source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/DNA%20barcoding%20in%20diet%20assessment
DNA barcoding in diet assessment is the use of DNA barcoding to analyse the diet of organisms. and further detect and describe their trophic interactions. This approach is based on the identification of consumed species by characterization of DNA present in dietary samples, e.g. individual food remains, regurgitates, gut and fecal samples, homogenized body of the host organism, target of the diet study (for example with whole body of insects). The DNA sequencing approach to be adopted depends on the diet breadth of the target consumer. For organisms feeding on one or only few species, traditional Sanger sequencing techniques can be used. For polyphagous species with diet items more difficult to identify, it is conceivable to determine all consumed species using NGS methodology. The barcode markers utilized for amplification will differ depending on the diet of the target organism. For herbivore diets, the standard DNA barcode loci will differ significantly depending on the plant taxonomic level. Therefore, for identifying plant tissue at the taxonomic family or genus level, the markers rbcL and trn-L-intron are used, which differ from the loci ITS2, matK, trnH-psbA (noncoding intergenic spacer) used to identify diet items to genus and species level. For animal prey, the most broadly used DNA barcode markers to identify diets are the mitochondrial cytochrome C oxydase (COI) and cytochrome b (cytb). When the diet is broad and diverse, DNA metabarcoding is used to identify most of the consumed items. Advantages A major benefit of using DNA barcoding in diet assessment is the ability to provide high taxonomic resolution of consumed species. Indeed, when compared to traditional morphological analysis, DNA barcoding enables a more reliable separation of closely related taxa reducing the observed bias. Moreover, DNA barcoding enables to detect soft and highly digested items, not recognisable through morphological identification. For example, Arachnids feed on pre-dige
https://en.wikipedia.org/wiki/FM-index
In computer science, an FM-index is a compressed full-text substring index based on the Burrows–Wheeler transform, with some similarities to the suffix array. It was created by Paolo Ferragina and Giovanni Manzini, who describe it as an opportunistic data structure as it allows compression of the input text while still permitting fast substring queries. The name stands for Full-text index in Minute space. It can be used to efficiently find the number of occurrences of a pattern within the compressed text, as well as locate the position of each occurrence. The query time, as well as the required storage space, has a sublinear complexity with respect to the size of the input data. The original authors have devised improvements to their original approach and dubbed it "FM-Index version 2". A further improvement, the alphabet-friendly FM-index, combines the use of compression boosting and wavelet trees to significantly reduce the space usage for large alphabets. The FM-index has found use in, among other places, bioinformatics. Background Using an index is a common strategy to efficiently search a large body of text. When the text is larger than what reasonably fits within a computer's main memory, there is a need to compress not only the text but also the index. When the FM-index was introduced, there were several suggested solutions that were based on traditional compression methods and tried to solve the compressed matching problem. In contrast, the FM-index is a compressed self-index, which means that it compresses the data and indexes it at the same time. FM-index data structure An FM-index is created by first taking the Burrows–Wheeler transform (BWT) of the input text. For example, the BWT of the string "abracadabra$" is "ard$rcaaaabb", and here it is represented by the matrix where each row is a rotation of the text, and the rows have been sorted lexicographically. The transform corresponds to the concatenation of the characters from the last column (l
https://en.wikipedia.org/wiki/Convex%20polytope
A convex polytope is a special case of a polytope, having the additional property that it is also a convex set contained in the -dimensional Euclidean space . Most texts use the term "polytope" for a bounded convex polytope, and the word "polyhedron" for the more general, possibly unbounded object. Others (including this article) allow polytopes to be unbounded. The terms "bounded/unbounded convex polytope" will be used below whenever the boundedness is critical to the discussed issue. Yet other texts identify a convex polytope with its boundary. Convex polytopes play an important role both in various branches of mathematics and in applied areas, most notably in linear programming. In the influential textbooks of Grünbaum and Ziegler on the subject, as well as in many other texts in discrete geometry, convex polytopes are often simply called "polytopes". Grünbaum points out that this is solely to avoid the endless repetition of the word "convex", and that the discussion should throughout be understood as applying only to the convex variety (p. 51). A polytope is called full-dimensional if it is an -dimensional object in . Examples Many examples of bounded convex polytopes can be found in the article "polyhedron". In the 2-dimensional case the full-dimensional examples are a half-plane, a strip between two parallel lines, an angle shape (the intersection of two non-parallel half-planes), a shape defined by a convex polygonal chain with two rays attached to its ends, and a convex polygon. Special cases of an unbounded convex polytope are a slab between two parallel hyperplanes, a wedge defined by two non-parallel half-spaces, a polyhedral cylinder (infinite prism), and a polyhedral cone (infinite cone) defined by three or more half-spaces passing through a common point. Definitions A convex polytope may be defined in a number of ways, depending on what is more suitable for the problem at hand. Grünbaum's definition is in terms of a convex set of points in spac
https://en.wikipedia.org/wiki/List%20of%20United%20States%20regional%20mathematics%20competitions
Many math competitions in the United States have regional restrictions. Of these, most are statewide. For a more complete list, please visit here . The contests include: Alabama Alabama Statewide High School Mathematics Contest Virgil Grissom High School Math Tournament Vestavia Hills High School Math Tournament Arizona Great Plains Math League AATM State High School Contest California Bay Area Math Olympiad Lawrence Livermore National Laboratories Annual High School Math Challenge Cal Poly Math Contest and Trimathlon Polya Competition Bay Area Math Meet College of Creative Studies Math Competition LA Math Cup Math Day at the Beach hosted by CSULB Math Field Day for San Diego Middle Schools Mesa Day Math Contest at UC Berkeley Santa Barbara County Math Superbowl Pomona College Mathematical Talent Search Redwood Empire Mathematics Tournament hosted by Humboldt State (middle and high school) San Diego Math League and San Diego Math Olympiad hosted by the San Diego Math Circle Santa Clara University High School Mathematics Contest SC Mathematics Competition (SCMC) hosted by RSO@USC Stanford Mathematics Tournament UCSD/GSDMC High School Honors Mathematics Contest Colorado Colorado Mathematics Olympiad District of Columbia Moody's Mega Math Florida Florida-Stuyvesant Alumni Mathematics Competition David Essner Mathematics Competition James S. Rickards High School Fall Invitational FAMAT Regional Competitions: January Regional February Regional March Regional FGCU Math Competition Georgia Central Math Meet(grades 9 - 12) GA Council of Teachers of Mathematics State Varsity Math Tournament STEM Olympiads Of America Math, Science & Cyber Olympiads (grades 3 - 8) Valdosta State University Middle Grades Mathematics Competition Illinois ICTM math contest (grades 3–12) Indiana [IUPUI High School Math Contest] (grades 9–12) Huntington University Math Competition (grades 6–12) Indiana Math League IASP Academic Super Bowl Rose-Hulman H
https://en.wikipedia.org/wiki/Pitfall%21
Pitfall! is a video game developed by David Crane for the Atari Video Computer System (later renamed Atari 2600) and released in 1982 by Activision. The player controls Pitfall Harry, who has a time limit of 20 minutes to seek treasure in a jungle. The game world is populated by enemies and hazards that variously cause the player to lose lives or points. Crane had made several games for both Atari, Inc. and Activision before working on Pitfall! in 1982. He started with creating a new realistic-style walking animation for a person on the Atari 2600 hardware. After completing it, he fashioned a game around it. He used a jungle setting with items to collect and enemies to avoid, and the result became Pitfall! Pitfall! received mostly positive reviews at the time of its release praising both its gameplay and graphics. The game was influential in the platform game genre and various publications have considered it one of the greatest video games of all time. It is also one of the best-selling Atari 2600 video games. The game was ported to several contemporary video game systems. It has been included in various Activision compilation games and was included as a secret extra in later Activision published titles. Gameplay Pitfall! is a video game set in a jungle where the player controls Pitfall Harry, a fortune hunter and explorer. Pitfall! has been described as a platform game by Nick Montfort and Ian Bogost, authors of Racing the Beam. Similar to Superman (1979) and Adventure (1980), the game does not feature side-scrolling, but instead loads one screen at a time, with a new screen appearing when Harry moves to the edge. The goal is to get Harry as many points as possible within a twenty-minute time limit. The player starts the game with 2000 points and can collect a total of 32 treasure hidden among 255 different scenes to increase their total, ranging from a money bag worth 2000 points, to a diamond ring worth 5000 points. Pitfall Harry moves left and right and can
https://en.wikipedia.org/wiki/Busulfan
Busulfan (Myleran, GlaxoSmithKline, Busulfex IV, Otsuka America Pharmaceutical, Inc.) is a chemotherapy drug in use since 1959. It is a cell cycle non-specific alkylating antineoplastic agent, in the class of alkyl sulfonates. Its chemical designation is 1,4-butanediol dimethanesulfonate. History Busulfan was approved by the US Food and Drug Administration (FDA) for treatment of chronic myeloid leukemia (CML) in 1999. Busulfan was the mainstay of the chemotherapeutic treatment of chronic myeloid leukemia (CML) until it was displaced by the new gold standard, imatinib, though it is still in use to a degree as a result of the drug's relative low cost. Indications Busulfan is used in pediatrics and adults in combination with cyclophosphamide or fludarabine/clofarabine as a conditioning agent prior to bone marrow transplantation, especially in chronic myelogenous leukemia (CML) and other leukemias, lymphomas, and myeloproliferative disorders. Busulfan can control tumor burden but cannot prevent transformation or correct cytogenic abnormalities. The drug was recently used in a study to examine the role of platelet-transported serotonin in liver regeneration. Availability Myleran is supplied in white film coated tablets with 2 mg of busulfan per tablet. After 2002, a great interest has appeared for intravenous presentations of busulfan. Busulfex is supplied as an intravenous solution with 6 mg/ml busulfan. Busulfex has proved equally effective as oral busulfan, with presumedly less toxic side effects. Pharmacokinetic and dynamic studies support this use, that has prompted its usage in transplantation regimes, particularly in frail patients. Fludarabine + busulfan is a typical example of this use. Side effects Toxicity may include interstitial pulmonary fibrosis ("busulfan lung"), hyperpigmentation, seizures, hepatic (veno-occlusive disease) (VOD) or sinusoidal obstruction syndrome (SOS), emesis, and wasting syndrome. Busulfan also induces impotence in males (kill
https://en.wikipedia.org/wiki/Heuristic%20analysis
Heuristic analysis is a method employed by many computer antivirus programs designed to detect previously unknown computer viruses, as well as new variants of viruses already in the "wild". Heuristic analysis is an expert based analysis that determines the susceptibility of a system towards particular threat/risk using various decision rules or weighing methods. MultiCriteria analysis (MCA) is one of the means of weighing. This method differs from statistical analysis, which bases itself on the available data/statistics. Operation Most antivirus programs that utilize heuristic analysis perform this function by executing the programming commands of a questionable program or script within a specialized virtual machine, thereby allowing the anti-virus program to internally simulate what would happen if the suspicious file were to be executed while keeping the suspicious code isolated from the real-world machine. It then analyzes the commands as they are performed, monitoring for common viral activities such as replication, file overwrites, and attempts to hide the existence of the suspicious file. If one or more virus-like actions are detected, the suspicious file is flagged as a potential virus, and the user alerted. Another common method of heuristic analysis is for the anti-virus program to decompile the suspicious program, then analyze the machine code contained within. The source code of the suspicious file is compared to the source code of known viruses and virus-like activities. If a certain percentage of the source code matches with the code of known viruses or virus-like activities, the file is flagged, and the user alerted. Effectiveness Heuristic analysis is capable of detecting many previously unknown viruses and new variants of current viruses. However, heuristic analysis operates on the basis of experience (by comparing the suspicious file to the code and functions of known viruses). This means it is likely to miss new viruses that contain previousl
https://en.wikipedia.org/wiki/Procerus%20muscle
The procerus muscle (or pyramidalis nasi) is a small pyramidal slip of muscle deep to the superior orbital nerve, artery and vein. Procerus is Latin, meaning tall or extended. Structure The procerus muscle arises by tendinous fibers from the fascia covering the lower part of the nasal bone and upper part of the lateral nasal cartilage. It is inserted into the skin over the lower part of the forehead between the two eyebrows on either side of the midline, its fibers merging with those of the frontalis muscle. Nerve supply The procerus muscle is supplied by the temporal branch of the facial nerve (VII). It may also be supplied by other branches of the facial nerve, which can be varied. Function The procerus muscle helps to pull that part of the skin between the eyebrows downwards, which assists in flaring the nostrils. It can also contribute to an expression of anger. Procerus is supplied by temporal and lower zygomatic branches from the facial nerve. A supply from its buccal branch has also been described. Its contraction can produce transverse wrinkles. Clinical significance Procerus sign Dystonia of the procerus muscle is involved in the procerus sign, which is indicative of progressive supranuclear palsy (PSP). Denervation The procerus muscle may be denervated to reduce furrow lines around the glabella caused by frowning. This may be for cosmetic purposes. Surgery can be used to transect the temporal branch of the facial nerve, although other branches of the facial nerve may also need to be cut.
https://en.wikipedia.org/wiki/Carcinoma
Carcinoma is a malignancy that develops from epithelial cells. Specifically, a carcinoma is a cancer that begins in a tissue that lines the inner or outer surfaces of the body, and that arises from cells originating in the endodermal, mesodermal or ectodermal germ layer during embryogenesis. Carcinomas occur when the DNA of a cell is damaged or altered and the cell begins to grow uncontrollably and become malignant. It is from the (itself derived from meaning crab).<ref>Oxford English Dictionary, 3rd edition, s.v.</ref> Classification As of 2004, no simple and comprehensive classification system has been devised and accepted within the scientific community. Traditionally, however, malignancies have generally been classified into various types using a combination of criteria, including: The cell type from which they start; specifically: Epithelial cells ⇨ carcinoma Non-hematopoietic mesenchymal cells ⇨ sarcoma Hematopoietic cells Bone marrow-derived cells that normally mature in the bloodstream ⇨ leukemia Bone marrow-derived cells that normally mature in the lymphatic system ⇨ lymphoma Germ cells ⇨ germinoma Other criteria that play a role include: The degree to which the malignant cells resemble their normal, untransformed counterparts The appearance of the local tissue and stromal architecture The anatomical location from which tumors arise Genetic, epigenetic, and molecular features Histological types Adenocarcinoma (adeno = gland) Refers to a carcinoma featuring microscopic glandular-related tissue cytology, tissue architecture, and/or gland-related molecular products, e.g., mucin. Squamous cell carcinoma Refers to a carcinoma with observable features and characteristics indicative of squamous differentiation (intercellular bridges, keratinization, squamous pearls). Adenosquamous carcinoma Refers to a mixed tumor containing both adenocarcinoma and squamous cell carcinoma, wherein each of these cell types comprise at least 10% of the tumor volu
https://en.wikipedia.org/wiki/Reticulation%20%28single-access%20key%29
In biology, a reticulation of a single-access identification key connects different branches of the identification tree to improve error tolerance and identification success. In a reticulated key, multiple paths lead to the same result; the tree data structure thus changes from a simple tree to a directed acyclic graph. Two forms of reticulation can be distinguished: Terminal reticulation and inner reticulation. In a terminal reticulation a single taxon or next-level-key is keyed out in several locations in the key. This type of reticulation is normally compatible with any printable presentation format of identification keys and normally does not require special precautions in software used for branching keys. In an inner reticulation a couplet with further leads can be reached through more than one path. Depending on the software or printable presentation format, this may be more challenging. For the linked (= "parallel" or "bracketed") format, where each lead points to a numbered couplet, inner reticulations present no special challenge. However, for the nested (= "indented") presentation format, where all following couplets immediately follow their lead, a cross-connection to a different subtree in the key requires a special mechanism. Reticulations generally improve the usability of a key, but may also diminish the overall probability of correct identification averaged over all taxa.
https://en.wikipedia.org/wiki/WebTorrent
WebTorrent is a peer-to-peer (P2P) streaming torrent client written in JavaScript, from the same author, Feross Aboukhadijeh, of YouTube Instant, and the team at WebTorrent and on GitHub, for use in web browsers, as well as a WebTorrent Desktop stand alone version able to bridge WebTorrent and BitTorrent serverless networks. History Before creating WebTorrent, the developers first created PeerCDN, a peer-to-peer content delivery network which was bought by Yahoo! in 2013. The idea behind WebTorrent is to make a BitTorrent-like protocol that works on the web browser, maintaining as much compatibility with BitTorrent as possible. Any web browser should be able to connect to a peer-to-peer swarm, fetch content, verify that it is correct, and display it to the user – all as much as possible without centralized servers relying on a network entirely of people's browsers. WebTorrent uses the same protocol as BitTorrent but uses a different transport layer. WebTorrent primarily relies on WebRTC connections, while BitTorrent uses TCP connections and UDP datagrams directly. WebTorrent Desktop The WebTorrent Desktop bridges the two networks of WebRTC-based WebTorrent and TCP/UDP-based BitTorrent simultaneously. The BitTorrent client Vuze (formerly Azureus) less gracefully but adequately functionally incorporated WebTorrent adding simultaneous network bridging to their software. The developers used Electron that makes desktop apps using JavaScript with access to all the APIs from Chrome and Node. Functionality Online video is the core focus as that is where WebTorrent is most useful. It is less suited for smaller files or data sets but is ideal for larger files. File availability, as with BitTorrents, is dependent on torrent seeding. If only a few users are sharing a file, then an HTTP server that provides webseeding would be the fallback. There is no sharing without webseeding. However, this could have some positive implications. Rather than using a middleman upl
https://en.wikipedia.org/wiki/Jorquette
The jorquette (horqueta; molinillo) is the point at which the vertical stem changes to fan growth on the cocoa tree (Theobroma cacao). The whorl of lateral branches which grow out at an angle of approximately 45 degrees is called the jorquette. For mostly of Theobroma sp, one of the two kinds of branch grows vertically upwards, (these are the trunk which grows until it is tall, and the chupons), and the other kind grows obliquely outwards, growing 3-5 lateral branches emerge apparently of the same level though each comes from a separate node. Criollo cacao frequently produces 3 to 5 laterals in a jorquette which, however, show a distinct space between their points of origin on the main stem, whereas, in Forastero cacao, the laterals all come off at the same level. When the tree matures, the bases of the laterals form a single ring. Subsequently, the tree development produce chupons from below the first jorquette to form another storey of fan branches from a second jorquette, a process which may be repeated. Selective pruning seeks for the jorquettes to achieve maximum light absorption efficiency.
https://en.wikipedia.org/wiki/I%20%E2%80%93%20Shih%20Liu
I – Shih Liu (1943) is a Taiwanese civil engineer. He teaches at the Institute of Mathematics of Federal University of Rio de Janeiro. Education I – Shih Liu studied at the National Taiwan University and graduated with a diploma in 1972. He continued his studies at the Johns Hopkins University (JHU) where he received his doctorate in applied mechanics in 1972 under the supervision of Ingo Müller. Academic life He became assistant professor at the National Taiwan University in 1965, teaching and research assistant at the Johns Hopkins University in 1967, post-doctoral fellow in 1972 and professor at Federal University of Rio de Janeiro (UFRJ) in 1972. He became visiting professor at Carnegie Mellon University in 1976–1977, at University of Bologna in 1982, 1986, at University of Berlin in 1990-1991 and Nagoya Institute of Technology in 2004. He also became visiting professor at Texas A&M University in 2006–2007, at College of Earth Sciences National Central University in 2012 and director pro-tempore at UFRJ in 2000–2002. Since 1972, he has more than 50 mathematical research articles published in peer-reviewed international journals. He is married with one son. Research areas His work deals with continuum mechanics, thermodynamics, relativistic mechanics, rigid body mechanics, elastodynamics, mechanics of deformable bodies, constitutive theories, entropy principle, Lagrange multipliers. Writings Introduction to Continuum Mechanics, Springer-Verlag, 2002 with Jose Merodio e Giuseppe Saccomandi: Constitutive Theories: Basic Principles Chapter 6 in Continuum Mechanics, in Encyclopedia of Life Support Systems (EOLSS) Developed under the auspices of the UNESCO Publications, 2009 A Continuum Mechanics Primer Lecture Note - On Constitutive Theories of Materials, 2010 Introduction to Continuum Mechanics Lecture Note, 2018 Elementary Tensor Analysis Lecture Note, 2018 Selected publications Liu, I.-S. (1972): Method of Lagrange Multipliers for Exploitation o
https://en.wikipedia.org/wiki/Lapse%20rate
The lapse rate is the rate at which an atmospheric variable, normally temperature in Earth's atmosphere, falls with altitude. Lapse rate arises from the word lapse, in the sense of a gradual fall. In dry air, the adiabatic lapse rate (i.e., decrease in temperature of a parcel of air that rises in the atmosphere without exchange energy with surrounding air) is 9.8 °C/km (5.4 °F per 1,000 ft). The saturated air lapse rate (SALR), or moist adiabatic lapse rate (MALR), is the decrease in temperature of a parcel of water-saturated air that rises in the atmosphere. It varies with the temperature and pressure of the parcel and is often in the range 3.6 to 9.2 °C/km (2 to 5 °F/1000 ft), as obtained from the International Civil Aviation Organization (ICAO). The environmental lapse rate is the decrease in temperature of air with altitude for a specific time and place (see below). It can be highly variable between circumstances. Lapse rate corresponds to the vertical component of the spatial gradient of temperature. Although this concept is most often applied to the Earth's troposphere, it can be extended to any gravitationally supported parcel of gas. Definition A formal definition from the Glossary of Meteorology is: The decrease of an atmospheric variable with height, the variable being temperature unless otherwise specified. Typically, the lapse rate is the negative of the rate of temperature change with altitude change: where (sometimes ) is the lapse rate given in units of temperature divided by units of altitude, T is temperature, and z is altitude. Convection and adiabatic expansion The temperature profile of the atmosphere is a result of an interaction between thermal conduction, thermal radiation, and natural convection. Sunlight hits the surface of the earth (land and sea) and heats them. They then heat the air above the surface. If radiation were the only way to transfer energy from the ground to space, the greenhouse effect of gases in the atmosphere wou
https://en.wikipedia.org/wiki/HP1%20holin%20family
The HP1 Holin (HP1 Holin) Family (TC# 1.E.7 ) is a member of the Holin Superfamily II. Proteins in this family are typically found to contain two transmembrane segments (TMSs) and range between 70 and 80 amino acyl residues (aas) in length. A representative list of proteins belonging to the HP1 holin family can be found in the Transporter Classification Database. The NucE protein (TC# 1.E.25.2.1) in Serratia marcescens shows homology to phage holin proteins involved in releasing lysozyme to the peptidoglycan of Gram-negative bacteria. The protein contains two characteristic transmembrane segments (TMSs) with a positively charged C-terminus. When the nucC operon carrying the nucEDC genes is placed in the Escherichia coli chromosome, NucE functions as a holin. Additionally, NucE can complement lysis-defective bacteriophage mutants to allow for plaque formation and release of phage. Although NucE can function as a holin it is not involved in the transport of nuclease, an extracellular protein encoded by the nucA gene. See also Holin Lysin Transporter Classification Database
https://en.wikipedia.org/wiki/Proline-rich%20protein%2030
Proline-rich protein 30 (PRR30 or C2orf53) is a protein in humans that is encoded for by the PRR30 gene. PRR30 is a member in the family of Proline-rich proteins characterized by their intrinsic lack of structure. Copy number variations in the PRR30 gene have been associated with an increased risk for neurofibromatosis. Gene The PRR30 gene is located on the short arm of human chromosome 2 at band 2p23.3. It flanked by Prolactin regulatory element binding (PREB) and Transcription Factor 23 (TCF23). The gene has three Exons in total. PRR30 has a length of 2618 base pairs of linear DNA. Promoter Region The PRR30 promoter directly flanks the gene and is 1162 base pairs in length. Transcript The PRR30 mRNA transcript is 2063 base pairs in length. There are four splice sites total all of which are in the 5’ UTR. There are no known isoforms or alternative splicing of PRR30. Protein Human protein PRR30 consists of 412 amino acid residues. It has a molecular weight of 44.7 kdal and an isoelectric point of 10.7. It is proline rich and composed primarily of non-essential amino acids. There is a region of extreme conservation across orthologs spanning from residues 187 to 321. PRR30 appears to be subcellularly localized to the cell nucleus. NetNES predicts a nuclear export signal from residues 213 to 216. IntAct predicts that PRR30 interacts with Human Testis Protein 37 or TEX37, Cystiene Rich Tail Protein 1 (CYSRT1), and Keratin Associated Protein 6-2 (KRTAP6-2). PRR30 is predicted to undergo post-translational modifications in the form of glycosylation and phosphorylation. Structure PRR30 is an intrinsically disordered protein (IDP) and lacks any formal tertiary structure or quaternary structure. I-Tasser and Phyre predict minimal coiling throughout PRR30 as a whole. In the region of high conservation, there are predicted alpha helices & beta sheets. Function Unstructured proteins like PRR30 are highly variable in function. Other Proline-Rich Proteins have been sh
https://en.wikipedia.org/wiki/Harish-Chandra%20isomorphism
In mathematics, the Harish-Chandra isomorphism, introduced by , is an isomorphism of commutative rings constructed in the theory of Lie algebras. The isomorphism maps the center of the universal enveloping algebra of a reductive Lie algebra to the elements of the symmetric algebra of a Cartan subalgebra that are invariant under the Weyl group . Introduction and setting Let be a semisimple Lie algebra, its Cartan subalgebra and be two elements of the weight space (where is the dual of ) and assume that a set of positive roots have been fixed. Let and be highest weight modules with highest weights and respectively. Central characters The -modules and are representations of the universal enveloping algebra and its center acts on the modules by scalar multiplication (this follows from the fact that the modules are generated by a highest weight vector). So, for and , and similarly for , where the functions are homomorphisms from to scalars called central characters. Statement of Harish-Chandra theorem For any , the characters if and only if and are on the same orbit of the Weyl group of , where is the half-sum of the positive roots, sometimes known as the Weyl vector. Another closely related formulation is that the Harish-Chandra homomorphism from the center of the universal enveloping algebra to (the elements of the symmetric algebra of the Cartan subalgebra fixed by the Weyl group) is an isomorphism. Explicit isomorphism More explicitly, the isomorphism can be constructed as the composition of two maps, one from to and another from to itself. The first is a projection . For a choice of positive roots , defining as the corresponding positive nilpotent subalgebra and negative nilpotent subalgebra respectively, due to the Poincaré–Birkhoff–Witt theorem there is a decomposition If is central, then in fact The restriction of the projection to the centre is , and is a homomorphism of algebras. This is related to the central chara
https://en.wikipedia.org/wiki/Minimum-distance%20estimation
Minimum-distance estimation (MDE) is a conceptual method for fitting a statistical model to data, usually the empirical distribution. Often-used estimators such as ordinary least squares can be thought of as special cases of minimum-distance estimation. While consistent and asymptotically normal, minimum-distance estimators are generally not statistically efficient when compared to maximum likelihood estimators, because they omit the Jacobian usually present in the likelihood function. This, however, substantially reduces the computational complexity of the optimization problem. Definition Let be an independent and identically distributed (iid) random sample from a population with distribution and . Let be the empirical distribution function based on the sample. Let be an estimator for . Then is an estimator for . Let be a functional returning some measure of "distance" between the two arguments. The functional is also called the criterion function. If there exists a such that , then is called the minimum-distance estimate of . Statistics used in estimation Most theoretical studies of minimum-distance estimation, and most applications, make use of "distance" measures which underlie already-established goodness of fit tests: the test statistic used in one of these tests is used as the distance measure to be minimised. Below are some examples of statistical tests that have been used for minimum-distance estimation. Chi-square criterion The chi-square test uses as its criterion the sum, over predefined groups, of the squared difference between the increases of the empirical distribution and the estimated distribution, weighted by the increase in the estimate for that group. Cramér–von Mises criterion The Cramér–von Mises criterion uses the integral of the squared difference between the empirical and the estimated distribution functions . Kolmogorov–Smirnov criterion The Kolmogorov–Smirnov test uses the supremum of the absolute difference between
https://en.wikipedia.org/wiki/El-Fish
El-Fish is a fish and fish-tank simulator and software toy developed by Russian game developer AnimaTek, with Maxis providing development advice. The game was published by Mindscape (v1.1) and later by Maxis (v1.1 + v1.2) in 1993 on 5 diskettes. Each fish in El-Fish has a unique Roe, similar to the genome. This allows the user to catch fish and use selective breeding and mutation to create fish to their own tastes for placing them in virtual aquariums. Around 800 possible genetic attributes (fin shape, body color, size, etc.) are available, which can be selectively shaped into virtually infinite numbers of unique fish. Once fish are created, El-Fish will algorithmically generate up to 256 animation frames so that the fish will appear to swim smoothly around the tank. The tank simulator is very customizable for this game's era. The player can select from a large number of backdrops and tank ornaments for the fish to swim between. The user can also import their own images to use as tank ornaments. El-Fish includes a fractal based plant generator for creating unique aquarium plants. There are several "moving objects" that can be added to the tanks which the fish will react to, such as a cat paw, fibcrab, and a small plastic scuba diver. The user can also procedurally generate background music for their tank using an in-game composer, or choose a separate MIDI music file to be played for each virtual aquarium, and feed the fish. The tank simulator can run as a memory-resident program in MS-DOS, making it a screensaver. Multiple tanks can be displayed via El-Fish's slideshow feature. Development El-Fish was created by Vladimir Pokhilko, Ph.D. and Alexey Pajitnov (the creator of Tetris), who had backgrounds in mathematics, computer science, and psychology. They were attempting to create software for INTEC (a company that they started) that would be made for "people's souls". They developed this idea, calling it "Human Software", with three rules: The software needs
https://en.wikipedia.org/wiki/Environmental%20impacts%20of%20animal%20agriculture
The environmental impacts of animal agriculture vary because of the wide variety of agricultural practices employed around the world. Despite this, all agricultural practices have been found to have a variety of effects on the environment to some extent. Animal agriculture, in particular meat production, can cause pollution, greenhouse gas emissions, biodiversity loss, disease, and significant consumption of land, food, and water. Meat is obtained through a variety of methods, including organic farming, free-range farming, intensive livestock production, and subsistence agriculture. The livestock sector also includes wool, egg and dairy production, the livestock used for tillage, and fish farming. Animal agriculture is a significant contributor to greenhouse gas emissions. Cows, sheep, and other ruminants digest their food by enteric fermentation, and their burps are the main source of methane emissions from land use, land-use change, and forestry. Together with methane and nitrous oxide from manure, this makes livestock the main source of greenhouse gas emissions from agriculture. A significant reduction in meat consumption is essential to mitigate climate change, especially as the human population increases by a projected 2.3 billion by the middle of the century. Consumption and production trends Multiple studies have found that increases in meat consumption are currently associated with human population growth and rising individual incomes or GDP, and therefore, the environmental impacts of meat production and consumption will increase unless current behaviours change. Changes in demand for meat will influence how much is produced, thus changing the environmental impact of meat production. It has been estimated that global meat consumption may double from 2000 to 2050, mostly as a consequence of the increasing world population, but also partly because of increased per capita meat consumption (with much of the per capita consumption increase occurring in the d
https://en.wikipedia.org/wiki/Kummer%E2%80%93Vandiver%20conjecture
In mathematics, the Kummer–Vandiver conjecture, or Vandiver conjecture, states that a prime p does not divide the class number hK of the maximal real subfield of the p-th cyclotomic field. The conjecture was first made by Ernst Kummer on 28 December 1849 and 24 April 1853 in letters to Leopold Kronecker, reprinted in , and independently rediscovered around 1920 by Philipp Furtwängler and , As of 2011, there is no particularly strong evidence either for or against the conjecture and it is unclear whether it is true or false, though it is likely that counterexamples are very rare. Background The class number h of the cyclotomic field is a product of two integers h1 and h2, called the first and second factors of the class number, where h2 is the class number of the maximal real subfield of the p-th cyclotomic field. The first factor h1 is well understood and can be computed easily in terms of Bernoulli numbers, and is usually rather large. The second factor h2 is not well understood and is hard to compute explicitly, and in the cases when it has been computed it is usually small. Kummer showed that if a prime p does not divide the class number h, then Fermat's Last Theorem holds for exponent p. The Kummer–Vandiver conjecture states that p does not divide the second factor h2. Kummer showed that if p divides the second factor, then it also divides the first factor. In particular the Kummer–Vandiver conjecture holds for regular primes (those for which p does not divide the first factor). Evidence for and against the Kummer–Vandiver conjecture Kummer verified the Kummer–Vandiver conjecture for p less than 200, and Vandiver extended this to p less than 600. verified it for p < 12 million. extended this to primes less than 163 million, and extended this to primes less than 231. describes an informal probability argument, based on rather dubious assumptions about the equidistribution of class numbers mod p, suggesting that the number of primes less t
https://en.wikipedia.org/wiki/Photosystem
Photosystems are functional and structural units of protein complexes involved in photosynthesis. Together they carry out the primary photochemistry of photosynthesis: the absorption of light and the transfer of energy and electrons. Photosystems are found in the thylakoid membranes of plants, algae, and cyanobacteria. These membranes are located inside the chloroplasts of plants and algae, and in the cytoplasmic membrane of photosynthetic bacteria. There are two kinds of photosystems: PSI and PSII. PSII will absorb red light, and PSI will absorb far-red light. Although photosynthetic activity will be detected when the photosystems are exposed to either red or far-red light, the photosynthetic activity will be the greatest when plants are exposed to both wavelengths of light. Studies have actually demonstrated that the two wavelengths together have a synergistic effect on the photosynthetic activity, rather than an additive one. Each photosystem has two parts: a reaction center, where the photochemistry occurs, and an antenna complex, which surrounds the reaction center. The antenna complex contains hundreds of chlorophyll molecules which funnel the excitation energy to the center of the photosystem. At the reaction center, the energy will be trapped and transferred to produce a high energy molecule. The main function of PSII is to efficiently split water into oxygen molecules and protons. PSII will provide a steady stream of electrons to PSI, which will boost these in energy and transfer them to NADP and H to make NADPH. The hydrogen from this NADPH can then be used in a number of different processes within the plant. Reaction centers Reaction centers are multi-protein complexes found within the thylakoid membrane. At the heart of a photosystem lies the reaction center, which is an enzyme that uses light to reduce and oxidize molecules (give off and take up electrons). This reaction center is surrounded by light-harvesting complexes that enhance the absorptio
https://en.wikipedia.org/wiki/DGLUCY
DGLUCY (D-glutamate cyclase) is a protein that in humans is encoded by the DGLUCY gene. Orthologs The human gene, DGLUCY, is highly conserved in mammals and birds. Orthologs gathered from BLAST and BLAT searches reveal that the human DGLUCY mRNA sequence is conserved with a sequence identity of 98% in chimpanzees, 88% in mice, and 81% in platypus and chicken. The following table contains a list orthologs that were gathered from BLAST searches. Sequence alignments were performed using blastn to derive sequence identity, score, and E-values between the human c14orf159 variant 1 mRNA and its orthologs. The protein that the human gene DGLUCY encodes has been found to be highly conserved among mammals, birds, amphibians, fish, tunicates, cnidarians, and echinoderms. However, no protein orthologs have been found in nematodes, arthropods, fungi, protists, plants, bacteria, or archea. Fungi and bacteria contain the DUF1445 conserved domain which is found in human c14orf159 and its orthologs. BLAST and BLAT searches have been utilized to find orthologs to the c14orf159 protein. The following table lists protein orthologs for the human protein with sequence identity, sequence similarity, scores, and E-values derived from blastp sequence comparisons. Post-translational modification The protein product of the DGLUCY gene is predicted and was found to be translocated to mitochondrion. Post-translational modifications are predicted for the protein DGLUCY. All predicted sites in human DGLUCY were compared to orthologs using multiple sequence alignments to determine likelihood of modification. Regulation Estrogen receptor alpha, in the presence of estradiol, binds to the DGLUCY gene and likely regulates its expression.
https://en.wikipedia.org/wiki/Regular%20Polytopes%20%28book%29
Regular Polytopes is a geometry book on regular polytopes written by Harold Scott MacDonald Coxeter. It was originally published by Methuen in 1947 and by Pitman Publishing in 1948, with a second edition published by Macmillan in 1963 and a third edition by Dover Publications in 1973. The Basic Library List Committee of the Mathematical Association of America has recommended that it be included in undergraduate mathematics libraries. Overview The main topics of the book are the Platonic solids (regular convex polyhedra), related polyhedra, and their higher-dimensional generalizations. It has 14 chapters, along with multiple appendices, providing a more complete treatment of the subject than any earlier work, and incorporating material from 18 of Coxeter's own previous papers. It includes many figures (both photographs of models by Paul Donchian and drawings), tables of numerical values, and historical remarks on the subject. The first chapter discusses regular polygons, regular polyhedra, basic concepts of graph theory, and the Euler characteristic. Using the Euler characteristic, Coxeter derives a Diophantine equation whose integer solutions describe and classify the regular polyhedra. The second chapter uses combinations of regular polyhedra and their duals to generate related polyhedra, including the semiregular polyhedra, and discusses zonohedra and Petrie polygons. Here and throughout the book, the shapes it discusses are identified and classified by their Schläfli symbols. Chapters 3 through 5 describe the symmetries of polyhedra, first as permutation groups and later, in the most innovative part of the book, as the Coxeter groups, groups generated by reflections and described by the angles between their reflection planes. This part of the book also describes the regular tessellations of the Euclidean plane and the sphere, and the regular honeycombs of Euclidean space. Chapter 6 discusses the star polyhedra including the Kepler–Poinsot polyhedra. The rema
https://en.wikipedia.org/wiki/MATSim
MATSim (the Multi-Agent Transport Simulation Toolkit) is an open source software development project developing agent-based software modules intended for use with transportation planning models. History "The MATSim project started with Kai Nagel, then at ETH Zurich, and his interest in improving his work with, and for, the TRansportation ANalysis and SIMulation System (TRANSIMS) project; he also wanted to make the resulting code open-source. After Kai Nagel’s departure to TU Berlin in 2004, Kay Axhausen joined the team, bringing a different approach and experience." Areas of Application MATSim has been applied to various areas: road transport, public transport, freight transport, regional evacuation etc.
https://en.wikipedia.org/wiki/Methyl%20cinnamate
Methyl cinnamate is the methyl ester of cinnamic acid and is a white or transparent solid with a strong, aromatic odor. It is found naturally in a variety of plants, including in fruits, like strawberry, and some culinary spices, such as Sichuan pepper and some varieties of basil. Eucalyptus olida has the highest known concentrations of methyl cinnamate (98%) with a 2–6% fresh weight yield in the leaf and twigs. Methyl cinnamate is used in the flavor and perfume industries. The flavor is fruity and strawberry-like; and the odor is sweet, balsamic with fruity odor, reminiscent of cinnamon and strawberry. It is known to attract males of various orchid bees, such as Aglae caerulea. List of plants that contain the chemical Eucalyptus olida 'Strawberry Gum' Ocotea quixos South American (Ecuadorian) Cinnamon, Ishpingo Ocimum americanum cv. Purple Lovingly (Querendona Morada) Ocimum americanum cv. Purple Castle (Castilla Morada) Ocimum americanum cv. Purple Long-legged (Zancona morada) Ocimum americanum cv. Clove (Clavo) Ocimum basilicum cv. Sweet Castle (Dulce de Castilla) Ocimum basilicum cv. White Compact (Blanca compacta) Ocimum basilicum cv. large green leaves () Ocimum micranthum cv. Cinnamon (Canela) Ocimum minimum cv. Little Virgin (Virgen pequena) Ocimum minimum cv. Purple Virgin (Virgen morada) Ocimum sp. cv. Purple ruffle (Crespa morada) Ocimum sp. cv. White Ruffle (Crespa blanca) Stanhopea embreei, an orchid Vanilla Toxicology and safety Moderately toxic by ingestion. The oral for rats is 2610 mg/kg. It is combustible as a liquid, and when heated to decomposition it emits acrid smoke and irritating fumes. Compendial status Food Chemicals Codex See also Eucalyptus oil Ralf Sieckmann v Deutsches Patent und Markenamt, a court case concerning a company attempting to trademark the chemical compound.
https://en.wikipedia.org/wiki/Elevational%20diversity%20gradient
Elevational diversity gradient (EDG) is an ecological pattern where biodiversity changes with elevation. The EDG states that species richness tends to decrease as elevation increases, up to a certain point, creating a "diversity bulge" at middle elevations. There have been multiple hypotheses proposed for explaining the EDG, none of which accurately describe the phenomenon in full. A similar pattern, known as the latitudinal diversity gradient, describes an increase in biodiversity from the poles to the equator. While the EDG generally follows the LDG (i.e., high elevations in tropical regions have greater biodiversity than high elevations in temperate regions), the LDG does not account for elevational changes. Origin The first recorded observation of the elevational diversity gradient was by Carl Linnaeus in his treatise On the growth of the habitable Earth. In this document, Linnaeus based his predictions on flood geology, assuming most of the world was at one point inundated, leaving only the highest elevations available for terrestrial life. Since, by Linnaeus’ hypothesis, all life was concentrated at high elevations, a higher species diversity would be observed there even as life re-populated lower elevations. In 1799, Alexander von Humboldt and Aimé Bonpland described elevational changes along the Andean slopes, noting how climatic changes impacted plant and animal communities. These observations contributed to Leslie R. Holdridge's "life zone concept" (1947). Climatic variables shaping life zones include mean potential temperature, total annual precipitation, and the ratio of mean annual evapotranspiration to mean annual precipitation. These variables, most notably precipitation and temperature, vary along an elevational gradient, resulting in the distribution of different ecosystems. Much of the current literature correlates elevational diversity to gradients in single climatic or biotic variables including "rainfall, temperature, productivity, competiti
https://en.wikipedia.org/wiki/WS-CAF
Web Services Composite Application Framework (WS-CAF) is an open framework developed by OASIS. Its purpose is to define a generic and open framework for applications that contain multiple services used together, which are sometimes referred to as composite applications. WS-CAF characteristics include interoperability, ease of implementation and ease of use. Scope The scope of WS-CAF includes: Provision of WSDL definitions for context, coordination and transactions. Message formats will be specified as SOAP headers and/or body content. The specification is to be programming language-neutral and platform-neutral. Demonstrated composability with other Web Service specifications that are being developed as open, recognized standards The goals of promoting convergence, consistent use, and a coherent architecture. Support composability as a critical architectural characteristic of Web service specifications. WS-CAF and WS-Context are targeted to become building blocks for other Web service specifications and standards. Input specifications The WS-CAF accepts the following Web services specifications as input: WS-Context WS-Coordination Framework (WS-CF) WS-Transaction Management (WS-TXM) Benefits The benefits and results of CAF are intended to be standard and interoperable ways to: Demarcate and coordinate web service activities Propagate and coordinate context information Notify participants of changes in an activity Define the relationship of coordinators to each other Recover transactions predictably and consistently in a business process execution. Interact across multiple transaction models (such as are used in CORBA, CICS, Enterprise JavaBeans or .NET environments). See also WS-Coordination - an alternative transaction standard Enterprise service bus External links NetBeans SOA Composite Application Project Home camelse Running Apache Camel in OpenESB
https://en.wikipedia.org/wiki/Standard%20Interchange%20Protocol
The Standard Interchange Protocol is a proprietary standard for communication between library computer systems and self-service circulation terminals. Although owned and controlled by 3M, the protocol is published and is widely used by other vendors. Version 2.0 of the protocol, known as "SIP2", is a de facto standard for library self-service applications. History SIP version 1.0 was published by 3M in 1993. The first version of the protocol supported basic check in and check out operations, but had minimal support for more advanced operations. Version 2.0 of the protocol was published in 2006 and added support for flexible, more user-friendly notifications, and for the automated processing of payments for late fees. SIP2 was widely adopted by library automation vendors, including ODILO, Lyngsoe Systems, Nexbib, Bibliotheca, Nedap, Checkpoint, Envisionware, FE Technologies, Meescan, Redia and open source integrated library system software such as Koha and Evergreen. The standard was the basis for the NISO Circulation Interchange Protocol (NCIP) standard which is eventually intended to replace it. Description SIP is a simple protocol in which requests to perform operations are sent over a connection, and responses are sent in return. The protocol explicitly does not define how a connection between the two devices is established; it is limited to specifying the format of the messages sent over the connection. There are no "trial" transactions; each operation will be attempted immediately and will either be permitted or not. The protocol specifies messages to check books in and out, to manage fee payments, to request holds and renewals, and to carry out the other basic circulation operations of a library. Encryption and authentication SIP has no built in encryption, so steps need to be taken to send the connection through some sort of encrypted tunnel. Two common methods are to use either stunnel or SSH to add a layer of encryption and/or an extra level of authe
https://en.wikipedia.org/wiki/ISO/IEC%2090003
ISO/IEC 90003 Software engineering -- Guidelines for the application of ISO 9001:2008 to computer software is a guidelines developed for organizations in the application of ISO 9001 to the acquisition, supply, development, operation and maintenance of computer software and related support services. This standard was developed by technical committee ISO/IEC JTC 1/SC 7 Software and systems engineering. ISO/IEC 90003 originally published as ISO 9000-3 for the first time in December 1997, was issued for the first time as an ISO/IEC 90003 in February 2004. The review cycle of ISO 90003 is every 5 years. Main requirements of the standard The ISO/IEC 90003:2014 adopts the ISO structure in 8 chapters in the following breakdown: Scope Normative references Terms and definitions Quality management system Management responsibility Resource management Product realization Measurement, analysis and improvement See also List of ISO standards List of IEC standards International Organization for Standardization
https://en.wikipedia.org/wiki/Bearer-Independent%20Call%20Control
The Bearer-Independent Call Control (BICC) is a signaling protocol based on N-ISUP that is used for supporting narrowband Integrated Services Digital Network (ISDN) service over a broadband backbone network. BICC is designed to interwork with existing transport technologies. BICC is specified in ITU-T recommendation Q.1901. BICC signaling messages are nearly identical to those in ISDN User Part (ISUP); the main difference being that the narrowband circuit identification code (CIC) has been modified. The BICC architecture consists of interconnected serving nodes that provide the call service function and the bearer control function. The call service function uses BICC signaling for call setup and may also interwork with ISUP. The bearer control function receives directives from the call service function via BICC Bearer Control Protocol (ITU-T recommendation Q.1950) and is responsible for setup and teardown of bearer paths on a set of physical transport links. Transport links are most commonly Asynchronous Transfer Mode (ATM) or Internet Protocol (IP). According to the ITU, the completion of the BICC protocols is a historic step toward broadband multimedia networks because it enables the seamless migration from circuit-switched TDM networks to high-capacity broadband multimedia networks. The Third-Generation Partnership Project (3GPP) has included BICC CS 2 in the Universal Mobile Telecommunications System (UMTS) release 4.
https://en.wikipedia.org/wiki/Session%20key
A session key is a single-use symmetric key used for encrypting all messages in one communication session. A closely related term is content encryption key (CEK), traffic encryption key (TEK), or multicast key which refers to any key used for encrypting messages, contrary to other uses like encrypting other keys (key encryption key (KEK) or key encryption has been made public key). Session keys can introduce complications into a system, yet they solve some real problems. There are two primary reasons to use session keys: Several cryptanalytic attacks become easier the more material encrypted with a specific key is available. By limiting the amount of data processed using a particular key, those attacks are rendered harder to perform. asymmetric encryption is too slow for many purposes, and all secret key algorithms require that the key is securely distributed. By using an asymmetric algorithm to encrypt the secret key for another, faster, symmetric algorithm, it's possible to improve overall performance considerably. This is the process used by PGP and GPG. Like all cryptographic keys, session keys must be chosen so that they cannot be predicted by an attacker, usually requiring them to be chosen randomly. Failure to choose session keys (or any key) properly is a major (and too common in actual practice) design flaw in any crypto system. See also Ephemeral key Random number generator List of cryptographic key types One-time pad Perfect forward secrecy
https://en.wikipedia.org/wiki/Respiratory%20burst
Respiratory burst (or oxidative burst) is the rapid release of the reactive oxygen species (ROS), superoxide anion () and hydrogen peroxide (), from different cell types. This is usually utilised for mammalian immunological defence, but also plays a role in cell signalling. Respiratory burst is also implicated in the ovum of animals following fertilization. It may also occur in plant cells. Immunity Immune cells can be divided into myeloid cells and lymphoid cells. Myeloid cells, including macrophages and neutrophils, are especially implicated in the respiratory burst. They are phagocytic, and the respiratory burst is vital for the subsequent degradation of internalised bacteria or other pathogens. This is an important aspect of the innate immunity. Respiratory burst requires a 10 to 20 fold increase in oxygen consumption through NADPH oxidase (NOX2 in humans) activity. NADPH is the key substrate of NOX2, and bears reducing power. Glycogen breakdown is vital to produce NADPH. This occurs via the pentose phosphate pathway. The NOX2 enzyme is bound in the phagolysosome membrane. Post bacterial phagocytosis, it is activated, producing superoxide via its redox centre, which transfers electrons from cytosolic NADPH to O2 in the phagosome. 2O2 + NADPH —> 2O2•– + NADP+ + H+ The superoxide can then spontaneously or enzymatically react with other molecules to give rise to other ROS. The phagocytic membrane reseals to limit exposure of the extracellular environment to the generated reactive free radicals. Pathways for reactive species generation There are 3 main pathways for the generation of reactive oxygen species or reactive nitrogen species (RNS) in effector cells: Superoxide dismutase (or alternatively, myeloperoxidase) generates hydrogen peroxide from superoxide. Hydroxyl radicals are then generated via the Haber–Weiss reaction or the Fenton reaction, of which are both catalyzed by Fe2+. O2•–+ H2O2 —> •OH + OH– + O2 In the presence of halide ions, promine
https://en.wikipedia.org/wiki/Carbon%E2%80%93carbon%20bond
A carbon–carbon bond is a covalent bond between two carbon atoms. The most common form is the single bond: a bond composed of two electrons, one from each of the two atoms. The carbon–carbon single bond is a sigma bond and is formed between one hybridized orbital from each of the carbon atoms. In ethane, the orbitals are sp3-hybridized orbitals, but single bonds formed between carbon atoms with other hybridizations do occur (e.g. sp2 to sp2). In fact, the carbon atoms in the single bond need not be of the same hybridization. Carbon atoms can also form double bonds in compounds called alkenes or triple bonds in compounds called alkynes. A double bond is formed with an sp2-hybridized orbital and a p-orbital that is not involved in the hybridization. A triple bond is formed with an sp-hybridized orbital and two p-orbitals from each atom. The use of the p-orbitals forms a pi bond. Chains and branching Carbon is one of the few elements that can form long chains of its own atoms, a property called catenation. This coupled with the strength of the carbon–carbon bond gives rise to an enormous number of molecular forms, many of which are important structural elements of life, so carbon compounds have their own field of study: organic chemistry. Branching is also common in C−C skeletons. Carbon atoms in a molecule are categorized by the number of carbon neighbors they have: A primary carbon has one carbon neighbor. A secondary carbon has two carbon neighbors. A tertiary carbon has three carbon neighbors. A quaternary carbon has four carbon neighbors. In "structurally complex organic molecules", it is the three-dimensional orientation of the carbon–carbon bonds at quaternary loci which dictates the shape of the molecule. Further, quaternary loci are found in many biologically active small molecules, such as cortisone and morphine. Synthesis Carbon–carbon bond-forming reactions are organic reactions in which a new carbon–carbon bond is formed. They are important in th
https://en.wikipedia.org/wiki/Black%20body
A black body or blackbody is an idealized physical body that absorbs all incident electromagnetic radiation, regardless of frequency or angle of incidence. The radiation emitted by a black body in thermal equilibrium with its environment is called black-body radiation. The name "black body" is given because it absorbs all colors of light. In contrast, a white body is one with a "rough surface that reflects all incident rays completely and uniformly in all directions." A black body in thermal equilibrium (that is, at a constant temperature) emits electromagnetic black-body radiation. The radiation is emitted according to Planck's law, meaning that it has a spectrum that is determined by the temperature alone (see figure at right), not by the body's shape or composition. An ideal black body in thermal equilibrium has two main properties: It is an ideal emitter: at every frequency, it emits as much or more thermal radiative energy as any other body at the same temperature. It is a diffuse emitter: measured per unit area perpendicular to the direction, the energy is radiated isotropically, independent of direction. Real materials emit energy at a fraction—called the emissivity—of black-body energy levels. By definition, a black body in thermal equilibrium has an emissivity . A source with a lower emissivity, independent of frequency, is often referred to as a gray body. Constructing black bodies with an emissivity as close to 1 as possible remains a topic of current interest. In astronomy, the radiation from stars and planets is sometimes characterized in terms of an effective temperature, the temperature of a black body that would emit the same total flux of electromagnetic energy. Definition The idea of a black body originally was introduced by Gustav Kirchhoff in 1860 as follows: A more modern definition drops the reference to "infinitely small thicknesses": Idealizations This section describes some concepts developed in connection with black bodies. Cavity w
https://en.wikipedia.org/wiki/Bernar%20Venet
Bernar Venet (born 20 April 1941) is a French conceptual artist. Early life Bernar Venet was born to Jean-Marie Venet, a school teacher and chemist, and Adeline Gilly and was the youngest of four boys. He was brought up in Château-Arnoux-Saint-Auban and had a religious upbringing, aspiring to become a missionary. He had struggled with asthma and academic subjects at school, while excelling in drawing and painting. With the support of a local artist; however, he became interested in painting and drawing at a young age. At age 11, discovering a book on Pierre-Auguste Renoir, he first understood that he might be able to forge a career out of his particular talent. After several attempts at gaining a formal education in the arts, he worked as a stage designer at the Nice Opera in 1959. In 1961, Venet joined the French Army whilst also starting to establish his style as an artist. During this period, he painted with tar, creating his art with his feet in a gestural style. This work eventually developed into black monochromatic paintings which eschewed all forms of action painting. Career After completing his military service, Venet returned to Nice, where he established his studio and continued to explore painting with tar, creating art with coal, and photography. His early sculpture, Tas de Charbon ("Pile of Coal") reflected his obsession with making art that changes the history of art, it was "the first sculpture devoid of a specific shape, where you could alter its size or exhibit it in various locations at the same time, and where the coal wasn’t used to create an artwork, but instead was the artwork itself." 1960s Subsequently, Venet became familiar with the work of Arman and some of the New Realists in Paris, such as César Baldaccini, Raymond Hains and Jacques Villeglé, and started sculpting with cardboard. He exhibited alongside New Realists and Pop artists' works in the Salon Comparaisons at the Paris Museum of Modern Art. In 1966, during a two-month visit
https://en.wikipedia.org/wiki/Digital%20channel%20election
A digital channel election was the process by which television stations in the United States chose which physical radio-frequency TV channel they would permanently use after the analog shutdown in 2009. The process was managed and mandated by the Federal Communications Commission for all full-power TV stations. Low-powered television (LPTV) stations are going through a somewhat different process, and are also allowed to flash-cut to digital. Process Stations could choose to keep their initial digital TV channel allocation, do a flash-cut to their former analog TV channel, or attempt to select another channel, often an analog channel or pre-transition digital channel from another station that had been orphaned. Stations on channels 52 to 69 did not have the first option, as the FCC and then the U.S. Congress revoked them from the bandplan. Many stations have chosen to keep their new channels permanently, after being forced to buy all new transmitters and television antennas. In some cases where the station's current analog tower could not handle the stress of the new digital antenna's weight and wind load, station owners had to construct entirely new broadcast towers in order to comply with the FCC's DTV mandate. Most broadcasters were bitter at having to purchase digital equipment and broadcast a digital signal when very few homeowners had digital television sets. The FCC allowed broadcasters the opportunity to petition the Federal Communications Commission (FCC) for special temporary authority (STA) to operate their digital facilities at low power, thereby allowing broadcasters additional time in which to purchase their full-power digital facilities. However, the FCC gave a stern July 2006 deadline for all full-power television stations to at least replicate 80% of their current analog coverage area, or run the risk of losing protection from encroachment by other stations. Most stations made an election in the first round, and most of those received
https://en.wikipedia.org/wiki/Burroughs%20MCP
The MCP (Master Control Program) is the operating system of the Burroughs B5000/B5500/B5700 and the B6500 and successors, including the Unisys Clearpath/MCP systems. MCP was originally written in 1961 in ESPOL (Executive Systems Problem Oriented Language). In the 1970s, MCP was converted to NEWP which was a better structured, more robust, and more secure form of ESPOL. The MCP was a leader in many areas, including: the first operating system to manage multiple processors, the first commercial implementation of virtual memory, and the first OS written exclusively in a high-level language. History In 1961, the MCP was the first OS written exclusively in a high-level language (HLL). The Burroughs Large System (B5000 and successors) were unique in that they were designed with the expectation that all software, including system software, would be written in an HLL rather than in assembly language, which was a unique and innovative approach in 1961. Unlike IBM, which faced hardware competition after the departure of Gene Amdahl, Burroughs software only ever ran on Burroughs hardware due to a lack of compatible third party hardware. For this reason, Burroughs was free to distribute the source code of all software it sold, including the MCP, which was designed with this openness in mind. For example, upgrading required the user to recompile the system software and apply any needed local patches. At the time, this was common practice, and was necessary as it was not unusual for customers (especially large ones, such as the Federal Reserve) to modify the program to fit their specific needs. As a result, a Burroughs Users Group was formed, which held annual meetings and allowed users to exchange their own extensions to the OS and other parts of the system software suite. Many such extensions have found their way into the base OS code over the years, and are now available to all customers. As such, the MCP could be considered one of the earliest open-source projects. Burro
https://en.wikipedia.org/wiki/Superficial%20perineal%20pouch
The superficial perineal pouch (also superficial perineal compartment/space/sac) is a compartment of the perineum. Structure The superficial perineal pouch is an open compartment, due to the fact that anteriorly, the space communicates freely with the potential space lying between the superficial fascia of the anterior abdominal wall and the anterior abdominal muscles: its inferior border is the fascia of Colles, the deeper membranous layer of the superficial perineal fascia that covers the inferior border of the muscles of the superficial perineal pouch. (The fascia of perineum is a deep fascia that covers the superficial perineal muscles individually). its superior border is the perineal membrane (inferior fascia of the urogenital diaphragm). Contents Muscles Ischiocavernosus muscle Bulbospongiosus muscle Superficial transverse perineal muscle Erectile bodies Corpus cavernosum (of penis and of clitoris) Corpus spongiosum (of penis) Vessels Posterior scrotal arteries (males)/Labial arteries (females) Artery to bulb (males)/vestibule (females) Urethral artery Nerves Posterior scrotal nerves (males)/Posterior Labial nerves(females) Other Crura of penis (males) / Crura of clitoris (females) Bulb of penis (males) / Bulb of vestibule (females) Bartholin's glands (female) Spongy urethra contained in the corpus spongiosum Additional images See also Deep perineal pouch
https://en.wikipedia.org/wiki/Pure%20Storage
Pure Storage, Inc. is an American publicly traded technology company headquartered in Santa Clara, California, United States. It develops all-flash data storage hardware and software products. Pure Storage was founded in 2009 and developed its products in stealth mode until 2011. Afterwards, the company grew in revenues by about 50% per quarter and raised more than $470 million in venture capital funding, before going public in 2015. Initially, Pure Storage developed the software for storage controllers and used generic flash storage hardware. Pure Storage finished developing its own proprietary flash storage hardware in 2015. Corporate history Pure Storage was founded in 2009 under the code name Os76 Inc. by John Colgrove and John Hayes. Initially, the company was setup within the offices of Sutter Hill Ventures, a venture capital firm, and funded with $5 million in early investments. Pure Storage raised another $20 million in venture capital in a series B funding round. The company came out of stealth mode as Pure Storage in August 2011. Simultaneously, Pure Storage announced it had raised $30 million in a third round of venture capital funding. Another $40 million was raised in August 2012, in order to fund Pure Storage's expansion into European markets. In May 2013, the venture capital arm of the American Central Intelligence Agency (CIA), In-Q-Tel, made an investment in Pure Storage for an un-disclosed amount. That August, Pure Storage raised another $150 million in funding. By this time, the company had raised a total of $245 million in venture capital investments. The following year, in 2014, Pure Storage raised $225 million in a series F funding round, valuating the company at $3 billion. Annual revenues for Pure Storage grew by almost 50% per quarter, from 2012 to 2014. It had $6 million in revenues in fiscal 2013, $43 million in fiscal 2014, and $174 million in fiscal 2015. Pure Storage sold 100 devices its first year of commercial production in 2012 an
https://en.wikipedia.org/wiki/Asterism%20%28gemology%29
An asterism () is a star-shaped concentration of light reflected or refracted from a gemstone. It can appear when a suitable stone is cut en cabochon (i.e. shaped and polished, not faceted). A gemstone that exhibits this effect is called a star stone or asteria. The best known is star sapphire, but many other minerals can also be asteria, usually due to impurities in the crystal structure. Archetype The archetypal asteria is the star sapphire, generally corundum with near uniform impurities which is bluish-grey and milky or opalescent, which when lit has a star of six rays. In the red instance stellate reflection is rarer; the star-ruby occasionally found with the star-sapphire in Sri Lanka is among the most valued of "fancy stones". Other examples are star-topaz (8 rays) and star diopside (4 rays). Description Asterism is generated by reflections of light from twin-lamellae or from extremely fine needle-shaped acicular inclusions within the stone's crystal structure. A common cause is oriented sub-microscopic crystals of rutile within the gem mineral. It occurs in rubies, sapphires, garnet, diopside and spinel when a cabochon is cut from a suitable stone. Star sapphires and rubies display the property from titanium dioxide impurities (rutile) present in them. The star-effect or "asterism" is caused by the difference in refractive index between the host material and that of the dense inclusions of tiny fibers of rutile (also known as "silk"). Rutile causes the relative bright relief of a star in a host material such as corundum, which has a refractive index between 1.760 and 1.778, much lower than that of rutile. The stars are caused by the light reflecting from needle-like inclusions of rutile aligned perpendicularly to the rays of the star. The star-effect may be also caused by the inclusions of hematite. In black star sapphire hematite needles formed parallel to the faces of the second order prism produce asterism. Some star sapphires from Thailand contain bo
https://en.wikipedia.org/wiki/Browser%20sniffing
Browser sniffing (also known as browser detection) is a set of techniques used in websites and web applications in order to determine the web browser a visitor is using, and to serve browser-appropriate content to the visitor. It is also used to detect mobile browsers and send them mobile-optimized websites. This practice is sometimes used to circumvent incompatibilities between browsers due to misinterpretation of HTML, Cascading Style Sheets (CSS), or the Document Object Model (DOM). While the World Wide Web Consortium maintains up-to-date central versions of some of the most important Web standards in the form of recommendations, in practice no software developer has designed a browser which adheres exactly to these standards; implementation of other standards and protocols, such as SVG and XMLHttpRequest, varies as well. As a result, different browsers display the same page differently, and so browser sniffing was developed to detect the web browser in order to help ensure consistent display of content. Sniffer methods Client-side sniffing Web pages can use programming languages such as JavaScript which are interpreted by the user agent, with results sent to the web server. For example: var isIEBrowser = false; if (window.ActiveXObject) { isIEBrowser = true; } // Or, shorter: var isIE = (window.ActiveXObject !== undefined); This code is run by the client computer, and the results are used by other code to make necessary adjustments on client-side. In this example, the client computer is asked to determine whether the browser can use a feature called ActiveX. Since this feature was proprietary to Microsoft, a positive result will indicate that the client may be running Microsoft's Internet Explorer. This is no longer a reliable indicator since Microsoft's open-source release of the ActiveX code, however, meaning that it can be used by any browser. Standard Browser detection method The web server communicates with the client using a communication protoco
https://en.wikipedia.org/wiki/Martin%20Henson%20%28computer%20scientist%29
Professor Martin C. Henson FBCS FRSA (born 14 October 1954) is an English computer scientist based at the University of Essex. He is dean for international affairs and is affiliated to the School of Computer Science & Electronic Engineering. Henson was head of the department of computer science from 2000 to 2006. Education Martin Henson was educated at The Bulmershe School in Woodley, Berkshire, at the University of Southampton (BSc, 1976), at the University of Reading (PGCE, 1977), and the University of Essex (MSc, 1981). Academic research Henson's academic work is in the area of formal methods to aid software engineering. His early work was in programming language semantics, especially using algebraic approaches for structuring compiler and interpreter generation from semantic descriptions. He moved on to work in functional languages, focusing on program verification and transformation, pioneering an approach to program transformation, adapted from work in semantic equivalences, using higher-order generalisations and relational constraints. Since the late 1990s, he has undertaken research into the design and use of logic in specification and program development. With Steve Reeves, he has studied the formal semantics of the Z notation in detail. This work was used in the international ISO standard for the Z notation.<ref> Information Technology — Z Formal Specification Notation — Syntax, Type System and Semantics], ISO/IEC 13568:2002, [http://www.iso.ch/ ISO, 2002.</ref> Most recently he has proposed a new approach to specification, based on specification theories, developing the specification logic nuZ – a Z-like specification language with a monotonic schema calculus. This was first presented in a talk in the BCS-FACS seminar series at the British Computer Society in London in 2005.BCS-FACS Evening Seminar Series, Past events 2005: nuZ – a wide-spectrum logic for specification and program development Henson has been a Fellow of the British Computer Society sin
https://en.wikipedia.org/wiki/Miti%20hue
Miti hue is a traditional sauce in Polyneisan cuisine made from the flesh of the coconut and salt water mixed together and fermented. Preparation is prepared from the young coconut known as , a stage where the flesh of the green coconut starts to harden and begins losing its water. The flesh of the is cut into pieces and placed in a calabash vessel, with salt water and the heads of freshwater prawns. The mixture is left in the sun for a few days to ferment. is served as an accompaniment to traditional Tahitian dishes, most notably the fermented fish dish Fafaru. The preparation of is also similar to Miti hue, though crushed crustaceans are entirely absent from the recipe. Flavourings like lemon, lime and chilli can also be added to Tai monomono, with the addition of chilli being known as . Fermented coconut sauce is also eaten in Tonga, the Samoan islands and the Polynesian island of Rotuma, but the process differs from Miti hue as the sauce is a byproduct of converting coconut shells into containers, a practice that was common in the West Polynesian islands. A mature coconut has a hole drilled into it and the water inside the nut is removed, replaced with sea water. A stopper is placed into the hole and is left to ferment for a few weeks, resulting the inner flesh breaking down into a gruel. Names Cook Islands: French Polynesia: Rotuma: Samoa and American Samoa: Tonga: See also Taioro – A fermented paste made from coconut meat, eaten in Oceania.
https://en.wikipedia.org/wiki/Actinoptychus
Actinoptychus is a genus of diatoms belonging to the family Heliopeltaceae. The genus was described in 1843 by Christian Gottfried Ehrenberg. Species: Actinoptychus octodenarius Ehrenberg Actinoptychus senarius (Ehrenberg) Ehrenberg, 1843
https://en.wikipedia.org/wiki/Phasevarion
In bacteria, phasevarions (also known as phase variable regulons) mediate a coordinated change in the expression of multiple genes or proteins. This occurs via phase variation of a single DNA methyltransferase. Phase variation of methyltransferase expression results in differential methylation throughout the bacterial genome, leading to variable expression of multiple genes through epigenetic mechanisms. Phasevarions have been identified in several mucosal-associated human-adapted pathogens, which include; Haemophilus influenzae, Neisseria meningitidis, Neisseria gonorrhoeae, Helicobacter pylori, Moraxella catarrhalis, and Streptococcus pneumoniae. All described phasevarions regulate expression of proteins that are involved in host colonization, survival, and pathogenesis, and many regulate putative vaccine targets. The presence of phasevarions complicates identification of stably expressed proteins, as the regulated genes do not contain any identifiable features. The only way to identify genes in a phasevarion is by detailed study of the organisms containing such systems. Study of the phasevarions, and identification of proteins they regulate, is therefore critical to generate effective and stable vaccines. Phase variable DNA methyltransferases Many of the phasevarions described to date are controlled by Type III methyltransferases. Mod genes are the methyltransferase component of type III restriction modification (R-M) systems in bacteria, and serve to protect host DNA from the action of the associated restriction enzyme. However, in many bacterial pathogens, mod genes contain simple sequence repeats (SSRs), and the associated restriction enzyme encoding gene (res) is inactive. In these organisms the DNA methyltransferase phase varies between two states (ON or OFF) by variation in the number of SSRs in the mod gene. Multiple different mod genes have been identified. Each Mod methylates a different DNA sequence in the genome. Methylation of unique DNA sequences r
https://en.wikipedia.org/wiki/Mesoblast
Mesoblast Limited is an Australian regenerative medicine company. It seeks to provide treatments for inflammatory ailments, cardiovascular disease, and back pain. The company is led by Silviu Itescu, who founded the company in 2004. History In Mesoblast's annual report from August 2010, the company first announced positive results of preclinical trials showing radiographic and pathologic disc regeneration with MPC-06-ID. Mesoblast said they were in the process of completing an Investigational New Drug (IND) submission to the United States FDA to commence Phase 2 clinical trials. In December 2010, Mesoblast entered into an agreement with US-based Cephalon to develop and commercialize novel adult Mesenchymal Precursor Stem Cell (MPC) therapeutics for degenerative conditions of the cardiovascular and central nervous systems. In September 2011, Mesoblast entered into an agreement with Swiss-based Lonza Group. Under the agreement, Lonza will manufacture the stem cells for Mesoblast's MPC cell products. Mesoblast will also have exclusive access to Lonza's Cell Therapy facilities in Singapore for the manufacture of allogeneic cell therapy. Osiris sold its MSC drug and patents to Mesoblast Ltd. in 2012. In March 2014, Circulation Journal published the results of a clinical trial using MPCs as adjunctive therapy for patients with a Ventricular Assist Device. In May 2014, Mesoblast announced it would receive incentives from the Singapore Economic Development Board (EDB) for activities in Singapore related to manufacturing operations, as well as product development and commercialization. On February 10, 2015, Mesoblast was granted a patent by the United States Patent and Trademark Office (USPTO) covering its proprietary Mesenchymal Precursor Cell (MPC) technology for use in the treatment of degenerated intervertebral discs. On March 19, 2015, Mesoblast announced that it has been selected by the Japan External Trade Organization (JETRO) as the only regenerative medicine c
https://en.wikipedia.org/wiki/Bradley%E2%80%93Terry%20model
The Bradley–Terry model is a probability model for the outcome of pairwise comparisons between individuals, teams, or objects. Given a pair of individuals and drawn from some population, it estimates the probability that the pairwise comparison turns out true, as where is a positive real-valued score assigned to individual . The comparison can be read as " is preferred to ", " ranks higher than ", or " beats ", depending on the application. For example, might represent the skill of a team in a sports tournament and the probability that wins a game against . Or might represent the quality or desirability of a commercial product and the probability that a consumer will prefer product over product . The Bradley–Terry model can be used in the forward direction to predict outcomes, as described, but is more commonly used in reverse to infer the scores given an observed set of outcomes. In this type of application represents some measure of the strength or quality of and the model lets us estimate the strengths from a series of pairwise comparisons. In a survey of wine preferences, for instance, it might be difficult for respondents to give a complete ranking of a large set of wines, but relatively easy for them to compare sample pairs of wines and say which they feel is better. Based on a set of such pairwise comparisons, the Bradley–Terry model can then be used to derive a full ranking of the wines. Once the values of the scores have been calculated, the model can then also be used in the forward direction, for instance to predict the likely outcome of comparisons that have not yet actually occurred. In the wine survey example, for instance, one could calculate the probability that someone will prefer wine over wine , even if no one in the survey directly compared that particular pair. History and applications The model is named after Ralph A. Bradley and Milton E. Terry, who presented it in 1952, although it had already been studied by Ernst Ze
https://en.wikipedia.org/wiki/Patient%20safety%20organization
A Patient Safety Organization (PSO) is a group, institution, or association that improves medical care by reducing medical errors. Common functions of patient safety organizations are data collection, analysis, reporting, education, funding, and advocacy. A PSO differs from a Federally designed Patient Safety Organization (PSO), which provides health care providers in the U.S. privilege and confidentiality protections for efforts to improve patient safety and the quality of patient care delivery (see 42 U.S.C. 299b-21 et seq. and www.PSO.AHRQ.gov.) In the 1990s, reports in several countries revealed a staggering number of patient injuries and deaths each year due to avoidable errors and deficiencies in health care, among them adverse events and complications arising from poor infection control. In the United States, a 1999 report from the Institute of Medicine called for a broad national effort to prevent these events, including the establishment of patient safety centers, expanded reporting of adverse events, and development of safety programs in healthcare organizations. Although many PSOs are funded and run by governments, others have sprung from private entities such as industry, professional and consumer groups. Functions To achieve their goals, patient safety organizations may Collect data on the prevalence and individual details of errors. Analyze sources of error by root cause analysis. Propose and disseminate methods for error prevention. Design and conduct pilot projects to study safety initiatives, including monitoring of results. Raise awareness and inform the public, health professionals, providers, purchasers, and employers. Conduct fundraising and provide funding for research and safety projects. Advocate for regulatory and legislative changes. Governmental organizations World Health Organization World Alliance for Patient Safety In response to a 2002 World Health Assembly Resolution, the World Health Organization (WHO) launched the Worl
https://en.wikipedia.org/wiki/Tyndallization
Tyndallization is a process from the nineteenth century for sterilizing substances, usually food, named after its inventor John Tyndall, that can be used to kill heat-resistant endospores. Although now considered dated, it is still occasionally used. A simple and effective sterilizing method commonly used today is autoclaving: heating the substance being sterilized to for 15 minutes in a pressured system. If autoclaving is not possible because of lack of equipment, or the need to sterilize something that will not withstand the higher temperature, unpressurized heating for a prolonged period at a temperature of up to , the boiling point of water, may be used. The heat will kill any bacterial cells; however, bacterial spores capable of later germinating into bacterial cells may survive. Tyndallization can be used to destroy the spores. Tyndallization essentially consists of heating the substance to boiling point (or just a little below boiling point) and holding it there for 15 minutes, three days in succession. After each heating, the resting period will allow spores that have survived to germinate into bacterial cells; these cells will be killed by the next day's heating. During the resting periods the substance being sterilized is kept in a moist environment at a warm room temperature, conducive to germination of the spores. When the environment is favourable for bacteria, it is conducive to the germination of cells from spores, and spores do not form from cells in this environment (see bacterial spores). The Tyndallization process is usually effective in practice. But it is not considered completely reliable — some spores may survive and later germinate and multiply. It is not often used today, but is used for sterilizing items that cannot withstand pressurized heating, such as plant seeds. See also Autoclave
https://en.wikipedia.org/wiki/Jordan%20map
In theoretical physics, the Jordan map, often also called the Jordan–Schwinger map is a map from matrices to bilinear expressions of quantum oscillators which expedites computation of representations of Lie algebras occurring in physics. It was introduced by Pascual Jordan in 1935 and was utilized by Julian Schwinger in 1952 to re-work out the theory of quantum angular momentum efficiently, given that map’s ease of organizing the (symmetric) representations of su(2) in Fock space. The map utilizes several creation and annihilation operators and of routine use in quantum field theories and many-body problems, each pair representing a quantum harmonic oscillator. The commutation relations of creation and annihilation operators in a multiple-boson system are, where is the commutator and is the Kronecker delta. These operators change the eigenvalues of the number operator, , by one, as for multidimensional quantum harmonic oscillators. The Jordan map from a set of matrices to Fock space bilinear operators , is clearly a Lie algebra isomorphism, i.e. the operators satisfy the same commutation relations as the matrices . The example of angular momentum For example, the image of the Pauli matrices of SU(2) in this map, for two-vector a†s, and as satisfy the same commutation relations of SU(2) as well, and moreover, by reliance on the completeness relation for Pauli matrices, This is the starting point of Schwinger’s treatment of the theory of quantum angular momentum, predicated on the action of these operators on Fock states built of arbitrary higher powers of such operators. For instance, acting on an (unnormalized) Fock eigenstate, while so that, for , this is proportional to the eigenstate , Observe and , as well as . Fermions Antisymmetric representations of Lie algebras can further be accommodated by use of the fermionic operators and , as also suggested by Jordan. For fermions, the commutator is replaced by the anticommut
https://en.wikipedia.org/wiki/Andrew%20Wiles
Sir Andrew John Wiles (born 11 April 1953) is an English mathematician and a Royal Society Research Professor at the University of Oxford, specialising in number theory. He is best known for proving Fermat's Last Theorem, for which he was awarded the 2016 Abel Prize and the 2017 Copley Medal by the Royal Society. He was appointed Knight Commander of the Order of the British Empire in 2000, and in 2018, was appointed the first Regius Professor of Mathematics at Oxford. Wiles is also a 1997 MacArthur Fellow. Education and early life Wiles was born on 11 April 1953 in Cambridge, England, the son of Maurice Frank Wiles (1923–2005) and Patricia Wiles (née Mowll). From 1952 to 1955, his father worked as the chaplain at Ridley Hall, Cambridge, and later became the Regius Professor of Divinity at the University of Oxford. Wiles began his formal schooling in Nigeria, while living there as a very young boy with his parents. However, according to letters written by his parents, for at least the first several months after he was supposed to be attending classes, he refused to go. From that fact, Wiles himself concluded that he was not in his earliest years enthusiastic about spending time in academic institutions. He trusts the letters, though he could not remember himself a time when he did not enjoy solving mathematical problems. Wiles attended King's College School, Cambridge, and The Leys School, Cambridge. Wiles states that he came across Fermat's Last Theorem on his way home from school when he was 10 years old. He stopped at his local library where he found a book The Last Problem, by Eric Temple Bell, about the theorem. Fascinated by the existence of a theorem that was so easy to state that he, a ten-year-old, could understand it, but that no one had proven, he decided to be the first person to prove it. However, he soon realised that his knowledge was too limited, so he abandoned his childhood dream until it was brought back to his attention at the age of 33 by Ken
https://en.wikipedia.org/wiki/Bacterial%20capsule
The bacterial capsule is a large structure common to many bacteria. It is a polysaccharide layer that lies outside the cell envelope, and is thus deemed part of the outer envelope of a bacterial cell. It is a well-organized layer, not easily washed off, and it can be the cause of various diseases. The capsule—which can be found in both gram negative and gram-positive bacteria—is different from the second lipid membrane – bacterial outer membrane, which contains lipopolysaccharides and lipoproteins and is found only in gram-negative bacteria. When the amorphous viscid secretion (that makes up the capsule) diffuses into the surrounding medium and remains as a loose undemarcated secretion, it is known as a slime layer. Capsule and slime layer are sometimes summarized under the term glycocalyx. Composition Most bacterial capsules are composed of polysaccharide, but some species use other materials, such as poly-D-glutamic acid in Bacillus anthracis. Because most capsules are so tightly packed, they are difficult to stain because most standard stains cannot penetrate the capsule. To visualize encapsulated bacteria using a microscope, a sample is treated with a dark stain, such as India ink. The structure of the capsule prevents the stain from penetrating the cell. When viewed, bacterial capsules appear as a bright halo around the cell on a dark background. Function The bacterial capsule serves as a shield, giving protection from toxins, and from drying out. Capsules allow adhesion to surfaces and help enable the bacteria to evade the host immune system. The water content in the capsule gives the protection against drying out. The capsule is considered a virulence factor because it enhances the ability of bacteria to cause disease (e.g. prevents phagocytosis). The capsule can protect cells from engulfment by eukaryotic cells, such as macrophages. A capsule-specific antibody may be required for phagocytosis to occur. They also exclude bacterial viruses and most hydr
https://en.wikipedia.org/wiki/Cyclin%20E
Cyclin E is a member of the cyclin family. Cyclin E binds to G1 phase Cdk2, which is required for the transition from G1 to S phase of the cell cycle that determines initiation of DNA duplication. The Cyclin E/CDK2 complex phosphorylates p27Kip1 (an inhibitor of Cyclin D), tagging it for degradation, thus promoting expression of Cyclin A, allowing progression to S phase. Functions of Cyclin E Like all cyclin family members, cyclin E forms complexes with cyclin-dependent kinases. In particular, Cyclin E binds with CDK2. Cyclin E/CDK2 regulates multiple cellular processes by phosphorylating numerous downstream proteins. Cyclin E/CDK2 plays a critical role in the G1 phase and in the G1-S phase transition. Cyclin E/CDK2 phosphorylates retinoblastoma protein (Rb) to promote G1 progression. Hyper-phosphorylated Rb will no longer interact with E2F transcriptional factor, thus release it to promote expression of genes that drive cells to S phase through G1 phase. Cyclin E/CDK2 also phosphorylates p27 and p21 during G1 and S phases, respectively. Smad3, a key mediator of TGF-β pathway which inhibits cell cycle progression, can be phosphorylated by cyclin E/CDK2. The phosphorylation of Smad3 by cyclin E/CDK2 inhibits its transcriptional activity and ultimately facilitates cell cycle progression. CBP/p300 and E2F-5 are also substrates of cyclin E/CDK2. Phosphorylation of these two proteins stimulates the transcriptional events during cell cycle progression. Cyclin E/CDK2 can phosphorylate p220(NPAT) to promote histone gene transcription during cell cycle progression. Apart from the function in cell cycle progression, cyclin E/CDK2 plays a role in the centrosome cycle. This function is performed by phosphorylating nucleophosmin (NPM). Then NPM is released from binding to an unduplicated centrosome, thereby triggering duplication. CP110 is another cyclin E/CDK2 substrate which involves in centriole duplication and centrosome separation. Cyclin E/CDK2 has also been shown to
https://en.wikipedia.org/wiki/Algenol
Algenol, founded in 2009, headquartered in Fort Myers, Florida, Algenol is an industrial biotechnology company that is commercializing patented algae technology for production of ethanol and other fuels. The technology enables production four of the most important fuels (ethanol, gasoline, jet, and diesel fuel) using a proprietary process involving algae, sunlight, carbon dioxide and salt water. History In 2008 the company announced it would begin commercial production of Ethanol by 2009 in the Sonoran Desert in northwest Mexico. This seems not to have happened though and as of 2015 they are still not in commercial production. In October 2015 Paul Woods, the founder, resigned and the company announced they were laying off 25% of the staff and changing to a “water treatment and carbon capture now, and maybe fuels later” focus. In 2016, Algenol celebrated its 10th Anniversary and added algae-based sustainable products to its portfolio. Their name changed to Algenol Biotech LLC, and they are focusing on algae-based product development and manufacturing. Research Algenol’s biofuel technology potentially allows production of the four most important fuels (ethanol, gasoline, jet, and diesel fuel) for around $1.27 per gallon each at production levels of 8,000 total gallons of liquid fuel per acre per year, but to date has not been successfully implemented in commercial production. Potentially the fuel would be produced with a 60% reduction in carbon footprint and could offer customers savings of 75 cents a gallon. The technology could produce high yields and relies on patented photobioreactors and proprietary downstream techniques for low-cost fuel production. These low-cost techniques consume carbon dioxide from industrial sources, do not use farmland or food crops, and provide fresh water. Their biofuel technology uses sunlight, algae, non-arable land and carbon dioxide to produce ethanol and the leftover spent algae that can be converted into other biofuels. Th
https://en.wikipedia.org/wiki/Failures%20of%20water%20supply%20and%20sanitation%20systems
Failures of water supply and sanitation systems describe situations where water supply and sanitation systems (also called WASH systems) have been put in place (for example by the government or by non-government organizations (NGOs) but have failed to meet the expected outcomes. Often this is due to poor planning, lack of choice of appropriate technology depending upon the context, insufficient stakeholder involvement at the various stages of the project and lack of maintenance. While Hygiene Behavior Change is important in achieving the health benefits of improved WASH systems, the achievement of sustainability of WASH infrastructure depends on creation of demand for sanitation services. National government mapping and monitoring efforts as well as post-project monitoring by NGOs or researchers, have identified the failure of water supply systems (also known as water points, wells, boreholes, or similar) and sanitation systems (one part of sanitation systems are the toilets). The following sections provide examples of those failures sorted by country. Monitoring Some national and local governments monitor water services regularly. One example is the Sistema de Información de Agua y Saneamiento Rural (Rural Water and Sanitation Information System) a monitoring system in Honduras and Nicaragua. For organizations that work on WASH interventions, monitoring means using indicators to measure effectiveness of a development program. Some organizations or research organizations do "post-implementation monitoring", which occurs after the WASH intervention has been completed. The Water Point Data Exchange (WPDx), launched in 2015, is a global platform for sharing water point data collected by governments, non-profit organizations, researchers, and others. Failures of water supply systems Afghanistan During a WaterAid-IRC-RWSN webinar in 2011, Leendert Vijselaar of DACAAR said that 35% of 30,182 water points surveyed were non-functional. Nationally, 45% of water sup
https://en.wikipedia.org/wiki/Holmes%E2%80%93Thompson%20volume
In geometry of normed spaces, the Holmes–Thompson volume is a notion of volume that allows to compare sets contained in different normed spaces (of the same dimension). It was introduced by Raymond D. Holmes and Anthony Charles Thompson. Definition The Holmes–Thompson volume of a measurable set in a normed space is defined as the 2n-dimensional measure of the product set where is the dual unit ball of (the unit ball of the dual norm ). Symplectic (coordinate-free) definition The Holmes–Thompson volume can be defined without coordinates: if is a measurable set in an n-dimensional real normed space then its Holmes–Thompson volume is defined as the absolute value of the integral of the volume form over the set , where is the standard symplectic form on the vector space and is the dual unit ball of . This definition is consistent with the previous one, because if each point is given linear coordinates and each covector is given the dual coordinates (so that ), then the standard symplectic form is , and the volume form is whose integral over the set is just the usual volume of the set in the coordinate space . Volume in Finsler manifolds More generally, the Holmes–Thompson volume of a measurable set in a Finsler manifold can be defined as where and is the standard symplectic form on the cotangent bundle . Holmes–Thompson's definition of volume is appropriate for establishing links between the total volume of a manifold and the length of the geodesics (shortest curves) contained in it (such as systolic inequalities and filling volumes) because, according to Liouville's theorem, the geodesic flow preserves the symplectic volume of sets in the cotangent bundle. Computation using coordinates If is a region in coordinate space , then the tangent and cotangent spaces at each point can both be identified with . The Finsler metric is a continuous function that yields a (possibly asymmetric) norm for each point . The Holmes–Thompson volume of
https://en.wikipedia.org/wiki/Scoreboarding
Scoreboarding is a centralized method, first used in the CDC 6600 computer, for dynamically scheduling instructions so that they can execute out of order when there are no conflicts and the hardware is available. In a scoreboard, the data dependencies of every instruction are logged, tracked and strictly observed at all times. Instructions are released only when the scoreboard determines that there are no conflicts with previously issued ("in flight") instructions. If an instruction is stalled because it is unsafe to issue (or there are insufficient resources), the scoreboard monitors the flow of executing instructions until all dependencies have been resolved before the stalled instruction is issued. In essence: reads proceed on the absence of write hazards, and writes proceed in the absence of read hazards. Scoreboarding is essentially a hardware implementation of the same underlying algorithm seen in dataflow languages, creating a Directed Acyclic Graph, where the same logic is applied in the programming language runtime. Stages Instructions are decoded in order and go through the following four stages. Issue: The system checks which registers will be read and written by this instruction and where conflicts WAR and RAW and WAW are detected. RAW and WAR hazards are recorded using a Dependency Matrix (constructed from SR NOR latches in the original 6600 design) as it will be needed in the following stages. Simultaneously, an entry is recorded in a second Matrix, which records the instruction order as a Directed Acyclic Graph. In order to avoid output dependencies (WAW – Write after Write) the instruction is stalled until instructions intending to write to the same register are completed. The instruction is also stalled when required functional units are currently busy. No instruction is ever issued unless it is fully trackable from start to finish. Read operands: After an instruction has been issued and correctly allocated to the required hardware modul
https://en.wikipedia.org/wiki/Beacon%20Institute%20for%20Rivers%20%26%20Estuaries
Beacon Institute for Rivers and Estuaries, Clarkson University, with offices in City of Beacon and Troy, New York, is a 501(c)(3) not-for-profit environmental research organization focusing on real-time monitoring of river ecosystems. The institute's mission is to "create and maintain a global center for scientific and technological innovation that advances research, education and public policy regarding rivers and estuaries." In 2011, Beacon Institute for Rivers and Estuaries and Clarkson University announced an expansion of their education and operational partnership for commercialization of new real-time river monitoring sensor technology, academic programs and public policy solutions based on real-time data to protect waterways. Clarkson University Business School Dean Timothy Sugrue, a West Point graduate, is the institute's President and Chief Executive Officer, with responsibility for R&D oversight and commercial partnership development. With the new alliance, the institute's Founding Director, Hudson River environmentalist John Cronin, joined Clarkson's faculty as a Beacon Institute Fellow. Cronin also serves as Senior Fellow for Environmental Affairs at Pace University's Academy for the Environment. In 2008, Clarkson University's James S. Bonner and a team of its researchers joined the River and Estuary Observatory Network (REON) collaboration started by Beacon Institute and IBM. Together, the partners have established a first-of-its-kind real-time environmental monitoring network for rivers and estuaries that seeks to allow continuous monitoring of physical, chemical and biological data from points in New York's Hudson, Mohawk and St. Lawrence Rivers via an integrated network of sensors, robotics, mobile monitoring and computational technology deployed in the rivers. External links Beacon Institute for Rivers and Estuaries, Clarkson University Ecology organizations Beacon, New York Hudson River
https://en.wikipedia.org/wiki/Diophantine%20quintuple
In number theory, a diophantine -tuple is a set of positive integers such that is a perfect square for any A set of positive rational numbers with the similar property that the product of any two is one less than a rational square is known as a rational diophantine -tuple. Diophantine m-tuples The first diophantine quadruple was found by Fermat: It was proved in 1969 by Baker and Davenport that a fifth positive integer cannot be added to this set. However, Euler was able to extend this set by adding the rational number The question of existence of (integer) diophantine quintuples was one of the oldest outstanding unsolved problems in number theory. In 2004 Andrej Dujella showed that at most a finite number of diophantine quintuples exist. In 2016 it was shown that no such quintuples exist by He, Togbé and Ziegler. As Euler proved, every Diophantine pair can be extended to a Diophantine quadruple. The same is true for every Diophantine triple. In both of these types of extension, as for Fermat's quadruple, it is possible to add a fifth rational number rather than an integer. The rational case Diophantus himself found the rational diophantine quadruple More recently, Philip Gibbs found sets of six positive rationals with the property. It is not known whether any larger rational diophantine m-tuples exist or even if there is an upper bound, but it is known that no infinite set of rationals with the property exists.
https://en.wikipedia.org/wiki/Hugh%20of%20Saint%20Victor
Hugh of Saint Victor ( 1096 – 11 February 1141) was a Saxon canon regular and a leading theologian and writer on mystical theology. Life As with many medieval figures, little is known about Hugh's early life. He was probably born in the 1090s. His homeland may have been Lorraine, Ypres in Flanders, or the Duchy of Saxony. Some sources say that his birth occurred in the Harz district, being the eldest son of Baron Conrad of Blankenburg. Over the protests of his family, he entered the Priory of St. Pancras, a community of canons regular, where he had studied, located at Hamerleve or Hamersleben, near Halberstadt. Due to civil unrest shortly after his entry to the priory, Hugh's uncle, Reinhard of Blankenburg, who was the local bishop, advised him to transfer to the Abbey of Saint Victor in Paris, where he himself had studied theology. He accepted his uncle's advice and made the move at a date which is unclear, possibly 1115–18 or around 1120. He spent the rest of his life there, advancing to head the school. Works Hugh wrote many works from the 1120s until his death (Migne, Patrologia Latina contains 46 works by Hugh, and this is not a full collection), including works of theology (both treatises and sententiae), commentaries (mostly on the Bible but also including one of pseudo-Dionysius' Celestial Hierarchies), mysticism, philosophy and the arts, and a number of letters and sermons. Hugh was influenced by many people, but chiefly by Saint Augustine, especially in holding that the arts and philosophy can serve theology. Hugh's most significant works include: De sacramentis christianae fidei (On the Mysteries of the Christian Faith/On the Sacraments of the Christian Faith) It is Hugh's most celebrated masterpiece and presents the bulk of Hugh's thoughts on theological and mystical ideas, ranging from God and angels to natural laws. Didascalicon de studio legendi (Didascalicon, or, On the Study of Reading). The subtitle to the Didascalicon, De Studio Legendi, m
https://en.wikipedia.org/wiki/ABHD2
Abhydrolase domain-containing protein 2 is a serine hydrolase enzyme that is strongly expressed in human spermatozoa. It is a key controller of sperm hyperactivation, which is a necessary step in allowing sperm to fertilize an egg. It is encoded by the ABHD2 gene. Function In the presence of Progesterone (or Pregnenolone Sulfate,) it cleaves 2-arachidonoylglycerol (2AG) into glycerol and arachidonic acid (AA). 2AG inhibits sperm calcium channel CatSper, and so when ABHD2 removes 2AG calcium flows into the cell through the CatSper channel, leading to hyperactivation. ABHD2 is inhibited by testosterone, (as well as hydrocortisone, and the plant triterpenoids lupeol and pristimerin) which may prevent premature hyperactivation. Structure This gene encodes a protein containing an alpha/beta hydrolase fold, which is a catalytic domain found in a very wide range of enzymes. Alternative splicing of this gene results in two transcript variants encoding the same protein. Role in disease The ABHD2 gene is down regulated in the lungs of people with Emphysema. Analysis of ABHD2 deficiency in mice found a decrease in phosphatidylcholine levels. The mice developed emphysema which was attributed to an increase in macrophage infiltration, increased inflammatory cytokine levels, an imbalance of protease/anti-protease, and an increase in cell death. This research suggests that ABHD2 is important in maintaining the structural integrity of the lungs, and that disruption of phospholipid metabolism in the alveoli may lead to the development of emphysema. Increased expression has also been seen in the lungs of smokers. ABHD2 is also expressed in atherosclerotic lesions. Expression has been found to be higher in patients with unstable angina than in patients with stable angina. Up-regulation of ABHD2 has been observed in cells transfected with Hepatitis B virus (HBV) DNA (HepG2.2.15 cells). Expression was down-regulated by the drug lamivudine, used in the treatment of hepatiti
https://en.wikipedia.org/wiki/16th%20meridian%20east
The meridian 16° east of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, Europe, Africa, the Atlantic Ocean, the Southern Ocean, and Antarctica to the South Pole. The 16th meridian east forms a great circle with the 164th meridian west. From Pole to Pole Starting at the North Pole and heading south to the South Pole, the 16th meridian east passes through: {| class="wikitable plainrowheaders" ! scope="col" width="125" | Co-ordinates ! scope="col" | Country, territory or sea ! scope="col" | Notes |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Arctic Ocean | style="background:#b0e0e6;" | |- | ! scope="row" | | Island of Spitsbergen, Svalbard |-valign="top" | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Atlantic Ocean | style="background:#b0e0e6;" | Greenland SeaNorwegian Sea |-valign="top" | ! scope="row" | | Islands of Andøy and Hinnøya, and the mainland |- | ! scope="row" | | |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Baltic Sea | style="background:#b0e0e6;" | |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | |- | ! scope="row" | | For about 11 km |- | ! scope="row" | | For about 6 km |- | ! scope="row" | | |-valign="top" | ! scope="row" | | Passing through Zagreb, east of the city centre |- | ! scope="row" | | |- | ! scope="row" | | |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Mediterranean Sea | style="background:#b0e0e6;" | Adriatic Sea |- | ! scope="row" | | Island of Biševo |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Mediterranean Sea | style="background:#b0e0e6;" | Adriatic Sea |- | ! scope="row" | | |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Mediterranean Sea | style="background:#b0e0e6;" | Gulf of Manfredonia |- | ! scope="row" | | |- | style="background:#b0e0e6
https://en.wikipedia.org/wiki/Spacetime%20topology
Spacetime topology is the topological structure of spacetime, a topic studied primarily in general relativity. This physical theory models gravitation as the curvature of a four dimensional Lorentzian manifold (a spacetime) and the concepts of topology thus become important in analysing local as well as global aspects of spacetime. The study of spacetime topology is especially important in physical cosmology. Types of topology There are two main types of topology for a spacetime M. Manifold topology As with any manifold, a spacetime possesses a natural manifold topology. Here the open sets are the image of open sets in . Path or Zeeman topology Definition: The topology in which a subset is open if for every timelike curve there is a set in the manifold topology such that . It is the finest topology which induces the same topology as does on timelike curves. Properties Strictly finer than the manifold topology. It is therefore Hausdorff, separable but not locally compact. A base for the topology is sets of the form for some point and some convex normal neighbourhood . ( denote the chronological past and future). Alexandrov topology The Alexandrov topology on spacetime, is the coarsest topology such that both and are open for all subsets . Here the base of open sets for the topology are sets of the form for some points . This topology coincides with the manifold topology if and only if the manifold is strongly causal but it is coarser in general. Note that in mathematics, an Alexandrov topology on a partial order is usually taken to be the coarsest topology in which only the upper sets are required to be open. This topology goes back to Pavel Alexandrov. Nowadays, the correct mathematical term for the Alexandrov topology on spacetime (which goes back to Alexandr D. Alexandrov) would be the interval topology, but when Kronheimer and Penrose introduced the term this difference in nomenclature was not as clear, and in physics the term Ale
https://en.wikipedia.org/wiki/Proboscis
A proboscis () is an elongated appendage from the head of an animal, either a vertebrate or an invertebrate. In invertebrates, the term usually refers to tubular mouthparts used for feeding and sucking. In vertebrates, a proboscis is an elongated nose or snout. Etymology First attested in English in 1609 from Latin , the latinisation of the Ancient Greek (), which comes from () 'forth, forward, before' + (), 'to feed, to nourish'. The plural as derived from the Greek is , but in English the plural form proboscises occurs frequently. Invertebrates The most common usage is to refer to the tubular feeding and sucking organ of certain invertebrates such as insects (e.g., moths, butterflies, and mosquitoes), worms (including Acanthocephala, proboscis worms) and gastropod molluscs. Acanthocephala The Acanthocephala or thorny-headed worms, or spiny-headed worms are characterized by the presence of an eversible proboscis, armed with spines, which it uses to pierce and hold the gut wall of its host. Lepidoptera mouth parts The mouth parts of Lepidoptera (butterflies and moths) mainly consist of the sucking kind; this part is known as the proboscis or 'haustellum'. The proboscis consists of two tubes held together by hooks and separable for cleaning. The proboscis contains muscles for operating. Each tube is inwardly concave, thus forming a central tube up which moisture is sucked. Suction takes place due to the contraction and expansion of a sac in the head. A specific example of the proboscis being used for feeding is in the species Deilephila elpenor. In this species, the moth hovers in front of the flower and extends its long proboscis to attain its food. A few Lepidoptera species lack mouth parts and therefore do not feed in the imago. Others, such as the family Micropterigidae, have mouth parts of the chewing kind. The study of insect mouthparts was helpful for the understanding of the functional mechanism of the proboscis of butterflies (Lepidoptera) to el
https://en.wikipedia.org/wiki/Deployment%20of%20COVID-19%20vaccines
, 13.4billion COVID-19 vaccine doses have been administered worldwide, with 67.9 percent of the global population having received at least one dose. While 4.19million vaccines were then being administered daily, only 22.3 percent of people in low-income countries had received at least a first vaccine by September 2022, according to official reports from national health agencies, which are collated by Our World in Data. During a pandemic on the rapid timeline and scale of COVID-19 cases in 2020, international organizations like the World Health Organization (WHO) and Coalition for Epidemic Preparedness Innovations (CEPI), vaccine developers, governments, and industry evaluated the distribution of the eventual vaccine(s). Individual countries producing a vaccine may be persuaded to favor the highest bidder for manufacturing or provide first-class service to their own country. Experts emphasize that licensed vaccines should be available and affordable for people at the frontlines of healthcare and in most need. In April 2020, it was reported that the UK agreed to work with 20 other countries and global organizations, including France, Germany, and Italy, to find a vaccine and share the results, and that UK citizens would not get preferential access to any new COVID‑19 vaccines developed by taxpayer-funded UK universities. Several companies planned to initially manufacture a vaccine at artificially low prices, then increase prices for profitability later if annual vaccinations are needed and as countries build stock for future needs. The WHO had set out the target to vaccinate 40% of the population of all countries by the end of 2021 and 70% by mid-2022, but many countries missed the 40% target at the end of 2021. Distribution Note about table in this section: Number and percentage of people who have received at least one dose of a COVID-19 vaccine (unless noted otherwise). May include vaccination of non-citizens, which can push totals beyond 100% of the local popu
https://en.wikipedia.org/wiki/160%20%28number%29
160 (one hundred [and] sixty) is the natural number following 159 and preceding 161. In mathematics 160 is the sum of the first 11 primes, as well as the sum of the cubes of the first three primes. Given 160, the Mertens function returns 0. 160 is the smallest number n with exactly 12 solutions to the equation φ(x) = n. In telecommunications The number of characters permitted in a standard short message service The number for Dial-a-Disc (1966–1991), a telephone number operated by the General Post Office in the United Kingdom, which enabled callers to hear the latest chart hits See also 160s List of highways numbered 160 United Nations Security Council Resolution 160 United States Supreme Court cases, Volume 160 Article 160 of the Constitution of Malaysia Norris School District 160, Lancaster County, Nebraska
https://en.wikipedia.org/wiki/Accent%20kernel
Accent is an operating system kernel, most notable for being the predecessor to the Mach kernel. Originally developed at Carnegie Mellon University (CMU), Accent was influenced by the Aleph kernel developed at the University of Rochester. Accent improves upon the older kernel, fixing several problems and re-targeting hardware support for networks of workstation machines (specifically, the Three Rivers PERQ) instead of minicomputers. Accent was part of the SPICE Project at CMU which ran from 1981 to 1985. Development of Accent led directly to the introduction of Mach, used in NeXTSTEP, GNU Hurd, and modern Apple operating systems including Mac OS and iOS. The original Aleph project used data copying to allow programs to communicate. Applications could open ports, which would allow them to receive data sent to them by other programs. The idea was to write a number of servers that would control resources on the machine, passing data along until it reached an end user. In this respect it was similar in concept to Unix, although the implementation was much different, using messages instead of memory. This turned out to have a number of problems, notably that copying memory on their Data General Eclipse was very expensive. In 1979 one of the Aleph engineers, Richard Rashid, left for CMU and started work on a new version of Aleph that avoided its problems. In particular, Accent targeted workstation machines featuring a MMU, using the MMU to "copy" large blocks of memory via mapping, making the memory appear to be in two different places. Only data that was changed by one program or another would have to be physically copied, using the copy-on-write algorithm. To understand the difference, consider two interacting programs, one feeding a file to another. Under Aleph the data from the provider would have to be copied 2kB at a time (due to features of the Eclipse) into the user process. Under Accent the data simply "appeared" in the user process for the cost of a few ins
https://en.wikipedia.org/wiki/Cross-domain%20solution
A cross-domain solution (CDS) is an integrated information assurance system composed of specialized software, and sometimes hardware, that provides a controlled interface to manually or automatically enable and/or restrict the access or transfer of information between two or more security domains based on a predetermined security policy. CDSs are designed to enforce domain separation and typically include some form of content filtering, which is used to designate information that is unauthorized for transfer between security domains or levels of classification, such as between different military divisions, intelligence agencies, or other operations which critically depend on the timely sharing of potentially sensitive information. The goal of a CDS is to allow a trusted network domain to exchange information with other domains, either one-way or bi-directionally, without introducing the potential for security threats that would normally come with network connectivity. Although the goal is 100% assurance, this is not possible in practice, thus CDS development, assessment, and deployment are based on comprehensive risk management. Due to the sensitive nature of their use, every aspect of an accredited CDS must be rigorously evaluated under what is known as a Lab-Based Security Assessment (LBSA) to reduce the potential vulnerabilities and risks to the system itself and those to which it will be deployed. The evaluation and accreditation of CDSs in the United States are primarily under the authority of the National Cross Domain Strategy and Management Office (NCDSMO) within the National Security Agency (NSA). The three primary elements demanded from cross-domain solutions are: Data confidentiality; is most often imposed by hardware-enforced one-way data transfer Data integrity: content management using filtering for viruses and malware; content examination utilities; in high-to-low security transfer audited human review Data availability: security-hardened operati
https://en.wikipedia.org/wiki/History%20of%20ancient%20numeral%20systems
Number systems have progressed from the use of fingers and tally marks, perhaps more than 40,000 years ago, to the use of sets of glyphs able to represent any conceivable number efficiently. The earliest known unambiguous notations for numbers emerged in Mesopotamia about 5000 or 6000 years ago. Prehistory Counting initially involves the fingers, given that digit-tallying is common in number systems that are emerging today, as is the use of the hands to express the numbers five and ten. In addition, the majority of the world's number systems are organized by tens, fives, and twenties, suggesting the use of the hands and feet in counting, and cross-linguistically, terms for these amounts are etymologically based on the hands and feet. Finally, there are neurological connections between the parts of the brain that appreciate quantity and the part that "knows" the fingers (finger gnosia), and these suggest that humans are neurologically predisposed to use their hands in counting. While finger-counting is typically not something that preserves archaeologically, some prehistoric hand stencils have been interpreted as finger-counting since of the 32 possible patterns the fingers can produce, only five (the ones typically used in counting from one to five) are found at Cosquer Cave, France. Since the capacity and persistence of the fingers are limited, finger-counting is typically supplemented by means of devices with greater capacity and persistence, including tallies made of wood or other materials. Possible tally marks made by carving notches in wood, bone, and stone appear in the archaeological record at least forty thousand years ago. These tally marks may have been used for counting time, such as numbers of days or lunar cycles, or for keeping records of quantities, such as numbers of animals or other valuable commodities. However, there is currently no diagnostic technique that can reliably determine the social purpose or use of prehistoric linear marks inscribe
https://en.wikipedia.org/wiki/Prince%20of%20Darkness%20%28film%29
Prince of Darkness is a 1987 American supernatural horror film, written and directed by John Carpenter, and starring Donald Pleasence, Victor Wong, Jameson Parker, and Lisa Blount. The second installment in what Carpenter calls his "Apocalypse Trilogy"—which began with The Thing (1982) and concludes with In the Mouth of Madness (1994)—the film follows a group of quantum physics students in Los Angeles who are asked to assist a Catholic priest in investigating an ancient cylinder of liquid discovered in a monastery, which they come to find is a sentient, liquid embodiment of Satan. Plot A Catholic priest invites quantum physicist Professor Howard Birack and his students to join him in the basement of a Los Angeles monastery belonging to "The Brotherhood of Sleep", an old order who communicate through dreams. The priest requires their assistance in investigating a mysterious cylinder containing a swirling green liquid. Among the thirteen academics present are wise-cracking Walter, demure Kelly, the highly-strung Susan, and lovers Brian and Catherine. They decipher an ancient text found next to the cylinder which describes the liquid as the corporeal embodiment of Satan. The team also learns Jesus Christ was an extra-terrestrial who was executed for heresy after trying to warn the people of Earth about the vessel in which Satan was trapped. The liquid is then discovered to be sentient. The academics use a computer to analyze the books surrounding it, and find that they included differential equations. Over a period of two days, small jets of liquid escape from the cylinder. Members of the group exposed to the liquid become possessed by the entity and attack the others. The first victim is Susan, who begins killing off the others one by one, after which they too become possessed. Anyone who attempts to flee the monastery is killed by the growing mass of enthralled homeless people who have surrounded the building. Professor Birack and the priest theorize that Satan is
https://en.wikipedia.org/wiki/ZNF548
Zinc Finger Protein 548 (ZNF548) is a human protein encoded by the ZNF548 gene which is located on chromosome 19. It is found in the nucleus and is hypothesized to play a role in the regulation of transcription by RNA Polymerase II. It belongs to the Krüppel C2H2-type zinc-finger protein family as it contains many zinc-finger repeats. Gene This protein coding gene is 4987 bp long and encodes transcript variant 1 which is the longest ZNF548 isoform. It is found on chromosome 19; its exact position is 19q13.43 in the plus strand. The gene has 4 exons which encode for a Kruppel associated box (KRAB domain) and 11 zinc finger repeats. Promoter The promoter of the ZNF548 gene is 1198 bases long and is located at 57388850 - 57390047 on chromosome 19. The promoter region is conserved in 6 orthologs: Rhesus macaque (rhesus monkey), Pan troglodytes (chimpanzee), Oryctolagus cuniculus (European rabbit), Equus caballus (horse), Canis lupus familiaris (dog) and Sus scrofa (pig). Transcript Transcript variant 1 is the longest transcript and encodes the longest protein isoform (ZNF548 isoform 1) which is 545 amino acids long. Transcript variant 2 is missing exon 2 and encodes ZNF548 isoform 2 which is 533 amino acids long. Protein ZNF548 belongs to the Kruppel C2H2-type zinc finger protein family as it contains 11 Cys2His2-type zinc finger repeats. Each zinc finger has a conserved ββα structure where a zinc atom is fixed by C2H2 residues. ZNF548 is able to attach to the DNA at a 44 bp long sequence through its C2H2 Zn motifs, each binding to 4 DNA bases. The protein also contains a Kruppel-associated box (KRAB) which is a domain found at the N terminus and contains multiple charged amino acids. This domain plays a role in transcription; it binds to the RING-B box-coiled coil (RBCC) domain of the KAP-1/TIF1-beta co-repressor. Tertiary structure of ZNF548 was predicted using I-Tasser. ZNF548 has a molecular weight of 64 kDa and a predicted isoelectric point of 8.21. Compo
https://en.wikipedia.org/wiki/MRV%20Communications
MRV Communications is a communications equipment and services company based in Chatsworth, California. Through its business units, the company is a provider of optical communications network infrastructure equipment and services to a broad range of telecom concerns, including multi-national telecommunications operators, local municipalities, MSOs, corporate and consumer high-speed G-Internet service providers, and data storage and cloud computing providers. MRV Communications was acquired by ADVA Optical Networking on August 14, 2017. History MRV was founded in 1988 by Prof. Shlomo Margalit and Dr. Zeev Rav-Noy as a maker of Metro and Access optoelectronic components. MRV’s Metro and Access transceivers enable network equipment to be deployed across large campuses or in municipal and regional networks. To expand its leadership, MRV established LuminentOIC, an independent subsidiary. LuminentOIC makes fiber-to-the-premises (FTTP) components, an activity that was initiated by Rob Goldman, who founded the FTTx business unit in Luminant in 2001. In the 1990s, MRV produced Ethernet switching and Optical Transport for Metro and campus environments. MRV began building switches and routers used by carriers implementing Metro Ethernet networks that provide Ethernet services to enterprise customers and multi-dwelling residential buildings. Significant Milestones – Acquisitions, Product Development: 1992 – Created NBASE Communications through Galcom and Ace acquisitions. Acquisitions created a networking company with a focus on technology for the Token Ring LAN, IBM Connectivity, and Multi-Platform Network Management for the IBM NetView and HP OpenView platforms. Following the acquisitions, the Company consolidated these operations in Israel with its networking operations in the U.S. 1996 – Acquired Fibronics from Elbit Ltd. Enhanced the development of Fast Ethernet and Gigabit Ethernet functions through the acquisitions of the Fibronics GigaHub family of products – Serv
https://en.wikipedia.org/wiki/List%20of%20botanists%20by%20author%20abbreviation%20%28S%29
A–R To find entries for A–R, use the table of contents above. S Sabine – Joseph Sabine (1770–1837) Sabourin – Lucien Sabourin (1904–1987) Sacc. – Pier Andrea Saccardo (1845–1920) Sachet – Marie-Hélène Sachet (1922–1986) Sachs – Julius von Sachs (1832–1897) S.A.Cain – Stanley Adair Cain (1902–1995) Sacleux – Charles Sacleux (1856–1943) Sadeb. – Richard Emil Benjamin Sadebeck (1839–1905) Saelán – Anders Thiodolf Saelán (1834–1921) Saff. – William Edwin Safford (1859–1926) Sagást. – Abundio Sagástegui Alva (1932–2012) S.A.Hammer – Steven Allen Hammer (born 1951) Sahlb. – Carl Reinhold Sahlberg (1779–1860) Sahni – Birbal Sahni (1891–1949) S.A.J.Bell – Stephen Andrew James Bell (born 1967) S.Akiyama – Shinobu Akiyama (born 1957) Sa.Kurata – Satoru Kurata (1922–1978) Salisb. – Richard Anthony Salisbury (1761–1829) Salmaki – Yasaman Salmaki (fl. 2016) Salm-Dyck – Joseph zu Salm-Reifferscheidt-Dyck (1773–1861) Salmon – John Drew Salmon (1802–1859) Salter – Samuel James Augustus Salter (1825–1897) Sam. – (1885–1944) Sambo – Maria Cengia Sambo (1888–1939) S.A.Mori – Scott Alan Mori (1941–2020) Samp. – Gonçalo António da Silva Ferreira Sampaio (1865–1937) Sander – Henry Frederick Conrad Sander (1847–1920) S.Andrews – Susyn M. Andrews (born 1953) Sandwith – Noel Yvri Sandwith (1901–1965) S.A.Nikitin – Sergei Alekseevich Nikitin (1898–1982) S.Anil Kumar – S. Anil Kumar (fl. 2008) Sanín – Maria José Sanín (fl. 2008) Sanio – Carl Gustav Sanio (1832–1891) Sanjappa – Munivenkatappa Sanjappa (born 1951) Sankowsky – G. Sankowsky (fl. 2003) Santapau – Hermenegild Santapau (1903–1970) Santi – Giorgio Santi (1746–1822) Santin – Dionete Aparecida Santin (fl. 1991) Saporta – Louis Charles Joseph Gaston de Saporta (1823–1895) Saralegui – (born 1949) Sarasin – Karl Friedrich Sarasin (1859–1942) Sarato – César Sarato (1829–1893) Sarauw – Georg Frederik Ludvig Sarauw (1862–1928) Sarg. – Charles Sprague Sargent (1841–1927) S.Arn. – Samuel
https://en.wikipedia.org/wiki/List%20of%20White%20Sea%20biota%20species%20by%20phylum
This is a List of White Sea species, ordered by suspected phylum. ?Incertae sedis 3 species Phylum ?Arthropoda 1 species Phylum ?Cnidaria 1 species Erniettomorphs 1 species Phylum ?Mollusca 1 species Phylum ?Porifera 1 species. Phylum Proarticulata 3 species Phylum Rangeomorpha 3 species Phylum Trilobozoa 1 species Alphabetical listing Bomakellia Bonata septata Cephalonega Charniodiscus Chondroplon Cyclomedusa Dickinsonia Inaria Kimberella Palaeophragmodictya Parvancorina Pteridinium Tamga (Genus) Tribrachidium Vaveliksia Yorgia See also Vendia Odontogriphus White Sea White Sea Ediacaran life
https://en.wikipedia.org/wiki/Postman%20%28software%29
Postman is an API platform for developers. The company is headquartered in San Francisco and maintains an office in Bangalore, where it was founded. As of February 2023, Postman reports having more than 25 million registered users and 75,000 open APIs, which it says constitutes the world's largest public API hub. History Postman started in 2014 as a side project of software engineer Abhinav Asthana, a former intern at Yahoo Bangalore who found it difficult to develop and test APIs. He launched Postman as a free app in the Chrome Web Store. Abhinav recruited former colleagues Ankit Sobti and Abhijit Kane to found Postman Inc in 2014. The three co-founders lead the company today, with Abhinav serving as CEO and Sobti as CTO. In May 2015 Postman raised a $1 million seed round. In August 2021 the company raised a $225 million Series D round at a $5.6 billion valuation. As of 2023, Postman has been named to Forbes Cloud 100 list for three years running, ranking as high as #28. Products API repository: Allows users to store, catalog, and collaborate around API artifacts in a central platform within public, private, or partner networks API builder: Helps implement an API design workflow through specifications including OpenAPI, GraphQL, and RAML. Integrates varied source controls, CI/CD, gateways, and APM solutions Tools: API client, API design, API documentation, API testing, mock servers, and API detection Intelligence: Security warnings, API repository search, workspaces, reporting, API governance Workspaces: Personal, team, partner, and public workspaces allow developers to collaborate internally and externally Plans Postman offers a tiered pricing model. Options range from a free plan for small teams to enterprise plans that can serve thousands of developers and offer custom domains, reporting, analytics, governance, and enterprise integrations with GitHub and GitLab. Ownership Postman is privately held, with funding from Nexus Venture Partners, C
https://en.wikipedia.org/wiki/TO-220
The TO-220 is a style of electronic package used for high-powered, through-hole components with pin spacing. The "TO" designation stands for "transistor outline". TO-220 packages have three leads. Similar packages with two, four, five or seven leads are also manufactured. A notable characteristic is a metal tab with a hole, used to mount the case to a heatsink, allowing the component to dissipate more heat than one constructed in a TO-92 case. Common TO-220-packaged components include discrete semiconductors such as transistors and silicon-controlled rectifiers, as well as integrated circuits. Typical applications The TO-220 package is a "power package" intended for power semiconductors and an example of a through-hole design rather than a surface-mount technology type of package. TO-220 packages can be mounted to a heat sink to dissipate several watts of waste heat. On a so-called "infinite heat sink", this can be 50 W or more. The top of the package has a metal tab with a hole used to mount the component to a heat sink. Thermal compound is often applied between package and heatsink to further improve heat transfer. The metal tab is often connected electrically to the internal circuitry. This does not normally pose a problem when using isolated heatsinks, but an electrically-insulating pad or sheet may be required to electrically isolate the component from the heatsink if the heatsink is electrically conductive, grounded or otherwise non-isolated. Many materials may be used to electrically isolate the TO-220 package, some of which have the added benefit of high thermal conductivity. In applications that require a heatsink, damage or destruction of the TO-220 device due to overheating may occur if the heatsink is dislodged during operation. A heatsinked TO-220 package dissipating 1 W of heat will have an internal (junction) temperature typically 2 to 5 °C higher than the package's temperature (due to the thermal resistance between the junction and the meta
https://en.wikipedia.org/wiki/Stonesoft%20Corporation
Stonesoft Corporation was a public company that developed and sold network security solutions based in Helsinki, Finland. It was publicly owned until 2013 when it was acquired by Intel's subsidiary McAfee. Stonesoft does business globally, with a regional headquarters in Atlanta, Georgia, United States, and sales offices throughout Europe, the Middle East, and China. In July, 2013 McAfee, a part of Intel Security, completed a tender offer to acquire all Stonesoft products and technologies. Stonesoft became a part of the McAfee Network Security Business Unit. Stonesoft firewall products were renamed McAfee Next Generation Firewall. McAfee sold Stonesoft to Forcepoint in January 2016. History Founded in 1990, Stonesoft started as a systems integrator in the Nordic regions of Europe. In 1994 it introduced StoneBeat, a technology for creating a high availability pair of firewalls in an active-passive configuration. In 1999, the company extended StoneBeat with a patented load balancing clustering technology, launching StoneBeat FullCluster. It was one of the first technologies certified in Check Point's OPSEC program. In 2001, Stonesoft expanded its product set into the firewall/VPN space, becoming a direct competitor to Check Point. The StoneGate Firewall/VPN was launched on March 19, 2001. In January 2003, the company introduced the first virtual firewall/VPN solution, for IBM mainframes. In 2010, the company released information via CERT-FI on Advanced Evasion technique (AETs) that met with skepticism in the community. Further AETs were released in 2011, and eventually verified by independent labs and researchers. In 2012 “Stonesoft” replaced the “StoneGate” product name. From now on, Stonesoft is used both as the company and product name. Stonesoft Corporation's product sales for Q3 2012 were circa 5.6 million euros. The product sales grew by approximately 18%. The Q3 net sales were approximately 9.2–9.3 million euros, which equals a growth by14-16%. The g
https://en.wikipedia.org/wiki/Vortex%20tube
The vortex tube, also known as the Ranque-Hilsch vortex tube, is a mechanical device that separates a compressed gas into hot and cold streams. The gas emerging from the hot end can reach temperatures of , and the gas emerging from the cold end can reach . It has no moving parts and is considered an environmentally friendly technology because it can work solely on compressed air and does not use Freon. Its efficiency is low, however, counteracting its other environmental advantages. Pressurised gas is injected tangentially into a swirl chamber near one end of a tube, leading to a rapid rotation—the first vortex—as it moves along the inner surface of the tube to the far end. A conical nozzle allows gas specifically from this outer layer to escape at that end through a valve. The remainder of the gas is forced to return in an inner vortex of reduced diameter within the outer vortex. Gas from the inner vortex transfers heat to the gas in the outer vortex, so the outer layer is hotter at the far end than it was initially. The gas in the central vortex is likewise cooler upon its return to the starting-point, where it is released from the tube. Method of operation To explain the temperature separation in a vortex tube, there are two main approaches: Fundamental approach: the physics This approach is based on first-principles physics alone and is not limited to vortex tubes only, but applies to moving gas in general. It shows that temperature separation in a moving gas is due only to enthalpy conservation in a moving frame of reference. The thermal process in the vortex tube can be estimated in the following way: The main physical phenomenon of the vortex tube is the temperature separation between the cold vortex core and the warm vortex periphery. The "vortex tube effect" is fully explained with the work equation of Euler, also known as Euler's turbine equation, which can be written in its most general vectorial form as: , where is the total, or stagnation t
https://en.wikipedia.org/wiki/Soft%20tissue%20injury
A soft tissue injury is the damage of muscles, ligaments and tendons throughout the body. Common soft tissue injuries usually occur from a sprain, strain, a one-off blow resulting in a contusion or overuse of a particular part of the body. Soft tissue injuries can result in pain, swelling, bruising and loss of function. Signs and symptoms Sprains A sprain is a type of acute injury which results from the stretching or tearing of a ligament. Depending on the severity of the sprain, the movement on the joint can be compromised since ligaments aid in the stability and support of joints. Sprains are commonly seen in vulnerable areas such as the wrists, knees and ankles. They can occur from movements such as falling on an outstretched hand or a twisting of the ankle or foot. The severity of a sprain can be classified: Grade 1: Only some of the fibers in the ligament are torn, and the injured site is moderately painful and swollen. Function in the joint will be unaffected for the most part. Grade 2: Many of the ligament fibers are torn, and pain and swelling is moderate. The functionality of the joint is compromised. Grade 3: The soft tissue is completely torn, and functionality and strength on the joint is completely compromised. In most cases, surgery is needed to repair the damage. Strains A strain is a type of acute injury that occurs to the muscle or tendon. Similar to sprains, it can vary in severity, from a stretching of the muscle or tendon to a complete tear of the tendon from the muscle. Some of the most common places that strains occur are in the foot, back of the leg (hamstring), or back. Bruising (contusion) A contusion is the discoloration of the skin, which results from underlying muscle fibers and connective tissue being crushed. This can happen in a variety of ways such as a direct blow to the skin, or a fall taken against a hard surface. The discoloration in the skin is present when blood begins to pool around the injury. Tendinitis Tendi
https://en.wikipedia.org/wiki/Flavor%20masker
In the beverage, food, and pharmaceutical industries, a flavor masker is a chemical interaction that causes the absence of taste. This is known as the Farish effect, a phenomenon noted by 18th-century chemist William Farish. Contrary to popular belief, a flavor masker is not one chemical component; rather, it is two components that interact with the vallate papillae on the tongue with little or no reaction. Each component, individually, stimulates the vallate papillae.
https://en.wikipedia.org/wiki/Tannaka%E2%80%93Krein%20duality
In mathematics, Tannaka–Krein duality theory concerns the interaction of a compact topological group and its category of linear representations. It is a natural extension of Pontryagin duality, between compact and discrete commutative topological groups, to groups that are compact but noncommutative. The theory is named after Tadao Tannaka and Mark Grigorievich Krein. In contrast to the case of commutative groups considered by Lev Pontryagin, the notion dual to a noncommutative compact group is not a group, but a category of representations Π(G) with some additional structure, formed by the finite-dimensional representations of G. Duality theorems of Tannaka and Krein describe the converse passage from the category Π(G) back to the group G, allowing one to recover the group from its category of representations. Moreover, they in effect completely characterize all categories that can arise from a group in this fashion. Alexander Grothendieck later showed that by a similar process, Tannaka duality can be extended to the case of algebraic groups via Tannakian formalism. Meanwhile, the original theory of Tannaka and Krein continued to be developed and refined by mathematical physicists. A generalization of Tannaka–Krein theory provides the natural framework for studying representations of quantum groups, and is currently being extended to quantum supergroups, quantum groupoids and their dual Hopf algebroids. The idea of Tannaka–Krein duality: category of representations of a group In Pontryagin duality theory for locally compact commutative groups, the dual object to a group G is its character group which consists of its one-dimensional unitary representations. If we allow the group G to be noncommutative, the most direct analogue of the character group is the set of equivalence classes of irreducible unitary representations of G. The analogue of the product of characters is the tensor product of representations. However, irreducible representations of G in general
https://en.wikipedia.org/wiki/Hypograph%20%28mathematics%29
In mathematics, the hypograph or subgraph of a function is the set of points lying on or below its graph. A related definition is that of such a function's epigraph, which is the set of points on or above the function's graph. The domain (rather than the codomain) of the function is not particularly important for this definition; it can be an arbitrary set instead of . Definition The definition of the hypograph was inspired by that of the graph of a function, where the of is defined to be the set The or of a function valued in the extended real numbers is the set Similarly, the set of points on or above the function is its epigraph. The is the hypograph with the graph removed: Despite the fact that might take one (or both) of as a value (in which case its graph would be a subset of ), the hypograph of is nevertheless defined to be a subset of rather than of Properties The hypograph of a function is empty if and only if is identically equal to negative infinity. A function is concave if and only if its hypograph is a convex set. The hypograph of a real affine function is a halfspace in A function is upper semicontinuous if and only if its hypograph is closed. See also Citations
https://en.wikipedia.org/wiki/100th%20meridian%20east
The meridian 100° east of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, Asia, the Indian Ocean, the Southern Ocean, and Antarctica to the South Pole. The 100th meridian east forms a great circle with the 80th meridian west. From Pole to Pole Starting at the North Pole and heading south to the South Pole, the 100th meridian east passes through: {| class="wikitable plainrowheaders" ! scope="col" width="130" | Co-ordinates ! scope="col" | Country, territory or sea ! scope="col" | Notes |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Arctic Ocean | style="background:#b0e0e6;" | |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Laptev Sea | style="background:#b0e0e6;" | |- | ! scope="row" | | Krasnoyarsk Krai — October Revolution Island, Severnaya Zemlya |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Kara Sea | style="background:#b0e0e6;" | |- | ! scope="row" | | Krasnoyarsk Krai — Bolshevik Island, Severnaya Zemlya |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Kara Sea | style="background:#b0e0e6;" | |-valign="top" | ! scope="row" | | Krasnoyarsk Krai Irkutsk Oblast — from Republic of Buryatia — from |- | ! scope="row" | | |-valign="top" | ! scope="row" | | Inner Mongolia Gansu — from Inner Mongolia — from Gansu — from Qinghai — from Sichuan — from Yunnan — from |- | ! scope="row" | (Burma) | |- | ! scope="row" | | |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Gulf of Thailand | style="background:#b0e0e6;" | |- | ! scope="row" | | |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Gulf of Thailand | style="background:#b0e0e6;" | |- | ! scope="row" | | Islands of Ko Pha Ngan and Ko Samui |- | style="background:#b0e0e6;" | ! scope="row" style="background:#b0e0e6;" | Gulf of Thailand | style="background:#b0e0e
https://en.wikipedia.org/wiki/2R%20hypothesis
The 2R hypothesis or Ohno's hypothesis, first proposed by Susumu Ohno in 1970, is a hypothesis that the genomes of the early vertebrate lineage underwent two complete genome duplications, and thus modern vertebrate genomes reflect paleopolyploidy. The name derives from the 2 rounds of duplication originally hypothesized by Ohno, but refined in a 1994 version, and the term 2R hypothesis was probably coined in 1999. Variations in the number and timings of genome duplications typically still are referred to as examples of the 2R hypothesis. The 2R hypothesis has been the subject of much research and controversy; however, with growing support from genome data, including the human genome, the balance of opinion has shifted strongly in favour of support for the hypothesis. According to Karsten Hokamp, Aoife McLysaght and Kenneth H. Wolfe, the version of the genome duplication hypothesis from which 2R hypothesis takes its name appears in Holland et al. and the term was coined by Austin L. Hughes. Ohno's argument Ohno presented the first version of the 2R hypothesis as part of his larger argument for the general importance of gene duplication in evolution. Based on relative genome sizes and isozyme analysis, he suggested that ancestral fish or amphibians had undergone at least one and possibly more cases of "tetraploid evolution". He later added to this argument the evidence that most paralogous genes in vertebrates do not demonstrate genetic linkage. Ohno argued that linkage should be expected in the case of individual tandem duplications (in which a duplicate gene is added adjacent to the original gene on the same chromosome), but not in the case of chromosome duplications. Later evidence In 1977, Schmidtke and colleagues showed that isozyme complexity is similar in lancelets and tunicates, contradicting a prediction of Ohno's hypothesis that genome duplication occurred in the common ancestor of lancelets and vertebrates. However, this analysis did not examine verte
https://en.wikipedia.org/wiki/European%20Federation%20of%20Parasitologists
The European Federation of Parasitologists (EFP) is a non-profit scientific international organization, founded in November 1966 by Witold Stefański who was its first president. It gathers around 30 national societies of parasitology of European countries. The original bylaws were published in the International Journal for Parasitology in 1979. Hundreds of European scientists are affiliated to the EFP through their national societies. The EFP is a member of the World Federation of Parasitologists . The EFP aims at helping human or animal health authorities in fighting any emerging parasitic problem. Aims The main objectives of the European Federation of Parasitologists are to promote the exchange of knowledge on parasitic organisms and diseases, to coordinate researches and networks related to parasitic organisms, to support of basic, veterinary & medical parasitology, to attract young scientists and students to develop researches in Parasitology and to organize a European Multicolloquium of Parasitology (EMOP) every 4 years. The European Federation of Parasitologists is registered in the EU transparency register ( ID: 68170229123-35) Colloquiums Eleven European Multicolloqium of Parasitology (EMOP) have been held so far : Rennes, France, 1–4 September 1971 Trogyr, Yugoslavia, 1–6 September 1975 Cambridge, United Kingdom, 7–13 September 1980 İzmir, Turkey, 14–19 October 1984 Budapest, Hungary, 4–9 September 1988 The Hague, Netherlands, 7–11 September 1992 Parma, Italy, 2–6 September 1996 Poznań, Poland, 10–14 September 2000 Valencia, Spain, 18–23 July 2004 Paris, France, 24–28 August 2008 Cluj Napoca, Romania, 25–29 July 2012. Turku, Finland, 20–24 July 2016, hosted by Scandinavian-Baltic Society for Parasitology (SBSP). Awards and Scholarships The EFP offers, during the EMOP, Young Scientist Awards to stimulate the involvement of young scientists in the development of parasitology in Europe. Awards are in two areas: "Research in Basic Parasitology" a
https://en.wikipedia.org/wiki/Moedomo%20Soedigdomarto
Moedomo Soedigdomarto, also spelled Mudomo Sudigdomarto, (29 November 1927, Magetan – 5 November 2005, Bandung) was an Indonesian mathematician, educator and professor at the Bandung Institute of Technology, of which he was rektor. Soedigdomarto was one of the first Indonesians to obtain a Ph.D. in mathematics, which he earned from the University of Illinois Urbana-Champaign, with a dissertation titled "A Representation Theory for the Laplace Transform of Vector-Valued Functions", in 1959 at the age of 32, under the orientation of Robert Gardner Bartle. Soedigdomarto was the first Indonesian to have a paper recorded in Mathematical Reviews (Moedomo and J. J. Uhl, Jr. "Radon-Nikodym theorems for the Bochner and Pettis integrals" published in the Pacific Journal of Mathematics in 1971).
https://en.wikipedia.org/wiki/RegulonDB
RegulonDB is a database of the regulatory network of gene expression in Escherichia coli K-12. RegulonDB also models the organization of the genes in transcription units, operons and regulons. A total of 120 sRNAs with 231 total interactions which all together regulate 192 genes are also included. RegulonDB was founded in 1998 and also contributes data to the EcoCyc database. Transcription factors and sensory-response units In bacteria, such as E. coli, genes, are regulated by sequence elements in promoters and related binding sites). RegulonDB provides a database of such regulatory elements, their binding sites and the transcription factors that bind to these sites in E. coli. RegulonDB 9.0 includes 184 experimentally determined transcription factors (TFs) as well as 120 computationally predicted TFs, that is, a total of 304. The complete repertoire of 189 genetic sensory-response units (GENSOR units) are reported, integrating their signal, regulatory interactions, and metabolic pathways. A total of 78 GENSOR units have their four components highlighted; 119 include the genetic switch and the response, and 2 contain only the genetic switch. A total of 103 TFs have a known effector in RegulonDB, including 25 two-component systems. There were enough sites to build a motif for 93 TFs to infer 16,207 predicted TF binding sites. This set of predicted binding sites corresponds to 12,574 TF → gene regulatory interactions; this represents a recovery of 52% of the 1592 annotated regulatory interactions in the database for the 93 TFs for which RegulonDB has a position-weight matrix (PWM). If only TFs with a good-quality PWM are taken into account, the total number of predicted TF → gene interactions is 8,714, recovering 672 (57%) of annotated interactions for this TF subset. Semi-automatic curation produced a total of 3,195 regulatory interactions for 199 TFs. Definitions Check the glossary for all definitions. Transcription unit (TU) A transcription unit is a s
https://en.wikipedia.org/wiki/Ramaria%20rasilispora
Ramaria rasilispora, commonly known as the yellow coral, is a coral mushroom in the family Gomphaceae. Described as new to science in 1974, it is found in western North America south to Mexico, and in the eastern Himalaya. Taxonomy The species was first described scientifically in 1974 by American mycologists Currie Marr and Daniel Stuntz. The specific epithet rasilispora is derived from the roots rasil- (shaved, scraped, or worn smooth) and spora (spore). It is commonly known as the "yellow coral". Description The fruit bodies are large and broad, measuring or more tall and wide. They originate from a single thick, conical stem measuring long by wide; this base is branched up to seven times, and the branches are themselves polychotomously (multiply) or dichotomously (divided into two) branched. The branches are smooth and cream to pale yellow in color, except in young specimens that lack coloration. Primary branches are thick, from in diameter, while upper branches are usually thick. The context is fleshy to fibrous, but when dry has a consistency similar to bendable chalk. In young fruit bodies, the stipe and lower branches are whitish to light yellowish. Upper branches are light orange to apricot-yellow, maturing to a pale grayish-orange. Branch tips are initially the same color as the branch, but darken to brown in maturity or when dry. Fruit bodies have no distinctive taste or odor. Spores are cylindrical, with a surface texture ranging from smooth to finely warted, and measure 8–11 by 3–4 μm. The basidia (spore-bearing cells) are club-shaped, two- to four-spored (most have four spores), and measure 47–60 by 8–10 μm. The variety Ramaria rasilispora var. scatesina differs from the main type in the color of its fruit bodies, which, in both young and mature specimens, have branches that range from yellowish-white to light yellow. The fruit bodies are edible, and "quite popular" according to David Arora, who reports its use raw in salads, or candied like
https://en.wikipedia.org/wiki/Brevifollis
Brevifollis is a Gram-negative genus of bacteria from the family of Verrucomicrobiaceae with one known species (Brevifollis gellanilyticus).
https://en.wikipedia.org/wiki/Weak%20operator%20topology
In functional analysis, the weak operator topology, often abbreviated WOT, is the weakest topology on the set of bounded operators on a Hilbert space , such that the functional sending an operator to the complex number is continuous for any vectors and in the Hilbert space. Explicitly, for an operator there is base of neighborhoods of the following type: choose a finite number of vectors , continuous functionals , and positive real constants indexed by the same finite set . An operator lies in the neighborhood if and only if for all . Equivalently, a net of bounded operators converges to in WOT if for all and , the net converges to . Relationship with other topologies on B(H) The WOT is the weakest among all common topologies on , the bounded operators on a Hilbert space . Strong operator topology The strong operator topology, or SOT, on is the topology of pointwise convergence. Because the inner product is a continuous function, the SOT is stronger than WOT. The following example shows that this inclusion is strict. Let and consider the sequence of right shifts. An application of Cauchy-Schwarz shows that in WOT. But clearly does not converge to in SOT. The linear functionals on the set of bounded operators on a Hilbert space that are continuous in the strong operator topology are precisely those that are continuous in the WOT (actually, the WOT is the weakest operator topology that leaves continuous all strongly continuous linear functionals on the set of bounded operators on the Hilbert space H). Because of this fact, the closure of a convex set of operators in the WOT is the same as the closure of that set in the SOT. It follows from the polarization identity that a net converges to in SOT if and only if in WOT. Weak-star operator topology The predual of B(H) is the trace class operators C1(H), and it generates the w*-topology on B(H), called the weak-star operator topology or σ-weak topology. The weak-operator and σ-weak topolog
https://en.wikipedia.org/wiki/Validator
A validator is a computer program used to check the validity or syntactical correctness of a fragment of code or document. The term is commonly used in the context of validating HTML, CSS, and XML documents like RSS feeds, though it can be used for any defined format or language. Accessibility validators are automated tools that are designed to verify compliance of a web page or a web site with respect to one or more accessibility guidelines (such as WCAG, Section 508 or those associated with national laws such as the Stanca Act). See also CSS HTML Validator for Windows HTML Tidy W3C Markup Validation Service Well-formed element XML validation
https://en.wikipedia.org/wiki/Gale%E2%80%93Shapley%20algorithm
In mathematics, economics, and computer science, the Gale–Shapley algorithm (also known as the deferred acceptance algorithm or propose-and-reject algorithm) is an algorithm for finding a solution to the stable matching problem, named for David Gale and Lloyd Shapley. It takes polynomial time, and the time is linear in the size of the input to the algorithm. It is a truthful mechanism from the point of view of the proposing participants, for whom the solution will always be optimal. Background The stable matching problem, in its most basic form, takes as input equal numbers of two types of participants ( job applicants and employers, for example), and an ordering for each participant giving their preference for whom to be matched to among the participants of the other type. A stable matching always exists, and the algorithmic problem solved by the Gale–Shapley algorithm is to find one. A matching is not stable if: In other words, a matching is stable when there is no pair (A, B) where both participants prefer each other to their matched partners. If such a pair exists, the matching is not stable, in the sense that the members of this pair would prefer to leave the system and be matched to each other, possibly leaving other participants unmatched. Solution In 1962, David Gale and Lloyd Shapley proved that, for any equal number of participants of each type, it is always possible to find a matching in which all pairs are stable. They presented an algorithm to do so. In 1984, Alvin E. Roth observed that essentially the same algorithm had already been in practical use since the early 1950s, in the National Resident Matching Program. The Gale–Shapley algorithm involves a number of "rounds" (or "iterations"). In terms of job applicants and employers, it can be expressed as follows: In each round, any subset of the employers with open job positions makes a job offer to the applicant they prefer, among the ones they have not yet already made an offer to. Each applic
https://en.wikipedia.org/wiki/TV-out
The term TV-out is commonly used to label the connector of equipment providing an analog video signal acceptable for a television AV input. TV-out is different from AV-out in that it only provides video, no audio. Types of signals and their respective connectors include: Composite video S-video Component video See AV input for more information. Television technology Graphics cards
https://en.wikipedia.org/wiki/Delayed%20milestone
A delayed milestone, which is also known as a developmental delay, refers to a situation where a child does not reach a particular developmental milestone at the expected age. Developmental milestones refer to a collection of indicators that a child is anticipated to reach as they grow older. Each age group has its distinct set of milestones, representing behaviors that develop gradually and serve as foundational building blocks for growth and ongoing learning. These behavioral milestones fall into various categories of child development stages, including: Adaptive skills: Activities of daily living, such as putting on clothes, eating, and washing independently. Cognition and intellect: Involves thinking, solving problems, making judgements and comprehension. Emotional expression: Includes facial movements, such as a smile when happy, or an action, such as giving a gift to express gratitude Language: Being able to communicate verbally with speech and/or nonverbally with gesture Motor coordination: Encompasses both gross and fine motor skills, such as jumping and drawing. Sensory: Vision, hearing, touch, taste, smell Social interaction: Involves the ability to initiate contact with peers and engage in group play. Epidemiology Developmental delay is prevalent in approximately 1-3% of children under the age of 5 worldwide. According to a systematic analysis done for a conducted study in 2016, there are approximately 52.9 million children worldwide under the age of 5 that are affected by some type of developmental delay or delayed milestone. For example, the prevalence of autism spectrum disorders was estimated to be 2.64%. 95% of the children with these delayed milestones live in countries with low to middle income and have very limited availability of healthcare resources. There is a risk of having a delayed milestone if a child live in an under-resourced nation. Causes Delayed milestones can manifest as early as infancy and develop later in early school
https://en.wikipedia.org/wiki/Operations%20security
Operations security (OPSEC) or operational security is a process that identifies critical information to determine whether friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information. The term "operations security" was coined by the United States military during the Vietnam War. History Vietnam In 1966, United States Admiral Ulysses Sharp established a multidisciplinary security team to investigate the failure of certain combat operations during the Vietnam War. This operation was dubbed Operation Purple Dragon, and included personnel from the National Security Agency and the Department of Defense. When the operation concluded, the Purple Dragon team codified their recommendations. They called the process "Operations Security" in order to distinguish the process from existing processes and ensure continued inter-agency support. NSDD 298 In 1988, President Ronald Reagan signed National Security Decision Directive (NSDD) 298. This document established the National Operations Security Program and named the Director of the National Security Agency as the executive agent for inter-agency OPSEC support. This document also established the Interagency OPSEC Support Staff (IOSS). Private-sector application The private sector has also adopted OPSEC as a defensive measure against competitive intelligence collection efforts. See also For Official Use Only – FOUO Information security Intelligence cycle security Security Security Culture Sensitive but unclassified – SBU Controlled Unclassified Information - CUI Social engineering
https://en.wikipedia.org/wiki/Metafont
Metafont is a description language used to define raster fonts. It is also the name of the interpreter that executes Metafont code, generating the bitmap fonts that can be embedded into e.g. PostScript. Metafont was devised by Donald Knuth as a companion to his TeX typesetting system. One of the characteristics of Metafont is that the points defining the shapes of the glyphs—for example top of a stem, or intersection of a stem and crossbar—are defined with geometrical equations; the intent that the three stems of an ‘m’ are equally spaced horizontally might be expressed as if points 1, 2, and 3 are at the bottom ends of the three stems, whereas the intent that they all end on the same vertical position would be . Metafont is a macro language, where operations such as "draw a lower case top of stem serif at point 4" might appear as one macro instruction (with the point as argument) in the program for a letter. For describing shapes, Metafont has a rich set of path construction operations that mostly relieves the user of having to calculate control points. Many families of Metafont fonts are set up so that the main source file for a font only defines a small number of design parameters (x-height, em width, slant, vertical stroke width, etc.), then calling a separate source file common for a whole range of fonts to actually draw the individual glyphs; this is the meta aspect of the system. Modes of operation Metafont is most often run as a helper to output device (printer, screen) drivers; in those cases, its job is to generate bitmaps for a font for a specific combination of output device (called a mode in Metafont) and resolution (visible in the name of the output file, see below). These bitmaps are typically stored for later reuse, so that Metafont does not have to be run every time a document is displayed, but on the other hand TeX distributions with a Metafont component have typically not included any prebuilt bitmap fonts, since they would be rather large i
https://en.wikipedia.org/wiki/Ant%20communication
Ant communication involves pheromones, which is a method using chemical trails for other ants or insects to find and follow. Background Ants have many different pheromones, depending on the species. When an ant finds something interesting, whether it is food or an enemy, it excretes a chemical substance from it and drags it along the floor to the colony. When a different worker sets its antenna down on the trail, it senses the trail, changes its own behavior (depending on the specific pheromone) and follows it depending on what kind. If it is a food trail, the worker will follow the trail to find the food; If it does find the food, it will go back to the colony and strengthen the trail, making more and more workers to follow the trail. Same thing with attacking/defending the colony, when detected, other workers will begin attacking the enemy inside a circle of pheromones, rather than a trail.
https://en.wikipedia.org/wiki/OmniPeek
Omnipeek is a packet analyzer software tool from Savvius, a LiveAction company, for network troubleshooting and protocol analysis. It supports an application programming interface (API) for plugins. History Savvius (formerly WildPackets) was founded in 1990 as The AG Group by Mahboud Zabetian and Tim McCreery. In 2000 the company changed its name to WildPackets to address the popular market it had developed for its products. The first product by the company was written for the Macintosh and was called EtherPeek. It was the first affordable software-only protocol analyzer for Ethernet networks. It was later ported to Microsoft Windows, which was released in 1997. Earlier, LocalPeek and TokenPeek were developed for LocalTalk and Token Ring networks respectively. In 2001, AiroPeek was released, which added support for wireless IEEE 802.11 (marketed with the Wi-Fi brand) networks. In 2003, the OmniEngine Distributed Capture Engine was released as software, and as a hardware network recorder appliance. In the early morning of July 15, 2002, WildPackets' building in Walnut Creek, California burnt to the ground including everything in it. However, no one was hurt and the employees regrouped at a new location and the company survived the fire. Mid-April 2015, the company changed its name from WildPackets to Savvius and broadened its focus to include network security. In June 2018, Savvius was acquired by LiveAction, a company that provides network performance management, visualization and analytics software. Acquisitions Savvius acquired Net3 Group in November 2000. Their product, NetSense, an expert system for network troubleshooting, was converted initially converted into a plug-in and then later fully integrated into a new version of the product called EtherPeekNX. Savvius acquired Optimized Engineering Corporation in 2001. Optimized network analysis instructors, training courses and certifications were added to Savvius' services. Extensibility Omnipeek has
https://en.wikipedia.org/wiki/Ingrid%20Hornef
Ingrid Hornef (born August 12, 1940) is a German sculptor, installation artist, curator and painter. She is a representative of Concrete art and became best known for using a dice as a random number generator in her series of works Alea iacta est (Latin for the die is cast). Life Ingrid Hornef acquired her professional skills as an autodidact and opened her own studio in 1985. In her early days, she was mainly concerned with pottery and attended ceramic courses in 1984 and 1985 with the well-known Japanese ceramic artist Takeshi Yasuda. In 1992 she took part in workshops by Mária Geszler Garzuly in Kecskemét , Hungary. Besides her work as an artist, Hornef is also active as a curator. In 2002, she initiated the temporary sculpture trail Land schafft Kunst (Land Creates Art) as part of the Rhine-Main Regional Park between Hochheim-Massenheim and Wiesbaden-Delkenheim. The area is a typical industrial landscape with seemingly intact nature, but at the same time there are high-rise buildings and high-voltage power lines that dominate the landscape. Hornef invited 21 artists to create their works especially for this place. In July 2019, Hornef organized a German-Greek–WWII–memorial and peace project named Building Bridges, together with city councilor Annette Courtis, who has Greek roots and who, like Hornef, lives in Hofheim am Taunus. In a small village called Chouni (municipal district of Agrinio), Greece, 16 German and Greek artists created works of art from sandstone under the direction of Hornef, in which they dealt with the history of Chouni during World War II. The village had been almost completely burned down by German soldiers in 1944. Parallel to this, lectures on the effects of the Second World War in Greece were held. The resulting sculptures were permanently installed on the village square in Chouni. In July 2021, a corresponding workshop took place in Hofheim, again led by Hornef. Here, too, the invited German and Greek artists formed works of art in