source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Fuxianospira%20gyrata | Fuxianospira gyrata is a Cambrian macroalgae found in the Chengjiang lagerstatte. Preserved in clustered, helicoid groups, the filaments are threadlike, plain and without branches. Brown and smooth in appearance, these structural characteristics display a resemblance to modern brown algae. A limited amount of algae species have been discovered in the Chengjiang biota, suggesting that diversity within the general algae population may have been sparse. It is thought that the macroalgae could be the most basic component of the Chengjiang biota food chain.
It is also theorised that Fuxianospira gyrata, among other Chengjiang algae, is actually a coprolite. |
https://en.wikipedia.org/wiki/Cristina%20Toninelli | Cristina Toninelli is an Italian mathematician who works in France as a director of research for the French National Centre for Scientific Research (CNRS), at the Centre de recherche en mathématiques de la décision (Ceremade) of Paris Dauphine University.
Her research concerns the probability theory and statistical mechanics of phase transitions in interacting particle systems, including bootstrap percolation, glass transitions, and jamming. She has also studied cellular automata and group testing.
Education and career
Toninelli studied physics at Sapienza University of Rome, earning a laurea in 2000 and completing a Ph.D. in 2004. Her doctoral dissertation, Kinetically constrained models for glassy dynamics, was supervised by Giovanni Jona-Lasinio.
She became a postdoctoral researcher in the laboratory for theoretical physics (LPT) at the École normale supérieure (Paris) from 2003 to 2005 and then for shorter periods at Service de Physique Théorique in CEA Paris-Saclay and at the Laboratory of Theoretical Physics and Statistical Models in Paris-Saclay University, also visiting the Instituto Nacional de Matemática Pura e Aplicada in Brazil. In 2006 she began working as a researcher for the CNRS. She has been a director of research since 2018.
Recognition
The Société mathématique de France gave Toninelli the 2021 , citing her work on the relaxation towards equilibrium of interacting particle systems. |
https://en.wikipedia.org/wiki/Mir-720%20microRNA%20precursor%20family | In molecular biology, mir-720 microRNA is a short RNA molecule. MicroRNAs function to regulate the expression levels of other genes by several mechanisms.
Congenital Neural Tube Defects
miR-720 expression has been found to vary in the serum levels of women carrying fetuses with and without neural tube defects. miR-720 is significantly downregulated following child delivery, thus suggesting a role in pregnancy as well as a possible placental derivation.
miR-720 Upregulation
miR-720 is upregulated in myelodysplastic syndromes, in molar tooth germ in newborn mice following anti-miR-214 injection and in mesangial cells (specialised smooth muscle cells in the kidneys) treated with microRNA inhibitor.
miR-720 Targeting
miR-720 was shown to target the pluripotency factor Nanog and to upregulate DNMTs. miR-720 controlled stem cell phenotype, proliferation, and differentiation of human dental pulp cells. Dental pulp includes mesenchymal (stem) cells, blood vessels, blood and peripheral nerves. Repression of the pluripotency factor Nanog and upregulation of DNMTs in dental pulp cells by miR-720 initiated odontoblastic differentiation. Therefore, it was suggested that odontoblastic differentiation of dental pulp stem cells required miR-720 that repressed Nanog and induced Dnmt3a and Dnmt3b.
See also
MicroRNA |
https://en.wikipedia.org/wiki/Source%20code%20virus | Source code viruses are a subset of computer viruses that make modifications to source code located on an infected machine. A source file can be overwritten such that it includes a call to some malicious code. By targeting a generic programming language, such as C, source code viruses can be very portable. Source code viruses are rare, partly due to the difficulty of parsing source code programmatically, but have been reported to exist.
One such virus (W32/Induc-A) was identified by anti-virus specialist Sophos as capable of injecting itself into the source code of any Delphi program it finds on an infected computer, and then compiles itself into a finished executable.
Notes |
https://en.wikipedia.org/wiki/Personal%20grooming | Grooming (also called preening) is the art and practice of cleaning and maintaining parts of the body. It is a species-typical behavior.
In animals
Individual animals regularly clean themselves and put their fur, feathers or other skin coverings in good order. This activity is known as personal grooming, a form of hygiene. Extracting foreign objects such as insects, leaves, dirt, twigs and parasites is a form of grooming. Among animals, birds spend considerable time preening their feathers. This is done to remove ectoparasites, keep the feathers in good aerodynamic condition, and waterproof them. To do that, they use the preen oil secreted by the uropygial gland, the dust of down feathers, or other means such as dust-bathing or anting. During oil spills, animal conservationists that rescue penguins sometimes dress them in knitted sweaters to stop them from preening and thereby ingesting the mineral oil, which is poisonous. Monkeys may also pick out nits from their fur or scratch their rears to keep themselves clean. Cats are well known for their extensive grooming. Cats groom so often that they often produce hairballs from the fur they ingest. Many mammal species also groom their genitals after copulation.
Grooming as a social activity
Many social animals adapt preening and grooming behaviors for other social purposes such as bonding and the strengthening of social structures. Grooming plays a particularly important role in forming social bonds in many primate species, such as chacma baboons and wedge-capped capuchins.
Mutual grooming in human relationships
In humankind, mutual grooming relates closely to social grooming, which is defined as the process by which human beings fulfill one of their basic instincts, such as socializing, cooperating and learning from each other.
In research conducted by Holly Nelson (from the University of New Hampshire) and Glenn Geher (State University of New York at Paltz), individuals who chose their romantic partner repor |
https://en.wikipedia.org/wiki/Mebetoys | Meccanica Bessana Toys (mostly known for its acronym and tradename Mebetoys), was an Italian toy manufacturer that produced die-cast scale model cars during the 1960s and 1970s.
The company was purchased by Mattel in 1969, which continued commercialising Mebetoy as one of its brands. Mebetoy's main competition in Italy was the earlier trailblazer Mercury, Polistil and the rarer Ediltoys.
History
Mebetoys was started by Ugo and Martino Besana in 1959 in Oleggio Castello, Italy. Their brother Mario Besana joined the company in 1967, one year after the company started. A diecast car line was started that same year, rather late compared to the entry of many other companies in the early-to-mid-1950s. In detail and proportion, Mebetoys joined superior model producers of French Solido and fellow Italian Polistil, in many ways these became the triumvirate of diecast models on the European continent, though Danish Tekno and Italian Rio Models also were important. Models were exact to scale with many moving parts, and generally more sophisticated than venerable British producers Corgi and Dinky Toys.
Model details
Mebetoys models were known for well-done castings. Some were very clever model selections such as the Autobianchi A66 Elaf petroleum with a roof luggage rack carrying two large plastic oil barrels, or the Porsche 912 Rally (a 911 in rally form) with rock guards in thin yellow plastic strips covering the front windshield and hood and also featuring red and chrome body and bumper supports which extended from front to rear bumper. This car, in 1:43 scale, was topped off, literally, with three spare tires on the roof. Mebetoys Innocenti Mini (Italian-made mini) appeared in several different guises – including with skis and sled on its roof rack. Other models were unique because they were not offered elsewhere, like the ISO Fidia S4 grand touring sedan. Politoys had the Rivolta and Corgi and Matchbox made the Grifo ubiquitous, but nobody else made the Fidia S4. Mod |
https://en.wikipedia.org/wiki/P%E2%80%93n%20diode | This article provides a more detailed explanation of p–n diode behavior than is found in the articles p–n junction or diode.
A p–n diode is a type of semiconductor diode based upon the p–n junction. The diode conducts current in only one direction, and it is made by joining a p-type semiconducting layer to an n-type semiconducting layer. Semiconductor diodes have multiple uses including rectification of alternating current to direct current, in the detection of radio signals, and emitting and detecting light.
Structure
The figure shows two of the many possible structures used for p–n semiconductor diodes, both adapted to increase the voltage the devices can withstand in reverse bias. The top structure uses a mesa to avoid a sharp curvature of the p+-region next to the adjoining n-layer. The bottom structure uses a lightly doped p-guard-ring at the edge of the sharp corner of the p+-layer to spread the voltage out over a larger distance and reduce the electric field. (Superscripts like n+ or n− refer to heavier or lighter impurity doping levels.)
Electrical behavior
The ideal diode has zero resistance for the forward bias polarity, and infinite resistance (conducts zero current) for the reverse voltage polarity; if connected in an alternating current circuit, the semiconductor diode acts as an electrical rectifier.
The semiconductor diode is not ideal. As shown in the figure, the diode does not conduct appreciably until a nonzero knee voltage (or turn-on, cut-in, or threshold voltage) is reached, whose value depends on the semiconductor (listed in ). Above this voltage the slope of the current-voltage curve is not infinite (on-resistance is not zero). In the reverse direction the diode conducts a nonzero leakage current (exaggerated by a smaller scale in the figure) and at a sufficiently large reverse voltage below the breakdown voltage the current increases very rapidly with more negative reverse voltages.
As shown in the figure, the on or off resistances are |
https://en.wikipedia.org/wiki/Google%20TV%20%28operating%20system%29 | Google TV was a smart TV operating system from Google co-developed by Intel, Sony and Logitech. It launched in October 2010 with official devices initially made by Sony and Logitech. Google TV integrated the Android 3.0/3.2 operating system and the Google Chrome web browser to create an interactive television overlay on top of existing online video sites to add a 10-foot user interface, for a smart TV experience.
Google TV's first generation devices were all based on x86 architecture processors and were created and commercialized by Sony and Logitech. The second generation of devices are all based on ARM architecture processors and with additional partners including LG, Samsung, Vizio and Hisense. In 2013, more second generation Google TV-supported devices were announced by new partners, including Hisense, Netgear, TCL, and Asus, some of which include 3D video support.
Google TV was succeeded in June 2014 by Android TV, a newer platform which shares closer ties with the Android platform and has a revamped user experience integrating with Knowledge Graph, and providing casting support from mobile devices. As of June 2014, the Google TV SDK is no longer available, ending any future software development for existing devices and effectively deprecating the platform. The "Google TV" branding has since been used as a replacement for Google Play Movies & TV, and to refer to a user interface used on newer Android TV devices (such as Chromecast with Google TV).
History
2010 March – Media outlets reported that the Google TV project was underway, although the partnering companies did not confirm their involvement in the venture until later.
2010 May 20 – The Google TV project was officially announced at the 2010 Google I/O conference on May 20. Google stated that the new platform would be incorporated directly into new high-definition television sets and Blu-ray Disc players by Sony, although set-top boxes would also be developed by Logitech. The company indicated that |
https://en.wikipedia.org/wiki/ISO%20639 | ISO 639 is a multi-part standard by the International Organization for Standardization (ISO) concerned with representation of names for languages and language groups.
It currently consists of five parts (1-5); a part 6 was published but withdrawn.
It was first approved in 1967 as a single-part ISO Recommendation, ISO/R 639, superseded in 2002 by part 1 of the new series, ISO 639-1
Use of ISO 639 codes
The language codes defined in the several sections of ISO 639 are used for bibliographic purposes and, in computing and internet environments, as a key element of locale data. The codes also find use in various applications, such as Wikipedia URLs for its different language editions.
Current and historical parts of the standard
Each part of the standard is maintained by a maintenance agency, which adds codes and changes the status of codes when needed. ISO 639-6 was withdrawn in 2014.
Characteristics of individual codes
Scopes:
Individual languages
Macrolanguages (Part 3)
Collections of languages (Parts 1, 2, 5). Part 1 contains only one collection (bh), some collections were already in Part 2, and others were added only in Part 5:
Remainder groups: 36 collections in both Part 2 and 5 are of this kind (including one that was also coded in Part 1) — for compatibility with Part 2 when Part 5 was still not published, the remainder groups do not contain any language and collection that was already coded in Part 2 (however new applications compatible with Part 5 may treat these groups inclusively, as long they respect the containment hierarchy published in Part 5 and they use the most specific collection when grouping languages);
Regular groups: 29 collections in both Parts 2 and 5 are of this kind — for compatibility with Part 2, they can not contain other groups;
Families: 50 new collections coded only in Part 5 (including one containing a regular group already coded in Part 2) — for compatibility with Part 2, they may contain other collections except remainder |
https://en.wikipedia.org/wiki/Genomics%20of%20personality%20traits | Personality traits are patterns of thoughts, feelings and behaviors that reflect the tendency to respond in certain ways under certain circumstances.
Personality is influenced by genetic and environmental factors and associated with mental health. Beside the environment factor, genetic variants can be detected for personality traits. These traits are polygenic. Significant genetic variants are present for most of the behavioral traits. There is a consistency in detection of genetic variants and genomic association for traits derived from pedigree.
Trait theory
The Big Five personality traits, also known as the five-factor model (FFM) or the OCEAN model, is the prevailing model for personality traits. When factor analysis (a statistical technique) is applied to personality survey data, some words or questionnaire items used to describe aspects of personality are often applied to the same person. For example, someone described as conscientious is more likely to be described as "always prepared" rather than "messy". This theory uses descriptors of common language and therefore suggests five broad dimensions commonly used to describe the human personality and psyche.
The five factors are:
Openness to experience (inventive/curious vs. consistent/cautious)
Conscientiousness (efficient/organized vs. easy-going/careless)
Extraversion (outgoing/energetic vs. solitary/reserved)
Agreeableness (friendly/compassionate vs. challenging/detached)
Neuroticism (sensitive/nervous vs. secure/confident).
Methods
The methods mostly used in genomics of personality traits' studies are two: analytic methods and not-analytic ones (such as questionnaires).
Analytic
Analytical techniques that can be used to measure genomics of personality include:
GWAS, genome wide association study is a method used to define markers (these markers are single nucleotide polymorphism, SNPs) across the genomes in order to better understand the contribution of genetics to personality traits. Since |
https://en.wikipedia.org/wiki/PLD5 | Phospholipase D family, member 5 is a protein that in humans is encoded by the PLD5 gene.
Model organisms
Model organisms have been used in the study of PLD5 function. A conditional knockout mouse line, called Pld5tm1a(KOMP)Wtsi was generated as part of the International Knockout Mouse Consortium program — a high-throughput mutagenesis project to generate and distribute animal models of disease to interested scientists — at the Wellcome Trust Sanger Institute.
Male and female animals underwent a standardized phenotypic screen to determine the effects of deletion. Twenty five tests were carried out on mutant mice but no significant abnormalities were observed. |
https://en.wikipedia.org/wiki/J%C3%A1nos%20Koll%C3%A1r | János Kollár (born 7 June 1956) is a Hungarian mathematician, specializing in algebraic geometry.
Professional career
Kollár began his studies at the Eötvös University in Budapest and later received his PhD at Brandeis University in 1984 under the direction of Teruhisa Matsusaka with a thesis on canonical threefolds. He was Junior Fellow at Harvard University from 1984 to 1987 and professor at the University of Utah from 1987 until 1999. Currently, he is professor at Princeton University.
Contributions
Kollár is known for his contributions to the minimal model program for threefolds and hence the compactification of moduli of algebraic surfaces, for pioneering the notion of rational connectedness (i.e. extending the theory of rationally connected varieties for varieties over the complex field to varieties over local fields), and finding counterexamples to a conjecture of John Nash. (In 1952 Nash conjectured a converse to a famous theorem he proved, and Kollár was able to provide many 3-dimensional counterexamples from an important new structure theory for a class of 3-dimensional algebraic varieties.)
Kollár also gave the first algebraic proof of effective Nullstellensatz: let be polynomials of degree at most in variables; if they have no common zero, then the equation has a solution such that each polynomial has degree at most .
Awards and honors
Kollár is a member of the National Academy of Sciences since 2005 and received the Cole Prize in 2006. He is an external member of the Hungarian Academy of Sciences since 1995. In 2012 he became a fellow of the American Mathematical Society. In 2016 he became a fellow of the American Academy of Arts and Sciences. In 2017 he received the Shaw Prize in Mathematical Sciences.
In 1990 he was an invited speaker at the International Congress of Mathematicians (ICM) in Kyōto. In 1996 he gave one of the plenary addresses at the European Mathematical Congress in Budapest (Low degree polynomial equations: arithmetic, geom |
https://en.wikipedia.org/wiki/ZNF320 | Zinc finger protein 320 is a protein that in humans is encoded by the ZNF320 gene.
Function
ZNF320 encodes a Kruppel-like zinc finger protein. Members of this protein family are involved in activation or repression of transcription. |
https://en.wikipedia.org/wiki/Lattice-based%20access%20control | In computer security, lattice-based access control (LBAC) is a complex access control model based on the interaction between any combination of objects (such as resources, computers, and applications) and subjects (such as individuals, groups or organizations).
In this type of label-based mandatory access control model, a lattice is used to define the levels of security that an object may have and that a subject may have access to. The subject is only allowed to access an object if the security level of the subject is greater than or equal to that of the object.
Mathematically, the security level access may also be expressed in terms of the lattice (a partial order set) where each object and subject have a greatest lower bound (meet) and least upper bound (join) of access rights. For example, if two subjects A and B need access to an object, the security level is defined as the meet of the levels of A and B. In another example, if two objects X and Y are combined, they form another object Z, which is assigned the security level formed by the join of the levels of X and Y.
LBAC is also known as a label-based access control (or rule-based access control) restriction as opposed to role-based access control (RBAC).
Lattice based access control models were first formally defined by Denning (1976); see also Sandhu (1993).
See also |
https://en.wikipedia.org/wiki/EPROM | An EPROM (rarely EROM), or erasable programmable read-only memory, is a type of programmable read-only memory (PROM) chip that retains its data when its power supply is switched off. Computer memory that can retrieve stored data after a power supply has been turned off and back on is called non-volatile. It is an array of floating-gate transistors individually programmed by an electronic device that supplies higher voltages than those normally used in digital circuits. Once programmed, an EPROM can be erased by exposing it to strong ultraviolet light source (such as from a mercury-vapor lamp). EPROMs are easily recognizable by the transparent fused quartz (or on later models resin) window on the top of the package, through which the silicon chip is visible, and which permits exposure to ultraviolet light during erasing.
Operation
Development of the EPROM memory cell started with investigation of faulty integrated circuits where the gate connections of transistors had broken. Stored charge on these isolated gates changes their threshold voltage.
Following the invention of the MOSFET (metal–oxide–semiconductor field-effect transistor) by Mohamed Atalla and Dawon Kahng at Bell Labs, presented in 1960, Frank Wanlass studied MOSFET structures in the early 1960s. In 1963, he noted the movement of charge through oxide onto a gate. While he did not pursue it, this idea would later become the basis for EPROM technology.
In 1967, Dawon Kahng and Simon Min Sze at Bell Labs proposed that the floating gate of a MOSFET could be used for the cell of a reprogrammable ROM (read-only memory). Building on this concept, Dov Frohman of Intel invented EPROM in 1971, and was awarded in 1972. Frohman designed the Intel 1702, a 2048-bit EPROM, which was announced by Intel in 1971.
Each storage location of an EPROM consists of a single field-effect transistor. Each field-effect transistor consists of a channel in the semiconductor body of the device. Source and drain contacts are ma |
https://en.wikipedia.org/wiki/Nested%20polymerase%20chain%20reaction | Nested polymerase chain reaction (nested PCR) is a modification of polymerase chain reaction intended to reduce non-specific binding in products due to the amplification of unexpected primer binding sites.
Polymerase chain reaction
Polymerase chain reaction itself is the process used to amplify DNA samples, via a temperature-mediated DNA polymerase. The products can be used for sequencing or analysis, and this process is a key part of many genetics research laboratories, along with uses in DNA fingerprinting for forensics and other human genetic cases. Conventional PCR requires primers complementary to the termini of the target DNA. The amount of product from the PCR increases with the number of temperature cycles that the reaction is subjected to. A commonly occurring problem is primers binding to incorrect regions of the DNA, giving unexpected products. This problem becomes more likely with an increased number of cycles of PCR.
Primers
Nested polymerase chain reaction involves two sets of primers, used in two successive runs of polymerase chain reaction, the second set intended to amplify a secondary target within the first run product. This allows amplification for a low number of runs in the first round, limiting non-specific products. The second nested primer set should only amplify the intended product from the first round of amplification and not non-specific product. This allows running more total cycles while minimizing non-specific products. This is useful for rare templates or PCR with high background.
Processes
The target DNA undergoes the first run of polymerase chain reaction with the first set of primers, shown in green. The selection of alternative and similar primer binding sites gives a selection of products, only one containing the intended sequence.
The product from the first reaction undergoes a second run with the second set of primers, shown in red. It is very unlikely that any of the unwanted PCR products contain binding sites for both |
https://en.wikipedia.org/wiki/Greenspun%27s%20tenth%20rule | Greenspun's tenth rule of programming is an aphorism in computer programming and especially programming language circles that states:
Overview
The rule expresses the opinion that the argued flexibility and extensibility designed into the programming language Lisp includes all functionality that is theoretically needed to write any complex computer program, and that the features required to develop and manage such complexity in other programming languages are equivalent to some subset of the methods used in Lisp.
Other programming languages, while claiming to be simpler, require programmers to reinvent in a haphazard way a significant amount of needed functionality that is present in Lisp as a standard, time-proven base.
It can also be interpreted as a satiric critique of systems that include complex, highly configurable sub-systems. Rather than including a custom interpreter for some domain-specific language, Greenspun's rule suggests using a widely accepted, fully featured language like Lisp.
Paul Graham also highlights the satiric nature of the concept, albeit based on real issues:
The rule was written sometime around 1993 by Philip Greenspun. Although it is known as his tenth rule, this is a misnomer. There are in fact no preceding rules, only the tenth. The reason for this according to Greenspun:
Hacker Robert Morris later declared a corollary, which clarifies the set of "sufficiently complicated" programs to which the rule applies:
This corollary jokingly refers to the fact that many Common Lisp implementations (especially those available in the early 1990s) depend upon a low-level core of compiled C, which sidesteps the issue of bootstrapping but may itself be somewhat variable in quality, at least compared to a cleanly self-hosting Common Lisp.
See also
Inner-platform effect
Software Peter principle
Turing tarpit
Zawinski's law of software envelopment |
https://en.wikipedia.org/wiki/Bracket%20ring | In mathematics invariant theory, the bracket ring is the subring of the ring of polynomials k[x11,...,xdn] generated by the d-by-d minors of a generic d-by-n matrix (xij).
The bracket ring may be regarded as the ring of polynomials on the image of a Grassmannian under the Plücker embedding.
For given d ≤ n we define as formal variables the brackets [λ1 λ2 ... λd] with the λ taken from {1,...,n}, subject to [λ1 λ2 ... λd] = − [λ2 λ1 ... λd] and similarly for other transpositions. The set Λ(n,d) of size generates a polynomial ring K[Λ(n,d)] over a field K. There is a homomorphism Φ(n,d) from K[Λ(n,d)] to the polynomial ring K[xi,j] in nd indeterminates given by mapping
[λ1 λ2 ... λd] to the determinant of the d by d matrix consisting of the columns of the xi,j indexed by the λ. The bracket ring B(n,d) is the image of Φ. The kernel I(n,d) of Φ encodes the relations or syzygies that exist between the minors of a generic n by d matrix. The projective variety defined by the ideal I is the (n−d)d dimensional Grassmann variety whose points correspond to d-dimensional subspaces of an n-dimensional space.
To compute with brackets it is necessary to determine when an expression lies in the ideal I(n,d). This is achieved by a straightening law due to Young (1928).
See also
Bracket algebra |
https://en.wikipedia.org/wiki/Half%20hull%20model%20ship | A half hull model ship (also known as a "half hull" or "half ship") is a wooden model ship featuring only one half of a boat's hull without rigging or other fixtures.
Background
Prior to the twentieth century, half hull model ships were constructed by shipwrights as a means of planning a ship's design and sheer and ensuring that the ship would be symmetrical. The half hulls were mounted on a board and were exact scale replicas of the actual ship's hull. With the advent of computer design, half hulls are now built as decorative nautical art and constructed after a ship is completed.
See also
Wooden model ship
Marine Art |
https://en.wikipedia.org/wiki/TMEM104 | Transmembrane protein 104 (TMEM104) is a protein that in humans is encoded by the TMEM104 gene. The aliases of TMEM104 are FLJ00021 and FLJ20255. Humans have a 163,255 base pair long gene coding sequence, 4703 base pair long mRNA, and 496 amino acid long protein sequence. In Eukaryotes, the TMEM104 gene is conserved.
Gene
Location
TMEM104 is located on human chromosome 17 at the locus 17q25.1. TMEM104 is located between the genes NAT9 and GRIN2C.
Transcripts
There are 7 main transcription variants: isoform 1, isoform 2, variant X1 - X5. TMEM104 is predicted to have a promoter region 150 base pairs upstream of the start of transcription. The promoter region of Homo sapien TMEM104 compared to other organisms is very unconserved. It was hard to find anything outside of Mammalia species and most were found under Primates.
Tissue expression
In most human tissues, TMEM104 has a modest expression level (25–50th percentile), relative to all human proteins, according to RNA-seq data.
Subcelluar expression
The protein has been located primarily in the plasma membrane and less so found in nucleus.
Immunochemistry Data
Thermofisher claims that it exhibits significant nuclear and cytoplasmic positivity in glandular cells. With the aid of a TMEM104 polyclonal antibody, the samples were probed.
Protein
TMEM104 variant 1 protein is 496 amino acids in length. TMEM104 is a secreted protein that is overexpressed in Adrenal. TMEM104 is a phenylalanine enriched and glutamine poor protein.
Characteristics
TMEM104 has an isoelectric point of 6.8 and a molecular weight of 55.7 kdaltons. It is predicted to have between nine and eleven transmembrane domains, making it a transmembrane protein.
Post Translation Modifications
The post-translational modifications N-glycosylation, sulfonation, and phosphorylation are among those predicted for TMEM104.
Tertiary structure
TMEM104 has a tertiary structure with alpha helices and beta sheets.
Interaction
TMEM104 has been shown t |
https://en.wikipedia.org/wiki/Propellant | A propellant (or propellent) is a mass that is expelled or expanded in such a way as to create a thrust or another motive force in accordance with Newton's third law of motion, and "propel" a vehicle, projectile, or fluid payload. In vehicles, the engine that expels the propellant is called a reaction engine. Although technically a propellant is the reaction mass used to create thrust, the term "propellant" is often used to describe a substance which contains both the reaction mass and the fuel that holds the energy used to accelerate the reaction mass. For example, the term "propellant" is often used in chemical rocket design to describe a combined fuel/propellant, although the propellants should not be confused with the fuel that is used by an engine to produce the energy that expels the propellant. Even though the byproducts of substances used as fuel are also often used as a reaction mass to create the thrust, such as with a chemical rocket engine, propellant and fuel are two distinct concepts.
Vehicles can use propellants to move by ejecting a propellant backwards which creates an opposite force that moves the vehicle forward. Projectiles can use propellants that are expanding gases which provide the motive force to set the projectile in motion. Aerosol cans use propellants which are fluids that are compressed so that when the propellant is allowed to escape by releasing a valve, the energy stored by the compression moves the propellant out of the can and that propellant forces the aerosol payload out along with the propellant. Compressed fluid may also be used as a simple vehicle propellant, with the potential energy that is stored in the compressed fluid used to expel the fluid as the propellant. The energy stored in the fluid was added to the system when the fluid was compressed, such as compressed air. The energy applied to the pump or thermal system that is used to compress the air is stored until it is released by allowing the propellant to escape. Compr |
https://en.wikipedia.org/wiki/Goro%20Shimura | was a Japanese mathematician and Michael Henry Strater Professor Emeritus of Mathematics at Princeton University who worked in number theory, automorphic forms, and arithmetic geometry. He was known for developing the theory of complex multiplication of abelian varieties and Shimura varieties, as well as posing the Taniyama–Shimura conjecture which ultimately led to the proof of Fermat's Last Theorem.
Biography
Gorō Shimura was born in Hamamatsu, Japan, on 23 February 1930. Shimura graduated with a B.A. in mathematics and a D.Sc. in mathematics from the University of Tokyo in 1952 and 1958, respectively.
After graduating, Shimura became a lecturer at the University of Tokyo, then worked abroad — including ten months in Paris and a seven-month stint at Princeton's Institute for Advanced Study — before returning to Tokyo, where he married Chikako Ishiguro. He then moved from Tokyo to join the faculty of Osaka University, but growing unhappy with his funding situation, he decided to seek employment in the United States. Through André Weil he obtained a position at Princeton University. Shimura joined the Princeton faculty in 1964 and retired in 1999, during which time he advised over 28 doctoral students and received the Guggenheim Fellowship in 1970, the Cole Prize for number theory in 1977, the Asahi Prize in 1991, and the Steele Prize for lifetime achievement in 1996.
Shimura described his approach to mathematics as "phenomenological": his interest was in finding new types of interesting behavior in the theory of automorphic forms. He also argued for a "romantic" approach, something he found lacking in the younger generation of mathematicians. Shimura used a two-part process for research, using one desk in his home dedicated to working on new research in the mornings and a second desk for perfecting papers in the afternoon.
Shimura had two children, Tomoko and Haru, with his wife Chikako. Shimura died on 3 May 2019 in Princeton, New Jersey at the age of 89.
Res |
https://en.wikipedia.org/wiki/Jim%20Williams%20%28analog%20designer%29 | James M. Williams (April 14, 1948 – June 12, 2011) was an analog circuit designer and technical author who worked for the Massachusetts Institute of Technology (1968–1979), Philbrick, National Semiconductor (1979–1982) and Linear Technology Corporation (LTC) (1982–2011). He wrote over 350 publications relating to analog circuit design, including five books, 21 application notes for National Semiconductor, 62 application notes for Linear Technology, and over 125 articles for EDN Magazine.
Williams suffered a stroke on June 10 and died on June 12, 2011.
Bibliography (partial)
For a complete bibliography, see.
See also
Paul Brokaw
Barrie Gilbert
Howard Johnson (electrical engineer)
Bob Pease — analog electronics engineer, technical author, and colleague. Pease died in an automobile accident after leaving Williams' memorial.
Bob Widlar — pioneering analog integrated circuit designer, technical author, early consultant to Linear Technology Corporation
Building 20 — legendary MIT building where Jim Williams had a design lab early in his career |
https://en.wikipedia.org/wiki/Surface%20brightness%20fluctuation | Surface brightness fluctuation (SBF) is a secondary distance indicator used to estimate distances to galaxies. It is useful to 100 Mpc (parsec). The method measures the variance in a galaxy's light distribution arising from fluctuations in the numbers of and luminosities of individual stars per resolution element.
The SBF technique uses the fact that galaxies are made up of a finite number of stars. The number of stars in any small patch of a galaxy will vary from point to point, creating a noise-like fluctuation in its surface brightness. While the various stars present in a galaxy will cover an enormous range of luminosity, the SBF can be characterized as having an average brightness. A galaxy twice as far away appears twice as smooth as a result of the averaging. Older elliptical galaxies have fairly consistent stellar populations, thus it closely approximates a standard candle. In practice, corrections are required to account for variations in age or metallicity from galaxy to galaxy. Calibration of the method is made empirically from Cepheids or theoretically from stellar population models.
The SBF pattern is measured from the power spectrum of the residuals left behind from a deep galaxy image after a smooth model of the galaxy has been subtracted. The SBF pattern is evident as the transform of the point spread function in the Fourier domain. The amplitude of the spectrum gives the luminosity of the fluctuation star. Because the technique depends on a precise understanding of the image structure of the galaxy, extraneous sources such as globular clusters and background galaxies must be excluded. Corrections for interstellar dust absorption must also be accounted. In practice this means that SBF works best for elliptical galaxies or the bulges of S0 galaxies, and less so for spiral galaxies as they generally have complex morphologies and extensive dust features.
SBF is calibrated by use of nearby Cepheid period-luminosity relation (P-L) based on me |
https://en.wikipedia.org/wiki/Kr%C3%BCppel%20associated%20box | The Krüppel associated box (KRAB) domain is a category of transcriptional repression domains present in approximately 400 human zinc finger protein-based transcription factors (KRAB zinc finger proteins). The KRAB domain typically consists of about 75 amino acid residues, while the minimal repression module is approximately 45 amino acid residues. It is predicted to function through protein-protein interactions via two amphipathic helices. The most prominent interacting protein is called TRIM28 initially visualized as SMP1, cloned as KAP1 and TIF1-beta. Substitutions for the conserved residues abolish repression.
Over 10 independently encoded KRAB domains have been shown to be effective repressors of transcription, suggesting this activity to be a common property of the domain. KRAB domains can be fused with dCas9 CRISPR tools to form even stronger repressors.
Evolution
The KRAB domain had initially been identified in 1988 as a periodic array of leucine residues separated by six amino acids 5’ to the zinc finger region of KOX1/ZNF10 coined heptad repeat of leucines (also known as a leucine zipper). Later, this domain was named in association with the C2H2-Zinc finger proteins Krüppel associated box (KRAB). The KRAB domain is confined to genomes from tetrapod organisms. The KRAB containing C2H2-ZNF genes constitute the largest sub-family of zinc finger genes. More than half of the C2H2-ZNF genes are associated with a KRAB domain in the human genome. They are more prone to clustering and are found in large clusters on the human genome.
The KRAB domain presents one of the strongest repressors in the human genome. Once the KRAB domain was fused to the tetracycline repressor (TetR), the TetR-KRAB fusion proteins were the first engineered drug-inducible repressor that worked in mammalian cells.
Examples
Human genes encoding KRAB-ZFPs include KOX1/ZNF10, KOX8/ZNF708, ZNF43, ZNF184, ZNF91, HPF4, HTF10 and HTF34. |
https://en.wikipedia.org/wiki/Asplenium%20hybrids | The fern genus Asplenium is well known for its hybridization capacity, especially in temperate zones.
Appalachian Asplenium hybrid complex
The Appalachian hybrid complex in Asplenium is a polyploid complex composed of 3 diploid species, 3 allotetraploid species formed by hybridisation and chromosome doubling from the former, and assorted diploid, triploid and tetraploid hybrids between the 6 species.
The three diploid parent species are mountain spleenwort (Asplenium montanum), ebony spleenwort (Asplenium platyneuron), and American walking fern (Asplenium rhizophyllum). Their chromosome complements are abbreviated "MM", "PP" and "RR", respectively. Three possible sterile diploid hybrids can form from their hybridization:
A. montanum × platyneuron (MP) has been collected on very rare occasions.
A. montanum × rhizophyllum (MR) is theorized to exist, but has never been collected.
A. platyneuron × rhizophyllum (PR) is known as Scott's spleenwort (Asplenium × ebenoides) and is relatively common.
In addition, A. platyneuron and A. rhizophyllum, which have a more extensive range, hybridize with other spleenwort species outside the Appalachian complex.
At some point in the past, each of the sterile diploid hybrids experienced a chromosome doubling event that made them fertile allotetraploids; allozyme analysis shows that this happened on several independent occasions for A. montanum × platyneuron and A. montanum × rhizophyllum. These doubling events gave rise to the following tetraploids:
Since these allotetraploids are fertile, they are capable of crossing with each other and with the three diploid species to form the following sterile triploid and tetraploid hybrids, most of which are quite rare and occur sporadically where their parents' ranges overlap:
New Zealand hybrids
19 hybrids within the genus have been described from New Zealand, but have not been given binomials.
Other hybrid species
Asplenium afghanicum (Asplenium dolomiticum × A. lepidum var. haussknech |
https://en.wikipedia.org/wiki/Transcript%20of%20unknown%20function | Transcripts of unknown function (TUFs) is the name that has been suggested for known RNA transcripts of DNA whose function is unclear. Most are probably ncRNAs, such as RNAi or snoRNAs, but could also represent a whole new class of ncRNA. Their DNA sequences reside in the intergenic or intronic regions of the genome, which is often called junk DNA.
Categories
Broadly speaking, TUFs can be classified into three categories:
TUFs that are complementary to sense transcripts of protein-coding genes
TUFs that are novel isoform transcripts of protein-coding genes; this can include expressed pseudogenes
TUFs that reside on the same strand as protein-coding genes in the intronic region or entirely in the intergenic region |
https://en.wikipedia.org/wiki/Inter%20caetera | Inter caetera ('Among other [works]') was a papal bull issued by Pope Alexander VI on the 4 May 1493, which granted to the Catholic Monarchs King Ferdinand II of Aragon and Queen Isabella I of Castile all lands to the "west and south" of a pole-to-pole line 100 leagues west and south of any of the islands of the Azores or the Cape Verde islands.
It remains unclear whether the pope intended a "donation" of sovereignty or an infeudation or investiture. Differing interpretations have been argued since the bull was issued, with some arguing that it was only meant to transform the possession and occupation of land into lawful sovereignty. Others, including the Spanish crown and the conquistadors, interpreted it in the widest possible sense, deducing that it gave Spain full political sovereignty.
Inter caetera and its supplement Dudum siquidem (September 1493) are two of the Bulls of Donation. While these bulls purported to settle disputes between Spain and Portugal, they did not address the exploratory and colonial ambitions of other nations, which became more of an issue after the Protestant Reformation.
Background
Before Christopher Columbus received support for his voyage from Queen Isabella and King Ferdinand of Spain, he had first approached King John II of Portugal. The king's scholars and navigators reviewed Columbus's documentation, determined that his calculations grossly underestimated the diameter of the Earth and thus the length of the voyage, and recommended against subsidizing the expedition. Upon Columbus's return from his first voyage to the Americas, his first landing was made in the Portuguese Azores; a subsequent storm drove his ship to Lisbon on 4 March 1493. Hearing of Columbus's discoveries, the Portuguese king informed him that he believed the voyage to be in violation of the 1479 Treaty of Alcáçovas. The treaty had been ratified with the 1481 papal bull Aeterni regis, which confirmed previous bulls of 1452 (Dum diversas), 1455 (Romanus Pontife |
https://en.wikipedia.org/wiki/This%20Book%20Needs%20No%20Title | This Book Needs No Title: A Budget of Living Paradoxes is a 1980 collection of essays about logic, paradoxes, and philosophy, by Raymond Smullyan. It was first published by Prentice-Hall.
In 2023, it was reissued by What Is the Name of This Press, with a new foreword by Donald Knuth.
Reception
Kirkus Reviews called it "funny" and "provocative", commending Smullyan's descriptions of Zen and noting that the book could appeal to both children and adults, but conceded that Smullyan's work may be an "acquired taste".
The Washington Post has described "This Book Needs No Title" as "tantalizing", while Michael Dirda has declared that (along with Smullyan's earlier "What is the Name of this Book") it has "the cleverest of all titles", positing that Smullyan may have been inspired by Denis Diderot's "Ceci n'est pas un conte". |
https://en.wikipedia.org/wiki/Bernoulli%20polynomials | In mathematics, the Bernoulli polynomials, named after Jacob Bernoulli, combine the Bernoulli numbers and binomial coefficients. They are used for series expansion of functions, and with the Euler–MacLaurin formula.
These polynomials occur in the study of many special functions and, in particular, the Riemann zeta function and the Hurwitz zeta function. They are an Appell sequence (i.e. a Sheffer sequence for the ordinary derivative operator). For the Bernoulli polynomials, the number of crossings of the x-axis in the unit interval does not go up with the degree. In the limit of large degree, they approach, when appropriately scaled, the sine and cosine functions.
A similar set of polynomials, based on a generating function, is the family of Euler polynomials.
Representations
The Bernoulli polynomials Bn can be defined by a generating function. They also admit a variety of derived representations.
Generating functions
The generating function for the Bernoulli polynomials is
The generating function for the Euler polynomials is
Explicit formula
for n ≥ 0, where Bk are the Bernoulli numbers, and Ek are the Euler numbers.
Representation by a differential operator
The Bernoulli polynomials are also given by
where D = d/dx is differentiation with respect to x and the fraction is expanded as a formal power series. It follows that
cf. integrals below. By the same token, the Euler polynomials are given by
Representation by an integral operator
The Bernoulli polynomials are also the unique polynomials determined by
The integral transform
on polynomials f, simply amounts to
This can be used to produce the inversion formulae below.
Another explicit formula
An explicit formula for the Bernoulli polynomials is given by
That is similar to the series expression for the Hurwitz zeta function in the complex plane. Indeed, there is the relationship
where ζ(s, q) is the Hurwitz zeta function. The latter generalizes the Bernoulli polynomials, allowing for non-int |
https://en.wikipedia.org/wiki/Excelan | Excelan was a computer networking company founded in 1982 by Kanwal Rekhi, Inder Singh and Navindra Jain. Excelan was a manufacturer of smart Ethernet cards, until the company merged with, and was acquired by Novell in 1989. The company offered a line of Ethernet "front end processor" boards for Multibus, VMEbus, Q-Bus, Unibus, and IBM AT Bus systems. The cards were equipped with their own processor and memory, and ran TCP/IP protocol software that was downloaded onto the cards from the host system. Excelan offered software like LAN Workplace that integrated the cards into a variety of operating system environments, including many flavors of UNIX, RSX-11, VMS, and DOS. The hardware and software were sold under the EXOS brand. In 1987, Excelan also acquired Kinetics, a small networking company that manufactured and sold a variety of Ethernet networking products for Apple Macintosh environments, most notably an AppleTalk-to-Ethernet gateway called the FastPath.
Excelan also manufactured and sold Ethernet network analyzer products, the first being the Excelan Nutcracker, followed later by the Excelan LANalyzer.
See also
Novell LAN WorkPlace for DOS |
https://en.wikipedia.org/wiki/John%20C.%20Oxtoby | John C. Oxtoby (1910–1991) was an American mathematician. In 1936, he graduated with a Master of Science in Mathematics from Harvard University. He was professor of mathematics at Bryn Mawr College in Pennsylvania from 1939 until his retirement in 1979.
Works |
https://en.wikipedia.org/wiki/Sphere%20eversion | In differential topology, sphere eversion is the process of turning a sphere inside out in a three-dimensional space (the word eversion means "turning inside out"). Remarkably, it is possible to smoothly and continuously turn a sphere inside out in this way (allowing self-intersections of the sphere's surface) without cutting or tearing it or creating any crease. This is surprising, both to non-mathematicians and to those who understand regular homotopy, and can be regarded as a veridical paradox; that is something that, while being true, on first glance seems false.
More precisely, let
be the standard embedding; then there is a regular homotopy of immersions
such that ƒ0 = ƒ and ƒ1 = −ƒ.
History
An existence proof for crease-free sphere eversion was first created by .
It is difficult to visualize a particular example of such a turning, although some digital animations have been produced that make it somewhat easier. The first example was exhibited through the efforts of several mathematicians, including Arnold S. Shapiro and Bernard Morin, who was blind. On the other hand, it is much easier to prove that such a "turning" exists, and that is what Smale did.
Smale's graduate adviser Raoul Bott at first told Smale that the result was obviously wrong .
His reasoning was that the degree of the Gauss map must be preserved in such "turning"—in particular it follows that there is no such turning of S1 in R2. But the degrees of the Gauss map for the embeddings f and −f in R3 are both equal to 1, and do not have opposite sign as one might incorrectly guess. The degree of the Gauss map of all immersions of S2 in R3 is 1, so there is no obstacle. The term "veridical paradox" applies perhaps more appropriately at this level: until Smale's work, there was no documented attempt to argue for or against the eversion of S2, and later efforts are in hindsight, so there never was a historical paradox associated with sphere eversion, only an appreciation of the subtleties in vis |
https://en.wikipedia.org/wiki/Minimum%20mass | In astronomy, minimum mass is the lower-bound calculated mass of observed objects such as planets, stars and binary systems, nebulae, and black holes.
Minimum mass is a widely cited statistic for extrasolar planets detected by the radial velocity method or Doppler spectroscopy, and is determined using the binary mass function. This method reveals planets by measuring changes in the movement of stars in the line-of-sight, so the real orbital inclinations and true masses of the planets are generally unknown. This is a result of sin i degeneracy.
If inclination i can be determined, the true mass can be obtained from the calculated minimum mass using the following relationship:
Exoplanets
Orientation of the transit to Earth
Most stars will not have their planets lined up and orientated so that they eclipse over the center of the star and give the viewer on earth a perfect transit. It is for this reason that when we often are only able to extrapolate a minimum mass when viewing a star's wobble because we do not know the inclination and therefore only be able to calculate the part pulling the star on the plane of celestial sphere.
For orbiting bodies in extrasolar planetary systems, an inclination of 0° or 180° corresponds to a face-on orbit (which cannot be observed by radial velocity), whereas an inclination of 90° corresponds to an edge-on orbit (for which the true mass equals the minimum mass).
Planets with orbits highly inclined to the line of sight from Earth produce smaller visible wobbles, and are thus more difficult to detect. One of the advantages of the radial velocity method is that eccentricity of the planet's orbit can be measured directly. One of the main disadvantages of the radial-velocity method is that it can only estimate a planet's minimum mass (). This is called Sin i degeneracy. The posterior distribution of the inclination angle i depends on the true mass distribution of the planets.
Radial velocity method
However, when there are multipl |
https://en.wikipedia.org/wiki/Barley%20mild%20mosaic%20bymovirus | Barley mild mosaic bymovirus is a plant virus.
See also
See the article in French, "Jaunisse nanisante de l'orge":
https://fr.wikipedia.org/wiki/Jaunisse_nanisante_de_l%27orge |
https://en.wikipedia.org/wiki/Great%20Michigan%20Pizza%20Funeral | The Great Michigan Pizza Funeral (also referred to as the Great Pizza Funeral of Michigan and the Great Pizza Burial) was the ceremonial disposal of 29,188 frozen cheese-and-mushroom pizzas in Ossineke, Michigan on March 5, 1973. The manufacturer, Mario Fabbrini, had been ordered to recall the pizzas by the Food and Drug Administration (FDA) after initial tests suggested the presence of botulism-causing bacteria in a batch of canned mushrooms. Fabbrini decided to ceremonially dispose of the pizzas to demonstrate accountability and receive publicity. The pizzas were tipped into an deep hole in the ground before a crowd of onlookers, who were addressed by Michigan governor William Milliken. Later tests by the FDA ruled out botulism. Fabbrini sued his suppliers and the Michigan Court of Appeals awarded him $211,000 in 1979, though he closed his business a few years later.
Background
Mario Fabbrini came from Fiume, Croatia. Having lived under fascist rule and then in communist Yugoslavia, he emigrated to the United States after World War II. Settling in Ossineke, Michigan, he began making and selling frozen pizzas from his home kitchen. Fabbrini's wife, Olga, helped him adapt the traditional recipes of his hometown to suit American tastes. Within nine years, Fabbrini had grown his business, Papa Fabbrini Pizzas, into one of the most modern pizza factories in the country. His plant, which employed 22 people, had capacity to produce 45,000 pizzas a week.
Alleged botulism contamination
In January 1973, employees at the United Canning Company of East Palestine, Ohio, noticed a number of cans of mushrooms were swelling, an indication of contamination. The plant had recently switched to an automated can-filling line, which was less sterile than the previous method of hand-filling, and also led to some overfilling of the cans. United Canning notified the Food and Drug Administration (FDA) who took samples for testing.
The FDA stated that their tests confirmed |
https://en.wikipedia.org/wiki/Shunt%20impedance | In accelerator physics, shunt impedance is a measure of the strength with which an eigenmode of a resonant radio frequency structure (e.g., in a microwave cavity) interacts with charged particles on a given straight line, typically along the axis of rotational symmetry. If not specified further, the term is likely to refer to longitudinal effective shunt impedance.
Longitudinal shunt impedance
To produce longitudinal Coulomb forces which add up to the (longitudinal) acceleration voltage , an eigenmode of the resonator has to be excited, leading to power dissipation . The definition of the longitudinal effective shunt impedance, , then reads:
with the longitudinal effective acceleration voltage .
The time-independent shunt impedance, , with the time-independent acceleration voltage is defined:
One can use the quality factor to substitute with an equivalent expression:
where W is the maximum energy stored. Since the quality factor is the only quantity in the right equation term that depends on wall properties, the quantity is often used to design cavities, omitting material properties at first (see also cavity geometry factor).
Transverse shunt impedance
When a particle is deflected in transverse direction, the definition of the shunt impedance can be used with substitution of the (longitudinal) acceleration voltage by the transverse effective acceleration voltage, taking into account transversal Coulomb and Lorentz forces.
This does not necessarily imply a change in particle energy since a particle can also be deflected by magnetic fields (see Panofsky-Wenzel theorem).
Polarization angle
Because the transverse deflection can be described with polar coordinates, one may define a deflection or polarization angle using the transverse acceleration voltage components. Polar coordinates are used because it is possible to add up voltage components like vectors, but not shunt impedances. |
https://en.wikipedia.org/wiki/X86%20debug%20register | On the x86 architecture, a debug register is a register used by a processor for program debugging. There are six debug registers, named DR0...DR7, with DR4 and DR5 as obsolete synonyms for DR6 and DR7. The debug registers allow programmers to selectively enable various debug conditions associated with a set of four debug addresses.
Two of these registers are used to control debug features. These registers are accessed by variants of the MOV instruction. A debug register may be either the source operand or destination operand. The debug registers are privileged resources; the MOV instructions that access them can only be executed at privilege level zero. An attempt to read or write the debug registers when executing at any other privilege level causes a general protection fault.
DR0 to DR3
Each of these registers contains the linear address associated with one of four breakpoint conditions. Each breakpoint condition is further defined by bits in DR7.
The debug address registers are effective whether or not paging is enabled. The addresses in these registers are linear addresses. If paging is enabled, the linear addresses are translated into physical addresses by the processor's paging mechanism. If paging is not enabled, these linear addresses are the same as physical addresses.
Note that when paging is enabled, different tasks may have different linear-to-physical address mappings. When this is the case, an address in a debug address register may be relevant to one task but not to another. For this reason the x86 has both global and local enable bits in DR7. These bits indicate whether a given debug address has a global (all tasks) or local (current task only) relevance.
DR6 - Debug status
The debug status register permits the debugger to determine which debug conditions have occurred. When the processor detects an enabled debug exception, it will set the corresponding bits of this register before entering the debug exception handler.
DR7 - Debug control
The de |
https://en.wikipedia.org/wiki/Mirror%20image | A mirror image (in a plane mirror) is a reflected duplication of an object that appears almost identical, but is reversed in the direction perpendicular to the mirror surface. As an optical effect it results from reflection off from substances such as a mirror or water. It is also a concept in geometry and can be used as a conceptualization process for 3-D structures.
In geometry and geometrical optics
In two dimensions
In geometry, the mirror image of an object or two-dimensional figure is the virtual image formed by reflection in a plane mirror; it is of the same size as the original object, yet different, unless the object or figure has reflection symmetry (also known as a P-symmetry).
Two-dimensional mirror images can be seen in the reflections of mirrors or other reflecting surfaces, or on a printed surface seen inside-out. If we first look at an object that is effectively two-dimensional (such as the writing on a card) and then turn the card to face a mirror, the object turns through an angle of 180° and we see a left-right reversal in the mirror. In this example, it is the change in orientation rather than the mirror itself that causes the observed reversal. Another example is when we stand with our backs to the mirror and face an object that is in front of the mirror. Then we compare the object with its reflection by turning ourselves 180°, towards the mirror. Again we perceive a left-right reversal due to a change in our orientation. So, in these examples the mirror does not actually cause the observed reversals.
In three dimensions
The concept of reflection can be extended to three-dimensional objects, including the inside parts, even if they are not transparent. The term then relates to structural as well as visual aspects. A three-dimensional object is reversed in the direction perpendicular to the mirror surface. In physics, mirror images are investigated in the subject called geometrical optics. More fundamentally in geometry and mathematics they |
https://en.wikipedia.org/wiki/LuneOS | LuneOS is a mobile operating system (OS) based on the Linux kernel and currently developed by WebOS Ports community. With a user interface based on direct manipulation, LuneOS is designed primarily for touchscreen mobile devices such as smartphones and tablet computers. The OS uses touch inputs that loosely correspond to real-world actions, like swiping, tapping, pinching, and reverse pinching to manipulate on-screen objects, and a virtual keyboard.
LuneOS is the open source successor for Palm/HP webOS where the user interface is rebuilt from scratch by using the latest technologies available (Qt 5.15.0 / QML, Qt WebEngine, etc). It is not intended to compete with iPhone or Android on features. All devices can have a LuneOS port if they have a CyanogenMod / LineageOS ROM available that works. LuneOS uses the minimal Android System Image that is created using Halium which in turn is based upon CyanogenMod / LineageOS.
Currently, the system is still in alpha, with some internal hardware not supported and some applications still buggy. It can be updated without a reinstall. It has the feel of the webOS formerly used on Palm and HP hardware, including a cards-based multitasking system and Universal Search. It has been described as "a niche mobile operating system maintained by enthusiasts".
Release schedule
See also
Enyo
Access Linux Platform
Ubuntu Touch - Linux Ubuntu for smartphones and tablets. |
https://en.wikipedia.org/wiki/Sextupole%20magnet | A sextupole magnet (also known as a hexapole magnet) consist of six magnetic poles set out in an arrangement of alternating north and south poles arranged around an axis. They are used in particle accelerators for the control of chromatic aberrations and for damping the head tail instability. Two sets of sextupole magnets are used in transmission electron microscopes to correct for spherical aberration.
The design of sextupoles using electromagnets generally involves six steel pole tips of alternating polarity. The steel is magnetised by a large electric current that flows in the coils of wire wrapped around the poles. The coils may be formed from hollow copper magnet wire that carry coolant, usually de-ionized water. The current density of such a conductor can be above 10 amps/mm2 (four times that of standard copper conductors).
In particle accelerators
At the energies reached in high energy particle accelerators, magnetic deflection is more powerful than electrostatic, and use of the magnetic term of the Lorentz force:
is enabled with various magnets that make up 'the lattice' required to bend, steer and focus a charged particle beam.
The quadrupole magnets used to focus and combine the beam have the unfortunate property that their focusing strength (describable by a focal length) is dependent on the energy of the particle being focused—high energy particles having longer focal lengths than those with lower energy. Since all realistic beams have some, non-negligible, energy spread, any focusing scheme that relies purely on quadrupole magnets will result in the size of the beam "blowing up" with distance.
In linear accelerators this is due to the under- or over-focusing of the particles, while in storage rings it is related to the chromaticity of the ring (the tendency for off-energy particles to have different values for the betatron phase advance per orbit).
Typically this is controlled with the addition of sextupolar fields to the lattice.
Sextupolar fie |
https://en.wikipedia.org/wiki/Augmented%20tuning | An augmented tuning is a musical tuning system for musical instruments that is associated with augmented triads, that is a root note, a major third, and an augmented fifth. The augmented fifth is constructed by stacking the major third with another major third. Consequently, all of the intervals are major thirds.
Augmented tunings are used for stringed instruments, especially guitars, and for wind instruments. For guitars, augmented tunings are called major thirds tunings.
Instruments
Guitar
Major-thirds (M3) tunings are unconventional open tunings, in which the open strings form an augmented triad; in M3 tunings, the augmented fifth replaces the perfect fifth of the major triad of conventional open-tunings. Consequently M3 tunings are also called (open) augmented-fifth tunings (in French "La guitare #5, majeure quinte augmentée"). Unfortunately, the open augmented-chord sounds dissonant to audiences who are accustomed to standard tuning.
Wind
For a diatonic wind instrument (such as a harmonica or accordion), the blow notes repeat a sequence of
C E G♯
(perhaps shifted to begin with E♭ or with G) and draw notes follow a repeating sequence of
E♭ G B
though perhaps with a different initial sequence.
For example:
{| class="wikitable" style="text-align:center"
! hole
|| 1 || 2 || 3 || 4 || 5 || 6 || 7 || 8 || 9 || 10 || 11 || 12
|-
! blow note
|| C || E || G || C || E || G || C || E || G || C || E || G
|-
! draw note
|| E || G || B || E || G || B || E || G || B || E || G || B
|}
See also
Diminished tuning
Richter tuning
Solo tuning
Notes |
https://en.wikipedia.org/wiki/Snow%20%28app%29 | Snow (stylized in all caps) is an image messaging and multimedia mobile application created by Camp Mobile, a subsidiary of South Korean internet search giant Naver Corporation. It features virtual stickers using augmented reality and photographic filters. Pictures and messages sent through Snow are only accessible for a short time.
Background
Snow was launched September 2015 by Camp Mobile. The company collaborated with different Korean artists such as BTS and Twice to launch selfie stickers.
In 2016, the app spun off into its own company, named as Snow Corp.
In 2018, Snow Corp raised $50M from SoftBank and Sequoia China. It is reported that it plans to use the investment to develop its augmented reality and facial recognition technologies.
Features
Snow allows users to take pictures or videos (of a maximum duration of 5 minutes) and choose from 1,300 stickers and 50 filters. They can also send them as messages that destroy themselves in 48 hours. Videos could also be saved as GIF files. According to Business Insider, the app functions as a clone of Snapchat. |
https://en.wikipedia.org/wiki/Storage%20tube | Storage tubes are a class of cathode-ray tubes (CRTs) that are designed to hold an image for a long period of time, typically as long as power is supplied to the tube.
A specialized type of storage tube, the Williams tube, was used as a main memory system on a number of early computers, from the late 1940s into the early 1950s. They were replaced with other technologies, notably core memory, starting in the 1950s.
In a new form, the bistable tube, storage tubes made a comeback in the 1960s and 1970s for use in computer graphics, most notably the Tektronix 4010 series. Today they are obsolete, their functions provided by low-cost memory devices and liquid crystal displays.
Operation
Background
A conventional CRT consists of an electron gun at the back of the tube that is aimed at a thin layer of phosphor at the front of the tube. Depending on the role, the beam of electrons emitted by the gun is steered around the display using magnetic (television) or electrostatic (oscilloscope) means. When the electrons strike the phosphor, the phosphor "lights up" at that location for a time, and then fades away. The length of time the spot remains is a function of the phosphor chemistry.
At very low energies, electrons from the gun will strike the phosphor and nothing will happen. As the energy is increased, it will reach a critical point, , that will activate the phosphor and cause it to give off light. As the voltage increases beyond the brightness of the spot will increase. This allows the CRT to display images with varying intensity, like a television image.
Above another effect also starts, secondary emission. When any insulating material is struck by electrons over a certain critical energy, electrons within the material are forced out of it through collisions, increasing the number of free electrons. This effect is used in electron multipliers as found in night vision systems and similar devices. In the case of a CRT this effect is generally undesirable; the new e |
https://en.wikipedia.org/wiki/Face%20diagonal | In geometry, a face diagonal of a polyhedron is a diagonal on one of the faces, in contrast to a space diagonal passing through the interior of the polyhedron.
A cuboid has twelve face diagonals (two on each of the six faces), and it has four space diagonals. The cuboid's face diagonals can have up to three different lengths, since the faces come in congruent pairs and the two diagonals on any face are equal. The cuboid's space diagonals all have the same length. If the edge lengths of a cuboid are a, b, and c, then the distinct rectangular faces have edges (a, b), (a, c), and (b, c); so the respective face diagonals have lengths and
Thus each face diagonal of a cube with side length a is .
A regular dodecahedron has 60 face diagonals (and 100 space diagonals). |
https://en.wikipedia.org/wiki/John%20Lane%20Bell | John Lane Bell (born March 25, 1945) is an Anglo-Canadian philosopher, mathematician and logician. He is Professor Emeritus of Philosophy at the University of Western Ontario in Canada. His research includes such topics as set theory, model theory, lattice theory, modal logic, quantum logic, constructive mathematics, type theory, topos theory, infinitesimal analysis, spacetime theory, and the philosophy of mathematics. He is the author of more than 70 articles and of 13 books. In 2009, he was elected a Fellow of the Royal Society of Canada.
Biography
John Bell was awarded a scholarship to Oxford University at the age of 15, and graduated with a D.Phil. in Mathematics: his dissertation supervisor was John Crossley. During 1968–89 he was Lecturer in Mathematics and Reader in Mathematical Logic at the London School of Economics.
Bell's students include Graham Priest (Ph.D. Mathematics LSE, 1972), Michael Hallett (Ph.D. Philosophy LSE, 1979), David DeVidi (Ph.D. Philosophy UWO, 1994), Elaine Landry (Ph.D. Philosophy UWO, 1997) and Richard Feist (Ph.D. Philosophy UWO, 1999).
Bibliography
The Continuous, the Discrete, and the Infinitesimal in Philosophy and Mathematics (New and Revised Edition of 2005 book), Springer, 2019.
Oppositions and Paradoxes: Philosophical Perplexities in Science and Mathematics. Broadview Press, 2016.
Intuitionistic Set Theory. College Publications, 2013.
Set Theory: Boolean-Valued Models and Independence Proofs. Oxford University Press 2011.
The Axiom of Choice. College Publications, 2009.
The Continuous and the Infinitesimal in Mathematics and Philosophy. Polimetrica, 2005.
(With D. DeVidi and G. Solomon) Logical Options: An Introduction to Classical and Alternative Logics. Broadview Press, 2001.
The Art of the Intelligible: An Elementary Survey of Mathematics in its Conceptual Development. Kluwer, 1999.
A Primer of Infinitesimal Analysis. Cambridge University Press, 1998. Second Edition, 2008.
Toposes & Local Set Theories: An Introductio |
https://en.wikipedia.org/wiki/Hyperelastic%20material | A hyperelastic or Green elastic material is a type of constitutive model for ideally elastic material for which the stress–strain relationship derives from a strain energy density function. The hyperelastic material is a special case of a Cauchy elastic material.
For many materials, linear elastic models do not accurately describe the observed material behaviour. The most common example of this kind of material is rubber, whose stress-strain relationship can be defined as non-linearly elastic, isotropic and incompressible. Hyperelasticity provides a means of modeling the stress–strain behavior of such materials. The behavior of unfilled, vulcanized elastomers often conforms closely to the hyperelastic ideal. Filled elastomers and biological tissues are also often modeled via the hyperelastic idealization.
Ronald Rivlin and Melvin Mooney developed the first hyperelastic models, the Neo-Hookean and Mooney–Rivlin solids. Many other hyperelastic models have since been developed. Other widely used hyperelastic material models include the Ogden model and the Arruda–Boyce model.
Hyperelastic material models
Saint Venant–Kirchhoff model
The simplest hyperelastic material model is the Saint Venant–Kirchhoff model which is just an extension of the geometrically linear elastic material model to the geometrically nonlinear regime. This model has the general form and the isotropic form respectively
where is tensor contraction, is the second Piola–Kirchhoff stress, is a fourth order stiffness tensor and is the Lagrangian Green strain given by
and are the Lamé constants, and is the second order unit tensor.
The strain-energy density function for the Saint Venant–Kirchhoff model is
and the second Piola–Kirchhoff stress can be derived from the relation
Classification of hyperelastic material models
Hyperelastic material models can be classified as:
phenomenological descriptions of observed behavior
Fung
Mooney–Rivlin
Ogden
Polynomial
Saint Venant–Kirchhoff
|
https://en.wikipedia.org/wiki/OT1%20encoding | OT1 (aka TeX text) is a 7-bit TeX encoding developed by Donald E. Knuth.
Character set
See also
OML encoding
OMS encoding |
https://en.wikipedia.org/wiki/Czech%20Va%C5%A1ek | Czech Vašek (literal. "Czech Václav", German: "Böhmischer Wenzel") is a historical figure representing the national character of the Czech people used in time of national competition with German nationalism at the end of the 19th century.
Overview
Such figures differ from those that serve as personifications of the nation itself, as Čechie did the Czech nation and Marianne the French. He is usually depicted in a folk costume combining hat from Pilsen region with clothes from different regions.
They were used as a negative caricature of Czechs by Germans, symbolising them as street musicians. But also positively by Czech themselves.
Czech Vašek is considered a counterpart to Deutscher Michel, a figure representing the national character of the German people.
See also
Flag of the Czech Republic
Čechie, personification of Czechs
Deutscher Michel, personification of the German people |
https://en.wikipedia.org/wiki/Chillingham%20cattle | Chillingham cattle, also known as Chillingham wild cattle, are a breed of cattle that live in a large enclosed park at Chillingham Castle, Northumberland, England. In summer 2022 the cattle numbers 138 animals with approximately equal numbers of males and females The herd has remained remarkably genetically isolated for hundreds of years, surviving despite inbreeding depression due to the small population. There is also a small reserve herd of about 20 animals located on Crown Estate land near Fochabers, North East Scotland.
Description of cattle
The Chillingham cattle are related to White Park cattle, in the sense that the Chillingham herd has contributed to the White Park, though there has been no gene flow the other way. Chillingham cattle are small, with upright horns in both males and females. Bulls weigh around , cows about . They are white with coloured ears (they may also have some colour on feet, nose and around the eyes). In the case of Chillingham cattle, the ear-colour is red – in most White Park animals the ears are black (which is genetically dominant over red in cattle). Chillingham cattle are of generally primitive conformation while White Parks are of classical British beef conformation.
A brief review of academic studies on the Chillingham cattle is available.
Description of the Northumberland habitat
To many visitors, the most striking element of the historic habitat at Chillingham is the widespread occurrence of large oak trees amongst grassland (wood pasture), providing a glimpse of Britain as many think it appeared in medieval times. However, most of these trees were only planted in the 1780s - early 19th century, and the truly ancient trees of the park are the streamside alder trees, which were probably coppiced in the mid-18th century. They were probably hundreds of years old even then and the stems now growing are themselves around 250 years old. A diversity of plants and animals find a habitat here, due to the absence of the intensi |
https://en.wikipedia.org/wiki/Endospore%20staining | Endospore staining is a technique used in bacteriology to identify the presence of endospores in a bacterial sample. Within bacteria, endospores are protective structures used to survive extreme conditions, including high temperatures making them highly resistant to chemicals. Endospores contain little or no ATP which indicates how dormant they can be. Endospores contain a tough outer coating made up of keratin which protects them from nucleic DNA as well as other adaptations. Endospores are able to regerminate into vegetative cells, which provides a protective nature that makes them difficult to stain using normal techniques such as simple staining and gram staining. Special techniques for endospore staining include the Schaeffer–Fulton stain and the Moeller stain.
History
Endospores were first studied in 1876 by scientists Cohn and Koch. It was found that endospores could not be stained using simple stains such as methylene blue, safranin, and carbol fuchsin. These scientists, along with a few others, found out that spores were dormant and resistant to heat. In the early 1900s, researchers were trying to find alternative methods to improve disease and infection from these endospores.
In 1922, Dorner published a method for staining endospores. He found a differential staining technique where endospores appear green and vegetative cells appear pinkish red. Dorner used heat as a step in the process, but it was time-consuming, so in 1933, Schaeffer and Fulton modified his method.
Schaeffer and Fulton made the heating process a lot faster by using a Bunsen burner. Although this method was not the most beneficial, it was a lot more convenient than Dorner's method. This improved method provided a quicker and easier test and allowed for the spores to be more susceptible to the dyes. To this day, the Schaeffer- Fulton stain is still performed to help identify bacteria.
Examples
Endospores are able to last for decades in multiple hard conditions, such as drying and f |
https://en.wikipedia.org/wiki/Halpin%E2%80%93Tsai%20model | Halpin–Tsai model is a mathematical model for the prediction of elasticity of composite material based on the geometry and orientation of the filler and the elastic properties of the filler and matrix. The model is based on the self-consistent field method although often consider to be empirical.
See also
Cadec-online.com implements the Halpin–Tsai model among others. |
https://en.wikipedia.org/wiki/Shoploop | Shoploop is a new generation video shopping platform developed by Google that enables products to be promoted within a maximum of 90 seconds. |
https://en.wikipedia.org/wiki/Namco%20System%20246 | The Namco System 246 is a development of the Sony PlayStation 2 technology as a basis for an arcade system board. It was released in December 2000 on its first game Bloody Roar 3. Like the Sega NAOMI, it is widely licensed for use by other manufacturers. Games such as Battle Gear 3 and Capcom Fighting Evolution are examples of System 246-based arcade games that are not Namco products.
Specifications
Main CPU: MIPS III R5900-based "Emotion Engine", 64-bit RISC operating at 294.912 MHz (Overclocking to 299 MHz on System 256), with 128-bit SIMD capabilities
Sub CPU: MIPS II R3000A IOP with cache at 33.8688 MHz (Unlike the PSXCPU)
System memory: 32 MB RIMM 3200 32-bit dual-channel (2x 16-bit) RDRAM (Direct Rambus DRAM) @ 400 MHz, 3.2 GB/s peak bandwidth
Graphics: "Graphics Synthesizer" operating at 147.456 MHz
Graphics memory: 4MB eDRAM (8MB on System 256)
Sound: "SPU1+SPU2"
Media: CD-ROM, DVD-ROM, Hard Disk Drive, 64 MBit 3.3V NAND FlashROM Security Dongle
Namco System 256 is an upgraded version of System 246, but the upgrades are unknown (more VRAM and faster CPU speeds likely).
Namco Super System 256 is the same as regular Namco System 256 but it has the gun board integrated, though this variant was only used in Time Crisis 4.
Namco System 147 is similar to 246 but does not use a DVD-ROM drive, instead it has ROM chips on the system board.
List of System 246 / System 256 / System Super 256 / System 147 games
Released
Ace Driver 3: Final Turn (Namco, 2008)
Battle Gear 3 (Taito, 2002)
Battle Gear 3 Tuned (Taito, 2003)
Bloody Roar 3 (Namco / 8ing / Raizing, 2000)
Capcom Fighting Evolution (Capcom, 2004)
Chou Dragon Ball Z (Banpresto, 2005)
Cobra: The Arcade (Namco, 2005)
Dragon Chronicles - Legend of The Master Ark (Namco, 2003)
Dragon Chronicles Online (Namco, 2004)
Druaga Online - The Story of Aon (Namco, 2006)
Fate/Unlimited Codes (Capcom / Type-Moon / Cavia / 8ing, 2008)
Getchu Play! Tottoko Hamutaro (Banpresto, 2007)
Gundam Seed: Rengou |
https://en.wikipedia.org/wiki/LENG9 | Leukocyte Receptor Cluster Member 9 (LENG 9) is an uncharacterized protein encoded by the LENG9 gene. In humans, LENG9 is predicted to play a role in fertility and reproductive disorders associated with female endometrium structures.
Gene
Location
LENG9 is located at 19q13.42 on chromosome 19, spanning the sense strand (-) from 54,461,796 bp to 54,463,711 bp. The LENG9 gene is 1,930 base pairs in length and contains one exon.
Gene Neighborhood
Genes LENG8-AS1 and CDC42EP5 neighbor LENG9 on chromosome 19. CDC42EP5 extends over the same region of LENG9 while LENG8-AS1 is located to the left of both genes. TTYH1 and LENG8 are also found in the same gene neighborhood but are located on the opposite strand.
Expression
LENG9 is highly expressed (75-100%) in skeletal muscles and part of fetal liver tissues while ubiquitous expression of LENG9 is moderate (50-75%) in all other tissues observed. Human expression of LENG9 is observed in the cervix, lung, and placenta of adults. The gene is also expressed in disease states including lung tumors and primitive neuroectodermal tumors, usually found in children or young adults. However, LENG9 is not expressed during the juvenile stage of development.
Promoter
The promoter region is predicted to be 1101 base pairs in length. The transcriptional start site found in this region is located 119 bp upstream of the start codon as well as an in-frame stop codon at 1087 bp to 1089 bp.
mRNA Transcript
Splice Variants
In humans, LENG9 has two mRNA unspliced transcript variants. Variant (1) is the longest and most conserved transcript of the gene and is made up of one exon that is composed of 1,919 bp.
Protein
General Properties
LENG9 is 501 amino acids in length, with a predicted molecular weight of 53.2 kDa. The isoelectric point of LENG9 protein is predicted to be 7.7. No known transmembrane sequences were found for LENG9.
Composition
Analysis of the LENG9 protein was performed against the "human" database, which indic |
https://en.wikipedia.org/wiki/Oort%20constants | The Oort constants (discovered by Jan Oort) and are empirically derived parameters that characterize the local rotational properties of our galaxy, the Milky Way, in the following manner:
where and are the rotational velocity and distance to the Galactic Center, respectively, measured at the position of the Sun, and and are the velocities and distances at other positions in our part of the galaxy. As derived below, and depend only on the motions and positions of stars in the solar neighborhood. As of 2018, the most accurate values of these constants are , . From the Oort constants, it is possible to determine the orbital properties of the Sun, such as the orbital velocity and period, and infer local properties of the Galactic disk, such as the mass density and how the rotational velocity changes as a function of radius from the Galactic Center.
Historical significance and background
By the 1920s, a large fraction of the astronomical community had recognized that some of the diffuse, cloud-like objects, or nebulae, seen in the night sky were collections of stars located beyond our own, local collection of star clusters. These galaxies had diverse morphologies, ranging from ellipsoids to disks. The concentrated band of starlight that is the visible signature of the Milky Way was indicative of a disk structure for our galaxy; however, our location within our galaxy made structural determinations from observations difficult.
Classical mechanics predicted that a collection of stars could be supported against gravitational collapse by either random velocities of the stars or their rotation about its center of mass. For a disk-shaped collection, the support should be mainly rotational. Depending on the mass density, or distribution of the mass in the disk, the rotation velocity may be different at each radius from the center of the disk to the outer edge. A plot of these rotational velocities against the radii at which they are measured is called a rotation |
https://en.wikipedia.org/wiki/Unidentified%20infrared%20emission | The unidentified infrared emission (UIR or UIE) bands are infrared discrete emissions from circumstellar regions, interstellar media, star-forming regions and extragalactic objects for which the identity of the emitting materials is unknown. The main infrared features occur around 3.3, 6.2, 7.7, 8.6, 11.2, and 12.7 μm, although there are many other weak emission features within the ~ 5–19 μm spectral range. In the 1980s, astronomers discovered that the origin of the UIR emission bands is inherent in compounds made of aromatic C–H and C=C chemical bonds, and some went on to hypothesize that the materials responsible should be polycyclic aromatic hydrocarbon (PAH) molecules. Nevertheless, data recorded with the ESA's Infrared Space Observatory and NASA's Spitzer Space Telescope have suggested that the UIR emission bands arise from compounds that are far more complex in composition and structure than PAH molecules. Moreover, the UIR bands follow a clear evolutionary spectral trend that is linked to the lifespan of the astronomical source; from the time the UIR bands first appear around evolved stars in the protoplanetary nebula stage to evolved stages such as the planetary nebula phase.
The UIR emission phenomenon has been studied for approximately 30 years. |
https://en.wikipedia.org/wiki/Gila%20Hanna | Gila Hanna is a Canadian mathematics educator and philosopher of mathematics whose research interests include the nature and educational role of mathematical proofs, and gender in mathematics education. She is professor emerita in the Department of Curriculum, Teaching and Learning at the University of Toronto, affiliated with the Ontario Institute for Studies in Education, the former director of mathematics education at the Fields Institute, and the founder of the Canadian Journal of Mathematics, Science and Technology Education.
Books
Hanna is the author of Contact and Communication: An Evaluation of Bilingual Student Exchange Programs (OISE Press, 1980) and Rigorous Proof in Mathematics Education (OISE Press, 1983). Her numerous edited volumes include:
Creativity, Thought and Mathematical Proof (edited with Ian Winchester, 1990)
Towards Gender Equity in Mathematics Education (1996)
Proof Technology in Mathematics Research and Teaching (edited with David Reid and Michael de Villiers, 2019)
Recognition
Hanna was named a Fields Institute Fellow in 2003. She was the 2020 winner of the Partners in Research Dr. Jonathon Borwein Mathematics Ambassador Award. |
https://en.wikipedia.org/wiki/Sentroller | A sentroller, used in the Internet of things is a sensor, controller or actuator or combination of these three.
Sentrollers in the Internet of things
The current Internet is an Internet of people, based on people communicating with people, using smartphones, tablets, laptops and computers, but this is changing: equipment and devices connected to the Internet (e.g. set-top boxes, cameras, cars) are starting to shift the balance away from people towards things. The future is clearly moving into a direction where the number of things connected to the Internet will overwhelm the number of connected people. Predictions range up to a factor of 100 to 1 or more, and thus the Internet of people will transform into the Internet of things. Thereby, the Internet of things will connect to and communicate directly with other "things", rather than directly with people.
Many of the new things connected to the Internet will be sentrollers, which means they are either actuators, sensors, controllers, or combinations of these three things. One simple example is a home thermostat. A thermostat is a sentroller as it senses the temperature in the home, checks whether the home or room in which the thermostat is monitoring temperature is at the desired temperature, and if not, turns on the heater or the air conditioner. Therefore, a thermostat is a sensor and a controller – a sentroller. No human interaction with the thermostat or the cloud will be necessary for the thermostat to keep the heat in the home at the right level.
In practice, sentrollers absorb and/or produce very limited amounts of information, but connectivity to the internet is essential for their operation. The Internet of things will host the applications that know how to interpret the information provided by sentrollers and what action to be taken. The smarts of the smart home, smart energy, smart buildings, etc. actually reside in the cloud. The sentrollers are the end nodes that will become the majority population o |
https://en.wikipedia.org/wiki/Port%20Wine%20Museum | The Port Wine Museum () is a museum located in Porto, Portugal. The museum recounts the history of port wine and its relevance to the city and the country. The museum is located in an 18th-century warehouse, the , next to Douro River.
History
The Port Wine Museum was founded in 2004. In March 2019, the Port Wine museum was transferred to the New Port Wine Museum on Rua Reboleira 37. |
https://en.wikipedia.org/wiki/Canaan%20Creative | Canaan Creative, known simply as Canaan, is a China-based computer hardware manufacturer. Established in 2013 by N.G. Zhang, Canaan specializes in Blockchain servers and ASIC microprocessors for use in bitcoin mining.
History
In 2013, during studying for a doctor's degree, N.G. Zhang established Canaan Creative, where he served as the chairman and CEO.
In 2016, Canaan attempted a reverse takeover for $466 Millions USD by Shandong Luyitong, a public company listed on the Shenzhen Stock Exchange.
In January 2019, reports surfaced that Canaan is considering an IPO in the United States. Canaan raised $90 million in their November 2019 IPO.
In 2019, Canaan was listed on Nasdaq. |
https://en.wikipedia.org/wiki/Web.com | Web.com is an American dot-com company that provides a website builder, along with website hosting, domain name registration, web development, and various digital marketing services. It serves as a partner for very small to small-sized businesses and entrepreneurs, assisting them in establishing and expanding their online presence.
The company was founded in 1999 by Darin Brannan in Jacksonville, Florida as Website Pros Inc.. In early 2008 it took its current name after acquiring Atlanta-based company Web.com, which was founded in 1981 by Waldemar Fernández and was formerly known as Interland, Inc.
In 2021, Web.com merged with Endurance Web Presence to form a new company, Newfold Digital.
Corporate overview
Web.com is based in Jacksonville, Florida and incorporated in Delaware, and provides domain name registration and web development services, among others. The company caters to very small and small businesses and offers a variety of subscription services designed for entrepreneurs including, including design, hosting, management, e-commerce, lead generation, mobile commerce, online advertising, search engine optimization, and social media solutions.
Web.com reportedly had 3.3 million subscribers in January 2016. The company has offices in more than 20 U.S. states, and in Argentina (Buenos Aires), Canada (Barrie, Ontario, and Nova Scotia), and the United Kingdom (including Cardiff, Wales). Web.com was traded as "WEB" on NASDAQ.
David Brown served as Web.com's chief executive officer (CEO) until early 2019. Okumus Fund Management was the company's top shareholder, with 18.64 percent as of March 2017. In 2015, Okumus and Web.com agreed to appoint two independent directors to its board.
In May 2017, the company had 3,500 employees and a market capitalization of $1.1 billion. Web.com has a $1.21 billion valuation, as of June 2017.
History
Website Pros Inc.
David Brown established Website Pros Inc.'s predecessor, the technology services company Atlantic Tel |
https://en.wikipedia.org/wiki/Melon%20ball | Melon ballers are utensils to make balls of melon from a scoop with a diameter from around 1 centimeter to 3 centimeters (about 3/8 inch to 1 inch). They are generally used to make fruit salad.
Melon balls are made by pressing them into the melon's flesh and rotating. It can also be used to cut other soft fruit and ice cream. The diameter of a melon baller's bowl varies from around 1 centimeter to 3 centimeters (about 3/8 inch to 1 inch), and it is typically made of stainless steel with a handle of wood, metal, or hard plastic. Some varieties have the handle in the middle and a different-sized bowl on each end, and the bowl typically has a small hole in the middle to allow air and juice through. It is more commonly known as a prepping utensil. Melon ballers can be used for a variety of melons; like watermelon, cantaloupe, or honeydew. They typically are multifunctional utensils. They are also used for trying small bits of other foods such as ice cream or making chocolate truffles.
See also
List of melon dishes
Melon |
https://en.wikipedia.org/wiki/CCMP%20%28cryptography%29 | Counter Mode Cipher Block Chaining Message Authentication Code Protocol (Counter Mode CBC-MAC Protocol) or CCM mode Protocol (CCMP) is an encryption protocol designed for Wireless LAN products that implements the standards of the IEEE 802.11i amendment to the original IEEE 802.11 standard. CCMP is an enhanced data cryptographic encapsulation mechanism designed for data confidentiality and based upon the Counter Mode with CBC-MAC (CCM mode) of the Advanced Encryption Standard (AES) standard. It was created to address the vulnerabilities presented by Wired Equivalent Privacy (WEP), a dated, insecure protocol.
Technical details
CCMP uses CCM that combines CTR mode for data confidentiality and cipher block chaining message authentication code (CBC-MAC) for authentication and integrity. CCM protects the integrity of both the MPDU data field and selected portions of the IEEE 802.11 MPDU header. CCMP is based on AES processing and uses a 128-bit key and a 128-bit block size. CCMP uses CCM with the following two parameters:
M = 8; indicating that the MIC is 8 octets (eight bytes).
L = 2; indicating that the Length field is 2 octets.
A CCMP Medium Access Control Protocol Data Unit (MPDU) comprises five sections. The first is the MAC header which contains the destination and source address of the data packet. The second is the CCMP header which is composed of 8 octets and consists of the packet number (PN), the Ext IV, and the key ID. The packet number is a 48-bit number stored across 6 octets. The PN codes are the first two and last four octets of the CCMP header and are incremented for each subsequent packet. Between the PN codes are a reserved octet and a Key ID octet. The Key ID octet contains the Ext IV (bit 5), Key ID (bits 6–7), and a reserved subfield (bits 0–4). CCMP uses these values to encrypt the data unit and the MIC. The third section is the data unit which is the data being sent in the packet. The fourth is the message integrity code (MIC) which protects t |
https://en.wikipedia.org/wiki/De%20Bruijn%E2%80%93Erd%C5%91s%20theorem%20%28graph%20theory%29 | In graph theory, the De Bruijn–Erdős theorem relates graph coloring of an infinite graph to the same problem on its finite subgraphs. It states that, when all finite subgraphs can be colored with colors, the same is true for the whole graph. The theorem was proved by Nicolaas Govert de Bruijn and Paul Erdős (1951), after whom it is named.
The De Bruijn–Erdős theorem has several different proofs, all depending in some way on the axiom of choice. Its applications include extending the four-color theorem and Dilworth's theorem from finite graphs and partially ordered sets to infinite ones, and reducing the Hadwiger–Nelson problem on the chromatic number of the plane to a problem about finite graphs. It may be generalized from finite numbers of colors to sets of colors whose cardinality is a strongly compact cardinal.
Definitions and statement
An undirected graph is a mathematical object consisting of a set of vertices and a set of edges that link pairs of vertices. The two vertices associated with each edge are called its endpoints. The graph is finite when its vertices and edges form finite sets, and infinite otherwise. A graph coloring associates each vertex with a color drawn from a set of colors, in such a way that every edge has two different colors at its endpoints. A frequent goal in graph coloring is to minimize the total number of colors that are used; the chromatic number of a graph is this minimum number of colors. The four-color theorem states that every finite graph that can be drawn without crossings in the Euclidean plane needs at most four colors; however, some graphs with more complicated connectivity require more than four colors. It is a consequence of the axiom of choice that the chromatic number is well-defined for infinite graphs, but for these graphs the chromatic number might itself be an infinite cardinal number.
A subgraph of a graph is another graph obtained from a subset of its vertices and a subset of its edges. If the larger graph is c |
https://en.wikipedia.org/wiki/SOTA%20Mapping%20Project | SOTA Mapping Project (SMP) is a website (www.sotamaps.org) offering mapping resources for radio amateurs participating in the Summits On The Air (SOTA) awards program. It aims to provide comprehensive mapping information in graphical form based on Google Maps on summits included in the program, for participants in the program as well as for the general user.
The site is built and maintained by a small group of radio amateurs with interests in SOTA, hill walking and mountaineering, mapping and open source programming. They also maintain a similar site () for the Islands on the air (IOTA) award scheme.
Features
The site has five main mapping pages, each providing different sets of functionality.
Main page
This is the page most often used, since it is referenced directly by links from each of the SOTAWatch Summit pages. In addition to being able to view various SOTA Associations, Regions and individual summits, the page offers the exporting or downloading of such data in GPX (for import into a GPS device) or KML (for importing into Google Earth) formats.
Range page
The Range page provides tools with which the user can perform various distance-measurement tasks. The most often used of these is the "range" facility itself, which will find summits within a certain distance of some reference point. The user can input a central location in one of several forms - latitude/longitude, Maidenhead ("Grid") Locator, or an address or place-name - and can then choose one of three range-types within which the summits should be found:
closed circle: summits within the entire circle will be found;
open circle: by entering two different distances representing the radii of two concentric circles, summits will be found within the annulus formed by the two circles;
road-route: the user enters a search radius, and defines the start- and end-positions of a route; then, by choosing one of possibly several routes found between those points, all summits within a corridor of width equal |
https://en.wikipedia.org/wiki/Discrepancy%20game | A discrepancy game is a kind of positional game. Like most positional games, it is described by its set of positions/points/elements () and a family of sets (- a family of subsets of ). It is played by two players, called Balancer and Unbalancer. Each player in turn picks an element. The goal of Balancer is to ensure that every set in is balanced, i.e., the elements in each set are distributed roughly equally between the players. The goal of Unbalancer is to ensure that at least one set is unbalanced.
Formally, the goal of balancer is defined by a vector where n is the number of sets in . Balancer wins if in every set i, the difference between the number of elements taken by Balancer and the number of elements taken by Unbalancer is at most bi.
Equivalently, we can think of Balancer as labeling each element with +1 and Unbalancer labeling each element with -1, and Balancer's goal is to ensure the absolute value of the sum of labels in set i is at most bi.
The game was introduced by Frieze, Krivelevich, Pikhurko and Szabo, and generalized by Alon, Krivelevich, Spencer and Szabo.
Comparison to other games
In a Maker-Breaker game, Breaker has to take at least one element in every set.
In an Avoider-Enforcer game, Avoider has to take at most k-1 element in every set with k vertices.
In a discrepancy game, Balancer has to attain both goals simultaneously: he should take at least a certain fraction, and at most a certain fraction, of the elements in each set.
Winning conditions
Let n be the number of sets, and ki be the number of elements in set i.
If , then Balancer has a winning strategy. In particular, if for all i, , then Balancer has a winning strategy. In particular, if the size of all sets is k, then Balancer can ensure that in each set, each of the players has between and elements.
If , then Balancer has a winning-strategy for the case that for every i, bi = ki-1 (so Balancer can each player has an element in each of the sets). |
https://en.wikipedia.org/wiki/Dedekind-infinite%20set | In mathematics, a set A is Dedekind-infinite (named after the German mathematician Richard Dedekind) if some proper subset B of A is equinumerous to A. Explicitly, this means that there exists a bijective function from A onto some proper subset B of A. A set is Dedekind-finite if it is not Dedekind-infinite (i.e., no such bijection exists). Proposed by Dedekind in 1888, Dedekind-infiniteness was the first definition of "infinite" that did not rely on the definition of the natural numbers.
A simple example is , the set of natural numbers. From Galileo's paradox, there exists a bijection that maps every natural number n to its square n2. Since the set of squares is a proper subset of , is Dedekind-infinite.
Until the foundational crisis of mathematics showed the need for a more careful treatment of set theory, most mathematicians assumed that a set is infinite if and only if it is Dedekind-infinite. In the early twentieth century, Zermelo–Fraenkel set theory, today the most commonly used form of axiomatic set theory, was proposed as an axiomatic system to formulate a theory of sets free of paradoxes such as Russell's paradox. Using the axioms of Zermelo–Fraenkel set theory with the originally highly controversial axiom of choice included (ZFC) one can show that a set is Dedekind-finite if and only if it is finite in the usual sense. However, there exists a model of Zermelo–Fraenkel set theory without the axiom of choice (ZF) in which there exists an infinite, Dedekind-finite set, showing that the axioms of ZF are not strong enough to prove that every set that is Dedekind-finite is finite. There are definitions of finiteness and infiniteness of sets besides the one given by Dedekind that do not depend on the axiom of choice.
A vaguely related notion is that of a Dedekind-finite ring.
Comparison with the usual definition of infinite set
This definition of "infinite set" should be compared with the usual definition: a set A is infinite when it cannot be put in bije |
https://en.wikipedia.org/wiki/Nitrogen%20dating | Nitrogen dating is a form of relative dating which relies on the reliable breakdown and release of amino acids from bone samples to estimate the age of the object. For human bones, the assumption of about 5% nitrogen in the bone, mostly in the form of collagen, allows fairly consistent dating techniques.
Compared to other dating techniques, Nitrogen dating can be unreliable because leaching from bone is dependent on temperature, soil pH, ground water, and the presence of microorganism that digest nitrogen rich elements, like collagen. Some studies compare nitrogen dating results with dating results from methods like fluorine absorption dating to create more accurate estimates. Though some situations, like thin porous bones might more rapidly change the dating created by multiple methods. |
https://en.wikipedia.org/wiki/Fullscreen%20%28aspect%20ratio%29 | Fullscreen (or full screen) refers to the 4:3 (1.:1) aspect ratio of early standard television screens and computer monitors. Widescreen ratios started to become more popular in the 1990s and 2000s.
Film originally created in the 4:3 aspect ratio does not need to be altered for full-screen release. In contrast, other aspect ratios can be converted to full screen using techniques such as pan and scan, open matte or reframing. In pan and scan, the 4:3 image is extracted from within the original frame by cropping the sides of the film. In open matte, the 4:3 image is extracted from parts of the original negative which were shot but not intended to be used for the theatrical release. In reframing, elements within the image are repositioned. Reframing is used for entirely CG movies, where the elements can be easily moved.
History
Full-screen aspect ratios in standard television have been in use since the invention of moving picture cameras. Early computer monitors employed the same aspect ratio. The aspect ratio 4:3 was used for 35 mm films in the silent era. It is also very close to the 1.375:1 Academy ratio, defined by the Academy of Motion Picture Arts and Sciences as a standard after the advent of optical sound-on-film. By having TV match this aspect ratio, movies originally photographed on 35 mm film could be satisfactorily viewed on TV in the early days of television (i.e. the 1940s and the 1950s). When cinema attendance dropped, Hollywood created widescreen aspect ratios (such as 1.85:1) in order to differentiate the film industry from TV. However, at the start of the 21st century, broadcasters worldwide began phasing out the 4:3 standard entirely and manufacturers started to favor the 16:9 aspect ratio for modern high-definition television sets, broadcast cameras and computer monitors.
See also
Aspect ratio (image) |
https://en.wikipedia.org/wiki/Dershowitz%E2%80%93Manna%20ordering | In mathematics, the Dershowitz–Manna ordering is a well-founded ordering on multisets named after Nachum Dershowitz and Zohar Manna. It is often used in context of termination of programs or term rewriting systems.
Suppose that is a well-founded partial order and let be the set of all finite multisets on . For multisets we define the Dershowitz–Manna ordering as follows:
whenever there exist two multisets with the following properties:
,
,
, and
dominates , that is, for all , there is some such that .
An equivalent definition was given by Huet and Oppen as follows:
if and only if
, and
for all in , if then there is some in such that and . |
https://en.wikipedia.org/wiki/Legacy%20of%20the%20Wizard | Legacy of the Wizard, originally released in Japan as , is a fantasy-themed action role-playing platform game released for the MSX, MSX2 and Famicom in Japan and for the Nintendo Entertainment System in the United States. Legacy of the Wizard is an installment in Falcom's Dragon Slayer series, and one of only five Dragon Slayer games that were localized outside Japan. The game was an early example of an open-world, non-linear action RPG, combining action-RPG gameplay with what would later be called "Metroidvania"-style action-adventure elements.
Plot
The game chronicles the story of the Drasle family (an abbreviation for "Dragon Slayer"; though the characters are given the last name "Worzen" in the credits) and their attempt to destroy an ancient dragon named Keela that is magically entrapped in a painting within an underground labyrinth. To accomplish this goal, they must find the "Dragon Slayer", a magical sword that is protected by four hidden crowns. The player must use the unique abilities of each member of the family to regain possession of the crowns and destroy the evil Keela. Like many games of its era, the story of Legacy of the Wizard is explained almost entirely in the game's instruction manual.
Gameplay
The Drasle family consists of six members of three generations, plus the family pet, which resembles a small dinosaur. The player takes control of the members of the Drasles and their pet, sending them one at a time into the vast cavern filled with traps, puzzles and monsters, in search of the four crowns, while periodically returning to the family household on the surface to change characters and to obtain a password. Each member of the family, which consists of the father, mother, son, daughter, and the pet, has different strengths and weaknesses to contribute to this goal. Some characters have seemingly powerful strengths, but each is offset by proportionate limitations. For example, the father has the strongest attack power, but cannot jump as hig |
https://en.wikipedia.org/wiki/Parameter%20word | In the mathematical study of combinatorics on words, a parameter word is a string over a given alphabet having some number of wildcard characters. The set of strings matching a given parameter word is called a parameter set or combinatorial cube. Parameter words can be composed, to produce smaller subcubes of a given combinatorial cube. They have applications in Ramsey theory and in computer science in the detection of duplicate code.
Definitions and notation
Formally, a word of length , over a given alphabet , is a sequence of characters, some of which may be drawn from and the others of which are distinct wildcard characters . Each wildcard character is required to appear at least once, but may appear multiple times, and the wildcard characters must appear in the order given by their indexes: the first wildcard character in the word must be , the next one that is different from must be , etc. As a special case, a word over the given
alphabet, without any wildcard characters, is said to be a 0-parameter word. For 1-parameter words, the subscripts may be omitted, as there is no ambiguity between different wildcard characters. The set of all words over , of length , is
A word represents a set of strings (0-parameter words), obtained by substituting a symbol of for each wildcard character. This set of strings is called a parameter set of combinatorial cube, and is called its dimension. A one-dimensional combinatorial cube may be called a combinatorial line.
In a combinatorial cube, each copy of a particular wildcard character must have the same replacement. A generalization of parameter words allows different copies of the same wildcard character to be replaced by different characters from the alphabet, in a controlled way. If is an alphabet and is a group with an action on , then a parameter word is a word together with an assignment of a group element to each wildcard character in the word. The first occurrence of each wildcard character must be a |
https://en.wikipedia.org/wiki/D-Scribe%20Digital%20Publishing | D-Scribe Digital Publishing is an open access electronic publishing program of the University Library System (ULS) of the University of Pittsburgh. It comprises over 100 thematic collections that together contain over 100,000 digital objects. This content, most of which is available through open access, includes both digitized versions of materials from the collections of the University of Pittsburgh and other local institutions as well as original 'born-electronic' content actively contributed by scholars worldwide. D-Scribe includes such items as photographs, maps, books, journal articles, dissertations, government documents, and technical reports, along with over 745 previously out-of-print titles published by the University of Pittsburgh Press. The digital publishing efforts of the University Library System began in 1998 and have won praise for their innovation from the leadership at the Association of Research Libraries and peer institutions.
Major digitized collections
The University Library System at the University of Pittsburgh has created various digital collections through its D-Scribe Digital Publishing program and has made them available to the public via the Internet. The following is a selection of the more prominent or larger collections available online.
19th-century schoolbooks
A full-text digitized presentation of over 140 historic books in the 16,000 volume Neitz Old Textbook Collection. The textbooks date from the 19th century and are fully searchable.
Archive of European Integration
A digitized repository and archive of material dealing with European integration that focuses on the normalization of relations of Eastern and Western Europe following the Cold War and the integration movements in West Europe that resulted in the European Community. Nearly 30 universities throughout Europe and America contribute content to the AEI. The AEI collects both independently produced research materials and official European Community/European Union do |
https://en.wikipedia.org/wiki/Tokogeny | Tokogeny or tocogeny is the biological relationship between parent and offspring, or more generally between ancestors and descendants. In contradistinction to phylogeny it applies to individual organisms as opposed to species.
In the tokogentic system shared characteristics are called traits. |
https://en.wikipedia.org/wiki/D-glycerate%20dehydrogenase%20deficiency | D-glycerate dehydrogenase deficiency (or 3-phosphoglycerate dehydrogenase deficiency, PHGDH deficiency, PHGDHD) is a rare autosomal metabolic disease where the young patient is unable to produce an enzyme necessary to convert 3-phosphoglycerate into 3-phosphohydroxypyruvate, which is the only way for humans to synthesize serine.This disorder is called Neu–Laxova syndrome in neonates.
Symptoms and signs
In addition significantly shortening lifespan, PHGDH deficiencies are known to cause congenital microcephaly, psychomotor retardation, and seizures in both humans and rats, presumably due to the essential signaling within the nervous system that serine, glycine, and other downstream molecules are intimately involved with.
Cause
Homozygous or compound heterozygous mutations in 3-phosphoglycerate dehydrogenase (PHGDH) cause Neu-Laxova syndrome and phosphoglycerate dehydrogenase deficiency.
Mechanism
3-Phosphoglycerate dehydrogenase catalyzes the transition of 3-phosphoglycerate into 3-phosphohydroxypyruvate, which is the committed step in the phosphorylated pathway of L-serine biosynthesis. It is also essential in cysteine and glycine synthesis, which lie further downstream. This pathway represents the only way to synthesize serine in most organisms except plants, which uniquely possess multiple synthetic pathways. Nonetheless, the phosphorylated pathway that PHGDH participates in is still suspected to have an essential role in serine synthesis used in the developmental signaling of plants.
Diagnosis
Treatment
Treatment typically involves oral supplementation of serine and glycine. |
https://en.wikipedia.org/wiki/Laguerre%20transformations | The Laguerre transformations or axial homographies are an analogue of Möbius transformations over the dual numbers. When studying these transformations, the dual numbers are often interpreted as representing oriented lines on the plane. The Laguerre transformations map lines to lines, and include in particular all isometries of the plane.
Strictly speaking, these transformations act on the dual number projective line, which adjoins to the dual numbers a set of points at infinity. Topologically, this projective line is equivalent to a cylinder. Points on this cylinder are in a natural one-to-one correspondence with oriented lines on the plane.
Definition
A Laguerre transformation is a linear fractional transformation where are all dual numbers, lies on the dual number projective line, and is not a zero divisor.
A dual number is a hypercomplex number of the form where but . This can be compared to the complex numbers which are of the form where .
The points of the dual number projective line can be defined equivalently in two ways:
The usual set of dual numbers, but with some additional "points at infinity". Formally, the set is . The points at infinity can be expressed as where is an arbitrary real number. Different values of correspond to different points at infinity. These points are infinite because is often understood as being an infinitesimal number, and so is therefore infinite.
The homogeneous coordinates [x : y] with x and y dual numbers such that the ideal that they generate is the whole ring of dual numbers. The ring is viewed through the injection x ↦ [x : 1]. The projective line includes points [1 : yε].
Line coordinates
A line which makes an angle with the x-axis, and whose x-intercept is denoted , is represented by the dual number
The above doesn't make sense when the line is parallel to the x-axis. In that case, if then set where is the y-intercept of the line. This may not appear to be valid, as one is dividing by a zer |
https://en.wikipedia.org/wiki/Carcel | The Carcel is a former French unit for measuring the intensity of light. The unit was defined in 1860 as the intensity of a Carcel lamp with standard burner and chimney dimensions, which burnt colza oil
(obtained from the seed of the plant Brassica campestris) at a rate of 42 grams of colza oil per hour with a flame 40 millimeters in height.
In modern terminology one carcel equals about 9.74 candelas.
See also
Jail, or cárcel in Spanish |
https://en.wikipedia.org/wiki/Linear%20molecular%20geometry | The linear molecular geometry describes the geometry around a central atom bonded to two other atoms (or ligands) placed at a bond angle of 180°. Linear organic molecules, such as acetylene (), are often described by invoking sp orbital hybridization for their carbon centers.
According to the VSEPR model (Valence Shell Electron Pair Repulsion model), linear geometry occurs at central atoms with two bonded atoms and zero or three lone pairs ( or ) in the AXE notation. Neutral molecules with linear geometry include beryllium fluoride () with two single bonds, carbon dioxide () with two double bonds, hydrogen cyanide () with one single and one triple bond. The most important linear molecule with more than three atoms is acetylene (), in which each of its carbon atoms is considered to be a central atom with a single bond to one hydrogen and a triple bond to the other carbon atom. Linear anions include azide () and thiocyanate (), and a linear cation is the nitronium ion ().
Linear geometry also occurs in molecules, such as xenon difluoride () and the triiodide ion () with one iodide bonded to the two others. As described by the VSEPR model, the five valence electron pairs on the central atom form a trigonal bipyramid in which the three lone pairs occupy the less crowded equatorial positions and the two bonded atoms occupy the two axial positions at the opposite ends of an axis, forming a linear molecule.
See also
AXE method
Molecular geometry |
https://en.wikipedia.org/wiki/Max%20Planck%20Institute%20of%20Biophysics | The Max Planck Institute of Biophysics () is located in Frankfurt, Germany. It was founded as the Kaiser Wilhelm Institute of Biophysics in 1937, and moved into a new building in 2003. It is an institute of the Max Planck Society.
Since March 2003, the MPI for Biophysics has resided in a new building on the Riedberg campus of the Goethe University Frankfurt in the north of the city. At the end of 2016, a total of 178 employees were working at the institute, including 48 scientists and 50 junior researchers. The Nobel Prize winner Hartmut Michel was the director of the institute starting 1987 until he was replaced by Ana J. García-Sáez in October 2023. Scientific links to fellow researchers at Goethe University have been strengthened further, as the institute is now situated next to the university's biology, chemistry and physics laboratories. Together with the Max Planck Institute for Brain Research and the Goethe University the institute run the International Max Planck Research School (IMPRS) for Structure and Function of Biological Membranes, a graduate program offering a Ph.D. in the period from 2000 until 2012.
Departments
Molecular Membrane Biology (Hartmut Michel, since 1987)
Structural Biology (Werner Kühlbrandt, since 1997)
Biophysical Chemistry (Ernst Bamberg, since 1993, em. since 2016)
Theoretical Biophysics (Gerhard Hummer, since 2013)
Molecular Sociology (Martin Beck, since 2019)
Molecular Neurogenetics (Peter Mombaerts, from 2006 until 2010)
A prerequisite for the understanding of the fundamental processes of life is the knowledge of the structure of the participating macromolecules. Two of the four departments are devoted to the challenging task of determining the structure of membrane proteins. Under the direction of Hartmut Michel (Nobel Prize in Chemistry of 1988 for the first structure determination of a membrane protein), the Department of Molecular Membrane Biology approaches this problem primarily by x-ray crystallography, whereas the Dep |
https://en.wikipedia.org/wiki/Raspberry | The raspberry is the edible fruit of a multitude of plant species in the genus Rubus of the rose family, most of which are in the subgenus Idaeobatus. The name also applies to these plants themselves. Raspberries are perennial with woody stems. World production of raspberries in 2020 was 895,771 tonnes, led by Russia with 20% of the total.
Description
A raspberry is an aggregate fruit, developing from the numerous distinct carpels of a single flower. What distinguishes the raspberry from its blackberry relatives is whether or not the torus (receptacle or stem) "picks with" (i.e., stays with) the fruit. When picking a blackberry fruit, the torus stays with the fruit. With a raspberry, the torus remains on the plant, leaving a hollow core in the raspberry fruit.
Raspberries are grown for the fresh fruit market and for commercial processing into individually quick frozen (IQF) fruit, purée, juice, or as dried fruit used in a variety of grocery products such as raspberry pie. Raspberries need ample sun and water for optimal development. Raspberries thrive in well-drained soil with a pH between 6 and 7 with ample organic matter to assist in retaining water. While moisture is essential, wet and heavy soils or excess irrigation can bring on Phytophthora root rot, which is one of the most serious pest problems facing the red raspberry. As a cultivated plant in moist, temperate regions, it is easy to grow and has a tendency to spread unless pruned. Escaped raspberries frequently appear as garden weeds, spread by seeds found in bird droppings.
An individual raspberry weighs , and is made up of around 100 drupelets, each of which consists of a juicy pulp and a single central seed. A raspberry bush can yield several hundred berries a year.
Etymology
Raspberry derives its name from raspise, "a sweet rose-colored wine" (mid-15th century), from the Anglo-Latin vinum raspeys, or from raspoie, meaning "thicket", of Germanic origin. The name may have been influenced by its appe |
https://en.wikipedia.org/wiki/Bourbaki%20dangerous%20bend%20symbol | The dangerous bend or caution symbol ☡ () was created by the Nicolas Bourbaki group of mathematicians and appears in the margins of mathematics books written by the group. It resembles a road sign that indicates a "dangerous bend" in the road ahead, and is used to mark passages tricky on a first reading or with an especially difficult argument.
Variations
Others have used variations of the symbol in their books. The computer scientist Donald Knuth introduced an American-style road-sign depiction in his Metafont and TeX systems, with a pair of adjacent signs indicating doubly dangerous passages.
Typography
In the LaTeX typesetting system, Knuth's dangerous bend symbol can be produced by
first loading the font manfnt (a font with extra symbols used in Knuth's TeX manual) with
\usepackage{manfnt}
and then typing
\dbend
There are several variations given by \lhdbend, \reversedvideodbend, \textdbend, \textlhdbend, and \textreversedvideodbend.
See also
Halmos box |
https://en.wikipedia.org/wiki/Siege%20of%20Fort%20Pitt | The siege of Fort Pitt took place during June and July 1763 in what is now the city of Pittsburgh, Pennsylvania, United States. The siege was a part of Pontiac's War, an effort by Native Americans to remove the Anglo-Americans from the Ohio Country and Allegheny Plateau after they refused to honor their promises and treaties to leave voluntarily after the defeat of the French. The Native American efforts of diplomacy, and by siege, to remove the Anglo-Americans from Fort Pitt ultimately failed.
This event is best known as an early instance of biological warfare, in which William Trent from an American settler family and Simeon Ecuyer, a Swiss mercenary in British service, gave items from a smallpox infirmary as gifts to Native American emissaries with the hope of spreading the deadly disease to nearby tribes. The effectiveness is unknown, although it is known that the method used is inefficient compared to respiratory transmission and these attempts to spread the disease are difficult to differentiate from epidemics occurring from previous contacts with colonists.
Background
Fort Pitt was built in 1758 during the French and Indian War, on the site of what was previously Fort Duquesne in what is now the city of Pittsburgh, Pennsylvania, United States. The French abandoned and destroyed Fort Duquesne in November 1758 with the approach of General John Forbes's expedition. The Forbes expedition was successful in part because of the Treaty of Easton, in which area American Indians agreed to end their alliance with the French. American Indians—primarily the Six Nations, Delawares and Shawnees—made this agreement with the understanding that the British would leave the area after their war with the French.Instead of leaving the territory west of the Appalachian Mountains as they had agreed, the Anglo-Americans remained on Native lands and reinforced their forts while settlers continued to push westward, despite the Royal Proclamation of 1763 placing a limit upon the west |
https://en.wikipedia.org/wiki/Data-Link%20Switching | Data-Link Switching (DLSw) is a tunneling protocol designed to tunnel unroutable, non-IP based protocols such as IBM Systems Network Architecture (SNA) and NBF over an IP network.
DLSw was initially documented in IETF RFC 1434 in 1993. In 1995 it was further documented in the IETF RFC 1795. DLSw version 2 was presented in 1997 in IETF RFC 2166 as an improvement to RFC 1795. Cisco Systems has its own proprietary extensions to DLSw in DLSw+. According to Cisco, DLSw+ is 100% IETF RFC 1795 compliant but includes some proprietary extensions that can be used when both devices are Cisco.
Some organisations are starting to replace DLSw tunneling with the more modern Enterprise Extender (EE) protocol which is a feature of IBM APPN on z/OS systems. Microsoft refers to EE as IPDLC. Enterprise Extender uses UDP traffic at the transport layer rather than the network layer.
Cisco deploy Enterprise Extender on their hardware via the IOS feature known as SNAsW (SNA Switch).
See also
Microsoft Host Integration Server
Synchronous Data Link Control
Systems Network Architecture |
https://en.wikipedia.org/wiki/Spirit%20DSP | Spirit DSP is a Russian company that develops embedded software for real-time voice and video communication over IP networks – voice and video engines. Its voice and video software platform is used by carriers, mobile messaging apps, and social networks, serving more than 1 billion users in 100 countries.
The company is headquartered in Moscow, with sales offices in the United States, Japan, Korea, Israel, Germany, Italy, France, Singapore, Taiwan and China.
History
Spirit DSP was founded in 1992. Since 1996 the company is focused on embedded software products for IP communications. Most important competitor was Global IP Solutions, until their acquisition by Google, Inc. and the subsequent release of their most important software products as Free Software.
Products
Spirit's voice and video engines are targeted at various applications – PC and mobile communication applications (softphones, IMS-, Unified Communications and Enterprise Mobility clients), terminal user equipment with IP-connectivity (media phones, IP phones, IP set top boxes, Mobile Internet Devices) and infrastructure equipment (IP gateways, ATAs, media servers, etc.).
Spirit's VoIP software products are media processing libraries. They include standard (like G.723, G.729, H.264, MPEG-4) and proprietary Spirit IPMR voice and video codecs for speech and video compression / decompression, RTP packetizers, echo and noise cancellation, packet loss concealment and error correction, adaptive jitter buffer, audio and video synchronization, CPU load and playback rate control, etc. These components are integrated into a module within application framework.
Awards and recognition
In 2005 and 2007 company was included in "Pulver 100" listing of privately held growth companies deemed to represent the future of the IP-voice and video communications ecosystem. In 2007 Spirit DSP was awarded a Seal of E-Excellence Award at CeBIT for innovative VVoIP technologies in the global market.
VideoSpace was awarded 2 |
https://en.wikipedia.org/wiki/The%20Psychology%20of%20Nuclear%20Proliferation | The Psychology of Nuclear Proliferation: Identity, Emotions, and Foreign Policy is a 2006 book by Jacques E. C. Hymans, published by Cambridge University Press. In the book, Hymans draws on the humanities and social sciences to build a model of decision-making that links identity to emotions and ultimately to nuclear energy policy choices.
See also
List of books about nuclear issues
List of nuclear whistleblowers
Nuclear disarmament
Nuclear weapons |
https://en.wikipedia.org/wiki/Project%204.1 | Project 4.1 was the designation for a medical study and experimentation conducted by the United States of those residents of the Marshall Islands exposed to radioactive fallout from the March 1, 1954 Castle Bravo nuclear test at Bikini Atoll, which had an unexpectedly large yield. Government and mainstream historical sources point to the study being organized on March 6 or March 7, 1954, six days after the Bravo shot.
Establishment and secrecy
In the wake of the Castle Bravo detonation, a new research section was added to the Castle Bravo Weapons Effects research section. Program 4, "Biomedical effects," was to include one project, Project 4.1, titled "Study of Response of Human Beings exposed to Significant Beta and Gamma Radiation due to Fall-out from High-Yield Weapons." Eugene P. Cronkite of the National Naval Medical Center was designated as Project Officer. Cronkite's instructions stressed the importance of secrecy surrounding the project:
The purpose of the project, as a 1982 Defense Nuclear Agency report explained, was both medical as well as for research purposes:
Preparation
As a Department of Energy Committee writing on the human radiation experiments wrote, "It appears to have been almost immediately apparent to the AEC and the Joint Task Force running the Castle series that research on radiation effects could be done in conjunction with the medical treatment of the exposed populations." The DOE report also concluded that "The dual purpose of what is now a DOE medical program has led to a view by the Marshallese that they were being used as 'guinea pigs' in a 'radiation experiment.'"
Organizations involved in the project included the Naval Medical Research Institute, the Naval Radiological Defense Laboratory, Patrol Squadron 29, the Naval Air Station, Kwajalein, Los Alamos National Laboratory, the Applied Fisheries Laboratory at the University of Washington, and Hanford Atomic Power Operations. Three U.S. Navy ships were used in the project: USS N |
https://en.wikipedia.org/wiki/OpenSTA | OpenSTA is a feature-rich GUI-based web server benchmarking utility that can perform scripted HTTP and HTTPS heavy load tests with performance measurements. It is freely available and distributable under the open source GNU General Public License. OpenSTA currently only runs on Microsoft Windows-based operating systems.
Scripts are recorded in a proprietary language called "SCL". It is a fairly simple coding language that provides support for custom functions, variable scopes, and random or sequential lists.
OpenSTA was originally written by Cyrano. Cyrano's intentions were to write commercial plug in modules and support for OpenSTA for performance testing non-web applications.
Note that the most recent version posted on the OpenSTA home page is 1.4.4, released 27 Oct, 2007.
See also
Load testing tools |
https://en.wikipedia.org/wiki/Marine%20geophysics | Marine geophysics is the scientific discipline that employs methods of geophysics to study the world's ocean basins and continental margins, particularly the solid earth beneath the ocean. It shares objectives with marine geology, which uses sedimentological, paleontological, and geochemical methods. Marine geophysical data analyses led to the theories of seafloor spreading and plate tectonics.
Methods
Marine geophysics uses techniques largely employed on the continents, from fields including exploration geophysics and seismology, and methods unique to the ocean such as sonar. Most geophysical instruments are used from surface ships but some are towed near the seafloor or function autonomously, as with Autonomous Underwater Vehicles or AUVs.
Objectives of marine geophysics include determination of the depth and features of the seafloor, the seismic structure and earthquakes in the ocean basins, the mapping of gravity and magnetic anomalies over the basins and margins, the determination of heat flow through the seafloor, and electrical properties of the ocean crust and Earth's mantle.
Navigation
Modern marine geophysics, as with most oceanographic surveying with research ships, use Global Positioning System satellites, either the U.S. GPS array or the Russian GLONASS for ship navigation. Geophysical instruments towed near the seafloor typically use acoustic transponder navigation sonar networks.
Ocean depth
The depth of the seafloor is measured using echo sounding, a sonar method developed during the 20th century and advanced during World War II. Common variations are based on the sonar beam width and number of sonar beams as is used in multibeam sonar or swath mapping that became more advanced toward the latter half of the 20th century.
Sedimentary cover of the seafloor
The thickness and type of sediments covering the ocean crust are estimated using the seismic reflection technique. This method was highly advanced by offshore oil exploration companies. The |
https://en.wikipedia.org/wiki/International%20Electrotechnical%20Exhibition | The 1891 International Electrotechnical Exhibition was held between 16 May and 19 October on the disused site of the three former (Western Railway Stations) in Frankfurt am Main, Germany. The exhibition featured the first long-distance transmission of high-power, three-phase electric current, which was generated 175 km away at Lauffen am Neckar. As a result of this successful field trial, three-phase current became established for electrical transmission networks throughout the world.
History
The "Elektrotechnische Gesellschaft" (Electrotechnical Society) was founded in Frankfurt in 1881 with the aim of promoting electricity and, in particular, furthering research into its application for industry and technology. Three years later, some ten manufacturers of electrical equipment had set themselves up in the city. In around 1890, some of the enterprises were established which would later become major firms in Frankfurt: Hartmann & Braun, Staudt & Voigt (from 1891 Voigt & Haefner) and W Lahmeyer & Co (from 1893 Elektrizitäts-AG, previously W Lahmeyer & Co). And it was in Frankfurt that the "second industrial revolution" began to emerge – a revolution that would bring about fundamental changes similar to those created 100 years previously by the introduction of the steam engine to the world of work. In 1891, the German electrical industry was ready to demonstrate its capabilities to the world at the International Electrotechnical Exhibition. A site was chosen – that of the former western stations between the city and the new main station, which had been completed in 1888.
Prompted by the Paris "Exposition Universelle" (World Fair) of 1889, Leopold Sonnemann, publisher of the Frankfurter Zeitung newspaper, interested the Electrotechnical Society in the idea of an exhibition. The Society expressed an interest and started preparations in the same year. However, there was another consideration apart from the setting up of an international exhibition – Frankfurt had |
https://en.wikipedia.org/wiki/Fuscin | Fuscin is an antibiotic with the molecular formula C15H16O5 which is produced by the fungus Oidiodendron fuscum and other Oidiodendron species and
the fungus Potebniamyces gallicola. Fuscin is an ADP transporter inhibitor. |
https://en.wikipedia.org/wiki/Abscission | Abscission () is the shedding of various parts of an organism, such as a plant dropping a leaf, fruit, flower, or seed. In zoology, abscission is the intentional shedding of a body part, such as the shedding of a claw, husk, or the autotomy of a tail to evade a predator. In mycology, it is the liberation of a fungal spore. In cell biology, abscission refers to the separation of two daughter cells at the completion of cytokinesis.
In plants
Function
A plant will abscise a part either to discard a member that is no longer necessary, such as a leaf during autumn, or a flower following fertilisation, or for the purposes of reproduction. Most deciduous plants drop their leaves by abscission before winter, whereas evergreen plants continuously abscise their leaves. Another form of abscission is fruit drop, when a plant abscises fruit while still immature in order to conserve resources needed to bring the remaining fruit to maturity. If a leaf is damaged, a plant may also abscise it to conserve water or photosynthetic efficiency, depending on the 'costs' to the plant as a whole. The abscission layer is a greenish-greyish color.
Abscission can also occur in premature leaves as a means of plant defense. Premature leaf abscission has been shown to occur in response to infestation by gall aphids. By abscising leaves that have been made host to aphid galls, plants have been shown to massively diminish the pest population, as 98% of aphids in abscised galls died. The abscission is selective, and the chance of dropping leaves increases as the number of galls increases. A leaf with three or more galls was four times more likely to abscise than a leaf with one, and 20 times as likely to be dropped as a leaf without any galls.
Process
Abscission occurs in a series of three events: 1) resorption, 2) protective layer formation, and 3) detachment. Steps 2 and 3 may occur in either order depending on the species.
Resorption
Resorption involves degrading chlorophyll to extract the |
https://en.wikipedia.org/wiki/Oskar%20Klein%20Memorial%20Lecture | The Oskar Klein Memorial Lecture at Stockholm University, dedicated to the memory of the Swedish physicist Oskar Klein (1894-1977), is held annually since 1988 by a prominent physicist, who also receives the Oskar Klein Medal. The lecture is sponsored by the university and the Nobel Committee of the Royal Swedish Academy of Sciences.
List of lecturers and recipients of the Medal
Source:
2022 - Igor R. Klebanov
2020 - Roy Kerr
2019 - Lisa Randall
2018 - Leonard Susskind
2017 - Sheldon Glashow
2016 - Kip S. Thorne
2015 - Rashid Sunyaev
2014 - Andrew Strominger
2013 - Frank Wilczek
2012 - Juan Maldacena
2011 - Joseph Silk
2010 - Alexei A. Starobinsky
2009 - Peter Higgs
2008 - Helen Quinn
2007 - Gabriele Veneziano
2006 - Viatcheslav Mukhanov
2005 - Yoichiro Nambu
2004 - Pierre Ramond
2003 - Stephen Hawking
2002 - Martin Rees
2001 - Andrei Linde
2000 - David Gross
1999 - Gerard 't Hooft
1998 - Edward Witten
1997 - P. J. E. Peebles
1996 - Alexander Polyakov
1995 - Nathan Seiberg
1994 - The Oskar Klein Centenary Symposium, September 19-21, 1994
1993 - Tsung-Dao Lee
1992 - John A. Wheeler
1991 - Alan Guth
1990 - Hans Bethe
1989 - Steven Weinberg
1988 - Chen Ning Yang
See also
Lise Meitner Distinguished Lecture
List of physics awards
External links |
https://en.wikipedia.org/wiki/Gendicine | Gendicine is a gene therapy medication used to treat patients with head and neck squamous cell carcinoma linked to mutations in the TP53 gene. It consists of recombinant adenovirus engineered to code for p53 protein (rAd-p53) and is manufactured by Shenzhen SiBiono GeneTech.
Gendicine was the first gene therapy product to obtain regulatory approval for clinical use in humans after Chinese State Food and Drug Administration approved it in 2003.
Mechanism of action
Gendicine enters the tumour cells by way of receptor-mediated endocytosis and begins to over-express genes coding for the p53 protein needed to fight the tumour. Ad-p53 seems to act by stimulating the apoptotic pathway in tumour cells, which increases the expression of tumour suppressor genes and immune response factors (such as the ability of natural killer (NK) cells to exert "bystander" effects). It also decreases the expression of multi-drug resistance, vascular endothelial growth factor and matrix metalloproteinase-2 genes and blocking transcriptional survival signals.
p53 mutation status of the tumour cells and response to Ad-p53 treatment are not closely correlated. Ad-p53 appears to act synergistically with conventional treatments such as chemo- and radiotherapy. This synergy still exists in patients with chemotherapy and radiotherapy-resistant tumors. Gendicine produces fewer side effects than conventional therapy.
Related development
Contusugene ladenovec (Advexin), a similar gene therapy developed by Introgene that also uses adenovirus to deliver the p53 gene, was turned down by the FDA in 2008 and withdrawn by the maker from the EMA approval shortly after. |
https://en.wikipedia.org/wiki/ACAM2000 | ACAM2000 is a smallpox vaccine manufactured by Sanofi Pasteur Biologics Co. It provides protection against smallpox for people determined to be at high risk for smallpox infection.
Background
Smallpox is considered a biological threat due to its potential to be used as a biological agent. Biological agents are toxins or organisms that can cause illness or death in humans, animals and plants. Exposure can result from an intentional vector, like a terrorist attack, or an unintentional release of the agent.
Smallpox was eradicated in 1980. However, there has been interest in the development of vaccines due to the possible use of smallpox as a biological agent.
Smallpox vaccine development
Smallpox vaccine development is now in its second generation. First-generation vaccines were derived from calf-lymph, and include Dryvax, APVS, Lancy-vaxina and Lister. Second-generation vaccines are cell-cultured and include ACAM2000 and CCSV.
Both Dryvax and ACAM2000 come from the New York City Board of Health strain of vaccinia. Dryvax was grown on calf skin and then freeze-dried for storage. Dryvax was first licensed by the FDA in 1931; however, it is no longer manufactured. ACAM2000 is a second generation smallpox vaccine. It comes from a clone of Dryvax which is purified and produced using modern cell culture technology.
ACAM2000 history
Emergent BioSolutions developed ACAM2000 under a contract with the U.S. Centers for Disease Control and Prevention (CDC).
The U.S. Food and Drug Administration (FDA) approved ACAM2000 in August 2007. By February 2008, it replaced Dryvax for all smallpox vaccinations.
As of 2010, there were over 200 million doses manufactured for the U.S. Strategic National Stockpile.
According to the U.S. FDA, "The approval and availability of this second-generation smallpox vaccine in the Strategic National Stockpile (SNS) enhances the emergency preparedness of the United States against the use of smallpox as a dangerous biological weapon."
Adminis |
https://en.wikipedia.org/wiki/Osmotic%20coefficient | An osmotic coefficient is a quantity which characterises the deviation of a solvent from ideal behaviour, referenced to Raoult's law. It can be also applied to solutes. Its definition depends on the ways of expressing chemical composition of mixtures.
The osmotic coefficient based on molality m is defined by:
and on a mole fraction basis by:
where is the chemical potential of the pure solvent and is the chemical potential of the solvent in a solution, MA is its molar mass, xA its mole fraction, R the gas constant and T the temperature in Kelvin. The latter osmotic
coefficient is sometimes called the rational osmotic coefficient. The values for the two definitions are different, but since
the two definitions are similar, and in fact both approach 1 as the concentration goes to zero.
Applications
For liquid solutions, the osmotic coefficient is often used to calculate the salt activity coefficient from the solvent activity, or vice versa. For example, freezing point depression measurements, or measurements of deviations from ideality for other colligative properties, allows calculation of the salt activity coefficient through the osmotic coefficient.
Relation to other quantities
In a single solute solution, the (molality based) osmotic coefficient and the solute activity coefficient are related to the excess Gibbs free energy by the relations:
and there is thus a differential relationship between them (temperature and pressure held constant):
Liquid electrolyte solutions
For a single salt solute with molal activitiy (), the osmotic coefficient can be written as where is the stochiometric number of salt and the activity of the solvent. can be calculated from the salt activity coefficient via:
Moreover, the activity coefficient of the salt can be calculated from:
According to Debye–Hückel theory, which is accurate only at low concentrations, is asymptotic to , where I is ionic strength and A is the Debye–Hückel constant (equal to about 1.17 for |
https://en.wikipedia.org/wiki/TI-BASIC%2083 | TI-BASIC 83,TI-BASIC Z80 or simply TI-BASIC, is the built-in programming language for the Texas Instruments programmable calculators in the TI-83 series. Calculators that implement TI-BASIC have a built in editor for writing programs. While the considerably faster Z80 assembly language is supported for the calculators, TI-BASIC's in-calculator editor and more user friendly syntax make it easier to use. TI-BASIC is interpreted.
Syntax
The syntax for TI-BASIC 83 is significantly different compared to most dialects of BASIC. For example, the language does not permit indentation with whitespace characters. It also depends on the TI calculator character set because it is tokenized. Aside from these differences, TI-BASIC retains most control flow statements: conditionals, various loops, GOTOs and Labels. Conditionals and loops use End to denote the end of their bodies.
Each command can be placed on a new line, or separated by a colon for brevity. As such, the following snippets are identical in function.
:Disp "FOO
:Disp "BAR
and
:Disp "FOO:Disp "BAR
In the above example the closing double quotes can be omitted because the colon causes all open markers to be closed.
Unlike many high-level programming languages, TI-BASIC has only one assignment operator: →. The rightward arrow assigns the value on the left to the variable on the right.
Conditionals
TI-BASIC includes simple constructs using the If statement. When the If token does not have a Then token on the following line it will only execute the next single command.
:If condition
:command
Where condition is any boolean statement. One benefit of this format is brevity as it does not include Then and End. An If statement may have more than one command in its body if, instead of a command, a Then token is placed.
:If condition
:Then
:command
:command
:End
When using Then, the body must be closed by an End token. One more construct utilizes Else. This allows one of two bodies to be executed.
:If condition
:Then
:bod |
https://en.wikipedia.org/wiki/Functional%20design | Functional Design is a paradigm used to simplify the design of hardware and software devices such as computer software and, increasingly, 3D models. A functional design assures that each modular part of a device has only one responsibility and performs that responsibility with the minimum of side effects on other parts. Functionally designed modules tend to have low coupling.
Advantages
The advantage for implementation is that if a software module has a single purpose, it will be simpler, and therefore easier and less expensive, to design and implement.
Systems with functionally designed parts are easier to modify because each part does only what it claims to do.
Since maintenance is more than 3/4 of a successful system's life, this feature is a crucial advantage. It also makes the system easier to understand and document, which simplifies training. The result is that the practical lifetime of a functional system is longer.
In a system of programs, a functional module will be easier to reuse because it is less likely to have side effects that appear in other parts of the system.
Technique
The standard way to assure functional design is to review the description of a module. If the description includes conjunctions such as "and" or "or", then the design has more than one responsibility, and is therefore likely to have side effects. The responsibilities need to be divided into several modules in order to achieve a functional design.
Critiques and limits
Every computer system has parts that cannot be functionally pure because they exist to distribute CPU cycles or other resources to different modules. For example, most systems have an "initialization" section that starts up the modules. Other well-known examples are the interrupt vector table and the main loop.
Some functions inherently have mixed semantics. For example, a function "move the car from the garage" inherently has a side effect of changing the "car position". In some cases, the mixed semantics c |
https://en.wikipedia.org/wiki/Field%20encapsulation | In computer programming, field encapsulation involves providing methods that can be used to read from or write to the field rather than accessing the field directly. Sometimes these accessor methods are called getX and setX (where X is the field's name), which are also known as mutator methods. Usually the accessor methods have public visibility while the field being encapsulated is given private visibility - this allows a programmer to restrict what actions another user of the code can perform. Compare the following Java class in which the name field has not been encapsulated:
public class NormalFieldClass {
public String name;
public static void main(String[] args)
{
NormalFieldClass example1 = new NormalFieldClass();
example1.name = "myName";
System.out.println("My name is " + example1.name);
}
}
with the same example using encapsulation:
public class EncapsulatedFieldClass {
private String name;
public String getName()
{
return name;
}
public void setName(String newName)
{
name = newName;
}
public static void main(String[] args)
{
EncapsulatedFieldClass example1 = new EncapsulatedFieldClass();
example1.setName("myName");
System.out.println("My name is " + example1.getName());
}
}
In the first example a user is free to use the public name variable however they see fit - in the second however the writer of the class retains control over how the private name variable is read and written by only permitting access to the field via its getName and setName methods.
Advantages
The internal storage format of the data is hidden; in the example, an expectation of the use of restricted character sets could allow data compression through recoding (e.g., of eight bit characters to a six bit code). An attempt to encode characters out of the range of the expected data could then be handled by casting an error in the set routine.
In general, the ge |
https://en.wikipedia.org/wiki/Interleukin-12%20subunit%20beta | Subunit beta of interleukin 12 (also known as IL-12B, natural killer cell stimulatory factor 2, cytotoxic lymphocyte maturation factor p40, or interleukin-12 subunit p40) is a protein subunit that in humans is encoded by the IL12B gene. IL-12B is a common subunit of interleukin 12 and interleukin 23.
Function
This gene encodes a subunit of interleukin 12, a cytokine that acts on T and natural killer cells, and has a broad array of biological activities. Interleukin 12 is a disulfide-linked heterodimer composed of the 40 kDa cytokine receptor like subunit encoded by this gene, and a 35 kDa subunit encoded by IL12A. This cytokine is expressed by activated macrophages that serve as an essential inducer of Th1 cells development. This cytokine has been found to be important for sustaining a sufficient number of memory/effector Th1 cells to mediate long-term protection to an intracellular pathogen. Overexpression of this gene was observed in the central nervous system of patients with multiple sclerosis (MS), suggesting a role of this cytokine in the pathogenesis of the disease. The promoter polymorphism of this gene has been reported to be associated with the severity of atopic and non-atopic asthma in children.
Role as IL-23 subunit
Interleukin-12 p40 also serves as a subunit of interleukin 23. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.