source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Subsumption%20lattice | A subsumption lattice is a mathematical structure used in the theoretical background of automated theorem proving and other symbolic computation applications.
Definition
A term t1 is said to subsume a term t2 if a substitution σ exists such that σ applied to t1 yields t2. In this case, t1 is also called more general than t2, and t2 is called more specific than t1, or an instance of t1.
The set of all (first-order) terms over a given signature can be made a lattice over the partial ordering relation "... is more specific than ..." as follows:
consider two terms equal if they differ only in their variable naming,
add an artificial minimal element Ω (the overspecified term), which is considered to be more specific than any other term.
This lattice is called the subsumption lattice. Two terms are said to be unifiable if their meet differs from Ω.
Properties
The join and the meet operation in this lattice are called anti-unification and unification, respectively. A variable x and the artificial element Ω are the top and the bottom element of the lattice, respectively. Each ground term, i.e. each term without variables, is an atom of the lattice. The lattice has infinite descending chains, e.g. x, g(x), g(g(x)), g(g(g(x))), ..., but no infinite ascending ones.
If f is a binary function symbol, g is a unary function symbol, and x and y denote variables, then the terms f(x,y), f(g(x),y), f(g(x),g(y)), f(x,x), and f(g(x),g(x)) form the minimal non-modular lattice N5 (see Pic. 1); its appearance prevents the subsumption lattice from being modular and hence also from being distributive.
The set of terms unifiable with a given term need not be closed with respect to meet; Pic. 2 shows a counter-example.
Denoting by Gnd(t) the set of all ground instances of a term t, the following properties hold:
t equals the join of all members of Gnd(t), modulo renaming,
t1 is an instance of t2 if and only if Gnd(t1) ⊆ Gnd(t2),
terms with the same set of ground instances are equ |
https://en.wikipedia.org/wiki/Lexicostatistics | Lexicostatistics is a method of comparative linguistics that involves comparing the percentage of lexical cognates between languages to determine their relationship. Lexicostatistics is related to the comparative method but does not reconstruct a proto-language. It is to be distinguished from glottochronology, which attempts to use lexicostatistical methods to estimate the length of time since two or more languages diverged from a common earlier proto-language. This is merely one application of lexicostatistics, however; other applications of it may not share the assumption of a constant rate of change for basic lexical items.
The term "lexicostatistics" is misleading in that mathematical equations are used but not statistics. Other features of a language may be used other than the lexicon, though this is unusual. Whereas the comparative method used shared identified innovations to determine sub-groups, lexicostatistics does not identify these. Lexicostatistics is a distance-based method, whereas the comparative method considers language characters directly. The lexicostatistics method is a simple and fast technique relative to the comparative method but has limitations (discussed below). It can be validated by cross-checking the trees produced by both methods.
History
Lexicostatistics was developed by Morris Swadesh in a series of articles in the 1950s, based on earlier ideas. The concept's first known use was by Dumont d'Urville in 1834 who compared various "Oceanic" languages and proposed a method for calculating a coefficient of relationship. Hymes (1960) and Embleton (1986) both review the history of lexicostatistics.
Method
Create word list
The aim is to generate a list of universally used meanings (hand, mouth, sky, I). Words are then collected for these meaning slots for each language being considered. Swadesh reduced a larger set of meanings down to 200 originally. He later found that it was necessary to reduce it further but that he could include some |
https://en.wikipedia.org/wiki/Time-weighted%20return | The time-weighted return (TWR) is a method of calculating investment return, where returns over sub-periods are compounded together, with each sub-period weighted according to its duration.
The time-weighted method differs (further) from other methods of calculating investment return, in the particular way it compensates for external flows
External flows
The time-weighted return is a measure of the historical performance of an investment portfolio which compensates for external flows. External flows are net movements of value that result from transfers of cash, securities, or other instruments into or out of the portfolio, with no simultaneous equal and opposite movement of value in the opposite direction, as in the case of a purchase or sale, and that are not income from the investments in the portfolio, such as interest, coupons, or dividends.
To compensate for external flows, the overall time interval under analysis is divided into contiguous sub-periods at each point in time within the overall time period whenever there is an external flow. In general, these sub-periods will be of unequal lengths. The returns over the sub-periods between external flows are linked geometrically (compounded) together, i.e. by multiplying together the growth factors in all the sub-periods. (The growth factor in each sub-period is equal to 1 plus the return over the sub-period.)
The problem of external flows
To illustrate the problem of external flows, consider the following example.
Example 1
Suppose an investor transfers $500 into a portfolio at the beginning of Year 1, and another $1,000 at the beginning of Year 2, and the portfolio has a total value of $1,500 at the end of the Year 2. The net gain over the two-year period is zero, so intuitively, we might expect that the return over the whole 2-year period to be 0% (which is incidentally the result of applying one of the money-weighted methods). If the cash flow of $1,000 at the beginning of Year 2 is ignored, then the simpl |
https://en.wikipedia.org/wiki/Helopeltis%20antonii | Helopeltis antonii, also known as the tea mosquito bug, are heteropterans found within the Miridae family. They have a relatively large geographical distribution and are a known pest of many agricultural “cash” crops such as cocoa, cashew, and tea. Subsequently, their impact negatively influences economic growth within the regions in which they inhabit. Thus, their impact on humans has caused them to be of great interest biologically, resulting in significant environmental implications.
Distribution
Helopeltis antonii are found in a region known as the old-world tropics which encompasses places such as India, Northern Australia, Guinea, Vietnam, Tanzania, Nigeria, and Indonesia. More specifically, they are more concentrated in the agricultural regions of the old-world tropics. In India their distribution is primarily found within the “cashew belt” which is located along the western coast and central regions of the country due to its high affinity for these plants. However, different nations grow certain crops in various locations within their borders. Crops that H. antonii prefer will ultimately determine their specific distribution within a country.
Identification of distribution
H. antonii are often mistaken and misidentified with other Helopeltis species. Thus, identifying the exact geographical range of H. antonii has become a difficult process. However, recent advances in species identification though DNA barcoding has made it much easier. DNA barcoding is a rapid and relatively inexpensive identification technique that locates unique genetic markers in their DNA allowing for the accurate identification of not only H. antonii, but other species as well.
Mating
Reproduction for H. antonii occurs in 4 stages—arousal, mounting, copulation, and termination of copulation—and occurs year-round. Mounting, arousal, and termination of copulation occurs within a short time frame; copulation is much longer and more variable in length. Mating typically occur in shade |
https://en.wikipedia.org/wiki/880%20%28number%29 | 880 (eight hundred [and] eighty) is the natural number following 879 and preceding 881.
It is the number of 4-by-4 magic squares.
And the triple factorial: 11!!! = 880.
880 is the frequency in hertz of the musical note A5.
880 is also:
The code for international direct dialing phone calls to Bangladesh
The year 880 BC or AD 880.
Interstate 880, several Interstate highways in the United States.
Dodge Custom 880, an automobile manufactured from 1962 to 1965. |
https://en.wikipedia.org/wiki/Hit-or-miss%20transform | In mathematical morphology, hit-or-miss transform is an operation that detects a given configuration (or pattern) in a binary image, using the morphological erosion operator and a pair of disjoint structuring elements. The result of the hit-or-miss transform is the set of positions where the first structuring element fits in the foreground of the input image, and the second structuring element misses it completely.
Mathematical definition
In binary morphology, an image is viewed as a subset of a Euclidean space or the integer grid , for some dimension d. Let us denote this space or grid by E.
A structuring element is a simple, pre-defined shape, represented as a binary image, used to probe another binary image, in morphological operations such as erosion, dilation, opening, and closing.
Let and be two structuring elements satisfying . The pair (C,D) is sometimes called a composite structuring element. The hit-or-miss transform of a given image A by B=(C,D) is given by:
,
where is the set complement of A.
That is, a point x in E belongs to the hit-or-miss transform output if C translated to x fits in A, and D translated to x misses A (fits the background of A).
Some applications
Thinning
Let , and consider the eight composite structuring elements, composed of:
and ,
and
and the three rotations of each by 90°, 180°, and 270°. The corresponding composite structuring elements are denoted .
For any i between 1 and 8, and any binary image X, define
where denotes the set-theoretical difference.
The thinning of an image A is obtained by cyclically iterating until convergence:
Other applications
Pattern detection. By definition, the hit-or-miss transform indicates the positions where a certain pattern (characterized by the composite structuring element B) occurs in the input image.
Pruning. The hit-or-miss transform can be used to identify the end-points of a line to allow this line to be shrunk from each end to remove unwanted branches.
Computing |
https://en.wikipedia.org/wiki/Pomeranchuk%20cooling | Pomeranchuk cooling (named after Isaak Pomeranchuk) is the phenomenon in which liquid helium-3 will cool if it is compressed isentropically when it is below 0.3 K. This occurs because helium-3 has the unusual property that its solid state can have a higher entropy than its liquid state. The effect was first observed by Yuri Anufriev in 1965. This can be used to construct a cryogenic cooler.
In 2021 an analog effect has been observed on twisted bilayer graphene and in TMDs |
https://en.wikipedia.org/wiki/Partition%20of%20an%20interval | In mathematics, a partition of an interval on the real line is a finite sequence of real numbers such that
.
In other terms, a partition of a compact interval is a strictly increasing sequence of numbers (belonging to the interval itself) starting from the initial point of and arriving at the final point of .
Every interval of the form is referred to as a subinterval of the partition x.
Refinement of a partition
Another partition of the given interval [a, b] is defined as a refinement of the partition , if contains all the points of and possibly some other points as well; the partition is said to be “finer” than . Given two partitions, and , one can always form their common refinement, denoted , which consists of all the points of and , in increasing order.
Norm of a partition
The norm (or mesh) of the partition
is the length of the longest of these subintervals
{{math|maxxi − xi−1}} : i 1, … , n .
Applications
Partitions are used in the theory of the Riemann integral, the Riemann–Stieltjes integral and the regulated integral. Specifically, as finer partitions of a given interval are considered, their mesh approaches zero and the Riemann sum based on a given partition approaches the Riemann integral.
Tagged partitions
A tagged partition is a partition of a given interval together with a finite sequence of numbers subject to the conditions that for each ,
.
In other words, a tagged partition is a partition together with a distinguished point of every subinterval: its mesh is defined in the same way as for an ordinary partition. It is possible to define a partial order on the set of all tagged partitions by saying that one tagged partition is bigger than another if the bigger one is a refinement of the smaller one.
Suppose that together with is a tagged partition of , and that together with is another tagged partition of . We say that together with is a refinement of a tagged partition together with if for each integer with , there |
https://en.wikipedia.org/wiki/Chris%20Stevens%20%28mathematician%29 | Terrie Christine Stevens, also known as T. Christine Stevens, is an American mathematician whose research concerns topological groups, the history of mathematics, and mathematics education. She is also known as the co-founder of Project NExT, a mentorship program for recent doctorates in mathematics, which she directed from 1994 until 2009.
Education and career
Stevens graduated from Smith College in 1970, and completed her doctorate in 1978 at Harvard University under the supervision of Andrew M. Gleason. Her dissertation was Weakened Topologies for Lie Groups.
She held teaching positions at the University of Massachusetts Lowell, at Mount Holyoke College and at Arkansas State University before joining Saint Louis University, where for 25 years she was a professor of mathematics and computer science.
She was also a Congressional Science Fellow assisting congressman Theodore S. Weiss in 1984–1985, and was a program officer at the National Science Foundation in 1987–1989. After retiring from SLU, she became Associate Executive Director for Meetings and Professional Services of the American Mathematical Society. She also served as an AMS Council member at large from 2011 to 2013.
Recognition
In 2004 Stevens won the Gung and Hu Award for
Distinguished Service to Mathematics of the Mathematical Association of America for her work on Project NExT.
In 2010 Stevens was awarded the Smith College Medal by her alma mater.
She has been a fellow of the American Association for the Advancement of Science since 2005,
and in 2012, she became one of the inaugural fellows of the American Mathematical Society. She was the 2015 winner of the Louise Hay Award of the Association for Women in Mathematics. |
https://en.wikipedia.org/wiki/KZUP-CD | KZUP-CD (channel 20) is a low-power, Class A independent television station in Baton Rouge, Louisiana, United States. It is owned by Nexstar Media Group alongside Fox affiliate WGMB-TV (channel 44) and CW owned-and-operated station WBRL-CD (channel 21); Nexstar also provides certain services to NBC affiliate WVLA-TV (channel 33) under joint sales and shared services agreements (JSA/SSA) with owner White Knight Broadcasting. The stations share studios on Perkins Road in Baton Rouge, while KZUP-CD's transmitter is located near Addis, Louisiana.
While "KZUP-CD" is the station's official call sign, it uses "KZUP-TV" for promotional purposes.
History
The station signed on the air in 1999 as a WZUP, a UPN affiliate available only on cable (TCI and later Cox channel 13). It was the second UPN affiliate (of three) in the Baton Rouge area. When the station went over the air on November 26, 2002, it changed its call sign to KZUP-CA; originally it was going to air on channel 21 and WB affiliate WBRL-CA was on channel 19, but this assignment was short-lived. Channel 19 was once used as a translator station for local station and original UPN affiliate WBTR, and when KZUP went on the air, WBTR moved to previously-unused channel 41. It became an independent station after losing UPN to Raycom Media's WBXH-CA in 2003. As an independent, it called itself "Z-19," and it primarily aired African-American-oriented programming like Good Times, The Fresh Prince of Bel-Air, and The Jeffersons. For brief periods in 2005, KZUP was used to simulcast WVLA and WGMB over analog as their individual transmitter towers were turned off to allow upgrades for their digital television channels. KZUP became an affiliate of the Retro Television Network on September 15, 2008. In 2012, White Knight Broadcasting dropped RTN and resumed carrying syndicated programming.
On April 24, 2013, Communications Corporation of America announced the sale of its entire group to Nexstar Broadcasting Group. WVLA and KZU |
https://en.wikipedia.org/wiki/Brownian%20motion | Brownian motion is the random motion of particles suspended in a medium (a liquid or a gas).
This motion pattern typically consists of random fluctuations in a particle's position inside a fluid sub-domain, followed by a relocation to another sub-domain. Each relocation is followed by more fluctuations within the new closed volume. This pattern describes a fluid at thermal equilibrium, defined by a given temperature. Within such a fluid, there exists no preferential direction of flow (as in transport phenomena). More specifically, the fluid's overall linear and angular momenta remain null over time. The kinetic energies of the molecular Brownian motions, together with those of molecular rotations and vibrations, sum up to the caloric component of a fluid's internal energy (the equipartition theorem).
This motion is named after the botanist Robert Brown, who first described the phenomenon in 1827, while looking through a microscope at pollen of the plant Clarkia pulchella immersed in water. In 1900, almost eighty years later, the French mathematician Louis Bachelier modeled the stochastic process now called Brownian motion in his doctoral thesis, The Theory of Speculation (Théorie de la spéculation), prepared under the supervision of Henri Poincaré. Then, in 1905, theoretical physicist Albert Einstein published a paper where he modeled the motion of the pollen particles as being moved by individual water molecules, making one of his first major scientific contributions.
The direction of the force of atomic bombardment is constantly changing, and at different times the particle is hit more on one side than another, leading to the seemingly random nature of the motion. This explanation of Brownian motion served as convincing evidence that atoms and molecules exist and was further verified experimentally by Jean Perrin in 1908. Perrin was awarded the Nobel Prize in Physics in 1926 "for his work on the discontinuous structure of matter".
The many-body interactions th |
https://en.wikipedia.org/wiki/National%20Prize%20for%20Natural%20Sciences%20%28Chile%29 | The National Prize for Natural Sciences () was created in 1992 as one of the replacements for the National Prize for Sciences under Law 19169. The other two prizes in this same area are for Exact Sciences and Applied Sciences and Technologies.
It is part of the National Prize of Chile.
Winners
1992, Jorge Allende (biochemistry)
1994, Humberto Maturana (neurobiology)
1996, (hydrobiology)
1998, Juan Antonio Garbarino Bacigalupo (chemistry)
2000, (biophysics)
2002, Ramón Latorre (biophysics)
2004, Pedro Labarca Prado (biophysics)
2006, Cecilia Hidalgo Tapia (biochemistry)
2008, (neurobiology)
2010, Mary Kalin Arroyo (botany)
2012, (marine biology)
2014, Ligia Gargallo (chemistry)
2016, Francisco Rothhammer Engel (genetics)
2018, (ecology)
See also
List of biology awards
List of earth sciences awards
List of chemistry awards
List of medicine awards
List of neuroscience awards
List of psychology awards
CONICYT |
https://en.wikipedia.org/wiki/Adjacent%20channel%20power%20ratio | Adjacent Channel Power Ratio (ACPR) is ratio between the total power of adjacent channel (intermodulation signal) to the main channel's power (useful signal).
Ratio
The ratio between the total power adjacent channel (intermodulation signal) to the main channel's power (useful signal). There are two ways of measuring ACPR. The first way is by finding 10*log of the ratio of the total output power to the power in adjacent channel. The second (and much more popular method) is to find the ratio of the output power in a smaller bandwidth around the center of carrier to the power in the adjacent channel. The smaller bandwidth is equal to the bandwidth of the adjacent channel signal. Second way is more popular, because it can be measured easily.
ACPR is desired to be as low as possible. A high ACPR indicates that significant spectral spreading has occurred.
See also
Spectral leakage
Spread spectrum |
https://en.wikipedia.org/wiki/Skin%20manifestations%20of%20sarcoidosis | Sarcoidosis, an inflammatory disease, involves the skin in about 25% of patients. The most common lesions are erythema nodosum, plaques, maculopapular eruptions, subcutaneous nodules, and lupus pernio. Treatment is not required, since the lesions usually resolve spontaneously in two to four weeks. Although it may be disfiguring, cutaneous sarcoidosis rarely causes major problems.
Classification
Morphology
Ulcerative sarcoidosis is a cutaneous condition affecting roughly 5% of people with sarcoidosis.
Annular sarcoidosis is a cutaneous condition characterized by papular skin lesions arranged in annular
patterns, usually with a red-brown hue.
Pattern
Morpheaform sarcoidosis is a very rare cutaneous condition characterized by specific cutaneous skin lesions of sarcoidosis accompanied by substantial fibrosis, simulating morphea.
Erythrodermic sarcoidosis is a cutaneous condition and very rare form of sarcoidosis.
Hypopigmented sarcoidosis is a cutaneous condition characterized by areas of hypopigmented skin. It is usually diagnosed in darkly pigmented races and may be the earliest sign of sarcoidosis.
Papular sarcoid is a cutaneous condition characterized by papules, which are the most common morphology of cutaneous sarcoidosis.
Ichthyosiform sarcoidosis is a cutaneous condition resembling ichthyosis vulgaris or acquired ichthyosis, with fine scaling usually on the distal extremities, by caused by sarcoidosis.
Location
Subcutaneous sarcoidosis (also known as "Darier–Roussy disease" and "Darier-Roussy sarcoid") is a cutaneous condition characterized by numerous 0.5- to 0.3-cm deep-seated nodules on the trunk and extremities.
Scar sarcoid (also known as "Sarcoidosis in scars") is a cutaneous condition characterized by infiltration and elevation of tattoos and old flat scars due to sarcoidosis.
Mucosal sarcoidosis is a cutaneous condition characterized by pinhead-sized papules that may be grouped and fused together to form a flat plaque.
Erythrodermic sarcoido |
https://en.wikipedia.org/wiki/Satellite%20radio | Satellite radio is defined by the International Telecommunication Union (ITU)'s ITU Radio Regulations (RR) as a broadcasting-satellite service. The satellite's signals are broadcast nationwide, across a much wider geographical area than terrestrial radio stations, and the service is primarily intended for the occupants of motor vehicles. It is available by subscription, mostly commercial free, and offers subscribers more stations and a wider variety of programming options than terrestrial radio.
Satellite radio technology was inducted into the Space Foundation Space Technology Hall of Fame in 2002. Satellite radio uses the 2.3 GHz S band in North America for nationwide digital radio broadcasting. In other parts of the world, satellite radio uses the 1.4 GHz L band allocated for DAB.
History and overview
The first satellite radio broadcasts occurred in Africa and the Middle East in 1999. The first US broadcasts were in 2001 followed by Japan in 2004 and Canada in 2005.
There have been three (not counting MobaHo! of Japan) major satellite radio companies: WorldSpace, Sirius Satellite Radio and XM Satellite Radio, all founded in the 1990s in the United States. WorldSpace operated in the Africa and Asia region, whereas Sirius and XM competed in the North American (USA and Canada) market. Of the three companies, WorldSpace went bankrupt in 2009 and Sirius and XM merged in 2008 to form Sirius XM. The merger was done to avoid bankruptcy. The new company had financial problems and was within days of bankruptcy in 2009, but was able to find investors. The company did not go bankrupt and Sirius XM Satellite radio continues () to operate.
Africa and Eurasia
WorldSpace was founded by Ethiopia-born lawyer Noah Samara in Washington, D.C., in 1990, with the goal of making satellite radio programming available to the developing world. On June 22, 1991, the FCC gave WorldSpace permission to launch a satellite to provide digital programming to Africa and the Middle East. WorldSpa |
https://en.wikipedia.org/wiki/Cloud-based%20integration | Cloud-based integration is a form of systems integration business delivered as a cloud computing service that addresses data, process, service-oriented architecture (SOA) and application integration.
Description
Integration platform as a service (iPaaS) is a suite of cloud services enabling customers to develop, execute and govern integration flows between disparate applications. Under the cloud-based iPaaS integration model, customers drive the development and deployment of integrations without installing or managing any hardware or middleware. The iPaaS model allows businesses to achieve integration without big investment into skills or licensed middleware software. iPaaS used to be regarded primarily as an integration tool for cloud-based software applications, used mainly by small to mid-sized business. Over time, a hybrid type of iPaaS—Hybrid-IT iPaaS—that connects cloud to on-premises, is becoming increasingly popular. Additionally, large enterprises are exploring new ways of integrating iPaaS into their existing IT infrastructures.
Cloud integration was basically created to break down the data silos, improve connectivity and optimize the business process. Cloud integration has increased its popularity as the usage of Software as a Service solutions is growing day by day.
Prior to the emergence of cloud computing in the early 2000s, integration could be categorized as either internal or business to business (B2B). Internal integration requirements were serviced through an on-premises middleware platform and typically utilized a service bus to manage exchange of data between systems. B2B integration was serviced through EDI gateways or value-added network (VAN). The advent of SaaS applications created a new kind of demand which was met through cloud-based integration. Since their emergence, many such services have also developed the capability to integrate legacy or on-premises applications, as well as function as EDI gateways.
The following essential featu |
https://en.wikipedia.org/wiki/Springloops | Springloops is a web-based Git and Subversion version control and hosting service with integrated deploy and code collaboration features for web and software developers. Springloops was also the name of the company behind the service until it rebranded to 84kids in May 2013.
Springloops can be used both from the command line and through a web-based graphical interface shared with BamBam!, Chime and Anchor apps from 84kids.
Springloops offers two kinds of paid plans: Personal, with 3-6GB of disk space and 10-25 repositories, and Business, with 12-60GB of space and 50 to unlimited repositories and a range of extra features. The service also provides a free plan for teachers available upon direct request via email (presumably with no limits on the account), as well as a free plan with 1 repository and 100MB of space. All plans start with a 14-day free trial.
History
Springloops launched in late 2006 as an SVN version control and deploy and was gradually growing into a full-scale project management application. v2.0 was released in June 2009 with new interface and features: tasks, time tracking, wiki module and Git support. On May 5, 2013, the service was upgraded to v3.0 and received a heavy graphical overhaul. The core features were extracted into four separate apps (probably for marketing reasons): BamBam! (tasks), Chime (time tracking), Anchor (wiki) and Springloops which retained its original allocation of source & deploy tool. The apps can be used separately or integrated within one account, depending on user needs and profile.
The software’s account settings also mention Turbine, described “discussions and note-taking for teams.” It’s been greyed out and labeled “Coming soon” since the division, however.
Controversy
The v3.0 upgrade spawned a wide range of reactions, especially due to drastic changes in UI and UX. In September 2013 the company released a major update which was a direct response to the feedback from users. The team wrote:
If we were to descr |
https://en.wikipedia.org/wiki/Polynomial%20hyperelastic%20model | The polynomial hyperelastic material model is a phenomenological model of rubber elasticity. In this model, the strain energy density function is of the form of a polynomial in the two invariants of the left Cauchy-Green deformation tensor.
The strain energy density function for the polynomial model is
where are material constants and .
For compressible materials, a dependence of volume is added
where
In the limit where , the polynomial model reduces to the Neo-Hookean solid model. For a compressible Mooney-Rivlin material and we have |
https://en.wikipedia.org/wiki/Watermarking%20attack | In cryptography, a watermarking attack is an attack on disk encryption methods where the presence of a specially crafted piece of data can be detected by an attacker without knowing the encryption key.
Problem description
Disk encryption suites generally operate on data in 512-byte sectors which are individually encrypted and decrypted. These 512-byte sectors alone can use any block cipher mode of operation (typically CBC), but since arbitrary sectors in the middle of the disk need to be accessible individually, they cannot depend on the contents of their preceding/succeeding sectors. Thus, with CBC, each sector has to have its own initialization vector (IV). If these IVs are predictable by an attacker (and the filesystem reliably starts file content at the same offset to the start of each sector, and files are likely to be largely contiguous), then there is a chosen plaintext attack which can reveal the existence of encrypted data.
The problem is analogous to that of using block ciphers in the electronic codebook (ECB) mode, but instead of whole blocks, only the first block in different sectors are identical. The problem can be relatively easily eliminated by making the IVs unpredictable with, for example, ESSIV.
Alternatively, one can use modes of operation specifically designed for disk encryption (see disk encryption theory). This weakness affected many disk encryption programs, including older versions of BestCrypt as well as the now-deprecated cryptoloop.
To carry out the attack, a specially crafted plaintext file is created for encryption in the system under attack, to "NOP-out" the IV
such that the first ciphertext block in two or more sectors is identical. This requires that the input to the cipher (plaintext, , XOR initialisation vector, ) for each block must be the same; i.e., . Thus, we must choose plaintexts, such that .
The ciphertext block patterns generated in this way give away the existence of the file, without any need for the disk to be |
https://en.wikipedia.org/wiki/Administration%20on%20Aging | The Administration on Aging (AoA) is an agency within the Administration for Community Living of the United States Department of Health and Human Services. AoA works to ensure that older Americans can stay independent in their communities, mostly by awarding grants to States, Native American tribal organizations, and local communities to support programs authorized by Congress in the Older Americans Act. AoA also awards discretionary grants to research organizations working on projects that support those goals. It conducts statistical activities in support of the research, analysis, and evaluation of programs to meet the needs of an aging population.
AoA's FY 2013 budget proposal includes a total of $1.9 billion, $819 million of which funds senior nutrition programs like Meals on Wheels. The agency also funds $539 million in grants to programs to help seniors stay in their homes through services (such as accomplishing essential activities of daily living, like getting to the doctor's office, buying groceries etc.) and through help given to caregivers. Some of these grants are for Cash & Counseling programs that provide Medicaid participants a monthly budget for home care and access to services that help them manage their finances.
AoA is headed by the Assistant Secretary for Aging. From July 2016 to August 2017, Edwin Walker served as Acting Assistant Secretary for Aging. The Assistant Secretary reports directly to the Secretary of Health and Human Services. Lance Allen Robertson was confirmed in August 2017, and served until January 20, 2021. On January 20, 2021, Alison Barkoff was sworn in as Principal Deputy Assistant Secretary, and was named as Acting Assistant Secretary. On March 9, 2022, President Biden Nominated Rita Landgraf, the former Secretary of the Delaware Department of Health and Social Services, to serve as his first Assistant Secretary. Confirmation is pending.
See also
:Category:United States Assistant Secretaries for Aging
Pension Rights C |
https://en.wikipedia.org/wiki/Jenkem | Jenkem is an inhalant and hallucinogen created from fermented human waste. In the mid-1990s, it was reported to be a popular street drug among Zambian youth. They would reportedly put the feces and urine in a jar or a bucket and seal it with a balloon or lid respectively, then leave it out to ferment in the sun; afterwards they would inhale the fumes created.
In November 2007, there was a moral panic in the United States after widespread reports of jenkem becoming a popular recreational drug in middle and high schools across the country, though the true extent of the practice has since been called into question. Several sources reported that the increase in American media coverage was based on a hoax and on faulty Internet research.
Description
The name derives from Genkem, a brand of glues which had "become the generic name for all the glues used by glue-sniffing children" in South Africa, where the drug originated and is most popular on the African continent today. In the book Children of AIDS: Africa's Orphan Crisis by Emma Guest, the making of jenkem is described: "fermented human sewage, scraped from pipes and stored in plastic bags for a week or so, until it gives off numbing, intoxicating fumes." The process is similarly described in a 1995 IPS report: "Human excreta is scooped up from the edges of the sewer ponds in old cans and containers which are covered with a polyethylene bag and left to stew or ferment for a week." A 1999 BBC article refers to "the dark brown sludge, gathering up fistfuls and stuffing it into small plastic bottles. They tap the bottles on the ground, taking care to leave enough room for methane to form at the top."
The effects of jenkem inhalation supposedly last for around an hour and consist of auditory and visual hallucinations for some users. In 1995, one user told a reporter it is "more potent than cannabis." A 1999 report interviewed a user, who said, "With glue, I just hear voices in my head. But with jenkem, I see visions. |
https://en.wikipedia.org/wiki/Light-year | A light-year, alternatively spelled light year, is a unit of length used to express astronomical distances and is equivalent to about 9.46 trillion kilometers (), or 5.88 trillion miles (). As defined by the International Astronomical Union (IAU), a light-year is the distance that light travels in a vacuum in one Julian year (365.25 days). Because it includes the word "year", the term is sometimes misinterpreted as a unit of time.
The light-year is most often used when expressing distances to stars and other distances on a galactic scale, especially in non-specialist contexts and popular science publications. The unit most commonly used in professional astronomy is the parsec (symbol: pc, about 3.26 light-years) which derives from astrometry; it is the distance at which one astronomical unit (au) subtends an angle of one second of arc.
Definitions
As defined by the International Astronomical Union (IAU), the light-year is the product of the Julian year (365.25 days, as opposed to the 365.2425-day Gregorian year or the 365.24219-day Tropical year that both approximate) and the speed of light (). Both of these values are included in the IAU (1976) System of Astronomical Constants, used since 1984. From this, the following conversions can be derived. The IAU-recognized abbreviation for light-year is "ly", although other standards like ISO 80000:2006 (now superseded) have used "l.y." and localized abbreviations are frequent, such as "al" in French (from année-lumière), Spanish (from año luz), Italian (from anno luce), "Lj" in German (from Lichtjahr), etc.
{|
|-
|rowspan=6 valign=top|1 light-year
|= metres (exactly)
|-
|≈ petametres
|-
|≈ trillion kilometres ( trillion miles)
|-
|≈ astronomical units
|-
|≈ parsec
|}
Before 1984, the tropical year (not the Julian year) and a measured (not defined) speed of light were included in the IAU (1964) System of Astronomical Constants, used from 1968 to 1983. The product of Simon Newcomb's J1900.0 mean tropical year |
https://en.wikipedia.org/wiki/Exocrine%20pancreas%20cell | An exocrine pancreas cell is a pancreatic cell that produces enzymes that are secreted into the small intestine. These enzymes help digest food by releasing enzymes as it passes through the gastrointestinal tract. These include acinar cells, which secrete bicarbonate solution and mucin.
External links
Exocrine pancreas cell entry in the public domain NCI Dictionary of Cancer Terms
Pancreas anatomy |
https://en.wikipedia.org/wiki/Echo%20removal | Echo removal is the process of removing echo and reverberation artifacts from audio signals. The reverberation is typically modeled as the convolution of a (sometimes time-varying) impulse response with a hypothetical clean input signal, where both the clean input signal (which is to be recovered) and the impulse response are unknown. This is an example of an inverse problem. In almost all cases, there is insufficient information in the input signal to uniquely determine a plausible original image, making it an ill-posed problem. This is generally solved by the use of a regularization term to attempt to eliminate implausible solutions.
This problem is analogous to deblurring in the image processing domain.
See also
Echo suppression and cancellation
Digital room correction
Noise reduction
Linear prediction coder
Signal processing |
https://en.wikipedia.org/wiki/Two-cube%20calendar | A two-cube calendar is a desk calendar consisting of two cubes with faces marked by digits 0 through 9. Each face of each cube is marked with a single digit, and it is possible to arrange the cubes so that any chosen day of the month (from 01, 02, ... through 31) is visible on the two front faces.
A puzzle about the two-cube calendar was described in Gardner's column in Scientific American. In the puzzle discussed in Mathematical Circus (1992), two visible faces of one cube have digits 1 and 2 on them, and three visible faces of another cube have digits 3, 4, 5 on them. The cubes are arranged so that their front faces indicate the 25th day of the current month. The problem is to determine digits hidden on the seven invisible faces.
Gardner wrote he saw a two-cube desk calendar in a store window in New York. According to a letter received by Gardner from John S. Singleton (England), Singleton patented the calendar in 1957, but the patent lapsed in 1965.
A number of variations are manufactured and sold as souvenirs, differing in the appearance and the existence of additional bars or cubes to set the current month and the day of week.
Solution of the problem
Digits 1 and 2 need to be placed on both cubes to allow numbers 11 and 22. That leaves us with 4 sides of each cube (total of 8) for another 8 digits. However, digit 0 needs to be combined with all other digits, so it also needs to be placed on both cubes. That means we need to place remaining 7 digits (from 3 to 9) on the remaining 6 sides of cubes. The solution is possible because digit 6 looks like inverted 9.
Therefore, the solution of the problem is:
If the problem is based on another given set of visible digits, the last three digits of each cube could be shuffled between the cubes.
Three-cube variation for the month abbreviations
A variation with three cubes providing English abbreviations for the twelve months is discussed in a Scientific American column in December 1977. One solution of this varia |
https://en.wikipedia.org/wiki/Xobdo.org | Xobdo.org is the first online Assamese dictionary to become available online on 10 March 2006. As of 6 August 2011 the database of this dictionary contains 37013 words of Assamese language. This is a wiki, where anybody can contribute and edit words in the dictionary provided they have a substantial knowledge of the Assamese language. Moreover, the dictionary has the facility to categorize the words as per their origin, nature and locality. It also has the facility of incorporating encyclopedic entries. This website uses UNICODE fonts which ensures global visibility of Assamese fonts when users set their character encoding option to Unicode (UTF-8).
The dictionary is the brainchild of Bikram M Baruah, an Assamese petroleum engineer based in Abu Dhabi. Later many interested people specialized in different areas joined as the working force behind this dictionary.
In 2007 xobdo.org added multiple interfaces to include 17 more languages spoken in the North East India: Khasi, Dimasa, Bodo, Karbi, Nagamese, Garo, Ao, Mizo, Mishing, Tanii (Apatani), Monpa, Meitei-lon, Bishnupriya, Chakma, Kok-Borok, Kuki, and Tanchangya aimed at giving a multilingual edge to the dictionary. Currently XOBDO gives a platform for 27 languages of North-East India, along with English. However, the database for these languages is still substantially small.
Authorship and management
A group of volunteers are responsible for adding words at XOBDO database. As of now the website has two levels of volunteers: "contributors" and "editors". A contributor enters an English and its corresponding Assamese word to the temporary database. Afterwards an editor assigns a unique "idea ID" to the corresponding English and Assamese words and carries on other editing works, if required, to match the standards of XOBDO. After assigning the idea ID the words are added to the main database ready to be retrieved by a user.
Technical details
Initially xobdo.org employed Microsoft server tools and technologies. |
https://en.wikipedia.org/wiki/Halin%27s%20grid%20theorem | In graph theory, a branch of mathematics, Halin's grid theorem states that the infinite graphs with thick ends are exactly the graphs containing subdivisions of the hexagonal tiling of the plane. It was published by , and is a precursor to the work of Robertson and Seymour linking treewidth to large grid minors, which became an important component of the algorithmic theory of bidimensionality.
Definitions and statement
A ray, in an infinite graph, is a semi-infinite path: a connected infinite subgraph in which one vertex has degree one and the rest have degree two.
defined two rays r0 and r1 to be equivalent if there exists a ray r2 that includes infinitely many vertices from each of them. This is an equivalence relation, and its equivalence classes (sets of mutually equivalent rays) are called the ends of the graph. defined a thick end of a graph to be an end that contains infinitely many rays that are pairwise disjoint from each other.
An example of a graph with a thick end is provided by the hexagonal tiling of the Euclidean plane. Its vertices and edges form an infinite cubic planar graph, which contains many rays. For example, some of its rays form Hamiltonian paths that spiral out from a central starting vertex and cover all the vertices of the graph. One of these spiraling rays can be used as the ray r2 in the definition of equivalence of rays (no matter what rays r0 and r1 are given), showing that every two rays are equivalent and that this graph has a single end. There also exist infinite sets of rays that are all disjoint from each other, for instance the sets of rays that use only two of the six directions that a path can follow within the tiling. Because it has infinitely many pairwise disjoint rays, all equivalent to each other, this graph has a thick end.
Halin's theorem states that this example is universal: every graph with a thick end contains as a subgraph either this graph itself, or a graph formed from it by modifying it in simple ways, by |
https://en.wikipedia.org/wiki/List%20of%20NAS%20manufacturers | The following notable companies manufacture Network-attached Storage devices.
See also
File area network
Disk enclosure
Network architecture
Global Namespace
Server (computing) |
https://en.wikipedia.org/wiki/Phalaenopsis%20%C3%97%20valentinii | Phalaenopsis × valentinii is a species of orchid native to peninsular Malaysia. It is a natural hybrid of Phalaenopsis violacea and Phalaenopsis cornu-cervi.
Taxonomy
It has been placed within the section Stauroglottis by Robert Allen Rolfe. Its hybrid nature was unknown in this placement. |
https://en.wikipedia.org/wiki/Intel%205-level%20paging | Intel 5-level paging, referred to simply as 5-level paging in Intel documents, is a processor extension for the x86-64 line of processors. It extends the size of virtual addresses from 48 bits to 57 bits, increasing the addressable virtual memory from 256 TB to 128 PB. The extension was first implemented in the Ice Lake processors, and the 4.14 Linux kernel adds support for it. Windows 10 and 11 with server versions also support this extension in their latest updates, where it is provided by a separate kernel of the system called ntkrla57.exe.
Technology
x86-64 processors without this feature use a four-level page table structure when operating in 64-bit mode. A similar situation arose when the 32 bit IA-32 processors used two levels, allowing up to four GB of memory (both virtual and physical). To support more than 4 GB of RAM, an additional mode of address translation called Physical Address Extension (PAE) was defined, involving a third level. This was enabled by setting a bit in the CR4 register. Likewise, the new extension is enabled by setting bit 12 of the CR4 register (known as LA57). This is only used when the processor is operating in 64 bit mode, and only may be modified when it is not. If the bit is not set, the processor operates with four paging levels.
As adding another page table multiplies the address space by 512, the virtual limit has increased from 256 TB to 128 PB. An extra nine bits of the virtual address index the new table, so while formerly bits 0 through 47 were in use, now bits 0 through 56 are in use.
As with four level paging, the high-order bits of a virtual address that do not participate in address translation must be the same as the most significant implemented bit. With five-level paging enabled, this means that bits 57 through 63 must be copies of bit 56. Intel has renamed the existing paging system as "4-level paging", which used to be known as IA-32e paging.
Extending page table entry to 128 bits allows full 64-bit address |
https://en.wikipedia.org/wiki/BGP%20hijacking | BGP hijacking (sometimes referred to as prefix hijacking, route hijacking or IP hijacking) is the illegitimate takeover of groups of IP addresses by corrupting Internet routing tables maintained using the Border Gateway Protocol (BGP).
Background
The Internet is a global network in enabling any connected host, identified by its unique IP address, to talk to any other, anywhere in the world. This is achieved by passing data from one router to another, repeatedly moving each packet closer to its destination, until it is hopefully delivered. To do this, each router must be regularly supplied with up-to-date routing tables. At the global level, individual IP addresses are grouped together into prefixes. These prefixes will be originated, or owned, by an autonomous system (AS) and the routing tables between ASes are maintained using the Border Gateway Protocol (BGP).
A group of networks that operates under a single external routing policy is known as an autonomous system. For example, Sprint, Verizon, and AT&T each are an AS. Each AS has its own unique AS identifier number. BGP is the standard routing protocol used to exchange information about IP routing between autonomous systems.
Each AS uses BGP to advertise prefixes that it can deliver traffic to. For example, if the network prefix is inside AS 64496, then that AS will advertise to its provider(s) and/or peer(s) that it can deliver any traffic destined for .
Although security extensions are available for BGP, and third-party route DB resources exist for validating routes, by default the BGP protocol is designed to trust all route announcements sent by peers, and few ISPs rigorously enforce checks on BGP sessions.
Mechanism
IP hijacking can occur deliberately or by accident in one of several ways:
An AS announces that it originates a prefix that it does not actually originate.
An AS announces a more specific prefix than what may be announced by the true originating AS.
An AS announces that it can ro |
https://en.wikipedia.org/wiki/Centisome | A centisome is a unit of length defined as one percent of the length of a particular chromosome. This course unit of physical DNA length began to be used in the early exploration of genomes through molecular biology before the resolution of the nucleic acid sequences of chromosomes was possible.
One of the main uses for this unit was for describing the locus of a gene by giving a distance in centisomes from a reference point on the chromosome. For instance, when the complete genome of the bacterium Escherichia coli was finally completed in 1997, it was presented with a scale given in centisomes (as well as one in kilobases). Since bacterial chromosomes are circular, the reference point cannot be an end of the DNA molecule, but must be some point that has some easily determinable unique characteristic. Often this point is the origin of replication, although for E. coli it is the origin of transfer during conjugation. Hence, the reference point for centisome positions is simply a convention established for each individual species of organism.
For the most part, modern scientific literature uses "centisome" as part of a shorthand way of referring to a particular region of interest on the chromosome of particular organisms. For instance, much research has been done on the "Centisome 63" area of the chromosomes of Salmonella species. |
https://en.wikipedia.org/wiki/Anandamide | Anandamide (ANA), also known as N-arachidonoylethanolamine (AEA), an N-acylethanolamine (NAE), is a fatty acid neurotransmitter. Anandamide was the first endocannabinoid to be discovered: it participates in the body's endocannabinoid system by binding to cannabinoid receptors, the same receptors that the psychoactive compound THC in cannabis acts on. Anandamide is found in nearly all tissues in a wide range of animals. Anandamide has also been found in plants, including small amounts in chocolate. The name 'anandamide' is taken from the Sanskrit word ananda, which means "joy, bliss, delight", plus amide.
Anandamide is derived from the non-oxidative metabolism of arachidonic acid, an essential omega-6 fatty acid. It is synthesized from N-arachidonoyl phosphatidylethanolamine by multiple pathways. It is degraded primarily by the fatty acid amide hydrolase (FAAH) enzyme, which converts anandamide into ethanolamine and arachidonic acid. As such, inhibitors of FAAH lead to elevated anandamide levels and are being pursued for therapeutic use.
Anandamide is also being explored for its role in diabetic neuropathy/neuropathy, as cannabinoids as well as exogenous or endogenous anandamide, demonstrate broad-spectrum antinociceptive properties in a model of painful diabetic neuropathy, mediated through peripheral activation of both cannabinoid receptors, i.e. CB1 and CB2, beside involvement of transient receptor vanilloid type-1 (TRPV1) channels in the pain modulation, as endovanilloid signalling modulates local pain, as well as in reduction of inflammation associated with renal injury.
Physiological functions
Anandamide's effects can occur in either the central or peripheral nervous system. These distinct effects are mediated primarily by CB1 cannabinoid receptors in the central nervous system, and CB2 cannabinoid receptors in the periphery. The latter are mainly involved in functions of the immune system. Cannabinoid receptors were originally discovered as being sensitiv |
https://en.wikipedia.org/wiki/Vba32%20AntiVirus | VBA32 (Virus Block Ada 32) is antivirus software from the vendor VirusBlokAda for personal computers running Microsoft Windows. It detects and neutralizes computer viruses, computer worms, Trojan horses and other malware (backdoors, adware, spyware, etc.) in real time and on demand.
VBA32 is used as one of the antivirus engines at VirusTotal.
VirusBlokAda
VirusBlokAda is an antivirus software vendor established in 1997 in Belarus. In 2010 it discovered Stuxnet, the first malware that attacks supervisory control and data acquisition (SCADA) systems.
The program
In 2009 Judit Papp assessed that its VBA32 Antivirus product could detect 26 percent of unknown malware, compared to 67 percent detected by Avira's Antivir Premium and 8 percent detected by MicroWorld's eScan Anti-Virus.
See also
Antivirus software
Comparison of antivirus software
Comparison of computer viruses |
https://en.wikipedia.org/wiki/Fermi%20contact%20interaction | The Fermi contact interaction is the magnetic interaction between an electron and an atomic nucleus. Its major manifestation is in electron paramagnetic resonance and nuclear magnetic resonance spectroscopies, where it is responsible for the appearance of isotropic hyperfine coupling.
This requires that the electron occupy an s-orbital. The interaction is described with the parameter A, which takes the units megahertz. The magnitude of A is given by this relationships
and
where A is the energy of the interaction, μn is the nuclear magnetic moment, μe is the electron magnetic dipole moment, Ψ(0) is the value of the electron wavefunction at the nucleus, and denotes the quantum mechanical spin coupling.
It has been pointed out that it is an ill-defined problem because the standard formulation assumes that the nucleus has a magnetic dipolar moment, which is not always the case.
Use in magnetic resonance spectroscopy
Roughly, the magnitude of A indicates the extent to which the unpaired spin resides on the nucleus. Thus, knowledge of the A values allows one to map the singly occupied molecular orbital.
History
The interaction was first derived by Enrico Fermi in 1930. A classical derivation of this term is contained in "Classical Electrodynamics" by J. D. Jackson. In short, the classical energy may be written in terms of the energy of one magnetic dipole moment in the magnetic field B(r) of another dipole. This field acquires a simple expression when the distance r between the two dipoles goes to zero, since |
https://en.wikipedia.org/wiki/Envy-free%20cake-cutting | An envy-free cake-cutting is a kind of fair cake-cutting. It is a division of a heterogeneous resource ("cake") that satisfies the envy-free criterion, namely, that every partner feels that their allocated share is at least as good as any other share, according to their own subjective valuation.
When there are only two partners, the problem is easy and was solved in antiquity by the divide and choose protocol. When there are three or more partners, the problem becomes much more challenging.
Two major variants of the problem have been studied:
Connected pieces, e.g. if the cake is a 1-dimensional interval then each partner must receive a single sub-interval. If there are partners, only cuts are needed.
General pieces, e.g. if the cake is a 1-dimensional interval then each partner can receive a union of disjoint sub-intervals.
Short history
Modern research into the fair cake-cutting problem started in the 1940s. The first fairness criterion studied was proportional division, and a procedure for n partners was soon found.
The stronger criterion of envy-freeness was introduced into the cake-cutting problem by George Gamow and Marvin Stern in 1950s.
A procedure for three partners and general pieces was found in 1960. A procedure for three partners and connected pieces was found only in 1980.
Envy-free division for four or more partners had been an open problem until the 1990s, when three procedures for general pieces and a procedure for connected pieces were published. All these procedures are unbounded - they may require a number of steps which is not bounded in advance. The procedure for connected pieces may even require an infinite number of steps.
Two lower bounds on the run-time complexity of envy-freeness were published in the 2000s.
For general pieces, the lower bound is Ω(n2).
For connected pieces the lower bound is infinity – there is provably no finite protocol for three or more partners.
In the 2010s, several approximation procedures and proce |
https://en.wikipedia.org/wiki/Lewis%20structure | Lewis structuresalso called Lewis dot formulas, Lewis dot structures, electron dot structures, or Lewis electron dot structures (LEDs)are diagrams that show the bonding between atoms of a molecule, as well as the lone pairs of electrons that may exist in the molecule. A Lewis structure can be drawn for any covalently bonded molecule, as well as coordination compounds. The Lewis structure was named after Gilbert N. Lewis, who introduced it in his 1916 article The Atom and the Molecule. Lewis structures extend the concept of the electron dot diagram by adding lines between atoms to represent shared pairs in a chemical bond.
Lewis structures show each atom and its position in the structure of the molecule using its chemical symbol. Lines are drawn between atoms that are bonded to one another (pairs of dots can be used instead of lines). Excess electrons that form lone pairs are represented as pairs of dots, and are placed next to the atoms.
Although main group elements of the second period and beyond usually react by gaining, losing, or sharing electrons until they have achieved a valence shell electron configuration with a full octet of (8) electrons, hydrogen (H) can only form bonds which share just two electrons.
Construction and electron counting
The total number of electrons represented in a Lewis structure is equal to the sum of the numbers of valence electrons on each individual atom. Non-valence electrons are not represented in Lewis structures.
Once the total number of valence electrons has been determined, they are placed into the structure according to these steps:
Initially, one line (representing a single bond) is drawn between each pair of connected atoms.
Each bond consists of a pair of electrons, so if t is the total number of electrons to be placed and n is the number of single bonds just drawn, t−2n electrons remain to be placed. These are temporarily drawn as dots, one per electron, to a maximum of eight per atom (two in the case of hydrogen) |
https://en.wikipedia.org/wiki/Nick%20DeWolf | Nicholas DeWolf (July 12, 1928 – April 16, 2006) was co-founder of Teradyne, a Boston, Massachusetts-based manufacturer of automatic test equipment. He founded the company in 1960 with Alex d'Arbeloff, a classmate at MIT.
Early life and education
DeWolf was born in Philadelphia, Pennsylvania and graduated with an S.B. in EECS from MIT in 1948.
Career
During his eleven years as CEO of Teradyne, DeWolf is credited with designing more than 300 semiconductor and other test systems, including the J259, the world's first computer-operated integrated circuit tester.
After leaving Teradyne in 1971, DeWolf moved to Aspen, Colorado, where in 1979, he teamed with artist Travis Fulton to create Aspen's "dancing fountain". DeWolf also designed a computer system without hard disks or fans; this system (the ON! computer) booted up in seconds, a much faster time than even the computers of today.
Awards
1979: Semiconductor Equipment and Materials International SEMI Award for North America.
2001: Telluride Tech Festival Award of Technology, Boulder, CO.
2005: inducted into the Aspen Hall of Fame with wife Maggie DeWolf.
Photography
DeWolf was also a keen and prolific photographer. His son-in-law and archivist, Steve Lundeen, is scanning DeWolf's complete archive and making it available on Flickr.
Death
DeWolf died in Aspen, Colorado at the age of 77.
Quotes
"What the customer demands is last year's model, cheaper. To find out what the customer needs you have to understand what the customer is doing as well as he understands it. Then you build what he needs and you educate him to the fact that he needs it."
"To select a component, size a product, design a system or plan a new company, first test the extremes and then have the courage to resist what is popular and the wisdom to choose what is best". |
https://en.wikipedia.org/wiki/Speech%20acquisition | Speech acquisition focuses on the development of vocal, acoustic and oral language by a child. This includes motor planning and execution, pronunciation, phonological and articulation patterns (as opposed to content and grammar which is language).
Spoken speech consists of an organized set of sounds or phonemes that are used to convey meaning while language is an arbitrary association of symbols used according to prescribed rules to convey meaning.
While grammatical and syntactic learning can be seen as a part of language acquisition, speech acquisition includes the development of speech perception and speech production over the first years of a child's lifetime. There are several models to explain the norms of speech sound or phoneme acquisition in children.
Development of speech perception
Sensory learning concerning acoustic speech signals already starts during pregnancy. Hepper and Shahidullah (1992) described the progression of fetal response to different pure tone frequencies. They suggested fetuses respond to 500 Hertz (Hz) at 19 weeks gestation, 250 Hz and 500 Hz at 27 weeks gestation and finally respond to 250, 500, 1000, 3000 Hz between 33 and 35 weeks gestation. Lanky and Williams (2005) suggested that fetuses could respond to pure tone stimuli of 500 Hz as early as 16 weeks.
The newborn is already capable of discerning many phonetic contrasts. This capability may be innate.
Speech perception becomes language-specific for vowels at around 6 months, for sound combinations at around 9 months and for language-specific consonants at around 11 months.
Infants detect typical word stress patterns, and use stress to identify words around the age of 8 months.
As an infant grows into a child their ability to discriminate between speech sounds should increase. Rvachew (2007) described three developmental stages in which a child recognizes or discerns adult-like, phonological and articulatory representations of sounds. In the first stage, the child is gen |
https://en.wikipedia.org/wiki/User%20space%20and%20kernel%20space | A modern computer operating system usually segregates virtual memory into user space and kernel space. Primarily, this separation serves to provide memory protection and hardware protection from malicious or errant software behaviour.
Kernel space is strictly reserved for running a privileged operating system kernel, kernel extensions, and most device drivers. In contrast, user space is the memory area where application software and some drivers execute.
Overview
The term user space (or userland) refers to all code that runs outside the operating system's kernel. User space usually refers to the various programs and libraries that the operating system uses to interact with the kernel: software that performs input/output, manipulates file system objects, application software, etc.
Each user space process normally runs in its own virtual memory space, and, unless explicitly allowed, cannot access the memory of other processes. This is the basis for memory protection in today's mainstream operating systems, and a building block for privilege separation. A separate user mode can also be used to build efficient virtual machines – see Popek and Goldberg virtualization requirements. With enough privileges, processes can request the kernel to map part of another process's memory space to its own, as is the case for debuggers. Programs can also request shared memory regions with other processes, although other techniques are also available to allow inter-process communication.
Implementation
The most common way of implementing a user mode separate from kernel mode involves operating system protection rings.
Protection rings, in turn, are implemented using CPU modes.
Typically, kernel space programs run in kernel mode, also called supervisor mode;
normal applications in user space run in user mode.
Many operating systems are single address space operating systems—they have a single address space for all user-mode code. (The kernel-mode code may be in the same address s |
https://en.wikipedia.org/wiki/International%20Workshop%20on%20Operator%20Theory%20and%20its%20Applications | International Workshop on Operator Theory and its Applications (IWOTA) was started in 1981 to bring together mathematicians and engineers working in operator theoretic side of functional analysis and its applications to related fields. These include:
Differential equations and Integral equations
Complex analysis and Harmonic analysis
Linear system and Control theory
Mathematical physics
Signal processing
Numerical analysis
The other major branch of operator theory, Operator algebras (C* and von Neumann Algebras), is not heavily represented at IWOTA and has its own conferences.
IWOTA gathers leading experts from all over the world for an intense exchange of new results, information and opinions, and for tracing the future developments in the field. The IWOTA meetings provide opportunities for participants (including young researchers) to present their own work in invited and contributed talks, to interact with other researchers from around the globe, and to broaden their knowledge of the field.
In addition, IWOTA emphasizes cross-disciplinary interaction among mathematicians, electrical engineers and mathematical physicists. In the even years, the IWOTA workshop is a satellite meeting to the biennial International Symposium on the Mathematical Theory of Networks and Systems (MTNS). From the humble beginnings in the early 80's, the IWOTA workshops grew to become one of the largest continuing conferences attended by the community of researchers in operator theory.
History of IWOTA
First IWOTA Meeting
The International Workshop on Operator Theory and its Applications was started on August 1, 1981, adjacent to the International Symposium on Mathematical Theory of Networks and Systems (MTNS) with goal of exposing operator theorists, even pure theorists, to recent developments in engineering (especially H-infinity methods in control theory) which had a significant intersection with operator theory. Israel Gohberg was the visionary and driving force of IWOTA |
https://en.wikipedia.org/wiki/Programmable%20interval%20timer | In computing and in embedded systems, a programmable interval timer (PIT) is a counter that generates an output signal when it reaches a programmed count. The output signal may trigger an interrupt.
Common features
PITs may be one-shot or periodic. One-shot timers will signal only once and then stop counting. Periodic timers signal every time they reach a specific value and then restart, thus producing a signal at periodic intervals. Periodic timers are typically used to invoke activities that must be performed at regular intervals.
Counters are usually programmed with fixed intervals that determine how long the counter will count before it will output a signal.
IBM PC compatible
The Intel 8253 PIT was the original timing device used on IBM PC compatibles. It used a 1.193182 MHz clock signal (one third of the color burst frequency used by NTSC, one twelfth of the system clock crystal oscillator, therefore one quarter of the 4.77 MHz CPU clock) and contains three timers. Timer 0 is used by Microsoft Windows (uniprocessor) and Linux as a system timer, timer 1 was historically used for dynamic random access memory refreshes and timer 2 for the PC speaker.
The LAPIC in newer Intel systems offers a higher-resolution (one microsecond) timer. This is used in preference to the PIT timer in Linux kernels starting with 2.6.18.
See also
High Precision Event Timer
Monostable multivibrator
NE555 |
https://en.wikipedia.org/wiki/Rudolf%20Jaenisch | Rudolf Jaenisch (born on April 22, 1942) is a Professor of Biology at MIT and a founding member of the Whitehead Institute for Biomedical Research. He is a pioneer of transgenic science, in which an animal’s genetic makeup is altered. Jaenisch has focused on creating genetically modified mice to study cancer, epigenetic reprogramming and neurological diseases.
Research
Jaenisch’s first breakthrough occurred in 1974, when he and Beatrice Mintz showed that foreign DNA could be integrated into the DNA of early mouse embryos They injected retrovirus DNA into early mouse embryos and showed that leukemia DNA sequences had integrated into the mouse genome and also into that of its offspring. These mice were the first transgenic mammals in history.
His current research focuses on the epigenetic regulation of gene expression, which has led to major advances in creating embryonic stem cells and “induced pluripotent stem" (IPS) cells, as well as their therapeutic applications. In 2007, Jaenisch’s laboratory was one of the first three laboratories worldwide to report reprogramming cells taken from a mouse's tail into IPS cells. Jaenisch has since shown therapeutic benefits of IPS cell-based treatment for sickle-cell anemia and Parkinson's disease in mice. Additional research focuses on the epigenetic mechanisms involved in cancer and brain development.
Jaenisch’s therapeutic cloning research deals exclusively with mice, but he is an advocate for using the same techniques with human cells in order to advance embryonic stem cell research. However, in 2001, Jaenisch made a public case against human reproductive cloning, testifying before a U.S. House of Representatives subcommittee and writing an editorial in Science magazine.
Career
Jaenisch received his doctorate in medicine from the University of Munich in 1967, preferring the laboratory to the clinic. He became a postdoc at the Max Planck Institute in Munich, studying bacteriophages. He left Germany in 1970 for research |
https://en.wikipedia.org/wiki/Spotnet | Spotnet is a protocol on top of Usenet, providing a decentralized alternative to usenet indexing websites, and the NZB format in general. Spotnet allows users to create and browse private 'newsservers', or decentralized repositories of files and information. Members share spots (file sharing) with one another, similar to the seeding process in torrent sharing. Spotnet experienced tremendous growth since the closure of in 2011.
While the uses of Spotnet and Usenet are varied, one of the most common is the creation of home media servers. Several third-party applications allow automatic download and categorization of spots - typically movies, TV shows, or music files, to assist with the creation and maintenance of stored media.
Clients
Spotnet articles are placed in a textgroup, which can be headered using any Usenet client, but in order to get the full experience you need a client that is compatible with the protocol, for example:
Spotnet (.NET)
Spotweb (PHP)
Spotlite (C)
μSpotted (.NET)
SpotGrit (.NET)
Django-Spotnet (Python, Django)
Besides searching, most of these clients also have functionality for commenting on these spots, as well as adding new ones to the index. Other clients just implement the protocol, without the community-features:
URD (PHP)
BinReader (C++)
Technical details
Spotnet is a XML-based format, placed in the header of usenet articles. This RSA signed XML contains metadata about a post (a group articles) usually found in a .NFO file, like a description/genre/format, but also references to an accompanying image and zipped NZB file elsewhere on usenet.
The Message-ID of such an article can serve as a link to the full post (similar to Magnet URI), because it indirectly references all required articles. These links can be spread on media like Twitter, without the need for a central server hosting them. For a full specification of the protocol see the Spotnet Wiki.
Spotnet uses four usenet groups:
header group: free.pt
nzb |
https://en.wikipedia.org/wiki/Multitree | In combinatorics and order theory, a multitree may describe either of two equivalent structures: a directed acyclic graph (DAG) in which there is at most one directed path between any two vertices, or equivalently in which the subgraph reachable from any vertex induces an undirected tree, or a partially ordered set (poset) that does not have four items , , , and forming a diamond suborder with and but with and incomparable to each other (also called a diamond-free poset).
In computational complexity theory, multitrees have also been called strongly unambiguous graphs or mangroves; they can be used to model nondeterministic algorithms in which there is at most one computational path connecting any two states.
Multitrees may be used to represent multiple overlapping taxonomies over the same ground set. If a family tree may contain multiple marriages from one family to another, but does not contain marriages between any two blood relatives, then it forms a multitree.
Equivalence between DAG and poset definitions
In a directed acyclic graph, if there is at most one directed path between any two vertices, or equivalently if the subgraph reachable from any vertex induces an undirected tree, then its reachability relation is a diamond-free partial order. Conversely, in a diamond-free partial order, the transitive reduction identifies a directed acyclic graph in which the subgraph reachable from any vertex induces an undirected tree.
Diamond-free families
A diamond-free family of sets is a family F of sets whose inclusion ordering forms a diamond-free poset. If D(n) denotes the largest possible diamond-free family of subsets of an n-element set, then it is known that
,
and it is conjectured that the limit is 2.
Related structures
A polytree, a directed acyclic graph formed by orienting the edges of an undirected tree, is a special case of a multitree.
The subgraph reachable from any vertex in a multitree is an arborescence rooted in the vertex, that is a polyt |
https://en.wikipedia.org/wiki/Singular%20integral%20operators%20of%20convolution%20type | In mathematics, singular integral operators of convolution type are the singular integral operators that arise on Rn and Tn through convolution by distributions; equivalently they are the singular integral operators that commute with translations. The classical examples in harmonic analysis are the harmonic conjugation operator on the circle, the Hilbert transform on the circle and the real line, the Beurling transform in the complex plane and the Riesz transforms in Euclidean space. The continuity of these operators on L2 is evident because the Fourier transform converts them into multiplication operators. Continuity on Lp spaces was first established by Marcel Riesz. The classical techniques include the use of Poisson integrals, interpolation theory and the Hardy–Littlewood maximal function. For more general operators, fundamental new techniques, introduced by Alberto Calderón and Antoni Zygmund in 1952, were developed by a number of authors to give general criteria for continuity on Lp spaces. This article explains the theory for the classical operators and sketches the subsequent general theory.
L2 theory
Hilbert transform on the circle
The theory for L2 functions is particularly simple on the circle. If f ∈ L2(T), then it has a Fourier series expansion
Hardy space H2(T) consists of the functions for which the negative coefficients vanish, an = 0 for n < 0. These are precisely the square-integrable functions that arise as boundary values of holomorphic functions in the open unit disk. Indeed, f is the boundary value of the function
in the sense that the functions
defined by the restriction of F to the concentric circles |z| = r, satisfy
The orthogonal projection P of L2(T) onto H2(T) is called the Szegő projection. It is a bounded operator on L2(T) with operator norm 1. By Cauchy's theorem
Thus
When r = 1, the integrand on the right-hand side has a singularity at θ = 0. The truncated Hilbert transform is defined by
where δ = |1 – eiε|. Since it is defi |
https://en.wikipedia.org/wiki/Ecological%20anthropology | Ecological anthropology is a sub-field of anthropology and is defined as the "study of cultural adaptations to environments". The sub-field is also defined as, "the study of relationships between a population of humans and their biophysical environment". The focus of its research concerns "how cultural beliefs and practices helped human populations adapt to their environments, and how people used elements of their culture to maintain their ecosystems". Ecological anthropology developed from the approach of cultural ecology, and it provided a conceptual framework more suitable for scientific inquiry than the cultural ecology approach. Research pursued under this approach aims to study a wide range of human responses to environmental problems.
Ecological anthropologist, Conrad Kottak published arguing there is an original older 'functionalist', apolitical style ecological anthropology and, as of the time of writing in 1999, a 'new ecological anthropology' was emerging and being recommended consisting of a more complex intersecting global, national, regional and local systems style or approach.
History of the domain and leading researchers
In the 1960s, ecological anthropology first appeared as a response to cultural ecology, a sub-field of anthropology led by Julian Steward. Steward focused on studying different modes of subsistence as methods of energy transfer and then analyzed how they determine other aspects of culture. Culture became the unit of analysis. The first ecological anthropologists explored the idea that humans as ecological populations should be the unit of analysis, and culture became the means by which that population alters and adapts to the environment. It was characterised by systems theory, functionalism and negative feedback analysis.
Benjamin S. Orlove has noted that the development of ecological anthropology has occurred in stages. "Each stage is a reaction to the previous one rather than merely an addition to it". The first stage con |
https://en.wikipedia.org/wiki/History%20of%20PDF | The Portable Document Format (PDF) was created by Adobe Systems, introduced at the Windows and OS/2 Conference in January 1993 and remained a proprietary format until it was released as an open standard in 2008. Since then, it is under the control of International Organization for Standardization (ISO) Committee of volunteer industry experts.
PDF was developed to share documents, including text formatting and inline images, among computer users of disparate platforms who may not have access to mutually-compatible application software. It was created by a research and development team called Camelot, led by Adobe's co-founder John Warnock. PDF was one among a number of competing formats such as DjVu, Envoy, Common Ground Digital Paper, Farallon Replica and even Adobe's own PostScript format. In those early years before the rise of the World Wide Web and HTML documents, PDF was popular mainly in desktop publishing workflows.
PDF's adoption in the early days of the format's history was slow. Indeed, the Adobe Board of Directors attempted to cancel the development of the format, as they could see little demand for it. Adobe Acrobat, Adobe's suite for reading and creating PDF files, was not freely available; early versions of PDF had no support for external hyperlinks, reducing its usefulness on the Internet; the larger size of a PDF document compared to plain text required longer download times over the slower modems common at the time; and rendering PDF files was slow on the less powerful machines of the day.
Adobe distributed its Adobe Reader (now Acrobat Reader) program free of charge from version 2.0 onwards, and continued supporting the original PDF, which eventually became the de facto standard for fixed-format electronic documents.
In 2008 Adobe Systems' PDF Reference 1.7 became ISO 32000:1:2008. Thereafter, further development of PDF (including PDF 2.0) is conducted by ISO's TC 171 SC 2 WG 8 with the participation of Adobe Systems and other subject matter ex |
https://en.wikipedia.org/wiki/Bacterial%20transcription | Bacterial transcription is the process in which a segment of bacterial DNA is copied into a newly synthesized strand of messenger RNA (mRNA) with use of the enzyme RNA polymerase.
The process occurs in three main steps: initiation, elongation, and termination; and the end result is a strand of mRNA that is complementary to a single strand of DNA. Generally, the transcribed region accounts for more than one gene. In fact, many prokaryotic genes occur in operons, which are a series of genes that work together to code for the same protein or gene product and are controlled by a single promoter. Bacterial RNA polymerase is made up of four subunits and when a fifth subunit attaches, called the σ-factor, the polymerase can recognize specific binding sequences in the DNA, called promoters. The binding of the σ-factor to the promoter is the first step in initiation. Once the σ-factor releases from the polymerase, elongation proceeds. The polymerase continues down the double stranded DNA, unwinding it and synthesizing the new mRNA strand until it reaches a termination site. There are two termination mechanisms that are discussed in further detail below. Termination is required at specific sites for proper gene expression to occur. Gene expression determines how much gene product, such as protein, is made by the gene. Transcription is carried out by RNA polymerase but its specificity is controlled by sequence-specific DNA binding proteins called transcription factors. Transcription factors work to recognize specific DNA sequences and based on the cells needs, promote or inhibit additional transcription. Similar to other taxa, bacteria experience bursts of transcription. The work of the Jones team in Jones et al 2014 explains some of the underlying causes of bursts and other variability, including stability of the resulting mRNA, the strength of promotion encoded in the relevant promoter and the duration of transcription due to strength of the TF binding site. They also found |
https://en.wikipedia.org/wiki/Cardiophysics | Cardiophysics is an interdisciplinary science that stands at the junction of cardiology and medical physics, with researchers using the methods of, and theories from, physics to study cardiovascular system at different levels of its organisation, from the molecular scale to whole organisms. Being formed historically as part of systems biology, cardiophysics designed to reveal connections between the physical mechanisms, underlying the organization of the cardiovascular system, and biological features of its functioning.
Zbigniew R. Struzik seems to be a first author who used the term in a scientific publication in 2004.
One can use interchangeably also the terms cardiovascular physics.
See also
Medical physics
Important publications in medical physics
Biomedicine
Biomedical engineering
Physiome
Nanomedicine |
https://en.wikipedia.org/wiki/Stooge%20sort | Stooge sort is a recursive sorting algorithm. It is notable for its exceptionally bad time complexity of =
The running time of the algorithm is thus slower compared to reasonable sorting algorithms, and is slower than bubble sort, a canonical example of a fairly inefficient sort. It is however more efficient than Slowsort. The name comes from The Three Stooges.
The algorithm is defined as follows:
If the value at the start is larger than the value at the end, swap them.
If there are 3 or more elements in the list, then:
Stooge sort the initial 2/3 of the list
Stooge sort the final 2/3 of the list
Stooge sort the initial 2/3 of the list again
It is important to get the integer sort size used in the recursive calls by rounding the 2/3 upwards, e.g. rounding 2/3 of 5 should give 4 rather than 3, as otherwise the sort can fail on certain data.
Implementation
Pseudocode
function stoogesort(array L, i = 0, j = length(L)-1){
if L[i] > L[j] then // If the leftmost element is larger than the rightmost element
swap(L[i],L[j]) // Then swap them
if (j - i + 1) > 2 then // If there are at least 3 elements in the array
t = floor((j - i + 1) / 3)
stoogesort(L, i, j-t) // Sort the first 2/3 of the array
stoogesort(L, i+t, j) // Sort the last 2/3 of the array
stoogesort(L, i, j-t) // Sort the first 2/3 of the array again
return L
}
Haskell
-- Not the best but equal to above
stoogesort :: (Ord a) => [a] -> [a]
stoogesort [] = []
stoogesort src = innerStoogesort src 0 ((length src) - 1)
innerStoogesort :: (Ord a) => [a] -> Int -> Int -> [a]
innerStoogesort src i j
| (j - i + 1) > 2 = src''''
| otherwise = src'
where
src' = swap src i j -- need every call
t = floor (fromIntegral (j - i + 1) / 3.0)
src'' = innerStoogesort src' i (j - t)
src''' = innerStoogesort src'' (i + t) j
src'''' = innerStoogesort src''' i (j - t)
swa |
https://en.wikipedia.org/wiki/International%20Molecular%20Exchange%20Consortium | The International Molecular Exchange Consortium (IMEx) is a group of the major public providers of molecular interaction data to provide a single, non-redundant set of molecular interactions. Data is captured using a detailed curation model and made available in the PSI-MI standard formats. Participating databases include DIP, IntAct, the Molecular Interaction Database (MINT), MatrixDB, InnateDB, IID, HPIDB, UCL Cardiovascular Gene Annotation, MBInfo, Molecular Connections and UniProt. The group collates the interaction data and prevents duplicate entries in the various databases. The IMEx consortium also supports and contributes to the development of the HUPO-PSI-MI XML format, which is now widely implemented.
External references
IMEx website |
https://en.wikipedia.org/wiki/Cleanskin%20%28wine%29 | In Australia and New Zealand, cleanskin wine is a term for wine whose label does not indicate the winery or the winemaker's name. It is typically sold at a low price.
Cleanskin labels usually only show the grape variety and the year of bottling, as well as other information required by Australian law - alcohol content, volume, additives and standard drink information.
Cleanskin wines are typically sold cheaply in dozen lots for home consumption. They may be branded wines that were originally sold at a higher price and re-labelled as cleanskins, or they may be wines produced for the purpose of being sold as cleanskins. Consequently, the quality of various batches of cleanskin wine can vary significantly.
Cleanskin wine was introduced to Australia in the early 2000s as a way for the wine industry to cope with a massive oversupply of wine, and a resulting drop in prices. As a result, wine consumption in Australia has greatly increased as of 2006. Also, the price of cleanskin wine has dropped to around or below the price of beer or even bottled water.
The word "cleanskin" comes from the Australian term for unbranded cattle, and is also used to refer to undercover law enforcement agents. |
https://en.wikipedia.org/wiki/Battleship%20%28puzzle%29 | The Battleship puzzle (sometimes called Bimaru, Yubotu, Solitaire Battleships or Battleship Solitaire) is a logic puzzle based on the Battleship guessing game. It and its variants have appeared in several puzzle contests, including the World Puzzle Championship, and puzzle magazines, such as Games magazine.
Solitaire Battleship was invented in Argentina by Jaime Poniachik and was first featured in 1982 in the Argentine magazine . Battleship gained more widespread popularity after its international debut at the first World Puzzle Championship in New York City in 1992. Battleship appeared in Games magazine the following year and remains a regular feature of the magazine. Variants of Battleship have emerged since the puzzle's inclusion in the first World Puzzle Championship.
Battleship is played in a grid of squares that hides ships of different sizes. Numbers alongside the grid indicate how many squares in a row or column are occupied by part of a ship.
History
The solitaire version of Battleship was invented in Argentina in 1982 under the name Batalla Naval, with the first published puzzles appearing in 1982 in the Spanish magazine . Battleship was created by the magazine's founder, Jaime Poniachik, along with its editors Eduardo Abel Gimenez, Jorge Varlotta, and Daniel Samoilovich.
After 1982, no more Battleship puzzles were published until 1987, when they appeared in , a renamed version of . The publishing company of regularly publishes Battleship puzzles in its monthly magazine .
Battleship made its international debut at the first World Puzzle Championship in New York in 1992 and met with success. The next World Puzzle Championship in 1993 featured a variant of Battleship that omitted some of the row and column numbers. Battleship was first published in Games magazine in 1993, the year after the first World Puzzle Championship. Other variants later emerged, including Hexagonal Battleship, 3D Battleship, and Diagonal Battleship.
Rules
In Battleship, |
https://en.wikipedia.org/wiki/Intracorporeal | Intracorporeal or intracorporal is an adjective that means within (intra-) the body (corpus). Its antonym is extracorporeal.
It is used frequently in medicine to describe medical procedures that occur within the body, or within a corpus, as opposed to extracorporeal procedures (e.g. extracorporeal membrane oxygenation).
In a medical or surgical context, it may refer to:
Intracorporeal anastomosis
Intracorporeal circulation
Intracorporeal energy harvesting, harvesting energy from the body, and storing it, to sustain a medical device (e.g. a pacemaker).
Intracorporeal injection
Intracorporeal microrobotics
Intracorporeal reconstruction
Intracorporeal suturing
Intracorporeal urinary diversion
Lithotripsy:
Intracorporeal electrohydraulic lithotripsy
Intracorporeal laser lithotripsy
Intracorporeal pneumatic lithotripsy
Intracorporeal shock wave lithotripsy
See also
Human body (corpus humanum)
In vivo |
https://en.wikipedia.org/wiki/Dedekind%20zeta%20function | In mathematics, the Dedekind zeta function of an algebraic number field K, generally denoted ζK(s), is a generalization of the Riemann zeta function (which is obtained in the case where K is the field of rational numbers Q). It can be defined as a Dirichlet series, it has an Euler product expansion, it satisfies a functional equation, it has an analytic continuation to a meromorphic function on the complex plane C with only a simple pole at s = 1, and its values encode arithmetic data of K. The extended Riemann hypothesis states that if ζK(s) = 0 and 0 < Re(s) < 1, then Re(s) = 1/2.
The Dedekind zeta function is named for Richard Dedekind who introduced it in his supplement to Peter Gustav Lejeune Dirichlet's Vorlesungen über Zahlentheorie.
Definition and basic properties
Let K be an algebraic number field. Its Dedekind zeta function is first defined for complex numbers s with real part Re(s) > 1 by the Dirichlet series
where I ranges through the non-zero ideals of the ring of integers OK of K and NK/Q(I) denotes the absolute norm of I (which is equal to both the index [OK : I] of I in OK or equivalently the cardinality of quotient ring OK / I). This sum converges absolutely for all complex numbers s with real part Re(s) > 1. In the case K = Q, this definition reduces to that of the Riemann zeta function.
Euler product
The Dedekind zeta function of has an Euler product which is a product over all the non-zero prime ideals of
This is the expression in analytic terms of the uniqueness of prime factorization of ideals in . For is non-zero.
Analytic continuation and functional equation
Erich Hecke first proved that ζK(s) has an analytic continuation to the complex plane as a meromorphic function, having a simple pole only at s = 1. The residue at that pole is given by the analytic class number formula and is made up of important arithmetic data involving invariants of the unit group and class group of K.
The Dedekind zeta function satisfies a functional equat |
https://en.wikipedia.org/wiki/Center%20of%20pressure%20%28fluid%20mechanics%29 | In fluid mechanics, the center of pressure is the point where the total sum of a pressure field acts on a body, causing a force to act through that point. The total force vector acting at the center of pressure is the surface integral of the pressure vector field across the surface of the body. The resultant force and center of pressure location produce an equivalent force and moment on the body as the original pressure field.
Pressure fields occur in both static and dynamic fluid mechanics. Specification of the center of pressure, the reference point from which the center of pressure is referenced, and the associated force vector allows the moment generated about any point to be computed by a translation from the reference point to the desired new point. It is common for the center of pressure to be located on the body, but in fluid flows it is possible for the pressure field to exert a moment on the body of such magnitude that the center of pressure is located outside the body.
Hydrostatic example (dam)
Since the forces of water on a dam are hydrostatic forces, they vary linearly with depth. The total force on the dam is then the integral of the pressure multiplied by the width of the dam as a function of the depth. The center of pressure is located at the centroid of the triangular shaped pressure field from the top of the water line. The hydrostatic force and tipping moment on the dam about some point can be computed from the total force and center of pressure location relative to the point of interest.
Historical usage for sailboats
Center of pressure is used in sailboat design to represent the position on a sail where the aerodynamic force is concentrated.
The relationship of the aerodynamic center of pressure on the sails to the hydrodynamic center of pressure (referred to as the center of lateral resistance) on the hull determines the behavior of the boat in the wind. This behavior is known as the "helm" and is either a weather helm or lee helm. |
https://en.wikipedia.org/wiki/Terminal%20ballistics | Terminal ballistics is a sub-field of ballistics concerned with the behavior and effects of a projectile when it hits and transfers its energy to a target.
Bullet design (as well as the velocity of impact) largely determines the effectiveness of penetration.
General
The concept of terminal ballistics can be applied to any projectile striking a target. Much of the topic specifically regards the effects of small arms fire striking live targets, and a projectile's ability to incapacitate or eliminate a target.
Common factors include bullet weight, composition, velocity, and shape.
Firearm projectiles
Classes of bullets
There are three basic classes of bullets:
Those designed to maximize accuracy at varying ranges
Those designed to maximize damage to a target (by penetrating as deeply as possible)
Those designed to avoid over-penetration of a target. This is done by deformation (to control the depth to which the bullet penetrates) which, as a by-product, causes more damage inside the wound. This class may limit penetration by either expanding or fragmenting.
Target shooting
For short-range target shooting, typically on ranges up to 50 meters, or 55 yards, with low-powered ammunition like a .22 long rifle, aerodynamics is relatively unimportant, and velocities are low compared to velocities attained by full-powered ammunition.
As long as a bullet's weight is balanced, it will not tumble; its shape is thus unimportant for purposes of its aerodynamics. For shooting at paper targets, bullets that will punch a perfect hole through the target —called wadcutters— are preferred. They have a very flat front, often with a relatively sharp edge along the perimeter, which punches out a hole equal to or almost equal to its diameter, thus enabling unambiguous scoring of the target. Since cutting the edge of a target ring will result in a higher score, accuracy to within fractions of an inch is desirable.
Magazine-fed pistols tend not to reliably feed wadcutters becaus |
https://en.wikipedia.org/wiki/Chebyshev%20iteration | In numerical linear algebra, the Chebyshev iteration is an
iterative method for determining the solutions of a system of linear equations. The method is named after Russian mathematician Pafnuty Chebyshev.
Chebyshev iteration avoids the computation of inner products as is necessary for the other nonstationary methods. For some distributed-memory architectures these inner products are a bottleneck with respect to efficiency. The price one pays for avoiding inner products is that the method requires enough knowledge about spectrum of the coefficient matrix A, that is an upper estimate for the upper eigenvalue and lower estimate for the lower eigenvalue. There are modifications of the method for nonsymmetric matrices A.
Example code in MATLAB
function [x] = SolChebyshev002(A, b, x0, iterNum, lMax, lMin)
d = (lMax + lMin) / 2;
c = (lMax - lMin) / 2;
preCond = eye(size(A)); % Preconditioner
x = x0;
r = b - A * x;
for i = 1:iterNum % size(A, 1)
z = linsolve(preCond, r);
if (i == 1)
p = z;
alpha = 1/d;
else if (i == 2)
beta = (1/2) * (c * alpha)^2
alpha = 1/(d - beta / alpha);
p = z + beta * p;
else
beta = (c * alpha / 2)^2;
alpha = 1/(d - beta / alpha);
p = z + beta * p;
end;
x = x + alpha * p;
r = b - A * x; %(= r - alpha * A * p)
if (norm(r) < 1e-15), break; end; % stop if necessary
end;
end
Code translated from
and.
See also
Iterative method. Linear systems
List of numerical analysis topics. Solving systems of linear equations
Jacobi iteration
Gauss–Seidel method
Modified Richardson iteration
Successive over-relaxation
Conjugate gradient method
Generalized minimal residual method
Biconjugate gradient method
Iterative Template Library
IML++ |
https://en.wikipedia.org/wiki/Systems%20biomedicine | Systems biomedicine, also called systems biomedical science, is the application of systems biology to the understanding and modulation of developmental and pathological processes in humans, and in animal and cellular models. Whereas systems biology aims at modeling exhaustive networks of interactions (with the long-term goal of, for example, creating a comprehensive computational model of the cell), mainly at intra-cellular level, systems biomedicine emphasizes the multilevel, hierarchical nature of the models (molecule, organelle, cell, tissue, organ, individual/genotype, environmental factor, population, ecosystem) by discovering and selecting the key factors at each level and integrating them into models that reveal the global, emergent behavior of the biological process under consideration.
Such an approach will be favorable when the execution of all the experiments necessary to establish exhaustive models is limited by time and expense (e.g., in animal models) or basic ethics (e.g., human experimentation).
In the year of 1992, a paper on system biomedicine by Kamada T. was published (Nov.-Dec.), and an article on systems medicine and pharmacology by Zeng B.J. was also published (April) in the same time period.
In 2009, the first collective book on systems biomedicine was edited by Edison T. Liu and Douglas A. Lauffenburger.
In October 2008, one of the first research groups uniquely devoted to systems biomedicine was established at the European Institute of Oncology. One of the first research centers specialized on systems biomedicine was founded by Rudi Balling. The Luxembourg Centre for Systems Biomedicine is an interdisciplinary center of the University of Luxembourg. The first centre devoted to spatial issues in systems biomedicine has been recently established at Oregon Health and Science University.
The first peer-reviewed journal on this topic, Systems Biomedicine, was recently established by Landes Bioscience.
See also
Systems biology
Systems med |
https://en.wikipedia.org/wiki/Palmar%20carpometacarpal%20ligaments | The Palmar carpometacarpal ligaments (or volar) are a series of bands on the palmar surface of the carpometacarpal joints that connect the carpal bones to the second through fifth metacarpal bones. The second metacarpal is connected to the trapezium. The third metacarpal is connected to the trapezium, to the capitate, and to the hamate. The fourth and fifth metacarpals are connected to the hamate.
The palmar carpometacarpal ligaments have a somewhat similar arrangement to the dorsal carpometacarpal ligaments, with the exception of those of the third metacarpal, which are three in number:
a lateral one from the greater multangular, situated superficial to the sheath of the tendon of the Flexor carpi radialis;
and intermediate one from the capitate;
and a medial one from the hamate. |
https://en.wikipedia.org/wiki/Nuclear%20Physics%20News | Nuclear Physics News, International () is a quarterly science magazine covering research in nuclear physics, published since 1990 by Taylor & Francis. It is the official magazine of the Nuclear Physics European Collaboration Committee, an Expert Committee of the European Science Foundation, which was also established in 1990. The magazine is based in Garching bei München, Germany.
The editor in chief is Gabriele-Elisabeth Körner (Technical University of Munich). |
https://en.wikipedia.org/wiki/More%20Card | More Card is a rechargeable smart card for paying transportation fares in public transport systems in India. Tipped as a nationwide interoperable transport card, the card aims to be a single point of transaction, applicable in state buses, Metro and even parking. The card was launched in 2012 in Delhi, initially acting as a common card for the Delhi Metro and its feeder buses.
Name and logo
The brand name More has been chosen to signify the national bird peacock (in Hindi & related Indian languages - such as those using the Devanagari script - मोर [mor] means peacock) as also literally, to convey that you get more and more by using this card. The logo of the card is an illustration of peacock.
History
In a move to aid commuter convenience, and to mitigate its cash handling pains, BEST, adopted a new alternative method of paying for bus fares. From January 2007, the multi-application card system called GO Mumbai card was made available to the desired commuters. The purpose of the "Go Mumbai" card was to have a uniform currency for various kinds of transactions like paying tolls, paying for fuel, payments at railway canteens, etc. The GO Mumbai card scheme was introduced by Kaizen Automation Pvt Ltd in April 2008. The card intended to help users travel in Brihanmumbai Electric Supply and Transport (BEST) buses and local trains.
The card, launched first for BEST buses, was later extended to Central and Western Railway services and promised to be a transport card for seamless connectivity in Mumbai. While BEST conductors were provided with hand-held devices to validate the cards, Go Mumbai devices were installed at all railway stations. There were also plans to extend it to toll collection, taxis and autos. The railways' efforts to popularise the GO Mumbai card scheme proved futile. But the dreams crashed after Kaizen Limited, the company involved in the project, failed to supply enough number of hand-held devices to check the card's validity. Another reason for |
https://en.wikipedia.org/wiki/Oxalosuccinic%20acid | Oxalosuccinic acid is a substrate of the citric acid cycle. It is acted upon by isocitrate dehydrogenase. Salts and esters of oxalosuccinic acid are known as oxalosuccinates.
Oxalosuccinic acid/oxalosuccinate is an unstable 6-carbon intermediate in the tricarboxylic acid cycle. It's a keto acid, formed during the oxidative decarboxylation of isocitrate to alpha-ketoglutarate, which is catalyzed by the enzyme isocitrate dehydrogenase. Isocitrate is first oxidized by coenzyme NAD+ to form oxalosuccinic acid/oxalosuccinate. Oxalosuccinic acid is both an alpha-keto and a beta-keto acid (an unstable compound) and it is the beta-ketoic property that allows the loss of carbon dioxide in the enzymatic reaction in conversion to the five-carbon molecule 2-oxoglutarate. |
https://en.wikipedia.org/wiki/Cardiac%20Electrophysiology%20Society | The Cardiac Electrophysiology Society (CES) is an international society of basic and clinical scientists and physicians interested in cardiac electrophysiology and arrhythmias. The Cardiac Electrophysiology Society's founder was George Burch in 1949 and its current president is Jonathan C. Makielski, M.D. |
https://en.wikipedia.org/wiki/Nuclear%20sexing | Nuclear sexing is a technique for genetic sex determination in those species where XX chromosome pair is present. Nuclear sexing can be done by identifying Barr body, a drumstick like appendage located in the rim of the nucleus in somatic cells. Barr body is the inactive X chromosome which lies condensed in the nucleus of somatic cells. A typical human (or other XY-based organism) female has only one Barr body per somatic cell, while a typical human male has none. Though a Barr body can be sought in any human nucleated cell, circulating mononuclear cells are commonly used for this purpose. These cells are cultured, and treated with chemicals such as colcemid to arrest mitosis in metaphase.
A minimum of 30 percent of sex chromatin indicates genetic female sex. |
https://en.wikipedia.org/wiki/Jean-Pierre%20Bourguignon | Jean-Pierre Bourguignon (born 21 July 1947) is a French mathematician, working in the field of differential geometry.
Biography
Born in Lyon, he studied at École Polytechnique in Palaiseau, graduating in 1969. For his graduate studies he went to Paris Diderot University, where he obtained his PhD in 1974 under the direction of Marcel Berger.
He was president of the Société Mathématique de France from 1990 to 1992. From 1995 to 1998, he was president of the European Mathematical Society. He was director of the Institut des Hautes Études Scientifiques near Paris from 1994 to 2013. Between 1 January 2014 and 31 December 2019 he was the President of the European Research Council.
Selected publications
Articles
with H. Blaine Lawson and James Simons:
with H. Blaine Lawson:
with Jean-Pierre Ezin:
Books
with Oussama Hijazi, Jean-Louis Milhorat, Andrei Moroianu and Sergiu Moroianu:
as editor with Rolf Jeltsch, Alberto Adrego Pinto, and Marcelo Viana: |
https://en.wikipedia.org/wiki/Systems%20Biology%20Ireland | Systems Biology Ireland (SBI) is a Science Foundation Ireland-funded centre for science, engineering and technology research. It is an initiative between University College Dublin (UCD) and University of Galway (UCG). It is based on the Belfield campus of UCD, and works in the areas of systems biology, systems medicine and personalised medicine.
SBI designs new therapeutic approaches to cancer, its research enabling the development of technologies that can be used for early identification of responsive patient groups and accelerated discovery of new combination therapies.
People associated with SBI include its director Prof. Walter Kolch and deputy director Prof. Boris Kholodenko |
https://en.wikipedia.org/wiki/Disease%20gene%20identification | Disease gene identification is a process by which scientists identify the mutant genotypes responsible for an inherited genetic disorder. Mutations in these genes can include single nucleotide substitutions, single nucleotide additions/deletions, deletion of the entire gene, and other genetic abnormalities.
Significance
Knowledge of which genes (when non-functional) cause which disorders will simplify diagnosis of patients and provide insights into the functional characteristics of the mutation. The advent of modern-day high-throughput sequencing technologies combined with insights provided from the growing field of genomics is resulting in more rapid disease gene identification, thus allowing scientists to identify more complex mutations.
Generic gene identification procedure
Disease gene identification techniques often follow the same overall procedure. DNA is first collected from several patients who are believed to have the same genetic disease. Then, their DNA samples are analyzed and screened to determine probable regions where the mutation could potentially reside. These techniques are mentioned below. These probable regions are then lined-up with one another and the overlapping region should contain the mutant gene. If enough of the genome sequence is known, that region is searched for candidate genes. Coding regions of these genes are then sequenced until a mutation is discovered or another patient is discovered, in which case the analysis can be repeated, potentially narrowing down the region of interest.
The differences between most disease gene identification procedures are in the second step (where DNA samples are analyzed and screened to determine regions in which the mutation could reside).
Pre-genomics techniques
Without the aid of the whole-genome sequences, pre-genomics investigations looked at select regions of the genome, often with only minimal knowledge of the gene sequences they were looking at. Genetic techniques capable o |
https://en.wikipedia.org/wiki/World%20War%20II%3A%20TCG | World War II: TCG is a free-to-play, online turn-based digital collectible card game developed and published by FrozenShard Games. The game was released on March 6, 2014 for iOS, June 19, 2014 for Android, and February 23, 2019 for Steam. It is the first release from FrozenShard Games, which was founded on September 24, 2012 by three former Blizzard Entertainment employees and was created following a successful Kickstarter campaign.
World War II: TCG is based on the events of World War II.
Gameplay
As of 2015, World War II: TCG allows players to join five different distinct factions including: The Germans, Russians, Japanese, Americans, and the British. Players can enjoy the game in a variety of ways by playing in a single player mode, online co-op, an online PvP mode, and even a cross-platform PvP mode so players can play each other on a variety of different consoles.
World War II: TCG contains four major types of cards in: Units, Items, Orders, and Commands. Each card type is based on World War II technology, such as the Japanese A6M Zero plane and Tiger tank.
The game has a unique resource system in which the player starts with three action points that can be used to play cards from their first turn onwards. Players can use their action points to promote units and become more powerful; a card that starts as an infantry unit gains more attack power, health, and abilities after being promoted. If a card is destroyed, it returns to the player's deck and may be drawn again in its promoted state.
And though World War II: TCG had a good fan base behind it, as of October 3, FrozenShard announed the official end of the game itself. Due to the fact that Gamesparks, the backend provider of FrozenShard, ultimately decided to end their services. And with no other viable options/services to be able to support the game, FrozenShard in turn ultimately decided to shut down the game.
Expansions
Release dates in chronological order:
Sea Lords - Added ships and submarin |
https://en.wikipedia.org/wiki/Psychological%20effects%20of%20Internet%20use | Various researchers have undertaken efforts to examine the psychological effects of Internet use. Some research employs studying brain functions in Internet users. Some studies assert that these changes are harmful, while others argue that asserted changes are beneficial.
Assertions
American writer Nicholas Carr asserts that Internet use reduces the deep thinking that leads to true creativity. He also says that hyperlinks and overstimulation means that the brain must give most of its attention to short-term decisions. Carr also states that the vast availability of information on the World Wide Web overwhelms the brain and hurts long-term memory. He says that the availability of stimuli leads to a very large cognitive load, which makes it difficult to remember anything.
Computer scientist Ramesh Sitaraman has asserted that Internet users are impatient and are likely to get more impatient with time. In a large-scale research study that completed in 2012 involving millions of users watching videos on the Internet, Krishnan and Sitaraman show that users start to abandon online videos if they do not start playing within two seconds. In addition, users with faster Internet connections (such as FTTH) showed less patience and abandoned videos at a faster rate than users with slower Internet connections. Many commentators have since argued that these results provide a glimpse into the future: as Internet services become faster and provide more instant gratification, people become less patient and less able to delay gratification and work towards longer-term rewards.
Psychologist Steven Pinker, however, argues that people have control over what they do, and that research and reasoning never came naturally to people. He says that "experience does not revamp the basic information-processing capacities of the brain" and asserts that the Internet is actually making people smarter.
MRI studies
The BBC describes the research published in the peer-reviewed science journal PLoS O |
https://en.wikipedia.org/wiki/Monoamine%20oxidase%20B | Monoamine oxidase B, also known as MAOB, is an enzyme that in humans is encoded by the MAOB gene.
The protein encoded by this gene belongs to the flavin monoamine oxidase family. It is an enzyme located in the outer mitochondrial membrane. It catalyzes the oxidative deamination of biogenic and xenobiotic amines and plays an important role in the catabolism of neuroactive and vasoactive amines in the central nervous system and peripheral tissues (such as dopamine). This protein preferentially degrades benzylamine and phenethylamine. Similar to monoamine oxidase A (MAOA), it also degrades dopamine [though some new research contradicts this, suggesting that MAOB does not directly degrade dopamine, but is responsible for GABA synthesis].
Structure and Function
Monoamine oxidase B has a hydrophobic bipartite elongated cavity that (for the "open" conformation) occupies a combined volume close to 700 Å3. hMAO-A has a single cavity that exhibits a rounder shape and is larger in volume than the "substrate cavity" of hMAO-B.
The first cavity of hMAO-B has been termed the entrance cavity (290 Å3), the second substrate cavity or active site cavity (~390 Å3) – between both an isoleucine199 side-chain serves as a gate. Depending on the substrate or bound inhibitor, it can exist in either an open or a closed form, which has been shown to be important in defining the inhibitor specificity of hMAO B. At the end of the substrate cavity is the FAD cofactor with sites for favorable amine binding about the flavin involving two nearly parallel tyrosyl (398 and 435) residues that form what has been termed an aromatic cage.
Like MAO-A, MAO-B catalyzes O2-dependent oxidation of primary arylalkyl amines, the initial step in the breakdown of these molecules. The products are the corresponding aldehyde, hydrogen peroxide, and ammonia:
Amine + + → Aldehyde + +
This reaction is believed to occur in three steps. First, the amine is oxidized to the corresponding imine, with reduction |
https://en.wikipedia.org/wiki/Plasma%20membrane%20monoamine%20transporter | The plasma membrane monoamine transporter (PMAT) is a low-affinity monoamine transporter protein which in humans is encoded by the SLC29A4 gene. It is known alternatively as the human equilibrative nucleoside transporter-4 (hENT4). Unlike other members of the ENT family, it is impermeable to most nucleosides, with the exception of the inhibitory neurotransmitter and ribonucleoside adenosine, which it is permeable to in a highly pH-dependent manner.
This protein is an integral membrane protein that transports the monoamine neurotransmitters (serotonin, dopamine, norepinephrine) as well as adenosine, from synaptic spaces into presynaptic neurons or neighboring glial cells. It is abundantly expressed in the human brain, heart tissue, and skeletal muscle, as well as in the kidneys. It is relatively insensitive to the high affinity inhibitors (such as SSRIs) of the SLC6A monoamine transporters (SERT, DAT, NET), as well being only weakly sensitive to the adenosine transport inhibitor, dipyridamole. Its transport of monoamines, unlike for adenosine, is pH-insensitive. At low pH, (5.5-6.5 range, as occurs under ischemic conditions) however, its transport efficiency for adenosine becomes greater than for serotonin.
It has 530 amino acid residues with 10–12 transmembrane segments, and is not homologous to other known monoamine transporters, such as the high-affinity SERT, DAT, and NET, or the low-affinity SLC22A OCT family. It was initially identified by a search of the draft human genome database by its sequence homology to ENTs (equilibrative nucleoside transporters).
Ligands
Inhibitors
No highly selective PMAT inhibitors are yet available, but a number of existing compounds have been found to act as weak inhibitors of this transporter, with the exception of decynium-22, which is more potent. These compounds include:
Luteolin
Cimetidine
Decynium-22
Dipyridamole
Quinidine
Quinine
Tryptamine
Verapamil
Substrates
Acetylcholine (poor)
Adenosine (at low pH)
Do |
https://en.wikipedia.org/wiki/Levinson%27s%20theorem | Levinson's theorem is an important theorem in non-relativistic quantum scattering theory. It relates the number of bound states of a potential to the difference in phase of a scattered wave at zero and infinite energies. It was published by Norman Levinson in 1949.
Statement of theorem
The difference in the -wave phase shift of a scattered wave at zero energy, , and infinite energy, , for a spherically symmetric potential is related to the number of bound states by:
where or . The case is exceptional and it can only happen in -wave scattering. The following conditions are sufficient to guarantee the theorem:
continuous in except for a finite number of finite discontinuities |
https://en.wikipedia.org/wiki/H-derivative | In mathematics, the H-derivative is a notion of derivative in the study of abstract Wiener spaces and the Malliavin calculus.
Definition
Let be an abstract Wiener space, and suppose that is differentiable. Then the Fréchet derivative is a map
;
i.e., for , is an element of , the dual space to .
Therefore, define the -derivative at by
,
a continuous linear map on .
Define the -gradient by
.
That is, if denotes the adjoint of , we have .
See also
Malliavin derivative |
https://en.wikipedia.org/wiki/NeuroMatrix | NeuroMatrix is a digital signal processor (DSP) series developed by NTC Module. The DSP has a VLIW/SIMD architecture. It consists of a 32-bit RISC core and a 64-bit vector co-processor. The vector co-processor supports vector operations with elements of variable bit length (US Pat. 6539368 B1) and is optimized to support the implementation of artificial neural networks. From this derives the name NeuroMatrix Core (NMC). Newer devices contain multiple DSP cores and additional ARM or PowerPC 470 cores.
Overview
Details
L1879VM1
start of development in 1996, start of production in 1999 at Samsung
1879VM2
manufactured at Fujitsu
1879VM3
manufactured at Fujitsu
1879VM5Ya
manufactured at Fujitsu Japan
1879VM6Ya
manufactured at GlobalFoundries Malaysia
1879VM8Ya
system-on-a-chip (SoC) containing 4 computing clusters, each consisting of one ARM Cortex-A5 core and four NMC4 DSP cores, plus one stand-alone ARM Cortex-A5 core
manufactured at TSMC ?
1879VYa1Ya
system-on-a-chip (SoC) for software-defined radios, including four 12-bit analog-to-digital converters with 82MSamples/s and hardware blocks implementing a digital direct-conversion receiver
K1879KhB1Ya
, also romanized as K1879XB1Ya
manufactured at Fujitsu
system-on-a-chip (SoC) for set-top boxes where the NMC core is used as an audio processor
1879KhK1Ya
, also romanized as 1879XK1Ya
system-on-a-chip (SoC) for software-defined radios, including four 12-bit analog-to-digital converters with 85MSamples/s and hardware blocks implementing a digital direct-conversion receiver
K1888VS018
system-on-a-chip (SoC) for software-defined radios, including four 10-bit analog-to-digital converters with 90MSamples/s, as well as CAN bus, I²C, SPI, Ethernet
1888VS048
system-on-a-chip (SoC) for connecting a PCI Express 2.0 host interface to 4x Gigabit Ethernet (with RFC 4175 support), ARINC 429, as well as CAN bus, I²C, SPI
1888VS058
system-on-a-chip (SoC) for radar systems with dedicated |
https://en.wikipedia.org/wiki/Information%20technology%20consulting | In management, information technology consulting (also called IT consulting, computer consultancy, business and technology services, computing consultancy, technology consulting, and IT advisory) is a field of activity which focuses on advising organizations on how best to use information technology (IT) in achieving their business objectives, but it can also refer more generally to IT outsourcing.
Once a business owner defines the needs to take a business to the next level, a decision maker will define a scope, cost and a time frame of the project. The role of the IT consultancy company is to support and nurture the company from the very beginning of the project until the end, and deliver the project not only in the scope, time and cost but also with complete customer satisfaction.
See also
List of major IT consulting firms
Consultant
Outsourcing |
https://en.wikipedia.org/wiki/Skull%20bossing | Skull bossing is a descriptive term in medical physical examination indicating a protuberance of the skull, most often in the frontal bones of the forehead ("frontal bossing"). Although prominence of the skull bones may be normal, skull bossing may be associated with certain medical conditions, including nutritional, metabolic, hormonal, and hematologic disorders.
Frontal bossing
Frontal bossing is the development of an unusually pronounced forehead which may also be associated with a heavier than normal brow ridge. It is caused by enlargement of the frontal bone, often in conjunction with abnormal enlargement of other facial bones, skull, mandible, and bones of the hands and feet. Frontal bossing may be seen in a few rare medical syndromes such as acromegaly – a chronic medical disorder in which the anterior pituitary gland produces excess growth hormone (GH). Frontal bossing may also occur in diseases resulting in chronic anemia, where there is increased hematopoiesis and enlargement of the medullary cavities of the skull.
Associated medical disorders
Rickets
Achondroplasia
Acromegaly
Basal cell nevus syndrome
Congenital syphilis
Cleidocranial dysostosis
Crouzon syndrome
Cryopyrin-Associated Periodic Syndrome (CAPS – PFS)
Ectodermal dysplasia
Extramedullary hematopoiesis
Fragile X syndrome
Hurler syndrome
Osteopathia Striata with Cranial Sclerosis
Pfeiffer syndrome
Rubinstein-Taybi syndrome
Russell-Silver syndrome (Russell-Silver dwarf)
Thanatophoric dysplasia
Talfan syndrome
Trimethadione (antiseizure drug) use during pregnancy
Beta-thalassemia (due to expansion of bone marrow secondary to increased hematopoiesis; see Extramedullary hematopoiesis)
Hallermann-Streiff syndrome |
https://en.wikipedia.org/wiki/Golomb%20ruler | In mathematics, a Golomb ruler is a set of marks at integer positions along a ruler such that no two pairs of marks are the same distance apart. The number of marks on the ruler is its order, and the largest distance between two of its marks is its length. Translation and reflection of a Golomb ruler are considered trivial, so the smallest mark is customarily put at 0 and the next mark at the smaller of its two possible values. Golomb rulers can be viewed as a one-dimensional special case of Costas arrays.
The Golomb ruler was named for Solomon W. Golomb and discovered independently by and . Sophie Piccard also published early research on these sets, in 1939, stating as a theorem the claim that two Golomb rulers with the same distance set must be congruent. This turned out to be false for six-point rulers, but true otherwise.
There is no requirement that a Golomb ruler be able to measure all distances up to its length, but if it does, it is called a perfect Golomb ruler. It has been proved that no perfect Golomb ruler exists for five or more marks. A Golomb ruler is optimal if no shorter Golomb ruler of the same order exists. Creating Golomb rulers is easy, but proving the optimal Golomb ruler (or rulers) for a specified order is computationally very challenging.
Distributed.net has completed distributed massively parallel searches for optimal order-24 through order-28 Golomb rulers, each time confirming the suspected candidate ruler.
Currently, the complexity of finding optimal Golomb rulers (OGRs) of arbitrary order n (where n is given in unary) is unknown. In the past there was some speculation that it is an NP-hard problem. Problems related to the construction of Golomb rulers are provably shown to be NP-hard, where it is also noted that no known NP-complete problem has similar flavor to finding Golomb rulers.
Definitions
Golomb rulers as sets
A set of integers where is a Golomb ruler if and only if
The order of such a Golomb ruler is and its length i |
https://en.wikipedia.org/wiki/AM%20broadcasting | AM broadcasting is radio broadcasting using amplitude modulation (AM) transmissions. It was the first method developed for making audio radio transmissions, and is still used worldwide, primarily for medium wave (also known as "AM band") transmissions, but also on the longwave and shortwave radio bands.
The earliest experimental AM transmissions began in the early 1900s. However, widespread AM broadcasting was not established until the 1920s, following the development of vacuum tube receivers and transmitters. AM radio remained the dominant method of broadcasting for the next 30 years, a period called the "Golden Age of Radio", until television broadcasting became widespread in the 1950s and received much of the programming previously carried by radio. Later, AM radio's audiences declined greatly due to competition from FM (frequency modulation) radio, Digital Audio Broadcasting (DAB), satellite radio, HD (digital) radio, Internet radio, music streaming services, and podcasting.
Compared to FM or digital transmissions, AM transmissions are less expensive to transmit and can be sent over long distances; however, they are much more susceptible to interference, and often have lower audio fidelity. Thus, AM broadcasters tend to specialize in spoken-word formats, such as talk radio, all news and sports, with music formats primarily for FM and digital stations.
History
Early broadcasting development
The idea of broadcasting — the unrestricted transmission of signals to a widespread audience — dates back to the founding period of radio development, even though the earliest radio transmissions, originally known as "Hertzian radiation" and "wireless telegraphy", used spark-gap transmitters that could only transmit the dots-and-dashes of Morse code. In October 1898 a London publication, The Electrician, noted that "there are rare cases where, as Dr. [Oliver] Lodge once expressed it, it might be advantageous to 'shout' the message, spreading it broadcast to receivers in |
https://en.wikipedia.org/wiki/%E2%88%82 | The character ∂ (Unicode: U+2202) is a stylized cursive d mainly used as a mathematical symbol, usually to denote a partial derivative such as (read as "the partial derivative of z with respect to x"). It is also used for boundary of a set, the boundary operator in a chain complex, and the conjugate of the Dolbeault operator on smooth differential forms over a complex manifold. It should be distinguished from other similar-looking symbols such as lowercase Greek letter delta (δ) or the lowercase Latin letter eth (ð).
History
The symbol was originally introduced in 1770 by Nicolas de Condorcet, who used it for a partial differential, and adopted for the partial derivative by Adrien-Marie Legendre in 1786.
It represents a specialized cursive type of the letter d, just as the integral sign originates as a specialized type of a long s (first used in print by Leibniz in 1686).
Use of the symbol was discontinued by Legendre, but it was taken up again by Carl Gustav Jacob Jacobi in 1841, whose usage became widely adopted.
Names and coding
The symbol is variously referred to as
"partial", "curly d", "funky d", "rounded d", "curved d", "dabba", "number 6 mirrored", or "Jacobi's delta", or as "del" (but this name is also used for the "nabla" symbol ∇).
It may also be pronounced simply "dee", "partial dee", "doh", or "die".
The Unicode character is accessed by HTML entities ∂ or ∂, and the equivalent LaTeX symbol (Computer Modern glyph: ) is accessed by \partial.
Uses
∂ is also used to denote the following:
The Jacobian .
The boundary of a set in topology.
The boundary operator on a chain complex in homological algebra.
The boundary operator of a differential graded algebra.
The conjugate of the Dolbeault operator on complex differential forms.
The boundary ∂(S) of a set of vertices S in a graph is the set of edges leaving S, which defines a cut.
See also
d'Alembert operator
Differentiable programming
List of mathematical symbols
Notation for diff |
https://en.wikipedia.org/wiki/VPS35L | (See also: List of proteins in the human body)
VPS35L is a gene encoding the VPS35 Endosomal Protein Sorting Factor Like protein. |
https://en.wikipedia.org/wiki/WaveNet | WaveNet is a deep neural network for generating raw audio. It was created by researchers at London-based AI firm DeepMind. The technique, outlined in a paper in September 2016, is able to generate relatively realistic-sounding human-like voices by directly modelling waveforms using a neural network method trained with recordings of real speech. Tests with US English and Mandarin reportedly showed that the system outperforms Google's best existing text-to-speech (TTS) systems, although as of 2016 its text-to-speech synthesis still was less convincing than actual human speech. WaveNet's ability to generate raw waveforms means that it can model any kind of audio, including music.
History
Generating speech from text is an increasingly common task thanks to the popularity of software such as Apple's Siri, Microsoft's Cortana, Amazon Alexa and the Google Assistant.
Most such systems use a variation of a technique that involves concatenated sound fragments together to form recognisable sounds and words. The most common of these is called concatenative TTS. It consists of large library of speech fragments, recorded from a single speaker that are then concatenated to produce complete words and sounds. The result sounds unnatural, with an odd cadence and tone. The reliance on a recorded library also makes it difficult to modify or change the voice.
Another technique, known as parametric TTS, uses mathematical models to recreate sounds that are then assembled into words and sentences. The information required to generate the sounds is stored in the parameters of the model. The characteristics of the output speech are controlled via the inputs to the model, while the speech is typically created using a voice synthesiser known as a vocoder. This can also result in unnatural sounding audio.
Design and ongoing research
Background
WaveNet is a type of feedforward neural network known as a deep convolutional neural network (CNN). In WaveNet, the CNN takes a raw signal as |
https://en.wikipedia.org/wiki/Multi-agent%20planning | In computer science multi-agent planning involves coordinating the resources and activities of multiple agents.
NASA says, "multiagent planning is concerned with planning by (and for) multiple agents. It can involve agents planning for a common goal, an agent coordinating the plans (plan merging) or planning of others, or agents refining their own plans while negotiating over tasks or resources. The topic also involves how agents can do this in real time while executing plans (distributed continual planning). Multiagent scheduling differs from multiagent planning the same way planning and scheduling differ: in scheduling often the tasks that need to be performed are already decided, and in practice, scheduling tends to focus on algorithms for specific problem domains".
See also
Automated planning and scheduling
Distributed artificial intelligence
Cooperative distributed problem solving and Coordination
Multi-agent systems and Software agent and Self-organization
Multi-agent reinforcement learning
Task Analysis, Environment Modeling, and Simulation (TAEMS or TÆMS) |
https://en.wikipedia.org/wiki/Heuristic%20%28computer%20science%29 | In mathematical optimization and computer science, heuristic (from Greek εὑρίσκω "I find, discover") is a technique designed for problem solving more quickly when classic methods are too slow for finding an exact or approximate solution, or when classic methods fail to find any exact solution in a search space. This is achieved by trading optimality, completeness, accuracy, or precision for speed. In a way, it can be considered a shortcut.
A heuristic function, also simply called a heuristic, is a function that ranks alternatives in search algorithms at each branching step based on available information to decide which branch to follow. For example, it may approximate the exact solution.
Definition and motivation
The objective of a heuristic is to produce a solution in a reasonable time frame that is good enough for solving the problem at hand. This solution may not be the best of all the solutions to this problem, or it may simply approximate the exact solution. But it is still valuable because finding it does not require a prohibitively long time.
Heuristics may produce results by themselves, or they may be used in conjunction with optimization algorithms to improve their efficiency (e.g., they may be used to generate good seed values).
Results about NP-hardness in theoretical computer science make heuristics the only viable option for a variety of complex optimization problems that need to be routinely solved in real-world applications.
Heuristics underlie the whole field of Artificial Intelligence and the computer simulation of thinking, as they may be used in situations where there are no known algorithms.
Trade-off
The trade-off criteria for deciding whether to use a heuristic for solving a given problem include the following:
Optimality: When several solutions exist for a given problem, does the heuristic guarantee that the best solution will be found? Is it actually necessary to find the best solution?
Completeness: When several solutions exi |
https://en.wikipedia.org/wiki/BB84 | BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocol. The protocol is provably secure assuming a perfect implementation, relying on two conditions: (1) the quantum property that information gain is only possible at the expense of disturbing the signal if the two states one is trying to distinguish are not orthogonal (see no-cloning theorem); and (2) the existence of an authenticated public classical channel. It is usually explained as a method of securely communicating a private key from one party to another for use in one-time pad encryption.
The proof of BB84 depends on a perfect implementation. Side channel attacks exist, taking advantage of non-quantum sources of information. Since this information is non-quantum, it can be intercepted without measuring or cloning quantum particles.
Description
In the BB84 scheme, Alice wishes to send a private key to Bob. She begins with two strings of bits, and , each bits long. She then encodes these two strings as a tensor product of qubits:
where and are the -th bits of and respectively. Together, give us an index into the following four qubit states:
Note that the bit is what decides which basis is encoded in (either in the computational basis or the Hadamard basis). The qubits are now in states that are not mutually orthogonal, and thus it is impossible to distinguish all of them with certainty without knowing .
Alice sends over a public and authenticated quantum channel to Bob. Bob receives a state , where represents both the effects of noise in the channel and eavesdropping by a third party we'll call Eve. After Bob receives the string of qubits, both Bob and Eve have their own states. However, since only Alice knows , it makes it virtually impossible for either Bob or Eve to distinguish the states of the qubits. Also, after Bob has received the qubits, we know that Eve cannot be in possession of a cop |
https://en.wikipedia.org/wiki/HP%20Integrity%20Virtual%20Machines | Integrity Virtual Machines is a hypervisor from Hewlett Packard Enterprise for HPE Integrity Servers running HP-UX. It is part of HP's Virtual Server Environment suite, and is optimized for server use.
History
Christophe de Dinechin initiated a skunkworks project to virtualize Itanium, with the help of Jean-Marc Chevrot and of a "virtual team" of experienced HP engineers. A prototype of Integrity Virtual Machines was then developed between 2000 and 2003 by Christophe de Dinechin, Todd Kjos and Jonathan Ross. It was then turned into a full-fledged product by a larger team of experienced OpenVMS, Tru64 Unix and HP-UX kernel engineers.
Version 1.0 and 1.2, released in 2005, ran HP-UX in virtual machines.
Version 2.0, released in November 2006, additionally supports Windows Server 2003, CD and DVD burners, tape drives and VLAN.
Version 3.0, released in June 2007, supports Linux Red Hat Enterprise Linux
Version 3.5, released in late 2007, supports SUSE Linux Enterprise Server, HP-UX 11i v3 guests, new service packs for Windows and Linux guests, and accelerated virtual I/O for HP-UX guests, enabling better I/O performance and a larger number of devices.
Version 4.0, released in September 2008, runs on HP-UX 11.31 (also known as 11i v3), supports 8 virtual CPUs, capped CPU allocation (in addition to CPU entitlement as in previous releases), additional support for accelerated virtual I/O (AVIO), and a new VM performance analysis tool. Version 4.0 also includes beta functionality such as on-line migration and support for OpenVMS guests.
Version 4.1, released in April 2009, supports Online VM Migration which allows customers to migrate active guests from one VM Host to another VM Host without service interruption. It also provides support for SSH third-party alternatives for secure communications, accelerated virtual I/O (AVIO) for networking on Windows and Linux guests, support for ignite and VxVM backing stores.
Version 4.2, released March 2010, supports encryptio |
https://en.wikipedia.org/wiki/Fixation%20reflex | The fixation reflex is that concerned with attracting the eye on a peripheral object. For example, when a light shines in the periphery, the eyes shift gaze on it. It is controlled by the occipital lobe of the cerebral cortex, corroborated by three main tests:
Removal of cortex causes shutdown of this reflex
Drawing a figure on the cortex surface will cause eye movements in the direction traveled
Detecting an image by recording the actual signals from the eyes
Older research declares that a motor pathway from the occipital cortex to the brainstem motor neurons was via the superior colliculi. This is the case in lower animals, but in humans, the theory that eye-muscle nuclei aside from the superior colliculi of the midbrain is now generally held.
When an object is focused directly at an object but the eyes drift off their target, the fixation reflex keeps the eyes focused on the original object, albeit moving itself.
See also
Nystagmus
Saccade
Bibliography
"eye, human."Encyclopædia Britannica. 2008. Encyclopædia Britannica 2006 Ultimate Reference Suite DVD
Reflexes
Vision |
https://en.wikipedia.org/wiki/Neighbourhood%20unit | Generally the concept of the neighborhood unit, crystallised from the prevailing social and intellectual attitudes of the early 1900s by Clarence Perry, is an early diagrammatic planning model for residential development in metropolitan areas. It was designed by Perry to act as a framework for urban planners attempting to design functional, self-contained and desirable neighbourhoods in the early 20th century in industrialising cities. It continues to be utilised (albeit in progressive and adapted ways, such as in New Urbanism), as a means of ordering and organising new residential communities in a way which satisfies contemporary "social, administrative and service requirements for satisfactory urban existence".
History
Clarence Perry's conceptualisation of the neighbourhood unit evolved out of an earlier idea of his, to provide a planning formula for the arrangement and distribution of playgrounds in the New York region. The necessity for a formula such as this was attributed to the rise of the automobile in the early 20th century. During a period where road sense had not yet amalgamated with the social conscious, and many of the urban tools we now use to manage the threat posed by vehicular traffic did not exist, or were not in abundance (such as pedestrian crossings, traffic lights and road signs), developing cities such as New York, which embraced the motor car, suffered street fatality rates in excess of one child a day.
Perry conceived of neighbourhoods in this time period as islands locked amidst a burgeoning sea of vehicular traffic, a dangerous obstacle which prevented children (and adults) from safely walking to nearby playgrounds and amenities. Perry's neighbourhood unit concept began as a means of combating this obstacle. Ultimately, however, it evolved to serve a much broader purpose, of providing a discernible identity for the concept of the "neighborhood", and of offering to designers a framework for disseminating the city into smaller subareas (su |
https://en.wikipedia.org/wiki/Pearson%E2%80%93Anson%20effect | The Pearson–Anson effect, discovered in 1922 by Stephen Oswald Pearson and Horatio Saint George Anson, is the phenomenon of an oscillating electric voltage produced by a neon bulb connected across a capacitor, when a direct current is applied through a resistor. This circuit, now called the Pearson-Anson oscillator, neon lamp oscillator, or sawtooth oscillator, is one of the simplest types of relaxation oscillator. It generates a sawtooth output waveform. It has been used in low frequency applications such as blinking warning lights, stroboscopes, tone generators in electronic organs and other electronic music circuits, and in time bases and deflection circuits of early cathode-ray tube oscilloscopes. Since the development of microelectronics, these simple negative resistance oscillators have been superseded in many applications by more flexible semiconductor relaxation oscillators such as the 555 timer IC.
Neon bulb as a switching device
A neon bulb, often used as an indicator lamp in appliances, consists of a glass bulb containing two electrodes, separated by an inert gas such as neon at low pressure. Its nonlinear current-voltage characteristics (diagram below) allow it to function as a switching device.
When a voltage is applied across the electrodes, the gas conducts almost no electric current until a threshold voltage is reached (point b), called the firing or breakdown voltage, Vb. At this voltage electrons in the gas are accelerated to a high enough speed to knock other electrons off gas atoms, which go on to knock off more electrons in a chain reaction. The gas in the bulb ionizes, starting a glow discharge, and its resistance drops to a low value. In its conducting state the current through the bulb is limited only by the external circuit. The voltage across the bulb drops to a lower voltage called the maintaining voltage Vm. The bulb will continue to conduct current until the applied voltage drops below the extinction voltage Ve (point d), w |
https://en.wikipedia.org/wiki/EE%20Times | EE Times (Electronic Engineering Times) is an electronics industry magazine published in the United States since 1972. EE Times is currently owned by AspenCore, a division of Arrow Electronics since August 2016.
Since its acquisition by AspenCore, EE Times has seen major editorial and publishing technology investment and a renewed emphasis on investigative coverage. New features include The Dispatch, which profiles frontline engineers and unpacks real-life design problems and their solutions in technical yet conversational reporting.
Ownership and status
EE Times was launched in 1972 by Gerard G. Leeds of CMP Publications Inc. In 1999, the Leeds family sold CMP to United Business Media for $900 million. After 2000, EE Times moved more into web publishing. The shift in advertising from print to online began to accelerate in 2007, and the periodical shed staff to adjust to the downturn in revenue.
In July 2013, the digital edition migrated to UBM TechWeb's DeusM community platform.
On June 3, 2016, UBM announced that EE Times, along with the rest of its electronics media portfolio (EDN, Embedded.com, TechOnline, and Datasheets.com), was being sold to AspenCore Media, a company owned by Arrow Electronics, for $23.5 million. The acquisition was completed on August 1, 2016.
Availability
EE Times is free for qualified design engineers, managers, and business and corporate management in the electronics industry. It is also available online; the EE Times website offers news, columns, and features articles for semiconductor manufacturing, communications, electronic design automation, electronic engineering, technology, and products. In November 2012, UBM Electronics announced that the December 2012 issue of EE Times would be the last in print. In 2013, EE Times will be an online product only.
In 2018, EE Times rolled out a refreshed website, resurrected its print edition in Europe, and launched a new radio show, EE Times On Air, available an hour after the live br |
https://en.wikipedia.org/wiki/Clone%20tool | The clone tool, as it is known in Adobe Photoshop, Inkscape, GIMP, and Corel PhotoPaint, is used in digital image editing to replace information for one part of a picture with information from another part. In other image editing software, its equivalent is sometimes called a rubber stamp tool or a clone brush.
Applications
A typical use for the tool is in – more colloquially, "airbrushing" or "photoshopping" out an unwanted part of the image.
If a part of an image is removed simply by cutting it out, then a hole is left in the background. The Clone tool can fill in this hole convincingly with a copy of the existing background from elsewhere in the image.
A common use for this tool is to retouch skin, particularly in portraits, to remove blemishes and make skin tones more even. Cloning can also be used to remove other unwanted elements, such as telephone wires, an unwanted bird in the sky, and the like.
A more automated method of object removal uses texture synthesis to fill in gaps. Of these, patch-based texture synthesis or "image quilting" is essentially an automated application of the clone tool, choosing the optimal source area so as to patch over with a minimal seam.
In some cases, the undesired object is mixed with the remainder of the image, and a simple circular brush, even with feathering, would not work. For these cases, some programs allow an object to be selected by color/outline so other areas are not affected. Other programs allow edge/color sensitive brushes to deal with such objects.
Healing tool
A similar tool is the healing tool, which occurs in variants such as the healing brush or spot healing tool. These incorporate the existing texture, rather than painting it over.
See also
Inpainting
Seam carving |
https://en.wikipedia.org/wiki/Rise%20over%20thermal | In wireless communication systems, the rise over thermal (ROT) indicates the ratio between the total interference received on a base station and the thermal noise.
The ROT is a measurement of congestion of a cellular telephone network. The acceptable level of ROT is often used to define the capacity of systems using CDMA (code-division multiple access). |
https://en.wikipedia.org/wiki/Agence%20nationale%20de%20s%C3%A9curit%C3%A9%20du%20m%C3%A9dicament%20et%20des%20produits%20de%20sant%C3%A9 | Agence nationale de sécurité du médicament et des produits de santé (ANSM) superseded the tasks and duties of Agence française de sécurité sanitaire des produits de santé (AFSSAPS) on 1 May 2012. It is responsible for assessing the benefits and risks associated with the use of drugs and other medical products throughout their life-cycle. ANSM assesses the safety, efficacy and quality of these products and must balance patient safety with access to novel therapies.
Agence française de sécurité sanitaire des produits de santé
The Agence française de sécurité sanitaire des produits de santé (French Agency for the Safety of Health Products), often abbreviated AFSSAPS or AFSSaPS, was a French government agency whose main mission was to assess health risks posed by health products intended for human consumption, particularly pharmaceutical drugs. It was responsible for issuing permits for marketing approval and became the single French authority in the regulation of biomedical research.
The agency was last headed by Dominique Maraninchi and had about 1,000 employees plus 2,000 associated experts. Its budget amounted to approximately 157 million euros, with the bulk of revenue came from taxes and charges levied on the activity of the pharmaceutical industry.
History
The Medicines Agency was created by law no. 93-5 of January 4, 1993 and decree no. 93-265 of March 8, 1993, notably following the contaminated blood affair. It became operational in April 1993, then the structure and organization of the agency were approved by the French government on September 2, 1993.
Health data, publications
A list of 77 monitored drugs was published in 2011.
In mid-December 2014, Health Insurance posted on www.data.gouv.fr 112 sets of open data, certified health data relating to the supply and consumption of healthcare in France, in order to improve transparency. drug prescription, traceability of active ingredients and their date of marketing.
In September 2018, the ANSM prevente |
https://en.wikipedia.org/wiki/Purity%20%28quantum%20mechanics%29 | In quantum mechanics, and especially quantum information theory, the purity of a normalized quantum state is a scalar defined as
where is the density matrix of the state and is the trace operation. The purity defines a measure on quantum states, giving information on how much a state is mixed.
Mathematical properties
The purity of a normalized quantum state satisfies , where is the dimension of the Hilbert space upon which the state is defined. The upper bound is obtained by and (see trace).
If is a projection, which defines a pure state, then the upper bound is saturated: (see Projections). The lower bound is obtained by the completely mixed state, represented by the matrix .
The purity of a quantum state is conserved under unitary transformations acting on the density matrix in the form , where is a unitary matrix. Specifically, it is conserved under the time evolution operator , where is the Hamiltonian operator.
Physical meaning
A pure quantum state can be represented as a single vector in the Hilbert space. In the density matrix formulation, a pure state is represented by the matrix
However, a mixed state cannot be represented this way, and instead is represented by a convex combination of pure states
while for normalization. The purity parameter is related to the coefficients: If only one coefficient is equal to 1, the state is pure. Indeed, the purity is when the state is completely mixed, i.e.
where are orthonormal vectors that constitute a basis of the Hilbert space.
Geometrical representation
On the Bloch sphere, pure states are represented by a point on the surface of the sphere, whereas mixed states are represented by an interior point. Thus, the purity of a state can be visualized as the degree to which the point is close to the surface of the sphere.
For example, the completely mixed state of a single qubit is represented by the center of the sphere, by symmetry.
A graphical intuition of purity may be gained by looking at |
https://en.wikipedia.org/wiki/Admission%20control | Admission control is a validation process in communication systems where a check is performed before a connection is established to see if current resources are sufficient for the proposed connection.
Applications
For some applications, dedicated resources (such as a wavelength across an optical network) may be needed in which case admission control has to verify availability of such resources before a request can be admitted.
For more elastic applications, a total volume of resources may be needed prior to some deadline in order to satisfy a new request, in which case admission control needs to verify availability of resources at the time and perform scheduling to guarantee satisfaction of an admitted request.
Admission control systems
Asynchronous Transfer Mode
Audio Video Bridging using Stream Reservation Protocol
Call admission control
IEEE 1394
Integrated services on IP networks
Public switched telephone network |
https://en.wikipedia.org/wiki/Plate%20detector%20%28radio%29 | In electronics, a plate detector (anode bend detector, grid bias detector) is a vacuum tube circuit in which an amplifying tube having a control grid is operated in a non-linear region of its grid voltage versus plate current transfer characteristic, usually near plate current cutoff, to demodulate amplitude modulated carrier signal. This differs from the grid leak detector, which utilizes the non-linearity of the grid voltage versus grid current characteristic for demodulation. It also differs from the diode detector, which is a two-terminal device.
History
Plate detector circuits were most commonly used from the 1920s until the start of World War II. In 1927, the advent of screen grid tubes permitted much more radio frequency amplification before the detector stage than previously practically possible. The previously used grid leak detector was less suited to the higher radio frequency signal level than the plate detector. Diode detectors also became popular during the later 1920s because, unlike plate detector circuits, they could also provide automatic gain control voltage (A.V.C.) for the radio frequency amplifier stages of the receiver. However, the dual-diode/triode and dual-diode/pentode tubes commonly used for detection/A.V.C. circuits had bulk wholesale costs that were as much as twice the cost of the tubes commonly used as plate detectors. This made plate detector circuits more practical for low-priced radios sold during the depths of the Great Depression.
Operation
Negative bias is applied to the grid to bring the plate current almost to cutoff. The grid is connected directly to the secondary of a radio frequency or intermediate frequency transformer. An incoming signal will cause the plate current to increase much more during the positive 180 degrees of the carrier frequency cycle than it decreases during the negative 180 degrees. The plate current variation will include the original modulation frequencies. The plate current is passed through a pl |
https://en.wikipedia.org/wiki/Plantar%20tarsometatarsal%20ligaments | The plantar tarsometatarsal ligaments consist of longitudinal and oblique bands, disposed with less regularity than the dorsal ligaments.
Those for the first and second metatarsals are the strongest; the second and third metatarsals are joined by oblique bands to the first cuneiform; the fourth and fifth metatarsals are connected by a few fibers to the cuboid. |
https://en.wikipedia.org/wiki/TCP-Illinois | TCP-Illinois is a variant of TCP congestion control protocol, developed at the University of Illinois at Urbana–Champaign. It is especially targeted at high-speed, long-distance networks. A sender side modification to the standard TCP congestion control algorithm, it achieves a higher average throughput than the standard TCP, allocates the network resource fairly as the standard TCP, is compatible with the standard TCP, and provides incentives for TCP users to switch.
Principles of operation
TCP-Illinois is a loss-delay based algorithm, which uses packet loss as the primary congestion signal to determine the direction of window size change, and uses queuing delay as the secondary congestion signal to adjust the pace of window size change. Similarly to the standard TCP, TCP-Illinois increases the window size W by for each acknowledgment, and decreases by for each loss event. Unlike the standard TCP, and are not constants. Instead, they are functions of average queuing delay : , where is decreasing and is increasing.
There are numerous choices of and . One such class is:
We let and be continuous functions and thus , and . Suppose is the maximum average queuing delay and we denote , then we also have . From these conditions, we have
This specific choice is demonstrated in Figure 1.
Properties and Performance
TCP-Illinois increases the throughput much more quickly than TCP when congestion is far and increases the throughput very slowly when congestion is imminent. As a result, the window curve is concave and the average throughput achieved is much larger than the standard TCP, see Figure 2.
It also has many other desirable features, like fairness, compatibility with the standard TCP, providing incentive for TCP users to switch, robust against inaccurate delay measurement.
See also
H-TCP
BIC TCP
HSTCP
TCP
FAST TCP |
https://en.wikipedia.org/wiki/Mart%C3%ADn%20Berasategui | Martín Berasategui Olazábal is a Spanish chef expert in Basque cuisine and owner of an eponymous restaurant in Lasarte-Oria (Gipuzkoa), Spain. Since 2001 it has been awarded three Michelin stars. He holds twelve stars in total, more than any other Spanish chef.
Biography
At the age of 14, Berasategui began to work in his parents' restaurant, Bodegón Alejandro. When Berasategui began his culinary career, there were no Michelin star restaurants in the Basque Country. He was sent to France to train as a pastry chef when he was 17. At the age of 20 he took over his parents' restaurant, and earned his first Michelin star there by the age of 25.
Berasategui opened his eponymous restaurant in Lasarte-Oria (outside San Sebastián) in 1993. It was awarded a third Michelin star in the 2001 Michelin Guide. The restaurant was voted 29th-best restaurant in the world by Restaurant in both 2008 and 2011, the highest the restaurant has appeared on the list.
As of 2013, he holds more Michelin stars than any other Spanish chef. In addition to his three at Restaurante Martín Berasategui, he holds three at Restaurante Lasarte in Barcelona and another two at M.B. in Tenerife (the largest of the Canary Islands). His restaurant M.B. in the Ritz Carlton Abama resort in Tenerife gained its first Michelin star in the 2010 guide. He most recently received one Michelin star for Oria, the sister restaurant of Lasarte that is also located in the Monument Hotel in Barcelona. In addition to his four Michelin-starred restaurants, he owns a further six around the world including two in the Dominican Republic and one in Mexico, and is opening a further restaurant in Costa Rica in 2014.
It was announced in 2013 that the François Rabelais University would be awarding an honorary doctorate to Berasategui in culinary studies. It is the first time that the university has awarded honorary doctorates to chefs, with Mikuni Kiyomi, Philippe Rochat and Pierre Wynants also receiving the awards. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.