artery lie upon the same plane, the glossopharyngeal and hypoglossal nerves passing forward between them. The vagus nerve descends between and behind the vein and the artery in the same sheath (the carotid sheath), and the accessory runs obliquely backward, superficial or deep to the vein.
At the root of the neck, the right internal jugular vein is a little distance from the common carotid artery, and crosses the first part of the subclavian artery, while the left internal jugular vein usually overlaps the common carotid artery.
The left vein is generally smaller than the right, and each contains a pair of valves, which exist about 2.5 cm above the termination of the vessel.
Variation
In 9–12% of the Western population, the size, shape or course of the internal jugular vein is abnormal. Variants identified including veins markedly smaller, or not functionally present. The mean diameter is 10 mm, but may range between 5 and 35 mm.
Tributaries
|
https://en.wikipedia.org/wiki/Call%20signs%20in%20the%20United%20States | Call signs in the United States are identifiers assigned to radio and television stations, which are issued by the Federal Communications Commission (FCC) and, in the case of most government stations, the National Telecommunications and Information Administration (NTIA). They consist of from 3 to 9 letters and digits, with their composition determined by a station's service category. By international agreement, all call signs starting with the letters K, N and W, as well as AAA-ALZ, are reserved exclusively for use in the United States.
AM, FM, TV and shortwave broadcasting stations can request their own call letters, as long as they are unique. The FCC policy covering broadcasting stations limits them to call signs that start with a "K" or a "W", with "K" call signs generally reserved for stations west of the Mississippi River, and "W" limited to stations east of the river. Amateur stations can receive call signs starting with all of the letters "A", "K", "N" and "W". Formerly, prefixes beginning with "A" were exclusively assigned to U.S. Army stations and prefixes beginning with "N" to U.S. Navy stations.
Broadcasting stations
Although most transmitters regulated by the Federal Communications Commission (FCC) are issued call signs for their official identification, the general public is most familiar with the ones used by radio and TV broadcasting stations. However, there is a wide variety in how much emphasis stations give to their call signs; for some it is the primary way they establish public identity, while others largely ignore their call signs, considering a moniker or slogan to be more easily remembered by listeners (and those filling in diaries for the Nielsen Audio ratings measurement). In the United States, the only time broadcasting stations are required to mention their call signs is during station identification announcements, made at a "natural break in programming" as close to the beginning of each hour as possible.
Television stations have the |
https://en.wikipedia.org/wiki/B5000%20instruction%20set | The Burroughs B5000 was the first stack machine and also the first computer with a segmented virtual memory.
The Burroughs B5000 instruction set includes the set of valid operations for the B5000, B5500 and B5700. It is not compatible with the B6500, B7500, B8500 or their successors.
Instruction streams on a B5000 contain 12-bit syllables, four to a word. The architecture has two modes, Word Mode and Character Mode, and each has a separate repertoire of syllables. A processor may be either Control State or Normal State, and certain syllables are only permissible in Control State. The architecture does not provide for addressing registers or storage directly; all references are through the 1024 word Program Reference Table (PRT), current code segment, marked locations within the stack or to the A and B registers holding the top two locations on the stack. Burroughs numbers bits in a syllable from 0 (high bit) to 11 (low bit) and in a word from 0 (high bit) to 47 (low bit).
Word Mode
In Word Mode, there are four types of syllables.
The interpretation of the 10-bit relative address in Operand Call and Descriptor Call depends on the setting of several processor flags. For main programs (SALF off) it is always an offset into the Program Reference Table (PRT).
Character Mode |
https://en.wikipedia.org/wiki/Lisa%20Jones%20%28scientist%29 | Lisa Michelle Jones (born February 1977) is an associate professor of pharmaceutical sciences at the University of Maryland, Baltimore (UMB). Her research is in structural proteomics, using mass spectrometry together with fast photochemical oxidation of proteins (FPOP), allowing researchers to study the solvent accessibility of proteins experimentally.
Early life and education
Jones became interested in science as a freshman at high school, where she took part in a national Science Technology Engineering Program. She earned a BS in biochemistry at Syracuse University in 1999. Jones completed her PhD at Georgia State University and specialized in structural biology.
Jones received postdoctoral training in structural virology at the University of Alabama at Birmingham. She was a Pfizer postdoctoral researcher at Washington University in St. Louis working with Michael Gross on MassSpec-based protein foot-printing.
Research and career
After her postdoctoral research, she joined Indiana University, where she became an associate professor. She moved to the University of Maryland School of Pharmacy in 2016.
In her research, Jones focusses on structural proteomics, having developed fast photochemical oxidation of proteins (FPOP) which uses an excimer laser for photolysis, which generates hydroxyl radicals. Hydroxyl radicals go on to oxidise the side chains of amino acids and provide solvent accessibility of proteins within a cell. FPOP can provide information on the sites of ligand binding, protein interaction and protein conformational changes in vivo. More recently, her group has extended the platform with a no-flow platform for high-throughput in-cell measurements.
In 2019, she received the Biophysical Society's Junior Faculty Award.
Jones also works on science outreach and improving representation in the sciences. She is a mentor in the UMD CURE Scholars Program and a member of the American Society for Mass Spectrometry Diversity and Outreach Working Group. Jone |
https://en.wikipedia.org/wiki/Mathematics%20of%20artificial%20neural%20networks | An artificial neural network (ANN) combines biological principles with advanced statistics to solve problems in domains such as pattern recognition and game-play. ANNs adopt the basic model of neuron analogues connected to each other in a variety of ways.
Structure
Neuron
A neuron with label receiving an input from predecessor neurons consists of the following components:
an activation , the neuron's state, depending on a discrete time parameter,
an optional threshold , which stays fixed unless changed by learning,
an activation function that computes the new activation at a given time from , and the net input giving rise to the relation
and an output function computing the output from the activation
Often the output function is simply the identity function.
An input neuron has no predecessor but serves as input interface for the whole network. Similarly an output neuron has no successor and thus serves as output interface of the whole network.
Propagation function
The propagation function computes the input to the neuron from the outputs and typically has the form
Bias
A bias term can be added, changing the form to the following:
where is a bias.
Neural networks as functions
Neural network models can be viewed as defining a function that takes an input (observation) and produces an output (decision) or a distribution over or both and . Sometimes models are intimately associated with a particular learning rule. A common use of the phrase "ANN model" is really the definition of a class of such functions (where members of the class are obtained by varying parameters, connection weights, or specifics of the architecture such as the number of neurons, number of layers or their connectivity).
Mathematically, a neuron's network function is defined as a composition of other functions , that can further be decomposed into other functions. This can be conveniently represented as a network structure, with arrows depicting the dependen |
https://en.wikipedia.org/wiki/ISO/IEC%2010367 | ISO/IEC 10367:1991 is a standard developed by ISO/IEC JTC 1/SC 2, defining graphical character sets for use in character encodings implementing levels 2 and 3 of ISO/IEC 4873 (as opposed to ISO/IEC 8859, which defines character encodings at level 1 of ISO/IEC 4873).
Relationship to ISO/IEC 8859
The parts of ISO/IEC 8859 define complete encodings at level 1 of ISO/IEC 4873 (i.e., as stateless extended ASCII single-byte encodings, reserving the C1 area), and do not allow for use of multiple parts together. For use at levels 2 and 3 of ISO/IEC 4873 (i.e., with shift codes for additional graphical character sets), ISO/IEC 8859 stipulates that equivalent sets from ISO/IEC 10367 should be used instead.
ISO/IEC 10367:1991 includes ASCII, as well as sets matching the G1 sets used for the right-hand sides (non-ASCII parts) of ISO/IEC 6937 (ITU T.51) and of ISO/IEC 8859 parts 1 through 9 (i.e., those parts that existed as of 1991, when it was published), a set of additional Roman characters supplementing some of those parts, and a set of box drawing characters (shown below).
Supplementary G3 Latin set
ISO/IEC 10367 includes the ISO-IR-154 graphical set, which is intended to supplement Latin alphabets number 1, 2 and 5 (i.e., ISO-8859-1, ISO-8859-2 and ISO-8859-9). Specifically, it is intended for use as a G3 set in a profile of ISO/IEC 4873 in which the G1 and G2 sets include the right hand side of ISO-8859-2, and also that of either ISO-8859-1 or ISO-8859-9. These configurations represent the entire ISO/IEC 6937 repertoire (ITU T.51 Annex A) without non-spacing codes.
For instance, the letter Ĉ would be encoded under ISO/IEC 4873 level 2 as 0x8F 0x23 if this set is included.
Highlighted characters also appear in ISO-8859-1 or ISO-8859-9. Under the current edition of ISO/IEC 4873 / ECMA-43 (though not earlier editions), characters must be used from the lowest-numbered working set they appear in, hence those characters are not used from this G3 set when the respective |
https://en.wikipedia.org/wiki/Nitrate%20reductase | Nitrate reductases are molybdoenzymes that reduce nitrate (NO) to nitrite (NO). This reaction is critical for the production of protein in most crop plants, as nitrate is the predominant source of nitrogen in fertilized soils.
Types
Eukaryotic
Eukaryotic nitrate reductases are part of the sulfite oxidase family of molybdoenzymes. They transfer electrons from NADH or NADPH to nitrate.
Prokaryotic
Prokaryotic nitrate reductases belong to the DMSO reductase family of molybdoenzymes and have been classified into three groups, assimilatory nitrate reductases (Nas), respiratory nitrate reductase (Nar), and periplasmic nitrate reductases (Nap). The active site of these enzymes is a Mo ion that is bound to the four thiolate functions of two pterin molecules. The coordination sphere of the Mo is completed by one amino-acid side chain and oxygen and/or sulfur ligands. The exact environment of the Mo ion in certain of these enzymes (oxygen versus sulfur as a sixth molybdenum ligand) is still debated. The Mo is covalently attached to the protein by a cysteine ligand in Nap, and an aspartate in Nar.
Structure
Prokaryotic nitrate reductases have two major types, transmembrane nitrate reductases and periplasmic nitrate reductases. The transmembrane nitrate reductase (NAR) does proton translocation and can contribute to the generation of ATP by the proton motive force. The periplasmic nitrate reductase (NAP) does not do proton translocation and does not contribute to the proton motive force.
The transmembrane respiratory nitrate reductase is composed of three subunits; an 1 alpha, 1 beta and 2 gamma. It is the second nitrate reductase enzyme which it can substitute for the NRA enzyme in Escherichia coli allowing it to use nitrate as an electron acceptor during anaerobic respiration. A transmembrane nitrate reductase that can function as a proton pump (similar to the case of anaerobic respiration) has been discovered in a diatom Thalassiosira weissflogii.
The nitrate reduct |
https://en.wikipedia.org/wiki/Cys-loop%20receptor | The Cys-loop ligand-gated ion channel superfamily is composed of nicotinic acetylcholine, GABAA, GABAA-ρ, glycine, 5-HT3, and zinc-activated (ZAC) receptors. These receptors are composed of five protein subunits which form a pentameric arrangement around a central pore. There are usually 2 alpha subunits and 3 other beta, gamma, or delta subunits (some consist of 5 alpha subunits).
The name of the family refers to a characteristic loop formed by 13 highly conserved amino acids between two cysteine (Cys) residues, which form a disulfide bond near the N-terminal extracellular domain.
Cys-loop receptors are known only in eukaryotes, but are part of a larger family of pentameric ligand-gated ion channels. Only the Cys-loop clade includes the pair of bridging cysteine residues. The larger superfamily includes bacterial (e.g. GLIC) as well as non-Cys-loop eukaryotic receptors, and is referred to as "pentameric ligand-gated ion channels", or "Pro-loop receptors".
All subunits consist of a large conserved extracellular N-terminal domain, three highly conserved transmembrane domains, a cytoplasmic loop of variable size and amino acid sequence, and a fourth transmembrane region with a relatively short and variable extracellular C-terminal domain.
Neurotransmitters bind at the interface between subunits in the extracellular domain.
Each subunit contains four membrane-spanning alpha helices (M1, M2, M3, M4). The pore is formed primarily by the M2 helices. The M3-M4 linker is the intracellular domain that binds the cytoskeleton.
Binding
Most knowledge about cys-loop receptors comes from inferences made while studying various members of the family. Research on the structures of acetylcholine binding proteins (AChBP) determined that the binding sites consist of six loops, with the first three forming the principal face and the next three forming the complementary face. The last loop on the principal face wraps over the ligand in the active receptor. This site is also abu |
https://en.wikipedia.org/wiki/Pussyhat | A pussyhat is a pink, crafted brimless hat or cap, created in large numbers by women involved with the United States 2017 Women's March. They are the result of the Pussyhat Project, a nationwide effort initiated by Krista Suh and Jayna Zweiman, a screenwriter and architect located in Los Angeles, to create pink hats to be worn at the march.
In response to this call, crafters all over the United States began making these hats using patterns provided on the project Web site for use with either a knitting method, crocheting and even sewing with fabrics. The project's goal was to have one million hats handed out at the Washington March. The hats are made using pink yarns or fabrics and were originally designed to be a positive form of protest for Trump's inauguration by Krista Suh. Suh, from Los Angeles, wanted a hat for the cooler climate in Washington, D.C. and made a hat for herself to wear at the Women's March, realizing the potential: "We could all wear them, make a unified statement". One of the project founders, Jayna Zweiman, stated "I think it's resonating a lot because we're really saying that no matter who you are or where you are, you can be politically active." Suh and Zweiman worked with Kat Coyle, the owner of a local knitting supply shop called The Little Knittery, to come up with the original design. The project launched in November 2016 and quickly became popular on social media with over 100,000 downloads of the pattern to make the hat.
Name
The creators state that the name refers to the resemblance of the top corners of the hats to cat ears while also attempting to reclaim the term "pussy", a play on Trump's widely reported 2005 remarks that women would let him "grab them by the pussy." Many of the hats worn by marchers in Washington, D.C., were created by crafters who were unable to attend and wished them to be worn by those who could, to represent their presence. Those hats optionally contained notes from the crafters to the wearers, expressing |
https://en.wikipedia.org/wiki/Move%20by%20nature | In game theory a move by nature is a decision or move in an extensive form game made by a player who has no strategic interests in the outcome. The effect is to add a player, 'Nature', whose practical role is to act as a random number generator. For instance, if a game of Poker requires a dealer to choose which cards a player is dealt, the dealer plays the role of the Nature player.
Fig. 1 shows a signaling game which begins with a move by nature. Moves by nature are an integral part of games of incomplete information. |
https://en.wikipedia.org/wiki/HiperLAN | HiperLAN (High Performance Radio LAN) is a wireless LAN standard. It is a European alternative for the IEEE 802.11 standards. It is defined by the European Telecommunications Standards Institute (ETSI). In ETSI the standards are defined by the BRAN project (Broadband Radio Access Networks). The HiperLAN standard family has four different versions.
HiperLAN/1
Planning for the first version of the standard, called HiperLAN/1, started 1992, when planning of 802.11 was already going on. The goal of the HiperLAN was the high data rate, higher than 802.11. The standard was approved in 1997. The functional specification is EN300652, the rest is in ETS300836.
The standard covers the physical layer and the media access control part of the data link layer like 802.11. There is a new sublayer called Channel Access and Control sublayer (CAC). This sublayer deals with the access requests to the channels. The accomplishing of the request is dependent on the usage of the channel and the priority of the request.
CAC layer provides hierarchical independence with Elimination-Yield Non-Preemptive Multiple Access mechanism (EY-NPMA). EY-NPMA codes priority choices and other functions into one variable length radio pulse preceding the packet data. EY-NPMA enables the network to function with few collisions even though there would be a large number of users. Multimedia applications work in HiperLAN because of EY-NPMA priority mechanism. MAC layer defines protocols for routing, security and power saving and provides naturally data transfer to the upper layers.
On the physical layer FSK and GMSK modulations are used in HiperLAN/1.
HiperLAN features:
range 100 m
slow mobility (1.4 m/s)
supports asynchronous and synchronous traffic
Bit rate - 23.59 Mbit/s
Description- Wireless Ethernet
Frequency range- 5 GHz
HiperLAN does not conflict with microwave and other kitchen appliances, which are on 2.4 GHz.
An innovative feature of HIPERLAN 1, which other wireless networks do not offer, is |
https://en.wikipedia.org/wiki/Message-oriented%20middleware | Message-oriented middleware (MOM) is software or hardware infrastructure supporting sending and receiving messages between distributed systems. MOM allows application modules to be distributed over heterogeneous platforms and reduces the complexity of developing applications that span multiple operating systems and network protocols. The middleware creates a distributed communications layer that insulates the application developer from the details of the various operating systems and network interfaces. APIs that extend across diverse platforms and networks are typically provided by MOM.
This middleware layer allows software components (applications, Enterprise JavaBeans, servlets, and other components) that have been developed independently and that run on different networked platforms to interact with one another. Applications distributed on different network nodes use the application interface to communicate. In addition, by providing an administrative interface, this new, virtual system of interconnected applications can be made fault tolerant and secure.
MOM provides software elements that reside in all communicating components of a client/server architecture and typically support asynchronous calls between the client and server applications. MOM reduces the involvement of application developers with the complexity of the master-slave nature of the client/server mechanism.
Middleware categories
Remote procedure call or RPC-based middleware
Object request broker or ORB-based middleware
Message-oriented middleware or MOM-based middleware
All these models make it possible for one software component to affect the behavior of another component over a network. They are different in that RPC- and ORB-based middleware create systems of tightly coupled components, whereas MOM-based systems allow for a loose coupling of components. In an RPC- or ORB-based system, when one procedure calls another, it must wait for the called procedure to return before it can do anyt |
https://en.wikipedia.org/wiki/Telebirr | Telebirr () is a mobile money service developed and was launched by Ethio telecom, the state owned telecommunication and Internet service provider in Ethiopia. It took five months to develop the end-to-end service. It facilitates the delivery of cashless transactions. The platform deployed currently has the capacity of processing up to 100 transactions per second (TPS) and can be scaled up to 1000 TPS. The service is accessible via SMS, USSD, and smartphone applications. Telebirr works in five languages.
Registration
Though the service is fully accessible for any customer of Ethio telecom, the users need to register through the mobile application called Telebirr or using an authorized agent or Ethio telecom shop or Unstructured Supplementary Service Data (USSD), *127# nationally. However, Telebirr also provides a “quick registration” by using any information that already exists in Ethio telecom's system. |
https://en.wikipedia.org/wiki/Open%20and%20closed%20maps | In mathematics, more specifically in topology, an open map is a function between two topological spaces that maps open sets to open sets.
That is, a function is open if for any open set in the image is open in
Likewise, a closed map is a function that maps closed sets to closed sets.
A map may be open, closed, both, or neither; in particular, an open map need not be closed and vice versa.
Open and closed maps are not necessarily continuous. Further, continuity is independent of openness and closedness in the general case and a continuous function may have one, both, or neither property; this fact remains true even if one restricts oneself to metric spaces.
Although their definitions seem more natural, open and closed maps are much less important than continuous maps.
Recall that, by definition, a function is continuous if the preimage of every open set of is open in (Equivalently, if the preimage of every closed set of is closed in ).
Early study of open maps was pioneered by Simion Stoilow and Gordon Thomas Whyburn.
Definitions and characterizations
If is a subset of a topological space then let and (resp. ) denote the closure (resp. interior) of in that space.
Let be a function between topological spaces. If is any set then is called the image of under
Competing definitions
There are two different competing, but closely related, definitions of "" that are widely used, where both of these definitions can be summarized as: "it is a map that sends open sets to open sets."
The following terminology is sometimes used to distinguish between the two definitions.
A map is called a
"" if whenever is an open subset of the domain then is an open subset of 's codomain
"" if whenever is an open subset of the domain then is an open subset of 's image where as usual, this set is endowed with the subspace topology induced on it by 's codomain
Every strongly open map is a relatively open map. However, these definitions are not equival |
https://en.wikipedia.org/wiki/Myosin | Myosins () are a superfamily of motor proteins best known for their roles in muscle contraction and in a wide range of other motility processes in eukaryotes. They are ATP-dependent and responsible for actin-based motility.
The first myosin (M2) to be discovered was in 1864 by Wilhelm Kühne. Kühne had extracted a viscous protein from skeletal muscle that he held responsible for keeping the tension state in muscle. He called this protein myosin. The term has been extended to include a group of similar ATPases found in the cells of both striated muscle tissue and smooth muscle tissue.
Following the discovery in 1973 of enzymes with myosin-like function in Acanthamoeba castellanii, a global range of divergent myosin genes have been discovered throughout the realm of eukaryotes.
Although myosin was originally thought to be restricted to muscle cells (hence myo-(s) + -in), there is no single "myosin"; rather it is a very large superfamily of genes whose protein products share the basic properties of actin binding, ATP hydrolysis (ATPase enzyme activity), and force transduction. Virtually all eukaryotic cells contain myosin isoforms. Some isoforms have specialized functions in certain cell types (such as muscle), while other isoforms are ubiquitous. The structure and function of myosin is globally conserved across species, to the extent that rabbit muscle myosin II will bind to actin from an amoeba.
Structure and functions
Domains
Most myosin molecules are composed of a head, neck, and tail domain.
The head domain binds the filamentous actin, and uses ATP hydrolysis to generate force and to "walk" along the filament towards the barbed (+) end (with the exception of myosin VI, which moves towards the pointed (-) end).
the neck domain acts as a linker and as a lever arm for transducing force generated by the catalytic motor domain. The neck domain can also serve as a binding site for myosin light chains which are distinct proteins that form part of a macromolecula |
https://en.wikipedia.org/wiki/Physics%20Analysis%20Workstation | The Physics Analysis Workstation (PAW) is an interactive, scriptable computer software tool for data analysis and graphical presentation in High Energy Physics (HEP).
The development of this software tool started at CERN in 1986, it was optimized for the processing of very large amounts of data. It was based on and intended for inter-operation with components of CERNLIB, an extensive collection of Fortran libraries.
PAW had been a standard tool in high energy physics for decades, yet was essentially unmaintained. Despite continuing popularity as of 2008, it has been losing ground to the C++-based ROOT package. Conversion tutorials exist. In 2014, development and support were stopped.
Sample script
PAW uses its own scripting language. Here is sample code (with its actual output), which can be used to plot data gathered in files.
* read data
vector/read X,Y input_file.dat
* eps plot
fort/file 55 gg_ggg_dsig_dphid_179181.eps
meta 55 -113
opt linx | linear scale
opt logy | logarithmic scale
* here goes plot
set plci 1 | line color
set lwid 2 | line width
set dmod 1 | line type (solid, dotted, etc.)
graph 32 X Y AL | 32 stands for input data lines in input file
* plot title and comments
set txci 1
atitle '[f] (deg)' 'd[s]/d[f]! (mb)'
set txci 1
text 180.0 2e1 '[f]=179...181 deg' 0.12
close 55 |
https://en.wikipedia.org/wiki/Perpetuity | In finance, a perpetuity is an annuity that has no end, or a stream of cash payments that continues forever. There are few actual perpetuities in existence. For example, the United Kingdom (UK) government issued them in the past; these were known as consols and were all finally redeemed in 2015.
Real estate and preferred stock are among some types of investments that affect the results of a perpetuity, and prices can be established using techniques for valuing a perpetuity. Perpetuities are but one of the time value of money methods for valuing financial assets.
Perpetuities can be structured as a perpetual bond and are a form of ordinary annuities. The concept is closely linked to terminal value and terminal growth rate in valuation.
Detailed description
A perpetuity is an annuity in which the periodic payments begin on a fixed date and continue indefinitely. It is sometimes referred to as a perpetual annuity. Fixed coupon payments on permanently invested (irredeemable) sums of money are prime examples of perpetuities. Scholarships paid perpetually from an endowment fit the definition of perpetuity.
The value of the perpetuity is finite because receipts that are anticipated far in the future have extremely low present value (present value of the future cash flows). Unlike a typical bond, because the principal is never repaid, there is no present value for the principal. Assuming that payments begin at the end of the current period, the price of a perpetuity is simply the coupon amount over the appropriate discount rate or yield; that is,
where PV = present value of the perpetuity, A = the amount of the periodic payment, and r = yield, discount rate or interest rate.
To give a numerical example, a 3% UK government war loan will trade at 50 pence per pound in a yield environment of 6%, while at 3% yield it is trading at par. That is, if the face value of the loan is £100 and the annual payment £3, the value of the loan is £50 when market interest rates are |
https://en.wikipedia.org/wiki/Second-order%20cellular%20automaton | A second-order cellular automaton is a type of reversible cellular automaton (CA) invented by Edward Fredkin where the state of a cell at time depends not only on its neighborhood at time , but also on its state at time .
General technique
In general, the evolution rule for a second-order automaton may be described as a function that maps the neighborhood of a cell to a permutation on the states of the automaton. In each time step , for each cell of the automaton, this function is applied to the neighborhood of to give a permutation . Then, this permutation is applied to the state of cell at time , and the result is the state of the cell at time
. In this way, the configuration of the automaton at each time step is computed from two previous time steps: the immediately previous step determines the permutations that are applied to the cells, and the time step before that one gives the states on which these permutations operate.
The reversed time dynamics of a second-order automaton may be described by another second-order automaton with the same neighborhood, in which the function mapping neighborhoods to permutations gives the inverse permutation to . That is, on each possible neighborhood , and should be inverse permutations. With this reverse rule, the automaton described by function correctly computes the configuration at time from the configurations at time and . Because every second-order automaton can be reversed in this way, it follows that they are all reversible cellular automata, regardless of which function is chosen to determine the automaton rule.
For two-state automata
If a cellular automaton has only two states, then there are also only two possible permutations of states: the identity permutation that maps each state to itself, and the permutation that maps each state to the other state. We may identify these two permutations with the two states of the automaton.
In this way, every second-order cellular automaton (defined by a functi |
https://en.wikipedia.org/wiki/Molecular%20and%20Cellular%20Biology | Molecular and Cellular Biology is a biweekly peer-reviewed scientific journal covering all aspects of molecular and cellular biology. It is published by the American Society for Microbiology and the editor-in-chief is Peter Tontonoz (University of California, Los Angeles). It was established in 1981. The h-index (1981-2021) is 338.
Abstracting and indexing
The journal is abstracted and indexed in:
According to the Journal Citation Reports, the journal has a 2021 impact factor of 5.069. |
https://en.wikipedia.org/wiki/Leodamas%20of%20Thasos | Leodamas of Thasos (, c. 380 BC) was a Greek mathematician and a contemporary of Plato, about whom little is known.
There are two references to Leodamas in Proclus's Commentary on Euclid:
At this time [Plato's time] also lived Leodamas of Thasos, Archytas of Tarentum, and Theaetetus of Athens, by whom the theorems [of geometry] were increased in number and brought into a more scientific arrangement. Younger than Leodamas was Neoclides and his pupil Leon, who added many discoveries.
Plato, it is said, taught this method [analysis] to Leodamas, who is also reported to have made many discoveries in geometry by means of it.
and one in Diogenes Laërtius' Lives and Opinions of Eminent Philosophers, Book 3 (Plato):
He [Plato] was the first to explain to Leodamas of Thasos the method of solving problems by analysis.
Notes
5th-century BC births
4th-century BC deaths
4th-century BC Greek people
Ancient Greek mathematicians
Ancient Thasians
4th-century BC mathematicians |
https://en.wikipedia.org/wiki/Infinitary%20combinatorics | In mathematics, infinitary combinatorics, or combinatorial set theory, is an extension of ideas in combinatorics to infinite sets.
Some of the things studied include continuous graphs and trees, extensions of Ramsey's theorem, and Martin's axiom.
Recent developments concern combinatorics of the continuum and combinatorics on successors of singular cardinals.
Ramsey theory for infinite sets
Write κ, λ for ordinals, m for a cardinal number and n for a natural number. introduced the notation
as a shorthand way of saying that every partition of the set [κ]n of n-element subsets of into m pieces has a homogeneous set of order type λ. A homogeneous set is in this case a subset of κ such that every n-element subset is in the same element of the partition. When m is 2 it is often omitted.
Assuming the axiom of choice, there are no ordinals κ with κ→(ω)ω, so n is usually taken to be finite. An extension where n is almost allowed to be infinite is
the notation
which is a shorthand way of saying that every partition of the set of finite subsets of κ into m pieces has a subset of order type λ such that for any finite n, all subsets of size n are in the same element of the partition. When m is 2 it is often omitted.
Another variation is the notation
which is a shorthand way of saying that every coloring of the set [κ]n of n-element subsets of κ with 2 colors has a subset of order type λ such that all elements of [λ]n have the first color, or a subset of order type μ such that all elements of [μ]n have the second color.
Some properties of this include: (in what follows is a cardinal)
for all finite n and k (Ramsey's theorem).
(Erdős–Rado theorem.)
(Sierpiński theorem)
(Erdős–Dushnik–Miller theorem).
In choiceless universes, partition properties with infinite exponents may hold, and some of them are obtained as consequences of the axiom of determinacy (AD). For example, Donald A. Martin proved that AD implies
Large cardinals
Several large cardinal properties |
https://en.wikipedia.org/wiki/Memory%20Reference%20Code | The Memory Reference Code (or MRC) is a fundamental component in the design of some computers, and is "one of the most important aspects of the BIOS" for an Intel-based motherboard. It is the part of an Intel motherboard's firmware that determines how the computer's memory (RAM) will be initialized, and adjusts memory timing algorithms correctly for the effects of any modifications set by the user or computer hardware.
Overview
Intel has defined the Memory Reference Code (MRC) as follows:
The MRC is responsible for initializing the memory as part of the POST process at power-on. Intel provides support in the MRC for all fully validated memory configurations. For non-validated configurations, a system designer should work with their BIOS vendor to produce a working MRC solution ... The MRC in the system BIOS needs to know the specification of the attached system memory. Most of this info should be contained in the onboard SPD. With this in mind care needs to be taken when programming the appropriate values into the SPD [the part of a memory module that contains its operating requirements and specification]. A system designer should work with their memory and BIOS vendors to implement a suitable SPD programming.
As such, the MRC is a part of the BIOS (or firmware) of an Intel motherboard. George Chen, a research and development (R&D) director at ASUS, described it in 2007 as follows:
The MRC is part of reference BIOS code, which relates to memory initialization in the BIOS. It includes information about memory settings, frequency, timing, driving and detailed operations of the memory controller. The MRC is written in a C-language code, which can be edited and compiled by board makers. It provides a space to develop advanced features, and the ability to tune memory. We try to look into [Intel's] Memory Reference Code to try to understand its behaviour ... Sometimes, there are some remarks inside the source code, while on other occasions, we just try to change |
https://en.wikipedia.org/wiki/Mesh%20analysis | Mesh analysis (or the mesh current method) is a method that is used to solve planar circuits for the currents (and indirectly the voltages) at any place in the electrical circuit. Planar circuits are circuits that can be drawn on a plane surface with no wires crossing each other. A more general technique, called loop analysis (with the corresponding network variables called loop currents) can be applied to any circuit, planar or not. Mesh analysis and loop analysis both make use of Kirchhoff’s voltage law to arrive at a set of equations guaranteed to be solvable if the circuit has a solution. Mesh analysis is usually easier to use when the circuit is planar, compared to loop analysis.
Mesh currents and essential meshes
Mesh analysis works by arbitrarily assigning mesh currents in the essential meshes (also referred to as independent meshes). An essential mesh is a loop in the circuit that does not contain any other loop. Figure 1 labels the essential meshes with one, two, and three.
A mesh current is a current that loops around the essential mesh and the equations are solved in terms of them. A mesh current may not correspond to any physically flowing current, but the physical currents are easily found from them. It is usual practice to have all the mesh currents loop in the same direction. This helps prevent errors when writing out the equations. The convention is to have all the mesh currents looping in a clockwise direction. Figure 2 shows the same circuit from Figure 1 with the mesh currents labeled.
Solving for mesh currents instead of directly applying Kirchhoff's current law and Kirchhoff's voltage law can greatly reduce the amount of calculation required. This is because there are fewer mesh currents than there are physical branch currents. In figure 2 for example, there are six branch currents but only three mesh currents.
Setting up the equations
Each mesh produces one equation. These equations are the sum of the voltage drops in a comple |
https://en.wikipedia.org/wiki/Emergent%20materialism | In the philosophy of mind, emergent (or emergentist) materialism is a theory which asserts that the mind is irreducibly existent in some sense. However, the mind does not exist in the sense of being an ontological simple. Further, the study of mental phenomena is independent of other sciences. The theory primarily maintains that the human mind's evolution is a product of material nature and that it cannot exist without material basis.
Overview
The view holds that mental properties emerge as novel properties of complex material systems. These are conceptually irreducible as physical properties of the complexes that have them. The theory, however, states that the mind is independent due to the causal influences between body and mind. This is described as a "primitive relation" that is grounded in or dependent on the physical, but with metaphysical necessity.
Emergent materialism can be divided into emergence which denies mental causation and emergence which allows for causal effect. A version of the latter type has been advocated by John R. Searle, called biological naturalism.
The other main group of materialist views in the philosophy of mind can be labeled non-emergent (or non-emergentist) materialism, and includes pure physicalism (eliminative materialism), identity theory (reductive materialism), philosophical behaviorism, and functionalism.
See also
Cartesian dualism
Emergentism
Emergence
Epiphenomenalism
Materialism
Mind–body problem
Monism
Physicalism |
https://en.wikipedia.org/wiki/K%C5%8Dwhai | Kōwhai ( or ) are small woody legume trees within the genus Sophora, in the family Fabaceae, that are native to New Zealand. There are eight species, with Sophora microphylla and S. tetraptera being as large trees. Their natural habitat is beside streams and on the edges of forest, in lowland or mountain open areas. Kōwhai trees grow throughout the country and are a common feature in New Zealand gardens. Outside of New Zealand, kōwhai tend to be restricted to mild temperate maritime climates.
The blooms of the kōwhai are widely regarded as being New Zealand's unofficial national flower. As such, it is often incorporated as a visual shorthand for the country, such as in Meghan Markle's wedding veil, which included distinctive flora representing all Commonwealth nations.
The Māori word kōwhai is related to words in some other Polynesian languages that refer to different species that look superficially similar, such as (Sesbania tomentosa), (Sesbania grandiflora) and Marquesan kohai (Caesalpinia pulcherrima). Kōwhai is also the Māori word for the colour yellow. The spelling kowhai (without a macron) is common in New Zealand English.
Species
The eight species of kōwhai are:
Sophora chathamica, coastal kōwhai
Sophora fulvida, Waitakere kōwhai
Sophora godleyi, Godley's kōwhai
Sophora longicarinata, limestone kōwhai
Sophora microphylla, small-leaved kōwhai
Sophora molloyi, Cook Strait kōwhai
Sophora prostrata, prostrate kōwhai
Sophora tetraptera, large-leaved kōwhai
Description and ecology
Most species of kōwhai grow to around 8 m high and have fairly smooth bark with small leaves. S. microphylla has smaller leaves (0.5–0.7 cm long by 0.3–0.4 cm wide) and flowers (2.5–3.5 cm long) than S. tetraptera, which has leaves of 1–2 cm long and flowers that are 3–5 cm long.
The very distinctive seed pods that appear after flowering are almost segmented, and each contains six or more smooth, hard seeds. Most species have yellow seeds, but Sophora prostrata has bla |
https://en.wikipedia.org/wiki/Deme%20%28biology%29 | In biology, a deme, in the strict sense, is a group of individuals that belong to the same taxonomic group. However, when biologists, and especially ecologists, use the term ‘deme’ they usually refer to it as the definition of a gamodeme: a local group of individuals (from the same taxon) that interbreed with each other and share a gene pool. The latter definition of a deme is only applicable to sexual reproducing species, while the former is more neutral and also takes asexual reproducing species into account, such as certain plant species. In the following sections the latter (and most frequently used) definition of a deme will be used.
In evolutionary computation, a "deme" often refers to any isolated subpopulation subjected to selection as a unit rather than as individuals.
Local adaptation
A population of a species usually has multiple demes. Environments between these demes can differ. Demes could, therefore, become locally adapted to their environment. A good example of this is the Adaptive Deme Formation (ADF) hypothesis in insects. The ADF hypothesis states that herbivorous insects can become adapted to specific host plants in their local environment because local plants can have unique nutrient patches to which insects may become adapted. This hypothesis predicts that less mobile insect demes are more likely to become locally adapted than more dispersive insect. However, a meta-analysis, based on 17 studies on this subject, showed that dispersive insect demes were as likely to become locally adapted as less mobile insects. Moreover, this study found a small indication that feeding behaviour might stimulate the local adaptation of demes. Endophagous insects were more likely to become locally adapted than exophagous insects. The explanation for this could be that endophagous insects come in more close and continuous contact to the plant's mechanical, chemical and phenological defensive mechanisms.
Speciation and demes
Speciation could occur at the level |
https://en.wikipedia.org/wiki/Anti-vaccine%20activism | Anti-vaccine activism is organized activity designed to increase vaccine hesitancy, often by disseminating misinformation or disinformation. Although myths, conspiracy theories, misinformation and disinformation spread by the anti-vaccination movement and fringe doctors increases vaccine hesitancy and public debates around the medical, ethical, and legal issues related to vaccines, there is no serious hesitancy or debate within mainstream medical and scientific circles about the benefits of vaccination.
18th and 19th century
Ideas that would eventually coalesce into anti-vaccine activism have existed for longer than vaccines themselves. Some philosophical approaches (e.g. homeopathy, vitalism) are incompatible with the microbiological paradigm that explains how the immune system and vaccines work. Vaccine hesitancy and anti-vaccine activism exist within a broader context that involves cultural tradition, religious belief, approaches to health and disease, and political affiliation.
Opposition to variolation for smallpox (a predecessor to vaccination) was organized as early as the 1820s around the premise that vaccination was unnatural and an attempt to thwart divine judgment. Religious arguments against inoculation, the earliest arguments against vaccination, were soon advanced. For example, in a 1722 sermon entitled "The Dangerous and Sinful Practice of Inoculation", the English theologian Reverend Edmund Massey argued that diseases are sent by God to punish sin and that any attempt to prevent smallpox via inoculation is a "diabolical operation". It was customary at the time for popular preachers to publish sermons, which reached a wide audience. This was the case with Massey, whose sermon reached North America, where there was early religious opposition, particularly by John Williams. A greater source of opposition there was William Douglass, a medical graduate of Edinburgh University and a Fellow of the Royal Society, who had settled in Boston.
Vaccination it |
https://en.wikipedia.org/wiki/Eastin%E2%80%93Knill%20theorem | The Eastin–Knill theorem is a no-go theorem that states: "No quantum error correcting code can have a continuous symmetry which acts transversely on physical qubits". In other words, no quantum error correcting code can transversely implement a universal gate set, where a transversal logical gate is one that can be implemented on a logical qubit by the independent action of separate physical gates on corresponding physical qubits.
In addition to investigating fault tolerant quantum computation, the Eastin–Knill theorem is also useful for studying quantum gravity via the AdS/CFT correspondence and in condensed matter physics via quantum reference frame or many-body theory.
The theorem is named after Bryan Eastin and Emanuel Knill, who published it in 2009.
Description
Since quantum computers are inherently noisy, quantum error correcting codes are used to correct errors that affect information due to decoherence and dissipation. Decoding error corrected data in order to perform gates on the qubits makes it prone to errors. Fault tolerant quantum computation avoids this by performing gates on encoded data. Transversal gates, which perform a gate between two logical qubits each of which is encoded in N physical qubits by pairing up the physical qubits of each encoded qubit ("code block"), and performing independent gates on each pair, can be used to perform fault tolerant but not universal quantum computation because they guarantee that errors don't spread uncontrollably through the computation. This is because transversal gates ensure that each qubit in a code block is acted on by at most a single physical gate and each code block is corrected independently when an error occurs.
The Eastin–Knill theorem implies that a universal set like } gates can't be implemented transversally. For example, the T gate can't be implemented transversely in the Steane code. This calls for ways of circumventing Eastin–Knill in order to perform fault tolerant quantum computatio |
https://en.wikipedia.org/wiki/Malthusian%20growth%20model | A Malthusian growth model, sometimes called a simple exponential growth model, is essentially exponential growth based on the idea of the function being proportional to the speed to which the function grows. The model is named after Thomas Robert Malthus, who wrote An Essay on the Principle of Population (1798), one of the earliest and most influential books on population.
Malthusian models have the following form:
where
P0 = P(0) is the initial population size,
r = the population growth rate, which Ronald Fisher called the Malthusian parameter of population growth in The Genetical Theory of Natural Selection, and Alfred J. Lotka called the intrinsic rate of increase,
t = time.
The model can also been written in the form of a differential equation:
with initial condition:
P(0)= P0
This model is often referred to as the exponential law. It is widely regarded in the field of population ecology as the first principle of population dynamics, with Malthus as the founder. The exponential law is therefore also sometimes referred to as the Malthusian Law. By now, it is a widely accepted view to analogize Malthusian growth in Ecology to Newton's First Law of uniform motion in physics.
Malthus wrote that all life forms, including humans, have a propensity to exponential population growth when resources are abundant but that actual growth is limited by available resources:
A model of population growth bounded by resource limitations was developed by Pierre Francois Verhulst in 1838, after he had read Malthus' essay. Verhulst named the model a logistic function.
See also
Albert Allen Bartlett – a leading proponent of the Malthusian Growth Model
Exogenous growth model – related growth model from economics
Growth theory – related ideas from economics
Human overpopulation
Irruptive growth – an extension of the Malthusian model accounting for population explosions and crashes
Malthusian catastrophe
Neo-malthusianism
The Genetical Theory of Natural Selection |
https://en.wikipedia.org/wiki/Pytkeev%20space | In mathematics, and especially topology, a Pytkeev space is a topological space that satisfies qualities more subtle than a convergence of a sequence. They are named after E. G. Pytkeev, who proved in 1983 that sequential spaces have this property.
Definitions
Let X be a topological space. For a subset S of X let S denote the closure of S. Then a point x is called a Pytkeev point if for every set A with , there is a countable -net of infinite subsets of A. A Pytkeev space is a space in which every point is a Pytkeev point.
Examples
Every sequential space is also a Pytkeev space. This is because, if then there exists a sequence {ak} that converges to x. So take the countable π-net of infinite subsets of A to be }.
If X is a Pytkeev space, then it is also a Weakly Fréchet–Urysohn space. |
https://en.wikipedia.org/wiki/Mordant | A mordant or dye fixative is a substance used to set (i.e., bind) dyes on fabrics. It does this by forming a coordination complex with the dye, which then attaches to the fabric (or tissue). It may be used for dyeing fabrics or for intensifying stains in cell or tissue preparations. Although mordants are still used, especially by small batch dyers, it has been largely displaced in industry by directs.
The term mordant comes from the Latin mordere, "to bite". In the past, it was thought that a mordant helped the dye bite onto the fiber so that it would hold fast during washing. A mordant is often a polyvalent metal ion, and one example is chromium (III). The resulting coordination complex of dye and ion is colloidal and can be either acidic or alkaline.
Common dye mordants
Mordants include tannic acid, oxalic acid, alum, chrome alum, sodium chloride, and certain salts of aluminium, chromium, copper, iron, iodine, potassium, sodium, tungsten, and tin.
Iodine is often referred to as a mordant in Gram stains, but is in fact a trapping agent.
Dyeing methods
The three methods used for mordanting are:
Pre-mordanting (onchrome): The substrate is treated with the mordant and then the dye. The complex between the mordant and dye is formed on the fibre.
Meta-mordanting (metachrome): The mordant is added in the dye bath itself. The process is simpler than pre- or post-mordanting, but is applicable to only a few dyes. Mordant red 19 shown above is applied in this manner
Post-mordanting (afterchrome): The dyed material is treated with a mordant. The complex between the mordant and dye is formed on the fibre.
The type of mordant used affects the shade obtained after dyeing and also affects the fastness property of the dye. The application of mordant, either pre-mordant, meta-mordant or post-mordant methods, is influenced by:
The action of the mordant on the substrate: if the mordant and dye methods are harsh (for example, an acidic mordant with an acidic dye), pre- |
https://en.wikipedia.org/wiki/FDOA | Frequency difference of arrival (FDOA) or differential Doppler (DD), is a technique analogous to TDOA for estimating the location of a radio emitter based on observations from other points. (It can also be used for estimating one's own position based on observations of multiple emitters). TDOA and FDOA are sometimes used together to improve location accuracy and the resulting estimates are somewhat independent. By combining TDOA and FDOA measurements, instantaneous geolocation can be performed in two dimensions.
It differs from TDOA in that the FDOA observation points must be in relative motion with respect to each other and the emitter. This relative motion results in different doppler shifts observations of the emitter at each location in general. The relative motion can be achieved by using airborne observations in aircraft, for example. The emitter location can then be estimated with knowledge of the observation points' location and vector velocities and the observed relative doppler shifts between pairs of locations.
A disadvantage of FDOA is that large amounts of data must be moved between observation points or to a central location to do the cross-correlation that is necessary to estimate the doppler shift.
The accuracy of the location estimate is related to the bandwidth of the emitter's signal, the signal-to-noise ratio at each observation point, and the geometry and vector velocities of the emitter and the observation points.
See also
Multilateration
Further reading
Ho, K.C.; Chan, Y.T.;, "Geolocation of a known altitude object from TDOA and FDOA measurements," IEEE Transactions on Aerospace and Electronic Systems, vol.33, no.3, pp.770-783, July 1997. , IEEE XPlore.
Digital signal processing |
https://en.wikipedia.org/wiki/Tridemorph | Tridemorph is a fungicide used to control Erysiphe graminis. It was developed by BASF in the 1960s who use the trade name Calixin. The World Health Organization has categorized it as a Class II "moderately hazardous" pesticide because it is believed harmful if swallowed and can cause irritation to skin and eyes.
One theory for the cause of the Hollinwell incident is that it might have been caused by inhalation of tridemorph. |
https://en.wikipedia.org/wiki/Molecular%20tagging%20velocimetry | Molecular tagging velocimetry (MTV) is a specific form of flow velocimetry, a technique for determining the velocity of currents in fluids such as air and water. In its simplest form, a single "write" laser beam is shot once through the sample space. Along its path an optically induced chemical process is initiated, resulting in the creation of a new chemical species or in changing the internal energy state of an existing one, so that the molecules struck by the laser beam can be distinguished from the rest of the fluid. Such molecules are said to be "tagged".
This line of tagged molecules is now transported by the fluid flow. To obtain velocity information, images at two instances in time are obtained and analyzed (often by correlation of the image intensities) to determine the displacement. If the flow is three-dimensional or turbulent the line will not only be displaced, it will also be deformed.
Description
There are three optical ways via which these tagged molecules can be visualized: fluorescence, phosphorescence and laser-induced fluorescence (LIF). In all three cases molecules relax to a lower state and their excess energy is released as photons. In fluorescence this energy decay occurs rapidly (within s to s at atmospheric pressure), thus making "direct" fluorescence impractical for tagging. In phosphorescence the decay is slower, because the transition is quantum-mechanically forbidden.
In some "writing" schemes, the tagged molecule ends up in an excited state. If the molecule relaxes through phosphorescence, lasting long enough to see line displacement, this can be used to track the written line and no additional visualisation step is needed. If during tagging the molecule did not reach a phosphorescing state, or relaxed before the molecule was "read", a second step is needed. The tagged molecule is then excited using a second laser beam, employing a wavelength such that it specifically excites the tagged molecule. The molecule will fluoresce and th |
https://en.wikipedia.org/wiki/Tiger%27s%20blood | Tiger's blood or tiger blood is a flavor of shave ice, snow cones, and other products.
It does not contain blood or anything from tigers. The flavor is a combination of strawberry, watermelon, and a smaller amount of coconut, though some syrup makers have slightly different recipes and add other flavors like cherry.
Though the flavor is strongly associated with Hawaii, some think it originated in Texas in the 1980s. However, ads from the area at the time make clear the connection to Hawaii, and the flavor was still considered exotic in Texas into the next decade. Also in the mid 1980's tiger blood was appearing in Utah and South Carolina along with imaginative flavors like "rock & roll" and "popeye". In 1977 the flavor was in Missouri at a New Orleans-style shave-ice shop. |
https://en.wikipedia.org/wiki/Candy%20cap | Candy cap or curry milkcap is the English-language common name for several closely related edible species of Lactarius; L. camphoratus, L. fragilis, and L. rubidus. These mushrooms are valued for their highly aromatic qualities and are used culinarily as a flavoring rather than as a constituent of a full meal.
Description and classification
Candy caps are small to medium-size mushrooms, with a pileus ranging from 2–5 cm in diameter (though L. rubidus and L. rufulus can be slightly larger), and with coloration ranging through various burnt orange to burnt orange-red to orange-brown shades. The pileus shape ranges from broadly convex in young specimens to plane to slightly depressed in older ones; lamellae are attached to subdecurrent. The entire fruiting body is quite fragile and brittle. Like all members of Lactarius, the fruiting body exudes a latex when broken, which in these species is whitish and watery in appearance, and is often compared to whey or nonfat milk. The latex may have little flavor or may be slightly sweet, but should never taste bitter or acrid. These species are particularly distinguishable by their scent, which has been variously compared to maple syrup, camphor, curry, fenugreek, burnt sugar, Malt-O-Meal, or Maggi-Würze. This scent may be quite faint in fresh specimens, but typically becomes quite strong when the fruiting body is dried.
Microscopically, they share features typical of Lactarius, including round to slightly ovular spores with distinct amyloid ornamentation and sphaerocysts that are abundant in the pileus and stipe trama, but infrequent in the lamellar trama.
The candy caps have been placed in various infrageneric groups of Lactarius depending on the author. Bon defined the candy caps and allies as making up the subsection Camphoratini of the section Olentes. Subsection Camphoratini is defined by their similarity in color, odor (with the exception of L. rostratus – see below), and by the presence of macrocystidia on their hymen |
https://en.wikipedia.org/wiki/Seaport%20Centre | Seaport Centre is a high-tech business park located in Redwood City, California, United States, and as of 2007 is one of the largest biotechnology research complexes in the San Francisco Bay Area.
The property consists of of developed building area, and is situated in proximity to the Port of Redwood City. The property is classified as Class A office space and is constructed as a series of separate buildings. The original lands of the Seaport Centre were used as salt evaporation ponds on tidal lands of the San Francisco Bay, a land use that started sometime prior to 1940. As of 2002 leasing rates at Seaport Centre were in the range of $27 per square foot per annum. In 2005, Slough Estates, a United Kingdom-based REIT, purchased the entirety of Seaport Centre to develop it as a biotechnology research center to compete with the existing biotech hubs in Silicon Valley and South San Francisco.
The Seaport Centre is located on generally level ground at approximately above mean sea level. Stormwater surface runoff is pumped from Seaport Centre to discharge into Redwood Creek.
Aerial photographic history
Due to the large scale of this area and its historical lack of accessibility, the area history can be revealed well with aerial photographic records. In 1989, the firm of Earth Metrics Incorporated conducted a review of historic aerial photographs dating back to 1956.(Earth Metrics, 1989) The Seaport Centre site and its environs, as of the 1956 aerial stereo photo, were essentially undeveloped, although extensive salt evaporation ponds were evident on site. Redwood City Planning Department records confirm that the site was used for salt evaporation since sometime prior to World War II.
Analysis of five sets of time staged stereo pairs of aerial photos reveal that the Seaport Centre site remained undeveloped until 1982; up until that time, city records show that the site was zoned as "Tidal Plain", a designation not allowing urban development. Area land use gra |
https://en.wikipedia.org/wiki/Apportionment%20%28politics%29 | Apportionment is the process by which seats in a legislative body are distributed among administrative divisions, such as states or parties, entitled to representation. This page presents the general principles and issues related to apportionment. The page Apportionment by country describes specific practices used around the world. The page Mathematics of apportionment describes mathematical formulations and properties of apportionment rules.
The simplest and most universal principle is that elections should give each voter's intentions equal weight. This is both intuitive and stated in laws such as the Fourteenth Amendment to the United States Constitution (the Equal Protection Clause). However, there are a variety of historical and technical reasons why this principle is not followed absolutely or, in some cases, as a first priority.
Common problems
Fundamentally, the representation of a population in the thousands or millions by a reasonable size, thus accountable governing body involves arithmetic that will not be exact. Although weighing a representative's votes (on proposed laws and measures etc.) according to the number of their constituents could make representation more exact, giving each representative exactly one vote avoids complexity in governance.
Over time, populations migrate and change in number. Governing bodies, however, usually exist for a defined term of office. While parliamentary systems provide for dissolution of the body in reaction to political events, no system tries to make real-time adjustments (during one term of office) to reflect demographic changes. Instead, any redistricting takes effect at the next scheduled election or next scheduled census.
Apportionment by district
In some representative assemblies, each member represents a geographic district. Equal representation requires that districts comprise the same number of residents or voters. But this is not universal, for reasons including the following:
In federations li |
https://en.wikipedia.org/wiki/Dialogue%20Concerning%20the%20Two%20Chief%20World%20Systems | The Dialogue Concerning the Two Chief World Systems (Dialogo sopra i due massimi sistemi del mondo) is a 1632 Italian-language book by Galileo Galilei comparing the Copernican system with the traditional Ptolemaic system. It was translated into Latin as Systema cosmicum () in 1635 by Matthias Bernegger. The book was dedicated to Galileo's patron, Ferdinando II de' Medici, Grand Duke of Tuscany, who received the first printed copy on February 22, 1632.
In the Copernican system, the Earth and other planets orbit the Sun, while in the Ptolemaic system, everything in the Universe circles around the Earth. The Dialogue was published in Florence under a formal license from the Inquisition. In 1633, Galileo was found to be "vehemently suspect of heresy" based on the book, which was then placed on the Index of Forbidden Books, from which it was not removed until 1835 (after the theories it discussed had been permitted in print in 1822). In an action that was not announced at the time, the publication of anything else he had written or ever might write was also banned in Catholic countries.
Overview
While writing the book, Galileo referred to it as his Dialogue on the Tides, and when the manuscript went to the Inquisition for approval, the title was Dialogue on the Ebb and Flow of the Sea. He was ordered to remove all mention of tides from the title and to change the preface because granting approval to such a title would look like approval of his theory of the tides using the motion of the Earth as proof. As a result, the formal title on the title page is Dialogue, which is followed by Galileo's name, academic posts, and followed by a long subtitle. The name by which the work is now known was extracted by the printer from the description on the title page when permission was given to reprint it with an approved preface by a Catholic theologian in 1744. This must be kept in mind when discussing Galileo's motives for writing the book. Although the book is presented formall |
https://en.wikipedia.org/wiki/Perron%27s%20irreducibility%20criterion | Perron's irreducibility criterion is a sufficient condition for a polynomial to be irreducible in —that is, for it to be unfactorable into the product of lower-degree polynomials with integer coefficients.
This criterion is applicable only to monic polynomials. However, unlike other commonly used criteria, Perron's criterion does not require any knowledge of prime decomposition of the polynomial's coefficients.
Criterion
Suppose we have the following polynomial with integer coefficients
where . If either of the following two conditions applies:
then is irreducible over the integers (and by Gauss's lemma also over the rational numbers).
History
The criterion was first published by Oskar Perron in 1907 in Journal für die reine und angewandte Mathematik.
Proof
A short proof can be given based on the following lemma due to Panaitopol:
Lemma. Let be a polynomial with . Then exactly one zero of satisfies , and the other zeroes of satisfy .
Suppose that where and are integer polynomials. Since, by the above lemma, has only one zero with modulus not less than , one of the polynomials has all its zeroes strictly inside the unit circle. Suppose that are the zeroes of , and . Note that is a nonzero integer, and , contradiction. Therefore, is irreducible.
Generalizations
In his publication Perron provided variants of the criterion for multivariate polynomials over arbitrary fields. In 2010, Bonciocat published novel proofs of these criteria.
See also
Eisenstein's criterion
Cohn's irreducibility criterion |
https://en.wikipedia.org/wiki/Charge%20density%20wave | A charge density wave (CDW) is an ordered quantum fluid of electrons in a linear chain compound or layered crystal. The electrons within a CDW form a standing wave pattern and sometimes collectively carry an electric current. The electrons in such a CDW, like those in a superconductor, can flow through a linear chain compound en masse, in a highly correlated fashion. Unlike a superconductor, however, the electric CDW current often flows in a jerky fashion, much like water dripping from a faucet due to its electrostatic properties. In a CDW, the combined effects of pinning (due to impurities) and electrostatic interactions (due to the net electric charges of any CDW kinks) likely play critical roles in the CDW current's jerky behavior, as discussed in sections 4 & 5 below.
Most CDW's in metallic crystals form due to the wave-like nature of electrons – a manifestation of quantum mechanical wave–particle duality – causing the electronic charge density to become spatially modulated, i.e., to form periodic "bumps" in charge. This standing wave affects each electronic wave function, and is created by combining electron states, or wavefunctions, of opposite momenta. The effect is somewhat analogous to the standing wave in a guitar string, which can be viewed as the combination of two interfering, traveling waves moving in opposite directions (see interference (wave propagation)).
The CDW in electronic charge is accompanied by a periodic distortion – essentially a superlattice – of the atomic lattice. The metallic crystals look like thin shiny ribbons (e.g., quasi-1-D NbSe3 crystals) or shiny flat sheets (e.g., quasi-2-D, 1T-TaS2 crystals). The CDW's existence was first predicted in the 1930s by Rudolf Peierls. He argued that a 1-D metal would be unstable to the formation of energy gaps at the Fermi wavevectors ±kF, which reduce the energies of the filled electronic states at ±kF as compared to their original Fermi energy EF. The temperature below which such gaps form |
https://en.wikipedia.org/wiki/Comparison%20of%20data-serialization%20formats | This is a comparison of data serialization formats, various ways to convert complex objects to sequences of bits. It does not include markup languages used exclusively as document file formats.
Overview
Syntax comparison of human-readable formats
Comparison of binary formats
See also
Comparison of document-markup languages |
https://en.wikipedia.org/wiki/Nanoneuronics | Nanoneuronics is an emerging discipline involving the application of nanometer-scale methods, materials, science and technology to neurons and neural tissue in order to design and develop advanced medical applications.
Overview
Nanoneuronics is a new discipline of engineering that aims to harness the collaborative power and knowledge of nanotechnology, neuroscience, electrical engineering, neural engineering and ethics for the design and development of advanced medical interventions with the nervous system.
Although non-invasive approaches to the nervous system have been effective for diagnosis and therapy in many treatments, an overwhelming number of severe neurological conditions will likely require invasive approaches for effective therapY.
History
The term “nanoneuronics” was coined in 2006 by Prof. Richard Magin, at the time the head of the Bioengineering Department at the University of Illinois at Chicago.
The National Science Foundation has approved initial funding toward the study of ways in which experts in these fields can work together to promote interdisciplinary research. |
https://en.wikipedia.org/wiki/Ergodic%20sequence | In mathematics, an ergodic sequence is a certain type of integer sequence, having certain equidistribution properties.
Definition
Let be an infinite, strictly increasing sequence of positive integers. Then, given an integer q, this sequence is said to be ergodic mod q if, for all integers , one has
where
and card is the count (the number of elements) of a set, so that is the number of elements in the sequence A that are less than or equal to t, and
so is the number of elements in the sequence A, less than t, that are equivalent to k modulo q. That is, a sequence is an ergodic sequence if it becomes uniformly distributed mod q as the sequence is taken to infinity.
An equivalent definition is that the sum
vanish for every integer k with .
If a sequence is ergodic for all q, then it is sometimes said to be ergodic for periodic systems.
Examples
The sequence of positive integers is ergodic for all q.
Almost all Bernoulli sequences, that is, sequences associated with a Bernoulli process, are ergodic for all q. That is, let be a probability space of random variables over two letters . Then, given , the random variable is 1 with some probability p and is zero with some probability 1-p; this is the definition of a Bernoulli process. Associated with each is the sequence of integers
Then almost every sequence is ergodic.
See also
Ergodic theory
Ergodic process, for the use of the term in signal processing
Ergodic theory
Integer sequences |
https://en.wikipedia.org/wiki/CMBFAST | In physical cosmology, CMBFAST is a computer code, written by Uroš Seljak and Matias Zaldarriaga, for computing the anisotropy of the cosmic microwave background. It was the first efficient program to do so, reducing the time taken to compute the anisotropy from several days to a few minutes by using a novel semi-analytic line-of-sight approach. |
https://en.wikipedia.org/wiki/Guaro%20%28drink%29 | Guaro is a liquor made in many places in Latin America. A clear liquid distilled from sugar cane juices, it has a slightly sweeter taste than comparable liquors. It is traditionally 60 proof or 30% alcohol, although recently 70 proof and 80 proof versions are produced. It is popular in Colombia, Costa Rica, Ecuador, El Salvador, Guatemala, Honduras, Nicaragua, and Panama, although in many places the word "guaro" can refer to almost any liquor.
The name "guaro" came from Central America. Colombians call it aguardiente. Sometimes it is referred to as a "soft vodka" because it has a lower alcohol content than vodka.
History
In Costa Rica, the government nationalized its manufacture in 1851 in an effort to quell the clandestine production of liquor. The Fabrica Nacional de Licores (National Liquor Factory) was founded for this reason, and since 1980 produces the only legal brand, Cacique Guaro.
Clandestine and fraudulent production
Clandestine liquor production is still prevalent, but it is seen more as a tradition than a business as it would be difficult to compete with the nationally produced guaro. The illegal version of the product is often called guaro de contrabando ("smuggled guaro") and is produced by various methods, all through distillation, but with different base ingredients, typically fruits or sweets from other sources, molasses from sugarcane, or simply sugar.
Deaths
In 2019 multiple deaths were reported caused by drinking adulterated counterfeit guaro produced by various criminal organizations.
Export
In 2004, the Costa Rican company S. Guaro LLC began exporting guaro to California in the United States. In 2005, Tranquilo Imports began marketing Guaro Tranquilo in Texas in the United States. As of 2007, guaro was still difficult to find in U.S. markets. |
https://en.wikipedia.org/wiki/PLAT%20domain | In molecular biology the PLAT domain is a protein domain that is found in a variety of membrane or lipid associated proteins. It is called the PLAT (Polycystin-1, Lipoxygenase, Alpha-Toxin) domain<ref
name="PUB00018111"></ref> or LH2 (Lipoxygenase homology) domain. The known structure
of pancreatic lipase shows this domain binds to procolipase , which mediates membrane association.
This domain forms a beta-sandwich composed of two β-sheets of four β-strands each.
Human proteins containing this domain
ALOX12; ALOX12B; ALOX12P2; ALOX15; ALOX15B; ALOX5; ALOXE3; LIPC;
LIPG; LOXHD1; LPL; PKD1; PKD1L1; PKD1L2; PKD1L3; PKDREJ;
PNLIP; PNLIPRP1; PNLIPRP2; PNLIPRP3; RAB6IP1; |
https://en.wikipedia.org/wiki/Trailing%20zero | In mathematics, trailing zeros are a sequence of 0 in the decimal representation (or more generally, in any positional representation) of a number, after which no other digits follow.
Trailing zeros to the right of a decimal point, as in 12.340, don’t affect the value of a number and may be omitted if all that is of interest is its numerical value. This is true even if the zeros recur infinitely. For example, in pharmacy, trailing zeros are omitted from dose values to prevent misreading. However, trailing zeros may be useful for indicating the number of significant figures, for example in a measurement. In such a context, "simplifying" a number by removing trailing zeros would be incorrect.
The number of trailing zeros in a non-zero base-b integer n equals the exponent of the highest power of b that divides n. For example, 14000 has three trailing zeros and is therefore divisible by 1000 = 103, but not by 104. This property is useful when looking for small factors in integer factorization. Some computer architectures have a count trailing zeros operation in their instruction set for efficiently determining the number of trailing zero bits in a machine word.
Factorial
The number of trailing zeros in the decimal representation of n!, the factorial of a non-negative integer n, is simply the multiplicity of the prime factor 5 in n!. This can be determined with this special case of de Polignac's formula:
where k must be chosen such that
more precisely
and denotes the floor function applied to a. For n = 0, 1, 2, ... this is
0, 0, 0, 0, 0, 1, 1, 1, 1, 1, 2, 2, 2, 2, 2, 3, 3, 3, 3, 3, 4, 4, 4, 4, 4, 6, ... .
For example, 53 > 32, and therefore 32! = 263130836933693530167218012160000000 ends in
zeros. If n < 5, the inequality is satisfied by k = 0; in that case the sum is empty, giving the answer 0.
The formula actually counts the number of factors 5 in n!, but since there are at least as many factors 2, this is equivalent to the number of factors 10, each o |
https://en.wikipedia.org/wiki/IObit%20Malware%20Fighter | IObit Malware Fighter (introduced in 2004) is an anti-malware and anti-virus program for the Microsoft Windows operating system (Windows XP and later). It is designed to remove and protect against malware, including, but not limited to Trojans, rootkits, and ransomware.
Overview
IObit Malware Fighter has a freeware version, which can run alongside the user's existing anti-virus solution. In the paid edition, the product comes with anti-virus protection. As of version 6, released in 2018, the product includes the Bitdefender engine in its commercial version, along with its anti-malware engine. New features of the latest release includes an improved user interface called "Safe Box" created to protect specific folders from unauthorized access, and "MBR Guard" which protects the user's system from malicious attacks such as Petya and cryptocurrency mining scripts.
Releases
In 2010, the first beta for IObit Malware Fighter 1.0 was released to the public.
In 2013, IObit Malware Fighter 2 was released. In this version, IObit debuted its "cloud security" component, in which the user can upload a file to the cloud to determine whether it is malicious or not. In 2015, version 3 was released, and then, in 2016, version 4, which added the Bitdefender anti-virus engine in its commercial edition.
In 2017, version 5 was released. Among new features was an anti-ransomware component. Version 6 was released in May 2018.
In 2018, version 6 was released. It added new features, including Safe Box, and MBR Guard.
Reception
In November 2011, the free and paid versions of IObit Malware Fighter were reviewed by Bright Hub, in which the reviewer was unable to recommend the product, citing poor malware protection.
In May 2013, IObit Malware Fighter received a "dismal" score, half a star out of five, for its paid version by PC Magazine.
In December 2013, the paid version of IObit Malware Fighter received a 1 out of 5-star rating from Softpedia.
In March 2015, the commercial version of I |
https://en.wikipedia.org/wiki/Spelunker%20%28video%20game%29 | Spelunker is a 1983 platform video game developed by Timothy G. Martin of MicroGraphic Image. It is set in a colossal cave, with the player starting at the cave's entrance at the top, and the objective is to get to the treasure at the bottom.
Originally released by MicroGraphic Image for the Atari 8-bit family in 1983, the game was later ported to the Commodore 64 and re-released by Broderbund in 1984, with European publishing rights licensed to Ariolasoft. It was released on arcade in 1985, on the Nintendo Entertainment System on December 6, 1985 in Japan and September 1987 in North America, and on the MSX in 1986. A sequel was released in arcades in 1986 called Spelunker II: 23 no Kagi, and a different sequel for the NES on September 18, 1987 called Spelunker II: Yūsha e no Chōsen, both by Irem and in Japan only.
Gameplay
The player must walk and jump through increasingly challenging parts of the cave, all while working with a finite supply of fresh air, which can be replenished at various points.
The cave's hazards include bats, which drop deadly guano on the player; and a ghost haunting the cave, randomly appearing to take the player to the shadow world. The player character can send a blast of air to push the ghost away. However, this renders the player's character immobile for a few seconds, thus vulnerable to other dangers and further depleting their air supply. Objects to collect include sticks of dynamite, flares, and keys. Precise positioning and jumping are key factors in successfully completing the game.
The cave is divided into six levels. Although the levels connect seamlessly to each other, forming one large map, the game clearly signals a level change at certain points by showing the name of the next level and giving the player a bonus, consisting of an extra life and a varying number of points. Once a player completed all six levels, a new cave will be started with the same layout but with increasing difficulty. There are six caves total. While |
https://en.wikipedia.org/wiki/Focal%20cloud | A focal cloud is the collection of focal points of an imperfect lens or parabolic reflector whether optical, electrostatic or electromagnetic. This includes parabolic antennas and lens-type reflective antennas of all kinds. The effect is analogous to the circle of confusion in photography.
In a perfect lens or parabolic reflector, rays parallel to the device's axis striking the lens or reflector all pass through a single point, the focal point. In an imperfectly constructed lens or reflector, rays passing through different parts of the element do not converge to a single point but have different focal points. The set of these focal points forms a region called the focal cloud. The diameter of the focal cloud determines the maximum resolution of the optical system. Lens-reflector artifacts, geometry and other imperfections determine the actual diameter of the focal cloud.
Satellite dish effects
A focal cloud can render a satellite dish less efficient, resulting in a reduced gain. The imperfections of the antenna lead to two problems: On the one hand the more the radio waves are directed away from the phase center of the feed horn, the more attenuated they get coupled into the waveguide. On the other hand the more the distance between antenna surface and feed horn varies, the bigger the phase shift gets - the closer the phase shift gets to 180 degrees (half a wave length) between different parts of the antenna surface, the more the signal gets extinguished (attenuated). Feed horn design might be able mitigate some of these losses.
For countering the effect, there are several techniques, either in construction of the reflectors or lenses, or in the way signal beams are concentrated.
Satellite-based dish antennas may be deformed intentionally to selectively distribute radiated power over a desired "footprint", in order to increase received power in the desired reception area (e.g. one selected nation), and reduce power outside of it (e.g. a neighboring nation) |
https://en.wikipedia.org/wiki/Pleurotus%20ostreatus | Pleurotus ostreatus, the oyster mushroom, oyster fungus, hiratake, or pearl oyster mushroom is a common edible mushroom.
It is one of the more commonly sought wild mushrooms, though it can also be cultivated on straw and other media.
Description
The mushroom has a broad, fan or oyster-shaped cap spanning ; natural specimens range from white to gray or tan to dark-brown; the margin is inrolled when young, and is smooth and often somewhat lobed or wavy. The flesh is white, firm, and varies in thickness due to stipe arrangement. The gills of the mushroom are white to cream, and descend on the stalk if present. If so, the stipe is off-center with a lateral attachment to wood. The spore print of the mushroom is white to lilac-gray, and best viewed on dark background.
The mushroom's stipe is often absent. When present, it is short and thick.
It has the bittersweet aroma of benzaldehyde (which is also characteristic of bitter almonds).
P. ostreatus is a carnivorous fungus, preying on nematodes by using a calcium-dependent toxin that paralyzes the prey within minutes of contact, causing necrosis and formation of a slurry to facilitate ingestion as a protein-rich food source.
Similar species
It is related to the similarly cultivated Pleurotus eryngii (king oyster mushroom). Other similar species include Pleurocybella porrigens, Hohenbuehelia petaloides, and the hairy-capped Phyllotopsis nidulans.
Omphalotus nidiformis is a toxic lookalike found in Australia and Japan. In North America, the toxic muscarine-containing Omphalotus olivascens (the western jack-o'-lantern mushroom) and Clitocybe dealbata (the ivory funnel mushroom) both bear a resemblance to P. ostreatus.
Name
Both the Latin and common names refer to the shape of the fruiting body. The Latin pleurotus (side-ear) refers to the sideways growth of the stem with respect to the cap, while the Latin ostreatus (and the English common name, oyster) refers to the shape of the cap which resembles the bivalve of the s |
https://en.wikipedia.org/wiki/List%20of%20computer%20system%20emulators | This article lists software and hardware that emulates computing platforms.
The host in this article is the system running the emulator, and the guest is the system being emulated.
The list is organized by guest operating system (the system being emulated), grouped by word length. Each section contains a list of emulators capable of emulating the specified guest, details of the range of guest systems able to be emulated, and the required host environment and licensing.
64-bit guest systems
ARM aarch64
AlphaServer
IBM
Silicon Graphics
UltraSPARC
x86-64 platforms (64-bit PC and compatible hardware)
60-bit guest systems
60-bit CDC 6000 series and Cyber mainframe
48-bit guest systems
English Electric KDF9
36-bit guest systems
DEC PDP-10
GE-600 series / Honeywell 6000 series
IBM 7094
32-bit guest systems
Acorn Archimedes, A7000, RiscPC, Phoebe
While the ARM processor in the Acorn Archimedes is a 32-bit chip, it only had 26-bit addressing making an ARM/Archimedes emulator, such as Aemulor or others below, necessary for 26-bit compatibility, for later ARM processors have mostly dropped it.
Amiga
Android
BlueStacks
Genymotion
LeapDroid
App Inventor for Android
Android Studio
MEmu
Android-x86
Nox App Player
Windows Subsystem for Android
Apple iOS
touchHLE
Apple Lisa
Apple Macintosh with 680x0 CPU
Macintosh with PowerPC CPU
Atari ST/STE/Falcon
AT&T UNIX PC
Cobalt Qube
Corel NetWinder
DEC VAX
DECstation
IBM mainframe (32-bit)
Motorola 88000
Sharp X68000
Sinclair QL
SPARCstation
x86 platforms (32-bit PC and compatible hardware)
24-bit guest systems
ICL 1900
SDS 900-series
20-bit guest systems
GE-200 series
PERQ
18-bit guest systems
DEC PDP-1
DEC PDP-4/7/9/15
16-bit guest systems
Apple IIGS
NEC PC-9800 series
DEC PDP-11
Mera 400
Polish minicomputer Mera 400. Also in development hardware emulator in FPGA.
TI-99/4 and TI-99/4A
Texas Instruments TI-980
Texas Instruments TI-990
Varian Data Machines
x86-16 IBM PC/XT/AT comp |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.