source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Accessible%20category | The theory of accessible categories is a part of mathematics, specifically of category theory. It attempts to describe categories in terms of the "size" (a cardinal number) of the operations needed to generate their objects.
The theory originates in the work of Grothendieck completed by 1969, and Gabriel and Ulmer (1971). It has been further developed in 1989 by Michael Makkai and Robert Paré, with motivation coming from model theory, a branch of mathematical logic.
A standard text book by Adámek and Rosický appeared in 1994.
Accessible categories also have applications in homotopy theory. Grothendieck continued the development of the theory for homotopy-theoretic purposes in his (still partly unpublished) 1991 manuscript Les dérivateurs.
Some properties of accessible categories depend on the set universe in use, particularly on the cardinal properties and Vopěnka's principle.
-directed colimits and -presentable objects
Let be an infinite regular cardinal, i.e. a cardinal number that is not the sum of a smaller number of smaller cardinals; examples are (aleph-0), the first infinite cardinal number, and , the first uncountable cardinal). A partially ordered set is called -directed if every subset of of cardinality less than has an upper bound in . In particular, the ordinary directed sets are precisely the -directed sets.
Now let be a category. A direct limit (also known as a directed colimit) over a -directed set is called a -directed colimit. An object of is called -presentable if the Hom functor preserves all -directed colimits in . It is clear that every -presentable object is also -presentable whenever , since every -directed colimit is also a -directed colimit in that case. A -presentable object is called finitely presentable.
Examples
In the category Set of all sets, the finitely presentable objects coincide with the finite sets. The -presentable objects are the sets of cardinality smaller than .
In the category of all groups, an object is fini |
https://en.wikipedia.org/wiki/Operational%20semantics | Operational semantics is a category of formal programming language semantics in which certain desired properties of a program, such as correctness, safety or security, are verified by constructing proofs from logical statements about its execution and procedures, rather than by attaching mathematical meanings to its terms (denotational semantics). Operational semantics are classified in two categories: structural operational semantics (or small-step semantics) formally describe how the individual steps of a computation take place in a computer-based system; by opposition natural semantics (or big-step semantics) describe how the overall results of the executions are obtained. Other approaches to providing a formal semantics of programming languages include axiomatic semantics and denotational semantics.
The operational semantics for a programming language describes how a valid program is interpreted as sequences of computational steps. These sequences then are the meaning of the program. In the context of functional programming, the final step in a terminating sequence returns the value of the program. (In general there can be many return values for a single program, because the program could be nondeterministic, and even for a deterministic program there can be many computation sequences since the semantics may not specify exactly what sequence of operations arrives at that value.)
Perhaps the first formal incarnation of operational semantics was the use of the lambda calculus to define the semantics of Lisp. Abstract machines in the tradition of the SECD machine are also closely related.
History
The concept of operational semantics was used for the first time in defining the semantics of Algol 68.
The following statement is a quote from the revised ALGOL 68 report:
The meaning of a program in the strict language is explained in terms of a hypothetical computer
which performs the set of actions that constitute the elaboration of that program. (Algol68, Section |
https://en.wikipedia.org/wiki/Suxibuzone | Suxibuzone is an analgesic used for joint and muscular pain. It is a prodrug of the non-steroidal anti-inflammatory drug (NSAID) phenylbutazone, and is commonly used in horses. |
https://en.wikipedia.org/wiki/Bucranium | Bucranium (plural bucrania; Latin, from Greek βουκράνιον, referring to the skull of an ox) was a form of carved decoration commonly used in Classical architecture. The name is generally considered to originate with the practice of displaying garlanded, sacrificial oxen, whose heads were displayed on the walls of temples, a practice dating back to the sophisticated Neolithic site of Çatalhöyük in eastern Anatolia, where cattle skulls were overlaid with white plaster.
Etymology and sphere of application
The word "bucranium" (latin bucranium) comes from Ancient Greek: βουκράνιον – being composed of βοῦς (ox) and κρανίον (skull) – and literally means "ox skull". Analogic, the Greek word αἰγικράνιον (latin aegicranium) means a "goat skull", also used as a decorative element in architecture.
The technical term "bucranium" was originally used in the description of classical architecture. Its application to the field of prehistoric archeology is relatively recent and is mainly due to the work of the British archaeologist James Mellaart dedicated to the Neolithic site of Çatalhöyük. In 1977, Glyn Daniel established this new meaning of the term, introducing it into the Illustrated Encyclopedia of Archeology.
Overview
In ancient Rome, bucrania were frequently used as metopes between the triglyphs on the friezes of temples designed with the Doric order of architecture. They were also used in bas-relief or painted decor to adorn marble altars, often draped or decorated with garlands of fruit or flowers, many of which have survived.
A rich and festive Doric order was employed at the Basilica Aemilia on the Roman Forum; enough of it was standing for Giuliano da Sangallo to make a drawing, c 1520, reconstructing the facade (Codex Vaticano Barberiniano Latino 4424); the alternation of the shallow libation dishes called paterae with bucrania in the metopes reinforced the solemn sacrificial theme.
While the presence of bucrania was typically used with the Doric order, the Romans |
https://en.wikipedia.org/wiki/Remote%20Initial%20Program%20Load | Remote Initial Program Load (RIPL or RPL) is a protocol for starting a computer and loading its operating system from a server via a network. Such a server runs a network operating system such as LAN Manager, LAN Server, Windows NT Server, Novell NetWare, LANtastic, Solaris or Linux.
RIPL is similar to Preboot Execution Environment (PXE), but it uses the Novell NetWare-based boot method. It was originally developed by IBM.
IBM LAN Server
IBM LAN Server enables clients (RIPL requesters) to load the operating systems DOS or OS/2 via the 802.2/DLC-protocol from the LAN (often Token Ring). Therefore, the server compares the clients' requests with entries in its RPL.MAP table. Remote booting DOS workstations via boot images was supported as early as 1990 by IBM LAN Server 1.2 via its PCDOSRPL protocol. IBM LAN Server 2.0 introduced remote booting of OS/2 stations (since OS/2 1.30.1) in 1992.
RPL and DOS
For DOS remote boot to work, the RPL boot loader is loaded into the client's memory over the network before the operating system starts. Without special precautions the operating system could easily overwrite the RPL code during boot, since the RPL code resides in unallocated memory (typically at the top of the available conventional memory). The RPL code hides and thereby protects itself from being overwritten by hooking INT 12h and reducing the memory reported by this BIOS service by its own size. INT 12h is used by DOS to query the amount of available memory when initializing its own real-mode memory allocation scheme. This causes problems on more modern DOS systems, where free real-mode address ranges may be utilized by the operating system in order to relocate parts of itself and load drivers high, so that the amount of available conventional memory is maximized. Typically, various operating system vendor and version specific "dirty tricks" had to be used by the RPL code in order to survive this very dynamic boot process and let DOS regain control over the memor |
https://en.wikipedia.org/wiki/Eukaryotic%20transcription | Eukaryotic transcription is the elaborate process that eukaryotic cells use to copy genetic information stored in DNA into units of transportable complementary RNA replica. Gene transcription occurs in both eukaryotic and prokaryotic cells. Unlike prokaryotic RNA polymerase that initiates the transcription of all different types of RNA, RNA polymerase in eukaryotes (including humans) comes in three variations, each translating a different type of gene. A eukaryotic cell has a nucleus that separates the processes of transcription and translation. Eukaryotic transcription occurs within the nucleus where DNA is packaged into nucleosomes and higher order chromatin structures. The complexity of the eukaryotic genome necessitates a great variety and complexity of gene expression control.
Eukaryotic transcription proceeds in three sequential stages: initiation, elongation, and termination.
The RNAs transcribed serve diverse functions. For example, structural components of the ribosome are transcribed by RNA polymerase I. Protein coding genes are transcribed by RNA polymerase II into messenger RNAs (mRNAs) that carry the information from DNA to the site of protein synthesis. More abundantly made are the so-called non-coding RNAs account for the large majority of the transcriptional output of a cell. These non-coding RNAs perform a variety of important cellular functions.
RNA polymerase
Eukaryotes have three nuclear RNA polymerases, each with distinct roles and properties.
RNA polymerase I (Pol I) catalyses the transcription of all rRNA genes except 5S. These rRNA genes are organised into a single transcriptional unit and are transcribed into a continuous transcript. This precursor is then processed into three rRNAs: 18S, 5.8S, and 28S. The transcription of rRNA genes takes place in a specialised structure of the nucleus called the nucleolus, where the transcribed rRNAs are combined with proteins to form ribosomes.
RNA polymerase II (Pol II) is responsible for the tra |
https://en.wikipedia.org/wiki/Hypothetical%20syllogism | In classical logic, a hypothetical syllogism is a valid argument form, a deductive syllogism with a conditional statement for one or both of its premises. The term originated with Theophrastus.
Types
Hypothetical syllogisms come in two types: mixed and pure. A mixed hypothetical syllogism has two premises: one conditional statement and one statement that either affirms or denies the antecedent or consequent of that conditional statement. For example,
If P, then Q.
P.
∴ Q.
In this example, the first premise is a conditional statement in which "P" is the antecedent and "Q" is the consequent. The second premise "affirms" the antecedent. The conclusion, that the consequent must be true, is deductively valid.
A mixed hypothetical syllogism has four possible forms, two of which are valid, while the other two are invalid. A valid mixed hypothetical syllogism either affirms the antecedent (modus ponens) or denies the consequent (modus tollens). An invalid hypothetical syllogism either affirms the consequent (fallacy of the converse) or denies the antecedent (fallacy of the inverse).
A pure hypothetical syllogism is a syllogism in which both premises and the conclusion are all conditional statements. The antecedent of one premise must match the consequent of the other for the conditional to be valid. Consequently, conditionals contain remained antecedent as antecedent and remained consequent as consequent.
If P, then Q.
If Q, then R.
∴ If P, then R.
An example in English:
If I do not wake up, then I cannot go to work.
If I cannot go to work, then I will not get paid.
Therefore, if I do not wake up, then I will not get paid.
Propositional logic
In propositional logic, hypothetical syllogism is the name of a valid rule of inference (often abbreviated HS and sometimes also called the chain argument, chain rule, or the principle of transitivity of implication). The rule may be stated:
where the rule is that whenever instances of "", and "" appear on lines of a proof, "" |
https://en.wikipedia.org/wiki/Robert%20Osserman | Robert "Bob" Osserman (December 19, 1926 – November 30, 2011) was an American mathematician who worked in geometry. He is specially remembered for his work on the theory of minimal surfaces.
Raised in Bronx, he went to Bronx High School of Science (diploma, 1942) and New York University. He earned a Ph.D. in 1955 from Harvard University with the thesis Contributions to the Problem of Type (on Riemann surfaces) supervised by Lars Ahlfors.
He joined Stanford University in 1955. He joined the Mathematical Sciences Research Institute in 1990.
He worked on geometric function theory, differential geometry, the two integrated in a theory of minimal surfaces, isoperimetric inequality, and other issues in the areas of astronomy, geometry, cartography and complex function theory.
Osserman was the head of mathematics at Office of Naval Research, a Fulbright Lecturer at the University of Paris and Guggenheim Fellow at the University of Warwick. He edited numerous books and promoted mathematics, such as in interviews with celebrities Steve Martin and Alan Alda.
He was an invited speaker at the International Congress of Mathematicians (ICM) of 1978 in Helsinki.
He received the Lester R. Ford Award (1980) of the Mathematical Association of America for his popular science writings.
H. Blaine Lawson, David Allen Hoffman and Michael Gage were Ph.D. students of his.
Robert Osserman died on Wednesday, November 30, 2011 at his home.
Mathematical contributions
The Keller–Osserman problem
Osserman's most widely cited research article, published in 1957, dealt with the partial differential equation
He showed that fast growth and monotonicity of is incompatible with the existence of global solutions. As a particular instance of his more general result:
Osserman's method was to construct special solutions of the PDE which would facilitate application of the maximum principle. In particular, he showed that for any real number there exists a rotationally symmetric solution on s |
https://en.wikipedia.org/wiki/Corpse%20decomposition | Decomposition is the process in which the organs and complex molecules of animal and human bodies break down into simple organic matter over time. In vertebrates, five stages of decomposition are typically recognized: fresh, bloat, active decay, advanced decay, and dry/skeletonized. Knowing the different stages of decomposition can help investigators in determining the post-mortem interval (PMI). The rate of decomposition of human remains can vary due to environmental factors and other factors. Environmental factors include temperature, burning, humidity, and the availability of oxygen. Other factors include body size, clothing, and the cause of death.
Stages and characteristics
The five stages of decomposition—fresh (aka autolysis), bloat, active decay, advanced decay, and dry/skeletonized—have specific characteristics that are used to identify which stage the remains are in. These stages are illustrated by reference to an experimental study of the decay of a pig corpse.
Fresh
At this stage the remains are usually intact and free of insects. The corpse progresses through algor mortis (a reduction in body temperature until ambient temperature is reached), rigor mortis (the temporary stiffening of the limbs due to chemical changes in the muscles), and livor mortis (pooling of the blood on the side of the body that is closest to the ground).
Bloat
At this stage, the microorganisms residing in the digestive system begin to digest the tissues of the body, excreting gases that cause the torso and limbs to bloat, and producing foul-smelling chemicals including putrescine and cadaverine. Cells in tissues break down and release hydrolytic enzymes, and the top layer of skin may become loosened, leading to skin slippage. Decomposition of the gastrointestinal tract results in a dark, foul-smelling liquid called "purge fluid" that is forced out of the nose and mouth due to gas pressure in the intestine. The bloat stage is characterized by a shift in the bacterial popul |
https://en.wikipedia.org/wiki/Wireless%20network%20organizations%20by%20size | Wireless Network organizations sorted by size to have a better overview of the size of these organizations around the globe and to determine which networks are tiny and which are not.
Athens_Wireless_Metropolitan_Network - 800
TWMN - 503
Pretoria Wireless Users Group - 455
Jawug - 330
Patras_wireless_metropolitan_network - 250
Heraklion Student Wireless Network - 150
Patras_Wireless_Network - 150
Melbourne Wireless - 150
Personal_Telco - 100
Wireless_Leiden - 71
Cape Town Wireless User Group (CTWUG) - 70
Ioannina Wireless Network - 40
TasWireless - 37
Seattle Wireless - 30
Unknown
AirJaldi - 2000 computers linked
BWIC
Champaign-Urbana Community Wireless Network
Clermont_Sans_Fil
Melbourne_Wireless
NYCwireless
Outernet_(network)
Wireless_Toronto
Vancouver_Community_Network
Wireless network organizations |
https://en.wikipedia.org/wiki/Commercial%20code%20%28communications%29 | In telecommunication, a commercial code is a code once used to save on cablegram costs. Telegraph (and telex) charged per word sent, so companies which sent large volumes of telegrams developed codes to save money on tolls. Elaborate commercial codes which encoded complete phrases into single words were developed and published as codebooks of thousands of phrases and sentences with corresponding codewords. Commercial codes were not generally intended to keep telegrams private, as codes were widely published; they were usually cost-saving measures only.
Many general-purpose codes, such as the Acme Code and the ABC Code, were published and widely used between the 1870s and the 1950s, before the arrival of transatlantic telephone calls and next-day airmail rendered them obsolete. Numerous special-purpose codes were also developed and sold for fields as varied as aviation, car dealerships, insurance, and cinema, containing words and phrases commonly used in those professions.
These codes turned complete phrases into single words (commonly of five letters). These were not always genuine words; for example, codes contained "words" such as BYOXO ("Are you trying to weasel out of our deal?"), LIOUY ("Why do you not answer my question?"), BMULD ("You're a skunk!"), or AYYLU ("Not clearly coded, repeat more clearly.").
History
The first telegraphic codes were developed shortly after the advent of the telegraph, and spread rapidly: the first codebook was in use by 1845. In 1854, one eighth of telegrams transmitted between New York and New Orleans were written in code. Cable tolls were charged by the word, and telegraph companies counted codewords like any other words, so a carefully constructed code could reduce message lengths enormously.
Early codes were typically compilations of phrases and corresponding codewords numbering in the tens of thousands. Codewords were chosen to be pronounceable words to minimize errors by telegraphers, and telegrams composed of non-prono |
https://en.wikipedia.org/wiki/Lichenometry | In archaeology, palaeontology, and geomorphology, lichenometry is a geomorphic method of geochronologic dating that uses lichen growth to determine the age of exposed rock, based on a presumed specific rate of increase in radial size over time. Measuring the diameter of the largest lichen of a species on a rock surface can therefore be used to determine the length of time the rock has been exposed. Lichen can be preserved on old rock faces for up to 10,000 years, providing the maximum age limit of the technique, though it is most accurate (within 10% error) when applied to surfaces that have been exposed for less than 1,000 years. (The practical limit of the technique might be 4,000 to 5,000 years.) Lichenometry is especially useful for dating surfaces less than 500 years old, as radiocarbon dating techniques are less accurate over this period. The lichens most commonly used for lichenometry are those of the genera Rhizocarpon (e.g. the species Rhizocarpon geographicum) and Xanthoria. The measured growth rates of R. geographicum tends to fall within the range of 0.9–0.3 millimeter per year, depending on several factors, including the size of the lichen patch.
It was first employed by Knut Fægri in 1933, though the first exclusively lichenometric paper was not published until 1950, by Austrian Roland Beschel in a paper concerning the European Alps.
Lichenometry can provide dates for glacial deposits in tundra environments, lake level changes, glacial moraines, trim lines, palaeofloods, rockfalls, seismic events associated with the rockfalls, talus (scree) stabilization and former extent of permafrost or very persistent snow cover. It has also been explored as a tool in assessing the speed of glacier retreat due to climate change.
Among the potential problems of the technique are the difficulty of correctly identifying the species, delay between exposure and colonization, varying growth rates from region to region as well as the fact that growth rates are not alway |
https://en.wikipedia.org/wiki/CYC1 | Cytochrome c1, heme protein, mitochondrial (CYC1), also known as UQCR4, MC3DN6, Complex III subunit 4, Cytochrome b-c1 complex subunit 4, or Ubiquinol-cytochrome-c reductase complex cytochrome c1 subunit is a protein that in humans is encoded by the CYC1 gene. CYC1 is a respiratory subunit of Ubiquinol Cytochrome c Reductase (complex III), which is located in the inner mitochondrial membrane and is part of the electron transport chain. Mutations in this gene may cause mitochondrial complex III deficiency, nuclear, type 6.
Structure
CYC1 is located on the q arm of chromosome 8 in position 24.3 and has 8 exons. The CYC1 gene produces a 13.5 kDa protein composed of 130 amino acids. CYC1 belongs to the cytochrome c family. CYC1 is a phosphoprotein and subunit of Ubiquinol Cytochrome c Reductase that binds heme groups. It has helix, transit peptide, and transmembrane domains and contains 9 alpha helixes, 5 beta strands, and 3 turns. The transmembrane protein passes through the inner mitochondrial membrane once and the majority of the protein is found on the intermembrane side. CYC1 contains covalent heme bindings sites at positions 121 and 124 and heme axial ligand iron-metal binding sites at positions 125 and 244.
Function
CYC1 encodes a protein that is located in the inner mitochondrial membrane and is part of Ubiquinol Cytochrome c Reductase (complex III). The encoded protein, CYC1, is a respiratory subunit of the cytochrome bc1 complex, which plays an important role in the mitochondrial respiratory chain by transferring electrons from the Rieske iron-sulfur protein to cytochrome c.
Species
CYC1 is a human gene that is conserved in chimpanzee, Rhesus monkey, dog, cow, mouse, rat, zebrafish, fruit fly, mosquito, C. elegans, S. cerevisiae, K. lactis, E. gossypii, S. pombe, N. crassa, A. thaliana, rice, and frog. There are orthologs of CYC1 in 137 known organisms.
Clinical Significance
Variants of CYC1 have been associated with mitochondrial complex III deficienc |
https://en.wikipedia.org/wiki/RomArchive | The RomArchive is a digital repository of Romani culture, established in 2015. Fourteen curators organised 5,000 objects, available in English, German and Romani. The archive has won a European Union Prize for Cultural Heritage and a Grimme-Preis.
Project
The RomArchive was established in 2015 as a digital repository of Romani culture. The German Federal Cultural Foundation was the largest initial sponsor, providing €3.75 million. The founders were Isabel Raabe and Franziska Sauerbrey. The project covers areas such as dance, film, literature and flamenco. Filmmaker Katalin Bársony curated a selection of 35 films which authentically present Romani culture, one being Taikon by Lawen Mohtadi. The visual arts collection is curated by Tímea Junghaus and photography by André Raatzsch. In total there are fourteen curators.
The archive contains 5,000 objects and is available in English, German and Romani. The Documentation and Cultural Centre of German Sinti and Roma took over the sponsorship of the RomArchive in 2019, on International Romani Day. The same year, the archive won a European Union Prize for Cultural Heritage. In 2020, it also won a Grimme-Preis. |
https://en.wikipedia.org/wiki/CP2K | CP2K is a freely available (GPL) quantum chemistry and solid state physics program package, written in Fortran 2008, to perform atomistic simulations of solid state, liquid, molecular, periodic, material, crystal, and biological systems. It provides a general framework for different methods: density functional theory (DFT) using a mixed Gaussian and plane waves approach (GPW) via LDA, GGA, MP2, or RPA levels of theory, classical pair and many-body potentials, semi-empirical (AM1, PM3, MNDO, MNDOd, PM6) and tight-binding Hamiltonians, as well as Quantum Mechanics/Molecular Mechanics (QM/MM) hybrid schemes relying on the Gaussian Expansion of the Electrostatic Potential (GEEP). The Gaussian and Augmented Plane Waves method (GAPW) as an extension of the GPW method allows for all-electron calculations. CP2K can do simulations of molecular dynamics, metadynamics, Monte Carlo, Ehrenfest dynamics, vibrational analysis, core level spectroscopy, energy minimization, and transition state optimization using NEB or dimer method.
CP2K provides editor plugins for Vim and Emacs syntax highlighting, along with other tools for input generation and output processing.
The latest version 2023.2 was released on 28 July 2023.
See also
Car–Parrinello molecular dynamics
Computational chemistry
Molecular dynamics
Monte Carlo algorithm
Energy minimization
Quantum chemistry
Quantum chemistry computer programs
Ab initio quantum chemistry methods
Møller–Plesset perturbation theory
Hartree–Fock method
Random phase approximation
Density functional theory
Harris functional
Tight binding
Semi-empirical quantum chemistry method
Key Papers
External links
Official CP2K Website
Users' Forum
1st CP2K Tutorial: Enabling the power of imagination in MD Simulations
2nd CP2K Tutorial: Enabling the power of imagination in MD Simulations
CP2K User Tutorial: "Computational Spectroscopy"
Ascalaph, a 3rd party graphical shell for CP2K and other quantum chemistry software |
https://en.wikipedia.org/wiki/Vidoop | Vidoop LLC was a privately held company based in Portland, Oregon. Its flagship product was Vidoop Secure, a login solution designed to function without traditional passwords, which Vidoop claimed was resistant to brute force, keystroke logging, phishing, and some man-in-the-middle attacks. On 30 May 2009, Vidoop announced that it was going out of business.
Founding and Launch
Vidoop was founded in 2006 in Tulsa, Oklahoma. As of March 2006 it had 4 employees and would initially reveal only that it was developing a novel login solution that hides an access code in plain sight. After over a year of secretive development and testing, the company launched its product, Vidoop Secure, at the Web 2.0 Expo in San Francisco, California on 2007-04-17. Luke Sontag, a co-founder, gave a presentation at the expo demonstrating the technology and further announced that an unnamed Fortune 500 company would be replacing its login system with Vidoop by July 2007.
Products
Vidoop's core technology is the Vidoop Dynamic Image Grid, a login tool that powers Vidoop Secure and thus myVidoop.com. The company also sells advertising space, allowing a company to place its products as images in the grid. There are currently two multi-national advertisers: Smart USA (a division of Daimler) and ConocoPhillips (Phillips66, Conoco, and 76 brand gas stations). One regional advertiser: Mazzio's. And one local advertiser: Jackie Cooper Imports (A local Tulsa, OK auto dealer).
Vidoop Secure
Vidoop Secure is a user login technology based on categorized images. When a user enrolls in a system implementing the technology, he chooses from several categories of images (such as airplanes, cars, or keys). Furthermore, the user's computer is "activated" with a cookie, which is only provided upon the user's confirmation of a code transmitted either by email or by phone via voice or text message. At the time of login, if the cookie is found, a grid of images is displayed that includes pictures belongin |
https://en.wikipedia.org/wiki/Minimum%20bias%20event | Minimum bias (MB) events are inelastic events selected by a high-energy experiment's loose (minimum bias) trigger with as little bias as possible. MB events can include both non-diffractive and diffractive processes although the precise definition and relative contributions vary among experiments and analyses. Quite often the beam hadrons ooze through each other and fall apart without any hard collisions occurring in the event. MB event is not the same as the underlying event (UE), which consists of particles accompanying a hard scattering. The density of particles in the UE in jet events is found to be roughly a factor of two greater than that in MB in proton-proton collisions at the Tevatron and the LHC. |
https://en.wikipedia.org/wiki/Firewall%20%28computing%29 | In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.
History
The term firewall originally referred to a wall intended to confine a fire within a line of adjacent buildings. Later uses refer to similar structures, such as the metal sheet separating the engine compartment of a vehicle or aircraft from the passenger compartment. The term was applied in the late 1980s to network technology that emerged when the Internet was fairly new in terms of its global use and connectivity. The predecessors to firewalls for network security were routers used in the late 1980s. Because they already segregated networks, routers could apply filtering to packets crossing them.
Before it was used in real-life computing, the term appeared in the 1983 computer-hacking movie WarGames, and possibly inspired its later use.
Types
Firewalls are categorized as a network-based or a host-based system. Network-based firewalls are positioned between two or more networks, typically between the local area network (LAN) and wide area network (WAN), their basic function is to control the flow of data between connected networks. They are either a software appliance running on general-purpose hardware, a hardware appliance running on special-purpose hardware, or a virtual appliance running on a virtual host controlled by a hypervisor. Firewall appliances may also offer non firewall functionality, such as DHCP or VPN services. Host-based firewalls are deployed directly on the host itself to control network traffic or other computing resources. This can be a daemon or service as a part of the operating system or an agent application for protection.
Packet filter
The first reported type of network firewall is called a packet filter, which inspects packets transferred between compu |
https://en.wikipedia.org/wiki/Sema%20domain | The Sema domain is a structural domain of semaphorins, which are a large family of secreted and transmembrane proteins, some of which function as repellent signals during axon guidance. Sema domains also occur in the hepatocyte growth factor receptor (Uniprot: ), Plexin-A3 (Uniprot: ) and in viral proteins.
CD100 (also called SEMA4D) is associated with PTPase and serine kinase activity. CD100 increases PMA, CD3 and CD2 induced T cell proliferation, increases CD45 induced T cell adhesion, induces B cell homotypic adhesion and down-regulates B cell expression of CD23.
The Sema domain is characterised by a conserved set of cysteine residues, which form four disulfide bonds to stabilise the structure. The Sema domain fold is a variation of the beta propeller topology, with seven blades radially
arranged around a central axis. Each blade contains a four- stranded (strands A to D) antiparallel beta sheet. The inner strand of each blade (A) lines the channel at the centre of the propeller, with strands B and C of the same repeat radiating outward, and strand D of the next repeat forming the outer edge of the blade. The large size of the Sema domain is not due to a single inserted domain but results from the presence of additional secondary structure elements inserted in most of the blades. The Sema domain uses a 'loop and hook' system to close the circle between the first and the last blades. The blades are constructed sequentially with an N-terminal beta- strand closing the circle by providing the outermost strand (D) of the seventh (C-terminal) blade. The beta-propeller is further stabilized by an extension of the N-terminus, providing an additional, fifth beta-strand on the outer edge of blade 6.
Human proteins containing this domain
MET; MST1R; PLXNA1; PLXNA2; PLXNA3; PLXNA4; PLXNB1; PLXNB2;
PLXNB3; PLXND1; SEMA3A; SEMA3B; SEMA3C; SEMA3D; SEMA3E; SEMA3F;
SEMA3G; SEMA4A; SEMA4B; SEMA4C; SEMA4D; SEMA4F; |
https://en.wikipedia.org/wiki/Inhibitor%20of%20DNA-binding%20protein | Inhibitor of DNA-binding/differentiation proteins, also known as ID proteins comprise a family of proteins that heterodimerize with basic helix-loop-helix (bHLH) transcription factors to inhibit DNA binding of bHLH proteins. ID proteins also contain the HLH-dimerization domain but lack the basic DNA-binding domain and thus regulate bHLH transcription factors when they heterodimerize with bHLH proteins. The first helix-loop-helix proteins identified were named E-proteins because they bind to Ephrussi-box (E-box) sequences. In normal development, E proteins form dimers with other bHLH transcription factors, allowing transcription to occur. However, in cancerous phenotypes, ID proteins can regulate transcription by binding E proteins, so no dimers can be formed and transcription is inactive. E proteins are members of the class I bHLH family and form dimers with bHLH proteins from class II to regulate transcription. Four ID proteins exist in humans: ID1, ID2, ID3, and ID4. The ID homologue gene in Drosophila is called extramacrochaetae (EMC) and encodes a transcription factor of the helix-loop-helix family that lacks a DNA binding domain. EMC regulates cell proliferation, formation of organs like the midgut, and wing development. ID proteins could be potential targets for systemic cancer therapies without inhibiting the functioning of most normal cells because they are highly expressed in embryonic stem cells, but not in differentiated adult cells. Evidence suggests that ID proteins are overexpressed in many types of cancer. For example, ID1 is overexpressed in pancreatic, breast, and prostate cancers. ID2 is upregulated in neuroblastoma, Ewing’s sarcoma, and squamous cell carcinoma of the head and neck.
Function
ID proteins are key regulators of development where they function to prevent premature differentiation of stem cells. By inhibiting the formation of E-protein dimers that promote differentiation, ID proteins can regulate the timing of differentiation of stem |
https://en.wikipedia.org/wiki/Runtime%20error%20detection | Runtime error detection is a software verification method that analyzes a software application as it executes and reports defects that are detected during that execution. It can be applied during unit testing, component testing, integration testing, system testing (automated/scripted or manual), or penetration testing.
Runtime error detection can identify defects that manifest themselves only at runtime (for example, file overwrites) and zeroing in on the root causes of the application crashing, running slowly, or behaving unpredictably. Defects commonly detected by runtime error detection include:
Race conditions
Exceptions
Resource leaks
Memory leaks
Security attack vulnerabilities (e.g., SQL injection)
Null pointers
Uninitialized memory
Buffer overflows
Runtime error detection tools can only detect errors in the executed control flow of the application.
See also
Development Testing
Software testing
Memory debugger
BoundsChecker
Runtime verification |
https://en.wikipedia.org/wiki/Smaart | Smaart (System Measurement Acoustical Analysis in Real Time) is a suite of audio and acoustical measurements and instrumentation software tools introduced in 1996 by JBL's professional audio division. It is designed to help the live sound engineer optimize sound reinforcement systems before public performance and actively monitor acoustical parameters in real time while an audio system is in use. Most earlier analysis systems required specific test signals sent through the sound system, ones that would be unpleasant for the audience to hear. Smaart is a source-independent analyzer and therefore will work effectively with a variety of test signals including speech or music.
The product has been known as JBL-SMAART, SIA-SMAART Pro, EAW SMAART, and SmaartLive. As of 2008 the product has been branded as simply Smaart. An acoustician version has been offered as Smaart Acoustic Tools, however as of Smaart v7.4, Acoustic Tools have been included within the Impulse Response mode of Smaart. A standalone sound pressure level monitoring only version called Smaart SPL was released in 2020.
Smaart is a real-time single and dual-channel fast Fourier transform (FFT) analyzer. Smaart has two modes: Real-Time Mode and impulse response mode. Real-Time mode views include single channel Spectrum and dual channel Transfer Function measurements to display RTA, Spectrograph, and Transfer Function (Live IR, Phase, Coherence, Magnitude) measurements. The impulse response mode will display time domain graphs such as Lin (Linear), Log (Logarithmic), ETC (Energy Time Curve), as well as Frequency, Spectrograph, and Histogram graphs. Impulse Response mode also includes a suite of acoustical intelligibly criteria such as STI, STIPA, Clarity, RT60, EDT, etc.
Smaart has been licensed and owned by several companies since JBL and is currently owned and developed by Rational Acoustics. First written as a native Windows 3.1 application to work within Windows 95 on IBM-compatible computers, in 20 |
https://en.wikipedia.org/wiki/LocalTalk-to-Ethernet%20bridge | A LocalTalk-to-Ethernet Bridge is a network bridge that joins the physical layer of the AppleTalk networking used by previous generations of Apple Computer products to an Ethernet network. This was an important class of products in the late 1980s and early 1990s, before Ethernet support became universal on the Mac lineup.
Some LocalTalk-to-Ethernet Bridges only performed Appletalk bridging. Others were also able to bridge other protocols using ad-hoc standards. One example was the MacIP system that allowed LocalTalk-based Macs to send and receive TCP/IP (internet) packets using the bridges as a go-between.
Examples
Hardware devices:
Asante: AsanteTalk
Cayman Systems: GatorBox
Compatible Systems: Ether Route/TCP, Ether Route II, RISC Router 3000E
Dayna Communications: EtherPrint, EtherPrint Plus, EtherPrint-T, EtherPrint-T Plus
Farallon: EtherPrint, EtherWave LocalTalk Adapter, InterRoute/5, StarRouter, EtherMac iPrint Adapter LT
FOCUS Enhancements EtherLAN PRINT
Hayes Inter-bridge
Kinetics: FastPath - in later years, available from Shiva Networks
Sonic Systems: microPrint, microBridge TCP/IP
Transware: EtherWay
Tribe Computer Works: TribeStar
Webster Computer Corporation: MultiGate, MultiPort Gateway, MultiPort/LT
Software in MacTCP era (<1995):
Apple IP Gateway from Apple Computer
SuperBridge/TCP from Sonic Systems
Software in Open Transport era (>1995):
Internet Gateway from Vicomsoft
IPNetRouter from Sustainable Softworks
LocalTalk Bridge from Apple Computer
Other Software
macipgw
Netatalk |
https://en.wikipedia.org/wiki/C1orf27 | Uncharacterized protein Chromosome 1 Open Reading Frame 27 is a protein in humans, encoded by the C1orf27 gene. It is accession number NM_017847. This is a membrane protein that is 3926 base pairs long with the most extensive string of amino acids being 454aa long. C1orf27 exhibits cytoplasmic expression in epidermal tissues. Predicted associated biological processes of the gene include cell fate specification and developmental properties.
Gene
Locus
This gene is located on chromosome 1 at 1q31.1. It is encoded on the plus strand of DNA spanning from 186,344,406 to 186,390,514.
mRNA
Alternative splicing
There appear to be four isoforms due to splicing. Two of those are truncated on the 3' end of the protein from 266aa and 396aa. Additional location of alternative splice sites are from 79aa to 102aa and 246aa to 260aa.
Protein
General properties
The primary encoded protein of C1orf27 consists of 454 amino acid residues and is 3926 base pairs long. It consists of 14 total exons. The predicted molecular weight of the primary, unmodified protein is approximately 51.1 kdal.
Aliases
As with many other genes, there are some common aliases found with this gene. Those aliases are Lymphocyte-Activation Gene-1 (LAG1) Interacting Protein, Transparent Testa Glabra 1 (TTG1), and Odorant Response Abnormal 4 (ODR4). The most common alias for C1orf27 is ODR4, and this is what most readily appears when searching the gene.
Composition
Computational analysis revealed the most abundant amino acid to be leucine at 10.1% of the total protein. The second most abundant was serine which contributes to 8.6% of the total protein. Glutamic acid was third most abundant and contributes to 7.7% of the protein. This analysis also revealed that the protein appears to be deficient in tryptophan as it only contributes to 1.1% of the protein. Based on the distribution of other amino acid types, there were five high scoring hydrophobic segments. There were also two transmembrane domains locat |
https://en.wikipedia.org/wiki/Quasi-interior%20point | In mathematics, specifically in order theory and functional analysis, an element of an ordered topological vector space is called a quasi-interior point of the positive cone of if and if the order interval is a total subset of ; that is, if the linear span of is a dense subset of
Properties
If is a separable metrizable locally convex ordered topological vector space whose positive cone is a complete and total subset of then the set of quasi-interior points of is dense in
Examples
If then a point in is quasi-interior to the positive cone if and only it is a weak order unit, which happens if and only if the element (which recall is an equivalence class of functions) contains a function that is almost everywhere (with respect to ).
A point in is quasi-interior to the positive cone if and only if it is interior to
See also |
https://en.wikipedia.org/wiki/Teratoma | A teratoma is a tumor made up of several different types of tissue, such as hair, muscle, teeth, or bone. Teratomata typically form in the tailbone (where it is known as a sacrococcygeal teratoma), ovary, or testicle.
Symptoms
Symptoms may be minimal if the tumor is small. A testicular teratoma may present as a painless lump. Complications may include ovarian torsion, testicular torsion, or hydrops fetalis.
They are a type of germ cell tumor (a tumor that begins in the cells that give rise to sperm or eggs). They are divided into two types: mature and immature. Mature teratomas include dermoid cysts and are generally benign. Immature teratomas may be cancerous. Most ovarian teratomas are mature. In adults, testicular teratomas are generally cancerous. Definitive diagnosis is based on a tissue biopsy.
Treatment of coccyx, testicular, and ovarian teratomas is generally by surgery. Testicular and immature ovarian teratomas are also frequently treated with chemotherapy.
Teratomas occur in the coccyx in about one in 30,000 newborns, making them one of the most common tumors in this age group. Females are affected more often than males. Ovarian teratomas represent about a quarter of ovarian tumors and are typically noticed during middle age. Testicular teratomas represent almost half of testicular cancers. They can occur in both children and adults. The term comes from the Greek word for "monster" plus the "-oma" suffix used for tumors.
Types
Mature teratoma
A mature teratoma is a grade 0 teratoma. They are highly variable in form and histology, and may be solid, cystic, or a combination of the two. A mature teratoma often contains several different types of tissue such as skin, muscle, and bone. Skin may surround a cyst and grow abundant hair (see dermoid cyst). Mature teratomas generally are benign, with 0.17-2% of mature cystic teratomas becoming malignant.
Immature teratoma
Immature teratoma is the malignant counterpart of the mature teratoma and contai |
https://en.wikipedia.org/wiki/Epsilon%20photography | Epsilon photography is a form of computational photography wherein multiple images are captured with slightly varying camera parameters (each image varying the parameter by a small amount ε, hence the name) such as aperture, exposure, focus, film speed and viewpoint for the purpose of enhanced post-capture flexibility. The term was coined by Prof. Ramesh Raskar. The technique has been developed as an alternative to light field photography that requires no specialized equipment. Examples of epsilon photography include focal stack photography, High dynamic range (HDR) photography, lucky imaging, multi-image panorama stitching and confocal stereo. The common thread for all the aforementioned imaging techniques is that multiple images are captured in order to produce a composite image of higher quality, such as richer color information, wider-field of view, more accurate depth map, less noise/blur and greater resolution.
Since Epsilon photography at times may require the capture of hundreds of images, recently an alternative called Compressive Epsilon Photography was proposed where one captures only a select few images instead and generates the rest of the images of the stack by making use of prior information about the scene or relationship among the images in the stack. The reconstructed stack of images can be used as before for novel photography applications such as light field recovery, depth estimation, refocusing and synthetic aperture photography.
Sources
See also
Computational photography
Digital photography
Image processing |
https://en.wikipedia.org/wiki/Dot%20%28diacritic%29 | When used as a diacritic mark, the term dot refers to the glyphs "combining dot above" (), and "combining dot below" ()
which may be combined with some letters of the extended Latin alphabets in use in
a variety of languages. Similar marks are used with other scripts.
Overdot
Language scripts or transcription schemes that use the dot above a letter as a diacritical mark:
In some forms of Arabic romanization, stands for ghayin (غ).
The Latin orthography for Chechen includes ċ, ç̇, ġ, q̇, and ẋ.
Traditional Irish typography, where the dot denotes lenition, and is called a or "dot of lenition": ḃ ċ ḋ ḟ ġ ṁ ṗ ṡ ṫ. Alternatively, lenition may be represented by a following letter h, thus: bh ch dh fh gh mh ph sh th. In Old Irish orthography, the dot was used only for ḟ ṡ, while the following h was used for ch ph th; lenition of other letters was not indicated. Later the two systems spread to the entire set of lenitable consonants and competed with each other. Eventually the standard practice was to use the dot when writing in Gaelic script and the following h when writing in antiqua. Thus ċ and ch represent the same phonetic element in Modern Irish.
is pronounced as , as opposed to ę, which is pronounced a lower (formerly nasalised), or e, pronounced .
Livonian uses ȯ as one of its eight vowels.
is used for a voiceless palato-alveolar affricate, ġ for a voiced palato-alveolar affricate, and ż for a voiced alveolar sibilant.
Old English: In modernized orthography, ċ is used for a voiceless palato-alveolar affricate , ġ for a palatal approximant (probably a voiced palatal fricative in the earliest texts), and (more rarely) sċ for a voiceless palato-alveolar fricative and cġ for a voiced palato-alveolar affricate .
is used for a voiced retroflex sibilant .
The Sioux languages such as Lakota, Osage, and Crow sometimes use the dot above to indicate ejective stops.
In the Canadian Aboriginal Syllabics orthography for the Cree, Ojibwe, and Inuktitut langu |
https://en.wikipedia.org/wiki/Laboratory%20developed%20test | Laboratory developed test (LDT) is a term used to refer to a certain class of in vitro diagnostics (IVDs) that, in the U.S., were traditionally regulated under the Clinical Laboratory Improvement Amendments program.
United States
In the United States, the Food and Drug Administration (FDA) has determined that while such tests qualify as medical devices, these products could enter the market without prior approval from the agency. In 2014, the FDA announced that it would start regulating some LDTs. In general, however, it has not done so, as of April 2019.
As LDTs do not require FDA 510(k) clearance required by other diagnostic tests, they have been viewed as a regulatory loophole by opponents.
Direct-to-consumer
Direct-to-consumer tests are regulated as medical devices, although they are not necessarily reviewed by the FDA.
23andMe direct-to-consumer genetic tests were originally offered as LDTs, but the FDA challenged that and forced the company to submit the test for approval as a class II medical device.
Companies
Several companies offer lab-developed tests. |
https://en.wikipedia.org/wiki/Cleavage%20and%20polyadenylation%20specificity%20factor | Cleavage and polyadenylation specificity factor (CPSF) is involved in the cleavage of the 3' signaling region from a newly synthesized pre-messenger RNA (pre-mRNA) molecule in the process of gene transcription. It is the first protein to bind to the signaling region near the cleavage site of the pre-mRNA, to which the poly(A) tail will be added by polynucleotide adenylyltransferase. The upstream signaling region has the canonical nucleotide sequence AAUAAA, which is highly conserved across the vast majority of pre-mRNAs. A second downstream signaling region, located on the portion of the pre-mRNA that is cleaved before polyadenylation, consists of a GU-rich region required for efficient processing.
Structure
CPSF is a protein complex, consisting of four proteins: CPSF-73, CPSF-100, CPSF-30 and CPSF-160.
CPSF-73 is a zinc-dependent hydrolase which cleaves the mRNA precursor just downstream the polyadenylation signal sequence AAUAAA.
CPSF-160 is the largest subunit of CPSF and directly binds to the AAUAAA polyadenylation signal.
CPSF recruits proteins to the 3' region. Identified proteins that are coordinated by CPSF activity include: cleavage stimulatory factor and the two poorly understood cleavage factors. The binding of the polynucleotide adenylyltransferase responsible for actually synthesizing the tail is a necessary prerequisite for cleavage, thus ensuring that cleavage and polyadenylation are tightly coupled processes.
Genes
CPSF1, CPSF2, CPSF3, CPSF4, CPSF6 |
https://en.wikipedia.org/wiki/Paralytic%20peptides | Paralytic peptides are a family of short (23 amino acids) insect peptides that halt metamorphosis of insects from larvae to pupae. These peptides contain one disulphide bridge. The family includes growth-blocking peptide (GBP) of Mythimna separata (Oriental armyworm) and the paralytic peptides from Manduca sexta (tobacco hawkmoth), Heliothis virescens (noctuid moth), and Spodoptera exigua (beet armyworm) as well as plasmatocyte-spreading peptide (PSP1). |
https://en.wikipedia.org/wiki/Thomson%20DTI%206300-16 | The Thomson DTI 6300-16 (or 6300-25 to denote the 250GB version) was the first digital television recorder used to access Top Up TV’s push video on-demand service. The device first launched on the market in 2006. Previously the Top Up TV Freeview+ box was known as the Top Up TV+ BOX and the Top Up TV Anytime DTR. connections to the TV and external equipment are made at the rear of the box whilst at the front is the remote sensor, coloured LEDs, viewing card slot and front panel controls.
Packaging
Included in the packaging is a Top Up TV remote control and SCART lead, a signal improvement kit, an RF lead and a power cable. Printed materials include the Top Up TV welcome pack, a remote control codes guide and an instruction manual. The rear of the box has two SCART sockets, two tuners, an S-Video output, analogue phono output and digital audio output. It features a powered but functionless USB port on the front or rear of the DTR.
Firmware
The system software is developed by Top Up TV by Kieron Edwards and the other members of the Technical team at Top Up TV. The overnight downloads and existing pay TV "live" channels like ESPN and Gold use the Nagravision Merlin encryption system (in chameleon mode) after a card swap in 2008. For interactive services the box has a fast MHEG5 v1.06 engine. It is also capable of receiving MHEG Plus applications such as Betfair and Teletext Extra as of version 4.07 also both services are no longer available support in the software code remains. Whilst the box contains a 160GB HDD or a 250GB HDD in the DTI 6300-25 version, the box can be upgraded support up to 500GB HDD's.
Top Up TV Freeview+ Box has received thirteen software revisions since its launch, these are for the Thomson DTI6300-16 (160GB) and DTI6300-25 (250GB) models:
There are newer models of the Top Up TV Freeview+ box manufactured by Thomson and Vestel (Wharfedale, Digihome, Bush, Sharp, Metronic etc.) which have different firmware versions to the above.
Problems
The |
https://en.wikipedia.org/wiki/ADAM7 | Disintegrin and metalloproteinase domain-containing protein 7 is a protein that in humans is encoded by the ADAM7 gene. ADAM7 is an 85-kDa enzyme that is a member of the transmembrane ADAM (A Disintegrin and Metalloprotease) protein family. Members of this family are membrane-anchored proteins structurally related to snake venom disintegrins, and have been implicated in a variety of biological processes involving cell-cell and cell-matrix interactions, including fertilization, muscle development, and neurogenesis. ADAM7 is important for the maturation of sperm cells in mammals. ADAM7 is also denoted as: ADAM_7, ADAM-7, EAPI, GP-83, and GP83.
Function
The functions of ADAM7 directly relate to sperm maturation and fertilization. Sperm are immobile until traversing the epididymis, in which the sperm interact with many proteins secreted by epithelial cells of the epididymis. Lacking protease activity, ADAM7 may play roles in protein-protein interactions and cell adhesion processes including sperm-egg fusion. ADAM7 is secreted by epididymis cells and transferred to the maturing sperm's surface. As determined through mouse gene knock-out studies, the amount of ADAM7 secreted is directly linked to ADAM2 and ADAM3 protein levels. Complex formation between ADAM7, Calnexin, Hspa5, and Itm2b have been shown to act as a molecular chaperone after ADAM7 is incorporated into the membrane of sperm cells. Furthermore, complex formation with Itm2b is increased during sperm capacitation leading to a conformation change in ADAM7. As such, the ADAM7 protein plays an important function involved in sperm capacitation, although this function is not entirely understood.
Mechanism of secretion and membrane transfer
ADAM7 is synthesized in epididymis cells and transferred to the membrane of immature sperm cells as they traverse the epididymis during sperm maturation. Epithelial cells of the epididymis incorporate ADAM7 into their membrane normally like other integral membrane protein. Por |
https://en.wikipedia.org/wiki/Maize%20milling | Maize miller is the processing of maize (corn) for safe and palatable consumption as food. Processing can be by machine-milling in either large- or small-scale mills, or by hand-milling in domestic or community settings.
The maize is first cleaned and then "conditioned", or "tempered", by soaking the kernels in water. This facilitates the separation of the seed coat and pericarp from the endosperm. Further processing consists of separating components of the grain, and grinding it into various grades.
Cleaning and conditioning
Cleaning and conditioning of the maize is an important step in the process and refers to the removal of foreign material and all that is not maize kernels from the to-be milled grain that lowers the quality of the product such as husk, straw, dust, sand, and everything too big or too small and lighter than a maize kernel.
It also refers to the removal of poisonous seeds, and material harmful to the milling equipment such as metal and stones. Conditioning refers to the addition of moisture to the maize to allow the bran to be peeled off in flakes during milling with plate or roller mills, allowing easy separation in a sifter and, most importantly, to add mass to the meal.
Milling and sifting
Following this process, milling can commence and may take several forms:
The roller mill may be a single roller mill, double roller mill or pneumatic roller mill. In a complete maize milling plant, there are several roller mills that work together, they have different functions, the first mill mainly peeling the maize skin, the second and third will grind the maize into granular sizes, and meanwhile to get some super fine flour, and the granular sized product will go to the next mill to continue grinding.
While grinding time, use double bin sifter or square plan sifter to sift the meal from the miller, classification and sifting more super flour. In general, the sifting used to separate the flour and bran, also separate large size and small size to ens |
https://en.wikipedia.org/wiki/LDAP%20Admin | LDAP Admin is a free, open-source LDAP directory management tool licensed under the GNU General Public License. Small and compact, LDAP Admin is also highly configurable through the use of the template extensions. In addition to common browsing and editing functions, LDAP Admin provides a directory management functionality by supporting a number of application-specific LDAP objects such as Posix and Samba groups and accounts, Postfix objects and a number of Active Directory objects. It also provides an XML-based template engine which extends the application in a seamless way allowing it to support virtually unlimited number of user defined objects.
Features
Some of the key features include:
Browsing and editing of LDAP directories
Recursive operations on directory trees (copy, move and delete)
Modify operations on datasets
Password management
Management of Posix Groups and Accounts
Management of Samba Groups and Accounts
Postfix MTA Support
Template support
Offline browsing and editing of LDIF files
As of version 1.3 the templates support for JavaScript and VBScript was introduced providing for a dynamic templates.
Limitations
LDAP Admin runs on the Windows operating systems only. By using the Wine software, it is apparently possible to run the application on a Linux and Mac OS X operating systems. There is also a Linux port (still Beta) of LdapAdmin.
See also
List of LDAP software |
https://en.wikipedia.org/wiki/2018%20US%20egg%20recall | The 2018 US egg recall was a product recall for fresh chicken eggs in the United States beginning on April 13, 2018. The United States Department of Agriculture recalled more than 200 million eggs after a salmonella outbreak connected to Iowa egg farms, including Rose Acre Farms.
It was the largest egg recall since 2010.
See also
2018 American salmonella outbreak |
https://en.wikipedia.org/wiki/Fluorosilicate%20glass | Fluorosilicate glass (FSG) is a glass material composed primarily of fluorine, silicon and oxygen. It has a number of uses in industry and manufacturing, especially in semiconductor fabrication where it forms an insulating dielectric. The related fluorosilicate glass-ceramics have good mechanical and chemical properties.
Semiconductor fabrication
FSG has a small relative dielectric constant (low-κ dielectric) and is used in between metal copper interconnect layers during silicon integrated circuit fabrication process. It is widely used by semiconductor fabrication plants on geometries under 0.25 microns (μ). FSG is effectively a fluorine-containing silicon dioxide (κ=3.5, while κ of undoped silicon dioxide is 3.9). FSG is used by IBM. Intel started using Cu metal layers and FSG on its 1.2 GHz Pentium processor at 130 nm complementary metal–oxide–semiconductor (CMOS). Taiwan Semiconductor Manufacturing Company (TSMC) combined FSG and copper in the Altera APEX.
Fluorosilicate glass-ceramics
Fluorosilicate glass-ceramics are crystalline or semi-crystalline solids formed by careful cooling of molten fluorosilicate glass. They have good mechanical properties.
Potassium fluororichterite based materials are composed from tiny interlocked rod-shaped amphibole crystals; they have good resistance to chemicals and can be used in microwave ovens. Richterite glass-ceramics are used for high-performance tableware.
Fluorosilicate glass-ceramics with sheet structure, derived from mica, are strong and machinable. They find a number of uses and can be used in high vacuum and as dielectrics and precision ceramic components. A number of mica and mica-fluoroapatite glass-ceramics were studied as biomaterials.
See also
Fluoride glass
Glass
Silicate |
https://en.wikipedia.org/wiki/Al%20Baydha%20Project | The Al Baydha Project, in rural, western Saudi Arabia, is a land restoration, poverty-alleviation, and heritage preservation program, based on principles of permacultural and hydrological design. Located roughly south of Mecca, in Makkah Province, Al Baydha is an area characterized by the rocky, arid, foothills of the Hijaz Mountains. Arab tribes are the major residents of this region.
Founded in 2009 by Her Royal Highness Princess Haifa Al Faisal, Harvard ethicist Mona Hamdy, and Stanford permaculturist Neal Spackman, Al Baydha has begun to see practical and ecological results.
Project goals
Most notably, Al Baydha's emphasis is on creating an economy for the inhabitants of Al Baydha that is socially, culturally, environmentally, and economically sustainable. The project's main objective is to create financial and social independence for the inhabitants by training, educating and employing them in the infrastructure and capacity building activities undertaken by the Al Baydha Project.
Al Baydha's environmental goal is the reversal of desertification. This is accomplished largely via rainwater harvesting, through utilization of rock terraces and gabions (or small check dams), as well as catchment of runoff into swale lines. These support afforestation of drought-resistant trees, such as date palms, in the natural landscape. Another focus of the program is on slowing down flash floods in the highlands, and, over time, converting them into seasonal streams or wadis. In the long-term future, Al Baydha hopes to transform the region into a savanna ecosystem, in part, by means of assisted natural regeneration, conservation grazing, and the effects of evapotranspiration and atmospheric moisture recycling.
Site development after the end of artificial irrigation
In 2016, the Al Baydha Project received a commendation from Prince Khaled Al Faisal for innovative work undertaken by the inhabitants of Al Baydha as a model of national excellence in humanitarianism, sus |
https://en.wikipedia.org/wiki/Posterior%20external%20jugular%20vein | The posterior external jugular vein begins in the occipital region and returns the blood from the skin and superficial muscles in the upper and back part of the neck, lying between the Splenius and Trapezius.
It runs down the back part of the neck, and opens into the external jugular vein just below the middle of its course.
See also
jugular vein |
https://en.wikipedia.org/wiki/Photobleaching | In optics, photobleaching (sometimes termed fading) is the photochemical alteration of a dye or a fluorophore molecule such that it is permanently unable to fluoresce. This is caused by cleaving of covalent bonds or non-specific reactions between the fluorophore and surrounding molecules. Such irreversible modifications in covalent bonds are caused by transition from a singlet state to the triplet state of the fluorophores. The number of excitation cycles to achieve full bleaching varies. In microscopy, photobleaching may complicate the observation of fluorescent molecules, since they will eventually be destroyed by the light exposure necessary to stimulate them into fluorescing. This is especially problematic in time-lapse microscopy.
However, photobleaching may also be used prior to applying the (primarily antibody-linked) fluorescent molecules, in an attempt to quench autofluorescence. This can help improve the signal-to-noise ratio.
Photobleaching may also be exploited to study the motion and/or diffusion of molecules, for example via the FRAP, in which movement of cellular components can be confirmed by observing a recovery of fluorescence at the site of photobleaching, or FLIP techniques, in which multiple rounds of photobleaching is done so that the spread of fluorescence loss can be observed in cell.
Loss of activity caused by photobleaching can be controlled by reducing the intensity or time-span of light exposure, by increasing the concentration of fluorophores, by reducing the frequency and thus the photon energy of the input light, or by employing more robust fluorophores that are less prone to bleaching (e.g. Cyanine Dyes, Alexa Fluors or DyLight Fluors, AttoDyes, Janelia Dyes and others). To a reasonable approximation, a given molecule will be destroyed after a constant exposure (intensity of emission X emission time X number of cycles) because, in a constant environment, each absorption-emission cycle has an equal probability of causing photobleach |
https://en.wikipedia.org/wiki/Taivo%20Arak | Taivo Arak (2 November 1946, Tallinn – 17 October 2007, Stockholm) was an Estonian mathematician, specializing in probability theory.
Biography
In 1969 he graduated from Leningrad State University. There he received in 1972 his Russian candidate degree (Ph.D.) under I. A. Ibragimov.
In 1983 Arak defended his dissertation for his Russian doctorate (higher doctoral degree similar to habilitation).
From 1972 to 1981 he worked at the Tallinn University of Technology. From 1981 he worked at the Institute of Cybernetics of the Academy of Sciences of the Estonian SSR. In 1986 he was an Invited Speaker at the International Congress of Mathematicians in Berkeley, California.
Most of his research dealt with the theory of probability.
Awards
(1983) - for the series of papers "Равномерные предельные теоремы для сумм независимых случайных величин" (Uniform limit theorems for sums of independent random variables).
Selected publications
with Andrei Yuryevich Zaitsev:
with Donatas Surgailis:
with D. Surgailis:
with Peter Clifford and D. Surgailis: |
https://en.wikipedia.org/wiki/Stacked%20Volumetric%20Optical%20Disc | The Stacked Volumetric Optical Disc (or SVOD) is an optical disc format developed by Hitachi Maxell, which uses an array of wafer-thin optical discs to allow data storage.
Each "layer" (a thin polycarbonate disc) holds around 9.4 GB of information, and the wafers are stacked in layers of 20, 25, 100, or more, giving a substantially larger overall data capacity; for example, 100× cartridges could hold 940 GB using the system as announced.
Hitachi Maxell announced the creation of the SVOD standard in 2006, intending to launch it the next year. Aimed primarily at commercial users, the target price was ¥40,000 for a cartridge of 100 thin discs, with the potential to expand into the home user market. When they announced the system, Hitachi Maxell publicly recognized the possibility that the system could be eventually modified for use with a blue-violet laser, similar to Blu-ray discs, which could have expanded the capacity of the system to 3-5 TB. It is possible that they in fact developed this "second generation" SVOD for use with standard Blu-ray lasers, with each thin disc having a storage capacity of 25 GB, or a 100-disc cartridge having a storage of 5 TB. Hitachi Maxell developed systems both for burning to the media using standard DVD optical heads, and pre-recording to the media using a special heat imprint technique they called "nanoimprinting." Though nanoimprinting initially required 6 minutes per disc for pressing, they had improved it to 8 seconds, and intended to achieve a comparable throughput to standard DVD pressing. The primary application of the SVOD system seemed to be business data archival, replacing digital tape archives.
In 2007, Japanese broadcaster NHK announced a similar system, based on Blu-ray discs, of stacked optical storage media specifically designed to rotate at high speeds, up to 15,000 RPM.
SVOD was anticipated to be a likely be a candidate, along with Holographic Versatile Discs (HVDs), to be a next-generation optical disc standa |
https://en.wikipedia.org/wiki/Burton%20%28nut%29 | Burton is a cultivar of hican (nut or tree), a cross between hickory and pecan, species of the genus Carya. Burton nuts have a unique, yet very pleasing hickory flavor indicative of hickory trees. Hickory-pecan hybrids are often unproductive.
External links
Information about the Burton |
https://en.wikipedia.org/wiki/Lowell%20Center%20for%20Space%20Science%20%26%20Technology | Lowell Center for Space Science & Technology (abbreviated as LoCSST) is a public research centre in Lowell, Massachusetts, affiliated by University of Massachusetts Lowell. The research centre has partners and grants from research giants like NASA, National Science Federation, BoldlyGo institute for its excellence in Space science research.
Faculty
Supriya Chakrabarti, Ph.D., Professor of UMass Lowell and Director of the institute, faculty on Physics and applied physics.
Dimitris Christodoulou, Assistant Teaching Professor, faculty on Mathematical Science
Ofer Cohen, excels in the field of Computational plasma physics, Computational methods, Magnetohydrodynamics
Timothy Cook, Associate Professor in Physics; works on Visible & ultraviolet instrumentation, Sounding rockets, Small satellites, Tomography & other novel data analysis techniques
Christopher Hansen, Chair, UMass Lowell SHAP3D Site Director, Associate Professor of Mechanical Engineering; works on Materials science, self-healing materials, additive manufacturing (i.e. 3D printing) techniques
Silas Laycock, Associate Professor in Physics; works on Neutron stars and black holes in X-ray binaries, pulsars, multi wavelength astronomy, time domain astrophysics.
Marianna Maiaru, Assistant Professor of Mechanical Engineering
Ramaswamy Nagarajan, Co-Director of HEROES; works on Biocatalysis, greener advanced materials (electronic, photo-responsive polymers, molecularly integrated hybrid nanomaterials, materials for energy conversion/storage), elastomers, thermal & morphological characterization of materials, roll to roll manufacture of flexible electronic products
Jay Weitzen, Professor of Electrical & Computer Engineering and Wireless Communication
Research
The institute has or had worked on numerous topics or projects.
Experimental astronomy and space physics.
Observational Astronomy
Research on X-ray Binary Pulsars, based
Black Hole High mass X-ray Binary
Computational Astrophysics and Space Physics
|
https://en.wikipedia.org/wiki/Alceon%20Group | Alceon Group is an Australian manufacturer and owns Decor Corporation Founded in Melbourne in 1958 and acquired by Marlin Brands in 2017 and Willow Ware Australia Founded in Melbourne in 1887.
Willow had its origin in Wilson Brothers Pty, founded by Ralph and Richard, sons of Ralph Wilson, sen., (c. 1826 – 14 June 1901) and Elizabeth Wilson ( – 21 April 1912). With start-up capital from their parents, they began making tin cans in 1887, then developed a factory in North Melbourne. Ralph Wilson (1865 – 10 December 1930) married Agnes Kirkwood Twaddell (1870–1946) in 1896, and had a home "Benarty", in High street, Malvern. He seems to have been a respected employer, but nothing has been found of his brother Richard's involvement, apart from his retirement in 1906. Apart from robberies and vandalism, the company was never in the news; they established the "Willow" brand in the 1920s, making billies, Coolgardie safes, etc.; became W., M., Y., and A. H. Wilson Ltd. They later moved to Tullamarine, and now only make plastic products. Since 2018 owned by Decor Corporation, a subsidiary of Marlin Management Services.
Brands
Marlin Brands
Owns 50% of Marlin Brands with Oaktree Capital Management.
EziBuy
Zanui - Homewares Stores
Decor - Food Storage Containers, Brushware & Mops
Reva - Pegs
Starmaid - Document Storage
Willow - BBQ Needs, Document Storage
Mosaic Brands
In July 2018, City Chic Collective sold five of its brands; Autograph, Crossroads, Katies, Millers and Rivers, to Noni B (later renamed to Mosaic Brands) leaving only one brand, City Chic, in its portfolio. The remaining operations were rebranded City Chic Collective in November 2018.
Owns 36% of Mosaic Brands.
Autograph
BeMe
Crossroads
Events
Katies
Liz Jordan
Maggie T
Millers
Noni B
Rivers
Rockmans
Table Eight
W. Lane
See also
List of companies of Australia
Manufacturing in Australia |
https://en.wikipedia.org/wiki/Captive%20breeding | Captive breeding, also known as captive propagation, is the process of keeping plants or animals in controlled environments, such as wildlife reserves, zoos, botanic gardens, and other conservation facilities. It is sometimes employed to help species that are being threatened by the effects of human activities such as climate change, habitat loss, fragmentation, overhunting or fishing, pollution, predation, disease, and parasitism.
For many species, relatively little is known about the conditions needed for successful breeding. Information about a species' reproductive biology may be critical to the success of a captive breeding program. In some cases a captive breeding program can save a species from extinction, but for success, breeders must consider many factors—including genetic, ecological, behavioral, and ethical issues. Most successful attempts involve the cooperation and coordination of many institutions. The efforts put into captive breeding can aid in education about conservation because species in captivity are closer to the public than their wild conspecifics. These accomplishments from the continued breeding of species for generations in captivity is also aided by extensive research efforts ex-situ and in-situ.
History
Captive breeding techniques began with the first human domestication of animals such as goats, and plants like wheat, at least 10,000 years ago. These practices were expanded with the rise of the first zoos, which started as royal menageries such as the one at Hierakonpolis, capital in the Predynastic Period of Egypt.
The first actual captive breeding programs were only started in the 1960s. These programs, such as the Arabian Oryx breeding program from the Phoenix Zoo in 1962, were aimed at the reintroduction of these species into the wild. These programs expanded under The Endangered Species Act of 1973 of the Nixon Administration which focused on protecting endangered species and their habitats to preserve biodiversity. Since th |
https://en.wikipedia.org/wiki/TickIT | TickIT is a certification program for companies in the software development and computer industries, supported primarily by the United Kingdom and Swedish industries through UKAS and SWEDAC respectively. Its general objective is to improve software quality.
History
In the 1980s, the UK government's CCTA organisation promoted the use of IT standards in the UK public sector, with work on BS5750 (Quality Management) leading to the publishing of the Quality Management Library and the inception of the TickIT assessment scheme with DTI, MoD and participation of software development companies.
The TickIT Guide
TickIT also includes a guide. This provides guidance in understanding and applying ISO 9001 in the IT industry. It gives a background to the TickIT scheme, including its origins and objectives. Furthermore, it provides detailed information on how to implement a Quality System and the expected structure and content relevant to software activities. The TickIT guide also assists in defining appropriate measures and/or metrics. Various TickIT Guides have been issued, including "Guide to Software Quality Management and Certification using EN29001". |
https://en.wikipedia.org/wiki/MIR3648 | MicroRNA 3648 is a microRNA that in humans is produced by MIR3648 gene. This gene was recently shown to be specific to humans by Nathan H. Lents and colleagues.
Function
microRNAs (miRNAs) are short (20-24 nt) non-coding RNAs that are involved in post-transcriptional regulation of gene expression in multicellular organisms by affecting both the stability and translation of mRNAs. miRNAs are transcribed by RNA polymerase II as part of capped and polyadenylated primary transcripts (pri-miRNAs) that can be either protein-coding or non-coding. The primary transcript is cleaved by the Drosha ribonuclease III enzyme to produce an approximately 70-nt stem-loop precursor miRNA (pre-miRNA), which is further cleaved by the cytoplasmic Dicer ribonuclease to generate the mature miRNA and antisense miRNA star (miRNA*) products. The mature miRNA is incorporated into a RNA-induced silencing complex (RISC), which recognizes target mRNAs through imperfect base pairing with the miRNA and most commonly results in translational inhibition or destabilization of the target mRNA. The RefSeq represents the predicted microRNA stem-loop. [provided by RefSeq, Sep 2009]. |
https://en.wikipedia.org/wiki/Stomatal%20conductance | Stomatal conductance, usually measured in mmol m−2 s−1 by a porometer, estimates the rate of gas exchange (i.e., carbon dioxide uptake) and transpiration (i.e., water loss as water vapor) through the leaf stomata as determined by the degree of stomatal aperture (and therefore the physical resistances to the movement of gases between the air and the interior of the leaf).
The stomatal conductance, or its inverse, stomatal resistance, is under the direct biological control of the leaf through its guard cells, which surround the stomatal pore. The turgor pressure and osmotic potential of guard cells are directly related to the stomatal conductance.
Stomatal conductance is a function of stomatal density, stomatal aperture, and stomatal size. Stomatal conductance is integral to leaf level calculations of transpiration. Multiple studies have shown a direct correlation between the use of herbicides and changes in physiological and biochemical growth processes in plants, particularly non-target plants, resulting in a reduction in stomatal conductance and turgor pressure in leaves.
Relation to stomatal opening
For mechanism, see: Stomatal opening and closingStomatal conductance is a function of the density, size and degree of opening of the stomata; with more open stomata allowing greater conductance, and consequently indicating that photosynthesis and transpiration rates are potentially higher. Therefore, stomatal opening and closing has a direct relationship to stomatal conductance.
Light-dependent stomatal opening
Light-dependent stomatal opening occurs in many species and under many different conditions. Light is a major stimulus involved in stomatal conductance, and has two key elements that are involved in the process: 1) the stomatal response to blue light, and 2) photosynthesis in the chloroplast of the guard cell. In C3 and C4 plants, the stomata open when there is an increase in light, and they close when there is a decrease in light. In CAM plants, however, |
https://en.wikipedia.org/wiki/MultiDimensional%20eXpressions | Multidimensional Expressions (MDX) is a query language for online analytical processing (OLAP) using a database management system. Much like SQL, it is a query language for OLAP cubes. It is also a calculation language, with syntax similar to spreadsheet formulae.
Background
The MultiDimensional eXpressions (MDX) language provides a specialized syntax for querying and manipulating the multidimensional data stored in OLAP cubes. While it is possible to translate some of these into traditional SQL, it would frequently require the synthesis of clumsy SQL expressions even for very simple MDX expressions. MDX has been embraced by a wide majority of OLAP vendors and has become the standard for OLAP systems.
History
MDX was first introduced as part of the OLE DB for OLAP specification in 1997 from Microsoft. It was invented by the group of SQL Server engineers including Mosha Pasumansky. The specification was quickly followed by commercial release of Microsoft OLAP Services 7.0 in 1998 and later by Microsoft Analysis Services. The latest version of the OLE DB for OLAP specification was issued by Microsoft in 1999.
While it was not an open standard, but rather a Microsoft-owned specification, it was adopted by a wide range of OLAP vendors.
The XML for Analysis specification referred back to the OLE DB for OLAP specification for details on the MDX Query Language. In Analysis Services 2005, Microsoft added some MDX Query Language extensions like subselects. Products like Microsoft Excel 2007 started to use these new MDX Query Language extensions. Some refer to this newer variant of MDX as MDX 2005.
mdXML
In 2001 the XMLA Council released the XML for Analysis (XMLA) standard, which included mdXML as a query language. In the XMLA 1.1 specification, mdXML is essentially MDX wrapped in the XML <Statement> tag.
MDX data types
There are six primary data types in MDX
Scalar. Scalar is either a number or a string. It can be specified as a literal, e.g. number 5 or string " |
https://en.wikipedia.org/wiki/Cousin%27s%20theorem | In real analysis, a branch of mathematics, Cousin's theorem states that:
If for every point of a closed region (in modern terms, "closed and bounded") there is a circle of finite radius (in modern term, a "neighborhood"), then the region can be divided into a finite number of subregions such that each subregion is interior to a circle of a given set having its center in the subregion.
This result was originally proved by Pierre Cousin, a student of Henri Poincaré, in 1895, and it extends the original Heine–Borel theorem on compactness for arbitrary covers of compact subsets of . However, Pierre Cousin did not receive any credit. Cousin's theorem was generally attributed to Henri Lebesgue as the Borel–Lebesgue theorem. Lebesgue was aware of this result in 1898, and proved it in his 1903 dissertation.
In modern terms, it is stated as:
Let be a full cover of [a, b], that is, a collection of closed subintervals of [a, b] with the property that for every x ∈ [a, b], there exists a δ>0 so that contains all subintervals of [a, b] which contains x and length smaller than δ. Then there exists a partition of non-overlapping intervals for [a, b], where and a=x0 < x1 < ⋯ < xn=b for all 1≤i≤n.
Cousin's lemma is studied in Reverse Mathematics where it is one of the first third-order theorems that is hard to prove in terms of the comprehension axioms needed.
In Henstock–Kurzweil integration
Cousin's theorem is instrumental in the study of Henstock–Kurzweil integration, and in this context, it is known as Cousin's lemma or the fineness theorem.
A gauge on is a strictly positive real-valued function , while a tagged partition of is a finite sequence
Given a gauge and a tagged partition of , we say is -fine if for all , we have , where denotes the open ball of radius centred at . Cousin's lemma is now stated as:
If , then every gauge has a -fine partition.
Proof of the theorem
Cousin's theorem has an intuitionistic proof using the open induction principle, whic |
https://en.wikipedia.org/wiki/Minion%20%28chat%20widget%29 | Minion (Hangul: 미니온) is a chatting widget developed by DevArzz, the South Korean server. It is created with Python 2.7.x version and twistedmatrix 11.0 library.
Minion can be built on to the Web browsers. In addition, there are public and non-public channels; non-public channels are usually installed on the private web pages, but it can be upgraded to public later on as they pay.
Functions
Minion has functions that most of chatting programs have. It is similar to the chatting programs of how to use it. Minion mainly has six functions:
Call: calls other users on the chatting. It makes beeping sound while calling the users.
Whisper: chats to another user. It appears to be purple/pink while whisper to another user. No other users can see the whisper log.
Private Channel: creates the private channel. The creator of private channel can invite other users to the channel. However, the users cannot get into the channel unless they got invited.
Status: the user can change their status. There are three status: away, do not disturb, and online. It is similar to the status system in Windows Messenger or Skype.
IP Ban: bans the IP of user from the channel. It requires the API key to activate this certain type of function.
Cutoff the Chatting: blocks the user from chatting for 30 seconds. The user still can watch the chatting and is able to whisper to other users. It requires the API key to do it. It is also possible to use this function if the user has created his/her own private channel.
The chatting will also cutoff if the user either types same text more than three lines, or types 10 lines before the 15 seconds. It gives four warnings, and after the warning, the user's IP will automatically banned from the server.
Servers
Minion has different servers to hold up all the users accessing from different locations. There are total 11 servers, 66,500 capacity (of users), and 724 channels. All Minion servers are running through DevArzz server, so web traffic does not shut down |
https://en.wikipedia.org/wiki/MTV-1 | The MTV-1 Micro TV was the second model of a near pocket-sized television. The first was the Panasonic IC model TR-001 introduced in 1970. The MTV-1 was developed by Clive Sinclair (Sinclair Radionics Ltd). It was shown to the public at trade shows in London and Chicago in January, 1977, and released for sale in 1978. Development spanned 10 years and included a cash infusion of (about ) from the UK government in 1976.
The MTV-1 used a German AEG Telefunken black-and-white, electrostatic deflection cathode ray tube (CRT) and included a rechargeable 4-AA-cell NiCad battery pack. It measured and weighed . It was able to receive either PAL or NTSC transmissions on VHF or UHF. A Welsh company, Wolsey Electronics, manufactured it for Sinclair. Custom ICs made by Texas Instruments and Sinclair contributed to its small size and low power consumption.
The original (about ) price tag proved to be too high to sell many of them, and Sinclair lost over in 1978, eventually selling its remaining inventory to liquidators at greatly reduced prices.
The MTV-1B, released later in 1978 at the much lower price of , was able to receive only British and South African UHF PAL signals. The original MTV-1 was the world's first multistandard TV, being capable of switching between PAL and NTSC. |
https://en.wikipedia.org/wiki/Cage%20%28graph%20theory%29 | In the mathematical field of graph theory, a cage is a regular graph that has as few vertices as possible for its girth.
Formally, an is defined to be a graph in which each vertex has exactly neighbors, and in which the shortest cycle has length exactly .
An is an with the smallest possible number of vertices, among all . A is often called a .
It is known that an exists for any combination of and . It follows that all exist.
If a Moore graph exists with degree and girth , it must be a cage. Moreover, the bounds on the sizes of Moore graphs generalize to cages: any cage with odd girth must have at least
vertices, and any cage with even girth must have at least
vertices. Any with exactly this many vertices is by definition a Moore graph and therefore automatically a cage.
There may exist multiple cages for a given combination of and . For instance there are three nonisomorphic , each with 70 vertices: the Balaban 10-cage, the Harries graph and the Harries–Wong graph. But there is only one : the Balaban 11-cage (with 112 vertices).
Known cages
A 1-regular graph has no cycle, and a connected 2-regular graph has girth equal to its number of vertices, so cages are only of interest for r ≥ 3. The (r,3)-cage is a complete graph Kr+1 on r+1 vertices, and the (r,4)-cage is a complete bipartite graph Kr,r on 2r vertices.
Notable cages include:
(3,5)-cage: the Petersen graph, 10 vertices
(3,6)-cage: the Heawood graph, 14 vertices
(3,7)-cage: the McGee graph, 24 vertices
(3,8)-cage: the Tutte–Coxeter graph, 30 vertices
(3,10)-cage: the Balaban 10-cage, 70 vertices
(3,11)-cage: the Balaban 11-cage, 112 vertices
(4,5)-cage: the Robertson graph, 19 vertices
(7,5)-cage: The Hoffman–Singleton graph, 50 vertices.
When r − 1 is a prime power, the (r,6) cages are the incidence graphs of projective planes.
When r − 1 is a prime power, the (r,8) and (r,12) cages are generalized polygons.
The numbers of vertices in the known (r,g) cages, for values of r > |
https://en.wikipedia.org/wiki/Wright%20%28ADL%29 | In software architecture, Wright is an architecture description language developed at Carnegie Mellon University. Wright formalizes a software architecture in terms of concepts such as components, connectors, roles, and ports. The dynamic behavior of different ports of an individual component is described using the Communicating Sequential Processes (CSP) process algebra. The roles that different components interacting through a connector can take are also described using CSP. Due to the formal nature of the behavior descriptions, automatic checks of port/role compatibility, and overall system consistency can be performed.
Wright was principally developed by Robert Allen and David Garlan. |
https://en.wikipedia.org/wiki/Call%20signs%20in%20the%20Middle%20East | Call signs in the Middle East are unique identifiers for telecommunications and broadcasting in the Middle East. Call signs are regulated internationally by the International Telecommunication Union (ITU) and nationally by local government and international agencies in Israel, Jordan, Lebanon, Syria, The Palestinian Authority, occupied territories and other nations or DXCC entities.
About 9,100 licensed operators in the Middle East have call signs. Since callsign allocation from the ITU is administered by national political authorities and international mandates, it is a story of transition, compromise, and internationally unrecognized operation to follow the history of such allocations in the 20th century in this area.
Call sign blocks for telecommunication
The ITU has assigned countries in the Middle East the following call sign blocks for all radio communication, broadcasting or transmission:
The DXCC deleted entities list notes that for the British Protectorate prefix of ZC6 and the Palestine prefix of 4X1, only contacts made June 30, 1968, and before, count for Palestine as an entity. Contacts made July 1, 1968, and after, count as Israel (4X).
4W used to be a prefix for Yemen, but only contacts made May 21, 1990, and before, count for this entity. With the merger of North and South Yemen, only "7O" is used. However, amateur operation from this entity is extremely rare.
While not directly related to call signs, the ITU further has divided all countries assigned amateur radio prefixes into three regions; the Middle East is located in ITU Region 1. It is assigned ITU Zone 39 with Egypt being mainly in ITU Zone 38 and Iran in ITU Zone 40, and CQ Zones 20 & 21 with Egypt mainly in CQ Zone 34.
History of call sign allocation
The callsign allocation history of this region is complex and follows the political interests of various countries who exercised political control in the region. It also changed in relation to various independence movements, particula |
https://en.wikipedia.org/wiki/Thorax | The thorax (: thoraces or thoraxes) or chest is a part of the anatomy of humans, mammals, and other tetrapod animals located between the neck and the abdomen. In insects, crustaceans, and the extinct trilobites, the thorax is one of the three main divisions of the creature's body, each of which is in turn composed of multiple segments.
The human thorax includes the thoracic cavity and the thoracic wall. It contains organs including the heart, lungs, and thymus gland, as well as muscles and various other internal structures. Many diseases may affect the chest, and one of the most common symptoms is chest pain.
Etymology
The word thorax comes from the Greek θώραξ thorax "breastplate, cuirass, corslet" via .
Human thorax
Structure
In humans and other hominids, the thorax is the chest region of the body between the neck and the abdomen, along with its internal organs and other contents. It is mostly protected and supported by the rib cage, spine, and shoulder girdle.
Contents
The contents of the thorax include the heart and lungs (and the thymus gland); the major and minor pectoral muscles, trapezius muscles, and neck muscle; and internal structures such as the diaphragm, the esophagus, the trachea, and a part of the sternum known as the xiphoid process. Arteries and veins are also contained – (aorta, superior vena cava, inferior vena cava and the pulmonary artery); bones (the shoulder socket containing the upper part of the humerus, the scapula, sternum, thoracic portion of the spine, collarbone, and the rib cage and floating ribs).
External structures are the skin and nipples.
The chest
In the human body, the region of the thorax between the neck and diaphragm in the front of the body is called the chest. The corresponding area in an animal can also be referred to as the chest.
The shape of the chest does not correspond to that part of the thoracic skeleton that encloses the heart and lungs. All the breadth of the shoulders is due to the shoulder girdle, and |
https://en.wikipedia.org/wiki/Boltzmann%20Medal | The Boltzmann Medal (or Boltzmann Award) is a prize awarded to physicists that obtain new results concerning statistical mechanics; it is named after the celebrated physicist Ludwig Boltzmann. The Boltzmann Medal is awarded once every three years by the Commission on Statistical Physics of the International Union of Pure and Applied Physics, during the STATPHYS conference.
The award consists of a gilded medal; its front carries the inscription Ludwig Boltzmann, 1844–1906.
Recipients
All the winners are influential physicists or mathematicians whose contribution to statistical physics have been relevant in the past decades. Institution with multiple recipients are Sapienza University of Rome (3) and École Normale Supérieure, Cornell University, University of Cambridge and Princeton University (2).
The Medal cannot be awarded to scientist who already has been laureate of a Nobel Prize. Two recipients of the Boltzmann Medal have gone to win the Nobel Prize in Physics: Kenneth G. Wilson (1982) and Giorgio Parisi (2021).
See also
List of physics awards |
https://en.wikipedia.org/wiki/Accelerator%20neutrino | An accelerator neutrino is a human-generated neutrino or antineutrino obtained using particle accelerators, in which beam of protons is accelerated and collided with a fixed target, producing mesons (mainly pions) which then decay into neutrinos. Depending on the energy of the accelerated protons and whether mesons decay in flight or at rest it is possible to generate neutrinos of a different flavour, energy and angular distribution. Accelerator neutrinos are used to study neutrino interactions and neutrino oscillations taking advantage of high intensity of neutrino beams, as well as a possibility to control and understand their type and kinematic properties to a much greater extent than for neutrinos from other sources.
Muon neutrino beam production
The process of the muon neutrino or muon antineutrino beam production consists of the following steps:
Acceleration of a primary proton beam in a particle accelerator.
Proton beam collision with a fixed target. In such a collision secondary particles, mainly pions and kaons, are produced.
Focusing, by a set of magnetic horns, the secondary particles with a selected charge: positive to produce the muon neutrino beam, negative to produce the muon anti-neutrino beam.
Decay of the secondary particles in flight in a long (of the order of hundreds meters) decay tunnel. Charged pions decay in more than 99.98% into a muon and the corresponding neutrino according to the principle of preserving electric charge and lepton number:
→ + , → +
It is usually intended to have a pure beam, containing only one type of neutrino: either or . Thus, the length of the decay tunnel is optimised to maximise the number of pion decays and simultaneously minimise the number of muon decays, in which undesirable types of neutrinos are produced:
→ + + , → + +
In most of kaon decays the appropriate type of neutrinos (muon neutrinos for positive kaons and muon antineutrinos for negative kaons) are produced:
→ + , → |
https://en.wikipedia.org/wiki/Sphere%20packing%20in%20a%20cylinder | Sphere packing in a cylinder is a three-dimensional packing problem with the objective of packing a given number of identical spheres inside a cylinder of specified diameter and length. For cylinders with diameters on the same order of magnitude as the spheres, such packings result in what are called columnar structures.
These problems are studied extensively in the context of biology, nanoscience, materials science, and so forth due to the analogous assembly of small particles (like cells and atoms) into cylindrical crystalline structures.
Appearance in science
Columnar structures appear in various research fields on a broad range of length scales from metres down to the nanoscale. On the largest scale, such structures can be found in botany where seeds of a plant assemble around the stem. On a smaller scale bubbles of equal size crystallise to columnar foam structures when confined in a glass tube. In nanoscience such structures can be found in man-made objects which are on length scales from a micron to the nanoscale.
Botany
Columnar structures were first studied in botany due to their diverse appearances in plants. D'Arcy Thompson analysed such arrangement of plant parts around the stem in his book "On Growth and Form" (1917). But they are also of interest in other biological areas, including bacteria, viruses, microtubules, and the notochord of the zebra fish.
One of the largest flowers where the berries arrange in a regular cylindrical form is the titan arum. This flower can be up to 3m in height and is natively solely found in western Sumatra and western Java.
On smaller length scales, the berries of the Arum maculatum form a columnar structure in autumn. Its berries are similar to that of the corpse flower, since the titan arum is its larger relative. However, the cuckoo-pint is much smaller in height (height ≈ 20 cm). The berry arrangement varies with the stem to berry size.
Another plant that can be found in many gardens of residential areas is the |
https://en.wikipedia.org/wiki/Mature%20messenger%20RNA | Mature messenger RNA, often abbreviated as mature mRNA is a eukaryotic RNA transcript that has been spliced and processed and is ready for translation in the course of protein synthesis. Unlike the eukaryotic RNA immediately after transcription known as precursor messenger RNA, mature mRNA consists exclusively of exons and has all introns removed.
Mature mRNA is also called "mature transcript", "mature RNA" or "mRNA".
The production of a mature mRNA molecule occurs in 3 steps:
Capping of the 5' end
Polyadenylation of the 3' end
RNA Splicing of the introns
Capping the 5' End
During capping, a 7-methylguanosine residue is attached to the 5'-terminal end of the primary transcripts.This is otherwise known as the GTP or 5' cap. The 5' cap is used to increase mRNA stability. Further, the 5' cap is used as an attachment point for ribosomes. Beyond this, the 5' cap has also been shown to have a role in exporting the mature mRNA from the nucleus and into the cytoplasm.
Polyadenylation
In polyadenylation, a poly-adenosine tail of about 200 adenylate residues is added by a nuclear polymerase post-transcriptionally. This is known as a Poly-A tail and is used for stability and guidance, so that the mRNA can exit the nucleus and find the ribosome. It is added at a polyadenylation site in the 3' untranslated region of the mRNA, cleaving the mRNA in the process. When there are multiple polyadenylation sites on the same mRNA molecule, alternative polyadenylation can occur. See polyadenylation for further details.
RNA Splicing
Pre-mRNA has both introns and exons. As a part of the maturation process, RNA splicing removes the non-coding RNA introns leaving behind the exons, which are then spliced and joined together to form the mature mRNA. Splicing is conducted by the spliceosome. The spliceosome is a large ribonucleoprotein which cleaves the RNA at the splicing site and recombines the exons of the RNA. Similar to polyadenylation, alternative splicing can occur, resultin |
https://en.wikipedia.org/wiki/Wang%20B-machine | As presented by Hao Wang (1954, 1957), his basic machine B is an extremely simple computational model equivalent to the Turing machine. It is "the first formulation of a Turing-machine theory in terms of computer-like models" (Minsky, 1967: 200). With only 4 sequential instructions it is very similar to, but even simpler than, the 7 sequential instructions of the Post–Turing machine. In the same paper, Wang introduced a variety of equivalent machines, including what he called the W-machine, which is the B-machine with an "erase" instruction added to the instruction set.
Description
As defined by Wang (1954) the B-machine has at its command only 4 instructions:
(1) → : Move tape-scanning head one tape square to the right (or move tape one square left), then continue to next instruction in numerical sequence;
(2) ← : Move tape-scanning head one tape square to the left (or move tape one square right), then continue to next instruction in numerical sequence;
(3) * : In scanned tape-square print mark * then go to next instruction in numerical sequence;
(4) Cn: Conditional "transfer" (jump, branch) to instruction "n": If scanned tape-square is marked then go to instruction "n" else (if scanned square is blank) continue to next instruction in numerical sequence.
A sample of a simple B-machine instruction is his example (p. 65):
1. *, 2. →, 3. C2, 4. →, 5. ←
He rewrites this as a collection of ordered pairs:
{ ( 1, * ), ( 2, → ), ( 3, C2 ), ( 4, → ), ( 5, ← ) }
Wang's W-machine is simply the B-machine with the one additional instruction
(5) E : In scanned tape-square erase the mark * (if there is one) then go to next instruction in numerical sequence.
See also
Codd's cellular automaton
Counter-machine model |
https://en.wikipedia.org/wiki/Gongche%20notation | Gongche notation or gongchepu is a traditional musical notation method, once popular in ancient China. It uses Chinese characters to represent musical notes. It was named after two of the Chinese characters that were used to represent musical notes, namely "" gōng and "" chě.
Sheet music written in this notation is still used for traditional Chinese musical instruments and Chinese operas. However usage of the notation has declined, replaced by mostly jianpu (numbered musical notation) and sometimes the standard western notation.
The notation usually uses a movable "do" system. There are variations of the character set used for musical notes. A commonly accepted set is shown below with its relation to jianpu and solfege.
{| class="wikitable" align="center"
|- align="center"
!Gongche
|width="12%"|shàng
|width="12%"|chě
|width="12%"|gōng
|width="12%"|fán
|width="12%"|liù
|width="12%"|wǔ
|width="12%"|yǐ
|- align="center"
!Numbered musical notation
|1||2||3||(4)||5||6||(7)
|- align="center"
!Movable do solfège syllable
|do||re||mi||(between fa and fa♯)||sol||la||(between ti♭ and ti)
|- align="center"
!Simplified Japanese notation
|||||||||||||L
|}
Usual variations
The three notes just below the central octave are usually represented by special characters:
{| class="wikitable" align="center"
|- align="center"
!Gongche
|width="22%"|hé
|width="22%"|sì
|width="22%"|yī
|- align="center" valign="top"
!Jianpu
|5̣
|6̣
|(7̣)
|- align="center"
!Solfege
|sol||la||(between ti♭ and ti)
|- align="center"
!Simplified Japanese notation
|||||
|}
Sometimes "" shì is used instead of "" sì. Sometimes "" yī is not used, or its role is exchanged with "" yǐ.
To represent other notes in different octaves, traditions differ among themselves. For Kunqu, the final strokes of "", "", "", "", "", "" and "" are extended by a tiny slash downward for the lower octave; additionally, a left radical "" is added to denote one octave higher than the central, or "" for two octaves higher. For Cantone |
https://en.wikipedia.org/wiki/Cork%20%28material%29 | Cork is an impermeable buoyant material. It is the phellem layer of bark tissue which is harvested for commercial use primarily from Quercus suber (the cork oak), which is native to southwest Europe and northwest Africa. Cork is composed of suberin, a hydrophobic substance. Because of its impermeable, buoyant, elastic, and fire retardant properties, it is used in a variety of products, the most common of which is wine stoppers.
The montado landscape of Portugal produces approximately half of the cork harvested annually worldwide, with Corticeira Amorim being the leading company in the industry. Cork was examined microscopically by Robert Hooke, which led to his discovery and naming of the cell.
Cork composition varies depending on geographic origin, climate and soil conditions, genetic origin, tree dimensions, age (virgin or reproduction), and growth conditions. However, in general, cork is made up of suberin (average of about 40%), lignin (22%), polysaccharides (cellulose and hemicellulose) (18%), extractables (15%) and others.
History
Cork is a natural material used by humans for over 5,000 years. It is a material whose applications have been known since antiquity, especially in floating devices and as stopper for beverages, mainly wine, whose market, from the early twentieth century, had a massive expansion, particularly due to the development of several cork based agglomerates.
In China, Egypt, Babylon, and Persia from about 3000 BC, cork was already used for sealing containers, fishing equipment, and domestic applications. In ancient Greece (1600 to 1100 years BC) cork was used in footwear, to manufacture a type of sandals attached to the foot by straps, generally leather and with a sole in cork or leather.
In the second century AD, a Greek physician, Dioscorides, noted several medical applications of cork, mainly for hair loss treatment. Nowadays, the majority of people know cork for its use as stoppers in wine bottles. Cork stoppers were adopted in 1729 |
https://en.wikipedia.org/wiki/Rate%20sensor | A rate sensor is a sensor that measures a rate (or rate of change). It may refer to:
Angular rate sensor
Rate gyro
Yaw-rate sensor
Heart rate sensor
Breath rate sensor
Oxygen transmission rate sensors
Moisture vapor transmission rate sensors
See also
Sensor based Variable Rate Application
Sensors |
https://en.wikipedia.org/wiki/Martin%E2%80%93Schultz%20scale | The Martin–Schultz scale is a standard color scale commonly used in physical anthropology to establish more or less precisely the eye color of an individual; it was created by the anthropologists Rudolf Martin and Bruno K Schultz in the first half of the 20th century. The scale consists of 20 colors (from light blue to dark brown-black) that correspond to the different eye colors observed in nature due to the amount of melanin in the iris (in this case, the lower the number, the lighter the eye color):
1-2: blue iris (1a, 1b, 1c, 2a : light blue iris - 2b: darker blue iris)
3: blue-gray iris
4: gray iris (4a, 4b)
5: blue-gray iris with yellow/brown spots
6: gray-green iris with yellow/brown spots
7: green iris
8: green iris with yellow/brown spots
9-10-11: light-brown and hazel iris
12-13: medium brown iris
14-15-16: dark-brown and black iris
See also
Eye color
Martin scale
Human eye |
https://en.wikipedia.org/wiki/John%20Whitby%20Allen | John Whitby Allen (July 2, 1913 – January 6, 1973) was an American model railroader who created the HO scale Gorre & Daphetid model railroad in Monterey, California, and wrote numerous magazine articles on model railroading starting in the 1940s. Allen was renowned for his skill at scratch building and creating scenery. He also pioneered the technique of weathering his models for a more realistic appearance. In addition to his superdetailing of locomotives, rolling stock, structures, and scenery, Allen was known for populating his model world with scale figures in humorous scenes. Other techniques Allen promoted were realistic train operation and the use of forced perspective to create the illusion of a model railroad layout larger than it really was.
Early life
Born in Joplin, Missouri, Allen lost his father to typhoid fever when he was three; his mother died during the flu epidemic about nine years later. Allen lived with relatives in Missouri until attending school in Minnesota. While there, he developed rheumatic fever, and on the advice of a doctor, moved to California to live with an aunt and uncle. His health improved, but the rheumatic fever weakened his heart.
After completing high school, Allen attended UCLA, and joined the Reserve Officers' Training Corps (ROTC). He became comfortable around military people, and later recruited servicemen to help run the Gorre & Daphetid.
In 1934, Allen and his brother went to the World's Fair in Chicago, and saw scale model trains in operation, and he was impressed. He was attending UCLA studying economics, but switched to art school, which he attended for three years, specializing in photography. There he acquired the skills that set his layout and model photography apart.
In 1935, John's paternal grandparents died, leaving him about $1,900 ($ today), then the equivalent of a year's salary for a middle-class man. John invested the money with the help of his brother, and in about 11 years, the value was such that he |
https://en.wikipedia.org/wiki/Motion%20compensation | Motion compensation in computing, is an algorithmic technique used to predict a frame in a video, given the previous and/or future frames by accounting for motion of the camera and/or objects in the video. It is employed in the encoding of video data for video compression, for example in the generation of MPEG-2 files. Motion compensation describes a picture in terms of the transformation of a reference picture to the current picture. The reference picture may be previous in time or even from the future. When images can be accurately synthesized from previously transmitted/stored images, the compression efficiency can be improved.
Motion compensation is one of the two key video compression techniques used in video coding standards, along with the discrete cosine transform (DCT). Most video coding standards, such as the H.26x and MPEG formats, typically use motion-compensated DCT hybrid coding, known as block motion compensation (BMC) or motion-compensated DCT (MC DCT).
Functionality
Motion compensation exploits the fact that, often, for many frames of a movie, the only difference between one frame and another is the result of either the camera moving or an object in the frame moving. In reference to a video file, this means much of the information that represents one frame will be the same as the information used in the next frame.
Using motion compensation, a video stream will contain some full (reference) frames; then the only information stored for the frames in between would be the information needed to transform the previous frame into the next frame.
Illustrated example
The following is a simplistic illustrated explanation of how motion compensation works. Two successive frames were captured from the movie Elephants Dream. As can be seen from the images, the bottom (motion compensated) difference between two frames contains significantly less detail than the prior images, and thus compresses much better than the rest. Thus the information that is require |
https://en.wikipedia.org/wiki/Easton%27s%20theorem | In set theory, Easton's theorem is a result on the possible cardinal numbers of powersets. (extending a result of Robert M. Solovay) showed via forcing that the only constraints on permissible values for 2κ when κ is a regular cardinal are
(where cf(α) is the cofinality of α) and
Statement
If G is a class function whose domain consists of ordinals and whose range consists of ordinals such that
G is non-decreasing,
the cofinality of is greater than for each α in the domain of G, and
is regular for each α in the domain of G,
then there is a model of ZFC such that
for each in the domain of G.
The proof of Easton's theorem uses forcing with a proper class of forcing conditions over a model satisfying the generalized continuum hypothesis.
The first two conditions in the theorem are necessary. Condition 1 is a well known property of cardinality, while condition 2 follows from König's theorem.
In Easton's model the powersets of singular cardinals have the smallest possible cardinality compatible with the conditions that 2κ has cofinality greater than κ and is a non-decreasing function of κ.
No extension to singular cardinals
proved that a singular cardinal of uncountable cofinality cannot be the smallest cardinal for which the generalized continuum hypothesis fails. This shows that Easton's theorem cannot be extended to the class of all cardinals. The program of PCF theory gives results on the possible values of for singular cardinals . PCF theory shows that the values of the continuum function on singular cardinals are strongly influenced by the values on smaller cardinals, whereas Easton's theorem shows that the values of the continuum function on regular cardinals are only weakly influenced by the values on smaller cardinals.
See also
Singular cardinal hypothesis
Aleph number
Beth number |
https://en.wikipedia.org/wiki/Cycloamylose | Cycloamyloses are cyclic α-1,4 linked glucans comprising dozens or hundreds of glucose units. Chemically they are similar to the much smaller cyclodextrins, which are typically composed of 6, 7 or 8 glucose units.
Discovery
Cycloamyloses were discovered as a result of studies of the function of 4-α-glucanotransferase, also known as disproportionating enzyme or D-enzyme (EC 2.4.1.25) isolated from potato.
Synthesis
Upon incubation of D-enzyme with high molecular weight amylose, a product was obtained with decreased ability to form a blue complex with iodine, without reducing or non-reducing ends, and resistant to hydrolysis by glucoamylase (an exoamylase). Takaha and Smith deduced that the product was a cyclic polymer, which they confirmed by mass spectrometry and acid hydrolysis, and showed that it comprised between 17 and several hundred glucose units. It was subsequently shown that D-enzyme could create complex cycloglucans from amylopectin. Similar 4-α-glucanotransferases from bacteria and other organisms have also been shown to produce cycloglucans upon incubation with amylose or amylopectin.
Structure
While the structures of cyclodextrins are planar circles, the structure of cycloamyloses with 10 to 14 glucose units were determined to be circular with strain-induced band-flips and kinks. In contrast the structure of a larger cycloamylose with 26 glucose units was determined to comprise two short left-handed V-amylose helices in antiparallel arrangement.
Applications
Cycloamyloses contain cavities in the helices which are capable of accommodating guest molecules, which suggested applications in chemical technologies. Cycloamylose is used in artificial chaperone technology for the refolding of denatured proteins. Cycloglucans have physicochemical properties that make them useful in food and manufacturing. |
https://en.wikipedia.org/wiki/Grid-tie%20inverter | A grid-tie inverter converts direct current (DC) into an alternating current (AC) suitable for injecting into an electrical power grid, normally 120 V RMS at 60 Hz or 240 V RMS at 50 Hz. Grid-tie inverters are used between local electrical power generators: solar panel, wind turbine, hydro-electric, and the grid.
To inject electrical power efficiently and safely into the grid, grid-tie inverters must accurately match the voltage, frequency and phase of the grid sine wave AC waveform.
Payment for injected power
Electricity companies, in some countries, pay for electrical power that is injected into the electricity utility grid. Payment is arranged in several ways.
With net metering the electricity company pays for the net power injected into the grid, as recorded by a meter in the customer's premises. For example, a customer may consume 400 kilowatt-hours over a month and may return 500 kilowatt-hours to the grid in the same month. In this case the electricity company would pay for the 100 kilowatt hours balance of power fed back into the grid. In the US, net metering policies vary by jurisdiction.
Feed-in tariff, based on a contract with a distribution company or other power authority, is where the customer is paid for electrical power injected into the grid.
In the United States, grid-interactive power systems are specified in the National Electric Code (NEC), which also mandates requirements for grid-interactive inverters.
Operation
Grid-tie inverters convert DC electrical power into AC power suitable for injecting into the electric utility company grid. The grid tie inverter (GTI) must match the phase of the grid and maintain the output voltage slightly higher than the grid voltage at any instant. A high-quality modern grid-tie inverter has a fixed unity power factor, which means its output voltage and current are perfectly lined up, and its phase angle is within 1° of the AC power grid. The inverter has an internal computer that senses the current AC grid |
https://en.wikipedia.org/wiki/Clinical%20pathway | A clinical pathway, also known as care pathway, integrated care pathway, critical pathway, or care map, is one of the main tools used to manage the quality in healthcare concerning the standardisation of care processes. It has been shown that their implementation reduces the variability in clinical practice and improves outcomes. Clinical pathways aim to promote organised and efficient patient care based on evidence-based medicine, and aim to optimise outcomes in settings such as acute care and home care. A single clinical pathway may refer to multiple clinical guidelines on several topics in a well specified context.
Definition
A clinical pathway is a multidisciplinary management tool based on evidence-based practice for a specific group of patients with a predictable clinical course, in which the different tasks (interventions) by the professionals involved in the patient care are defined, optimized and sequenced either by hour (ED), day (acute care) or visit (homecare). Outcomes are tied to specific interventions.
The concept of clinical pathways may have different meanings to different stakeholders. Managed care organizations often view clinical pathways in a similar way as they view care plans, in which the care provided to a patient is definitive and deliberate. Clinical pathways can range in scope from simple medication utilization to a comprehensive treatment plan. Clinical pathways aim for greater standardization of treatment regimens and sequencing as well as improved outcomes, from both a quality of life and a clinical outcomes perspective.
History
The clinical pathway concept appeared for the first time at the New England Medical Center (Boston, United States) in 1985, inspired by Karen Zander and Kathleen Bower. Clinical pathways appeared as a result of the adaptation of the documents used in industrial quality management, the standard operating procedures (SOPs), whose goals are:
Improve efficiency in the use of resources.
Finish work in a set time. |
https://en.wikipedia.org/wiki/Bead%20and%20reel | Bead and reel is an architectural motif, usually found in sculptures, moldings and numismatics. It consists in a thin line where beadlike elements alternate with cylindrical ones. It is found throughout the modern Western world in architectural detail, particularly on Greek/Roman style buildings, wallpaper borders, and interior moulding design. It is often used in combination with the egg-and-dart motif.
According to art historian John Boardman, the bead and reels motif was entirely developed in Greece from motifs derived from the turning techniques used for wood and metal, and was first employed in stone sculpture in Greece during the 6th century BC. The motif then spread to Persia, Egypt and the Hellenistic world, and as far as India, where it can be found on the abacus part of some of the Pillars of Ashoka or the Pataliputra capital. Bead and reel motifs can be found abundantly in Greek and Hellenistic sculpture and on the border of Hellenistic coins.
See also
Pearl circle |
https://en.wikipedia.org/wiki/History%20of%20perpetual%20motion%20machines | The history of perpetual motion machines dates at least back to the Middle Ages. For millennia, it was not clear whether perpetual motion devices were possible or not, but modern theories of thermodynamics have shown that they are impossible. Despite this, many attempts have been made to construct such machines, continuing into modern times. Modern designers and proponents sometimes use other terms, such as "overunity", to describe their inventions.
History
Pre-19th century
There are some unsourced claims that a perpetual motion machine called the "magic wheel" (a wheel spinning on its axle powered by lodestones) appeared in 8th-century Bavaria. This historical claim appears to be unsubstantiated though often repeated.
Early designs of perpetual motion machines were done by Indian mathematician–astronomer Bhaskara II, who described a wheel (Bhāskara's wheel) that he claimed would run forever.
A drawing of a perpetual motion machine appeared in the sketchbook of Villard de Honnecourt, a 13th-century French master mason and architect. The sketchbook was concerned with mechanics and architecture. Following the example of Villard, Peter of Maricourt designed a magnetic globe which, if it were mounted without friction parallel to the celestial axis, would rotate once a day. It was intended to serve as an automatic armillary sphere.
Leonardo da Vinci made a number of drawings of devices he hoped would make free energy. Leonardo da Vinci was generally against such devices, but drew and examined numerous overbalanced wheels.
Mark Anthony Zimara, a 16th-century Italian scholar, proposed a self-blowing windmill.
Various scholars in this period investigated the topic. In 1607 Cornelius Drebbel in "Wonder-vondt van de eeuwighe bewegingh" dedicated a Perpetuum motion machine to James I of England. It was described by Heinrich Hiesserle von Chodaw in 1621. Robert Boyle devised the "perpetual vase" ("perpetual goblet" or "hydrostatic paradox") which was discussed by Denis |
https://en.wikipedia.org/wiki/Telechrome | Telechrome was the first all-electronic single-tube color television system. It was invented by well-known Scottish television engineer, John Logie Baird, who had previously made the first public television broadcast, as well as the first color broadcast using a pre-Telechrome system.
Telechrome used two electron guns aimed at either side of a thin, semi-transparent mica sheet. One of the sides was covered in cyan phosphor and the other red-orange, producing a limited color gamut, but well suited to displaying skin tones. With minor modifications, the system could also be used to produce 3D images. Telechrome was selected as the basis for a UK-wide television standard by a committee in 1944, but the difficult task of converting the two-color system to three-color RGB was still under way when Baird died in 1946.
The introduction of the shadow mask design by RCA produced a workable solution for color television, albeit one with considerably less image brightness. Interest in alternative systems like the Telechrome or Geer tube faded by the late 1950s. The only alternatives to see widespread use were General Electric's slot-mask, and Sony's Trinitron, both were modifications of the RCA concept. All CRT-based methods have since been almost completely replaced by LCD television, starting in the 1990s.
Background
Mechanical and hybrid color
Baird performed one of the earliest public demonstrations of color television system on 3 July 1928 using an all-mechanical system with three Nipkow disk scanners synchronized with a single disk on the receiving end and three colored lights that were turned on and off in synchronicity with the broadcaster. The same basic system was used on 4 February 1938 to create the first color broadcast transmissions from The Crystal Palace to the Dominion Theatre in London. Baird was not the only one to experiment with mechanical color television, and a number of similar devices were demonstrated throughout this period, but Baird is recorded |
https://en.wikipedia.org/wiki/Late%20Elongated%20Hypocotyl | The Late Elongated Hypocotyl gene (LHY), is an oscillating gene found in plants that functions as part of their circadian clock. LHY encodes components of mutually regulatory negative feedback loops with Circadian Clock Associated 1 (CCA1) in which overexpression of either results in dampening of both of their expression. This negative feedback loop affects the rhythmicity of multiple outputs creating a daytime protein complex. LHY was one of the first genes identified in the plant clock, along with TOC1 and CCA1. LHY and CCA1 have similar patterns of expression, which is capable of being induced by light. Single loss-of-function mutants in both genes result in seemingly identical phenotypes, but LHY cannot fully rescue the rhythm when CCA1 is absent, indicating that they may only be partially functionally redundant. Under constant light conditions, CCA1 and LHY double loss-of-function mutants fail to maintain rhythms in clock-controlled RNAs.
The circadian clock in plants has completely different components to those in the animal, fungus or bacterial clocks. The plant clock does have a conceptual similarity to the animal clock in that it consists of a series of interlocking transcriptional feedback loops. The genes involved in the clock show their peak expression at a fixed time of day. The peak expression of the CCA1 and LHY genes occurs at dawn, and the peak expression of the TOC1 gene occurs roughly at dusk. CCA1/LHY and TOC1 proteins repress the expression of each others genes. The result is that as CCA1/LHY protein levels start to reduce after dawn, it releases the repression on the TOC1 gene, allowing TOC1 expression and TOC1 protein levels to increase. As TOC1 protein levels increase, it further suppresses the expression of the CCA1 and LHY genes. The opposite of this sequence occurs overnight to re-establish the peak expression of CCA1 and LHY genes at dawn.
CCA1 is generally a more significant component of this oscillator. Light induces its transcription |
https://en.wikipedia.org/wiki/John%20Milsum | John H. Milsum (August 15, 1925 – November 9, 2008) was a Canadian control engineer who was Professor and first Director at the Biomedical Engineering Department of the McGill University in Montreal, and a professor at the University of British Columbia. Milsum is known for his book "Biological Control Systems Analysis" from 1966, which is a classic in the field and has been translated into many languages.
Biography
Milsum was born in England. He received his Ph.D. in 1957 in control engineering at the Massachusetts Institute of Technology.
He started working at the National Research Council in Ottawa from 1950 to 1961. In 1961 he came to McGill as the first Abitibi professor of control engineering in the Department of Electrical Engineering. In 1972 Milsum moved to the University of British Columbia (UBC) to become the Imperial Oil professor of General Systems and a professor in the Department of Health Care and Epidemiology. He was instrumental in the creation of UBC's Institute of Health Promotion Research in 1990.
He was president of the International Society for the Systems Sciences in 1967-68. And he was a member of the National Research Council in Ottawa.
In 1986, he was bestowed the honour of Emeritus Member of the Canadian Medical and Biological Engineering Society.
Milsum died peacefully at home in 2008 November, at age 83.
Publications
1955. Preliminary investigation of transient cooling of aircraft electronic equipment using heat storage material. with William G. Nance.
1957. Problems in optimizing of stochastically-disturbed, saturating regulators, employing a binary error criterion. Thesis Sc.D., Massachusetts Institute of Technology, Dept. of Mechanical Engineering.
1966. Biological Control Systems Analysis. McGraw Hill
1968. Positive Feedback. (editor) Pergamon Press Ltd.
1984. Health, stress, and illness : a systems approach. New York : Praeger.
Articles:
1972, "The Hierarchical Basis for Living Systems," in George J. Klir (ed.), Tr |
https://en.wikipedia.org/wiki/Planarity | Planarity is a 2005 puzzle computer game by John Tantalo, based on a concept by Mary Radcliffe at Western Michigan University.
The name comes from the concept of planar graphs in graph theory; these are graphs that can be embedded in the Euclidean plane so that no edges intersect. By Fáry's theorem, if a graph is planar, it can be drawn without crossings so that all of its edges are straight line segments. In the planarity game, the player is presented with a circular layout of a planar graph, with all the vertices placed on a single circle and with many crossings. The goal for the player is to eliminate all of the crossings and construct a straight-line embedding of the graph by moving the vertices one by one into better positions.
History and versions
The game was written in Flash by John Tantalo at Case Western Reserve University in 2005. Online popularity and the local notoriety he gained placed Tantalo as one of Cleveland's most interesting people for 2006. It in turn has inspired the creation of a GTK+ version by Xiph.org's Chris Montgomery, which possesses additional level generation algorithms and the ability to manipulate multiple nodes at once.
Puzzle generation algorithm
The definition of the planarity puzzle does not depend on how the planar graphs in the puzzle are generated, but the original implementation uses the following algorithm:
Generate a set of random lines in a plane such that no two lines are parallel and no three lines meet in a single point.
Calculate the intersections of every line pair.
Create a graph with a vertex for each intersection and an edge for each line segment connecting two intersections (the arrangement of the lines).
If a graph is generated from lines, then the graph will have exactly vertices (each line has vertices, and each vertex is shared with one other line) and edges (each line contains edges). The first level of Planarity is built with lines, so it has vertices and edges. Each level after is generated |
https://en.wikipedia.org/wiki/Mighty%20Math | Mighty Math is a collection of six educational video games for the Windows and Macintosh platforms, developed and published by Edmark software. As the title indicates, the games are heavily oriented on mathematics. Two of each games cater for different age groups with fitting content. Carnival Countdown and Zoo Zillions are suited for Kindergarten and 2nd graders and teaches beginner topics. Number Heroes and Calculating Crew cater for 3rd till 6th graders and teaches intermediate topics. Astro Algebra and Cosmic Geometry are designed for 5th till 9th graders and teaches advanced topics. The games were all developed under Harcourt's strategy. In response to the series growing popularity, Edmark launched a website called the "Mighty Math Club" in November.
Games
The series were introduced to teach the concepts of math techniques and reinforcing math skills.
Carnival Countdown was released in July 1996. It teaches counting, sums and early multiplication and division. Number Heroes was released that very same time. It teaches similar content to its prequel but with larger numbers plus fractions, geometry and graphs and charts.
Reception
The Mighty Math series was a finalist for the Computer Game Developers Conference's 1996 "Best Educational Game" Spotlight Award, but lost the prize to Freddi Fish 2. |
https://en.wikipedia.org/wiki/Covert%20conditioning | Covert conditioning is an approach to mental health treatment that utilizes the principles of applied behavior analysis, or cognitive-behavior therapies (CBTs) to help individuals improve their behavior or inner experience. This method relies on the individual's ability to use imagery for purposes such as mental rehearsal. In some populations, it has been found that an imaginary reward can be as effective as a real one. The effectiveness of covert conditioning is believed to depend on the careful application of behavioral treatment principles, including a comprehensive behavioral analysis.
Some clinicians include the mind's ability to spontaneously generate imagery that can provide intuitive solutions or even reprocessing that improves people's typical reactions to situations or inner material. However, this goes beyond the behavioristic principles on which covert conditioning is based.
Therapies and self-help methods have aspects of covert conditioning. This can be seen in focusing, some neuro-linguistic programming methods such as future pacing, and various visualization or imaginal processes used in behavior therapies, such as CBTs or clinical behavior analysis.
Therapeutic interventions
"Systematic desensitization" associates an aversive stimulus with a behavior that the client wishes to reduce or eliminate. This is achieved by imagining the target behavior followed by imagining an aversive consequence. "Covert extinction" attempts to reduce a behavior by imagining the target behavior while imagining that the reinforcer does not occur. "Covert response cost" seeks to reduce a behavior by associating the loss of a reinforcer with the target behavior that is to be decreased.
"Contact desensitization" intends to increase a behavior by imagining a reinforcing experience in connection with modeling the correct behavior. "Covert negative reinforcement" attempts to increase a behavior by connecting the termination of an aversive stimulus with increased production o |
https://en.wikipedia.org/wiki/Tomotherapy | Tomotherapy is a type of radiation therapy treatment machine. In tomotherapy a thin radiation beam is modulated as it rotates around the patient, while they are moved through the bore of the machine. The name comes from the use of a strip-shaped beam, so that only one “slice” (Greek prefix “tomo-”) of the target is exposed at any one time by the radiation. The external appearance of the system and movement of the radiation source and patient can be considered analogous to a CT scanner (computed tomography), which uses lower doses of radiation for imaging. Like a conventional machine used for X-ray external beam radiotherapy (often referred to as a linear accelerator or linac, their main component), a linear accelerator generates the radiation beam, but the external appearance of the machine, the patient positioning, and treatment delivery is different. Conventional linacs do not work on a slice-by-slice basis but typically have a large area beam which can also be resized and modulated.
General principles
The treatment field's length (the width of the radiation slice) is adjustable using collimator jaws. In static-jaw delivery, the field length remains constant during a treatment. In dynamic-jaw delivery, the field length changes so that it begins and ends at its minimum setting.
Tomotherapy treatment times vary compared to normal radiation therapy treatment times. Tomotherapy treatment times can be as low as 6.5 minutes for common prostate treatment, excluding extra time for imaging. Modern tomotherapy and conventional linac systems incorporate one or both of megavoltage X-ray or kilovoltage X-ray imaging systems, enabling image-guided radiation therapy (IMRT). In tomotherapy, images are acquired in a very similar manner to a CT scanner, thanks to their closely related design.
There are few head-to-head comparisons of tomotherapy and other IMRT techniques, however there is some evidence that a conventional linac using VMAT can provide faster treatment whereas to |
https://en.wikipedia.org/wiki/EMAGE | EMAGE (e-Mouse Atlas of Gene Expression) is an online biological database of gene expression data in the developing mouse (Mus musculus) embryo. The data held in EMAGE is spatially annotated to a framework of 3D mouse embryo models produced by EMAP (e-Mouse Atlas Project). These spatial annotations allow users to query EMAGE by spatial pattern as well as by gene name, anatomy term or Gene Ontology (GO) term. EMAGE is a freely available web-based resource funded by the Medical Research Council (UK) and based at the MRC Human Genetics Unit in the Institute of Genetics and Molecular Medicine, Edinburgh, UK.
Contents
EMAGE contains in situ hybridisation, immunohistochemistry, and in situ reporter (e.g. knock-in and gene trap) data. It includes wholemount data, section data and full 3D OPT (Optical Projection Tomography) data. The gene expression patterns are mapped into or onto the standard models by a team of biocurators, using bespoke mapping software. In addition to the spatial annotations, EMAGE data is also text annotated to provide a text based description of the expression patterns. This text annotation is carried out in collaboration with the MGI Gene Expression Database (GXD) using the EMAP mouse anatomy ontology.
EMAGE data comes primarily from peer reviewed, published journal articles, and from large scale screens, but also from direct submissions from researches working in the field. Data does not need to be published to be included in EMAGE, however EMAGE is a curated database. Biocurators check the accuracy of the meta-data included in the database entries and as well as performing the spatial annotations of the data.
EMAGE entries are designed to adhere to the Minimum information specification for in situ hybridization and immunohistochemistry experiments (MISFISHIE) specifications, and as such contain information about the submitter/author publication, detection reagent, assay specimen preparation, and experimental procedures as well as the orig |
https://en.wikipedia.org/wiki/Open%20Database%20Connectivity | In computing, Open Database Connectivity (ODBC) is a standard application programming interface (API) for accessing database management systems (DBMS). The designers of ODBC aimed to make it independent of database systems and operating systems. An application written using ODBC can be ported to other platforms, both on the client and server side, with few changes to the data access code.
ODBC accomplishes DBMS independence by using an ODBC driver as a translation layer between the application and the DBMS. The application uses ODBC functions through an ODBC driver manager with which it is linked, and the driver passes the query to the DBMS. An ODBC driver can be thought of as analogous to a printer driver or other driver, providing a standard set of functions for the application to use, and implementing DBMS-specific functionality. An application that can use ODBC is referred to as "ODBC-compliant". Any ODBC-compliant application can access any DBMS for which a driver is installed. Drivers exist for all major DBMSs, many other data sources like address book systems and Microsoft Excel, and even for text or comma-separated values (CSV) files.
ODBC was originally developed by Microsoft and Simba Technologies during the early 1990s, and became the basis for the Call Level Interface (CLI) standardized by SQL Access Group in the Unix and mainframe field. ODBC retained several features that were removed as part of the CLI effort. Full ODBC was later ported back to those platforms, and became a de facto standard considerably better known than CLI. The CLI remains similar to ODBC, and applications can be ported from one platform to the other with few changes.
History
Before ODBC
The introduction of the mainframe-based relational database during the 1970s led to a proliferation of data access methods. Generally these systems operated together with a simple command processor that allowed users to type in English-like commands, and receive output. The best-known examples |
https://en.wikipedia.org/wiki/Veillonellaceae | The Veillonellaceae are a family of the Clostridia, formerly known as Acidaminococcaceae. Bacteria in this family are grouped together mainly based on genetic studies, which place them among the Bacillota. Supporting this placement, several species are capable of forming endospores. However, they differ from most other Bacillota in having Gram-negative stains. The cell wall composition is peculiar.
Members of this family are all obligate anaerobes, and occur in habitats such as rivers, lakes, and the intestines of vertebrates. They range from spherical forms, such as Megasphaera and Veillonella, to curved rods, as typified by the Selenomonads. Selenomonas has a characteristic crescent-shape, with flagella inserted on the concave side, while Sporomusa is similar but non-motile. Their names refer to this distinctive morphology: selene means moon, and musa means banana.
The name Selenobacteria also refers to some this group.
The description of this family was emended in 2010 and, together with the Acidaminococcaceae (familia nova, which means a newly coined taxa), it was placed in the order Selenomonadales (ordo novus) in the class Negativicutes (classis novus) of the phylum Bacillota.
Phylogeny
The currently accepted taxonomy is based on the List of Prokaryotic names with Standing in Nomenclature (LPSN) and National Center for Biotechnology Information (NCBI)
See also
List of bacteria genera
List of bacterial orders |
https://en.wikipedia.org/wiki/Apache%20SpamAssassin | Apache SpamAssassin is a computer program used for e-mail spam filtering. It uses a variety of spam-detection techniques, including DNS and fuzzy checksum techniques, Bayesian filtering, external programs, blacklists and online databases. It is released under the Apache License 2.0 and is a part of the Apache Foundation since 2004.
The program can be integrated with the mail server to automatically filter all mail for a site. It can also be run by individual users on their own mailbox and integrates with several mail programs. Apache SpamAssassin is highly configurable; if used as a system-wide filter it can still be configured to support per-user preferences.
History
Apache SpamAssassin was created by Justin Mason, who had maintained a number of patches against an earlier program named filter.plx by Mark Jeftovic, which in turn was begun in August 1997. Mason rewrote all of Jeftovic's code from scratch and uploaded the resulting codebase to SourceForge on April 20, 2001.
In Summer 2004 the project became an Apache Software Foundation project and later officially renamed to Apache SpamAssassin.
The SpamAssassin 3.4.2 release in September 2019 was the first in over three years, but the developers say that "The project has picked up a new set of developers and is moving forward again.".
In December 2019, version 3.4.3 of SpamAssassin was released.
In April, 2021, version 3.4.6 of SpamAssassin was released. It was announced that development of version 4.0.0 would become project's focus.
Methods of usage
Apache SpamAssassin is a Perl-based application ( in CPAN) which is usually used to filter all incoming mail for one or several users. It can be run as a standalone application or as a subprogram of another application (such as a Milter, SA-Exim, Exiscan, MailScanner, MIMEDefang, Amavis) or as a client () that communicates with a daemon (). The client/server or embedded mode of operation has performance benefits, but under certain circumstances may introduce add |
https://en.wikipedia.org/wiki/Magix%20Music%20Maker | Magix Music Maker is a commercial digital audio workstation (DAW) designed by the company Magix for the consumer sector. The program is branched from Samplitude, Magic's professional digital audio workstation. First published in 1994, the program continues to be updated. By 2006 it had sold over a million copies in varying versions
Aside from the core Music Maker program, versions have been made for different types of music. The software was also ported to PlayStation 2.
Core versions
Magix has developed three core versions of Music Maker for Windows:
Music Maker 2023 Free: The free version of the music software and currently download-only. The included features are free sound loops, a Beatbox, 3 instruments, 6 effects, and 8 tracks.
Music Maker 2023 Plus: The plus version of the music software and currently download-only. The included features are free sound loops, 1 soundpool, and 1 collection, a Beatbox, 5 instruments, 20 effects, and unlimited tracks.
Music Maker 2023 Premium: The premium version of the music software and currently download-only. The included features are free sound loops, 3 soundpools, and 1 collection, Beatbox Pro 2, Modern EQ, Wizard FX Suite, 7 instruments, 36 effects, unlimited tracks, 64 bit support and AI SongMaker.
Other editions include the 80s Edition, Trap Edition, EDM Edition, and Hip Hop Edition.
Features
Music Maker is an entry level music production app to make songs in various genres. The Premium version allows users to export digital music in surround sound formats.
Sound pool
Sound import (digital music files, real instruments or vocals)
Mixer, MIDI editor, synthesizer
Sound processing plug-ins (equalization, dynamic compression, reverb, delay, chorus, flanger, distortion, limiting, vocoder)
VST Virtual instruments (high-quality midi guitars, basses, drums, pianos, and more).
Supported file formats and interfaces
Minimum system requirements
PC
Processor with 2 GHz, or higher
2 GB RAM
Hard disk drive with |
https://en.wikipedia.org/wiki/Seam%20sealant | Seam sealants are chemical coating compositions.
Textiles
Seam sealants are applied to waterproof seams of items such as rainwear, tents, backpacks, shoes, drysacks, and drysuits. They are often applied by the consumer post-purchase.
Automotive industry
Seam sealing was already performed manually successfully for preventing perforation corrosion in the 1980s. Today used in the OEM automotive industry primarily for the purpose of seals against air leaks and to waterproof sheetmetal overlaps that occur in the assembly of a vehicle. Such overlaps are typically decorative rather than structurally supportive. Accordingly, they are usually only spot welded and this process results in a closure that is not air or water tight.
Seam sealants are sprayed or extruded over the joined edges of these overlaps, and they then either cure to a flexible waterproof "seal" by drying (dehydrating) in the case of water borne compositions, or thermoset irreversibly to a flexible adherent seam seal by going through an oven bake in the case of plasticized polyvinylchloride compositions. Most interior seam seals are not visible after the vehicle is finished, because they are covered by carpeting, interior roof headliner, or decorative trim panels. Exterior seam seals are always painted over and are referred to as "coach joint seals."
The flat-stream application with many special solutions (special nozzles) was increasingly used as the most flexible procedure. |
https://en.wikipedia.org/wiki/Bernoulli%27s%20principle | Bernoulli's principle is a key concept in fluid dynamics that relates pressure, speed and height. Bernoulli's principle states that an increase in the speed of a fluid occurs simultaneously with a decrease in static pressure or the fluid's potential energy. The principle is named after the Swiss mathematician and physicist Daniel Bernoulli, who published it in his book Hydrodynamica in 1738. Although Bernoulli deduced that pressure decreases when the flow speed increases, it was Leonhard Euler in 1752 who derived Bernoulli's equation in its usual form.
Bernoulli's principle can be derived from the principle of conservation of energy. This states that, in a steady flow, the sum of all forms of energy in a fluid is the same at all points that are free of viscous forces. This requires that the sum of kinetic energy, potential energy and internal energy remains constant. Thus an increase in the speed of the fluid—implying an increase in its kinetic energy—occurs with a simultaneous decrease in (the sum of) its potential energy (including the static pressure) and internal energy. If the fluid is flowing out of a reservoir, the sum of all forms of energy is the same because in a reservoir the energy per unit volume (the sum of pressure and gravitational potential ) is the same everywhere.
Bernoulli's principle can also be derived directly from Isaac Newton's second Law of Motion. If a small volume of fluid is flowing horizontally from a region of high pressure to a region of low pressure, then there is more pressure behind than in front. This gives a net force on the volume, accelerating it along the streamline.
Fluid particles are subject only to pressure and their own weight. If a fluid is flowing horizontally and along a section of a streamline, where the speed increases it can only be because the fluid on that section has moved from a region of higher pressure to a region of lower pressure; and if its speed decreases, it can only be because it has moved from a reg |
https://en.wikipedia.org/wiki/Host%E2%80%93parasite%20coevolution | Host–parasite coevolution is a special case of coevolution, where a host and a parasite continually adapt to each other. This can create an evolutionary arms race between them. A more benign possibility is of an evolutionary trade-off between transmission and virulence in the parasite, as if it kills its host too quickly, the parasite will not be able to reproduce either. Another theory, the Red Queen hypothesis, proposes that since both host and parasite have to keep on evolving to keep up with each other, and since sexual reproduction continually creates new combinations of genes, parasitism favours sexual reproduction in the host.
The genetic changes involved are changes in frequencies of alleles, variant forms of individual genes, within populations. These are determined by three main types of selection dynamics: negative frequency-dependent selection when a rare allele has a selective advantage; heterozygote advantage; and directional selection near an advantageous allele. A possible result is a geographic mosaic in a parasitised population, as both host and parasite adapt to environmental conditions that vary in space and time.
Host–parasite coevolution is ubiquitous both in the wild and in humans, domesticated animals and crop plants. Major diseases such as malaria, AIDS and influenza are caused by coevolving parasites.
Model systems for the study of host–parasite coevolution include the nematode Caenorhabditis elegans with the bacterium Bacillus thuringiensis; the crustacean Daphnia and its numerous parasites; and the bacterium Escherichia coli and the mammals (including humans) whose intestines it inhabits.
Overview
Hosts and parasites exert reciprocal selective pressures on each other, which may lead to rapid reciprocal adaptation. For organisms with short generation times, host–parasite coevolution can be observed in comparatively small time periods, making it possible to study evolutionary change in real-time under both field and laboratory condit |
https://en.wikipedia.org/wiki/Web%20interoperability | Web interoperability is producing web pages viewable with nearly every device and browser. There have been various projects to improve web interoperability, for example the Web Standards Project, Mozilla's Technology Evangelism and Web Standards Group, and the Web Essential Conference.
History
The term was first used in the Web Interoperability Pledge, which is a promise to adhere to current HTML recommendations as promoted by the World Wide Web Consortium (W3C). The WIP was not a W3C initiative. but it was started by and has been run by ZDNet AnchorDesk.
This issue was known as "cross browsing" in the browser war between Internet Explorer and Netscape. Microsoft's Internet Explorer was the dominant browser after that, but modern web browsers such as Mozilla Firefox, Opera and Safari have become dominant, and support additional web standards beyond what Internet Explorer supports. Because of Internet Explorer's backwards compatibility, some web pages have continued to use non-standard HTML tags, DOM handling scripts, and platform-specific technologies such as ActiveX, which could potentially be harmful for Web accessibility and device independence.
Elements
Structural and semantic markup with HTML
CSS-based layout with layout elements that resize based on screen size
See also
Web accessibility
Computer accessibility
Multimodal interaction
Forward compatibility
Backward compatibility |
https://en.wikipedia.org/wiki/Simplicial%20approximation%20theorem | In mathematics, the simplicial approximation theorem is a foundational result for algebraic topology, guaranteeing that continuous mappings can be (by a slight deformation) approximated by ones that are piecewise of the simplest kind. It applies to mappings between spaces that are built up from simplices—that is, finite simplicial complexes. The general continuous mapping between such spaces can be represented approximately by the type of mapping that is (affine-) linear on each simplex into another simplex, at the cost (i) of sufficient barycentric subdivision of the simplices of the domain, and (ii) replacement of the actual mapping by a homotopic one.
This theorem was first proved by L.E.J. Brouwer, by use of the Lebesgue covering theorem (a result based on compactness). It served to put the homology theory of the time—the first decade of the twentieth century—on a rigorous basis, since it showed that the topological effect (on homology groups) of continuous mappings could in a given case be expressed in a finitary way. This must be seen against the background of a realisation at the time that continuity was in general compatible with the pathological, in some other areas. This initiated, one could say, the era of combinatorial topology.
There is a further simplicial approximation theorem for homotopies, stating that a homotopy between continuous mappings can likewise be approximated by a combinatorial version.
Formal statement of the theorem
Let and be two simplicial complexes. A simplicial mapping is called a simplicial approximation of a continuous function if for every point , belongs to the minimal closed simplex of containing the point . If is a simplicial approximation to a continuous map , then the geometric realization of , is necessarily homotopic to .
The simplicial approximation theorem states that given any continuous map there exists a natural number such that for all there exists a simplicial approximation to (where denotes the b |
https://en.wikipedia.org/wiki/Lithium%20%28medication%29 | Certain lithium compounds, also known as lithium salts, are used as psychiatric medications, primarily for bipolar disorder and for major depressive disorder. In lower doses, other salts such as lithium citrate are known as nutritional lithium and have occasionally been used to treat ADHD. Lithium is taken orally.
Common side effects include increased urination, shakiness of the hands, and increased thirst. Serious side effects include hypothyroidism, diabetes insipidus, and lithium toxicity. Blood level monitoring is recommended to decrease the risk of potential toxicity. If levels become too high, diarrhea, vomiting, poor coordination, sleepiness, and ringing in the ears may occur. Lithium is teratogenic at high doses, especially during the first trimester of pregnancy. The use of lithium while breastfeeding is controversial; however, many international health authorities advise against it, and the long-term outcomes of perinatal lithium exposure have not been studied. The American Academy of Pediatrics lists lithium as contraindicated for pregnancy and lactation. The United States Food and Drug Administration categorizes lithium as having positive evidence of risk for pregnancy and possible hazardous risk for lactation.
Lithium salts are classified as mood stabilizers. Lithium's mechanism of action is not known.
In the nineteenth century, lithium was used in people who had gout, epilepsy, and cancer. Its use in the treatment of mental disorders began with Carl Lange in Denmark and William Alexander Hammond in New York City, who used lithium to treat mania from the 1870s onwards, based on now-discredited theories involving its effect on uric acid. Use of lithium for mental disorders was re-established (on a different theoretical basis) in 1948 by John Cade in Australia. It is on the World Health Organization's List of Essential Medicines, and is available as a generic medication. In 2020, it was the 197th most commonly prescribed medication in the United States |
https://en.wikipedia.org/wiki/Financial%20Crimes%20Enforcement%20Network | The Financial Crimes Enforcement Network (FinCEN) is a bureau of the United States Department of the Treasury that collects and analyzes information about financial transactions in order to combat domestic and international money laundering, terrorist financing, and other financial crimes.
Mission
FinCEN's director expressed its mission in November 2013 as "to safeguard the financial system from illicit use, combat money laundering and promote national security." FinCEN serves as the U.S. Financial Intelligence Unit (FIU) and is one of 147 FIUs making up the Egmont Group of Financial Intelligence Units. FinCEN's self-described motto is "follow the money." The website states: "The primary motive of criminals is financial gain, and they leave financial trails as they try to launder the proceeds of crimes or attempt to spend their ill-gotten profits." It is a network bringing people and information together, by coordinating information sharing with law enforcement agencies, regulators and other partners in the financial industry.
History
FinCEN was established by order of the Secretary of the Treasury (Treasury Order Numbered 105-08) on April 25, 1990. In May 1994, its mission was broadened to include regulatory responsibilities, and in October 1994 the Treasury Department's precursor of FinCEN, the Office of Financial Enforcement was merged with FinCEN. On September 26, 2002, after Title III of the PATRIOT Act was passed, Treasury Order 180-01 made it an official bureau in the Department of the Treasury.
Since 1995, FinCEN employs the FinCEN Artificial Intelligence System (FAIS).
In September 2012, FinCEN's information technology called FinCEN Portal and Query System migrated with 11 years of data into FinCEN Query, a search engine similar to Google. It is a "one stop shop" accessible via the FinCEN Portal allowing broad searches across more fields than before and returning more results. Since September 2012 FinCEN generates 4 new reports: Suspicious Activity Re |
https://en.wikipedia.org/wiki/List%20of%20GTK%20applications | This is a list of notable applications that use GTK and/or Clutter for their GUI widgets. Such applications blend well with desktop environments that are GTK-based as well, such as GNOME, Cinnamon, LXDE, MATE, Pantheon, Sugar, Xfce or ROX Desktop.
Official GNOME applications
The GNOME Project, i.e. all the people involved with the development of the GNOME desktop environment, is the biggest contributor to GTK, and the GNOME Core Applications as well as the GNOME Games employ the newest GUI widgets from the cutting-edge version of GTK and demonstrates their capabilities.
Shells, user interfaces, application launchers
GNOME Shell – the desktop graphical GUI shell introduced with GNOME version 3.0
Cinnamon fork of the GNOME Shell
GNOME Panel – applications launcher
Maynard, a shell for Weston by Collabora originally for the Raspberry Pi
GNOME Panel and forks
Budgie is a distro-agnostic desktop environment
Education software
Tux Typing – typing tutor for children
DrGeo – geometry software
GCompris – educational entertainment for children (legacy version only)
Utility software
Operating system administration
Disk Usage Analyzer – Disk-usage analyzer
GNOME Disks – utility for the hard disk; partition editor, S.M.A.R.T. monitoring, formerly known as Gnome Disk Utility or palimpsest
GParted – utility for the hard disk; partition editor
GDM – X display manager
GNOME Keyring Manager – Password manager
GNOME Screensaver – Simple screensaver configuration
Alacarte – Menu editor
End-user utilities
Archive Manager – archive manager
Cheese – webcam application
Conduit Synchronizer – Photo/music/notes/files etc. synchronization
Eye of GNOME – official image-viewer for GNOME
Getting Things GNOME! – Personal tasks management software
gnee – A GNOME GUI and a panel applet that can be used to record and replay test cases.
GNOME Boxes – Application to access remote or virtual systems
GNOME Screenshot – take screenshots of desktop and windows
GNOME Calculator |
https://en.wikipedia.org/wiki/Soft%20matter | Soft matter or soft condensed matter is a subfield of condensed matter comprising a variety of physical systems that are deformed or structurally altered by thermal or mechanical stress of the magnitude of thermal fluctuations. These materials share an important common feature in that predominant physical behaviors occur at an energy scale comparable with room temperature thermal energy (of order of kT), and that entropy is considered the dominant factor. At these temperatures, quantum aspects are generally unimportant. Soft materials include liquids, colloids, polymers, foams, gels, granular materials, liquid crystals, flesh, and a number of biomaterials. When soft materials interact favorably with surfaces, they become squashed without an external compressive force. Pierre-Gilles de Gennes, who has been called the "founding father of soft matter," received the Nobel Prize in Physics in 1991 for discovering that methods developed for studying order phenomena in simple systems can be generalized to the more complex cases found in soft matter, in particular, to the behaviors of liquid crystals and polymers.
History
The current understanding of soft matter grew from the Albert Einstein's work on Brownian motion, understanding that a particle suspended in a fluid must have a similar thermal energy to the fluid itself (of order of kT). This work built on established research into systems that would now be considered colloids.
The crystalline optical properties of liquid crystals and their ability to flow were first described by Friedrich Reinitzer in 1888, and further characterized by Otto Lehmann in 1889. The experimental setup that Lehmann used to investigate the two melting points of cholesteryl benzoate are still used in the research of liquid crystals today.
In 1920, Hermann Staudinger, recipient of the 1953 Nobel Prize in Chemistry, was the first person to suggest that polymers are formed through covalent bonds that link smaller molecules together. The idea o |
https://en.wikipedia.org/wiki/ATM%20Adaptation%20Layer%205 | ATM Adaptation Layer 5 (AAL5) is an ATM adaptation layer used to send variable-length packets up to 65,535 octets in size across an Asynchronous Transfer Mode (ATM) network.
Unlike most network frames, which place control information in the header, AAL5 places control information in an 8-octet trailer at the end of the packet. The AAL5 trailer contains a 16-bit length field, a 32-bit cyclic redundancy check (CRC) and two 8-bit fields labeled UU and CPI that are currently unused.
Each AAL5 packet is divided into an integral number of ATM cells and reassembled into a packet before delivery to the receiving host. This process is known as Segmentation and Reassembly (see below). The last cell contains padding to ensure that the entire packet is a multiple of 48 octets long. The final cell contains up to 40 octets of data, followed by padding bytes and the 8-octet trailer. In other words, AAL5 places the trailer in the last 8 octets of the final cell where it can be found without knowing the length of the packet; the final cell is identified by a bit in the ATM header (see below), and the trailer is always in the last 8 octets of that cell.
Convergence, segmentation, and reassembly
When an application sends data over an ATM connection using AAL5, the host delivers a block of data to the AAL5 interface. AAL5 generates a trailer, divides the information into 48-octet pieces, and transfers each piece across the ATM network in a single cell. On the receiving end of the connection, AAL5 reassembles incoming cells into a packet, checks the CRC to ensure that all pieces arrived correctly, and passes the resulting block of data to the host software. The process of dividing a block of data into cells and regrouping them is known as ATM segmentation and reassembly (SAR).
By separating the functions of segmentation and reassembly from cell transport, AAL5 follows the layering principle. The ATM cell transfer layer is classified as "machine-to-machine" because the layering pri |
https://en.wikipedia.org/wiki/Fluoroestradiol%20F-18 | Fluoroestradiol F-18, also known as [18F]16α-fluoroestradiol and sold under the brand name Cerianna, is a radioactive diagnostic agent indicated for use with positron emission tomography (PET) imaging. It is an analog of estrogen and is used to detect estrogen receptor-positive breast cancer lesions.
Chemistry
Chemically, fluoroestradiol F-18 is [18F]16α-fluoro-3,17β-diol-estratriene-1,3,5(10).
History
Fluoroestradiol F-18 was approved for medical use in the United States in May 2020.
See also
4-Fluoroestradiol |
https://en.wikipedia.org/wiki/Email%20box | A mailbox (also electronic mailbox, email box, email mailbox, e-mailbox) is the destination to which electronic mail messages are delivered.
It is the equivalent of a letter box in the postal system.
Definitions
A mailbox is identified by an email address. However, not all email addresses correspond to a storage facility. The term pseudo-mailbox is sometimes used to refer to an address that does not correspond to a definitive mail store. Email forwarding may be applied to reach end recipients from such addresses. Electronic mailing lists and email aliases are typical examples.
RFC 5321, defines an email address as a character string that identifies a user to whom mail will be sent or a location into which mail will be deposited. The term mailbox refers to that depository. In that sense, the terms mailbox and address can be used interchangeably.
RFC 5322 defines a mailbox as follows: A mailbox receives mail. It is a 'conceptual entity' that does not necessarily pertain to file storage. It further exemplifies that some sites may choose to print mail on a printer and deliver the output to the addressee's desk, much like a traditional fax transmission.
Access
Access to a mailbox is controlled by a mailbox provider. Usually, anyone can send messages to a mailbox while only authenticated users can read or delete from their own mailboxes. An email client retrieves messages from one or more mailboxes. The database (file, directory, storage system) in which the client stores the messages is called the local mailbox.
Read access
Popular client–server protocols to retrieve messages are:
Post Office Protocol (POP): a method that is most suitable for reading messages from a single client computer. Usually messages are removed from the server mailbox after retrieval. Anyway, the master copy of a message is the one in the local mailbox.
Internet Message Access Protocol (IMAP): designed to retrieve messages from multiple clients by allowing remote management of the serv |
https://en.wikipedia.org/wiki/Guest%20Host%20Displays | Guest Host Displays, Dichroic Displays, Polymer Dispersed Displays
Guest host displays are similar to more common liquid crystal displays, but also include polymers, inorganic particles, or dichroic dye within the liquid crystal matrix.
In dichroic dye displays, as the birefringence of the host liquid crystals change from planar to perpendicular orientation, the guest dyes also change orientation, from absorbing / planar orientation, to non-absorbing / perpendicular orientation.
Unlike common TN (Twisted Nematic) or STN (Super Twisted Nematic) liquid crystal displays, guest host displays are typically driven direct, and are not usually multiplex driven.
In addition, guest host displays usually require higher operating voltages than TN or STN displays. For example, the polymer dispersed liquid crystal display (also called a P.D.L.C. display), is usually operated at voltages from 4.5 V to 24 V to as high as 100 V. Similarly, dichroic dye containing guest host displays, require voltages from 4.5 V to 10 V and higher.
However, the P.D.L.C. display and many dichroic dye containing guest host displays, such as the White-Taylor Phase Change display, do not require polarizers, which is a significant advantage over TN or STN displays. Lacking polarizers these displays commonly have lower contrast than TN or STN displays, But are often sunlight readable, and usually have no backlight, and hence no backlight glare.
Polarizer free displays enable low cost devices, since the polarizer is one of the more expensive components comprising the common liquid crystal display.
Lacking polarizers, the guest host display substrates can be manufactured from low cost birefringent plastic films. And the plastic film substrates enable additional economies such as continuous R2R manufacturing (Roll to Roll manufacturing) of the displays, with its inherent economies over batch manufacturing processes.
Continuous manufacturing of displays is described in U.S. Patents 4,228,574, 4,924, |
https://en.wikipedia.org/wiki/CodeXL | CodeXL (formerly AMD CodeXL) was an open-source software development tool suite which included a GPU debugger, a GPU profiler, a CPU profiler, a graphics frame analyzer and a static shader/kernel analyzer.
CodeXL was mainly developed by AMD. With version 2.0 CodeXL was made part of GPUOpen and is free and open-source software subject to the requirements of the MIT License. It is no longer branded as an AMD product.
CPU profiler and Power profiler were included in CodeXL until version 2.5. Now these profilers are released as part of the tool.
In April 2020 AMD updated the GitHub repository announcing that "CodeXL is no longer being actively developed or supported by AMD and is being archived"
Features
GPU debugger
CodeXL's GPU debugger allows engineers to debug OpenGL and OpenCL API calls and runtime objects, and debug OpenCL kernels: set breakpoints, step through source code in real-time, view all variables across different GPU cores during kernel execution, identify logic and memory errors, reduce memory transaction overhead, visualize OpenCL/OpenGL buffers and images and OpenGL textures as pictures or as spreadsheet data, and in this way to improve general software quality and optimize its performance.
GPU profiler
CodeXL's GPU profiler collects and visualizes hardware performance counters data, application trace, kernel occupancy, and offers hotspot analysis for AMD GPUs and APUs. The profiler gathers data from the OpenCL runtime, and from the GPU/APU itself during the execution of the kernels, and can be used to discover performance bottlenecks and optimize kernel execution.
CPU profiler
supersedes the CodeXL for CPU and Power Profiling functionalities on AMD processors.
CodeXL's CPU profiling suite can be used to identify, investigate and improve the performance of applications, drivers and system software on AMD CPUs. CodeXL's CPU profiler uses a statistical sampling based approach with various profiling techniques and measures: Time-Based Profili |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.