source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Princess%20Tomato%20in%20the%20Salad%20Kingdom | is a video game by Hudson Soft originally released in 1984 for the NEC PC-8801, NEC PC-6001, FM-7 and MSX Japanese home computers.
It was ported on May 27, 1988, to the Famicom, and February 8, 1991 for the Nintendo Entertainment System in North America. It was also released on the Wii's Virtual Console in Japan on January 19, 2010, and in North America on February 8.
The characters are primarily cartoon-like anthropomorphic fruits and vegetables, though the game does contain some human characters, including Princess Tomato's sister, Lisa, and the villainous Farmies.
Plot
Taking the role of Sir Cucumber, a knight, the player is assigned by King Broccoli (now deceased) to defeat the evil Minister Pumpkin, who has kidnapped Princess Tomato. Early on, Sir Cucumber gains a sidekick, Percy the baby persimmon, who offers advice and helps throughout the quest (and always refers to Sir Cucumber as "Boss").
Gameplay
Princess Tomato in the Salad Kingdom plays similarly to a text adventure, though due to the NES's lack of a keyboard accessory, the possible commands are represented by buttons which line both sides of the screen. The commands are fixed and do not change during gameplay. Primarily, the game consists of still screens, with the exception of the "finger wars", mazes and occasional animated character, such as the octoberry and fernbirds. Players can issue commands to the game's protagonist. While the player may run into difficulty determining which actions will advance the game, the only way to "lose" is by failing to defeat the end-game boss, Minister Pumpkin, in a final game of "finger wars".
Legacy
Princess Tomato makes an appearance in Super Bomberman R as a playable DLC character named "Princess Tomato Bomber". She was added in the 2.0 update released in November 2017.
See also
List of Nintendo Entertainment System games
List of Hudson Soft games |
https://en.wikipedia.org/wiki/Cyclin%20B | Cyclin B is a member of the cyclin family. Cyclin B is a mitotic cyclin. The amount of cyclin B (which binds to Cdk1) and the activity of the cyclin B-Cdk complex rise through the cell cycle until mitosis, where they fall abruptly due to degradation of cyclin B (Cdk1 is constitutively present). The complex of Cdk and cyclin B is called maturation promoting factor or mitosis promoting factor (MPF).
Function
Cyclin B is necessary for the progression of the cells into and out of M phase of the cell cycle.
At the end of S phase the phosphatase cdc25c dephosphorylates tyrosine15 and this activates the cyclin B/CDK1 complex. Upon activation the complex is shuttled to the nucleus where it serves to trigger for entry into mitosis. However, if DNA damage is detected alternative proteins are activated which results in the inhibitory phosphorylation of cdc25c and therefore cyclinB/CDK1 is not activated. In order for the cell to progress out of mitosis, the degradation of cyclin B is necessary.
The cyclin B/CDK1 complex also interacts with a variety of other key proteins and pathways which regulate cell growth and progression of mitosis. Cross-talk between many of these pathways links cyclin B levels indirectly to induction of apoptosis. The cyclin B/CDK1 complex plays a critical role in the expression of the survival signal survivin. Survivin is necessary for proper creation of the mitotic spindle which strongly affects cell viability, therefore when cyclin B levels are disrupted cells experience difficulty polarizing. A decrease in survivin levels and the associated mitotic disarray triggers apoptosis via caspase 3 mediated pathway.
Role in Cancer
Cyclin B plays an integral role in many types of cancer. Hyperplasia (uncontrolled cell growth) is one of the hallmarks of cancer. Because cyclin B is necessary for cells to enter mitosis and therefore necessary for cell division, cyclin B levels are often de-regulated in tumors. When cyclin B levels are elevated, cells |
https://en.wikipedia.org/wiki/Mihnea%20Popa | Mihnea Popa (born 11 August 1973) is a Romanian-American mathematician at Harvard University, specializing in algebraic geometry. He is known for his work on complex birational geometry, Hodge theory, abelian varieties, and vector bundles.
Academic career
Popa received his bachelor's degree in 1996 from the University of Bucharest. He studied mathematics at the University of California, Los Angeles from 1996 to 1997, and then in 2001 he received his Ph.D. from the University of Michigan under the supervision of Robert Lazarsfeld. His thesis was titled Linear Series on Moduli Spaces of Vector Bundles on Curves. From 2001 to 2005, Popa was a Benjamin Peirce Assistant Professor at Harvard University and from 2005 to 2007 an assistant professor at the University of Chicago. He joined the University of Illinois at Chicago as an associate professor in 2007 and became a full professor in 2011. In 2014 he moved to Northwestern University, and in 2020 he became a professor at Harvard University.
Awards and honors
Popa is an honorary member of the Institute of Mathematics of the Romanian Academy. He was an AMS Centennial Fellow in 2005–2007, a Sloan Research Fellow in 2007–2009, and a Simons Fellow in 2015–2016. In 2015 he became a fellow of the American Mathematical Society. In 2018 he was an Invited Speaker at the International Congress of Mathematicians in Rio de Janeiro.
Selected publications
Positivity for Hodge modules and geometric applications, in Proceedings of Symposia in Pure Mathematics, Vol. 97, Part I, Algebraic Geometry: Salt Lake City 2015, pp. 555–584. |
https://en.wikipedia.org/wiki/Erzherzog%20Rainer-Medaille | The Erzherzog Rainer-Medaille of the Kaiserlich-königlichen zoologisch-botanischen Gesellschaft in Wien (now "Zoologisch-Botanischen Gesellschaft in Österreich") was awarded annually to a scientist in commemoration of Archduke Rainer of Austria (1827–1913).
Rainer Medalists
1912: Erwin Baur, German botanist (1875-1933)
1912: Theodor Boveri, German geneticist (1862-1915)
1914: Ross Granville Harrison, American biologist (1870-1959)
1914: George Reber Wieland, American paleontologist (1865–1953)
1921: Hans Winkler, German botanist (1877-1945)
1921: Othenio Abel, Paleontologist, paleobiologist (1875-1946)
1923: Nils Heribert-Nilsson, Swedish botanist and geneticist (1883-1955)
1923: Karl von Frisch, German-Austrian ethologist (1886-1982)
1925: Fritz von Wettstein, Czech-Austrian botanist (1895-1945)
1925: Richard Hesse, German zoologist
1927: August Thienemann, German zoologist (1882-1960)
1927: Gunnar Vilhelm Täckholm, botanist (1891-1933)
1929: Erik Stensiö, Swedish ichthyologist
1929: Fritz Knoll, Austrian botanist (1883-1981)
1931: Werner Lüdi, Swiss botanist (1888-1968)
1933: Heinrich Walter, German-Russian botanist and eco-physiologist (1898-1989)
1933: Paul Buchner, German zoologist
1935: Lothar Geitler, Austrian botanist and cytologist (1899-1990)
1935: Jürgen Wilhelm Harms, German zoologist
1937: Sven P. Ekman, Swedish ostracodologist (1876-1964)
1937: Karl Schnarf, botanist (1879-1947)
See also
List of biology awards |
https://en.wikipedia.org/wiki/GIWS%20%28software%29 | GIWS is a wrapper generator intended to simplify calling Java from C or C++ by automatically generating the necessary JNI code.
GIWS is released under the CeCILL license.
Example
The following Java class does some simple computation.
package basic_example;
import java.lang.Math;
public class MyComplexClass{
public MyComplexClass(){
// the constructor
}
public long myVeryComplexComputation(double a, double b){
return Math.round(Math.cos(a)+Math.sin(b)*9);
}
}
GIWS gives the capability to call it from C++.
#include <iostream>
#include "basic_example.hxx"
#include <jni.h>
JavaVM* create_vm() {
JavaVM* jvm;
JNIEnv* env;
JavaVMInitArgs args;
JavaVMOption options[2];
args.version = JNI_VERSION_1_4;
args.nOptions = 2;
options[0].optionString = const_cast<char*>("-Djava.class.path=.");
options[1].optionString = const_cast<char*>("-Xcheck:jni");
args.options = options;
args.ignoreUnrecognized = JNI_FALSE;
JNI_CreateJavaVM(&jvm, (void **)&env, &args);
return jvm;
}
using namespace basic_example;
using namespace std;
int main(){
JavaVM* jvm = create_vm();
MyComplexClass *testOfMyClass = new MyComplexClass(jvm);
cout << "My Computation: " << testOfMyClass->myVeryComplexComputation(1.2,80) << endl;
return 0;
}
To generate the binding, GIWS uses a XML declaration. GIWS will generate the JNI code to call the Java object.
<package name="basic_example">
<object name="MyComplexClass">
<method name="myVeryComplexComputation" returnType="long">
<param type="double" name="a" />
<param type="double" name="b" />
</method>
</object>
</package>
See also
SWIG allows one to call C or C++ from higher level languages
External links
Programming tools
Cross-platform software
Free computer programming tools
Java platform |
https://en.wikipedia.org/wiki/List%20of%20methanol%20poisoning%20incidents | Outbreaks of methanol poisoning have occurred when methanol is used to lace moonshine (bootleg liquor).
Methanol is toxic to humans via ingestion due to metabolism. If as little as 10 ml of pure methanol is ingested, for example, it can break down into formic acid, which can cause permanent blindness by destruction of the optic nerve, and 30 ml is potentially fatal, although the median lethal dose is typically 100 ml (3.4 fl oz) (i.e. 1–2 ml/kg body weight) of pure methanol. This does not happen with ethanol, which breaks down into acetic acid, which is non-toxic in small amounts. Reference dose for methanol is 0.5 mg/kg/day. Toxic effects take hours to start, and effective antidotes, like ethanol, can often prevent permanent damage. Because of its similarities in both appearance and odor to ethanol (the alcohol in beverages), it is difficult to differentiate between the two.
Australia
In 2013 three people died and one suffered partial blindness when they ingested a home-made beverage containing methanol.
In 1997 two people from Central Australia died and two survived after ingesting a drink made from methanol and other alcoholic beverages.
Brazil
In 1999, 35 people died, in ten cities of the state of Bahia as a result of drinking cachaça contaminated with methanol. Further investigation revealed concentrations as high as 24.84% methanol. As other different cases have also been related, in a 20-day window there have been 450 people hospitalized with the toxicity symptoms of methanol ingestion.
Cambodia
In 2012, 49 people died, and more than 300 people were hospitalized, after drinking rice wine contaminated by methanol.
Costa Rica
25 persons died in August 2019 due to methanol poisoning.
Czech Republic
The 2012 Czech Republic methanol poisonings occurred in September 2012 in the Czech Republic, Poland and Slovakia. Over the course of several days, 38 people in the Czech Republic and 4 people in Poland died as a result of methanol poisoning and several tens o |
https://en.wikipedia.org/wiki/L-type%20lectin%20domain | In molecular biology the L-like lectin domain is a protein domain found in lectins which are similar to the leguminous plant lectins.
Lectins are structurally diverse proteins that bind to specific carbohydrates. This family includes the VIP36 and ERGIC-53 lectins. Although proteins containing this domain were originally identified as a family of animal lectins, there are also yeast representatives.
ERGIC-53 is a 53kDa protein, localised to the intermediate region between the endoplasmic reticulum and the Golgi apparatus (ER-Golgi-Intermediate Compartment, ERGIC). It was identified as a calcium-dependent, mannose-specific lectin. Its dysfunction has been associated with combined factors V and VIII deficiency, suggesting an important and substrate-specific role for ERGIC-53 in the glycoprotein-secreting pathway.
The L-like lectin domain has an overall globular shape composed of a beta-sandwich of two major twisted antiparallel beta-sheets. The beta-sandwich comprises a major concave beta-sheet and a minor convex beta-sheet, in a variation of the jelly roll fold. |
https://en.wikipedia.org/wiki/Sudomotor | Sudomotor function refers to the autonomic nervous system control of sweat gland activity in response to various environmental and individual factors. Sweat production is a vital thermoregulatory mechanism used by the body to prevent heat-related illness as the evaporation of sweat is the body’s most effective method of heat reduction and the only cooling method available when the air temperature rises above skin temperature. In addition, sweat plays key roles in grip, microbial defense, and wound healing.
Physiology
Human sweat glands are primarily classified as either eccrine or apocrine glands. Eccrine glands open directly onto the surface of the skin, while apocrine glands open into hair follicles. Eccrine glands are the predominant sweat gland in the human body with numbers totaling up to 4 million. They are located within the reticular dermal layer of the skin and distributed across nearly the entire surface of the body with the largest numbers occurring in the palms and soles.
Eccrine sweat is secreted in response to both emotional and thermal stimulation. Eccrine glands are primarily innervated by small-diameter, unmyelinated class C-fibers from postganglionic sympathetic cholinergic neurons. Increases in body and skin temperature are detected by visceral and peripheral thermoreceptors, which send signals via class C and Aδ-fiber afferent somatic neurons through the lateral spinothalamic tract to the preoptic nucleus of the hypothalamus for processing. In addition, there are warm-sensitive neurons located within the preoptic nucleus that detect increases in core body temperature. Efferent pathways then descend ipsilaterally from the hypothalamus through the pons and medulla to preganglionic sympathetic cholinergic neurons in the intermediolateral column of the spinal cord. The preganglionic neurons synapse with postganglionic cholinergic sudomotor (and to a lesser extent adrenergic) neurons in the paravertebral sympathetic ganglia. When the action potentia |
https://en.wikipedia.org/wiki/James%20Eells | James Eells (October 25, 1926 – February 14, 2007) was an American mathematician, who specialized in mathematical analysis.
Biography
Eells studied mathematics at Bowdoin College in Maine and earned his undergraduate degree in 1947. After graduation he spent one year teaching mathematics at Robert College in Istanbul and starting in 1948 was for two years an instructor at Amherst College in Amherst, Massachusetts. Next he undertook graduate study at Harvard University, where in 1954 he received his Ph.D under Hassler Whitney with thesis Geometric Aspects of Integration Theory.
In the academic year 1955–1956 he was at the Institute for Advanced Study (and subsequently in 1962–1963, 1972–1973, 1977, and 1982). He taught at Columbia University for several years. In 1964 he became a full professor at Cornell University. In 1963 and in 1966–1967 he was at the University of Cambridge, and after a visit to the new mathematics department developed by Erik Christopher Zeeman at the University of Warwick Eells became a professor of mathematical analysis there in 1969. Eells organized many of the University of Warwick Symposia in mathematics.
In 1986 he became the first director of the mathematics section of the Abdus Salam International Centre for Theoretical Physics in Trieste; for six years he served as director in addition to his appointment at the University of Warwick. In 1992 he retired and lived in Cambridge.
Eells did research on global analysis, especially, harmonic maps on Riemannian manifolds, which are important in the theory of minimal surfaces and theoretical physics. His doctoral students included John C. Wood.
In 1970 he was an invited speaker at the International Mathematical Congress in Nice (On Fredholm manifolds with K. D. Elworthy).
He was co-editor of the collected works of Hassler Whitney. Eells's doctoral students include luc LEMAIRE Peter Štefan (1941–1978), Giorgio Valli (1960–1999) and . Eells was married since 1950 and had a son and three da |
https://en.wikipedia.org/wiki/Quantum%20critical%20point | A quantum critical point is a point in the phase diagram of a material where a continuous phase transition takes place at absolute zero. A quantum critical point is typically achieved by a continuous suppression of a nonzero temperature phase transition to zero temperature by the application of a pressure, field, or through doping. Conventional phase transitions occur at nonzero temperature when the growth of random thermal fluctuations leads to a change in the physical state of a system. Condensed matter physics research over the past few decades has revealed a new class of phase transitions called quantum phase transitions which take place at absolute zero. In the absence of the thermal fluctuations which trigger conventional phase transitions, quantum phase transitions are driven by the zero point quantum fluctuations associated with Heisenberg's uncertainty principle.
Overview
Within the class of phase transitions, there are two main categories: at a first-order phase transition, the properties shift discontinuously, as in the melting of solid, whereas at a second order phase transition, the state of the system changes in a continuous fashion. Second-order phase transitions are marked by the growth of fluctuations on ever-longer length-scales. These fluctuations are called "critical fluctuations". At the critical point where a second-order transition occurs the critical fluctuations are scale invariant and extend over the entire system. At a nonzero temperature phase transition, the fluctuations that develop at a critical point are governed by classical physics, because the characteristic energy of quantum fluctuations is always smaller than the characteristic Boltzmann thermal energy .
At a quantum critical point, the critical fluctuations are quantum mechanical in nature, exhibiting scale invariance in both space and in time. Unlike classical critical points, where the critical fluctuations are limited to a narrow region around the phase transition, the in |
https://en.wikipedia.org/wiki/Archease | In molecular biology, the archease''' superfamily of proteins are represented in all three domains of life. Archease genes are generally located adjacent to genes encoding proteins involved in DNA or RNA processing and therefore been predicted to be modulators or chaperones involved in DNA or RNA metabolism. Many of the roles of archeases remain to be established experimentally.
The function of one of the archeases from the hyperthermophile Pyrococcus abyssi has been determined. The gene encoding the archease (PAB1946) is located in a bicistronic operon immediately upstream from a second open reading frame (PAB1947), which encodes a tRNA m5C methyltransferase. The methyl transferase catalyses m5C formation at several cytosine's within tRNAs with preference for C49; the specificity of the methyltransferase reaction being increased by the archease. The archease exists in monomeric and oligomeric states, with only the oligomeric forms able to bind the methyltransferase. Binding prevents aggregation and hinders dimerisation of the methyltransferase-tRNA complex.
The function of this family of archeases as chaperones is supported by structural analysis of the archease from Methanobacterium thermoautotrophicum'', which shows homology to heat shock protein 33, a chaperone protein that inhibits the aggregation of partially denatured proteins. |
https://en.wikipedia.org/wiki/Myelencephalon | The myelencephalon or afterbrain is the most posterior region of the embryonic hindbrain, from which the medulla oblongata develops.
Development
Neural tube to myelencephalon
During fetal development, divisions of the neural tube that give rise to the hindbrain (rhombencephalon) and the other primary vesicles (forebrain and midbrain) occur at 28 days after conception. With the exception of the midbrain, these primary vesicles undergo further differentiation at 5 weeks after conception to form the myelencephalon and the other secondary vesicles.
Myelencephalon to medulla
Final shape differentiation of the myelencephalon into the medulla oblongata can be observed at 20 weeks gestation.
Medulla oblongata
The medulla oblongata is part of the brain stem that serves as the connection of the spinal cord to the brain. It is situated between the pons and the spinal cord.
Function
The medulla oblongata is responsible for several functions of the autonomic nervous system. These functions include:
1) Respiration: monitors the acidity of the blood and sends electrical signals to intercostal muscle tissue to increase their contraction rate in order to oxygenate the blood as needed.
2) Cardiac & Vasomotor Center: monitors and regulates cardiovascular activities by:
Sympathetic excitation in order to increase cardiac output
Parasympathetic inhibition of cardiac output
Affecting blood pressure via vasodilation and vasoconstriction
3) Reflexes
Coughing
Sneezing
Swallowing (palatal)
Vomiting
Gagging (pharyngeal)
Jaw jerk (masseter)
Damage/trauma
Because of its location in the brainstem and its many important roles in the autonomic nervous system, damage to the medulla oblongata is usually fatal. |
https://en.wikipedia.org/wiki/Electrical%20resistivity%20and%20conductivity | Electrical resistivity (also called volume resistivity or specific electrical resistance) is a fundamental specific property of a material that measures its electrical resistance or how strongly it resists electric current. A low resistivity indicates a material that readily allows electric current. Resistivity is commonly represented by the Greek letter (rho). The SI unit of electrical resistivity is the ohm-metre (Ω⋅m). For example, if a solid cube of material has sheet contacts on two opposite faces, and the resistance between these contacts is , then the resistivity of the material is .
Electrical conductivity (or specific conductance) is the reciprocal of electrical resistivity. It represents a material's ability to conduct electric current. It is commonly signified by the Greek letter (sigma), but (kappa) (especially in electrical engineering) and (gamma) are sometimes used. The SI unit of electrical conductivity is siemens per metre (S/m). Resistivity and conductivity are intensive properties of materials, giving the opposition of a standard cube of material to current. Electrical resistance and conductance are corresponding extensive properties that give the opposition of a specific object to electric current.
Definition
Ideal case
In an ideal case, cross-section and physical composition of the examined material are uniform across the sample, and the electric field and current density are both parallel and constant everywhere. Many resistors and conductors do in fact have a uniform cross section with a uniform flow of electric current, and are made of a single material, so that this is a good model. (See the adjacent diagram.) When this is the case, the resistance of the conductor is directly proportional to its length and inversely proportional to its cross-sectional area, where the electrical resistivity (Greek: rho) is the constant of proportionality. This is written as:
where
The resistivity can be expressed using the SI unit ohm metre (Ω⋅m |
https://en.wikipedia.org/wiki/Oscillation%20%28mathematics%29 | In mathematics, the oscillation of a function or a sequence is a number that quantifies how much that sequence or function varies between its extreme values as it approaches infinity or a point. As is the case with limits, there are several definitions that put the intuitive concept into a form suitable for a mathematical treatment: oscillation of a sequence of real numbers, oscillation of a real-valued function at a point, and oscillation of a function on an interval (or open set).
Definitions
Oscillation of a sequence
Let be a sequence of real numbers. The oscillation of that sequence is defined as the difference (possibly infinite) between the limit superior and limit inferior of :
.
The oscillation is zero if and only if the sequence converges. It is undefined if and are both equal to +∞ or both equal to −∞, that is, if the sequence tends to +∞ or −∞.
Oscillation of a function on an open set
Let be a real-valued function of a real variable. The oscillation of on an interval in its domain is the difference between the supremum and infimum of :
More generally, if is a function on a topological space (such as a metric space), then the oscillation of on an open set is
Oscillation of a function at a point
The oscillation of a function of a real variable at a point is defined as the limit as of the oscillation of on an -neighborhood of :
This is the same as the difference between the limit superior and limit inferior of the function at , provided the point is not excluded from the limits.
More generally, if is a real-valued function on a metric space, then the oscillation is
Examples
has oscillation ∞ at = 0, and oscillation 0 at other finite and at −∞ and +∞.
(the topologist's sine curve) has oscillation 2 at = 0, and 0 elsewhere.
has oscillation 0 at every finite , and 2 at −∞ and +∞.
or 1, -1, 1, -1, 1, -1... has oscillation 2.
In the last example the sequence is periodic, and any sequence that is periodic without being constant |
https://en.wikipedia.org/wiki/Opposition%20surge | The opposition surge (sometimes known as the opposition effect, opposition spike or Seeliger effect) is the brightening of a rough surface, or an object with many particles, when illuminated from directly behind the observer. The term is most widely used in astronomy, where generally it refers to the sudden noticeable increase in the brightness of a celestial body such as a planet, moon, or comet as its phase angle of observation approaches zero. It is so named because the reflected light from the Moon and Mars appear significantly brighter than predicted by simple Lambertian reflectance when at astronomical opposition. Two physical mechanisms have been proposed for this observational phenomenon: shadow hiding and coherent backscatter.
Overview
The phase angle is defined as the angle between the observer, the observed object and the source of light. In the case of the Solar System, the light source is the Sun, and the observer is generally on Earth. At zero phase angle, the Sun is directly behind the observer and the object is directly ahead, fully illuminated.
As the phase angle of an object lit by the Sun decreases, the object's brightness rapidly increases. This is mainly due to the increased area lit, but is also partly due to the intrinsic brightness of the part that is sunlit. This is affected by such factors as the angle at which light reflected from the object is observed. For this reason, a full moon is more than twice as bright as the moon at first or third quarter, even though the visible area illuminated appears to be exactly twice as large.
Physical mechanisms
Shadow hiding
When the angle of reflection is close to the angle at which the light's rays hit the surface (that is, when the Sun and the object are close to opposition from the viewpoint of the observer), this intrinsic brightness is usually close to its maximum. At a phase angle of zero degrees, all shadows disappear and the object is fully illuminated. When phase angles approach zero, th |
https://en.wikipedia.org/wiki/Tilt%20%28optics%29 | In optics, tilt is a deviation in the direction a beam of light propagates.
Overview
Tilt quantifies the average slope in both the X and Y directions of a wavefront or phase profile across the pupil of an optical system. In conjunction with piston (the first Zernike polynomial term), X and Y tilt can be modeled using the second and third Zernike polynomials:
X-Tilt:
Y-Tilt:
where is the normalized radius with and is the azimuthal angle with .
The and coefficients are typically expressed as a fraction of a chosen wavelength of light.
Piston and tilt are not actually true optical aberrations, as they do not represent or model curvature in the wavefront. Defocus is the lowest order true optical aberration. If piston and tilt are subtracted from an otherwise perfect wavefront, a perfect, aberration-free image is formed.
Rapid optical tilts in both X and Y directions are termed jitter. Jitter can arise from three-dimensional mechanical vibration, and from rapidly varying 3D refraction in aerodynamic flowfields. Jitter may be compensated in an adaptive optics system by using a flat mirror mounted on a dynamic two-axis mount that allows small, rapid, computer-controlled changes in the mirror X and Y angles. This is often termed a "fast steering mirror", or FSM. A gimbaled optical pointing system cannot mechanically track an object or stabilize a projected laser beam to much better than several hundred microradians. Buffeting due to aerodynamic turbulence further degrades the pointing stability.
Light, however, has no appreciable momentum, and by reflecting from a computer-driven FSM, an image or laser beam can be stabilized to single microradians, or even a few hundred nanoradians. This almost totally eliminates image blurring due to motion, and far-field laser beam jitter. Limitations on the degree of line-of-sight stabilization arise from the limited dynamic range of the FSM tilt, and the highest frequency the mirror tilt angle can be change |
https://en.wikipedia.org/wiki/%2B%20h.c. | + h.c. is an abbreviation for "plus the H ermitian c onjugate"; it means is that there are additional terms which are the Hermitian conjugates of all of the preceding terms, and is a convenient shorthand to omit half the terms actually present.
Context and use
The notation convention "+ h.c." is common in quantum mechanics in the context of writing out formulas for Lagrangians and Hamiltonians, which conventionally are both required to be Hermitian operators.
The expression
means
The mathematics of quantum mechanics is based on complex numbers, whereas almost all observations (measurements) are only real numbers. Adding its own conjugate to an operator guarantees that the combination is Hermitian, which in turn guarantees that the combined operator's eigenvalues will be real numbers, suitable for predicting values of observations / measurements.
Dagger and asterisk notation
In the expressions above, is used as the symbol for the Hermitian conjugate (also called the conjugate transpose) of , defined as applying both the complex conjugate and the transpose transformations to the operator , in any order.
The dagger () is an old notation in mathematics, but is still widespread in quantum-mechanics. In mathematics (particularly linear algebra) the Hermitian conjugate of is commonly written as , but in quantum mechanics the asterisk () notation is sometimes used for the complex conjugate only, and not the combined conjugate transpose (Hermitian conjugate). |
https://en.wikipedia.org/wiki/Ka/Ks%20ratio | {{DISPLAYTITLE:Ka/Ks ratio}}
In genetics, the Ka/Ks ratio, also known as ω or dN/dS ratio, is used to estimate the balance between neutral mutations, purifying selection and beneficial mutations acting on a set of homologous protein-coding genes. It is calculated as the ratio of the number of nonsynonymous substitutions per non-synonymous site (Ka), in a given period of time, to the number of synonymous substitutions per synonymous site (Ks), in the same period. The latter are assumed to be neutral, so that the ratio indicates the net balance between deleterious and beneficial mutations. Values of Ka/Ks significantly above 1 are unlikely to occur without at least some of the mutations being advantageous. If beneficial mutations are assumed to make little contribution, then Ka/Ks estimates the degree of evolutionary constraint.
Context
Selection acts on variation in phenotypes, which are often the result of mutations in protein-coding genes. The genetic code is written in DNA sequences as codons, groups of three nucleotides. Each codon represents a single amino acid in a protein chain. However, there are more codons (64) than amino acids found in proteins (20), so many codons are effectively synonyms. For example, the DNA codons TTT and TTC both code for the amino acid Phenylalanine, so a change from the third T to C makes no difference to the resulting protein. On the other hand, the codon GAG codes for Glutamic acid while the codon GTG codes for Valine, so a change from the middle A to T does change the resulting protein, for better or (more likely) worse, so the change is not a synonym. These changes are illustrated in the tables below.
The Ka/Ks ratio measures the relative rates of synonymous and nonsynonymous substitutions at a particular site.
Methods
Methods for estimating Ka and Ks use a sequence alignment of two or more nucleotide sequences of homologous genes that code for proteins (rather than being genetic switches, controlling development or the rate |
https://en.wikipedia.org/wiki/Home%20network | A home network or home area network (HAN) is a type of computer network that facilitates communication among devices within the close vicinity of a home. Devices capable of participating in this network, for example, smart devices such as network printers and handheld mobile computers, often gain enhanced emergent capabilities through their ability to interact. These additional capabilities can be used to increase the quality of life inside the home in a variety of ways, such as automation of repetitive tasks, increased personal productivity, enhanced home security, and easier access to entertainment.
Origin
IPv4 address exhaustion has forced most Internet service providers to grant only a single WAN-facing IP address for each residential account. Multiple devices within a residence or small office are provisioned with internet access by establishing a local area network (LAN) for the local devices with IP addresses reservied for private networks. A network router is configured with the provider's IP address on the WAN interface, which is shared among all devices in the LAN by network address translation.
Infrastructure devices
Certain devices on a home network are primarily concerned with enabling or supporting the communications of the kinds of end devices home-dwellers more directly interact with. Unlike their data center counterparts, these "networking" devices are compact and passively cooled, aiming to be as hands-off and non-obtrusive as possible:
A gateway establishes physical and data link layer connectivity to a WAN over a service provider's native telecommunications infrastructure. Such devices typically contain a cable, DSL, or optical modem bound to a network interface controller for Ethernet. Routers are often incorporated into these devices for additional convenience.
A router establishes network layer connectivity between a WAN and the home network. It also performs the key function of network address translation that allows independently add |
https://en.wikipedia.org/wiki/Molecular%20models%20of%20DNA | Molecular models of DNA structures are representations of the molecular geometry and topology of deoxyribonucleic acid (DNA) molecules using one of several means, with the aim of simplifying and presenting the essential, physical and chemical, properties of DNA molecular structures either in vivo or in vitro. These representations include closely packed spheres (CPK models) made of plastic, metal wires for skeletal models, graphic computations and animations by computers, artistic rendering. Computer molecular models also allow animations and molecular dynamics simulations that are very important for understanding how DNA functions in vivo.
The more advanced, computer-based molecular models of DNA involve molecular dynamics simulations and quantum mechanics computations of vibro-rotations, delocalized molecular orbitals (MOs), electric dipole moments, hydrogen-bonding, and so on. DNA molecular dynamics modeling involves simulating deoxyribonucleic acid (DNA) molecular geometry and topology changes with time as a result of both intra- and inter- molecular interactions of DNA. Whereas molecular models of DNA molecules such as closely packed spheres (CPK models) made of plastic or metal wires for skeletal models are useful representations of static DNA structures, their usefulness is very limited for representing complex DNA dynamics. Computer molecular modeling allows both animations and molecular dynamics simulations that are very important to understand how DNA functions in vivo.
History
From the very early stages of structural studies of DNA by X-ray diffraction and biochemical means, molecular models such as the Watson-Crick nucleic acid double helix model were successfully employed to solve the 'puzzle' of DNA structure, and also find how the latter relates to its key functions in living cells. The first high quality X-ray diffraction patterns
of A-DNA were reported by Rosalind Franklin and Raymond Gosling in 1953. Rosalind Franklin made the critical obser |
https://en.wikipedia.org/wiki/Horizontal%20fissure%20of%20cerebellum | The largest and deepest fissure in the cerebellum is named the horizontal fissure (or horizontal sulcus).
It commences in front of the pons, and passes horizontally around the free margin of the hemisphere to the middle line behind, and divides the cerebellum into an upper and a lower portion.
Additional images |
https://en.wikipedia.org/wiki/Cross-site%20leaks | Cross-site leaks, also known as XS-Leaks, are a class of web security vulnerabilities. This class of vulnerabilities allow an attacker to gain access to sensitive information about a user's browsing session while using other websites. This is done by leveraging long-standing information leakage issues (side channels) inherent to the design of the web platform, such as the use of CSS attributes or cache timing information to reveal a user's previous browsing habits.
The existence of cross-site leaks has been known since 2000 when it was first discovered by researchers at Purdue University. However, most modern defences against these class of attacks have been introduced relatively recently in the form of extensions to the HTTP protocol which allow websites to instruct the browser to selectively disallow or annotate certain kinds of stateful cross-origin requests.
Background
For a web application, or web app, there are two primary components: a web browser and multiple web servers. The web browser interacts with the web servers via the HTTP protocol and socket connections to render a web application. Certain parts of the web application need to react to user input or other client-side logic; this is done by executing HTML, CSS or Javascript as part of the rendering process. During this process, the web app transitions in between a lot of well-defined states. These states are often synced between the web server and the web browser via the HTTP or socket protocol.
To provide isolation and security of different web applications from each other, the interactions between the execution context of these apps are governed by the same-origin policy. A specific web application cannot reach into a different web app's execution context and arbitrarily gain information about the execution state of the other web application. However, a web application can embed content from other web apps using frames or requests to third-party sites via cross-origin requests. Cross-site leaks |
https://en.wikipedia.org/wiki/Vicky%20Neale | Victoria Neale (1984 – 3 May 2023) was a British mathematician and writer. She was Whitehead Lecturer at Oxford's Mathematical Institute and Supernumerary Fellow at Balliol College. Her research specialty was number theory. The author of the 2017 book Closing the Gap: The Quest to Understand Prime Numbers, she was interviewed on several BBC radio programs as a mathematics expert. In addition, she wrote for The Conversation and The Guardian. Her other educational and outreach activities included lecturing at the PROMYS Europe high-school program and helping to organize the European Girls' Mathematical Olympiad.
Neale was born in 1984. She obtained her PhD in 2011 from the University of Cambridge. Her thesis work, supervised by Ben Joseph Green, concerned Waring's problem. She then taught at Cambridge while being Director of Studies in mathematics at Murray Edwards College, before moving to Oxford in the summer of 2014.
Neale died on 3 May 2023, at the age of 39. She had been diagnosed with a rare type of cancer in 2021. |
https://en.wikipedia.org/wiki/False%20light | In US law, false light is a tort concerning privacy that is similar to the tort of defamation. The privacy laws in the United States include a non-public person's right to protection from publicity that creates an untrue or misleading impression about them. That right is balanced against the First Amendment right of free speech.
False light differs from defamation primarily in being intended "to protect the plaintiff's mental or emotional well-being", rather than to protect a plaintiff's reputation as is the case with the tort of defamation and in being about the impression created rather than being about veracity. If a publication of information is false, then a tort of defamation might have occurred. If that communication is not technically false but is still misleading, then a tort of false light might have occurred.
False light privacy claims often arise under the same facts as defamation cases, and therefore not all states recognize false light actions. There is a subtle difference in the way courts view the legal theories—false light cases are about damage to a person's personal feelings or dignity, whereas defamation is about damage to a person's reputation.
The specific elements of the tort of false light vary considerably, even among those jurisdictions which do recognize this tort. Generally, these elements consist of the following:
A publication by the defendant about the plaintiff;
made with actual malice if the plaintiff is a public figure;
which places the plaintiff in a false light;
and that would be highly offensive (i.e., embarrassing to reasonable persons).
Some U.S. state courts have ruled that false light lawsuits brought under their states' laws must be rewritten as defamation lawsuits; these courts generally base their opinion on the premises that a) any publication or statement giving rise to a false-light claim will also give rise to a defamation claim, such that the set of statements creating false light is necessarily, although |
https://en.wikipedia.org/wiki/Hymenoptera%20Genome%20Database | The Hymenoptera Genome Database (HGD) is a comprehensive resource supporting genomics of Hymenoptera.
See also
BeeBase |
https://en.wikipedia.org/wiki/Ancestry-informative%20marker | In population genetics, an ancestry-informative marker (AIM) is a single-nucleotide polymorphism that exhibits substantially different frequencies between different populations. A set of many AIMs can be used to estimate the proportion of ancestry of an individual derived from each population.
A single-nucleotide polymorphism is a modification of a single nucleotide base within a DNA sequence. There are an estimated 15 million SNP (Single-nucleotide polymorphism) sites (out of roughly 3 billion base pairs, or about 0.4%) from among which AIMs may potentially be selected. The SNPs that relate to ancestry are often traced to the Y chromosome and mitochondrial DNA because both of these areas are inherited from one parent, eradicating complexities that come with parental gene recombination. SNP mutations are rare, so sequences with SNPs tend to be passed down through generations rather than altered each generation. However, because any given SNP is relatively common in a population, analysts must examine groups of SNPs (otherwise known as AIMS) to determine someone's ancestry. Using statistical methods such as apparent error rate and Improved Bayesian Estimate, the set of SNPs with the highest accuracy for predicting a specific ancestry can be found.
Examining a suite of these markers more or less evenly spaced across the genome is also a cost-effective way to discover novel genes underlying complex diseases in a technique called admixture mapping or mapping by admixture linkage disequilibrium.
As one example, the Duffy Null allele (FY*0) has a frequency of almost 100% of Sub-Saharan Africans, but occurs very infrequently in populations outside of this region. A person having this allele is thus more likely to have Sub-Saharan African ancestors. North and South Han Chinese ancestry can be distinguished unambiguously using a set of 140 AIMS.
Collections of AIMs have been developed that can estimate the geographical origins of ancestors from within Europe.
Follow |
https://en.wikipedia.org/wiki/Quark%20%28kernel%29 | In computing, Quark is an operating system kernel used in MorphOS. It is a microkernel designed to run fully virtualized computers, called boxes (see sandbox). , only one box is available, the ABox, that lets users run extant AmigaOS software compiled for Motorola 68000 series (MC680x0 or 68k) and PowerPC central processing units (CPUs).
Design goals
The Quark microkernel is not a member of the L4 microkernel family, but borrows concepts from it, including: the clan (group of tasks), ID concept, and recursive address mapping. Quark also has an asynchronous/synchronous message interface similar to Amiga's Exec kernel but adapted to an environment with memory protection.
Other Quark features include:
High super/usermode switch speed
Low interrupt latency
Interrupt threads (IntThreads) and Int P-code abstraction
Symmetric multiprocessing (SMP)
Models task/thread and clan/chief
Resource tracking
Virtual memory (optional)
Distributed computing
No access to kernel structures
Clean design with an elegant application programming interface (API)
Micro/pico kernel mix
For this new kernel, a hardware abstraction layer is used which provides the needed hardware resource information like scanning all Amiga Zorro II bus boards, Peripheral Component Interconnect (PCI) boards, and local hardware resources.
Functions
SYS_AddLinkMessage
SYS_AttemptSemaphore
SYS_AttemptSemaphoreShared
SYS_CopyCPUHalConfig
SYS_CreateMemList
SYS_CreateTask
SYS_DeletePort
SYS_DeleteSemaphore
SYS_DumpMemHeader
SYS_FindFreeMemArea
SYS_FindSkipSize
SYS_GetLinkMessage
SYS_GetMessageAttr
SYS_GetNextCPU
SYS_Init
SYS_InsideClan
SYS_IsClanMember
SYS_MMUAddPage
SYS_MMUGetEntry
SYS_MoveRomModuleToMemoryEnd
SYS_ObtainPort
SYS_ObtainSemaphore
SYS_ObtainSemaphoreShared
SYS_ReleaseSemaphore
SYS_ReplyMessage
SYS_SendMessage
SYS_SetMessageAttr
SYS_SetupPageTable
SYS_ShowExceptionThreads
SYS_ShowForbidThreads
SYS_ShowIntThreads
SYS_ShowQuarkState
SYS_ShowReadyThreads
SYS |
https://en.wikipedia.org/wiki/American%20Photonics | American Photonics, Inc. (API) was a very early developer of local area network technologies in the 1980s, based first in Brewster, New York, moving later to Brookfield Center, Connecticut.
History
American Photonics, Inc., was founded in 1982 by James Walyus (1938–2000) while he was employed by Exxon Optical Information Systems (Exxon OIS) of Elmsford, New York. His intention was to create an organization that would develop leading-edge, yet commercially viable, optical communication technologies that could be sold into large potential markets.
After some initial research in networking technologies, API was contracted by Interlan (another early Ethernet networking company, subsequently acquired by Micom and then by Racal Electronics PLC) to develop an adjunct to its 10BASE5 Ethernet transceivers and network interface cards (NICs, or network cards). This adjunct product was to extend the distance between the transceiver and the NIC by way of fiber optics, as the distance was severely limited by the 15-pin Attachment Unit Interface (AUI) cable used in this connection.
Building upon this early success, API developed the RL1000 line of Ethernet 10BASE5 transceivers. The RL1000 physical design was patterned on the rugged 3Com 3C107 transceiver, with the added feature of indicator lamps much like the Cabletron Systems ST500 transceiver, and it became relatively popular as a result.
Another early Ethernet product designed by API was the RL6000 Ethernet Repeater. This unit directly competed with the Digital Equipment Corporation (DEC) DEREP-AA repeater, but had the advantages of being modular (allowing for fiber interfaces, Thinnet or AUI Cable interfaces) and smaller (occupying less than half the space of a DEREP-AA). Consequently, API was able to overtake DEC in sales of this product in 1984, a significant feat for a start-up in the Ethernet industry.
One of the last Ethernet products developed by API was the RL8000 Modular Ethernet Hub. This unit was released at |
https://en.wikipedia.org/wiki/PTS%20glucose-glucoside%20%28Glc%29%20family | The PTS Glucose-Glucoside (Glc) family (TC# 4.A.1) includes porters specific for glucose, glucosamine, N-acetylglucosamine and a large variety of α- and β-glucosides, and is part of the PTS-GFL superfamily.
Homology
Not all β-glucoside PTS porters are in this class, as the PTS porter first described as the cellobiose β-glucoside porter is the diacetylchitobiose porter in the Lac family. The IIA, IIB and IIC domains of all of the group translocators listed below are demonstrably homologous. These porters (the IIC domains) show limited sequence similarity with and are homologous to members of the Fru family and less with members of the Lac family. The IIC domains of the glucose and glucoside subfamilies are as distant from each other as they are from the Fru, Mtl and Lac families. As is true of other members of the PTS-GFL superfamily, the IIC domains of these permeases probably have a uniform 10 TMS topology.
Structure and function
The three-dimensional structures of the IIA and IIB domains of the Escherichia coli glucose porter have been elucidated. IIAglc has a complex β-sandwich structure while IIBglc is a split αβ-sandwich with a topology unrelated to the split αβ-sandwich structure of HPr. Some bacteria have many PTS transport systems belonging to different families. For example, the solventogenic Clostridium acetobutylicum ATCC 824 has 13 altogether with 6 in the Glc family, 2 in the Fru family, 2 in the Lac family, 1 in the Gat family and 2 in the Man family.
Several of the PTS porters in the Glc family lack their own IIA domains and instead use the glucose IIA protein (IIAglc or Crr). Most of these porters have the B and C domains linked together in a single polypeptide chain. A cysteyl residue in the IIB domain is phosphorylated by direct phosphoryl transfer from IIAglc(his~P) or one of its homologues. Those porters which lack a IIA domain include the maltose, arbutin-salicin-cellobiose, trehalose, putative glucoside and sucrose porters of E. coli. Most |
https://en.wikipedia.org/wiki/Glycosmis%20pentaphylla | Glycosmis pentaphylla is a species of flowering plant in the family Rutaceae, known commonly as orangeberry and gin berry. It occurs in Southeast Asia and northern Australia. It is cultivated for its edible pink fruits. In temperate zones, it can be cultivated indoors as a houseplant.
Images |
https://en.wikipedia.org/wiki/Simple%20Authentication%20and%20Security%20Layer | Simple Authentication and Security Layer (SASL) is a framework for authentication and data security in Internet protocols. It decouples authentication mechanisms from application protocols, in theory allowing any authentication mechanism supported by SASL to be used in any application protocol that uses SASL. Authentication mechanisms can also support proxy authorization, a facility allowing one user to assume the identity of another. They can also provide a data security layer offering data integrity and data confidentiality services. DIGEST-MD5 provides an example of mechanisms which can provide a data-security layer. Application protocols that support SASL typically also support Transport Layer Security (TLS) to complement the services offered by SASL.
John Gardiner Myers wrote the original SASL specification (RFC 2222) in 1997. In 2006, that document was replaced by RFC 4422 authored by Alexey Melnikov and Kurt D. Zeilenga. SASL, as defined by RFC 4422 is an IETF Standard Track protocol and is, , a Proposed Standard.
SASL mechanisms
A SASL mechanism implements a series of challenges and responses. Defined SASL mechanisms include:
SASL-aware application protocols
Application protocols define their representation of SASL exchanges with a profile. A protocol has a service name such as "ldap" in a registry shared with GSSAPI and Kerberos.
protocols currently supporting SASL include:
Application Configuration Access Protocol
Advanced Message Queuing Protocol (AMQP)
Blocks Extensible Exchange Protocol
Internet Message Access Protocol (IMAP)
Internet Message Support Protocol
Internet Relay Chat (IRC) (with IRCX or the IRCv3 SASL extension)
Lightweight Directory Access Protocol (LDAP)
libvirt
ManageSieve (RFC 5804)
memcached
Post Office Protocol (POP)
Remote framebuffer protocol used by VNC
Simple Mail Transfer Protocol (SMTP)
Subversion protocol
Extensible Messaging and Presence Protocol (XMPP)
See also
Transport Layer Security (TLS) |
https://en.wikipedia.org/wiki/Euprymna%20scolopes |
Euprymna scolopes, also known as the Hawaiian bobtail squid, is a species of bobtail squid in the family Sepiolidae native to the central Pacific Ocean, where it occurs in shallow coastal waters off the Hawaiian Islands and Midway Island. The type specimen was collected off the Hawaiian Islands and is located at the National Museum of Natural History in Washington, D.C.
Euprymna scolopes grows to in mantle length. Hatchlings weigh and mature in 80 days. Adults weigh up to .
In the wild, E. scolopes feeds on species of shrimp, including Halocaridina rubra, Palaemon debilis, and Palaemon pacificus. In the laboratory, E. scolopes has been reared on a varied diet of animals, including mysids (Anisomysis sp.), brine shrimp (Artemia salina), mosquitofish (Gambusia affinis), prawns (Leander debilis), and octopuses (Octopus cyanea).
The Hawaiian monk seal (Monachus schauinslandi) preys on E. scolopes in northwestern Hawaiian waters.
On June 3, 2021, SpaceX CRS-22 launched E. scolopes, along with tardigrades, to the International Space Station. The squid were launched as hatchlings and will be studied to see if they can incorporate their symbiotic bacteria into their light organ while in space.
Symbiosis
Euprymna scolopes lives in a symbiotic relationship with the bioluminescent bacteria Aliivibrio fischeri, which inhabits a special light organ in the squid's mantle. The bacteria are fed a sugar and amino acid solution by the squid and in return hide the squid's silhouette when viewed from below by matching the amount of light hitting the top of the mantle (counter-illumination). E. scolopes serves as a model organism for animal-bacterial symbiosis and its relationship with A. fischeri has been carefully studied.
Acquisition
The bioluminescent bacterium, A. fischeri, is horizontally transmitted throughout the E. scolopes population. Hatchlings lack these necessary bacteria and must carefully select for them in a marine world saturated with other microorganisms.
To |
https://en.wikipedia.org/wiki/Chitin-glucan%20complex | Chitin-glucan complex (CGC) is a copolymer (polysaccharide) that makes up fungal cell walls, consisting of covalently-bonded chitin and branched 1,3/1,6-ß-D-glucan. CGCs are alkaline-insoluble. Different species of fungi have different structural compositions of chitin and β-glucan making up the CGCs in their cell walls. Soil composition and other environmental factors can also affect the ratio of chitin to β-glucan found in the CGC. Fungal cell walls may also contain chitosan-glucan complexes, which are similar copolymers but have chitosan instead of chitin. Chitin and chitosan are closely related molecules: greater than 40% of the polymer chain of chitin is made of acetylated glucosamine units, whereas greater than 60% of chitosan is made of deacetylated glucosamine units.
In their natural form, CGCs provide structural support to the fungal cell wall. Biomedical applications of CGCs have been studied, including the immunostimulant properties of A. fumigatus, as well as successful antibacterial activity against S. typhimurium by CGCs from A. niger and M. rouxii. There is some evidence that CGCs can act as an effective prebiotic, as it was tested on growing 100 different bifidobacterial strains as well as on rats in vivo. CGCs have many industrial applications, such as in food, cosmetics, and textiles industries, because they can be prepared easily without toxins. As food additives, they are commonly used due to their ability to adsorb heavy metal ions. Additionally, CGCs are produced in high volume industrially because they can be broken down into their constitutive components by hydrolysis, producing pure chitin (or chitosan) and β-glucans.
Rather than being produced from animal parts, pure chitin can be extracted from the cell walls of the fungus Pichia pastoris, recently classified as Komagataella pastoris. Unlike chitin extracted from crustaceans, for example, this chitin contains no heavy metals. A study revealed that the complex exhibits traces of α-chit |
https://en.wikipedia.org/wiki/External%20anal%20sphincter | The external anal sphincter (or sphincter ani externus) is an oval tube skeletal muscle fibers. Distally, it is adherent to the skin surrounding the margin of the anus. The sphincter exhibits a resting state of tonical contraction.
Anatomy
The external anal sphincter is far more substantial than the internal anal sphincter. The proximal portion of external anal sphincter overlaps the internal anal sphincter (which terminates distally a little distance proximal to the anal orifice) superficially; where the two overlap, they are separated by the intervening conjoint longitudinal muscle.
Structure
Historically, the sphincter was described as consisting of three parts (deep, superficial, and subcontinuous), however, this is not supported by current anatomical knowledge. Some sources still describe it as consisting of two layers: deep (or proximal) superficial (or distal or subcutaneous).
Some of the muscles fibres decussate at the anterior midline and posterior midline, so forming an anterior commissure and posterior commissure.
Attachments
The muscle attaches anteriorly onto the perineal body, and posteriorly onto the anococcygeal ligament.
Innervation
The sphincter receives innervation from the bilaterally paired inferior anal nerve (each a branch of the pudendal nerve which is derived from ventral rami of S2-S4). It may also receive additional motor innervation from the nerve to levator ani.
Histology
The sphincter consists mostly of slow twitch fibers that allow extended continuous contraction.
Function
(1) Like other muscles, it is always in a state of tonic contraction, and having no antagonistic muscle it keeps the anal canal and orifice shut.
(2) It can be put into a condition of greater contraction under the influence of the will, so as more firmly to occlude the anal aperture, in expiratory efforts unconnected with defecation.
(3) Taking its fixed point at the coccyx, it helps to fix the central point of the perineum, so that the bulbospongiosus |
https://en.wikipedia.org/wiki/Coronoid%20fossa%20of%20the%20humerus | Superior to the anterior portion of the trochlea is a small depression, the coronoid fossa, which receives the coronoid process of the ulna during flexion of the forearm. It is directly adjacent to the radial fossa of the humerus.
Additional images |
https://en.wikipedia.org/wiki/Aruba%20Networks | HPE Aruba Networking, formerly known as Aruba Networks, is a Santa Clara, California-based cloud based security networking subsidiary of Hewlett Packard Enterprise company.
The company was founded in Sunnyvale, California in 2002 by Keerti Melkote and Pankaj Manglik. On March 2, 2015, Hewlett-Packard announced it would acquire Aruba Networks for approximately $3 billion USD. On May 19, 2015, HP completed the acquisition. As of November 1, 2015, the company operates as the "Intelligent Edge" business unit of Hewlett Packard Enterprise company, which encompasses all of HP/HPE's networking and security related operations and acquisitions.
Acquisitions
See also
HP Networking Products
ProCurve
ProCurve Products |
https://en.wikipedia.org/wiki/Universal%20Immunisation%20Programme | Universal Immunisation Programme (UIP) is a vaccination programme launched by the Government of India in 1985. It became a part of Child Survival and Safe Motherhood Programme in 1992 and is currently one of the key areas under the National Health Mission since 2005. The programme now consists of vaccination for 12 diseases- tuberculosis, diphtheria, pertussis (whooping cough), tetanus, poliomyelitis, measles, hepatitis B, rotaviral gastroenteritis, Japanese encephalitis, rubella, pneumonia (haemophilus influenzae type B) and Pneumococcal diseases (pneumococcal pneumonia and meningitis). Hepatitis B and Pneumococcal diseases were added to the UIP in 2007 and 2017 respectively. The cost of all the vaccines are borne entirely by the Government of India and is funded through taxes with a budget of in 2022 and the program covers all residents of India, including foreign residents.
The other additions in UIP through the way are inactivated polio vaccine (IPV), rotavirus vaccine (RVV), Measles-Rubella vaccine (MR). Four new vaccines have been introduced into the country’s Universal Immunisation Programme (UIP), including injectable polio vaccine, an adult vaccine against Japanese Encephalitis and Pneumococcal Conjugate Vaccine.
Vaccines against rotavirus, rubella and polio (injectable) will help the country meet its Millennium Development Goals 4 targets that include reducing child mortality by two-thirds by 2015, besides meeting meet global polio eradication targets. An adult vaccine against Japanese encephalitis was also introduced in districts with high levels of the disease. The recommendations to introduce these new vaccines have been made after numerous scientific studies and comprehensive deliberations by the National Technical Advisory Group of India (NTAGI), the country’s apex scientific advisory body on immunisation.
Vaccine benefits are debated with some urging caution in the choice of vaccines introduced while expanding the immunisation programme, despite |
https://en.wikipedia.org/wiki/Liquid%20Scintillator%20Neutrino%20Detector | The Liquid Scintillator Neutrino Detector (LSND) was a scintillation counter at Los Alamos National Laboratory that measured the number of neutrinos being produced by an accelerator neutrino source. The LSND project was created to look for evidence of neutrino oscillation, and its results conflict with the Standard Model expectation of only three neutrino flavors, when considered in the context of other solar and atmospheric neutrino oscillation experiments. Cosmological data bound the mass of the sterile neutrino to ms < 0.26eV (0.44eV) at 95% (99.9%) confidence limit, excluding at high significance the sterile neutrino hypothesis as an explanation of the LSND anomaly. The controversial LSND result was tested by the MiniBooNE experiment at Fermilab which has found similar evidence for oscillations.
The hint is currently undergoing further tests at MicroBooNE at Fermilab.
The detector consisted of a tank filled with 167 tons (50,000 gallons) of mineral oil and of b-PDB (2-(4-tert-butylphenyl)-5-(4-biphenyl)-1,3,4-oxadiazole) organic scintillator material. Cherenkov light emitted by particle interactions was detected by an array of 1220 photomultiplier tubes. The experiment collected data from 1993 to 1998. |
https://en.wikipedia.org/wiki/Shattering%20%28agriculture%29 | In agriculture, shattering is the dispersal of a crop's seeds upon their becoming ripe. From an agricultural perspective this is generally an undesirable process, and in the history of crop domestication several important advances have involved a mutation in a crop plant that reduced shattering—instead of the seeds being dispersed as soon as they were ripe, the mutant plants retained the seeds for longer, which made harvesting much more effective. Non-shattering phenotype is one of the prerequisites for plant breeding especially when introgressing valuable traits from wild varieties of domesticated crops.
A particularly important mutation that was selected very early in the history of agriculture removed the "brittle rachis" problem from wheat. A ripe head ("ear") of wild-type wheat is easily shattered into dispersal units when touched, or blown by the wind, because during ripening a series of abscission layers forms that divides the rachis into short segments, each attached to a single spikelet (which contains 2–3 grains along with chaff).
A different class of shattering mechanisms involves dehiscence of the mature fruit, which releases the seeds.
Current research priorities to understand the genetics of shattering include the following crops:
Barley
Buckwheat
Grain Amaranth
Oilseed rape (Brassica napus)
Sesame and rapeseed are harvested before the seed is fully mature, so that the pods do not split and drop the seeds. |
https://en.wikipedia.org/wiki/Facial%20nerve | The facial nerve, also known as the seventh cranial nerve, cranial nerve VII, or simply CN VII, is a cranial nerve that emerges from the pons of the brainstem, controls the muscles of facial expression, and functions in the conveyance of taste sensations from the anterior two-thirds of the tongue. The nerve typically travels from the pons through the facial canal in the temporal bone and exits the skull at the stylomastoid foramen. It arises from the brainstem from an area posterior to the cranial nerve VI (abducens nerve) and anterior to cranial nerve VIII (vestibulocochlear nerve).
The facial nerve also supplies preganglionic parasympathetic fibers to several head and neck ganglia.
The facial and intermediate nerves can be collectively referred to as the nervus intermediofacialis.
Structure
The path of the facial nerve can be divided into six segments:
intracranial (cisternal) segment
meatal (canalicular) segment (within the internal auditory canal)
labyrinthine segment (internal auditory canal to geniculate ganglion)
tympanic segment (from geniculate ganglion to pyramidal eminence)
mastoid segment (from pyramidal eminence to stylomastoid foramen)
extratemporal segment (from stylomastoid foramen to post parotid branches)
The motor part of the facial nerve arises from the facial nerve nucleus in the pons, while the sensory and parasympathetic parts of the facial nerve arise from the intermediate nerve.
From the brain stem, the motor and sensory parts of the facial nerve join and traverse the posterior cranial fossa before entering the petrous temporal bone via the internal auditory meatus. Upon exiting the internal auditory meatus, the nerve then runs a tortuous course through the facial canal, which is divided into the labyrinthine, tympanic, and mastoid segments.
The labyrinthine segment is very short, and ends where the facial nerve forms a bend known as the geniculum of the facial nerve (genu meaning knee), which contains the geniculate ganglion for |
https://en.wikipedia.org/wiki/History%20of%20cholera | Seven cholera pandemics have occurred in the past 200 years, with the first pandemic originating in India in 1817. The seventh cholera pandemic is officially a current pandemic and has been ongoing since 1961, according to a World Health Organization factsheet in March 2022. Additionally, there have been many documented major local cholera outbreaks, such as a 1991–1994 outbreak in South America and, more recently, the 2016–2021 Yemen cholera outbreak.
Although much is known about the mechanisms behind the spread of cholera, this has not led to a full understanding of what makes cholera outbreaks happen in some places and not others. Lack of treatment of human feces and lack of treatment of drinking water greatly facilitate its spread. Bodies of water have been found to serve as a reservoir, and seafood shipped long distances can spread the disease.
Between 1816 and 1923, the first six cholera pandemics occurred consecutively and continuously over time. Increased commerce, migration, and pilgrimage are credited for its transmission. Late in this period (particularly 1879–1883), major scientific breakthroughs toward the treatment of cholera develop: the first immunization by Pasteur, the development of the first cholera vaccine, and identification of the bacterium Vibrio cholerae by Filippo Pacini and Robert Koch. After a long hiatus, a seventh cholera pandemic spread in 1961. The pandemic subsided in the 1970s, but continued on a smaller scale. Outbreaks occur across the developing world to the current day. Epidemics occurred after wars, civil unrest, or natural disasters, when water and food supplies had become contaminated with Vibrio cholerae, and also due to crowded living conditions and poor sanitation.
Deaths in India between 1817 and 1860 in the first three pandemics of the nineteenth century, are estimated to have exceeded 15 million people. Another 23 million died between 1865 and 1917, during the next three pandemics. Cholera deaths in the Russian Empi |
https://en.wikipedia.org/wiki/Gliophorus%20psittacinus | Gliophorus psittacinus, commonly known as the parrot toadstool or parrot waxcap, is a colourful member of the genus Gliophorus, found across Northern Europe. It was formerly known as Hygrocybe psittacina, but a molecular phylogenetics study found it to belong in the genus Gliophorus. It had already been placed in Gliophorus, but it had been considered a synonym of Hygrocybe.
Description
The parrot toadstool is a small mushroom, with a convex to umbonate cap up to in diameter, which is green when young and later yellowish or even pinkish tinged. The stipe, measuring in length and 3–5 mm in width, is green to greenish yellow. The broad adnate gills are greenish with yellow edges and spore print white. The green colouring persists at the stem apex even in old specimens. The spores are white, elliptical, smooth and inamyloid.
Its odour and taste are mild. There are no known chemical tests.
It fruits late summer to autumn (September to November).
Distribution and habitat
Gliophorus psittacinus is widely distributed in grasslands in western Europe, United Kingdom, Iceland, Greenland, the Americas, South Africa, Japan, being found in late summer and autumn. In Europe it is apparently in decline due to the degradation of habitats. Early Australian records of this form have been found to be the similar green toadstools Gliophorus graminicolor or G. viridis on reexamination. Gliophorus psittacinus is known to occur at one site in the Lane Cove River valley near Sydney.
Edibility
Gliophorus psittacinus is generally considered edible, but not worthwhile due to its small size and sliminess. Consumption of over 20 specimens in one sitting can cause gastrointestinal disorders. |
https://en.wikipedia.org/wiki/Roadkill%20cuisine | Roadkill cuisine is preparing and eating roadkill, animals hit by vehicles and found along roads.
It is a practice engaged in by a small subculture in the United States, southern Canada, the United Kingdom, and other Western countries as well as in other parts of the world. It is also a subject of humor and urban legend.
Large animals such as cattle, pigs, and including deer, elk, moose, and bear are frequently struck in some parts of the United States, as well as smaller animals such as birds, poultry animals, seafood animals, and including squirrels, opossum, raccoons, skunks. Fresh kill is preferred and parasites are a concern, so the kill is typically well cooked. Advantages of the roadkill diet, apart from its free cost, are that the animals that roadkill scavengers eat are naturally high in vitamins and proteins with lean meat and little saturated fat, and generally free of additives and drugs.
Almost 1.3 million deer are hit by vehicles each year in the US. If the animal is not obviously suffering from disease, the meat is no different from that obtained by hunting. The practice of eating roadkill is legal, and even encouraged in some jurisdictions, while it is tightly controlled or restricted in other areas. Roadkill eating is often mocked in pop culture, where it is associated with stereotypes of rednecks and uncouth persons.
Preparation
In the United Kingdom, various casseroles may be prepared from badger, hedgehog, otter, rat, rabbit or pheasant where available. Others recommend preparing fox cub or hedgehog in a fricassee.
Hedgehog was traditionally eaten roasted with a nettle pudding.
Badger must be cooked thoroughly to avoid the risk of trichinellosis (alt. trichinosis, trichiniasis).
Roadkill enthusiasts in Canada recommend roasting beaver, which should first be soaked in salted water overnight after removing all fat.
There are several roadkill cookbooks, typically with a tongue-in-cheek treatment but containing sensible advice, not least of w |
https://en.wikipedia.org/wiki/Cipher%20Department%20of%20the%20High%20Command%20of%20the%20Wehrmacht | The Cipher Department of the High Command of the Wehrmacht () (also Oberkommando der Wehrmacht Chiffrierabteilung or Chiffrierabteilung of the High Command of the Wehrmacht or Chiffrierabteilung of the OKW or OKW/Chi or Chi) was the Signal Intelligence Agency of the Supreme Command of the Armed Forces of the German Armed Forces before and during World War II. OKW/Chi, within the formal order of battle hierarchy OKW/WFsT/Ag WNV/Chi, dealt with the cryptanalysis and deciphering of enemy and neutral states' message traffic and security control of its own key processes and machinery, such as the rotor cipher machine ENIGMA machine. It was the successor to the former Chi bureau () of the Reichswehr Ministry.
Short name
The letter "Chi" for the Chiffrierabteilung ("cipher department") is, contrary to what one might expect, not the Greek letter Chi, nor anything to do with the chi-squared test, a common cryptographic test used as part of deciphering of enciphered message, and invented by Solomon Kullback, but simply the first three letters of the word Chiffrierabteilung.
German cryptology service structure during World War II
From the early 1930s to the start of the war, Germany had a good understanding of, and indeed a lead in, both cryptoanalytic and cryptographic cryptology services. The various agencies had cracked the French–English inter-allied cipher, the Germans with some help from the Italian Communications Intelligence Organization stole American diplomatic codes, and codes taken from the British embassy in Rome, that enabled the breaking of the cipher, leading to some gains early in the war. Although the Germans worked to ensure its cryptologic services were effective at the outbreak of the war, the service offerings fragmented considerably among the German armed forces. OKW/Chi had jurisdiction over all the military cryptologic bureaus, chairing the executive committee. However, for several reasons, including specialisation against opposing forces of a simila |
https://en.wikipedia.org/wiki/The%20Daily%20Stormer | The Daily Stormer is an American far-right, neo-Nazi, white supremacist, misogynist, Islamophobic, antisemitic, and Holocaust denial commentary and message board website that advocates for a second genocide of Jews. It is part of the alt-right movement. Its editor, Andrew Anglin, founded the outlet on July 4, 2013, as a faster-paced replacement for his previous website Total Fascism, which had focused on his own long-form essays on fascism, race, and antisemitic conspiracy theories. In contrast, The Daily Stormer relies heavily on quoted material with exaggerated headlines.
The site is known for its use of Internet memes, which have been likened to the imageboard 4chan and cited as attractions for a younger and more ideologically diverse audience. While some white nationalist authors have praised The Daily Stormers reach, others have taken issue with its content and tone, accusing Anglin of being an agent provocateur, used to discredit true white nationalism.
The Daily Stormer orchestrates what it calls the "Troll Army", which is involved in Internet trolling of figures with whom Anglin disagrees politically. In August 2017, after causing outrage by insulting the victim of a car-ramming homicide at the far-right Unite the Right rally, the website was rejected by several domain registrars. In August 2019, the site went offline temporarily when their service provider, BitMitigate, was cut off by their cloud infrastructure provider; the site found another provider.
In June 2019, a federal judge ordered Anglin to pay $4.1 million to comedian Dean Obeidallah, whom Anglin had falsely accused of orchestrating the Manchester Arena bombing. In July 2019, a federal magistrate recommended that Anglin pay $14 million to Tanya Gersh, a woman from Whitefish, Montana against whom Anglin had organized a targeted harassment campaign.
Management
Founder
Andrew Anglin was born in 1984, and grew up near Columbus, Ohio. According to both Anglin and his childhood classmates, he was |
https://en.wikipedia.org/wiki/DQS | DQS Holding GmbH based in Frankfurt am Main is the holding company of the worldwide DQS Group. The group provides assessments and certifications of management systems and processes of any type.
History
DQS was founded in 1985 in Berlin and was the first German certification body. The aim of the founding partners, DGQ (German Society for Quality) and DIN (German Institute for Standardization), was mainly to promote the German economy. The foundation overlapped with the publication of the first drafts of the ISO 9000 series of standards, which also include the most important quality standard worldwide today: ISO 9001.
In 1986 DQS became the first certification body in Germany to issue a certificate according to ISO 9001.
After the merger of DQS with the Management Systems Solutions (MSS) division of the American product certification body Underwriters Laboratories Inc. in March 2008, DQS-UL Group is currently one of the world's largest system certification bodies. Since June 2015 the company changed its name to DQS Group.
Corporate Organization
DQS Holding GmbH has more than 85 offices in over 60 countries. DQS Group currently has about 20,000 certified customers across almost all industries with approximately 65,000 certified locations in over 130 countries.
The concern employs 814 people and commands 2,500 auditors in 2019 (annual average). Among the largest companies within the group are DQS India.(Bangalore), DQS Inc. (USA), DQS do Brasil Ltd., DQS Japan Inc., DQS Medizinprodukte GmbH (Medical Devices), DQS CFS (sustainability) and DQS GmbH (all Germany).
DQS India
Headquartered in Bangalore Main and with a local offices in Chennai, Pune, Gujarat, DQS India is the largest subsidiary of DQS Holding GmbH.
DQS GmbH in Germany
Headquartered in Frankfurt am Main and with a local offices in Hamburg, DQS GmbH is the largest subsidiary of DQS Holding GmbH.
Service spectrum
The group’s services include cross-industry assessments to customer or industry-specif |
https://en.wikipedia.org/wiki/Setapp | Setapp is a subscription-based service for macOS and iOS applications released by the Ukrainian software company MacPaw in 2017. It provides access to a growing collection of software from different developers for a fixed monthly fee. App categories cover productivity, lifestyle, web development, Mac maintenance, creativity, writing, education, and personal finance. There are over 190 apps in the Setapp subscription and 1 million users.
History
Setapp launched in beta in November 2016, and was officially released in January 2017. In June 2017, Setapp reported having 10,000 subscribers worldwide, mainly in the United States but with growing audiences in the United Kingdom, Germany, and France. By November of that year, there were more than 200,000 trial users testing the service.
In November 2019, Setapp launched Setapp for Teams, a service adjusted for teams' and organizations' use.
Setapp launched an iOS version in August 2020.
Business model
Setapp introduced a subscription model for software usage akin to streaming services like Spotify and Netflix. Instead of paying a single price for a standalone application, users can use all the apps in the collection for a single monthly fee.
The philosophy behind the initiative was to give users preselected, ready-to-use software that covers both generic and job-specific tasks. Applications on Setapp are automatically updated and contain no in-app purchases or advertisements.
The main part of the revenue generated by Setapp is divided between app developers based on app usage.
System requirements
macOS version:
El Capitan 10.11 (minimum) (current version 3.1.1 requires minimum Sierra 10.12; El Capitan 10.11 requires downloading 1.18.9 from the Internet Archive)
Sierra 10.12 and later (recommended; required to install iOS apps)
iOS apps have individual minimum requirements
500 MB of free space for initial installation
Internet connection to install separate apps
Awards and recognition
Finalist at the 21st a |
https://en.wikipedia.org/wiki/Polymersome | In biotechnology, polymersomes are a class of artificial vesicles, tiny hollow spheres that enclose a solution. Polymersomes are made using amphiphilic synthetic block copolymers to form the vesicle membrane, and have radii ranging from 50 nm to 5 µm or more. Most reported polymersomes contain an aqueous solution in their core and are useful for encapsulating and protecting sensitive molecules, such as drugs, enzymes, other proteins and peptides, and DNA and RNA fragments. The polymersome membrane provides a physical barrier that isolates the encapsulated material from external materials, such as those found in biological systems.
Synthosomes are polymersomes engineered to contain channels (transmembrane proteins) that allow certain chemicals to pass through the membrane, into or out of the vesicle. This allows for the collection or enzymatic modification of these substances.
The term "polymersome" for vesicles made from block copolymers was coined in 1999. Polymersomes are similar to liposomes, which are vesicles formed from naturally occurring lipids. While having many of the properties of natural liposomes, polymersomes exhibit increased stability and reduced permeability. Furthermore, the use of synthetic polymers enables designers to manipulate the characteristics of the membrane and thus control permeability, release rates, stability and other properties of the polymersome.
Preparation
Several different morphologies of the block copolymer used to create the polymersome have been used. The most frequently used are the linear diblock or triblock copolymers. In these cases, the block copolymer has one block that is hydrophobic; the other block or blocks are hydrophilic. Other morphologies used include comb copolymers, where the backbone block is hydrophilic and the comb branches are hydrophobic, and dendronized block copolymers, where the dendrimer portion is hydrophilic.
In the case of diblock, comb and dendronized copolymers the polymersome membrane has the |
https://en.wikipedia.org/wiki/List%20of%20military%20clothing%20camouflage%20patterns | This is a list of military clothing camouflage patterns used for battledress. Military camouflage is the use of camouflage by armed forces to protect personnel and equipment from observation by enemy forces. Textile patterns for uniforms have multiple functions, including camouflage, identifying friend from foe, and esprit de corps.
The list is organized by pattern; only patterned textiles are shown. It includes current and past issue patterns, with dates; users may include a wide range of military bodies.
Patterns
See also
Military uniform
Snow camouflage#Military usage |
https://en.wikipedia.org/wiki/Protein%20music | Protein music (DNA music or genetic music) is a musical technique where music is composed by converting protein sequences or genes to musical notes. It is a theoretical method made by Joël Sternheimer, who is a physicist, composer and mathematician.
The first published references to protein music in the scientific literature are a paper co-authored by a member of The Shamen in 1996,
and a short correspondence by Hayashi and Munakata in Nature in 1984.
Theory
In Gödel, Escher, Bach, Douglas Hofstadter draws similarities and analogies between genes and music.
It even proposes that meaning is constructed in protein and in music.
The ideas that supports the possibility of creating harmonic musics using this method are:
The repetition process governs both the musical composition and the DNA sequence construction.
The conformations and energetics of the protein secondary and tertiary structures at the atomic level. See also for full compositions made using this concept.
Pink noise (the correlation structure "1/f spectra") have been found in both musical signals and DNA sequences.
Models with duplication and mutation operations, such as the "expansion-modification model" are able to generate sequences with 1/f spectra.
When DNA sequences are converted to music, it sounds musical.
Human Genome Project has revealed similar genetic themes not only between species, but also between proteins.
Musical renditions of DNA and proteins is not only a music composition method, but also a technique for studying genetic sequences. Music is a way of representing sequential relationships in a type of informational string to which the human ear is keenly attuned. The analytic and educational potential of using music to represent genetic patterns has been recognized from secondary school to university level.
Practice
Examples of simple protein structures converted to midi music file show the independence of protein music from musical instrument, and the convenience of using prot |
https://en.wikipedia.org/wiki/List%20of%20English%20palindromic%20phrases | A palindrome is a word, number, phrase, or other sequence of symbols that reads the same backwards as forwards, such as the sentence: "A man, a plan, a canal – Panama". Following is a list of palindromic phrases of two or more words in the English language, found in multiple independent collections of palindromic phrases.
As late as 1821, The New Monthly Magazine reported that there was only one known palindrome in the English language. In the following centuries, many more English palindomes were constructed. For many long-attested or well-known palindromes, authorship can not be determined, although a number can tentatively be attributed to a handful of prolific palindrome creators. Because of the popularity of palindromes as a form of word play, a number of sources have collected and listed popular palindromes, and palindrome-constructing contests have been held.
Notable palindromic phrases in English
See also
List of palindromic places
Notes |
https://en.wikipedia.org/wiki/Harriet%20Bruce-Annan | Harriet Dansowaa Bruce-Annan (birth name: Grace Akosua Dansowaa Ani-Agyei; born 1965 in Accra, Ghana) is a Ghanaian programmer and humanitarian living in Düsseldorf, Germany. She has become known as the founder of African Angel, a charity organisation which supports and provides training for children from the slums of Accra's Bukom district.
Life and work
Bruce-Annan was born in Accra on December 19, 1965 by Madam Victoria Lankai Lamptey. She spent her childhood in Adabraka and regularly visited her grandmother, who lived in a slum called Bukom. Despite all the suffering prevailing in her community, she still got along in her childhood. With the help of her uncle, she later studied programming in Ghana. Her first job was with a German computer company.
In 1990, Bruce-Annan emigrated with her husband to Germany, after he had promised her a better education in Europe. She went to Germany as an employee of the British Forces. Upon arrival, they lived in a hotel in Düsseldorf, before moving into an apartment in Oberhausen, Germany. However, following several cases of abuse, she fled to a women's shelter in Düsseldorf. There, she first worked as a nursing assistant, then as a lavatory attendant at the Düsseldorf fair and at the Golden Unicorn pub on Ratinger Straße.
While at Düsseldorf, she began collecting money to help orphans in the slums of Bukom in Accra. On September 15, 2002, together with six others, Bruce-Annan founded the African Angel Association. In 2004, she flew from Düsseldorf to Ghana with 5,000 euros to start her African Angel Association. The Association supports children from the Bukom slum, particularly orphans, by financing their education and training.
In 2008, Bruce-Annan was invited to the Berlin Senate conference, where the role of knowledge in international migration was discussed. In 2009, she appeared in on NDR television and on Markus Lanz talk shows. Bruce-Annan has been touring Germany and Austria for several years to present her pr |
https://en.wikipedia.org/wiki/Dockerin | Dockerin is a protein domain found in the cellulosome cellular structure of anaerobic bacteria. It is found on many endoglucanase enzymes. The dockerin's binding partner is the cohesin domain, located on the scaffoldin protein. This interaction between the dockerin domains of the enzyme constituents of the cellulosome and the cohesin domains of the scaffoldin protein is essential to the construction of the cellulosome complex. The Dockerin domain has two in-tandem repeats of a non-EF hand calcium binding motif. Each motif is characterized by a loop-helix structure. The three-dimensional structure of dockerin has been determined in solution, as well as in complex with Cohesin.
There are three types of Dockerin domains: I, II and III which bind to Cohesin Type I, Cohesin Type II and Cohesin Type III respectively. A type I dockerin domain is 65-70 residues long. The binding specificity of Type I interaction was well studied by structural and mutagenesis studies. Type II interaction is less well characterized.
See also
EF hand
cellulosome |
https://en.wikipedia.org/wiki/Three-letter%20acronym | A three-letter acronym (TLA), or three-letter abbreviation, is an abbreviation consisting of three letters. These are usually the initial letters of the words of the phrase abbreviated, and are written in capital letters (upper case); three-letter abbreviations such as etc. and Mrs. are not three-letter acronyms, but "TLA" is a TLA (an example of an autological abbreviation).
Most three-letter abbreviations are not, strictly, acronyms, but rather initialisms: all the letters are pronounced as the names of letters, as in APA . Some are true acronyms, pronounced as a word: as with computed axial tomography, for example, CAT is almost always pronounced as the animal's name () in "CAT scan". Even the initialisms are however considered three-letter acronyms, because that term appeared first in widespread use, and is overwhelmingly popular today.
Examples
Academic testing: ACT, SAT
Air Navigation Services (ANS): AIS, ASM, ATC, ATM, ATS, CNS, FIS, FPC, MET, and SAR
IATA airport codes: LAX and LHR
Business: CEO, CFO, and other C-level officers
Canine registries: AKC and CKC
Chemistry, biology, and pharmaceuticals: GMO, LSD, and MSG
Clinical medicine: CAD, CHF, PSA, and SOB
Communications shorthand: LOL and OMG
Computer phrases: CPU, DOS, RAM, ROM, and GNU
Corporations: BMW, IBM, AMD, and NEC
Countries: SRI, USA, CAR, UAE, DRC, etc.
Currency: USD, GBP, and CHF
Famous people: FDR, JFK, MJK, MLK, OBL, RBG, RDJ, and RMS
File extensions: JPG, PDF, and XLS
Military and weaponry: BFR and RPG
Musical groups: R.E.M., XTC, TLC, E.L.O., MC5, GBH, O.A.R., MDC, D.R.I., JFA
Personal advertisements: SBM for Single Black Male, STR for Short Term Relationship
Political Parties: BJP, CCP, GOP, and AAP
Religion: LDS, SBC, and SDA
Ship prefixes: HMS, USS, and RMS
Sports organizations: NFL, MLB, (North America); AFL, and NRL (Australia); NPB (Japan); ACB, LFP (Spain); IPL (India), EPL (England), WBO
State postal abbreviations: NSW, QLD, VIC, and TAS (Australia)
Televi |
https://en.wikipedia.org/wiki/Gigabyte%20%28journal%29 | GigaByte is a peer-reviewed open-science journal published by GigaScience Press since 2020. It focuses on short, focused, data-driven articles describing and sharing open research data sets and software. Using an exclusively XML-based publishing system that automates the production process to make it simple to change views, languages and embed interactive content, in 2022 it won the ALPSP Award for Innovation in Publishing.
In order to host the large data-sets the journal covers, like its sister journal GigaScience it uses its own in-house disciplinary repository: GigaDB.
The journal is abstracted and indexed by PubMed/PMC/DOAJ and CNKI. |
https://en.wikipedia.org/wiki/CD%20publishing | CD publishing is the use of CD duplication systems to create a large number of unique discs. For instance, storing a unique serial number on each copy of a software application disc would be considered CD publishing.
The term CD publishing is believed to have been coined by the Rimage Corporation as part of a marketing program which referred to CD-R discs as "digital paper." Automated disc production and printing systems, such as those made by Rimage, can be shared on a computer network much like an office printer to facilitate the creation of unique discs. This is the root of both the digital paper and CD publishing terms.
The extension into CD publishing is a distinct advantage of CD duplication systems over traditional CD replication - where large quantities of identical discs must be made.
External links
Understanding CD-R & CD-RW: Duplication, Replication, and Publishing @ the Optical Storage Technology Association
Computer storage media
Optical disc authoring |
https://en.wikipedia.org/wiki/Mathematical%20programming%20with%20equilibrium%20constraints | Mathematical programming with equilibrium constraints (MPEC) is the study of
constrained optimization problems where the constraints include variational inequalities or complementarities. MPEC is related to the Stackelberg game.
MPEC is used in the study of engineering design, economic equilibrium, and multilevel games.
MPEC is difficult to deal with because its feasible region is not necessarily convex or even connected. |
https://en.wikipedia.org/wiki/List%20of%20ATSC%203.0%20television%20stations%20in%20the%20United%20States | This is a list of United States television stations which broadcast using the ATSC 3.0 standard, branded as "NextGen TV". |
https://en.wikipedia.org/wiki/Luttinger%E2%80%93Kohn%20model | A flavor of the k·p perturbation theory used for calculating the structure of multiple, degenerate electronic bands in bulk and quantum well semiconductors. The method is a generalization of the single band k·p theory.
In this model the influence of all other bands is taken into account by using Löwdin's perturbation method.
Background
All bands can be subdivided into two classes:
Class A: six valence bands (heavy hole, light hole, split off band and their spin counterparts) and two conduction bands.
Class B: all other bands.
The method concentrates on the bands in Class A, and takes into account Class B bands perturbatively.
We can write the perturbed solution as a linear combination of the unperturbed eigenstates :
Assuming the unperturbed eigenstates are orthonormalized, the eigenequation are:
,
where
.
From this expression we can write:
,
where the first sum on the right-hand side is over the states in class A only, while the second sum is over the states on class B. Since we are interested in the coefficients for m in class A, we may eliminate those in class B by an iteration procedure to obtain:
,
Equivalently, for ():
and
.
When the coefficients belonging to Class A are determined so are .
Schrödinger equation and basis functions
The Hamiltonian including the spin-orbit interaction can be written as:
,
where is the Pauli spin matrix vector. Substituting into the Schrödinger equation in Bloch approximation we obtain
,
where
and the perturbation Hamiltonian can be defined as
The unperturbed Hamiltonian refers to the band-edge spin-orbit system (for k=0). At the band edge, conduction band Bloch waves exhibit s-like symmetry, while valence band states are p-like (3-fold degenerate without spin). Let us denote these states as , and , and respectively. These Bloch functions can be pictured as periodic repetition of atomic orbitals, repeated at intervals corresponding to the lattice spacing. The Bloch function can be expanded in |
https://en.wikipedia.org/wiki/Molybdenite | Molybdenite is a mineral of molybdenum disulfide, MoS2. Similar in appearance and feel to graphite, molybdenite has a lubricating effect that is a consequence of its layered structure. The atomic structure consists of a sheet of molybdenum atoms sandwiched between sheets of sulfur atoms. The Mo-S bonds are strong, but the interaction between the sulfur atoms at the top and bottom of separate sandwich-like tri-layers is weak, resulting in easy slippage as well as cleavage planes.
Molybdenite crystallizes in the hexagonal crystal system as the common polytype 2H and also in the trigonal system as the 3R polytype.
Description
Occurrence
Molybdenite occurs in high temperature hydrothermal ore deposits.
Its associated minerals include pyrite, chalcopyrite, quartz, anhydrite, fluorite, and scheelite. Important deposits include the disseminated porphyry molybdenum deposits at Questa, New Mexico and the Henderson and Climax mines in Colorado. Molybdenite also occurs in porphyry copper deposits of Arizona, Utah, and Mexico.
The element rhenium is always present in molybdenite as a substitute for molybdenum, usually in the parts per million (ppm ) range, but often up to 1–2%. High rhenium content results in a structural variety detectable by X-ray diffraction techniques. Molybdenite ores are essentially the only source for rhenium. The presence of the radioactive isotope rhenium-187 and its daughter isotope osmium-187 provides a useful geochronologic dating technique.
Features
Molybdenite is extremely soft with a metallic luster, and is superficially almost identical to graphite, to the point where it is not possible to positively distinguish between the two minerals without scientific equipment. It marks paper in much the same way as graphite. Its distinguishing feature from graphite is its higher specific gravity, as well as its tendency to occur in a matrix.
Uses
Molybdenite is an important ore of molybdenum, and is the most common source of the metal. While |
https://en.wikipedia.org/wiki/David%20A.%20Cox | David Archibald Cox (born September 23, 1948 in Washington, D.C.) is a retired American mathematician, working in algebraic geometry.
Cox graduated from Rice University with a bachelor's degree in 1970 and his Ph.D. in 1975 at Princeton University, under the supervision of Eric Friedlander (Tubular Neighborhoods in the Etale Topology). From 1974 to 1975, he was assistant professor at Haverford College and at Rutgers University from 1975 to 1979. In 1979, he became assistant professor and in 1988 professor at Amherst College.
He studies, among other things, étale homotopy theory, elliptic surfaces, computer-based algebraic geometry (such as Gröbner basis), Torelli sets and toric varieties, and history of mathematics. He is also known for several textbooks. He is a fellow of the American Mathematical Society.
From 1987 to 1988 he was a guest professor at Oklahoma State University. In 2012, he received the Lester Randolph Ford Award for Why Eisenstein Proved the Eisenstein Criterion and Why Schönemann Discovered It First.
Writings
With John Little, Donal O'Shea: Ideals, varieties, and algorithms: an introduction to computational algebraic geometry and commutative algebra, 3rd. edition, Springer Verlag 2007
David A. Cox, John Little, and Donal O'Shea: Using algebraic geometry, 2nd. edition, Graduate Texts in Mathematics, vol. 185, Springer-Verlag, 2005.
With Sheldon Katz: Mirror Symmetry and Algebraic Geometry, American Mathematical Society 1999
Galois Theory, Wiley/Interscience 2004
With Bernd Sturmfels, Dinesh Manocha (eds.) Applications of computational algebraic geometry, American Mathematical Society 1998
Primes of the form : Fermat, class field theory, and complex multiplication, Wiley 1989
With John Little, Henry Schenck: Toric Varieties, American Mathematical Society 2011
Contributions to Ernst Kunz Residues and duality for projective algebraic varieties, American Mathematical Society 2008
See also
Cox–Zucker machine
Cox ring |
https://en.wikipedia.org/wiki/Methyl-CpG-binding%20domain | The Methyl-CpG-binding domain (MBD) in molecular biology binds to DNA that contains one or more symmetrically methylated CpGs. MBD has negligible non-specific affinity for unmethylated DNA. In vitro foot-printing with the chromosomal protein MeCP2 showed that the MBD could protect a 12 nucleotide region surrounding a methyl CpG pair.
DNA methylation at CpG dinucleotides, the most common DNA modification in eukaryotes, has been associated with various phenomena such as alterations in chromatin structure, genomic imprinting, transposon and chromosome X inactivation, differentiation, and cancer. Effects of DNA methylation are mediated through proteins that bind to symmetrically methylated CpGs. Such proteins contain a specific domain of ~70 residues, the methyl-CpG-binding domain (MBD), which is linked to additional domains associated with chromatin, such as the bromodomain, the AT hook motif, the SET domain, or the PHD finger. MBD-containing proteins appear to act as structural proteins, which recruit a variety of histone deacetylase (HDAC) complexes and chromatin remodelling factors, leading to chromatin compaction and, consequently, to transcriptional repression. The MBD of MeCP2, MBD1, MBD2, MBD4 and BAZ2 mediates binding to DNA, and in cases of MeCP2, MBD1 and MBD2, preferentially to methylated CpG. In human MBD3 and SETDB1, the MBD has been shown to mediate protein-protein interactions. MBDs are also found in DNA demethylase.
The MBD folds into an alpha/beta sandwich structure comprising a layer of twisted beta sheet, backed by another layer formed by the alpha1 helix and a hairpin loop at the C terminus. These layers are both amphipathic, with the alpha1 helix and the beta sheet lying parallel and the hydrophobic faces tightly packed against each other. The beta sheet is composed of two long inner strands (beta2 and beta3) sandwiched by two shorter outer strands (beta1 and beta4).
The structure of the MBD domain bound to methylated DNA has been solved (). It |
https://en.wikipedia.org/wiki/KCNA10 | Potassium voltage-gated channel subfamily A member 10 also known as Kv1.8 is a protein that in humans is encoded by the KCNA10 gene. The protein encoded by this gene is a voltage-gated potassium channel subunit. |
https://en.wikipedia.org/wiki/Set-theoretic%20definition%20of%20natural%20numbers | In set theory, several ways have been proposed to construct the natural numbers. These include the representation via von Neumann ordinals, commonly employed in axiomatic set theory, and a system based on equinumerosity that was proposed by Gottlob Frege and by Bertrand Russell.
Definition as von Neumann ordinals
In Zermelo–Fraenkel (ZF) set theory, the natural numbers are defined recursively by letting be the empty set and for each n. In this way for each natural number n. This definition has the property that n is a set with n elements. The first few numbers defined this way are:
The set N of natural numbers is defined in this system as the smallest set containing 0 and closed under the successor function S defined by . The structure is a model of the Peano axioms . The existence of the set N is equivalent to the axiom of infinity in ZF set theory.
The set N and its elements, when constructed this way, are an initial part of the von Neumann ordinals. Ravven and Quine refer to these sets as "counter sets".
Frege and Russell
Gottlob Frege and Bertrand Russell each proposed defining a natural number n as the collection of all sets with n elements. More formally, a natural number is an equivalence class of finite sets under the equivalence relation of equinumerosity. This definition may appear circular, but it is not, because equinumerosity can be defined in alternate ways, for instance by saying that two sets are equinumerous if they can be put into one-to-one correspondence—this is sometimes known as Hume's principle.
This definition works in type theory, and in set theories that grew out of type theory, such as New Foundations and related systems. However, it does not work in the axiomatic set theory ZFC nor in certain related systems, because in such systems the equivalence classes under equinumerosity are proper classes rather than sets.
For enabling natural numbers to form a set, equinumerous classes are replaced by special sets, named cardinal |
https://en.wikipedia.org/wiki/Urania%20Propitia | Urania Propitia () is a book of astronomical tables written by Maria Cunitz and published in 1650. As Maria Cunitz was the daughter of both a physician and mathematician, it was her ability to grasp complex mathematics quickly and transcribe her findings as a polyglot that allowed her to do what few women had done before her.
Introduction
Urania Propitia was a simplification of the Rudolphine Tables written by Johannes Kepler in 1627. Kepler's dedication to Emperor Ferdinand II which was originally dedicated to Rudolf II was filled with complex and tedious logarithms. Cunitz found many errors within the Rudolphine Tables. The simplifications to these tables were published as the Urania Propitia. In Urania Propitia, Cunitz removed logarithms from Kepler's work, which increased the accuracy and simplified the calculations from the Rudolphine Tables. Cunitz omitted some coefficients from her equations, leading to inaccuracies within her work. Astronomical tables of the time all contained computational errors, so despite these errors, Urania Propitia is seen as more accurate than Kepler’s work. The tables are mostly astrological, but the instructions are completely astronomical.
Urania Propitia was published in Latin and German. The German publication is credited as a source that led to establishing German as a scientific language. The publishing Urania Propitia is credited for making astrological tables more accessible outside of universities.
Beyond the instructions, Maria Cunitz's book is split into three parts.
Part 1: Tables for spherical astronomy
The first part is the mathematical starting point. These include "sexagesimal sines, solutions of small right triangles in minutes and seconds, and tables for spherical astronomy for degrees of the ecliptic of: declination, right ascension, oblique ascension for latitudes 0 degrees to 72 degrees at 2 degree intervals..."
Part 2: Tables of average motions
It is the second part that the heart of Maria Cunitz's si |
https://en.wikipedia.org/wiki/Cupid%27s%20bow | The Cupid's bow is a facial feature where the double curve of a human upper lip is said to resemble the bow of Cupid, the Roman god of erotic love. The peaks of the bow coincide with the philtral columns giving a prominent bow appearance to the lip.
See also
Philtrum
White roll |
https://en.wikipedia.org/wiki/Neutral%20buoyancy | Neutral buoyancy occurs when an object's average density is equal to the density of the fluid in which it is immersed, resulting in the buoyant force balancing the force of gravity that would otherwise cause the object to sink (if the body's density is greater than the density of the fluid in which it is immersed) or rise (if it is less). An object that has neutral buoyancy will neither sink nor rise.
In scuba diving, the ability to maintain neutral buoyancy through controlled breathing, accurate weighting, and management of the buoyancy compensator is an important skill. A scuba diver maintains neutral buoyancy by continuous correction, usually by controlled breathing, as neutral buoyancy is an unstable condition for a compressible object in a liquid.
History
The mathematician Archimedes discovered much of how buoyancy works more than 2000 years ago. In his research, Archimedes discovered that an object is buoyed up by a force equal to the weight of the water displaced by the object. In other words, an inflatable boat that displaces 100 pounds (45 kilograms) of water is supported by the same amount of force. An object that floats in a fluid is known as being positively buoyant. An object that sinks to the bottom is negatively buoyant, while an object that remains in balance at the same level in the fluid is neutrally buoyant. Ways to adjust buoyancy were developed to produce equipment such as the inflatable life jacket, which is filled with gas and helps to reduce a person's average density, assisting in floating and swimming, as well as certain diving equipment (including submarines and submersibles) which have adjustable volume air chambers to regulate buoyancy.
Uses
Buoyancy is important in many fields. Boats, ships and seaplanes are engineered in a way that ensures that they remain afloat. Submarines have controllable buoyancy to make them submerge and rise on demand. Many objects were developed with buoyancy in mind, such as life preservers and pontoons.
B |
https://en.wikipedia.org/wiki/Complete%20set%20of%20commuting%20observables | In quantum mechanics, a complete set of commuting observables (CSCO) is a set of commuting operators whose common eigenvectors can be used as a basis to express any quantum state. In the case of operators with discrete spectra, a CSCO is a set of commuting observables whose simultaneous eigenspaces span the Hilbert space, so that the eigenvectors are uniquely specified by the corresponding sets of eigenvalues.
Since each pair of observables in the set commutes, the observables are all compatible so that the measurement of one observable has no effect on the result of measuring another observable in the set. It is therefore not necessary to specify the order in which the different observables are measured. Measurement of the complete set of observables constitutes a complete measurement, in the sense that it projects the quantum state of the system onto a unique and known vector in the basis defined by the set of operators. That is, to prepare the completely specified state, we have to take any state arbitrarily, and then perform a succession of measurements corresponding to all the observables in the set, until it becomes a uniquely specified vector in the Hilbert space (up to a phase).
The compatibility theorem
Consider two observables, and , represented by the operators and . Then the following statements are equivalent:
and are compatible observables.
and have a common eigenbasis.
The operators and commute, meaning that .
Proofs
Discussion
We consider the two above observables and . Suppose there exists a complete set of kets whose every element is simultaneously an eigenket of and . Then we say that and are compatible. If we denote the eigenvalues of and corresponding to respectively by and , we can write
If the system happens to be in one of the eigenstates, say, , then both and can be simultaneously measured to any arbitrary level of precision, and we will get the results and respectively. This idea can be extended to more than two |
https://en.wikipedia.org/wiki/Dueling%20Dinosaurs | The Dueling Dinosaurs or Montana Dueling Dinosaurs is a fossil specimen originating from the Hell Creek Formation of Montana. It consists of the fossilized skeletons of an adolescent Tyrannosaurus rex and a Triceratops horridus entangled with one another, and entombed in sandstone. The "dueling" inference comes from the numerous injuries sustained by both dinosaurs, including a tooth from the Tyrannosaurus embedded within the Triceratops, although it is not known whether they were actually buried fighting one another. Despite the scientific importance of the specimen, it has remained relatively obscure due to a lengthy legal dispute over property rights to the specimen, which has since been resolved. The fossil is currently in the possession of the North Carolina Museum of Natural Sciences.
History
The specimen was originally discovered in 2006 by ranchers Clayton Phipps, Mark Eatman, and Chad O’Connor in Montana. Two different ranching families, the Seversons and the Murrays, owned the land on which the fossils were found. After the fossils and the surrounding rock were excavated, the ranchers unsuccessfully tried to sell the fossil to several museums throughout the decade, including the Smithsonian and the Museum of the Rockies. The ranchers then attempted to sell the specimen to a private buyer, including auctioning at Bonhams, but also to no avail.
In 2016, Lindsay Zanno of the North Carolina Museum of Natural Sciences reached out to Phipps, starting negotiations to purchase the fossil, with funds being raised through the private nonprofit Friends of the North Carolina Museum of Natural Sciences. However, legal issues over rightful ownership of the fossils slowed these negotiations; the Seversons had most of the control over mineral rights on Murray land, and if whether fossils could be considered minerals (in which case the Seversons would have rights to it) was disputed. Although a previous court had ruled in favor of the Murrays, in November 2018 judges ru |
https://en.wikipedia.org/wiki/Desulfovibrio%20acrylicus | Desulfovibrio acrylicus is a bacterium from the genus of Desulfovibrio which has been isolated from marine sediments from the Wadden Sea. |
https://en.wikipedia.org/wiki/Schreier%20conjecture | In finite group theory, the Schreier conjecture asserts that the outer automorphism group of every finite simple group is solvable. It was proposed by Otto Schreier in 1926, and is now known to be true as a result of the classification of finite simple groups, but no simpler proof is known. |
https://en.wikipedia.org/wiki/W-algebra | In conformal field theory and representation theory, a W-algebra is an associative algebra that generalizes the Virasoro algebra. W-algebras were introduced by Alexander Zamolodchikov, and the name "W-algebra" comes from the fact that Zamolodchikov used the letter W for one of the elements of one of his examples.
Definition
A W-algebra is an associative algebra that is generated by the modes of a finite number of meromorphic fields , including the energy-momentum tensor . For , is a primary field of conformal dimension . The generators of the algebra are related to the meromorphic fields by the mode expansions
The commutation relations of are given by the Virasoro algebra, which is parameterized by a central charge . This number is also called the central charge of the W-algebra. The commutation relations
are equivalent to the assumption that is a primary field of dimension .
The rest of the commutation relations can in principle be determined by solving the Jacobi identities.
Given a finite set of conformal dimensions (not necessarily all distinct), the number of W-algebras generated by may be zero, one or more. The resulting W-algebras may exist for all , or only for some specific values of the central charge.
A W-algebra is called freely generated if its generators obey no other relations than the commutation relations. Most commonly studied W-algebras are freely generated, including the W(N) algebras. In this article, the sections on representation theory and correlation functions apply to freely generated W-algebras.
Constructions
While it is possible to construct W-algebras by assuming the existence of a number of meromorphic fields and solving the Jacobi identities, there also exist systematic constructions of families of W-algebras.
Drinfeld-Sokolov reduction
From a finite-dimensional Lie algebra , together with an embedding , a W-algebra may be constructed from the universal enveloping algebra of the affine Lie algebra by a kind of BRST co |
https://en.wikipedia.org/wiki/Desiccation%20tolerance | Desiccation tolerance refers to the ability of an organism to withstand or endure extreme dryness, or drought-like conditions. Plants and animals living in arid or periodically arid environments such as temporary streams or ponds may face the challenge of desiccation, therefore physiological or behavioral adaptations to withstand these periods are necessary to ensure survival. In particular, insects occupy a wide range of ecologically diverse niches and, so, exhibit a variety of strategies to avoid desiccation.
In general, desiccation resistance in insects is measured by the change in mass during dry conditions. The overall mass difference between measurements before and after aridity exposure is attributed to body water loss, as respiratory water loss is generally considered negligible.
Desiccation and plants
Desiccation tolerant plants include Craterostigma plantagineum, Lindernia brevidens and Ramonda serbica.
Desiccation sensitive plants include members of Arabidopsis genus, Lindernia subracemosa, Gossypium hirsutum, Triticum aestivum and Zea mays.
Types of desiccation resistance
There are three main ways in which insects can increase their tolerance to desiccation: by increasing their total body water content; by reducing the rate of body water loss; and by tolerating a larger proportion of overall water loss from the body. Survival time is determined by initial water content, and can be calculated by dividing water loss tolerance (the maximum amount of water that may be removed without resulting in death) by water loss rate.
Increasing body water content
Insects with a higher initial body water content have better survival rates during arid conditions than insects with a lower initial body water content. Higher amounts of internal body water lengthen the time necessary to remove the amount of water required to kill the organism. The way in which body water content is increased may differ depending on the species.
The accumulation of glycogen during |
https://en.wikipedia.org/wiki/Epigenetic%20theories%20of%20homosexuality | Epigenetic theories of homosexuality concern the studies of changes in gene expression or cellular phenotype caused by mechanisms other than changes in the underlying DNA sequence, and their role in the development of homosexuality. Epigenetics examines the set of chemical reactions that switch parts of the genome on and off at strategic times and locations in the organism's life cycle. However, epigenetic theories tangle a multiplicity of initiating causes and of resulting final effects and will never lead to a single cause or a single result. Hence, any interpretation of such theories may not focus just one isolated reason of a multiplicity of causes or of effects.
Instead of affecting the organism's DNA sequence, non-genetic factors may cause the organism's genes to express themselves differently. DNA in the human body is wrapped around histones, which are proteins that package and order DNA into structural units. DNA and histone are covered with chemical tags known as the epigenome, which shapes the physical structure of the genome. It tightly wraps inactive genes on the DNA sequence making those genes unreadable while loosely wrapping active genes making them more expressive. The more tightly wrapped the gene, the less it will be expressed in the organism. These epigenetic tags react to stimuli presented from the outside world. It adjusts specific genes in the genome to respond to humans' rapidly changing environments.
The idea of epigenetics and gene expression has been a theory applied to the origins of homosexuality in humans. One team of researchers examined the effects of epi-marks buffering XX fetuses and XY fetuses from certain androgen exposure and used published data on fetal androgen signaling and gene regulation through non-genetic changes in DNA packaging to develop a new model for homosexuality. The researchers found that stronger than average epi-marks, epigenomes that are wrapped tightly around the DNA sequence, convert sexual preference in ind |
https://en.wikipedia.org/wiki/Brachiocephalic%20artery | The brachiocephalic artery (or brachiocephalic trunk) is an artery of the mediastinum that supplies blood to the right arm and the head and neck. It was previously known as the innominate artery, meaning unnamed artery.
It is the first branch of the aortic arch. Soon after it emerges, the brachiocephalic artery divides into the right common carotid artery and the right subclavian artery.
There is no brachiocephalic artery for the left side of the body. The left common carotid, and the left subclavian artery, come directly off the aortic arch. However, there are two brachiocephalic veins.
Structure
The brachiocephalic artery arises, on a level with the upper border of the second right costal cartilage, from the start of the aortic arch, on a plane anterior to the origin of the left carotid artery. It ascends obliquely upward, backward, and to the right to the level of the upper border of the right sternoclavicular articulation, where it divides into the right common carotid artery and right subclavian arteries. The artery then crosses the trachea in front of it obliquely from the left to the right, roughly at the middle of the trachea or the level of the ninth tracheal cartilage.
Relations
Brachiocephalic artery has relation with:
anterior - left brachiocephalic vein and thymus
posterior - trachea
right - superior vena cava, right brachiocephalic vein, and pleura
left - left common carotid artery and thymus
Thymus typically sits atop the brachiocephalic artery, and separates the artery from the posterior surface of the manubrium of sternum.
Branches
The thyroid ima artery ascends in front of the trachea to the lower part of the thyroid, which it supplies.
Variation
The innominate artery usually gives off no branches, but occasionally a small branch, the thyroid ima artery, arises from it. Other times, it gives off a thymic or bronchial branch.
Thyroid ima artery varies greatly in size, and appears to compensate for deficiency or absence of one of the ot |
https://en.wikipedia.org/wiki/Void%20ratio | The void ratio of a mixture or composite is the ratio of the volume of voids to volume of solids.
It is a dimensionless quantity in materials science, and is closely related to porosity as follows:
and
where is void ratio, is porosity, VV is the volume of void-space (such as fluids), VS is the volume of solids, and VT is the total or bulk volume. This figure is relevant in composites, in mining (particular with regard to the properties of tailings), and in soil science. In geotechnical engineering, it is considered one of the state variables of soils and represented by the symbol e.
Note that in geotechnical engineering, the symbol usually represents the angle of shearing resistance, a shear strength (soil) parameter. Because of this, the equation is usually rewritten using for porosity:
and
where is void ratio, is porosity, VV is the volume of void-space (air and water), VS is the volume of solids, and VT is the total or bulk volume.
Engineering applications
Volume change tendency control. If void ratio is high (loose soils) voids in a soil skeleton tend to minimize under loading - adjacent particles contract. The opposite situation, i.e. when void ratio is relatively small (dense soils), indicates that the volume of the soil is vulnerable to increase under loading - particles dilate.
Fluid conductivity control (ability of water movement through the soil). Loose soils show high conductivity, while dense soils are not so permeable.
Particles movement. In a loose soil particles can move quite easily, whereas in a dense one finer particles cannot pass through the voids, which leads to clogging.
See also
Void (composites)
External links
Relation between void ratio and porosity |
https://en.wikipedia.org/wiki/Baker%E2%80%93Campbell%E2%80%93Hausdorff%20formula | In mathematics, the Baker–Campbell–Hausdorff formula is the solution for to the equation
for possibly noncommutative and in the Lie algebra of a Lie group. There are various ways of writing the formula, but all ultimately yield an expression for in Lie algebraic terms, that is, as a formal series (not necessarily convergent) in and and iterated commutators thereof. The first few terms of this series are:
where "" indicates terms involving higher commutators of and . If and are sufficiently small elements of the Lie algebra of a Lie group , the series is convergent. Meanwhile, every element sufficiently close to the identity in can be expressed as for a small in . Thus, we can say that near the identity the group multiplication in —written as —can be expressed in purely Lie algebraic terms. The Baker–Campbell–Hausdorff formula can be used to give comparatively simple proofs of deep results in the Lie group–Lie algebra correspondence.
If and are sufficiently small matrices, then can be computed as the logarithm of , where the exponentials and the logarithm can be computed as power series. The point of the Baker–Campbell–Hausdorff formula is then the highly nonobvious claim that can be expressed as a series in repeated commutators of and .
Modern expositions of the formula can be found in, among other places, the books of Rossmann and Hall.
History
The formula is named after Henry Frederick Baker, John Edward Campbell, and Felix Hausdorff who stated its qualitative form, i.e. that only commutators and commutators of commutators, ad infinitum, are needed to express the solution. An earlier statement of the form was adumbrated by Friedrich Schur in 1890 where a convergent power series is given, with terms recursively defined. This qualitative form is what is used in the most important applications, such as the relatively accessible proofs of the Lie correspondence and in quantum field theory. Following Schur, it was noted in print by Campbell ( |
https://en.wikipedia.org/wiki/Temporal%20network | A temporal network, also known as a time-varying network, is a network whose links are active only at certain points in time. Each link carries information on when it is active, along with other possible characteristics such as a weight. Time-varying networks are of particular relevance to spreading processes, like the spread of information and disease, since each link is a contact opportunity and the time ordering of contacts is included.
Examples of time-varying networks include communication networks where each link is relatively short or instantaneous, such as phone calls or e-mails. Information spreads over both networks, and some computer viruses spread over the second. Networks of physical proximity, encoding who encounters whom and when, can be represented as time-varying networks. Some diseases, such as airborne pathogens, spread through physical proximity. Real-world data on time resolved physical proximity networks has been used to improve epidemic modeling.
Neural networks and brain networks can be represented as time-varying networks since the activation of neurons are time-correlated.
Time-varying networks are characterized by intermittent activation at the scale of individual links. This is in contrast to various models of network evolution, which may include an overall time dependence at the scale of the network as a whole.
Applicability
Time-varying networks are inherently dynamic, and used for modeling spreading processes on networks. Whether using time-varying networks will be worth the added complexity depends on the relative time scales in question. Time-varying networks are most useful in describing systems where the spreading process on a network and the network itself evolve at similar timescales.
Let the characteristic timescale for the evolution of the network be , and the characteristic timescale for the evolution of the spreading process be . A process on a network will fall into one of three categories:
Static approximation – where |
https://en.wikipedia.org/wiki/Myopalladin | Myopalladin is a protein that in humans is encoded by the MYPN gene. Myopalladin is a muscle protein responsible for tethering proteins at the Z-disc and for communicating between the sarcomere and the nucleus in cardiac and skeletal muscle
Structure
Myopalladin is a 145.2 kDa protein composed of 1320 amino acids. Myopalladin has five Ig-like repeats within the protein, and a proline-rich domain. Myopalladin binds the Src homology domain of nebulette and nebulin and tethers it to alpha-actinin via its C-terminal domain binding to the EF hand domains of alpha-actinin. The N-terminal region of myopalladin binds to the nuclear protein CARP, known to regulate gene expression in muscle. It also has been shown to bind ANKRD23.
Function
Myopalladin has dual subcellular localization, residing in both the nucleus and sarcomere/I-bands in muscle. Accordingly, myopalladin has functions in both sarcomere assembly and in control of gene expression. Specifics of these functions were gleaned from studies involving MYPN mutants associated with various cardiomyopathies. The Q529X myopalladin mutant demonstrated incompetence in recruiting key binding partners such as desmin, alpha-actinin and CARP to the Z-disc during myofibrilogenesis. In contrast, the Y20C mutant resulted in decreased expression of binding partners.
Clinical significance
Mutations in MYPN have been linked to nemaline myopathy, dilated cardiomyopathy, hypertrophic cardiomyopathy and restrictive cardiomyopathy. |
https://en.wikipedia.org/wiki/Malgrange%E2%80%93Zerner%20theorem | In mathematics, Malgrange–Zerner theorem (named for Bernard Malgrange and Martin Zerner) shows that a function on allowing holomorphic extension in each variable separately can be extended, under certain conditions, to a function holomorphic in all variables jointly. This theorem can be seen as a generalization of Bochner's tube theorem to functions defined on tube-like domains whose base is not an open set.
Theorem Let
and let convex hull of . Let be a locally bounded function such that and that for any fixed point the function is holomorphic in in the interior of for each . Then the function can be uniquely extended to a function holomorphic in the interior of .
History
According to Henry Epstein, this theorem was proved first by Malgrange in 1961 (unpublished), then by Zerner (as cited in ), and commmunicated to him privately. Epstein's lectures contain the first published proof (attributed there to Broz, Epstein and Glaser). The assumption was later relaxed to (see Ref.[1] in ) and finally to . |
https://en.wikipedia.org/wiki/Kicker%20magnet | Kicker magnets are dipole magnets used to rapidly switch a particle beam between two paths. Conceptually similar to a railroad switch in function, a kicker magnet must switch on very rapidly, then maintain a stable magnetic field for some minimum time. Switch-off time is also important, but less critical.
An injection kicker magnet merges two beams incoming from different directions. Most commonly, there is a beam circulating in a synchrotron, in the form of a particle train which only partially fills the arc. As soon as the circulating particle train has passed the kicker, it is switched on so that an additional batch of particles may be appended to the train. The magnet must then be switched off in time to not affect the head of the train when it next rounds the synchrotron.
An ejection kicker magnet does the opposite, diverting a circulating beam so it leaves the synchrotron. Almost always, an ejection kicker is used to eject the entire particle train, emptying the synchrotron. This means that it has the entire tail-to-head gap in the synchrotron to function, and the switch-off time is essentially irrelevant. However, it must hold a stable field for longer (one full rotation of the synchrotron), and must generate a stronger magnetic field, as it is used to eject a higher energy beam that has been accelerated in the synchrotron.
The magnets are powered by a high voltage (usually in the range of tens of thousands of volts) source called a power modulator which uses a pulse forming network to produce a short pulse of current (usually in the range of a few nanoseconds to a microsecond and thousands of amperes in amplitude). The current produces a magnetic field in the magnet, which in turn imparts a Lorentz force on the particles as they traverse the magnet's length, causing the beam to deflect into the proper trajectory.
Because a kicker magnet applies a particular lateral impulse to the beam, to achieve a fixed deflection angle the strength of the kick |
https://en.wikipedia.org/wiki/Thymineless%20death | Thymineless death is the phenomenon by which bacteria, yeasts and mammalian cells undergo cell death when they are starved of thymidine triphosphate (dTTP), an essential precursor for DNA replication. This phenomenon underlies the mechanism of action of several antibacterial, antimalarial and anticancer agents, such as trimethoprim, sulfamethoxazole, methotrexate and fluorouracil.
History
The phenomenon was first reported in 1954 by Hazel D. Barner and Seymour S. Cohen in Escherichia coli when thymine-requiring mutants of the bacteria lost viability when grown in a medium lacking thymine but containing other essential nutrients. Subsequently, this discovery led to the development of theories to explain the mechanism of action of several pyrimidine analogs that targeted thymine metabolism in bacteria and tumor cells. The phenomenon was commonly attributed to "unbalanced growth" wherein cells continued fundamental processes of RNA transcription, protein synthesis and metabolism in the absence of DNA replication. However, nutrient starvation does not generally kill cells to the extent observed in cells that lack thymine. The molecular mechanism of thymineless death remains unknown; DNA breaks were observed during thymineless death, which could explain the killing. Possible pathways involved with the killing mechanism include: replication initiation, breakage of ongoing replication forks, futile DNA repair, replication origin destruction, and an addiction module. |
https://en.wikipedia.org/wiki/DNA%20profiling | DNA profiling (also called DNA fingerprinting and genetic fingerprinting) is the process of determining an individual's deoxyribonucleic acid (DNA) characteristics. DNA analysis intended to identify a species, rather than an individual, is called DNA barcoding.
DNA profiling is a forensic technique in criminal investigations, comparing criminal suspects' profiles to DNA evidence so as to assess the likelihood of their involvement in the crime. It is also used in paternity testing, to establish immigration eligibility, and in genealogical and medical research. DNA profiling has also been used in the study of animal and plant populations in the fields of zoology, botany, and agriculture.
Background
Starting in the 1980s, scientific advances allowed the use of DNA as a material for the identification of an individual. The first patent covering the direct use of DNA variation for forensics (US5593832A) was filed by Jeffrey Glassberg in 1983, based upon work he had done while at Rockefeller University in the United States in 1981.
British geneticist Sir Alec Jeffreys independently developed a process for DNA profiling in 1985 while working in the Department of Genetics at the University of Leicester. Jefferys discovered that a DNA examiner could establish patterns in unknown DNA. These patterns were a part of inherited traits that could be used to advance the field of relationship analysis. These discoveries lead to the first use of DNA profiling in a criminal case.
The process, developed by Jeffreys in conjunction with Peter Gill and Dave Werrett of the Forensic Science Service (FSS), was first used forensically in the solving of the murder of two teenagers who had been raped and murdered in Narborough, Leicestershire in 1983 and 1986. In the murder inquiry, led by Detective David Baker, the DNA contained within blood samples obtained voluntarily from around 5,000 local men who willingly assisted Leicestershire Constabulary with the investigation, resulted in the e |
https://en.wikipedia.org/wiki/Arcto-Tertiary%20Geoflora | The Arcto-Tertiary Geoflora is a hypothesized floral assemblage that once covered the Northern Hemisphere, from roughly the late Mesozoic to mid Cenozoic Eras.
Origins
First proposed by the paleobotanists J.S. Gardner and C. Ettinghausen in 1879, the concept was intended to answer questions about the disjunct distribution of identical or closely related plant species: for instance, magnolia and tulip trees are native to both the Southeast United States and southern China and Indochina.
As envisioned, the ATG had a wide distribution when the global climate was much warmer than it is currently, a situation strengthened by the closer position of some of the continents in late Mesozoic to early Cenozoic times. With the onset of global cooling and the Ice Ages, the ranges of these tropical to subtropical species were left in isolated pockets of warmer climates.
The southern, more tropical equivalent of the ATG was the Neotropical Tertiary Geoflora.
Footnotes
External links
https://php.radford.edu/~swoodwar/biomes/?page_id=94
Biogeography |
https://en.wikipedia.org/wiki/Population%20proportion | In statistics, a population proportion, generally denoted by or the Greek letter , is a parameter that describes a percentage value associated with a population. For example, the 2010 United States Census showed that 83.7% of the American population was identified as not being Hispanic or Latino; the value of .837 is a population proportion. In general, the population proportion and other population parameters are unknown. A census can be conducted in order to determine the actual value of a population parameter, but often a census is not practical due to its costs and time consumption.
A population proportion is usually estimated through an unbiased sample statistic obtained from an observational study or experiment. For example, the National Technological Literacy Conference conducted a national survey of 2,000 adults to determine the percentage of adults who are economically illiterate. The study showed that 72% of the 2,000 adults sampled did not understand what a gross domestic product is. The value of 72% is a sample proportion. The sample proportion is generally denoted by and in some textbooks by .
Mathematical definition
A proportion is mathematically defined as being the ratio of the quantity of elements (a countable quantity) in a subset to the size of a set :
where is the count of successes in the population, and is the size of the population.
This mathematical definition can be generalized to provide the definition for the sample proportion:
where is the count of successes in the sample, and is the size of the sample obtained from the population.
Estimation
One of the main focuses of study in inferential statistics is determining the "true" value of a parameter. Generally, the actual value for a parameter will never be found, unless a census is conducted on the population of study. However, there are statistical methods that can be used to get a reasonable estimation for a parameter. These methods include confidence intervals and hypoth |
https://en.wikipedia.org/wiki/Renzo%20L.%20Ricca | Renzo Luigi Ricca (24 January 1960) is an Italian-born applied mathematician (naturalised British citizen), professor of mathematical physics at the University of Milano-Bicocca. His principal research interests are in classical field theory, dynamical systems (classical and quantum vortex dynamics and magnetohydrodynamics in particular) and structural complexity. He is known for his contributions to the field of geometric and topological fluid dynamics and, in particular, for his work on geometric and topological aspects of kinetic and magnetic helicity, and physical knot theory in general.
Education
Ricca was born and educated first in Casale Monferrato, and then in Turin and Cambridge (UK). He attended the Liceo Scientifico Palli before reading engineering and mathematical sciences at the Politecnico di Torino, where he graduated in 1988. By a prestigious doctoral grant offered by the Association for the Promotion of the Scientific and Technological Development of Piedmont (ASSTP, Turin) he entered Trinity College at the University of Cambridge, where he read mathematics. His Ph.D. work was conducted under the guidance of H. Keith Moffatt on the subject of topological fluid dynamics. In 1991 while completing his doctoral studies he was awarded the J.T. Knight's Prize in Mathematics for work on geometric interpretation of soliton conserved quantities, obtaining the Ph.D. in Applied Mathematics for work on geometric and topological aspects of vortex filament dynamics.
Career
In 1992, after visiting the Institute for Theoretical Physics (UC Santa Barbara) and the Institute for Advanced Study (Princeton),
Ricca returned to Europe joining the faculty of the mathematics department of the University College London, first as a research fellow. and then as a senior research fellow and part-time lecturer. From 1993 to 1995 he also held a joint position as university researcher at the Politecnico di Torino. In 2003 he moved to the Department of Mathematics and Applicati |
https://en.wikipedia.org/wiki/Immunotransplant | Immunotransplant is a maneuver used to make vaccines more powerful. It refers to the process of infusing vaccine-primed T lymphocytes into lymphodepleted recipients for the purpose of enhancing the proliferation and function of those T cells and increasing immune protection induced by that vaccine.
The concept takes advantage of data from animal and studies in vaccinology and the homeostasis of T cells and has applications in the treatment of infectious disease, immunodeficiency syndromes, and cancer.
Basic Immunology
Vaccines
Historically, the effect of vaccines -particularly against pathogens- has been assessed by measurement of their induction of a B-cell-mediated -or humoral- immune response, i.e. the production of pathogen-specific antibodies. In the study of both infectious diseases and cancer, a majority of potential immune targets are only expressed intra-cellularly, and are thus inaccessible to antibody-mediated elimination. T-cell mediated immunity, by contrast, has the potential to recognize targets expressed either extra- or intra-cellularly and has therefore been studied extensively for treatment of these diseases.
A number of pre-clinical and clinical studies have demonstrated that vaccines against pathogens, bystander (non-pathogenic) proteins, tumor-associated antigens, or whole tumor cells, can induce specific T-cell mediated immune responses. A number of approaches have been considered to amplify T cell mediated immune responses(e.g. IL-2, CTLA-4, IL-7, CD137), and some of these have shown clinical efficacy in eliminating particular types of cancer, most notably melanoma and renal cell carcinoma.
T-Cell Homeostasis and Homeostatic Proliferation
The use of immunotransplant to enhance T cell-mediated immune responses, derive from studies of T cell homeostasis. The total cohort of T cells in an organism maintain homeostasis – a consistent total number of T cells in the peripheral blood. Transient elevations in peripheral blood T cell counts |
https://en.wikipedia.org/wiki/Sinespace | Sinespace is a free-to-play massively multiplayer online Unity 3D-based platform created and published by Sine Wave Entertainment. It enables users to create and sell 3D content and interact with others as 3D avatars. It was beta launched in November 2016 and teamed up with Unity to make its SDK available in the Unity Asset Store in March 2019. It supports Oculus Rift, HTC Vive and Windows Mixed Reality headsets, but is also accessible through PC, Mac, Linux, and Chrome web browsers.
Usage
Sinespace's usage is similar to that of multiplayer virtual worlds. Players can create and customize their own 3D worlds and 3D content such as vehicles, mini-games, avatar clothing and gestures, and sell them for real world money. Players can also customize the shape and appearance of their avatar and buy avatars from third party developers such as Daz 3D. Content is created through a Unity 3D-compatible SDK, and in-game through building tools.
Enterprise
Sinespace also has private, white-labeled grids for enterprise use. Customers include the U.S. Department of Defense, Pearson Education, Virgin Group, the Smithsonian, the University of Edinburgh, Michigan State University, and other organizations.
Events
Sinespace has hosted several in-world talk shows featuring live audiences of avatars with notable people in the arts and technology, who also appear in avatar form, including video game designer Warren Spector, VR pioneer Jaron Lanier, MMO pioneer Richard Bartle, and Hugh Welchman, producer of the Oscar-nominated animated feature Loving Vincent.
Developer
Sinespace's lead developer is Adam Frisby, who was also a key developer of the open source virtual world OpenSimulator. Frisby additionally created a company that earned seven figures in real money by selling content in Second Life. Sinespace is published by Sine Wave Entertainment, a company based in London. The Chairman is Peter Norris, who is also Chairman of Virgin Group. |
https://en.wikipedia.org/wiki/Fast%20radio%20burst | In radio astronomy, a fast radio burst (FRB) is a transient radio pulse of length ranging from a fraction of a millisecond, for a ultra-fast radio burst, to 3 seconds, caused by some high-energy astrophysical process not yet understood. Astronomers estimate the average FRB releases as much energy in a millisecond as the Sun puts out in three days. While extremely energetic at their source, the strength of the signal reaching Earth has been described as 1,000 times less than from a mobile phone on the Moon. The first FRB was discovered by Duncan Lorimer and his student David Narkevic in 2007 when they were looking through archival pulsar survey data, and it is therefore commonly referred to as the Lorimer Burst. Many FRBs have since been recorded, including several that have been detected to repeat in seemingly irregular ways. Only one FRB has been detected to repeat in a regular way: FRB 180916 seems to pulse every 16.35 days.
Most FRBs are extragalactic, but the first Milky Way FRB was detected by the CHIME radio telescope in April 2020. In June 2021, astronomers reported over 500 FRBs from outer space detected.
When the FRBs are polarized, it indicates that they are emitted from a source contained within an extremely powerful magnetic field. The exact origin and cause of the FRBs is still the subject of investigation; proposals for their origin range from a rapidly rotating neutron star and a black hole, to extraterrestrial intelligence. In 2020, astronomers reported narrowing down a source of fast radio bursts, which may now plausibly include "compact-object mergers and magnetars arising from normal core collapse supernovae". A neutron star has been proposed as the origin of an unusual FRB with periodic peaks lasting over 3 seconds reported in 2022.
The discovery in 2012 of the first repeating source, FRB 121102, and its localization and characterization in 2017, has improved the understanding of the source class. FRB 121102 is identified with a galaxy at a di |
https://en.wikipedia.org/wiki/Technetium-99m%20generator | A technetium-99m generator, or colloquially a technetium cow or moly cow, is a device used to extract the metastable isotope 99mTc of technetium from a decaying sample of molybdenum-99. 99Mo has a half-life of 66 hours and can be easily transported over long distances to hospitals where its decay product technetium-99m (with a half-life of only 6 hours, inconvenient for transport) is extracted and used for a variety of nuclear medicine diagnostic procedures, where its short half-life is very useful.
Parent isotope source
99Mo can be obtained by the neutron activation (n,γ reaction) of 98Mo in a high neutron flux reactor. However, the most frequently used method is through fission of uranium-235 in a nuclear reactor. While most reactors currently engaged in 99Mo production use highly enriched uranium-235 targets, proliferation concerns have prompted some producers to transition to low-enriched uranium targets. The target is irradiated with neutrons to form 99Mo as a fission product (with 6.1% yield). Molybdenum-99 is then separated from unreacted uranium and other fission products in a hot cell.
Generator invention and history
99mTc remained a scientific curiosity until the 1950s when Powell Richards realized the potential of technetium-99m as a medical radiotracer and promoted its use among the medical community. While Richards was in charge of the radioisotope production at the Hot Lab Division of the Brookhaven National Laboratory, Walter Tucker and Margaret Greene were working on how to improve the separation process purity of the short-lived eluted daughter product iodine-132 from tellurium-132, its 3.2-days parent, produced in the Brookhaven Graphite Research Reactor. They detected a trace contaminant which proved to be 99mTc, which was coming from 99Mo and was following tellurium in the chemistry of the separation process for other fission products. Based on the similarities between the chemistry of the tellurium-iodine parent-daughter pair, Tucker and Green |
https://en.wikipedia.org/wiki/SeaLifeBase | SeaLifeBase is a global online database of information about marine life. It aims to provide key information on the taxonomy, distribution and ecology of all marine species in the world apart from finfish. SeaLifeBase is in partnership with the WorldFish Center in Malaysia and the UBC Institute for the Oceans and Fisheries at the University of British Columbia. Daniel Pauly is the principal investigator and it is coordinated by Maria Lourdes D. Palomares. , it included descriptions of 85,000 species, 59,400 common names, 15,500 pictures, and references to 39,300 works in the scientific literature. SeaLifeBase complements FishBase, which provides parallel information for finfish.
History
The origins of SeaLifeBase go back to the 1970s, when the fisheries scientist Daniel Pauly found himself struggling to test a hypothesis on how the growing ability of fish was affected by the size of their gills. Hypotheses, such as this one, could be tested only if large amounts of empirical data were available. At the time, fisheries management used analytical models which required estimates for fish growth and mortality. Pauly believed that the only practical way fisheries managers could access the volume of data they needed was to assemble all the data available in the published literature into some central repository. This would mean that when a new hypothesis needs to be tested, the available data will already be there in a validated and accessible form, and there will be no need create a new dataset and then have to validate it. Pauly recruited Rainer Froese, and the beginnings of a software database along these lines was encoded in 1988. This database, initially confined to tropical fish, became the prototype for FishBase. FishBase was extended to cover all finfish, and is now the largest online database for fish in the world.
Given FishBase's success, there was naturally a demand for a database covering forms of aquatic life other than finfish. This resulted, in 2006, in t |
https://en.wikipedia.org/wiki/Conformon | From a biological standpoint, the goal-directed molecular motions inside living cells are carried out by biopolymers acting like molecular machines (e.g. myosin, RNA/DNA polymerase, ion pumps, etc.). These molecular machines are driven by conformons, that is sequence-specific mechanical strains generated by free energy released in chemical reactions or stress induced destabilisations in supercoiled biopolymer chains. Therefore, conformons can be defined as packets of conformational energy generated from substrate binding or chemical reactions and confined within biopolymers.
On the other hand, from a physics standpoint, the conformon is a localization of elastic and electronic energy which may propagate in space with or without dissipation. The mechanism which involves dissipationless propagation is a form of molecular superconductivity. On quantum mechanical level both elastic/vibrational and electronic energy can be quantised, therefore the conformon carries a fixed portion of energy. This has led to the definition of quantum of conformation (shape). |
https://en.wikipedia.org/wiki/Streptogramin | Streptogramins are a class of antibiotics.
Streptogramins are effective in the treatment of vancomycin-resistant Staphylococcus aureus (VRSA) and vancomycin-resistant Enterococcus (VRE), two of the most rapidly growing strains of multidrug-resistant bacteria. They fall into two groups: streptogramin A and streptogramin B.
Members include:
Quinupristin/dalfopristin
Pristinamycin
Virginiamycin
NXL 103, an experimental streptogramin in clinical trials for the treatment of respiratory tract infections. |
https://en.wikipedia.org/wiki/Environment%20artist | An environment artist is a professional artist who works in the video game industry or film industry as a 3D modeler, specializing in outdoor and indoor locations for a game's setting. They are responsible for creating the majority of the overall asset and visuals the player will encounter on the screen, modelling, texturing and placing assets, buildings, streets, foliage, furniture and all other elements into a scene using a method called set dressing. They
also approximate collision so that the player isn't running through walls or other objects that block, optimize topology so that the level runs at a manageable framerate, and help bring life to the game world. Environment art has become an increasingly desired field of work since the rise of console gaming. With more technology comes better environments. There is usually direct correlation between time and quality of environment art. |
https://en.wikipedia.org/wiki/Functional%20contextualism | Functional contextualism is a modern philosophy of science rooted in philosophical pragmatism and contextualism. It is most actively developed in behavioral science in general and the field of behavior analysis and contextual behavioral science in particular (see the entry for the Association for Contextual Behavioral Science). Functional contextualism serves as the basis of a theory of language known as relational frame theory and its most prominent application, acceptance and commitment therapy. It is an extension and contextualistic interpretation of B.F. Skinner's radical behaviorism first delineated by Steven C. Hayes which emphasizes the importance of predicting and influencing psychological events (including thoughts, feelings, and behaviors) with precision, scope, and depth, by focusing on manipulable variables in their context.
Contextualism
The form of contextualism from which functional contextualism emerged is the one described by the philosopher Stephen C. Pepper in his book World Hypotheses: A Study in Evidence. In this work, Pepper noted that philosophical systems tend to cluster around a few distinct "world hypotheses" or "world views". Each world view is characterized by a distinctive underlying root metaphor and truth criterion. Root metaphors are based on seemingly well-understood, common-sense, everyday objects or ideas, and serve as the basic analogy by which an analyst attempts to understand the world. A world view's root metaphor roughly corresponds to its ontological assumptions, or views about the nature of being or existence (e.g., whether the universe is deterministic or not). Truth criteria are inextricably linked to their root metaphors, and provide the basis for evaluating the validity of analyses. A world view's truth criterion roughly corresponds to its epistemological assumptions, or views about the nature of knowledge and truth (e.g., whether it is discovered or constructed).
The root metaphor of contextualism is the "act in conte |
https://en.wikipedia.org/wiki/Albert%20Morris | Albert Morris (13 August 1886 in Bridgetown, South Australia – 9 January 1939, Broken Hill New South Wales) was an acclaimed Australian botanist, landscaper, ecologist, conservationist and developer of arid-zone revegetation techniques that featured natural regeneration . Morris is particularly celebrated for his decisive role in the development of the Broken Hill regeneration area, a pioneering arid-zone natural regeneration project. The regeneration area project exhibited standards and principles characteristic of the contemporary environmental repair practice, ecological restoration. The work of Albert Morris, Margaret Morris and their restoration colleagues significantly influenced the development of New South Wales government soil erosion management policies in the 1940s.
First Nations communities
From time immemorial Traditional Owners, the Wilyakali people, cared for homelands that encompassed the extended Broken Hill and Barrier Ranges region, western New South Wales (hereafter NSW). They maintained relations with the Barkandji (aka Paakantyi) nation, of the Baaka (aka Darling River). From ca.1830 onwards, pastoralists forcibly dispossessed the Barkandji and Wilyakali communities, seizing homelands along the Baaka and steadily extending their influence to more distant regions. As well as being dispossessed of their spiritually significant homelands, First Nations communities of western NSW were for many decades subjected to various hardships: material deprivation; widespread ill health and epidemics; racism; confinement to government reserves and denial of civil liberties. Dedicated government rectification of these injustices only commenced in the latter decades of the twentieth century. In 2015, the Wilyakali community and the Barkandji nation, after eighteen years of challenging and protracted legal proceedings, were successful in establishing their Native title claim to traditional homelands along the Baaka and extensive areas of western NSW. Today, |
https://en.wikipedia.org/wiki/Megawatts%20and%20Megatons | Megawatts and Megatons is a 2001 book by Richard L. Garwin and Georges Charpak. The book is said to be a good primer on nuclear power and also a detailed discussion of nuclear weapons and potential paths for weapons reduction.
The book presents detailed information about nuclear reactors and provides useful information on nuclear power program development in the United States and France. A discussion on nuclear weapons and non-proliferation follows.
See also
Megatons to Megawatts Program
List of books about nuclear issues
Nuclear disarmament
Energy amplifier
Accelerator-driven sub-critical reactor |
https://en.wikipedia.org/wiki/Trillium%20Model | The Trillium Model, created by a collaborative team from Bell Canada, Northern Telecom and Bell Northern Research (Northern Telecom and Bell Northern Research later merged into Nortel Networks) combines requirements from the ISO 9000 series, the Capability Maturity Model (CMM) for software, and the Baldrige Criteria for Performance Excellence, with software quality standards from the IEEE. Trillium has a telecommunications orientation and provides customer focus. The practices in the Trillium Model are derived from a benchmarking exercise which focused on all practices that would contribute to an organization's product development and support capability.
The Trillium Model covers all aspects of the software development life-cycle, most system and product development and support activities, and a significant number of related marketing activities. Many of the practices described in the model can be applied directly to hardware development.
Objectives
The Trillium Model has been developed from a customer perspective, as perceived in a competitive, commercial environment. The Model is used in a variety of ways:
In benchmarking an organization's product development and support process capability against best practices in the industry,
In self-assessment mode, to help identify opportunities for improvement within a product development organization, and
In pre-contractual negotiations, to assist in selecting a supplier.
This Model and its accompanying tools are not in themselves a product development process or life-cycle model. Rather, the Trillium Model provides key industry best practices which can be used to improve an existing process or life-cycle
Scale
The Trillium scale spans levels 1 through 5. Levels can be characterized in the following way:
Unstructured: The development process is ad hoc. Projects often cannot meet quality or schedule targets. Success, while possible, is based on individuals rather than on organizational infrastructure. (Risk – |
https://en.wikipedia.org/wiki/Financial%20correlation | Financial correlations measure the relationship between the changes of two or more financial variables over time. For example, the prices of equity stocks and fixed interest bonds often move in opposite directions: when investors sell stocks, they often use the proceeds to buy bonds and vice versa. In this case, stock and bond prices are negatively correlated.
Financial correlations play a key role in modern finance. Under the capital asset pricing model (CAPM; a model recognised by a Nobel prize), an increase in diversification increases the return/risk ratio. Measures of risk include value at risk, expected shortfall, and portfolio return variance.
Financial correlation and the Pearson product-moment correlation coefficient
There are several statistical measures of the degree of financial correlations. The Pearson product-moment correlation coefficient is sometimes applied to finance correlations. However, the limitations of Pearson correlation approach in finance are evident. First, linear dependencies as assessed by the Pearson correlation coefficient do not appear often in finance. Second, linear correlation measures are only natural dependence measures if the joint distribution of the variables is elliptical. However, only few financial distributions such as the multivariate normal distribution and the multivariate student-t distribution are special cases of elliptical distributions, for which the linear correlation measure can be meaningfully interpreted. Third, a zero Pearson product-moment correlation coefficient does not necessarily mean independence, because only the two first moments are considered. For example, (y ≠ 0) will lead to Pearson correlation coefficient of zero, which is arguably misleading. Since the Pearson approach is unsatisfactory to model financial correlations, quantitative analysts have developed specific financial correlation measures. Accurately estimating correlations requires the modeling process of marginals to incorporate char |
https://en.wikipedia.org/wiki/Viennese%20trichord | In music theory, a Viennese trichord (also Sus#4 chord, Viennese fourth chord, and tritone-fourth chord), named for the Second Viennese School, is a pitch set with prime form (0,1,6). Its Forte number is 3-5. The sets C–D–G and C–F–G are both examples of Viennese trichords, though they may be voiced in many ways.
According to Henry Martin, "[c]omposers such as Webern ... are partial to 016 trichords, given their 'more dissonant' inclusion of ics 1 and 6."
In jazz and popular music, the chord formed by the inversion of the set usually has a dominant function, being the third, seventh, and added fourth/eleventh of a dominant chord with elided root (and fifth, see jazz chord). For example, the Viennese trichord of C-F#-G could be considered a D11/C: D (elided) - F# - A (elided) - C - G. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.