source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Pre-algebra | Prealgebra is a common name for a course in middle school mathematics in the United States, usually taught in the 7th grade or 8th grade. The objective of it is to prepare students for the study of algebra. Usually, algebra is taught in the 8th and 9th grade.
As an intermediate stage after arithmetic, prealgebra helps students pass specific conceptual barriers. Students are introduced to the idea that an equals sign, rather than just being the answer to a question as in basic arithmetic, means that two sides are equivalent and can be manipulated together. They also learn how numbers, variables, and words can be used in the same ways.
Subjects
Subjects taught in a prealgebra course may include:
Review of natural number arithmetic
Types of numbers such as integers, fractions, decimals and negative numbers
Ratios and percents
Factorization of natural numbers
Properties of operations such as associativity and distributivity
Simple (integer) roots and powers
Rules of evaluation of expressions, such as operator precedence and use of parentheses
Basics of equations, including rules for invariant manipulation of equations
Understanding of variable manipulation
Manipulation and plotting in the standard 4-quadrant Cartesian coordinate plane
Powers in scientific notation (example: 340,000,000 in scientific notation is 3.4 × 108)
Identifying Probability
Solving Square roots
Pythagorean Theorem
Prealgebra may include subjects from geometry, especially to further the understanding of algebra in applications to area and volume.
Prealgebra may also include subjects from statistics to identify probability and interpret data.
Proficiency in prealgebra is an indicator of college success. It can also be taught as a remedial course for college students.
See also
Precalculus
Mathematics education in the United States |
https://en.wikipedia.org/wiki/Metric-affine%20gravitation%20theory | In comparison with General Relativity, dynamic variables of metric-affine gravitation theory are both a pseudo-Riemannian metric and a general linear connection on a world manifold . Metric-affine gravitation theory has been suggested as a natural generalization of Einstein–Cartan theory of gravity with torsion where a linear connection obeys the condition that a covariant derivative of a metric equals zero.
Metric-affine gravitation theory straightforwardly comes from gauge gravitation theory where a general linear connection plays the role of a gauge field. Let be the tangent bundle over a manifold provided with bundle coordinates . A general linear connection on is represented by a connection tangent-valued form
It is associated to a principal connection on the principal frame bundle of frames in the tangent spaces to whose structure group is a general linear group . Consequently, it can be treated as a gauge field. A pseudo-Riemannian metric on is defined as a global section of the quotient bundle , where is the Lorentz group. Therefore, one can regard it as a classical Higgs field in gauge gravitation theory. Gauge symmetries of metric-affine gravitation theory are general covariant transformations.
It is essential that, given a pseudo-Riemannian metric , any linear connection on admits a splitting
in the Christoffel symbols
a nonmetricity tensor
and a contorsion tensor
where
is the torsion tensor of .
Due to this splitting, metric-affine gravitation theory possesses a different collection of dynamic variables which are a pseudo-Riemannian metric, a non-metricity tensor and a torsion tensor. As a consequence, a Lagrangian of metric-affine gravitation theory can contain different terms expressed both in a curvature of a connection and its torsion and non-metricity tensors. In particular, a metric-affine f(R) gravity, whose Lagrangian is an arbitrary function of a scalar curvature of , is considered.
A linear connect |
https://en.wikipedia.org/wiki/Conformal%20anomaly | A conformal anomaly, scale anomaly, trace anomaly or Weyl anomaly is an anomaly, i.e. a quantum phenomenon that breaks the conformal symmetry of the classical theory.
In quantum field theory when we set to zero we have only Feynman tree diagrams, which is a "classical" theory (equivalent to the Fredholm formulation of a classical field theory).
One-loop (N-loop) Feynman diagrams are proportional to ().
If a current is conserved classically () but develops a divergence at loop level in quantum field theory (), we say there is an "anomaly." A famous example is the axial current anomaly where massless fermions will have a classically conserved axial current, but which develops a nonzero divergence in the presence of gauge fields.
A scale invariant theory, one in which there are no mass scales, will have a conserved Noether current called the "scale current." This is derived by performing scale transformations on the coordinates of space-time. The divergence of the scale current is then the trace of the stress tensor. In the absence of any mass scales the stress tensor trace vanishes (), hence the current is "classically conserved" and the theory is classically scale invariant.
However, at loop level the scale current can develop a nonzero divergence. This is called the "scale anomaly" or "trace anomaly" and represents the generation of mass
by quantum mechanics. It is related to the renormalization group,
or the "running of coupling constants," when they are viewed at different mass scales.
While this can be formulated without reference to gravity, it becomes more powerful
when general relativity is considered.
A classically conformal theory with arbitrary background metric has an action that is invariant under rescalings of the background metric and other matter fields,
called Weyl transformations. Note that if we rescale the coordinates this is a general coordinate transformation, and merges with general covariance, the exact symmetry of general r |
https://en.wikipedia.org/wiki/Ruckus%20Networks | RUCKUS Networks (formerly known as Ruckus Wireless) is a brand of wired and wireless networking equipment and software owned by CommScope. Ruckus offers Switches, Wi-Fi access points, CBRS access points, Controllers, Management systems, Cloud management, AAA/BYOD software, AI and ML analytics software, location software and IoT controller software products to mobile carriers, broadband service providers, and corporate enterprises. As a company, Ruckus invented and has patented wireless voice, video, and data technology, such as adaptive antenna arrays that extend signal range, increase data rates, and avoid interference, providing distribution of delay-sensitive content over standard 802.11 Wi-Fi.
RUCKUS began trading on the New York Stock Exchange in 2012, and was delisted in 2016, after it was acquired by Brocade Communications Systems for approximately $1.5 billion on May 27, 2016. Ruckus Wireless and Brocade ICX line of Switching products were acquired by Arris International for $800 million in a deal finalized on December 1, 2017. The company was renamed as Ruckus Networks, an ARRIS company from Ruckus Wireless. On April 4, 2019, CommScope completed its acquisition of Arris, which included the recently acquired Ruckus.
History
Origin, Incubation and Funding
RUCKUS Networks started in 2002 as an incubator project with name SCEOS (Sequoia Capital Entertainment Operating System) funded by a small seed round from Sequoia Capital, in Menlo Park, California. After incubation Ruckus was incorporated in June 2004 as Video54 Technologies Inc., by William Kish and Victor Shtrom. Sequoia Capital, WK Technology Fund, and Sutter Hill Ventures initially funded the company. Selina Lo was the first CEO of the company and continued until company's acquisition by Brocade Communications in 2016.
At its initial days, RUCKUS focuses on In-Home IPTV content distribution over wireless. In 2007, Ruckus introduced a miniaturised wireless multimedia adapter, the MediaFlex USB Dong |
https://en.wikipedia.org/wiki/Pseudopodia | A pseudopod or pseudopodium (: pseudopods or pseudopodia) is a temporary arm-like projection of a eukaryotic cell membrane that is emerged in the direction of movement. Filled with cytoplasm, pseudopodia primarily consist of actin filaments and may also contain microtubules and intermediate filaments. Pseudopods are used for motility and ingestion. They are often found in amoebas.
Different types of pseudopodia can be classified by their distinct appearances. Lamellipodia are broad and thin. Filopodia are slender, thread-like, and are supported largely by microfilaments. Lobopodia are bulbous and amoebic. Reticulopodia are complex structures bearing individual pseudopodia which form irregular nets. Axopodia are the phagocytosis type with long, thin pseudopods supported by complex microtubule arrays enveloped with cytoplasm; they respond rapidly to physical contact.
Some pseudopodial cells are able to use multiple types of pseudopodia depending on the situation: Most of them use a combination of lamellipodia and filopodia to migrate (such as metastatic cancer cells). The human foreskin fibroblasts can either use lamellipodia- or lobopodia-based migration in a 3D matrix depending on the matrix elasticity.
Generally, several pseudopodia arise from the surface of the body, (polypodial, for example, Amoeba proteus), or a single pseudopod may form on the surface of the body (monopodial, such as Entamoeba histolytica).
Cells which make pseudopods are generally referred to as amoeboids.
Formation
Via extracellular cue
To move towards a target, the cell uses chemotaxis. It senses extracellular signalling molecules, chemoattractants (e.g. cAMP for Dictyostelium cells), to extend pseudopodia at the membrane area facing the source of these molecules.
The chemoattractants bind to G protein-coupled receptors, which activate GTPases of the Rho family (e.g. Cdc42, Rac) via G-proteins.
Rho GTPases are able to activate WASp which in turn activate Arp2/3 complex which serve as |
https://en.wikipedia.org/wiki/Moufang%20polygon | In mathematics, Moufang polygons are a generalization by Jacques Tits of the Moufang planes studied by Ruth Moufang, and are irreducible buildings of rank two that admit the action of root groups.
In a book on the topic, Tits and Richard Weiss classify them all. An earlier theorem, proved independently by Tits and Weiss, showed that a Moufang polygon must be a generalized 3-gon, 4-gon, 6-gon, or 8-gon, so the purpose of the aforementioned book was to analyze these four cases.
Definitions
A generalized n-gon is a bipartite graph of diameter n and girth 2n.
A graph is called thick if all vertices have valence at least 3.
A root of a generalized n-gon is a path of length n.
An apartment of a generalized n-gon is a cycle of length 2n.
The root subgroup of a root is the subgroup of automorphisms of a graph that fix all vertices adjacent to one of the inner vertices of the root.
A Moufang n-gon is a thick generalized n-gon (with n>2) such that the root subgroup of any root acts transitively on the apartments containing the root.
Moufang 3-gons
A Moufang 3-gon can be identified with the incidence graph of a Moufang projective plane. In this identification, the points and lines of the plane correspond to the vertices of the building.
Real forms of Lie groups give rise to examples which are the three main types of Moufang 3-gons. There are four real division algebras: the real numbers, the complex numbers, the quaternions, and the octonions, of dimensions 1,2,4 and 8, respectively. The projective plane over such a division algebra then gives rise to a Moufang 3-gon.
These projective planes correspond to the building attached to SL3(R), SL3(C), a real form of A5 and to a real form of E6, respectively.
In the first diagram the circled nodes represent 1-spaces and 2-spaces in a three-dimensional vector space. In the second diagram the circled nodes represent 1-space and 2-spaces in a 3-dimensional vector space over the quaternions, which in turn represent certain 2-space |
https://en.wikipedia.org/wiki/Tree%20automaton | A tree automaton is a type of state machine. Tree automata deal with tree structures, rather than the strings of more conventional state machines.
The following article deals with branching tree automata, which correspond to regular languages of trees.
As with classical automata, finite tree automata (FTA) can be either a deterministic automaton or not. According to how the automaton processes the input tree, finite tree automata can be of two types: (a) bottom up, (b) top down. This is an important issue, as although non-deterministic (ND) top-down and ND bottom-up tree automata are equivalent in expressive power, deterministic top-down automata are strictly less powerful than their deterministic bottom-up counterparts, because tree properties specified by deterministic top-down tree automata can only depend on path properties. (Deterministic bottom-up tree automata are as powerful as ND tree automata.)
Definitions
A bottom-up finite tree automaton over F is defined as a tuple
(Q, F, Qf, Δ),
where Q is a set of states, F is a ranked alphabet (i.e., an alphabet whose symbols have an associated arity), Qf ⊆ Q is a set of final states, and Δ is a set of transition rules of the form f(q1(x1),...,qn(xn)) → q(f(x1,...,xn)), for an n-ary f ∈ F, q, qi ∈ Q, and xi variables denoting subtrees. That is, members of Δ are rewrite rules from nodes whose childs' roots are states, to nodes whose roots are states. Thus the state of a node is deduced from the states of its children.
For n=0, that is, for a constant symbol f, the above transition rule definition reads f() → q(f()); often the empty parentheses are omitted for convenience: f → q(f).
Since these transition rules for constant symbols (leaves) do not require a state, no explicitly defined initial states are needed.
A bottom-up tree automaton is run on a ground term over F, starting at all its leaves simultaneously and moving upwards, associating a run state from Q with each subterm.
The term is accepted if its root |
https://en.wikipedia.org/wiki/Betacoronavirus%201 | Betacoronavirus 1 is a species of coronavirus which infects humans and cattle. The infecting virus is an enveloped, positive-sense, single-stranded RNA virus and is a member of the genus Betacoronavirus and subgenus Embecovirus. Like other embecoviruses, it has an additional shorter spike-like surface protein called hemagglutinin esterase (HE) as well as the larger coronavirus spike protein. |
https://en.wikipedia.org/wiki/Ab%20initio%20methods%20%28nuclear%20physics%29 | In nuclear physics, ab initio methods seek to describe the atomic nucleus from the bottom up by solving the non-relativistic Schrödinger equation for all constituent nucleons and the forces between them. This is done either exactly for very light nuclei (up to four nucleons) or by employing certain well-controlled approximations for heavier nuclei. Ab initio methods constitute a more fundamental approach compared to e.g. the nuclear shell model. Recent progress has enabled ab initio treatment of heavier nuclei such as nickel.
A significant challenge in the ab initio treatment stems from the complexities of the inter-nucleon interaction. The strong nuclear force is believed to emerge from the strong interaction described by quantum chromodynamics (QCD), but QCD is non-perturbative in the low-energy regime relevant to nuclear physics. This makes the direct use of QCD for the description of the inter-nucleon interactions very difficult (see lattice QCD), and a model must be used instead. The most sophisticated models available are based on chiral effective field theory. This effective field theory (EFT) includes all interactions compatible with the symmetries of QCD, ordered by the size of their contributions. The degrees of freedom in this theory are nucleons and pions, as opposed to quarks and gluons as in QCD. The effective theory contains parameters called low-energy constants, which can be determined from scattering data.
Chiral EFT implies the existence of many-body forces, most notably the three-nucleon interaction which is known to be an essential ingredient in the nuclear many-body problem.
After arriving at a Hamiltonian (based on chiral EFT or other models) one must solve the Schrödinger equation
where is the many-body wavefunction of the A nucleons in the nucleus. Various ab initio methods have been devised to numerically find solutions to this equation:
Green's function Monte Carlo (GFMC)
No-core shell model (NCSM)
Coupled cluster (CC)
Self-cons |
https://en.wikipedia.org/wiki/E.164 | E.164 is an international standard (ITU-T Recommendation), titled The international public telecommunication numbering plan, that defines a numbering plan for the worldwide public switched telephone network (PSTN) and some other data networks.
E.164 defines a general format for international telephone numbers. Plan-conforming telephone numbers are limited to only digits and to a maximum of fifteen digits. The specification divides the digit string into a country code of one to three digits, and the subscriber telephone number of a maximum of twelve digits.
Alternative formats (with area codes and country specific numbers) are available. Any country-specific international call prefixes are not contained in the specification.
The title of the original version and first revision of the E.164 standard was Numbering Plan for the ISDN Era
Recommendations
E.163
E.163 was the former ITU-T recommendation for describing telephone numbers for the public switched telephone network (PSTN). In the United States, this was formerly referred to as a directory number. E.163 was withdrawn, and some recommendations were incorporated into revision 1 of E.164 in 1997.
E.164.1
This recommendation describes the procedures and criteria for the reservation, assignment, and reclamation of E.164 country codes and associated identification code (IC) assignments. The criteria and procedures are provided as a basis for the effective and efficient utilization of the available E.164 numbering resources.
E.164.2
This recommendation contains the criteria and procedures for an applicant to be temporarily assigned a three-digit identification code within the shared E.164 country code +991 for the purpose of conducting an international non-commercial trial.
E.164.3
This recommendation describes the principles, criteria, and procedures for the assignment and reclamation of resources within a shared E.164 country code for groups of countries. These shared country codes will coexist with all other |
https://en.wikipedia.org/wiki/Paul%20W.%20Chun | Paul W. Chun is a professor emeritus at the University of Florida. He is a researcher in the field of protein folding equilibria, in particular, he is known as the "leading proponent" of using the Planck-Benzinger thermal work function to understand protein folding thermodynamics and stability. As such Chun has written a number of papers relating to the thermodynamics of protein folding. He received his Ph.D. in 1965 from the University of Missouri for work on the interaction of casein molecules, and joined the department of biochemistry and molecular biology at the University of Florida soon thereafter. He retired in 2003.
He has published 68 peer-reviewed papers listed in Scopus. |
https://en.wikipedia.org/wiki/Deoxyadenosine%20diphosphate | Deoxyadenosine diphosphate is a nucleoside diphosphate. It is related to the common nucleic acid ATP, or adenosine triphosphate, with the -OH (hydroxyl) group on the 2' carbon on the nucleotide's pentose removed (hence the deoxy- part of the name), and with one fewer phosphoryl group than ATP. This makes it also similar to adenosine diphosphate except with a hydroxyl group removed.
Deoxyadenosine diphosphate is abbreviated dADP.
See also
Cofactor
Guanosine
Cyclic adenosine monophosphate |
https://en.wikipedia.org/wiki/Unit%20of%20measurement | A unit of measurement is a definite magnitude of a quantity, defined and adopted by convention or by law, that is used as a standard for measurement of the same kind of quantity. Any other quantity of that kind can be expressed as a multiple of the unit of measurement.
For example, a length is a physical quantity. The metre (symbol m) is a unit of length that represents a definite predetermined length. For instance, when referencing "10 metres" (or 10 m), what is actually meant is 10 times the definite predetermined length called "metre".
The definition, agreement, and practical use of units of measurement have played a crucial role in human endeavour from early ages up to the present. A multitude of systems of units used to be very common. Now there is a global standard, the International System of Units (SI), the modern form of the metric system.
In trade, weights and measures are often a subject of governmental regulation, to ensure fairness and transparency. The International Bureau of Weights and Measures (BIPM) is tasked with ensuring worldwide uniformity of measurements and their traceability to the International System of Units (SI).
Metrology is the science of developing nationally and internationally accepted units of measurement.
In physics and metrology, units are standards for measurement of physical quantities that need clear definitions to be useful. Reproducibility of experimental results is central to the scientific method. A standard system of units facilitates this. Scientific systems of units are a refinement of the concept of weights and measures historically developed for commercial purposes.
Science, medicine, and engineering often use larger and smaller units of measurement than those used in everyday life. The judicious selection of the units of measurement can aid researchers in problem solving (see, for example, dimensional analysis).
In the social sciences, there are no standard units of measurement and the theory and practice of m |
https://en.wikipedia.org/wiki/Doubly%20connected%20edge%20list | The doubly connected edge list (DCEL), also known as half-edge data structure, is a data structure to represent an embedding of a planar graph in the plane, and polytopes in 3D. This data structure provides efficient manipulation of the topological information associated with the objects in question (vertices, edges, faces). It is used in many algorithms of computational geometry to handle polygonal subdivisions of the plane, commonly called planar straight-line graphs (PSLG). For example, a Voronoi diagram is commonly represented by a DCEL inside a bounding box.
This data structure was originally suggested by Muller and Preparata for representations of 3D convex polyhedra.
Later, a somewhat different data structure was suggested, but the name "DCEL" was retained.
For simplicity, only connected graphs are considered, however the DCEL structure may be extended to handle disconnected graphs as well by introducing dummy edges between disconnected components.
Data structure
DCEL is more than just a doubly linked list of edges. In the general case, a DCEL contains a record for each edge, vertex and face of the subdivision. Each record may contain additional information, for example, a face may contain the name of the area. Each edge usually bounds two faces and it is, therefore, convenient to regard each edge as two "half-edges" (which are represented by the two edges with opposite directions, between two vertices, in the picture on the right). Each half-edge is "associated" with a single face and thus has a pointer to that face. All half-edges associated with a face are clockwise or counter-clockwise. For example, in the picture on the right, all half-edges associated with the middle face (i.e. the "internal" half-edges) are counter-clockwise. A half-edge has a pointer to the next half-edge and previous half-edge of the same face. To reach the other face, we can go to the twin of the half-edge and then traverse the other face. Each half-edge also has a pointer t |
https://en.wikipedia.org/wiki/Berylliosis | Berylliosis, or chronic beryllium disease (CBD), is a chronic allergic-type lung response and chronic lung disease caused by exposure to beryllium and its compounds, a form of beryllium poisoning. It is distinct from acute beryllium poisoning, which became rare following occupational exposure limits established around 1950. Berylliosis is an occupational lung disease.
While there is no cure, symptoms can be treated.
Signs and symptoms
With single or prolonged exposure by inhalation the lungs may become sensitized to beryllium. Berylliosis has a slow onset and progression. Some people who are sensitized to beryllium may not have symptoms. Continued exposure causes the development of small inflammatory nodules, called granulomas. Of note, the authors of a 2006 study suggested that beryllium inhalation was not the only form of exposure and perhaps skin exposure was also a cause, as they found that a reduction in beryllium inhalation did not result in a reduction in CBD or beryllium sensitization.
Granulomas are seen in other chronic diseases, such as tuberculosis and sarcoidosis, and it can occasionally be hard to distinguish berylliosis from these disorders. However, granulomas of CBD will typically be non-caseating, i.e. not characterized by necrosis and therefore not exhibiting a cheese-like appearance grossly.
Ultimately, this process leads to restrictive lung disease (a decrease in diffusion capacity).
The earliest symptoms are typically cough and shortness of breath. Other symptoms include chest pain, joint aches, weight loss, and fever.
Rarely, one can get granulomas in other organs including the liver.
The onset of symptoms can range from weeks up to tens of years from the initial exposure. In some individuals, a single exposure to beryllium can cause berylliosis.
Pathogenesis
In susceptible persons, beryllium exposure can lead to a cell-mediated immune response. The T-cells become sensitized to beryllium. Each subsequent exposure leads to an immune re |
https://en.wikipedia.org/wiki/Competition%20number | In many sports, a competition number is used to identify and differentiate the competitors taking part in a competitive endeavour. For example, runners in a race may wear prominent competition numbers so that they may be clearly identified from a distance. Competition numbers are differentiated from uniform numbers in that the former are used for a specific event (for example, competition numbers worn by marathon runners) while the latter persist over time through multiple events, seasons, or sometimes an entire career (for example, uniform numbers worn by Major League Baseball players).
Competition numbers may also be called bib numbers when worn on bibs over, or affixed to, the athletes' tops. With new technology, bibs might contain timing chips for electronic identification. In addition to identifying an athlete, many high profile events also imprint sponsor logos. In such high profile events, bib numbers are mandatory. Failure to wear them could make an athlete subject to disqualification.
Athletics
Since the 2000s, track and field athletes at major competitions wear their names as well as their numbers on their bibs. In relay events, all team members have the IOC country code. Track athletes also wear lane numbers on the shorts called "hip numbers", for identification by the fully automatic timing system which photographs athletes from the side as they cross a finish line. In racewalking events, competitors also must wear numbers on their backs for identification by the judges after a violation has been detected.
In mixed competitions, like marathons, where professional athletes run on the same course as non-elite athletes, the professionals traditionally wear bibs with their names to differentiate their pre-race status.
Gallery
Motorsport
In some types of motorsport, such as rallys, competition numbers are attached to the vehicles taking part in a specific event. The competition number can also be used in conjunction with some kinds of timing systems, |
https://en.wikipedia.org/wiki/Tetens%20equation | The Tetens equation is an equation to calculate the saturation vapour pressure of water over liquid and ice. It is named after its creator, O. Tetens who was an early German meteorologist. He published his equation in 1930, and while the publication itself is rather obscure, the equation is widely known among meteorologists and climatologists because of its ease of use and relative accuracy at temperatures within the normal ranges of natural weather conditions.
The equation is structurally identical to the August-Roche-Magnus equation, but the coefficients differ.
Formula
Monteith and Unsworth (2008) provide Tetens' formula for temperatures above 0 °C:
where temperature is in degrees Celsius (°C) and saturation vapor pressure is in kilopascals (kPa). According to Monteith and Unsworth, "Values of saturation vapour pressure from Tetens' formula are within 1 Pa of exact values up to 35 °C."
Murray (1967) provides Tetens' equation for temperatures below 0 °C:
See also
Vapour pressure of water
Antoine equation
Arden Buck equation
Lee–Kesler method
Goff–Gratch equation |
https://en.wikipedia.org/wiki/Circumpolar%20distribution | A circumpolar distribution is any range of a taxon that occurs over a wide range of longitudes but only at high latitudes; such a range therefore extends all the way around either the North Pole or the South Pole. Taxa that are also found in isolated high-mountain environments further from the poles are said to have arctic–alpine distributions.
Animals with circumpolar distributions include the reindeer, polar bear, Arctic fox, snowy owl, snow bunting, king eider, brent goose and long-tailed skua in the north, and the Weddell seal and Adélie penguin in the south.
Plants with northern circumpolar distributions include Eutrema edwardsii (syn. Draba laevigata), Saxifraga oppositifolia, Persicaria vivipara and Honckenya peploides. |
https://en.wikipedia.org/wiki/Paracellular%20transport | Paracellular transport refers to the transfer of substances across an epithelium by passing through the intercellular space between the cells. It is in contrast to transcellular transport, where the substances travel through the cell, passing through both the apical membrane and basolateral membrane.
The distinction has particular significance in renal physiology and intestinal physiology. Transcellular transport often involves energy expenditure whereas paracellular transport is unmediated and passive down a concentration gradient, or by osmosis (for water) and solvent drag for solutes. Paracellular transport also has the benefit that absorption rate is matched to load because it has no transporters that can be saturated.
In most mammals, intestinal absorption of nutrients is thought to be dominated by transcellular transport, e.g., glucose is primarily absorbed via the SGLT1 transporter and other glucose transporters. Paracellular absorption therefore plays only a minor role in glucose absorption, although there is evidence that paracellular pathways become more available when nutrients are present in the intestinal lumen. In contrast, small flying vertebrates (small birds and bats) rely on the paracellular pathway for the majority of glucose absorption in the intestine. This has been hypothesized to compensate for an evolutionary pressure to reduce mass in flying animals, which resulted in a reduction in intestine size and faster transit time of food through the gut.
Capillaries of the blood–brain barrier have only transcellular transport, in contrast with normal capillaries which have both transcellular and paracellular transport.
The paracellular pathway of transport is also important for the absorption of drugs in the gastrointestinal tract. The paracellular pathway allows the permeation of hydrophilic molecules that are not able to permeate through the lipid membrane by the transcellular pathway of absorption. This is particularly important for hydrophi |
https://en.wikipedia.org/wiki/Soul%20of%20a%20Robot | Soul of a Robot is a video game sequel to Nonterraqueous for the ZX Spectrum, Amstrad CPC and MSX, released by Mastertronic in 1985. It was sometimes called Nonterraqueous 2.
Plot
The attempt to destroy the rogue computer from Nonterraqueous failed. Now the computer threatens to self-destruct with old age, taking the planet Nonterraqueous with it. The people of the planet create another robot, one with the mind of a man. On a kamikaze mission to the computer's core, it must locate the three keys to allow it to transport to the next section, before self-destructing inside the computer's core.
Gameplay
Gameplay is rather different from the prequel Nonterraqueous. The robot which is controlled by the player does not "fly" like in the previous game but leaps rather like an ordinary platform game. However, the ability to fly is available in the game, and necessary to complete it. The robot still has a "psyche" value which must not be allowed to decrease to zero and which decreases with certain actions. The "laser" from the previous game also remains.
The game was considered much more difficult than its prequel, relying on perfectly timed and aimed jumps (the player is able to choose five "strengths" of jump) in order to progress, and enjoyed much less commercial success. The gameplay was much slower and jumps and flying can take a lot of time and effort to perform correctly. There also seems to be a certain influence from Underwurlde in the gameplay and sounds used in the game.
Soul of a Robot was also a much smaller game, the map containing only a third as many individual screens as its prequel, with only 256 rooms.
External links
Soul of a Robot at CPC Wiki
1985 video games
ZX Spectrum games
Amstrad CPC games
MSX games
Mastertronic games
Video games about robots
Video games developed in the United Kingdom
Video games set on fictional planets |
https://en.wikipedia.org/wiki/Yojimbo%20%28software%29 | Yojimbo is a personal information manager for MacOS by Bare Bones Software. It can store notes, images and media, URLs, web pages, and passwords. Yojimbo can also encrypt any of its contents and store the password in the Keychain. It is Bare Bones' second Cocoa application.
History
Yojimbo was first released on January 23, 2006. At the time, Bare Bones called it "a completely new information organizer".
Yojimbo 1.1
Yojimbo 1.3
Yojimbo 1.5
Yojimbo 2.0
Yojimbo 2.1
Yojimbo 2.2
Yojimbo 3 and new iPad version
Yojimbo 4
Yojimbo 4.5
In 2007, another developer, Adrian Ross, created Webjimbo, a web interface through which users can access their Yojimbo libraries.
Like other developers, Bare Bones Software faced difficulties adding iCloud sync due to early limitations in Apple's service. Tech reporter Christophe Laporte criticized Yojimbo's transition to iCloud as bungled, and expressed frustration at the lack of updates to the app. |
https://en.wikipedia.org/wiki/Brachyglene%20caenea | Brachyglene caenea is a moth of the family Notodontidae first described by Dru Drury in 1782. It is restricted
to south-eastern Brazil, from Rio de Janeiro south to Santa Catarina.
Description
Antennae black and setaceous. Thorax and abdomen nearly black. Wings deep brown, nearly black; the anterior having a yellow band crossing them from the anterior edges to the lower corners; and the posterior having a broad yellow streak on the anterior edges. Margins of the wings entire. Wingspan inches (70 mm). |
https://en.wikipedia.org/wiki/Light-front%20quantization%20applications | The light-front quantization of quantum field theories provides a useful alternative to ordinary equal-time quantization. In particular, it can lead to a relativistic description of bound systems in terms of quantum-mechanical wave functions. The quantization is based on the choice of light-front coordinates, where plays the role of time and the corresponding spatial coordinate is . Here, is the ordinary time, is a Cartesian coordinate, and is the speed of light. The other two Cartesian coordinates, and , are untouched and often called transverse or perpendicular, denoted by symbols of the type . The choice of the frame of reference where the time and -axis are defined can be left unspecified in an exactly soluble relativistic theory, but in practical calculations some choices may be more suitable than others. The basic formalism is discussed elsewhere.
There are many applications of this technique, some of which are discussed below. Essentially, the analysis of any relativistic quantum system can benefit from the use of light-front coordinates and the associated quantization of the theory that governs the system.
Nuclear reactions
The light-front technique was brought into nuclear physics by the pioneering papers of Frankfurt and Strikman. The emphasis was on using the correct kinematic variables (and the corresponding simplifications achieved) in making correct treatments of high-energy nuclear reactions. This sub-section focuses on only a few examples.
Calculations of deep inelastic scattering from nuclei require knowledge of nucleon distribution functions within the nucleus. These functions give the probability that a nucleon of momentum carries a given fraction of the plus component of the nuclear momentum, , .
Nuclear wave functions have been best determined using the equal-time framework. It therefore seems reasonable to see if one could re-calculate nuclear wave functions using the light front formalism. There are several basic nuclear structur |
https://en.wikipedia.org/wiki/Microgametogenesis | Microgametogenesis is the process in plant reproduction where a microgametophyte develops in a pollen grain to the three-celled stage of its development. In flowering plants it occurs with a microspore mother cell inside the anther of the plant.
When the microgametophyte is first formed inside the pollen grain four sets of fertile cells called sporogenous cells are apparent. These cells are surrounded by a wall of sterile cells called the tapetum, which supplies food to the cell and eventually becomes the cell wall for the pollen grain. These sets of sporogenous cells eventually develop into diploid microspore mother cells. These microspore mother cells, also called microsporocytes, then undergo meiosis and become four microspore haploid cells. These new microspore cells then undergo mitosis and form a tube cell and a generative cell. The generative cell then undergoes mitosis one more time to form two male gametes, also called sperm.
See also
Gametogenesis |
https://en.wikipedia.org/wiki/Metro%20WSIT | Web Services Interoperability Technology (WSIT) is an open-source project started by Sun Microsystems to develop the next-generation of Web service technologies. It provides interoperability between Java Web Services and Microsoft's Windows Communication Foundation (WCF).
It consists of Java programming language APIs that enable advanced WS-* features to be used in a way that is compatible with Microsoft's Windows Communication Foundation as used by .NET. The interoperability between different products is accomplished by implementing a number of Web Services specifications, like JAX-WS that provides interoperability between Java Web Services and Microsoft Windows Communication Foundation.
WSIT is currently under development as part of Eclipse Metro.
WSIT is a series of extensions to the basic SOAP protocol, and so uses JAX-WS and JAXB. It is not a new protocol such as the binary DCOM.
WSIT implements the WS-I specifications, including:
Metadata
WS-MetadataExchange
WS-Transfer
WS-Policy
Security
WS-Security
WS-SecureConversation
WS-Trust
WS-SecurityPolicy
Messaging
WS-ReliableMessaging
WS-RMPolicy
Transactions
WS-Coordination
WS-AtomicTransaction
See also
JAX-WS |
https://en.wikipedia.org/wiki/Mihyun%20Kang | Mihyun Kang () is a South Korean mathematician specializing in combinatorics, including graph enumeration and the topological properties of random graphs. She is a professor in the Institute of Discrete Mathematics at the Graz University of Technology.
Education and career
Kang completed a PhD at KAIST, the Korea Advanced Institute of Science and Technology, in 2001. Her dissertation, Random Walks on a Union of Finite Groups, was supervised by Geon Ho Choe.
She became a postdoctoral researcher at the Humboldt University of Berlin from 2001 to 2008, and completed a habilitation there in 2007. From 2008 to 2011 she was funded by the German Research Foundation as a Heisenberg Fellow. After taking an acting professorship at the Ludwig Maximilian University of Munich in 2011, she became a full professor at the Graz University of Technology in 2012. At the same time, she became head of the Institute of Discrete Mathematics at Graz.
Recognition
Kang was a 2019 winner of the Friedrich Wilhelm Bessel Research Prize of the Alexander von Humboldt Foundation. |
https://en.wikipedia.org/wiki/International%20Congress%20of%20Mathematicians | The International Congress of Mathematicians (ICM) is the largest conference for the topic of mathematics. It meets once every four years, hosted by the International Mathematical Union (IMU).
The Fields Medals, the IMU Abacus Medal (known before 2022 as the Nevanlinna Prize), the Gauss Prize, and the Chern Medal are awarded during the congress's opening ceremony. Each congress is memorialized by a printed set of Proceedings recording academic papers based on invited talks intended to be relevant to current topics of general interest. Being invited to talk at the ICM has been called "the equivalent ... of an induction to a hall of fame".
History
German mathematicians Felix Klein and Georg Cantor are credited with putting forward the idea of an international congress of mathematicians in the 1890s.
The University of Chicago, which had opened in 1892, organized an International Mathematical Congress at the Chicago World's Fair in 1893, where Felix Klein participated as the official German representative.
The first official International Congress of Mathematicians was held in Zurich in August 1897. The organizers included such prominent mathematicians as Luigi Cremona, Felix Klein, Gösta Mittag-Leffler, Andrey Markov, and others. The congress was attended by 208 mathematicians from 16 countries, including 12 from Russia and 7 from the US. Only four were women: Iginia Massarini, Vera von Schiff, Charlotte Scott, and Charlotte Wedell.
During the 1900 congress in Paris, France, David Hilbert announced his famous list of 23 unsolved mathematical problems, now termed Hilbert's problems. Moritz Cantor and Vito Volterra gave the two plenary lectures at the start of the congress.
At the 1904 ICM Gyula Kőnig delivered a lecture where he claimed that Cantor's famous continuum hypothesis was false. An error in Kőnig's proof was discovered by Ernst Zermelo soon thereafter. Kőnig's announcement at the congress caused considerable uproar, and Klein had to personally explain |
https://en.wikipedia.org/wiki/CCDC92 | CCDC92, or Limkain beta-2, is a protein which in humans is encoded by the CCDC92 gene. It is likely involved in DNA repair or reduction/oxidation reactions. The gene ubiquitously found in humans and is highly conserved across animals.
The CCDC92 gene is located at cytogenic location 12q24.31 and is 36,576 bases long with nine exons which codes for a 331 amino-acid long protein.
Protein
The protein CCDC92 (Accession Number: NP_079416) is found in the nucleus in humans. It has one domain, coiled-coil domain 92, from amino acids 23-82, which has no known function. The protein is rich in histidine and glutamic acid, and is deficient in phenylalanine. It has a molecular weight of 37kDal, a PI of 9.3, and has no charged domains, hydrophobic domains, or transmembrane domains. CCDC92 has conserved predicted phosphorylation sites at S211, S325, T21, T52, T122, Y130 and conserved glycosylation sites at S183 and T244.
Sequence
mtsphfssyd egpldvsmaa tnlenqlhsa qknllflqre hastlkglhs eirrlqqhct dltyeltvks seqtgdgtsk sselkkrcee leaqlkvken enaellkele qknamitvle ntikerekky leelkakshk ltllsseleq rastiaylts qlhaakkklm sssgtsdasp sgspvlasyk pappkdklpe tprrrmkksl saplhpefee vyrfgaesrk lllrepvdam pdptpfllar esaevhlike rplvippias drsgeqhspa rekphkahvg vahrihhatp pqaqpevktl avdqvnggkv vrkhsgtdrt v
Structure
There is a large alpha helical section near the start of the protein which extends to near the midpoint of the protein, then two smaller helical sections are near the end (see conceptual translation below).
The tertiary structure of CCDC92 was predicted using I-TASSER and is shown to the right. I-TASSER has moderate confidence in the reliability of this structure (C-Score of -1.61). This structure is remarkably similar to that of an antiparallel domain in the protein PcsB in Streptococcus pneumoniae. This protein is involved in cleaving the cell wall, however the antiparallel domain's function is unknown.
Expression
In humans, CCDC92 is expressed ubiquitously at a medium t |
https://en.wikipedia.org/wiki/Psychiatric%20genetics | Psychiatric genetics is a subfield of behavioral neurogenetics and behavioral genetics which studies the role of genetics in the development of mental disorders (such as alcoholism, schizophrenia, bipolar disorder, and autism). The basic principle behind psychiatric genetics is that genetic polymorphisms (as indicated by linkage to e.g. a single nucleotide polymorphism) are part of the causation of psychiatric disorders.
Psychiatric genetics is a somewhat new name for the old question, "Are behavioral and psychological conditions and deviations inherited?". The goal of psychiatric genetics is to better understand the causes of psychiatric disorders, to use that knowledge to improve treatment methods, and possibly also to develop personalized treatments based on genetic profiles (see pharmacogenomics). In other words, the goal is to transform parts of psychiatry into a neuroscience-based discipline.
Recent advances in molecular biology allowed for the identification of hundreds of common and rare genetic variations that contribute to psychiatric disorders.
History
Research on psychiatric genetics began in the late nineteenth century with Francis Galton (a founder of psychiatric genetics) who was motivated by the work of Charles Darwin and his concept of desegregation. These methods of study later improved due to the development of more advanced clinical, epidemiological, and biometrical research tools. Better research tools were the precursor to the ability to perform valid family, twin, and adoption studies. Researchers learned that genes influence how these disorders manifest and that they tend to aggregate in families.
Heritability and genetics
Most psychiatric disorders are highly heritable; the estimated heritability for bipolar disorder, schizophrenia, and autism (80% or higher) is much higher than that of diseases like breast cancer and Parkinson disease. Having a close family member affected by a mental illness is the largest known risk factor, to date. H |
https://en.wikipedia.org/wiki/Differential%20coefficient | In physics, the differential coefficient of a function f(x) is what is now called its derivative df(x)/dx, the (not necessarily constant) multiplicative factor or coefficient of the differential dx in the differential df(x).
A coefficient is usually a constant quantity, but the differential coefficient of f is a constant function only if f is a linear function. When f is not linear, its differential coefficient is a function, call it , derived by the differentiation of f, hence, the modern term, derivative.
The older usage is now rarely seen.
Early editions of Silvanus P. Thompson's Calculus Made Easy use the older term. In his 1998 update of this text, Martin Gardner lets the first use of "differential coefficient" stand, along with Thompson's criticism of the term as a needlessly obscure phrase that should not intimidate students, and substitutes "derivative" for the remainder of the book.
Mathematical analysis
Differential calculus
Functions and mappings |
https://en.wikipedia.org/wiki/Taxon%20in%20disguise | In bacteriology, a taxon in disguise is a species, genus or higher unit of biological classification whose evolutionary history reveals has evolved from another unit of a similar or lower rank, making the parent unit paraphyletic. That happens when rapid evolution makes a new species appear so radically different from the ancestral group that it is not (initially) recognised as belonging to the parent phylogenetic group, which is left as an evolutionary grade.
While the term is from bacteriology, parallel examples are found throughout the tree of life. For example, four-footed animals have evolved from piscine ancestors but since they are not generally considered fish, they can be said to be "fish in disguise".
In many cases, the paraphyly can be resolved by reclassifying the taxon in question under the parent group. However, in bacteriology, since renaming groups may have serious consequences since by causing confusion over the identity of pathogens, it is generally avoided for some groups.
Examples
Shigella
The bacterial genus Shigella is the cause of bacillary dysentery, a potentially-severe infection that kills over a million people every year. The genus (S. dysenteriae, S. flexneri, S. boydii, S. sonnei) have evolved from the common intestinal bacterium Escherichia coli, which renders that species paraphyletic. E. coli itself can also cause serious dysentery, but differences in genetic makeup between E. coli and Shigella cause different medical conditions and symptoms.
Escherichia coli is a badly-classified species since some strains share only 20% of their genome. It is so diverse that it should be given a higher taxonomic ranking. However, medical conditions associated with E. coli itself and Shigella make the current classification not to be changed to avoid confusion in medical context. Shigella will thus remain "E. coli in disguise".
B. cereus-group
Similarly, the Bacillus species of the B. cereus-group (B. anthracis, B. cereus, B . thuringiensis |
https://en.wikipedia.org/wiki/Mobile-ITX | Mobile-ITX is the smallest (by 2009) x86 compliant motherboard form factor presented by VIA Technologies in December, 2009. The motherboard size (CPU module) is . There are no computer ports on the CPU module and it is necessary to use an I/O carrier board. The design is intended for medical, transportation and military embedded markets.
History
The Mobile-ITX form factor was announced by VIA Technologies at Computex in June, 2007. The motherboard size of first prototypes was . The design was intended for ultra-mobile computing such as a smartphone or UMPC.
The prototype boards shown to date include a x86-compliant 1 GHz VIA C7-M processor, 256 or 512 megabytes of RAM, a modified version of the VIA CX700 chipset (called the CX700S), an interface for a cellular radio module (demonstration boards contain a CDMA radio), a DC-DC electrical converter, and various connecting interfaces.
At the announcement, an ultra-mobile PC reference design was shown running Windows XP Embedded.
Notes and references
External links
Mobile-ITX Specification
Motherboard form factors
IBM PC compatibles
Mobile computers |
https://en.wikipedia.org/wiki/The%20Dodo%20%28website%29 | The Dodo is an American media brand and digital publisher focused on telling animals' stories. The Dodo is headquartered in New York City.
History
The Dodo was launched in January 2014 by Izzie Lerer, the daughter of media executive Kenneth Lerer, and journalist Kerry Lauerman. The company—named after the dodo, an extinct bird from the island of Mauritius— was founded by Lerer out of "a personal passion for the subject matter..." Lerer has a PhD in animal studies with a focus on animal ethics and human relationships from Columbia University, and launched the website after noticing the viral success of animal videos online but seeing no one "really owned the space." The Dodo became one of the most popular Facebook publishers, garnering 1 billion video views from the social network in November 2015, and was crowned the No. 1 animal brand on all of social media by the Webby Awards in 2019.
In late 2017, The Dodo launched "El Dodo", its first non-English language channel to reach Spanish speaking audiences. The Dodo's editorial and video production staff unionized with the Writers Guild of America, East in April 2018.
Expansion
The brand expanded into longer-form storytelling with its first TV series, "Dodo Heroes" on Animal Planet in June 2018, which went on to become the network's top-performing freshman series and was picked up for a second season in 2019. In June 2018, The Dodo held its first ever "Best Dog Day Ever" pop-up event in New York City, which attracted over 1400 dogs and their owners. Based on the one day event's success, The Dodo decided to expand the franchise in 2019 for a month-long "Best Dog Day Ever: Halloween Edition" event in the fall for Tri-State dogs.
In July 2019, The Dodo partnered with VidCon for the conference's first-ever co-programmed section, "The Dodo Pet Zone" featuring some of the Internet's most-famous animals. In the summer of 2019, the animal brand launched its children's brand, "Dodo Kids", with a new YouTube channel with laun |
https://en.wikipedia.org/wiki/Genelux%20Corporation | Genelux Corporation is a late clinical-stage public company (Nasdaq: GNLX) developing a pipeline of next-generation oncolytic viral immunotherapies for patients suffering from aggressive and/or difficult-to-treat solid tumor types. The Company’s most advanced product candidate, Olvi-Vec (olvimulogene nanivacirepvec), is a proprietary, modified strain of the vaccinia virus (VACV), a stable DNA virus with a large engineering capacity.
The core of Genelux’s discovery and development efforts revolves around the company's proprietary CHOICE™ platform from which the Company has developed an extensive library of isolated and engineered oncolytic vaccinia virus immunotherapeutic product candidates, including Olvi-Vec.
The company is currently entered its pivot Phase 3 study in Platinum resistant/refractory ovarian cancer (PRROC). Trial design based on VIRO-15 Phase 2 trial which showed independent anti-tumor activity of Olvi-Vec and reversal of platinum resistance in the TME.
Locations
Genelux Corp. is headquartered in Westlake Village, California, with additional facilities in San Diego, California.
Olvi-Vec
Genelux’s lead oncology compound is Olvi-Vec (formally GL-ONC1, clinical grade formulation of the laboratory strain GLV-1h68), c is a proprietary, oncolytic vaccinia virus, modified to increase its safety, tumor selectivity and therapeutic potential. Vaccinia virus is a non-human pathogen. Virus-mediated oncolysis results in immunogenic cell death and triggers immune activation and memory for long-term immunotherapy against cancer. Olvi-Vec has been administered to more than 150 patients in clinical studies. In these studies, Olvi-Vec was generally well tolerated and the data provided evidence of clinical benefit. Most recently, Genelux announced the publication of positive topline results from its Phase 2 VIRO-15 trial of Olvi-Vec-primed immunochemotherapy in heavily pretreated patients with platinum-resistant or -refractory ovarian cancer (PRROC) in JAMA Oncol |
https://en.wikipedia.org/wiki/Lecithin%20citrate | Lecithin citrate is a food additive used as a preservative. Its E number is 344. It is not approved for use in the UK. |
https://en.wikipedia.org/wiki/Globuloviridae | Globuloviridae is a family of hyperthermophilic archaeal viruses. Crenarchaea of the genera Pyrobaculum and Thermoproteus serve as natural hosts. There are four species in this family, assigned to a single genus, Alphaglobulovirus.
Taxonomy
The family contains one genus which contains four species:
Alphaglobulovirus
Alphaglobulovirus PSV
Alphaglobulovirus PSV1
Alphaglobulovirus TSPV1
Alphaglobulovirus TTSV1
Structure
Virions in the Globuloviridae are spherical and enveloped. The diameter is around 100 nm.
Genomes are linear dsDNA and non-segmented, around 20–30kb in length.
Life cycle
Viral replication is cytoplasmic. DNA-templated transcription is the method of transcription. Pyrobaculum and Thermoproteus archaea serve as the natural host. Transmission routes are passive diffusion. |
https://en.wikipedia.org/wiki/Slime%20%28Dragon%20Quest%29 | are a fictional species of monster in the Dragon Quest role-playing video game franchise. Originally inspired by the game Wizardry to be a weak and common enemy for the 1986 video game Dragon Quest, Slimes have appeared in almost every Dragon Quest game since. Their popularity led to the appearance of many varieties of Slimes, including boss characters, friendly allies, and even emerging as the protagonist of the Rocket Slime video game series. Slimes have also appeared in other video game properties, including Nintendo's Mario and Super Smash Bros. series of crossover fighting games.
Their friendliness, limited power, and appealing form have caused the Slime to become a popular character and the mascot of the Dragon Quest series. It have been also placed on a multitude of different kinds of merchandise.
Concept and design
According to Yuji Horii, the creator of Dragon Quest, the inspiration for the Slimes came from a role-playing game series called Wizardry. Horii said that when it was originally conceived, the Slime was "a pile of goo", but Akira Toriyama's design came back as a tear-drop which they considered "perfect".
There are many different types of Slimes found throughout the Dragon Quest and Rocket Slime series. These include Slimes in different colors; She Slimes which are orange slimes that are slightly stronger then regular slimes and are despite their name, not always necessarily female; Bubble Slimes which look like pools of slime; Nautical Slimes that wear conch shells; the rare Metal Slimes which have high defense, give out large amounts of experience points, and tend to flee from battle; Healslimes which have tentacles; gem-shaped Slimes like the Emperor Slime; cube-shaped Box Slimes; and King Slimes, which are very large Slimes wearing crowns and come in various versions such as regular or metal.
In most appearances of Slimes, the creature plays an antagonist role, and occasionally appears as a boss. In some Dragon Quest titles, Slimes also ap |
https://en.wikipedia.org/wiki/Tissue%20Engineering%20and%20Regenerative%20Medicine%20International%20Society | Tissue Engineering and Regenerative Medicine International Society is an international learned society dedicated to tissue engineering and regenerative medicine.
Background
Regenerative medicine involves processes of replacing, engineering or regenerating human cells, tissues or organs to restore or establish normal function. A major technology of regenerative medicine is tissue engineering, which has variously been defined as "an interdisciplinary field that applies the principles of engineering and the life sciences toward the development of biological substitutes that restore, maintain, or improve tissue function", or "the creation of new tissue by the deliberate and controlled stimulation of selected target cells through a systematic combination of molecular and mechanical signals".
History
Tissue engineering emerged during the 1990s as a potentially powerful option for regenerating tissue and research initiatives were established in various cities in the US and in European countries including the UK, Italy, Germany and Switzerland, and also in Japan. Soon fledgling societies were formed in these countries in order to represent these new sciences, notably the European Tissue Engineering Society (ETES) and, in the US, the Tissue Engineering Society (TES), soon to become the Tissue Engineering Society international (TESi) and the Regenerative Medicine Society (RMS).
Because of the overlap between the activities of these societies and the increasing globalization of science and medicine, considerations of a merger between TESI and ETES and RMS were initiated in 2004 and agreement was reached during 2005 about the formation of the consolidated society, the Tissue Engineering and Regenerative Medicine International Society (TERMIS). Election of officers for TERMIS took place in September 2005, and the by-laws were approved by the Board.
Rapid progress in the organization of TERMIS took place during late 2005 and 2006. The SYIS, Student and Young Investigator Se |
https://en.wikipedia.org/wiki/Escherichia%20virus%20Wphi | Escherichia virus Wphi is a virus of the family Myoviridae, genus Peduovirus.
As a member of the group I of the Baltimore classification, Escherichia virus Wphi is a dsDNA viruses. All the members of family Myoviridae share a nonenveloped morphology consisting of a head and a tail separated by a neck. Its genome is linear. The propagation of the virions includes the attaching to a host cell (a bacterium, as Escherichia virus Wphi is a bacteriophage) and the injection of the double stranded DNA; the host transcribes and translates it to manufacture new particles. To replicate its genetic content requires host cell DNA polymerases and, hence, the process is highly dependent on the cell cycle. |
https://en.wikipedia.org/wiki/Infection%20rate | An infection rate (or incident rate) is the probability or risk of an infection in a population. It is used to measure the frequency of occurrence of new instances of infection within a population during a specific time period.
The number of infections equals the cases identified in the study or observed. An example would be HIV infection during a specific time period in the defined population. The population at risk are the cases appearing in the population during the same time period. An example would be all the people in a city during a specific time period. The constant, or K is assigned a value of 100 to represent a percentage. An example would be to find the percentage of people in a city who are infected with HIV: 6,000 cases in March divided by the population of a city (one million) multiplied by the constant (K) would give an infection rate of 0.6%.
Calculating the infection rate is used to analyze trends for the purpose of infection and disease control. An online infection rate calculator has been developed by the Centers for Disease Control and Prevention that allows the determination of the Streptococcal A infection rate in a population.
Clinical applications
Health care facilities routinely track their infection rates according to the guidelines issued by the Joint Commission. The healthcare-associated infection (HAI) rates measure infection of patients in a particular hospital. This allows rates to compared with other hospitals. These infections can often be prevented when healthcare facilities follow guidelines for safe care. To get payment from Medicare, hospitals are required to report data about some infections to the Centers for Disease Control and Prevention's (CDC's) National Healthcare Safety Network (NHSN). Hospitals currently submit information on central line-associated bloodstream infections (CLABSIs), catheter-associated urinary tract infections (CAUTIs), surgical site infections (SSIs), MRSA Bacteremia, and C. difficile laboratory-i |
https://en.wikipedia.org/wiki/Comparative%20embryology | Comparative embryology is the branch of embryology that compares and contrasts embryos of different species, showing how all animals are related.
History
Aristotle was the earliest person in recorded history to study embryos. Observing embryos of different species, he described how animals born in eggs (oviparously) and by live birth (viviparously) developed differently. He discovered there were two main ways the egg cell divided: holoblastically, where the whole egg divided and became the creature; and meroblastically, where only part of the egg became the creature. Further advances in comparative embryology did not come until the invention of the microscope. Since then, many people, from Ernst Haeckel to Charles Darwin, have contributed to the field.
Misconceptions
Many erroneous theories were formed in the early years of comparative embryology. For example, German biologist and philosopher Ernst Haeckel proposed that all organisms went through a "re-run" of evolution he said that 'ontogeny repeats phylogeny' while in development. Haeckel believed that to become a mammal, an embryo had to begin as a single-celled organism, then evolve into a fish, then an amphibian, a reptile, and finally a mammal. The theory was widely accepted, then disproved many years later.
Objectives
The field of comparative embryology aims to understand how embryos develop, and to research the inter-relatedness of animals. It has bolstered evolutionary theory by demonstrating that all vertebrates develop similarly and have a putative common ancestor.
See also
Embryology |
https://en.wikipedia.org/wiki/Developmental%20noise | Developmental noise or stochastic noise is a concept within developmental biology in which the observable characteristics or traits (phenotype) varies between individuals even though both individuals share the same genetic code (genotypes) and the other environmental factors are completely the same. Factors that influence the effect include stochastic, or randomized, gene expression and other cellular noise.
Definition
Although organisms within a species share very similar genes, similar environments and similar developmental history, each individual organism can develop differences due to noise in signaling and signal interpretation. This developmental noise may help individuals gain the ability to adapt to the environment and contribute to their unique patterns of development. Human fingerprints provide a well-known example; the fingerprints differ even between genetically identical human twins.
Use of noise in biology
Developmental noise may help individuals gain the ability to adapt to the environment. Biological systems display both variation and robustness. Natural variation within a population is in large part genetically determined, but variation due to noise may contribute to a rapid response by an individual to changes in the environment. This variation can have an evolutionary tuning effect that contributes to the optimal fitness of a population. In support of this idea, it has been shown that bacteria can switch stochastically into a "persistent" state which has slow growth coupled with an ability to survive antibiotic treatment. In another study, it has been shown that most of the noisy proteins were associated with the stress response. When proteins are expressed in small quantities, the expression of more noisy proteins will be more influenced by noises which come from the environmental context. Types of noises include extrinsic noise which is the variation in cell-to-cell expression level of protein, and intrinsic noise which is the variation of th |
https://en.wikipedia.org/wiki/Memory-disk%20synchronization | Memory-disk synchronisation is a process used in computers that immediately writes to disk any data queued for writing in volatile memory. Data is often held in this way for efficiency's sake, since writing to disk is a much slower process than writing to RAM. Disk synchronization is needed when the computer is going to be shut down, or occasionally if a particularly important bit of data has just been written.
In Unix-like systems, a disk synchronization may be requested by any user with the sync command.
See also
mmap, a POSIX-compliant Unix system call that maps files or devices into memory
msync, a POSIX-compliant Unix system call that forcefully flush memory to disk and synchronize
Computer memory |
https://en.wikipedia.org/wiki/Requirements%20elicitation | In requirements engineering, requirements elicitation is the practice of researching and discovering the requirements of a system from users, customers, and other stakeholders. The practice is also sometimes referred to as "requirement gathering".
The term elicitation is used in books and research to raise the fact that good requirements cannot just be collected from the customer, as would be indicated by the name requirements gathering. Requirements elicitation is non-trivial because you can never be sure you get all requirements from the user and customer by just asking them what the system should do or not do (for Safety and Reliability). Requirements elicitation practices include interviews, questionnaires, user observation, workshops, brainstorming, use cases, role playing and prototyping.
Before requirements can be analyzed, modeled, or specified they must be gathered through an elicitation process. Requirements elicitation is a part of the requirements engineering process, usually followed by analysis and specification of the requirements.
Commonly used elicitation processes are the stakeholder meetings or interviews. For example, an important first meeting could be between software engineers and customers where they discuss their perspective of the requirements.
The requirements elicitation process may appear simple: ask the customer, the users and others what the objectives for the system or product are, what is to be accomplished, how the system or product fits into the needs of business, and finally, how the system or product is to be used on a day-to-day basis. However, issues may arise that complicate the process.
In 1992, Christel and Kang identified problems that indicate the challenges for requirements elicitation:
'Problems of scope'. The boundary of the system is ill-defined or the customers/users specify unnecessary technical details that may confuse, rather than clarify, overall system objectives.
Problems of understanding. The customers/us |
https://en.wikipedia.org/wiki/Asprox%20botnet | The Asprox botnet (discovered around 2008), also known by its aliases Badsrc and Aseljo, is a botnet mostly involved in phishing scams and performing SQL injections into websites in order to spread malware. It is a highly infectious malware which spreads through an email or through a clone website. It can be used to trace any kind of personal or financial information and activities online.
Operations
Since its discovery in 2008 the Asprox botnet has been involved in multiple high-profile attacks on various websites in order to spread malware. The botnet itself consists of roughly 15,000 infected computers as of May, 2008, although the size of the botnet itself is highly variable as the controllers of the botnet have been known to deliberately shrink (and later regrow) their botnet in order to prevent more aggressive countermeasures from the IT Community.
The botnet propagates itself in a somewhat unusual way, as it actively searches and infects vulnerable websites running Active Server Pages. Once it finds a potential target the botnet performs a SQL injection on the website, inserting an IFrame which redirects the user visiting the site to a site hosting Malware.
The botnet usually attacks in waves - the goal of each wave is to infect as many websites as possible, thus achieving the highest possible spread rate. Once a wave is completed the botnet lay dormant for an extended amount of time, likely to prevent aggressive counterreactions from the security community. The initial wave took place in July, 2008, which infected an estimated 1,000 - 2,000 pages. An additional wave took place in October 2009, infecting an unknown number of websites. Another wave took place in June 2010, increasing the estimated total number of infected domains from 2,000 to an estimated 10,000 - 13,000 within a day.
Notable high-profile infections
While the infection targets of the Asprox botnet are randomly determined through Google searches, some high-profile websites have been inf |
https://en.wikipedia.org/wiki/Interposer | An interposer is an electrical interface routing between one socket or connection to another. The purpose of an interposer is to spread a connection to a wider pitch or to reroute a connection to a different connection.
Interposer comes from the Latin word "interpōnere", meaning "to put between". They are often used in BGA packages, multi-chip modules and high bandwidth memory.
A common example of an interposer is an integrated circuit die to BGA, such as in the Pentium II. This is done through various substrates, both rigid and flexible, most commonly FR4 for rigid, and polyimide for flexible. Silicon and glass are also evaluated as an integration method. Interposer stacks are also a widely accepted, cost-effective alternative to 3D ICs. There are already several products with interposer technology in the market, notably the AMD Fiji/Fury GPU, and the Xilinx Virtex-7 FPGA. In 2016, CEA Leti demonstrated their second generation 3D-NoC technology which combines small dies ("chiplets"), fabricated at the FDSOI 28 nm node, on a 65 nm CMOS interposer.
Another example of an interposer would be the adapter used to plug a SATA drive into a SAS backplane with redundant ports. While SAS drives have two ports that can be used to connect to redundant paths or storage controllers, SATA drives only have a single port. Directly, they can only connect to a single controller or path. SATA drives can be connected to nearly all SAS backplanes without adapters, but using an interposer with a port switching logic allows providing path redundancy.
See also
Die preparation
Integrated circuit
Semiconductor fabrication |
https://en.wikipedia.org/wiki/Bird%20%28mathematical%20artwork%29 | Bird, also known as A Bird in Flight refers to bird-like mathematical artworks that are introduced by mathematical equations. A group of these figures are created by combing through tens of thousands of computer-generated images. They are usually defined by trigonometric functions. An example of A Bird in Flight is made up of 500 segments defined in a Cartesian plane where for each the endpoints of the -th line segment are:
and
.
The 500 line segments defined above together form a shape in the Cartesian plane that resembles a bird with open wings. Looking at the line segments on the wings of the bird causes an optical illusion and may trick the viewer into thinking that the segments are curved lines. Therefore, the shape can also be considered as an optical artwork. Another version of A Bird in Flight was defined as the union of all of the circles with center and radius , where , and
The set of the 20,001 circles defined above form a subset of the plane that resembles a flying bird. Although this version's equations are a lot more complicated than the version made of 500 segments, it has a better resemblance to a real flying bird. |
https://en.wikipedia.org/wiki/Hindlimb | A hindlimb or back limb is one of the paired articulated appendages (limbs) attached on the caudal (posterior) end of a terrestrial tetrapod vertebrate's torso. With reference to quadrupeds, the term hindleg or back leg is often used instead. In bipedal animals with an upright posture (e.g. humans and some primates), the term lower limb is often used.
Location
It is located on the limb of an animal. Hindlimbs are present in a large number of quadrupeds. Though it is a posterior limb, it can cause lameness in some animals. The way of walking through hindlimbs are called bipedalism.
Benefits of hindlimbs
Hindlimbs are helpful in many ways, some examples are:
Frogs
Frogs can easily adapt at the surroundings using hindlimbs. The main reason is it can jump high to easily escape to its predator and also to catch prey. It can perform some tricks using the hindlimbs such as the somersault and hindersault. Frogs have 4 digits in fore limb while hindlimb have 5 digits. All digits are without nails.
Birds
All birds walk using hindlimbs. They have the ability to dig in two opposite directions using the hindlimbs. They can easily find food that makes them adapt on their surroundings. A bird with a forelimb that is very primitive is the Archaeopteryx. It adapted by using it but it was not capable of long-distance flights, leading to its extinction. The fastest biped is the ostrich. It runs at 70 km/h.
Kangaroo rats
Bipedality in kangaroo rats are seen to be an agent of adaptation. Kangaroo rats are long jumpers that can jump up to 18 feet, (that is twice the highest possible long jump and also high jump).
Using hindlimbs they can survive a challenging ecosystem. They can easily find food and survive hindrances in the environment. Some species use hindlimbs for competition.
First bipeds
The first vertebrate bipeds were the Bolosaurids, a group of prehistoric reptiles with no living relatives. The first one, Eudibamus, was a small, fast runner during the Permian Peri |
https://en.wikipedia.org/wiki/Fish%20collar | The fish collar, a cut from a fish's clavicle, is a seafood delicacy.
Summary
Fish collars are popular in Asian countries and are mostly found in Asian fish markets. Collars come in chunks of fins, skin, and bones and are difficult to clean. |
https://en.wikipedia.org/wiki/NAND%20logic | The NAND Boolean function has the property of functional completeness. This means that any Boolean expression can be re-expressed by an equivalent expression utilizing only NAND operations. For example, the function NOT(x) may be equivalently expressed as NAND(x,x). In the field of digital electronic circuits, this implies that it is possible to implement any Boolean function using just NAND gates.
The mathematical proof for this was published by Henry M. Sheffer in 1913 in the Transactions of the American Mathematical Society (Sheffer 1913). A similar case applies to the NOR function, and this is referred to as NOR logic.
NAND
A NAND gate is an inverted AND gate. It has the following truth table:
In CMOS logic, if both of the A and B inputs are high, then both the NMOS transistors (bottom half of the diagram) will conduct, neither of the PMOS transistors (top half) will conduct, and a conductive path will be established between the output and Vss (ground), bringing the output low. If both of the A and B inputs are low, then neither of the NMOS transistors will conduct, while both of the PMOS transistors will conduct, establishing a conductive path between the output and Vdd (voltage source), bringing the output high. If either of the A or B inputs is low, one of the NMOS transistors will not conduct, one of the PMOS transistors will, and a conductive path will be established between the output and Vdd (voltage source), bringing the output high. As the only configuration of the two inputs that results in a low output is when both are high, this circuit implements a NAND (NOT AND) logic gate.
Making other gates by using NAND gates
A NAND gate is a universal gate, meaning that any other gate can be represented as a combination of NAND gates.
NOT
A NOT gate is made by joining the inputs of a NAND gate together. Since a NAND gate is equivalent to an AND gate followed by a NOT gate, joining the inputs of a NAND gate leaves only the NOT gate.
AND
An AND gate is m |
https://en.wikipedia.org/wiki/Winsorized%20mean | A winsorized mean is a winsorized statistical measure of central tendency, much like the mean and median, and even more similar to the truncated mean. It involves the calculation of the mean after winsorizing — replacing given parts of a probability distribution or sample at the high and low end with the most extreme remaining values, typically doing so for an equal amount of both extremes; often 10 to 25 percent of the ends are replaced. The winsorized mean can equivalently be expressed as a weighted average of the truncated mean and the quantiles at which it is limited, which corresponds to replacing parts with the corresponding quantiles.
Advantages
The winsorized mean is a useful estimator because by retaining the outliers without taking them too literally, it is less sensitive to observations at the extremes than the straightforward mean, and will still generate a reasonable estimate of central tendency or mean for almost all statistical models. In this regard it is referred to as a robust estimator.
Drawbacks
The winsorized mean uses more information from the distribution or sample than the median. However, unless the underlying distribution is symmetric, the winsorized mean of a sample is unlikely to produce an unbiased estimator for either the mean or the median.
Example
For a sample of 10 numbers (from x(1), the smallest, to x(10) the largest; order statistic notation) the 10% winsorized mean is
The key is in the repetition of x(2) and x(9): the extras substitute for the original values x(1) and x(10) which have been discarded and replaced.
This is equivalent to a weighted average of 0.1 times the 5th percentile (x(2)), 0.8 times the 10% trimmed mean, and 0.1 times the 95th percentile (x(9)).
Notes |
https://en.wikipedia.org/wiki/Brooklyn%20Bridge%20%28software%29 | The Brooklyn Bridge from White Crane Systems was a data transfer enabler. Although it came with some hardware, it was the software which was the basis of the product. It also could transform the data's format.
Overview
The New York Times described its category as being among "communications packages used to transfer files." In an era of 300 baud, Brooklyn Bridge operated at "115,200 baud" so that a transfer which "at 300 baud took 4 minutes and 36 seconds" only needed
5 seconds. Unlike some communications packages, this one retains the original version-date, so as not to alarm people
when they seem to have what looks like an update, when it's not.
Description
Once the software is installed, users comfortable with typing the word "COPY" can do so as readily as they sneakernet. An earlier review described it as "less cumbersome than conventional communications software" The use of neither specialized hardware nor specialized software is ideal in an era when this can be done using online or other "outside" services.
See also
BLAST (protocol)
Kermit (protocol)
Zamzar |
https://en.wikipedia.org/wiki/Inflammatory%20bowel%20disease-22 | Inflammatory bowel disease-22 is a protein that in humans is encoded by the IBD22 gene. |
https://en.wikipedia.org/wiki/Aquarist | An aquarist is a person who manages aquariums, either professionally or as a hobby. They typically care for aquatic animals, including fish and marine invertebrates. Some may care for aquatic mammals. Aquarists often work at public aquariums. They may also work at nature reserves, zoos, and amusement parks. Some aquarists conduct field research outdoors. In business, aquarists may work at pet stores, as commercial fish breeders, or as manufacturers. Some aquarists are hobbyists, also known as "home aquarists," who may vary in skills and experience.
History
People have cared for aquatic animals since ancient times. The Sumerians kept fish in ponds as early as 2500 BCE. Pliny the Elder wrote of people who kept fish as oracles, and ancient Agrigent was believed to have fish ponds. The Roman poet Rutilus Namatianus wrote of a Etrurian Jew who kept fish in opaque tanks. By the 10th century, goldfish were popular pets in China. In 1369, Emperor Hung Wu established a porcelain factory to produce large tubs for fish. Around 1500, goldfish came to Sakai, Japan. Two hundred years later, Sato Sanzaemon, from Koriyama, became the first Japanese fish breeder, and fish breeding became popular throughout Japan. Around 1611, goldfish came to Europe, probably first in Portugal. By the 18th century, goldfish were common pets in Europe. During this time, Richard Bradley, an English botanist, and John Dayell, a Scottish naturalist, experimented with keeping marine life. In particular, scientists tried to determine if marine life could survive in captivity, as they usually died shortly after being removed from their natural environments.
For centuries, humans had limited exposure to aquatic life. The sea was often considered mysterious. As written by Bernd Brunner in The Ocean at home, "The ocean was considered a source of life but also a place of ill omen, death, and mayhem—a cursed, dark world where terrifying monsters lurked, devouring anything in sight." Yet, in the 19th century, |
https://en.wikipedia.org/wiki/Appearance%20energy | Appearance energy (also known as appearance potential) is the minimum energy that must be supplied to a gas phase atom or molecule in order to produce an ion. In mass spectrometry, it is accounted as the voltage to correspond for electron ionization. This is the minimum electron energy that produces an ion. In photoionization, it is the minimum photon energy of a photon that produces some ion signal. For example, the indene bromide ion (IndBr+) only loses bromine at an incident photon energy of 10.2 eV, so the product, indenyl, has an appearance energy of 10.2 eV.
See also
Ionization energy |
https://en.wikipedia.org/wiki/Impossible%20bottle | An impossible bottle is a bottle containing an object that appears too large to fit through the bottle's mouth.
The ship in a bottle is a traditional and the most iconic type of impossible bottle. Other common objects include fruits, matchboxes, decks of cards, tennis balls, racketballs, Rubik's Cubes, padlocks, knots, and scissors. These may be placed inside the bottle using various mechanisms, including constructing an object inside the bottle from smaller parts, using a small object that expands or grows inside the bottle, or molding the glass around the object.
Ship in a bottle
There are two ways to place a model ship inside a bottle. The simpler way is to rig the masts of the ship and raise it up when the ship is inside the bottle. Masts, spars, and sails are built separately and then attached to the hull of the ship with strings and hinges so the masts can lie flat against the deck. The ship is then placed inside the bottle and the masts are pulled up using the strings attached to the masts. The hull of the ship must still be able to fit through the opening. Bottles with minor distortions and soft tints are often chosen to hide the small details of the ship such as hinges on the masts. Alternatively, with specialized long-handled tools, it is possible to build the entire ship inside the bottle.
The oldest surviving ships in a bottle were crafted by Giovanni Biondo at the end of the eighteenth century; two, at least, reproduce Venetian ships of the line. These are quite large and expensive models: the bottles (intended to be displayed upside down, with the neck resting on a small pedestal) measure about 45 cm. The oldest (1784) is in a museum in Lübeck; another (1786) is held by a private collector; the third (1792), that apparently reproduces the heavy frigate PN Fama, is in the Navy Museum in Lisbon. Another old model (1795), from an unknown builder, is kept in a museum in Rotterdam.
Ships in bottles became more popular as folk art in the second half of |
https://en.wikipedia.org/wiki/Megamaths | Megamaths is a BBC educational television series for primary schools that was originally aired on BBC Two from 16 September 1996 to 4 February 2002. For its first three series, it was set in a castle on top of Table Mountain, populated by the four card suits (Kings, Queens and Jacks/Jackies, and a Joker who looked after children that visited the castle and took part in mathematical challenges). There were two gargoyles at the portcullis of the castle named Gar and Goyle who spoke mostly in rhyme, and an animated dragon called Brimstone who lived in the castle cellar (with his pet kitten, Digit). Each episode featured a song explaining the episode's mathematical content.
The three remaining series, however, were set in a "Superhero School" space station, featuring a trainee superhero named Maths Man who was initially guided by a female tutor, Her Wholeness, in the fifth series, and later by a male tutor, His Wholeness, in the fifth and sixth series. In the fourth series, there were also recurring sketches of a quiz show named Find that Fraction hosted by Colin Cool (played by Simon Davies who co-wrote the second to fourth series with director Neil Ben and had played the King of Diamonds in all four Table Mountain series), and a sports show named Sports Stand hosted by Sue Harker (a spoof of Sue Barker, who was played by Liz Anson) and Harry Fraction (a spoof of Harry Gration, who was also played by Simon Davies), along with a supervillain named The Diddler who Maths Man had to solve mathematical problems caused by when he ventured down to Earth (in the final episode, she was revealed to actually be Her Wholeness in disguise). In the sixth series, the Superhero School gained an on-board computer named VERA (whose initials stood for "Voice-Enhanced Resource Activator", and was voiced by Su Douglas who also played the Queen of Spades in the fourth series) and a character named 2D3D who appeared in his virtual reality glasses (Maths Man now also spoke directly to the au |
https://en.wikipedia.org/wiki/Comparison%20of%20online%20dating%20services | This is a partial, non-exhaustive list of notable online dating websites and mobile apps.
All services in the list that have an entry, whether they support heterosexual connections, currently support homosexual connections.
Online dating services
Defunct sites
SpeedDate.com
Yahoo! Personals
Spoonr
RocknRollDating
Spray Date
Travelcompanionexchange.com
True
Matchmaker.com (Dating service founded in 1986 which had users)
See also
Timeline of online dating services |
https://en.wikipedia.org/wiki/Shirley%20Corriher | Shirley O. Corriher (born February 23, 1935) is an American biochemist and author of CookWise: The Hows and Whys of Successful Cooking, winner of a James Beard Foundation award, and BakeWise: The Hows and Whys of Successful Baking. CookWise shows how scientific insights can be applied to traditional cooking, while BakeWise applies the same idea to baking. Some compare Corriher's approach to that of Harold McGee (whom Corriher thanks as her "intellectual hero" in the "My Gratitude and Thanks" section of Cookwise) and Alton Brown. She has made a number of appearances as a food consultant on Brown's show Good Eats and has released a DVD, Shirley O. Corriher's Kitchen Secrets Revealed.
Personal life
After graduating from Vanderbilt University in 1959, she and her husband opened a boys' school in Atlanta, Georgia, where she was responsible for cooking three meals a day for 30 boys. By 1970 the school had grown to 140 students. That same year she divorced her husband and left the school; she took up cooking to support herself and her three children.
Corriher lives with her current husband, Arch, in Atlanta.
Books
See also
Harold McGee
Alton Brown |
https://en.wikipedia.org/wiki/Rightscorp | Rightscorp. Inc (formerly DigitalRights) is a Los-Angeles based copyright enforcement company, which locates alleged copyright violators and collects money from legal damages as well as out of court settlements on behalf of the copyright holder(s). Rightscorp manages copyrights of videos, music, and video games.
Services
Clients
Rightscorp represents music, movie, and print publishers. In May 2014, Rightscorp reached 1.5 million copyrights being managed, including those held by Warner Bros. The company manages copyrights for over 800 feature films, including 14 movie titles with gross sales of over $3.5 billion.
Rightscorp works with music interests such as BMG Rights Management, which represents such musicians as David Bowie, Kings of Leon, and Will.i.am and is a member of the American Association of Independent Music. The company represents more than 13,000 copyrights held by Blue Pie Productions and metal/hardcore label Rotten Records. During the week of 24 February 2013, the company was also monitoring 13 songs on the Billboard Hot 100.
Monitoring
Rightcorp utilizes crawlers, which according to Steele and CEO Christopher Sabec, crawls Bittorrent file-sharing sites and finds seeders and their IP addresses over time. Though the company has the seeders’ IP addresses, it requires the ISPs to connect their notices to the seeders. Sabec also says the company can discriminate between actual piracy and unauthorized internet access, but there is no evidence to substantiate this claim.
In response to mobile streaming apps such as Meerkat, Periscope, and Popcorn Time, the company has also announced a "Streaming Rights Monitoring" service in May 2015, which the Rightscorp claims will be able to continuously monitor for streaming of copyrighted material on mobile streaming networks.
Notice forwarding
After determining the target IP address, Rightscorp requests that the Internet service provider for that address forward a notice of infringement to the user. The subscri |
https://en.wikipedia.org/wiki/Dynkin%20system | A Dynkin system, named after Eugene Dynkin, is a collection of subsets of another universal set satisfying a set of axioms weaker than those of -algebra. Dynkin systems are sometimes referred to as -systems (Dynkin himself used this term) or d-system. These set families have applications in measure theory and probability.
A major application of -systems is the - theorem, see below.
Definition
Let be a nonempty set, and let be a collection of subsets of (that is, is a subset of the power set of ). Then is a Dynkin system if
is closed under complements of subsets in supersets: if and then
is closed under countable increasing unions: if is an increasing sequence of sets in then
It is easy to check that any Dynkin system satisfies:
is closed under complements in : if then
Taking shows that
is closed under countable unions of pairwise disjoint sets: if is a sequence of pairwise disjoint sets in (meaning that for all ) then
To be clear, this property also holds for finite sequences of pairwise disjoint sets (by letting for all ).
Conversely, it is easy to check that a family of sets that satisfy conditions 4-6 is a Dynkin class.
For this reason, a small group of authors have adopted conditions 4-6 to define a Dynkin system as they are easier to verify.
An important fact is that any Dynkin system that is also a -system (that is, closed under finite intersections) is a -algebra. This can be verified by noting that conditions 2 and 3 together with closure under finite intersections imply closure under finite unions, which in turn implies closure under countable unions.
Given any collection of subsets of there exists a unique Dynkin system denoted which is minimal with respect to containing That is, if is any Dynkin system containing then is called the
For instance,
For another example, let and ; then
Sierpiński–Dynkin's π-λ theorem
Sierpiński-Dynkin's - theorem:
If is a -system and is a Dynkin system with then
In |
https://en.wikipedia.org/wiki/NASU%20Institute%20of%20Physics | The Institute of Physics (IOP) of the National Academy of Sciences of Ukraine () founded in 1926 is the oldest research institution of physical science within the academy. Being on the path of both infrastructure development and research diversification for more than 80 years, the institute has eventually originated five more specialized research institutions.
Currently, the institute employs more than 300 researchers (together with two full members and eight corresponding members of the NASU) and around 200 peoples of supporting personnel. It has more than 20 scientific units (including the state-of-the-art Femtosecond Laser Complex) which are grouped around four research programs
Traditionally, the institute is focused on fundamental research. At the same time, applied research on cryogenics, LC displays, laser systems, pyroelectric detectors, biophysics and plasma technologies strengthen the institute's activities.
The IOP is consistently ranked at the top of national academic institutions ranking. Besides, international reputation of IOP is growing constantly as prominent scientists from the Institute expand their activity to leading foreign research centers and universities.
History
The origin of the Institute of Physics dates back to 1921, when the Kyiv Regional Department of Education established the Physics research laboratory. The following year, it was transformed into the Kyiv Science-Research Department of Physics at Kyiv Polytechnic Institute. The separate entity was established in 1929, when the department was transformed into the Science-Research Institute of Physics of the People's Commissariat of Education of the Ukrainian Soviet Socialist Republic. It was eventually renamed as the Institute of Physics of the National Academy of Sciences of Ukraine. In 2009, the institute celebrated its 80th anniversary.
Academician O.G. Goldman was the founder and the first director of the institute, which has 20 employees in 1929, including 6 scientists and 1 |
https://en.wikipedia.org/wiki/Local%20tangent%20plane%20coordinates | Local tangent plane coordinates (LTP), also known as local ellipsoidal system, local geodetic coordinate system, or local vertical, local horizontal coordinates (LVLH), are a spatial reference system based on the tangent plane defined by the local vertical direction and the Earth's axis of rotation.
It consists of three coordinates: one represents the position along the northern axis, one along the local eastern axis, and one represents the vertical position.
Two right-handed variants exist: east, north, up (ENU) coordinates and north, east, down (NED) coordinates.
They serve for representing state vectors that are commonly used in aviation and marine cybernetics.
Axes
These frames are location dependent. For movements around the globe, like air or sea navigation, the frames are defined as tangent to the lines of geographical coordinates:
East–west tangent to parallels,
North–south tangent to meridians, and
Up–down in the direction normal to the oblate spheroid used as Earth's ellipsoid, which does not generally pass through the center of Earth.
Local east, north, up (ENU) coordinates
In many targeting and tracking applications the local East, North, Up (ENU) Cartesian coordinate system is far more intuitive and practical than ECEF or Geodetic coordinates. The local ENU coordinates are formed from a plane tangent to the Earth's surface fixed to a specific location and hence it is sometimes known as a "Local Tangent" or "local geodetic" plane. By convention the east axis is labeled , the north and the up .
Local north, east, down (NED) coordinates
In an airplane, most objects of interest are below the aircraft, so it is sensible to define down as a positive number. The North, East, Down (NED) coordinates allow this as an alternative to the ENU. By convention, the north axis is labeled , the east and the down . To avoid confusion between and , etc. in this article we will restrict the local coordinate frame to ENU.
The origin of this coordinate system i |
https://en.wikipedia.org/wiki/Abc%20conjecture | The abc conjecture (also known as the Oesterlé–Masser conjecture) is a conjecture in number theory that arose out of a discussion of Joseph Oesterlé and David Masser in 1985. It is stated in terms of three positive integers and (hence the name) that are relatively prime and satisfy . The conjecture essentially states that the product of the distinct prime factors of is usually not much smaller than . A number of famous conjectures and theorems in number theory would follow immediately from the abc conjecture or its versions. Mathematician Dorian Goldfeld described the abc conjecture as "The most important unsolved problem in Diophantine analysis".
The abc conjecture originated as the outcome of attempts by Oesterlé and Masser to understand the Szpiro conjecture about elliptic curves, which involves more geometric structures in its statement than the abc conjecture. The abc conjecture was shown to be equivalent to the modified Szpiro's conjecture.
Various attempts to prove the abc conjecture have been made, but none are currently accepted by the mainstream mathematical community, and, as of 2023, the conjecture is still regarded as unproven.
Formulations
Before stating the conjecture, the notion of the radical of an integer must be introduced: for a positive integer , the radical of , denoted , is the product of the distinct prime factors of . For example,
If a, b, and c are coprime positive integers such that a + b = c, it turns out that "usually" . The abc conjecture deals with the exceptions. Specifically, it states that:
An equivalent formulation is:
Equivalently (using the little o notation):
A fourth equivalent formulation of the conjecture involves the quality q(a, b, c) of the triple (a, b, c), which is defined as
For example:
A typical triple (a, b, c) of coprime positive integers with a + b = c will have c < rad(abc), i.e. q(a, b, c) < 1. Triples with q > 1 such as in the second example are rather special, they consist of numbers divisible b |
https://en.wikipedia.org/wiki/Ochratoxin%20A | Ochratoxin A—a toxin produced by different Aspergillus and Penicillium species — is one of the most-abundant food-contaminating mycotoxins. It is also a frequent contaminant of water-damaged houses and of heating ducts. Human exposure can occur through consumption of contaminated food products, particularly contaminated grain and pork products, as well as coffee, wine grapes, and dried grapes. The toxin has been found in the tissues and organs of animals, including human blood and breast milk. Ochratoxin A, like most toxic substances, has large species- and sex-specific toxicological differences.
Impact on human and animal health
Carcinogenicity
Ochratoxin A is potentially carcinogenic to humans (Group 2B), and has been shown to be weakly mutagenic, possibly by induction of oxidative DNA damage.
The evidence in experimental animals is sufficient to indicate carcinogenicity of ochratoxin A. It was tested for carcinogenicity by oral administration in mice and rats. It slightly increased the incidence of hepatocellular carcinomas in mice of each sex. and produced renal adenomas and carcinomas in male mice and in rats (carcinomas in 46% of males and 5% of females).
In humans, very little histology data are available, so a relationship between ochratoxin A and renal cell carcinoma has not been found. However, the incidence of transitional cell (urothelial) urinary cancers seems abnormally high in Balkan endemic nephropathy patients, especially for the upper urinary tract.
The molecular mechanism of ochratoxin A carcinogenicity has been under debate due to conflicting literature, however this mycotoxin has been proposed to play a major role in reducing antioxidant defenses.
Neurotoxicity
Ochratoxin A has a strong affinity for the brain, especially the cerebellum (Purkinje cells), ventral mesencephalon, and hippocampal structures. The affinity for the hippocampus could be relevant to the pathogenesis of Alzheimer's disease, and subchronic administration to rodents in |
https://en.wikipedia.org/wiki/Ys%20III%3A%20Wanderers%20from%20Ys | is a 1989 action role-playing game developed by Nihon Falcom. It is the third game in the Ys series.
Ys III was initially released for the PC-8801 and PC-9801 in 1989 under the title Wanderers from Ys, and versions for the MSX2 and X68000 soon followed. In 1991, a number of console ports were produced: versions for the TurboGrafx-CD, Famicom, Super NES, and Sega Genesis. A remake for the PlayStation 2 was released by Taito in 2005.
The TurboGrafx-CD, SNES, and Genesis ports, as well as the 2005 remake Ys: The Oath in Felghana, received releases in English. In addition, the Famicom and MSX2 ports have been fan-translated.
Plot
The opening scene informs the player that it has been three years since the events of Ys I and II. Adol Christin and his friend Dogi are on a journey. Passing through a town, they find a gypsy caravan and Dogi has his fortune told. The fortune teller's crystal ball explodes and both Adol and Dogi decide to go to Dogi's hometown of Redmont. On the way to Redmont, the pair chance upon a wildcat that attacks them, saving Dogi's childhood friend, Elena Stoddart, in the process. Upon arriving, they learn that the townspeople are being threatened by men from nearby Valestein Castle. Always ready for adventure, Adol decides to assume the task of helping them out.
Travelling to Tigray Quarry, Adol discovers that there has been a cave in, and monsters have taken over the quarry. Adol travels deep inside the quarry to rescue Edgar, the mayor of Redmont. After defeating the boss of the Quarry, Ellefale, and claiming the first statue, Adol finds Chester (brother of Elena) threatening Edgar. Adol pulls Edgar back out to the entrance of the quarry and goes back to Redmont. Meeting Elena (formally this time), Adol learns that some statues are being sought by Lord MacGuire, the King of Felghana province (where the game takes place). Another statue is being sought in the Illsburn Ruins, so Adol travels there to retrieve it. Another townsperson, Father Pierr |
https://en.wikipedia.org/wiki/Analog%20signal | An analog signal is any continuous-time signal representing some other quantity, i.e., analogous to another quantity. For example, in an analog audio signal, the instantaneous signal voltage varies continuously with the pressure of the sound waves.
In contrast, a digital signal represents the original time-varying quantity as a sampled sequence of quantized values. Digital sampling imposes some bandwidth and dynamic range constraints on the representation and adds quantization error.
The term analog signal usually refers to electrical signals; however, mechanical, pneumatic, hydraulic, and other systems may also convey or be considered analog signals.
Representation
An analog signal uses some property of the medium to convey the signal's information. For example, an aneroid barometer uses rotary position as the signal to convey pressure information. In an electrical signal, the voltage, current, or frequency of the signal may be varied to represent the information.
Any information may be conveyed by an analog signal; such a signal may be a measured response to changes in a physical variable, such as sound, light, temperature, position, or pressure. The physical variable is converted to an analog signal by a transducer. For example, sound striking the diaphragm of a microphone induces corresponding fluctuations in the current produced by a coil in an electromagnetic microphone or the voltage produced by a condenser microphone. The voltage or the current is said to be an analog of the sound.
Noise
An analog signal is subject to electronic noise and distortion introduced by communication channels, recording and signal processing operations, which can progressively degrade the signal-to-noise ratio (SNR). As the signal is transmitted, copied, or processed, the unavoidable noise introduced in the signal path will accumulate as a generation loss, progressively and irreversibly degrading the SNR, until in extreme cases, the signal can be overwhelmed. Noise can sho |
https://en.wikipedia.org/wiki/Pomegranate%20%28publisher%29 | Pomegranate Communications is a publishing and printing company formerly based in Petaluma, California, having moved to Portland, Oregon in 2013. The company, founded by Thomas F. Burke, began by publishing works of psychedelic art from San Francisco in 1968 under the name ThoFra Distributors. It distributed posters for concerts at Avalon Ballroom and The Fillmore.
Anchored in visual arts, Pomegranate was active in book publishing in the past as well, especially during the 1990s. Adjustments in that sector caused it to reduce involvement accordingly. Currently calendars - long a mainstay - remain a strong part of their catalog, along with coloring books for all ages, nature books and puzzles.
In its current form, Pomegranate is best described as a museum publisher, collaborating with institutions such as the National Gallery of Art, the Library of Congress, the British Library, the Smithsonian Museum of American Art, the Sierra Club, the Frank Lloyd Wright Foundation, and the Museum of Fine Arts, Boston. It is the licensee for artists M. C. Escher, Edward Gorey, Charley Harper, Wolf Kahn, Georgia O'Keeffe, and Gustave Baumann. Its monograph by Elizabeth Murray - Monet’s Passion has been reprinted extensively, and Irene Hardwicke Olivieri's Closer to Wildness has thrived.
Books published by Pomegranate
Visions, introduction by Walter Hopps (1977) , with works by Cliff McReynolds, Bill Martin, Thomas Akawie and Gage Taylor.
In Pursuit of the Unicorn, (1980) , by Josephine Bradley, with works by Kirwan (illustrator), Susan Seddon Boulet (illustrator), Charles Ware (illustrator), Niki Broyles (illustrator), Sandy Stedronsky (illustrator), Marjette Schille (illustrator), Jay Burch (illustrator)
Haiku: Japanese Art and Poetry, 2010 , by Judith Patt, Barry Till, and Michiko Warkentyne |
https://en.wikipedia.org/wiki/Exercise%20physiology | Exercise physiology is the physiology of physical exercise. It is one of the allied health professions, and involves the study of the acute responses and chronic adaptations to exercise. Exercise physiologists are the highest qualified exercise professionals and utilise education, lifestyle intervention and specific forms of exercise to rehabilitate and manage acute and chronic injuries and conditions.
Understanding the effect of exercise involves studying specific changes in muscular, cardiovascular, and neurohumoral systems that lead to changes in functional capacity and strength due to endurance training or strength training. The effect of training on the body has been defined as the reaction to the adaptive responses of the body arising from exercise or as "an elevation of metabolism produced by exercise".
Exercise physiologists study the effect of exercise on pathology, and the mechanisms by which exercise can reduce or reverse disease progression.
History
British physiologist Archibald Hill introduced the concepts of maximal oxygen uptake and oxygen debt in 1922. Hill and German physician Otto Meyerhof shared the 1922 Nobel Prize in Physiology or Medicine for their independent work related to muscle energy metabolism. Building on this work, scientists began measuring oxygen consumption during exercise. Notable contributions were made by Henry Taylor at the University of Minnesota, Scandinavian scientists Per-Olof Åstrand and Bengt Saltin in the 1950s and 60s, the Harvard Fatigue Laboratory, German universities, and the Copenhagen Muscle Research Centre among others.
In some countries it is a Primary Health Care Provider. Accredited Exercise Physiologists (AEP's) are university-trained professionals who prescribe exercise-based interventions to treat various conditions using dose response prescriptions specific to each individual.
Energy expenditure
Humans have a high capacity to expend energy for many hours during sustained exertion. For example, one i |
https://en.wikipedia.org/wiki/Closest%20string | In theoretical computer science, the closest string is an NP-hard computational problem, which tries to find the geometrical center of a set of input strings.
To understand the word "center", it is necessary to define a distance between two strings. Usually, this problem is studied with the Hamming distance in mind.
Formal definition
More formally, given n length-m strings s1, s2, ..., sn, the closest string problem seeks for a new length-m string s such that d(s,si) ≤ k for all i, where d denotes the Hamming distance, and where k is as small as possible. A decision problem version of the closest string problem, which is NP-complete, instead takes k as another input and questions whether there is a string within Hamming distance k of all the input strings.
The closest string problem can be seen as a special case of the generic 1-center problem in which the distances between elements are measured using Hamming distance.
Motivation
In bioinformatics, the closest string problem is an intensively studied facet of the problem of finding signals in DNA.
Simplifications and data reductions
Instances of closest string may contain information that is not essential to the problem. In some sense, the usual input of closest string contains information, that does not contribute to the hardness of the problem. For example, if some strings contain the character a, but none contains the character z, replacing all as with zs would yield an essentially equivalent instance, that is: from a solution of the modified instance, the original solution can be restored, and vice versa.
Normalizing the input
When all input strings that share the same length are written on top of each other, they form a matrix. Certain row types have essentially the same implications to the solution. For example, replacing a column with entries (a, a, b) with another column (x, x, y) might lead to a different solution string, but cannot affect solvability, because both columns express the same structure, |
https://en.wikipedia.org/wiki/Pseudo-abelian%20category | In mathematics, specifically in category theory, a pseudo-abelian category is a category that is preadditive and is such that every idempotent has a kernel. Recall that an idempotent morphism is an endomorphism of an object with the property that . Elementary considerations show that every idempotent then has a cokernel. The pseudo-abelian condition is stronger than preadditivity, but it is weaker than the requirement that every morphism have a kernel and cokernel, as is true for abelian categories.
Synonyms in the literature for pseudo-abelian include pseudoabelian and Karoubian.
Examples
Any abelian category, in particular the category Ab of abelian groups, is pseudo-abelian. Indeed, in an abelian category, every morphism has a kernel.
The category of associative rngs (not rings!) together with multiplicative morphisms is pseudo-abelian.
A more complicated example is the category of Chow motives. The construction of Chow motives uses the pseudo-abelian completion described below.
Pseudo-abelian completion
The Karoubi envelope construction associates to an arbitrary category a category together with a functor
such that the image of every idempotent in splits in .
When applied to a preadditive category , the Karoubi envelope construction yields a pseudo-abelian category
called the pseudo-abelian completion of . Moreover, the functor
is in fact an additive morphism.
To be precise, given a preadditive category we construct a pseudo-abelian category in the following way. The objects of are pairs where is an object of and is an idempotent of . The morphisms
in are those morphisms
such that in .
The functor
is given by taking to .
Citations |
https://en.wikipedia.org/wiki/Nitarsone | Nitarsone is an organoarsenic compound that is used in poultry production as a feed additive to increase weight gain, improve feed efficiency, and prevent histomoniasis (blackhead disease). It is marketed as Histostat by Zoetis.
Nitarsone once was one of four arsenical food-animal drugs—along with roxarsone, arsanilic acid, and carbarsone—approved by the U.S. Food and Drug Administration for use in feeding poultry. However, following the suspension of sales of roxarsone in the United States in 2011, nitarsone was thought to be the only arsenical animal drug actually marketed in the U.S. In September 2013, the FDA announced that Zoetis and Fleming Laboratories agreed to voluntarily withdraw from using roxarsone, arsanilic acid, and carbarsone, which left nitarsone as the only arsenical approved in the U.S. for use in food animals. But in 2015, the FDA also withdrew approval of nitarsone in animal feeds, effective at the end of 2015. |
https://en.wikipedia.org/wiki/Xetal | Xetal is the name of a family of non commercial massively parallel processors developed within Philips Research.
Background
The Xetal was conceived in 1999 at Philips Research when researchers Kleihorst, Abbo and Van der Avoird investigated possibilities for combining a CMOS image sensor with powerful image processing logic. Since CMOS image sensors (contrary to CCD sensors) can be produced using the same manufacturing process as processors, both could be combined in a single integrated circuit (IC). With the image sensor and image processing combined on the same die it is essentially possible to parallelize image processing up to the level where each pixel has its dedicated image processing logic. In such a design the image sensor would be in the upper layers of the IC while the image processing would be done in the lower layers, so image data would be transferred from one layer to the other, instead of through external pins or wires.
Additionally there is inherent parallelism in image processing algorithms. Many algorithms do the same processing on every pixel. Image processing is therefore a suitable domain for a massively parallel approach using an SIMD architecture. Although massive parallelism is not a new idea (earlier examples include ILLIAC IV and Goodyear MPP) the Xetal 1 was one of the first to apply this approach to image processing.
Initial design
The first design combined a QVGA image sensor with line-based A/D conversion. In this design, the analogue pixel values of the sensor were converted line by line (instead of pixel by pixel). For every line there were 320 A/D converters. Each A/D converter is connected to a dedicated processing element (PE) to do image processing. This parallel design meant that a complete line of 320 pixels could essentially be processed in a single clock cycle. This parallelism was also applied to the memory architecture, where each processing element could access a pixel from a so-called /Line memory.
Simulations of this d |
https://en.wikipedia.org/wiki/Logical%20biconditional | In logic and mathematics, the logical biconditional, also known as material biconditional or equivalence or biimplication or bientailment, is the logical connective used to conjoin two statements and to form the statement " if and only if " (often abbreviated as " iff "), where is known as the antecedent, and the consequent.
Nowadays, notations to represent equivalence include .
is logically equivalent to both and , and the XNOR (exclusive nor) boolean operator, which means "both or neither".
Semantically, the only case where a logical biconditional is different from a material conditional is the case where the hypothesis (antecedent) is false but the conclusion (consequent) is true. In this case, the result is true for the conditional, but false for the biconditional.
In the conceptual interpretation, means "All 's are 's and all 's are 's". In other words, the sets and coincide: they are identical. However, this does not mean that and need to have the same meaning (e.g., could be "equiangular trilateral" and could be "equilateral triangle"). When phrased as a sentence, the antecedent is the subject and the consequent is the predicate of a universal affirmative proposition (e.g., in the phrase "all men are mortal", "men" is the subject and "mortal" is the predicate).
In the propositional interpretation, means that implies and implies ; in other words, the propositions are logically equivalent, in the sense that both are either jointly true or jointly false. Again, this does not mean that they need to have the same meaning, as could be "the triangle ABC has two equal sides" and could be "the triangle ABC has two equal angles". In general, the antecedent is the premise, or the cause, and the consequent is the consequence. When an implication is translated by a hypothetical (or conditional) judgment, the antecedent is called the hypothesis (or the condition) and the consequent is called the thesis.
A common way of demonstrating a biconditiona |
https://en.wikipedia.org/wiki/Terminal%20cleaning | Terminal cleaning is the thorough cleaning of a room after use, used in healthcare environments to control the spread of infections.
Justification
Nosocomial infections claim approximately 90,000 lives in the United States annually. When patients are hospitalized and identified as having methicillin-resistant Staphylococcus aureus or infections that can be spread to other patients, best practices isolate these patients in rooms that are subjected to terminal cleaning when the patient is discharged.
For example, terminal cleaning reduces the spread of C. difficile infections.
Procedure
Terminal cleaning requires cleaning the entire room after use by the patient. Methods vary, but involve disinfection of all surfaces and discarding all disposable items and cleaning rags or towels as medical waste.
See also
Nosocomial infection
MRSA
VRE
Pseudomonas aeruginosa |
https://en.wikipedia.org/wiki/David%20Sobral | David Ricardo Serrano Gonçalves Sobral (born 11 February 1986) is a Portuguese Astrophysicist, best known for the discovery of galaxy CR-7. He was an Astrophysics lecturer and Reader at Lancaster University from January 2016 to August 2022.
Publications
A large H alpha survey at z=2.23, 1.47, 0.84 and 0.40: the 11 Gyr evolution of star-forming galaxies from HiZELS, Monthly Notices of the Royal Astronomical Society in 2013
Evidence for PopIII-like stellar populations in the most luminous Lyα emitters at the epoch of reionization: spectroscopic confirmation, The Astrophysical Journal 808 (2)
Chasing a Starlight: Investigating One of the Oldest Known Galaxies with MUSE |
https://en.wikipedia.org/wiki/Mate%20choice%20copying | Mate-choice copying, or non-independent mate choice, occurs when a female of an animal species copies another fellow female's mate choice. In other words, non-independent mate-choice is when a female's sexual preferences get socially inclined toward those of their fellow females. This behavior is speculated to be one of the driving forces of sexual selection and the evolution of male traits. It is also hypothesized that mate-choice copying can induce speciation due to the selective pressure for certain, preferred male qualities. Moreover, mate-choice copying is one form of social learning in which animals behave differently depending on what they observe in their surrounding environment. In other words, the animals tend to process the social stimuli they receive by observing the behavior of their conspecifics and execute a similar behavior to what they observed. Mate choice copying has been found in a wide variety of different species, including (but not limited to): invertebrates, like the common fruit fly (Drosophila melanogaster); fish, such as guppies (Poecilia reticulata) and ocellated wrasse; birds, like the black grouse; and mammals, such as the Norway rat (Rattus norvegicus) and humans. Most studies have focused on females, but male mate copying has been also found in sailfin mollies (Poecilia latipinna) and humans.
Mechanism
Visual copying
Mate-choice copying requires a highly developed form of social recognition by which the observer (i.e. copier) female recognizes the demonstrator (i.e. chooser) female when mating with a target male and later recognizes the target male to mate with it. Though it might seem simple, observer females actually do not copy the choice of any haphazard, demonstrator female; instead, they copy based on their perception of the demonstrator female's quality. In guppies (Poecilia reticulata) for instance, females are more likely to copy the mate choice of a larger sized fish than to copy the mate choice of a fish of the same or |
https://en.wikipedia.org/wiki/Merchant%27s%20mark | A merchant's mark is an emblem or device adopted by a merchant, and placed on goods or products sold by him in order to keep track of them, or as a sign of authentication. It may also be used as a mark of identity in other contexts.
History
Ancient use
Merchants' marks are as old as the sealings of the third millennium BCE found in Sumer that originated in the Indus Valley. Impressions of cloth, strings and other packing material on the reverse of tags with seal impressions indicate that the Harappan seals were used to control economic administration and trade. Amphorae from the Roman Empire can sometimes be traced to their sources from the inscriptions on their handles. Commercial inscriptions in Latin, known as tituli picti, appear on Roman containers used for trade.
Middle ages and early modern period
Symbolic merchants' marks continued to be used by artisans and townspeople of the medieval and early modern eras to identify themselves and authenticate their goods. These distinctive and easily recognizable marks often appeared in their seals on documents and on products made for sale. They are often found on headstones and in works of stained glass, brass, and stone, serving in place of heraldic imagery, which could not be used by the middle classes. They were the precursors of hallmarks, printer's marks, and trademarks.
Legal requirements and superstitions
To manage the risks of piracy or shipwreck, merchants often consigned a cargo to several vessels or caravans; a mark on a bale established legal ownership and avoided confusion. Early travellers, voyagers and merchants displayed their merchant's marks as well to ward off evil. Adventurous travellers and sailors ascribed the terrors and perils of their life to the wrath of the Devil. To counter these dangers merchants employed all sorts of religious and magical means to place their caravans, ships and merchandise under the protection of God and His Saints.
One such symbol combined the mystical "Sign o |
https://en.wikipedia.org/wiki/PTS%20Galactitol%20Family | The PTS Galactitol (Gat) Family (TC# 4.A.5) is part of the PTS-AG superfamily. The biochemistry of this family is poorly defined. The only well-characterized member of this family is the galactitol permease of Escherichia coli. However, a homologous IIC protein from Listeria monocytogenes has been shown to be required for D-arabitol fermentation. It presumably functions together with IIAGat and IIBGat homologues. IICGat is distantly related to IICSgc of E. coli; IIAGat is distantly related to IIASga and IIASgcof E. coli as well as IIAMtl and IIAFru. IIBGat is distantly related to IIBSga and IIBSgc of E. coli. Domains in the LicR/CelR family of transcriptional activators show C-terminal domains exhibiting weak sequence similarity to IIBGat and IIAGat. |
https://en.wikipedia.org/wiki/Houses%20for%20Visiting%20Mathematicians | The Houses for Visiting Mathematicians (also known as the Mathematics Research Centre houses) are a set of five houses and two flats, built for academics attending mathematical conferences at the University of Warwick.
The buildings are Grade II* listed and were built between 1968 and 1969 to the design of architect Bill Howell and were opened in June of that year by then Vice-Chancellor Jack Butterworth, Sir Christopher Zeeman and Bill Howell. Their construction was supported by a £50,000 grant from the Nuffield Foundation. In 1970, they received the RIBA Architecture Award.
The houses comprise a combined living room/kitchen and large study bedroom on the ground floor, and smaller study bedrooms and a bathroom on the first floor. The curved walls of the downstairs study are lined with blackboards, built to the specification that they should be high enough for the mathematician to work but also "low enough for small children to use the bottom bit."
See also
Grade II* listed buildings in Coventry |
https://en.wikipedia.org/wiki/Human%20placentophagy | Human placentophagy, or consumption of the placenta, is defined as "the ingestion of a human placenta postpartum, at any time, by any person, either in raw or altered (e.g., cooked, dried, steeped in liquid) form". While there are several anecdotes of different cultures practicing placentophagy in varying contexts, maternal placentophagy started in the US in the 1970s, with little to no evidence of its practice in any traditional or historic culture. Midwives and alternative-health advocates in the U.S. are the primary groups encouraging post-partum maternal placentophagy.
Maternal placentophagy has a small following in Western cultures, fostered by celebrities like January Jones. The placenta has high protein, rich iron and nutrient content, but there is inconclusive scientific evidence about any health benefit to its consumption. The risks of human placentophagy are also still unclear, but there has been one confirmed case of an infant needing hospitalization due to a group B strep blood infection tied to their mother's consumption of placenta capsules.
Placentophagy can be divided into two categories, maternal placentophagy and non-maternal placentophagy.
Maternal placentophagy
Maternal placentophagy is defined as "a mother’s ingestion of her own placenta postpartum, in any form, at any time". Of the more than 4000 species of placental mammals, most, including herbivores, regularly engage in maternal placentophagy, thought to be an instinct to hide any trace of childbirth from predators in the wild. The exceptions to placentophagy include mainly humans, Pinnipedia, Cetacea, and camels.
Non-maternal placentophagy
Non-maternal placentophagy is defined as "the ingestion of the placenta by any person other than the mother, at any time". Such instances of placentophagy have been attributed to the following: a shift toward carnivorousness at parturition, specific hunger, and general hunger. With most Eutherian mammals, the placenta is consumed postpartum by the m |
https://en.wikipedia.org/wiki/Gemini%20Wing | Gemini Wing is a vertically scrolling shooter created by Tecmo and released in arcades in 1987. One or two players control a futuristic aircraft flying over terrain and shooting enemies of an animalistic or insectoid design.
Home conversions were released for the ZX Spectrum, Commodore 64, Amstrad CPC, Amiga, Atari ST, MSX, and X68000.
Reception
In Japan, Game Machine listed Gemini Wing on their December 15, 1987 issue as being the eighth most-successful table arcade unit of the month. |
https://en.wikipedia.org/wiki/Breeding%20back | Breeding back is a form of artificial selection by the deliberate selective breeding of domestic (but not exclusively) animals, in an attempt to achieve an animal breed with a phenotype that resembles a wild type ancestor, usually one that has gone extinct. Breeding back is not to be confused with dedomestication.
It must be kept in mind that a breeding-back breed may be very similar to the extinct wild type in phenotype, ecological niche, and to some extent genetics, but the gene pool of that wild type was different prior to its extinction. Even the superficial authenticity of a bred-back animal depends on the particular stock used to breed the new lineage. As a result of this, some breeds, like Heck cattle, are at best a vague look-alike of the extinct wild type aurochs, according to the literature.
Background
The aim of breeding back programs is to restore the wild traits which may have been unintentionally preserved in the lineages of domesticated animals. Commonly, not only the new animal's phenotype, but also its ecological capacity, are considered in back-breeding projects, as hardy, "bred back" animals may be used in certain conservation projects. In nature, usually only individuals well suited to their natural circumstances will survive and reproduce, whereas humans select animals with additional attractive, docile or productive characteristics, protecting them from the dangers once found in their ancestral environment (predation, drought, disease, extremes of weather, lack of mating opportunities, etc.). In such cases, selection criteria in nature differ from those found in domesticated conditions. Because of this, domesticated animals often differ significantly in phenotype, behaviour and genetics from their wild forerunners. It is the hope of breeding-back programs to re-express, within a new breeding lineage, the wild, ancient traits that may have "lain buried" in the DNA of domestic animals.
In many cases, the extinct wild type ancestors of a give |
https://en.wikipedia.org/wiki/Social%20competence | Social competence consists of social, emotional, cognitive, and behavioral skills needed for successful social adaptation. Social competence also reflects having the ability to take another's perspective concerning a situation, learn from past experiences, and apply that learning to the changes in social interactions.
Social competence is the foundation upon which expectations for future interaction with others are built and perceptions of an individual's own behavior are developed. Social competence frequently encompasses social skills, social communication, and interpersonal communication. Competence is directly connected to social behavior, such as social motives, abilities, skills, habits, and knowledge. All of these social factors contribute to the development of a person's behavior.
History
The study of social competence began in the early 20th century with research into how children interact with their peers and function in social situations. In the 1930s, researchers began investigating peer groups and how children's characteristics affected their positions within these peer groups. In the 1950s and 1960s, research established that children's social competence was related to future mental health (such as maladaptive outcomes in adulthood), as well as problems in school settings. Research on social competence expanded greatly from this point on, as increasing amounts of evidence demonstrated the importance of social interactions. Social competence began to be viewed in terms of problem-solving skills and strategies in social situations, and was conceptualized in terms of effective social functioning and information processing. In the 1970s and 1980s, research began focusing on the impact of children's behavior on relationships, which influenced the study of the effectiveness of teaching children social skills that are age, gender, and context-specific.
In an effort to determine the reason for some children's lack of social skills in certain interactions, |
https://en.wikipedia.org/wiki/Antiparticle | In particle physics, every type of particle is associated with an antiparticle with the same mass but with opposite physical charges (such as electric charge). For example, the antiparticle of the electron is the positron (also known as an antielectron). While the electron has a negative electric charge, the positron has a positive electric charge, and is produced naturally in certain types of radioactive decay. The opposite is also true: the antiparticle of the positron is the electron.
Some particles, such as the photon, are their own antiparticle. Otherwise, for each pair of antiparticle partners, one is designated as the normal particle (the one that occurs in matter usually interacted with in daily life). The other (usually given the prefix "anti-") is designated the antiparticle.
Particle–antiparticle pairs can annihilate each other, producing photons; since the charges of the particle and antiparticle are opposite, total charge is conserved. For example, the positrons produced in natural radioactive decay quickly annihilate themselves with electrons, producing pairs of gamma rays, a process exploited in positron emission tomography.
The laws of nature are very nearly symmetrical with respect to particles and antiparticles. For example, an antiproton and a positron can form an antihydrogen atom, which is believed to have the same properties as a hydrogen atom. This leads to the question of why the formation of matter after the Big Bang resulted in a universe consisting almost entirely of matter, rather than being a half-and-half mixture of matter and antimatter. The discovery of charge parity violation helped to shed light on this problem by showing that this symmetry, originally thought to be perfect, was only approximate.
Because charge is conserved, it is not possible to create an antiparticle without either destroying another particle of the same charge (as is for instance the case when antiparticles are produced naturally via beta decay or the collis |
https://en.wikipedia.org/wiki/Utility%20representation%20theorem | In economics, a utility representation theorem asserts that, under certain conditions, a preference ordering can be represented by a real-valued utility function, such that option A is preferred to option B if and only if the utility of A is larger than that of B.
Background
Suppose a person is asked questions of the form "Do you prefer A or B?" (when A and B can be options, actions to take, states of the world, consumption bundles, etc.). If the agent prefers A to B, we write . The set of all such preference-pairs forms the person's preference relation.
Instead of recording the person's preferences between every pair of options, it would be much more convenient to have a single utility function - a function u that assigns a real number to each option, such that if and only if .
Not every preference-relation has a utility-function representation. For example, if the relation is not transitive (the agent prefers A to B, B to C, and C to A), then it has no utility representation, since any such utility function would have to satisfy , which is impossible.
A utility representation theorem gives conditions on a preference relation, that are sufficient for the existence of a utility representation.
Often, one would like the representing function u to satisfy additional conditions, such as continuity. This requires additional conditions on the preference relation.
Definitions
The set of options is a topological space denoted by X. In some cases we assume that X is also a metric space; in particular, X can be a subset of a Euclidean space Rm, such that each coordinate in {1,...,m} represents a commodity, and each m-vector in X represents a possible consumption bundle.
Preference relations
A preference relation is a subset of . It is denoted by either or :
The notation is used when the relation is strict, that is, means that option A is strictly better than option B. In this case, the relation should be irreflexive, that is, does not hold. It should also |
https://en.wikipedia.org/wiki/Framework-oriented%20design | Framework Oriented Design (FOD) is a programming paradigm that uses existing frameworks as the basis for an application design.
The framework can be thought of as fully functioning template application. The application development consists of modifying callback procedure behaviour and modifying object behaviour using inheritance.
This paradigm provides the patterns for understanding development with Rapid Application Development (RAD) systems such as Delphi, where the Integrated Development Environment (IDE) provides the template application and the programmer fills in the appropriate event handlers. The developer has the option of modifying existing objects via inheritance. |
https://en.wikipedia.org/wiki/C13orf38 | C13orf38 is a protein found in the thirteenth chromosome with an open reading frame number 38. It is 139 amino acids long. The protein goes by a number of aliases CCDC169-SOHLH2 and CCDC169. The protein is found to be over expressed in the testis of humans. It is not known what the exact function of the protein is at this current time. The human CCDC169 gene contains 753 nucleotides. C13orf contains a domain of unknown function DUF4600. which is conserved in between nucleotide interval 1-79. The protein contains 139 amino acids.
Aliases
Known aliases are CCDC169 and CCDC169-SOHLH2. SOHLH refers to the suspected role in oogenesis and spermatogenesis. CCDC refers to the structure of the domain the protein, which is a coil-coil domain containing protein. Isoforms:
C13orf38 has seven isoforms, a through e. The most common isoform is isoform b. CCDC169 isoform b gene codes for the C13orf38 protein. Isoform b is the most common isoform.
Protein regulation
There is evidence that the protein is retained in the nucleus. There are several leucine-rich nuclear export signals in the amino acid sequence of the protein. Making it likely to be retained in the nucleus after transcription.
Gene expression
Tissue expression
C13orf38 is over expressed in the testis of humans. It has very weak expression data in the bone marrow, brain, and vascular tissues. It is expressed in several types of tumors – brain, lung, and germ cell tumors. It can also be expressed in leukemia cells.
Antibodies
There are antibodies available that are polyclonal. The antibodies come from a rabbit host sold by Bioss antibodies. The molecular weight is 25kDa.
Homologs and paralogs
Homologs were found mostly in primates. The homolog with the furthest divergence would be the Hood coral, which predates humans by 686 million years.
There are two low identity paralogs and two hypothetical protein paralogs found through the sequencing of the human genome.
Genetic divergence
Diverges 432 million years a |
https://en.wikipedia.org/wiki/Arkanoid%3A%20Revenge%20of%20Doh | Arkanoid: Revenge of Doh (a.k.a. Arkanoid 2) is an arcade game released by Taito in 1987 as a sequel to Arkanoid.
Plot
The mysterious enemy known as DOH has returned to seek vengeance on the Vaus space vessel. The player must once again take control of the Vaus (paddle) and overcome many challenges in order to destroy DOH once and for all. Revenge of Doh sees the player battle through 34 rounds, taken from a grand total of 64.
Gameplay
Revenge of Doh differs from its predecessor with the introduction of "Warp Gates". Upon completion of a level or when the Break ("B") pill is caught, two gates appear at the bottom of the play area, on either side. The player can choose to go through either one of the gates - the choice will affect which version of the next level is provided. The fire-button is only used when the Laser Cannons ("L") or Catch ("C") pill is caught.
The game has new power-ups and enemy types, and two new types of bricks. Notched silver bricks, like normal silver bricks, take several hits to destroy. However, after a short period of time after destruction, they regenerate at full strength. These bricks do not need to be destroyed in order to complete a level. In addition, some bricks move left to right as long as their sides are not obstructed by other bricks.
The US version has an entirely different layout for Level 1 that feature an entire line of notched bricks, with all colored bricks above it moving from side to side.
On round 17, the player must defeat a giant brain as a mini-boss. After completing all 33 rounds, the player faces DOH in two forms as a final confrontation: its original, statue-like incarnation, then a creature with waving tentacles that break off and regenerate when struck.
Home versions include level editor, which players can use to create their own levels or edit and replace existing levels.
Release
Revenge of Doh initially released in arcades in June 1987. In June 1989, versions for the Tandy, Atari ST, Apple IIGS, and Co |
https://en.wikipedia.org/wiki/Timestamping%20%28computing%29 | In computing, timestamping refers to the use of an electronic timestamp to provide a temporal order among a set of events.
Timestamping techniques are used in a variety of computing fields, from network management and computer security to concurrency control. For instance, a heartbeat network uses timestamping to monitor the nodes on a high availability computer cluster.
Timestamping computer files (updating the timestamp in the per-file metadata every time a file is modified) makes it possible to use efficient build automation tools.
See also
Trusted timestamping
Timestamp-based concurrency control
Lamport timestamp |
https://en.wikipedia.org/wiki/Stabilizer%20code | The theory of quantum error correction plays a prominent role in the practical realization and engineering of
quantum computing and quantum communication devices. The first quantum
error-correcting codes are strikingly similar to classical block codes in their
operation and performance. Quantum error-correcting codes restore a noisy,
decohered quantum state to a pure quantum state. A
stabilizer quantum error-correcting code appends ancilla qubits
to qubits that we want to protect. A unitary encoding circuit rotates the
global state into a subspace of a larger Hilbert space. This highly entangled,
encoded state corrects for local noisy errors. A quantum error-correcting code makes quantum computation
and quantum communication practical by providing a way for a sender and
receiver to simulate a noiseless qubit channel given a noisy qubit channel
whose noise conforms to a particular error model.
The stabilizer theory of quantum error correction allows one to import some
classical binary or quaternary codes for use as a quantum code. However, when importing the
classical code, it must satisfy the dual-containing (or self-orthogonality)
constraint. Researchers have found many examples of classical codes satisfying
this constraint, but most classical codes do not. Nevertheless, it is still useful to import classical codes in this way (though, see how the entanglement-assisted stabilizer formalism overcomes this difficulty).
Mathematical background
The stabilizer formalism exploits elements of
the Pauli group in formulating quantum error-correcting codes. The set
consists of the Pauli operators:
The above operators act on a single qubit – a state represented by a vector in a two-dimensional
Hilbert space. Operators in have eigenvalues and either commute
or anti-commute. The set consists of -fold tensor products of
Pauli operators:
Elements of act on a quantum register of qubits. We
occasionally omit tensor product symbols in what follows so that
The -fold P |
https://en.wikipedia.org/wiki/Hessian%20Bibliography | The Hessian Bibliography () is a German regional bibliography. Its aim is to completely capture all the literature connected with the geography, history and culture of the German federal state of Hesse from the year 1974. It is based on the holdings of the copyright libraries at Kassel, Fulda, Frankfurt, Wiesbaden and Darmstadt.
By 2000 a total of 24 indexed year books had appeared in print; since then it has only been available in electronic form as a freely accessible database of the Hessian library information system (HEBIS). The titles are recorded in accordance with the Rules for Alphabetic Cataloguing and accessed using a comprehensive system of about 1,200 system sites and keywords. About 6,500 bibliographic records are added per year.
The Hessian bibliography is part of the Virtual German National Bibliography, which has its own web portal.
For the period before 1974, the "Literature on the History and Historic Geograph and Culture of Hesse" is used. This consists of seven printed volumes by Karl Ernst Demandt (covering the period to 1964) and by Winfried Leist and Wolfgang Podehl (covering the period 1965-1976). Currently, the volumes of Podehl and Leist are gradually being added retrospectively to the database. |
https://en.wikipedia.org/wiki/Profundal%20zone | The profundal zone is a deep zone of an inland body of freestanding water, such as a lake or pond, located below the range of effective light penetration. This is typically below the thermocline, the vertical zone in the water through which temperature drops rapidly. The temperature difference may be large enough to hamper mixing with the littoral zone in some seasons which causes a decrease in oxygen concentrations. The profundal is often defined, as the deepest, vegetation-free, and muddy zone of the lacustrine benthal. The profundal zone is often part of the aphotic zone. Sediment in the profundal zone primarily comprises silt and mud.
Organisms
The lack of light and oxygen in the profundal zone determines the type of biological community that can live in this region, which is distinctly different from the community in the overlying waters. The profundal macrofauna is therefore characterized by physiological and behavioural adaptations to low oxygen concentration. While benthic fauna differs between lakes, Chironomidae and Oligochaetae often dominate the benthic fauna of the profundal zone because they possess hemoglobin-like molecules to extract oxygen from poorly oxygenated water. Due to the low productivity of the profundal zone, organisms rely on detritus sinking from the photic zone. Species richness in the profundal zone is often similar to that in the limnetic zone. Microbial levels in the profundal benthos are higher than those in the littoral benthos, potentially due to a smaller average sediment particle size. Benthic macroinvertebrates are believed to be regulated by top-down pressure.
Nutrient cycling
Nutrient fluxes in the profundal zone are primarily driven by release from the benthos. The anoxic nature of the profundal zone drives ammonia release from benthic sediment. This can drive phytoplankton production, to the point of a phytoplankton bloom, and create toxic conditions for many organisms, particularly at a high pH. Hypolimnetic anoxia can |
https://en.wikipedia.org/wiki/Deficient%20number | In number theory, a deficient number or defective number is a positive integer for which the sum of divisors of is less than . Equivalently, it is a number for which the sum of proper divisors (or aliquot sum) is less than . For example, the proper divisors of 8 are , and their sum is less than 8, so 8 is deficient.
Denoting by the sum of divisors, the value is called the number's deficiency. In terms of the aliquot sum , the deficiency is .
Examples
The first few deficient numbers are
1, 2, 3, 4, 5, 7, 8, 9, 10, 11, 13, 14, 15, 16, 17, 19, 21, 22, 23, 25, 26, 27, 29, 31, 32, 33, 34, 35, 37, 38, 39, 41, 43, 44, 45, 46, 47, 49, 50, ...
As an example, consider the number 21. Its divisors are 1, 3, 7 and 21, and their sum is 32. Because 32 is less than 42, the number 21 is deficient. Its deficiency is 2 × 21 − 32 = 10.
Properties
Since the aliquot sums of prime numbers equal 1, all prime numbers are deficient. More generally, all odd numbers with one or two distinct prime factors are deficient. It follows that there are infinitely many odd deficient numbers. There are also an infinite number of even deficient numbers as all powers of two have the sum ().
More generally, all prime powers are deficient because their only proper divisors are which sum to , which is at most .
All proper divisors of deficient numbers are deficient. Moreover, all proper divisors of perfect numbers are deficient.
There exists at least one deficient number in the interval for all sufficiently large n.
Related concepts
Closely related to deficient numbers are perfect numbers with σ(n) = 2n, and abundant numbers with σ(n) > 2n.
The natural numbers were first classified as either deficient, perfect or abundant by Nicomachus in his Introductio Arithmetica (circa 100 CE).
See also
Almost perfect number
Amicable number
Sociable number
Superabundant number |
https://en.wikipedia.org/wiki/AppleLink | AppleLink was the name of both Apple Computer's online service for its dealers, third-party developers, and users, and the client software used to access it. Prior to the commercialization of the Internet, AppleLink was a popular service for Mac and Apple IIGS users. The service was offered from about 1986 to 1994 to various groups, before being superseded by their short-lived eWorld and finally today's multiple Apple websites.
Early years
The original AppleLink, which went online in 1985, was a service available only to Apple employees and dealers, and shortly thereafter to Apple University Consortium members. Apple's consumer 800 number in fact touted this fact, promoting your dealer as the place to turn for help because of his access to AppleLink. In the late 1980s the service was also opened up to software developers, who could use it both as an end-user support system as well as a conduit to Apple development for questions and suggestions.
AppleLink used client software written in Pascal under contract to Apple by Pete Burnight/Central Coast Software. The program extended the desktop metaphor of the Macintosh Finder to encompass the areas on the remote server site. These were displayed as folders and files just as local folders and files were. In addition, there was a set of public bulletin boards, and the ability to use email via the service—although initially only between AppleLink users. File transfer for drivers and system software was another important role, and for this Apple created the AppleLink Package format to combine and compress the two forks of a Macintosh file into one for storage and sending. Apple also developed their Communications Control Language (CCL) for AppleLink, a language still used in a very similar form for today's Macintosh modem scripts.
The "back end" of the AppleLink system was hosted on General Electric's Information Services (GEIS) (division) Mark III time-sharing mainframes and worldwide communications network. AppleLink |
https://en.wikipedia.org/wiki/Forbidden%20Planet | Forbidden Planet is a 1956 American science fiction film from Metro-Goldwyn-Mayer, produced by Nicholas Nayfack, and directed by Fred M. Wilcox from a script by Cyril Hume that was based on an original film story by Allen Adler and Irving Block. It stars Walter Pidgeon, Anne Francis, and Leslie Nielsen. Shot in Eastmancolor and CinemaScope, it is considered one of the great science fiction films of the 1950s, a precursor of contemporary science fiction cinema. The characters and isolated setting have been compared to those in William Shakespeare's The Tempest, and the plot contains certain happenings analogous to the play, leading many to consider it a loose adaptation.
Forbidden Planet pioneered several aspects of science fiction cinema. It was the first science fiction film to depict humans traveling in a man-made faster-than-light starship. It was also the first to be set entirely on a planet orbiting another star, far away from Earth and the Solar System. The Robby the Robot character is one of the first film robots that was more than just a mechanical "tin can" on legs; Robby displays a distinct personality and is an integral supporting character in the film. Outside science fiction, the film was groundbreaking as the first of any genre to use an entirely electronic musical score, courtesy of Bebe and Louis Barron.
Forbidden Planets effects team was nominated for the Academy Award for Best Visual Effects at the 29th Academy Awards. Tony Magistrale describes it as one of the best examples of early techno-horror. In 2013, the film was selected for preservation in the United States National Film Registry by the Library of Congress as being "culturally, historically, or aesthetically significant".
Plot
In the 23rd century, after more than a year's journey, the United Planets starship C-57D arrives at the distant planet Altair IV to determine the fate of an expedition sent there 20 years before. Dr. Edward Morbius, one of the original expedition's scientists, wa |
https://en.wikipedia.org/wiki/Bouff%C3%A9e%20d%C3%A9lirante | Bouffée délirante (BD) is an acute and transient psychotic disorder. It is a uniquely French psychiatric diagnostic term with a long history in France and various French speaking nations: Caribbean, e.g., Haiti, Guadeloupe, Antilles and Francophone Africa. The term BD was originally coined and described by Valentin Magnan (1835–1916), fell into relative disuse and was later revived by Henri Ey (1900–1977).
Terminology
The French word bouffée is often translated as a puff or waft (as of air), but can also mean a flash, rush or surge. Chabrol translates the word délirante as "delusional". Other common dictionary definitions include less useful meanings such as "crazy" or "incoherent". A reasonable English translation of the term bouffée délirante is "delusional flash".
Description
Bouffée délirante is "an acute, brief nonorganic psychosis that typically presents with a sudden onset of fully formed, thematically variable delusions and hallucinations against a background of some degree of clouding of consciousness, unstable and fluctuating affect, and spontaneous recovery with some probability of relapse." The following criteria have been suggested for a diagnosis of BD: a) abrupt onset, b) polymorphic delusions, emotional changes, mood swings, depersonalization, derealization and/or hallucinations, c) complete remission within weeks or a few months, d) exclusion of organic causation, alcohol or drug use, e) no psychiatric antecedents with the exception of a previous episode of bouffée délirante. American academic investigators proposed the following definition in 2011: "The French concept of bouffée délirante refers to conditions with a sudden onset marked by prominent delusions with hallucinations, confusion, anxiety and affective symptoms. Symptoms vary rapidly, perhaps even by the hour, and there is a rapid return to the premorbid state of health." A frequently quoted authority on BD, P. Pichot (Hôpital Sainte Anne, Paris) provides this description of BD:
|
https://en.wikipedia.org/wiki/Wolpertinger | In German folklore, a Wolpertinger (also called Wolperdinger or Woiperdinger) is an animal said to inhabit the alpine forests of Bavaria and Baden-Württemberg in Southern Germany.
Description
It has a body comprising various animal parts – generally wings, antlers, a tail, and fangs; all attached to the body of a small mammal. The most widespread description portrays the Wolpertinger as having the head of a rabbit, the body of a squirrel, the antlers of a deer, and the wings and occasionally the legs of a pheasant.
Stuffed "Wolpertingers", composed of parts of actual stuffed animals, are often displayed in inns or sold to tourists as souvenirs in the animal's "native regions". The Deutsches Jagd- und Fischereimuseum in Munich, Germany features a permanent exhibit on the creature.
It resembles other creatures from German folklore, such as the Rasselbock of the Thuringian Forest, the Dilldapp of the Alemannic region, and the Elwedritsche of the Palatinate region, which accounts describe as a chicken-like creature with antlers; additionally the American Jackalope as well as the Swedish Skvader somewhat resemble the wolpertinger. The Austrian counterpart of the Wolpertinger is the Raurakl.
According to folklore, Wolpertingers can be found in the forests of Bavaria. Variant regional spellings of the name include Wolperdinger, Woipertingers, and Volpertinger. They are part of a larger family of horned mammals that exist throughout the Germanic regions of Europe, such as the Austrian Raurackl, which is nearly identical to the German Wolpertinger.
In popular culture
Rumo, a 'Wolperting' is the main character of the novel Rumo and His Miraculous Adventures by Walter Moers, depicted as an anthropomorphic dog with horns.
See also
Al-mi'raj
Bunyip
Elwetritsch
Jackalope
Lepus cornutus
Rasselbock
Skvader
Shope papilloma virus, a possible inspiration of the fangs and antlers.
Wendigo |
https://en.wikipedia.org/wiki/Libroadrunner | libRoadRunner is a C/C++ software library that supports simulation of SBML based models.. It uses LLVM to generate extremely high-performance code and is the fastest SBML-based simulator currently available. Its main purpose is for use as a reusable library that can be hosted by other applications, particularly on large compute clusters for doing parameter optimization where performance is critical. It also has a set of Python bindings that allow it to be easily used from Python.
libroadrunner is often paired with Tellurium, which adds additional functionality such as Antimony scripting.
Capabilities
Time-course simulation using the CVODE, RK45, and Euler solvers of ordinary differential equations, which can report on the system's variable concentrations and reaction rates over time.
Steady-state calculations using non-linear solvers such as kinsolve and NLEQ2
Stochastic simulation using the standard Gillespie algorithm.
Supports both steady-state and time-dependent Metabolic control analysis, including calculating the elasticities towards the variable metabolites by algebraic or numerical differentiation of the rate equations, as well as the flux and concentration control coefficients by means of matrix inversion and perturbation methods.
libroadrunner will also compute the structural matrices (e.g. K- and L-matrices) of a stoichiometric model.
The stability of a system can be investigated by way of the system eigenvalues.
Data and results can be plotted via matplotlib, or saved in text files.
libroadrunner supports the import and export of standard SBML.
Applications
libroadrunner has been widely used in the systems biology community for doing research in systems biology modeling, as well as being a host for other simulation platforms.
Software applications that use libroadrunner
CompuCell3D
CRNT4SBML
DIVIPAC
massPy
pyBioNetFit
PhysiCell
pyViPR
runBiosimulations
SBMLSim
Tellurium (simulation tool)
Tissue Forge (multi-cellular |
https://en.wikipedia.org/wiki/Heliobacteria | Heliobacteria are a unique subset of prokaryotic bacteria that process light for energy. Distinguishable from other phototrophic bacteria, they utilize a unique photosynthetic pigment, bacteriochlorophyll g and are the only known Gram-positive phototroph. They are a key player in symbiotic nitrogen fixation alongside plants, and use a type I reaction center like green-sulfur bacteria.
RNA trees place the heliobacteria among the Bacillota. They have no outer membrane and like certain other Bacillota (Clostridia), they form heat-resistant endospores, which contain high levels of calcium and dipicolinic acid. Heliobacteria are the only Bacillota known to be phototrophic.
Metabolism
The heliobacteria are phototrophic: they convert light energy into chemical energy using a type I reaction center. The primary pigment involved is bacteriochlorophyll g, which is unique to the group and has a unique absorption spectrum; this gives the heliobacteria their own environmental niche. Phototrophic processes take place at the cell membrane, which does not form folds or compartments as it does in purple bacteria. Though heliobacteria are phototrophic, they can create energy without light using pyruvate fermentation, which generates significantly less energy than it could with light.
Heliobacteria are photoheterotrophic, requiring organic carbon sources, and they are exclusively anaerobic. Bacteriochlorophyll g is inactivated by the presence of oxygen, making them obligate anaerobes (they cannot survive in aerobic conditions). Heliobacteria have been found in soils, hot springs, soda lakes and are common in the waterlogged soils of paddy fields. They are avid nitrogen fixers, so are probably important in the fertility of paddy fields. Heliobacteria are mainly terrestrial phototrophs, contrary to the multitudes of others that are aquatic, and often form mutualistic relationships with the plants near them.
Taxonomy
Heliobacteria should not be confused with Helicobacter, which |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.