source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Langer%E2%80%93Giedion%20syndrome | Langer–Giedion syndrome (LGS) is a very uncommon autosomal dominant genetic disorder caused by a deletion of a small section of material on chromosome 8. It is named after the two doctors who undertook the main research into the condition in the 1960s. Diagnosis is usually made at birth or in early childhood.
Signs and symptoms
The features associated with this condition include: mild to moderate learning difficulties, short stature, unique facial features, small head and skeletal abnormalities including bony growths projecting from the surfaces of bones.
Craniofacial
Individuals with Langer–Giedion syndrome may display characteristic craniofacial abnormalities. These include a long prominent philtrum, a thin upper lip, wide spaced eyes, a bulbous nasal tip, a broad nasal bridge, wide nostrils, micrognathia, retrognathia, deep set eyes and large ears. The head itself is often unusually small in comparison to that of unaffected individuals of the same age and sex. Dental abnormalities, such as supernumerary central incisors and the absence of some teeth, may occur.
Muscoskeletal
Langer–Giedion syndrome causes cone shaped epiphyses of the phalanges of the hands and short fingers and toes. The fifth fingers are sometimes bent. Skeletal abnormalities not affecting the hands and feet may also occur. These include winged scapula, thin ribs and scoliosis. In addition, individuals with Langer–Giedion syndrome may develop hip problems similar to those seen in Legg–Calvé–Perthes disease such as progressive degeneration of the head of the thigh bone.
As affected individuals age they often develop benign boney growths called exostoses which project off the surfaces of the bones. Depending on the location of the exostoses they cause numerous complications such as compression of the spinal cord, asymmetric growth of the limbs and reduced mobility.
Langer–Giedion syndrome initially causes joint hypermobility. This progresses to joint stiffness later in life when osteocho |
https://en.wikipedia.org/wiki/Ezio%20Auditore%20da%20Firenze | Ezio Auditore da Firenze () is a fictional character in the video game series Assassin's Creed, an Italian Master Assassin who serves as the protagonist of the series' games set during the Italian Renaissance. His life and career as an Assassin are chronicled in Assassin's Creed II, II: Discovery (both 2009), Brotherhood (2010), and Revelations (2011), as well as the short films Assassin's Creed: Lineage (2009), Ascendance (2010), and Embers (2011) and various spin-off media of the franchise. In 2016, all three major games featuring Ezio, as well as Lineage and Embers, were re-released as an enhanced bundle titled Assassin's Creed: The Ezio Collection. Throughout most of his appearances, the character has been voiced by American actor Roger Craig Smith, while Canadian actor Devon Bostick portrayed him in live-action in Lineage.
Within the series' alternate historical setting, Ezio was born into Italian nobility from Florence in 1459. His family had long been loyal to the Assassin Brotherhood, a secret organization inspired by the real-life Order of Assassins dedicated to safeguarding peace and freedom, though Ezio did not learn about his Assassin heritage until his late teens, after most of his immediate kin was executed during the Pazzi conspiracy. His quest to track down those responsible sets him up against the Templar Order, the Assassins' mortal enemies, led locally by the House of Borgia. Spending decades to fight Rodrigo and Cesare Borgia and their henchmen, Ezio is eventually successful in restoring the Assassins to prominence in Italy, and becomes their Mentor in 1503. His further adventures lead him to Spain and the Ottoman Empire, where he again proves to be essential in helping the local Assassins overcome Templar threats. Following his retirement from the Brotherhood, Ezio settles down in Tuscany with his family, eventually dying from a heart attack in Florence in 1524.
The character has received critical acclaim and is often named among the greatest |
https://en.wikipedia.org/wiki/Zoology%20Building | The Zoology Building is a facility owned by the University of Aberdeen. It is situated in Tillydrone.
History
During construction, the building collapsed on 1 November 1966. It had been expected to be completed by summer 1967. Eight people were trapped, of which five died. Clearing of the site started in February 1967, and was completed in April.
The present building was constructed on the same plot as the previous building and is of a similar design. Plans were approved in September 1967. The present building opened in 1970.
Zoology Museum
The building contains the Zoology Museum. It holds various exhibits from the university's collections. Specimens range in age from the 1840s to the late 1970s. The only known egg from the Jerdon's courser was discovered in an uncatalogued drawer in the museum. The discovery was confirmed with DNA testing.
The building was also featured in Tetris depicting a Soviet Russian government building. |
https://en.wikipedia.org/wiki/Hypertriton | A hypertriton is a type of hypernucleus, formed of a proton, a neutron and any hyperon. The name comes from hyperon, which refers to baryons containing strange quarks, and triton, which refers to the nucleus of tritium. Because low-mass hyperons are longer-lived and easier to create than high-mass hyperons, the most common hypertritons are those containing Lambda baryons – H.
Its antiparticle, the antihypertriton, is formed of an antiproton, an antineutron and any antihyperon. The first one was discovered in March 2010 by the STAR detector of the Relativistic Heavy Ion Collider (RHIC) at Brookhaven National Laboratory. |
https://en.wikipedia.org/wiki/LDMOS | LDMOS (laterally-diffused metal-oxide semiconductor) is a planar double-diffused MOSFET (metal–oxide–semiconductor field-effect transistor) used in amplifiers, including microwave power amplifiers, RF power amplifiers and audio power amplifiers. These transistors are often fabricated on p/p+ silicon epitaxial layers. The fabrication of LDMOS devices mostly involves various ion-implantation and subsequent annealing cycles. As an example, the drift region of this power MOSFET is fabricated using up to three ion implantation sequences in order to achieve the appropriate doping profile needed to withstand high electric fields.
The silicon-based RF LDMOS (radio-frequency LDMOS) is the most widely used RF power amplifier in mobile networks, enabling the majority of the world's cellular voice and data traffic. LDMOS devices are widely used in RF power amplifiers for base-stations as the requirement is for high output power with a corresponding drain to source breakdown voltage usually above 60 volts. Compared to other devices such as GaAs FETs they show a lower maximum power gain frequency.
Manufacturers of LDMOS devices and foundries offering LDMOS technologies include TSMC, LFoundry, Tower Semiconductor, SAMSUNG, GLOBALFOUNDRIES, Vanguard International Semiconductor Corporation, STMicroelectronics, Infineon Technologies, RFMD, NXP Semiconductors (including former Freescale Semiconductor), SMIC, MK Semiconductors, Polyfet and Ampleon.
Photo Gallery
Applications
Common applications of LDMOS technology include the following.
Amplifiers — RF power amplifiers, audio power amplifiers, class AB
Audio technology — loudspeakers, high-fidelity (hi-fi) equipment, public announcement (PA) systems
Mobile devices — mobile phones
Mobile networks — base stations and RF amplifiers
Pulse applications
Radio-frequency (RF) technology — RF engineering (RF engineering), RF power amplifiers
Wireless technology — wireless networks and digital networks
RF LDMOS
Common applications of RF |
https://en.wikipedia.org/wiki/Basement | A basement or cellar is one or more floors of a building that are completely or partly below the ground floor. It generally is used as a utility space for a building, where such items as the furnace, water heater, breaker panel or fuse box, car park, and air-conditioning system are located; so also are amenities such as the electrical system and cable television distribution point. In cities with high property prices, such as London, basements are often fitted out to a high standard and used as living space.
In British English, the word basement is usually used for underground floors of, for example, department stores. The word is usually used with houses when the space below the ground floor is habitable, with windows and (usually) its own access. The word cellar applies to the whole underground level or to any large underground room. A subcellar or subbasement is a cellar that lies further underneath.
Purpose, geography, and history
A basement can be used in almost exactly the same manner as an additional above-ground floor of a house or other building. However, the use of basements depends largely on factors specific to a particular geographical area such as climate, soil, seismic activity, building technology, and real estate economics.
Basements in small buildings such as single-family detached houses are rare in wet climates such as Great Britain and Ireland where flooding can be a problem, though they may be used in larger structures. However, basements are considered standard on all but the smallest new buildings in many places with temperate continental climates such as the American Midwest and the Canadian Prairies where a concrete foundation below the frost line is needed in any case, to prevent a building from shifting during the freeze-thaw cycle. Basements are much easier to construct in areas with relatively soft soils and may be avoided in places where the soil is too compact for easy excavation. Their use may be restricted in earthquake zones, be |
https://en.wikipedia.org/wiki/TreapDB | TreapDB is a kind of NoSQL data store, and it is based on Treap data structure. Treap is a randomized balanced search tree, which has O(log(n)) complexity to insert or find a key. TreapDB supports many operations besides "get" and "set". For example, "prefix foo" fetch all the pairs whose key startswith "foo". TreapDB can be used in two ways: embedded library or standalone server.
TreapDB is sponsored by Sino-German Joint Laboratory of Software Integration. |
https://en.wikipedia.org/wiki/Axiom | An axiom, postulate, or assumption is a statement that is taken to be true, to serve as a premise or starting point for further reasoning and arguments. The word comes from the Ancient Greek word (), meaning 'that which is thought worthy or fit' or 'that which commends itself as evident'.
The precise definition varies across fields of study. In classic philosophy, an axiom is a statement that is so evident or well-established, that it is accepted without controversy or question. In modern logic, an axiom is a premise or starting point for reasoning.
In mathematics, an axiom may be a "logical axiom" or a "non-logical axiom". Logical axioms are taken to be true within the system of logic they define and are often shown in symbolic form (e.g., (A and B) implies A), while non-logical axioms (e.g., ) are substantive assertions about the elements of the domain of a specific mathematical theory, such as arithmetic.
Non-logical axioms may also be called "postulates" or "assumptions". In most cases, a non-logical axiom is simply a formal logical expression used in deduction to build a mathematical theory, and might or might not be self-evident in nature (e.g., the parallel postulate in Euclidean geometry). To axiomatize a system of knowledge is to show that its claims can be derived from a small, well-understood set of sentences (the axioms), and there are typically many ways to axiomatize a given mathematical domain.
Any axiom is a statement that serves as a starting point from which other statements are logically derived. Whether it is meaningful (and, if so, what it means) for an axiom to be "true" is a subject of debate in the philosophy of mathematics.
Etymology
The word axiom comes from the Greek word (axíōma), a verbal noun from the verb (axioein), meaning "to deem worthy", but also "to require", which in turn comes from (áxios), meaning "being in balance", and hence "having (the same) value (as)", "worthy", "proper". Among the ancient Greek philosophers an a |
https://en.wikipedia.org/wiki/Mutation%20breeding | Mutation breeding, sometimes referred to as "variation breeding", is the process of exposing seeds to chemicals, radiation, or enzymes in order to generate mutants with desirable traits to be bred with other cultivars. Plants created using mutagenesis are sometimes called mutagenic plants or mutagenic seeds.
From 1930 to 2014 more than 3200 mutagenic plant varieties were released that have been derived either as direct mutants (70%) or from their progeny (30%). Crop plants account for 75% of released mutagenic species with the remaining 25% ornamentals or decorative plants. However, although the FAO/IAEA reported in 2014 that over 1,000 mutant varieties of major staple crops were being grown worldwide, it is unclear how many of these varieties are currently used in agriculture or horticulture around the world, as these seeds are not always identified or labeled as having a mutagenic provenance.
History
According to garden historian Paige Johnson:
Processes
There are different kinds of mutagenic breeding such as using chemical mutagens like ethyl methanesulfonate and dimethyl sulfate, radiation or transposons to generate mutants. Mutation breeding is commonly used to produce traits in crops such as larger seeds, new colors, or sweeter fruits, that either cannot be found in nature or have been lost during evolution.
Radiation
Exposing plants to radiation is sometimes called radiation breeding and is a sub class of mutagenic breeding. Radiation breeding was discovered in the 1920s when Lewis Stadler of the University of Missouri used X-rays on maize and barley. In the case of barley, the resulting plants were white, yellow, pale yellow and some had white stripes. In 1928, Stadler first published his findings on radiation-induced mutagenesis in plants. During the period 1930–2004, radiation-induced mutant varieties were developed primarily using gamma rays (64%) and X-rays (22%).
Radiation breeding may take place in atomic gardens; and seeds have been sent |
https://en.wikipedia.org/wiki/Propositional%20function | In propositional calculus, a propositional function or a predicate is a sentence expressed in a way that would assume the value of true or false, except that within the sentence there is a variable (x) that is not defined or specified (thus being a free variable), which leaves the statement undetermined. The sentence may contain several such variables (e.g. n variables, in which case the function takes n arguments).
Overview
As a mathematical function, A(x) or A(x, x, ..., x), the propositional function is abstracted from predicates or propositional forms. As an example, consider the predicate scheme, "x is hot". The substitution of any entity for x will produce a specific proposition that can be described as either true or false, even though "x is hot" on its own has no value as either a true or false statement. However, when a value is assigned to x , such as lava, the function then has the value true; while one assigns to x a value like ice, the function then has the value false.
Propositional functions are useful in set theory for the formation of sets. For example, in 1903 Bertrand Russell wrote in The Principles of Mathematics (page 106):
"...it has become necessary to take propositional function as a primitive notion.
Later Russell examined the problem of whether propositional functions were predicative or not, and he proposed two theories to try to get at this question: the zig-zag theory and the ramified theory of types.
A Propositional Function, or a predicate, in a variable x is an open formula p(x) involving x that becomes a proposition when one gives x a definite value from the set of values it can take.
According to Clarence Lewis, "A proposition is any expression which is either true or false; a propositional function is an expression, containing one or more variables, which becomes a proposition when each of the variables is replaced by some one of its values from a discourse domain of individuals." Lewis used the notion of propositional func |
https://en.wikipedia.org/wiki/Oxaloacetic%20acid | Oxaloacetic acid (also known as oxalacetic acid or OAA) is a crystalline organic compound with the chemical formula HO2CC(O)CH2CO2H. Oxaloacetic acid, in the form of its conjugate base oxaloacetate, is a metabolic intermediate in many processes that occur in animals. It takes part in gluconeogenesis, the urea cycle, the glyoxylate cycle, amino acid synthesis, fatty acid synthesis and the citric acid cycle.
Properties
Oxaloacetic acid undergoes successive deprotonations to give the dianion:
HO2CC(O)CH2CO2H −O2CC(O)CH2CO2H + H+, pKa = 2.22
−O2CC(O)CH2CO2H −O2CC(O)CH2CO2− + H+, pKa = 3.89
At high pH, the enolizable proton is ionized:
−O2CC(O)CH2CO2− −O2CC(O−)CHCO2− + H+, pKa = 13.03
The enol forms of oxaloacetic acid are particularly stable. Keto-enol tautomerization is catalyzed by the enzyme oxaloacetate tautomerase. trans-Enol-oxaloacetate also appears when tartrate is the substrate for fumarase.
Biosynthesis
Oxaloacetate forms in several ways in nature. A principal route is upon oxidation of L-malate, catalyzed by malate dehydrogenase, in the citric acid cycle. Malate is also oxidized by succinate dehydrogenase in a slow reaction with the initial product being enol-oxaloacetate.
It also arises from the condensation of pyruvate with carbonic acid, driven by the hydrolysis of ATP:
CH3C(O)CO2− + HCO3− + ATP → −O2CCH2C(O)CO2− + ADP + Pi
Occurring in the mesophyll of plants, this process proceeds via phosphoenolpyruvate, catalysed by phosphoenolpyruvate carboxylase. Oxaloacetate can also arise from trans- or de- amination of aspartic acid.
Biochemical functions
Oxaloacetate is an intermediate of the citric acid cycle, where it reacts with acetyl-CoA to form citrate, catalyzed by citrate synthase. It is also involved in gluconeogenesis, the urea cycle, the glyoxylate cycle, amino acid synthesis, and fatty acid synthesis. Oxaloacetate is also a potent inhibitor of complex II.
Gluconeogenesis
Gluconeogenesis is a metabolic pathway |
https://en.wikipedia.org/wiki/Progress%20in%20Biophysics%20and%20Molecular%20Biology | Progress in Biophysics and Molecular Biology is a peer-reviewed scientific journal publishing review articles in the fields of biophysics and molecular biology. It was established in 1950 as Progress in Biophysics and Biophysical Chemistry, obtaining its current title in 1963.
It is published by Elsevier and the editors-in-chief are Denis Noble (University of Oxford), Tom Blundell (University of Cambridge), and Delphine Dean (Clemson University). According to the Journal Citation Reports, the journal has a 2020 impact factor of 3.667, and a CiteScore of 5.8.
History
First published in 1950, under the title Progress in Biophysics and Biophysical Chemistry, its original format was as a hardback book issued annually containing specialist reviews of important papers in the various different fields. Its multi-disciplinary coverage spanning biological and physical science disciplines was novel at that time, anticipating a trend that developed over the following decades. It was well regarded from the publication of the first edition, with one reviewer describing it as "refreshingly different", and recommended "for advanced students who want a comprehensive review of various phases of biophysics, biophysical chemistry, physiology, and the theoretical basis of specialized experimental techniques".
The founding editors were physicist Sir John Randall and the biochemist John Alfred Valentine Butler. Both had been closely involved with early work on the structure of DNA, Butler in early identification of the histone action in the inhibiting of DNA template action at the Chester Beatty Institute of the University of London, and Randall as director of the King's College London lab where Maurice Wilkes and Rosalind Franklin performed their experiments to determine the helical structure of DNA. The first volume included topics including the novel technique of X-ray crystallography of protein molecules, and the mechanical and thermal properties of muscle fibre operation.
When R |
https://en.wikipedia.org/wiki/Sarcomere | A sarcomere (Greek σάρξ sarx "flesh", μέρος meros "part") is the smallest functional unit of striated muscle tissue. It is the repeating unit between two Z-lines. Skeletal muscles are composed of tubular muscle cells (called muscle fibers or myofibers) which are formed during embryonic myogenesis. Muscle fibers contain numerous tubular myofibrils. Myofibrils are composed of repeating sections of sarcomeres, which appear under the microscope as alternating dark and light bands. Sarcomeres are composed of long, fibrous proteins as filaments that slide past each other when a muscle contracts or relaxes. The costamere is a different component that connects the sarcomere to the sarcolemma.
Two of the important proteins are myosin, which forms the thick filament, and actin, which forms the thin filament. Myosin has a long, fibrous tail and a globular head, which binds to actin. The myosin head also binds to ATP, which is the source of energy for muscle movement. Myosin can only bind to actin when the binding sites on actin are exposed by calcium ions.
Actin molecules are bound to the Z-line, which forms the borders of the sarcomere. Other bands appear when the sarcomere is relaxed.
The myofibrils of smooth muscle cells are not arranged into sarcomeres.
Bands
The sarcomeres give skeletal and cardiac muscle their striated appearance, which was first described by Van Leeuwenhoek.
A sarcomere is defined as the segment between two neighbouring Z-lines (or Z-discs). In electron micrographs of cross-striated muscle, the Z-line (from the German "zwischen" meaning between) appears in between the I-bands as a dark line that anchors the actin myofilaments.
Surrounding the Z-line is the region of the I-band (for isotropic). I-band is the zone of thin filaments that is not superimposed by thick filaments (myosin).
Following the I-band is the A-band (for anisotropic). Named for their properties under a polarized light microscope. An A-band contains the entire length of a si |
https://en.wikipedia.org/wiki/Beta%20hairpin | The beta hairpin (sometimes also called beta-ribbon or beta-beta unit) is a simple protein structural motif involving two beta strands that look like a hairpin. The motif consists of two strands that are adjacent in primary structure, oriented in an antiparallel direction (the N-terminus of one sheet is adjacent to the C-terminus of the next), and linked by a short loop of two to five amino acids. Beta hairpins can occur in isolation or as part of a series of hydrogen bonded strands that collectively comprise a beta sheet.
Researchers such as Francisco Blanco et al. have used protein NMR to show that beta-hairpins can be formed from isolated short peptides in aqueous solution, suggesting that hairpins could form nucleation sites for protein folding.
Classification
Beta hairpins were originally categorized solely by the number of amino acid residues in their loop sequences, such that they were named one-residue, two-residue, etc. This system, however, is somewhat ambiguous as it does not take into account whether the residues that signal the end of the hairpin are singly or doubly hydrogen bonded to one another. An improved means of classification has since been proposed by Milner-White and Poet. Beta hairpins are broken into four distinct classes as depicted in the publication's Figure 1. Each class begins with the smallest possible number of loop residues and progressively increases the loop size by removing hydrogen bonds in the beta sheet. The primary hairpin of class 1 is a one-residue loop where the bound residues share two hydrogen bonds. One hydrogen bond is then removed to create a three-residue loop, which is the secondary hairpin of class 1. Singly bound residues are counted in the loop sequence but also signal the end of the loop, thus defining this hairpin as a three-residue loop. This single hydrogen bond is then removed to create the tertiary hairpin; a five-residue loop with doubly bound residues. This pattern continues indefinitely and defines all |
https://en.wikipedia.org/wiki/Digital%20encoding%20of%20APL%20symbols | The programming language APL uses a number of symbols, rather than words from natural language, to identify operations, similarly to mathematical symbols. Prior to the wide adoption of Unicode, a number of special-purpose EBCDIC and non-EBCDIC code pages were used to represent the symbols required for writing APL.
Character sets
Due to its origins on IBM Selectric-based teleprinters, APL symbols have traditionally been represented on the wire using a unique, non-standard character set. In the 1960s and 1970s, few terminal devices existed which could reproduce them, the most popular ones being the IBM 2741 and IBM 1050 fitted with a specific APL print head. Over time, with the universal use of high-quality graphic display, printing devices and Unicode support, the APL character font problem has largely been eliminated.
Character repertoire
IBM assigns the following character IDs (GCGIDs) to APL syntax, which are used in the definitions of its code pages.
EBCDIC code pages
Code page 293
Code page 293 (CCSID 293), called "APL (USA)", is an EBCDIC code page which includes APL symbols, in addition to preserving the basic Latin letters and Western Arabic numerals at their usual EBCDIC locations.
Code page 310
Code page 310 ("Graphic Escape APL/TN") includes a larger gamut of symbols, but does not itself include the basic Latin letters or the basic digits. It is used alongside Code page 37-2, with the Code page 310 codes being prefixed by the Graphic Escape (EBCDIC 0x08) control character.
Code page 351
Code page 351 ("GDDM Default (USA)") contains most of the characters of Code page 293 and Code page 310 (except ⍷, epsilon with underline) in addition to the letters and digits, by replacing several control characters with symbols.
7-bit modified ASCII
Code page 371 (IR-68)
Code page 371, registered for use with ISO/IEC 2022 as ISO-IR-68, is a 7-bit heavily modified ASCII, designed by the APL Working Group of the Canadian Standards Association, intended for use wit |
https://en.wikipedia.org/wiki/Large%20deformation%20diffeomorphic%20metric%20mapping | Large deformation diffeomorphic metric mapping (LDDMM) is a specific suite of algorithms used for diffeomorphic mapping and manipulating dense imagery based on diffeomorphic metric mapping within the academic discipline of computational anatomy, to be distinguished from its precursor based on diffeomorphic mapping. The distinction between the two is that diffeomorphic metric maps satisfy the property that the length associated to their flow away from the identity induces a metric on the group of diffeomorphisms, which in turn induces a metric on the orbit of shapes and forms within the field of Computational Anatomy. The study of shapes and forms with the metric of diffeomorphic metric mapping is called diffeomorphometry.
A diffeomorphic mapping system is a system designed to map, manipulate, and transfer information which is stored in many types of spatially distributed medical imagery.
Diffeomorphic mapping is the underlying technology for mapping and analyzing information measured in human anatomical coordinate systems which have been measured via Medical imaging. Diffeomorphic mapping is a broad term that actually refers to a number of different algorithms, processes, and methods. It is attached to many operations and has many applications for analysis and visualization. Diffeomorphic mapping can be used to relate various sources of information which are indexed as a function of spatial position as the key index variable. Diffeomorphisms are by their Latin root structure preserving transformations, which are in turn differentiable and therefore smooth, allowing for the calculation of metric based quantities such as arc length and surface areas. Spatial location and extents in human anatomical coordinate systems can be recorded via a variety of Medical imaging modalities, generally termed multi-modal medical imagery, providing either scalar and or vector quantities at each spatial location. Examples are scalar T1 or T2 magnetic resonance imagery, or as 3x3 di |
https://en.wikipedia.org/wiki/Virginia%20Coast%20Reserve%20Long-Term%20Ecological%20Research | The Virginia Coast Reserve Long-Term Ecological Research (VCR/LTER) project is funded by the National Science Foundation. The VCR/LTER project's research activities focus on the mosaic of transitions and steady-state systems that comprise the barrier-island/lagoon/mainland landscape of the Eastern Shore of Virginia. Research is conducted in mainland marshes, the lagoon system behind the barrier islands, and on the islands themselves, particularly Hog Island. The VCR/LTER began operation in 1987. It initially focused on geophysical controls (e.g., storms) on coastal ecosystems. In 1992-1994 it broadened that focus to address the concept of ecological state change, which was linked in 1994-2000 to relationships between free surfaces (land, sea, freshwater table). More recent work (2000-2006), added a hypsometric perspective, which provides an alternate way of examining ecological patterns on the coastal landscape. It makes extensive use of the Virginia Coast Reserve of The Nature Conservancy.
The VCR/LTER is a member of the Long Term Ecological Research Network, and is administered by the Department of Environmental Sciences of the University of Virginia. Its field research headquarters is at the Anheuser-Busch Coastal Research Center of the University of Virginia in Oyster, Virginia. The research site received new funding from the National Science Foundation in 2018 which will allow the research team of Karen McGlathery, Michael Pace, Patricia Wiberg, John Porter, and to continue research projects into the impact of climate change on coastal barrier oceans. |
https://en.wikipedia.org/wiki/Quadratic%20Fourier%20transform | In mathematical physics and harmonic analysis, the quadratic Fourier transform is an integral transform that generalizes the fractional Fourier transform, which in turn generalizes the Fourier transform.
Roughly speaking, the Fourier transform corresponds to a change of variables from time to frequency (in the context of harmonic analysis) or from position to momentum (in the context of quantum mechanics). In phase space, this is a 90 degree rotation. The fractional Fourier transform generalizes this to any angle rotation, giving a smooth mixture of time and frequency, or of position and momentum. The quadratic Fourier transform extends this further to the group of all linear symplectic transformations in phase space (of which rotations are a subgroup).
More specifically, for every member of the metaplectic group (which is a double cover of the symplectic group) there is a corresponding quadratic Fourier transform. |
https://en.wikipedia.org/wiki/Circumcenter%20of%20mass | In geometry, the circumcenter of mass is a center associated with a polygon which shares many of the properties of the center of mass. More generally, the circumcenter of mass may be defined for simplicial polytopes and also in the spherical and hyperbolic geometries.
In the special case when the polytope is a quadrilateral or hexagon, the circumcenter of mass has been called the "quasicircumcenter" and has been used to define an Euler line of a quadrilateral. The circumcenter of mass allows us to define an Euler line for simplicial polytopes.
Definition in the plane
Let be an oriented polygon (with vertices counted countercyclically) in the plane with vertices and let be an arbitrary point not lying on the sides (or their extensions). Consider the triangulation of by the oriented triangles (the index is viewed modulo ). Associate with each of these triangles its circumcenter with weight equal to its oriented area (positive if its sequence of vertices is countercyclical; negative otherwise). The circumcenter of mass of is the center of mass of these weighted circumcenters. The result is independent of the choice of point .
Properties
In the special case when the polygon is cyclic, the circumcenter of mass coincides with the circumcenter.
The circumcenter of mass satisfies an analog of Archimedes' Lemma, which states that if a polygon is decomposed into two smaller polygons, then the circumcenter of mass of that polygon is a weighted sum of the circumcenters of mass of the two smaller polygons. As a consequence, any triangulation with nondegenerate triangles may be used to define the circumcenter of mass.
For an equilateral polygon, the circumcenter of mass and center of mass coincide. More generally, the circumcenter of mass and center of mass coincide for a simplicial polytope for which each face has the sum of squares of its edges a constant.
The circumcenter of mass is invariant under the operation of "recutting" of polygons. and the discrete bicyc |
https://en.wikipedia.org/wiki/Clostridium%20botulinum%20C3%20toxin | Clostridium botulinum C3 exoenzyme is a toxin that causes the addition of one or more ADP-ribose moieties to Rho-like proteins. Many bacterial toxins nucleotide-binding modify by ADP-ribosylation proteins involved in essential cell functions, leading to their toxic effects.
Action
The molecular basis of the action of these enzymes consists in binding of nicotinamide adenine dinucleotide (NAD), splitting NAD into its ADP-ribose and nicotinamide components, and transferring the ADP-ribose moiety to a specific residue on to a protein substrate, often of eukaryotic origin. All the toxins of this family share a highly conserved glutamate, which is the catalytic residue critical for the NAD-glycohydrolase activity. ADP-ribosyltransferase toxins have distinct substrate specificities and variable pathophysiological properties and can be subdivided into four subfamilies: diphtheria-like toxins, cholera-like toxins, binary toxins and C3-like exoenzymes.
C3-like exoenzymes unlike other ADP-ribosyltransferase toxins do not require a specific cell-surface binding translocation component for cell entry. Their specificity is for the small GTP-binding proteins RhoA, RhoB, and RhoC, which are ADP-ribosylated on an asparagine residue.
Bacterial toxins |
https://en.wikipedia.org/wiki/Sougwen%20Chung | Sougwen Chung (鍾愫君) is a Chinese-born, Canadian-raised artist residing in London. Chung's artistic practices are based on performance, drawing, still image, sculpture, and installation. Chung's work investigates mark-made-by-machine and mark-made-by-hand for understanding the encounter of computers and humans.
Early life
Chung grew up in Toronto, Canada, and Hong Kong. Their father, an opera singer, made sure that his children had experience with musical instruments at a very young age, and Chung grew up playing violin and piano. Sougwen Chung moved to the United States as a teenager and received a Bachelor of Fine Arts from Indiana University before obtaining a Masters Diploma in Interactive Art from Hyper Island in Sweden.
Career
Chung's work has been shown at galleries and museums across the world, including EMMA (museum) in Espoo, Finland, MAMCO in Geneva, Switzerland, Vancouver Art Gallery in Canada, and Istanbul's Akbank Sanat. Chung has spoken globally at conferences including Tribeca Film Festival, New York; The Hospital Club, London; MUTEK Festival, Montreal & Mexico City; Sónar +D, Barcelona; The Art Directors Club, New York; Stockholm; SXSW, Austin; Tokyo; Internet Dargana, Barcelona: FITC; New York; OFFF, Barcelona; Gray Area Festival, San Francisco; and SIGGRAPH, Vancouver.
Sougwen Chung's work has also been featured in multiple international press outlets including The New Yorker, Art F City, Artnet, Artsy, Dazed and Confused, The Creators Project, MASHABLE, EXIT Magazine, Engadget, Business Insider, Fast Company and USA Today.
An example of their work is the 2017 "Drawing Operations Unit." It is an exploration into how machine learning might be applied to the drawing style of the artist's hand. The robotic arm's behavior is generated from neural nets trained on the artist's drawing gestures. In a sense, the robotic arm has learned from the visual style of the artist's previous drawings and outputs a machine interpretation during the human/robot dr |
https://en.wikipedia.org/wiki/IL36G | Interleukin-36 gamma previously known as interleukin-1 family member 9 (IL1F9) is a protein that in humans is encoded by the IL36G gene.
Expression
IL36G is well-expressed in the epithelium of the skin, gut, and lung. In the skin IL36G is predominantly expressed in epidermal granular layer keratinocytes with little to no expression in basal layer keratinocytes.
Function
The protein encoded by this gene is a member of the interleukin-1 cytokine family. This gene and eight other interleukin-1 family genes form a cytokine gene cluster on chromosome 2. The activity of this cytokine is mediated via the interleukin-1 receptor-like 2 (IL1RL2/IL1R-rp2/IL-36 receptor), and is specifically inhibited by interleukin-36 receptor antagonist, (IL-36RA/IL1F5/IL-1 delta). Interferon-gamma, tumor necrosis factor-alpha and interleukin-1 β (IL-1β) are reported to stimulate the expression of this cytokine in keratinocytes. The expression of this cytokine in keratinocytes can also be induced by a multiple Pathogen-Associated Molecular Patterns (PAMPs). Both IL-36γ mRNA and protein have been linked to psoriasis lesions and has been used as a biomarker for differentiating between eczema and psoriasis. As with many other interleukin-1 family cytokines IL-36γ requires proteolytic cleavage of its N-terminus for full biological activity. However, unlike IL-1β the activation of IL-36γ is inflammasome-independent. IL-36γ is specifically cleaved by the endogenous protease cathepsin S as well exogenous proteases derived from fungal and bacterial pathogens. |
https://en.wikipedia.org/wiki/Petromarula | Petromarula is a genus of plants in the family Campanulaceae. There is only one known species, Petromarula pinnata, endemic to the island of Crete in the Mediterranean. The name "Petromarula" means "rock lettuce" in Greek, a reference to the plant's traditional use in salads.
Description
Petromarula pinnata is a robust, medium to tall perennial, minutely hairy above. Leaves mostly in a large basal rosette, pinnate to pinnately-lobed, the lower long-stalked; leaflets oval to oblong, coarsely toothed. Flowers pale blue, 9–10 mm, borne in large rather narrow panicles; corolla with 5 spreading to recurved linear lobes. Capsule opening by 3 pores in the middle. Flowers April–May.
Habitat
Rock crevices, cliffs and old walls.
Gallery |
https://en.wikipedia.org/wiki/Arrestin%20beta%202 | Beta-arrestin-2, also known as arrestin beta-2, is an intracellular protein that in humans is encoded by the ARRB2 gene.
Members of arrestin/beta-arrestin protein family are thought to participate in agonist-mediated desensitization of G protein-coupled receptors and cause specific dampening of cellular responses to stimuli such as hormones, neurotransmitters, or sensory signals, as well as having signalling roles in their own right. Arrestin beta 2, like arrestin beta 1, was shown to inhibit beta-adrenergic receptor function in vitro. It is expressed at high levels in the central nervous system and may play a role in the regulation of synaptic receptors. Besides the brain, a cDNA for arrestin beta 2 was isolated from thyroid gland, and thus it may also be involved in hormone-specific desensitization of TSH receptors. Multiple alternatively spliced transcript variants have been found for this gene, but the full-length nature of some variants has not been defined.
The protein may interact with the agonist DOI in 5-HT2A receptor signaling.
Arrestin beta 2 is crucial for the development of tolerance to morphine and other opioids.
Interactions
Arrestin beta 2 has been shown to interact with
AP2B1,
PSCD2,
Mdm2, and
RALGDS. |
https://en.wikipedia.org/wiki/Crysis%202 | Crysis 2 is a first-person shooter video game developed by Crytek, published by Electronic Arts and released in North America, Australia and Europe in March 2011 for Microsoft Windows, PlayStation 3, and Xbox 360. Officially announced on June 1, 2009, the game is the second main installment of the Crysis series, and a sequel to the 2007 video game Crysis, and its expansion Crysis Warhead. The story was written by Richard Morgan, while Peter Watts was consulted and wrote a novel adaptation of the game. It was the first game to showcase the CryEngine 3 game engine and the first game using the engine to be released on consoles. A sequel, Crysis 3, was released in 2013. A remastered version, titled Crysis 2 Remastered and following in the steps of Crysis Remastered, was released in 2021 for Nintendo Switch, PlayStation 4, Windows, and Xbox One, also bundled as part of the Crysis Remastered Trilogy compilation.
Gameplay
Crysis 2 is a first-person shooter. The player assumes the role of a Force Recon Marine called Alcatraz. Similar to its predecessor, it provides freedom to customize weaponry and abilities. Crytek wanted to avoid making another game set in a true jungle environment (as were Far Cry and Crysis); New York City has been dubbed an "urban jungle". The urban atmosphere offers new options with relation to progressing and planning attacks. Players are able to navigate between floors and buildings, as well as a destroyed cityscape.
Campaign
The player assumes the control of a Force Recon Marine named "Alcatraz", who gains ownership of the Nanosuit 2.0 from Army Delta Force officer Laurence "Prophet" Barnes, who returns from the original Crysis. CryNet Systems has been hunting Prophet to retrieve the suit, inadvertently pursuing Alcatraz, believing he is Prophet. The aliens seen in the original game have undergone a major redesigning, abandoning the ancient, tentacled exosuits seen in the first game for high-tech humanoid armored war machines that stalk Alcatraz |
https://en.wikipedia.org/wiki/Fimbrial%20usher%20protein | The fimbrial usher protein is involved in biogenesis of the pilus in Gram-negative bacteria. The biogenesis of some fimbriae (or pili) requires a two-component assembly and transport system which is composed of a periplasmic chaperone and a pore-forming outer membrane protein which has been termed a molecular 'usher'; this is the chaperone-usher pathway.
The usher protein has a molecular weight ranging from 86 to 100 kDa and is composed of a membrane-spanning 24-stranded beta barrel domain, reminiscent of porins, and of four periplasmic soluble domains: an N-terminal one of about 120 residues (NTD), a 'middle' domain of about 80 residues located as a soluble insertion within the beta barrel region of the sequence (plug domain) and two IG-like domains (each about 80 residues long) at the C-terminus (CTD1 and CTD2). Although the degree of sequence similarity of these proteins is not very high they share a number of characteristics. One of these is the presence of two pairs of disulfide bond-forming cysteines, the first one located in the NTD and the second in CTD2. The best conserved region of the sequence corresponds to the plug domain. |
https://en.wikipedia.org/wiki/Black%20hole%20thermodynamics | In physics, black hole thermodynamics is the area of study that seeks to reconcile the laws of thermodynamics with the existence of black hole event horizons. As the study of the statistical mechanics of black-body radiation led to the development of the theory of quantum mechanics, the effort to understand the statistical mechanics of black holes has had a deep impact upon the understanding of quantum gravity, leading to the formulation of the holographic principle.
Overview
The second law of thermodynamics requires that black holes have entropy. If black holes carried no entropy, it would be possible to violate the second law by throwing mass into the black hole. The increase of the entropy of the black hole more than compensates for the decrease of the entropy carried by the object that was swallowed.
In 1972, Jacob Bekenstein conjectured that black holes should have an entropy, where by the same year, he proposed no-hair theorems.
In 1973 Bekenstein suggested as the constant of proportionality, asserting that if the constant was not exactly this, it must be very close to it. The next year, in 1974, Stephen Hawking showed that black holes emit thermal Hawking radiation corresponding to a certain temperature (Hawking temperature). Using the thermodynamic relationship between energy, temperature and entropy, Hawking was able to confirm Bekenstein's conjecture and fix the constant of proportionality at :
where is the area of the event horizon, is the Boltzmann constant, and is the Planck length. This is often referred to as the Bekenstein–Hawking formula. The subscript BH either stands for "black hole" or "Bekenstein–Hawking". The black hole entropy is proportional to the area of its event horizon . The fact that the black hole entropy is also the maximal entropy that can be obtained by the Bekenstein bound (wherein the Bekenstein bound becomes an equality) was the main observation that led to the holographic principle. This area relationship was generalize |
https://en.wikipedia.org/wiki/Dunford%E2%80%93Schwartz%20theorem | In mathematics, particularly functional analysis, the Dunford–Schwartz theorem, named after Nelson Dunford and Jacob T. Schwartz, states that the averages of powers of certain norm-bounded operators on L1 converge in a suitable sense.
Statement of the theorem
The statement is no longer true when the boundedness condition is relaxed to even .
Notes
Theorems in functional analysis |
https://en.wikipedia.org/wiki/Math%20Blaster%20Mystery | Math Blaster Mystery is a 1989 educational video game within the Blaster Learning System franchise, developed by Davidson & Associates. It was the second title after the original Math Blaster! and available on Apple II, Apple IIGS and Macintosh computers.
In May 1993, the game was added to all 15 IBM-compatible computers at the Intex Corp. Computer Center within the Chinatown Library, in order to help students improve their English and math skills.
Critical reception
Compute! deemed it a "departure from the rote software that Davidson is best known for". The Baltimore Sun recommended the game for older players. The paper Mathematics Achievement Among Chinese-American and Caucasian-American Fifth and Sixth Grade Girls assessed the educational capabilities of the title, noting that the minigame Follow the Steps was "designed to help develop strategies for solving word problems step by step". Second International Handbook of Mathematics Education noted its uniqueness in framing word problems through context relevant to the overall game narrative, though added that it rarely went beyond elementary arithmetic.
Awards
|-
! scope="row" | 1990
| Math Blaster Mystery
| Software Publishers Association award for Best Secondary Education Program
| |
https://en.wikipedia.org/wiki/Change%20ringing | Change ringing is the art of ringing a set of tuned bells in a tightly controlled manner to produce precise variations in their successive striking sequences, known as "changes". This can be by method ringing in which the ringers commit to memory the rules for generating each change, or by call changes, where the ringers are instructed how to generate each change by instructions from a conductor. This creates a form of bell music which cannot be discerned as a conventional melody, but is a series of mathematical sequences.
Change ringing originated following the invention of English full-circle tower bell ringing in the early 17th century, when bell ringers found that swinging a bell through a much larger arc than that required for swing-chiming gave control over the time between successive strikes of the clapper. Ordinarily a bell will swing through a small arc only at a set speed governed by its size and shape in the nature of a simple pendulum, but by swinging through a larger arc approaching a full circle, control of the strike interval can be exercised by the ringer. This culminated in the technique of full circle ringing, which enabled ringers to independently change the speeds of their individual bells accurately to combine in ringing different mathematical permutations, known as "changes".
Speed control of a tower bell is exerted by the ringer only when each bell is mouth upwards and moving slowly near the balance point; this constraint and the intricate rope manipulation involved normally requires that each bell have its own ringer. The considerable weights of full-circle tower bells also means they cannot be easily stopped or started and the practical change of interval between successive strikes is limited. This places limitations on the rules for generating easily-rung changes; each bell must strike once in each change, but its position of striking in successive changes can only change by one place.
Change ringing is practised worldwide, but it is |
https://en.wikipedia.org/wiki/VDAC2 | Voltage-dependent anion-selective channel protein 2 is a protein that in humans is encoded by the VDAC2 gene on chromosome 10. This protein is a voltage-dependent anion channel and shares high structural homology with the other VDAC isoforms. VDACs are generally involved in the regulation of cell metabolism, mitochondrial apoptosis, and spermatogenesis. Additionally, VDAC2 participates in cardiac contractions and pulmonary circulation, which implicate it in cardiopulmonary diseases. VDAC2 also mediates immune response to infectious bursal disease (IBD).
Structure
The three VDAC isoforms in human are highly conserved, particularly with respect to their 3D structure. VDACs form a wide β-barrel structure, inside of which the N-terminal resides to partially close the pore. The sequence of the VDAC2 isoform contains an abundance of cysteines, which allow for the formation of disulfide bridges and, ultimately, affect the flexibility of the β-barrel. VDACs also contain a mitochondrial targeting sequence for the protein's translocation to the outer mitochondrial membrane. In particular, VDAC2 possesses an N-terminal longer by 11 residues compared to the other two isoforms.
Function
VDAC2 belongs to the mitochondrial porin family and is expected to share similar biological functions to the other VDAC isoforms. VDACs generally are involved in cellular energy metabolism by transporting ATP and other small ions and metabolites across the outer mitochondrial membrane. In mammalian cardiomyocytes, VDAC2 promotes mitochondrial transport of calcium ions in order to power cardiac contractions.
In addition, VDACs form part of the mitochondrial permeability transition pore (MPTP) and, thus, facilitate cytochrome C release, leading to apoptosis. VDACs have also been observed to interact with pro- or antiapoptotic proteins, such as Bcl-2 family proteins and kinases, and so may contribute to apoptosis independently from the MPTP. VDAC2 in particular has demonstrated a protective ef |
https://en.wikipedia.org/wiki/African%20Journal%20of%20AIDS%20Research | The African Journal of AIDS Research is a peer-reviewed medical journal published in 2002 by the National Inquiry Services Centre (Grahamstown, South Africa) on topics related related to understanding the social dimensions to AIDS in Africa. Launched to address the lack of an African-managed journal focussed on social-science research on HIV/AIDS in Africa, it is now co-published and distributed by Taylor and Francis. |
https://en.wikipedia.org/wiki/V-statistic | V-statistics are a class of statistics named for Richard von Mises who developed their asymptotic distribution theory in a fundamental paper in 1947. V-statistics are closely related to U-statistics (U for "unbiased") introduced by Wassily Hoeffding in 1948. A V-statistic is a statistical function (of a sample) defined by a particular statistical functional of a probability distribution.
Statistical functions
Statistics that can be represented as functionals of the empirical distribution function are called statistical functionals. Differentiability of the functional T plays a key role in the von Mises approach; thus von Mises considers differentiable statistical functionals.
Examples of statistical functions
The k-th central moment is the functional , where is the expected value of X. The associated statistical function is the sample k-th central moment,
The chi-squared goodness-of-fit statistic is a statistical function T(Fn), corresponding to the statistical functional
where Ai are the k cells and pi are the specified probabilities of the cells under the null hypothesis.
The Cramér–von-Mises and Anderson–Darling goodness-of-fit statistics are based on the functional
where w(x; F0) is a specified weight function and F0 is a specified null distribution. If w is the identity function then T(Fn) is the well known Cramér–von-Mises goodness-of-fit statistic; if then T(Fn) is the Anderson–Darling statistic.
Representation as a V-statistic
Suppose x1, ..., xn is a sample. In typical applications the statistical function has a representation as the V-statistic
where h is a symmetric kernel function. Serfling discusses how to find the kernel in practice. Vmn is called a V-statistic of degree m.
A symmetric kernel of degree 2 is a function h(x, y), such that h(x, y) = h(y, x) for all x and y in the domain of h. For samples x1, ..., xn, the corresponding V-statistic is defined
Example of a V-statistic
An example of a degree-2 V-statistic is the second |
https://en.wikipedia.org/wiki/Concatenation | In formal language theory and computer programming, string concatenation is the operation of joining character strings end-to-end. For example, the concatenation of "snow" and "ball" is "snowball". In certain formalisations of concatenation theory, also called string theory, string concatenation is a primitive notion.
Syntax
In many programming languages, string concatenation is a binary infix operator, and in some it is written without an operator. This is implemented in different ways:
Overloading the plus sign + Example from C#: "Hello, " + "World" has the value "Hello, World".
Dedicated operator, such as . in PHP, & in Visual Basic and || in SQL. This has the advantage over reusing + that it allows implicit type conversion to string.
string literal concatenation, which means that adjacent strings are concatenated without any operator. Example from C: "Hello, " "World" has the value "Hello, World".
Implementation
In programming, string concatenation generally occurs at run time, as string values are typically not known until run time. However, in the case of string literals, the values are known at compile time, and thus string concatenation can be done at compile time, either via string literal concatenation or via constant folding.
Concatenation of sets of strings
In formal language theory and pattern matching (including regular expressions), the concatenation operation on strings is generalised to an operation on sets of strings as follows:
For two sets of strings S1 and S2, the concatenation S1S2 consists of all strings of the form vw where v is a string from S1 and w is a string from S2, or formally . Many authors also use concatenation of a string set and a single string, and vice versa, which are defined similarly by and . In these definitions, the string vw is the ordinary concatenation of strings v and w as defined in the introductory section.
For example, if , and , then FR denotes the set of all chess board coordinates in algebraic notatio |
https://en.wikipedia.org/wiki/Source-code%20editor | A source-code editor is a text editor program designed specifically for editing source code of computer programs. It may be a standalone application or it may be built into an integrated development environment (IDE).
Characteristics
Source-code editors have characteristics specifically designed to simplify and speed up typing of source code, such as syntax highlighting, indentation, autocomplete and brace matching functionality. These editors also provide a convenient way to run a compiler, interpreter, debugger, or other program relevant for the software-development process. So, while many text editors like Notepad can be used to edit source code, if they don't enhance, automate or ease the editing of code, they are not source-code editors.
Structure editors are a different form of source-code editor, where instead of editing raw text, one manipulates the code's structure, generally the abstract syntax tree. In this case features such as syntax highlighting, validation, and code formatting are easily and efficiently implemented from the concrete syntax tree or abstract syntax tree, but editing is often more rigid than free-form text. Structure editors also require extensive support for each language, and thus are harder to extend to new languages than text editors, where basic support only requires supporting syntax highlighting or indentation. For this reason, strict structure editors are not popular for source code editing, though some IDEs provide similar functionality.
A source-code editor can check syntax while code is being entered and immediately warn of syntax problems. A few source-code editors compress source code, typically converting common keywords into single-byte tokens, removing unnecessary whitespace, and converting numbers to a binary form. Such tokenizing editors later uncompress the source code when viewing it, possibly prettyprinting it with consistent capitalization and spacing. A few source-code editors do both.
The Language Server Pro |
https://en.wikipedia.org/wiki/British%20Stammering%20Association | The British Stammering Association (BSA), trading as STAMMA since 2019, is a national membership organisation in the United Kingdom for adults and children who stammer, their friends and families, speech and language therapists and other professionals. It became a charity in 1978 and is based in London. The mission of the charity is to support anyone who stammers in the UK and tackle the stigma, ignorance and discrimination that people who stammer face so that they can live their lives in full and with dignity. It describes stammering as a neurological condition and estimates that up to 3% of adults in the UK have a stammer.
Organisation
The association's chief executive, since June 2018, is Jane Powell. The chair, since 2021, is Joanna Gaukroger.
President and patrons
The organisation's president was Brian Dodsworth, who died in 2021.
Stamma's patrons are: broadcaster and former MP Ed Balls, former Scotland international rugby captain Kelly Brown, author Jonty Claypole, Dame Margaret Drabble DBE, former MP and MSP John McAllion, David Mitchell, author of Black Swan Green, actor, rapper and podcaster Scroobius Pip, Arwel Richards, novelist, poet, playwright and presenter Owen Sheers, Jon Smith and Baroness Whitaker.
Previous patrons have included Nicholas Parsons CBE and Jonathan Miller, both now deceased.
International links
The British Stammering Association is a member of the European League of Stuttering Associations and the International Stuttering Association. At its World Congress in Brazil, the International Fluency Association awarded the IFA Consumer Award of Distinction 2009 to the British Stammering Association.
Scotland
The association had a Scottish branch, BSA Scotland, which was founded in 2004 and is now closed. It was a focus for Scottish campaigns, events and support services as well as to engage with the Scottish Parliament.
Advice, information and support
The association operates a helpline, webchat and email support service, and offers |
https://en.wikipedia.org/wiki/Reforestation%20in%20Costa%20Rica | Reforestation efforts are being made in Costa Rica to recondition its biodiversity and ecosystems that were affected by heavy deforestation in the 1900s.
History
Costa Rica has six different ecosystems, and is considered a biodiversity hotspot– having 5% of the world's total biodiversity within 0.1% of its landmass. The decline of the Costa Rican rainforest was due to unplanned logging in the mid-1900s. Loggers cleared much of the tropical rainforest for profit. By the 1990s, Costa Rica had the world's highest global deforestation rates. As a result, the Costa Rican government began its efforts to repair the damage inflicted on their landscape during this time and to develop in a sustainable manner.
Deforestation
In the 1940s, agriculture and unchecked logging were the main catalyst of the rapid decline of Costa Rica's indigenous woodlands. By the 1980s, two-thirds of the tropical rainforest were lost to these deforestation practices. Such rapid and forceful deforestation was due to the country's inappropriate policies like: cheap credit for cattle, land-titling laws which rewarded deforestation and rapid or imprudent expansion of road systems.
Purpose
A vast amount of the Costa Rican natural landscape was lost, therefore the government introduced two measures to protect and revive it. Firstly, the government made it illegal to clear forest without permission. Secondly, the government introduced payments for ecological services (PES) which provided an economic incentive to conserve and restore the forest.
These measures were so successful that, in 2021, the country won the first-ever Earthshot prize for their conservation efforts.
In an attempt to reverse the harmful effects caused by the inappropriate policies which drove reforestion, Costa Rica started using the PES program (Payment for Environental Services). The PES program gave financial incentives to owners of lands and forest planations for forest protection, reforestation and sustainable landscaping. |
https://en.wikipedia.org/wiki/Hyperbolic%203-manifold | In mathematics, more precisely in topology and differential geometry, a hyperbolic 3-manifold is a manifold of dimension 3 equipped with a hyperbolic metric, that is a Riemannian metric which has all its sectional curvatures equal to −1. It is generally required that this metric be also complete: in this case the manifold can be realised as a quotient of the 3-dimensional hyperbolic space by a discrete group of isometries (a Kleinian group).
Hyperbolic 3-manifolds of finite volume have a particular importance in 3-dimensional topology as follows from Thurston's geometrisation conjecture proved by Perelman. The study of Kleinian groups is also an important topic in geometric group theory.
Importance in topology
Hyperbolic geometry is the most rich and least understood of the eight geometries in dimension 3 (for example, for all other geometries it is not hard to give an explicit enumeration of the finite-volume manifolds with this geometry, while this is far from being the case for hyperbolic manifolds). After the proof of the Geometrisation conjecture, understanding the topological properties of hyperbolic 3-manifolds is thus a major goal of 3-dimensional topology. Recent breakthroughs of Kahn–Markovic, Wise, Agol and others have answered most long-standing open questions on the topic but there are still many less prominent ones which have not been solved.
In dimension 2 almost all closed surfaces are hyperbolic (all but the sphere, projective plane, torus and Klein bottle). In dimension 3 this is far from true: there are many ways to construct infinitely many non-hyperbolic closed manifolds. On the other hand, the heuristic statement that "a generic 3-manifold tends to be hyperbolic" is verified in many contexts. For example, any knot which is not either a satellite knot or a torus knot is hyperbolic. Moreover, almost all Dehn surgeries on a hyperbolic knot yield a hyperbolic manifold. A similar result is true of links (Thurston's hyperbolic Dehn surgery theor |
https://en.wikipedia.org/wiki/Mathematics%20and%20Mechanics%20of%20Complex%20Systems | Mathematics and Mechanics of Complex Systems (MEMOCS) is a half-yearly peer-reviewed scientific journal founded by the International Research Center for the Mathematics and Mechanics of Complex Systems (M&MoCS) from Università degli Studi dell'Aquila, in Italy. It is published by Mathematical Sciences Publishers, and first issued in February 2013. The co-chairs of the editorial board are Francesco dell'Isola and Gilles Francfort, and chair managing editor is Martin Ostoja-Starzewski.
MEMOCS is indexed in Scopus, MathSciNet and Zentralblatt MATH.
It is open access, free of author charges (being supported by grants from academic institutions), and available in both printed and electronic forms.
Contents
MEMOCS publishes articles from diverse scientific fields with a specific emphasis on mechanics. Its contents rely on the application or development of rigorous mathematical methods.
The journal also publishes original research in related areas of mathematics of well-established applicability, such as variational methods, numerical methods, and optimization techniques, as well as papers focusing on and clarifying particular aspects of the history of mathematics and science.
Among the contributors are Graeme Milton, Geoffrey Grimmett, David Steigmann, Mario Pulvirenti and Lucio Russo. |
https://en.wikipedia.org/wiki/Multiseat%20configuration | A multiseat, multi-station or multiterminal system is a single computer which supports multiple independent local users at the same time.
A "seat" consists of all hardware devices assigned to a specific workplace at which one user sits at and interacts with the computer. It consists of at least one graphics device (graphics card or just an output (e.g. HDMI/VGA/DisplayPort port) and the attached monitor/video projector) for the output and a keyboard and a mouse for the input. It can also include video cameras, sound cards and more.
Motivation
Since the 1960s computers have been shared between users. Especially in the early days of computing when computers were extremely expensive the usual paradigm was a central mainframe computer connected to numerous terminals. With the advent of personal computing this paradigm has been largely replaced by personal computers (or one computer per user).
Multiseat setups are a return to this multiuser paradigm but based around a PC which supports a number of zero-clients usually consisting of a terminal per user (screen, keyboard, mouse).
In some situations a multiseat setup is more cost-effective because it is not necessary to buy separate motherboards, microprocessors, RAM, hard disks and other components for each user. For example, buying one high speed CPU, usually costs less than buying several slower CPUs.
History
In the 1970s, it was very commonplace to connect multiple computer terminals to a single mainframe computer, even graphical terminals. Early terminals were connected with RS-232 type serial connections, either directly, or through modems. With the advent of Internet Protocol based networking, it became possible for multiple users to log into a host using telnet or – for a graphic environment – an X Window System "server". These systems would retain a physically secure "root console" for system administration and direct access to the host machine.
Support for multiple consoles in a PC running the X interface w |
https://en.wikipedia.org/wiki/Supergroup%20%28biology%29 | A supergroup, in evolutionary biology, is a large group of organisms that share one common ancestor and have important defining characteristics. It is an informal, mostly arbitrary rank in biological taxonomy that is often greater than phylum or kingdom, although some supergroups are also treated as phyla.
Eukaryotic supergroups
Since the decade of 2000's, the eukaryotic tree of life (abbreviated as eToL) has been divided into 5–8 major groupings called 'supergroups'. These groupings were established after the idea that only monophyletic groups should be accepted as ranks, as an alternative to the use of paraphyletic kingdom Protista. In the early days of the eToL six traditional supergroups were considered: Amoebozoa, Opisthokonta, "Excavata", Archaeplastida, "Chromalveolata" and Rhizaria. Since then, the eToL has been rearranged profoundly, and most of these groups were found as paraphyletic or lacked defining morphological characteristics that unite their members, which makes the 'supergroup' label more arbitrary.
Currently, the addition of many lineages of newly discovered protists (such as Telonemia, Picozoa, Hemimastigophora, Rigifilida...) and the use of phylogenomic analyses have brought a new, more accurate supergroup model. These are the current supergroups of eukaryotes:
TSAR, constituted by Telonemia and the SAR clade (Stramenopiles, Alveolata and Rhizaria). It is estimated to occupy up to half of all eukaryotic diversity, since it includes multiple major groups such as diatoms, dinoflagellates, seaweeds, ciliates, foraminiferans, radiolarians, and the apicomplexan and oomycete parasites. It essentially contains the majority of "Chromalveolata".
Haptista (also treated as a phylum), previously in "Chromalveolata", comprising the haptophyte algae and centrohelids.
Cryptista (also treated as a phylum), previously in "Chromalveolata", comprising the cryptomonads, katablepharids and the enigmatic Palpitomonas.
Archaeplastida (also treated as a kingdom), con |
https://en.wikipedia.org/wiki/Canonical%20model | A canonical model is a design pattern used to communicate between different data formats. Essentially: create a data model which is a superset of all the others ("canonical"), and create a "translator" module or layer to/from which all existing modules exchange data with other modules. The canonical model acts as a middleman. Each model now only needs to know how to communicate with the canonical model and dont need to know the implementation details of the other modules.
A form of enterprise application integration, it is intended to reduce costs and standardize on agreed data definitions associated with integrating business systems. A canonical model is any model that is canonical in nature, i.e. a model which is in the simplest form possible based on a standard, application integration (EAI) solution. Most organizations also adopt a set of standards for message structure and content (message payload). The desire for consistent message payload results in the construction of an enterprise or business domain canonical model common view within a given context. Often the term canonical model is used interchangeably with integration strategy and often entails a move to a message-based integration methodology. A typical migration from point-to-point canonical data model, an enterprise design pattern which provides common data naming, definition and values within a generalized data framework. Advantages of using a canonical data model are reducing the number of data translations and reducing the maintenance effort.
Adoption of a comprehensive enterprise interfacing to message-based integration begins with a decision on the middleware to be used to transport messages between endpoints. Often this decision results in the adoption of an enterprise service bus (ESB) or enterprise application integration (EAI) solution. Most organizations also adopt a set of standards for message structure and content (message payload). The desire for consistent message payload res |
https://en.wikipedia.org/wiki/Bias%20in%20the%20introduction%20of%20variation | Bias in the introduction of variation ("arrival bias") refers to a theory in the domain of evolutionary biology that asserts biases in the introduction of heritable variation are reflected in the outcome of evolution. It is relevant to topics in molecular evolution, evo-devo, and self-organization. In the context of this theory, "introduction" ("origination") is a technical term for events that shift an allele frequency upward from zero (mutation is the genetic process that converts one allele to another, whereas introduction is the population genetic process that adds to the set of alleles in a population with non-zero frequencies).
Formal models demonstrate that when an evolutionary process depends on introduction events, mutational and developmental biases in the generation of variation may influence the course of evolution by a first come, first served effect, so that evolution reflects the arrival of the likelier, not just the survival of the fitter.
Whereas mutational explanations for evolutionary patterns are often associated with neutral evolution, the theory of arrival biases distinctively predicts that biases in the generation of variation may shape adaptive change.
The most direct evidence for this kind of cause-effect relationship comes from laboratory studies showing that adaptive changes are systematically enriched for mutationally likely types of changes.
Retrospective analyses of natural cases of adaptation also provide support for the theory.
This theory is notable as an example of contemporary structuralist thinking, contrasting with a classical functionalist view in which the course of evolution is determined by natural selection (see ).
History
The theory of biases in the introduction process as a cause of orientation or direction in evolution has been explained as the convergence of two threads. The first, from theoretical population genetics, is the explicit recognition by theoreticians (toward the end of the 20th century) that a correct |
https://en.wikipedia.org/wiki/Happy99 | Happy99 (also termed Ska or I-Worm) is a computer worm for Microsoft Windows. It first appeared in mid-January 1999, spreading through email and usenet. The worm installs itself and runs in the background of a victim's machine, without their knowledge. It is generally considered the first virus to propagate by email, and has served as a template for the creation of other self-propagating viruses. Happy99 has spread on multiple continents, including North America, Europe, and Asia.
Significance
Happy99 was described by Paul Oldfield as "the first virus to spread rapidly by email". In the Computer Security Handbook, Happy99 is referred to as "the first modern worm". Happy99 also served as a template for the creation of ExploreZip, another self-spreading virus.
Spread
The worm first appeared on 20 January 1999. Media reports of the worm started coming in from the United States and Europe, in addition to numerous complaints on newsgroups from users that had become infected with the worm. Asia Pulse reported 74 cases of the virus from Japan in February, and 181 cases were reported in March—a monthly record at the time. On 3 March 1999, a Tokyo job company accidentally sent 4000 copies of the virus to 30 universities in Japan.
Dan Schrader of Trend Micro said that Happy99 was the single most commonly reported virus in their system for the month of March. A virus bulletin published in February 2000 reported that Happy99 caused reports of file-infecting malware to reach over 16% in April 1999. Sophos listed Happy99 among the top ten viruses reported in the year of 1999. Eric Chien, head of research at Symantec, reported that the worm was the second most reported virus in Europe for 2000. Marius Van Oers, a researcher for Network Associates, referred to Happy99 as "a global problem", saying that it was one of the most commonly reported viruses in 1999. When virus researcher Craig Schmugar posted a fix for the virus on his website, a million people downloaded it.
Technica |
https://en.wikipedia.org/wiki/Arden%27s%20rule | In theoretical computer science, Arden's rule, also known as Arden's lemma, is a mathematical statement about a certain form of language equations.
Background
A (formal) language is simply a set of strings. Such sets can be specified by means of some language equation, which in turn is based on operations on languages. Language equations are mathematical statements that resemble numerical equations, but the variables assume values of formal languages rather than numbers. Among the most common operations on two languages A and B are the set union A ∪ B, and their concatenation A⋅B. Finally, as an operation taking a single operand, the set A* denotes the Kleene star of the language A.
Statement of Arden's rule
Arden's rule states that the set A*⋅B is the smallest language that is a solution for X in the linear equation X = A⋅X ∪ B where X, A, B are sets of strings. Moreover, if the set A does not contain the empty word, then this solution is unique.
Equivalently, the set B⋅A* is the smallest language that is a solution for X in X = X⋅A ∪ B.
Application
Arden's rule can be used to help convert some finite automatons to regular expressions, as in Kleene's algorithm.
See also
Regular expression
Nondeterministic finite automaton
Notes |
https://en.wikipedia.org/wiki/Radical%20of%20an%20integer | In number theory, the radical of a positive integer n is defined as the product of the distinct prime numbers dividing n. Each prime factor of n occurs exactly once as a factor of this product:
The radical plays a central role in the statement of the abc conjecture.
Examples
Radical numbers for the first few positive integers are
1, 2, 3, 2, 5, 6, 7, 2, 3, 10, 11, 6, 13, 14, 15, 2, 17, 6, 19, 10, 21, 22, 23, 6, 5, 26, 3, 14, 29, 30, 31, 2, 33, 34, 35, 6, 37, 38, 39, 10, 41, 42, 43, 22, 15, 46, 47, 6, 7, 10, ... .
For example,
and therefore
Properties
The function is multiplicative (but not completely multiplicative).
The radical of any integer is the largest square-free divisor of and so also described as the square-free kernel of . There is no known polynomial-time algorithm for computing the square-free part of an integer.
The definition is generalized to the largest -free divisor of , , which are multiplicative functions which act on prime powers as
The cases and are tabulated in and .
The notion of the radical occurs in the abc conjecture, which states that, for any , there exists a finite such that, for all triples of coprime positive integers , , and satisfying ,
For any integer , the nilpotent elements of the finite ring are all of the multiples of . |
https://en.wikipedia.org/wiki/Chanterelle | Chanterelle is the common name of several species of fungi in the genera Cantharellus, Craterellus, Gomphus, and Polyozellus. They are among the most popular of wild edible mushrooms. They are orange, yellow or white, meaty and funnel-shaped. On the lower surface, underneath the smooth cap, most species have rounded, forked folds that run almost all the way down the stipe, which tapers down seamlessly from the cap. Many species emit a fruity aroma, reminiscent of apricots, and often have a mildly peppery taste (hence its German name, Pfifferling). The name chanterelle originates from the Greek kantharos meaning "tankard" or "cup", a reference to their general shape.
Description
At one time, all yellow or golden chanterelles in western North America had been classified as Cantharellus cibarius. Using DNA analysis, they have since been shown to be a group of related species. In 1997, the Pacific golden chanterelle (C. formosus) and C. cibarius var. roseocanus were identified, followed by C. cascadensis in 2003, C. californicus in 2008, and C. enelensis in 2017. C. cibarius var. roseocanus occurs in the Pacific Northwest in Sitka spruce forests, as well as Eastern Canada in association with Pinus banksiana.
The false chanterelle (Hygrophoropsis aurantiaca) has a similar appearance and can be confused with the chanterelle. Distinguishing factors are that false chanterelles have true gills, while chanterelles have folds. Additionally, color can help distinguish the two; the true chanterelle is uniform egg-yellow, while the false chanterelle is more orange in hue and graded, with darker center. The true chanterelle's folds are typically more wrinkled or rounded, and randomly forked. Though once thought to be hazardous, it is now known that the false chanterelle is edible but not especially tasty, and ingesting it may result in mild gastrointestinal distress. The poisonous species in the genus Omphalotus (the jack-o'-lantern mushrooms) have been misidentified as chanter |
https://en.wikipedia.org/wiki/Quantum%20logic%20spectroscopy | Quantum logic spectroscopy (QLS) is an ion control scheme that maps quantum information between two co-trapped ion species. Quantum logic operations allow desirable properties of each ion species to be utilized simultaneously. This enables work with ions and molecular ions that have complex internal energy level structures which preclude laser cooling and direct manipulation of state. QLS was first demonstrated by NIST in 2005. QLS was first applied to state detection in diatomic molecules in 2016 by Wolf et al, and later applied to state manipulation and detection of diatomic molecules by the Liebfried group at NIST in 2017
Overview
Lasers are used to couple each ion's internal and external motional degrees of freedom. The Coulomb interaction between the two ions couples their motion. This allows the internal state of one ion to be transferred to the other. An auxiliary "logic ion" provides cooling, state preparation, and state detection for the co-trapped "spectroscopy ion," which has an electronic transition of interest. The logic ion is used to sense and control the internal and external state of the spectroscopy ion.
The logic ion is selected to have a simple energy level structure that can be directly laser cooled, often an alkaline earth ion. The laser cooled logic ion provides sympathetic cooling to the spectroscopy ion, which lacks an efficient laser cooling scheme. Cooling the spectroscopy ion reduces the number of rotational and vibrational states that it can occupy. The remaining states are then accessed by driving stimulated Raman spectroscopy transitions with a laser. The light used for driving these transitions is far off-resonant from any electronic transitions. This enables control over the spectroscopy ion's rotational and vibrational state.
Thus far, QLS is limited to diatomic molecules with a mass within 1 AMU of the laser cooled "logic" ion. This is largely due to poorer coupling of the motional states of the occupants of the ion trap as the |
https://en.wikipedia.org/wiki/Decentralized%20web | The decentralized web is a research program which proposes to reorganize the Internet using peer-to-peer or federated infrastructure rather than centralized data hosting services. Interest in the decentralized web arose due to the lack of trust in network maintenance organizations, due to scandals involving widespread espionage and content control. Proposed mechanisms include decentralized identifiers and distributed ledgers.
Decentralized identifiers
Decentralized identifiers are an important part of decentralized web applications. Decentralized identifiers are sometimes encapsulated in "decentralized identifier documents" (referred to as "DIDs"). Decentralized web applications frequently rely on URLs to decentralized identifier documents. The World Wide Web Consortium has several recommendations regarding DIDs. These identity documents are intended to identify any subject (e.g., a person, organization, thing, data model, abstract entity, etc.) that the controller of the DID decides that it identifies.
Cryptocurrency
A decentralized currency can be a helpful element in a decentralized web platform. A "cryptocurrency" (or crypto currency or crypto for short) is a digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a ledger. The ledger is a form of computerized database using strong cryptography to secure transaction records, to control the creation of additional coins, and to verify the transfer of coin ownership. It typically does not exist in physical form (like paper money) and is typically not issued by a central authority. Cryptocurrencies typically use decentralized control as opposed to centralized digital currency and central banking systems.
When a cryptocurrency is minted or created prior to issuance or issued by a single issuer, it is generally considered centralized. When implemented with decentralized control, each cryptocurrency works through distributed ledger technology, typically a b |
https://en.wikipedia.org/wiki/Constant%20routine%20protocol | A constant routine protocol is a common method used in human circadian rhythm research to study internally generated, or endogenous, circadian rhythms without the effect of external, or exogenous, influences. In the method, subjects are kept in constant conditions for at least 24 hours. These include constant light and temperature, as well as constant semi-recumbent posture. In addition, subjects' food intake is evenly distributed throughout the protocol, and subjects are typically not allowed to sleep for the duration. While in these conditions, subjects are often assessed for a number of variables of interest. Two of the most common and best understood of these variables are core body temperature and melatonin.
History
The term was first coined by in 1978 after it was used in an experiment to determine the effects of jet lag independent of an individual's behavioral cycle - though the methods involved in a constant routine date back to at least 1947.
The protocol arose from the well established concept in circadian research that the observation of organisms under constant conditions allows for the illumination of endogenous rhythms, as first described by French scientist Jean-Jacques d'Ortous de Mairan in 1729. In contrast to previous methods, however, the constant routine protocol was developed upon the recognition that several key behaviors exhibiting circadian rhythmicity (including sleep-wake cycle, the behavioral cycle, and the food-intake cycle) also act as masking agents of some endogenous rhythms.
Discoveries
The constant routine protocol, because of its ability to drastically reduce the masking effect of exogenous influences on the circadian pacemaker, has yielded invaluable results in the literature over the last 40 years of its use. Some of these achievements include accurate characterization of the endogenous components of the diurnal rhythms of melatonin, core body temperature, thyroid stimulating hormone (TSH), glucose tolerance, heart rate, and |
https://en.wikipedia.org/wiki/Two-body%20problem%20in%20general%20relativity | The two-body problem in general relativity (or relativistic two-body problem) is the determination of the motion and gravitational field of two bodies as described by the field equations of general relativity. Solving the Kepler problem is essential to calculate the bending of light by gravity and the motion of a planet orbiting its sun. Solutions are also used to describe the motion of binary stars around each other, and estimate their gradual loss of energy through gravitational radiation.
General relativity describes the gravitational field by curved space-time; the field equations governing this curvature are nonlinear and therefore difficult to solve in a closed form. No exact solutions of the Kepler problem have been found, but an approximate solution has: the Schwarzschild solution. This solution pertains when the mass M of one body is overwhelmingly greater than the mass m of the other. If so, the larger mass may be taken as stationary and the sole contributor to the gravitational field. This is a good approximation for a photon passing a star and for a planet orbiting its sun. The motion of the lighter body (called the "particle" below) can then be determined from the Schwarzschild solution; the motion is a geodesic ("shortest path between two points") in the curved space-time. Such geodesic solutions account for the anomalous precession of the planet Mercury, which is a key piece of evidence supporting the theory of general relativity. They also describe the bending of light in a gravitational field, another prediction famously used as evidence for general relativity.
If both masses are considered to contribute to the gravitational field, as in binary stars, the Kepler problem can be solved only approximately. The earliest approximation method to be developed was the post-Newtonian expansion, an iterative method in which an initial solution is gradually corrected. More recently, it has become possible to solve Einstein's field equation using a computer |
https://en.wikipedia.org/wiki/Garlic%20production%20in%20China | Garlic production in China is significant to the worldwide garlic industry, as China provides 80% of the total world production and is the leading exporter. Following China, other significant garlic producers include India (5% of world production) and Bangladesh (1%). As of 2019, China produced 23 million tonnes annually.
History
Garlic in China is mentioned in the Calendar of the Xia, dating to 2000 BCE. It is theorized that its cultivation in China occurred at the same time as it did in ancient Mesopotamia. The ancient Chinese recognized the powerful antibiotic effects of garlic and used it in Chinese traditional medicine, using it to cure stomach upset and diarrhea, among other ailments.
Between 1992 and 2000, Chinese garlic exports increased from 128,239 tonnes to 383,860 tonnes annually, and it became the world's largest producer.
China has been involved in numerous disputes with competitors including South Korea, Japan and the United States, and the country has been investigated for dumping. In 1994, the US introduced a 376.67 percent anti-dumping tax on Chinese garlic for a 5-year period, and when Chinese garlic merchants failed to meet with US official to review the situation in 1999, the duty has since been kept on permanent basis. In 1994, China too introduced regulations on export of garlic to 12 countries, and under the new regulations only 16 firms were permitted to export and a fixed quota was fixed for each firm and a fee collected on that basis. The total quota allotted was mentioned by the Chinese Chamber of Commerce as 100,000 metric tons in 1994 with increasing amounts in the following four years.
In February 2001, the nations agreed to settle the long-running dispute related to China's interest in three European Union member states through a seven-year agreement. In 2004, an anti-dumping duty was imposed by Canada on garlic as the assessment at that time was China's exports met 75 percent of the world production of garlic. The review committe |
https://en.wikipedia.org/wiki/Point%20of%20care%20medical%20information%20summary | Point of care medical information summaries are defined as "web-based medical compendia specifically designed to deliver predigested, rapidly accessible, comprehensive, periodically updated, and evidence-based information" to healthcare providers.
Products
BMJ Best Practice
DynaMed
UpToDate
See also
Clinical decision support system |
https://en.wikipedia.org/wiki/Inverse%20lithography | In semiconductor device fabrication, the inverse lithography technology (ILT) is an approach to photomask design. This is basically an approach to solve an inverse imaging problem: to calculate the shapes of the openings in a photomask ("source") so that the passing light produces a good approximation of the desired pattern ("target") on the illuminated material, typically a photoresist. As such, it is treated as a mathematical optimization problem of a special kind, because usually an analytical solution does not exist. In conventional approaches known as the optical proximity correction (OPC) a "target" shape is augmented with carefully tuned rectangles to produce a "Manhattan shape" for the "source", as shown in the illustration. The ILT approach generates curvilinear shapes for the "source", which deliver better approximations for the "target".
The ILT was proposed in 1980s, however at that time it was impractical due to the huge required computational power and complicated "source" shapes, which presented difficulties for verification (design rule checking) and manufacturing. However in late 2000s developers started reconsidering ILT due to significant increases in computational power. |
https://en.wikipedia.org/wiki/Drainage%20equation | A drainage equation is an equation describing the relation between depth and spacing of parallel subsurface drains, depth of the watertable, depth and hydraulic conductivity of the soils. It is used in drainage design.
A well known steady-state drainage equation is the Hooghoudt drain spacing equation. Its original publication is in Dutch. The equation was introduced in the USA by van Schilfgaarde.
Hooghoudt's equation
Hooghoudt's equation can be written as:.
Q L2 = 8 Kb d (Dd - Dw) + 4 Ka (Dd - Dw)2
where:
Q = steady state drainage discharge rate (m/day)
Ka = hydraulic conductivity of the soil above drain level (m/day)
Kb = hydraulic conductivity of the soil below drain level (m/day)
Di = depth of the impermeable layer below drain level (m)
Dd = depth of the drains (m)
Dw = steady state depth of the watertable midway between the drains (m)
L = spacing between the drains (m)
d = equivalent depth, a function of L, (Di-Dd), and r
r = drain radius (m)
Steady (equilibrium) state condition
In steady state, the level of the water table remains constant and the discharge rate (Q) equals the rate of groundwater recharge (R), i.e. the amount of water entering the groundwater through the watertable per unit of time. By considering a long-term (e.g. seasonal) average depth of the water table (Dw) in combination with the long-term average recharge rate (R), the net storage of water in that period of time is negligibly small and the steady state condition is satisfied: one obtains a dynamic equilibrium.
Derivation of the equation
For the derivation of the equation Hooghoudt used the law of Darcy, the summation of circular potential functions and, for the determination of the influence of the impermeable layer, de method of mirror images and superposition.
Hooghoudt published tables for the determination of the equivalent depth (d), because the function (F) in d = F (L,Di-Dd,r) consists of long series of terms.
Determining:
the discharge rate (Q) fr |
https://en.wikipedia.org/wiki/Seal%20and%20flag%20of%20the%20Panama%20Canal%20Zone | The seal and flag were the symbols of the Panama Canal Zone, an unincorporated territory of the United States, that existed from 1903 to 1979. The seal was adopted in 1906, and the flag in 1915. They were used until October 1, 1979, when the territory ceased to exist.
Design
Seal
The 1906 design of the seal had central image of a shield containing a brown galleon ship with white sails, passing through the Panama Canal, placed in the lower part of the shield. The ship flew an orange-and-white flag on the top of its sail. On the sides of the ship were located brown banks of the Canal, with green grass. The ship sailed in the blue water, with waves, and depicting a yellow reflection of the orange sky, that made for the background. The top portion of the shield consisted of 2 rows of horizontal stripes. The top stripe was blue, while the bottom one was divided into 13 vertical stripes, that alternated between white and red. The colours referenced the flag of the United States. Below the shield was located a light blue ribbon with motto "The Land Divided; The World United" yellow capital letters.
Both elements were placed on the white background within a blue circle with yellow outer and inner boundaries. The top of the circle had the text "Seal of the Canal Zone Isthmus of Panama" written in yellow capital letters. On the bottom of the circle were located three yellow five-pointed stars.
Flag
The flag consisted of the seal of the territory, placed in the centre, on the blue background.
History
The seal was designed by the governor of the Panama Canal Zone, George Whitefield Davis, and former United States Department of State official, Gaillard Hunt. In 1905, Davis proposed a design of the seal, that included the motives related to the Panama Canal. He described the construction of the canal as an endeavor to "join the seas for the benefit of mankind", which later evolved into the motto of the territory, "the land devided; the world united". In 1905, Tiffany an |
https://en.wikipedia.org/wiki/ALESS%20073.1 | ALESS 073.1 is an old spiral galaxy 12 billion light years away from Earth. The discovery was published in February 2021 in the journal Science. It has challenged the way astronomers understand galaxies and galaxy formation.
Observation
The galaxy was reported in a study conducted by a team of astronomers led by Dr. Federico Lelli at Cardiff University. The team used the Atacama Large Millimeter/submillimeter Array (ALMA) telescope, currently the largest radio telescope in the world, to observe the galaxy in its adolescence. The publication of the study of ALESS 073.1 includes “one of the sharpest, direct images of a primordial galaxy ever produced which allowed the team to undertake a detailed study of its internal structure," according to Cardiff University.
Distance
ALESS 073.1 is about 12 billion light years away from Earth. Due to its distance away from Earth, the light being shown is from when the universe was only 10% of its current age.
Characteristics
Like all galaxies, ALESS 073.1 is composed of gas, dark matter, and dust. It is made from stars that are held together by gravity.
ALESS 073.1 is estimated to have formed 12 billion years ago, just 1.2 billion years after the Big Bang. The image of the galaxy seen now gives an image of it during its early years. However, the physical characteristics of the galaxy indicate that the galaxy is much older than its features indicate. ALESS 073.1 exhibits features normally attributed to mature galaxies, such as spiral arms that extend from its center. In this way, it has similar features to spiral galaxies. It also has a rotating disk and a bulge, characteristics found in mature galaxies. This is contrary to the previous understanding of newer galaxies being chaotic, without a particular shape or structure. Over billions of years, young galaxies slow down and stabilize. This creates the distinctive features that are associated with mature galaxies.
The core of ALESS 073.1 hints at the presence of a superm |
https://en.wikipedia.org/wiki/Apple%20seed%20oil | Apple seed oil is a vegetable oil obtained by pressing apple seeds. It is used in manufacturing cosmetics.
Apple seed oil contains protein (about 34%). Apple seed oil may be used as an edible oil, with the oil cake being used to supplement animal feed.
Apple seed oil has a relatively high iodine value and because of this it is used in the production of alkyd resins, shoe polish and varnish.
Fatty acid profile
Apple seed oils consist of predominantly unsaturated fatty acids, linoleic acid (50.7-51.4%), oleic acid (37.49-38.55%). Saturated fatty acids present in apple seed oil are palmitic acid (6.51-6.60%), stearic acid (1.75-1.96%) and arachidic acid (1.49-1.54%).
See also
Tomato seed oil |
https://en.wikipedia.org/wiki/MIDI%20beat%20clock | MIDI beat clock, or simply MIDI clock, is a clock signal that is broadcast via MIDI to ensure that several MIDI-enabled devices such as a synthesizer or music sequencer stay in synchronization. Clock events are sent at a rate of 24 pulses per quarter note. Those pulses are used to maintain a synchronized tempo for synthesizers that have BPM-dependent voices and also for arpeggiator synchronization.
MIDI beat clock differs from MIDI timecode in that MIDI beat clock is tempo-dependent.
Location information can be specified using MIDI Song Position Pointer (SPP, see below), although many simple MIDI devices ignore this message.
Messages
MIDI beat clock defines the following real-time messages:
clock (decimal 248, hex 0xF8)
start (decimal 250, hex 0xFA)
continue (decimal 251, hex 0xFB)
stop (decimal 252, hex 0xFC)
MIDI also specifies a System Common message called Song Position Pointer (SPP). SPP can be used in conjunction with the above realtime messages for complete sync. This message consists of 3 bytes; a status byte (decimal 242, hex 0xF2), followed by two 7-bit data bytes (least significant byte first) forming a 14-bit value which specifies the number of "MIDI beats" (1 MIDI beat = a 16th note = 6 clock pulses) since the start of the song.
This message only needs to be sent once if a jump to a different position in the song is needed. Thereafter only realtime clock messages need to be sent to advance the song position one tick at a time.
See also
DIN sync
PPQN
Word clock
External links
Freeware to measure a midiclock beat signal
MAX/MSP documentation to their sync~ object
MIDI specification
Summary of MIDI messages
Song Position Pointer (SPP)
Encodings
MIDI standards
Synchronization |
https://en.wikipedia.org/wiki/Lester%20Dubins | Lester Dubins (April 27, 1920 – February 11, 2010) was an American mathematician noted primarily for his research in probability theory. He was a faculty member at the University of California at Berkeley from 1962 through 2004, and in retirement was Professor Emeritus of Mathematics and Statistics.
It has been thought that, since classic red-and-black casino roulette is a game in which the house on average wins more than the gambler, that "bold play", i.e. betting one's whole purse on a single trial, is a uniquely optimal strategy. While a graduate student at the University of Chicago, Dubins surprised his teacher Leonard Jimmie Savage with a mathematical demonstration that this is not true. Dubins and Savage wrote a book that appeared in 1965 titled How to Gamble if You Must (Inequalities for Stochastic Processes) which presented a mathematical theory of gambling processes and optimal behavior in gambling situations, pointing out their relevance to traditional approaches to probability. Under the influence of the work of Bruno de Finetti, Dubins and Savage worked in the context of finitely additive rather than countably additive probability theory, thereby bypassing some technical difficulties.
Dubins was the author of nearly a hundred scholarly publications. Besides probability, some of these were on curves of minimal length under constraints on curvature and initial and final tangents (see Dubins path), Tarski's circle squaring problem, convex analysis, and geometry.
His doctoral students include Theodore Hill. Together with Gideon E. Schwarz he proved the Dubins–Schwarz theorem.
Publications
Dubins–Spanier theorems |
https://en.wikipedia.org/wiki/Acervulus | An acervulus (pl. acervuli) is a small asexual fruiting body that erupts through the epidermis of host plants parasitised by mitosporic fungi of the form order Melanconiales (Deuteromycota, Coelomycetes). It has the form of a small cushion at the bottom of which short crowded conidiophores are formed. The spores escape through an opening at the top.
Sources
Trigiano, Robert Nicholas, Mark Townsend Windham, Alan S. Windham. (2004) Plant Pathology: Concepts and Laboratory Exercises. CRC Press. pp. 11,129,137.
Fungal morphology and anatomy
Asexual reproduction |
https://en.wikipedia.org/wiki/XHTML%20Friends%20Network | XHTML Friends Network (XFN) is an HTML microformat developed by Global Multimedia Protocols Group that provides a simple way to represent human relationships using links. XFN enables web authors to indicate relationships to the people in their blogrolls by adding one or more keywords as the rel attribute to their links. XFN was the first microformat, introduced in December 2003.
Example
A friend of Jimmy Example could indicate that relationship by publishing a link on their site like this:
<a href="http://jimmy.example.com/" rel="friend">Jimmy Example</a>
Multiple values may be used, so if that friend has met Jimmy:
<a href="http://jimmy.example.com/" rel="friend met">Jimmy Example</a>
See also
FOAF
hCard |
https://en.wikipedia.org/wiki/Search/Retrieve%20Web%20Service | Search/Retrieve Web service (SRW) is a web service for search and retrieval. SRW provides a SOAP interface to queries, to augment the URL interface provided by its companion protocol Search/Retrieve via URL (SRU). Queries in SRU and SRW are expressed using the Contextual Query Language (CQL).
Standards for SRW, SRU, and CQL are promulgated by the United States Library of Congress.
The SRW service and SRU protocol were both created by as part of the ZING (Z39.50 International: Next Generation) initiative as successors to the Z39.50 protocol.
Example usage
See also
Z39.50
Implementations
refbase
RefDB
Te Ara: The Encyclopedia of New Zealand
External links
SRU: Search/Retrieve via URL
SRW: Search/Retrieve Web Service
CQL: Contextual Query Language
Web services
Library science terminology |
https://en.wikipedia.org/wiki/Netocracy | Netocracy was a term invented by the editorial board of the American technology magazine Wired in the early 1990s. A portmanteau of Internet and aristocracy, netocracy refers to a perceived global upper-class that bases its power on a technological advantage and networking skills, in comparison to what is portrayed as a bourgeoisie of a gradually diminishing importance.
The concept was later picked up and redefined by Alexander Bard and Jan Söderqvist for their book Netocracy — The New Power Elite and Life After Capitalism (originally published in Swedish in 2000 as Nätokraterna –t boken om det elektroniska klassamhället, published in English by Reuters/Pearsall UK in 2002).
The netocracy concept has been compared with Richard Florida's concept of the creative class. Bard and Söderqvist have also defined an underclass in opposition to the netocracy, which they refer to as the consumtariat.
The consumtariat
Alexander Bard describes a new underclass called the consumtariat, a portmanteau of consumer and proletariat, whose main activity is consumption, regulated from above. It is kept occupied with private problems, its desires provoked with the use of advertisements and its active participation is limited to things like product choice, product customization, engaging with interactive products and life-style choice.
Cyberdeutocracy
Similar to netocracy, is the concept of cyberdeutocracy. Karl W. Deutsch in his book The Nerves of Government: Models of Political Communication and Control hypothesized about "information elites, controlling means of mass communication and, accordingly, power institutions, the functioning of which is based on the use of information in their activities." Thus Deutsch introduced the concept of deutocracy, combining the words 'Deutsch' and 'autocracy' to get the new term. Cyberdeutocracy combines 'deutocracy' with the prefix 'cyber-' and is defined as a political regime based on the control by the political and corporate elites of the info |
https://en.wikipedia.org/wiki/SMP%20%28computer%20algebra%20system%29 | Symbolic Manipulation Program, usually called SMP, was a computer algebra system designed by Chris A. Cole and Stephen Wolfram at Caltech circa 1979. It was initially developed in the Caltech physics department with contributions from Geoffrey C. Fox, Jeffrey M. Greif, Eric D. Mjolsness, Larry J. Romans, Timothy Shaw, and Anthony E. Terrano.
SMP was first sold commercially in 1981, by the Computer Mathematics Corporation of Los Angeles, which later became part of Inference Corporation. Inference further developed the program and marketed it commercially from 1983 to 1988, but it was not a commercial success, and Inference became pessimistic about the market for symbolic math programs, and so abandoned SMP to concentrate on expert systems.
SMP was influenced by the earlier computer algebra systems Macsyma (of which Wolfram was a user) and Schoonschip (whose code Wolfram studied).
SMP follows a rule-based approach, giving it a "consistent, pattern-directed language". Unlike Macsyma and Reduce, it was written in C.
During the 1980s, it was one of the generally available general-purpose computer algebra systems, along with Reduce, Macsyma, and Scratchpad, and later muMATH and Maple. It was often used for teaching college calculus.
The design of SMP's interactive language and its "map" commands influenced the design of the 1984 version of Scratchpad.
Criticism
SMP has been criticized for various characteristics, notably its use of floating-point numbers instead of exact rational numbers, which can lead to incorrect results, and makes polynomial greatest common divisor calculations problematic. Many other problems in early versions of the system were purportedly fixed in later versions. |
https://en.wikipedia.org/wiki/Andreas%20Blass | Andreas Raphael Blass (born October 27, 1947) is a mathematician, currently a professor at the University of Michigan. He works in mathematical logic, particularly set theory, and theoretical computer science.
Blass graduated from the University of Detroit, where he was a Putnam Fellow in 1965, in 1966 with a B.S. in physics. He received his Ph.D. in 1970 from Harvard University, with a thesis on Orderings of Ultrafilters written under the supervision of Frank Wattenberg. Since 1970 he has been employed by the University of Michigan, first as a T.H. Hildebrandt Research Instructor (1970–72), then assistant professor (1972–76), associate professor (1976–84) and since 1984 he has been a full professor there.
In 2014, he became a Fellow of the American Mathematical Society.
Selected publications and results
In 1984 Blass proved that the existence of a basis for every vector space is equivalent to the axiom of choice. He made important contributions in the development of the set theory of the reals and forcing.
Blass was the first to point out connections between game semantics and linear logic.
He has authored more than 200 research articles in mathematical logic and theoretical computer science, including: |
https://en.wikipedia.org/wiki/Amazon%20ElastiCache | Amazon ElastiCache is a fully managed in-memory data store and cache service by Amazon Web Services (AWS). The service improves the performance of web applications by retrieving information from managed in-memory caches, instead of relying entirely on slower disk-based databases. ElastiCache supports two open-source in-memory caching engines: Memcached and Redis (also called "ElastiCache for Redis").
As a web service running in the computing cloud, Amazon ElastiCache is designed to simplify the setup, operation, and scaling of memcached and Redis deployments. Complex administration processes like patching software, backing up and restoring data sets and dynamically adding or removing capabilities are managed automatically. Scaling ElastiCache resources can be performed by a single API call.
Amazon ElastiCache was first released on August 22, 2011, supporting memcached. This was followed by support for reserved instances on April 5, 2012 and Redis on September 4, 2013.
Uses
As a managed database service with multiple supported engines, Amazon ElastiCache has a wide range of uses, including
Performance acceleration
Database limitations are often a bottleneck for application performance. By placing Amazon ElastiCache between an application and its database tier, database operations can be accelerated.
Cost reduction
Using ElastiCache for database performance acceleration can significantly reduce the infrastructure needed to support the database. In many cases, the cost savings outweigh the cache costs. Expedia was able to use ElastiCache to reduce provisioned DynamoDB capacity by 90%, reducing total database cost by 6x.
Processing time series data
Using the Redis engine, ElastiCache can rapidly process time-series data, quickly selecting newest or oldest records or events within range of a point-in-time.
Leaderboards
Leaderboards are an effective way to show a user quickly where they currently stand within a gamified system. For systems with large numbers of gam |
https://en.wikipedia.org/wiki/Ethnocomputing | Ethnocomputing is the study of the interactions between computing and culture. It is carried out through theoretical analysis, empirical investigation, and design implementation. It includes research on the impact of computing on society, as well as the reverse: how cultural, historical, personal, and societal origins and surroundings cause and affect the innovation, development, diffusion, maintenance, and appropriation of computational artifacts or ideas. From the ethnocomputing perspective, no computational technology is culturally "neutral," and no cultural practice is a computational void. Instead of considering culture to be a hindrance for software engineering, culture should be seen as a resource for innovation and design.
Subject matter
Social categories for ethnocomputing include:
Indigenous computing: In some cases, ethnocomputing "translates" from indigenous culture to high tech frameworks: for example, analyzing the African board game Owari as a one-dimensional cellular automaton.
Social/historical studies of computing: In other cases ethnocomputing seeks to identify the social, cultural, historical, or personal dimensions of high tech computational ideas and artifacts: for example, the relationship between the Turing Test and Alan Turing's closeted gay identity.
Appropriation in computing: lay persons who did not participate in the original design of a computing system can still affect it by modifying its interpretation, use, or structure. Such "modding" may be as subtle as the key board character "emoticons" created through lay use of email, or as blatant as the stylized customization of computer cases.
Equity tools: a software "Applications Quest" has been developed for generating a "diversity index" that allows consideration of multiple identity characteristics in college admissions.
Technical categories in ethnocomputing include:
Organized structures and models used to represent information (data structures)
Ways of manipulating the organiz |
https://en.wikipedia.org/wiki/Affinity%20capture | Affinity capture is a technique in molecular biology used to isolate desired compounds based on their chemical properties and a solid substrate. Commonly, plates out of solid materials such as glass are coated with various reagents to allow for covalent bonding of a capturing molecule such as an antibody. Afterwards, a solvent containing a desired compound for isolation is poured onto the plate, and the compound binds to the receptors on the plate (hence the capturing of the compound). Washing the plate and removing the desired compound completes the purification process.
Applications
Affinity capture has been used to isolate proteins by means of binding a peptide sequence to the solid substrate, thus allowing for protein capture. The process has also been examined for potential automation, but the unique circumstances for any given experiment may impede reproducibility. |
https://en.wikipedia.org/wiki/Mutant%20protein | A mutant protein is the protein product encoded by a gene with mutation. Mutated protein can have single amino acid change (minor, but still in many cases significant change leading to disease) or wide-range amino acid changes by e.g. truncation of C-terminus after introducing premature stop codon.
See also
Site-directed mutagenesis
Phi value analysis
missense mutation
nonsense mutation
point mutation
frameshift mutation
silent mutation
single-nucleotide polymorphism |
https://en.wikipedia.org/wiki/Bombenzielanlage | The Bombenzielanlage ("Bomb Target System"), sometimes referred to as the Bomb Ziel Automat (BZA), was a German World War II bombsight analog computer designed to calculate the precise release of bombs during dive-bombing. It was fitted to a number of aircraft types, including the Junkers Ju 88 and the Arado Ar 234. The unit controlled an aiming mark on sight in front of the pilot. The computer assessed the angle of dive, aircraft track, and altitude. The operator set other variables, such as barometric pressure, target altitude, airspeed and wind speed. During operation, the bomb(s) were released when an aiming mark coincided with the target.
Further reading
Photographs of BZA equipment: Images 18 to 23 in image gallery in Hollway, Don, 'The Battle of Graveney Marsh'. History Magazine. Feb/March 2019. http://www.donhollway.com/graveneymarsh/index.html Accessed 2020-04-20. |
https://en.wikipedia.org/wiki/Physiologia%20Plantarum | Physiologia Plantarum is a peer-reviewed scientific journal published by Wiley-Blackwell on behalf of the Scandinavian Plant Physiology Society. The journal publishes papers on all aspects of all organizational levels of experimental plant biology ranging from biophysics, biochemistry, molecular and cell biology to ecophysiology.
According to the Journal Citation Reports, the journal has a 2021 impact factor of 5.081, ranking it 33rd out of 235 journals in the category "Plant Sciences". |
https://en.wikipedia.org/wiki/Vulkan | Vulkan is a low-overhead, cross-platform API and open standard for 3D graphics and computing. It was originally developed as Mantle by AMD, but was later given to Khronos Group. It was intended to address the shortcomings of OpenGL, and allow developers more control over the GPU.
Overview
Vulkan targets high-performance real-time 3D-graphics applications, such as video games and interactive media, and highly parallelized computing. Vulkan is intended to offer higher performance and more efficient CPU and GPU usage compared to the older OpenGL and Direct3D 11 APIs. It does so by providing a considerably lower-level API for the application than the older APIs that more closely resembles how modern GPUs work.
Vulkan is comparable to Apple's Metal API and Microsoft's Direct3D 12, and is harder to use than the higher-level OpenGL and Direct3D 11 APIs. In addition to its lower CPU usage, Vulkan is designed to allow developers to better distribute work among multiple CPU cores.
Vulkan was first announced by the non-profit Khronos Group at GDC 2015. The Vulkan API was initially referred to as the "next generation OpenGL initiative", or "OpenGL next" by Khronos, but use of those names was discontinued when "Vulkan" was announced.
Vulkan is derived from and built upon components of AMD's Mantle API, which was donated by AMD to Khronos with the intent of giving Khronos a foundation on which to begin developing a low-level API that they could standardize across the industry.
Features
Vulkan is intended to provide a variety of advantages over other APIs as well as its predecessor, OpenGL. Vulkan offers lower overhead, more direct control over the GPU, and lower CPU usage. The overall concept and feature set of Vulkan is similar to concepts seen in Mantle and later adopted by Microsoft with Direct3D 12 and Apple with Metal.
Intended advantages of Vulkan over previous-generation APIs include the following:
Unified API
Vulkan provides a single API for both desktop and mo |
https://en.wikipedia.org/wiki/Variable%20%28mathematics%29 | In mathematics, a variable (from Latin variabilis, "changeable") is a symbol that represents a mathematical object. A variable may represent a number, a vector, a matrix, a function, the argument of a function, a set, or an element of a set.
Algebraic computations with variables as if they were explicit numbers solve a range of problems in a single computation. For example, the quadratic formula solves any quadratic equation by substituting the numeric values of the coefficients of that equation for the variables that represent them in the quadratic formula. In mathematical logic, a variable is either a symbol representing an unspecified term of the theory (a meta-variable), or a basic object of the theory that is manipulated without referring to its possible intuitive interpretation.
History
In ancient works such as Euclid's Elements, single letters refer to geometric points and shapes. In the 7th century, Brahmagupta used different colours to represent the unknowns in algebraic equations in the Brāhmasphuṭasiddhānta. One section of this book is called "Equations of Several Colours".
At the end of the 16th century, François Viète introduced the idea of representing known and unknown numbers by letters, nowadays called variables, and the idea of computing with them as if they were numbers—in order to obtain the result by a simple replacement. Viète's convention was to use consonants for known values, and vowels for unknowns.
In 1637, René Descartes "invented the convention of representing unknowns in equations by x, y, and z, and knowns by a, b, and c". Contrarily to Viète's convention, Descartes' is still commonly in use. The history of the letter x in math was discussed in a 1887 Scientific American article.
Starting in the 1660s, Isaac Newton and Gottfried Wilhelm Leibniz independently developed the infinitesimal calculus, which essentially consists of studying how an infinitesimal variation of a variable quantity induces a corresponding variation of anothe |
https://en.wikipedia.org/wiki/Aquiherbosa | An aquiherbosa is a plant community of herbaceous plants that exists in abundantly wet areas. This can refer to plant communities in wetlands, ponds, or other bodies of water. |
https://en.wikipedia.org/wiki/Osmoconformer | Osmoconformers are marine organisms that maintain an internal environment which is isotonic to their external environment. This means that the osmotic pressure of the organism's cells is equal to the osmotic pressure of their surrounding environment. By minimizing the osmotic gradient, this subsequently minimizes the net influx and efflux of water into and out of cells. Even though osmoconformers have an internal environment that is isosmotic to their external environment, the types of ions in the two environments differ greatly in order to allow critical biological functions to occur.
An advantage of osmoconformation is that such organisms don’t need to expend as much energy as osmoregulators in order to regulate ion gradients. However, to ensure that the correct types of ions are in the desired location, a small amount of energy is expended on ion transport. A disadvantage to osmoconformation is that the organisms are subject to changes in the osmolarity of their environment.
Examples
Invertebrates
Most osmoconformers are marine invertebrates such as echinoderms (such as starfish), mussels, marine crabs, lobsters, jellyfish, ascidians (sea squirts - primitive chordates), and scallops. Some insects are also osmoconformers. Some osmoconformers, such as echinoderms, are stenohaline, which means they can only survive in a limited range of external osmolarities. The survival of such organisms is thus contingent on their external osmotic environment remaining relatively constant. On the other hand, some osmoconformers are classified as euryhaline, which means they can survive in a broad range of external osmolarities. Mussels are a prime example of a euryhaline osmoconformer. Mussels have adapted to survive in a broad range of external salinities due to their ability to close their shells which allows them to seclude themselves from unfavorable external environments.
Craniates
There are a couple of examples of osmoconformers that are craniates such as ha |
https://en.wikipedia.org/wiki/Isaak%20Khalatnikov | Isaak Markovich Khalatnikov (, ; 17 October 1919 – 9 January 2021) was a leading Soviet theoretical physicist who made significant contributions to many areas of theoretical physics, including general relativity, quantum field theory, as well as the theory of quantum liquids. He is well known for his role in developing the Landau-Khalatnikov theory of superfluidity and the so-called BKL conjecture in the general theory of relativity.
Life and career
Isaak Khalatnikov was born into a Ukrainian Jewish family in Yekaterinoslav (now Dnipro, Ukraine) and graduated from Dnipropetrovsk State University with a degree in Physics in 1941. He had been a member of the Communist Party since 1944. He earned his doctorate in 1952. His wife Valentina was the daughter of Revolutionary hero Mykola Shchors.
Much of Khalatnikov's research was a collaboration with, or inspired by, Lev Landau, including the Landau-Khalatnikov theory of superfluidity.
During 1969 he briefly worked as a part-time professor of theoretical physics at Leiden University.
In 1970, inspired by the mixmaster model introduced by Charles W. Misner, then at Princeton University, Khalatnikov, together with Vladimir Belinski and Evgeny Lifshitz, introduced what has become known as the BKL conjecture, which is widely regarded as one of the most outstanding open problems in the classical theory of gravitation.
Khalatnikov directed the Landau Institute for Theoretical Physics in Moscow from 1965 to 1992. He was elected to the Academy of Sciences of the Soviet Union in 1984. He has been awarded the Landau Gold Medal, the Humboldt Prize, and the Marcel Grossmann Award. He was also a foreign member of the Royal Society of London.
He was portrayed by actor Georg Nikoloff in the film The Theory of Everything.
Khalatnikov died in Chernogolovka on 9 January 2021, aged 101.
Honours and awards
Order "For Merit to the Fatherland", 3rd class (1999)
Order of Alexander Nevsky (2020)
Order of the October Revolution (1986)
|
https://en.wikipedia.org/wiki/Hyphomicrobiales | The Hyphomicrobiales (synonom Rhizobiales) are an order of Gram-negative Alphaproteobacteria.
The rhizobia, which fix nitrogen and are symbiotic with plant roots, appear in several different families. The four families Nitrobacteraceae, Hyphomicrobiaceae, Phyllobacteriaceae, and Rhizobiaceae contain at least several genera of nitrogen-fixing, legume-nodulating, microsymbiotic bacteria. Examples are the genera Bradyrhizobium and Rhizobium. Species of the Methylocystaceae are methanotrophs; they use methanol (CH3OH) or methane (CH4) as their sole energy and carbon sources. Other important genera are the human pathogens Bartonella and Brucella, as well as Agrobacterium (useful in genetic engineering).
Taxonomy
Accepted families
Aestuariivirgaceae Li et al. 2019
Afifellaceae Hördt et al. 2020
Ahrensiaceae Hördt et al. 2020
Alsobacteraceae Sun et al. 2018
Amorphaceae Hördt et al. 2020
Ancalomicrobiaceae Dahal et al. 2018
Aurantimonadaceae Hördt et al. 2020
Bartonellaceae Gieszczykiewicz 1939 (Approved Lists 1980)
Beijerinckiaceae Garrity et al. 2006
Blastochloridaceae Hördt et al. 2020
Boseaceae Hördt et al. 2020
Breoghaniaceae Hördt et al. 2020
Brucellaceae Breed et al. 1957 (Approved Lists 1980)
Chelatococcaceae Dedysh et al. 2016
Cohaesibacteraceae Hwang and Cho 2008
Devosiaceae Hördt et al. 2020
Hyphomicrobiaceae Babudieri 1950 (Approved Lists 1980)
Kaistiaceae Hördt et al. 2020
Lichenibacteriaceae Pankratov et al. 2020
Lichenihabitantaceae Noh et al. 2019
Methylobacteriaceae Garrity et al. 2006
Methylocystaceae Bowman 2006
Nitrobacteraceae corrig. Buchanan 1917 (Approved Lists 1980)
Notoacmeibacteraceae Huang et al. 2017
Parvibaculaceae Hördt et al. 2020
Phreatobacteraceae Hördt et al. 2020
Phyllobacteriaceae Mergaert and Swings 2006
Pleomorphomonadaceae Hördt et al. 2020
Pseudoxanthobacteraceae Hördt et al. 2020
Rhabdaerophilaceae Ming et al. 2020
Rhizobiaceae Conn 1938 (Approved Lists 1980)
Rhodobiaceae Garrity et al. 2006
R |
https://en.wikipedia.org/wiki/Sirius%20%28synchrotron%20light%20source%29 | Sirius is a diffraction-limited storage ring synchrotron light source at the Laboratório Nacional de Luz Síncrotron in Campinas, São Paulo State, Brazil. It has a circumference of , a diameter of , and an electron energy of 3 GeV. The produced synchrotron radiation covers the range of infrared, optical, ultraviolet and X-ray light.
Costing R$1.8 billion, it was funded by the Ministry of Science, Technology, Innovation and Communication (Brazil) and the São Paulo Research Foundation. Discussion started in 2008, and initial funding of R$2 million was granted in 2009. Construction started in 2015, and was finished in 2018. The first electron loop around the storage ring was achieved in November 2019. Its first experiments were made during COVID-19 pandemic at MANACÁ beamline, dedicated to macromolecular crystallography.
Sirius is the second synchrotron lightsource constructed in Brazil. The first one, UVX, was a second generation machine operated by LNLS from 1997 to 2019.
Characteristics
Sirius is used to understand the atomic structure of substances, which can help in the development of new drugs, new materials used in construction, oil exploration and in many other areas. The 68,000-square-meter building houses a ring-shaped, circumferential 500-meter facility. To protect people from the radiation released by machine operation, designed to be the most advanced of its kind in the world, the whole is shielded by 1 kilometer of concrete walls. Around R$1.8 billion were invested in the project, which makes it the most ambitious scientific project ever made in Brazil.
Beamlines
Currently, Sirius has 9 operational beamlines, 1 in scientific commissioning, 2 in the assembly phase and 1 the design phase. |
https://en.wikipedia.org/wiki/Current%20solar%20income | The current solar income of the Earth, or any ecoregion of the earth, is the amount of solar energy that falls on it as sunlight. This is thought important in some branches of green economics, as the ultimate measure of renewable energy.
Buckminster Fuller first described the concept in his 1970 paper Cosmic Costing, contrasting the photosynthesis on which natural capital and sustainable infrastructural capital depend, with the chemosynthesis of extracting and using fossil fuels.
Paul Hawken is a more recent advocate of the concept, and views it as central to his notion of a restorative economy. It remains a popular notion among those who believe that toxic waste and maintenance problems of direct solar energy devices can ultimately be overcome, or that yields of passive or biological means of gathering and using this energy as biofuels can be made to approximate those of fossil fuels.
See also
Howard Odum
Vladimir Ivanovich Vernadsky
solar constant
Buckminster Fuller
Renewable energy economy
Systems ecology
Energy economics |
https://en.wikipedia.org/wiki/Flag%20jacking | Flag-jacking () is the act of travelers wearing a foreign flag on their clothing or backpack in an attempt to disguise the country they are visiting from; this occurs most prominently in cases where American tourists wear Canadian flags in an attempt to pass as Canadians. The intention is that by showing the flag of a country regarded favorably by the region they are visiting, they will receive friendlier treatment or service than they might otherwise have encountered.
Origin
The term flag-jacking gained additional popularity after an article entitled "How to Spot Flag-Jacking Frauds Abroad" was published on 1 July 2013 by The Huffington Post. The article stated that flag-jacking is a transitory act involving a person's use of a country's flag to create the false impression of being a citizen of a favored nation. The most common situation, according to the article, is when Americans pose as Canadians. Instances of flag-jacking date to the late 1990s.
Identification
Business Insider, CNN, FlightNetwork, and The Huffington Post have claimed it is possible to identify flag jackers by analysing their body language. In honor of Canada Day in 2013, FlightNetwork and their PR Agency (Pointman News Creation) commissioned Mark Bowden (of Truthplane) a top international body language expert, to provide humorous tips on how Americans can pass themselves off as Canadians by adopting gestures that he termed the "Maple-o-gy", the "Canuck Crinkle", the "Toque Tilt", the "Stars and Gripes Forever", the "Polka-Loon" and the "American Psycho". |
https://en.wikipedia.org/wiki/Complete%20linkage | In genetics, complete (or absolute) linkage is defined as the state in which two loci are so close together that alleles of these loci are virtually never separated by crossing over. The closer the physical location of two genes on the DNA, the less likely they are to be separated by a crossing-over event. In the case of male Drosophila there is complete absence of recombinant types due to absence of crossing over. This means that all of the genes that start out on a single chromosome, will end up on that same chromosome in their original configuration. In the absence of recombination, only parental phenotypes are expected.
Linkage
Genetic Linkage is the tendency of alleles, which are located closely together on a chromosome, to be inherited together during the process of meiosis in sexually reproducing organisms. During the process of meiosis, homologous chromosomes pair up, and can exchange corresponding sections of DNA. As a result, genes that were originally on the same chromosome can finish up on different chromosomes. This process is known as genetic recombination. The rate of recombination of two discrete loci corresponds to their physical proximity. Alleles that are closer together have lower rates of recombination than those that are located far apart. The distance between two alleles on a chromosome can be determined by calculating the percentage or recombination between two loci. These probabilities of recombination can be used to construct a linkage map, or a graphical representation of the location of genes and gene in respect to one another. If linkage is complete, there should be no recombination events that separate the two alleles, and therefore only parental combinations of alleles should be observed in offspring. Linkage between two loci can have significant implications regarding the inheritance of certain types of diseases.
Gene maps or Qualitative Trait Loci (QTL) maps can be produced using two separate methods. One way uses the frequency |
https://en.wikipedia.org/wiki/Ectopic%20pancreas | An ectopic pancreas is an anatomical abnormality in which pancreatic tissue has grown outside its normal location and without vascular or other anatomical connections to the pancreas. It is a congenital disease and is also known as heterotopic, accessory, or aberrant pancreas.
Signs and symptoms
Often, heterotopic pancreas is asymptomatic. When present, symptoms may include abdominal pain and distension. Often heterotopic pancreas is recognized as an incidental finding on imaging studies performed for an unrelated reason. Ectopic pancreatic tissue may occur anywhere in the abdominal cavity, though more than 90 percent are found in the stomach, duodenum or jejunum. Rarely, pancreatic heterotopic tissue may be found in the colon, spleen or liver.
Diagnosis
The diagnosis of ectopic pancreas can be challenging. Confirmation of the diagnosis requires tissue sampling, via biopsy or surgical resection.
Treatment
If no symptoms are present, then treatment is not necessary. When symptoms are present, treatment consists of surgical resection.
Epidemiology
The incidence of heterotopic pancreas is relatively low. |
https://en.wikipedia.org/wiki/Dodecahedral%20conjecture | The dodecahedral conjecture in geometry is intimately related to sphere packing.
László Fejes Tóth, a 20th-century Hungarian geometer, considered the Voronoi decomposition of any given packing of unit spheres. He conjectured in 1943 that the minimal volume of any cell in the resulting Voronoi decomposition was at least as large as the volume of a regular dodecahedron circumscribed to a unit sphere.
Thomas Callister Hales and Sean McLaughlin proved the conjecture in 1998, following the same strategy that led Hales to his proof of the Kepler conjecture. The proofs rely on extensive computations. McLaughlin was awarded the 1999 Morgan Prize for his contribution to this proof. |
https://en.wikipedia.org/wiki/AgcXML | agcXML is a set of extensible markup language (XML) schemas designed to automate and streamline the exchange of information during the building design and construction process. agcXML facilitates the electronic exchange of typical business information between different programs that would otherwise be exchanged in unstructured construction documents.
Current state
As of February 2014, AGC re-focused on starting the schema development and adoption phase. AGC engaged the Burger Consulting Group(BCG) in Chicago to manage this process. To encourage collaboration with AGC and BCG, an Advisory Board composed of software vendors, contractors and AGC's IT Forum Steering committee members that work to determine and verify the direction of the agcXML PMO.
In October 2013, revisions to the existing schema Request for Information (RFI) and Change Order Directive began. The revisions to the alpha schema were completed on March 4, 2014 and a live RFI transaction demonstration was held at AGC's National Convention. The demonstration was a resounding success and the schema will now go onto the public review period. Progress still continues on the Change Order Directive with a public review period expected in May 2014.
Advisory board members
Advisory Board members included:
Charlene Atkinson, VP, Chief Information Officer, Swinteron, Inc.
Karmyn Babcock, IT Director, The Weitz Company
Tom Garrett, Vice President, Chief Safety & HR Officer, Brasfield & Gorrie
Maxime Montreil, IT Director, Colas, Inc.
Marc Goldman, Director of Strategy, The Blue Book and Construction Network
Yan Llamas, R&D Solutions Architect, COINS-Global
Eric Foster, Vice President, Development, Maxwell Systems
Ken Damon, Product Manager, PMWeb, Inc.
Dennis Stejskal, Vice President – Product Management, Sage Construction and Real Estate
Robert Humphreys, Vice President, Product Management, Viewpoint Construction Software
Bill Cobb, President, Haverstick-Borthwick Company
Kurt M. Koenig, Vice President of Pro |
https://en.wikipedia.org/wiki/Keysmash | A keysmash (alternatively key smash or keyboard smash) is internet slang for the typing out of a random sequence of letters on a computer keyboard or touchscreen, often to express intense emotion. Gaining popularity since 2019, the term is often used to convey intense or indescribable emotions (such as frustration or excitement), and it can also be used as an expression of laughter.
History and usage
Dictionary.com lists keysmash as both a noun ("I typed a keysmash") and a verb ("I keysmashed a response"), dating the term to sometime between 1995 and 2000.
The first commonly used variation of "keysmashing" appeared and possibly first majorly originated from the Turkish internet sphere, where the so-called "random laugh", or "random" (as said in Turkish) has been in use since at least the mid-2000s in online forums, e.g ekşisözlük, to convey and portray a more genuine laughter—implying a user "laughed so hard that they fell on (rolled over) their keyboard".
The term is often associated with Stan Twitter users, VSCO culture, and members of the LGBT community, but is not restricted to these groups. Keysmashing has occasionally been referred to as "gay keysmashing" due to this association.
Variations
Keysmashes of any kind can usually be seen in either all lower case, or all upper case letters. Despite how random many keysmashes may appear to be, there are societal patterns and norms to what a keysmash is supposed to look like. Keysmashes that fail to visually appeal to the ones typing them have a chance of being completely rewritten or having a few minor adjustments made (i.e. removing or adding new characters). The overall format of a keysmash is one that is usually dependent on the type of device or keyboard that is being used and therefore makes different keyboard layouts more acceptable for keysmashing than others.
QWERTY
Keysmashes typed on QWERTY keyboards are not as randomized as the action of keysmashing tends to imply. QWERTY keysmashes consistently |
https://en.wikipedia.org/wiki/Motivic%20integration | Motivic integration is a notion in algebraic geometry that was introduced by Maxim Kontsevich in 1995 and was developed by Jan Denef and François Loeser. Since its introduction it has proved to be quite useful in various branches of algebraic geometry, most notably birational geometry and singularity theory. Roughly speaking, motivic integration assigns to subsets of the arc space of an algebraic variety, a volume living in the Grothendieck ring of algebraic varieties. The naming 'motivic' mirrors the fact that unlike ordinary integration, for which the values are real numbers, in motivic integration the values are geometric in nature. |
https://en.wikipedia.org/wiki/Galactic%20Bridges%20and%20Tails | Galactic Bridges and Tails is a computer animation film created in 1972 by astrophysicists Alar Toomre and Juri Toomre. The brothers created the film as a teaching aid to accompany their 1972 landmark research paper of the same name, published in The Astrophysical Journal, which described galaxy collisions and galaxy mergers.
Technology of the original animated film
The Toomre film contains both 2D and 3D computer graphics simulations of colliding galaxies. The animations are time-lapses that compress billions of years into just a few minutes. Written in the FORTRAN programming language, the simulations sent character and vector information to a CRT-based ASCII character film recorder. The film recorder exposed multiple frames of 16mm film to create the final animated film.
Digital film restoration
In 2007, filmmaker Michael Lauter worked with the Toomre brothers to digitally restore the 16mm original film and create a new HD video (1080p24) digital master.
Derivative simulations
Massachusetts-based MathWorks created a Simulink model titled Spiral Galaxy Formation Simulation for use within their MATLAB programming environment. The company states that their computer animation model was inspired by the original Galactic Bridges and Tails paper and film. |
https://en.wikipedia.org/wiki/Moseley%27s%20law | Moseley's law is an empirical law concerning the characteristic X-rays emitted by atoms. The law had been discovered and published by the English physicist Henry Moseley in 1913–1914. Until Moseley's work, "atomic number" was merely an element's place in the periodic table and was not known to be associated with any measurable physical quantity. In brief, the law states that the square root of the frequency of the emitted X-ray is approximately proportional to the atomic number:
History
The historic periodic table was roughly ordered by increasing atomic weight, but in a few famous cases the physical properties of two elements suggested that the heavier ought to precede the lighter. An example is cobalt having the atomic weight of 58.9 and nickel having the atomic weight of 58.7.
Henry Moseley and other physicists used X-ray diffraction to study the elements, and the results of their experiments led to organizing the periodic table by proton count.
Apparatus
Since the spectral emissions for the lighter elements would be in the soft X-ray range (absorbed by air), the spectrometry apparatus had to be enclosed inside a vacuum. Details of the experimental setup are documented in the journal articles "The High-Frequency Spectra of the Elements" Part I and Part II.
Results
Moseley found that the lines (in Siegbahn notation) were indeed related to the atomic number, Z.
Following Bohr's lead, Moseley found that for the spectral lines, this relationship could be approximated by a simple formula, later called Moseley's Law.
where:
is the frequency of the observed X-ray emission line
and are constants that depend on the type of line (that is, K, L, etc. in X-ray notation)
Rydberg frequency and = 1 for lines, and Rydberg frequency and for lines.
Derivation
Moseley derived his formula empirically by fitting the square root of the X-ray frequency plotted against the atomic number. This formula can be explained based on the Bohr model of the atom, namely, |
https://en.wikipedia.org/wiki/THEOS | THEOS, which translates from Greek as "God", is an operating system which started out as OASIS, a microcomputer operating system for small computers that use the Z80 processor. When the operating system was launched for the IBM Personal Computer/AT in 1982, the decision was taken to change the name from OASIS to THEOS, short for THE Operating System.
History
OASIS
The OASIS operating system was originally developed and distributed in 1977 by Phase One Systems of Oakland, California (President Howard Sidorsky). OASIS was developed for the Z80 processor and was the first multi-user operating system for 8-bit microprocessor based computers (Z-80 from Zilog). "OASIS" was a backronym for "Online Application System Interactive Software".
OASIS consisted of a multi-user operating system, a powerful Business Basic/Interpreter, C compiler and a powerful text editor. Timothy Williams developed OASIS and was employed at Phase One. The market asked for 16-bit systems but there was no real 16-bit multi-user OS for 16-bit systems. Every month Phase One announced OASIS-16 but it did not come. One day Timothy Williams claimed that he owned OASIS and started a court case against Phase One and claimed several million U.S. dollars. Sidorsky had no choice and claimed Chapter 11. The court case took two years and finally the ruling was that Timothy Williams was allowed to develop the 16-bit version of OASIS but he was not allowed to use the OASIS name anymore.
David Shirley presented an alternative history at the Computer Information Centre, an OASIS distributor for the UK in the early 1980s. He said Timothy Williams developed the OASIS operating system and contracted with Phase One Systems to market and sell the product. Development of the 16-bit product was underway, but the product was prematurely announced by POS. This led to pressure to release OASIS early, when it was still not properly debugged or optimised. (OASIS 8-bit was quite well optimised by that point, with many parts |
https://en.wikipedia.org/wiki/Parenthesome | Within the cells of some members of basidiomycetes fungi are found microscopic structures called parenthesomes or septal pore caps. They are shaped like parentheses and found on either side of pores in the dolipore septum which separates cells within a hypha. Their function has not been established, and their composition has not been fully elucidated. The variations in their appearance are useful in distinguishing individual species.
Generally, they are barrel shaped, with an endoplasmic reticulum covering.
See also
Pit connection |
https://en.wikipedia.org/wiki/ODE-CDV | ODE-CDV (octadecyloxyethyl-cidofovir) is a cidofovir derivative with antiviral activity. |
https://en.wikipedia.org/wiki/Tenuazonic%20acid | Tenuazonic acid is a mycotoxin produced by Alternaria species. It is a powerful eukaryotic protein synthesis inhibitor. It is a tetrameric acid that is ubiquitous in biological environments and prevents the release of newly synthesized protein from the ribosome. Its toxicity is the highest among all Alternaria mycotoxins and has both phytotoxic and cytotoxic properties. In 1991 Tenuazonic acid was reported to inhibit skin tumor promotion in mice.
Inhibitory properties
Tenuazonic acid (TeA) is a potent phytotoxin and an effective bio-herbicide due to its ability to block the photosynthetic pathway. It specifically plays an inhibitory role in photosystem II (PSII) by blocking the flow of electrons from QA to QB. Studies aimed to determine the exact binding site of TeA in photosystem II found that it binds to the QB site, preventing QA from transferring its electrons to QB. Chlorophyll fluorescence study of the croftonweed plant treated by TeA in vivo show a time dependent increase of reduced QA as electron transfer is halted. This resulted in decreased photosynthesis in vivo. Tenuazonic acid also resulted in inactivation of PSII QA and QB reaction centers. Understanding this inhibitory mechanism of tenuazonic acid in photosynthesis allows for creation of new herbicides which are more targeted and less lethal to the environment.
Tenuazonic acid has been a compound of interest in drug development research for Alzheimer's disease (AD). Several factors contribute to the onset of AD, including low levels of the neurotransmitter acetylcholine (Ach), heightened production of free radicals, and reactive oxygen species (ROS) that cause increased oxidative stress. A drug for AD must target multiple factors of the disease to have a successful therapeutic effect. One study examining six natural compounds determined tenuazonic acid to be a viable compound to treat this multi-factorial disease due to its anti-oxidative and acetylcholinesterase inhibiting properties. Acetylcholin |
https://en.wikipedia.org/wiki/Golgi%20tendon%20organ | The Golgi tendon organ (GTO) (also called Golgi organ, tendon organ, neurotendinous organ or neurotendinous spindle) is a proprioceptor – a type of sensory receptor that senses changes in muscle tension. It lies at the interface between a muscle and its tendon known as the musculotendinous junction also known as the myotendinous junction. It provides the sensory component of the Golgi tendon reflex.
The Golgi tendon organ is one of several eponymous terms named after the Italian physician Camillo Golgi.
Structure
The body of the Golgi tendon organ is made up of braided strands of collagen (intrafusal fasciculi) that are less compact than elsewhere in the tendon and are encapsulated.
The capsule is connected in series (along a single path) with a group of muscle fibers () at one end, and merge into the tendon proper at the other.
Each capsule is about long, has a diameter of about , and is perforated by one or more afferent type Ib sensory nerve fibers (Aɑ fiber), which are large myelinated axons that can conduct nerve impulses very rapidly.
Inside the capsule, the afferent fibers lose their medullary sheaths, branch, intertwine with the collagen fibers, and terminate as flattened leaf-like endings between the collagen strands (see figure).
Function
When the muscle generates force, the sensory terminals are compressed. This stretching deforms the terminals of the Ib afferent axon, opening stretch-sensitive cation channels. As a result, the Ib axon is depolarized and fires nerve impulses that are propagated to the spinal cord. The action potential frequency signals the force being developed by 10-20 extrafusal muscle fibers in the muscle. Average level of activity in a tendon organ population is representative of the whole muscle force.
The Ib sensory feedback generates stretch reflexes and supraspinal responses which control muscle contraction. Ib afferents synapse with interneurons in the spinal cord that also project to the brain cerebellum and cerebral cor |
https://en.wikipedia.org/wiki/Shimon%20Even | Shimon Even (; June 15, 1935 – May 1, 2004) was an Israeli computer science researcher. His main topics of interest included algorithms, graph theory and cryptography. He was a member of the Computer Science Department at the Technion since 1974. Shimon Even was the PhD advisor of Oded Goldreich, a prominent cryptographer.
Books
Algorithmic Combinatorics, Macmillan, 1973.
Graph Algorithms, Computer Science Press, 1979. .
See also
Oblivious transfer
External links
Memorial page
Bibliography on DBLP
Prof. Even's "genealogy" (PDF)
1935 births
2004 deaths
Modern cryptographers
Graph theorists
Israeli computer scientists
Israeli cryptographers
Harvard University alumni
Even Shimon
Burials at Yarkon Cemetery |
https://en.wikipedia.org/wiki/Torus-based%20cryptography | Torus-based cryptography involves using algebraic tori to construct a group for use in ciphers based on the discrete logarithm problem. This idea was first introduced by Alice Silverberg and Karl Rubin in 2003 in the form of a public key algorithm by the name of CEILIDH. It improves on conventional cryptosystems by representing some elements of large finite fields compactly and therefore transmitting fewer bits.
See also
Torus |
https://en.wikipedia.org/wiki/UBlock%20Origin | uBlock Origin (; "" ) is a free and open-source browser extension for content filtering, including ad blocking. The extension is available for Chrome, Chromium, Edge, Firefox, Opera, Pale Moon, as well as versions of Safari prior to 13. uBlock Origin has received praise from technology websites and is reported to be much less memory-intensive than other extensions with similar functionality. uBlock Origin's stated purpose is to give users the means to enforce their own (content-filtering) choices.
uBlock Origin is actively developed and maintained by its creator and lead developer Raymond Hill.
History
uBlock
uBlock was initially named "μBlock" but the name was later changed to "uBlock" to avoid confusion as to how the Greek letter μ (Mu/Micro) in "μBlock" should be pronounced. Development started by forking from the codebase of HTTP Switchboard along with another blocking extension called uMatrix, designed for advanced users. uBlock was developed by Raymond Hill to use community-maintained block lists, while adding features and raising the code quality to release standards. First released in June 2014 as a Chrome and Opera extension, by winter 2015, the extension had expanded to other browsers.
The uBlock project official repository was transferred to Chris Aljoudi by original developer Raymond Hill in April 2015, due to frustration of dealing with requests. However, Hill immediately self-forked it and continued the effort there. This version was later renamed uBlock Origin and it has been completely divorced from Aljoudi's uBlock. Aljoudi created ublock.org to host and promote uBlock and to request donations. In response, uBlock's founder Raymond Hill stated that "the donations sought by ublock.org are not benefiting any of those who contributed most to create uBlock Origin." The development of uBlock stopped in August 2015 and it has been sporadically updated since January 2017. In July 2018, ublock.org was acquired by AdBlock, and since February 2019, uBlock |
https://en.wikipedia.org/wiki/Embrace%2C%20extend%2C%20and%20extinguish | "Embrace, extend, and extinguish" (EEE), also known as "embrace, extend, and exterminate", is a phrase that the U.S. Department of Justice found was used internally by Microsoft to describe its strategy for entering product categories involving widely used standards, extending those standards with proprietary capabilities, and then using those differences in order to strongly disadvantage its competitors.
Origin
The strategy and phrase "embrace and extend" were first described outside Microsoft in a 1996 article in The New York Times titled "Tomorrow, the World Wide Web! Microsoft, the PC King, Wants to Reign Over the Internet", in which writer John Markoff said, "Rather than merely embrace and extend the Internet, the company's critics now fear, Microsoft intends to engulf it." The phrase "embrace and extend" also appears in a facetious motivational song by an anonymous Microsoft employee, and in an interview of Steve Ballmer by The New York Times.
A variant of the phrase, "embrace, extend then innovate", is used in J Allard's 1994 memo "Windows: The Next Killer Application on the Internet" to Paul Maritz and other executives at Microsoft. The memo starts with a background on the Internet in general, and then proposes a strategy on how to turn Windows into the next "killer app" for the Internet:
The addition of "extinguish" in the phrase "embrace, extend and extinguish" was first introduced in the United States v. Microsoft Corp. antitrust trial when then vice president of Intel, Steven McGeady, used the phrase to explain Microsoft vice president Paul Maritz's statement in a 1995 meeting with Intel that described Microsoft's strategy to "kill HTML by extending it".
Strategy
The strategy's three phases are:
Embrace: Development of software substantially compatible with a competing product, or implementing a public standard.
Extend: Addition and promotion of features not supported by the competing product or part of the standard, creating interoperability prob |
https://en.wikipedia.org/wiki/Process%20variable | In control theory, a process variable (PV; also process value or process parameter) is the current measured value of a particular part of a process which is being monitored or controlled. An example of this would be the temperature of a furnace. The current temperature is the process variable, while the desired temperature is known as the set-point (SP).
Control system use
Measurement of process variables is essential in control systems to controlling a process. The value of the process variable is continuously monitored so that control may be exerted.
Four commonly measured variables that affect chemical and physical processes are: pressure, temperature, level and flow. but there are in fact a large number of measurement quantities which for international purposes use the International System of Units (SI)
The SP-PV error is used to exert control on a process so that the value of PV equals the value of the SP. A classic use of this is in the
PID controller. |
https://en.wikipedia.org/wiki/ENI%20number | An ENI number (European Number of Identification or European Vessel Identification Number) is a registration for ships capable of navigating on inland European waters. It is a unique, eight-digit identifier that is attached to a hull for its entire lifetime, independent of the vessel's current name or flag.
ENI was introduced by the Inland Transport Committee of the United Nations Economic Commission for Europe in their meeting on 11–13 October 2006 in Geneva. It is based on the Rhine Vessel certification system previously used for ships navigating the Rhine, and is comparable to the IMO ship identification number.
Format
The ENI number consists of eight Arabic numerals. The first three digits identify the competent authority where the number is assigned (see "List of prefixes" below) and the last five digits are a serial number.
Ships which have a vessel number in accordance to the Rhine Inspection Rules receive an ENI beginning with "0" and followed by the seven digit Rhine number. A vessel which has been issued an IMO number may only receive an ENI number if it has appropriate certifications for inland water travel. Its ENI will begin with "9" followed by its seven digit IMO number.
The ENI number is transmitted by Inland-Automatic Identification System transponders.
Requirements
Not all European vessels are required to carry an ENI number. As of April 2007, a vessel must have an ENI if it operates on inland waterways and meets any of the following criteria: is over in length; is greater than in volume; is a tug or push boat that operates with a qualifying vessel; is a passenger ship; or is a floating installation/equipment. If a vessel is issued an ENI, this number must be displayed on the sides and stern of the vessel.
List of prefixes |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.