source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Nearline%20storage | Nearline storage (a portmanteau of "near" and "online storage") is a term used in computer science to describe an intermediate type of data storage that represents a compromise between online storage (supporting frequent, very rapid access to data) and offline storage/archiving (used for backups or long-term storage, with infrequent access to data).
Nearline storage dates back to the IBM 3850 Mass Storage System (MSS) tape library, which was announced in 1974.
Overview
The formal distinction between online, nearline, and offline storage is:
Online storage is immediately available for input/output (I/O).
Nearline storage is not immediately available, but can be made online quickly without human intervention.
Offline storage is not immediately available, and requires some human intervention to become online.
For example, always-on spinning hard disk drives are online storage, while spinning drives that spin down automatically, such as in Massive Arrays of Idle Disks (MAID), are nearline storage. Removable media such as tape cartridges that can be automatically loaded, as in tape libraries, are nearline storage, while tape cartridges that must be manually loaded are offline storage.
Robotic nearline storage
The nearline storage system knows on which volume (cartridge) the data resides, and usually asks a robot to retrieve it from this physical location (usually: a tape library or optical jukebox) and put it into a tape drive or optical disc drive to enable access by bringing the data it contains online. This process is not instant, but it only requires a few seconds.
Nearline tape and optical storage has the advantage of relatively longer lifespans compared to spinning hard drives, simply due to the storage media being idle and usually stored in protected dust-free enclosures when not in use. In a robotic tape loading system, the tape drive used for accessing data experiences the most wear and may need occasional replacement, but the tapes themselves can las |
https://en.wikipedia.org/wiki/AI%20Song%20Contest%202021 | The AI Song Contest 2021 was the second edition of the AI Song Contest, an international music competition for songs that have been composed using artificial intelligence (AI). The contest was co-organised by the technology hubs Wallifornia MusicTech, DeepMusic.ai, and Amsterdam Music Lab. The results of the competition were announced on 6 July 2021 at a virtual conference that was part of the four-day Music & Innovation Summit organised by Wallifornia MusicTech. The contest was won by M.O.G.I.I.7.E.D. from the United States with the song "Listen to Your Body Choir".
Format
Each participating team had to submit a song of up to four minutes that has been composed using artificial intelligence. Human input was allowed, but the more AI was used, the more points the entry got from the jury. The entries were also evaluated by the public through online voting. The winner was announced in a live show on 6 July 2021.
Jury
The jury consisted of eight AI experts, who assessed each entry based on the use of artificial intelligence in the songwriting process:
Ryan Groves (Infinite Album)
Imogen Heap (singer-songwriter)
Anna Huang (Google Brain)
Rujing Stacy Huang (KTH Royal Institute of Technology)
Ajay Kapur (California Institute of the Arts)
Hendrik Vincent Koops (RTL Nederland)
Mark Simos (Berklee College of Music)
Uncanny Valley (winners of the 2020 edition)
Competing entries
The live show took place on 6 July 2021 at 18:00 CEST and was broadcast by Wallifornia MusicTech as part of the virtual Music & Innovation Summit. The contest featured the following competing entries:
Notes |
https://en.wikipedia.org/wiki/Timeout%20Detection%20and%20Recovery | Timeout Detection and Recovery or TDR is a feature of the Windows operating system (OS) introduced in Windows Vista. It detects response problems from a graphics card (GPU), and if a timeout occurs, the OS will attempt a card reset to recover a functional and responsive desktop environment. However, if the attempt was unsuccessful, it results in the Blue Screen of Death (BSOD). The recovery tries to mitigate the scenario where an end user superfluously reboots their device should it become unresponsive.
Timeline
When the GPU takes more than the allotted time to process a request, the system's GPU scheduler will pick up the anomaly. It then tries to preempt the particular task, this operation has the TDR timeout which is 2 seconds by default.
Once the timeout is up and the task is not completed or preempted, the kernel determines that the GPU is frozen and proceeds to inform the respective driver about the detected timeout. It is then the driver's responsibility to properly reset and reinitialize the underlying GPU.
The OS will then do a bunch of other recovery steps needed for the system to regain responsiveness. If the entire operation was successful, the end user might see some visual artefacts and a message will be shown on the screen describing what had happened ("Display driver stopped responding and has recovered."), else a BSOD might ensue.
Possible causes
There are multiple probable causes should a recovery fail, causing an inevitable BSOD:
Outdated drivers
GPU/Hardware issue
Overloading the GPU
Corrupted application/system files/driver
BSOD stop codes
Possible BSOD stop codes emitted if the attempted recovery failed:
VIDEO_TDR_FAILURE (Bug check value: 0x116), recovery and resetting of display driver from a TDR timeout failed.
See also
Windows Display Driver Model
Display driver
DirectX
Vulkan |
https://en.wikipedia.org/wiki/QUADPACK | QUADPACK is a FORTRAN 77 library for numerical integration of one-dimensional functions. It was included in the SLATEC Common Mathematical Library and is therefore in the public domain. The individual subprograms are also available on netlib.
The GNU Scientific Library reimplemented the QUADPACK routines in C. SciPy provides a Python interface to part of QUADPACK.
Routines
The main focus of QUADPACK is on automatic integration routines in which the user inputs the problem and an absolute or relative error tolerance and the routine attempts to perform the integration with an error no larger than that requested. There are nine such automatic routines in QUADPACK, in addition to a number of non-automatic routines. All but one of the automatic routines use adaptive quadrature.
Each of the adaptive routines also have versions suffixed by E that have an extended parameter list that provides more information and allows more control. Double precision versions of all routines were released with prefix D.
General-purpose routines
The two general-purpose routines most suitable for use without further analysis of the integrand are QAGS for integration over a finite interval and QAGI for integration over an infinite interval. These two routines are used in GNU Octave (the quad command) and R (the integrate function).
QAGS uses global adaptive quadrature based on 21-point Gauss–Kronrod quadrature within each subinterval, with acceleration by Peter Wynn's epsilon algorithm.
QAGI is the only general-purpose routine for infinite intervals, and maps the infinite interval onto the semi-open interval (0,1] using a transformation then uses the same approach as QAGS, except with 15-point rather than 21-point Gauss–Kronrod quadrature. For an integral over the whole real line, the transformation used is : This is not the best approach for all integrands: another transformation may be appropriate, or one might prefer to break up the original interval and use QAGI only on the infinit |
https://en.wikipedia.org/wiki/1%3A50%20scale | 1:50 scale is a popular size for diecast models from European manufacturers such as Conrad, Tekno, NZG, WSI and LionToys. Typically they produce scale models of construction vehicles, tower cranes, trucks and buses. These are often the official models distributed by the manufacturers of the real vehicles as a promotional items for prospective customers. These models are also very popular in Europe despite their small size compared to stamped metal construction toys which are usually found in the US.
This scale is similar to O scale used in model trains and 1:50 scale will appear compatible with 1:48 scale models as produced by US manufacturers of O scale model trains and some makers of military vehicles (especially aircraft).
See also
Scale model
Diecast toy
Model car
Model commercial vehicle
Model construction vehicle
Rail transport modelling scales
Model railway scales |
https://en.wikipedia.org/wiki/Judith%20Q.%20Longyear | Judith Querida Longyear (20 September 1938–13 December 1995) was an American mathematician and professor whose research interests included graph theory and combinatorics. Longyear was the second woman to ever earn a mathematics Ph.D. from Pennsylvania State University, where she studied under the supervision of Sarvadaman Chowla and wrote a thesis entitled Tactical Configurations. Longyear taught mathematics at several universities including California Institute of Technology, Dartmouth College and Wayne State University. She worked on nested block designs and Hadamard matrices. |
https://en.wikipedia.org/wiki/List%20of%20set%20identities%20and%20relations | This article lists mathematical properties and laws of sets, involving the set-theoretic operations of union, intersection, and complementation and the relations of set equality and set inclusion. It also provides systematic procedures for evaluating expressions, and performing calculations, involving these operations and relations.
The binary operations of set union () and intersection () satisfy many identities. Several of these identities or "laws" have well established names.
Notation
Throughout this article, capital letters (such as and ) will denote sets. On the left hand side of an identity, typically,
will be the eft most set,
will be the iddle set, and
will be the ight most set.
This is to facilitate applying identities to expressions that are complicated or use the same symbols as the identity.
For example, the identity
may be read as:
Elementary set operations
For sets and define:
and
where the is sometimes denoted by and equals:
One set is said to another set if Sets that do not intersect are said to be .
The power set of is the set of all subsets of and will be denoted by
Universe set and complement notation
The notation
may be used if is a subset of some set that is understood (say from context, or because it is clearly stated what the superset is).
It is emphasized that the definition of depends on context. For instance, had been declared as a subset of with the sets and not necessarily related to each other in any way, then would likely mean instead of
If it is needed then unless indicated otherwise, it should be assumed that denotes the universe set, which means that all sets that are used in the formula are subsets of
In particular, the complement of a set will be denoted by where unless indicated otherwise, it should be assumed that denotes the complement of in (the universe)
One subset involved
Assume
Identity:
Definition: is called a left identity element of a binary operator if fo |
https://en.wikipedia.org/wiki/Zariski%20geometry | In mathematics, a Zariski geometry consists of an abstract structure introduced by Ehud Hrushovski and Boris Zilber, in order to give a characterisation of the Zariski topology on an algebraic curve, and all its powers. The Zariski topology on a product of algebraic varieties is very rarely the product topology, but richer in closed sets defined by equations that mix two sets of variables. The result described gives that a very definite meaning, applying to projective curves and compact Riemann surfaces in particular.
Definition
A Zariski geometry consists of a set X and a topological structure on each of the sets
X, X2, X3, ...
satisfying certain axioms.
(N) Each of the Xn is a Noetherian topological space, of dimension at most n.
Some standard terminology for Noetherian spaces will now be assumed.
(A) In each Xn, the subsets defined by equality in an n-tuple are closed. The mappings
Xm → Xn
defined by projecting out certain coordinates and setting others as constants are all continuous.
(B) For a projection
p: Xm → Xn
and an irreducible closed subset Y of Xm, p(Y) lies between its closure Z and Z \ where is a proper closed subset of Z. (This is quantifier elimination, at an abstract level.)
(C) X is irreducible.
(D) There is a uniform bound on the number of elements of a fiber in a projection of any closed set in Xm, other than the cases where the fiber is X.
(E) A closed irreducible subset of Xm, of dimension r, when intersected with a diagonal subset in which s coordinates are set equal, has all components of dimension at least r − s + 1.
The further condition required is called very ample (cf. very ample line bundle). It is assumed there is an irreducible closed subset P of some Xm, and an irreducible closed subset Q of P× X2, with the following properties:
(I) Given pairs (x, y), (, ) in X2, for some t in P, the set of (t, u, v) in Q includes (t, x, y) but not (t, , )
(J) For t outside a proper closed subset of P, the set of (x, y) in X |
https://en.wikipedia.org/wiki/Eduardo%20Suger | Eduardo Suger Cofiño (November 29, 1938) is a Swiss-born Guatemalan physicist, scholar, educator, and politician. He is one of the founders of Galileo University in Guatemala City and of the Suger Montano Institute. Suger was the first Central American to receive his PhD in physics.
Early life
Suger was born in Zürich, Switzerland on 29 November 1938 to Emilio Suger, a Swiss national, and Estela Cofiño Valladares of Acatenango, Chimaltenango, Guatemala. When World War II broke out, Suger's father was called up to complete his mandatory military service. Suger's mother spoke no German despite living in Switzerland and traveled to the Guatemalan Consulate in Germany for help returning to Guatemala. Shortly after she and Suger returned, she married Enrique Castañeda Rubio, an engineer and official in the Army, and had four more children. Suger lived with his maternal grandmother nearby from the time his mother remarried until his grandmother passed away in 1949/1950.
Education
Suger graduated from La Preparatoria and earned extra money tutoring his classmates in math. He briefly studied chemistry at Universidad de San Carlos de Guatemala (USAC) before deciding to study at the Zürich's Federal Institute of Technology (ETH), the same school his role model Albert Einstein attended. He lived with his strict father and stepmother while earning his BS in physics and mathematics and MS in theoretical physics. At 20, he began teaching geometry and physics, and later worked for a quantum mechanics and molecular physics lab at IBM. Suger served in the military before returning to Guatemala in 1964. He subsequently earned his PhD in molecular physics the University of Texas at Austin (UTA) in 1971. While at UTA, he was inducted into Sigma Xi science society; did labwork in a molecular physics group; and was an academic assistant for a postgraduate Classical Mechanics course.
Academic career
Suger has been teaching mathematical physics for more than 50 years in universities in |
https://en.wikipedia.org/wiki/Benjamin%20Weiss | Benjamin Weiss (; born 1941) is an American-Israeli mathematician known for his contributions to ergodic theory, topological dynamics, probability theory, game theory, and descriptive set theory.
Biography
Benjamin ("Benjy") Weiss was born in New York City. In 1962 he received B.A. from Yeshiva University and M.A. from the Graduate School of Science, Yeshiva University. In 1965, he received his Ph.D. from Princeton under the supervision of William Feller.
Academic career
Between 1965 and 1967, Weiss worked at the IBM Research. In 1967, he joined the faculty of the Hebrew University of Jerusalem; and since 1990 occupied the Miriam and Julius Vinik Chair in Mathematics (Emeritus since 2009). Weiss held visiting positions at Stanford, MSRI, and IBM Research Center.
Weiss published over 180 papers in ergodic theory, topological dynamics, orbit equivalence, probability, information theory, game theory, descriptive set theory; with notable contributions including introduction of Markov partitions (with Roy Adler), development of ergodic theory of amenable groups (with Don Ornstein), mean dimension (with Elon Lindenstrauss), introduction of sofic subshifts and sofic groups. The road coloring conjecture was also posed by Weiss with Roy Adler.
One of Weiss's students is Elon Lindenstrauss, a 2010 recipient of the Fields Medal.
Awards and recognition
Weiss gave an invited address at the International Congress of Mathematicians 1974,
was twice the main speaker at a Conference Board of Mathematical Sciences (1979 and 1995),
gave the M.B.Porter Distinguished Lecture Series at Rice University (1998).
In 2000 Weiss was elected as a Foreign Honorary Member of the American Academy of Arts and Sciences.
In 2006 he was awarded the Rothschild Prize in Mathematics.
In 2012 Weiss was elected a Fellow of the American Mathematical Society.
See also
Daniel Rudolph - contemporary of and academic collaborator with Weiss |
https://en.wikipedia.org/wiki/Valve%20of%20inferior%20vena%20cava | The valve of the inferior vena cava (eustachian valve) is a venous valve that lies at the junction of the inferior vena cava and right atrium.
Development
In prenatal development, the eustachian valve helps direct the flow of oxygen-rich blood through the right atrium into the left atrium and away from the right ventricle. Before birth, the fetal circulation directs oxygen-rich blood returning from the placenta to mix with blood from the hepatic veins in the inferior vena cava. Streaming this blood across the atrial septum via the foramen ovale increases the oxygen content of blood in the left atrium. This in turn increases the oxygen concentration of blood in the left ventricle, the aorta, the coronary circulation and the circulation of the developing brain.
Following birth and separation from the placenta, the oxygen content in the inferior vena cava falls. With the onset of breathing, the left atrium receives oxygen-rich blood from the lungs via the pulmonary veins. As blood flow to the lungs increases, the amount of blood flow entering the left atrium increases. When the pressure in the left atrium exceeds the pressure in the right atrium, the foramen ovale begins to close and limits the blood flow between the left and right atrium. While the eustachian valve persists in adult life, it essentially does not have a specific function after the gestational period.
Variation
There is a large variability in size, shape, thickness, and texture of the persistent eustachian valve, and in the extent to which it encroaches on neighboring structures such as the atrial septum. At one end of the spectrum, the embryonic eustachian valve disappears completely or is represented only by a thin ridge. Most commonly, it is a crescentic fold of endocardium arising from the anterior rim of the IVC orifice. The lateral horn of the crescent tends to meet the lower end of the crista terminalis, while the medial horn joins the thebesian valve, a semicircular valvular fold at t |
https://en.wikipedia.org/wiki/BolA-like%20protein%20family | In molecular biology, the BolA-like protein family consists of the morpho-protein BolA from Escherichia coli, the Fra2 protein from Saccharomyces cerevisiae, and various homologs. The BolA protein is a DNA-binding regulator; the Fra2 protein is an iron sulfur cluster protein that binds Grx3/4 and is involved in regulating iron levels
.
In E. coli, over-expression of this protein causes round morphology and may be involved in switching the cell between elongation and septation systems during cell division. The expression of BolA is growth rate regulated and is induced during the transition into the stationary phase. BolA is also induced by stress during early stages of growth and may have a general role in stress response. It has also been suggested that BolA can induce the transcription of penicillin binding proteins 6 and 5. |
https://en.wikipedia.org/wiki/Graceful%20exit | A graceful exit (or graceful handling) is a simple programming idiom wherein a program detects a serious error condition and "exits gracefully" in a controlled manner as a result. Often the program prints a descriptive error message to a terminal or log as part of the graceful exit.
Usually, code for a graceful exit exists when the alternative — allowing the error to go undetected and unhandled — would produce spurious errors or later anomalous behavior that would be more difficult for the programmer to debug. The code associated with a graceful exit may also take additional steps, such as closing files, to ensure that the program leaves data in a consistent, recoverable state.
Graceful exits are not always desired. In many cases, an outright crash can give the software developer the opportunity to attach a debugger or collect important information, such as a core dump or stack trace, to diagnose the root cause of the error.
In a language that supports formal exception handling, a graceful exit may be the final step in the handling of an exception. In other languages graceful exits can be implemented with additional statements at the locations of possible errors.
The phrase "graceful exit" has also been generalized to refer to letting go from a job or relationship in life that has ended.
In Perl
In the Perl programming language, graceful exits are generally implemented via the operator. For example, the code for opening a file often reads like the following:
# Open the file 'myresults' for writing, or die with an appropriate error message.
open RESULTS, '>', 'myresults' or die "can't write to 'myresults' file: $!";
If the attempt to open the file myresults fails, the containing program will terminate with an error message and an exit status indicating abnormal termination.
In Java
In the Java programming language, the block is used often to catch exceptions. All potentially dangerous code is placed inside the block and, if an exception occurred, is stop |
https://en.wikipedia.org/wiki/Mayer%20f-function | The Mayer f-function is an auxiliary function that often appears in the series expansion of thermodynamic quantities related to classical many-particle systems. It is named after chemist and physicist Joseph Edward Mayer.
Definition
Consider a system of classical particles interacting through a pair-wise potential
where the bold labels and denote the continuous degrees of freedom associated with the particles, e.g.,
for spherically symmetric particles and
for rigid non-spherical particles where denotes position and the orientation parametrized e.g. by Euler angles. The Mayer f-function is then defined as
where the inverse absolute temperature in units of energy−1 .
See also
Virial coefficient
Cluster expansion
Excluded volume
Notes
Special functions |
https://en.wikipedia.org/wiki/Wound%20contracture | Wound contracture is a process that may occur during wound healing when an excess of wound contraction, a normal healing process, leads to physical deformity characterized by skin constriction and functional limitations. Wound contractures may be seen after serious burns and may occur on the palms, the soles, and the anterior thorax. For example, scars that prevent joints from extending or scars that cause an ectropion are considered wound contractures.
See also
Wound healing
Burn scar contracture |
https://en.wikipedia.org/wiki/C6orf201 | Chromosome 6 open reading frame 201, C6orf201, is a protein that in humans is encoded by the C6orf201 gene.
In humans this gene encodes for a nuclear protein that is primarily expressed in the testis.
Gene
In humans, the gene is 51,558 base pairs long. The transcript that produces the longest protein of 140 amino acids is translated from unprocessed mRNA that has six exons and is 1664 nucleotides in length.
Aliases
Chromosome 6 open reading frame 201 (C6orf201) is also referred to as: dJ1013A10.5, MGC87625, RP5-1013A10.5, and LOC404220.
Locus
C6orf201 is located on chromosome 6 at 6p25.2 position and is encoded on the plus strand. C6orf201 is located near the FAM217A gene and the ECI2 gene.
Conservation
C6orf201 is highly conserved in primates, is moderately conserved in other mammals, and there is also conservation in a few reptiles. There is enough conservation in mycoplasma gallinarum to suggest that there may have been a horizontal gene transfer event sometime during the evolutionary history of C6orf201. There are no paralogs or gene duplication events for C6orf201.
Orthologs
Homologous domains
C6orf201 belongs to DUF4523 (Pfam15023), a functionally uncharacterized family of proteins that is found in mammals.
Protein
Names
Less common names of the C6orf201 protein are: protein MGC87625, hypothetical protein LOC404220, OTTHUMP00000213693, and OTTHUMP00000213725.
General properties/features
In humans the longest protein variant is 140 amino acids long, has a molecular weight of 16.2 kDa, and an isoelectric point of 10.88. C6orf201 is predicted to be a nuclear protein.
Modification and Structure
C6orf201 has multiple predicted PKC and CKII phosphorylation sites in humans. The protein also has a nuclear localization signal. C6orf201 has a conserved alpha helix and a conserved beta strand in the protein.
Protein interactions
C6orf201 interacts with SRPK1, TMEM106B, and APP.
Expression
C6orf201 is primarily expressed in the testis of humans and is also ex |
https://en.wikipedia.org/wiki/Sider%20%28Automated%20Code%20Review%29 | Sider is an automated code review tool with GitHub. It's based on static code analysis and integrates with a number of open source static analysis tools. It checks style violations, code quality, security and dependencies and provides results as a comment on GitHub pull request.
Sider was developed by Tokyo-based startup Actcat and launched in April 2014. It released technical debt kanban feature for Ruby in August 2016.
Sider changed service and company names from SideCI to Sider in June 2018.
Sider's business was transferred from Sider Inc. to Sleeek Corporation on October 31, 2019.
Features
Easy setup process. Sider can be set up in 30 seconds.
Immediate feedback on Pull Requests. Sider automatically and immediately scans PRs for issues of style, complexity, duplication, and security. On using GitHub Pull Requests, it will point out any issues so that one can discuss and fix them before merging. Moreover, you do not have to change the flow of existing code review.
Get Slack notification. Sider can be officially connected to Slack, which leads you to get notifications for each of your private or public projects. It will tell you whether there is something in need of attention.
Sider is free for open source projects. It offers a limited free plan for private repositories.
Every GitHub user can get a 14-day trial without charge.
Supported languages
Ruby
PHP
JavaScript
TypeScript
CSS
Java
Kotlin
Go
Python
Swift
C/C++
C#
Shell Script
Dockerfile
Markdown
See also
Automated code review
Programming tools
Code review
List of tools for code review
Static Analysis
List of tools for static code analysis
Awards
Ruby biz Grand prix 2016 Special Prize |
https://en.wikipedia.org/wiki/Cartoon%20All-Stars%20to%20the%20Rescue | Cartoon All-Stars to the Rescue is a 1990 American animated television propaganda film starring many characters from several animated television series at the time of its release. Financed by McDonald's, Ronald McDonald Children's Charities, it was originally simulcast for a limited time on April 21, 1990, on all four major American television networks (by supporting their Saturday morning characters): ABC, CBS, NBC, and Fox, and most independent stations, as well as various cable networks. McDonald's released a VHS home video edition of the special distributed by Buena Vista Home Video, which opened with an introduction from President George H. W. Bush, First Lady Barbara Bush and their dog, Millie. It was produced by the Academy of Television Arts & Sciences Foundation and Southern Star Productions, and was animated overseas by Wang Film Productions. The musical number "Wonderful Ways to Say No" was written by Academy Award-winning composer, Alan Menken and lyricist Howard Ashman, who also wrote the songs for Walt Disney Animation Studios' The Little Mermaid, Beauty and the Beast, and Aladdin.
The plot chronicles the exploits of Michael, a young teenage boy who is using marijuana as well as stealing and drinking alcohol. His younger sister, Corey, is worried about him because he started acting differently which becomes a concern for their parents (who are also starting to notice his changes). When Corey's piggy bank goes missing one morning, her cartoon toys come to life to help her find it. After discovering it in Michael's room along with his stash of drugs, they proceed to work together to do an intervention and take him on a fantasy journey to teach him the risks and consequences a life of drug abuse can bring.
Plot
In Corey's room, an unseen person steals Corey's piggy bank off her dresser. The theft is witnessed by Papa Smurf, who emerges from a Smurfs comic book with the other Smurfs and he alerts the other cartoon characters in the room (Alf from a pict |
https://en.wikipedia.org/wiki/Beam%20stack%20search | Beam stack search is a search algorithm that combines chronological backtracking (that is, depth-first search) with beam search and is similar to depth-first beam search. Both search algorithms are anytime algorithms that find good but likely sub-optimal solutions quickly, like beam search, then backtrack and continue to find improved solutions until convergence to an optimal solution.
Implementation
Beam stack search uses the beam stack as a data structure to integrate chronological backtracking with beam search and can be combined with the divide and conquer algorithm technique, resulting in divide-and-conquer beam-stack search.
Alternatives
Beam search using limited discrepancy backtracking (BULB) is a search algorithm that combines limited discrepancy search with beam search and thus performs non-chronological backtracking, which often outperforms the chronological backtracking done by beam stack search and depth-first beam search. |
https://en.wikipedia.org/wiki/Journal%20of%20Educational%20and%20Behavioral%20Statistics | The Journal of Educational and Behavioral Statistics is a peer-reviewed academic journal published by SAGE Publications on behalf of the American Educational Research Association and American Statistical Association. It covers statistical methods and applied statistics in the educational and behavioral sciences. The journal was established in 1976 as the Journal of Educational Statistics and obtained its current name in 1994. The journal's editors are Steven Andrew Culpepper (University of Illinois at Urbana-Champaign) and Gongjun Xu (University of Michigan).
Mission statement
The Journal of Educational and Behavioral Statistics (JEBS) provides an outlet for papers that are original and useful to those applying statistical approaches to problems and issues in educational or behavioral research. Typical papers will present new methods of analysis. In addition, critical reviews of current practice, tutorial presentations of less well known methods, and novel applications of already-known methods will be published. Papers discussing statistical techniques without specific educational or behavioral interest will have lower priority.
Abstracting and indexing
Journal of Educational and Behavioral Statistics is abstracted and indexed in, among other databases, SCOPUS and the Social Sciences Citation Index. According to the Journal Citation Reports, the journal has a 2022 impact factor of 2.4.
Editors-in-chief
The following is a list of the people who have recently been the editor-in-chief of Journal of Educational and Behavioral Statistics:
Steven Culpepper
Li Cai
Daniel McCaffrey
Sandip Sinharay
Matthew Johnson
David Rindskopf
David Thissen
Howard Wainer |
https://en.wikipedia.org/wiki/An%20Essay%20on%20the%20Principle%20of%20Population | The book An Essay on the Principle of Population was first published anonymously in 1798, but the author was soon identified as Thomas Robert Malthus. The book warned of future difficulties, on an interpretation of the population increasing in geometric progression (so as to double every 25 years) while food production increased in an arithmetic progression, which would leave a difference resulting in the want of food and famine, unless birth rates decreased.
While it was not the first book on population, Malthus's book fuelled debate about the size of the population in Britain and contributed to the passing of the Census Act 1800. This Act enabled the holding of a national census in England, Wales and Scotland, starting in 1801 and continuing every ten years to the present. The book's 6th edition (1826) was independently cited as a key influence by both Charles Darwin and Alfred Russel Wallace in developing the theory of natural selection.
A key portion of the book was dedicated to what is now known as the Malthusian Law of Population. The theory claims that growing population rates contribute to a rising supply of labour and inevitably lowers wages. In essence, Malthus feared that continued population growth lends itself to poverty.
In 1803, Malthus published, under the same title, a heavily revised second edition of his work. His final version, the 6th edition, was published in 1826. In 1830, 32 years after the first edition, Malthus published a condensed version entitled A Summary View on the Principle of Population, which included responses to criticisms of the larger work.
Overview
Between 1798 and 1826 Malthus published six editions of his famous treatise, updating each edition to incorporate new material, to address criticism, and to convey changes in his own perspectives on the subject. He wrote the original text in reaction to the optimism of his father and his father's associates (notably Rousseau) regarding the future improvement of society. Malthu |
https://en.wikipedia.org/wiki/Thermal%20conductance%20and%20resistance | In heat transfer, thermal engineering, and thermodynamics, thermal conductance and thermal resistance are fundamental concepts that describe the ability of materials or systems to conduct heat and the opposition they offer to the heat current. The ability to manipulate these properties allows engineers to control temperature gradient, prevent thermal shock, and maximize the efficiency of thermal systems. Furthermore, these principles find applications in a multitude of fields, including materials science, mechanical engineering, electronics, and energy management. Knowledge of these principles is crucial in various scientific, engineering, and everyday applications, from designing efficient temperature control, thermal insulation, and thermal management in industrial processes to optimizing the performance of electronic devices.
Thermal conductance (C) measures the ability of a material or system to conduct heat. It provides insights into the ease with which heat can pass through a particular system. It is measured in units of watts per kelvin (W/K). It is essential in the design of heat exchangers, thermally efficient materials, and various engineering systems where the controlled movement of heat is vital.
Conversely, thermal resistance (R) measures the opposition to the heat current in a material or system. It is measured in units of kelvins per watt (K/W) and indicates how much temperature difference (in kelvins) is required to transfer a unit of heat current (in watts) through the material or object. It is essential to optimize the building insulation, evaluate the efficiency of electronic devices, and enhance the performance of heat sinks in various applications.
Objects made of insulators like rubber tend to have very high resistance and low conductance, while objects made of conductors like metals tend to have very low resistance and high conductance. This relationship is quantified by resistivity or conductivity. However, the nature of a material is no |
https://en.wikipedia.org/wiki/Fast%20parallel%20proteolysis | Fast parallel proteolysis (FASTpp) is a method to determine the thermostability of proteins by measuring which fraction of protein resists rapid proteolytic digestion.
History and background
Proteolysis is widely used in biochemistry and cell biology to probe protein structure. In "limited trypsin proteolysis", low amounts of protease digest both folded and unfolded protein but at largely different rates: unstructured proteins are cut more rapidly, while structured proteins are cut at a slower rate (sometimes by orders of magnitude). Recently, several other assays of protein stability based on proteolysis have been proposed, exploiting other proteases with high specificity for cleaving unfolded proteins. These include Pulse Proteolysis, Proteolytic Scanning Calorimetry and FASTpp.
How it works
FASTpp measures the quantity of protein that resists digestion under various conditions. To this end, a thermostable protease is used, which cleaves specifically at exposed hydrophobic residues. The FASTpp assay combines the thermal unfolding, specificity of a thermostable protease for the unfolded fraction with the separation power of SDS-PAGE. Due to this combination, FASTpp can detect changes in the fraction folded over a large physico-chemical range of conditions including temperatures up to 85 °C, pH 6–9, presence or absence of the whole proteome. Applications range from biotechnology to study of point mutations and ligand binding assays.
Applications
FASTpp has been used to probe:
Lysate effect on protein stability
Thermal proteome stability
Coupled folding and binding
Ligand effects on fraction folded & stability
Effects of mutations on fraction folded & stability (e.g. point mutation/missense mutations)
Kinetic protein stability
Technology
First, a cell lysate is generated by glass beads beating, pressure homogenisation or chemical or physical lysis methods that do not denature the protein(s) of interest. (Optionally for targeted analysis) a prot |
https://en.wikipedia.org/wiki/Nosology | Nosology () is the branch of medical science that deals with the classification of diseases. Fully classifying a medical condition requires knowing its cause (and that there is only one cause), the effects it has on the body, the symptoms that are produced, and other factors. For example, influenza is classified as an infectious disease because it is caused by a virus, and it is classified as a respiratory infection because the virus infects and damages certain tissues in the respiratory tract. The more that is known about the disease, the more ways the disease can be classified nosologically.
Nosography is a description whose primary purpose is enabling a diagnostic label to be put on the situation. As such, a nosographical entity need not have a single cause. For example, inability to speak due to advanced dementia and an inability to speak due to a stroke could be nosologically different but nosographically the same.
Types of classification
Diseases may be classified by cause, pathogenesis (mechanism by which the disease progresses), or by symptom(s).
Alternatively, diseases may be classified according to the organ system involved, though this is often complicated since many diseases affect more than one organ.
Traditionally diseases were defined as syndromes by their symptoms. When more information is available, they are also defined by the damage they produce. When cause is known, they are better defined by their cause, though still important are their characteristics. This leads to a branching differentiation in which a clinical syndrome (pattern of signs and symptoms) can come to be understood as a nonspecific finding shared by a group of disease entities or endotypes. For example, concepts such as murrain and the grippe that were formerly undifferentiable to humans and thus understood as a single disease later can be logically unraveled as separate diseases with similar clinical presentations. Thus, nosology is dynamic, reclassifying as science adv |
https://en.wikipedia.org/wiki/Polysome%20%28crystallography%29 | In crystallography, the term polysome is used to describe overall mineral structures which have structurally and compositionally different framework structures.
A general example is amphiboles, in which cutting along the {010} plane yields alternating layers of pyroxene and trioctahedral mica. |
https://en.wikipedia.org/wiki/One-dimensional%20space | In physics and mathematics, a sequence of n numbers can specify a location in n-dimensional space. When , the set of all such locations is called a one-dimensional space. An example of a one-dimensional space is the number line, where the position of each point on it can be described by a single number.
In algebraic geometry there are several structures that are technically one-dimensional spaces but referred to in other terms. A field k is a one-dimensional vector space over itself. Similarly, the projective line over k is a one-dimensional space. In particular, if , the complex numbers, then the complex projective line is one-dimensional with respect to , even though it is also known as the Riemann sphere.
More generally, a ring is a length-one module over itself. Similarly, the projective line over a ring is a one-dimensional space over the ring. In case the ring is an algebra over a field, these spaces are one-dimensional with respect to the algebra, even if the algebra is of higher dimensionality.
Hypersphere
The hypersphere in 1 dimension is a pair of points, sometimes called a 0-sphere as its surface is zero-dimensional. Its length is
where is the radius.
Coordinate systems in one-dimensional space
One dimensional coordinate systems include the number line.
See also
Univariate |
https://en.wikipedia.org/wiki/CG%20artist | CG artists (also known as computer graphics artists) create 2D and 3D art, usually for cinema, advertising or animation movies. A CG artist's work usually revolves around finding balance between artistic sensibilities and technical limitations while working within a development team.
In a game development context, CG artists work closely with game directors, art directors, animators, game designers and level designers. CG artists (typically, technical artists) will also work with game programmers to ensure that the 3D models and assets created by the art team function as desired inside a game engine.
CG artists are typically skilled at creating both 2D and 3D digital art, and often specialize in one or more subsets of content creation such as: hard surface modeling, organic modelling, concept art painting, architectural rendering, animation, and/or visual effects. If the CG artist is a technical artist, they will usually also have programming skills such as shader and script writing, character rigging, and/or skill in languages such as Python, MEL, C++, or C#.
CG artists often begin their career with a degree from an animation school, an arts discipline, or in computer science. |
https://en.wikipedia.org/wiki/Gian-Carlo%20Rota | Gian-Carlo Rota (April 27, 1932 – April 18, 1999) was an Italian-American mathematician and philosopher. He spent most of his career at the Massachusetts Institute of Technology, where he worked in combinatorics, functional analysis, probability theory, and phenomenology.
Early life and education
Rota was born in Vigevano, Italy. His father, Giovanni, an architect and prominent antifascist, was the brother of the mathematician Rosetta, who was the wife of the writer Ennio Flaiano. Gian-Carlo's family left Italy when he was 13 years old, initially going to Switzerland.
Rota attended the Colegio Americano de Quito in Ecuador, and graduated with an A.B. in mathematics from Princeton University in 1953 after completing a senior thesis, titled "On the solubility of linear equations in topological vector spaces", under the supervision of William Feller. He then pursued graduate studies at Yale University, where he received a Ph.D. in mathematics in 1956 after completing a doctoral dissertation, titled "Extension Theory Of Ordinary Linear Differential Operators", under the supervision of Jacob T. Schwartz.
Career
Much of Rota's career was spent as a professor at the Massachusetts Institute of Technology (MIT), where he was and remains the only person ever to be appointed Professor of Applied Mathematics and Philosophy. Rota was also the Norbert Wiener Professor of Applied Mathematics.
In addition to his professorships at MIT, Rota held four honorary degrees, from the University of Strasbourg, France (1984); the University of L'Aquila, Italy (1990); the University of Bologna, Italy (1996); and Brooklyn Polytechnic University (1997).
Beginning in 1966 he was a consultant at Los Alamos National Laboratory, frequently visiting to lecture, discuss, and collaborate, notably with his friend Stanisław Ulam. He was also a consultant for the Rand Corporation (1966–71) and for the Brookhaven National Laboratory (1969–1973). Rota was elected to the National Academy of Sciences in |
https://en.wikipedia.org/wiki/LOMAC | Low Water-Mark Mandatory Access Control (LOMAC) is a Mandatory Access Control model which protects the integrity of system objects and subjects by means of an information flow policy coupled with the subject demotion via floating labels. In LOMAC, all system subjects and objects are assigned integrity labels, made up of one or more hierarchical grades, depending on their types. Together, these label elements permit all labels to be placed in a partial order, with information flow protections and demotion decisions based on a dominance operator describing the order.
Implementations
In FreeBSD, the Biba model is implemented by the mac_lomac MAC policy.
In Linux, there is a project that attempts to implement LOMAC policy.
See also
Multi-Level Security — MLS
Mandatory Access Control — MAC
Discretionary Access — DAC
Take-Grant Model
The Clark-Wilson Integrity Model
Graham-Denning Model
Security Modes of Operation |
https://en.wikipedia.org/wiki/Hydrophilic%20interaction%20chromatography | Hydrophilic interaction chromatography (or hydrophilic interaction liquid chromatography, HILIC) is a variant of normal phase liquid chromatography that partly overlaps with other chromatographic applications such as ion chromatography and reversed phase liquid chromatography. HILIC uses hydrophilic stationary phases with reversed-phase type eluents. The name was suggested by Andrew Alpert in his 1990 paper on the subject. He described the chromatographic mechanism for it as liquid-liquid partition chromatography where analytes elute in order of increasing polarity, a conclusion supported by a review and re-evaluation of published data.
Surface
Any polar chromatographic surface can be used for HILIC separations. Even non-polar bonded silicas have been used with extremely high organic solvent composition, thanks to the exposed patches of silica in between the bonded ligands on the support, which can affect the interactions. With that exception, HILIC phases can be grouped into five categories of neutral polar or ionic surfaces:
simple unbonded silica silanol or diol bonded phases
amino or anionic bonded phases
amide bonded phases
cationic bonded phases
zwitterionic bonded phases
Mobile phase
A typical mobile phase for HILIC chromatography includes acetonitrile ("MeCN", also designated as "ACN") with a small amount of water. However, any aprotic solvent miscible with water (e.g. THF or dioxane) can be used. Alcohols can also be used, however, their concentration must be higher to achieve the same degree of retention for an analyte relative to an aprotic solvent - water combination. See also Aqueous Normal Phase Chromatography
It is commonly believed that in HILIC, the mobile phase forms a water-rich layer on the surface of the polar stationary phase vs. the water-deficient mobile phase, creating a liquid/liquid extraction system. The analyte is distributed between these two layers. However, HILIC is more than just simple partitioning and includes hydrogen d |
https://en.wikipedia.org/wiki/Greek%20diacritics | Greek orthography has used a variety of diacritics starting in the Hellenistic period. The more complex polytonic orthography (), which includes five diacritics, notates Ancient Greek phonology. The simpler monotonic orthography (), introduced in 1982, corresponds to Modern Greek phonology, and requires only two diacritics.
Polytonic orthography () is the standard system for Ancient Greek and Medieval Greek. The acute accent (´), the circumflex (ˆ), and the grave accent (`) indicate different kinds of pitch accent. The rough breathing (῾) indicates the presence of the sound before a letter, while the smooth breathing (᾿) indicates the absence of .
Since in Modern Greek the pitch accent has been replaced by a dynamic accent (stress), and was lost, most polytonic diacritics have no phonetic significance, and merely reveal the underlying Ancient Greek etymology.
Monotonic orthography () is the standard system for Modern Greek. It retains two diacritics: a single accent or tonos (΄) that indicates stress, and the diaeresis ( ¨ ), which usually indicates a hiatus but occasionally indicates a diphthong: compare modern Greek (, "lamb chops"), with a diphthong, and (, "little children") with a simple vowel. A tonos and a diaeresis can be combined on a single vowel to indicate a stressed vowel after a hiatus, as in the verb (, "I feed").
Although it is not a diacritic, the hypodiastole (comma) has in a similar way the function of a sound-changing diacritic in a handful of Greek words, principally distinguishing (, "whatever") from (, "that").
History
The original Greek alphabet did not have diacritics. The Greek alphabet is attested since the 8th century BC, and until 403 BC, variations of the Greek alphabet—which exclusively used what are now known as capitals—were used in different cities and areas. From 403 on, the Athenians decided to employ a version of the Ionian alphabet. With the spread of Koine Greek, a continuation of the Attic dialect, the Ionic alph |
https://en.wikipedia.org/wiki/EUROCAT%20%28medicine%29 | EUROCAT founded in 1979, is a high quality network of population-based congenital anomaly registries across Europe for the monitoring, surveillance and research of congenital anomalies.
In January 2023 the network has 43 member registries from 23 countries covering more than 25% of European births per year. The detailed registry descriptions can be found on the EUROCAT website
Objectives
EUROCAT’s objectives are to:
Provide essential epidemiologic information on congenital anomalies in Europe.
Facilitate the early warning of teratogenic exposures.
Evaluate the effectiveness of primary prevention.
Assess the impact of developments in prenatal screening.
Act as an information and resource centre regarding clusters or exposures or risk factors for concern.
Provide a ready collaborative network and infrastructure for research related to the causes and prevention of congenital anomalies and the treatment and care of affected children.
Act as a catalyst for the setting up of registries throughout Europe collecting comparable, standardised data.
History
EUROCAT was founded in 1979 as the European Concerted Action on Congenital Anomalies and Twins. The EUROCAT Central Registry was based in Brussels from 1979 to 1999 and at the University of Ulster from 2000 to 2014.
In 2015 the Central Registry was transferred to the European Commission’s Joint Research Centre (JRC) in Ispra, Italy, and it is now an integral part of the European Platform on Rare Disease Registration.
Leadership is provided by the JRC-EUROCAT Management Committee, comprising elected members from the EUROCAT congenital anomaly registries and representatives from the JRC.
Methodology
All EUROCAT member registries use multiple sources of information to ascertain cases in live births, late fetal deaths (>20 weeks gestational age) and terminations of pregnancy for fetal anomaly at any gestational age.
EUROCAT has achieved a high level of data harmonisation and interoperability between registri |
https://en.wikipedia.org/wiki/Gavilan%20SC | The Gavilan SC is a laptop computer that was the first ever to be marketed as a "laptop". The computer ran on an Intel 8088 microprocessor running at 5 MHz and sported a touchpad for a pointing device, one of the first computers to do so. The laptop was developed by Manuel "Manny" Fernandez and released by the Gavilan Computer Corporation, the company he founded and owned, in May 1983.
History
The brainchild of Gavilan Computer Corporation founder Manuel (Manny) Fernandez, the Gavilan was introduced in May 1983, at approximately the same time as the similar Sharp PC-5000. It came to market a year after the GRiD Compass, with which it shared several pioneering details, notably a clamshell design, in which the screen folds shut over the keyboard.
The Gavilan, however, was more affordable than the GRiD, at a list price of around US$4000. Unlike the GRiD, it was equipped with a floppy disk drive and used the MS-DOS operating system, although it was only partially IBM PC-compatible. Powered by a 5 MHz Intel 8088 processor, it was equipped with a basic graphical user interface, stored in its 48 KB of ROM. The operating system used a FORTH-like interpreter to generate very compact code. An internal 300-baud modem was standard. A compact printer that attached to the rear of the machine was an option.
The machine's included software was a terminal program, MS-DOS, and MBasic (a version of the BASIC programming language). An Office Pack of four applications—Sorcim SuperCalc and SuperWriter, and pfs:File and pfs:Report—was optional.
It was far smaller than competing IBM compatible portables, such as the Compaq Portable, which were the size of a portable sewing machine and weighed more than twice the Gavilan's 4 kg (9 lb), and unlike the Gavilan they could not run off batteries. Gavilan claimed the SC could run up to nine hours on its built-in nickel-cadmium batteries.
Jack Hall, an award-winning industrial designer, was chosen to work out the ergonomics, mechanics and ov |
https://en.wikipedia.org/wiki/Strudel%20%28ice%29 | A strudel (plural: strudel) is a vertical hole in sea ice through which downward jet-like, buoyancy-driven drainage of flood water is thought to occur. This feature is less than a few tens of meters in size and typically occurs within 30 km from a river mouth, in the sea ice expanse that is fastened to the coastline (known as fast ice). Once the water that flooded the ice has completely drained off the ice surface, strudel become recognizable by a radial pattern of feeder channels that lead to the hole. They are elongated and irregularly spaced, with the larger ones up to several kilometers apart. Their distribution tends to be controlled by weak areas in the ice – in places, they line up along fractures or refrozen extensional cracks. The ice sheet where they occur may be 2 m in thickness, at water depths (below the ice) in the order of a few meters.
The term strudel is German, and designates a whirlpool, in reference to the water vortex that forms above these features during drainage. It has been suggested that this vortex could present a hazard for investigators wishing to study this phenomenon in the field, and that this would explain, at least partly, why little is known about strudel.
Formation
The formation of strudel is related to the break up of a frozen river during the melting season, where this river runs into a sea ice expanse. At that time, fresh water flows onto the fast ice with a progression rate of about 2–3 m/s, extending up to a few tens of kilometers away from the river mouth. Water depths above the ice surface may be up to a few meters. A strudel forms as a result of water carving its way through the ice sheet. Drainage is initiated through small openings or cracks in the ice resulting from the weight of the freshwater. Some are reportedly enlarged seal-breathing holes. Within a few days, the water drains off the ice. Drainage is driven by the buoyancy of the ice, not by the density difference between freshwater and sea water. The pressure |
https://en.wikipedia.org/wiki/Gen%205%20Fibre%20Channel | Gen 5 Fibre Channel is the marketing name for purpose-built, data center network infrastructure for storage that provides reliability, scalability and up to 16 Gbit/s performance adopted by Brocade, Emulex, and QLogic. The name was created to move away from speed-based naming to technology generation-based naming. Gen 5 Fibre Channel is based on the 5th generation of (1, 2, 4, 8, 16 Gbit/s).
Brocade Gen 5 Fibre Channel
Brocade formally introduced the term "Gen 5 Fibre Channel" in a press release announcing Brocade Fabric Vision Technology. Brocade has a broad range of Gen 5 Fibre Channel platforms spanning from director-class switches (Brocade DCX 8510), to fixed-port switches (Brocade 6520/6510/6505), to embedded switches, and adapters (Brocade 1860 Fabric Adapter).
Brocade platforms with Gen 5 Fibre Channel are positioned for high-density server virtualization, cloud architectures, and next generation flash and SSD storage.
Emulex Gen 5 Fibre Channel
Emulex first introduced Gen 5 Fibre Channel in a press release announcing ecosystem and partner adoption of Gen 5 Fibre Channel HBAs for flash storage and SAN appliances. In conjunction, the Emulex LightPulse LPe1600B HBAs were re-positioned as "The PCI Express (PCIe) 3.0 LPe16000B Gen 5 Fibre Channel (16GFC/8GFC/4GFC) Host Bus Adapters"
QLogic Gen 5 Fibre Channel
QLogic first introduced Gen 5 Fibre Channel in during the Q1 2013 earnings call on July 25, 2013. In conjunction, the QLogic 2600 Series HBAs were repositioned as "2600 Series 16Gb Gen 5 Fibre Channel Adapters".
Cisco Gen 5 Fibre Channel
Cisco has not adopted the Gen 5 Fibre Channel branding.
Other sources adopting the Gen 5 Fibre Channel name
In an IDC Link report from March 26, 2013, analyst Ashish Nadkarni provided an assessment of Brocade's March 25 product launch
Dell'Oro Senior Analyst Casey Quillin started using Gen 5 Fibre Channel in his Fibre Channel Switch reports starting in March 2013.
Gen 5 Fibre Channel Controversy
There have been h |
https://en.wikipedia.org/wiki/Triadobatrachus | Triadobatrachus is an extinct genus of salientian frog-like amphibians, including only one known species, Triadobatrachus massinoti. It is the oldest member of the frog lineage known, and an excellent example of a transitional fossil. It lived during the Early Triassic about 250 million years ago, in what is now Madagascar.
Triadobatrachus was long, and still retained many primitive characteristics, such as possessing at least 26 vertebrae, where modern frogs have only four to nine. At least 10 of these vertebrae formed a short tail, which the animal may have retained as an adult. It probably swam by kicking its hind legs, although it could not jump, as most modern frogs can. Its skull resembled that of modern frogs, consisting of a latticework of thin bones separated by large openings.
This creature, or a relative, evolved eventually into modern frogs, the earliest example of which is Prosalirus, millions of years later in the Early Jurassic.
It was first discovered in the 1930s, when Adrien Massinot, near the village of Betsiaka in northern Madagascar, found an almost complete skeleton in the Induan Middle Sakamena Formation of the Sakamena Group. The animal must have fossilized soon after its death, because all bones lay in their natural anatomical position. Only the anterior part of the skull and the ends of the limbs were missing. This fossil was initially described under the name Protobatrachus massinoti by the French paleontologist Jean Piveteau in 1936. Much more detailed description were published more recently.
Although it was found in marine deposits, the general structure of Triadobatrachus shows that it probably lived for part of the time on land and breathed air. Its proximity to the mainland is further borne out by the remains of terrestrial plants found with it, and because most extant amphibians do not tolerate saltwater, and that this saltwater intolerance was probably present in the earliest lissamphibians.
Gallery |
https://en.wikipedia.org/wiki/Acetoin | Acetoin, also known as 3-hydroxybutanone or acetyl methyl carbinol, is an organic compound with the formula CH3CH(OH)C(O)CH3. It is a colorless liquid with a pleasant, buttery odor. It is chiral. The form produced by bacteria is (R)-acetoin.
Production in bacteria
Acetoin is a neutral, four-carbon molecule used as an external energy store by a number of fermentative bacteria. It is produced by the decarboxylation of alpha-acetolactate, a common precursor in the biosynthesis of branched-chain amino acids. Owing to its neutral nature, production and excretion of acetoin during exponential growth prevents over-acidification of the cytoplasm and the surrounding medium that would result from accumulation of acidic metabolic products, such as acetic acid and citric acid. Once superior carbon sources are exhausted, and the culture enters stationary phase, acetoin can be used to maintain the culture density. The conversion of acetoin into acetyl-CoA is catalysed by the acetoin dehydrogenase complex, following a mechanism largely analogous to the pyruvate dehydrogenase complex; however, as acetoin is not a 2-oxoacid, it does not undergo decarboxylation by the E1 enzyme; instead, a molecule of acetaldehyde is released.
In some bacteria, acetoin can also be reduced to 2,3-butanediol by acetoin reductase/2,3-butanediol dehydrogenase.
The Voges-Proskauer test is a commonly used microbiological test for acetoin production.
Uses
Food ingredients
Acetoin, along with diacetyl, is one of the compounds that gives butter its characteristic flavor. Because of this, manufacturers of partially hydrogenated oils typically add artificial butter flavor – acetoin and diacetyl – (along with beta carotene for the yellow color) to the final product.
Acetoin can be found in apples, yogurt, asparagus, blackcurrants, blackberries, wheat, broccoli, brussels sprouts, cantaloupes, and maple syrup.
Acetoin is used as a food flavoring (in baked goods) and as a fragrance.
Electronic cigarettes
|
https://en.wikipedia.org/wiki/Park%20Grass%20Experiment | The Park Grass Experiment is a biological study originally set up to test the effect of fertilizers and manures on hay yields. The scientific experiment is located at the Rothamsted Research in the English county of Hertfordshire, and is notable as one of the longest-running experiments of modern science, as it was initiated in 1856 and has been continually monitored ever since.
The experiment was originally designed to answer agricultural questions but has since proved an invaluable resource for studying natural selection and biodiversity. The treatments under study were found to be affecting the botanical make-up of the plots and the ecology of the field and it has been studied ever since. In spring, the field is a colourful tapestry of flowers and grasses, some plots still having the wide range of plants that most meadows probably contained hundreds of years ago.
Over its history, Park Grass has:
demonstrated that conventional field trials probably underestimate threats to plant biodiversity from long term changes, such as soil acidification,
shown how plant species richness, biomass and pH are related,
demonstrated that competition between plants can make the effects of climatic variation on communities more extreme,
provided one of the first demonstrations of local evolutionary change under different selection pressures and
endowed us with an archive of soil and hay samples that have been used to track the history of atmospheric pollution, including nuclear fallout.
Bibliography
Rothamsted Research: Classical Experiments
Biodiversity
Ecological experiments
Grasslands |
https://en.wikipedia.org/wiki/Tracking%20error | In finance, tracking error or active risk is a measure of the risk in an investment portfolio that is due to active management decisions made by the portfolio manager; it indicates how closely a portfolio follows the index to which it is benchmarked. The best measure is the standard deviation of the difference between the portfolio and index returns.
Many portfolios are managed to a benchmark, typically an index. Some portfolios are expected to replicate, before trading and other costs, the returns of an index exactly (e.g., an index fund), while others are expected to 'actively manage' the portfolio by deviating slightly from the index in order to generate active returns. Tracking error is a measure of the deviation from the benchmark; the aforementioned index fund would have a tracking error close to zero, while an actively managed portfolio would normally have a higher tracking error. Thus the tracking error does not include any risk (return) that is merely a function of the market's movement. In addition to risk (return) from specific stock selection or industry and factor "betas", it can also include risk (return) from market timing decisions.
Dividing portfolio active return by portfolio tracking error gives the information ratio, which is a risk adjusted performance measure.
Definition
If tracking error is measured historically, it is called 'realized' or 'ex post' tracking error. If a model is used to predict tracking error, it is called 'ex ante' tracking error. Ex-post tracking error is more useful for reporting performance, whereas ex-ante tracking error is generally used by portfolio managers to control risk. Various types of ex-ante tracking error models exist, from simple equity models which use beta as a primary determinant to more complicated multi-factor fixed income models. In a factor model of a portfolio, the non-systematic risk (i.e., the standard deviation of the residuals) is called "tracking error" in the investment field. The latter way t |
https://en.wikipedia.org/wiki/Ancient%20Egyptian%20creation%20myths | Ancient Egyptian creation myths are the ancient Egyptian accounts of the creation of the world. The Pyramid Texts, tomb wall decorations, and writings, dating back to the Old Kingdom (c. 2700–2200 BCE) have provided the majority of information regarding ancient Egyptian creation myths. These myths also form the earliest religious compilations in the world. The ancient Egyptians had many creator gods and associated legends. Thus, the world or more specifically Egypt was created in diverse ways according to different parts of ancient Egypt. Some versions of the myth indicate spitting, others masturbation, as the act of creation. The earliest god, Ra and/or Atum (both being creator/sun gods), emerged from a chaotic state of the world and gave rise to Shu (air) and Tefnut (moisture), from whose union came Geb (earth) and Nut (sky), who in turn created Osiris, Isis, Set, and Nephthys. An extension to this basic framework was the Osiris myth involving Osiris, his consort Isis, and their son Horus. The murder of Osiris by Set, and the resulting struggle for power, won by Horus, provided a powerful narrative linking the ancient Egyptian ideology of kingship with the creation of the cosmos.
In all of these myths, the world was said to have emerged from an infinite, lifeless sea when the sun rose for the first time, in a distant period known as zp tpj (sometimes transcribed as Zep Tepi), "the first occasion". Different myths attributed the creation to different gods: the set of eight primordial deities called the Ogdoad, the contemplative deity Ptah, and the mysterious, transcendent god Amun. While these differing cosmogonies competed to some extent, in other ways they were complementary, as different aspects of the Egyptian understanding of creation.
Common elements
The different myths have some elements in common. They all held that the world had arisen out of the lifeless waters of chaos, called Nu. They also included a pyramid-shaped mound, called the benben, which was |
https://en.wikipedia.org/wiki/Neutrophil%20cytosolic%20factor%204 | Neutrophil cytosol factor 4 is a protein that in humans is encoded by the NCF4 gene.
Function
The protein encoded by this gene is a cytosolic regulatory component of the superoxide-producing phagocyte NADPH-oxidase, a multicomponent enzyme system important for host defense. This protein is preferentially expressed in cells of myeloid lineage. It interacts primarily with neutrophil cytosolic factor 2 (NCF2/p67-phox) to form a complex with neutrophil cytosolic factor 1 (NCF1/p47-phox), which further interacts with the small G protein RAC1 and translocates to the membrane upon cell stimulation. This complex then activates flavocytochrome b, the membrane-integrated catalytic core of the enzyme system. The PX domain of this protein can bind phospholipid products of the PI(3) kinase, which suggests its role in PI(3) kinase-mediated signaling events. The phosphorylation of this protein was found to negatively regulate the enzyme activity. Alternatively spliced transcript variants encoding distinct isoforms have been observed.
Clinical significance
GWAS studies showed that Crohn's disease patient with certain SNPs in NCF4 are more susceptible to get Crohn's disease. Crohn's patient with rs4821544 variants showed a decreased reactive oxygen species after stimulation with GM-CSF which is a proinflammtory cytokine.
Interactions
Neutrophil cytosolic factor 4 has been shown to interact with Ku70, Neutrophil cytosolic factor 1 and Moesin. |
https://en.wikipedia.org/wiki/Pearls%20in%20Graph%20Theory | Pearls in Graph Theory: A Comprehensive Introduction is an undergraduate-level textbook on graph theory by Nora Hartsfield and Gerhard Ringel. It was published in 1990 by Academic Press with a revised edition in 1994 and a paperback reprint of the revised edition by Dover Books in 2003. The Basic Library List Committee of the Mathematical Association of America has suggested its inclusion in undergraduate mathematics libraries.
Topics
The "pearls" of the title include theorems, proofs, problems, and examples in graph theory. The book has ten chapters; after an introductory chapter on basic definitions, the remaining chapters material on graph coloring; Hamiltonian cycles and Euler tours; extremal graph theory; subgraph counting problems including connections to permutations, derangements, and Cayley's formula; graph labelings; planar graphs, the four color theorem, and the circle packing theorem; near-planar graphs; and graph embedding on topological surfaces.
The book also includes several unsolved problems such as the Oberwolfach problem on covering complete graphs by cycles, the characterization of magic graphs, and Ringel's Earth–Moon problem on coloring biplanar graphs.
Despite its subtitle "A comprehensive introduction", the book is short and its selection of topics reflects author Ringel's personal interests.. Important topics in graph theory that are not coveredinclude the symmetries of graphs, cliques, connections between graphs and linear algebra including adjacency matrices, algebraic graph theory and spectral graph theory, connectivity of a graph (or even biconnected components), Hall's marriage theorem, line graphs, interval graphs, and the theory of tournaments. There is also only one chapter of coverage on algorithms and real-world applications of graph theory. Also, the book omits "difficult or long proofs".
Audience and reception
The book is written as a lower-level undergraduate textbook and recommends that students using it have previously tak |
https://en.wikipedia.org/wiki/Comprehensive%20medication%20management | Comprehensive medication management (CMM) is the process of delivering clinical services aimed at ensuring a patient's medications (including prescribed, over-the-counter, vitamins, supplements and alternative) are individually assessed to determine that they have an appropriate reason for use, are efficacious for treating their respective medical condition or helping meet defined patient or clinical goals, are safe considering comorbidities and other medications being taken, and are able to be taken by the patient as intended without difficulty.
CMM is generally delivered directly by a pharmacist in a clinic setting, in collaboration with other health care providers including primary care providers, nurse care coordinators, social workers, dietitians, diabetes educators, behavioral health, and more. Pharmacists who conduct CMM generally have a collaborative practice agreement with a physician at their site of practice, allowing them to prescribe and adjust medications for several chronic conditions including high blood pressure, diabetes, high cholesterol, asthma, chronic-obstructive pulmonary disease, anticoagulation management and smoking cessation among others.
Beyond assessing a patient's medications in their present state, the pharmacist delivering CMM will work with the patient to develop goals for the utilization of drug therapy, and schedule continual follow-up to ensure these goals are met. A key component of CMM is patient-centeredness, referring to the process by which the patient understands and agrees to the goals of therapy and actively participates in the plan for care. |
https://en.wikipedia.org/wiki/Rufus%20Bowen | Robert Edward "Rufus" Bowen (23 February 1947 – 30 July 1978) was an internationally known professor in the Department of Mathematics at the University of California, Berkeley, who specialized in dynamical systems theory. Bowen's work dealt primarily with axiom A systems, but the methods he used while exploring topological entropy, symbolic dynamics, ergodic theory, Markov partitions, and invariant measures "have application far beyond the axiom A systems for which they were invented." The Bowen Lectures at the University of California, Berkeley, are given in his honor.
Life
Robert Edward Bowen was born in Vallejo, California, to Marie DeWinter Bowen, a school teacher, and Emery Bowen, a Travis Air Force Base budget officer, but he grew up fifteen miles away in Fairfield, California, where he attended the public schools and graduated from Armijo High School in 1964. His senior yearbook documents that he played two years of varsity basketball, was a member of the science, math, and language clubs, and was President of the senior class. During his first three years of high school, he finished 102nd, 7th, and 2nd among Californians in the MAA (Mathematical Association of America) mathematics test. In 1964, he finished second in the Westinghouse (now Intel) Science Talent Search in Washington, D.C. During his senior year in high school, his first published paper appeared in the American Mathematical Monthly.
As an undergraduate at the University of California, Berkeley, Bowen was a Putnam Fellow in 1964 and 1965. He earned his bachelor's degree from Berkeley where he received, on 15 June 1967, the University Medal as the most distinguished graduating senior. He also received the Dorothea Klumpke Roberts Prize (as top mathematics student) and the Mathematics Department Citation. At this time, Bowen was quoted as saying, "I'm slightly involved in political activity." He was "active in organizations devoted to preventing nuclear war."
Bowen married Carol Twito of Ha |
https://en.wikipedia.org/wiki/Zilch%20%28electromagnetism%29 | In physics, zilch (or zilches) is a set of ten conserved quantities of the source-free electromagnetic field, which were discovered by Lipkin in 1964. The name refers to the fact that the zilches are only conserved in regions free of electric charge, and therefore have limited physical significance. One of the conserved quantities (Lipkin's ) has an intuitive physical interpretation and is also known as optical chirality.
In particular, first, Daniel M. Lipkin observed that if he defined the quantities
then the free Maxwell equations imply that
which implies that the quantity is constant. This time-independent quantity is known as the zilch, but, more precisely, it is one of the ten zilches discovered by Lipkin (see below). Nowadays, the quantity is widely known as optical chirality (up to a factor of 1/2). The quantity is the spatial density of optical chirality, while is the optical chirality flux. Generalizing the aforementioned differential conservation law for , Lipkin found other nine conservation laws, all unrelated to the stress–energy tensor. He collectively named these ten conserved quantities the zilch (nowadays, they are also called the zilches) because of the apparent lack of physical significance.
The zilch(es) are often described in terms of the zilch tensor, . The latter can be expressed using the dual electromagnetic tensor as
. The zilch tensor is symmetric under the exchange of its first two indices, and , while it is also traceless with respect to any two indices, as well as divergence-free with respect to any index.
The conservation law means that the following ten quantities are time-independent:
These are the ten zilches (or just the zilch) discovered by Lipkin. In fact, only nine zilches are independent. The time-independent quantity is known as the 00-zilch and is equal to the aforementioned optical chirality (). In general, the time-independent quantity is known as the -zilch (the indices run from 0 to 3) and it is |
https://en.wikipedia.org/wiki/Freiman%27s%20theorem | In additive combinatorics, Freiman's theorem is a central result which indicates the approximate structure of sets whose sumset is small. It roughly states that if is small, then can be contained in a small generalized arithmetic progression.
Statement
If is a finite subset of with , then is contained in a generalized arithmetic progression of dimension at most and size at most , where and are constants depending only on .
Examples
For a finite set of integers, it is always true that
with equality precisely when is an arithmetic progression.
More generally, suppose is a subset of a finite proper generalized arithmetic progression of dimension such that for some real . Then , so that
History of Freiman's theorem
This result is due to Gregory Freiman (1964, 1966). Much interest in it, and applications, stemmed from a new proof by Imre Z. Ruzsa (1994). Mei-Chu Chang proved new polynomial estimates for the size of arithmetic progressions arising in the theorem in 2002. The current best bounds were provided by Tom Sanders.
Tools used in the proof
The proof presented here follows the proof in Yufei Zhao's lecture notes.
Plünnecke-Ruzsa inequality
Ruzsa covering lemma
The Ruzsa covering lemma states the following:
Let and be finite subsets of an abelian group with nonempty, and let be a positive real number. Then if , there is a subset of with at most elements such that .
This lemma provides a bound on how many copies of one needs to cover , hence the name. The proof is essentially a greedy algorithm:
Proof: Let be a maximal subset of such that the sets for are all disjoint. Then , and also , so . Furthermore, for any , there is some such that intersects , as otherwise adding to contradicts the maximality of . Thus , so .
Freiman homomorphisms and the Ruzsa modeling lemma
Let be a positive integer, and and be abelian groups. Let and . A map is a Freiman -homomorphism if
whenever for any .
If in addition is a bijection an |
https://en.wikipedia.org/wiki/Fieldata | FIELDATA (also written as Fieldata) was a pioneering computer project run by the US Army Signal Corps in the late 1950s that intended to create a single standard (as defined in MIL-STD-188A/B/C) for collecting and distributing battlefield information. In this respect it could be thought of as a generalization of the US Air Force's SAGE system that was being created at about the same time.
Unlike SAGE, FIELDATA was intended to be much larger in scope, allowing information to be gathered from any number of sources and forms. Much of the FIELDATA system was the specifications for the format the data would take, leading to a character set that would be a huge influence on ASCII a few years later. FIELDATA also specified the message formats and even the electrical standards for connecting FIELDATA-standard machines together.
Another part of the FIELDATA project was the design and construction of computers at several different scales, from data-input terminals at one end, to theatre-wide data processing centers at the other. Several FIELDATA-standard computers were built during the lifetime of the project, including the transportable MOBIDIC from Sylvania, and the BASICPAC and LOGICPAC from Philco. Another system, ARTOC, was intended to provide graphical output (in the form of photographic slides), but was never completed.
Because FIELDATA did not specify codes for interconnection and data transmission control, different systems (like "STANDARD FORM", "COMLOGNET Common language code", "SACCOMNET (465L) Control Code") used different control functions. Intercommunication between them was difficult.
FIELDATA is the original character set used internally in UNIVAC computers of the 1100 series, each six-bit character contained in six sequential bits of the 36-bit word of that computer. The direct successor to the UNIVAC 1100 is the Unisys 2200 series computers, which used FIELDATA (although ASCII is now also common with each character encoded in 1/4 of a word, or 9 bits). |
https://en.wikipedia.org/wiki/Continuous%20Plankton%20Recorder | The Continuous Plankton Recorder (CPR) Survey is one of the longest running marine biological monitoring programmes in the world. Started in 1931 by Sir Alister Hardy and Sir Cyril Lucas, the Survey provides marine scientists and policy-makers with measures of plankton communities, coupled with ocean physical, biological and chemical observations, on a pan-oceanic scale. The Survey is a globally recognised leader on the impacts of environmental change on the health of our oceans.
Today the CPR Survey is operated by the Marine Biological Association (MBA), located in Plymouth, UK. Uniquely, the CPR Survey's methods of sampling and plankton analysis remain unchanged since 1948, providing a spatio-temporally comprehensive > 70 year record of marine plankton dynamics.
Sampling and analysis
The CPR is a torpedo-shaped plankton sampling instrument designed to be towed from merchant ships, or ships of opportunity, on their normal sailings. As of December 31, 2020, the Survey had towed a total of by 278 ships since the survey's inception. In March 2021 the Survey was awarded a Guinness World Record for the 'Greatest Distance Sampled by a Marine Survey' equivalent to 326 circumnavigations of the world – over the course of its almost-90-year history.
The greatest distance sampled in a single year was , logged in 2014.
CPR's have been towed in all oceans of the world, the Mediterranean, Baltic and North Seas and in freshwater lakes. However, CPR sampling primarily focuses on the northwest European shelf and the Northeast and Northwest Atlantic, with these regions undergoing monthly sampling; regular sampling is also now carried out in the North Pacific. Additionally, sister CPR surveys, not conducted by the MBA but using similar methodology, are operated from the United States, Australia, India, Cyprus, Brazil, South Africa, France and Japan, as part of the Global Alliance of Continuous Plankton Recorder Surveys.
The CPR is towed at a depth of approximately 10 metres. W |
https://en.wikipedia.org/wiki/Google%20Silicon%20Initiative | The Google Open Silicon Initiative is an initiative launched by the Google Hardware Toolchains team to democratize access to custom silicon design. Google has partnered with SkyWater Technology and GlobalFoundries to open-source their Process Design Kits for 180nm, 130nm and 90nm process. This initiative provides free software tools for chip designers to create, verify and test virtual chip circuit designs before they are physically produced in factories. The aim of the initiative is to reduce the cost of chip designs and production, which will benefit DIY enthusiasts, researchers, universities, and chip startups. The program has gained more partners, including the US Department of Defense, which injected $15 million in funding to SkyWater, one of the manufacturers supporting the program. |
https://en.wikipedia.org/wiki/Protein%20phosphatase%202 | Protein phosphatase 2 (PP2), also known as PP2A, is an enzyme that in humans is encoded by the PPP2CA gene. The PP2A heterotrimeric protein phosphatase is ubiquitously expressed, accounting for a large fraction of phosphatase activity in eukaryotic cells. Its serine/threonine phosphatase activity has a broad substrate specificity and diverse cellular functions. Among the targets of PP2A are proteins of oncogenic signaling cascades, such as Raf, MEK, and AKT, where PP2A may act as a tumor suppressor.
Structure and function
PP2A consists of a dimeric core enzyme composed of the structural A and catalytic C subunits, and a regulatory B subunit. When the PP2A catalytic C subunit associates with the A and B subunits several species of holoenzymes are produced with distinct functions and characteristics. The A subunit, a founding member of the HEAT repeat protein family (huntingtin, EF3, PP2A, TOR1), is the scaffold required for the formation of the heterotrimeric complex. When the A subunit binds it alters the enzymatic activity of the catalytic subunit, even if the B subunit is absent. While C and A subunit sequences show remarkable sequence conservation throughout eukaryotes, regulatory B subunits are more heterogeneous and are believed to play key roles in controlling the localization and specific activity of different holoenzymes. Multicellular eukaryotes express four classes of variable regulatory subunits: B (PR55), B′ (B56 or PR61), B″ (PR72), and B‴ (PR93/PR110), with at least 16 members in these subfamilies. In addition, accessory proteins and post-translational modifications (such as methylation) control PP2A subunit associations and activities.
The two catalytic metal ions located in PP2A's active site are manganese.
Drug discovery
PP2 has been identified as a potential biological target to discover drugs to treat Parkinson's disease and Alzheimer's disease, however as of 2014 it was unclear which isoforms would be most beneficial to target, and also |
https://en.wikipedia.org/wiki/Douglas%20Woodall | Douglas Robert Woodall (born November 1943 in Stoke-on-Trent) is a British mathematician and psephologist. He studied mathematics at the University of Cambridge, and earned his Ph.D. at the University of Nottingham in 1969, his thesis being "Some results in combinatorial mathematics". He worked in the Department of Mathematics from 1969 until his retirement in 2007, as researcher, lecturer, associate professor and reader. He devised the later-no-harm criterion, a voting system criterion that is considered important in the comparison of electoral systems. Woodall has done a lot of work exploring the monotonicity criterion. He also contributed to the problem of fair cake-cutting, for example, by presenting an algorithm for finding a super-proportional division.
Selected publications
See also
Woodall's conjecture on dicuts and dijoins in directed graphs |
https://en.wikipedia.org/wiki/Thirring%E2%80%93Wess%20model | The Thirring–Wess model or Vector Meson model
is an exactly solvable quantum field theory, describing the interaction of a Dirac field with a vector field in dimension two.
Definition
The Lagrangian density is made of three terms:
the free vector field is described by
for and the boson mass must be
strictly positive;
the free fermion field
is described by
where the fermion mass can be positive or zero.
And the interaction term is
Although not required to define the massive vector field, there can be also a gauge-fixing term
for
There is a remarkable difference between the case and the case : the latter requires a field renormalization to absorb divergences of the two point correlation.
History
This model was introduced by Thirring and Wess as a version of the Schwinger model with a vector mass term in the Lagrangian .
When the fermion is massless (), the model is exactly solvable. One solution was found, for , by Thirring and Wess
using a method introduced by Johnson for the Thirring model; and, for , two different solutions were given by Brown and Sommerfield. Subsequently Hagen showed (for , but it turns out to be true for ) that there is a one parameter family of solutions. |
https://en.wikipedia.org/wiki/Threshold%20potential | In electrophysiology, the threshold potential is the critical level to which a membrane potential must be depolarized to initiate an action potential. In neuroscience, threshold potentials are necessary to regulate and propagate signaling in both the central nervous system (CNS) and the peripheral nervous system (PNS).
Most often, the threshold potential is a membrane potential value between –50 and –55 mV, but can vary based upon several factors. A neuron's resting membrane potential (–70 mV) can be altered to either increase or decrease likelihood of reaching threshold via sodium and potassium ions. An influx of sodium into the cell through open, voltage-gated sodium channels can depolarize the membrane past threshold and thus excite it while an efflux of potassium or influx of chloride can hyperpolarize the cell and thus inhibit threshold from being reached.
Discovery
Initial experiments revolved around the concept that any electrical change that is brought about in neurons must occur through the action of ions. The German physical chemist Walther Nernst applied this concept in experiments to discover nervous excitability, and concluded that the local excitatory process through a semi-permeable membrane depends upon the ionic concentration. Also, ion concentration was shown to be the limiting factor in excitation. If the proper concentration of ions was attained, excitation would certainly occur. This was the basis for discovering the threshold value.
Along with reconstructing the action potential in the 1950s, Alan Lloyd Hodgkin and Andrew Huxley were also able to experimentally determine the mechanism behind the threshold for excitation. It is known as the Hodgkin–Huxley model. Through use of voltage clamp techniques on a squid giant axon, they discovered that excitable tissues generally exhibit the phenomenon that a certain membrane potential must be reached in order to fire an action potential. Since the experiment yielded results through the observation o |
https://en.wikipedia.org/wiki/Mesotrophic%20soil | Mesotrophic soils are soils with a moderate inherent fertility. An indicator of soil fertility is its base status, which is expressed as a ratio relating the major nutrient cations (calcium, magnesium, potassium and sodium) found there to the soil's clay percentage. This is commonly expressed in hundredths of a mole of cations per kilogram of clay, i.e. cmol (+) kg−1 clay.
See also
Mesotrophic lake
Types of soil |
https://en.wikipedia.org/wiki/Artin%E2%80%93Verdier%20duality | In mathematics, Artin–Verdier duality is a duality theorem for constructible abelian sheaves over the spectrum of a ring of algebraic numbers, introduced by , that generalizes Tate duality.
It shows that, as far as etale (or flat) cohomology is concerned, the ring of integers in a number field behaves like a 3-dimensional mathematical object.
Statement
Let X be the spectrum of the ring of integers in a totally imaginary number field K, and F a constructible étale abelian sheaf on X. Then the Yoneda pairing
is a non-degenerate pairing of finite abelian groups, for every integer r.
Here, Hr(X,F) is the r-th étale cohomology group of the scheme X with values in F, and Extr(F,G) is the group of r-extensions of the étale sheaf G by the étale sheaf F in the category of étale abelian sheaves on X. Moreover, Gm denotes the étale sheaf of units in the structure sheaf of X.
proved Artin–Verdier duality for constructible, but not necessarily torsion sheaves. For such a sheaf F, the above pairing induces isomorphisms
where
Finite flat group schemes
Let U be an open subscheme of the spectrum of the ring of integers in a number field K, and F a finite flat commutative group scheme over U. Then the cup product defines a non-degenerate pairing
of finite abelian groups, for all integers r.
Here FD denotes the Cartier dual of F, which is another finite flat commutative group scheme over U. Moreover, is the r-th flat cohomology group of the scheme U with values in the flat abelian sheaf F, and is the r-th flat cohomology with compact supports of U with values in the flat abelian sheaf F.
The flat cohomology with compact supports is defined to give rise to a long exact sequence
The sum is taken over all places of K, which are not in U, including the archimedean ones. The local contribution Hr(Kv, F) is the Galois cohomology of the Henselization Kv of K at the place v, modified a la Tate:
Here is a separable closure of |
https://en.wikipedia.org/wiki/Carnivore%20%28software%29 | Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation (FBI) that was designed to monitor email and electronic communications. It used a customizable packet sniffer that could monitor all of a target user's Internet traffic. Carnivore was implemented in October 1997. By 2005 it had been replaced with improved commercial software.
Development
Carnivore grew out of an earlier FBI project called "Omnivore", which itself replaced an older undisclosed (at the time) surveillance tool migrated from the US Navy by FBI Director of Integrity and Compliance, Patrick W. Kelley. In September 1998, the FBI's Data Intercept Technology Unit (DITU) in Quantico, Virginia, launched a project to migrate Omnivore from Sun's Solaris operating system to a Windows NT platform. This was done to facilitate the miniaturization of the system and support a wider range of personal computer (PC) equipment. The migration project was called "Triple Phoenix" and the resulting system was named "Carnivore."
Configuration
The Carnivore system was a Microsoft Windows-based workstation with packet-sniffing software and a removable Jaz disk drive. This computer must be physically installed at an Internet service provider (ISP) or other location where it can "sniff" traffic on a LAN segment to look for email messages in transit. The technology itself was not highly advanced—it used a standard packet sniffer and straightforward filtering. No monitor or keyboard was present at the ISP. The critical components of the operation were the filtering criteria. Copies of every packet were made, and required filtering at a later time. To accurately match the appropriate subject, an elaborate content model was developed.
An independent technical review of Carnivore for the Justice Department was prepared in 2000.
Controversy
Several groups and scholars expressed concern regarding the implementation, usage, and possible abuses of Carnivore. In July 2000, the Electronic F |
https://en.wikipedia.org/wiki/Ulan%20%28Rivermaya%20song%29 | "Ulan" () is the first single released by Filipino rock band Rivermaya and also the first single released on their debut self-titled album in 1995. The song was produced by Chito S. Roño and Lizza G. Nakpil.
The song was written by rhythm guitarist and keyboardist Rico Blanco and Nathan Azarcon, the band's bassist. Blanco's keyboard solo was featured on the instrumental break. On the intro, the guitars were played by Blanco and Perf de Castro.
Personnel
Bamboo Mañalac: vocals
Rico Blanco: keyboards, rhythm guitar, backing vocals
Perf de Castro: lead guitar
Nathan Azarcon: bass guitar
Mark Escueta: drums, percussion
Cover versions
The song was covered by Janine Teñoso for the 2019 film of the same name. |
https://en.wikipedia.org/wiki/Virtual%20assistant%20privacy | Virtual assistants are software technology that assist users complete various tasks. Well known virtual assistants include Amazon Alexa, and Siri, produced by Apple. Other companies, such as Google and Microsoft, also have virtual assistants. There are privacy issues concerning what information can go to the third party corporations that operate virtual assistants and how this data can potentially be used.
Because virtual assistants similarly to robots or other artificial intelligence are often considered "nurturing" bodies, consumers may overlook potential controversies and value their convenience more than their privacy. When forming relationships with devices, humans tend to become closer to those that perform humanly functions, which is what virtual assistants do. In order to allow users both convenience and assistance, privacy by design and the Virtual Security Button (VS Button) propose methods in which both are possible.
One layer versus multilayer authentication
The Virtual Security Button, which would detect motion, has been proposed as a method of adding multilayer authentication to devices that currently only have a single layer; devices with single layer authentication solely require a voice to be activated. This voice could be any person, not necessarily the intended human, which makes the method unreliable. Multilayer authentication requires multiple layers of security to authorize a virtual assistant to work. The Virtual Security button would provide a second layer of authentication for devices, such as Alexa, that would be triggered by both movement and the voice combined.
A specific instance in which there are issues with the lack of verification necessary to unlock access to the virtual assistants and to give them commands is when an Amazon Alexa is left in a living quarters unattended. Currently, there is only one layer of authentication which is the voice; there is not a layer that requires the owner of the virtual assistant to be present. Th |
https://en.wikipedia.org/wiki/Human%20radiation%20experiments | [[File:Joseph Hamilton with radio sodium experiment 97401413.jpeg|thumb|250px|upright|Joseph G. Hamilton was the primary researcher for the human plutonium experiments done at U.C. San Francisco from 1944 to 1947. Hamilton wrote a memo in 1950 discouraging further human experiments because the AEC would be left open "to considerable criticism," since the experiments as proposed had "a little of the Buchenwald touch."<ref name=Sea>"The Media & Me: [The Radiation Story No One Would Touch]", Geoffrey Sea, Columbia Journalism Review, March/April 1994.</ref>]]
Since the discovery of ionizing radiation, a number of human radiation experiments have been performed to understand the effects of ionizing radiation and radioactive contamination on the human body, specifically with the element plutonium.
Experiments performed in the United States
Numerous human radiation experiments have been performed in the United States, many of which were funded by various U.S. government agencies such as the United States Department of Defense, the United States Atomic Energy Commission, and the United States Public Health Service. Also involved were several universities, most notably the Vanderbilt University involved in several of them. The experiments included:
directly injecting plutonium and other radioactive elements to mostly terminal patients without their consent.
feeding radioactive traces to children
enlisting doctors to administer radioactive iron to impoverished pregnant women
exposing U.S. soldiers and prisoners to high levels of radiation
irradiating the testicles of prisoners, which caused severe birth defects
exhuming bodies from graveyards to test them for radiation (without the consent of the families of the deceased)
On January 15, 1994, President Bill Clinton formed the Advisory Committee on Human Radiation Experiments (ACHRE), chaired by Ruth FadenACHRE homepage, archived of the Johns Hopkins Berman Institute of Bioethics. One of the primary motivating factor |
https://en.wikipedia.org/wiki/Stress%20space | In continuum mechanics, Haigh–Westergaard stress space, or simply stress space is a 3-dimensional space in which the three spatial axes represent the three principal stresses of a body subject to stress. This space is named after Bernard Haigh and Harold M. Westergaard.
In mathematical terms, H-W space can also be interpreted (understood) as a set of numerical markers of stress tensors orbits (with respect to proper rotations group – special orthogonal group SO3); every point of H-W space represents one orbit.
Functions of the principal stresses, such as the yield function, can be represented by surfaces in stress space''. In particular, the surface represented by von Mises yield function is a right circular cylinder, equiaxial to each of the three stress axes.
In 2-dimensional models, stress space''' reduces to a plane and the von Mises yield surface reduces to an ellipse. |
https://en.wikipedia.org/wiki/Solving%20the%20Riddle%20of%20Phyllotaxis | Solving the Riddle of Phyllotaxis: Why the Fibonacci Numbers and the Golden Ratio Occur in Plants is a book on the mathematics of plant structure, and in particular on phyllotaxis, the arrangement of leaves on plant stems. It was written by Irving Adler, and published in 2012 by World Scientific. The Basic Library List Committee of the Mathematical Association of America has suggested its inclusion in undergraduate mathematics libraries.
Background
Irving Adler (1913–2012) was known as a peace protester, schoolteacher, and children's science book author before, in 1961, earning a doctorate in abstract algebra. Even later in his life, Adler began working on phyllotaxis, the mathematical structure of leaves on plant stems. This book, which collects several of his papers on the subject previously published in journals and edited volumes, is the last of his 85 books to be published before his death.
Topics
Different plants arrange their leaves differently, for instance on alternating sides of the plant stem, or rotated from each other by other fractions of a full rotation between consecutive leaves. In these patterns, rotations by 1/2 of an angle, 1/3 of an angle, 3/8 of an angle, or 5/8 of an angle are common, and it does not appear to be coincidental that the numerators and denominators of these fractions are all Fibonacci numbers. Higher Fibonacci numbers often appear in the number of spiral arms in the spiraling patterns of sunflower seed heads, or the helical patterns of pineapple cells. The theme of Adler's work in this area, in the papers reproduced in this volume, was to find a mathematical model for plant development that would explain these patterns and the occurrence of the Fibonacci numbers and the golden ratio within them.
The papers are arranged chronologically; they include four journal papers from the 1970s, another from the late 1990s, and a preface and book chapter also from the 1990s. Among them, the first is the longest, and reviewer Adhemar Bult |
https://en.wikipedia.org/wiki/Permutation | In mathematics, a permutation of a set is, loosely speaking, an arrangement of its members into a sequence or linear order, or if the set is already ordered, a rearrangement of its elements. The word "permutation" also refers to the act or process of changing the linear order of an ordered set.
For example, there are six permutations (orderings) of the set {1,2,3}: written as tuples, they are (1,2,3), (1,3,2), (2,1,3), (2,3,1), (3,1,2), and (3,2,1). Anagrams of a word whose letters are all different are also permutations: the letters are already ordered in the original word, and the anagram reorders them. The study of permutations of finite sets is an important topic in combinatorics and group theory.
Permutations are used in almost every branch of mathematics and in many other fields of science. In computer science, they are used for analyzing sorting algorithms; in quantum physics, for describing states of particles; and in biology, for describing RNA sequences.
The number of permutations of distinct objects is factorial, usually written as , which means the product of all positive integers less than or equal to .
Formally, a permutation of a set is defined as a bijection from to itself. That is, it is a function from to for which every element occurs exactly once as an image value. Such a function is equivalent to the rearrangement of the elements of in which each element i is replaced by the corresponding . For example, the permutation (3,1,2) is described by the function defined as
.
The collection of all permutations of a set form a group called the symmetric group of the set. The group operation is the composition of functions (performing one rearrangement after the other), which results in another function (rearrangement). The properties of permutations do not depend on the nature of the elements being permuted, only on their number, so one often considers the standard set .
In elementary combinatorics, the -permutations, or partial permut |
https://en.wikipedia.org/wiki/Pathophysiology%20%28journal%29 | Pathophysiology is a quarterly peer-reviewed medical journal covering pathology and pathophysiology. It was established in 1994 and was originally published by Elsevier on behalf of the International Society for Pathophysiology. It was established by Toshikazu Yoshikawa, who was also its first editor-in-chief. The current editor-in-chief is J. Steven Alexander (Louisiana State University Health Sciences Center in Shreveport). The journal is abstracted and indexed in Chemical Abstracts, EMBASE, and Scopus. It is now published by MDPI since 2020. |
https://en.wikipedia.org/wiki/International%20Year%20of%20Biodiversity | The International Year of Biodiversity (IYB) was a year-long celebration of biological diversity and its importance, taking place internationally in 2010. Coinciding with the date of the 2010 Biodiversity Target, the year was declared by the 61st session of the United Nations General Assembly in 2006.
It was meant to help raise awareness of the importance of biodiversity through activities and events, to influence decision makers, and "to elevate biological diversity nearer to the top of the political agenda".
Background
The United Nations General Assembly declared 2010 as the International Year of Biodiversity (Resolution 61/203). This year coincided with the 2010 Biodiversity Target adopted by the Parties to the Convention on Biological Diversity and by Heads of State and government at the World Summit for Sustainable Development in Johannesburg in 2002.
The Secretariat of the Convention on Biological Diversity (CBD), based in Montreal, Canada, was coordinating the International Year of Biodiversity campaign.
Established at the Earth Summit in Rio de Janeiro in 1992, the Convention on Biological Diversity is an international treaty for the conservation and sustainable use of biodiversity and the equitable sharing of the benefits of biodiversity. The CBD has near-universal participation, with 193 Parties.
Main goals in UN view
The main goals of the International Year of Biodiversity were to:
Enhance public awareness of the importance of conserving biodiversity and of the underlying threats to biodiversity
Raise awareness of the accomplishments to save biodiversity that had been realized by communities and governments
Promote innovative solutions to reduce the threats to biodiversity
Encourage individuals, organizations and governments to act immediately to halt biodiversity loss
Start dialog between stakeholders for what to do in the post-2010 period
Slogan
Biodiversity is life. Biodiversity is our life.
See also
United Nations Decade on Biodiversity |
https://en.wikipedia.org/wiki/TwoOStwo | twoOStwo was a commercial software product developed by Parallels Software Studio (prior to its acquisition by SWsoft). The workstation software consisted of a virtual machine suite for Intel x86-compatible computers which allowed the creation and execution of multiple x86 virtual computers simultaneously. Each virtual machine instance could execute its own guest operating system including Windows, Linux, OS/2 and BSD variants.
Description
The computer and operating system instance that executes the twoOStwo process is referred to as the host machine. Instances of operating systems running inside a virtual machine are referred to as guest virtual machines. Like an emulator, twoOStwo provides a completely virtualized set of hardware to the guest operating system; for example, irrespective of make and model of the physical network adapter, the guest machine will see a Novell/Eagle NE2000 or Realtek RTL8029(AS) network adapter. twoOStwo virtualizes all devices within the virtual environment, including the video adapter, network adapter, and hard disk adapters. It also provides pass-through drivers for serial and parallel devices.
Because all guest virtual machines use the same hardware drivers irrespective of the actual hardware on the host computer, virtual machine instances are highly portable between computers. For example, a running virtual machine can be stopped, copied to another physical computer, and started.
Implementation
Conventional emulators like Bochs emulate the microprocessor, executing each guest CPU instruction by calling a software subroutine on the host machine that simulates the function of that CPU instruction. This level of abstraction allows the guest machine to run on host machines with a different type of microprocessor, but is also very slow.
A more efficient approach consists in software debugger technique. Some parts of the code are executed natively on the real processor; on 'bad' instructions, there are software interrupts that break |
https://en.wikipedia.org/wiki/MECIPT | The Timişoara Polytechnic Institute Electronic Computer (Romanian: Mașina Electronică de Calcul Institutul Politehnic Timişoara), known as MECIPT, is the name used for a family of computers built from 1961 to 1968 at the Polytechnic University of Timișoara in Romania.
MECIPT-1 was a first generation computer built by Iosif Kaufmann and Wilhelm Lowenfeld (1956–1962), a team joined in 1961 by Vasile Baltac. This was the second computer built in Romania after Victor Toma built the CIFA-1 in 1957, and the first in a Romanian university. MECIPT-2 (1962) and MECIPT-3 (1965) followed as second and third generation computer technology.
Parts of MECIPT 1 and 2 were exhibited in the Museum of Banat. and are now in the UPT Museum In 2011, a 50th anniversary celebration was organized in Timişoara to recall the importance of the MECIPT computers to Romania. |
https://en.wikipedia.org/wiki/Isotopic%20labeling | Isotopic labeling (or isotopic labelling) is a technique used to track the passage of an isotope (an atom with a detectable variation in neutron count) through a reaction, metabolic pathway, or cell. The reactant is 'labeled' by replacing specific atoms by their isotope. The reactant is then allowed to undergo the reaction. The position of the isotopes in the products is measured to determine the sequence the isotopic atom followed in the reaction or the cell's metabolic pathway. The nuclides used in isotopic labeling may be stable nuclides or radionuclides. In the latter case, the labeling is called radiolabeling.
In isotopic labeling, there are multiple ways to detect the presence of labeling isotopes; through their mass, vibrational mode, or radioactive decay. Mass spectrometry detects the difference in an isotope's mass, while infrared spectroscopy detects the difference in the isotope's vibrational modes. Nuclear magnetic resonance detects atoms with different gyromagnetic ratios. The radioactive decay can be detected through an ionization chamber or autoradiographs of gels.
An example of the use of isotopic labeling is the study of phenol (C6H5OH) in water by replacing common hydrogen (protium) with deuterium (deuterium labeling). Upon adding phenol to deuterated water (water containing D2O in addition to the usual H2O), the substitution of deuterium for the hydrogen is observed in phenol's hydroxyl group (resulting in C6H5OD), indicating that phenol readily undergoes hydrogen-exchange reactions with water. Only the hydroxyl group is affected, indicating that the other 5 hydrogen atoms do not participate in the exchange reactions.
Isotopic tracer
An isotopic tracer, (also "isotopic marker" or "isotopic label"), is used in chemistry and biochemistry to help understand chemical reactions and interactions. In this technique, one or more of the atoms of the molecule of interest is substituted for an atom of the same chemical element, but of a different isotope |
https://en.wikipedia.org/wiki/Yang%E2%80%93Baxter%20equation | In physics, the Yang–Baxter equation (or star–triangle relation) is a consistency equation which was first introduced in the field of statistical mechanics. It depends on the idea that in some scattering situations, particles may preserve their momentum while changing their quantum internal states. It states that a matrix , acting on two out of three objects, satisfies
In one-dimensional quantum systems, is the scattering matrix and if it satisfies the Yang–Baxter equation then the system is integrable. The Yang–Baxter equation also shows up when discussing knot theory and the braid groups where corresponds to swapping two strands. Since one can swap three strands two different ways, the Yang–Baxter equation enforces that both paths are the same.
It takes its name from independent work of C. N. Yang from 1968, and R. J. Baxter from 1971.
General form of the parameter-dependent Yang–Baxter equation
Let be a unital associative algebra. In its most general form, the parameter-dependent Yang–Baxter equation is an equation for , a parameter-dependent element of the tensor product (here, and are the parameters, which usually range over the real numbers ℝ in the case of an additive parameter, or over positive real numbers ℝ+ in the case of a multiplicative parameter).
Let for , with algebra homomorphisms determined by
The general form of the Yang–Baxter equation is
for all values of , and .
Parameter-independent form
Let be a unital associative algebra. The parameter-independent Yang–Baxter equation is an equation for , an invertible element of the tensor product . The Yang–Baxter equation is
where , , and .
With respect to a basis
Often the unital associative algebra is the algebra of endomorphisms of a vector space over a field , that is, . With respect to a basis of , the components of the matrices are written , which is the component associated to the map . Omitting parameter dependence, the component of the Yang–Baxter equation associate |
https://en.wikipedia.org/wiki/Network%20UPS%20Tools | Network UPS Tools (NUT) is a suite of software component designed to monitor power devices, such as uninterruptible power supplies, power distribution units, solar controllers and servers power supply units. Many brands and models are supported and exposed via a network protocol and standardized interface.
It follows a three-tier model with dozens of NUT device driver daemons that communicate with power-related hardware devices over selected media using vendor-specific protocols, the NUT server which represents the drivers on the network (defaulting to IANA registered port ) using the standardized NUT protocol, and NUT clients (running on same as the server, or on remote systems) which can manage the power devices and query their power states and other metrics for any applications, usually ranging from historic graphing and graceful shutdowns to orchestrated power failover and VM migration.
Based on NUT design and protocol, the project community authored "UPS management protocol", Informational RFC 9271, which was published by IETF in August 2022, and the IANA port number registry was updated to reflect it (even though this RFC is not formally an Internet Standard).
Clients maintained in the NUT codebase include , and for command-line actions, for relatively simple monitoring and graceful shutdowns (considering the amount of minimally required vs. total available power source units in the current server), for complex monitoring scenarios, for a simple web interface, a X11 desktop client, as well as C, C++ and Python libraries for third-party clients. Community projects include more clients and bindings for other languages.
Being a cross-platform project, NUT works on most Unix, BSD and Linux platforms with various system architectures, from embedded systems to venerable Solaris, HP-UX and AIX servers. There were also native Windows builds based on previous stable NUT release line, last being 2.6.5. This effort was revived after the NUT 2.8.0 release, bec |
https://en.wikipedia.org/wiki/Patch%20%28computing%29 | A patch is a set of changes to a computer program or its supporting data designed to update, fix, or improve it. This includes fixing security vulnerabilities and other bugs, with such patches usually being called bugfixes or bug fixes. Patches are often written to improve the functionality, usability, or performance of a program. The majority of patches are provided by software vendors for operating system and application updates.
Patches may be installed either under programmed control or by a human programmer using an editing tool or a debugger. They may be applied to program files on a storage device, or in computer memory. Patches may be permanent (until patched again) or temporary.
Patching makes possible the modification of compiled and machine language object programs when the source code is unavailable. This demands a thorough understanding of the inner workings of the object code by the person creating the patch, which is difficult without close study of the source code. Someone unfamiliar with the program being patched may install a patch using a patch utility created by another person who is the Admin. Even when the source code is available, patching makes possible the installation of small changes to the object program without the need to recompile or reassemble. For minor changes to software, it is often easier and more economical to distribute patches to users rather than redistributing a newly recompiled or reassembled program.
Although meant to fix problems, poorly designed patches can sometimes introduce new problems (see software regressions). In some special cases updates may knowingly break the functionality or disable a device, for instance, by removing components for which the update provider is no longer licensed.
Patch management is a part of lifecycle management, and is the process of using a strategy and plan of what patches should be applied to which systems at a specified time.
Types
Binary patches
Patches for proprietary softwar |
https://en.wikipedia.org/wiki/Formose%20reaction | The formose reaction, discovered by Aleksandr Butlerov in 1861, and hence also known as the Butlerov reaction, involves the formation of sugars from formaldehyde. The term formose is a portmanteau of formaldehyde and aldose.
Reaction and mechanism
The reaction is catalyzed by a base and a divalent metal such as calcium. The intermediary steps taking place are aldol reactions, reverse aldol reactions, and aldose-ketose isomerizations. Intermediates are glycolaldehyde, glyceraldehyde, dihydroxyacetone, and tetrose sugars. In 1959, Breslow proposed a mechanism for the reaction, consisting of the following steps:
The reaction exhibits an induction period, during which only the nonproductive Cannizzaro disproportionation of formaldehyde (to methanol and formate) occurs. The initial dimerization of formaldehyde to give glycolaldehyde (1) occurs via an unknown mechanism, possibly promoted by light or through a free radical process and is very slow. However, the reaction is autocatalytic: 1 catalyzes the condensation of two molecules of formaldehyde to produce an additional molecule of 1. Hence, even a trace (as low as 3 ppm) of glycolaldehyde is enough to initiate the reaction. The autocatalytic cycle begins with the aldol reaction of 1 with formaldehyde to make glyceraldehyde (2). An aldose-ketose isomerization of 2 forms dihydroxyacetone (3). A further aldol reaction of 3 with formaldehyde produces tetrulose (6), which undergoes another ketose-aldose isomerization to form aldotetrose 7 (either threose or erythrose). The retro-aldol reaction of 7 generates two molecules of 1, resulting in the net production of a molecule of 1 from two molecules of formaldehyde, catalyzed by 1 itself (autocatalysis). During this process, 3 can also react with 1 to form ribulose (4), which can isomerize to give rise to ribose (5), an important building block of ribonucleic acid.
The aldose-ketose isomerization steps are promoted by chelation to |
https://en.wikipedia.org/wiki/Ultrastructural%20identity | Ultrastructural identity is a concept in biology. It asserts that evolutionary lineages of eukaryotes in general and protists in particular can be distinguished by complements and arrangements of cellular organelles. These ultrastructural components can be visualized by electron microscopy.
The concept emerged following the application of electron microscopy to protists.
Protists
Early ultrastructural studies revealed that many previously accepted groupings of protists based on optical microscopy included organisms with differing cellular organelles. Those groups included amoebae, flagellates, heliozoa, radiolaria, sporozoa, slime molds, and chromophytic algae. They were deemed likely to be polyphyletic, and their inclusion in efforts to assemble a phylogenetic tree would cause confusion. As an example of this work, German cell biologist Christian Bardele established unexpected diversity with the simply organized heliozoa. His work made it evident that heliozoa were not monophyletic and subsequent studies revealed that the heliozoa was composed of seven types of organisms: actinophryids, centrohelids, ciliophryids, desmothoracids, dimporphids, gymnosphaerids and taxopodids.
A critical advance was made by British phycologist David Hibberd. He demonstrated that two types of chromophytic algae, previously presumed to be closely related, had different organizations that were revealed by electron microscopy. The number and organization of locomotor organelles differed (chrysophyte - two flagella; haptophyte - two flagella and haponema), the surfaces of which differed (chrysophyte - with tripartite flagellar hairs now regarded as apomorphic for stramenopiles; haptophyte - naked), as did the transitional zone between axoneme and basal body (chrysophyte with helix); as did flagellar anchorage systems; presence or absence of embellishments on the cell surface (chrysophyte - naked; haptophyte - with scales), plastids especially eyespot, location and functions of dictyosom |
https://en.wikipedia.org/wiki/Wakame | Wakame (Undaria pinnatifida) is a species of kelp native to cold, temperate coasts of the northwest Pacific Ocean. As an edible seaweed, it has a subtly sweet, but distinctive and strong flavour and texture. It is most often served in soups and salads.
Wakame has long been collected for food in East Asia, and sea farmers in Japan have cultivated wakame since the eighth century (Nara period).
Although native to cold temperate coastal areas of Japan, Korea, China, and Russia, it has established itself in temperate regions around the world, including New Zealand, the United States, Belgium, France, Great Britain, Spain, Italy, Argentina, Australia and Mexico. , the Invasive Species Specialist Group has listed the species on its list of 100 worst globally invasive species.
Names
The primary common name is derived from the Japanese name (, , , ).
In English, it can be also called sea mustard.
In Chinese, it is called (裙带菜) or (海帶芽)
In French, it is called or ('sea fern').
In Korean, it is called (미역).
Etymology
In Old Japanese, stood for edible seaweeds in general as opposed to standing for algae. In kanji, such as , and were applied to transcribe the word. Among seaweeds, wakame was likely most often eaten, therefore especially meant wakame. It expanded later to other seaweeds like kajime, hirome (kombu), arame, etc. Wakame is derived from + (, lit. 'young seaweed'). If this is a eulogistic prefix, the same as the of tamagushi, wakame likely stood for seaweeds widely in ancient ages. In the Man'yōshū, in addition to and (both are read as ), (, soft wakame) can be seen. Besides, (, lit. 'beautiful algae'), which often appeared in the , may be wakame depending on poems.
History in the West
The earliest appearance in Western documents is probably in Nippo Jisho (1603), as Vacame.
In 1867 the word wakame appeared in an English-language publication, A Japanese and English Dictionary, by James C. Hepburn.
Starting in the 1960s, the word wakame start |
https://en.wikipedia.org/wiki/George%20David%20Birkhoff%20Prize | The George David Birkhoff Prize in applied mathematics is awarded – jointly by the American Mathematical Society (AMS) and the Society for Industrial and Applied Mathematics (SIAM) – in honour of George David Birkhoff (1884–1944). It is currently awarded every three years for an outstanding contribution to: "applied mathematics in the highest and broadest sense". The recipient of the prize has to be a member of one of the awarding societies, as well as a resident of the United States of America, Canada or Mexico. The prize was endowed in 1967, first issued in 1968, and currently (2020) amounts to US$5,000.
Recipients
See also
List of mathematics awards
Prizes named after people
Notes
Awards established in 1968
Awards of the American Mathematical Society
Awards of the Society for Industrial and Applied Mathematics
Triennial events
Applied mathematics
North American awards
1968 establishments in North America |
https://en.wikipedia.org/wiki/Body%20cavity | A body cavity is any space or compartment, or potential space, in an animal body. Cavities accommodate organs and other structures; cavities as potential spaces contain fluid.
The two largest human body cavities are the ventral body cavity, and the dorsal body cavity. In the dorsal body cavity the brain and spinal cord are located.
The membranes that surround the central nervous system organs (the brain and the spinal cord, in the cranial and spinal cavities) are the three meninges. The differently lined spaces contain different types of fluid. In the meninges for example the fluid is cerebrospinal fluid; in the abdominal cavity the fluid contained in the peritoneum is a serous fluid.
In amniotes and some invertebrates the peritoneum lines their largest body cavity called the coelom.
Mammals
Mammalian embryos develop two body cavities: the intraembryonic coelom and the extraembryonic coelom (or chorionic cavity). The intraembryonic coelom is lined by somatic and splanchnic lateral plate mesoderm, while the extraembryonic coelom is lined by extraembryonic mesoderm. The intraembryonic coelom is the only cavity that persists in the mammal at term, which is why its name is often contracted to simply coelomic cavity. Subdividing the coelomic cavity into compartments, for example, the pericardial cavity / pericardium, where the heart develops, simplifies discussion of the anatomies of complex animals.
Cavitation in the early embryo is the process of forming the blastocoel, the fluid-filled cavity defining the blastula stage in non-mammals, or the blastocyst in mammals.
Human body cavities
The dorsal (posterior) cavity and the ventral (anterior) cavity are the largest body compartments.
The dorsal body cavity includes the cranial cavity, enclosed by the skull and contains the brain, and the spinal cavity, enclosed by the spine, and contains the spinal cord.
The ventral body cavity includes the thoracic cavity, enclosed by the ribcage and contains the lungs and he |
https://en.wikipedia.org/wiki/Climbing%20injuries | Injuries in rock climbing may occur due to falls, or due to overuse (see Sports injury). Injuries due to falls are relatively uncommon; the vast majority of injuries result from overuse, most often occurring in the fingers, elbows, and shoulders. Such injuries are often no worse than torn calluses, cuts, burns and bruises. However, overuse symptoms, if ignored, may lead to permanent damage (esp. to tendons, tendon sheaths, ligaments, and joint capsules).
Risk groups
The climbers most prone to overuse injuries are intermediate to expert within lead climbing or bouldering, since these disciplines are the most athletic in nature.
Overuse injuries in climbing
In terms of overuse injuries a British study found that:
40% occurred in the fingers
16% in the shoulders
12% in the elbows
5% in the knees
5% in the back
4% in the wrists
One injury that tend to be very common among climbers is Carpal tunnel syndrome. It is found in about 25% of climbers.
Finger injuries
604 injured rock climbers were prospectively evaluated from January 1998 to December 2001, due to the rapid growth of new complex finger trauma in the mid-1980s. Of the most frequent injuries, three out of four were related to the fingers: pulley injuries accounted for 20%, tendovaginitis for 7%, and joint capsular damage for 6.1%.
Pulleys
Damage to the flexor tendon pulleys that encircle and support the tendons that cross the finger joints is the most common finger injury within the sport (see climber's finger).
The main culprit for pulley related injuries is the common crimp grip, especially in the closed position. The crimp grip requires a near ninety-degree flexion of the middle finger joint, which produces a tremendous force load on the A2 pulley. Injuries to the A2 pulley can range from microscopic to partial tears and, in the worst case, complete ruptures. Some climbers report hearing a pop, which might be a sign of a significant tear or complete rupture, during an extremely heavy move (e.g. ti |
https://en.wikipedia.org/wiki/1992%E2%80%931993%20Jack%20in%20the%20Box%20E.%20coli%20outbreak | The 1992–1993 Jack in the Box E. coli outbreak occurred when the Escherichia coli O157:H7 bacterium (originating from contaminated beef patties) killed four children and infected 732 people across four states. The outbreak involved 73 Jack in the Box restaurants in California, Idaho, Washington, and Nevada, and has been described as "far and away the most infamous food poison outbreak in contemporary history." The majority of the affected were under 10 years old. Four children died and 178 others were left with permanent injury including kidney and brain damage.
On February 10, 1993, newly inaugurated President Bill Clinton participated in a televised town meeting program from the studios of WXYZ-TV in Detroit, Michigan. He fielded questions from the studio audience as well as studio audiences in Miami, Florida, and Seattle, Washington, and responded to questions from the parents of Riley Detwiler – the fourth and final child to die in the E. coli outbreak. The wide media coverage and scale of the outbreak were responsible for "bringing the exotic-sounding bacterium out of the lab and into the public consciousness," but it was not the first E. coli O157:H7 outbreak resulting from undercooked patties. The bacterium had previously been identified in an outbreak of food poisoning in 1982 (traced to undercooked burgers sold by McDonald's restaurants in Oregon and Michigan). Before the Jack in the Box incident, there had been 22 documented outbreaks in the United States resulting in 35 deaths.
Sources
On January 12, 1993, Phil Tarr, then a pediatric gastroenterologist at the University of Washington and Seattle's Children's Hospital, filed a report with the Washington State Department of Health (DOH) about a perceived cluster of children with bloody diarrhea and Hemolytic Uremic Syndrome (HUS) likely caused by E. coli O157:H7. Dr. Tarr contacted Dr. John Kobayashi, the Washington State Epidemiologist, who started the epidemiological trace-back, linking these cases to u |
https://en.wikipedia.org/wiki/Mycorestoration | Mycorestoration is the use of fungi to restore degraded environments. It is a multi-method approach to restore damaged habitats such as oil spill sites and logging roads, while also restoring the health of targeted forest sites that have been compromised in development. Mycorestoration is also used to control insect populations. It generally uses a four-tier approach of mycofiltration, mycoforestry, mycoremediation, and mycopesticides. The mycelia of a number of different gilled fungi are used in some of these applications. |
https://en.wikipedia.org/wiki/Atypon | Atypon Systems, LLC, is an online publishing platform provider for publishers and other providers of scientific, technical, medical, scholarly, professional and government content. It is headquartered in Santa Clara, California. It has been owned by John Wiley & Sons since 2016.
Atypon’s flagship product is Literatum, which was released in 1999. It is a publishing and website development platform that enables content providers to deliver, market and sell any type of digital content as well as to control the user interface and user experience of their publication websites.
History
The company was founded in Silicon Valley in 1996 by software engineer and Fulbright Scholar Georgios Papadopoulos.
Atypon has grown both organically and through acquisitions. It acquired Extenza e-Publishing Services in 2011.
The acquisition of eMeta in 2008 expanded Atypon’s product portfolio to include RightSuite, an enterprise access and commerce platform for the publishing and media industry. Atypon acquired the Metapress business from EBSCO Information Services in 2014, with the Metapress platform to be discontinued and customers moved to Atypon's Literatum platform.
In October 2016, Atypon was purchased by academic publisher John Wiley & Sons for $120 million. Atypon operates as a separate, independent business unit of Wiley.
In 2018, Wiley migrated its own Wiley Online Library to Literatum.
Atypon has grown internationally, expanding on its initial primary locations in Amman, Jordan, Athens, Greece, Oxford, UK, Santa Clara, CA, and New York, NY to a remote-first workplace
Products and services
Literatum is a hosted e-publishing platform that is used to manage, deliver and monetize online content. It consists of six modules for designing and building websites, hosting and managing content, managing user access, targeting advertising, simplifying e-commerce, and reporting and analyzing site activity. The platform is home to more than 13,000 journals containing almost 27 mil |
https://en.wikipedia.org/wiki/Disqus | Disqus () is an American blog comment hosting service for websites and online communities that use a networked platform. The company's platform includes various features, such as social integration, social networking, user profiles, spam and moderation tools, analytics, email notifications, and mobile commenting. It was founded in 2007 by Daniel Ha and Jason Yan as a Y Combinator startup.
In 2011, Disqus was ranked 2 in Quantcast's U.S. networks with 151 million monthly unique U.S. visits. Disqus was featured on CNN, The Daily Telegraph, and IGN, and about 750,000 blogs and websites.
On December 5, 2017, Disqus was acquired by Zeta Global.
History
Disqus was first developed in the summer of 2007 as a Y Combinator startup. It was headed by Daniel Ha and Jason Yan, who were undergraduates at the University of California, Davis. Disqus was launched on October 30, 2007.
In early 2011, Disqus raised $10 million in funding from North Bridge Venture Partners and Union Square Ventures.
In March 2011, Disqus was used by 75% of websites that included a third-party commenting or discussion system.
On December 5, 2017, Zeta Global announced that it had acquired Disqus for an undisclosed amount. In a blog post, Disqus stated that it planned to continue operations as normal.
Business model
Disqus operates on the ad-supported freemium financial model. While the service is free to use for commenters and small websites, it displays ads. Users can pay optional fees to hide ads and unlock additional features.
In November 2010, Disqus began officially offering three add-on packages for websites.
Starting July 2012, Disqus offered just two premium packages. These were the VIP package and a single-sign-on-only package, for $99/month.
Starting in March 2013, Premium packages were phased out.
On January 4, 2017, Disqus announced new premium packages rolling out in March of 2017. A later blog post clarified that over 95% of sites using Disqus, primarily for personal blogs and n |
https://en.wikipedia.org/wiki/Rhodolith | Rhodoliths (from Greek for red rocks) are colorful, unattached calcareous nodules, composed of crustose, benthic marine red algae that resemble coral. Rhodolith beds create biogenic habitat for diverse benthic communities. The rhodolithic growth habit has been attained by a number of unrelated coralline red algae, organisms that deposit calcium carbonate within their cell walls to form hard structures or nodules that resemble beds of coral.
Rhodoliths do not attach themselves to the rocky seabed. Rather, they roll like tumbleweeds along the seafloor until they become too large in size to be mobilised by the prevailing wave and current regime. They may then become incorporated into a semi-continuous algal mat or form an algal build-up. While corals are animals that are both autotrophic (photosynthesize via their symbionts) or heterotrophic (feeding on plankton), rhodoliths produce energy solely through photosynthesis (i.e. they can only grow and survive in the photic zone of the ocean).
Scientists believe rhodoliths have been present in the world's oceans since at least the Eocene epoch, some 55 million years ago.
Overview
Rhodoliths (including maërl) have been defined as calcareous nodules composed of more than 50% of coralline red algal material and consisting of one to several coralline species growing together.
Habitat
Rhodolith beds have been found throughout the world's oceans, including in the Arctic near Greenland, in waters off British Columbia, Canada, the Gulf of California, Mexico, the Mediterranean as off New Zealand and eastern Australia. Globally, rhodoliths fill an important niche in the marine ecosystem, serving as a transition habitat between rocky areas and barren, sandy areas. Rhodoliths provide a stable and three-dimensional habitat onto and into which a wide variety of species can attach, including other algae, commercial species such as clams and scallops, and true corals. Rhodoliths are resilient to a variety of environmental disturbanc |
https://en.wikipedia.org/wiki/German%20Naval%20Grid%20System | German Naval Grid Reference (German:Gradnetzmeldeverfahren), was a system for referencing a location on a map. Introduced initially by the German Luftwaffe just before World War II, it was used widely in the German armed forces until 1943. Each armed force had its own version of this reference.
The reference used in the ’Gradnetzmeldeverfahren’ can be viewed as a short form of the position in full, without a real translation or encoding.
In the Kriegsmarine version, the entire globe was divided into large square sectors (assuming a Mercator projection), each with its unique two-letter designation (e.g. AE, AF, BA, BB, etc.) with each square called a quadrant 486 nautical miles to a side. E.g CA covered the East Coast of the United States from about Portsmouth, Hampshire south to Cape Fear, North Carolina. Each such sector was further sub-divided into a 3 x 3 matrix, so that there were nine squares. Each of the nine squares were again divided into nine smaller squares.
This was known as a Grid, so that there were now 81 total grid squares within a sector. Each grid was given a two-digit designation, so the Grid System would now have two alphabets and two digits. Each of these Grids were again divided in the same manner – first into a 3 x 3 matrix, and then each matrix was divided into nine squares, so that a further 81 squares were formed within the Grid. Each newly formed square was again given a two digit designation. The complete Grid System would now read as two alphabets with four digits. This can be referred to as the patrol zone. Thus the Kriegsmarine could pinpoint any location on the globe using six characters, a very useful tool when using radio. Its precision was to the level of six nautical miles within a grid. This was how locations were communicated to naval units, particularly U-boats. Thus grid location AN1879 denoted a location east of Northern Scotland, just below Scapa Flow.
For example, major grid AJ is located south of Greenland. Each submari |
https://en.wikipedia.org/wiki/Carola%20Wenk | Carola Wenk (born 1973) is a German-American computer scientist known for her research on algorithms for finding similarities between geometric shapes, such as matching vehicle trajectories to road networks, comparing trajectories with each other using Fréchet distance, or testing similarity for gel electrophoresis data. Her work has also involved biomedical applications of geometric algorithms, including the use of virtual reality to diagnose glaucoma. She is a professor of computer science at Tulane University.
Education and career
Wenk is originally from Berlin. She earned a diploma in mathematics in 1998 at the Free University of Berlin with the thesis Algorithmen für das Crossdating in der Dendrochronologie (Algorithms for Crossdating in Dendrochronology) supervised by Helmut Alt. She continued to work with Alt at the Free University of Berlin and in 2002 completed a doctorate in computer science (Dr. rer. nat.) with the dissertation Shape Matching in Higher Dimensions.
After postdoctoral research with Alon Efrat at the University of Arizona, Wenk joined the faculty at the University of Texas at San Antonio in 2004. She chaired the faculty senate of the university from 2010 to 2012. As faculty senate chair, she oversaw a change in the university grading system to allow plus and minus modifiers in letter grades, and a policy to reduce the use of paper by making all campus printers and copiers double-sided.
She moved to Tulane University in 2012, and was promoted to full professor in 2017. At Tulane, she also holds an adjunct position in the mathematics department.
Book
With Mahmuda Ahmed, Sophia Karagiorgou, and Dieter Pfoser, Wenk is the co-author of the book Map Construction Algorithms (Springer, 2015). |
https://en.wikipedia.org/wiki/Equation-free%20modeling | Equation-free modeling is a method for multiscale computation and computer-aided analysis. It is designed for a class of complicated systems in which one observes evolution at a macroscopic, coarse scale of interest, while accurate models are only given at a finely detailed, microscopic, level of description. The framework empowers one to perform macroscopic computational tasks (over large space-time scales) using only appropriately initialized microscopic simulation on short time and small length scales. The methodology eliminates the derivation of explicit macroscopic evolution equations when these equations conceptually exist but are not available in closed form; hence the term equation-free.
Introduction
In a wide range of chemical, physical and biological systems, coherent macroscopic behavior emerges from interactions between microscopic entities themselves (molecules, cells, grains, animals in a population, agents) and with their environment. Sometimes, remarkably, a coarse-scale differential equation model (such as the Navier-Stokes equations for fluid flow, or a reaction–diffusion system) can accurately describe macroscopic behavior. Such macroscale modeling makes use of general principles of conservation (atoms, particles, mass, momentum, energy), and closed into a well-posed system through phenomenological constitutive equations or equations of state. However, one increasingly encounters complex systems that only have known microscopic, fine scale, models. In such cases, although we observe the emergence of coarse-scale, macroscopic behavior, modeling it through explicit closure relations may be impossible or impractical. Non-Newtonian fluid flow, chemotaxis, porous media transport, epidemiology, brain modeling and neuronal systems are some typical examples. Equation-free modeling aims to use such microscale models to predict coarse macroscale emergent phenomena.
Performing coarse-scale computational tasks directly with fine-scale models is often inf |
https://en.wikipedia.org/wiki/History%20of%20zoology%20%281859%E2%80%93present%29 | This article considers the history of zoology since the theory of evolution by natural selection proposed by Charles Darwin in 1859.
Charles Darwin gave new direction to morphology and physiology, by uniting them in a common biological theory: the theory of organic evolution. The result was a reconstruction of the classification of animals upon a genealogical basis, fresh investigation of the development of animals, and early attempts to determine their genetic relationships. The end of the 19th century saw the fall of spontaneous generation and the rise of the germ theory of disease, though the mechanism of inheritance remained a mystery. In the early 20th century, the rediscovery of Mendel's work led to the rapid development of genetics by Thomas Hunt Morgan and his students, and by the 1930s the combination of population genetics and natural selection in the "neo-Darwinian synthesis".
Second half of nineteenth century
Darwin and the theory of evolution
The 1859 publication of Darwin's theory in On the Origin of Species by Means of Natural Selection, or the Preservation of Favoured Races in the Struggle for Life is often considered the central event in the history of modern zoology. Darwin's established credibility as a naturalist, the sober tone of the work, and most of all the sheer strength and volume of evidence presented, allowed Origin to succeed where previous evolutionary works such as the anonymous Vestiges of Creation had failed. Most scientists were convinced of evolution and common descent by the end of the 19th century. However, natural selection would not be accepted as the primary mechanism of evolution until well into the 20th century, as most contemporary theories of heredity seemed incompatible with the inheritance of random variation.
Alfred Russel Wallace, following on earlier work by de Candolle, Humboldt and Darwin, made major contributions to zoogeography. Because of his interest in the transmutation hypothesis, he paid particular attent |
https://en.wikipedia.org/wiki/Jscrambler | Jscrambler is a technology company mainly known for its JavaScript obfuscator and eponymous monitoring framework. The obfuscator makes it harder to reverse engineer a web application's client-side code and tamper with its integrity. For real-time detection of web skimming, DOM tampering and user interface changes, the monitoring framework can be used. Jscrambler's products are used in a number of sectors including finance, broadcasting and online gaming.
History
Early days and founding
Jscrambler started as AuditMark, which was founded in 2009 by Pedro Fortuna and Rui Ribeiro. The company's initial focus was developing a solution to fight click-fraud in advertising campaigns, since the traffic audit mechanism was JavaScript dependent. The name of the flagship product - Jscrambler - also became the name of the company, which was officially founded in 2014.
Investment
As of September 2021, Jscrambler had raised a total of US$18.1 million in funding over 3 rounds:
Seed — In 2014, Jscrambler raised US$800,000 from Portugal Ventures, a public VC and PE firm.
Seed Extension — In March 2018, Jscrambler raised US$2.3 million in a round led by Sonae IM with the co-investment of Portugal Ventures.
Series A — In September 2021, Jscrambler raised US$15 million in a round led by Ace Capital Partners, with participation from Sonae IM and Portugal Ventures.
Industry recognition
In 2019, Jscrambler was recognized by Deloitte in the Technology Fast 500 ranking as one of EMEA's fastest-growing tech companies. Jscrambler was also recognized in Gartner’s 2019 Market Guide for In-App Protection, 2020 Market Guide for Online Fraud Detection, 2020 Hype Cycle for Endpoint Security, and 2021 Hype Cycle for Application Security.
Media and awards
2013 Eurocloud Best Cloud Startup Award
Best solutions for keeping JavaScript clean and secure by Tech Wire Asia
Staying Safe While Accessing Online Banking by Infosecurity Magazine |
https://en.wikipedia.org/wiki/Haganeyama%20Transmitter | Haganeyama Transmitter (はがね山標準電波送信所, ) is an LF-time signal transmitter at Fuji-cho, Saga-city, Saga-ken, Japan used for transmitting the time signal JJY on 60 kHz. The Haganeyama site is one of two JJY transmitters, another is the Otakadoyama site.
Summy
NAME: NICT Haganeyama LF station
Location: Summit of Mt. Hagane, Fuji-cho, Saga-city, Saga-ken
Elevation: about 900m
Latitude: 33°27'56.0"N
Longitude: 130°10'32.0"E
License: NICT
Station purpose: Transmitting the official Japanese government frequency standards and time signal
Frequency form: 250H A1B
Frequency: 60kHz
Antenna power: 50kW (Antenna efficiency: about 45%)
Antenna form: Umbrella type 200m high
Operation time: continuously
Operation start: 2001/10/01
Range: About 1,000 km
Transmission method :
See also
Otakadoyayama Transmitter |
https://en.wikipedia.org/wiki/Koenigsberger%20ratio | The Koenigsberger ratio is the proportion of remanent magnetization relative to induced magnetization in natural rocks. It was first described by . It is a dimensionless parameter often used in geophysical exploration to describe the magnetic characteristics of a geological body for help in interpreting magnetic anomaly patterns.
The total magnetization of a rock is the sum of its natural remanent magnetization and the magnetization induced by the ambient geomagnetic field. Thus, a Koenigsberger ratio, Q, greater than 1 indicates that the remanence properties contribute the majority of the total magnetization of the rock. |
https://en.wikipedia.org/wiki/Thread%20control%20block | Thread Control Block (TCB) is a data structure in the operating system kernel which contains thread-specific information needed to manage it. The TCB is "the manifestation of a thread in an operating system."
An example of information contained within a TCB is:
Thread Identifier: Unique id (tid) is assigned to every new thread
Stack pointer: Points to thread's stack in the process
Program counter: Points to the current program instruction of the thread
State of the thread (running, ready, waiting, start, done)
Thread's register values
Pointer to the Process control block (PCB) of the process that the thread lives on
The Thread Control Block acts as a library of information about the threads in a system. Specific information is stored in the thread control block highlighting important information about each process.
See also
Parallel Thread Execution
Process control block (PCB) |
https://en.wikipedia.org/wiki/Direct%20memory%20access | Direct memory access (DMA) is a feature of computer systems that allows certain hardware subsystems to access main system memory independently of the central processing unit (CPU).
Without DMA, when the CPU is using programmed input/output, it is typically fully occupied for the entire duration of the read or write operation, and is thus unavailable to perform other work. With DMA, the CPU first initiates the transfer, then it does other operations while the transfer is in progress, and it finally receives an interrupt from the DMA controller (DMAC) when the operation is done. This feature is useful at any time that the CPU cannot keep up with the rate of data transfer, or when the CPU needs to perform work while waiting for a relatively slow I/O data transfer. Many hardware systems use DMA, including disk drive controllers, graphics cards, network cards and sound cards. DMA is also used for intra-chip data transfer in some multi-core processors. Computers that have DMA channels can transfer data to and from devices with much less CPU overhead than computers without DMA channels. Similarly, a processing circuitry inside a multi-core processor can transfer data to and from its local memory without occupying its processor time, allowing computation and data transfer to proceed in parallel.
DMA can also be used for "memory to memory" copying or moving of data within memory. DMA can offload expensive memory operations, such as large copies or scatter-gather operations, from the CPU to a dedicated DMA engine. An implementation example is the I/O Acceleration Technology. DMA is of interest in network-on-chip and in-memory computing architectures.
Principles
Third-party
Standard DMA, also called third-party DMA, uses a DMA controller. A DMA controller can generate memory addresses and initiate memory read or write cycles. It contains several hardware registers that can be written and read by the CPU. These include a memory address register, a byte count register, and |
https://en.wikipedia.org/wiki/Modus%20vivendi | Modus vivendi (plural modi vivendi) is a Latin phrase that means "mode of living" or "way of life". In international relations, it often is used to mean an arrangement or agreement that allows conflicting parties to coexist in peace. In science, it is used to describe lifestyles.
Modus means "mode", "way", "method", or "manner". Vivendi means "of living". The phrase is often used to describe informal and temporary arrangements in political affairs. For example, if two sides reach a modus vivendi regarding disputed territories, despite political, historical or cultural incompatibilities, an accommodation of their respective differences is established for the sake of contingency.
In diplomacy, a modus vivendi is an instrument for establishing an international accord of a temporary or provisional nature, intended to be replaced by a more substantial and thorough agreement, such as a treaty. Armistices and instruments of surrender are intended to achieve a modus vivendi.
Examples
The term often refers to Anglo-French relations from the 1815 end of the Napoleonic Wars to the 1904 Entente Cordiale.
On 7 January 1948, the United States, Britain and Canada, concluded an agreement known as the modus vivendi, that allowed for limited sharing of technical information on nuclear weapons which officially repealed the Quebec Agreement.
See also |
https://en.wikipedia.org/wiki/L2%20holin%20family | The Putative Acholeplasma Phage L2 Holin (L2 Holin) Family (TC# 1.E.59) consists of a putative holin (TC# 1.E.59.1.1; 81 amino acyl residues (aas) and 2 transmembrane segments (TMSs)) and a homologous uncharacterized protein (TC# 1.E.59.1.2; 75 aas and 2 TMSs). These proteins are of particular interest because they may show a link between prokaryotic holins and eukaryotic virus viroporins. While functionally uncharacterized, this putative holin (TC# 1.E.59.1.1) comes up in BLAST searches when members of viroporin families TC# 1.A.95 and TC# 1.A.100 are used as query sequences.
See also
Holin
Lysin
Transporter Classification Database
Further reading
Nieva, José Luis; Madan, Vanesa; Carrasco, Luis. "Viroporins: structure and biological functions". Nature Reviews Microbiology 10 (8): 563–574. .
Saier, Milton H.; Reddy, Bhaskara L. (2015-01-01). "Holins in Bacteria, Eukaryotes, and Archaea: Multifunctional Xenologues with Potential Biotechnological and Biomedical Applications". Journal of Bacteriology 197(1): 7–17. . . . .
Wang, I. N.; Smith, D. L.; Young, R. (2000-01-01). "Holins: the protein clocks of bacteriophage infections". Annual Review of Microbiology 54: 799–825. . . . |
https://en.wikipedia.org/wiki/Google%20File%20System | Google File System (GFS or GoogleFS, not to be confused with the GFS Linux file system) is a proprietary distributed file system developed by Google to provide efficient, reliable access to data using large clusters of commodity hardware. Google file system was replaced by Colossus in 2010.
Design
GFS is enhanced for Google's core data storage and usage needs (primarily the search engine), which can generate enormous amounts of data that must be retained; Google File System grew out of an earlier Google effort, "BigFiles", developed by Larry Page and Sergey Brin in the early days of Google, while it was still located in Stanford. Files are divided into fixed-size chunks of 64 megabytes, similar to clusters or sectors in regular file systems, which are only extremely rarely overwritten, or shrunk; files are usually appended to or read. It is also designed and optimized to run on Google's computing clusters, dense nodes which consist of cheap "commodity" computers, which means precautions must be taken against the high failure rate of individual nodes and the subsequent data loss. Other design decisions select for high data throughputs, even when it comes at the cost of latency.
A GFS cluster consists of multiple nodes. These nodes are divided into two types: one Master node and multiple Chunkservers. Each file is divided into fixed-size chunks. Chunkservers store these chunks. Each chunk is assigned a globally unique 64-bit label by the master node at the time of creation, and logical mappings of files to constituent chunks are maintained. Each chunk is replicated several times throughout the network. At default, it is replicated three times, but this is configurable. Files which are in high demand may have a higher replication factor, while files for which the application client uses strict storage optimizations may be replicated less than three times - in order to cope with quick garbage cleaning policies.
The Master server does not usually store the actual chu |
https://en.wikipedia.org/wiki/Classic%20Mac%20OS | Mac OS (originally System Software; retronym: Classic Mac OS) is the series of operating systems developed for the Macintosh family of personal computers by Apple Computer from 1984 to 2001, starting with System 1 and ending with Mac OS 9. The Macintosh operating system is credited with having popularized the graphical user interface concept. It was included with every Macintosh that was sold during the era in which it was developed, and many updates to the system software were done in conjunction with the introduction of new Macintosh systems.
Apple released the original Macintosh on January 24, 1984. The first version of the system software, which had no official name, was partially based on the Lisa OS, which Apple previously released for the Lisa computer in 1983. As part of an agreement allowing Xerox to buy shares in Apple at a favorable price, it also used concepts from the Xerox PARC Alto computer, which former Apple CEO Steve Jobs and other Lisa team members had previewed. This operating system consisted of the Macintosh Toolbox ROM and the "System Folder", a set of files that were loaded from disk. The name Macintosh System Software came into use in 1987 with System 5. Apple rebranded the system as Mac OS in 1996, starting officially with version 7.6, due in part to its Macintosh clone program. That program ended after the release of Mac OS 8 in 1997. The last major release of the system was Mac OS 9 in 1999.
Initial versions of the System Software ran one application at a time. With the Macintosh 512K, a system extension called the Switcher was developed to use this additional memory to allow multiple programs to remain loaded. The software of each loaded program used the memory exclusively; only when activated by the Switcher did the program appear, even the Finder's desktop. With the Switcher, the now familiar Clipboard feature allowed copy and paste between the loaded programs across switches including the desktop.
With the introduction of System 5 |
https://en.wikipedia.org/wiki/CCL7 | Chemokine (C-C motif) ligand 7 (CCL7) is a small cytokine that was previously called monocyte-chemotactic protein 3 (MCP3). CCL7 is a small protein that belongs to the CC chemokine family and is most closely related to CCL2 (previously called MCP1).
Genomics
In the human genome, CCL7 is encoded by the CCL7 gene which is one of the several chemokine genes clustered on chromosome 17q11.2-q12. This region contains the gene for the MCP subset of CC chemokines. The CCL7 gene has been given the locus symbol SCYA7.
The gene consists of three exons and two introns. The first exon contains a 5′-untranslated region (5′-UTR), the information for the signal sequence (23 amino acids), and the mature protein's first two amino acids. The second exon encodes amino acids 3–42 of the mature proteins. The third exon is composed of the C-terminal region of the protein, a 3′-UTR containing one or more destabilizing AU-rich sequences and a polyadenylation signal.
Molecular biology
CCL7 was first characterized from osteosarcoma supernatant. CCL7 consists of 99 amino acids, which contains 23-amino acid signal peptide. The mature protein about 76 amino acids is secreted after cleavage of the signal peptide. In contrast to most chemokines, CCL7 exists in a general monomeric form, differing from the dimer formed in a highly concentrated solution.
CCL7 can exist in four different glycotypes with a molecular weight 11, 13, 17 and 18 kDa in COS cells.
CCL7 mediates effects on the immune cell types through binding to numerous receptors, including CCR1, CCR2, CCR3, CCR5, and CCR10. These receptors belongs to the G protein-coupled seven-transmembrane receptors. CCL7 can also interact with cell surface glycosaminoglycans (GAGs) present on all animal cell surfaces.
Function
CCL7 is expressed in many types of cells, including stromal cells, keratinocytes, airway smooth muscle cells, parenchymal cells, fibroblasts and leukocytes and also in tumor cells.
CCL7 mainly acts as a chemoattract |
https://en.wikipedia.org/wiki/Midjourney | Midjourney is a generative artificial intelligence program and service created and hosted by San Francisco–based independent research lab Midjourney, Inc. Midjourney generates images from natural language descriptions, called "prompts", similar to OpenAI's DALL-E and Stability AI's Stable Diffusion.
The tool is currently in open beta, which it entered on July 12, 2022. The Midjourney team is led by David Holz, who co-founded Leap Motion. Holz told The Register in August 2022 that the company was already profitable. Users create artwork with Midjourney using Discord bot commands.
History
Midjourney, Inc. was founded in San Francisco, California, by David Holz, previously co-founder of Leap Motion. The Midjourney image generation platform first entered open beta on July 12, 2022. However, on March 14, 2022, the Discord server launched with a request to post high-quality photographs to Twitter/Reddit for system's training.
Model versions
The company has been working on improving its algorithms, releasing new model versions every few months. Version 2 of their algorithm was launched in April 2022 and version 3 on July 25. On November 5, 2022, the alpha iteration of version 4 was released to users and on March 15, 2023, the alpha iteration of version 5 was released. The 5.1 model is more 'opinionated' than version 5, applying more of its own stylization to images, while the 5.1 RAW model adds improvement while working better with more literal prompts. After version 5.2 is released with a increasingly better image quality.
|}
Functionality
Midjourney is currently only accessible through a Discord bot on their official Discord server, by direct messaging the bot, or by inviting the bot to a third party server. To generate images, users use the command and type in a prompt; the bot then returns a set of four images. Users may then choose which images they want to upscale. Midjourney is also working on a web interface.
Beyond the command, Midjourney offers many othe |
https://en.wikipedia.org/wiki/Agency%20for%20Toxic%20Substances%20and%20Disease%20Registry | The Agency for Toxic Substances and Disease Registry (ATSDR) is a federal public health agency within the United States Department of Health and Human Services. The agency focuses on minimizing human health risks associated with exposure to hazardous substances. It works closely with other federal, state, and local agencies; tribal governments; local communities; and healthcare providers. Its mission is to "Serve the public through responsive public health actions to promote healthy and safe environments and prevent harmful exposures." ATSDR was created as an advisory, nonregulatory agency by the Superfund legislation and was formally organized in 1985.
Although ATSDR is an independent operating agency within the Department of Health and Human Services, the Centers for Disease Control and Prevention (CDC) performs many of its administrative functions. The CDC director also serves as the ATSDR administrator, and ATSDR has a joint Office of the Director with the National Center for Environmental Health (NCEH). The ATSDR headquarters are located in Atlanta, Georgia, at the CDC Chamblee campus. In fiscal year 2010, ATSDR had an operating budget of $76.8 million and had roughly 300 full-time employees (not including contractors).
The ATSDR is formally and administratively overseen by the Director of the Centers for Disease Control and Prevention (CDC), currently Dr. Mandy Cohen since July 10, 2023 Direction is provided by ATSDR's Director, currently Dr. Patrick N. Breysse, who ranks below the Administrator, and ATSDR's Associate Director, currently Dr. Christopher M. Reh.
Overview
ATSDR is an agency within the US Department of Health and Human Services concerned with the effects of hazardous substances on human health. ATSDR is charged with assessing the presence and nature of health hazards at specific Superfund sites, as well as helping prevent or reduce further exposure and the illnesses that can result from such exposures. ATSDR is an oversight agency created to e |
https://en.wikipedia.org/wiki/Jonquetella | Jonquetella is a Gram-negative and strictly aerobic genus of bacteria from the family of Synergistaceae with one known species (Jonquetella anthropi). Jonquetella anthropi has been isolated from a human cyst from Montpellier in France. |
https://en.wikipedia.org/wiki/Color%20vision | Color vision, a feature of visual perception, is an ability to perceive differences between light composed of different frequencies independently of light intensity. Color perception is a part of the larger visual system and is mediated by a complex process between neurons that begins with differential stimulation of different types of photoreceptors by light entering the eye. Those photoreceptors then emit outputs that are propagated through many layers of neurons and then ultimately to the brain. Color vision is found in many animals and is mediated by similar underlying mechanisms with common types of biological molecules and a complex history of evolution in different animal taxa. In primates, color vision may have evolved under selective pressure for a variety of visual tasks including the foraging for nutritious young leaves, ripe fruit, and flowers, as well as detecting predator camouflage and emotional states in other primates.
Wavelength
Isaac Newton discovered that white light after being split into its component colors when passed through a dispersive prism could be recombined to make white light by passing them through a different prism. The visible light spectrum ranges from about 380 to 740 nanometers. Spectral colors (colors that are produced by a narrow band of wavelengths) such as red, orange, yellow, green, cyan, blue, and violet can be found in this range. These spectral colors do not refer to a single wavelength, but rather to a set of wavelengths: red, 625–740 nm; orange, 590–625 nm; yellow, 565–590 nm; green, 500–565 nm; cyan, 485–500 nm; blue, 450–485 nm; violet, 380–450 nm.
Wavelengths longer or shorter than this range are called infrared or ultraviolet, respectively. Humans cannot generally see these wavelengths, but other animals may.
Hue detection
Sufficient differences in wavelength cause a difference in the perceived hue; the just-noticeable difference in wavelength varies from about 1 nm in the blue-green and yellow wavelengths t |
https://en.wikipedia.org/wiki/Almost | In set theory, when dealing with sets of infinite size, the term almost or nearly is used to refer to all but a negligible amount of elements in the set. The notion of "negligible" depends on the context, and may mean "of measure zero" (in a measure space), "finite" (when infinite sets are involved), or "countable" (when uncountably infinite sets are involved).
For example:
The set is almost for any in , because only finitely many natural numbers are less than .
The set of prime numbers is not almost , because there are infinitely many natural numbers that are not prime numbers.
The set of transcendental numbers are almost , because the algebraic real numbers form a countable subset of the set of real numbers (which is uncountable).
The Cantor set is uncountably infinite, but has Lebesgue measure zero. So almost all real numbers in (0, 1) are members of the complement of the Cantor set.
See also
Almost all
Almost surely
Approximation
List of mathematical jargon |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.