source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Apple%20II%20peripheral%20cards
The Apple II line of computers supported a number of Apple II peripheral cards. In an era before plug and play USB or Bluetooth connections, these were expansion cards that plugged into slots on the motherboard. They added to and extended the functionality of the base motherboard when paired with specialized software that enabled the computer to read the input/output of the devices on the other side of the cable (the peripheral) or to take advantage of chips on the board - as was the case with memory expansion cards. All Apple II models except the Apple IIc had at least seven 50-pin expansion slots, labeled Slots 1 though 7. These slots could hold printed circuit board cards with double-sided edge connectors, 25 "fingers" on each side, with 100 mil (0.1 inch) spacing between centers. Slot 3 in an Apple IIe that has an 80-column card fitted (which is usually the case) and Slots 1 through 6 in a normally configured Apple IIgs are "virtually" filled with on-board devices which means that the physical slots cannot be used at all, or only with certain specific cards, unless the conflicting "virtual" device is disabled. In addition to the seven standard expansion slots, the following computers contained additional, largely special-purpose expansion slots: Apple II and Apple II Plus: Slot 0 (50-pin, for the firmware card or the 16 kB Apple II Language Card) Apple IIe: Auxiliary Slot (60-pin; primarily for 80-column display and memory expansion) Apple IIgs: Memory Expansion Slot (40-pin) Perhaps the most common cards found on early Apple II systems were the Disk II Controller Card, which allowed users of earlier Apple IIs to use the Apple Disk II, a 5¼ inch, 140 kB floppy disk drive; and the Apple 16K Language Card, which increased the base memory of late-model Apple II and standard Apple II Plus units from 48 kB to 64 kB. The Z-80 SoftCard, making the computer compatible with CP/M software, was also very popular. Both Apple and dozens of third-party vendors created
https://en.wikipedia.org/wiki/Robert%20Huggins
Robert Alan Huggins is Professor Emeritus at the Department of Materials Science and Engineering at the School of Engineering at Stanford University and Honorary Professor at the University of Kiel and the University of Ulm. He was previously Chief Scientist at the Center for Solar Energy and Hydrogen Research in Ulm. The International Society for Solid State Ionics (ISSI) held a symposium in his honor in 2009, in recognition of his work on fundamental properties and behavior of materials, solid state ionic probing techniques, catalytic behavior at gas–solid interfaces, and the development of electrodes for Lithium Ion batteries. Education Robert Alan Huggins is the son of chemist Maurice Loyal Huggins, known for the Huggins equation and the Flory–Huggins theory. Robert Huggins earned his BA in Physics from Amherst College, and went on to obtain an MS and Sc.D. in Metallurgy from the Massachusetts Institute of Technology, where he also served as an instructor. Career Huggins joined the Stanford faculty in 1954. He established Stanford's Department of Materials Science and Engineering in 1959 and its Center for Materials Research program in 1961. He became a full professor in 1962. Huggins also served as Director of Materials Sciences at the Advanced Research Projects Agency (ARPA) in Washington, D.C. from 1968–1970. Huggins spent a sabbatical in 1965 and 1966 working with Carl Wagner at the Max Planck Institute for Biophysical Chemistry in Göttingen, Germany, an experience he later described as pivotal for his later work on lithium-ion batteries. He was one of the founders of the Materials Research Society in 1973. In 1987 he co-founded the International Society for Solid State Ionics (ISSI), serving as its first President from 1987–1989. Huggins was the founding editor of the Annual Review of Materials Science from 1971–1993 and the editor of the journals Solid State Ionics and Materials Research Bulletin. As of October 1991, Huggins became the Chief Sc
https://en.wikipedia.org/wiki/PEPR1%20and%20PEPR2
PEPR 1 and PEPR2 (Perception of the Arabidopsis Danger Signal Peptide 1 or 2) are homolog kinases that act as enzymes on other proteins. They attach a phosphate group to specific proteins, called phosphorylation. These reactions can cause the function of the phosphorylated proteins to change. Both PEPR 1 and PEPR 2 can be classified as receptor kinases, which serve an important role in immunity in plants. Receptor kinases have the ability to change the conformation of receptors by adding the phosphate group. These specific receptor kinases serve as a pattern recognition receptor, or PRR, that can quickly and efficiently recognize many different molecular patterns or signatures that are unique to each pathogen. They can also detect different danger signals released from the host and respond accordingly. More specifically, the proteins contain leucine-rich repeat segments that interact outside of the cell. This leucine-rich repeat is a structural motif present in some proteins that has specific functions due to its folded structure. This fold can contain many repeating amino acids, but the most common is the hydrophobic leucine, hence the name. PEPR1 and PEPR2 are present in plants and are involved in several immune system processes. Their ability to change the conformation of receptors can have an effect on signaling processes within plants, allowing the plant to have a system of immunity in place in case of an infection or pathogen. Discovery The PEPR1 and PEPR2 kinases that bind to the receptors AtPEPR1 and AtPEPR2, respectively were identified. Through photolabeling with a radioactively marked ligand, an AtPep1 receptor was able to be purified and later duplicated. This led to the discovery of the first damage associated molecular pattern or DAMP/pattern recognition receptor couple in Arabidopsis, otherwise known as the thale cress, which is a small flowering plant common in Eurasia. This discovered receptor was coined PEPR1, PEP receptor 1. Further analys
https://en.wikipedia.org/wiki/Care%20farming
Care farming is the use of farming practices for the stated purpose of providing or promoting healing, mental health, social, or educational care services. Convicts may also be required to spend time at care farms. Care farms may provide supervised, structured programs of farming-related activities, including animal husbandry, crop and vegetable production and woodland management. Effectiveness Working on a care farm can help adult offenders gain new skills. In nineteenth century Scotland, teaching farming skills to young offenders was tried as a means of reducing recidivism and promoting honest labour. The farm school at Riddrie in the period 1866-68 taught 158 boys. Of these, 64 were subsequently described as "doing well" (ie keeping out of a life of crime). The Riddrie experiment ended due to unrelated costs issues in 1871. More studies on care farming are desirable to determine whether it can be an alternative and adjuvant therapy for people with certain mental illnesses (such as anxiety or depression). Care farming can be beneficial for the animals on the farm. For example, greater exposure to humans has the potential to reduce some of the stresses caused by typical agricultural practices. Having more people see the animals may increase the detection of parasites or other animal health issues. History Benjamin Rush (1746–1813) published 5 books in a series of Medical Inquiries and Observations, the last being concerned with The Diseases of The Mind (1812). In this volume, the practice of horticulture is mentioned twice. See also Animal-assisted therapy Ecopsychology Green exercise Horticultural therapy Prison farm
https://en.wikipedia.org/wiki/Le%20Vaillant
Le Vaillant (French: The Valiant) (died 4 June 1916) was a pigeon used by the French Army in the First World War. The bird was the last held at Fort Vaux before it was overrun in the Battle of Verdun. Le Vaillant carried a message from the fort's commander Sylvain Reynal to his senior officers requesting reinforcements but was mortally wounded in flight. The bird was posthumously appointed to the Legion of Honour and is commemorated by a plaque at the fort. Background Fort Vaux was a fortification guarding the north-east approach to the city of Verdun. The fort was besieged by German forces during the 1916 Battle of Verdun and by early June the remaining French garrison was under the command of Commandant Sylvain Raynal. Telephone connection between the fort and the had been severed by German troops and Raynal's only means of communication was by messenger pigeon, of which he had four. With German attacks continuing to gain ground Raynal sent the first of his pigeons on 2 June. The message requested that artillery fire be directed upon the fort against German troops that had occupied its upperworks. The pigeon arrived at the citadel, despite injury but had lost the ring containing the message. Raynal's penultimate bird was received and was awarded the Croix de Guerre for its flight. Flight of 4 June On 4 June Raynal released his last pigeon, number 787.15, named Le Vaillant. The message he bore included the text "we are holding. But ... relief is imperative ... This is my last pigeon". Le Vaillant had been affected by gas released from German shells and was revived by a number of trips to a loophole in Raynal's command post. He set off at 11:30 a.m. Le Vaillant delivered the message to the dovecot at the citadel. The bird was grievously wounded and died in the hands of the citadel's pigeon master. Because of the message, five relief parties were sent to reinforce Raynal, arriving on 5 June. The garrison lacked water and ammunition and Raynal was
https://en.wikipedia.org/wiki/Hispania%20%28personification%29
Hispania is the national personification of Spain. The antecedent of this representation were some coins on which there was a horseman holding a lance and the legend HISPANORVM. These coins corresponded to the first half of the 2nd century BC and were minted in Morgantina (Sicily). These coins were carried out by the Hispanic mercenaries who received the government of this Sicilian city by order of the Roman Senate during the Second Punic War. The first representation of Hispania appeared during the Roman Republic as the head of a woman with the legend HISPAN, and was minted in Rome by the Roman family Postumia (81 B.C.). Since then different coins emerged with allegorical representations of Hispania with different characteristics during the entire Roman era. Like other coins with provincial allegories, it would fall into disuse due to the prevalence of symbols of Rome and Constantinople being minted on coins and would not reappear until the Spanish peseta, which itself was based upon the allegory used during the reign of Hadrian. From then on, the allegory would be made into monuments, statues and reliefs. Hispania in numismatics The antecedent of the allegory of Hispania was a series of coins minted in Morgantina (Sicily) by Hispanic mercenaries who ruled this city by order of the Senate during the Second Punic War. In these, an equine horseman with a spear and with the legend HISPANORVM was represented. The next known reference to Hispania was a coin minted by the Annia family where the legend appears: L. F. FABI. L.F. HISP. / Q which was an abbreviation for Lucius Fabius L.f. Hispaniensis / Quaestor. This coin was minted to commemorate the participation of Lucius Fabius during a campaign in Hispania in the Sertorian War. The beginnings The first representation of Hispania arose in the Roman Republic. It consisted of a woman's head with the legend HISPAN. It was minted in Rome by the Postumia family in 81 a. C. referring to his predecessor L. Postumius A
https://en.wikipedia.org/wiki/Genomic%20convergence
Genomic convergence is a multifactor approach used in genetic research that combines different kinds of genetic data analysis to identify and prioritize susceptibility genes for a complex disease. Early applications In January 2003, Michael Hauser along with fellow researchers at the Duke Center for Human Genetics (CHG) coined the term “genomic convergence” to describe their endeavor to identify genes affecting the expression of Parkinson disease (PD). Their work successfully combined serial analysis of gene expression (SAGE) with genetic linkage analysis. The authors explain, “While both linkage and expression analyses are powerful on their own, the number of possible genes they present as candidates for PD or any complex disorder remains extremely large”. The convergence of the two methods allowed researchers to decrease the number of possible PD genes to consider for further study. Their success prompted further use of the genomic convergence method at the CHG, and in July 2003 Yi-Ju Li, et al. published a paper revealing that glutathione S-transferase omega-1 (GSTO1) modifies the age-at-onset (AAO) of Alzheimer disease (AD) and PD. In May 2004, Dr. Margaret Pericak-Vance, currently the director of the John P. Hussman Institute for Human Genomics at the University of Miami Miller School of Medicine and then the director of the CHG, articulated the value of the genomic convergence method at a New York Academy of Sciences (NYAS) keynote address entitled "Novel Methods in Genetic Exploration of Neurodegenerative Disease." She stated, "No single method is going to get us where we need to be with these complex traits. It is going to take a combination of methods to dissect the underlying etiology of these disorders". Recent and future applications Genomic convergence has a countless number of creative applications that combine the strengths of different analyses and studies. Maher Noureddine et al., note in their 2005 paper, “One of the growing problems in the s
https://en.wikipedia.org/wiki/Poincar%C3%A9%20plot
A Poincaré plot, named after Henri Poincaré, is a type of recurrence plot used to quantify self-similarity in processes, usually periodic functions. It is also known as a return map. Poincaré plots can be used to distinguish chaos from randomness by embedding a data set in a higher-dimensional state space. Given a time series of the form a return map in its simplest form first plots (xt, xt+1), then plots (xt+1, xt+2), then (xt+2, xt+3), and so on. Applications in electrocardiography An electrocardiogram (ECG) is a tracing of the voltage changes in the chest generated by the heart, whose contraction in a normal person is triggered by an electrical impulse that originates in the sinoatrial node. The ECG normally consists of a series of waves, labeled the P, Q, R, S and T waves. The P wave represents depolarization of the atria, the Q-R-S series of waves depolarization of the ventricles and the T wave repolarization of the ventricles. The interval between two successive R waves (the RR interval) is a measure of the heart rate. The heart rate normally varies slightly: during a deep breath, it speeds up and during a deep exhalation, it slows down. (The RR interval will shorten when the heart speeds up, and lengthen when it slows.) An RR tachograph is a graph of the numerical value of the RR-interval versus time. In the context of RR tachography, a Poincaré plot is a graph of RR(n) on the x-axis versus RR(n + 1) (the succeeding RR interval) on the y-axis, i.e. one takes a sequence of intervals and plots each interval against the following interval. The recurrence plot is used as a standard visualizing technique to detect the presence of oscillations in non-linear dynamic systems. In the context of electrocardiography, the rate of the healthy heart is normally tightly controlled by the body's regulatory mechanisms (specifically, by the autonomic nervous system). Several research papers demonstrate the potential of ECG signal-based Poincaré plots in detecting he
https://en.wikipedia.org/wiki/Ignitron
An ignitron is a type of gas-filled tube used as a controlled rectifier and dating from the 1930s. Invented by Joseph Slepian while employed by Westinghouse, Westinghouse was the original manufacturer and owned trademark rights to the name "Ignitron". Ignitrons are closely related to mercury-arc valves but differ in the way the arc is ignited. They function similarly to thyratrons; a triggering pulse to the igniter electrode turns the device "on", allowing a high current to flow between the cathode and anode electrodes. After it is turned on, the current through the anode must be reduced to zero to restore the device to its nonconducting state. They are used to switch high currents in heavy industrial applications. Construction and operation An ignitron is usually a large steel container with a pool of mercury in the bottom that acts as a cathode during operation. A large graphite or refractory metal cylinder, held above the pool by an insulated electrical connection, serves as the anode. An igniting electrode (called the ignitor), made of a refractory semiconductor material such as silicon carbide, is briefly pulsed with a high current to create a puff of electrically conductive mercury plasma. The plasma rapidly bridges the space between the mercury pool and the anode, permitting heavy conduction between the main electrodes. At the surface of the mercury, heating by the resulting arc liberates large numbers of electrons which help to maintain the mercury arc. The mercury surface thus serves as the cathode, and current is normally only in one direction. Once ignited, an ignitron will continue to pass current until either the current is externally interrupted or the voltage applied between cathode and anode is reversed. Applications Ignitrons were long used as high-current rectifiers in major industrial and utility installations where thousands of amperes of AC must be converted to DC, such as aluminum smelters. Ignitrons were used to control the current in el
https://en.wikipedia.org/wiki/Tachyonic%20antitelephone
A tachyonic antitelephone is a hypothetical device in theoretical physics that could be used to send signals into one's own past. Albert Einstein in 1907 presented a thought experiment of how faster-than-light signals can lead to a paradox of causality, which was described by Einstein and Arnold Sommerfeld in 1910 as a means "to telegraph into the past". The same thought experiment was described by Richard Chace Tolman in 1917; thus, it is also known as Tolman's paradox. A device capable of "telegraphing into the past" was later also called a "tachyonic antitelephone" by Gregory Benford et al. According to current understanding of physics, no such faster-than-light transfer of information is actually possible. One-way example Tolman used the following variation of Einstein's thought experiment: Imagine a distance with endpoints and . Let a signal be sent from A propagating with velocity towards B. All of this is measured in an inertial frame where the endpoints are at rest. The arrival at B is given by: Here, the event at A is the cause of the event at B. However, in the inertial frame moving with relative velocity v, the time of arrival at B is given according to the Lorentz transformation (c is the speed of light): It can be easily shown that if a > c, then certain values of v can make Δt' negative. In other words, the effect arises before the cause in this frame. Einstein (and similarly Tolman) concluded that this result contains in their view no logical contradiction; he said, however, it contradicts the totality of our experience so that the impossibility of a > c seems to be sufficiently proven. Two-way example A more common variation of this thought experiment is to send back the signal to the sender (a similar one was given by David Bohm). If Alice (A) is on a spacecraft moving away from the Earth in the positive x-direction with a speed , and she wants to communicate with Bob (B) back home. Assuming both of them have a device that is capable of t
https://en.wikipedia.org/wiki/Mathematical%20finance
Mathematical finance, also known as quantitative finance and financial mathematics, is a field of applied mathematics, concerned with mathematical modeling of financial markets. In general, there exist two separate branches of finance that require advanced quantitative techniques: derivatives pricing on the one hand, and risk and portfolio management on the other. Mathematical finance overlaps heavily with the fields of computational finance and financial engineering. The latter focuses on applications and modeling, often by help of stochastic asset models, while the former focuses, in addition to analysis, on building tools of implementation for the models. Also related is quantitative investing, which relies on statistical and numerical models (and lately machine learning) as opposed to traditional fundamental analysis when managing portfolios. French mathematician Louis Bachelier's doctoral thesis, defended in 1900, is considered the first scholarly work on mathematical finance. But mathematical finance emerged as a discipline in the 1970s, following the work of Fischer Black, Myron Scholes and Robert Merton on option pricing theory. Mathematical investing originated from the research of mathematician Edward Thorp who used statistical methods to first invent card counting in blackjack and then applied its principles to modern systematic investing. The subject has a close relationship with the discipline of financial economics, which is concerned with much of the underlying theory that is involved in financial mathematics. While trained economists use complex economic models that are built on observed empirical relationships, in contrast, mathematical finance analysis will derive and extend the mathematical or numerical models without necessarily establishing a link to financial theory, taking observed market prices as input. See: Valuation of options; Financial modeling; Asset pricing. The fundamental theorem of arbitrage-free pricing is one of the key theor
https://en.wikipedia.org/wiki/Typhloesus
Typhloesus wellsi is an extinct species of enigmatic bilaterian animals from the Bear Gulch Limestone. It was once thought to be the first body fossil of a conodont, based on what turned out to be its gut contents; it is now thought to exhibit a radula, which would make it a mollusc, although different types of animal have independently evolved radula-like features. Mark Purnell, of the Centre for Palaeobiology at the University of Leicester, said that it was not definitively known "what this weird thing is". Discovery Typhloesus was first described back in 1973 from Carboniferous rocks in Montana. The animal was then jokingly referred to as the ‘alien goldfish’ by subsequent studies. Because of its highly enigmatic nature, this organism was only mentioned briefly in several papers. It was then thought to have been the first known body fossil of a conodont, which are a primitive group of jawless agnathan fish distantly related to lampreys and hagfish. This was based on the presence of "conodont elements", which are the small comb-like teeth of those animals. The teeth however were actually located in the gut contents of the Typhloesus, meaning that while it wasn't a conodont, they were a part of its diet. The animals taxonomy would be shrouded in mystery for over 30 years until in September 2022, when a new paper published revealed several potential mollusk-like features of the animal. Description It has a fusiform (spindle-shaped) body, with a maximum length of 90 mm. At the posterior or backside of the animal is a caudal fin, which was supported by two sets of orthogonal fin rays. The exterior lacks any other organs. The internal anatomy consists of a foregut and a midgut. The gut lacks a midsection and an anus. Beneath the midgut is a disc shaped organ, tentatively called a ferrodiscus; the purpose of this organ is unknown, however it has a high concentration of iron. Paleoecology It might have been both a predator and a scavenger, as its fossils sometime
https://en.wikipedia.org/wiki/Bud
In botany, a bud is an undeveloped or embryonic shoot and normally occurs in the axil of a leaf or at the tip of a stem. Once formed, a bud may remain for some time in a dormant condition, or it may form a shoot immediately. Buds may be specialized to develop flowers or short shoots or may have the potential for general shoot development. The term bud is also used in zoology, where it refers to an outgrowth from the body which can develop into a new individual. Overview The buds of many woody plants, especially in temperate or cold climates, are protected by a covering of modified leaves called scales which tightly enclose the more delicate parts of the bud. Many bud scales are covered by a gummy substance which serves as added protection. When the bud develops, the scales may enlarge somewhat but usually just drop off, leaving a series of horizontally-elongated scars on the surface of the growing stem. By means of these scars one can determine the age of any young branch, since each year's growth ends in the formation of a bud, the formation of which produces an additional group of bud scale scars. Continued growth of the branch causes these scars to be obliterated after a few years so that the total age of older branches cannot be determined by this means. In many plants, scales do not form over the bud, and the bud is then called a naked bud. The minute underdeveloped leaves in such buds are often excessively hairy. Naked buds are found in some shrubs, like some species of the Sumac and Viburnums (Viburnum alnifolium and V. lantana) and in herbaceous plants. In many of the latter, buds are even more reduced, often consisting of undifferentiated masses of cells in the axils of leaves. A terminal bud occurs on the end of a stem and lateral buds are found on the side. A head of cabbage (see Brassica) is an exceptionally large terminal bud, while Brussels sprouts are large lateral buds. Since buds are formed in the axils of leaves, their distribution on the stem
https://en.wikipedia.org/wiki/American%20Megatrends
American Megatrends International, LLC, doing business as AMI, is an international hardware and software company, specializing in PC hardware and firmware. The company was founded in 1985 by Pat Sarma and Subramonian Shankar. It is headquartered in Building 800 at 3095 Satellite Boulevard in unincorporated Gwinnett County, Georgia, United States, near the city of Duluth, and in the Atlanta metropolitan area. The company started as a manufacturer of complete motherboards, positioning itself in the high-end segment. Its first customer was PCs Limited, later known as Dell Computer. As hardware activity moved progressively to Taiwan-based original design manufacturers, AMI continued to develop BIOS firmware for major motherboard manufacturers. The company produced BIOS software for motherboards (1986), server motherboards (1992), storage controllers (1995) and remote-management cards (1998). In 1993, AMI produced MegaRAID, a storage controller card. AMI sold its RAID assets to LSI Corporation in 2001, with only one employee from the RAID-division remaining with the AMI core team. AMI continued to focus on OEM and ODM business and technology. Its product line includes AMIBIOS (a BIOS), Aptio (a successor to AMIBIOS8 based on the UEFI standard), diagnostic software, AMI EC (embedded controller firmware), MG-Series SGPIO backplane controllers (for SATA, SAS and NVMe storage devices), driver/firmware development, and MegaRAC (BMC firmware). Founding American Megatrends Inc. (AMI) was founded in 1985 by Subramonian Shankar and Pat Sarma with funds from a previous consulting venture, Access Methods Inc. (also AMI). Access Methods was a company run by Pat Sarma and his partner. After Access Methods successfully launched the AMIBIOS, there were legal issues among the owners of the company, resulting in Sarma buying out his partners. Access Methods still owned the rights to the AMIBIOS. Sarma had already started a company called Quintessential Consultants Inc. (QCI), and l
https://en.wikipedia.org/wiki/Alkannin
Alkannin is a natural dye that is obtained from the extracts of plants from the borage family Alkanna tinctoria that are found in the south of France. The dye is used as a food colouring and in cosmetics. It is used as a red-brown food additive in regions such as Australia. Alkannin is deep red in an acid and blue in an alkaline environment. The chemical structure as a naphthoquinone derivative was first determined by Brockmann in 1936. The R-enantiomer of alkannin is known as shikonin, and the racemic mixture of the two is known as shikalkin. Biosynthesis The enzyme 4-hydroxybenzoate geranyltransferase utilises geranyl diphosphate and 4-hydroxybenzoate to produce 3-geranyl-4-hydroxybenzoate and diphosphate. These compounds are then used to form alkannin. Research Because the root bark (cork layers) of this plant contains large amounts of red naphthoquinone pigments, the roots of these plants are red-purple. If shikonin is extracted from fresh tissues, it gradually darkens over several days, finally forming black precipitates, which are thought to be polymers.
https://en.wikipedia.org/wiki/YadA%20bacterial%20adhesin%20protein%20domain
In molecular biology, YadA is a protein domain which is short for Yersinia adhesin A. These proteins have strong sequence and structural homology, particularly at their C-terminal end. The function is to promote their pathogenicity and virulence in host cells, though cell adhesion. YadA is found in three pathogenic species of Yersinia, Y. pestis, Y. pseudotuberculosis, and Y. enterocolitica. The YadA domain is encoded for by a virulence plasmid in Yersinia, which encodes a type-III secretion (T3S) system consisting of the Ysc injectisome and the Yop effectors. Function Essentially, the main function of the YadA domain is to help cell adhesion and to increase virulence. YadA is a collagen-binding outer membrane protein. It forms the fibrillar matrix on the bacterial cell surface. This aids cell attachment and helps the bacteria invade eukaryotic cells. Additionally, by forming the fibrillar matrix, the YadA domain protects the bacteria by facilitating agglutination resistance, serum resistance, complement inactivation and phagocytosis resistance. The importance of adhesins to YadA function and Yersinia survival is huge. Attachment further allows more interactions and increase of biofilm formation to aid bacterial colonization. In Yersinia, it helps initiate the infectious process in host cells and are critical virulence factors. Additionally, bacteria have the ability to regulate adhesion expression, meaning that when Yersinia no longer requires YadA, it can be turned off. Furthermore, YadA expression is mainly temperature regulated, at 37 degrees Celsius. It also has two molecular regulators: an activator, VirF and a repressor, YmoA. Substrate adhesion The YadA protein domain adheres to the following substrates: epithelial cells extracellular matrix collagen cellular fibronectin laminin Protein domains in YadA C terminal domain The C-terminal domain consists of 120 amino acids which belong to a family of surface-exposed bacterial proteins. The YadA C-term
https://en.wikipedia.org/wiki/Eremobiotus
Eremobiotus is a genus of tardigrade in the class Eutardigrada. Species Eremobiotus alicatai (Binda 1969) Eremobiotus ovezovae Biserov, 1992
https://en.wikipedia.org/wiki/Mulard
The mulard (or moulard) is a hybrid between two different genera of domestic duck: the domestic Muscovy duck (Cairina moschata domestica) and the domestic duck (Anas platyrhynchos domesticus), derived from the wild mallard. American Pekins and other domestic ducks are most commonly used to breed mulards due to the breed's high meat production. Like many interspecific F1 hybrids, mulards are sterile, giving them the nickname mule ducks. While it is possible to produce mulards naturally, artificial insemination is used more often with greater success. The term mulard or moulard is generally reserved for offspring where the parental drake is a Muscovy and the duck is a Pekin. When the drake is a Pekin, the offspring tend to be smaller and are called hinnies. Husbandry and production The mulard is commercially produced on farms for meat and foie gras. The White Muscovy and the Pekin are the two most common purebred, commercially farmed ducks. Hybrids of the two are hardier and calmer, in addition to exhibiting natural hybrid vigor. The incubation period of the hybrid eggs is between the mallard and Muscovy, with an average of 32 days. About half of the eggs hatch into mulard ducks. Mulards tend to combine certain traits of the parent breeds. Due to their Muscovy heritage, they produce leaner meat than Pekins; females tend to be raised for meat, while males are used for foie gras. Like Muscovy ducks, mulards have claws on their feet, but do not fly and perch; instead, they prefer to stay near water, as Pekins do. Traditionally, foie gras was primarily produced with geese, but by the 1960s the majority of farmers began to use mulards. Geese are more expensive to maintain than ducks (they are larger and more aggressive), and the more temperamental Muscovies did not accept the process of gavage (force feeding) as readily as Pekins, causing the quality of the foie gras to suffer. This problem was avoided by the introduction of mulards. These hybrids have also become ex
https://en.wikipedia.org/wiki/Hortonella
Hortonella is a fossil genus of alga that has been placed deep in the coralline stem group on the basis of its scarcely differentiated thallus.
https://en.wikipedia.org/wiki/AArch64
AArch64 or ARM64 is the 64-bit extension of the ARM architecture family. It was first introduced with the Armv8-A architecture. Arm releases a new extension every year. ARMv8.x and ARMv9.x extensions and features Announced in October 2011, ARMv8-A represents a fundamental change to the ARM architecture. It adds an optional 64-bit architecture, named "AArch64", and the associated new "A64" instruction set. AArch64 provides user-space compatibility with the existing 32-bit architecture ("AArch32" / ARMv7-A), and instruction set ("A32"). The 16-32bit Thumb instruction set is referred to as "T32" and has no 64-bit counterpart. ARMv8-A allows 32-bit applications to be executed in a 64-bit OS, and a 32-bit OS to be under the control of a 64-bit hypervisor. ARM announced their Cortex-A53 and Cortex-A57 cores on 30 October 2012. Apple was the first to release an ARMv8-A compatible core (Cyclone) in a consumer product (iPhone 5S). AppliedMicro, using an FPGA, was the first to demo ARMv8-A. The first ARMv8-A SoC from Samsung is the Exynos 5433 used in the Galaxy Note 4, which features two clusters of four Cortex-A57 and Cortex-A53 cores in a big.LITTLE configuration; but it will run only in AArch32 mode. To both AArch32 and AArch64, ARMv8-A makes VFPv3/v4 and advanced SIMD (Neon) standard. It also adds cryptography instructions supporting AES, SHA-1/SHA-256 and finite field arithmetic. Naming conventions 64 + 32 bit Architecture: AArch64 Specification: ARMv8-A Instruction sets: A64 + A32 Suffixes: v8-A 32 + 16 (Thumb) bit Architecture: AArch32 Specification: ARMv8-R / ARMv7-A Instruction sets: A32 + T32 Suffixes: -A32 / -R / v7-A Example: ARMv8-R, Cortex-A32 AArch64 features New instruction set, A64 Has 31 general-purpose 64-bit registers. Has dedicated zero or stack pointer (SP) register (depending on instruction). The program counter (PC) is no longer directly accessible as a register. Instructions are still 32 bits long and mostly the same as A32 (
https://en.wikipedia.org/wiki/The%20Inheritance%20%282014%20film%29
The Inheritance is a 2014 documentary feature film about Huntington's disease written by Bridget Lyon and directed by Jeffrey McDonald. Based in New Zealand and telling the story of Lyon's family, it features interviews with prominent researchers and advocates in the Huntington's disease field including Charles Sabine, Michael R. Hayden, Jeff Carroll and Edward Wild. It premiered at the 2014 New Zealand International Film Festival and has attracted media coverage in New Zealand and Australia.
https://en.wikipedia.org/wiki/Smart%20host
A smart host or smarthost is an email server via which third parties can send emails and have them forwarded on to the email recipients' email servers. Smarthosts were originally open mail relays, but most providers now require authentication from the sender, to verify that the sender is authorised – for example, an ISP might run a smarthost for their paying customers only. Use in spam control efforts In an effort to reduce email spam originating from their customer's IP addresses, some internet service providers (ISPs), will not allow their customers to communicate directly with recipient mailservers via the default SMTP port number 25. Instead, often they will set up a smarthost to which their customers can direct all their outward mail – or customers could alternatively use one of the commercial smarthost services. Sometimes, even if an outward port 25 is not blocked, an individual or organisation's normal external IP address has a difficulty in getting SMTP mail accepted. This could be because that IP was assigned in the past to someone who sent spam from it, or appears to be a dynamic address such as typically used for home connection. Whatever the reason for the "poor reputation" or "blacklisting", they can choose to redirect all their email out to an external smarthost for delivery. Reducing complexity When a host runs its own local mail server, a smart host is often used to transmit all mail to other systems through a central mail server. This is used to ease the management of a single mail server with aliases, security, and Internet access rather than maintaining numerous local mail servers. See also Mail submission agent
https://en.wikipedia.org/wiki/DF-1%20Protocol
DF-1 / DF1 protocol is an asynchronous byte-oriented protocol that is used to communicate with most Allen Bradley RS-232 interface modules. DF1 protocol consists of link layer and application layer formats. DF1 works over half duplex and full duplex modes of communication. Application layer messages Application layer message format consists of Command Initiator messages (request messages) and Command Executor (reply messages). Important command initiator messages are as follows. apply port configuration bit write change mode close file diagnostic status disable forces disable outputs download request echo enable outputs enable PLC scanning enter download mode enter upload mode exit download/upload mode file read file write get edit resource initialize memory modify PLC-2 compatibility file open file physical read physical write read bytes physical read diagnostic counters reset diagnostic counters read link parameters read-modify-write read section size restart request set CPU mode set data table size set ENQs set link parameters set NAKs set timeout set variables shutdown See also Computer networking Computer science External links DF1 Protocol Reference Manual DF1 protocol Open Source Industrial computing Serial buses Industrial automation
https://en.wikipedia.org/wiki/Melanosclerite
The Melanosclerites are a group of problematic microfossils obtained by palynological processing. Morphology The form-taxon contains a wide array of rod-like fossils, 100 µm to some mm long, that culminate in a broad bulbous 'head', often separated from the stalk by a constriction. The bulbous end may bear broad 'prongs', giving the appearance of the end of a human femur where the prongs are paired, although the prongs often occur in higher number – five, six, a dozen – with some resemblance to Namacalathus. Affinity The affinity of melanosclerites is uncertain; algal has been proposed, but hydrozoan (cnidarian) is preferred, though not conclusively established. Melanoscleritoites Eisenack, 1963 is interpreted as a hydrozoan, with other taxa not attributable to that particular class, on the basis of a broad morphological similarity – though the distinguishing features are far from unequivocal, and the preservation of the material raises some taphonomic problems. The composition resembles that of chitinozoans, scolecodonts, graptolites, and fungi – though at least one species of extant cubomedusan hydroid does produce a similarity resilient "chitinous" 'wall'. Occurrence They have been reported in shallow marine sandstones and limestones, as well as upper slope and open marine sediments, in strata from the Lower Cambrian to Upper Devonian. Taxa include: Eichbaumia Schallreuter, 1981 Eichbaumia incus Schallreuter, 1981 Melanoarbustum Górka, 1971 Melanoarbustum balticum Górka, 1971 Melanoclava Eisenack, 1942 Melanoclava betaotda Eisenack, 1942 Melanocyathus Eisenack, 1942 Melanocyathus dentatus Eisenack, 1942 Melanoporella Górka, 1971 Melanoporella polonica Górka, 1971 Melanoporella bulla Melanoporella clava Schallreuter, 1981 Melanorhachis Eisenack, 1942 Melanorhachis regularis Eisenack, 1942 Melanoscleritoites Eisenack, 1963 Melanosteus Eisenack, 1942 Melanosteus acutus Eisenack, 1942 Melanostylus Eisenack, 1963 Melanostylus coronifer Eisena
https://en.wikipedia.org/wiki/Over-the-top%20media%20service
An over-the-top (OTT) media service (also known as streaming platforms) is a media service offered directly to viewers via the Internet. OTT bypasses cable, broadcast, and satellite television platforms—the types of companies that have traditionally acted as controllers or distributors of such content. It has also been used to describe no-carrier cellphones, for which all communications are charged as data, avoiding monopolistic competition, or apps for phones that transmit data in this manner, including both those that replace other call methods and those that update software. The term is most synonymous with subscription-based video on demand (SVoD) services that offer access to film and television content (including existing shows and movies for which rights have been acquired from the content owner, as well as original content produced specifically for the service). OTT (Over-the-Top) services also include a range of "skinny" television offerings that provide access to live streams of linear specialty channels. These services resemble traditional satellite or cable TV providers, but the content is delivered via the public Internet instead of a closed, private network with exclusive equipment like set-top boxes. Over-the-top services are typically accessed via websites on personal computers, as well as via apps on mobile devices (such as smartphones and tablets), digital media players (including video game consoles), or televisions with integrated Smart TV platforms. Over-The-Top services have had a profound impact on the way we consume media and entertainment. OTT refers to the delivery of video, audio, and other media content over the internet, bypassing traditional cable or satellite television providers. Definitions In 2011, the Canadian Radio-television and Telecommunications Commission (CRTC), Canada's telecom regulator, stated that it "considers that Internet access to programming independent of a facility or network dedicated to its delivery (via, fo
https://en.wikipedia.org/wiki/Desoxyribonucleate
"Desoxyribonucleic acid" and "desoxyribonucleate" are archaic terms for DNA, deoxyribonucleic acid, and its salts, respectively. The terms are used in this sense in various classic papers in genetics, such as Avery, MacLeod, and McCarty (1944).
https://en.wikipedia.org/wiki/Florin%20sign
The florin sign (ƒ) is a symbol that is used for the currencies named florin, also called guilder. The Dutch name for the currency is gulden. The symbol "ƒ" is the lowercase version of Ƒ of the Latin alphabet. In many serif typefaces, it can often be substituted with a normal italic small-letter f ( ). It is used in the following current and obsolete currencies (between brackets their ISO 4217 currency codes): Current: Aruban florin (AWG) Netherlands Antillean guilder (ANG) Obsolete: Dutch guilder (NLG; until 2002) Netherlands Indies guilder (until 1954) Surinamese guilder (SRG; until 2004) Italian florin (until 1533) Currency symbols
https://en.wikipedia.org/wiki/Darwin%E2%80%93Fowler%20method
In statistical mechanics, the Darwin–Fowler method is used for deriving the distribution functions with mean probability. It was developed by Charles Galton Darwin and Ralph H. Fowler in 1922–1923. Distribution functions are used in statistical physics to estimate the mean number of particles occupying an energy level (hence also called occupation numbers). These distributions are mostly derived as those numbers for which the system under consideration is in its state of maximum probability. But one really requires average numbers. These average numbers can be obtained by the Darwin–Fowler method. Of course, for systems in the thermodynamic limit (large number of particles), as in statistical mechanics, the results are the same as with maximization. Darwin–Fowler method In most texts on statistical mechanics the statistical distribution functions in Maxwell–Boltzmann statistics, Bose–Einstein statistics, Fermi–Dirac statistics) are derived by determining those for which the system is in its state of maximum probability. But one really requires those with average or mean probability, although – of course – the results are usually the same for systems with a huge number of elements, as is the case in statistical mechanics. The method for deriving the distribution functions with mean probability has been developed by C. G. Darwin and Fowler and is therefore known as the Darwin–Fowler method. This method is the most reliable general procedure for deriving statistical distribution functions. Since the method employs a selector variable (a factor introduced for each element to permit a counting procedure) the method is also known as the Darwin–Fowler method of selector variables. Note that a distribution function is not the same as the probability – cf. Maxwell–Boltzmann distribution, Bose–Einstein distribution, Fermi–Dirac distribution. Also note that the distribution function which is a measure of the fraction of those states which are actually occupied by elements
https://en.wikipedia.org/wiki/Metacommunity
An ecological metacommunity is a set of interacting communities which are linked by the dispersal of multiple, potentially interacting species. The term is derived from the field of community ecology, which is primarily concerned with patterns of species distribution, abundance and interactions. Metacommunity ecology combines the importance of local factors (environmental conditions, competition, predation) and regional factors (dispersal of individuals, immigration, emigration) to explain patterns of species distributions that happen in different spatial scales. There are four theoretical frameworks, or unifying themes, that each detail specific mechanistic processes useful for predicting empirical community patterns. These are the patch dynamics, species sorting, source–sink dynamics (or mass effect) and neutral model frameworks. Patch dynamics models describe species composition among multiple, identical patches, such as islands. In this framework, species are able to persist on patches through tradeoffs in colonization ability and competitive ability, where less competitive species can disperse to unoccupied patches faster than they go extinct in others. Species sorting models describe variation in abundance and composition within the metacommunity due to individual species responses to environmental heterogeneity, such that certain local conditions may favor certain species and not others. Under this perspective, species are able to persist in patches with suitable environmental conditions resulting in a strong correlation between local species composition and the environment. This model represents the classical theories of the niche-centric era of G. Evelyn Hutchinson and Robert MacArthur. Source-sink models describe a framework in which dispersal and environmental heterogeneity interact to determine local and regional abundance and composition. This framework is derived from the metapopulation ecology term describing source–sink dynamics at the pop
https://en.wikipedia.org/wiki/WICB%20Junior%20and%20Senior%20Awards
The Women In Cell Biology Committee of the American Society for Cell Biology (ASCB) recognizes outstanding achievements by women in cell biology by presenting three (previously only two) Career Recognition Awards at the ASCB Annual Meeting. The Junior Award is given to a woman in an early stage of her career (generally seven or eight years in an independent position) who has made exceptional scientific contributions to cell biology and exhibits the potential for continuing a high level of scientific endeavor while fostering the career development of damaged young scientists. The Mid-Career Award (introduced in 2012) is given to a woman at the mid-career level who has made exceptional scientific contributions to cell biology and/or has effectively translated cell biology across disciplines, and who exemplifies a high level of scientific endeavor and leadership. The Senior Award is given to a woman or man in a later career stage (generally full professor or equivalent) whose outstanding scientific achievements are coupled with a long-standing record of support for women in science and by mentorship of both men and women in scientific careers. Senior awardees Source: WICB 2020 Erika Holzbaur 2019 Rong Li 2018 Eva Nogales 2017 Harvey Lodish 2016 Susan Gerbi 2015 Angelika Amon 2014 Sandra L. Schmid 2013 Lucille Shapiro 2012 Marianne Bronner 2011 Susan Rae Wente 2010 Zena Werb 2009 Janet Rossant 2008 Fiona Watt 2007 Frances Brodsky 2006 Joseph Gall 2005 Elizabeth Blackburn 2004 Susan Lindquist 2003 Philip Stahl 2002 Natasha Raikhel 2001 Joan Brugge 2000 Shirley Tilghman 1999 Ursula Goodenough 1998 Christine Guthrie 1997 Elaine Fuchs 1996 Sarah C. R. Elgin 1995 Virginia Zakian 1994 Ann Hubbard 1993 Mina Bissell 1992 Helen Blau 1991 Hynda Kleinman 1990 Dorthea Wilson and Rosemary Simpson 1989 Dorothy Bainton 1988 No Awardees selected 1987 Dorothy M. Skinner 1986 Mary Clutter Mid-Career awardees Source: WICB 2020 Daniela Nicastro and Anne E. Carpenter 2019 Coleen T. Murp
https://en.wikipedia.org/wiki/Chip%20creep
Chip creep refers to the problem of an integrated circuit (chip) working its way out of its socket over time. This was mainly an issue in early PCs. Chip creep occurs due to thermal expansion, which is expansion and contraction as the system heats up and cools down. It can also occur due to vibration. While chip creep was most common with older memory modules, it was also a problem with CPUs and other main chips that were inserted into sockets. An example is the Apple III, where its CPU would be dislodged and the user would need to reseat the chips. To fix chip creep, users of older systems would often have to remove the case cover and push the loose chip back into the socket. Today's computer systems are not as affected by chip creep, since chips are more securely held, either by various types of retainer clips or by being soldered into place, and since system cooling has improved.
https://en.wikipedia.org/wiki/Spectral%20expansion%20solution
In probability theory, the spectral expansion solution method is a technique for computing the stationary probability distribution of a continuous-time Markov chain whose state space is a semi-infinite lattice strip. For example, an M/M/c queue where service nodes can breakdown and be repaired has a two-dimensional state space where one dimension has a finite limit and the other is unbounded. The stationary distribution vector is expressed directly (not as a transform) in terms of eigenvalues and eigenvectors of a matrix polynomial.
https://en.wikipedia.org/wiki/Alec%20Fraser-Brunner
Alec Frederick Fraser-Brunner (6 April 1906—17 Sept 1986) was a British ichthyologist. His career included work with the Colonial Office, the Food and Agriculture Organization, and as the curator of the Van Kleef Aquarium in Singapore and the aquarium at Edinburgh Zoo. Amongst his written works is Cussons Book of Tropical Fishes, published as result of Manchester industrialist Alexander Tom Cussons' interest in tropical fish. Cussons had a keen interest in orchids. The hot-houses in which he grew them proved to be well-suited to tropical fish aquariums. Alec Frederick Fraser-Brunner is the designer of Singapore's iconic national symbol, the Merlion. The Merlion was originally designed for the Singapore Tourism Board as their logo in 1964. It went on to be sculpted by Mr Lim Nang Seng and completed in 1972. It now sits at Merlion Park in Marina Bay. Taxon described by him See :Category:Taxa named by Alec Fraser-Brunner
https://en.wikipedia.org/wiki/Phosphatidylinositol
Phosphatidylinositol (or Inositol Phospholipid, abbreviation PtdIns) consists of a family of lipids made of a phosphate group, two fatty acid chains, and one inositol molecule. They represent a class of the phosphatidylglycerides. Typically phosphatidylinositols form a minor component on the cytosolic side of eukaryotic cell membranes. The phosphate group gives the molecules a negative charge at physiological pH. The form of phosphatidylinositol comprising the isomer muco-inositol acts as a sensory receptor in the taste function of the sensory system. No molecular difference from phosphatidylinositols comprising the myo-conformers of inositol is known. The phosphatidylinositol can be phosphorylated to form phosphatidylinositol phosphate (PI-4-P, referred to as PIP in close context or informally), phosphatidylinositol bisphosphate (PIP2) and phosphatidylinositol trisphosphate (PIP3). All lipids based on phosphatidylinositol are known as inositides, or sometimes phosphoinositides. Biosynthesis The synthesis of phosphatidylinositol in the laboratory is catalyzed by phosphatidylinositol synthase and involves CDP-diacylglycerol and L-myo-inositol. Chemistry PI has a polar and non-polar region, making the lipid an amphiphile. Phosphatidylinositol is classified as a glycerophospholipid that contains a glycerol backbone, two non-polar fatty acid tails, a phosphate group substituted with an inositol polar head group. The most common fatty acids of phosphoinositides are stearic acid in the SN1 position and arachidonic acid, in the SN2 position. Hydrolysis of phosphoinositides yield one mole of glycerol, two moles of fatty acids, one mole of inositol and one, two, or three moles of phosphoric acids, depending on the number of phosphates on the inositol rings. Phosphoinositides are regarded as the most acidic phospholipids. The specific fatty acids of PtdIns, and their conformation, employed in the sensory neurons has not been elucidated. Phosphoinositides Phosphoryl
https://en.wikipedia.org/wiki/Critical%20to%20quality
Critical to quality is an attribute of a part, assembly, sub-assembly, product, or process that is literally critical to quality or more precisely, has a direct and significant impact on its actual or perceived quality. See also Business process CTQ tree Design for Six Sigma Total quality management Total productive maintenance
https://en.wikipedia.org/wiki/Human%20performance%20modeling
Human performance modeling (HPM) is a method of quantifying human behavior, cognition, and processes. It is a tool used by human factors researchers and practitioners for both the analysis of human function and for the development of systems designed for optimal user experience and interaction . It is a complementary approach to other usability testing methods for evaluating the impact of interface features on operator performance. History The Human Factors and Ergonomics Society (HFES) formed the Human Performance Modeling Technical Group in 2004. Although a recent discipline, human factors practitioners have been constructing and applying models of human performance since World War II. Notable early examples of human performance models include Paul Fitts' model of aimed motor movement (1954), the choice reaction time models of Hick (1952) and Hyman (1953), and the Swets et al. (1964) work on signal detection. It is suggested that the earliest developments in HPM arose out of the need to quantify human-system feedback for those military systems in development during WWII (see Manual Control Theory below), with continued interest in the development of these models augmented by the cognitive revolution (see Cognition & Memory below). Human Performance Models Human performance models predict human behavior in a task, domain, or system. However, these models must be based upon and compared against empirical human-in-the-loop data to ensure that the human performance predictions are correct. As human behavior is inherently complex, simplified representations of interactions are essential to the success of a given model. As no model is able to capture the complete breadth and detail of human performance within a system, domain, or even task, details are abstracted away to these keep models manageable. Although the omission of details is an issue in basic psychological research, it is less of a concern in applied contexts such as those of most concern to the human fac
https://en.wikipedia.org/wiki/Micronization
Micronization is the process of reducing the average diameter of a solid material's particles. Traditional techniques for micronization focus on mechanical means, such as milling and grinding. Modern techniques make use of the properties of supercritical fluids and manipulate the principles of solubility. The term micronization usually refers to the reduction of average particle diameters to the micrometer range, but can also describe further reduction to the nanometer scale. Common applications include the production of active chemical ingredients, foodstuff ingredients, and pharmaceuticals. These chemicals need to be micronized to increase efficacy. Traditional techniques Traditional micronization techniques are based on friction to reduce particle size. Such methods include milling, bashing and grinding. A typical industrial mill is composed of a cylindrical metallic drum that usually contains steel spheres. As the drum rotates the spheres inside collide with the particles of the solid, thus crushing them towards smaller diameters. In the case of grinding, the solid particles are formed when the grinding units of the device rub against each other while particles of the solid are trapped in between. Methods like crushing and cutting are also used for reducing particle diameter, but produce more rough particles compared to the two previous techniques (and are therefore the early stages of the micronization process). Crushing employs hammer-like tools to break the solid into smaller particles by means of impact. Cutting uses sharp blades to cut the rough solid pieces into smaller ones. Modern techniques Modern methods use supercritical fluids in the micronization process. These methods use supercritical fluids to induce a state of supersaturation, which leads to precipitation of individual particles. The most widely applied techniques of this category include the RESS process (Rapid Expansion of Supercritical Solutions), the SAS method (Supercritical Anti-Solven
https://en.wikipedia.org/wiki/Comparison%20of%20JavaScript%20charting%20libraries
There are different JavaScript charting libraries available. Below is a comparison of which features are available in each. See also Ext JS JavaScript graphics library JavaScript InfoVis Toolkit
https://en.wikipedia.org/wiki/Sequestrant
A sequestrant is a food additive which improves the quality and stability of foods. A sequestrant forms chelate complexes with polyvalent metal ions, especially copper, iron and nickel. This can prevent the oxidation of the fats in the food. Sequestrants are therefore a type of preservative. The name comes from Latin and means "to withdraw from use" . Common sequestrants are: Calcium chloride (E509) Calcium acetate (E263) Calcium disodium ethylene diamine tetra-acetate (E385) Glucono delta-lactone (E575) Sodium gluconate (E576) Potassium gluconate (E577) Sodium tripolyphosphate (E451) Sodium hexametaphosphate (E452i) Sodium and calcium salts of EDTA are also commonly used in many foods and beverages.
https://en.wikipedia.org/wiki/Xoroshiro128%2B
xoroshiro128+ (named after its operations: XOR, rotate, shift, rotate) is a pseudorandom number generator intended as a successor to xorshift+. Instead of perpetuating Marsaglia's tradition of xorshift as a basic operation, xoroshiro128+ uses a shift/rotate-based linear transformation designed by Sebastiano Vigna in collaboration with David Blackman. The result is a significant improvement in speed and statistical quality. Statistical Quality The lowest bits of the output generated by xoroshiro128+ have low quality. The authors of xoroshiro128+ acknowledge that it does not pass all statistical tests, stating This is xoroshiro128+ 1.0, our best and fastest small-state generator for floating-point numbers. We suggest to use its upper bits for floating-point generation, as it is slightly faster than xoroshiro128**. It passes all tests we are aware of except for the four lower bits, which might fail linearity tests (and just those), so if low linear complexity is not considered an issue (as it is usually the case) it can be used to generate 64-bit outputs, too; moreover, this generator has a very mild Hamming-weight dependency making our test (http://prng.di.unimi.it/hwd.php) fail after 5 TB of output; we believe this slight bias cannot affect any application. If you are concerned, use xoroshiro128** or xoshiro256+. We suggest to use a sign test to extract a random Boolean value, and right shifts to extract subsets of bits. The state must be seeded so that it is not everywhere zero. If you have a 64-bit seed, we suggest to seed a splitmix64 generator and use its output to fill s. NOTE: the parameters (a=24, b=16, c=37) of this version give slightly better results in our test than the 2016 version (a=55, b=14, c=36). These claims about not passing tests can be confirmed by running PractRand on the input, resulting in output like that shown below: RNG_test using PractRand version 0.93 RNG = RNG_stdin64, seed =
https://en.wikipedia.org/wiki/4OR
4OR - A Quarterly Journal of Operations Research is a peer-reviewed scientific journal that was established in 2003 and is published by Springer Science+Business Media. It is a joint official journal of the Belgian, French, and Italian Operations Research Societies. The journal publishes research papers and surveys on the theory and applications of Operations Research. The Editors-in-chief are Yves Crama (University of Liège), Michel Grabisch (Pantheon-Sorbonne University), and Silvano Martello (University of Bologna). Abstracting and indexing The journal is abstracted and indexed in the following databases: DBLP EconLit EBSCO Information Services Google Scholar International Abstracts in Operations Research Journal Citation Reports Mathematical Reviews OCLC ProQuest Science Citation Index SCImago Journal Rank Scopus Zentralblatt Math According to the Journal Citation Reports, the journal has a 2021 impact factor of 1.763.
https://en.wikipedia.org/wiki/Shope%20papilloma%20virus
The Shope papilloma virus (SPV), also known as cottontail rabbit papilloma virus (CRPV) or Kappapapillomavirus 2, is a papillomavirus which infects certain leporids, causing keratinous carcinomas resembling horns, typically on or near the animal's head. The carcinomas can metastasize or become large enough to interfere with the host's ability to eat, causing starvation. Richard E. Shope investigated the horns and discovered the virus in 1933, an important breakthrough in the study of oncoviruses. The virus was originally discovered in cottontail rabbits in the Midwestern U.S. but can also infect brush rabbits, black-tailed jackrabbits, snowshoe hares, European rabbits, and domestic rabbits. History In the 1930s, hunters in northwestern Iowa reported that the rabbits they shot had several "horn" protrusions on many parts of their bodies including their faces and necks. The virus is also a possible source of myths about the jackalope, a rabbit with the horns of an antelope, and related cryptids such as the wolpertinger. Stories and illustrations of horned rabbits appear in scientific treatises dating back many years, such as the Tableau encyclopédique et méthodique, from 1655. The Iowa reports led cancer researcher Richard E. Shope to investigate, and he discovered the virus in 1933. He separated the virus from horny warts on cottontail rabbits and made one of the first mammalian tumor virus discoveries. Shope determined the protrusions were keratinous carcinomas due to the infection of CRPV. Shope's research led to the development of the first mammalian model of cancer caused by a virus. He was able to isolate virus particles from tumors on captured animals and use these to inoculate domestic rabbits, which then developed similar tumors. This has contributed to our understanding of fundamental mechanisms in neoplasia, or the formation of a new, abnormal growth of tissue. The virus was sequenced in 1984, showing substantial sequence similarities to HPV1a. It has be
https://en.wikipedia.org/wiki/Arrow%E2%80%93Debreu%20model
In mathematical economics, the Arrow–Debreu model is a theoretical general equilibrium model. It posits that under certain economic assumptions (convex preferences, perfect competition, and demand independence) there must be a set of prices such that aggregate supplies will equal aggregate demands for every commodity in the economy. The model is central to the theory of general (economic) equilibrium and it is often used as a general reference for other microeconomic models. It was proposed by Kenneth Arrow, Gérard Debreu in 1954, and Lionel W. McKenzie independently in 1954, with later improvements in 1959. The A-D model is one of the most general models of competitive economy and is a crucial part of general equilibrium theory, as it can be used to prove the existence of general equilibrium (or Walrasian equilibrium) of an economy. In general, there may be many equilibria. Arrow (1972) and Debreu (1983) were separately awarded the Nobel Prize in Economics for their development of the model. McKenzie however was not awarded. Preliminary concepts Convex sets and fixed points In 1954, McKenzie and the pair Arrow and Debreu independently proved the existence of general equilibria by invoking the Kakutani fixed-point theorem on the fixed points of a continuous function from a compact, convex set into itself. In the Arrow–Debreu approach, convexity is essential, because such fixed-point theorems are inapplicable to non-convex sets. For example, the rotation of the unit circle by 90 degrees lacks fixed points, although this rotation is a continuous transformation of a compact set into itself; although compact, the unit circle is non-convex. In contrast, the same rotation applied to the convex hull of the unit circle leaves the point (0,0) fixed. Notice that the Kakutani theorem does not assert that there exists exactly one fixed point. Reflecting the unit disk across the y-axis leaves a vertical segment fixed, so that this reflection has an infinite number of fixe
https://en.wikipedia.org/wiki/LOCC
LOCC, or local operations and classical communication, is a method in quantum information theory where a local (product) operation is performed on part of the system, and where the result of that operation is "communicated" classically to another part where usually another local operation is performed conditioned on the information received. Mathematical properties The formal definition of the set of LOCC operations is complicated due to the fact that later local operations depend in general on all the previous classical communication and due to the unbounded number of communication rounds. For any finite number one can define , the set of LOCC operations that can be achieved with rounds of classical communication. The set becomes strictly larger whenever is increased and care has to be taken to define the limit of infinitely many rounds. In particular, the set LOCC is not topologically closed, that is there are quantum operations that can be approximated arbitrarily closely by LOCC but that are not themselves LOCC. A one-round LOCC is a quantum instrument , for which the trace-non-increasing completely positive maps (CPMs) are local for all measurement results , i.e., and there is one site such that only at the map is not trace-preserving. This means that the instrument can be realized by the party at site applying the (local) instrument and communicating the classical result to all other parties, which then each perform (conditioned on ) trace-preserving (deterministic) local quantum operations . Then are defined recursively as those operations that can be realized by following up an operation with a -operation. Here it is allowed that the party which performs the follow-up operations depends on the result of the previous rounds. Moreover, we also allow "coarse-graining", i.e., discarding some of the classical information encoded in the measurement results (of all rounds). The union of all operations is denoted by and contains instruments tha
https://en.wikipedia.org/wiki/Phycobiliprotein
Phycobiliproteins are water-soluble proteins present in cyanobacteria and certain algae (rhodophytes, cryptomonads, glaucocystophytes). They capture light energy, which is then passed on to chlorophylls during photosynthesis. Phycobiliproteins are formed of a complex between proteins and covalently bound phycobilins that act as chromophores (the light-capturing part). They are most important constituents of the phycobilisomes. Major phycobiliproteins Characteristics Phycobiliproteins demonstrate superior fluorescent properties compared to small organic fluorophores, especially when high sensitivity or multicolor detection required : Broad and high absorption of light suits many light sources Very intense emission of light: 10-20 times brighter than small organic fluorophores Relative large Stokes shift gives low background, and allows multicolor detections. Excitation and emission spectra do not overlap compared to conventional organic dyes. Can be used in tandem (simultaneous use by FRET) with conventional chromophores (i.e. PE and FITC, or APC and SR101 with the same light source). Longer fluorescence retention period. High water solubility Applications Phycobiliproteins allow very high detection sensitivity, and can be used in various fluorescence based techniques fluorimetric microplate assays , FISH and multicolor detection. They are under development for use in artificial photosynthesis, limited by the relatively low conversion efficiency of 4-5%.
https://en.wikipedia.org/wiki/Felice%20Casorati%20%28mathematician%29
Felice Casorati (17 December 1835 – 11 September 1890) was an Italian mathematician who studied at the University of Pavia. He was born in Pavia and died in Casteggio. He is best known for the Casorati–Weierstrass theorem in complex analysis. The theorem, named for Casorati and Karl Theodor Wilhelm Weierstrass, describes the remarkable behaviour of holomorphic functions near essential singularities, which is that every holomorphic function gets values from any complex neighbourhood, in any neighbourhood of the singularity. The Casorati matrix is useful in the study of linear difference equations, just as the Wronskian is useful with linear differential equations. It is calculated based on n functions of the single input variable. Works , available at Gallica (also at GDZ). Freely available copies of volume 1 of his best-known monograph, the only one ever published. External links 1835 births 1890 deaths 19th-century Italian mathematicians Mathematical analysts Scientists from Pavia
https://en.wikipedia.org/wiki/Pungency
Pungency () refers to the taste of food commonly referred to as spiciness, hotness or heat, found in foods such as chili peppers. Highly pungent tastes may be experienced as unpleasant. The term piquancy () is sometimes applied to foods with a lower degree of pungency that are "agreeably stimulating to the palate". Examples of piquant food include mustard and curry. Terminology In colloquial speech, the term "pungency" can refer to any strong, sharp smell or flavor. However, in scientific speech, it refers specifically to the "hot" or "spicy" quality of chili peppers. It is the preferred term by scientists as it eliminates the ambiguity arising from use of "hot", which can also refer to temperature, and "spicy", which can also refer to spices. For instance, a pumpkin pie can be both hot (out of the oven) and spicy (due to the common inclusion of spices such as cinnamon, nutmeg, allspice, mace, and cloves), but it is not pungent. Conversely, pure capsaicin is pungent, yet it is not naturally accompanied by a hot temperature or spices. As the Oxford, Collins, and Merriam-Webster dictionaries explain, "piquancy" can refer to mild pungency, that is, flavors and spices that are much less strong than chilli peppers, including, for example, the strong flavor of some tomatoes. In other words, pungency always refers to a very strong taste whereas piquancy refers to any spices and foods that are "agreeably stimulating to the palate", in other words to food that is spicy in the general sense of "well-spiced". Mildly pungent or sour foods may be referred to as tangy. Uses Pungency is often quantified in scales that range from mild to hot. The Scoville scale measures the pungency of chili peppers, as defined by the amount of capsaicin they contain. Pungency is not considered a taste in the technical sense because it is carried to the brain by a different set of nerves. While taste nerves are activated when consuming foods like chili peppers, the sensation commonly interpre
https://en.wikipedia.org/wiki/Urine%20anion%20gap
The urine anion gap is calculated using measured ions found in the urine. It is used to aid in the differential diagnosis of metabolic acidosis. The term "anion gap" without qualification usually implies serum anion gap. The "urine anion gap" is a different measure, principally used to determine whether the kidneys are capable of appropriately acidifying urine. Calculation Urine anion gap is calculated by subtracting the urine concentration of chloride (anions) from the concentrations of sodium plus potassium (cations): = Na+ + K+ − Cl− where the concentrations are expressed in units of milliequivalents/liter (mEq/L). In contrast to the serum anion gap equation, the bicarbonate is excluded. This is because urine is acidic, so the bicarbonate level would be negligible. Uses Determining the cause of a metabolic acidosis that lacks a serum anion gap often depends on determining whether the kidney is appropriately excreting acid. The urine anion gap is an 'artificial' and calculated measure that is representative of the unmeasured ions in urine. Usually the most important unmeasured ion in urine is NH4+ since it is the most important form of acid excretion by the kidney. Urine NH4+ is difficult to measure directly, but its excretion is usually accompanied by the anion chloride. A negative urine anion gap can be used as evidence of increased NH4+ excretion. In a metabolic acidosis without a serum anion gap: A positive urine anion gap suggests a low urinary NH4+ (e.g. renal tubular acidosis). A negative urine anion gap suggests a high urinary NH4+ (e.g. diarrhea).
https://en.wikipedia.org/wiki/Rokhlin%27s%20theorem
In 4-dimensional topology, a branch of mathematics, Rokhlin's theorem states that if a smooth, orientable, closed 4-manifold M has a spin structure (or, equivalently, the second Stiefel–Whitney class vanishes), then the signature of its intersection form, a quadratic form on the second cohomology group , is divisible by 16. The theorem is named for Vladimir Rokhlin, who proved it in 1952. Examples The intersection form on M is unimodular on by Poincaré duality, and the vanishing of implies that the intersection form is even. By a theorem of Cahit Arf, any even unimodular lattice has signature divisible by 8, so Rokhlin's theorem forces one extra factor of 2 to divide the signature. A K3 surface is compact, 4 dimensional, and vanishes, and the signature is −16, so 16 is the best possible number in Rokhlin's theorem. A complex surface in of degree is spin if and only if is even. It has signature , which can be seen from Friedrich Hirzebruch's signature theorem. The case gives back the last example of a K3 surface. Michael Freedman's E8 manifold is a simply connected compact topological manifold with vanishing and intersection form of signature 8. Rokhlin's theorem implies that this manifold has no smooth structure. This manifold shows that Rokhlin's theorem fails for the set of merely topological (rather than smooth) manifolds. If the manifold M is simply connected (or more generally if the first homology group has no 2-torsion), then the vanishing of is equivalent to the intersection form being even. This is not true in general: an Enriques surface is a compact smooth 4 manifold and has even intersection form II1,9 of signature −8 (not divisible by 16), but the class does not vanish and is represented by a torsion element in the second cohomology group. Proofs Rokhlin's theorem can be deduced from the fact that the third stable homotopy group of spheres is cyclic of order 24; this is Rokhlin's original approach. It can also be deduced from the Atiyah
https://en.wikipedia.org/wiki/Hyperaccumulators%20table%20%E2%80%93%203
This list covers hyperaccumulators, plant species which accumulate, or are tolerant of radionuclides (Cd, Cs-137, Co, Pu-238, Ra, Sr, U-234, 235, 238), hydrocarbons and organic solvents (Benzene, BTEX, DDT, Dieldrin, Endosulfan, Fluoranthene, MTBE, PCB, PCNB, TCE and by-products), and inorganic solvents (Potassium ferrocyanide). See also: Hyperaccumulators table – 1 : Ag, Al, As, Be, Cr, Cu, Hg, Mn, Mo, Naphthalene, Pb, Pd, Se, Zn Hyperaccumulators table – 2 : Nickel {| class="wikitable sortable" style="text-align:center" |+ hyperaccumulators and contaminants: Radionuclides, Hydrocarbons and Organic Solvents – accumulation rates ! Contaminant || Accumulation rates (in mg/kg of dry weight) || Latin name || English name || H-Hyperaccumulator or A-Accumulator P-Precipitator T-Tolerant || Notes || Sources |- | Cd || || Athyrium yokoscense || (Japanese false spleenwort?) || Cd(A), Cu(H), Pb(H), Zn(H) || Origin Japan || |- | Cd || >100 || Avena strigosa Schreb. || New-OatLopsided Oat or Bristle Oat || || || |- | Cd || H- || Bacopa monnieri || Smooth Water Hyssop, Waterhyssop, Brahmi, Thyme-leafed gratiola, Water hyssop || Cr(H), Cu(H), Hg(A), Pb(A) || Origin India; aquatic emergent species || |- | Cd || || Brassicaceae || Mustards, mustard flowers, crucifers or, cabbage family || Cd(H), Cs(H), Ni(H), Sr(H), Zn(H) || Phytoextraction || |- | Cd || A- || Brassica juncea L. || Indian mustard || Cr(A), Cu(H), Ni(H), Pb(H), Pb(P), U(A), Zn(H) || cultivated || |- | Cd || H- || Vallisneria americana || Tape Grass || Cr(A), Cu(H), Pb(H) || Origins Europe and N. Africa; extensively cultivated in the aquarium trade || |- | Cd || >100 || Crotalaria juncea || Sunn or sunn hemp || || High amounts of total soluble phenolics || |- | Cd || H- || Eichhornia crassipes || Water Hyacinth || Cr(A), Cu(A), Hg(H), Pb(H), Zn(A). Also Cs, Sr, U and pesticides || Pantropical/Subtropical, 'the troublesome weed' || |- | Cd || || Helianthus annuus || Sunflower || || Phytoextraction & rhizofiltrati
https://en.wikipedia.org/wiki/Lehmer%20sequence
In mathematics, a Lehmer sequence is a generalization of a Lucas sequence. Algebraic relations If a and b are complex numbers with under the following conditions: Q and R are relatively prime nonzero integers is not a root of unity. Then, the corresponding Lehmer numbers are: for n odd, and for n even. Their companion numbers are: for n odd and for n even. Recurrence Lehmer numbers form a linear recurrence relation with with initial values . Similarly the companion sequence satisfies with initial values
https://en.wikipedia.org/wiki/Matt%20Mullenweg
Matthew Charles Mullenweg (born January 11, 1984) is an American entrepreneur and web developer living in Houston. He is known for developing and founding the free and open-source web software WordPress, and its parent company Automattic. After dropping out of the University of Houston, he worked at CNET Networks from 2004 to 2006 until he quit and founded Automattic, an internet company whose brands include WordPress.com, Akismet, Gravatar, VaultPress, IntenseDebate, Crowdsignal, and Tumblr. Early life and education Mullenweg was born in Houston, Texas, and attended the High School for the Performing and Visual Arts where he studied jazz saxophone. He studied at the University of Houston, majoring in political science, before he dropped out in 2004 to pursue a job at CNET Networks. Mullenweg was raised Catholic. Career In January 2003, Mullenweg and Mike Little started WordPress as a fork of b2. They were soon joined by original b2 developer Michel Valdrighi. Mullenweg was 19 years old, and a freshman at the University of Houston at the time. In March 2004, he co-founded the Global Multimedia Protocols Group (GMPG) with Eric Meyer and Tantek Çelik. GMPG wrote the first of the Microformats. In April 2004, with fellow WordPress developers, they launched Ping-O-Matic, a hub for notifying or "pinging" blog search engines, like Technorati, about blog updates. The following month, WordPress competitor Movable Type announced a radical price change, driving thousands of users to seek another blogging platform; this is widely seen as the tipping point in WordPress's popularity. In October 2004, he was recruited by CNET to work on WordPress for them and help them with blogs and new media offerings. He dropped out of college and moved to San Francisco from Houston, Texas, the following month. Mullenweg announced bbPress in December, Mullenweg and the WordPress team released WordPress 1.5 "Strayhorn" in February 2005, which had over 900,000 downloads. The release introduc
https://en.wikipedia.org/wiki/First%20arch%20syndrome
First arch syndromes are congenital defects caused by a failure of neural crest cells to migrate into the first pharyngeal arch. They can produce facial anomalies. Examples of first arch syndromes include Treacher Collins syndrome and Pierre Robin syndrome.
https://en.wikipedia.org/wiki/Operator%20%28physics%29
In physics, an operator is a function over a space of physical states onto another space of physical states. The simplest example of the utility of operators is the study of symmetry (which makes the concept of a group useful in this context). Because of this, they are useful tools in classical mechanics. Operators are even more important in quantum mechanics, where they form an intrinsic part of the formulation of the theory. Operators in classical mechanics In classical mechanics, the movement of a particle (or system of particles) is completely determined by the Lagrangian or equivalently the Hamiltonian , a function of the generalized coordinates q, generalized velocities and its conjugate momenta: If either L or H is independent of a generalized coordinate q, meaning the L and H do not change when q is changed, which in turn means the dynamics of the particle are still the same even when q changes, the corresponding momenta conjugate to those coordinates will be conserved (this is part of Noether's theorem, and the invariance of motion with respect to the coordinate q is a symmetry). Operators in classical mechanics are related to these symmetries. More technically, when H is invariant under the action of a certain group of transformations G: . The elements of G are physical operators, which map physical states among themselves. Table of classical mechanics operators where is the rotation matrix about an axis defined by the unit vector and angle θ. Generators If the transformation is infinitesimal, the operator action should be of the form where is the identity operator, is a parameter with a small value, and will depend on the transformation at hand, and is called a generator of the group. Again, as a simple example, we will derive the generator of the space translations on 1D functions. As it was stated, . If is infinitesimal, then we may write This formula may be rewritten as where is the generator of the translation group, whi
https://en.wikipedia.org/wiki/Indalo
The Indalo is a Bronze Age magical symbol found in the cave of "Los Letreros" ("The Signboards") in Sierra de María-Los Vélez Natural Park in Vélez Blanco, Almería, Andalusia, Spain. It has been customary to paint the Indalo symbol on the front of houses and businesses to protect them from evil and is considered to be a god totem. The indalo has an origin in the Levante, Spain and dates back to 2500 BC. The pictograph was named in memory of Saint Indaletius. Legend has it that the Indalo was a ghost that could hold and carry a rainbow in his hands (thus the arch over the head of the man). The Indalo has been adopted as the official symbol in the province of Almería, Spain. The Indalo symbol is used as a lucky charm in the Almería region also. To carry the charm is only beneficial if it has been presented as a gift. Some people also believe that the story behind the symbol of the Indalo man is about a man who escapes in a cave to get away from the rain, then when the rain stops, out comes a rainbow and when the man walks away from the wall of the cave, the image is left there.
https://en.wikipedia.org/wiki/Creatine-alpha%20ketoglutarate
Creatine-alpha-ketoglutarate is a salt formed from alpha-ketoglutaric acid (AKG) and creatine. Creatine is a mass-produced fitness supplement that is supposed to increase the user's muscle mass, strength and power. Creatine requires a delivery system for cell uptake. An example is arginine alpha-ketoglutarate. Arginine alpha-ketoglutarate itself is a chemical compound that is supposed to increase the blood flow to muscles and therefore, increase nutrient delivery to muscle cells. Alpha-ketoglutarate (α-KG or AKG) itself is a central molecule in the Krebs cycle that controls the organism's overall citric acid cycle rate. It can improve bone tissue development in the skeletal muscles by decreasing protein catabolism and increasing protein synthesis. The supplement industry has theorized that binding creatine to alpha-ketoglutarate could show significant improvements in creatine delivery and uptake which would ultimately lead to greater improvements in muscle mass and performance. Still relatively new in the fitness industry, more research is needed to test the validity of its effects.
https://en.wikipedia.org/wiki/CAFASP
CAFASP, or the Critical Assessment of Fully Automated Structure Prediction, is a large-scale blind experiment in protein structure prediction that studies the performance of automated structure prediction webservers in homology modeling, fold recognition, and ab initio prediction of protein tertiary structures based only on amino acid sequence. The experiment runs once every two years in parallel with CASP, which focuses on predictions that incorporate human intervention and expertise. Compared to related benchmarking techniques LiveBench and EVA, which run weekly against newly solved protein structures deposited in the Protein Data Bank, CAFASP generates much less data, but has the advantage of producing predictions that are directly comparable to those produced by human prediction experts. Recently CAFASP has been run essentially integrated into the CASP results rather than as a separate experiment.
https://en.wikipedia.org/wiki/Flipper%20%28anatomy%29
A flipper is a broad, flattened limb adapted for aquatic locomotion. It refers to the fully webbed, swimming appendages of aquatic vertebrates that are not fish. In animals with two flippers, such as whales, the flipper refers solely to the forelimbs. In animals with four flippers, such as pinnipeds and sea turtles, one may distinguish fore- and hind-flippers, or pectoral flippers and pelvic flippers. Animals with flippers include penguins (whose flippers are also called wings), cetaceans (e.g., dolphins and whales), pinnipeds (e.g., walruses, earless and eared seals), sirenians (e.g., manatees and dugongs), and marine reptiles such as the sea turtles and the now-extinct plesiosaurs, mosasaurs, ichthyosaurs, and metriorhynchids. Usage of the terms "fin" and "flipper" is sometimes inconsistent, even in the scientific literature. However, the hydrodynamic control surfaces of fish are always referred to as "fins" and never "flippers". Tetrapod limbs which have evolved into fin-like structures are usually (but not always) called "flippers" rather than fins. The dorsal structure on cetaceans is called the "dorsal fin" and the large cetacean tails are referred to primarily as flukes but occasionally as "caudal fins"; neither of these structures are flippers. Some flippers are very efficient hydrofoils, analogous to wings (airfoils), used to propel and maneuver through the water with great speed and maneuverability (see Foil). Swimming appendages with the digits still apparent, as in the webbed forefeet of amphibious turtles and platypus, are considered paddles rather than flippers. Locomotion For all species of aquatic vertebrates, swimming performance depends upon the animal's control surfaces, which include flippers, flukes and fins. Flippers are used for different types of propulsion, control, and rotation. In cetaceans, they are primarily used for control while the fluke is used for propulsion. The evolution of flippers in penguins was at the expense of their
https://en.wikipedia.org/wiki/Buridan%20formula
In quantified modal logic, the Buridan formula and the converse Buridan formula (more accurately, schemata rather than formulas) (i) syntactically state principles of interchange between quantifiers and modalities; (ii) semantically state a relation between domains of possible worlds. The formulas are named in honor of the medieval philosopher Jean Buridan by analogy with the Barcan formula and the converse Barcan formula introduced as axioms by Ruth Barcan Marcus. The Buridan formula The Buridan formula is: . In English, the schema reads: If possibly everything is F, then everything is possibly F. It is equivalent in a classical modal logic (but not necessarily in other formulations of modal logic) to . The converse Buridan formula The converse Buridan formula is: . Buridan's logic In medieval scholasticism, nominalists held that universals exist only subsequent to particular things or pragmatic circumstances, while realists followed Plato in asserting that universals exist independently of, and superior to, particular things.
https://en.wikipedia.org/wiki/RoboWar
RoboWar is an open-source video game in which the player programs onscreen icon-like robots to battle each other with animation and sound effects. The syntax of the language in which the robots are programmed is a relatively simple stack-based one, based largely on IF, THEN, and simply-defined variables. 25 RoboWar tournaments were held in the past between 1990 until roughly 2003, when tournaments became intermittent and many of the major coders moved on. All robots from all tournaments are available on the RoboWar website. The RoboWar programming language, RoboTalk, is a stack-oriented programming language and is similar in structure to FORTH. Programming features RoboWar for the Macintosh was notable among the genre of autonomous robot programming games for the powerful programming model it exposed to the gamer. By the early 1990s, RoboWar included an integrated debugger that permitted stepping through code and setting breakpoints. Later editions of the RoboTalk language used by the robots (a cognate of the HyperTalk language for Apple's HyperCard) included support for interrupts as well. History RoboWar was originally released as a closed source shareware game in 1990 by David Harris for the Apple Macintosh platform. The source code has since been released and implementations are now also available for Microsoft Windows. It was based upon the same concepts as the 1981 Apple II game RobotWar. Initially tournaments were run by David Harris himself, but were eventually run by Eric Foley. See also Core War RobotWar Crobots Robot Battle
https://en.wikipedia.org/wiki/National%20Biodefense%20Analysis%20and%20Countermeasures%20Center
The National Biodefense Analysis and Countermeasures Center (NBACC) is a government biodefense research laboratory created by the U.S. Department of Homeland Security (DHS) and located at the sprawling biodefense campus at Fort Detrick in Frederick, MD, USA. The NBACC (pronounced EN-back) is the principal U.S. biodefense research institution engaged in laboratory-based threat assessment and bioforensics. NBACC is an important part of the National Interagency Biodefense Campus (NIBC) also located at Fort Detrick for the US Army, National Institutes of Health and the US Department of Agriculture. Background and mission The NBACC was created as a federal response to the anthrax letter attacks in 2001 as the first national laboratory operating under the Department of Homeland Security. The Department of Homeland Security said the mission of the NBACC is "to provide the scientific basis for the characterization of biological threats and bioforensic analysis to support attribution of their planned or actual use." Part of the NBACC's mission is to conduct realistic tests of the pathogens and tactics that might be used in a bioterrorism attack. It seeks to quantitatively answer questions pertaining to what might happen in a biological attack. This work is carried out by about 180 researchers and support staff and has become more advanced since the NBACC became certified to work with biological select agents and toxins in September 2011. Its work is necessary in the preparation and response to biological threats, which can be handled as they emerge through the NBACC national security biocontainment laboratory. The NBACC is equipped to develop and investigate genetically engineered viruses and bacteria. The NBACC evaluates new and emerging technologies, along with delivery devices that U.S. adversaries might use to disseminate the pathogens. The NBACC coordinates closely with the many departments and agencies in the U.S. government, including the U.S. intelligence commun
https://en.wikipedia.org/wiki/VHDL-AMS
VHDL-AMS is a derivative of the hardware description language VHDL (IEEE standard 1076-1993). It includes analog and mixed-signal extensions (AMS) in order to define the behavior of analog and mixed-signal systems (IEEE 1076.1-1999). The VHDL-AMS standard was created with the intent of enabling designers of analog and mixed signal systems and integrated circuits to create and use modules that encapsulate high-level behavioral descriptions as well as structural descriptions of systems and components. VHDL-AMS is an industry standard modeling language for mixed signal circuits. It provides both continuous-time and event-driven modeling semantics, and so is suitable for analog, digital, and mixed analog/digital circuits. It is particularly well suited for verification of very complex analog, mixed-signal and radio frequency integrated circuits. Code example In VHDL-AMS, a design consists at a minimum of an entity which describes the interface and an architecture which contains the actual implementation. In addition, most designs import library modules. Some designs also contain multiple architectures and configurations. A simple ideal diode in VHDL-AMS would look something like this: library IEEE; use IEEE.math_real.all; use IEEE.electrical_systems.all; -- this is the entity entity DIODE is generic (iss : current := 1.0e-14); port (terminal anode, cathode : electrical); end entity DIODE; architecture IDEAL of DIODE is quantity v across i through anode to cathode; constant vt : voltage := 0.0258; begin i == iss * (exp(v/vt) - 1.0); end architecture IDEAL; VHDL-AMS Simulators ANSYS Simplorer Cadence Virtuoso AMS Designer Dolphin Integration SMASH Mentor Graphics Questa ADMS Mentor Graphics SystemVision Synopsys SaberRD
https://en.wikipedia.org/wiki/Joseph%20S.%20B.%20Mitchell
Joseph S. B. Mitchell is an American computer scientist and mathematician. He is Distinguished Professor and Department Chair of Applied Mathematics and Statistics and Research Professor of Computer Science at Stony Brook University. Biography Mitchell received a BS (1981, Physics and Applied Mathematics), and an MS (1981, Mathematics) from Carnegie Mellon University, and Ph.D. (1986, Operations Research) from Stanford University (under advisership of Christos Papadimitriou). He was with Hughes Research Laboratories (1981–86) and then on the faculty of Cornell University (1986–1991). He now serves as Distinguished Professor of Applied Mathematics and Statistics and Research Professor of Computer Science at Stony Brook University. He serves as Chair of the Department of Applied Mathematics and Statistics (since 2014). Mitchell has served for several years on the Computational Geometry Steering Committee, often as Chair. He is on the editorial board of the journals Discrete and Computational Geometry, Computational Geometry: Theory and Applications, Journal of Computational Geometry, and the Journal of Graph Algorithms and Applications, and is an editor-in-chief of the International Journal of Computational Geometry and Applications. He has served on numerous program committees and was co-chair of the PC for the 21st ACM Symposium on Computational Geometry (2005). Research Mitchell's primary research area is computational geometry, applied to problems in computer graphics, visualization, air traffic management, manufacturing, and geographic information systems. Awards and honors Mitchell has been an NSF Presidential Young Investigator, Fulbright Scholar, and a recipient of the President's Award for Excellence in Scholarship and Creative Activities. He shared the 2010 Gödel Prize with Sanjeev Arora for devising a polynomial-time approximation scheme for the Euclidean travelling salesman problem. In 2011 the Association for Computing Machinery listed him as an A
https://en.wikipedia.org/wiki/Nature%E2%80%93culture%20divide
The nature–culture divide is the notion of a dichotomy between humans and the environment. It is a theoretical foundation of contemporary anthropology that considers whether nature and culture function separately from one another, or if they are in a continuous biotic relationship with each other. In East Asian society nature and culture are conceptualized as dichotomous (separate and distinct domains of reference). Some researchers consider culture to be "man's secret adaptive weapon" in the sense that it is the core means of survival. It has been observed that the terms "nature" and "culture" can not necessarily be translated into non-western languages, for example, the Native American scholar John Mohawk described "nature" as "anything that supports life". It has been suggested that small-scale societies can have a more symbiotic relationship with nature. Less symbiotic relations with nature are limiting small-scale communities' access to water and food resources. It was also argued that the contemporary man-nature divide manifests itself in different aspects of alienation and conflicts. Greenwood and Stini argue that agriculture is only monetarily cost-efficient because it takes much more to produce than one can get out of eating their own crops, e.g. "high culture cannot come at low energy costs". During the 1960s and 1970s, Sherry Ortner showed the parallel between the divide and gender roles with women as nature and men as culture. Understanding the history of how the nature-culture dichotomy came to be will help environmentalists and policymakers alike determine a new future in human and nature relations. Some elements to understanding this history are cultural (society) differences in views of land, theories behind the perpetuation of the dichotomy, and real-world examples of its existence even today. History Within European culture, land was an inherited right for each family's firstborn son and every other child would need to find another way to o
https://en.wikipedia.org/wiki/Neuch%C3%A2tel%20gas%20turbine
The Neuchâtel gas turbine is the world's first electric power-generating gas turbine to go into commercial operation. It was designed and constructed by Brown, Boveri & Cie and installed in 1939 at the municipal power station in Neuchâtel, Switzerland. The gas turbine was in-service as a standby unit from 1940 till its retirement in 2002. Design and development Brown, Boveri & Cie (BBC) first became involved with gas turbines when they began building turbo-compressors in collaboration with the French industrialist Auguste Rateau. The first machine built under this agreement was a 25 impeller, three casing centrifugal compressor for the experimental 1906 Armengaud-Lemale gas turbine. BBC worked on a number of experimental gas turbine projects in the 1910s and 20s. BBC's gas turbine collaborations included Holzwarth's explosion turbines and a two-stroke version of Herbert Humphrey’s Humphrey pump which would have been used for power generation (a so called “wet gas turbine”). None of these early gas turbine experiments produced a commercially viable product. In the 1930s BBC developed the commercially successful Velox boilers. Velox boilers use an axial flow air compressor driven by a flue-gas turbine to allow rapid heating of a steam boiler. The first Velox boiler was installed at the Mondeville steel works in France in 1932. In 1936, BBC built the world’s first constant flow industrial gas turbine for the Sun Oil refinery in Marcus Hook, Pennsylvania. The early BBC gas turbine sets were essentially Velox boilers with the steam component removed. The Marcus Hook turbine was used for the catalyst regeneration cycle of the Houndry oil refining process and had a high enough compressor efficiency such that the turbine produced a continuous power surplus that was used for electricity generation. BBC’s first opportunity to build a gas turbine solely for the purposes of electrical power generation came in 1938 when the Services Industriels de la Ville de Neuchâtel p
https://en.wikipedia.org/wiki/C1%20domain
C1 domain (also known as phorbol esters/diacylglycerol binding domain) binds an important secondary messenger diacylglycerol (DAG), as well as the analogous phorbol esters. Phorbol esters can directly stimulate protein kinase C, PKC. Phorbol esters (such as PMA) are analogues of DAG and potent tumor promoters that cause a variety of physiological changes when administered to both cells and tissues. DAG activates a family of serine/threonine protein kinases, collectively known as protein kinase C (PKC). Phorbol esters can directly stimulate PKC. The N-terminal region of PKC, known as C1, binds PMA and DAG in a phospholipid and zinc-dependent fashion. The C1 region contains one or two copies of a cysteine-rich domain, which is about 50 amino-acid residues long, and which is essential for DAG/PMA-binding. The DAG/PMA-binding domain binds two zinc ions; the ligands of these metal ions are probably the six cysteines and two histidines that are conserved in this domain. Human proteins containing this domain AKAP13; ARAF; ARHGAP29; ARHGEF2; BRAF; CDC42BPA; CDC42BPB; CDC42BPG; CHN1; CHN2; CIT; CIC; DGKA; DGKB; DGKD; DGKE; DGKG; DGKH; DGKI; DGKK; DGKQ; DGKZ; GMIP; HMHA1; KSR1; KSR2; MYO9A; MYO9B; PDZD8; PRKCA; PRKCB1; PRKCD; PRKCE; PRKCG; PRKCH; PRKCI; PRKCN; PRKCQ; PRKCZ; PRKD1; PRKD2; PRKD3; RACGAP1; RAF1; RASGRP; RASGRP1; RASGRP2; RASGRP3; RASGRP4; RASSF1; RASSF5; ROCK1; ROCK2; STAC; STAC2; STAC3; TENC1; UNC13A; UNC13B; UNC13C; VAV1; VAV2; VAV3;
https://en.wikipedia.org/wiki/Substructural%20logic
In logic, a substructural logic is a logic lacking one of the usual structural rules (e.g. of classical and intuitionistic logic), such as weakening, contraction, exchange or associativity. Two of the more significant substructural logics are relevance logic and linear logic. Examples In a sequent calculus, one writes each line of a proof as . Here the structural rules are rules for rewriting the LHS of the sequent, denoted Γ, initially conceived of as a string (sequence) of propositions. The standard interpretation of this string is as conjunction: we expect to read as the sequent notation for (A and B) implies C. Here we are taking the RHS Σ to be a single proposition C (which is the intuitionistic style of sequent); but everything applies equally to the general case, since all the manipulations are taking place to the left of the turnstile symbol . Since conjunction is a commutative and associative operation, the formal setting-up of sequent theory normally includes structural rules for rewriting the sequent Γ accordingly—for example for deducing from . There are further structural rules corresponding to the idempotent and monotonic properties of conjunction: from we can deduce . Also from one can deduce, for any B, . Linear logic, in which duplicated hypotheses 'count' differently from single occurrences, leaves out both of these rules, while relevant (or relevance) logics merely leaves out the latter rule, on the ground that B is clearly irrelevant to the conclusion. The above are basic examples of structural rules. It is not that these rules are contentious, when applied in conventional propositional calculus. They occur naturally in proof theory, and were first noticed there (before receiving a name). Premise composition There are numerous ways to compose premises (and in the multiple-conclusion case, conclusions as well). One way is to collect them into a set. But since e.g. {a,a} = {a} we have contraction for free if premises are sets.
https://en.wikipedia.org/wiki/National%20Flag%20Anthem%20of%20the%20Republic%20of%20China
The National Flag Anthem of the Republic of China () is a patriotic song typically played during the raising and lowering of the flag of the Republic of China. Domestically, the flag anthem is typically played immediately following the national anthem during flag ceremonies. It is also played at international sporting events such as the World Baseball Classic and Olympic Games, where Taiwan participates officially under the name of Chinese Taipei. The song is thus considered to be effectively a secondary national anthem; Republic of China nationals and supporters stand when it is performed and salute it as they would salute the national anthem. Origin After the Kuomintang Anthem became the de facto National Anthem of the Republic of China in 1930, the Ministry of Education had invited submissions for a new official national anthem. The music composed by Huang Tzu was eventually chosen in 1936, but the Nationalist Government refused to adopt it as the national anthem. As a compromise, the National Anthem remained unchanged, while Huang Tzu's music was adopted as the National Flag Anthem, with lyrics written in Classical Chinese usually attributed to Tai Chi-tao, who had also contributed to the lyrics of the National Anthem. Dispute of the author of lyrics According to Liu Yiling from the National Library of the Republic of China, there remains a dispute over the authorship of the lyrics. In some earlier publications, the lyrics were attributed as an anonymous work. However, later publications attributed it to Tai Chi-tao, who did compose a song with the title "National Flag Anthem" in 1928. Nevertheless, that work was very different from the current version. In 1929, Liang Desuo published "Blue Sky, White Sun, and a Wholly Red Earth", and some attribute the authorship of the National Flag Anthem to him due to the resemblance between that work and the current lyrics. Use Since 1983, the song (officially with different lyrics) was used at Olympic competitions ins
https://en.wikipedia.org/wiki/A.M.C.%3A%20Astro%20Marine%20Corps
A.M.C.: Astro Marine Corps is a 1989 platform shooter video game developed by Creepsoft and published by Dinamic Software. It was released for the Amiga, Atari ST, Commodore 64, ZX Spectrum, MSX, and Amstrad CPC. The program as written by Pablo Ariza with music by José A. Martín. Gameplay The player controls a member of the eponymous Astro Marine Corps, on a mission to stop the Deathbringers, a conglomerate of multiple alien criminals, from launching a campaign to conquer the galaxy. To fulfill his mission, the marine must run from left to right, jumping over obstacles and shooting aliens that try to kill him. Colliding with the aliens or their shots will lower the marine's health bar, or in the case of some enemies even kill him outright, making him lose one of his four lives. From time to time, boxes containing power ups or booby traps drop from the sky, and the marine has to shoot them to reveal their contents. Power ups include health refills, grenades and various alternate shot types such as a flame thrower or a spread shot. The marine can also obtain temporary invulnerability, although it doesn't work with enemies that can kill him instantly. The game is divided in two phases. Each phase must be completed in a limited amount of time, which is extended upon reaching various checkpoints. In the first phase, the marine has to reach the Deathbringers' ship landed on planet Dendar and hijack it. At the end of the phase, a boss alien, the Krauer, must be defeated. In the second phase, the marine must fight through the Deathbringers' home planet and destroy their leader, the Great Alien King, to end the invasion. Reception Retro Games Review felt the title was worth repeated play-throughs. ACE: Advanced Computer Entertainment felt the title was slick but straightforward. The One felt the game offered the "monster mashing" genre a "bit of class". ST Format thought it was no more than a competent shooter. Amiga Reviews felt the graphics were the best part. The games
https://en.wikipedia.org/wiki/Bitemporal%20modeling
Bitemporal modeling is a specific case of temporal database information modeling technique designed to handle historical data along two different timelines. This makes it possible to rewind the information to "as it actually was" in combination with "as it was recorded" at some point in time. In order to be able to do so, information cannot be discarded even if it is erroneous. Within, for example, financial reporting it is often desirable to be able to recreate an old report both as it actually looked at the time of creation and as it should have looked given corrections made to the data after its creation. Implementations of bitemporal modeling can be done using relational databases and graph databases. As such, bitemporal modeling is considered different from dimensional modeling and complementary to database normalization. The SQL:2011 standard provides language constructs for working with bitemporal data. However, many of current solutions are still vendor-specific. Philosophy Bitemporal modeling uses bitemporal structures as the basic components. This results in the databases which have a consistent type of temporality for all data. Benefits of bitemporal modeling By focusing on completeness and accuracy of data, bitemporal modeling facilitates the creation of complete audit trails of data. All data becomes immutable. Specifically this allows for queries which provide: The most accurate data possible as we know it now Data as we knew it at any point in time When and why the most accurate data we had changed Implementations in notable products MarkLogic introduced bitemporal data support in version 8.0. Time stamps for Valid and System time are stored in JSON or XML documents. XTDB (formerly Crux) is an open source database that indexes documents using an EAV data model and provides point-in-time bitemporal SQL & Datalog queries. TerminusDB is an open source document-oriented graph database that uses delta encoding and provides bitemporal functional
https://en.wikipedia.org/wiki/Surotomycin
Surotomycin was an investigational oral antibiotic. This macrolide antibiotic was under investigation by Merck & Co (who acquired Cubist Pharmaceuticals) for the treatment of life-threatening Diarrhea, commonly caused by the bacterium Clostridium difficile. After reaching phase III in clinical trials, its production was discontinued in 2017 due to its non-superiority to current therapies. See also Cadazolid Fidaxomicin Ridinilazole SCHEMBL19952957
https://en.wikipedia.org/wiki/Stave%20Puzzles
Stave Puzzles is an American jigsaw puzzle company located in Norwich, Vermont. The company was started in 1974 by Steve Richardson and Dave Tibbetts and was called Stave—a portmanteau of their first names. They manufacture hand cut jigsaw puzzles made from cherry-backed, 5-layered, wood. Stave produces several different puzzles types ranging from traditional puzzles, teaser puzzles which can have many open areas within the puzzles, trick puzzles in which the puzzles can be put together in two or more ways of which only one is correct. They also create three-dimensional puzzles, limited edition puzzles, and complete custom puzzles. Each puzzle is provided in a green and blue box and does not include a picture of the completed puzzle. Stave Puzzles is the largest hand-cut jigsaw puzzle company in the United States and competes with laser-cutting companies like Liberty Puzzles and Artifact Puzzles. Company history Steve Richardson moved from New Jersey to Vermont in 1969 and started a game design business with Dave Tibbetts. In 1974, Richardson was offered US$300 to make a wooden jigsaw puzzle. Richardson and Tibbetts founded Stave Puzzles in the same year. In 1976, Richardson bought out Tibbetts' share of the company for US$1 and a jigsaw. He built a small shop behind his garage and hired his first employee. In 1983, Stave introduced their first 2-Way Trick Puzzle, called Go Fish. In 1989, Stave Puzzles released an April Fools' Day joke puzzle called 5 Easy Pieces, which had no solution. The puzzles first thirty buyers were refunded their purchase price. Owners of Stave Puzzles include Queen Elizabeth II, Barbara Bush, Stephen King, Julie Andrews, Tom Peters, and Bill Gates. In 1990, Stave Puzzles was listed in the Guinness Book of World Records as having the most expensive jigsaw puzzle. Stave Puzzles was named by Tom Peters as the 1991 Product of the Year. Products Traditional puzzles Stave produces traditional rectangular puzzles that range in size from
https://en.wikipedia.org/wiki/Instruction-level%20parallelism
Instruction-level parallelism (ILP) is the parallel or simultaneous execution of a sequence of instructions in a computer program. More specifically ILP refers to the average number of instructions run per step of this parallel execution. Discussion ILP must not be confused with concurrency. In ILP there is a single specific thread of execution of a process. On the other hand, concurrency involves the assignment of multiple threads to a CPU's core in a strict alternation, or in true parallelism if there are enough CPU cores, ideally one core for each runnable thread. There are two approaches to instruction-level parallelism: hardware and software. Hardware level works upon dynamic parallelism, whereas the software level works on static parallelism. Dynamic parallelism means the processor decides at run time which instructions to execute in parallel, whereas static parallelism means the compiler decides which instructions to execute in parallel. The Pentium processor works on the dynamic sequence of parallel execution, but the Itanium processor works on the static level parallelism. Consider the following program: e = a + b f = c + d m = e * f Operation 3 depends on the results of operations 1 and 2, so it cannot be calculated until both of them are completed. However, operations 1 and 2 do not depend on any other operation, so they can be calculated simultaneously. If we assume that each operation can be completed in one unit of time then these three instructions can be completed in a total of two units of time, giving an ILP of 3/2. A goal of compiler and processor designers is to identify and take advantage of as much ILP as possible. Ordinary programs are typically written under a sequential execution model where instructions execute one after the other and in the order specified by the programmer. ILP allows the compiler and the processor to overlap the execution of multiple instructions or even to change the order in which instructions are executed.
https://en.wikipedia.org/wiki/Speech%20shadowing
Speech shadowing is a psycholinguistic experimental technique in which subjects repeat speech at a delay to the onset of hearing the phrase. The time between hearing the speech and responding, is how long the brain takes to process and produce speech. The task instructs participants to shadow speech, which generates intent to reproduce the phrase while motor regions in the brain unconsciously process the syntax and semantics of the words spoken. Words repeated during the shadowing task would also imitate the parlance of the shadowed speech. The reaction time between perceiving speech and then producing speech has been recorded at 250 ms for a standardised test. However, for people with left dominant brains, the reaction time has been recorded at 150 ms. Functional imaging finds that the shadowing of speech occurs through the dorsal stream. This area links auditory and motor representations of speech through a pathway that starts in the superior temporal cortex, extends to the inferior parietal cortex and ends with the posterior and inferior frontal cortexes, specifically in Broca's area. The speech shadowing technique was created as a research technique by the Leningrad Group led by Ludmilla Chistovich and Valerij Kozhevnikov in the late 1950s. In the 1950s, the Motor theory of speech perception was also in development through Alvin Liberman and Franklin S. Cooper. It has been used for research on stuttering and divided attention, with focus on the distraction of conversational audio while driving. Speech shadowing also has applications for language learning, as an interpretation method and in singing. History The Leningrad group was interested in the time difference between the articulation and perception of speech. The speech shadowing technique was formulated to measure this difference. To measure the initiation of speech, an artificial palate was placed in the speaker's mouth. When the tongue moved to begin pronunciation and touched the palate, the measuremen
https://en.wikipedia.org/wiki/Standardization%20in%20Lab%20Automation
gRPC The consortium for Standardization in Lab Automation (SiLA) is a not-for-profit membership organization formed by software suppliers, system integrators and pharma/biotech companies. It develops and introduces new device and data interface standards allowing rapid integration of lab automation hardware and data management systems. Highly skilled experts of member companies contribute in SiLA's technical work groups. Membership is open for institutions, corporations and individuals active in the life science lab automation industry. The SiLA consortium provides professional training, support and certification services to suppliers and system integrators implementing SiLA compliant interfaces. Mission SiLA is the global initiative to standardize software interfaces in the field of life science research instrumentation, like autosamplers, and laboratory automation. Instigated by the pharmaceutical industry's need for flexible laboratory automation, the initiative is supported by major device and software suppliers worldwide. Background Understanding the mechanisms of life requires extensive, often repetitive, experimentation. Laboratory automation, therefore, has become instrumental to the progress of the life sciences. Industry provides commercial laboratory devices to perform increasingly sophisticated tasks. However, combining equipment from different providers to work in concert often proves impossible. Exporting captured data from proprietary software for further analysis can be frustrating or impossible. This situation leads to a waste of resources: Available equipment needs to be replaced for compatibility reasons, software drivers have to be purchased or developed, and data conversion is time-consuming. Such technical obstacles impede the development of higher level autonomous experimentation systems. SiLA enables researchers to focus on their scientific questions by reducing equipment connectivity effort to a minimum. This is achieved by using proven,
https://en.wikipedia.org/wiki/Small%20copper%20carrier
Small copper carrier or SCC is a small molecule that transports copper in urine. It is excreted in the kidneys in humans or mice where the liver is unable to excrete excess copper in bile. This happens in Wilson’s disease where the presence of copper in urine is a diagnostic. It was discovered by Lawrence Wilson Gray and Svetlana Lutsenko. The molecule is 2 kDa. Its exact nature is not yet known but is presumed to be a peptide. The same peptide also appears in blood and urine of many different mammals. Its copper free molecular weight is 1329.5. In neutral conditions the small copper carrier molecule has a negative charge. Copper is bound to the carrier via oxygen and nitrogen (O or N).
https://en.wikipedia.org/wiki/Electronic%20Journal%20of%20Probability
The Electronic Journal of Probability is a peer-reviewed open access scientific journal published by the Institute of Mathematical Statistics and the Bernoulli Society. It covers all aspects of probability theory and the current editor-in-chief is Bénédicte Haas (Université Sorbonne Paris Nord). Electronic Communications in Probability is a sister journal that publishes short papers. The two journals share the same editorial board, but have different editors-in-chiefs, each chosen for a three-year period. According to the Journal Citation Reports, the Electronic Journal of Probability has a 2016 impact factor of 0.904. Recent editors-in-chief Bénédicte Hass (2021-2023) Andreas Kyprianou (2018-2020) Brian Rider (2015-2017) Michel Ledoux (2012-2014) Bálint Tóth (2009-2011) Andreas Greven (2005-2008) J Theodore Cox (2002-2004) Richard Bass (1999-2002) Krzysztof Burdzy and Gregory Lawler (1995-1999)
https://en.wikipedia.org/wiki/Binary%20prefix
A binary prefix is a unit prefix that indicates a multiple of a unit of measurement by an integer power of two. The most commonly used binary prefixes are kibi (symbol Ki, meaning 210= 1024), mebi (Mi, 220 = ), and gibi (Gi, 230 = ). They are most often used in information technology as multipliers of bit and byte, when expressing the capacity of storage devices or the size of computer files. The binary prefixes "kibi", "mebi", etc. were defined in 1999 by the International Electrotechnical Commission (IEC), in the IEC 60027-2 standard (Amendment 2). They were meant to replace the metric (SI) decimal power prefixes, such as "kilo" ("k", 103 = 1000), "mega" ("M", 106 = ) and "giga" ("G", 109 = ), that were commonly used in the computer industry to indicate the nearest powers of two. For example, a memory module whose capacity was specified by the manufacturer as "2 megabytes" or "2 MB" would hold 2 × 220 = bytes, instead of 2 × 106 = . On the other hand, a hard disk whose capacity is specified by the manufacturer as "10 gigabytes" or "10 GB", holds 10 × 109 = bytes, or a little more than that, but less than 10 × 230 = and a file whose size is listed as "2.3 GB" may have a size closer to 2.3 × 230 ≈ or to 2.3 × 109 = , depending on the program or operating system providing that measurement. This kind of ambiguity is often confusing to computer system users and has resulted in lawsuits. The IEC 60027-2 binary prefixes have been incorporated in the ISO/IEC 80000 standard and are supported by other standards bodies, including the BIPM, which defines the SI system, the US NIST, and the European Union. Prior to the 1999 IEC standard, some industry organizations, such as the Joint Electron Device Engineering Council (JEDEC), attempted to redefine the terms kilobyte, megabyte, and gigabyte, and the corresponding symbols KB, MB, and GB in the binary sense, for use in storage capacity measurements. However, other computer industry sectors (such as magnetic storage)
https://en.wikipedia.org/wiki/Victor%20Shestakov
Victor Ivanovich Shestakov (Russian: ) (1907–1987) was a Russian/Soviet logician and theoretician of electrical engineering. In 1935 he discovered the possible interpretation of Boolean algebra of logic in electro-mechanical relay circuits. He graduated from Moscow State University (1934) and worked there in the General Physics Department almost until his death. Shestakov proposed a theory of electric switches based on Boolean logic earlier than Claude Shannon (according to certification of Soviet logicians and mathematicians Sofya Yanovskaya, M. G. Gaaze-Rapoport, Roland Dobrushin, Oleg Lupanov, Yu. A. Gastev, Yu. T. Medvedev, and Vladimir Andreevich Uspensky), though Shestakov and Shannon defended Theses the same year (1938) and the first publication of Shestakov's result took place only in 1941 (in Russian). In the early 20th century, relay circuits began to be more widely used in automatics, defense of electric and communications systems. Every relay circuit schema for practical use was a distinct invention, because the general principle of simulation of these systems was not known. Shestakov's credit (and independently later Claude Shannon's) is the general theory of logical simulation, inspired by the rapidly increasing complexity of technical demands. Logical simulation requires solid mathematical foundations. Namely these foundations were originally established by Shestakov. Shestakov set forth an algebraic logic model of electrical two-pole switches (later three- and four-pole switches) with series and parallel connections of schematic elements (resistors, capacitors, magnets, inductive coils, etc.). Resistance of these elements could take arbitrary values on the real-number line, and upon the two-element set {0, ∞} this degenerates into the bivalent Boolean algebra of logic. Shestakov may be considered as a forerunner of combinatorial logic and its application (and, hence, Boolean algebra of logic as well) in electric engineering, the 'language' of whi
https://en.wikipedia.org/wiki/Infundibulicybe%20mediterranea
Infundibulicybe mediterranea is a species of agaric fungus in the family Tricholomataceae. Found in Mediterranean Europe, it was described as new to science in 2011. It is closely related to Infundibulicybe gibba, but can be distinguished from that species by its darker colored fruitbody and smaller spores, which measure 4.5–6 to 3–4 µm. The fungus is edible. It fruits singly in groups, or occasionally in rings under oaks, such as Quercus suber and Quercus ilex.
https://en.wikipedia.org/wiki/Perfect%20fluid
In physics, a perfect fluid or ideal fluid is a fluid that can be completely characterized by its rest frame mass density and isotropic pressure p. Real fluids are "sticky" and contain (and conduct) heat. Perfect fluids are idealized models in which these possibilities are neglected. Specifically, perfect fluids have no shear stresses, viscosity, or heat conduction. Quark–gluon plasma is the closest known substance to a perfect fluid. In space-positive metric signature tensor notation, the stress–energy tensor of a perfect fluid can be written in the form where U is the 4-velocity vector field of the fluid and where is the metric tensor of Minkowski spacetime. In time-positive metric signature tensor notation, the stress–energy tensor of a perfect fluid can be written in the form where U is the 4-velocity of the fluid and where is the metric tensor of Minkowski spacetime. This takes on a particularly simple form in the rest frame where is the energy density and is the pressure of the fluid. Perfect fluids admit a Lagrangian formulation, which allows the techniques used in field theory, in particular, quantization, to be applied to fluids. Perfect fluids are used in general relativity to model idealized distributions of matter, such as the interior of a star or an isotropic universe. In the latter case, the equation of state of the perfect fluid may be used in Friedmann–Lemaître–Robertson–Walker equations to describe the evolution of the universe. In general relativity, the expression for the stress–energy tensor of a perfect fluid is written as where U is the 4-velocity vector field of the fluid and where is the inverse metric, written with a space-positive signature. See also Equation of state Ideal gas Fluid solutions in general relativity Potential flow
https://en.wikipedia.org/wiki/Nutraceutical
A nutraceutical is a pharmaceutical alternative which claims physiological benefits. In the US, nutraceuticals are largely unregulated, as they exist in the same category as dietary supplements and food additives by the FDA, under the authority of the Federal Food, Drug, and Cosmetic Act. The word "nutraceutical" is a portmanteau term, blending the words "nutrition" and "pharmaceutical". Regulation Nutraceuticals are treated differently in different jurisdictions. Canada Under Canadian law, a nutraceutical can either be marketed as a food or as a drug; the terms "nutraceutical" and "functional food" have no legal distinction, referring to "a product isolated or purified from foods that is generally sold in medicinal forms not usually associated with food [and] is demonstrated to have a physiological benefit or provide protection against chronic disease." United States The term "nutraceutical" is not defined by US law. Depending on its ingredients and the claims with which it is marketed, a product is regulated as a drug, dietary supplement, food ingredient, or food. Other sources In the global market, there are significant product quality issues. Nutraceuticals from the international market may claim to use organic or exotic ingredients, yet the lack of regulation may compromise the safety and effectiveness of products. Companies looking to create a wide profit margin may create unregulated products overseas with low-quality or ineffective ingredients. Classification of nutraceuticals Nutraceuticals are products derived from food sources that are purported to provide extra health benefits, in addition to the basic nutritional value found in foods. Depending on the jurisdiction, products may claim to prevent chronic diseases, improve health, delay the aging process, increase life expectancy, or support the structure or function of the body. Dietary supplements In the United States, the Dietary Supplement Health and Education Act (DSHEA) of 1994 defined the t
https://en.wikipedia.org/wiki/Mil%C3%BC
Milü (; "close ratio"), also known as Zulü (Zu's ratio), is the name given to an approximation to (pi) found by Chinese mathematician and astronomer Zu Chongzhi in the 5th century. Using Liu Hui's algorithm (which is based on the areas of regular polygons approximating a circle), Zu famously computed to be between 3.1415926 and 3.1415927 and gave two rational approximations of , and , naming them respectively Yuelü (; "approximate ratio") and Milü. is the best rational approximation of with a denominator of four digits or fewer, being accurate to six decimal places. It is within % of the value of , or in terms of common fractions overestimates by less than . The next rational number (ordered by size of denominator) that is a better rational approximation of is , though it is still only correct to six decimal places. To be accurate to seven decimal places, one needs to go as far as . For eight, is needed. The accuracy of Milü to the true value of can be explained using the continued fraction expansion of , the first few terms of which are . A property of continued fractions is that truncating the expansion of a given number at any point will give the "best rational approximation" to the number. To obtain Milü, truncate the continued fraction expansion of immediately before the term 292; that is, is approximated by the finite continued fraction , which is equivalent to Milü. Since 292 is an unusually large term in a continued fraction expansion (corresponding to the next truncation introducing only a very small term, , to the overall fraction), this convergent will be especially close to the true value of : An easy mnemonic helps memorize this useful fraction by writing down each of the first three odd numbers twice: , then dividing the decimal number represented by the last 3 digits by the decimal number given by the first three digits. Alternatively, Zu's contemporary calendarist and mathematician He Chengtian invented a fraction interpolation method
https://en.wikipedia.org/wiki/Reduced%20residue%20system
In mathematics, a subset R of the integers is called a reduced residue system modulo n if: gcd(r, n) = 1 for each r in R, R contains φ(n) elements, no two elements of R are congruent modulo n. Here φ denotes Euler's totient function. A reduced residue system modulo n can be formed from a complete residue system modulo n by removing all integers not relatively prime to n. For example, a complete residue system modulo 12 is {0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11}. The so-called totatives 1, 5, 7 and 11 are the only integers in this set which are relatively prime to 12, and so the corresponding reduced residue system modulo 12 is {1, 5, 7, 11}. The cardinality of this set can be calculated with the totient function: φ(12) = 4. Some other reduced residue systems modulo 12 are: {13,17,19,23} {−11,−7,−5,−1} {−7,−13,13,31} {35,43,53,61} Facts If {r1, r2, ... , rφ(n)} is a reduced residue system modulo n with n > 2, then . Every number in a reduced residue system modulo n is a generator for the additive group of integers modulo n. If {r1, r2, ... , rφ(n)} is a reduced residue system modulo n, and a is an integer such that gcd(a, n) = 1, then {ar1, ar2, ... , arφ(n)} is also a reduced residue system modulo n. See also Complete residue system modulo m Multiplicative group of integers modulo n Congruence relation Euler's totient function Greatest common divisor Least residue system modulo m Modular arithmetic Number theory Residue number system Notes
https://en.wikipedia.org/wiki/Coral%20reef%20restoration
Coral reef restoration strategies use natural and anthropogenic processes to restore damaged coral reefs. Reefs suffer damage from a number of natural and man-made causes, and efforts are being made to rectify the damage and restore the reefs. This involves the fragmentation of mature corals, the placing of the living fragments on lines or frames, the nurturing of the fragments as they recover and grow, and the transplantation of the pieces into their final positions on the reef when they are large enough. Background Coral reefs are important buffers between the land and water and help to reduce storm damage and coastal erosion. They provide employment, recreational opportunities and they are a major source of food for coastal communities. It is estimated that $375 billion dollars come from ecosystem services provided by coral reefs each year. The most prevalent coral in tropical reefs are the stony corals Scleractinia that build hard skeletons of calcium carbonate which provide protection and structure to the reef. Coral polyps have a mutualistic relationship with single-celled algae referred to as zooxanthellae. These algae live in the tissue of coral polyps and provide energy to the coral through photosynthesis. In turn, the coral provides shelter and nutrients to the zooxanthellae. Half the world's coral since 1970 have disappeared, and all reefs being threatened with extinction by 2050. In order to ensure the existence of coral reefs in the future, new methods for restoring their ecosystems are being investigated. Fragmentation is the most common strategy for restoring reefs; often used to establish artificial reefs like coral trees, line nurseries, and fixed structures. Threats to coral reefs Some anthropogenic activities, such as coral mining, bottom trawling, canal digging, and blast fishing, cause physical disruption to coral reefs by damaging the corals' hard calcium carbonate skeletal structure. Another major threat to coral reefs comes from chemica
https://en.wikipedia.org/wiki/Band%20I
Band I is a range of radio frequencies within the very high frequency (VHF) part of the electromagnetic spectrum. The first time there was defined "for simplicity" in Annex 1 of "Final acts of the European Broadcasting Conference in the VHF and UHF bands - Stockholm, 1961". Band I ranges from 47 to 68 MHz for the European Broadcasting Area, and from 54 to 88 MHz for the Americas and it is primarily used for television broadcasting in compliance with ITU Radio Regulations (article 1.38). With the transition to digital TV, most Band I transmitters have already been switched off. Television broadcasting usage Channel spacings vary from country to country, with spacings of 6, 7 and 8 MHz being common. In the UK, Band I was originally used by the BBC for monochrome 405-line television; likewise, the French former 455-line (1937-1939) then 441-line (1943-1956) transmitter on the Eiffel Tower in Paris, and some stations of the French monochrome 819-line system used Band I. Both 405-line and 819-line systems were discontinued in the mid-1980s. Other European countries used Band I for 625-line analogue television, first in monochrome and later in colour. This was being gradually phased out with the introduction of digital television in the DVB-T standard, which is not defined for VHF Band I, though some older receivers and some modulators do support it. In the United States, use of this band is for analog NTSC (ended June 12, 2009) and digital ATSC (current). Digital television has problems with impulse noise interference, particularly in this band. Europe In European countries that used System B for television broadcasting, the band was subdivided into three channels, each being 7 MHz wide: Italy also used a "outband" "channel C" (video : 82.25 MHz - audio : 87.75 MHz). It was used by the first transmitter brought in service by the RAI in Torino in the Fifties which was previously used in WW2 by the US to broadcast NTSC TV on channel A6 for military purposes, later
https://en.wikipedia.org/wiki/Novy%E2%80%93MacNeal%E2%80%93Nicolle%20medium
Novy–MacNeal–Nicolle medium (NNN) in microbiology is a culture medium used to grow Leishmania – needed when the amastigotes are not found in sufficient quantities by scraping the growth substrate. It consists of 0.6% sodium chloride (NaCl) added to a simple blood agar slope. NNN can also be used to grow ''Trypanosoma cruzi
https://en.wikipedia.org/wiki/Number%20sentence
In mathematics education, a number sentence is an equation or inequality expressed using numbers and mathematical symbols. The term is used in primary level mathematics teaching in the US, Canada, UK, Australia, New Zealand and South Africa. Usage The term is used as means of asking students to write down equations using simple mathematical symbols (numerals, the four main basic mathematical operators, equality symbol). Sometimes boxes or shapes are used to indicate unknown values. As such, number sentences are used to introduce students to notions of structure and elementary algebra prior to a more formal treatment of these concepts. A number sentence without unknowns is equivalent to a logical proposition expressed using the notation of arithmetic. Examples A valid number sentence that is true: 83 + 19 = 102. A valid number sentence that is false: 1 + 1 = 3. A valid number sentence using a 'less than' symbol: 3 + 6 < 10. A valid number sentence using a 'more than' symbol: 3 + 9 > 11. An example from a lesson plan: Some students will use a direct computational approach. They will carry out the addition 26 + 39 = 65, put 65 = 26 + , and then find that = 39. See also Expression (mathematics) Equation Inequality (mathematics) Open sentence Sentence (mathematical logic)
https://en.wikipedia.org/wiki/Axiomatic%20system
In mathematics and logic, an axiomatic system is any set of axioms from which some or all axioms can be used in conjunction to logically derive theorems. A theory is a consistent, relatively-self-contained body of knowledge which usually contains an axiomatic system and all its derived theorems. An axiomatic system that is completely described is a special kind of formal system. A formal theory is an axiomatic system (usually formulated within model theory) that describes a set of sentences that is closed under logical implication. A formal proof is a complete rendition of a mathematical proof within a formal system. Properties An axiomatic system is said to be consistent if it lacks contradiction. That is, it is impossible to derive both a statement and its negation from the system's axioms. Consistency is a key requirement for most axiomatic systems, as the presence of contradiction would allow any statement to be proven (principle of explosion). In an axiomatic system, an axiom is called independent if it cannot be proven or disproven from other axioms in the system. A system is called independent if each of its underlying axioms is independent. Unlike consistency, independence is not a necessary requirement for a functioning axiomatic system — though it is usually sought after to minimize the number of axioms in the system. An axiomatic system is called complete if for every statement, either itself or its negation is derivable from the system's axioms (equivalently, every statement is capable of being proven true or false). Relative consistency Beyond consistency, relative consistency is also the mark of a worthwhile axiom system. This describes the scenario where the undefined terms of a first axiom system are provided definitions from a second, such that the axioms of the first are theorems of the second. A good example is the relative consistency of absolute geometry with respect to the theory of the real number system. Lines and points are undefin
https://en.wikipedia.org/wiki/Ars%20Mathematica%20Contemporanea
Ars Mathematica Contemporanea is a quarterly peer-reviewed scientific journal covering discrete mathematics in connection with other branches of mathematics. It is published by the University of Primorska together with the Society of Mathematicians, Physicists and Astronomers of Slovenia, the Institute of Mathematics, Physics, and Mechanics, and the Slovenian Discrete and Applied Mathematics Society. It is a platinum open access journal, with articles published under the Creative Commons Attribution 4.0 license. Abstracting and indexing The journal is indexed by: Current Contents/Physical, Chemical & Earth Sciences Mathematical Reviews Science Citation Index Expanded Scopus zbMATH According to the Journal Citation Reports, the journal has a 2018 impact factor of 0.910. See also List of academic journals published in Slovenia
https://en.wikipedia.org/wiki/Fatty%20acid%20synthesis
In biochemistry, fatty acid synthesis is the creation of fatty acids from acetyl-CoA and NADPH through the action of enzymes called fatty acid synthases. This process takes place in the cytoplasm of the cell. Most of the acetyl-CoA which is converted into fatty acids is derived from carbohydrates via the glycolytic pathway. The glycolytic pathway also provides the glycerol with which three fatty acids can combine (by means of ester bonds) to form triglycerides (also known as "triacylglycerols" – to distinguish them from fatty "acids" – or simply as "fat"), the final product of the lipogenic process. When only two fatty acids combine with glycerol and the third alcohol group is phosphorylated with a group such as phosphatidylcholine, a phospholipid is formed. Phospholipids form the bulk of the lipid bilayers that make up cell membranes and surrounds the organelles within the cells (such as the cell nucleus, mitochondria, endoplasmic reticulum, Golgi apparatus, etc.). In addition to cytosolic fatty acid synthesis, there is also mitochondrial fatty acid synthesis (mtFASII), in which malonyl-CoA is formed from malonic acid with the help of malonyl-CoA synthetase (ACSF3), which then becomes the final product octanoyl-ACP (C8) via further intermediate steps. Straight-chain fatty acids Straight-chain fatty acids occur in two types: saturated and unsaturated. Saturated straight-chain fatty acids Much like β-oxidation, straight-chain fatty acid synthesis occurs via the six recurring reactions shown below, until the 16-carbon palmitic acid is produced. The diagrams presented show how fatty acids are synthesized in microorganisms and list the enzymes found in Escherichia coli. These reactions are performed by fatty acid synthase II (FASII), which in general contain multiple enzymes that act as one complex. FASII is present in prokaryotes, plants, fungi, and parasites, as well as in mitochondria. In animals, as well as some fungi such as yeast, these same reactions occur
https://en.wikipedia.org/wiki/Reverse%20connection
A reverse connection is usually used to bypass firewall restrictions on open ports. A firewall usually blocks incoming connections on open ports, but does not block outgoing traffic. In a normal forward connection, a client connects to a server through the server's open port, but in the case of a reverse connection, the client opens the port that the server connects to. The most common way a reverse connection is used is to bypass firewall and router security restrictions. For example, a backdoor running on a computer behind a firewall that blocks incoming connections can easily open an outbound connection to a remote host on the Internet. Once the connection is established, the remote host can send commands to the backdoor. Remote administration tools (RAT) that use a reverse connection usually send SYN packets to the client's IP address. The client listens for these SYN packets and accepts the desired connections. If a computer is sending SYN packets or is connected to the client's computer, the connections can be discovered by using the netstat command or a common port listener like “Active Ports”. If the Internet connection is closed down and an application still tries to connect to remote hosts it may be infected with malware. Keyloggers and other malicious programs are harder to detect once installed, because they connect only once per session. Note that SYN packets by themselves are not necessarily a cause for alarm, as they are a standard part of all TCP connections. There are honest uses for using reverse connections, for example to allow hosts behind a NAT firewall to be administered remotely. These hosts do not normally have public IP addresses, and so must either have ports forwarded at the firewall, or open reverse connections to a central administration server.
https://en.wikipedia.org/wiki/Pray%20As%20You%20Go
Pray As You Go is a daily prayer website, podcast and application that was created in 2006 by the Jesuits in the United Kingdom. Since its founding it has been adapted into nine other languages and as of 2020, it is used 30 million times a year. Format Based on Ignatian spirituality, the website and its application has daily audio prayers that regularly use music, passages from the Bible and contemplations from the Spiritual Exercises, with reflective questions based on the examination of conscience. Later other prayers such as the rosary and stations of the cross were added. History On 1 March 2006, Pray As You Go was launched. It was founded by Peter Scally who had previously worked on Sacred Space in Ireland and who went on to also found Thinking Faith, an online theology journal in 2008. An open, public trial began. However, after more than 250,000 prayer sessions were downloaded, it was decided to continue it indefinitely. It started as a website and a podcast, where it could be downloaded and then listened to later, allowing people to be able to do it while commuting or travelling. By March 2008, over five million prayer sessions had been downloaded. On 6 April 2014, a Pray As You Go mobile application was launched. Before 2015, a Spanish version was created and called Rezando Voy. During Lent 2017, the French version, Prie en Chemin was launched, which after two years had 30,000 users. In 2019, in conjunction with Christian Life Community in Egypt, an Arabic version called Fi Tariqi Osally (on my way, I pray) was launched. In 2020, it was launched on Amazon Alexa. As of 2020, it is available in over 180 countries and there is a version in Dutch called Bidden Onderweg, in Hungarian it is called Napi-útra-való, in Polish as Modlitwa w Drodze, Portuguese as Passo a Rezar, Ukrainian as iMolytva and Vietnamese as Phút cãu nguyên. See also Saint Ignatius of Loyola List of Jesuit sites in the United Kingdom
https://en.wikipedia.org/wiki/PrivateCore
PrivateCore is a venture-backed startup located in Palo Alto, California that develops software to secure server data through server attestation and memory encryption. The company's attestation and memory encryption technology fills a gap that exists between “data in motion” encryption (TLS, email encryption) and “data at rest” encryption (disk encryption, tape encryption) by protecting “data in use” (random access memory). PrivateCore memory encryption technology protects against threats to servers such as cold boot attacks, hardware advanced persistent threats, rootkits/bootkits, computer hardware supply chain attacks, and physical threats to servers from insiders. PrivateCore was acquired by Facebook (now Meta Platforms) on 7 August 2014. History PrivateCore was founded in 2011 by security veterans from VMware and Google with seed funding from Foundation Capital. PrivateCore “virtualizes” physical security and enables service providers and enterprises to deploy servers processing sensitive data in outsourced environments while maintaining security around data in use. The company's memory encryption technology has been spurred by a number of industry trends including the increasing sophistication of hackers, a larger number of servers in outsourced environments, larger amounts of sensitive data being placed in persistent memory, and x86 virtualization technology which can increase the environment attack surface. PrivateCore was acquired by Facebook, a deal that was announced on 7 August 2014. Technology PrivateCore's focus is securing data-in-use on x86 servers. The company has taken advantage of recent microprocessor innovations including larger microprocessor caches and hardware cryptographic acceleration technology that enable more effective methods of encrypting memory while maintaining acceptable application performance. The technology approach goes beyond previous academic research efforts such as TRESOR. PrivateCore assumes that the only element th
https://en.wikipedia.org/wiki/BTRON
BTRON (Business TRON) is one of the subprojects of the TRON Project proposed by Ken Sakamura, which is responsible for the business phase. It refers to the operating systems (OS), keyboards, peripheral interface specifications, and other items related to personal computers (PCs) that were developed there. Originally, it refers to specifications rather than specific products, but in reality, the term "BTRON" is often used to refer to implementations. Currently, Personal Media Corporation's B-right/V is an implementation of BTRON3, and a software product called "" that includes it has been released. Specifications As with other TRON systems, only the specification of BTRON has been formulated, and the implementation method is not specified. Implementation is mentioned in this section to the extent necessary to explain the specification, but please refer to the Implementation section for details. BTRON1, BTRON2, BTRON3 The BTRON project began with Matsushita Electric Industrial and Personal Media prototyping "BTRON286," an implementation on a 16-bit CPU 286 for the CEC machine described below. BTRON1 specifications include the BTRON1 Programming Standard Handbook, which describes the OS API, and the BTRON1 Specification Software Specification. which describes the OS API. BTRON2 is planned to be implemented on , and only the specification has been created and published. It is planned to be implemented on evaluation machines equipped with TRON chips made by Fujitsu and named "2B". One of its features is that all OS-managed computing resources such as memory, processes, and threads are handled in a real/pseudomorphic model, a feature of BTRON. SIGBTRON's TRON chip machine MCUBE implemented "3B," which is 32-bit and uses an ITRON-specification RTOS (modified from "ItIs") for the microkernel. 3B and The B-right specification used in , etc. is "BTRON3" (currently, the microkernel is I-right); the specification that B-right/V conforms to is published as the BTRON3 spec
https://en.wikipedia.org/wiki/Saccheri%20quadrilateral
A Saccheri quadrilateral is a quadrilateral with two equal sides perpendicular to the base. It is named after Giovanni Gerolamo Saccheri, who used it extensively in his 1733 book (Euclid freed of every flaw), an attempt to prove the parallel postulate using the method reductio ad absurdum. Such a quadrilateral is sometimes called a Khayyam–Saccheri quadrilateral to credit Persian scholar Omar Khayyam who described them in his 11th century book (Explanations of the difficulties in the postulates of Euclid). For a Saccheri quadrilateral the legs and are equal in length and each perpendicular to the base The top is called the summit and the angles at and are called the summit angles. The advantage of using Saccheri quadrilaterals when considering the parallel postulate is that they clearly present three mutually exclusive options: Are the summit angles right angles, obtuse angles, or acute angles? Saccheri himself did not consider the possibility of non-Euclidean geometry and believed that both the obtuse and acute cases could be shown to be contradictory from Euclid's other postulates. He did show that the obtuse case was contradictory, but failed to properly handle the acute case. The existence of a Saccheri quadrilateral with right angles at the summit for any base and sides is equivalent to the parallel postulate, leading to Euclidean geometry. In hyperbolic geometry, arising from the negation of the parallel postulate, the summit angles are always acute. In elliptic or spherical geometry (which require a few modifications to Euclid's other postulates), the summit angles are always obtuse. History While the quadrilaterals are named for Saccheri, they were considered in the works of earlier mathematicians. Saccheri's first proposition states that if two equal lines and form equal angles with the line the angles at will equal each other; a version of this statement appears in the works of the ninth century scholar Thabit ibn Qurra. Abner of Burgos's
https://en.wikipedia.org/wiki/Cells%20%28journal%29
Cells is a monthly peer-reviewed open-access scientific journal that covers all aspects of cell and molecular biology, and biophysics. It was established in 2012 and is published by MDPI. The founding editor-in-chief is Alexander E. Kalyuzhny (University of Minnesota) who was joined by Cord Brakebusch (University of Copenhagen) in 2020. Abstracting and indexing The journal is abstracted and indexed in: Biological Abstracts BIOSIS Previews EBSCO databases Embase Index Medicus/MEDLINE/PubMed Science Citation Index Expanded Scopus According to the Journal Citation Reports, the journal has a 2021 impact factor of 7.666.
https://en.wikipedia.org/wiki/Polycomb%20repressive%20complex%201
Polycomb repressive complex 1 (PRC1) is one of the two classes of Polycomb Repressive complexes, the other being PRC2. Polycomb-group proteins play a major role in transcriptional regulation during development. Polycomb Repressive Complexes PRC1 and PRC2 function in the silencing of expression of the Hox gene network involved in development as well as the inactivation of the X chromosome. PRC1 inhibits the activated form of RNA polymerase II preinitiation complex with the use of H3K27me. PRC1 binds to three nucleosomes, this is believed to limit access of transcription factors to the chromatin, and therefore limit gene expression.
https://en.wikipedia.org/wiki/Sturm%E2%80%93Liouville%20theory
In mathematics and its applications, a Sturm–Liouville problem is a second-order linear ordinary differential equation of the form: for given functions , and , together with some boundary conditions at extreme values of . The goals of a given Sturm–Liouville problem are: To find the for which there exists a non-trivial solution to the problem. Such values are called the eigenvalues of the problem. For each eigenvalue , to find the corresponding solution of the problem. Such functions are called the eigenfunctions associated to each . Sturm–Liouville theory is the general study of Sturm–Liouville problems. In particular, for a "regular" Sturm–Liouville problem, it can be shown that there are an infinite number of eigenvalues each with a unique eigenfunction, and that these eigenfunctions form an orthonormal basis of a certain Hilbert space of functions. This theory is important in applied mathematics, where Sturm–Liouville problems occur very frequently, particularly when dealing with separable linear partial differential equations. For example, in quantum mechanics, the one-dimensional time-independent Schrödinger equation is a Sturm–Liouville problem. Sturm–Liouville theory is named after Jacques Charles François Sturm (1803–1855) and Joseph Liouville (1809–1882) who developed the theory. Main results The main results in Sturm–Liouville theory apply to a Sturm–Liouville problem on a finite interval that is "regular". The problem is said to be regular if: the coefficient functions and the derivative are all continuous on ; and for all ; the problem has separated boundary conditions of the form: The function , sometimes denoted , is called the weight or density function. The goals of a Sturm–Liouville problem are: to find the eigenvalues: those for which there exists a non-trivial solution; for each eigenvalue , to find the corresponding eigenfunction . For a regular Sturm–Liouville problem, a function is called a solution if it is con
https://en.wikipedia.org/wiki/153%20%28number%29
153 (one hundred [and] fifty-three) is the natural number following 152 and preceding 154. In mathematics The number 153 is associated with the geometric shape known as the Vesica Piscis or Mandorla. Archimedes, in his Measurement of a Circle, referred to this ratio (153/265), as constituting the "measure of the fish", this ratio being an imperfect representation of . As a triangular number, 153 is the sum of the first 17 integers, and is also the sum of the first five positive factorials:. The number 153 is also a hexagonal number, and a truncated triangle number, meaning that 1, 15, and 153 are all triangle numbers. The distinct prime factors of 153 add up to 20, and so do the ones of 154, hence the two form a Ruth-Aaron pair. Since , it is a 3-narcissistic number, and it is also the smallest three-digit number which can be expressed as the sum of cubes of its digits. Only five other numbers can be expressed as the sum of the cubes of their digits: 0, 1, 370, 371 and 407. It is also a Friedman number, since 153 = 3 × 51. The Biggs–Smith graph is a symmetric graph with 153 edges, all equivalent. Another feature of the number 153 is that it is the limit of the following algorithm: Take a random positive integer, divisible by three Split that number into its base 10 digits Take the sum of their cubes Go back to the second step An example, starting with the number 84: There are 153 uniform polypeta that are generated from four different fundamental Coxeter groups in six-dimensional space. In the Bible The Gospel of John (chapter 21:1–14) includes the narrative of the miraculous catch of 153 fish as the third appearance of Jesus after his resurrection. The precision of the number of fish in this narrative has long been considered peculiar, and many scholars have argued that 153 has some deeper significance. Jerome, for example, wrote that Oppian's Halieutica listed 153 species of fish, although this could not have been the intended meaning of the Gosp