source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Asterionellopsidaceae | Asterionellopsidaceae is a family of diatoms belonging to the order Rhaphoneidales.
Genera:
Asterionellopsis
Bleakeleya |
https://en.wikipedia.org/wiki/Worksoft | Worksoft, Inc. is a software testing company founded in 1998 and headquartered in Addison, Texas. The company provides an automation platform for test automation, business process discovery, and documentation supporting enterprise applications, including packaged and web apps.
In addition to its headquarters in Addison, Texas, the company has offices in London and Munich.
History
Worksoft was founded in 1998 by Linda Hayes, a co-founder of AutoTester, Inc, and was initially funded by a contract with Fidelity Investments for Y2K testing. Worksoft Certify was the first script-less automation tool designed for business analysts and is now a leader in the ERP automation industry. Texas-based Austin Ventures and California-based Crecendo Ventures are major investors. In 2010, Worksoft acquired TestFactory, a software testing company specializing in SAP.
In 2019, Worksoft was acquired by Marlin Equity Partners for an undisclosed sum.
Products
Worksoft Certify is a test automation platform focused on business process testing. Worksoft Certify can be used to test ERP applications, web apps, mobile apps, and more. The software is SAP certified for integration with SAP applications.
Other products include Worksoft Analyze, Worksoft Business Reporting Tool (BPP), Worksoft Execution Suite, and Process Capture 2.0. |
https://en.wikipedia.org/wiki/Deepfake | Deepfakes (portmanteau of "deep learning" and "fake") are synthetic media that have been digitally manipulated to replace one person's likeness convincingly with that of another. Deepfakes are the manipulation of facial appearance through deep generative methods. While the act of creating fake content is not new, deepfakes leverage powerful techniques from machine learning and artificial intelligence to manipulate or generate visual and audio content that can more easily deceive. The main machine learning methods used to create deepfakes are based on deep learning and involve training generative neural network architectures, such as autoencoders, or generative adversarial networks (GANs). In turn the field of image forensics develops techniques to detect manipulated images.
Deepfakes have garnered widespread attention for their potential use in creating child sexual abuse material, celebrity pornographic videos, revenge porn, fake news, hoaxes, bullying, and financial fraud.
The spreading of disinformation and hate speech through deepfakes has a potential to undermine core functions and norms of democratic systems by interfering with people's ability to participate in decisions that affect them, determine collective agendas and express political will through informed decision-making.
This has elicited responses from both industry and government to detect and limit their use.
From traditional entertainment to gaming, deepfake technology has evolved to be increasingly convincing and available to the public, allowing the disruption of the entertainment and media industries.
History
Photo manipulation was developed in the 19th century and soon applied to motion pictures. Technology steadily improved during the 20th century, and more quickly with the advent of digital video.
Deepfake technology has been developed by researchers at academic institutions beginning in the 1990s, and later by amateurs in online communities. More recently the methods have been adopted b |
https://en.wikipedia.org/wiki/Dreamcast%20homebrew | Though Sega officially discontinued its Dreamcast video game console in 2001, and released the console's last official game in 2007, Dreamcast homebrew developers continued to release unofficial games for the console. Unlike homebrew communities for other consoles, the Dreamcast homebrew developers are organized in development teams, such as Redspotgames.
Community
Redspotgames is a German homebrew publisher.
NG:DEV.TEAM
Games
This is a partial list of games. For a more complete list, see List of Dreamcast homebrew games
(R4) |
https://en.wikipedia.org/wiki/Viral%20structural%20protein | A viral structural protein is a viral protein that is a structural component of the mature virus.
Examples include the SARS coronavirus 3a and 7a accessory proteins.
Bacteriophage T4 structural proteins
During assembly of the bacteriophage (phage) T4 virion, the structural proteins encoded by the phage genes interact with each other in a characteristic sequence. Maintaining an appropriate balance in the amounts of each of these structural proteins produced during viral infection appears to be critical for normal phage T4 morphogenesis. Phage T4 encoded proteins that determine virion structure include major structural components, minor structural components and non-structural proteins that catalyze specific steps in the morphogenesis sequence. Phage T4 morphogenesis is divided into three independent pathways: the head, the tail and the long tail fibres as detailed by Yap and Rossman.
See also
Viral nonstructural protein |
https://en.wikipedia.org/wiki/Tridiagonal%20matrix | In linear algebra, a tridiagonal matrix is a band matrix that has nonzero elements only on the main diagonal, the subdiagonal/lower diagonal (the first diagonal below this), and the supradiagonal/upper diagonal (the first diagonal above the main diagonal). For example, the following matrix is tridiagonal:
The determinant of a tridiagonal matrix is given by the continuant of its elements.
An orthogonal transformation of a symmetric (or Hermitian) matrix to tridiagonal form can be done with the Lanczos algorithm.
Properties
A tridiagonal matrix is a matrix that is both upper and lower Hessenberg matrix. In particular, a tridiagonal matrix is a direct sum of p 1-by-1 and q 2-by-2 matrices such that — the dimension of the tridiagonal. Although a general tridiagonal matrix is not necessarily symmetric or Hermitian, many of those that arise when solving linear algebra problems have one of these properties. Furthermore, if a real tridiagonal matrix A satisfies ak,k+1 ak+1,k > 0 for all k, so that the signs of its entries are symmetric, then it is similar to a Hermitian matrix, by a diagonal change of basis matrix. Hence, its eigenvalues are real. If we replace the strict inequality by ak,k+1 ak+1,k ≥ 0, then by continuity, the eigenvalues are still guaranteed to be real, but the matrix need no longer be similar to a Hermitian matrix.
The set of all n × n tridiagonal matrices forms a 3n-2
dimensional vector space.
Many linear algebra algorithms require significantly less computational effort when applied to diagonal matrices, and this improvement often carries over to tridiagonal matrices as well.
Determinant
The determinant of a tridiagonal matrix A of order n can be computed from a three-term recurrence relation. Write f1 = |a1| = a1 (i.e., f1 is the determinant of the 1 by 1 matrix consisting only of a1), and let
The sequence (fi) is called the continuant and satisfies the recurrence relation
with initial values f0 = 1 and f−1 = 0. The cost of computing the det |
https://en.wikipedia.org/wiki/Timeline%20of%20plesiosaur%20research | This timeline of plesiosaur research is a chronologically ordered list of important fossil discoveries, controversies of interpretation, taxonomic revisions, and cultural portrayals of plesiosaurs, an order of marine reptiles that flourished during the Mesozoic Era. The first scientifically documented plesiosaur fossils were discovered during the early 19th century by Mary Anning. Plesiosaurs were actually discovered and described before dinosaurs. They were also among the first animals to be featured in artistic reconstructions of the ancient world, and therefore among the earliest prehistoric creatures to attract the attention of the lay public. Plesiosaurs were originally thought to be a kind of primitive transitional form between marine life and terrestrial reptiles. However, now plesiosaurs are recognized as highly derived marine reptiles descended from terrestrial ancestors.
Early researchers thought that plesiosaurs laid eggs like most reptiles. They commonly imagined plesiosaurs crawling up beaches and burying eggs like turtles. However, later opinion shifted towards the idea that plesiosaurs gave live birth and never went on dry land. Plesiosaur locomotion has been a source of continuous controversy among paleontologists. The earliest speculations on the subject during the 19th century saw plesiosaur swimming as analogous to the paddling of modern sea turtles. During the 1920s opinion shifted to the idea that plesiosaurs swam with a rowing motion. However, a paper published in 1975 that once more found support for sea turtle-like swimming in plesiosaurs. This conclusion reignited the controversy regarding plesiosaur locomotion through the late 20th century. In 2011, F. Robin O'Keefe and Luis M. Chiappe concluded the debate on plesiosaur reproduction, reporting the discovery of a gravid female plesiosaur with a single large embryo preserved inside her.
Prescientific
Associated remains of plesiosaurs and animals like the diving bird Hesperornis or the ptero |
https://en.wikipedia.org/wiki/63rd%20meridian%20west | The meridian 63° west of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, Greenland, North America, the Atlantic Ocean, South America, the Southern Ocean, and Antarctica to the South Pole.
The 63rd meridian west forms a great circle with the 117th meridian east.
In the Canadian province of Quebec, the 63rd meridian is used as a time zone boundary, with all land to its west falling within the Eastern Time Zone and all land to its east in the Atlantic Time Zone (never used DST).
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 63rd meridian west passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="120" | Co-ordinates
! scope="col" width="135" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Lincoln Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut — Ellesmere Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Nares Strait
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
|Daugaard-Jensen Land
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Baffin Bay
| style="background:#b0e0e6;" |
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Davis Strait
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut — Baffin Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Davis Strait
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Nunavut — Muingmak Island
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Davis Strait
| style="background:#b0e0e6;" |
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Atlantic Ocean
| style="background:#b0e0e6;" | L |
https://en.wikipedia.org/wiki/Sergey%20Kondratyuk | Sergey Yakovlevich Kondratyuk () (born 17 May 1959) is a Ukrainian botanist specialising in lichenology. His research deals with the taxonomy, floristics, ecology and geography of lichens and lichenicolous fungi. He has worked at the for more than 40 years. In 2014 Kondratyuk was awarded the State Prize of Ukraine in Science and Technology.
Early life and education
Kondratyuk was born in the Kirovohrad region, in Ulyanovsk. After graduating from school in 1976 he became a student of the Faculty of Biology at Kyiv State University. He specialized in the Department of Lower Plants. While still a student, Kondratyuk started to study lichens under the guidance of O.B. Bloom. Then began his career at the Institute of Botany (1979), as a senior technician and later an engineer in the Department of Algology and Lichenology. He continued his career as a graduate student of the institute (1981–1984). After successfully defending his dissertation entitled "Lichens of the Dnieper Upland" (1985), Kondratyuk continued to work at the institute, having passed the path from junior to leading researcher, head of the laboratory and department, scientific secretary, deputy director and finally acting director of the institute. In 1996 Kondratyuk defended his doctoral dissertation "Lichen flora of the plains of Ukraine and its analysis"; in 2006 he received the title of Professor.
Research
Since 1995, Kondratyuk has been working for many years with Professor Ingvar Kärnefelt from the Botanical Museum of Lund University (Sweden) to study lichens of the family Teloschistaceae. Many new genera have been circumscribed as a result, including Xanthomendoza, Josefpoeltia, Oxneria, and Rusavskia. Extensive collaborations with South Korean scientists have also resulted in the description of many taxa previously unknown to science. As of 2019, Kondratyuk has been the author or co-author of more than 400 scientific publications. Some well-known publications include "Flora of lichens of Ukrai |
https://en.wikipedia.org/wiki/Balaban%2011-cage | In the mathematical field of graph theory, the Balaban 11-cage or Balaban (3,11)-cage is a 3-regular graph with 112 vertices and 168 edges named after Alexandru T. Balaban.
The Balaban 11-cage is the unique (3,11)-cage. It was discovered by Balaban in 1973. The uniqueness was proved by Brendan McKay and Wendy Myrvold in 2003.
The Balaban 11-cage is a Hamiltonian graph and can be constructed by excision from the Tutte 12-cage by removing a small subtree and suppressing the resulting vertices of degree two.
It has independence number 52, chromatic number 3, chromatic index 3, radius 6, diameter 8 and girth 11. It is also a 3-vertex-connected graph and a 3-edge-connected graph.
The characteristic polynomial of the Balaban 11-cage is:
.
The automorphism group of the Balaban 11-cage is of order 64.
Gallery |
https://en.wikipedia.org/wiki/Finnish%20Maiden | The Maiden of Finland (, ) is the national personification of Finland.
Personification
She is a barefoot young woman in her mid-twenties with blonde hair, blue eyes, wearing a blue and white national costume or a white dress. She was originally called Aura after the Aura River in Turku.
As a symbol, the Finnish Maiden has been used since the 19th century when she was pictured as a woman wearing a turreted crown, and then developing as Finland gained a national consciousness and independence. She was depicted in poetry and fine arts. Zachris Topelius and Walter Runeberg were important in establishing the Finnish Maiden as a symbol. Like the Mother Svea of neighbouring Sweden, the Finnish maiden was, at first, a mature woman, but gradually became younger.
Mapping
The Maiden of Finland can also refer to the shape of Finland on a map. It's imagined as a female form which has one hand raised (and another, before the Moscow Armistice of 1944), a head, and a skirt. The metaphor is so commonly used that the northwestern area around Enontekiö is known as the "arm" (Käsivarsi) even in official contexts.
See also
Suomen Neito |
https://en.wikipedia.org/wiki/Taxonomy%20of%20Narcissus | The taxonomy of Narcissus is complex, and still not fully resolved. Known to the ancients, the genus name appears in Graeco-Roman literature, although their interest was as much medicinal as botanical. It is unclear which species the ancients were familiar with. Although frequently mentioned in Mediaeval and Renaissance texts it was not formally described till the work of Linnaeus in 1753. By 1789 it had been grouped into a family (Narcissi) but shortly thereafter this was renamed Amaryllideae, from which comes the modern placement within Amaryllidaceae, although for a while it was considered part of Liliaceae.
Many of the species now considered to be Narcissus were in separate genera during the nineteenth century, and the situation was further confused by the inclusion of many cultivated varieties. By 1875 the current circumscription was relatively settled. By 2004 phylogenetic studies had allowed the place of Narcissus within its fairly large family to be established, nested within a series of subfamilies (Amaryllidoideae) and tribes (Narcisseae). It shares its position in the latter tribe with Sternbergia.
The infrageneric classification has been even more complex and many schemes of subgenera, sections, subsections and series have been proposed, although all had certain similarities. Most authorities now consider there to be 10 – 11 sections based on phylogenetic evidence. The problems have largely arisen from the diversity of the wild species, frequent natural hybridisation and extensive cultivation with escape and subsequent naturalisation. The number of species has varied anywhere from 16 to nearly 160, but is probably around 50 – 60.
The genus appeared some time in the Late Oligocene to Early Miocene eras, around 24 million years ago, in the Iberian peninsula. While the exact origin of the word Narcissus is unknown it is frequently linked to its fragrance which was thought to be narcotic, and to the legend of the youth of that name who fell in love with h |
https://en.wikipedia.org/wiki/CP/CMS | CP/CMS (Control Program/Cambridge Monitor System) is a discontinued time-sharing operating system of the late 1960s and early 1970s, known for its excellent performance and advanced features. Among its three versions, CP-40/CMS was an important "one-off" research system that established the CP/CMS virtual machine architecture. It was followed by CP-67/CMS, a reimplementation of CP-40/CMS for the IBM System/360-67, and the primary focus of this article. Finally, CP-370/CMS was a reimplementation of CP-67/CMS for the System/370. While it was never released as such, it became the foundation of IBM's VM/370 operating system, announced in 1972.
Each implementation was a substantial redesign of its predecessor and an evolutionary step forward. CP-67/CMS was the first widely available virtual machine architecture. IBM pioneered this idea with its research systems M44/44X (which used partial virtualization) and CP-40 (which used full virtualization).
In addition to its role as the predecessor of the VM family, CP/CMS played an important role in the development of operating system (OS) theory, the design of IBM's System/370, the time-sharing industry, and the creation of a self-supporting user community that anticipated today's free software movement.
History
Fundamental CP/CMS architectural and strategic parameters were established in CP-40, which began production use at IBM's Cambridge Scientific Center in early 1967. This effort occurred in a complex political and technical milieu, discussed at some length and supported by first-hand quotes in the Wikipedia article History of CP/CMS.
In a nutshell:
In the early 1960s, IBM sought to maintain dominance over scientific computing, where time-sharing efforts such as CTSS and MIT's Project MAC gained focus. But IBM had committed to a huge project, the System/360, which took the company in a different direction.
The time-sharing community was disappointed with the S/360's lack of time-sharing capabilities. This led to k |
https://en.wikipedia.org/wiki/Exon%20trapping | Exon trapping is a molecular biology technique to identify potential exons in a fragment of eukaryote DNA of unknown intron-exon structure. This is done to determine if the fragment is part of an expressed gene.
The genomic fragment is inserted into the intron of a 'splicing vector' consisting of a known exon - intron - exon sequence of DNA, and the vector is then inserted into an eukaryotic cell. If the fragment does not contain exons (i.e., consists solely of intron DNA), it will be spliced out together with the vector's original intron. On the other hand, if exons are contained, they will be part of the mature mRNA after transcription (with all intron material removed). The presence of 'trapped exons' can be detected by an increase in size of the mRNA, or through RT-PCR to amplify the DNA of interest.
The technique has largely been supplanted by the approach of sequencing cDNA generated from mRNA and then using bioinformatics tools such as NCBI's BLAST server to determine the source of the sequence, thereby identifying the appropriate exon-intron splice sites. |
https://en.wikipedia.org/wiki/Emerin | Emerin is a protein that in humans is encoded by the EMD gene, also known as the STA gene. Emerin, together with LEMD3, is a LEM domain-containing integral protein of the inner nuclear membrane in vertebrates. Emerin is highly expressed in cardiac and skeletal muscle. In cardiac muscle, emerin localizes to adherens junctions within intercalated discs where it appears to function in mechanotransduction of cellular strain and in beta-catenin signaling. Mutations in emerin cause X-linked recessive Emery–Dreifuss muscular dystrophy, cardiac conduction abnormalities and dilated cardiomyopathy.
It is named after Alan Emery.
Structure
Emerin is a 29.0 kDa (34 kDa observed MW) protein composed of 254 amino acids. Emerin is a serine-rich protein with an N-terminal 20-amino acid hydrophobic region that is flanked by charged residues; the hydrophobic region may be important for anchoring the protein to the membrane, with the charged terminal tails being cytosolic. In cardiac, skeletal, and smooth muscle, emerin localizes to the inner nuclear membrane; expression of emerin is highest in skeletal and cardiac muscle. In cardiac muscle specifically, emerin also resides at adherens junctions within intercalated discs.
Function
Emerin is a serine-rich nuclear membrane protein and a member of the nuclear lamina-associated protein family. It mediates membrane anchorage to the cytoskeleton. Emery–Dreifuss muscular dystrophy is an X-linked inherited degenerative myopathy resulting from mutation in the EMD (also known clinically as STA) gene. Emerin appears to be involved in mechanotransduction, as emerin-deficient mouse fibroblasts failed to transduce normal mechanosensitive gene expression responses to strain stimuli. In cardiac muscle, emerin is also found complexed to beta-catenin at adherens junctions of intercalated discs, and cardiomyocytes from hearts lacking emerin showed beta-catenin redistribution as well as perturbed intercalated disc architecture and myocyte shape. This |
https://en.wikipedia.org/wiki/Neuroheuristics | Neuroheuristics (or neuristics) studies the dynamic relations within neuroscientific knowledge, using a transdisciplinary studies approach. It was proposed by Alessandro Villa in 2000.
Etymology
The word comes from the Greek νεύρον (neuron, which refers to the nerve cell) and εύρισκω ("euriskein", heuristic, which refers to problem-solving procedures characterized by informal, intuitive and speculative features).
Paradigm
Neuroheuristics defines a scientific paradigm aimed to develop strategies that can be enabled to understand brain and mind following subsequent problems emerging from transdisciplinary studies including philosophy, psychology, neuroscience, pharmacology, physics, artificial intelligence, engineering, computer science, economics and mathematics.
The research framework introduced by the neuroheuristic paradigm appears as an essential step for the investigation of the information processing effected by the brain because it is the outcome of nature and nurture, at the crossing of top-down and bottom-up design.
Neurobiologists apply a bottom-up research strategy in their studies. This strategy has been able to describe a simple organism's nervous system, such as Caenorhabditis elegans. However, it would be impossible to simultaneously examine all neurons and all variables. This limits the value experimentation using this method could provide.
The top-down strategy with the assistance of black box theory appears easier to complete, but inappropriate for understanding the mechanisms which coordinate neurons.
The paradigm offers a needed and possibly distinct approach to the study of brain and mind.
In this framework, a result cannot be simply positive or negative because the process itself cannot be reduced to proficiency as such. Dynamics is an essential feature of the neuroheuristic paradigm, but it is more than just the neurobiological facet of holism as opposed to reductionism. |
https://en.wikipedia.org/wiki/Gruber%20Prize%20in%20Genetics | The Gruber Prize in Genetics, established in 2001, is one of three international awards worth US$500,000 made by the Gruber Foundation, a non-profit organization based at Yale University in New Haven, Connecticut.
The Genetics Prize honors leading scientists for distinguished contributions in any realm of genetics research. The Foundation’s other international prizes are in Cosmology, Neuroscience, Justice, and Women’s Rights.
Recipients
2023 Allan Jacobson (University of Massachusetts Chan Medical School), and Lynne E. Maquat (University of Rochester School of Medicine)
2022 Ruth Lehmann (Whitehead Institute and MIT), James Priess (Fred Hutchinson Cancer Research Center), and Geraldine Seydoux (Johns Hopkins University School of Medicine).
2021 Stuart H. Orkin (Harvard Medical School, Howard Hughes Medical Institute)
2020 Bonnie Bassler (Princeton University, Howard Hughes Medical Institute)
2019 Bert Vogelstein (Johns Hopkins Hospital, Howard Hughes Medical Institute)
2018 Joanne Chory (Salk Institute for Biological Studies), and Elliot Meyerowitz (Caltech)
2017 Stephen J. Elledge, Harvard Medical School
2016 Michael Grunstein, University of California, Los Angeles (UCLA) and C. David Allis, Rockefeller Foundation
2015 Emmanuelle Charpentier, Helmholtz Centre for Infection Research in Germany and Jennifer Doudna, University of California, Berkeley
2014 Victor Ambros, PhD, University of Massachusetts; David Baulcombe, PhD, University of Cambridge; and Gary Ruvkun, PhD, Harvard University
2013 Svante Pääbo, PhD
2012 Douglas C. Wallace, PhD
2011 Ronald W. Davis, PhD, Stanford University
2010 Gerald Fink, PhD, the Margaret and Herman Sokol Professor at MIT
2009 Janet Rowley, MD, the Blum-Riese Distinguished Service Professor at the University of Chicago
2008 Allan C. Spradling, PhD, of the Carnegie Institution for Science and Howard Hughes Medical Institute (HHMI) in Baltimore; for his work on fruit fly genomics
2007 Maynard Olson of the University of Washington, a |
https://en.wikipedia.org/wiki/Regdanvimab | Regdanvimab, sold under the brand name Regkirona, is a human monoclonal antibody used for the treatment of COVID-19. The antibody is directed against the spike protein of SARS-CoV-2. It is developed by Celltrion. The medicine is given by infusion (drip) into a vein.
The most common side effects include infusion-related reactions, including allergic reactions and anaphylaxis.
Regdanvimab was approved for medical use in the European Union in November 2021.
Medical uses
In the European Union, regdanvimab is indicated for the treatment of adults with COVID-19 who do not require supplemental oxygen and who are at increased risk of progressing to severe COVID-19.
Society and culture
Legal status
In March 2021, the Committee for Medicinal Products for Human Use (CHMP) of the European Medicines Agency (EMA) started a rolling review of data on regdanvimab. In October 2021, the EMA started evaluating an application for marketing authorization for the monoclonal antibody regdanvimab (Regkirona) to treat adults with COVID-19 who do not require supplemental oxygen therapy and who are at increased risk of progressing to severe COVID-19. The applicant is Celltrion Healthcare Hungary Kft. The European Medicines Agency (EMA) concluded that regdanvimab can be used for the treatment of confirmed COVID-19 in adults who do not require supplemental oxygen therapy and who are at high risk of progressing to severe COVID-19.
In November 2021, the Committee for Medicinal Products for Human Use (CHMP) of the European Medicines Agency (EMA) recommended granting a marketing authorization in the European Union for regdanvimab (Regkirona) for the treatment of COVID-19. The company that applied for authorization of Regkirona is Celltrion Healthcare Hungary Kft. Regdanvimab was approved for medical use in the European Union in November 2021.
Names
Regdanvimab is the international nonproprietary name (INN). |
https://en.wikipedia.org/wiki/List%20of%20infectious%20diseases%20causing%20flu-like%20syndrome | This is a list of infectious diseases, other than the most common ones, that cause flu-like syndrome (influenza-like illness):
Bacterial
Anthrax
Brucellosis
Cat scratch fever
Legionellosis
Leptospirosis
Listeriosis
Lyme disease
Lymphogranuloma venereum
Mastitis
Salmonellosis
Toxic Shock Syndrome
Syphilis
Tuberculosis
Scrub typhus
Rocky Mountain spotted fever
Viral
Bornholm disease (Coxsackie B virus)
COVID-19
Chickenpox
Cytomegalovirus
Eastern equine encephalitis virus
California encephalitis virus
Enteroviruses
Hendra virus
Hepatitis A, B, C, D, E
Herpes
HIV-1, -2
Newcastle disease
Human parainfluenza viruses
Human rhinovirus
Measles
MERS coronavirus
Human respiratory syncytial virus (RSV)
Rubella
SARS coronavirus
SARS coronavirus 2
Slapped cheek syndrome
Smallpox
Togaviridae
Venezuelan equine encephalitis
Fungal
Blastomycosis
Coccidioidomycosis
Histoplasmosis
Stachybotrys chartarum
Protozoan
Babesiosis
Leishmaniasis
Malaria
Toxoplasmosis |
https://en.wikipedia.org/wiki/Pixel%20aspect%20ratio | A Pixel aspect ratio (often abbreviated PAR) is a mathematical ratio that describes how the width of a pixel in a digital image compared to the height of that pixel.
Most digital imaging systems display an image as a grid of tiny, square pixels. However, some imaging systems, especially those that must be compatible with standard-definition television motion pictures, display an image as a grid of rectangular pixels, in which the pixel width and height are different. Pixel aspect ratio describes this difference.
Use of pixel aspect ratio mostly involves pictures pertaining to standard-definition television and some other exceptional cases. Most other imaging systems, including those that comply with SMPTE standards and practices, use square pixels.
PAR is also known as sample aspect ratio and abbreviated SAR, though it can be confused with storage aspect ratio.
Introduction
The ratio of the width to the height of an image is known as the aspect ratio, or more precisely the display aspect ratio (DAR) – the aspect ratio of the image as displayed; for TV, DAR was traditionally 4:3 (a.k.a. fullscreen), with 16:9 (a.k.a. widescreen) now the standard for HDTV. In digital images, there is a distinction with the storage aspect ratio (SAR), which is the ratio of pixel dimensions. If an image is displayed with square pixels, then these ratios agree; if not, then non-square, "rectangular" pixels are used, and these ratios disagree. The aspect ratio of the pixels themselves is known as the pixel aspect ratio (PAR) – for square pixels this is 1:1 – and these are related by the identity:
{| class="wikitable"
|-
| SAR × PAR = DAR
|}
Rearranging (solving for PAR) yields:
{| class="wikitable"
|-
| PAR = DAR / SAR
|}
For example:
A 640 × 480 VGA image has a SAR of 640/480 = 4:3, and if displayed on a 4:3 display (DAR = 4:3) has square pixels, hence a PAR of 1:1.
By contrast, a 720 × 576 D-1 PAL image has a SAR of 720/576 = 5:4, but if displayed on a 4:3 display (DAR = 4:3) |
https://en.wikipedia.org/wiki/Pathophysiology%20of%20multiple%20sclerosis | Multiple sclerosis is an inflammatory demyelinating disease of the CNS in which activated immune cells invade the central nervous system and cause inflammation, neurodegeneration, and tissue damage. The underlying cause is currently unknown. Current research in neuropathology, neuroimmunology, neurobiology, and neuroimaging, together with clinical neurology, provide support for the notion that MS is not a single disease but rather a spectrum.
There are three clinical phenotypes: relapsing-remitting MS (RRMS), characterized by periods of neurological worsening following by remissions; secondary-progressive MS (SPMS), in which there is gradual progression of neurological dysfunction with fewer or no relapses; and primary-progressive MS (MS), in which neurological deterioration is observed from onset.
Pathophysiology is a convergence of pathology with physiology. Pathology is the medical discipline that describes conditions typically observed during a disease state; whereas physiology is the biological discipline that describes processes or mechanisms operating within an organism. Referring to MS, the physiology refers to the different processes that lead to the development of the lesions and the pathology refers to the condition associated with the lesions.
Pathology
Multiple sclerosis can be pathologically defined as the presence of distributed glial scars (or sclerosis) in the central nervous system disseminated in time (DIT) and space (DIS). The gold standard for MS diagnosis is pathological correlation, though given its limited availability, other diagnosis methods are normally used. The scleroses that define the disease are the remainders of previous demyelinating lesions in the CNS white matter of a patient (encephalomyelitis) showing special characteristics, such as confluent instead of perivenous demyelination.
There are three phases for how an unknown underlying condition may cause damage in MS:
An unknown soluble factor (produced by CD8+ T-cells or CD2 |
https://en.wikipedia.org/wiki/Series%2030%2B | Series 30+ (abbreviated as S30+) is a software platform and application user interface used for Nokia-branded mobile devices. The platform was introduced by Nokia in September 2013, first appearing on the Nokia 108, and has been the main Nokia feature phone operating system after the end of the Series 30 and Series 40 platforms in 2014. Despite the similar name and user interface, S30+ is technically completely different and unrelated to S30.
Many S30+ devices only support MAUI Runtime Environment, and application file (.vxp) developed by MediaTek, but some later devices have included support for J2ME applications. Even for models that don't support Java J2ME applications, some are still capable of running something. Some S30+ models also come with an online shop that would allow downloading new apps and games.
Some newer phone models with "Series 30+" platform are said to be based on RTOS.
List of devices
The following feature phones use the Series 30+ platform and are all available as both single and Dual SIM models.
Made by Nokia
Nokia 108 released in 2013 is a Series 30+ based device with support for camera, video and Bluetooth technology.
Nokia 220 was released in 2014 with 2.4-inch display and having Nokia Xpress browser and GPRS data connection (2.5G).
Nokia 225, released in 2014, is similar to the 220 but has a larger 2.8-inch display.
Made by Microsoft
Nokia 130 is a smaller device with a 1.8-inch display, also released in 2014.
Nokia 215 was announced in January 2015. Like the 220, the 215 has a 2.4-inch display, has GPRS – EDGE connectivity and only has a VGA camera.
Nokia 105 (2015) is a device announced in June 2015, it notably had increased storage and could store over 2.000 contacts and last 35 days on standby, and is advertised as a backup telephone for smartphone users.
Nokia 222 is a device announced in August 2015. The differentiation from its predecessors is that it comes with Skype's GroupMe application preinstalled, supports J2ME app |
https://en.wikipedia.org/wiki/Avian%20coronavirus%209203 | Avian coronavirus 9203 is a species of coronavirus in the genus Gammacoronavirus. |
https://en.wikipedia.org/wiki/Bollob%C3%A1s%E2%80%93Riordan%20polynomial | The Bollobás–Riordan polynomial can mean a 3-variable invariant polynomial of graphs on orientable surfaces, or a more general 4-variable invariant of ribbon graphs, generalizing the Tutte polynomial.
History
These polynomials were discovered by .
Formal definition
The 3-variable Bollobás–Riordan polynomial of a graph is given by
,
where the sum runs over all the spanning subgraphs and
is the number of vertices of ;
is the number of its edges of ;
is the number of components of ;
is the rank of , such that ;
is the nullity of , such that ;
is the number of connected components of the boundary of .
See also
Graph invariant |
https://en.wikipedia.org/wiki/Biology%20of%20trust | The biology of trust is the study of physiological mechanisms involved in mediating trust in social attachments. It has been studied in terms of genetics, endocrinology and neurobiology.
Trust is the intentional choice to believe the input of strangers because one believes they know the truth and have one's best interest at heart. Trust is important in creating social attachments.
Social bonds is a characteristic present in many mammals and other vertebrae species. However, there exists a paradox in the formation of social bonds in humans- while there are benefits, drawbacks, such as judgment, vulnerabilities to harmful physical and emotional hurt do exist. And overarching all of this is trust, which is marked by the intentional choice to rely on another individual for an underlying purpose, despite drawbacks- a factor in social bonds with biological implications.
Neural Mechanisms
Neuropeptides, specifically oxytocin (OT) and arginine-vasopressin (AVP), have been shown to be involved in physiological mechanisms of social behavior. Sex hormones, have also been correlated. The involvement of OT and AVP in trust and social attachment can be attributed the fact that both molecules can be released as neurotransmitters or hormones throughout the body. OT and AVP act as neurotransmitters when released directly by the hypothalamus; they act as neurohormones when released peripherally by the pituitary gland. So, both AVP and OT are peripheral (functioning throughout the body) and central (functioning within the brain).
Both social bonding and social attachment involve OT. In female rats that had OT injected directly into the brain, studies found that the OT rats exhibited full maternal behavior towards foster pups. In studies involving human subjects, increases in OT were observed in subjects who received intentional trust signals in a controlled trust game. When an OT receptor antagonist was injected in rats, it was found that there was a decrease in social recognit |
https://en.wikipedia.org/wiki/TEOS-10 | TEOS-10 (Thermodynamic Equation of Seawater - 2010) is the international standard for the use and calculation of the thermodynamic properties of seawater, humid air and ice. It supersedes the former standard EOS-80 (Equation of State of Seawater 1980). TEOS-10 is used by oceanographers and climate scientists to calculate and model properties of the oceans in an internationally comparable way.
History
TEOS-10 was developed by the SCOR(Scientific Committee on Oceanic Research)/IAPSO(International Association for the Physical Sciences of the Oceans) Working Group 127 which was chaired by Trevor McDougall. It has been approved as the official description of the thermodynamic properties of seawater, humid air and ice in 2009 by the Intergovernmental Oceanographic Commission (IOC) and in 2011 by the International Union of Geodesy and Geophysics (IUGG).
Physical basis
TEOS-10 is based on thermodynamic potentials. Fluids like humid air and liquid water in TEOS-10 are therefore described by the Helmholtz energy F(m,T,V)=F(m,T,m/ρ) or the specific Helmholtz-energy f(T,ρ)=F(m,T,m/ρ)/m. The Helmholtz energy has a unique value across phase boundaries. For the calculation of the thermodynamic properties of seawater and ice, TEOS-10 uses the specific Gibbs potential g(T,P)=G/m, G=F+pV, because the pressure is a more easily measurable property than density in a geophysical context. Gibbs energies are multivalued around phase boundaries and need to be defined for each phase separately.
The thermodynamic potential functions are determined by a set of adjustable parameters which are tuned to fit experimental data and theoretical laws of physics like the ideal gas equation. Since absolute energy and entropy cannot be directly measured, arbitrary reference states for liquid water, seawater and dry air in TEOS-10 are defined in a way that
internal energy and entropy of liquid water at the solid-liquid-gas triple point are zero,
entropy and enthalpy of seawater are zero at SA (Abso |
https://en.wikipedia.org/wiki/Network%20utility | Network utilities are software utilities designed to analyze and configure various aspects of computer networks. The majority of them originated on Unix systems, but several later ports to other operating systems exist.
The most common tools (found on most operating systems) include:
, ping a host to check connectivity (reports packet loss and latency, uses ICMP).
shows the series of successive systems a packet goes through en route to its destination on a network. It works by sending packets with sequential TTLs which generate ICMP TTL-exceeded messages from the hosts the packet passes through.
, used to query a DNS server for DNS data (deprecated on Unix systems in favour of and ; the preferred tool on Microsoft Windows systems).
vnStat, useful command to monitor network traffic from the console. vnstat allows to keep the traffic information in a log system to be analyzed by third party tools.
Other network utilities include:
, displays network connections (both incoming and outgoing), routing tables, and a number of network interface and network protocol statistics. It is used for finding problems in the network and to determine the amount of traffic on the network as a performance measurement.
, which sprays numerous packets in the direction of a host and reports results
allows local or remote configuration of network devices, Microsoft Windows
Some usages of network configuration tools also serve to display and diagnose networks, for example:
(on Linux)
(on Unix)
(on Windows)
can display an IP routing table
Main network utilities
List of the most useful network commands |
https://en.wikipedia.org/wiki/Balanites%20angolensis | Balanites angolensis, or Angolan green-thorn, is a species of tree from southern Africa, it is a member of the caltrop family, Zygophyllaceae.
Description
Balanites angolensis is a small semi-deciduous tree or shrub which grows to up to 8m in height. It has rough, corrugated bark which is green or greenish yellow on young shoots which are covered in dense hairs with yellow or green thorns which are up to 9 cm long. The flowers are greenish-yellow to whitish and are borne in small axillary clusters, each flower consisting of 5 petals and 5 sepals. The fruit is 30mm long, ovoid in shape and is orange when ripe. The leaves are alternate, consisting of one pair of leaflets, 12-17mm in length, leathery, yellowish green and downy. The leaves are ovoid with a pointed tip and tapering base and a short stalk.
Distribution
Balanites angolensis is found in Angola, Botswana and north eastern Namibia.
Habitat
Balanites angolensis occurs along seasonal watercourses and in savannah, on dry hills and in coastal forest. In dry scrub forest and mopane woodland Balanites angolensis is part of the understorey community.
Phenology
In Namibia Balanites angolensis flowers in October and November, fruit is seen from November but peaks in March and April.
Uses
The fruit is edible, the branches are used by the Himba for fencing and the roots are used by the Himba to treat breast complaints in nursing mothers by inhaling the smoke of the burning roots and by making an ointment out of the ashes and smearing this on the breasts. Extracts from the tree are also used to treat genitourinary system disorders.
Subspecies
There are two recognised subspecies:
Balanites angolensis angolensis (Welw.) Mildbr. & Schltr. from Angola and Botswana.
Balanites angolensis welwitschii (Tiegh.) Exell & Mendonça from north eastern Namibia. |
https://en.wikipedia.org/wiki/Graph%20realization%20problem | The graph realization problem is a decision problem in graph theory. Given a finite sequence of natural numbers, the problem asks whether there is a labeled simple graph such that is the degree sequence of this graph.
Solutions
The problem can be solved in polynomial time. One method of showing this uses the Havel–Hakimi algorithm constructing a special solution with the use of a recursive algorithm. Alternatively, following the characterization given by the Erdős–Gallai theorem, the problem can be solved by testing the validity of inequalities.
Other notations
The problem can also be stated in terms of symmetric matrices of zeros and ones. The connection can be seen if one realizes that each graph has an adjacency matrix where the column sums and row sums correspond to . The problem is then sometimes denoted by symmetric 0-1-matrices for given row sums.
Related problems
Similar problems describe the degree sequences of simple bipartite graphs or the degree sequences of simple directed graphs. The first problem is the so-called bipartite realization problem. The second is known as the digraph realization problem.
The problem of constructing a solution for the graph realization problem with the additional constraint that each such solution comes with the same probability was shown to have a polynomial-time approximation scheme for the degree sequences of regular graphs by Cooper, Martin, and Greenhill. The general problem is still unsolved. |
https://en.wikipedia.org/wiki/Angle%20of%20arrival | The angle of arrival (AoA) of a signal is the direction from which the signal (e.g. radio, optical or acoustic) is received.
Measurement
Measurement of AoA can be done by determining the direction of propagation of a radio-frequency wave incident on an antenna array or determined from maximum signal strength during antenna rotation.
The AoA can be calculated by measuring the time difference of arrival (TDOA) between individual elements of the array.
Generally this TDOA measurement is made by measuring the difference in received phase at each element in the antenna array. This can be thought of as beamforming in reverse. In beamforming, the signal from each element is weighed to "steer" the gain of the antenna array. In AoA, the delay of arrival at each element is measured directly and converted to an AoA measurement.
Consider, for example, a two element array spaced apart by one-half the wavelength of an incoming RF wave. If a wave is incident upon the array at boresight, it will arrive at each antenna simultaneously. This will yield 0° phase-difference measured between the two antenna elements, equivalent to a 0° AoA. If a wave is incident upon the array at broadside, then a 180° phase difference will be measured between the elements, corresponding to a 90° AoA.
In optics, AoA can be calculated using interferometry.
Applications
An application of AoA is in the geolocation of cell phones. The aim is either for the cell system to report the location of a cell phone placing an emergency call or to provide a service to tell the user of the cell phone where they are. Multiple receivers on a base station would calculate the AoA of the cell phone's signal, and this information would be combined to determine the phone's location.
AoA is generally used to discover the location of pirate radio stations or of any military radio transmitter.
In submarine acoustics, AoA is used to localize objects with active or passive ranging.
Limitation
Limitations on the acc |
https://en.wikipedia.org/wiki/Rackmount%20KVM | A KVM is a computer input/output device offering the combination of a keyboard, video monitor and mouse (pointing device). They are typically constructed to fit into a 19-inch rack although there are manufacturers who offer a KVM that can be mounted to a flat surface such as a control console.
Etymology
KVMs did not exist until the advent of the LCD computer monitor. Prior to the introduction of the KVM, there existed rack-mounted CRT monitors and separate rack-mounted keyboards and mice. With the introduction of the LCD computer monitor, it became possible to combine the display with the keyboard and pointing device into a 1U, 2U or 3U rackmount form factor to create the KVM.
Ibus, a now defunct computer company, secured patent US5388032, filed May 4, 1993, showing a KVM with a "discriminator" to connect to multiple computers. The "discriminator" is now known as a KVM switch.
Designs
There are two basic designs for KVMs: clamshell and lay-flat.
A Clamshell design hinges the display at the rear so that it folds forward over the keyboard for storage. The advantage to this design is shorter installed depth. The disadvantage is the 1U thickness of the assembly limits the available height for the keyboard and track-ball (if installed). Some KVMs have been designed to fit into 2U to allow a larger track-ball and full-travel keyboard to be installed.
A Lay-flat design hinges the display at the front edge of the display so that the display folds back. The advantage to this design is the full 1U height can be used for keyboard and track-ball height. The disadvantage is a much greater installed depth.
A design variation provides for a slim profile keyboard mounted in independent slides under the display and the display is hinged and mounted at the front of the unit. This allows the display to be deployed with the keyboard stowed so it does not protrude into aisle space. The display, when tilted upright, may only protrude an inch or so, effectively flush with |
https://en.wikipedia.org/wiki/Salted%20Challenge%20Response%20Authentication%20Mechanism | In cryptography, the Salted Challenge Response Authentication Mechanism (SCRAM) is a family of modern, password-based challenge–response authentication mechanisms providing authentication of a user to a server. As it is specified for Simple Authentication and Security Layer (SASL), it can be used for password-based logins to services like SMTP and IMAP (e-mail), XMPP (chat), or MongoDB and PostgreSQL (databases). For XMPP, supporting it is mandatory.
Motivation
Alice wants to log into Bob's server. She needs to prove she is who she claims to be. For solving this authentication problem, Alice and Bob have agreed upon a password, which Alice knows, and which Bob knows how to verify.
Now Alice could send her password over an unencrypted connection to Bob in a clear text form, for him to verify. That would however make the password accessible to Mallory, who is wiretapping the line. Alice and Bob could try to bypass this by encrypting the connection. However, Alice doesn't know whether the encryption was set up by Bob, and not by Mallory by doing a man-in-the-middle attack. Therefore, Alice sends a hashed version of her password instead, like in CRAM-MD5 or DIGEST-MD5. As it is a hash, Mallory doesn't get the password itself. And because the hash is salted with a challenge, Mallory could use it only for one login process. However, Alice wants to give some confidential information to Bob, and she wants to be sure it's Bob and not Mallory.
For solving this, Bob has registered himself to a certificate authority (CA), which signed his certificate. Alice could solely rely on that signature system, but she knows it has weaknesses. To give her additional assurance that there is no man-in-the-middle attack, Bob creates a proof that he knows the password (or a salted hash thereof), and includes his certificate into this proof. This inclusion is called channel binding, as the lower encryption channel is 'bound' to the higher application channel.
Alice then has an authenticat |
https://en.wikipedia.org/wiki/Curculin | Curculin or neoculin is a sweet protein that was discovered and isolated in 1990 from the fruit of Curculigo latifolia (Hypoxidaceae), a plant from Malaysia. Like miraculin, curculin exhibits taste-modifying activity; however, unlike miraculin, it also exhibits a sweet taste by itself. After consumption of curculin, water and sour solutions taste sweet. The plant is referred to locally as 'Lumbah' or 'Lemba'.
Protein structure
The active form of curculin is a heterodimer consisting of two monomeric units connected through two disulfide bridges. The mature monomers each consist of a sequence of 114 amino acids, weighing 12.5 kDa (curculin 1) and 12.7 kDa (curculin 2), respectively. While each of the two isoforms is capable of forming a homodimer, these do not possess the sweet taste nor the taste-modifying activity of the heterodimeric form. To avoid confusion, the heterodimeric form is sometimes referred to as "neoculin".
1, 1-50: DNVLLSGQTL HADHSLQAGA YTLTIQNKCN LVKYQNGRQI WASNTDRRGS
1, 51-100: GCRLTLLSDG NLVIYDHNNN DVWGSACWGD NGKYALVLQK DGRFVIYGPV
1, 101-114: LWSLGPNGCR RVNG
2, 1-50: DSVLLSGQTL YAGHSLTSGS YTLTIQNNCN LVKYQHGRQI WASDTDGQGS
2, 51-100: QCRLTLRSDG NLIIYDDNNM VVWGSDCWGN NGTYALVLQQ DGLFVIYGPV
2, 101-113: LWPLGLNGCR SLN
Amino acid sequence of sweet proteins curculin-1 and curculin-2 adapted from Swiss-Prot biological database of protein sequences. Intra-chain disulfide bonds in bold, inter-chain disulfide bonds underlined.
Sweetness properties
Curculin is considered to be a high-intensity sweetener, with a reported relative sweetness of 430-2070 times sweeter than sucrose on a weight basis.
A sweet taste, equivalent to a 6.8% or 12% sucrose solution, was observed after holding curculin in the mouth in combination with clear water or acidified water (citric acid), respectively. The sweet taste lasts for 5 minutes with water and 10 minutes with an acidic solution.
The taste-modifying activity of curculin is reduced in the presence of ions with two po |
https://en.wikipedia.org/wiki/Well%20poisoning | Well poisoning is the act of malicious manipulation of potable water resources in order to cause illness or death, or to deny an opponent access to fresh water resources.
Well poisoning has been historically documented as a strategy during wartime since antiquity, and was used both offensively (as a terror tactic to disrupt and depopulate a target area) and defensively (as a scorched earth tactic to deny an invading army sources of clean water). Rotting corpses (both animal and human) thrown down wells were the most common implementation; in one of the earliest examples of biological warfare, corpses known to have died from common transmissible diseases of the Pre-Modern era such as bubonic plague or tuberculosis were especially favored for well-poisoning.
Additionally, well poisoning was one of the three gravest antisemitic accusations made against Jews during the pre-modern period (the other two being host desecration and blood libel). Similar accusations were also made of Koreans living in Japan in the aftermath of the 1923 Great Kantō earthquake. In both cases the accusation was never substantiated, but did lead to wide-scale persecution and pogroms against the group so accused.
History of implementation in warfare
Instances of medieval usage
Well poisoning has been used as an important scorched earth tactic at least since medieval times. In 1462, for example, Prince Vlad III the Impaler of Wallachia utilized this method to delay his pursuing Ottoman Turk adversaries. Whilst retreating through Turkish-controlled Bulgaria, across the Danube River and back to the capital of Wallachia that same year, Vlad's army employed the poisoning of wells and other sources of water, as well as other scorched earth tactics en route to his country on both sides of the Danube, meaning that he deliberately polluted the water supplies of his fellow Romanians even at the cost of their lives if it slowed down his Muslim foes. Nearly 500 years later during the Winter War, the Finn |
https://en.wikipedia.org/wiki/Commodore%20USA | Commodore USA, LLC was a computer company based in Pompano Beach, Florida, with additional facilities in Fort Lauderdale, Florida. Commodore USA, LLC was founded in April 2010. The company's goal was to sell a new line of PCs using the classic Commodore and Amiga name brands of personal computers, having licensed the Commodore brand from Commodore Licensing BV on August 25, 2010 and the Amiga brand from Amiga, Inc. on August 31, 2010.
After the 2012 demise of Commodore USA, the claimed Commodore brand license turned out to be invalid, as a court ruled in 2013 that neither Asiarim Corporation nor its subsidiary Commodore Licensing BV ever were in a position to grant such a license. The court found that the Commodore trademarks were held by C=Holdings BV, and held Asiarim liable for trademark infringement. The Amiga brand license too was disputed by Hyperion Entertainment, on the basis of a 2009 settlement agreement between Hyperion and Amiga.
The last news release from the website is dated March 21, 2012. In January 2013, it was revealed that founder and driving force Barry S. Altman died of cancer on December 8, 2012. The last post on Commodore USA's forum came from Leo Nigro (Chief Technical Officer) on the 9th of December concerning the Amiga line.
Products
Phoenix
The Commodore Phoenix was a keyboard computer resembling an updated style of the Commodore 64. It was originally designed and manufactured by Cybernet as a space-saving workstation.
Commodore 64x
The flagship product for Commodore USA, named the Commodore 64x, was contained in a partially redesigned and updated Commodore 64 form factor. The machine looked like the original Commodore 64, except with a slightly updated keyboard and power supply. The base model has an Intel Atom processor and an NVIDIA Ion 2 graphics card. The top version released on August 13, 2011 was called the "C64x Extreme" and featured an Intel Core i7 CPU with 8 GB RAM and 3 TB hard drive using the Intel Sandy Bridge chipset. |
https://en.wikipedia.org/wiki/Natural%20Doctrine | is a 2014 tactical role-playing game by Kadokawa Games for the PlayStation 3, PlayStation 4 and PlayStation Vita.
Gameplay
The game is a tactical role-playing game based along the concept of natural selection. The game features single and multiplayer modes with versus and co-operative play, and is cross-play and cross-save compatible.
The game storyline is shown from the perspective of Geoff, the main protagonist, who is accompanied by two women named Vasily and Anka. Combat is based on a turn-based battle system, and a primary concept of gameplay is to have large numbers of allies and enemies simultaneously on a large size battlefield. Time can be controlled dynamically, and units can be controlled in a single space. Units in combat against one another form encampments, where units are able to return to camp at the end of the turn as long as the encampment isn't destroyed. Units are also able to hide behind objects.
Outside of Feste, species such as minotaurs, goblins and orcs set up bases, and intend on attacking from them. The field is wide and arranged within grid limits. In multiplayer mode, players can play as non-human species.
The online mode features a card battle game, where players can compete against one another with their own formulated decks.
Setting
The setting is within a universe where humans fight other races with magic and swords. Within a world of chaos, humans built the fortress city Feste as their home, and fought against other species. The protagonist, Geoff, is a guard soldier set out to clear out goblin dens to grant access to resources important for humankind.
Development
The game was announced at the SCEJA Press Conference in September 2013. It is the first title that is solely developed by Kadokawa. The game was originally intended to be a release title for the PlayStation 4; however, it was delayed twice, to April 2014.
Atsushi Ii, previously known for directing Patapon, led the development team as director. Atsushi Ikariya, resp |
https://en.wikipedia.org/wiki/Comparison%20of%20spreadsheet%20software | Spreadsheet is a class of application software design to analyze tabular data called "worksheets". A collection of worksheets is called a "workbook". Online spreadsheets do not depend on a particular operating system but require a standards-compliant web browser instead. One of the incentives for the creation of online spreadsheets was offering worksheet sharing and public sharing or workbooks as part of their features which enables collaboration between multiple users. Some on-line spreadsheets provide remote data update, allowing data values to be extracted from other users' spreadsheets even though they may be inactive at the time.
General
Operating system support
The operating systems the software can run on natively (without emulation). Android and iOS apps can be optimized for Chromebooks and iPads which run the operating systems ChromeOS and iPadOS respectively, the operating optimizations include things like multitasking capabilities, large and multi-display support, better keyboard and mouse support.
Supported file formats
This table gives a comparison of what file formats each spreadsheet can import and export. "Yes" means can both import and export.
Rows and Columns
-* 32-bit addressable memory on Microsoft Windows, i.e. ~2.5 GB.
See also
List of spreadsheet software
Comparison of word processors
Notes |
https://en.wikipedia.org/wiki/MK-886 | MK-886, or L-663536, is a leukotriene antagonist. It may perform this by blocking the 5-lipoxygenase activating protein (FLAP), thus inhibiting 5-lipoxygenase (5-LOX), and may help in treating atherosclerosis. |
https://en.wikipedia.org/wiki/Norstictic%20acid | Norstictic acid is a depsidone produced as a secondary metabolites in lichens. |
https://en.wikipedia.org/wiki/RSS%20Advisory%20Board | The RSS Advisory Board is a group founded in July 2003 that publishes the RSS 0.9, RSS 0.91 and RSS 2.0 specifications and helps developers create RSS applications.
Dave Winer, the lead author of several RSS specifications and a longtime evangelist of syndication, created the board to maintain the RSS 2.0 specification in cooperation with Harvard's Berkman Center.
In January 2006, RSS Advisory Board chairman Rogers Cadenhead announced that eight new members had joined the group, continuing the development of the RSS format and resolving ambiguities in the RSS 2.0 specification. Netscape developer Christopher Finke joined the board in March 2007, the company's first involvement in RSS since the publication of RSS 0.91.
In June 2007, the board revised its version of the specification to confirm that namespaces may extend core elements with namespace attributes, as Microsoft has done in Internet Explorer 7. In its view, a difference of interpretation left publishers unsure of whether this was permitted or forbidden.
In January 2008, Netscape announced that the RSS 0.9 and RSS 0.91 specifications, document type definitions and related documentation that it had published since their creation in 1999 were moving to the board.
Yahoo transferred the Media RSS specification to the board in December 2009.
Current members
Rogers Cadenhead
Sterling Camden
Simone Carletti
James Holderness
Jenny Levine
Eric Lunt
Randy Charles Morin
Ryan Parman
Paul Querna
Jake Savin
Jason Shellen |
https://en.wikipedia.org/wiki/Magic%20%28software%29 | Magic is an electronic design automation (EDA) layout tool for very-large-scale integration (VLSI) integrated circuit (IC) originally written by John Ousterhout and his graduate students at UC Berkeley. Work began on the project in February 1983. A primitive version was operational by April 1983, when Joan Pendleton, Shing Kong and other graduate student chip designers suffered through many fast revisions devised to meet their needs in designing the SOAR CPU chip, a follow-on to Berkeley RISC.
Fearing that Ousterhout was going to propose another name that started with "C" to match his previous projects Cm*, Caesar, and Crystal, Gordon Hamachi proposed the name Magic because he liked the idea of being able to say that people used magic to design chips. The rest of the development team enthusiastically agreed to this proposal after he devised the backronym Manhattan Artwork Generator for Integrated Circuits. The Magic software developers called themselves magicians, while the chip designers were Magic users.
As free and open-source software, subject to the requirements of the BSD license, Magic continues to be popular because it is easy to use and easy to expand for specialized tasks.
Differences
The main difference between Magic and other VLSI design tools is its use of "corner-stitched" geometry, in which all layout is represented as a stack of planes, and each plane consists entirely of "tiles" (rectangles). The tiles must cover the entire plane. Each tile consists of an (X, Y) coordinate of its lower left-hand corner, and links to four tiles: the right-most neighbor on the top, the top-most neighbor on the right, the bottom-most neighbor on the left, and the left-most neighbor on the bottom. With the addition of the type of material represented by the tile, the layout geometry in the plane is exactly specified. The corner-stitched geometry representation leads to the concept of layout as "paint" to be applied to, or erased from, a canvas. This is con |
https://en.wikipedia.org/wiki/Hugs%20and%20kisses | Hugs and kisses, abbreviated in North America as XO or XOXO, is an informal term used for expressing sincerity, faith, love, or good friendship at the end of a written letter, email or text message. In the United Kingdom, the phrase 'hugs and kisses' is widely used but XO or XOXO are not - even though O, 00 etc. for 'kisses' is also used.
Origins
The earliest attestation of the use of either x or o to indicate kisses identified by the Oxford English Dictionary appears in the English novellist Florence Montgomery's 1878 book Seaforth, which mentions "This letter [...] ends with the inevitable row of kisses,—sometimes expressed by × × × × ×, and sometimes by o o o o o o, according to the taste of the young scribbler". Here it appears that x and o are both ways to indicate a kiss. (Earlier versions of the dictionary identified an example from 1763, one Gil. White signing off a letter with "I am with many a xxxxxxx and many a Pater noster and Ave Maria, Gil. White". This has, however, since been reinterpreted as an indication of blessings rather than kisses, perhaps evoking the Christian sign of the cross.)
Nothing more is known about the origins of x and o meaning 'hugs' or 'kisses'. An 2014 article in The Washington Post that drew on interviews with scholars noted that "the Internet abounds with origin theories" yet that "there is no definitive answer to how a cross came to mean a kiss" and even that "less is known about how 'o' came to signify a hug".
Speculations include that the use of x to indicate a kiss was transferred from earlier symbolic uses of the letter. Allegedly, in the Middle Ages, a Christian cross might be drawn on documents or letters to mean sincerity, faith, and honesty; the sign was certainly sometimes used in place of a signature. Unscholarly speculations sometimes extend to the idea that after a cross was written at the end of a document, the writer might kiss it as a show of their sincerity. The Greek word for Christ, ΧΡΙΣΤΟΣ, gave rise to |
https://en.wikipedia.org/wiki/Castelnuovo%E2%80%93de%20Franchis%20theorem | In mathematics, the Castelnuovo–de Franchis theorem is a classical result on complex algebraic surfaces. Let X be such a surface, projective and non-singular, and let
ω1 and ω2
be two differentials of the first kind on X which are linearly independent but with wedge product 0. Then this data can be represented as a pullback of an algebraic curve: there is a non-singular algebraic curve C, a morphism
φ: X → C,
and differentials of the first kind ω1 and ω2 on C such that
φ*(1) = ω1 and φ*(2) = ω2.
This result is due to Guido Castelnuovo and Michele de Franchis (1875–1946).
The converse, that two such pullbacks would have wedge 0, is immediate.
See also
de Franchis theorem |
https://en.wikipedia.org/wiki/Kinematic%20pair | In classical mechanics, a kinematic pair is a connection between two physical objects that imposes constraints on their relative movement (kinematics). German engineer Franz Reuleaux introduced the kinematic pair as a new approach to the study of machines that provided an advance over the motion of elements consisting of simple machines.
Description
Kinematics is the branch of classical mechanics which describes the motion of points, bodies (objects) and systems of bodies (groups of objects) without consideration of the causes of motion. Kinematics as a field of study is often referred to as the "geometry of motion". For further detail, see Kinematics.
Hartenberg & Denavit presents the definition of a kinematic pair:
In the matter of connections between rigid bodies, Reuleaux recognized two kinds; he called them higher and lower pairs (of elements). With higher pairs, the two elements are in contact at a point or along a line, as in a ball bearing or disk cam and follower; the relative motions of coincident points are dissimilar. Lower pairs are those for which area contact may be visualized, as in pin connections, crossheads, ball-and socket joints and some others; the relative motion of coincident points of the elements, and hence of their links, are similar, and an exchange of elements from one link to the other does not alter the relative motion of the parts as it would with higher pairs.In kinematics, the two connected physical objects, forming a kinematic pair, are called 'rigid bodies'. In studies of mechanisms, manipulators or robots, the two objects are typically called 'links'.
Lower pair
A lower pair is an ideal joint that constrains contact between a surface in the moving body to a corresponding in the fixed body. A lower pair is one in which there occurs a surface or area contact between two members, e.g. nut and screw, universal joint used to connect two propeller shafts.
Cases of lower joints:
A revolute R joint, or hinged joint, requires a l |
https://en.wikipedia.org/wiki/Broadcast%20to%20Allied%20Merchant%20Ships | Broadcast to Allied Merchant Ships (BAMS) was a protocol and system of broadcasts for Allied Merchant ship convoys that was used during World War II to provide for the transmission of official messages to merchant ships in any part of the world. The BAMS system is designed for communication by the best employment of radio stations available.
Background
On the outbreak of World War II, the British Admiralty took over control from the GPO, and the embryo merchant ship broadcast system, called GBMS came into force. Ships listened at routine times to the Rugby Radio Station and to area stations, otherwise keeping watch on the international distress frequency at 500 kHz. After the fall of France, the Admiralty assumed control of all Allied merchant shipping which complied with British procedures. When America entered the war, the world was divided into two strategic zones, the Admiralty being responsible for merchant shipping in one, and the United States Navy in the other.
The GBMS organisation proved to be inadequate for the efficient clearance of traffic for a number of reasons, including poor coverage by Wireless telegraphy (W/T) stations, obsolescent equipment, and many ships only able to listen at single or two operator periods. The systems gradually improved, and from 1942 all Allied merchant ships had to have two radio technicians on board, with more modern equipment being fitted to ships.
In 1942, the GBMS system was superseded by the combined Anglo-American system of BAMS, and the addition of US Navy W/T stations improved the poor coverage. For ship to shore communications, during Radio silence, ships in Convoy passed any essential messages through their escort for transmission. The Commodore's and Vice-Commodore's ships, rescue ships, merchant aircraft carriers, and ships fitted with Huff Duff were fitted when possible for intercommunication with other escort vessels.
In 1943 Rodger Winn persuaded the Admiralty that German code breaking in World War II wa |
https://en.wikipedia.org/wiki/Barley%20honey | Barley honey is a Japanese product prepared with barley starch, and it is typically combined with rice flour. It is often consumed as part of breakfast. |
https://en.wikipedia.org/wiki/Russian%20Game%20Developers%20Conference | The Russian Game Developers' Conference (), or KRI (), was an annual event for industry professionals devoted to game development, publishing and distribution in Russia and surrounding territories. The show also featured the presentation of the annual KRI awards, a professional game awards. Attendance at KRI was relatively compared with some of the better-known game developer conferences abroad. However, this was mainly attributed to the population densities in the enormous geographic range that the conference covered and the difficulties in transportation. Back then Russian distribution video game networks were often plagued by software pirates. Due to the spread of digital distribution and the adoption Russian anti-piracy legislation, KRI grew each year, having been able to provide accommodation for attendants from afar. KRI also helped to establish and entrench various anti-piracy measures.
Starting with its inception in 2003, KRI quickly became Russia's leading video game trade show, offering developers a unique chance to share their experience, meet colleagues and communicate their ideas and works to the professional public. KRI attracted industry representatives not only from ex-USSR countries, but also from abroad. Every annual KRI event was attended by renowned game developers that are known across the planet.
In 2014 KRI merged with the IgroMir exhibition. |
https://en.wikipedia.org/wiki/Oriented%20matroid | An oriented matroid is a mathematical structure that abstracts the properties of directed graphs, vector arrangements over ordered fields, and hyperplane arrangements over ordered fields. In comparison, an ordinary (i.e., non-oriented) matroid abstracts the dependence properties that are common both to graphs, which are not necessarily directed, and to arrangements of vectors over fields, which are not necessarily ordered.
All oriented matroids have an underlying matroid. Thus, results on ordinary matroids can be applied to oriented matroids. However, the converse is false; some matroids cannot become an oriented matroid by orienting an underlying structure (e.g., circuits or independent sets).
The distinction between matroids and oriented matroids is discussed further below.
Matroids are often useful in areas such as dimension theory and algorithms.
Because of an oriented matroid's inclusion of additional details about the oriented nature of a structure,
its usefulness extends further into several areas including geometry and optimization.
Background
In order to abstract the concept of orientation on the edges of a graph to sets, one needs the ability to assign "direction" to the elements of a set. The way this achieved is with the following definition of signed sets.
A signed set, , combines a set of objects, , with a partition of that set into two subsets: and .
The members of are called the positive elements; members of are the negative elements.
The set is called the support of .
The empty signed set, , is defined as the empty set combined with a "partition" of it into two empty sets: and .
The signed set is the opposite of , i.e., , if and only if and
Given an element of the support , we will write for a positive element and for a negative element. In this way, a signed set is just adding negative signs to distinguished elements. This will make sense as a "direction" only when we consider orientations of larger structures. Then the sig |
https://en.wikipedia.org/wiki/LCD%20classification | There are various classifications of the electro-optical modes of liquid crystal displays (LCDs).
LCD operation in a nutshell
The operation of TN, VA and IPS-LCDs can be summarized as follows:
a well aligned LC configuration is deformed by an applied electric field,
this deformation changes the orientation of the local LC optical axis with respect to the direction of light propagation through the LC layer,
this change of orientation changes the polarization state of the light propagating through the LC layer,
this change of the polarization state is converted into a change of intensity by dichroic absorption, usually by external dichroic polarizers.
Activation
Liquid crystals can be aligned by both magnetic and electric fields. The strength of the required magnetic field is too high to be feasible for display applications.
One electro-optical effect with LCs requires a current through the LC-cell; all other practiced electro-optical effects only require an electric field (without current) for alignment of the LC.
Absorption Effects
The state of polarization of the light traveling through the LC layer cannot be perceived by human observers, it must be converted into intensity (e.g. luminance) in order to become perceivable. This is achieved with absorption by dichroic dyes and dichroic polarizers.
Polymer Dispersed Liquid Crystals
Liquid crystals with low molecular weight can be mixed with high molecular weight polymers, followed by phase-separation to form a kind of spongy matrix filled with LC droplets. An external electric field can align the LC to match its index with that of the polymer matrix, switching that cell from a milky (scattering) state to a clear transparent state. When dichroic dyes are dissolved in the LC an electric field can switch the PDLC from an absorbing state to a fairly transparent state.
When the amount of polymer is small compared to that of the LC there will be no separation of both components, but the polymer forms an an |
https://en.wikipedia.org/wiki/STN%20display | A super-twisted nematic (STN) display is a type of monochrome passive-matrix liquid crystal display (LCD).
History
This type of LCD was first patented by C. M. Waters and E. P. Raynes in 1982 whilst work was also conducted at the Brown Boveri Research Center, Baden, Switzerland, in 1983. For years a better scheme for multiplexing was sought. Standard twisted nematic (TN) LCDs with a 90 degrees twisted structure of the molecules have a contrast vs. voltage characteristic unfavorable for passive-matrix addressing as there is no distinct threshold voltage. STN displays, with the molecules twisted from 180 to 270 degrees, have superior characteristics.
Features
The main advantage of STN LCDs is their more pronounced electro-optical threshold allowing for passive-matrix addressing with many more lines and columns. For the first time, a prototype STN matrix display with 540x270 pixels was made by Brown Boveri (today ABB) in 1984, which was considered a breakthrough for the industry.
STN LCDs require less power and are less expensive to manufacture than TFT LCDs, another popular type of LCD that has largely superseded STN for mainstream laptops. STN displays typically suffer from lower image quality and slower response time than TFT displays. However, STN LCDs can be made purely reflective for viewing under direct sunlight. STN displays are used in some inexpensive mobile phones and informational screens of some digital products. In the early 1990s, they had been used in some portable computers such as Amstrad's PPC512 and PPC640, and in Nintendo's Game Boy.
Variants
CSTN (color super-twist nematic) is a color form for electronic display screens originally developed by Sharp Electronics. The CSTN uses red, green and blue filters to display color. The original CSTN displays developed in the early 1990s suffered from slow response times and ghosting (where text or graphic changes are blurred because the pixels cannot turn off and on fast enough). Recent advances in |
https://en.wikipedia.org/wiki/Andrea%20Goldsmith%20%28engineer%29 | Andrea Goldsmith is an American electrical engineer and the Dean of Engineering and Applied Science at Princeton University. She is also the Arthur LeGrand Doty Professor of Electrical Engineering at Princeton. She was previously the Stephen Harris Professor in the School of Engineering at Stanford University, as well as a faculty affiliate at the Stanford Neurosciences Institute. Her interests are in the design, analysis and fundamental performance limits of wireless systems and networks, and in the application of communication theory and signal processing to neuroscience. She also co-founded and served as chief technology officer of Plume WiFi and Quantenna Communications. Since 2021, she has been a member of the President’s Council of Advisors on Science and Technology (PCAST).
Early life and education
Goldsmith was raised in the San Fernando Valley, California. Her father Werner Goldsmith was a professor of mechanical engineering at UC Berkeley, and her mother Adrienne Goldsmith was an animator for cartoon shows including The Rocky and Bullwinkle Show. Goldsmith earned her bachelor's degree in engineering math from the University of California, Berkeley, in 1986, and her MS and PhD in electrical engineering from UC Berkeley in 1991 and 1994, respectively. In the years between obtaining her bachelor's and PhD, she spent four years as a systems engineer at a Silicon Valley defense communications startup.
Work and academic career
Goldsmith started her academic career at the California Institute of Technology and was there for four years. She joined Stanford in 1999, becoming an associate professor in 2002 and a full professor in 2007. At Stanford, she has served as chair of the faculty senate, and on the school's task force on women and leadership. In 2006, she took a leave of absence from Stanford and co-founded Quantenna Communications, a company that produces silicon chipsets designed for high-speed, wireless high-definition video home networking. She serve |
https://en.wikipedia.org/wiki/Jinyoung%20Park%20%28mathematician%29 | Jinyoung Park (; born 1982) is a South Korean mathematician at Stanford University working in combinatorics and graph theory. In 2022, she released a preprint containing a 6-page proposed proof of the Kahn–Kalai conjecture with Huy Tuan Pham.
Education and career
Park entered Seoul National University in 2001 and received her B.S. in Mathematics Education in 2004. She worked as a mathematics teacher in secondary schools in Seoul from 2005 to 2011. She began her graduate studies at Rutgers University in 2014, where she received her Ph.D. in 2020 under the supervision of Jeff Kahn. Her doctoral work earned the 2022 Dissertation Prize from the Association for Women in Mathematics.
She was a Member of the Institute for Advanced Study from 2020 to 2021. Since 2021, she has continued her postdoctoral work as a Szegö Assistant Professor at Stanford University, where her postdoctoral mentor is Jacob Fox. In 2023, Park received the Maryam Mirzakhani New Frontiers Prize for contributions to the resolution of several major conjectures on thresholds and selector processes.
Selected works
Frankston, Keith; Kahn, Jeff; Narayanan, Bhargav; Park, Jinyoung "Thresholds versus fractional expectation-thresholds." Ann. of Math. (2) 194 (2021), no. 2, 475–495. |
https://en.wikipedia.org/wiki/Speech%20error | A speech error, commonly referred to as a slip of the tongue (Latin: , or occasionally self-demonstratingly, ) or misspeaking, is a deviation (conscious or unconscious) from the apparently intended form of an utterance. They can be subdivided into spontaneously and inadvertently produced speech errors and intentionally produced word-plays or puns. Another distinction can be drawn between production and comprehension errors. Errors in speech production and perception are also called performance errors. Some examples of speech error include sound exchange or sound anticipation errors. In sound exchange errors, the order of two individual morphemes is reversed, while in sound anticipation errors a sound from a later syllable replaces one from an earlier syllable. Slips of the tongue are a normal and common occurrence. One study shows that most people can make up to as much as 22 slips of the tongue per day.
Speech errors are common among children, who have yet to refine their speech, and can frequently continue into adulthood. When errors continue past the age of 9 they are referred to as "residual speech errors" or RSEs. They sometimes lead to embarrassment and betrayal of the speaker's regional or ethnic origins. However, it is also common for them to enter the popular culture as a kind of linguistic "flavoring". Speech errors may be used intentionally for humorous effect, as with spoonerisms.
Within the field of psycholinguistics, speech errors fall under the category of language production. Types of speech errors include: exchange errors, perseveration, anticipation, shift, substitution, blends, additions, and deletions. The study of speech errors has contributed to the establishment/refinement of models of speech production since Victoria Fromkin's pioneering work on this topic.
Psycholinguistic explanations
Speech errors are made on an occasional basis by all speakers. They occur more often when speakers are nervous, tired, anxious or intoxicated. During liv |
https://en.wikipedia.org/wiki/Alice%20Dreger | Alice Domurat Dreger () is an American historian, bioethicist, author, and former professor of clinical medical humanities and bioethics at the Feinberg School of Medicine, Northwestern University, in Chicago, Illinois.
Dreger engages in academic work and activism in support of individuals born with atypical sex characteristics (intersex or disorders of sex development) and individuals born as conjoined twins. She challenges the perception that those with physical differences are somehow "broken" and need to be "fixed". She has opposed the use of "corrective" surgery on babies whose genitalia are considered "ambiguous". She has criticized the failure to follow such patients in later life and reported longer-term medical and psychological difficulties experienced by some of the people whose sex is arbitrarily assigned.
She supported J. Michael Bailey in the face of controversy over his book The Man Who Would Be Queen. Dreger has been criticized by transgender activist Lynn Conway for her support of psychologist Ray Blanchard's typology of trans women. In a 2008 article and in her 2015 book, Galileo's Middle Finger, Dreger argued that the controversy had gone far beyond addressing the scientific theories presented in Bailey's book to become an attack upon the author.
Dreger has been a featured speaker at TED talks. She has also worked as a journalist, founding East Lansing Info, a website that covers local affairs in East Lansing, Michigan.
Education
Dreger received her Ph.D. in history and philosophy of science from Indiana University Bloomington in 1995.
Early career
Dreger has taught at both Michigan State University, where she received a Teacher-Scholar Award in 2000, and at Northwestern University (2005–2015).
During her doctoral work, she became interested in "how and why it is that scientists and medical doctors work to mediate the relationships between our bodies and our selves" and "why it is we often look to scientists and medical doctors to read or e |
https://en.wikipedia.org/wiki/Spectral%20modeling%20synthesis | Spectral modeling synthesis (SMS) is an acoustic modeling approach for speech and other signals.
SMS considers sounds as a combination of harmonic content and noise content. Harmonic components are identified based on peaks in the frequency spectrum of the signal, normally as found by the short-time Fourier transform. The signal that remains following removal of the spectral components, sometimes referred to as the residual, is then modeled as white noise passed through a time-varying filter. The output of the model, then, are the frequencies and levels of the detected harmonic components and the coefficients of the time-varying filter.
Intuitively, the model can be applied to many types of audio signals. Speech signals, for example, include slowly changing harmonic sounds caused by vibration of the vocal cords plus wideband, noise-like sounds caused by the lips and mouth. Musical instruments also produce sounds containing both harmonic components and percussive, noise-like sounds when the notes are struck or changed.
See also
Speech coding
CELP
Source-filter model of speech production
FM synthesis
Sound synthesis
SPEAR - Sinusoidal Partial Editing Analysis and Resynthesis |
https://en.wikipedia.org/wiki/Origins%20of%20Life%20and%20Evolution%20of%20Biospheres | Origins of Life and Evolution of Biospheres is a peer-reviewed scientific journal established in 1968 covering astrobiology and origins of life research. It is the official journal of the International Society for the Study of the Origin of Life. The journal's scope includes research on the origin, evolution, distribution, and future of life on Earth and beyond. Some examples of areas of interest are: prebiotic chemistry and the nature of Earth's early environment, self-replicating and self-organizing systems, the RNA world hypothesis and of other possible precursor systems, and the problem of the origin of the genetic code. According to the Journal Citation Reports, the journal has a 2016 impact factor of 1.000.
Abstracting and indexing
The journal is abstracted and indexed in the following databases: |
https://en.wikipedia.org/wiki/Hendrik%20Lorentz | Hendrik Antoon Lorentz (; 18 July 1853 – 4 February 1928) was a Dutch physicist who shared the 1902 Nobel Prize in Physics with Pieter Zeeman for the discovery and theoretical explanation of the Zeeman effect. He derived the Lorentz transformation of the special theory of relativity, as well as the Lorentz force, which describes the combined electric and magnetic forces acting on a charged particle in an electromagnetic field. Lorentz was also responsible for the Lorentz oscillator model, a classical model used to describe the anomalous dispersion observed in dielectric materials when the driving frequency of the electric field was near the resonant frequency, resulting in abnormal refractive indices.
According to the biography published by the Nobel Foundation, "It may well be said that Lorentz was regarded by all theoretical physicists as the world's leading spirit, who completed what was left unfinished by his predecessors and prepared the ground for the fruitful reception of the new ideas based on the quantum theory." He received many other honours and distinctions, including a term as chairman of the International Committee on Intellectual Cooperation, the forerunner of UNESCO, between 1925 and 1928.
Biography
Early life and education
Hendrik Lorentz was born in Arnhem, Gelderland, Netherlands, the son of Gerrit Frederik Lorentz (1822–1893), a well-off horticulturist, and Geertruida van Ginkel (1826–1861). In 1862, after his mother's death, his father married Luberta Hupkes. Despite being raised as a Protestant, he was a freethinker in religious matters and regularly attended Catholic mass in his local French church. From 1866 to 1869, he attended the "Hogere Burgerschool" in Arnhem, a new type of public high school recently established by Johan Rudolph Thorbecke. His results in school were exemplary; not only did he excel in the physical sciences and mathematics, but also in English, French, and German. In 1870, he passed the exams in classical languages w |
https://en.wikipedia.org/wiki/FlowMon | Flowmon is a name for monitoring probe which is the result of academic research activity on CESNET and also a name for a commercial product which is marketed by university spin-off company Flowmon Networks.
Flowmon probe - result of research activities
Flowmon probe is an appliance for monitoring and reporting information of IP flows in high-speed computer networks. The probe is being developed by Liberouter team within the scope of CESNET research plan Optical National Research Network and its New Applications, research activity 602 - Programmable hardware.
Flowmon probe is built upon a pair of programmable network cards, called COMBO, and a host computer with Linux operating system. The pair of COMBO cards consists of a main card with PCI, PCI-X or PCI-Express connector for a connection to a motherboard of the host computer and of an add-on card with 2 or 4 network interfaces. Both cards contain programmable chips (FPGAs) which are able to process high amount of data at multi-gigabit speed. The flow monitoring process itself is split between the hardware (acceleration cards) and the application software running on the host computer. Following the principle of hardware/software codesign, all time-critical tasks are implemented in FPGA chips on acceleration cards while more complex operations are carried out by the application software. This concept enables monitoring of modern high-speed (1 Gbps, 10 Gbps) networks with no packet loss and with no necessity of input sampling. At the same time, a flexible and user-friendly interface is provided by software.
Flowmon probe is a passive monitoring device, i.e. it does not alter passing traffic in any way. Therefore, its detection is hardly possible. When connected to a network, Flowmon probe observes all passing traffic/packets, extracts and aggregates information of IP flows into flow records. Flowmon probe is able to export aggregated data to external collectors in NetFlow (version 5 and 9) and IPFIX format. Collec |
https://en.wikipedia.org/wiki/Force%20platform | Force platforms or force plates are measuring instruments that measure the ground reaction forces generated by a body standing on or moving across them, to quantify balance, gait and other parameters of biomechanics. Most common areas of application are medicine and sports.
Operation
The simplest force platform is a plate with a single pedestal, instrumented as a load cell. Better designs have a pair of rectangular plates, although triangular can also work, one over another with load cells or triaxial force transducers between them at the corners.
Like single-force platforms, dual-force platforms can be used to assess performance in double leg tests and strength and power asymmetries in unilateral jump and isometric tests. However, they also provide an additional level of intelligence on neuromuscular status by evaluating the force distribution between limbs during double-limb tests, revealing critical information on strength asymmetries and compensatory strategies.
The simplest force plates measure only the vertical component of the force in the geometric center of the platform. More advanced models measure the three-dimensional components of the single equivalent force applied to the surface and its point of application, usually called the centre of pressure (CoP), as well as the vertical moment of force. Cylindrical force plates have also been constructed for studying arboreal locomotion, including brachiation.
Force platforms may be classified as single-pedestal or multi-pedestal and by the transducer (force and moment transducer) type: strain gauge, piezoelectric sensors, capacitance gauge, piezoresistive, etc., each with its advantages and drawbacks. Single pedestal models, sometimes called load cells, are suitable for forces that are applied over a small area. For studies of movements, such as gait analysis, force platforms with at least three pedestals and usually four are used to permit forces that migrate across the plate. For example, during walking |
https://en.wikipedia.org/wiki/Gut%E2%80%93brain%20axis | The gut–brain axis is the two-way biochemical signaling that takes place between the gastrointestinal tract (GI tract) and the central nervous system (CNS). The "microbiota–gut–brain axis" includes the role of gut microbiota in the biochemical signaling events that take place between the GI tract and the CNS. Broadly defined, the gut–brain axis includes the central nervous system, neuroendocrine system, neuroimmune systems, the hypothalamic–pituitary–adrenal axis (HPA axis), sympathetic and parasympathetic arms of the autonomic nervous system, the enteric nervous system, vagus nerve, and the gut microbiota.
Chemicals released in the gut by the microbiome can vastly influence the development of the brain, starting from birth. A review from 2015 states that the microbiome influences the central nervous system by "regulating brain chemistry and influencing neuro-endocrine systems associated with stress response, anxiety and memory function". The gut, sometimes referred to as the "second brain", may use the same type of neural network as the central nervous system, suggesting why it could have a role in brain function and mental health.
The bidirectional communication is done by immune, endocrine, humoral and neural connections between the gastrointestinal tract and the central nervous system. More research suggests that the gut microorganisms influence the function of the brain by releasing the following chemicals: cytokines, neurotransmitters, neuropeptides, chemokines, endocrine messengers and microbial metabolites such as "short-chain fatty acids, branched chain amino acids, and peptidoglycans". The intestinal microbiome can then divert these products to the brain via the blood, neuropod cells, nerves, endocrine cells and more to be determined. The products then arrive in the brain, putatively impacting different metabolic processes. Studies have confirmed communication between the hippocampus, the prefrontal cortex and the amygdala (responsible for emotions and m |
https://en.wikipedia.org/wiki/Ephedraceae | Ephedraceae is a family of gymnosperms belonging to Gnetophyta, it contains only a single extant genus, Ephedra, as well as a number of extinct genera from the Early Cretaceous.
Taxonomy
Ephedraceae is agreed to be the most basal group amongst extant gnetophytes. Members of the family typically grow as shrubs and have small, linear leaves that possess parallel veins. The fossil Ephedraceae genera show a range of morphologies transitional between the ancestral lax male and female reproductive structures and the highly compact reproductive structures typical of modern Ephedra. Modern members of Ephedra have either dry winged membranous bracts (modified leaves which surround the seed), which are dispersed by wind, leathery covered seeds, which are dispersed by seed-eating rodents, or fleshy bracts which are consumed and then dispersed by birds. Some extinct members of Ephedra from the Early Cretaceous, such as Ephedra carnosa, as well as Arlenea from the Early Cretaceous of Brazil have fleshy bracts surrounding the seeds, suggesting that these seeds were dispersed by animals.
Genera
Ephedra L. Early Cretaceous-Recent
Arlenea Ribeiro, Yang, Saraiva, Bantim, Calixto Junior et Lima, 2023 Crato Formation, Brazil, Early Cretaceous (Aptian)
Leongathia V.A. Krassilov, D.L. Dilcher & J.G. Douglas 1998 Koonwarra fossil bed, Australia, Early Cretaceous (Aptian)
Jianchangia Yang, Wang and Ferguson, 2020 Jiufotang Formation, China, Early Cretaceous (Aptian)
Eamesia Yang, Lin and Ferguson, 2018 Yixian Formation, China, Early Cretaceous (Aptian)
Prognetella Krassilov et Bugdaeva, 1999 Yixian Formation, China, Early Cretaceous (Aptian) (initially interpreted as an angiosperm)
Chengia Yang, Lin & Wang, 2013, Yixian Formation, China, Early Cretaceous (Aptian)
Chaoyangia Duan, 1998 Yixian Formation, China, Early Cretaceous (Aptian)
Eragrosites Cao & Wu, 1998 Yixian Formation, China, Early Cretaceous (Aptian)
Gurvanella Krassilov, 1982 China, Mongolia, Early Cretaceous
Al |
https://en.wikipedia.org/wiki/Schei%C3%9Ftag | Scheißtage (literally "shitting days") referred to the additional one to three unpaid working days in Southern Germany and Austria for peasants and servants to compensate for the time they needed to defecate during their agreed employment.
This practice existed in the 18th and 19th centuries, and occasionally even until the early 20th century. The "Scheißtage" were performed after the expiration of the employment contract, usually after Candlemas, or at the end of each year on the 29th. or December 30.
Nowadays, the term Scheißtag is used in a vulgar-colloquial sense to mean a bad day.
Literature
Entry in Johann Andreas Schmeller, Georg Karl Frommann: Bayerisches Wörterbuch. 2nd edition, revised and supplemented by G. Karl Fromann. Volume 2, containing part III and IV of the first edition. Munich 1877, p. 475 (digital edition).
scheisztag. In: Jacob Grimm, Wilhelm Grimm (Hrsg.): Deutsches Wörterbuch. Band 14: R–Schiefe – (VIII). S. Hirzel, Leipzig 1893 (woerterbuchnetz.de). – refers to the entry in Schmeller's work. |
https://en.wikipedia.org/wiki/Hans%20Hahn%20%28mathematician%29 | Hans Hahn (; 27 September 1879 – 24 July 1934) was an Austrian mathematician and philosopher who made contributions to functional analysis, topology, set theory, the calculus of variations, real analysis, and order theory. In philosophy he was among the main logical positivists of the Vienna Circle.
Biography
Born in Vienna as the son of a higher government official of the K.K. Telegraphen-Korrespondenz Bureau (since 1946 named "Austria Presse Agentur"), in 1898 Hahn became a student at the Universität Wien starting with a study of law. In 1899 he switched over to mathematics and spent some time at the universities of Strasbourg, Munich and Göttingen. In 1902 he took his Ph.D. in Vienna, on the subject "Zur Theorie der zweiten Variation einfacher Integrale". He was a student of Gustav von Escherich.
He was appointed to the teaching staff (Habilitation) in Vienna in 1905. After 1905/1906 as a stand-in for Otto Stolz at Innsbruck and some further years as a Privatdozent in Vienna, he was nominated in 1909 Professor extraordinarius in Czernowitz, at that time a town within the empire of Austria. After joining the Austrian army in 1915, he was badly wounded in 1916 and became again Professor extraordinarius, now in Bonn. In 1917 he was nominated a regular Professor there and in 1921 he returned to Vienna with this title, where he stayed until his rather early death in 1934 at the age of 54, following cancer surgery.
He had married Eleonore ("Lilly") Minor in 1909 and they had a daughter, Nora (born 1910).
He was also interested in philosophy, and was part of a discussion group concerning Mach's positivism with Otto Neurath (who had married Hahn’s sister Olga Hahn-Neurath in 1912), and Phillip Frank prior to the First World War. In 1922, he helped arrange Moritz Schlick's entry into the group, which led to the founding of the Vienna Circle, the group that was at the center of logical positivist thought in the 1920s. His most famous student was Kurt Gödel, whose Ph. |
https://en.wikipedia.org/wiki/NetPC | NetPC is a standard for diskless PCs, developed by Microsoft and Intel as a competing standard to the Network Computer standard, because many NCs did not use Intel CPUs or Microsoft software. Network Computer was launched by Oracle Corporation in the mid-1990s. |
https://en.wikipedia.org/wiki/Lycoperdon%20echinatum | Lycoperdon echinatum, commonly known as the spiny puffball or the spring puffball, is a type of puffball mushroom in the family Agaricaceae. The saprobic species has been found in Africa, Europe, Central America, and North America, where it grows on soil in deciduous woods, glades, and pastures. It has been proposed that North American specimens be considered a separate species, Lycoperdon americanum, but this suggestion has not been followed by most authors. Molecular analysis indicates that L. echinatum is closely related to the puffball genus Handkea.
The fruit bodies of L. echinatum are wide by tall, supported by a small base, and densely covered with spines that are up to long. The spines can fall off in maturity, leaving a net-like pattern of scars on the underlying surface. Initially white in color, the puffballs turn a dark brown as they mature, at the same time changing from nearly round to somewhat flattened. Young specimens of L. echinatum resemble another edible spiny puffball, Lycoperdon pulcherrimum, but the latter species does not turn brown as it ages. The fruit bodies are edible when young, when the interior is white and firm and before it has turned into a powdery brown mass of spores. Laboratory tests have shown that extracts of the fruit bodies can inhibit the growth of several bacteria that are pathogenic to humans.
Taxonomy and phylogeny
The species was first described by Christian Hendrik Persoon in 1797. It was later reduced to a variety of Lycoperdon gemmatum (as L. gemmatum var. echinatum; L. gemmatum is now known as Lycoperdon perlatum) by Elias Magnus Fries, but American mycologist Charles Horton Peck, who extensively studied the North American distribution of the genus, raised it again to species level in 1879. He thought it worthy of status as a species distinct from L. gemmatum because of the different character of its warts, its much spinier appearance, and the smoother surface of the peridium underneath the spines. Miles Joseph |
https://en.wikipedia.org/wiki/G.%20Ledyard%20Stebbins | George Ledyard Stebbins Jr. (January 6, 1906 – January 19, 2000) was an American botanist and geneticist who is widely regarded as one of the leading evolutionary biologists of the 20th century. Stebbins received his Ph.D. in botany from Harvard University in 1931. He went on to the University of California, Berkeley, where his work with E. B. Babcock on the genetic evolution of plant species, and his association with a group of evolutionary biologists known as the Bay Area Biosystematists, led him to develop a comprehensive synthesis of plant evolution incorporating genetics.
His most important publication was Variation and Evolution in Plants, which combined genetics and Darwin's theory of natural selection to describe plant speciation. It is regarded as one of the main publications which formed the core of the modern synthesis and still provides the conceptual framework for research in plant evolutionary biology; according to Ernst Mayr, "Few later works dealing with the evolutionary systematics of plants have not been very deeply affected by Stebbins' work." He also researched and wrote widely on the role of hybridization and polyploidy in speciation and plant evolution; his work in this area has had a lasting influence on research in the field.
From 1960, Stebbins was instrumental in the establishment of the Department of Genetics at the University of California, Davis, and was active in numerous organizations involved in the promotion of evolution, and of science in general. He was elected to the National Academy of Sciences and the American Philosophical Society, was awarded the National Medal of Science, and was involved in the development of evolution-based science programs for California high schools, as well as the conservation of rare plants in that state.
Early life and education
Stebbins was born in Lawrence, New York, the youngest of three children. His parents were George Ledyard Stebbins, a wealthy real estate financier who developed Seal Harbor, |
https://en.wikipedia.org/wiki/Tatiana%20Shubin | Tatiana Shubin is a Soviet and American mathematician known for her work developing math circles, social structures for the mathematical enrichment of secondary-school students, especially among the Navajo and other Native American people. She is a professor of mathematics at San José State University in California.
Education and career
Shubin is originally from Ukraine, the daughter of a criminologist and a lawyer; she is of Jewish descent on her father's side. When she was ten, her family moved to Almaty in Kazakhstan, where her father had taken a university teaching position. After competing in the All Siberian Mathematics Competition she was invited to a special science boarding school in Akademgorodok, but after spending 8th grade there her parents brought her back to Almaty where she finished high school at age 16. She studied for five years at Moscow State University, earning a bachelor's degree there, but was expelled for non-participation in political activities and instead earned a master's degree at Kazakh State University in Almaty.
After obtaining a letter of invitation from an Israeli, she was allowed to leave the Soviet Union, spent nine months in Austria, and then emigrated to the US in 1978, with support from the Tolstoy Foundation. She completed a Ph.D. at the University of California, Santa Barbara in 1983, and joined the San José State University faculty as a lecturer in 1985.
Math circles
Shubin founded the San José Math Circles.
She co-founded the first math teachers' circle in 2006, and is a leader of the Math Teachers’ Circle Network that developed out of this circle. She was a co-founder of the Navajo Nation Math Circles project in 2012, and is a director of the Alliance of Indigenous Math Circles.
Publications
Shubin is the coeditor of several books on mathematics:
Mathematical Adventures for Students and Amateurs (edited with David F. Hayes, Mathematical Association of America, 2004)
Expeditions in Mathematics (edited with Gerald L. Al |
https://en.wikipedia.org/wiki/Chilled%20water | Chilled water is a commodity often used to cool a building's air and equipment, especially in situations where many individual rooms must be controlled separately, such as a hotel. The chilled water can be supplied by a vendor, such as a public utility, or created at the location of the building that will use it, which has been the norm.
Use
Chilled water cooling is not very different from typical residential air conditioning where water is pumped from the chiller to the air handler unit to cool the air.
Regardless of who provides it, the chilled water (between 4 and 7 °C (39-45 °F)) is pumped through an air handler, which captures the heat from the air, then disperses the air throughout the area to be cooled.
Site generated
As part of a chilled water system, the condenser water absorbs heat from the refrigerant in the condenser barrel of the water chiller and is then sent via return lines to a cooling tower, which is a heat exchange device used to transfer waste heat to the atmosphere. The extent to which the cooling tower decreases the temperature depends upon the outside temperature, the relative humidity and the atmospheric pressure. The water in the chilled water circuit will be lowered to the Wet-bulb temperature or dry-bulb temperature before proceeding to the water chiller, where it is cooled to between 4 and 7 °C and pumped to the air handler, where the cycle is repeated. The equipment required includes chillers, cooling towers, pumps and electrical control equipment. The initial capital outlay for these is substantial and maintenance costs can fluctuate. Adequate space must be included in building design for the physical plant and access to equipment.
Utility generated
The chilled water, having absorbed heat from the air, is sent via return lines back to the utility facility, where the process described in the previous section occurs. Utility generated chilled water eliminates the need for chillers and cooling towers at the property, reduces capital |
https://en.wikipedia.org/wiki/Yellow%20flag | Yellow flag may refer to:
Iris pseudacorus, an aquatic flowering plant
A flag of a yellow colour:
Yellow flag (contagion), historically displayed on ships to indicate the presence of disease or quarantine (obsolete); also used in some cities to mark a recent death in a neighborhood, regardless of cause
Racing flags, used in motor sports to indicate hazardous conditions
Penalty flag, used in various sports including American football
Yellow Flag Line, transport on the Chao Phraya River, with service indicated by the flag color
Yellow Dragon Flag, the flag of the Qing dynasty
The Yellow Flag, 1937 German drama film
Yellow Banners of the Eight Banner system
Plain Yellow Banner
Bordered Yellow Banner
Flag, yellow |
https://en.wikipedia.org/wiki/IEEE%20Transactions%20on%20Control%20Systems%20Technology | The IEEE Transactions on Control Systems Technology is published bimonthly by the IEEE Control Systems Society. The journal publishes papers, letters, tutorials, surveys, and perspectives on control systems technology. The editor-in-chief is Prof. Andrea Serrani (Ohio State University). According to the Journal Citation Reports, the journal has a 2019 impact factor of 5.312. |
https://en.wikipedia.org/wiki/Transcription%20software | Transcription software assists in the conversion of human speech into a text transcript. Audio or video files can be transcribed manually or automatically. Transcriptionists can replay a recording several times in a transcription editor and type what they hear. By using transcription hot keys, the manual transcription can be accelerated, the sound filtered, equalized or have the tempo adjusted when the clarity is not great. With speech recognition technology, transcriptionists can automatically convert recordings to text transcripts by opening recordings in a PC and uploading them to a cloud for automatic transcription, or transcribe recordings in real-time by using digital dictation. Depending on quality of recordings, machine generated transcripts may still need to be manually verified. The accuracy rate of the automatic transcription depends on several factors such as background noises, speakers' distance to the microphone, and accents.
Transcription software, as with transcription services, is often provided for business, legal, or medical purposes. Compared with audio content, a text transcript is searchable, takes up less computer memory, and can be used as an alternate method of communication, such as for closed captions.
The definition of transcription "software", as compared with transcription "service", is that the former is sufficiently automated that a user can run the entire system without engaging outside personnel. However, the advent of software-as-a-service and cloud computing models blur this distinction. It uses artificial intelligence, machine learning and natural language processing to convert speech to text and continuously learn new phrases and accents.
Development
Research at Google released a free android app Google Live Transcribe, it runs on Google Cloud. Google Chrome developed and has a available built in English Live Caption. Google Docs, Google Translate, Google Assistant, GBoard Google Text to Speech engine support transcription |
https://en.wikipedia.org/wiki/DevOps%20toolchain | A DevOps toolchain is a set or combination of tools that aid in the delivery, development, and management of software applications throughout the systems development life cycle, as coordinated by an organisation that uses DevOps practices.
Generally, DevOps tools fit into one or more activities, which supports specific DevOps initiatives: Plan, Create, Verify, Package, Release, Configure, Monitor, and Version Control.
Toolchains
In software, a toolchain is the set of programming tools that is used to perform a complex software development task or to create a software product, which is typically another computer program or a set of related programs. In general, the tools forming a toolchain are executed consecutively so the output or resulting environment state of each tool becomes the input or starting environment for the next one, but the term is also used when referring to a set of related tools that are not necessarily executed consecutively.
As DevOps is a set of practices that emphasizes the collaboration and communication of both software developers and other information technology (IT) professionals, while automating the process of software delivery and infrastructure changes, its implementation can include the definition of the series of tools used at various stages of the lifecycle; because DevOps is a cultural shift and collaboration between development and operations, there is no one product that can be considered a single DevOps tool. Instead a collection of tools, potentially from a variety of vendors, are used in one or more stages of the lifecycle.
Stages of DevOps
Plan
Plan is composed of two things: "define" and "plan". This activity refers to the business value and application requirements. Specifically "Plan" activities include:
Production metrics, objects and feedback
Requirements
Business metrics
Update release metrics
Release plan, timing and business case
Security policy and requirement
A combination of the IT personnel will be |
https://en.wikipedia.org/wiki/Sagittaria | Sagittaria is a genus of about 30 species of aquatic plants whose members go by a variety of common names, including arrowhead, duck potato, swamp potato, tule potato, and wapato. Most are native to South, Central, and North America, but there are also some from Europe, Africa, and Asia.
Description
Sagittaria plant stock (the perennial rhizome) is a horizontal creeper (stoloniferous) and obliquely obovate, the margins winged, with apical or ventral beak; in other words, they are a small, dry, one-seeded fruit that do not open to release the seed, set on a slant, narrower at the base, with winged edges, and having a "beaked" aperture (one side longer than the other) for sprouting, set above or below the fruit body.
One of the names for this plant is derived from the edible underwater tuber that the plant produces. In late fall or early spring, disturbing the aquatic mud in which the plant grows will cause its small tubers to float to the surface where they can be harvested and then boiled.
Uses
Many species have edible roots, prized for millennia as a reliable source of starch and carbohydrates, even during the winter. Some are edible raw, though are less bitter when cooked. They can be harvested by hand or by treading with one's feet in the mud. They are easy to propagate by replanting the roots.
Species
Accepted species:
Sagittaria aginashii Makino – Japan, Korea, Primorye
Sagittaria ambigua J.G.Sm. – Missouri Arrowhead – from Oklahoma to Indiana
Sagittaria australis (J.G.Sm.) Small – Appalachian Arrowhead – southeastern US from Louisiana to Florida and as far north as Iowa and New Jersey
Sagittaria brevirostra Mack. & Bush – Shortbeak Arrowhead – central US (Great Plains, Mississippi and Ohio Valleys, Great Lakes); also Virginia and Saskatchewan; naturalized in California
Sagittaria chapmanii (J.G.Sm.) C.Mohr – from Texas to the Carolinas
Sagittaria cristata Engelm – Crested arrowhead – Great Lakes region
Sagittaria cuneata E.P.Sheld. – Wapato, No |
https://en.wikipedia.org/wiki/Seemin%20Jamali | Seemin Jamali (; 19 August 1961 – 27 May 2023), also known as Iron Lady, Bullet Lady and Bomb-Proof Lady, was a Pakistani medical doctor and former executive director of Jinnah Postgraduate Medical Centre. She was appointed Member of Sindh Public Service Commission (SPSC) in December 2022. She was the recipient of Tamgha-e-Imtiaz (2019) and the Women Achievement Awards.
In October 2022, Jamali was given the honorary rank of Lieutenant Colonel by the Pakistan Army in recognition of her lifelong services.
Early life
Jamali was born on 19 August 1961, to Ghulamullah Din Muhammad Memon. She studied in Gulistan Shah Abdul Latif School and graduated from Nawabshah Medical College in 1986.
Career
Jamali joined JPMC in 1988. In 1993, she completed her master's degree in Primary Healthcare Management (MPHM) in Thailand. She took charge of JPMC's emergency department in 1995. She did a postdoctoral fellowship in Emergency Care in the US. She was awarded a scholarship for a post-doctoral fellowship in public health policy and injury prevention at the Johns Hopkins School of Public Health.
Personal life and death
In 2020, Jamali was diagnosed with colon cancer, which was successfully treated at the time.
On 27 May 2023, Jamali died from a recurrence of cancer while being admitted to Aga Khan University Hospital, Karachi. She was 61. |
https://en.wikipedia.org/wiki/Astronomical%20constant | An astronomical constant is any of several physical constants used in astronomy. Formal sets of constants, along with recommended values, have been defined by the International Astronomical Union (IAU) several times: in 1964 and in 1976 (with an update in 1994). In 2009 the IAU adopted a new current set, and recognizing that new observations and techniques continuously provide better values for these constants, they decided to not fix these values, but have the Working Group on Numerical Standards continuously maintain a set of Current Best Estimates. The set of constants is widely reproduced in publications such as the Astronomical Almanac of the United States Naval Observatory and HM Nautical Almanac Office.
Besides the IAU list of units and constants, also the International Earth Rotation and Reference Systems Service defines constants relevant to the orientation and rotation of the Earth, in its technical notes.
The IAU system of constants defines a system of astronomical units for length, mass and time (in fact, several such systems), and also includes constants such as the speed of light and the constant of gravitation which allow transformations between astronomical units and SI units. Slightly different values for the constants are obtained depending on the frame of reference used. Values quoted in barycentric dynamical time (TDB) or equivalent time scales such as the Teph of the Jet Propulsion Laboratory ephemerides represent the mean values that would be measured by an observer on the Earth's surface (strictly, on the surface of the geoid) over a long period of time. The IAU also recommends values in SI units, which are the values which would be measured (in proper length and proper time) by an observer at the barycentre of the Solar System: these are obtained by the following transformations:
Astronomical system of units
The astronomical unit of time is a time interval of one day (D) of 86400 seconds. The astronomical unit of mass is the mass of the |
https://en.wikipedia.org/wiki/Load%20dump | Load dump means the disconnection of a powered load. It can cause 2 problems:
failure of supply to equipment or customers
large voltage spikes from the inductive generator(s)
In automotive electronics, it refers to the disconnection of the vehicle battery from the alternator while the battery is being charged. Due to such a disconnection of the battery, other loads connected to the alternator experience a surge in the voltage on the battery bus. This surge may be as high as 120 volts and the surge may take up to 400 ms to decay. It is typically clamped to 40 V in 12 V vehicles and about 60 V in 24 V systems.
Overview
The field winding of an alternator has a large inductance. When the vehicle battery is being charged, the alternator generates a large current, the magnitude of which is controlled by the current in the field winding. If the battery becomes disconnected while it is being charged the load on the alternator suddenly decreases. However, the vehicle's voltage regulator cannot quickly cause the field current to decrease sufficiently, so the alternator continues to generate a large current. This large current causes the voltage on the vehicle bus to increase significantly -- well above the normal and regulated level.
All the loads connected to the alternator see this high voltage spike. The strength of the spike depends on many factors including the speed at which the alternator is rotating and the current which was being supplied to the battery before it was disconnected. These spike may peak at as high as 120 V and may take up to 400 ms to decay. This kind of a spike would damage many semiconductor devices, e.g. ECUs, that may be connected to the alternator. Special protection devices, such as TVS diodes, varistors which can withstand and absorb the energy of these spikes may be added to protect such semiconductor devices.
Various automotive standards such as ISO 7637-2 and SAE J1113-11 specify a standard shape of the load dump pulse against which |
https://en.wikipedia.org/wiki/Geometric%20magic%20square | A geometric magic square, often abbreviated to geomagic square, is a generalization of magic squares invented by Lee Sallows in 2001. A traditional magic square is a square array of numbers (almost always positive integers) whose sum taken in any row, any column, or in either diagonal is the same target number. A geomagic square, on the other hand, is a square array of geometrical shapes in which those appearing in each row, column, or diagonal can be fitted together to create an identical shape called the target shape. As with numerical types, it is required that the entries in a geomagic square be distinct. Similarly, the eight trivial variants of any square resulting from its rotation and/or reflection are all counted as the same square. By the dimension of a geomagic square is meant the dimension of the pieces it uses. Hitherto interest has focused mainly on 2D squares using planar pieces, but pieces of any dimension are permitted.
Examples
Figure 1 above shows a 3 × 3 geomagic square. The 3 pieces occupying each row, column and diagonal pave a rectangular target, as seen at left and right, and above and below. Here the 9 pieces are all decominoes, but pieces of any shape may appear, and it is not a requirement that they be of same size. In Figure 2, for instance, the pieces are polyominoes of consecutive sizes from 1 up to 9 units. The target is a 4 × 4 square with an inner square hole.
Surprisingly, computer investigations show that Figure 2 is just one among 4,370 distinct 3 × 3 geomagic squares using pieces with these same sizes and same target. Conversely, Figure 1 is one of only two solutions using similar-sized pieces and identical target. In general, repeated piece sizes imply fewer solutions. However, at present there exists no theoretical underpinning to explain these empirical findings.
The pieces in a geomagic square may also be disjoint, or composed of separated islands, as seen in Figure 3. Since they can be placed so as to mutually overlap, d |
https://en.wikipedia.org/wiki/Instanton | An instanton (or pseudoparticle) is a notion appearing in theoretical and mathematical physics. An instanton is a classical solution to equations of motion with a finite, non-zero action, either in quantum mechanics or in quantum field theory. More precisely, it is a solution to the equations of motion of the classical field theory on a Euclidean spacetime.
In such quantum theories, solutions to the equations of motion may be thought of as critical points of the action. The critical points of the action may be local maxima of the action, local minima, or saddle points. Instantons are important in quantum field theory because:
they appear in the path integral as the leading quantum corrections to the classical behavior of a system, and
they can be used to study the tunneling behavior in various systems such as a Yang–Mills theory.
Relevant to dynamics, families of instantons permit that instantons, i.e. different critical points of the equation of motion, be related to one another. In physics instantons are particularly important because the condensation of instantons (and noise-induced anti-instantons) is believed to be the explanation of the noise-induced chaotic phase known as self-organized criticality.
Mathematics
Mathematically, a Yang–Mills instanton is a self-dual or anti-self-dual connection in a principal bundle over a four-dimensional Riemannian manifold that plays the role of physical space-time in non-abelian gauge theory. Instantons are topologically nontrivial solutions of Yang–Mills equations that absolutely minimize the energy functional within their topological type. The first such solutions were discovered in the case of four-dimensional Euclidean space compactified to the four-dimensional sphere, and turned out to be localized in space-time, prompting the names pseudoparticle and instanton.
Yang–Mills instantons have been explicitly constructed in many cases by means of twistor theory, which relates them to algebraic vector bundles on al |
https://en.wikipedia.org/wiki/SGI%20O2 | The O2 was an entry-level Unix workstation introduced in 1996 by Silicon Graphics, Inc. (SGI) to replace their earlier Indy series. Like the Indy, the O2 used a single MIPS microprocessor and was intended to be used mainly for multimedia. Its larger counterpart was the SGI Octane. The O2 was SGI's last attempt at a low-end workstation.
Hardware
System architecture
Originally known as the "Moosehead" project, the O2 architecture featured a proprietary high-bandwidth Unified Memory Architecture (UMA) to connect system components. A PCI bus is bridged onto the UMA with one slot available. It had a designer case and an internal modular construction. Two SCSI drives could be mounted on special caddies (1 in the later R10000/R12000 models due to heat constraints) and an optional video capture / sound cassette mounted on the far left side.
CPU
The O2 comes in two distinct CPU flavours; the low-end MIPS 180 to 350 MHz R5000- or RM7000-based units and the higher-end 150 to 400 MHz R10000- or R12000-based units. The 200 MHz R5000 CPUs with 1 MB L2-cache are generally noticeably faster than the 180 MHz R5000s with 512 KB cache. There is a hobbyist project that has successfully retrofitted a 600 MHz RM7xxx MIPS processor into the O2.
Memory
There are eight DIMM slots on the motherboard and memory, and all O2s are expandable to 1 GB using proprietary 239-pin SDRAM DIMMs. The Memory & Rendering Engine (MRE) ASIC contains the memory controller. Memory is accessed via a 133 MHz 144-bit bus, of which 128 bits are for data and the remaining for ECC. This bus is interfaced by a set of buffers to the 66 MHz 256-bit memory system.
I/O
I/O functionality is provided by the IO Engine ASIC. The ASIC provides a 64-bit PCI bus, an ISA bus, two PS/2 ports for keyboard and mouse, and a 10/100 Base-T Ethernet port. The PCI bus has one 64-bit slot, but the ISA bus is present solely for attaching a Super I/O chip to provide serial and parallel ports.
Disks
The O2 carries an UltraWide SCSI |
https://en.wikipedia.org/wiki/Legacy%20costs | Legacy costs is a term formed by analogy with the computer industry's legacy systems. Legacy costs are those incurred by an organization (whether corporation or city) in prior years under different leadership or when the entity's priorities and resources were different. While it can refer to other commitments (particularly existing infrastructure) as well, it primarily refers to obligations to pay health care costs and pensions under defined-benefit plans for current employees and retirees, usually incurred during the labor peace era after World War II. Legacy costs are believed to hinder American jobs, such as auto manufacturers and central cities, and older airlines worldwide. This belief leads to the idea that legacy costs will lower the company's competitiveness. Organized labor sees such criticisms as part of a desire to abandon any form of social contract between worker and employer.
Newer, less-established entities have few or no problems with legacy costs, because they have less pension and health care liabilities (this applies to new suburbs, for example, as well as new companies), and are therefore able to out-compete (in some cases) the older entities.
History
In the 1990s, steel firms were guaranteed pension funds. Workers had health-care benefits through these steel firms; however, there was an issue in funding for the defined benefit pension funds. In 1986, PBGC took over LTV's pension payments after LTV went bankrupt. The main apprehension was the liabilities between the firms with defined benefit plans and the firms with contribution pension plans. After this problem, many workers believed that the old firms had to pay the costs of the pensions, also known as legacy costs.
The Lincoln Institute of Land Policy has conducted research on how much money is spent on pension plans from state and local government in their published 2012 findings. This research used records from Boston College Center for Retirement Research with a Public Plans Database (P |
https://en.wikipedia.org/wiki/Sotolon | Sotolon (also known as sotolone) is a lactone and an extremely powerful aroma compound, with the typical smell of fenugreek or curry at high concentrations and maple syrup, caramel, or burnt sugar at lower concentrations. Sotolon is the major aroma and flavor component of fenugreek seed and lovage, and is one of several aromatic and flavor components of artificial maple syrup. It is also present in molasses, aged rum, aged sake and white wine, flor sherry, roast tobacco, and dried fruiting bodies of the mushroom Lactarius helvus. Sotolon can pass through the body relatively unchanged, and consumption of foods high in sotolon, such as fenugreek, can impart a maple syrup aroma to one's sweat and urine. In some individuals with the genetic disorder maple syrup urine disease, it is spontaneously produced in their bodies and excreted in their urine, leading to the disease's characteristic smell.
This molecule is thought to be responsible for the mysterious maple syrup smell that has occasionally wafted over Manhattan since 2005. Sotolon was first isolated in 1975 from the herb fenugreek. The compound was named in 1980 when it was found to be responsible for the flavor of raw cane sugar: soto- means "raw sugar" in Japanese and -olon signifies that the molecule is an enol lactone.
Several aging-derived compounds have been pointed out as playing an important role on the aroma of fortified wines; however, sotolon (3-hydroxy-4,5-dimethyl-2(5H)-furanone) is recognized as being the key odorant and has also been classified as a potential aging marker of these type of wines. This chiral lactone is a powerful odorant, which can impart a nutty, caramel, curry, or rancid odor, depending on its concentration and enantiomeric distribution. Despite being pointed out as a key odorant of other fortified wines, the researchers’ attention has also been directed to its off-flavor character, associated to the premature oxidative aging of young dry white wines, overlapping the expected fr |
https://en.wikipedia.org/wiki/Mumford%27s%20compactness%20theorem | In mathematics, Mumford's compactness theorem states that the space of compact Riemann surfaces of fixed genus g > 1 with no closed geodesics of length less than some fixed ε > 0 in the Poincaré metric is compact. It was proved by as a consequence of a theorem about the compactness of sets of discrete subgroups of semisimple Lie groups generalizing Mahler's compactness theorem. |
https://en.wikipedia.org/wiki/Rayleigh%E2%80%93Lorentz%20pendulum | Rayleigh–Lorentz pendulum (or Lorentz pendulum) is a simple pendulum, but subjected to a slowly varying frequency due to an external action (frequency is varied by varying the pendulum length), named after Lord Rayleigh and Hendrik Lorentz. This problem formed the basis for the concept of adiabatic invariants in mechanics. On account of the slow variation of frequency, it is shown that the ratio of average energy to frequency is constant.
History
The pendulum problem was first formulated by Lord Rayleigh in 1902, although some mathematical aspects have been discussed before by Léon Lecornu in 1895. Unaware of Rayleigh's work, at the first Solvay conference in 1911, Hendrik Lorentz proposed a question, How does a simple pendulum behave when the length of the suspending thread is gradually shortened?, in order to clarify the quantum theory at that time. To that Albert Einstein responded the next day by saying that both energy and frequency of the quantum pendulum changes such that their ratio is constant, so that the pendulum is in the same quantum state as the initial state. These two separate works formed the basis for the concept of adiabatic invariant, which found applications in various fields and old quantum theory. In 1958, Subrahmanyan Chandrasekhar took interest in the problem and studied it so that a renewed interest in the problem was set, subsequently to be studied by many other researchers like John Edensor Littlewood etc.
Mathematical description
The equation of the simple harmonic motion with frequency for the displacement is given by
If the frequency is constant, the solution is simply given by . But if the frequency is allowed to vary slowly with time , or precisely, if the characteristic time scale for the frequency variation is much smaller than the time period of oscillation, i.e.,
then it can be shown that
where is the average energy averaged over an oscillation. Since the frequency is changing with time due to external action, conservatio |
https://en.wikipedia.org/wiki/Binary%20combinatory%20logic | Binary combinatory logic (BCL) is a computer programming language that uses binary terms 0 and 1 to create a complete formulation of combinatory logic using only the symbols 0 and 1. Using the S and K combinators, complex boolean algebra functions can be made. BCL has applications in the theory of program-size complexity (Kolmogorov complexity).
Definition
S-K Basis
Utilizing K and S combinators of the Combinatory logic, logical functions can be represented in as functions of combinators:
Syntax
Backus–Naur form:
<term> ::= 00 | 01 | 1 <term> <term>
Semantics
The denotational semantics of BCL may be specified as follows:
[ 00 ] == K
[ 01 ] == S
[ 1 <term1> <term2> ] == ( [<term1>] [<term2>] )
where "[...]" abbreviates "the meaning of ...". Here K and S are the KS-basis combinators, and ( ) is the application operation, of combinatory logic. (The prefix 1 corresponds to a left parenthesis, right parentheses being unnecessary for disambiguation.)
Thus there are four equivalent formulations of BCL, depending on the manner of encoding the triplet (K, S, left parenthesis). These are (00, 01, 1) (as in the present version), (01, 00, 1), (10, 11, 0), and (11, 10, 0).
The operational semantics of BCL, apart from eta-reduction (which is not required for Turing completeness), may be very compactly specified by the following rewriting rules for subterms of a given term, parsing from the left:
1100xy → x
11101xyz → 11xz1yz
where x, y, and z are arbitrary subterms. (Note, for example, that because parsing is from the left, 10000 is not a subterm of 11010000.)
BCL can be used to replicate algorithms like Turing machines and Cellular automata, BCL is Turing complete.
See also
Iota and Jot |
https://en.wikipedia.org/wiki/Island%20of%20inversion | An island of inversion is a region of the chart of nuclides where isotopes have enhanced stability in a sea of mostly fleeting and unstable nuclei at the edge of the nuclear map. Each island contains isotopes with a non-standard ordering of single particle levels in the nuclear shell model. Such an area was first described in 1975 by French physicists carrying out spectroscopic mass measurements of exotic isotopes of lithium and sodium. Since then further studies have shown that five such regions exist within the known table of nuclides. These are centered at neutron-rich isotopes of five elements, namely 11Li, 20C, 31Na, 42Si, and 64Cr. Because there are five known islands of inversion, physicists have suggested renaming the phenomenon as an "archipelago of islands of shell breaking". Studies with the purpose of defining the edges of this region are still ongoing.
See also
Table of nuclides
Periodic table and Periodic table (extended)
Island of stability |
https://en.wikipedia.org/wiki/Journal%20of%20Economic%20Dynamics%20and%20Control | The Journal of Economic Dynamics and Control (JEDC) is a peer-reviewed scholarly journal devoted to computational economics, dynamic economic models, and macroeconomics. It is edited at the University of Amsterdam and published by Elsevier. It has been published since 1979.
The journal sometimes devotes special issues to particular topics, like 'Complexity in Economics and Finance' (May 2009), 'Dynamic Stochastic General Equilibrium Modelling' (August 2008), and 'Applications of Statistical Physics in Economics and Finance' (January 2008). In some years it has also published selected articles from the annual meeting of the Society for Computational Economics.
In their ranking of academic impact of economics journals, Kalaitzidakis et al. (2003) rank JEDC twenty-third out of 159 journals. while Kodrzycki and Yu (2006) rank it 27th out of 181 journals for its impact on economics.
See also
List of scholarly journals in economics |
https://en.wikipedia.org/wiki/IBM%20Quantum%20Platform | IBM Quantum Platform (previously as IBM Quantum Experience) is an online platform allowing public and premium access to cloud-based quantum computing services provided by IBM. This includes access to a set of IBM's prototype quantum processors, a set of tutorials on quantum computation, and access to an interactive textbook. As of February 2021, there are over 20 devices on the service, six of which are freely available for the public. This service can be used to run algorithms and experiments, and explore tutorials and simulations around what might be possible with quantum computing.
IBM's quantum processors are made up of superconducting transmon qubits, located in dilution refrigerators at the IBM Research headquarters at the Thomas J. Watson Research Center. Users interact with a quantum processor through the quantum circuit model of computation. Circuits can be created either using graphically with the Quantum Composer, or programmatically within the Jupyter notebooks of the Quantum Lab. Circuits are created using Qiskit and can be compiled down to OpenQASM for execution on real
quantum systems.
History
The service was launched in May 2016 as the IBM Quantum Experience with a five-qubit quantum processor and matching simulator connected in a star shaped pattern. At this time, users could only interact with the hardware through the quantum composer GUI. Quantum circuits were also limited to the specific two-qubit gates available on the hardware.
In July 2016, IBM launched the IBM Quantum Experience community forum. This was subsequently replaced by a Slack workspace.
In January 2017, IBM made a number of additions to the IBM Quantum Experience, including increasing the set of two-qubit interactions available on the five-qubit quantum processor, expanding the simulator to custom topologies up to twenty qubits, and allowing users to interact with the device and simulator using quantum assembly language code.
In March 2017, IBM released Qiskit to enable u |
https://en.wikipedia.org/wiki/Diplostigmaty | Diplostigmaty refers, in botany, to the presence of extra stigmas along the style. This condition is known from the genus Sebaea. It is thought to provide reproductive assurance. |
https://en.wikipedia.org/wiki/Tetraterpene | Tetraterpenes are terpenes consisting of eight isoprene units and have the molecular formula C40H64. Tetraterpenoids (including many carotenoids) are tetraterpenes that have been chemically modified, as indicated by the presence of oxygen-containing functional groups.
Phytoene is biosynthesized via the head-to-head condensation of two GGPP molecules. One group of tetraterpenes, and possibly the most studied one, is the carotenoids pigments. Carotenoids have important biological functions, with roles in light capture, antioxidative activity and protection against free radicals, synthesis of plant hormones and as structural components of the membranes. Aside their biological relevance, carotenoids are also high-value compounds for the food and pharmaceutical industries. Carotenoids are biosynthesized by photosynthetic and non-photosynthetic organisms; however, in photosynthetic organisms, they are essential components as accessory pigments for the light-harvesting reaction centers. Xanthophylls are another group of tetraterpene pigments distributed widely in nature. |
https://en.wikipedia.org/wiki/IEEE%20802.1X | IEEE 802.1X is an IEEE Standard for port-based network access control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN or WLAN.
IEEE 802.1X defines the encapsulation of the Extensible Authentication Protocol (EAP) over wired IEEE 802 networks and over 802.11 wireless networks, which is known as "EAP over LAN" or EAPOL. EAPOL was originally specified for IEEE 802.3 Ethernet, IEEE 802.5 Token Ring, and FDDI (ANSI X3T9.5/X3T12 and ISO 9314) in 802.1X-2001, but was extended to suit other IEEE 802 LAN technologies such as IEEE 802.11 wireless in 802.1X-2004. The EAPOL was also modified for use with IEEE 802.1AE ("MACsec") and IEEE 802.1AR (Secure Device Identity, DevID) in 802.1X-2010 to support service identification and optional point to point encryption over the internal LAN segment.
Overview
802.1X authentication involves three parties: a supplicant, an authenticator, and an authentication server. The supplicant is a client device (such as a laptop) that wishes to attach to the LAN/WLAN. The term 'supplicant' is also used interchangeably to refer to the software running on the client that provides credentials to the authenticator. The authenticator is a network device that provides a data link between the client and the network and can allow or block network traffic between the two, such as an Ethernet switch or wireless access point; and the authentication server is typically a trusted server that can receive and respond to requests for network access, and can tell the authenticator if the connection is to be allowed, and various settings that should apply to that client's connection or setting. Authentication servers typically run software supporting the RADIUS and EAP protocols. In some cases, the authentication server software may be running on the authenticator hardware.
The authenticator acts like a security guard to a protected network. The supplicant (i.e., c |
https://en.wikipedia.org/wiki/Address%20space | In computing, an address space defines a range of discrete addresses, each of which may correspond to a network host, peripheral device, disk sector, a memory cell or other logical or physical entity.
For software programs to save and retrieve stored data, each datum must have an address where it can be located. The number of address spaces available depends on the underlying address structure, which is usually limited by the computer architecture being used. Often an address space in a system with virtual memory corresponds to a highest level translation table, e.g., a segment table in IBM System/370.
Address spaces are created by combining enough uniquely identified qualifiers to make an address unambiguous within the address space. For a person's physical address, the address space would be a combination of locations, such as a neighborhood, town, city, or country. Some elements of a data address space may be the same, but if any element in the address is different, addresses in said space will reference different entities. For example, there could be multiple buildings at the same address of "32 Main Street" but in different towns, demonstrating that different towns have different, although similarly arranged, street address spaces.
An address space usually provides (or allows) a partitioning to several regions according to the mathematical structure it has. In the case of total order, as for memory addresses, these are simply chunks. Like the hierarchical design of postal addresses, some nested domain hierarchies appear as a directed ordered tree, such as with the Domain Name System or a directory structure. In the Internet, the Internet Assigned Numbers Authority (IANA) allocates ranges of IP addresses to various registries so each can manage their parts of the global Internet address space.
Examples
Uses of addresses include, but are not limited to the following:
Memory addresses for main memory, memory-mapped I/O, as well as for virtual memory;
Device |
https://en.wikipedia.org/wiki/Full%20cycle | In a pseudorandom number generator (PRNG), a full cycle or full period is the behavior of a PRNG over its set of valid states. In particular, a PRNG is said to have a full cycle if, for any valid seed state, the PRNG traverses every valid state before returning to the seed state, i.e., the period is equal to the cardinality of the state space.
The restrictions on the parameters of a PRNG for it to possess a full cycle are known only for certain types of PRNGs, such as linear congruential generators and linear-feedback shift registers. There is no general method to determine whether a PRNG algorithm is full-cycle short of exhausting the state space, which may be exponentially large compared to the size of the algorithm's internal state.
Example 1 (in C/C++)
Given a random number seed that is greater or equal to zero, a total sample size greater than 1, and an increment coprime to the total sample size, a full cycle can be generated with the following logic. Each nonnegative number smaller than the sample size occurs exactly once.
unsigned int seed = 0;
unsigned int sample_size = 3000;
unsigned int generated_number = seed % sample_size;
unsigned int increment = 7;
for (unsigned int iterator = 0; iterator < sample_size; ++iterator)
{
generated_number = (generated_number + increment) % sample_size;
}
Example 1 (in Python)
# Generator that goes through a full cycle
def cycle(seed: int, sample_size: int, increment: int):
nb = seed
for i in range(sample_size):
nb = (nb + increment) % sample_size
yield nb
# Example values
seed = 17
sample_size = 100
increment = 13
# Print all the numbers
print(list(cycle(seed, sample_size, increment)))
# Verify that all numbers were generated correctly
assert set(cycle(seed, sample_size, increment)) == set(range(sample_size))
See also
Linear congruential generator
Xorshift
Pseudorandom number generators
Articles with example Python (programming language) code |
https://en.wikipedia.org/wiki/Mailfence | Mailfence is a secure and encrypted email service that offers OpenPGP based end-to-end encryption and digital signatures. It was launched in November 2013 by ContactOffice Group, which has been operating an online collaboration suite for universities and other organizations since 1999.
History
Development
In the midst of 2013, the Mailfence project was started by the founders of ContactOffice. In March 2016, a beta version of end-to-end encryption and digital signatures for emails was released.
In January 2021, Mailfence released progressive web application for mobile devices.
Block in Russia
On 5 March 2020, Mailfence reported that their SMTP servers are blocked by Russian based email services. This was in response to their refusal to submit a Notice of Commencement of Collaboration with Roskomnadzor’s (the Federal Supervision Agency for Communications, Information Technology, and Mass Communication) of the Russian government. Mailfence did not respond to this request, citing obligation to provide information about users, violating its Terms and the federal Belgian laws.
Features
Mailfence provides secure email features, with other functions such as Calendar, Contacts, Documents and Collaboration. Encryption and Two-factor authentication are available in the free version of the product. Most other features are only available with paid subscriptions.
Email
The service supports POP/IMAP and Exchange ActiveSync as well as vanity domains with SPF, DKIM, DMARC and catch-all address support. Users can send both plain and rich text emails, organize messages in folders and/or categorize them with tags, take notes by setting comment on each message and create default message signatures for every sender address. Different identities can also be managed using aliases and filters for incoming emails.
Contacts
The contacts support (CSV, vCard, LDIF) import, (vCard, PDF) export and can be accessed using CardDAV. Users organize them with tags and can also create contac |
https://en.wikipedia.org/wiki/CCSID | A CCSID (coded character set identifier) is a 16-bit number that represents a particular encoding of a specific code page. For example, Unicode is a code page that has several character encoding schemes (referred to as "transformation forms")—including UTF-8, UTF-16 and UTF-32—but which may or may not actually be accompanied by a CCSID number to indicate that this encoding is being used.
Difference between a code page and a CCSID
The terms code page and CCSID are often used interchangeably, even though they are not synonymous. A code page may be only part of what makes up a CCSID. The following definitions from IBM help to illustrate this point:
A glyph is the actual physical pattern of pixels or ink that shows up on a display or printout.
A character is a concept that covers all glyphs associated with a certain symbol. For instance, "F", "F", "F", "", "", and "" are all different glyphs, but use the same character. The various modifiers (bold, italic, underline, color, and font) do not change the F's essential F-ness.
A character set contains the characters necessary to allow a particular human to carry on a meaningful interaction with the computer. It does not specify how those characters are represented in a computer. This level is the first one to separate characters into various alphabets (Latin, Arabic, Hebrew, Cyrillic, and so on) or ideographic groups (e.g., Chinese, Korean). It corresponds to a "character repertoire" in the Unicode encoding model.
A code page represents a particular assignment of code point values to characters. It corresponds to a "coded character set" in the Unicode encoding model. A code point for a character is the computer's internal representation of that character in a given code page. Many characters are represented by different code points in different code pages. Certain character sets can be adequately represented with single-byte code pages (which have a maximum 256 code points, hence a maximum of 256 characters), but m |
https://en.wikipedia.org/wiki/Keycap | A keycap is a small cover of plastic, metal, or other material placed over the keyswitch of a computer keyboard. Keycaps are often illustrated to indicate the key function or alphanumeric character they correspond to. Early keyboards were manufactured with the keyswitch and keycap integrated in one unit; keycaps separate from the switch were introduced to facilitate the production of different keyboard layouts.
History
Typical keycaps in the 1970s and 1980s were produced using two-shot molding, with the markings molded into each keycap in a different color of plastic. This eventually fell out of favor, as it was more expensive (particularly in tooling costs), and tended to produce keycaps more durable than the equipment on which they were mounted. Modern keycaps are usually labelled by stamping or laser engraving. However, two-shot molding ("doubleshot") keycaps are still available today, known for their feel and general durability.
Modern keycaps
Keycaps can be bought in replacement sets for a keyboard. Notably, replacement sets are frequently sold for keyboards that use Cherry MX-style stems. Custom sets are bought and sold within the enthusiast communities, and artisan keycaps can be purchased individually. Some artisan keycaps are cast into unique shapes such as LEGO
Keycaps are sold in printed and unprinted varieties. The unprinted variety, known as "Blank Keycaps," is said to promote touch typing and help build muscle memory because the user is forced to rely on motion rather than visuals. There are many designs for you to choose from. From anime design, bi-color design, game-based design, and even custom keycap as you wish. However, within the modern mechanical keyboard community, unprinted caps are typically chosen for their visual appeal.
The most common plastics used are ABS, PBT and POM (see the materials section).
The top of most keycaps may be described as cylinder-shaped (curving to the sides as if a fat cylinder was resting on it), flat or sph |
https://en.wikipedia.org/wiki/Upstream%20open%20reading%20frame | An upstream open reading frame (uORF) is an open reading frame (ORF) within the 5' untranslated region (5'UTR) of an mRNA. uORFs can regulate eukaryotic gene expression. Translation of the uORF typically inhibits downstream expression of the primary ORF. However, in some genes such as yeast GCN4, translation of specific uORFs may increase translation of the main ORF. In bacteria, uORFs are called leader peptides and were originally discovered on the basis of their impact on the regulation of genes involved in the synthesis or transport of amino acids.
Approximately 50% of human genes contain uORFs in their 5'UTR, and when present, these cause reductions in protein expression. Human peptides derived from translated uORFs can be detected from cellular material with a mass spectrometer.
See also
5'UTR
Eukaryotic translation
Leaky scanning |
https://en.wikipedia.org/wiki/The%20Sword%20of%20Damocles%20%28virtual%20reality%29 | The Sword of Damocles was the name for an early virtual reality (VR) head-mounted display and tracking system. It is widely considered to be the first augmented reality HMD system, although Morton Heilig had already created a stereoscopic head-mounted viewing apparatus without head tracking (known as "Stereoscopic-Television Apparatus for Individual Use" or "Telesphere Mask") earlier, patented in 1960.
The Sword of Damocles was created in 1968 by computer scientist Ivan Sutherland with the help of his students Bob Sproull, Quintin Foster, and Danny Cohen. Before he began working toward what he termed "the ultimate display", Ivan Sutherland was already well respected for his accomplishments in computer graphics (see Sketchpad). At MIT's Lincoln Laboratory beginning in 1966, Sutherland and his colleagues performed what are widely believed to be the first experiments with head-mounted displays of different kinds.
Features
The device was primitive both in terms of user interface and realism, and the graphics comprising the virtual environment were simple wireframe rooms. Sutherland's system displayed output from a computer program in the stereoscopic display. The perspective that the software showed the user would depend on the position of the user's gaze – which is why head tracking was necessary. The HMD had to be attached to a mechanical arm suspended from the ceiling of the lab partially due to its weight, and primarily to track head movements via linkages. The formidable appearance of the mechanism inspired its name. While using The Sword of Damocles, a user had to have his or her head securely fastened into the device to perform the experiments. At this time, the various components being tested were not fully integrated with one another.
Development
When Sutherland moved to the University of Utah in the late 1960s, work on integrating the various components into a single HMD system was begun. By the end of the decade, the first fully functional inte |
https://en.wikipedia.org/wiki/Hadamard%27s%20lemma | In mathematics, Hadamard's lemma, named after Jacques Hadamard, is essentially a first-order form of Taylor's theorem, in which we can express a smooth, real-valued function exactly in a convenient manner.
Statement
Proof
Consequences and applications
See also
Citations |
https://en.wikipedia.org/wiki/Stag%20film | A stag film (also blue movie or smoker) is a type of pornographic film produced secretly in the first two-thirds of the 20th century. Typically, stag films had certain traits. They were brief in duration (about 12 minutes at most), were silent, depicted hardcore pornography and were produced clandestinely due to censorship laws. Stag films were screened for all-male audiences in fraternities or similar locations; observers offered a raucous collective response to the film, exchanging sexual banter and achieving sexual arousal. Stag films were often screened in brothels.
Film historians describe stag films as a primitive form of cinema because they were produced by anonymous and amateur artists. Today, many of these films have been archived by the Kinsey Institute; however, most stag films are in a state of decay and have no copyright, credits, or acknowledged authorship. The stag film era ended due to the beginnings of the sexual revolution in the 1960s in combination with the new home movie technologies of the post-World War I decades, such as 16 mm, 8 mm, and Super 8 film. Scholars at the Kinsey Institute believe there were approximately 2,000 films produced between 1915 and 1968.
American stag cinema in general has received scholarly attention first in the mid-seventies by mainstream scholars, such as in Di Lauro and Gerald Rabkin's Dirty Movies (1976), and more recently by feminist and gay cultural historians, such as in Linda Williams' Hard Core: Power Pleasure, and the "Frenzy of the Visible" (1999) and Thomas Waugh's Homosociality in the Classical American Stag Film: Off-Screen, On-screen (2001).
History
Before the abolition of film censorship in the United States and a general acceptance of the production of pornography, porn was an underground phenomenon. Public presentation of such films were itinerant and were via secret exhibitions in brothels or smoker houses; or the films might be rented for private usage. Stag films were an entirely clandestine p |
https://en.wikipedia.org/wiki/Data%20Analytics%20Library | oneAPI Data Analytics Library (oneDAL; formerly Intel Data Analytics Acceleration Library or Intel DAAL), is a library of optimized algorithmic building blocks for data analysis stages most commonly associated with solving Big Data problems.
The library supports Intel processors and is available for Windows, Linux and macOS operating systems. The library is designed for use popular data platforms including Hadoop, Spark, R, and MATLAB.
History
Intel launched the Intel Data Analytics Library(oneDAL) on December 8, 2020. It also launched the Data Analytics Acceleration Library on August 25, 2015 and called it Intel Data Analytics Acceleration Library 2016 (Intel DAAL 2016). oneDAL is bundled with Intel oneAPI Base Toolkit as a commercial product. A standalone version is available commercially or freely, the only difference being support and maintenance related.
License
Apache License 2.0
Details
Functional categories
Intel DAAL has the following algorithms:
Analysis
Low Order Moments: Includes computing min, max, mean, standard deviation, variance, etc. for a dataset.
Quantiles: splitting observations into equal-sized groups defined by quantile orders.
Correlation matrix and variance-covariance matrix: A basic tool in understanding statistical dependence among variables. The degree of correlation indicates the tendency of one change to indicate the likely change in another.
Cosine distance matrix: Measuring pairwise distance using cosine distance.
Correlation distance matrix: Measuring pairwise distance between items using correlation distance.
Clustering: Grouping data into unlabeled groups. This is a typical technique used in “unsupervised learning” where there is not established model to rely on. Intel DAAL provides 2 algorithms for clustering: K-Means and “EM for GMM.”
Principal Component Analysis (PCA): the most popular algorithm for dimensionality reduction.
Association rules mining: Detecting co-occurrence patterns. Commonly known as “shopping basket minin |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.