source stringlengths 31 227 | text stringlengths 9 2k |
|---|---|
https://en.wikipedia.org/wiki/Polony%20sequencing | Polony sequencing is an inexpensive but highly accurate multiplex sequencing technique that can be used to “read” millions of immobilized DNA sequences in parallel. This technique was first developed by Dr. George Church's group at Harvard Medical School. Unlike other sequencing techniques, Polony sequencing technology is an open platform with freely downloadable, open source software and protocols. Also, the hardware of this technique can be easily set up with a commonly available epifluorescence microscopy and a computer-controlled flowcell/fluidics system. Polony sequencing is generally performed on paired-end tags library that each molecule of DNA template is of 135 bp in length with two 17–18 bp paired genomic tags separated and flanked by common sequences. The current read length of this technique is 26 bases per amplicon and 13 bases per tag, leaving a gap of 4–5 bases in each tag.
Workflow
The protocol of Polony sequencing can be broken into three main parts, which are the paired end-tag library construction, template amplification and DNA sequencing.
Paired end-tag library construction
This protocol begins by randomly shearing the tested genomic DNA into a tight size distribution. The sheared DNA molecules are then subjected for the end repair and A-tailed treatment. The end repair treatment converts any damaged or incompatible protruding ends of DNA to 5’-phosphorylated and blunt-ended DNA, enabling immediate blunt-end ligation, while the A-tailing treatment adds an A to the 3’ end of the sheared DNA. DNA molecules with a length of 1 kb are selected by loading on the 6% TBE PAGE gel. In the next step, the DNA molecules are circularized with T-tailed 30 bp long synthetic oligonucleotides (T30), which contains two outward-facing MmeI recognition sites, and the resulting circularized DNA undergoes rolling circle replication. The amplified circularized DNA molecules are then digested with MmeI (type IIs restriction endonuclease) which will cuts at a dista |
https://en.wikipedia.org/wiki/Nuclear%20reactor%20physics | Nuclear reactor physics is the field of physics that studies and deals with the applied study and engineering applications of chain reaction to induce a controlled rate of fission in a nuclear reactor for the production of energy.
Most nuclear reactors use a chain reaction to induce a controlled rate of nuclear fission in fissile material, releasing both energy and free neutrons. A reactor consists of an assembly of nuclear fuel (a reactor core), usually surrounded by a neutron moderator such as regular water, heavy water, graphite, or zirconium hydride, and fitted with mechanisms such as control rods which control the rate of the reaction.
The physics of nuclear fission has several quirks that affect the design and behavior of nuclear reactors. This article presents a general overview of the physics of nuclear reactors and their behavior.
Criticality
In a nuclear reactor, the neutron population at any instant is a function of the rate of neutron production (due to fission processes) and the rate of neutron losses (due to non-fission absorption mechanisms and leakage from the system). When a reactor’s neutron population remains steady from one generation to the next (creating as many new neutrons as are lost), the fission chain reaction is self-sustaining and the reactor's condition is referred to as "critical". When the reactor’s neutron production exceeds losses, characterized by increasing power level, it is considered "supercritical", and when losses dominate, it is considered "subcritical" and exhibits decreasing power.
The "Six-factor formula" is the neutron life-cycle balance equation, which includes six separate factors, the product of which is equal to the ratio of the number of neutrons in any generation to that of the previous one; this parameter is called the effective multiplication factor k, also denoted by Keff, where k = Є Lf ρ Lth f η, where Є = "fast-fission factor", Lf = "fast non-leakage factor", ρ = "resonance escape probability", Lth = |
https://en.wikipedia.org/wiki/Pom-Pom%20director | [[File:The Royal Navy during the Second World War A3651.jpg|thumbnail|right|Mark IV Directors on HMS King George V. The large rectangular box centred above the director contains the gyro rate unit. This image was taken early in King George Vs career before the addition of Type 282 radar.]]"Pom-Pom" director''' was a director for British anti-aircraft guns on British warships of the 1930s into the Second World War.
Development
The Vickers 40 mm QF 2 pounder "Pom-Pom" gun anti-aircraft mounting was introduced to the Royal Navy in the early 1930s. The multi-barrel mounting was capable of a tremendous volume of fire but the crew had great difficulty in aiming the mounting due to the smoke and vibration created by the guns. It was, therefore, essential to aim the mount from a remote location, using a director that had a clear view, free from smoke and vibration. The director crew would aim at the target aircraft and, in the early versions of the director, cause the layer (altitude) and trainer (azimuth) pointers to rotate on the gun mount. The gun crew would then move the mount to match the pointers rather than having to try and aim at the target aircraft.
Mark I - III directors
Directors I to III controlled the gun mounting through "follow the pointer" control and aimed at aircraft using eye shooting techniques through a simple ring sight. These directors began to appear on Royal Navy cruisers, battleships and aircraft carriers in 1930. They were universally fitted, one per pom-pom gun mounting, by the late 1930s. Most destroyers and smaller ships that carried 2-pounder guns continued to rely on aiming the guns with the on-mount gunsights due to the lack of space on these ships to site a director.
Director Mark IV
The Mk IV director was a considerable improvement and used gyroscopes in a gyro rate unit coupled to an optical rangefinder and Type 282 radar to determine the range, speed and direction of enemy aircraft and then used an on-director computer to produc |
https://en.wikipedia.org/wiki/Fry%20Medal | The F. E. J. Fry Medal is an annual award for zoology given by the Canadian Society of Zoologists.
It is presented to "the Canadian zoologist who has made an outstanding contribution to knowledge and understanding of an area in zoology". The recipient is expected to give a lecture to the next annual conference.
The award was established in 1974 in honour of Frederick E.J. Fry, the Canadian ichthyologist and aquatic ecologist, in recognition of his contribution to science in Canada.
Recipients
Source
See also
List of biologists
List of biology awards
List of awards named after people |
https://en.wikipedia.org/wiki/Sleeping%20barber%20problem | In computer science, the sleeping barber problem is a classic inter-process communication and synchronization problem that illustrates the complexities that arise when there are multiple operating system processes.
The problem was originally proposed in 1965 by computer science pioneer Edsger Dijkstra, who used it to make the point that general semaphores are often superfluous.
Problem statement
Imagine a hypothetical barbershop with one barber, one barber chair, and a waiting room with n chairs (n may be 0) for waiting customers. The following rules apply:
If there are no customers, the barber falls asleep in the chair
A customer must wake the barber if he is asleep
If a customer arrives while the barber is working, the customer leaves if all chairs are occupied and sits in an empty chair if it's available
When the barber finishes a haircut, he inspects the waiting room to see if there are any waiting customers and falls asleep if there are none
There are two main complications. First, there is a risk that a race condition, where the barber sleeps while a customer waits for the barber to get them for a haircut, arises because all of the actions—checking the waiting room, entering the shop, taking a waiting room chair—take a certain amount of time. Specifically, a customer may arrive to find the barber cutting hair so they return to the waiting room to take a seat but while walking back to the waiting room the barber finishes the haircut and goes to the waiting room, which he finds empty (because the customer walks slowly or went to the restroom) and thus goes to sleep in the barber chair. Second, another problem may occur when two customers arrive at the same time when there is only one empty seat in the waiting room and both try to sit in the single chair; only the first person to get to the chair will be able to sit.
A multiple sleeping barbers problem has the additional complexity of coordinating several barbers among the waiting customers.
Solutions
T |
https://en.wikipedia.org/wiki/Numbuster | NumBuster! is a phone community that users can access via a mobile phone client and a Web application. Developed by NumBuster Ltd, it allows users to find contact details of any phone number, exchange information about numbers with other users and block calls and messages. The client is available for Android and Apple iOS.
History
NumBuster! was developed by NumBuster Ltd, a privately held company founded by Evgeny Gnutikov, Ilya Osipov and some others. The project was launched on Android in May 2013 and as a Web site in February 2014. As of September 2014, it has more than 100 000 users in Russia and the CIS, where it was first launched. In July–August 2014, NumBuster! was accelerated in the biggest startup accelerator in France, NUMA Paris.
Features and functionality
The service is a global telephone directory that has social and call + SMS blocking functionality. It allows its users not only to find out the name of an unfamiliar caller or SMS sender, whether it's a person or a business, but also to rate and comment, thus adding more value to the service and helping other users in the community to get more information. Apart from that, users can block any phone number. Application is available on Android from May 2013 and on Apple iPhone from September 2014.
Languages and localization
NumBuster! is available in 12 languages: English, Russian, Turkish, Arabic, French, Chinese, Italian, Portuguese, Hindi, Spanish, Ukrainian and Korean.
Reception
Upon its release, NumBuster! gathered positive feedback from Russian bloggers and media, including a publication in a leading news web-site.
See also
List of most downloaded Android applications
Truecaller
Truth in Caller ID Act of 2009 |
https://en.wikipedia.org/wiki/Nathan%20Daboll | Nathan Daboll ( – March 9, 1818) was an American teacher who wrote the mathematics textbook most commonly used in American schools in the first half of the 19th century. During the course of his career, he also operated a popular navigation school for merchant mariners, and published a variety of almanacs during the American Revolution period.
Early years
Born in Groton, Connecticut, Daboll was the son of Nathan Daboll (born c. 1725 in East Hampton, New York; died c. 1780) and Anna Lynn (born 1724 in Groton). He had two brothers, John (born 1755) and Benjamin (1757–1848), and two sisters Susannah (born 1748) and Amy (born 1764). Daboll's father was born with the surname Dibble, but changed it to Daboll. Daboll's grandfather was born with the surname Dibble (sometimes spelled Deble).
Daboll had little formal education but mastered mathematics quickly while earning a living as a cooper.
Career
Daboll's early career was that of a teacher. He taught mathematics at the Academic School in Plainfield, Connecticut.
Because of Daboll's ability with mathematics, Samuel M. Green, an early almanac publisher in the colonies, asked Daboll to calculate almanac entries. Daboll did so, beginning in 1771, under the alias "Edmund Freebetter", before switching to publishing almanacs and registers under his own name. Almanacs were useful instruments in propaganda wars during the American Revolution. Some of Daboll's almanacs contained satirical or factual political commentary, while others didn't. For the most part, they contained common almanac material:
"lunations; eclipses of the luminaries; aspects; judgment of the weather; rising, sitting and southing of the seven stars; sun and moon's rising and sitting; festivals, and other remarkable days; courts; roads"
The textbook Daboll's schoolmaster's assistant: being a plain, practical system of arithmetic, adapted to the United States was published in 1799, and updated with Daboll's Schoolmaster's assistant, improved and enlarged be |
https://en.wikipedia.org/wiki/Improper%20rotation | In geometry, an improper rotation (also called rotation-reflection, rotoreflection, rotary reflection, or rotoinversion) is an isometry in Euclidean space that is a combination of a rotation about an axis and a reflection in a plane perpendicular to that axis. Reflection and inversion are each special case of improper rotation. Any improper rotation is an affine transformation and, in cases that keep the coordinate origin fixed, a linear transformation.
It is used as a symmetry operation in the context of geometric symmetry, molecular symmetry and crystallography, where an object that is unchanged by a combination of rotation and reflection is said to have improper rotation symmetry.
Three dimensions
In 3 dimensions, improper rotation is equivalently defined as a combination of rotation about an axis and inversion in a point on the axis. For this reason it is also called a rotoinversion or rotary inversion. The two definitions are equivalent because rotation by an angle θ followed by reflection is the same transformation as rotation by θ + 180° followed by inversion (taking the point of inversion to be in the plane of reflection). In both definitions, the operations commute.
A three-dimensional symmetry that has only one fixed point is necessarily an improper rotation.
An improper rotation of an object thus produces a rotation of its mirror image. The axis is called the rotation-reflection axis. This is called an n-fold improper rotation if the angle of rotation, before or after reflexion, is 360°/n (where n must be even). There are several different systems for naming individual improper rotations:
In the Schoenflies notation the symbol Sn (German, , for mirror), where n must be even, denotes the symmetry group generated by an n-fold improper rotation. For example, the symmetry operation S6 is the combination of a rotation of (360°/6)=60° and a mirror plane reflection. (This should not be confused with the same notation for symmetric groups).
In Hermann–Mau |
https://en.wikipedia.org/wiki/R%C3%B6ntgen%20equivalent%20physical | The Röntgen equivalent physical or rep (symbol rep) is a legacy unit of absorbed dose first introduced by Herbert Parker in 1945 to replace an improper application of the roentgen unit to biological tissue. It is the absorbed energetic dose before the biological efficiency of the radiation is factored in. The rep has variously been defined as 83 or 93 ergs per gram of tissue (8.3/9.3 mGy) or per cm3 of tissue.
At the time, this was thought to be the amount of energy deposited by 1 roentgen. Improved measurements have since found that one roentgen of air kerma deposits 8.77 mGy in dry air, or 9.6 mGy in soft tissue, but the rep was defined as a fixed number of ergs per unit gram.
A 1952 handbook from the US National Bureau of Standards affirms that "The numerical coefficient of the rep has been deliberately changed to 93, instead of the earlier 83, to agree with L. H. Gray's 'energy-unit'." Gray's 'energy unit' was " one roentgen of hard gamma resulted in about 93 ergs per gram energy absorption in water". The lower range value of 83.8 ergs was the value in air corresponding to wet tissue. The rep was commonly used until the 1960s, but was gradually displaced by the rad starting in 1954 and later the gray starting in 1977. |
https://en.wikipedia.org/wiki/Purine%20analogue | Purine analogues are antimetabolites that mimic the structure of metabolic purines.
Examples
Nucleobase analogues
Thiopurines such as thioguanine are used to treat acute leukemias and remissions in acute granulocytic leukemias.
Azathioprine is the main immunosuppressive cytotoxic substance. A prodrug, it is widely used in transplantation to control rejection reactions. It is nonenzymatically cleaved to mercaptopurine, a purine analogue that inhibits DNA synthesis. By preventing the clonal expansion of lymphocytes in the induction phase of the immune response, it affects both cell immunity and humoral immunity. It also successfully suppresses autoimmunity.
Mercaptopurine
Thioguanine
Nucleoside analogues
Clofarabine
Pentostatin and cladribine are adenosine analogs that are used primarily to treat hairy cell leukemia.
Nucleotide analogues
Fludarabine inhibits multiple DNA polymerases, DNA primase, and DNA ligase I, and is S phase-specific (since these enzymes are highly active during DNA replication).
Medical uses
Purine antimetabolites are commonly used to treat cancer by interfering with DNA replication. |
https://en.wikipedia.org/wiki/Shared%20library | A shared library or shared object is a file that is intended to be shared by executable files and further shared object files. Modules used by a program are loaded from individual shared objects into memory at load time or runtime, rather than being copied by a linker when it creates a single monolithic executable file for the program.
Shared libraries can be statically linked during compile-time, meaning that references to the library modules are resolved and the modules are allocated memory when the executable file is created. But often linking of shared libraries is postponed until they are loaded.
Most modern operating systems can have shared library files of the same format as the executable files. This offers two main advantages: first, it requires making only one loader for both of them, rather than two (having the single loader is considered well worth its added complexity). Secondly, it allows the executables also to be used as shared libraries, if they have a symbol table. Typical combined executable and shared library formats are ELF and Mach-O (both in Unix) and PE (Windows).
In some older environments such as 16-bit Windows or MPE for the HP 3000, only stack-based data (local) was allowed in shared-library code, or other significant restrictions were placed on shared-library code.
Memory sharing
Library code may be shared in memory by multiple processes, and on disk. If virtual memory is used, processes would execute the same physical page of RAM that is mapped into the different address spaces of the processes. This has advantages. For instance, on the OpenStep system, applications were often only a few hundred kilobytes in size and loaded quickly; most of their code was located in libraries that had already been loaded for other purposes by the operating system.
Programs can accomplish RAM sharing by using position-independent code, as in Unix, which leads to a complex but flexible architecture, or by using common virtual addresses, as in Window |
https://en.wikipedia.org/wiki/Trimagnesium%20phosphate | Trimagnesium phosphate describes inorganic compounds with formula Mg3(PO4)2.xH2O. They are magnesium acid salts of phosphoric acid, with varying amounts of water of crystallization: x = 0, 5, 8, 22.
The octahydrate forms upon reaction of stoichiometric quantities of monomagnesium phosphate (tetrahydrate) with magnesium hydroxide.
Mg(H2PO4)2•4H2O + 2 Mg(OH)2 → Mg3(PO4)2•8H2O
The octahydrate is found in nature as the mineral bobierrite.
The anhydrous compound is obtained by heating the hydrates to 400 °C. It is isostructural with cobalt(II) phosphate. The metal ions occupy both octahedral (six-coordinate) and pentacoordinate sites in a 1:2 ratio.
Safety
Magnesium phosphate tribasic is listed on the FDA's generally recognized as safe, or GRAS, list of substances.
See also
Magnesium phosphate |
https://en.wikipedia.org/wiki/Zero-weight%20cycle%20problem | In computer science and graph theory, the zero-weight cycle problem is the problem of deciding whether a directed graph with weights on the edges (which may be positive or negative or zero) has a cycle in which the sum of weights is 0.
A related problem is to decide whether the graph has a negative cycle, a cycle in which the sum of weights is less than 0. This related problem can be solved in polynomial time using the Bellman–Ford algorithm. If there is no negative cycle, then the distances found by the Bellman–Ford algorithm can be used, as in Johnson's algorithm, to reweight the edges of the graph in such a way that all edge weights become non-negative and all cycle lengths remain unchanged. With this reweighting, a zero-weight cycle becomes trivial to detect: it exists if and only if the zero-weight edges do not form a directed acyclic graph. Therefore, the special case of the zero-weight cycle problem, on graphs with no negative cycle, has a polynomial-time algorithm.
In contrast, for graphs that contain negative cycles, detecting a simple cycle of weight exactly 0 is an NP-complete problem. This is true even when the weights are integers of polynomial magnitude. In particular, there is a reduction from the Hamiltonian path problem, on an -vertex unweighted graph with specified starting and ending vertices and , to the zero-weight cycle problem on a weighted graph obtained by giving all edges of weight equal to one, and adding an additional edge from to with weight . |
https://en.wikipedia.org/wiki/Red%20Sea%20brine%20pool%20microbiology | The Red Sea and its extensions of the Gulf of Suez and the Gulf of Aqaba contain the largest recorded concentration of deep sea brine pools on the planet. These pools have many features that make them un-inhabitable to almost all organisms on the planet, yet, certain communities of microbes thrive within these extreme environments that have temperature ranging from 2.0 °C all the way up to the high of 75 °C. The Red Sea brine pools have extreme salinity concentrations and varying compositions of nutrients, chemicals properties and molecules that directly affect the microbiome between the estimated 25 individual pools in the region, some of which are closely clustered together in groups leading to their undetermined classification of names. The brine pools in the region originate from hydrothermal vents and shifting of tectonic plates and the accumulation of water with properties that make it unsuitable for mixing leading to its accumulation within faults and divots in the sea floor. Atlantis Deep II, Discovery Deep and the Kebrit are the most investigated and researched brine pools among the many located within the Red Sea
Additionally, many microbial species form beneficial symbiotic relationships with organisms living and feeding in proximity to the pools. These relationships allow for the study of specialised adaptations of microbes to brine pool environments.
List
In addition to the originally-discovered warm brine pools, recent discoveries have found four smaller warm brine pools named the NEOM Brine Pools located in the Gulf of Aqaba. Furthermore, multiple cold seeps have been identified in the region of the Red Sea (Thuwal Cold Seeps) consisting of two individual pools. Three of these Red Sea brine pools are unnamed as they are small and potentially extensions of other nearby larger pools.
Viral diversity
Composition
The virus community within the many Red Sea brine pools is largely unexplored. However, with the use of metagenomics, viral communitie |
https://en.wikipedia.org/wiki/Instrumentation%20%28computer%20programming%29 | In the context of computer programming, instrumentation refers to the measure of a product's performance, in order to diagnose errors and to write trace information. Instrumentation can be of two types: source instrumentation and binary instrumentation.
Output
In programming, instrumentation means:
Profiling: measuring dynamic program behaviors during a training run with a representative input. This is useful for properties of a program that cannot be analyzed statically with sufficient precision, such as alias analysis.
Inserting timers into functions.
Logging major events such as crashes.
Limitations
Instrumentation is limited by execution coverage. If the program never reaches a particular point of execution, then instrumentation at that point collects no data. For instance, if a word processor application is instrumented, but the user never activates the print feature, then the instrumentation can say nothing about the routines which are used exclusively by the printing feature.
Some types of instrumentation may cause a dramatic increase in execution time. This may limit the application of instrumentation to debugging contexts.
See also
Hooking – range of techniques used to alter or augment the behavior of an operating system, of applications, or of other software components by intercepting function calls or messages or events passed between software components.
Instruction set simulator – simulation of all instructions at machine code level to provide instrumentation
Runtime intelligence – technologies, managed services and practices for the collection, integration, analysis, and presentation of application usage levels, patterns, and practices.
Software performance analysis – techniques to monitor code performance, including instrumentation.
Hardware performance counter
DTrace – A comprehensive dynamic tracing framework for troubleshooting kernel and application problems on production systems in real time, implemented in Solaris, macOS, F |
https://en.wikipedia.org/wiki/Padovan%20sequence | In number theory, the Padovan sequence is the sequence of integers P(n) defined by the initial values
and the recurrence relation
The first few values of P(n) are
1, 1, 1, 2, 2, 3, 4, 5, 7, 9, 12, 16, 21, 28, 37, 49, 65, 86, 114, 151, 200, 265, ...
A Padovan prime is a Padovan number that is prime. The first Padovan primes are:
2, 3, 5, 7, 37, 151, 3329, 23833, 13091204281, 3093215881333057, 1363005552434666078217421284621279933627102780881053358473, 1558877695141608507751098941899265975115403618621811951868598809164180630185566719, ... .
The Padovan sequence is named after Richard Padovan who attributed its discovery to Dutch architect Hans van der Laan in his 1994 essay Dom. Hans van der Laan : Modern Primitive. The sequence was described by Ian Stewart in his Scientific American column Mathematical Recreations in June 1996. He also writes about it in one of his books, "Math Hysteria: Fun Games With Mathematics".
The above definition is the one given by Ian Stewart and by MathWorld. Other sources may start the sequence at a different place, in which case some of the identities in this article must be adjusted with appropriate offsets.
Recurrence relations
In the spiral, each triangle shares a side with two others giving a visual proof that
the Padovan sequence also satisfies the recurrence relation
Starting from this, the defining recurrence and other recurrences as they are discovered,
one can create an infinite number of further recurrences by repeatedly replacing by
The Perrin sequence satisfies the same recurrence relations as the Padovan sequence, although it has different initial values.
The Perrin sequence can be obtained from the Padovan sequence by the
following formula:
Extension to negative parameters
As with any sequence defined by a recurrence relation, Padovan numbers P(m) for m<0 can be defined by rewriting the recurrence relation as
Starting with m = −1 and working backwards, we extend P(m) to negative indices:
{| class="wikitabl |
https://en.wikipedia.org/wiki/NUTS%20statistical%20regions%20of%20the%20Czech%20Republic | The Nomenclature of Territorial Units for Statistics (NUTS) is a geocode standard for referencing the subdivisions of the Czech Republic for statistical purposes. The standard is developed and regulated by the European Union. The NUTS standard is instrumental in delivering the European Union's Structural Funds. The NUTS code for the Czech Republic is CZ and a hierarchy of three levels is established by Eurostat. Below these is a further levels of geographic organisation - the local administrative unit (LAU). In the Czech Republic, the LAU 1 is districts and the LAU 2 is municipalities.
Overall
NUTS codes
In the 2003 version, the Vysočina Region was coded CZ061, and the South Moravian Region was coded CZ062.
Local administrative units
Below the NUTS levels, the two LAU (Local Administrative Units) levels are:
The LAU codes of the Czech Republic can be downloaded here: ''
See also
List of Czech regions by Human Development Index
Subdivisions of the Czech Republic
ISO 3166-2 codes of the Czech Republic
FIPS region codes of the Czech Republic |
https://en.wikipedia.org/wiki/UCL%20Queen%20Square%20Institute%20of%20Neurology | The UCL Queen Square Institute of Neurology is an institute within the Faculty of Brain Sciences of University College London (UCL) and is located in London, United Kingdom. Together with the National Hospital for Neurology and Neurosurgery, an adjacent facility with which it cooperates closely, the institute forms a major centre for teaching, training and research in neurology and allied clinical and basic neurosciences.
The institute has a staff of around 710 and 500 graduate students, an annual turnover of £81million and occupies around 12,000 sq m of laboratory and office space. Four of the 12 most highly cited authors in neuroscience and behaviour in the world are currently based at the institute. The institute conducts research into a wide range of neurological diseases, including movement disorders, multiple sclerosis, epilepsy, brain cancer, stroke and brain injury, muscle and nerve disorders, cognitive dysfunction and dementia. It forms a key part of UCL Neuroscience.
History
The Institute of Neurology was established in 1950. It merged with UCL in 1997, becoming the UCL Institute of Neurology. The institute is centred at Queen Square House, a concrete tower in the north-east corner of Queen Square, London that opened in 1971. Due to expansion, some of the institute's departments and activities are now based in numerous locations in Queen Square and surrounding parts of Bloomsbury. The UCL Institute of Neurology was rebranded to UCL Queen Square Institute of Neurology in September, 2018.
In 2019, project manager Arcadis and contractor ISG Ltd began work to expand the footprint of the Eastman Dental Hospital site on Gray's Inn Road to enable construction of a new building for the UCL Queen Square Institute of Neurology and a hub for the UK Dementia Research Institute. Completion was scheduled for late 2023, for occupation in 2024.
Departments
The institute currently holds 578 active research projects, totalling £262m. Annual turnover is £80million. In |
https://en.wikipedia.org/wiki/Prechordal%20plate | In the development of vertebrate animals, the prechordal plate is a "uniquely thickened portion" of the endoderm that is in contact with ectoderm immediately rostral to the cephalic tip of the notochord. It is the most likely origin of the rostral cranial mesoderm.
STAGE 6
The prechordal plate is a thickening of the endoderm at the cranial end of the primitive streak seen in Embryo Beneke by Hill J.P., Florian J (1963)
STAGE 7
The prechordal plate is described as a median mass of cells, located at the anterior end of the notochord, which appears in early embryos as an integral part of the roof of the foregut. e.g. Embryos Bi 24 and Manchester 1285. and Gilbert P.W., (1957)
STAGE 8
O'Rahilly R., Müller F. (1987) present a detailed discussion of the term 'prechordal plate' and its relation to the 'prochordal plate'. These essentially synonymous terms refer to the horseshoe-shaped band of thickened endoderm rostral to the notochord but not quite reaching the rostral extremity of the embryo. It reaches its maximum state of development at about this stage and contributes mesodermal type cells to the surrounding tissue. Cells derived from the prechordal plate become incorporated into the cephalic mesenchyme ( including the 'premandibular' condensation described by Gilbert P.W., (1957) and some of the foregut endoderm.
STAGE 9
The prechordal plate is continuous rostrally with the cardiac mesenchyme and it is rotated caudo-ventrally as the cranial flexure develops and the head moves ventrally.
STAGE 10
In the 10 somite embryo, Carnegie No. 5074, the prechordal plate is continuous posteriorly with the notochord, and is made up of about 35-40 cells. The prechordal mesenchyme proliferates laterally over the junction of the dorsal aorta and first aortic arch on each side. Gilbert P.W., (1957)
STAGE 11
The prechordal plate contributes largely to the premandibular condensation and the mesenchyme of the heart such that little is seen in the median plane at this stage |
https://en.wikipedia.org/wiki/IBM%20System/32 | The IBM System/32 (IBM 5320) introduced in January 1975 was a midrange computer with built-in display screen, disk drives, printer, and database report software. It was used primarily by small to midsize businesses for accounting applications. RPG II was the primary programming language for the machine.
Overview
The 16-bit single-user System/32, also known as the IBM 5320, was introduced in 1975, and it was the successor to the IBM System/3 model 6 in the IBM midrange computer line. IBM described it as "the first system to incorporate hardware and comprehensive application software." The New York Times described the 32 as "a compact computer for first‐time users with little or no computer programming experience." Within 40 months, "the System/32 had surpassed the IBM System/3 as the most installed IBM computer."
The computer looked like a large office desk with a very small six-line by forty-character display. Having the appearance of a computerized desk, the System/32 was nicknamed the "Bionic Desk" after The Six Million Dollar Man (bionic man), a popular U.S. TV program when the computer was introduced in 1975. The 32 had a built-in line printer, that directly faced the operator when seated, and could print reports, memos, billing statements, address labels, etc.
It had been introduced January 7, 1975 and was withdrawn from marketing on October 17, 1984. Migration to the IBM System/34 was generally simple because source code was compatible and programs just needed recompilation.
Processor
The System/32 featured a 16-bit processor with a 200ns cycle time known as the Control Storage Processor (CSP). Whereas the System/3 used a hardwired processor, the System/32 implemented the System/3 instruction set in microcode. The System/32 processor utilized a vertical microcode format, with each microinstruction occupying 16 bits of control storage. There were 19 different microinstruction opcodes, however certain microinstructions could carry out different operation |
https://en.wikipedia.org/wiki/Mandibular%20notch | The mandibular notch, also known as the sigmoid notch, is a groove in the ramus of the mandible. It is the gap between the coronoid process anteriorly and the condyloid process posteriorly.
Structure
The mandibular notch is a concave groove at the top of the ramus of the mandible. It is the gap between the coronoid process anteriorly and the condyloid process posteriorly.
Function
The mandibular notch allows for the passage of the masseteric nerve (a branch of the mandibular nerve (V3) division of the trigeminal nerve), the masseteric artery, and the masseteric vein.
Clinical significance
The mandibular notch may be palpated to locate the parotid duct, the facial artery, the facial vein, and the medial pterygoid muscle.
Other animals
The mandibular notch can be found in other mammals, such as dogs and cats. There can be significant variation in its shape even within the same species. Archaeological evidence shows that the mandibular notch is different in other hominidae, such as neanderthals, and may be asymmetrical.
Additional images |
https://en.wikipedia.org/wiki/Screen%20burn-in | Screen burn-in, image burn-in, ghost image, or shadow image, is a permanent discoloration of areas on an electronic display such as a cathode ray tube (CRT) in an old computer monitor or television set. It is caused by cumulative non-uniform use of the screen.
Newer liquid-crystal displays (LCDs) may suffer from a phenomenon called image persistence instead, which is not permanent.
One way to combat screen burn-in was the use of screensavers, which would move an image around to ensure that no one area of the screen remained illuminated for too long.
Causes
With phosphor-based electronic displays (for example CRT-type computer monitors, oscilloscope screens or plasma displays), non-uniform use of specific areas, such as prolonged display of non-moving images (text or graphics), repetitive contents in gaming graphics, or certain broadcasts with tickers and flags, can create a permanent ghost-like image of these objects or otherwise degrade image quality. This is because the phosphor compounds which emit light to produce images lose their luminance with use. This wear results in uneven light output over time, and in severe cases can create a ghost image of previous content. Even if ghost images are not recognizable, the effects of screen burn are an immediate and continual degradation of image quality.
The length of time required for noticeable screen burn to develop varies due to many factors, ranging from the quality of the phosphors employed, to the degree of non-uniformity of sub-pixel use. It can take as little as a few weeks for noticeable ghosting to set in, especially if the screen displays a certain image (example: a menu bar at the top or bottom of the screen) constantly and displays it continually over time. In the rare case when horizontal or vertical deflection circuits fail, all output energy is concentrated to a vertical or horizontal line on the display which causes almost instant screen burn.
CRT
Phosphor burn-in is particularly prevalent with mo |
https://en.wikipedia.org/wiki/Tulipalin%20A | Tulipalin A, also known as α-methylene-γ-butyrolactone, is a naturally occurring compound found in certain flowers such as tulips and alstroemerias. Tulipalin A has the molecular formula C5H6O2 and the CAS registry number 547-65-9. It is an allergen and has been known to cause occupational contact dermatitis, i.e. 'tulip fingers,' in some who are commonly exposed to it such as florists. More recent experiments with this compound have uncovered potential applications for it in the field of polymerization. |
https://en.wikipedia.org/wiki/Ouchterlony%20double%20immunodiffusion | Ouchterlony double immunodiffusion (also known as passive double immunodiffusion) is an immunological technique used in the detection, identification and quantification of antibodies and antigens, such as immunoglobulins and extractable nuclear antigens. The technique is named after Örjan Ouchterlony, the Swedish physician who developed the test in 1948 to evaluate the production diphtheria toxins from isolated bacteria.
Procedure
A gel plate is cut to form a series of holes ("wells") in an agar or agarose gel. A sample extract of interest (for example human cells harvested from tonsil tissue) is placed in one well, sera or purified antibodies are placed in another well and the plate left for 48 hours to develop. During this time the antigens in the sample extract and the antibodies each diffuse out of their respective wells. Where the two diffusion fronts meet, if any of the antibodies recognize any of the antigens, they will bind to the antigens and form an immune complex. The immune complex precipitates in the gel to give a thin white line (precipitin line), which is a visual signature of antigen recognition.
The method can be conducted in parallel with multiple wells filled with different antigen mixtures and multiple wells with different antibodies or mixtures of antibodies, and antigen-antibody reactivity can be seen by observing between which wells the precipitate is observed. When more than one well is used there are many possible outcomes based on the reactivity of the antigen and antibody selected. The zone of equivalence lines may give a full identity (i.e. a continuous line), partial identity (i.e. a continuous line with a spur at one end), or a non-identity (i.e. the two lines cross completely).
The sensitivity of the assay can be increased by using a stain such as Coomassie brilliant blue, this is done by repeated staining and destaining of the assay until the precipitin lines are at maximum visibility.
Theory
Precipitation occurs with most antige |
https://en.wikipedia.org/wiki/Cryptogrammoideae | Cryptogrammoideae is a subfamily of ferns in the family Pteridaceae. The subfamily contains three genera and about 23 species.
Taxonomy
In the Pteridophyte Phylogeny Group classification of 2016 (PPG I), Cryptogrammoideae is one of the five subfamilies of the family Pteridaceae. Although the subfamily Cryptogrammoideae is similar to the family Cryptogrammaceae proposed by Pichi Sermolli in 1963, that group contained the morphologically similar genus Onychium (now in the subfamily Pteridoideae) instead of the less morphologically similar genus Coniogramme. In 2006, Smith et al. included Cryptogrammaceae as part of the family Pteridaceae, and in 2011, Christenhusz et al. listed its three genera in Cryptogrammoideae, one of five subfamilies of Pteridaceae, a placement used in PPG I.
The following diagram shows a likely phylogenic relationship between the three Cryptogrammoideae genera and the other Pteridaceae subfamilies. |
https://en.wikipedia.org/wiki/Hayabusa2 | is an asteroid sample-return mission operated by the Japanese state space agency JAXA. It is a successor to the Hayabusa mission, which returned asteroid samples for the first time in June 2010. Hayabusa2 was launched on 3 December 2014 and rendezvoused in space with near-Earth asteroid 162173 Ryugu on 27 June 2018. It surveyed the asteroid for a year and a half and took samples. It left the asteroid in November 2019 and returned the samples to Earth on 5 December 2020 UTC. Its mission has now been extended through at least 2031, when it will rendezvous with the small, rapidly-rotating asteroid .
Hayabusa2 carries multiple science payloads for remote sensing and sampling, and four small rovers to investigate the asteroid surface and analyze the environmental and geological context of the samples collected.
Mission overview
Asteroid 162173 Ryugu (formerly designated ) is a primitive carbonaceous near-Earth asteroid. Carbonaceous asteroids are thought to preserve the most pristine, untainted materials in the Solar System, a mixture of minerals, ice, and organic compounds that interact with each other. Studying it is expected to provide additional knowledge on the origin and evolution of the inner planets and, in particular, the origin of water and organic compounds on Earth, all relevant to the origin of life on Earth.
Initially, launch was planned for 30 November 2014, but was delayed to 3 December 2014 at 04:22:04 UTC (3 December 2014, 13:22:04 local time) on a H-IIA launch vehicle. Hayabusa2 launched together with PROCYON asteroid flyby space probe. PROCYON's mission was a failure. Hayabusa2 arrived at Ryugu on 27 June 2018, where it surveyed the asteroid for a year and a half and collected samples. It departed the asteroid in November 2019 and returned the samples to Earth in December 2020.
Compared to the previous Hayabusa mission, the spacecraft features improved ion engines, guidance and navigation technology, antennas, and attitude control systems. A kin |
https://en.wikipedia.org/wiki/Phi%20Tau%20Sigma | Phi Tau Sigma () is the Honor Society for food science and technology. The organization was founded in at the University of Massachusetts Amherst by Dr. Gideon E. (Guy) Livingston, a food technology professor. It was incorporated under the General Laws of the Commonwealth of Massachusetts , as "Phi Tau Sigma Honorary Society, Inc."
Greek letters designation
Why the choice of to designate the Honor Society? Some have speculated or assumed that the Greek letters correspond to the initials of "Food Technology Society". However very recent research by Mary K. Schmidl, making use of documents retrieved from the Oregon State University archives by Robert McGorrin, including the 1958 Constitution, has elucidated the real basis of the choice. The 1958 Constitution is headed with three Greek words
"ΦΙΛΕΙΝ ΤΡΟΦΗΣ ΣΠΟΥΔΗΝ" under which are the English words "Devotion to the Study of Foods". With the assistance of Petros Taoukis, the Greek words are translated as follows:
ΦΙΛΕΙΝ: Love or devotion (pronounced Philleen, accent on the last syllable)
ΤΡΟΦΗΣ:of Food (pronounced Trophees, accent on the last syllable)
ΣΠΟΥΔΗΝ: Study (pronounced Spootheen, accent on the last syllable - th as in the word “the” or “this” not like in the word “thesis”).
represent the initials of those three Greek words.
Charter Members
Besides Livingston, the charter members of the Honor Society were M.P. Baldorf, Robert V. Decareau, E. Felicotti, W.D. Powrie, M.A. Steinberg, and D.E. Westcott.
Purposes
To recognize and honor professional achievements of Food Scientists and Technologists,
To encourage the application of fundamental scientific principles to Food Science and Technology in each of its branches,
To stimulate the exchange of scientific knowledge through meetings, lectures, and publications,
To establish and maintain a network of like-minded professionals, and
To promote exclusively charitable, scientific, literary and educational programs.
Members
Phi Tau Sigma has (currentl |
https://en.wikipedia.org/wiki/Mathematical%20Alphanumeric%20Symbols | Mathematical Alphanumeric Symbols is a Unicode block comprising styled forms of Latin and Greek letters and decimal digits that enable mathematicians to denote different notions with different letter styles. The letters in various fonts often have specific, fixed meanings in particular areas of mathematics. By providing uniformity over numerous mathematical articles and books, these conventions help to read mathematical formulas. These also may be used to differentiate between concepts that share a letter in a single problem.
Unicode now includes many such symbols (in the range U+1D400–U+1D7FF). The rationale behind this is that it enables design and usage of special mathematical characters (fonts) that include all necessary properties to differentiate from other alphanumerics, e.g. in mathematics an italic "𝐴" can have a different meaning from a roman letter "A". Unicode originally included a limited set of such letter forms in its Letterlike Symbols block before completing the set of Latin and Greek letter forms in this block beginning in version 3.1.
Unicode expressly recommends that these characters not be used in general text as a substitute for presentational markup; the letters are specifically designed to be semantically different from each other. Unicode does include a set of normal serif letters in the set. Still they have found some usage on social media, for example by people who want a stylized user name, and in email spam, in an attempt to bypass filters.
All these letter shapes may be manipulated with MathML's attribute mathvariant.
The introduction date of some of the more commonly used symbols can be found in the Table of mathematical symbols by introduction date.
Tables of styled letters and digits
These tables show all styled forms of Latin and Greek letters, symbols and digits in the Unicode Standard, with the normal unstyled forms of these characters shown with a cyan background (the basic unstyled letters may be serif or sans-serif depen |
https://en.wikipedia.org/wiki/ResearchGate | ResearchGate is a European commercial social networking site for scientists and researchers to share papers, ask and answer questions, and find collaborators. According to a 2014 study by Nature and a 2016 article in Times Higher Education, it is the largest academic social network in terms of active users, although other services have more registered users, and a 2015–2016 survey suggests that almost as many academics have Google Scholar profiles.
While reading articles does not require registration, people who wish to become site members need to have an email address at a recognized institution or to be manually confirmed as a published researcher in order to sign up for an account. Members of the site each have a user profile and can upload research output including papers, data, chapters, negative results, patents, research proposals, methods, presentations, and software source code. Users may also follow the activities of other users and engage in discussions with them. Users are also able to block interactions with other users.
The site has been criticized for sending unsolicited email invitations to coauthors of the articles listed on the site that were written to appear as if the email messages were sent by the other coauthors of the articles (a practice the site said it had discontinued as of November 2016) and for automatically generating apparent profiles for non-users who have sometimes felt misrepresented by them. A study found that over half of the uploaded papers appear to infringe copyright, because the authors uploaded the publisher's version.
Features
The New York Times described the site as a mashup of Facebook, Twitter, and LinkedIn. Site members may follow a research interest, in addition to following other individual members. It has a blogging feature for users to write short reviews on peer-reviewed articles. ResearchGate indexes self-published information on user profiles to suggest members to connect with others who have similar interests |
https://en.wikipedia.org/wiki/Nomen%20novum | In biological nomenclature, a nomen novum (Latin for "new name"), new replacement name (or replacement name, new substitute name, substitute name) is a scientific name that is created specifically to replace another scientific name, but only when this other name cannot be used for technical, nomenclatural reasons (for example because it is a homonym: it is spelled the same as an existing, older name). It does not apply when a name is changed for taxonomic reasons (representing a change in scientific insight). It is frequently abbreviated, e.g. nomen nov., nom. nov..
Zoology
In zoology establishing a new replacement name is a nomenclatural act and it must be expressly proposed to substitute a previously established and available name.
Often, the older name cannot be used because another animal was described earlier with exactly the same name. For example, Lindholm discovered in 1913 that a generic name Jelskia established by Bourguignat in 1877 for a European freshwater snail could not be used because another author Taczanowski had proposed the same name in 1871 for a spider. So Lindholm proposed a new replacement name Borysthenia. This is an objective synonym of Jelskia Bourguignat, 1877, because he has the same type species, and is used today as Borysthenia.
Also, for names of species new replacement names are often necessary. New replacement names have been proposed since more than 100 years ago. In 1859 Bourguignat saw that the name Bulimus cinereus Mortillet, 1851 for an Italian snail could not be used because Reeve had proposed exactly the same name in 1848 for a completely different Bolivian snail. Since it was understood even then that the older name always has priority, Bourguignat proposed a new replacement name Bulimus psarolenus, and also added a note why this was necessary. The Italian snail is known until today under the name Solatopupa psarolena (Bourguignat, 1859).
A new replacement name must obey certain rules; not all of these are well known.
|
https://en.wikipedia.org/wiki/L%C3%A1szl%C3%B3%20Pyber | László Pyber (born 8 May 1960 in Budapest) is a Hungarian mathematician. He is a researcher at the Alfréd Rényi Institute of Mathematics, Budapest. He works in combinatorics and group theory.
Biography
Pyber received his Ph.D. from the Hungarian Academy of Sciences in 1989 under the direction of László Lovász and Gyula O.H. Katona with the thesis Extremal Structures and Covering Problems.
In 2007, he was awarded the Academics Prize by the Hungarian Academy of Sciences.
In 2017, he was the recipient of an ERC Advanced Grant.
Mathematical contributions
Pyber has solved a number of conjectures in graph theory. In 1985, he proved the conjecture of Paul Erdős and Tibor Gallai that edges of a simple graph with n vertices can be covered with at most n-1 circuits and edges. In 1986, he proved the conjecture of Paul Erdős that a graph with n vertices and its complement can be covered with n2/4+2 cliques.
He has also contributed to the study of permutation groups. In 1993, he provided an upper bound for the order of a 2-transitive group of degree n not containing An avoiding the use of the classification of finite simple groups. Together with Tomasz Łuczak, Pyber proved the conjecture of McKay that for every ε>0, there is a constant C such that C randomly chosen elements invariably generate the symmetric group Sn with probability greater than 1-ε.
Pyber has made fundamental contributions in enumerating finite groups of a given order n. In 1993, he proved that if the prime power decomposition of n is n=p1g1 ⋯ pkgk and μ=max(g1,...,gk), then the number of groups of order n is at mostIn 2004, Pyber settled several questions in subgroup growth by completing the investigation of the spectrum of possible subgroup growth types.
In 2011, Pyber and Andrei Jaikin-Zapirain obtained a surprisingly explicit formula for the number of random elements needed to generate a finite d-generator group with high probability. They also explored related questions for profinite groups and s |
https://en.wikipedia.org/wiki/List%20of%20convexity%20topics | This is a list of convexity topics, by Wikipedia page.
Alpha blending - the process of combining a translucent foreground color with a background color, thereby producing a new blended color. This is a convex combination of two colors allowing for transparency effects in computer graphics.
Barycentric coordinates - a coordinate system in which the location of a point of a simplex (a triangle, tetrahedron, etc.) is specified as the center of mass, or barycenter, of masses placed at its vertices. The coordinates are non-negative for points in the convex hull.
Borsuk's conjecture - a conjecture about the number of pieces required to cover a body with a larger diameter. Solved by Hadwiger for the case of smooth convex bodies.
Bond convexity - a measure of the non-linear relationship between price and yield duration of a bond to changes in interest rates, the second derivative of the price of the bond with respect to interest rates. A basic form of convexity in finance.
Carathéodory's theorem (convex hull) - If a point x of Rd lies in the convex hull of a set P, there is a subset of P with d+1 or fewer points such that x lies in its convex hull.
Choquet theory - an area of functional analysis and convex analysis concerned with measures with support on the extreme points of a convex set C. Roughly speaking, all vectors of C should appear as 'averages' of extreme points.
Complex convexity — extends the notion of convexity to complex numbers.
Convex analysis - the branch of mathematics devoted to the study of properties of convex functions and convex sets, often with applications in convex minimization.
Convex combination - a linear combination of points where all coefficients are non-negative and sum to 1. All convex combinations are within the convex hull of the given points.
Convex and Concave - a print by Escher in which many of the structure's features can be seen as both convex shapes and concave impressions.
Convex body - a compact convex set in a Euclide |
https://en.wikipedia.org/wiki/Committed%20dose | The committed dose in radiological protection is a measure of the stochastic health risk due to an intake of radioactive material into the human body. Stochastic in this context is defined as the probability of cancer induction and genetic damage, due to low levels of radiation. The SI unit of measure is the sievert.
A committed dose from an internal source represents the same effective risk as the same amount of effective dose applied uniformly to the whole body from an external source, or the same amount of equivalent dose applied to part of the body. The committed dose is not intended as a measure for deterministic effects, such as radiation sickness, which are defined as the severity of a health effect which is certain to happen.
The radiation risk proposed by the International Commission on Radiological Protection (ICRP) predicts that an effective dose of one sievert carries a 5.5% chance of developing cancer. Such a risk is the sum of both internal and external radiation dose.
ICRP definition
The ICRP states "Radionuclides incorporated in the human body irradiate the tissues over time periods determined by their physical half-life and their biological retention
within the body. Thus they may give rise to doses to body tissues for many months or years after the intake. The need to regulate exposures to radionuclides and the
accumulation of radiation dose over extended periods of time has led to the definition of committed dose quantities".
The ICRP defines two dose quantities for individual committed dose.
Committed equivalent dose is the time integral of the equivalent dose rate in a particular tissue or organ that will be received by an individual following intake of radioactive material into the body by a Reference Person, where t is the integration time in years. This refers specifically to the dose in a specific tissue or organ, in the similar way to external equivalent dose.
Committed effective dose, is the sum of the products of the committed orga |
https://en.wikipedia.org/wiki/Arabinosyltransferase | An arabinosyltransferase is a transferase enzyme acting upon arabinose.
This enzyme is involved in polymerisation of arabinogalactan (an essential component of the mycobacterial cell wall). Mycobacterially, the more precise term is arabinofuranosyltransferase, since the arabinose residues occur only in a furanose form.
This enzyme has important clinical applications as it is believed to be the target of the antimycobacterial drug ethambutol. |
https://en.wikipedia.org/wiki/Chip%20Authentication%20Program | The Chip Authentication Program (CAP) is a MasterCard initiative and technical specification for using EMV banking smartcards for authenticating users and transactions in online and telephone banking. It was also adopted by Visa as Dynamic Passcode Authentication (DPA). The CAP specification defines a handheld device (CAP reader) with a smartcard slot, a numeric keypad, and a display capable of displaying at least 12 characters (e.g., a starburst display). Banking customers who have been issued a CAP reader by their bank can insert their Chip and PIN (EMV) card into the CAP reader in order to participate in one of several supported authentication protocols. CAP is a form of two-factor authentication as both a smartcard and a valid PIN must be present for a transaction to succeed. Banks hope that the system will reduce the risk of unsuspecting customers entering their details into fraudulent websites after reading so-called phishing emails.
Operating principle
The CAP specification supports several authentication methods. The user first inserts their smartcard into the CAP reader and enables it by entering the PIN. A button is then pressed to select the transaction type. Most readers have two or three transaction types available to the user under a variety of names. Some known implementations are:
Code/identify Without requiring any further input, the CAP reader interacts with the smartcard to produce a decimal one-time password, which can be used, for example, to log into a banking website.
Response This mode implements challenge–response authentication, where the bank's website asks the customer to enter a "challenge" number into the CAP reader, and then copy the "response" number displayed by the CAP reader into the web site.
Sign This mode is an extension of the previous, where not only a random "challenge" value, but also crucial transaction details such as the transferred value, the currency, and recipient's account number have to be typed into the CAP reader |
https://en.wikipedia.org/wiki/Hypertext%20fiction | Hypertext fiction is a genre of electronic literature, characterized by the use of hypertext links that provide a new context for non-linearity in literature and reader interaction. The reader typically chooses links to move from one node of text to the next, and in this fashion arranges a story from a deeper pool of potential stories. Its spirit can also be seen in interactive fiction.
The term can also be used to describe traditionally-published books in which a nonlinear narrative and interactive narrative is achieved through internal references. James Joyce's Ulysses (1922), Enrique Jardiel Poncela's La Tournée de Dios (1932), Jorge Luis Borges' The Garden of Forking Paths (1941), Vladimir Nabokov's Pale Fire (1962), Julio Cortázar's Rayuela (1963; translated as Hopscotch), and Italo Calvino's The Castle of Crossed Destinies (1973) are early examples predating the word "hypertext", while a common pop-culture example is the Choose Your Own Adventure series in young adult fiction and other similar gamebooks, or Jason Shiga's Meanwhile, a graphic novel that allows readers to choose from a total of 3,856 possible linear narratives.
In 1969, IBM and Ted Nelson from Brown University gained permission from Nabokov's publisher to use Pale Fire as a demonstration of an early hypertext system and, in general, hypertext's potential. The unconventional form of the demonstration was dismissed in favour of a more technically oriented variant.
Definitions
There is little consensus on the definition of hypertext literature. The similar term cybertext is often used interchangeably with hypertext. In hypertext fiction, the reader assumes a significant role in the creation of the narrative. Each user obtains a different outcome based on the choices they make. Cybertexts may be equated to the transition between a linear piece of literature, such as a novel, and a game. In a novel, the reader has no choice, the plot and the characters are all chosen by the author; there is no 'u |
https://en.wikipedia.org/wiki/Cue%20note | In musical notation, a cue note is or cue notes are indications informing players, "of important passages being played by other instruments, [such as an] entrance after a long period of rest." A cue may also function as a guideline for another instrument for musical improvisation or if there are many bars rest to help the performer find where to come in.
"Cue notes may be given as guidance only, to assist a performer's entrance after numerous measures of rest....[Their size, and all elements associated with them] is somewhat smaller than normal note size, but still large enough to be legible (65-75% of normal note size)."
The cued instrument is indicated with text and the cue notes are smaller than the rest. The stems of cue notes all go in the same direction and cue notes are transposed into the key of the part entering. |
https://en.wikipedia.org/wiki/Tim%20Denvir | Tim Denvir (born 1939) is a British software engineer, specialising in formal methods.
Denvir studied for a Mathematics degree at Trinity College, Cambridge during 1959–1962.
Before his degree, during 1958–1959, Tim Denvir was an engineering assistant at Texas Instruments, designing, building and testing electronic circuits using discrete semiconductors. After his degree, during 1962–1965, he was a systems programmer with Elliott Brothers, programming operating systems and device drivers. During 1965–1969, he was a systems programmer at the University of London Atlas Computing Service, undertaking systems programming for the Atlas computer and compiler design. During 1969–1971, he was a project manager with RADICS, working on ALGOL 60 compilers.
During 1971–1972, Denvir was a principal technical officer at International Computers Limited (ICL), working on unifying compiler design for the ICL 2900 Series of mainframe computers. During 1972–1986, he was a department manager and then from 1980 chief research engineer at the Standard Telecommunication Laboratories (STL), working on project management, technical education, and research. He won the STL Creativity Award. During 1986–1991, he was a senior/principal consultant at Praxis Systems plc, seconded for part of the time to the Information Technology Division of the UK Government Department of Trade and Industry (DTI). During 1991–2003, he was Director of Translimina Ltd.
Academically, during 1988–1989, Denvir was an Associate Reader at Brunel University, teaching formal methods. During 1992–1994, he was Honorary Visiting Professor at City University in London, where he developed and delivered a course on denotational semantics.
Denvir has been a member of the editorial board for the Formal Aspects of Computing journal (1989-2003) and the Springer FACIT book series. He was a member of the BSI IST/51-119 Vienna Development Method (VDM) Standardisation Committee. He was the Secretary of VDM Europe (1986–88 & 1991) |
https://en.wikipedia.org/wiki/Flux%20switching%20alternator | A flux switching alternator is a form of high-speed alternator, an AC electrical generator, intended for direct drive by a turbine. They are simple in design with the rotor containing no coils or magnets, making them rugged and capable of high rotation speeds. This makes them suitable for their only widespread use, in guided missiles.
Guided missiles
Guided missiles require a source of electrical power during flight. This is needed to power the guidance and fuzing systems, possibly also the high-power loads of an active radar seeker (i.e. a transmitter) and rarely the missile's control surfaces. Control surface actuators for a high-speed missile require a high force and so these are usually powered by some non-electric means, such as tapping propellant exhaust gas from the missile's motor. Rare exceptions where electrically powered control surfaces are used are mostly medium-range subsonic naval missiles, e.g. Exocet, Harpoon and Martel. The total load varies for different missiles between around 100W to several kW.
The electrical supply for a missile must be reliable, particularly after long storage. Depending on the missile type, it may also be required to start delivering power almost immediately after start-up, or even before launch to allow gyroscopes to be accelerated to speed, and to provide power for varying lengths of time. Small anti-tank or air-to-air missiles may only require power for a few seconds of flight. Others, such as tactical missiles or ICBMs, may require power for several minutes. Turbojet-powered cruise missiles have the longest flight times (being long-ranged, yet also slowest in flight); however, these also have engines that are capable of driving a more conventional generator.
Two technologies are used in practice to power missiles: batteries and generators. The batteries used are usually esoteric types rarely found outside missiles, such as silver-zinc or thermal batteries. The generators used are simple high-speed generators, driven |
https://en.wikipedia.org/wiki/Tradebe | Tradebe is a waste management company based in Barcelona that was established in 1980. It operates in Spain, France, the United Kingdom, the United States and Oman. The chairman is Josep Creixell, and the Chief Executive is Victor Creixell.
Tradebe is a significant player in the solvent recycling and automated oil tank cleaning markets.
Prosecutions
The company has been prosecuted in the UK. In 2016 it was fined £38,960 after a chemical leak at their Hendon Dock plant in Sunderland. It was prosecuted in 2013 after a spillage of highly flammable liquid at a site in Knottingley. The United States Environmental Protection Agency fined it after environmental violations at the firm’s hazardous waste treatment facilities in Connecticut. Their subsidiary Norlite had to pay around £15,000 for air pollution violations in Cohoes, New York, in 2016.
Acquisitions
1984 Acquisition of Fragsa, which since 1975 had been working in the management and recycling of out-of-service vehicles using processes for the fragmentation and separation of metals.
1989 Ecoimsa obtains authorization for the collection of hydrocarbon waste from ships (Marpol).
1990 Acquisition of Fragnor, a fragmentation plant located in Amorebieta (Vizcaya)
1992 Acquisition of Lunagua with the goal of setting up an industrial waste treatment plant
1997 Creation of Intraval to develop new lines of business in consultancy, engineering and treatment of urban solid waste.
1998 Construction and development of a composting plant in Jorba (Barcelona).
2002 Acquisition of Ecología Química located in Gualba (Barcelona) specializing in the recycling of solvents from the chemical and pharmaceutical industries. Establishment of Recovery & Recycling Solutions located in Houston, the “center” of the world’s oil industry.
2003 Purchase of Willacy Oil Services, founded in 1989, providing an extensive range of equipment and services for the treatment of refinery sludge.
2003 Purchase of Tecnoambiente, a pion |
https://en.wikipedia.org/wiki/Lissajous%20orbit | In orbital mechanics, a Lissajous orbit (), named after Jules Antoine Lissajous, is a quasi-periodic orbital trajectory that an object can follow around a Lagrangian point of a three-body system with minimal propulsion. Lyapunov orbits around a Lagrangian point are curved paths that lie entirely in the plane of the two primary bodies. In contrast, Lissajous orbits include components in this plane and perpendicular to it, and follow a Lissajous curve. Halo orbits also include components perpendicular to the plane, but they are periodic, while Lissajous orbits are usually not.
In practice, any orbits around Lagrangian points , , or are dynamically unstable, meaning small departures from equilibrium grow over time. As a result, spacecraft in these Lagrangian point orbits must use their propulsion systems to perform orbital station-keeping. Although they are not perfectly stable, a modest effort of station keeping keeps a spacecraft in a desired Lissajous orbit for a long time.
In the absence of other influences, orbits about Lagrangian points and are dynamically stable so long as the ratio of the masses of the two main objects is greater than about 25. The natural dynamics keep the spacecraft (or natural celestial body) in the vicinity of the Lagrangian point without use of a propulsion system, even when slightly perturbed from equilibrium. These orbits can however be destabilized by other nearby massive objects. For example, orbits around the and points in the Earth–Moon system can last only a few million years instead of billions because of perturbations by the other planets in the Solar System.
Spacecraft using Lissajous orbits
Several missions have used Lissajous orbits: ACE at Sun–Earth L1, SOHO at Sun–Earth L1, DSCOVR at Sun–Earth L1, WMAP at Sun–Earth L2, and also the Genesis mission collecting solar particles at L1.
On 14 May 2009, the European Space Agency (ESA) launched into space the Herschel and Planck observatories, both of which use Lissajous orb |
https://en.wikipedia.org/wiki/David%20Rindskopf | David Rindskopf is an American psychologist and applied statistician, currently a Distinguished Professor at City University of New York, and a published author of both books and many articles in refereed journals. . He is a Fellow of the American Statistical Association (ASA), was the President of its New York section, and American Educational Research Association (AERA) and also former editor of the ASA-AERA journal Journal of Educational and Behavioral Statistics.
Dr. Rindskopf has served as an expert witness and is a statistical consultant and has been an invited speaker at conferences in England, Germany, Belgium, and Holland.
Rindskopf was an undergraduate at Antioch College and Iowa State University where he received a bachelor's degree with a double major in mathematics and psychology. He completed his doctorate in psychology with a specialization in statistics and research methodology at Iowa State University. He was a post-doctoral fellow in research and statistics at Northwestern University in Evanston, Illinois. He joined the CUNY faculty in 1979. |
https://en.wikipedia.org/wiki/Malthusian%20equilibrium | A population is in Malthusian equilibrium when all of its production is used only for subsistence. Malthusian equilibrium is a locally stable and a dynamic equilibrium.
See also
Thomas Malthus — See this article for further exposition.
An Essay on the Principle of Population
Malthusian growth model
Malthusian trap
Population dynamics |
https://en.wikipedia.org/wiki/Callosobruchus%20gibbicollis | Callosobruchus gibbicollis, is a species of leaf beetle found in Sri Lanka.
Description
Body red in color. Body vestiture is white and moderately dense. Antennae, mid legs and hind legs are yellowish red. It is characterized by strongly developed pronotal gibbosity. Pronotum conical. Pygidium is extremely convex and covered with white hairs. Metathorax and mesothorax are blackish. Seutellum quadrate. Elytral suture is brownish. Lateral spots in pronotum and hind femora are brownish. |
https://en.wikipedia.org/wiki/MEDLINE | MEDLINE (Medical Literature Analysis and Retrieval System Online, or MEDLARS Online) is a bibliographic database of life sciences and biomedical information. It includes bibliographic information for articles from academic journals covering medicine, nursing, pharmacy, dentistry, veterinary medicine, and health care. MEDLINE also covers much of the literature in biology and biochemistry, as well as fields such as molecular evolution.
Compiled by the United States National Library of Medicine (NLM), MEDLINE is freely available on the Internet and searchable via PubMed and NLM's National Center for Biotechnology Information's Entrez system.
History
MEDLARS (Medical Literature Analysis and Retrieval System) is a computerised biomedical bibliographic retrieval system. It was launched by the National Library of Medicine in 1964 and was the first large-scale, computer-based, retrospective search service available to the general public.
Initial development of MEDLARS
Since 1879, the National Library of Medicine has published Index Medicus, a monthly guide to medical articles in thousands of journals. The huge volume of bibliographic citations was manually compiled. In 1957 the staff of the NLM started to plan the mechanization of the Index Medicus, prompted by a desire for a better way to manipulate all this information, not only for Index Medicus but also to produce subsidiary products. By 1960 a detailed specification was prepared, and by the spring of 1961, request for proposals were sent out to 72 companies to develop the system. As a result, a contract was awarded to the General Electric Company. A Minneapolis-Honeywell 800 computer, which was to run MEDLARS, was delivered to the NLM in March 1963, and Frank Bradway Rogers (Director of the NLM 1949 to 1963) said at the time, "..If all goes well, the January 1964 issue of Index Medicus will be ready to emerge from the system at the end of this year. It may be that this will mark the beginning of a new era in medi |
https://en.wikipedia.org/wiki/SDS%20940 | The SDS 940 was Scientific Data Systems' (SDS) first machine designed to directly support time-sharing. The 940 was based on the SDS 930's 24-bit CPU, with additional circuitry to provide protected memory and virtual memory.
It was announced in February 1966 and shipped in April, becoming a major part of Tymshare's expansion during the 1960s. The influential Stanford Research Institute "oN-Line System" (NLS) was demonstrated on the system. This machine was later used to run Community Memory, the first bulletin board system.
After SDS was acquired by Xerox in 1969 and became Xerox Data Systems, the SDS 940 was renamed as the XDS 940.
History
The design was originally created by the University of California, Berkeley as part of their Project Genie that ran between 1964 and 1969. Genie added memory management and controller logic to an existing SDS 930 computer to give it page-mapped virtual memory, which would be heavily copied by other designs. The 940 was simply a commercialized version of the Genie design and remained backwardly compatible with their earlier models, with the exception of the 12-bit SDS 92.
Like most systems of the era, the machine was built with a bank of core memory as the primary storage, allowing between 16 and 64 kilowords. Words were 24 bits plus a parity bit. This was backed up by a variety of secondary storage devices, including a 1376 kword drum in Genie, or hard disks in the SDS models in the form of a drum-like 2097 kword "fixed-head" disk or a traditional "floating-head" model. The SDS machines also included a paper tape punch and reader, line printer, and a real-time clock. They bootstrapped from paper tape.
A file storage of 96 MB were also attached. The line printer used was a Potter Model HSP-3502 chain printer with 96 printing characters and a speed of about 230 lines per minute.
Software system
The operating system developed at Project Genie was the Berkeley Timesharing System.
By August 1968 a version 2.0 was announced th |
https://en.wikipedia.org/wiki/Appleton%E2%80%93Hartree%20equation | The Appleton–Hartree equation, sometimes also referred to as the Appleton–Lassen equation is a mathematical expression that describes the refractive index for electromagnetic wave propagation in a cold magnetized plasma. The Appleton–Hartree equation was developed independently by several different scientists, including Edward Victor Appleton, Douglas Hartree and German radio physicist H. K. Lassen. Lassen's work, completed two years prior to Appleton and five years prior to Hartree, included a more thorough treatment of collisional plasma; but, published only in German, it has not been widely read in the English speaking world of radio physics. Further, regarding the derivation by Appleton, it was noted in the historical study by Gilmore that Wilhelm Altar (while working with Appleton) first calculated the dispersion relation in 1926.
Equation
The dispersion relation can be written as an expression for the frequency (squared), but it is also common to write it as an expression for the index of refraction:
The full equation is typically given as follows:
or, alternatively, with damping term and rearranging terms:
Definition of terms:
: complex refractive index
: imaginary unit
: electron collision frequency
: angular frequency
: ordinary frequency (cycles per second, or Hertz)
: electron plasma frequency
: electron gyro frequency
: permittivity of free space
: ambient magnetic field strength
: electron charge
: electron mass
: angle between the ambient magnetic field vector and the wave vector
Modes of propagation
The presence of the sign in the Appleton–Hartree equation gives two separate solutions for the refractive index. For propagation perpendicular to the magnetic field, i.e., , the '+' sign represents the "ordinary mode," and the '−' sign represents the "extraordinary mode." For propagation parallel to the magnetic field, i.e., , the '+' sign represents a left-hand circularly polarized mode, and the '−' sign represents a right-hand circu |
https://en.wikipedia.org/wiki/Linked%20data | In computing, linked data is structured data which is interlinked with other data so it becomes more useful through semantic queries. It builds upon standard Web technologies such as HTTP, RDF and URIs, but rather than using them to serve web pages only for human readers, it extends them to share information in a way that can be read automatically by computers. Part of the vision of linked data is for the Internet to become a global database.
Tim Berners-Lee, director of the World Wide Web Consortium (W3C), coined the term in a 2006 design note about the Semantic Web project.
Linked data may also be open data, in which case it is usually described as Linked Open Data.
Principles
In his 2006 "Linked Data" note, Tim Berners-Lee outlined four principles of linked data, paraphrased along the following lines:
Uniform Resource Identifiers (URIs) should be used to name and identify individual things.
HTTP URIs should be used to allow these things to be looked up, interpreted, and subsequently "dereferenced".
Useful information about what a name identifies should be provided through open standards such as RDF, SPARQL, etc.
When publishing data on the Web, other things should be referred to using their HTTP URI-based names.
Tim Berners-Lee later restated these principles at a 2009 TED conference, again paraphrased along the following lines:
All conceptual things should have a name starting with HTTP.
Looking up an HTTP name should return useful data about the thing in question in a standard format.
Anything else that that same thing has a relationship with through its data should also be given a name beginning with HTTP.
Components
Thus, we can identify the following components as essential to a global Linked Data system as envisioned, and to any actual Linked Data subset within it:
URIs
HTTP
Structured data using controlled vocabulary terms and dataset definitions expressed in Resource Description Framework serialization formats such as RDFa, RDF/XML, N3, Turtle, o |
https://en.wikipedia.org/wiki/Polygon%20mesh | In 3D computer graphics and solid modeling, a polygon mesh is a collection of , s and s that defines the shape of a polyhedral object. The faces usually consist of triangles (triangle mesh), quadrilaterals (quads), or other simple convex polygons (n-gons), since this simplifies rendering, but may also be more generally composed of concave polygons, or even polygons with holes.
The study of polygon meshes is a large sub-field of computer graphics (specifically 3D computer graphics) and geometric modeling. Different representations of polygon meshes are used for different applications and goals. The variety of operations performed on meshes may include: Boolean logic (Constructive solid geometry), smoothing, simplification, and many others. Algorithms also exist for ray tracing, collision detection, and rigid-body dynamics with polygon meshes. If the mesh's edges are rendered instead of the faces, then the model becomes a wireframe model.
Volumetric meshes are distinct from polygon meshes in that they explicitly represent both the surface and volume of a structure, while polygon meshes only explicitly represent the surface (the volume is implicit).
Several methods exist for mesh generation, including the marching cubes algorithm.
Elements
Objects created with polygon meshes must store different types of elements. These include vertices, edges, faces, polygons and surfaces. In many applications, only vertices, edges and either faces or polygons are stored. A renderer may support only 3-sided faces, so polygons must be constructed of many of these, as shown above. However, many renderers either support quads and higher-sided polygons, or are able to convert polygons to triangles on the fly, making it unnecessary to store a mesh in a triangulated form.
Representations
Polygon meshes may be represented in a variety of ways, using different methods to store the vertex, edge and face data. These include:
Each of the representations above have particular |
https://en.wikipedia.org/wiki/Female%20urinal | A female urinal is a urinal designed for the female anatomy to allow for ease of use by women and girls. Different models enable urination in standing, semi-squatting, or squatting postures, but usually without direct bodily contact with the toilet. Sitting models also exist, and are designed for body contact with the urinal.
Unisex urinals are also marketed by various companies, and can be used by both sexes. Female and unisex urinals are much less common than male urinals. Moreover, male urinals are more abundant in men's public toilets than in the toilets of private homes.
Background
Advantages compared to toilets for urination
Urinals for female users could potentially have some of the same advantages as urinals for male users, when compared to toilets (solely with regard to urination):
lower cost
simpler maintenance
smaller space requirements (several wall-mounted urinals may be installed on the floor space of a single toilet cubicle)
reduced water consumption for flushing compared to sit toilets (waterless urinals can even function without any flushing water)
more hygienic, contact-free urination process (no risk of contact with feces from previous users)
no urine on toilet seat from women who avoid contact
faster use
potential for easier recycling of nutrients as fertilizer
Due to an increased number of units in the same amount of floor space, there is usually a faster and shorter queue for public urinals; up to 30% more people can use the toilet facilities at the same time.
Female urinals could possibly be suitable for use in public toilets which are heavily used during peak hours and which are likely to attract large numbers of visitors, especially places like theaters, stadiums, schools, universities, discotheques, shopping centers, and public transit facilities. In addition, temporary mobile female urinals have been developed for use at open-air events and festivals, as well as free-standing units for public spaces.
Design and implementation |
https://en.wikipedia.org/wiki/Apex%20%28diacritic%29 | In written Latin, the apex (plural "apices") is a mark with roughly the shape of an acute accent which was sometimes placed over vowels to indicate that they are long.
The shape and length of the apex can vary, sometimes within a single inscription. While virtually all apices consist of a line sloping up to the right, the line can be more or less curved, and varies in length from less than half the height of a letter to more than the height of a letter. Sometimes, it is adorned at the top with a distinct hook, protruding to the left. Rather than being centered over the vowel it modifies, the apex is often considerably displaced to the right.
Essentially the same diacritic, conventionally called in English the acute accent, is used today for the same purpose of denoting long vowels in a number of languages with Latin orthography, such as Irish (called in it the or simply "long"), Hungarian ( , from the words for "long" and "wedge"), Czech (called in it , "small line") and Slovak ( , from the word for "long"), as well as for the historically long vowels of Icelandic. In the 17th century, with a specialized shape distinct from that of the acute accent, a curved diacritic by the name of "apex" was adopted to mark final nasalization in the early Vietnamese alphabet, which already had an acute accent diacritic that was used to mark one of the tones.
Details
Although hardly known by most modern Latinists, the use of the sign was actually quite widespread during classical and postclassical times. The reason why it so often passes unnoticed lies probably in its smallish size and usually thinner nature in comparison with the lines that compose the letter on which it stands. Yet the more careful observer will soon start to notice apices in the exhibits of any museum, not only in many of the more formal epigraphic inscriptions, but also in handwritten palaeographic documents. However, otherwise punctilious transcriptions of the material customarily overlook this diacr |
https://en.wikipedia.org/wiki/Llin%C3%A1s%27s%20law | Llinás's law, or law of no interchangeability of neurons, is a statement in neuroscience made by Rodolfo Llinás in 1989, during his Luigi Galvani Award Lecture at the Fidia Research Foundation Neuroscience Award Lectures .
A neuron of a given kind (e.g. a thalamic cell) cannot be functionally replaced by one of another type (e.g. an inferior ollivary cell) even if their synaptic connectivity and the type of neurotransmitter outputs are identical. (The difference is that the intrinsic electrophysiological properties of thalamic cells are extraordinarily different from those of inferior olivary neurons).
The statement of this law is a consequence of an article written by Rodolfo Llinas himself in 1988 and published in Science with the title "The Intrinsic Electrophysiological Properties of Mammalian Neurons: Insights into Central Nervous System Function", which is considered a watershed due to its more than 2000 citations in the scientific literature, marking a major shift in viewpoint in neuroscience around the functional aspect. Until then, the prevailing belief in neuroscience was that just the connections and neurotransmitters released by neurons was enough to determine their function. Research by Llinás and colleagues during the 80's with vertebrates revealed this previously held dogma was wrong. |
https://en.wikipedia.org/wiki/Saccopharynx%20berteli | Saccopharynx berteli is a species of ray-finned fish within the family Saccopharyngidae. It is known from a single holotype collected from the central Pacific Ocean through an open fishing net at a depth of in 1977. The individual caught was an immature male with a length of . It has been classified as a 'Data deficient' species by the IUCN Red List as there is little information regarding its population, ecology, distribution, and potential threats. |
https://en.wikipedia.org/wiki/Somatotopic%20arrangement | Somatotopy is the point-for-point correspondence of an area of the body to a specific point on the central nervous system. Typically, the area of the body corresponds to a point on the primary somatosensory cortex (postcentral gyrus). This cortex is typically represented as a sensory homunculus which orients the specific body parts and their respective locations upon the homunculus. Areas such as the appendages, digits, penis, and face can draw their sensory locations upon the somatosensory cortex. The areas which are finely controlled (e.g., the digits) have larger portions of the somatosensory cortex whereas areas which are coarsely controlled (e.g., the trunk) have smaller portions. Areas such as the viscera do not have sensory locations on the post central gyrus.
Macaques, a kind of monkey, already exhibit somatotopy in their somatosensory and motor systems at birth.
Sensorimotor mapping of the human cerebellum
Functional magnetic resonance imaging (fMRI) was employed to determine areas of activation in the cerebellar cortex in humans during a series of motor tasks. The activation areas for movements of lips, tongue, hands, and feet were determined and found to be sharply confined to lobules and sublobules and their sagittal zones in the rostral and caudal spinocerebellar cortex. The activation mapped as two distinct homunculoid representations. One, a more extended representation, was located upside down in the superior cerebellum, and a second one, doubled and smaller, in the inferior cerebellum.
See also
Retinotopy
Topographic map (neuroanatomy)
Cortical homunculus |
https://en.wikipedia.org/wiki/Manganese%20in%20biology | Manganese is an essential biological element in all organisms. It is used in many enzymes and proteins. It is essential in plants.
Biochemistry
The classes of enzymes that have manganese cofactors include oxidoreductases, transferases, hydrolases, lyases, isomerases and ligases. Other enzymes containing manganese are arginase and Mn-containing superoxide dismutase (Mn-SOD). Also the enzyme class of reverse transcriptases of many retroviruses (though not lentiviruses such as HIV) contains manganese. Manganese-containing polypeptides are the diphtheria toxin, lectins and integrins.
Biological role in humans
Manganese is an essential human dietary element. It is present as a coenzyme in several biological processes, which include macronutrient metabolism, bone formation, and free radical defense systems. It is a critical component in dozens of proteins and enzymes. The human body contains about 12 mg of manganese, mostly in the bones. The soft tissue remainder is concentrated in the liver and kidneys. In the human brain, the manganese is bound to manganese metalloproteins, most notably glutamine synthetase in astrocytes.
Nutrition
Dietary recommendations
The U.S. Institute of Medicine (IOM) updated Estimated Average Requirements (EARs) and Recommended Dietary Allowances (RDAs) for minerals in 2001. For manganese there was not sufficient information to set EARs and RDAs, so needs are described as estimates for Adequate Intakes (AIs). As for safety, the IOM sets Tolerable upper intake levels (ULs) for vitamins and minerals when evidence is sufficient. In the case of manganese the adult UL is set at 11 mg/day. Collectively the EARs, RDAs, AIs and ULs are referred to as Dietary Reference Intakes (DRIs). Manganese deficiency is rare.
The European Food Safety Authority (EFSA) refers to the collective set of information as Dietary Reference Values, with Population Reference Intake (PRI) instead of RDA, and Average Requirement instead of EAR. AI and UL defined the s |
https://en.wikipedia.org/wiki/Chi%20site | A Chi site or Chi sequence is a short stretch of DNA in the genome of a bacterium near which homologous recombination is more likely to occur than on average across the genome. Chi sites serve as stimulators of DNA double-strand break repair in bacteria, which can arise from radiation or chemical treatments, or result from replication fork breakage during DNA replication. The sequence of the Chi site is unique to each group of closely related organisms; in E. coli and other enteric bacteria, such as Salmonella, the core sequence is 5'-GCTGGTGG-3' plus important nucleotides about 4 to 7 nucleotides to the 3' side of the core sequence. The existence of Chi sites was originally discovered in the genome of bacteriophage lambda, a virus that infects E. coli, but is now known to occur about 1000 times in the E. coli genome.
The Chi sequence serves as a signal to the RecBCD helicase-nuclease that triggers a major change in the activities of this enzyme. Upon encountering the Chi sequence as it unwinds DNA, RecBCD cuts the DNA a few nucleotides to the 3’ side of Chi, within the important sequences noted above; depending on the reaction conditions, this cut is either a simple nick on the 3'-ended strand or the change of nuclease activity from cutting the 3’-ended strand to cutting the 5’-ended strand. In either case the resulting 3’ single-stranded DNA (ssDNA) is bound by multiple molecules of RecA protein that facilitate "strand invasion," in which one strand of a homologous double-stranded DNA is displaced by the RecA-associated ssDNA. Strand invasion forms a joint DNA molecule called a D-loop. Resolution of the D-loop is thought to occur by replication primed by the 3’ end generated at Chi (in the D-loop). Alternatively, the D-loop may be converted into a Holliday junction by cutting of the D-loop and a second exchange of DNA strands; the Holliday junction can be converted into linear duplex DNA by cutting of the Holliday junction and ligation of the resultant nicks. E |
https://en.wikipedia.org/wiki/Transmembrane%20domain | A transmembrane domain (TMD) is a membrane-spanning protein domain. TMDs may consist of one or several alpha-helices or a transmembrane beta barrel. Because the interior of the lipid bilayer is hydrophobic, the amino acid residues in TMDs are often hydrophobic, although proteins such as membrane pumps and ion channels can contain polar residues. TMDs vary greatly in size and hydrophobicity; they may adopt organelle-specific properties.
Functions of transmembrane domains
Transmembrane domains are known to perform a variety of functions. These include:
Anchoring transmembrane proteins to the membrane.
Facilitating molecular transport of molecules such as ions and proteins across biological membranes; usually hydrophilic residues and binding sites in the TMDs help in this process.
Signal transduction across the membrane; many transmembrane proteins, such as G protein-coupled receptors, receive extracellular signals. TMDs then propagate those signals across the membrane to induce an intracellular effect.
Assisting in vesicle fusion; the function of TMDs is not well understood, but they have been shown to be critical for the fusion reaction, possibly as a result of TMDs affecting the tension of the lipid bilayer.
Mediating transport and sorting of transmembrane proteins; TMDs have been shown to work in tandem with cytosolic sorting signals, with length and hydrophobicity being the main determinants in TDM sorting. Longer and more hydrophobic TMDs aid in sorting proteins to the cell membrane, whereas shorter and less hydrophobic TMDs are used to retain proteins in the endoplasmic reticulum and the Golgi apparatus. The exact mechanism of this process is still unknown.
Identification of transmembrane helices
Transmembrane helices are visible in structures of membrane proteins determined by X-ray diffraction. They may also be predicted on the basis of hydrophobicity scales. Because the interior of the bilayer and the interiors of most proteins of known structure are |
https://en.wikipedia.org/wiki/Fermat%27s%20Last%20Theorem%20in%20fiction | The problem in number theory known as "Fermat's Last Theorem" has repeatedly received attention in fiction and popular culture. It was proved by Andrew Wiles in 1994.
Prose fiction
The theorem plays a key role in the 1948 mystery novel Murder by Mathematics by Hector Hawton.
Arthur Porges' short story "The Devil and Simon Flagg" features a mathematician who bargains with the Devil that the latter cannot produce a proof of Fermat's Last Theorem within twenty-four hours. The devil is not successful and is last seen beginning a collaboration with the hero. The story was first published in 1954 in The Magazine of Fantasy and Science Fiction.
In Douglas Hofstadter's 1979 book Gödel, Escher, Bach, the statement, "I have discovered a truly remarkable proof of this theorem which this margin is too small to contain" is repeatedly rephrased and satirized, including a pun on "fermata".
In Robert Forward's 1984/1985 science fiction novel Rocheworld, Fermat's Last Theorem is unproved far enough into the future for interstellar explorers to describe it to one of the mathematically inclined natives of another star system, who finds a proof.
In the 2003 book The Oxford Murders by Guillermo Martinez, Wiles's announcement in Cambridge of his proof of Fermat's Last Theorem forms a peripheral part of the action.
In Stieg Larsson's 2006 book The Girl Who Played With Fire, the main character Lisbeth Salander is mesmerized by the theorem. Fields medalist Timothy Gowers criticized Larsson's portrayal of the theorem as muddled and confused.
In Jasper Fforde's 2007 book First Among Sequels, 9 year-old Tuesday Next, seeing the equation on the sixth-form's math classroom's chalkboard, and thinking it homework, finds a simple counterexample.
Arthur C. Clarke and Frederik Pohl's 2008 novel The Last Theorem tells of the rise to fame and world prominence of a young Sri Lankan mathematician who devises an elegant proof of the theorem.
Television
"The Royale", an episode (first aired 27 March 19 |
https://en.wikipedia.org/wiki/Centrode | A centrode, in kinematics, is the path traced by the instantaneous center of rotation of a rigid plane figure moving in a plane. There are two types of centrodes: a space or fixed centrode, and a body or moving centrode.
The moving centrode rolls without slip on the fixed centrode.
Gallery
See also
Four-bar_linkage |
https://en.wikipedia.org/wiki/Zero-mode%20waveguide | A zero-mode waveguide is an optical waveguide that guides light energy into a volume that is small in all dimensions compared to the wavelength of the light.
Zero-mode waveguides have been developed for rapid parallel sensing of zeptolitre sample volumes, as applied to gene sequencing, by Pacific Biosciences (previously named Nanofluidics, Inc.)
A waveguide operated at frequencies lower than its cutoff frequency (wavelengths longer than its cutoff wavelength) and used as a precision attenuator is also known as a "waveguide below-cutoff attenuator."
The zero-mode waveguide is made possible by creating circular or rectangular nanoapertures using focused ion beam on an aluminium layer.
The zero-mode waveguide can also enhance fluorescence signals due to surface plasmons generated at metal-dielectric interfaces. Due to surface plasmon generation field is localized and enhanced as well as it changes the LDOS inside the cavity which leads to increase in Purcell Factor of analyte molecules inside the zero-mode waveguide
The zero-mode waveguide is very useful for Ultraviolet Auto-fluorescence spectroscopy on tryptophan-carrying proteins like beta-galactosidase. With further modification of the zero-mode waveguide with a conical reflector, it is possible to study the dynamic process of smaller proteins like streptavidin with 24 tryptophan.
,
The modified zero-mode waveguide with a conical reflector can be further optimized to enhance the signal-to-noise ratio and reach the ultimate sensitivity of single tryptophan proteins like TNase.
See also
Single-molecule real-time sequencing |
https://en.wikipedia.org/wiki/Network%20Advertising%20Initiative | The Network Advertising Initiative is an industry trade group founded in 2000 that develops self-regulatory standards for online advertising. Advertising networks created the organization in response to concerns from the Federal Trade Commission and consumer groups that online advertising — particularly targeted or behavioral advertising — harmed user privacy. The NAI seeks to provide self-regulatory guidelines for participating networks and opt-out technologies for consumers in order to maintain the value of online advertising while protecting consumer privacy. Membership in the NAI has fluctuated greatly over time, and both the organization and its self-regulatory system have been criticized for being ineffective in promoting privacy.[Missing Citation]
History
The NAI was formally announced at the Public Workshop on Online Profiling held by the FTC and the Department of Commerce on November 8, 1999. Its membership then consisted of 24/7 Media, AdForce, AdKnowledge, Adsmart, DoubleClick, Engage, Flycast, MatchLogic, NetGravity (a division of DoubleClick) and Real Media.
In July 2000, the NAI published a set of principles, negotiated with the FTC and endorsed by the FTC, in their report to Congress on online profiling. In May 2001, the NAI released an accompanying website allowing users to more quickly download opt-out cookies for all participating ad networks.
In 2002, the NAI released guidelines for the use of web beacons — small images or pieces of code used to track visiting and traffic patterns, and to install cookies on visitors' machines. These guidelines use a similar model of notice and choice as the NAI Principles; opt-in consent is only required when sensitive information is associated with personally identifiable information and transferred to a third party.
In 2003, the NAI formed the Email Service Provider Coalition (since renamed the Email Sender and Provider Coalition). The ESPC engages in lobbying, press relations and technical standards deve |
https://en.wikipedia.org/wiki/Graded-commutative%20ring | In algebra, a graded-commutative ring (also called a skew-commutative ring) is a graded ring that is commutative in the graded sense; that is, homogeneous elements x, y satisfy
where |x | and |y | denote the degrees of x and y.
A commutative (non-graded) ring, with trivial grading, is a basic example. For example, an exterior algebra is generally not a commutative ring but is a graded-commutative ring.
A cup product on cohomology satisfies the skew-commutative relation; hence, a cohomology ring is graded-commutative. In fact, many examples of graded-commutative rings come from algebraic topology and homological algebra. |
https://en.wikipedia.org/wiki/Carrier%20current | Carrier current transmission, originally called wired wireless, employs guided low-power radio-frequency signals, which are transmitted along electrical conductors. The transmissions are picked up by receivers that are either connected to the conductors, or a short distance from them. Carrier current transmission is used to send audio and telemetry to selected locations, and also for low-power broadcasting that covers a small geographical area, such as a college campus. The most common form of carrier current uses longwave or medium wave AM radio signals that are sent through existing electrical wiring, although other conductors can be used, such as telephone lines.
Technology
Carrier current generally uses low-power transmissions. In cases where the signals are being carried over electrical wires, special preparations must be made for distant transmissions, as the signals cannot pass through standard utility transformers. Signals can bridge transformers if the utility company has installed high-pass filters, which typically has already been done when carrier current-based data systems are in operation. Signals can also be impressed onto the neutral leg of the three-phase electric power system, a practice known as "neutral loading", in order to reduce or eliminate mains hum (60 hertz in North American installations), and to extend effective transmission line distance.
For a broadcasting installation, a typical carrier current transmitter has an output in the range 5 to 30 watts. However, electrical wiring is a very inefficient antenna, and this results in a transmitted effective radiated power of less than one watt, and the distance over which signals can be picked up is usually less than 60 meters (200 feet) from the wires. Transmission sound quality can be good, although it sometimes includes the low-frequency mains hum interference produced by the alternating current. However, not all listeners notice this hum, nor is it reproduced well by all receivers.
Exte |
https://en.wikipedia.org/wiki/GNU%20Taler | GNU Taler is a free software-based microtransaction and electronic payment system. Unlike most other decentralized payment systems, GNU Taler does not use a blockchain. A blind signature is used to protect the privacy of users as it prevents the exchange from knowing which coin it signed for which customer.
The project is led by Florian Dold and Christian Grothoff of Taler Systems SA. Taler is short for the "Taxable Anonymous Libre Economic Reserves" and alludes to the Taler coins in Germany during the Early Modern period. It has vocal support from GNU Project founder Richard Stallman. Stallman has described the program as "designed to be anonymous for the payer, but payees are always identified." In a paper published in Security, Privacy, and Applied Cryptography Engineering, GNU Taler is described as meeting ethical considerations – the paying customer is anonymous while the merchant is identified and taxable. An implementation is provided by Taler Systems SA.
See also
DigiCash
Cryptocurrency
Open source |
https://en.wikipedia.org/wiki/Singa%20the%20Lion | Singa The Kindness Lion was a mascot used for various public education campaigns in Singapore. It was created to educate the public on courtesy, graciousness and eventually kindness. A public education campaign featuring Singa the Kindness Lion was launched in 1982 under the National Courtesy Campaign with the slogan, "Courtesy is part of our tradition, it's so nice to be courteous."
From 2009, Singa the Kindness Lion has been adopted as the official mascot of the Singapore Kindness Movement.
Origins
Singa the Kindness Lion was initially created by a team of artists working under the then Ministry of Information & the Arts (MITA) - Now known as Ministry of Information, Communications and the Arts. The creation of Singa was overseen by Basskaran Nair, a civil servant, who headed the National Courtesy Campaign in its early years.
The team tasked with creating Singa consisted of chief artist Joseph Teo, Ahmad Asran and Eileen Wat. The team created Singa within a period of 6 weeks. The initial design of Singa was of a 'fierce-looking' lion and the subsequent revisions were overtly gentle in design.
The final version of Singa was only conceived after more than a hundred revisions. The final design depicts Singa as a golden lion with a bright and welcoming smile. Singa was introduced during a time where most campaigns were slogan driven. Singa's introduction paved the way for other mascots to be introduced into various public campaigns.
The Singapore Productivity campaign followed suit and adopted 'Teamy' the bee to address issues of productivity in the Singapore workforce.
Singa as popular character
Since its introduction, Singa has been made into a host of items ranging from badges, stickers, documentaries, jingles, songs, posters and banners, debates, contests, talks, exhibitions, courtesy courses, leaflets, handbooks and pamphlets. Singa soon became a familiar face with regular appearances in community events and advertisement campaigns.
The success of Singa th |
https://en.wikipedia.org/wiki/Site-specific%20recombinase%20technology | Site-specific recombinase technologies are genome engineering tools that depend on recombinase enzymes to replace targeted sections of DNA.
History
In the late 1980s gene targeting in murine embryonic stem cells (ESCs) enabled the transmission of mutations into the mouse germ line, and emerged as a novel option to study the genetic basis of regulatory networks as they exist in the genome. Still, classical gene targeting proved to be limited in several ways as gene functions became irreversibly destroyed by the marker gene that had to be introduced for selecting recombinant ESCs. These early steps led to animals in which the mutation was present in all cells of the body from the beginning leading to complex phenotypes and/or early lethality. There was a clear need for methods to restrict these mutations to specific points in development and specific cell types. This dream became reality when groups in the USA were able to introduce bacteriophage and yeast-derived site-specific recombination (SSR-) systems into mammalian cells as well as into the mouse.
Classification, properties and dedicated applications
Common genetic engineering strategies require a permanent modification of the target genome. To this end great sophistication has to be invested in the design of routes applied for the delivery of transgenes. Although for biotechnological purposes random integration is still common, it may result in unpredictable gene expression due to variable transgene copy numbers, lack of control about integration sites and associated mutations. The molecular requirements in the stem cell field are much more stringent. Here, homologous recombination (HR) can, in principle, provide specificity to the integration process, but for eukaryotes it is compromised by an extremely low efficiency. Although meganucleases, zinc-finger- and transcription activator-like effector nucleases (ZFNs and TALENs) are actual tools supporting HR, it was the availability of site-specific recombina |
https://en.wikipedia.org/wiki/Fibonacci%20search%20technique | In computer science, the Fibonacci search technique is a method of searching a sorted array using a divide and conquer algorithm that narrows down possible locations with the aid of Fibonacci numbers. Compared to binary search where the sorted array is divided into two equal-sized parts, one of which is examined further, Fibonacci search divides the array into two parts that have sizes that are consecutive Fibonacci numbers. On average, this leads to about 4% more comparisons to be executed, but it has the advantage that one only needs addition and subtraction to calculate the indices of the accessed array elements, while classical binary search needs bit-shift (see Bitwise operation), division or multiplication, operations that were less common at the time Fibonacci search was first published. Fibonacci search has an average- and worst-case complexity of O(log n) (see Big O notation).
The Fibonacci sequence has the property that a number is the sum of its two predecessors. Therefore the sequence can be computed by repeated addition. The ratio of two consecutive numbers approaches the Golden ratio, 1.618... Binary search works by dividing the seek area in equal parts (1:1). Fibonacci search can divide it into parts approaching 1:1.618 while using the simpler operations.
If the elements being searched have non-uniform access memory storage (i. e., the time needed to access a storage location varies depending on the location accessed), the Fibonacci search may have the advantage over binary search in slightly reducing the average time needed to access a storage location. If the machine executing the search has a direct mapped CPU cache, binary search may lead to more cache misses because the elements that are accessed often tend to gather in only a few cache lines; this is mitigated by splitting the array in parts that do not tend to be powers of two. If the data is stored on a magnetic tape where seek time depends on the current head position, a tradeoff between lo |
https://en.wikipedia.org/wiki/Kinetic%20diameter | Kinetic diameter is a measure applied to atoms and molecules that expresses the likelihood that a molecule in a gas will collide with another molecule. It is an indication of the size of the molecule as a target. The kinetic diameter is not the same as atomic diameter defined in terms of the size of the atom's electron shell, which is generally a lot smaller, depending on the exact definition used. Rather, it is the size of the sphere of influence that can lead to a scattering event.
Kinetic diameter is related to the mean free path of molecules in a gas. Mean free path is the average distance that a particle will travel without collision. For a fast moving particle (that is, one moving much faster than the particles it is moving through) the kinetic diameter is given by,
where,
d is the kinetic diameter,
r is the kinetic radius, r = d/2,
l is the mean free path, and
n is the number density of particles
However, a more usual situation is that the colliding particle being considered is indistinguishable from the population of particles in general. Here, the Maxwell–Boltzmann distribution of energies must be considered, which leads to the modified expression,
List of diameters
The following table lists the kinetic diameters of some common molecules;
Dissimilar particles
Collisions between two dissimilar particles occur when a beam of fast particles is fired into a gas consisting of another type of particle, or two dissimilar molecules randomly collide in a gas mixture. For such cases, the above formula for scattering cross section has to be modified.
The scattering cross section, σ, in a collision between two dissimilar particles or molecules is defined by the sum of the kinetic diameters of the two particles,
where.
r1, r2 are, half the kinetic diameter (ie, the kinetic radii) of the two particles, respectively.
We define an intensive quantity, the scattering coefficient α, as the product of the gas number density and the scattering cross section,
The |
https://en.wikipedia.org/wiki/Ring%20oscillator | A ring oscillator is a device composed of an odd number of NOT gates in a ring, whose output oscillates between two voltage levels, representing true and false. The NOT gates, or inverters, are attached in a chain and the output of the last inverter is fed back into the first.
Details
Because a single inverter computes the logical NOT of its input, it can be shown that the last output of a chain of an odd number of inverters is the logical NOT of the first input. The final output is asserted a finite amount of time after the first input is asserted and the feedback of the last output to the input causes oscillation.
A circular chain composed of an even number of inverters cannot be used as a ring oscillator. The last output in this case is the same as the input. However, this configuration of inverter feedback can be used as a storage element and it is the basic building block of static random access memory or SRAM.
The stages of the ring oscillator are often differential stages, that are more immune to external disturbances. This renders available also non-inverting stages. A ring oscillator can be made with a mix of inverting and non-inverting stages, provided the total number of inverting stages is odd. The oscillator period is in all cases equal to twice the sum of the individual delays of all stages.
A ring oscillator only requires power to operate. Above a certain voltage, typical well below the threshold voltage of the MOSFETs used, oscillations begin spontaneously. To increase the frequency of oscillation, two methods are commonly used. First, making the ring from a smaller number of inverters results in a higher frequency of oscillation, with about the same power consumption. Second, the supply voltage may be increased. In circuits where this method can be applied, it reduces the propagation delay through the chain of stages, increasing both the frequency of the oscillation and the current consumed.
Operation
To understand the operation of a ring |
https://en.wikipedia.org/wiki/Paley%20graph | In mathematics, Paley graphs are dense undirected graphs constructed from the members of a suitable finite field by connecting pairs of elements that differ by a quadratic residue. The Paley graphs form an infinite family of conference graphs, which yield an infinite family of symmetric conference matrices. Paley graphs allow graph-theoretic tools to be applied to the number theory of quadratic residues, and have interesting properties that make them useful in graph theory more generally.
Paley graphs are named after Raymond Paley. They are closely related to the Paley construction for constructing Hadamard matrices from quadratic residues .
They were introduced as graphs independently by and . Sachs was interested in them for their self-complementarity properties, while Erdős and Rényi studied their symmetries.
Paley digraphs are directed analogs of Paley graphs that yield antisymmetric conference matrices. They were introduced by (independently of Sachs, Erdős, and Rényi) as a way of constructing tournaments with a property previously known to be held only by random tournaments: in a Paley digraph, every small subset of vertices is dominated by some other vertex.
Definition
Let q be a prime power such that q = 1 (mod 4). That is, q should either be an arbitrary power of a Pythagorean prime (a prime congruent to 1 mod 4) or an even power of an odd non-Pythagorean prime. This choice of q implies that in the unique finite field Fq of order q, the element −1 has a square root.
Now let V = Fq and let
.
If a pair {a,b} is included in E, it is included under either ordering of its two elements. For, a − b = −(b − a), and −1 is a square, from which it follows that a − b is a square if and only if b − a is a square.
By definition G = (V, E) is the Paley graph of order q.
Example
For q = 13, the field Fq is just integer arithmetic modulo 13. The numbers with square roots mod 13 are:
±1 (square roots ±1 for +1, ±5 for −1)
±3 (square roots ±4 for +3, ±6 for − |
https://en.wikipedia.org/wiki/Pasch%27s%20theorem | In geometry, Pasch's theorem, stated in 1882 by the German mathematician Moritz Pasch, is a result in plane geometry which cannot be derived from Euclid's postulates.
Statement
The statement is as follows: [Here, for example, (, , ) means that point lies between points and .]
See also
Ordered geometry
Pasch's axiom
Notes |
https://en.wikipedia.org/wiki/List%20of%20software%20related%20to%20augmented%20reality | The following is a list of notable augmented reality software including programs for application development, content management, gaming and integrated AR solutions. For a list specifically for AR video games, see List of augmented reality video games.
Proprietary
Open source
See also
Fyuse |
https://en.wikipedia.org/wiki/Fares%20Scale%20of%20Injuries%20due%20to%20Cluster%20Munitions | The Fares Scale of Injuries due to Cluster Munitions is an anatomical and neuropsychological classification method to identify and describe injury scales for victims of cluster munitions. It was published in 2013 by Lebanese physicians, Jawad Fares and Youssef Fares.
Elements of the scale
Interpretation
The scale assesses the severity of injuries resulting from cluster munitions based on functional impairment. Due to the polytraumatic nature of the injuries and the damage to multiple systems in the body, the scale stratifies cohorts by exploring the limitation in activity resulting from the injury. Following a grading system (I-IV): Grade I shows functional impairment of less than 25%, Grade II shows 50%, Grade III shows 75%, and Grade IV demonstrates more than 75% functional impairment. Grading is done after meticulous and conjoint assessment of symptoms and functioning.
History
During the 2006 Lebanon War, it was estimated that 4.6 million cluster munitions were released over Lebanese soil, almost one million of which remained unexploded. These unexploded ordnances continued to injure and kill civilians after the war ended. Injuries were polytraumatic and often led to disability and significant neuropsychological effects. Research by Jawad Fares and Youssef Fares led to the development of the “Fares Scale of Injuries due to Cluster Munitions” to assess injuries based on functional impairment. The scale helped in classifying the wounds of victims and determining the best possible treatment. |
https://en.wikipedia.org/wiki/Accuracy%20paradox | The accuracy paradox is the paradoxical finding that accuracy is not a good metric for predictive models when classifying in predictive analytics. This is because a simple model may have a high level of accuracy but be too crude to be useful. For example, if the incidence of category A is dominant, being found in 99% of cases, then predicting that case is category A will have an accuracy of 99%. Precision and recall are better measures in such cases.
The underlying issue is that there is a class imbalance between the positive class and the negative class. Prior probabilities for these classes need to be accounted for in error analysis. Precision and recall help, but precision too can be biased by very unbalanced class priors in the test sets.
Example
For example, a city of 1 million people has ten terrorists. A profiling system results in the following confusion matrix:
Even though the accuracy is ≈ 99.9%, 990 out of the 1000 positive predictions are incorrect. The precision of = 1% reveals its poor performance. As the classes are so unbalanced, a better metric is the F1 score = ≈ 2% (the recall being = 1).
Literature
Kubat, M. (2000). Addressing the Curse of Imbalanced Training Sets: One-Sided Selection. Fourteenth International Conference on Machine Learning.
See also
False positive paradox |
https://en.wikipedia.org/wiki/Trace%20operator | In mathematics, the trace operator extends the notion of the restriction of a function to the boundary of its domain to "generalized" functions in a Sobolev space. This is particularly important for the study of partial differential equations with prescribed boundary conditions (boundary value problems), where weak solutions may not be regular enough to satisfy the boundary conditions in the classical sense of functions.
Motivation
On a bounded, smooth domain , consider the problem of solving Poisson's equation with inhomogeneous Dirichlet boundary conditions:
with given functions and with regularity discussed in the application section below. The weak solution of this equation must satisfy
for all .
The -regularity of is sufficient for the well-definedness of this integral equation. It is not apparent, however, in which sense can satisfy the boundary condition on : by definition, is an equivalence class of functions which can have arbitrary values on since this is a null set with respect to the n-dimensional Lebesgue measure.
If there holds by Sobolev's embedding theorem, such that can satisfy the boundary condition in the classical sense, i.e. the restriction of to agrees with the function (more precisely: there exists a representative of in with this property). For with such an embedding does not exist and the trace operator presented here must be used to give meaning to . Then with is called a weak solution to the boundary value problem if the integral equation above is satisfied. For the definition of the trace operator to be reasonable, there must hold for sufficiently regular .
Trace theorem
The trace operator can be defined for functions in the Sobolev spaces with , see the section below for possible extensions of the trace to other spaces. Let for be a bounded domain with Lipschitz boundary. Then there exists a bounded linear trace operator
such that extends the classical trace, i.e.
for all .
The continuity of impl |
https://en.wikipedia.org/wiki/128th%20meridian%20east | The meridian 128° east of Greenwich is a line of longitude that extends from the North Pole across the Arctic Ocean, Asia, Australia, the Indian Ocean, the Southern Ocean, and Antarctica to the South Pole.
The 128th meridian east forms a great circle with the 52nd meridian west.
From Pole to Pole
Starting at the North Pole and heading south to the South Pole, the 128th meridian east passes through:
{| class="wikitable plainrowheaders"
! scope="col" width="130" | Co-ordinates
! scope="col" | Country, territory or sea
! scope="col" | Notes
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Arctic Ocean
| style="background:#b0e0e6;" |
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Laptev Sea
| style="background:#b0e0e6;" |
|-valign="top"
|
! scope="row" |
| Sakha Republic — islands of the Lena Delta and the mainland Amur Oblast — from
|-valign="top"
|
! scope="row" |
| Heilongjiang Jilin — from
|-
|
! scope="row" |
|
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Sea of Japan
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
|
|-
|
! scope="row" |
| Mainland and the islands of Changseon and Namhae
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | East China Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Okinawa Prefecture — island of Iheya
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | East China Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Okinawa Prefecture — island of Okinawa
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Pacific Ocean
| style="background:#b0e0e6;" | Philippine Sea
|-
|
! scope="row" |
| Island of Halmahera
|-
| style="background:#b0e0e6;" |
! scope="row" style="background:#b0e0e6;" | Halmahera Sea
| style="background:#b0e0e6;" |
|-
|
! scope="row" |
| Island of Halmahera
|-
| style="background:#b0e0e6;" |
! |
https://en.wikipedia.org/wiki/Gnotobiosis | Gnotobiosis (from Greek roots gnostos "known" and bios "life") refers to an engineered state of an organism in which all forms of life (i.e., microorganisms) in or on it, including its microbiota, have been identified. The term gnotobiotic organism, or gnotobiote, can refer to a model organism that is colonized with a specific community of known microorganisms (isobiotic or defined flora animal) or that contains no microorganisms (germ-free) often for experimental purposes. The study of gnotobiosis and the generation of various types of gnotobiotic model organisms as tools for studying interactions between host organisms and microorganisms is referred to as gnotobiology.
History
The concept and field of gnotobiology was born of a debate between Louis Pasteur and Marceli Nencki in the late 19th century, in which Pasteur argued that animal life needed bacteria to succeed while Nencki argued that animals would be healthier without bacteria, but it wasn't until 1960 that the Association for Gnotobiotics was formed. Early attempts in gnotobiology were limited by inadequate equipment and nutritional knowledge, however, advancements in nutritional sciences, animal anatomy and physiology, and immunology have allowed for the improvement of gnotobiotic technologies.
Methods
Guinea pigs were the first germ-free animal model described in 1896 by George Nuttall and Hans Thierfelder, establishing techniques still used today in gnotobiology. Early methods for maintaining sterile environments involved sterile glass jars and gloveboxes, which developed into a conversation surrounding uniformity of the methods in the field at the 1939 symposium on Micrurgical and Germ-free Methods at the University of Notre Dame. Many early (1930-1950s) accomplishments in gnotobiology came from Notre Dame University, The University of Lund, and Nagoya University. The Laboratories of Bacteriology at the University of Notre Dame (known as LOBUND) was founded by John J. Cavanaugh and is cited for ma |
https://en.wikipedia.org/wiki/3B%20series%20computers | The 3B series computers are a line of minicomputers made between the late 1970s and 1993 by AT&T Computer Systems' Western Electric subsidiary, for use with the company's UNIX operating system. The line primarily consists of the models 3B20, 3B5, 3B15, 3B2, and 3B4000. The series is notable for controlling a series of electronic switching systems for telecommunication, for general computing purposes, and for serving as the historical software porting base for commercial UNIX.
History
The first 3B20D was installed in Fresno, California at Pacific Bell. Within two years, several hundred were in place throughout the Bell System. Some of the units came with "small, slow hard disks".
The general purpose family of 3B computer systems includes the 3B2, 3B5, 3B15, 3B20S, and 3B4000. They run the AT&T UNIX operating system and were named after the successful 3B20D High Availability processor.
In 1984, after regulatory constraints were lifted, AT&T introduced the 3B20D, 3B20S, 3B5, and 3B2 to the general computer market, a move that some commentators saw as an attempt to compete with IBM. In Europe, the 3B computers were distributed by Italian firm Olivetti, in which AT&T had a minority shareholding. After AT&T bought NCR Corporation, effective January 1992, the computers were marketed through NCR sales channels.
Having produced 70,000 units, the AT&T Oklahoma City plant stopped manufacturing 3B machines at the end of 1993, with the 3B20D to be the last units manufactured.
3B high-availability processors
The original series of 3B computers includes the models 3B20C, 3B20D, 3B21D, and 3B21E.
These systems are 32-bit microprogrammed duplex (redundant) high availability processor units running a real-time operating system. They were first produced in the late 1970s at the WECo factory in Lisle, Illinois, for telecommunications applications including the 4ESS and 5ESS systems.
They use the Duplex Multi Environment Real Time (DMERT) operating system which was renamed UNIX-R |
https://en.wikipedia.org/wiki/Belief%20structure | A belief structure is a distributed assessment with beliefs.
Evidential reasoning
A belief structure is used in the evidential reasoning (ER) approach for multiple-criteria decision analysis (MCDA) to represent the performance of an alternative option on a criterion.
In the ER approach, an MCDA problem is modelled by a belief decision matrix instead of a conventional decision matrix. The difference between the two is that, in the former, each element is a belief structure; in the latter, conversely, each element is a single value (either numerical or textual).
Application
For example, the quality of a car engine may be assessed to be “excellent” with a high degree of belief (e.g. 0.6) due to its low fuel consumption, low vibration and high responsiveness. At the same time, the quality may be assessed to be only “good” with a lower degree of belief (e.g. 0.4 or less) because its quietness and starting can still be improved. Such an assessment can be modeled by a belief structure: Si(engine)={(excellent, 0.6), (good, 0.4)}, where Si stands for the assessment of engine on the ith criterion (quality). In the belief structure, “excellent” and “good” are assessment standards, whilst “0.6” and “0.4” are degrees of belief. |
https://en.wikipedia.org/wiki/Quantum%20contextuality | Quantum contextuality is a feature of the phenomenology of quantum mechanics whereby measurements of quantum observables cannot simply be thought of as revealing pre-existing values. Any attempt to do so in a realistic hidden-variable theory leads to values that are dependent upon the choice of the other (compatible) observables which are simultaneously measured (the measurement context). More formally, the measurement result (assumed pre-existing) of a quantum observable is dependent upon which other commuting observables are within the same measurement set.
Contextuality was first demonstrated to be a feature of quantum phenomenology by the Bell–Kochen–Specker theorem. The study of contextuality has developed into a major topic of interest in quantum foundations as the phenomenon crystallises certain non-classical and counter-intuitive aspects of quantum theory. A number of powerful mathematical frameworks have been developed to study and better understand contextuality, from the perspective of sheaf theory, graph theory, hypergraphs, algebraic topology, and probabilistic couplings.
Nonlocality, in the sense of Bell's theorem, may be viewed as a special case of the more general phenomenon of contextuality, in which measurement contexts contain measurements that are distributed over spacelike separated regions. This follows from Fine's theorem.
Quantum contextuality has been identified as a source of quantum computational speedups and quantum advantage in quantum computing. Contemporary research has increasingly focused on exploring its utility as a computational resource.
Kochen and Specker
The need for contextuality was discussed informally in 1935 by Grete Hermann, but it was more than 30 years later when Simon B. Kochen and Ernst Specker, and separately John Bell, constructed proofs that any realistic hidden-variable theory able to explain the phenomenology of quantum mechanics is contextual for systems of Hilbert space dimension three and greater. The |
https://en.wikipedia.org/wiki/Cinquantenaire | The Parc du Cinquantenaire (French for "Park of the Fiftieth Anniversary", pronounced ) or Jubelpark (Dutch for "Jubilee Park", pronounced ) is a large public, urban park of in the easternmost part of the European Quarter in Brussels, Belgium.
Most buildings of the U-shaped complex that dominate the park were commissioned by the Belgian Government under the patronage of King Leopold II for the 1880 National Exhibition commemorating the 50th anniversary of the Belgian Revolution. During successive exhibitions, more structures were added to the site. The centrepiece memorial arch, known as the Cinquantenaire Arch (, ), was erected in 1905, replacing a previous temporary version of the arcade by Gédéon Bordiau. The surrounding park esplanade was full of picturesque gardens, ponds and waterfalls. It housed several trade fairs, exhibitions and festivals at the beginning of the 20th century. In 1930, the government decided to reserve the Cinquantenaire for use as a leisure park.
The Royal Museum of the Armed Forces and Military History has been the sole tenant of the northern half of the complex since 1880. The southern half has been occupied by the Art & History Museum (formerly the Cinquantenaire Museum) since 1889, and Autoworld vintage car museum since 1986. The Temple of Human Passions by Victor Horta, a remainder from 1896, the Monument to the Belgian Pioneers in Congo from 1921, and the Great Mosque of Brussels from 1978, are located in the north-western corner of the park (see map below).
Lines 1 and 5 of the Brussels Metro and the Belliard Tunnel from the Rue de la Loi/Wetstraat pass underneath the park, the latter partly in an open section in front of the arch. The nearest metro stations are Schuman to the west of the park, and Merode immediately to the east.
History
Originally, the area now known as the Cinquantenaire/Jubelpark (French/Dutch) was part of the military exercise ground of the Garde Civique outside of Brussels' city centre; the so-called "Lin |
https://en.wikipedia.org/wiki/Oracle%20complexity%20%28optimization%29 | In mathematical optimization, oracle complexity is a standard theoretical framework to study the computational requirements for solving classes of optimization problems. It is suitable for analyzing iterative algorithms which proceed by computing local information about the objective function at various points (such as the function's value, gradient, Hessian etc.). The framework has been used to provide tight worst-case guarantees on the number of required iterations, for several important classes of optimization problems.
Formal description
Consider the problem of minimizing some objective function (over some domain ), where is known to belong to some family of functions . Rather than direct access to , it is assumed that the algorithm can obtain information about via an oracle , which given a point in , returns some local information about in the neighborhood of . The algorithm begins at some initialization point , uses the information provided by the oracle to choose the next point , uses the additional information to choose the following point , and so on.
To give a concrete example, suppose that (the -dimensional Euclidean space), and consider the gradient descent algorithm, which initializes at some point and proceeds via the recursive equation
,
where is some step size parameter. This algorithm can be modeled in the framework above, where given any , the oracle returns the gradient , which is then used to choose the next point .
In this framework, for each choice of function family and oracle , one can study how many oracle calls/iterations are required, to guarantee some optimization criterion (for example, ensuring that the algorithm produces a point such that for some ). This is known as the oracle complexity of this class of optimization problems: Namely, the number of iterations such that on one hand, there is an algorithm that provably requires only this many iterations to succeed (for any function in ), and on the other hand, there |
https://en.wikipedia.org/wiki/Wm.%20K.%20Walthers | Wm. K. Walthers, Inc. is a manufacturer and distributor of model railroad supplies and tools.
History
Wm. K. Walthers, Inc., was officially founded in Milwaukee in 1932—though it started years earlier when seven-year-old William K. (Bill) Walthers got his first taste of the hobby with a small, wind-up toy train for Christmas. He continued with the hobby and eventually had an attic layout composed primarily of his scratch-built creations. A series of articles he wrote on building train control and signaling systems led to requests from other modelers that he began manufacturing them. The first ad (in the May issue of The Model Maker) offered a 24-page, 15¢ catalog that listed rail, couplers, and electrical supplies. Sales were over US$500.00 for the first year. By 1935, the catalogs were over 80 pages.
Within five years, Walthers had grown and a larger quarters were needed. Space was found on Erie Street, where everything—from milled wood parts to metal castings to decals—was made in-house.1937 also saw a new line in HO Scale, featured in its catalog. Bill brought operating layouts to the 1939 World's Fair, which gave the hobby a big boost. Soon, though, the growing possibility of war overshadowed these successes.
In 1958, Bill retired, and his son Bruce took over. Just as full-size railroads were being hard-hit by new technology, so too were model railroads. In 1960, Walthers became a full-line distributor of other manufacturers' products while continuing the expansion of the Walthers lines. By the start of the 1970s Bruce's son Phil had joined the company.
Acquisitions, expansions, and vertical integration
Expansion and diversification continue under Phil's tenure. The establishment of the Walthers Importing Division added several international lines. The company made agreements with several European companies to become the exclusive North American distributor for many famous European brands.
The manufacturing plant was modernized. Code 83 track was introduced |
https://en.wikipedia.org/wiki/List%20of%20trapdoor%20spiders | Trapdoor spider is a common name that is used to refer to various spiders from several different groups that create burrows with a silk-hinged trapdoor to help them ambush prey.
Several families within the infraorder Mygalomorphae contain trapdoor spiders:
Actinopodidae, a family otherwise known as 'mouse-spiders', in South America and Australia
Antrodiaetidae, a family of 'folding trapdoor spiders' from the United States and Japan
Barychelidae, a family of 'brush-footed trapdoor spiders' with pantropical distribution
Ctenizidae, a family of 'cork-lid trapdoor spiders' in tropical and subtropical regions
Cyrtaucheniidae, a family of 'wafer-lid trapdoor spiders, with wide distribution except cooler regions
Euctenizidae, a family of spiders that make wafer-like or cork-like trapdoors
Halonoproctidae, a family of spiders that make wafer-like or cork-like trapdoors and includes the phragmotic genus Cyclocosmia
Idiopidae, a family of 'spurred-trapdoor spiders' or 'armoured trapdoors' mostly in Southern Hemisphere
Migidae, also known as 'ridge fanged trapdoor spiders' or 'tree trapdoor spiders', in the Southern Hemisphere
Nemesiidae, a family of 'tube trapdoor spiders', with both tropical and temperate species worldwide
Theraphosidae, a family of tarantulas (where just a few species make trapdoors), also with wide distribution
There is also one family of trapdoor spiders in the suborder Mesothelae:
Liphistiidae, an unusual and unique family of spiders with armoured abdomens from Southeast Asia, China and Japan
Set index articles on spiders
Set index articles on animal common names |
https://en.wikipedia.org/wiki/JavaStation | The JavaStation was a Network Computer (NC) developed by Sun Microsystems between 1996 and 2000, intended to run only Java applications.
The hardware is based on the design of the Sun SPARCstation series, a very successful line of UNIX workstations.
The JavaStation, as an NC, lacks a hard drive, floppy or CD-ROM drive. It also differs from other Sun systems in having PS/2 keyboard and mouse interfaces and a VGA monitor connector.
Models
There were several models of the JavaStation produced, some being pre-production variants produced in very small numbers.
Production models comprised:
JavaStation-1 (part number JJ-xx), codenamed Mr. Coffee: based on a 110 MHz MicroSPARC IIe CPU, this was housed in a cuboidal Sun "unidisk" enclosure.
JavaStation-NC or JavaStation-10 (part number JK-xx) codenamed Krups: a redesigned Mr. Coffee with a 100 MHz MicroSPARC IIep CPU and enhanced video resolution and color capabilities. Krups was housed in a striking curved vertically oriented enclosure.
Models produced only as prototypes or in limited numbers included:
JavaStation/Fox: a prototype of the Mr Coffee: essentially a repackaged SPARCstation 4 Model 110.
JavaStation-E (part number JE-xx) codenamed Espresso: a Krups with PCI slots and a non-functional ATA interface in a restyled enclosure.
Dover: a JavaStation based on PC compatible hardware, with a Cyrix MediaGXm CPU.
JavaEngine-1: an ATX form-factor version of Krups for embedded systems.
A 68030-based system designed by Diba, Inc. (later acquired by Sun) circa 1996, which could be considered a very early JavaStation-like system.
In addition, Sun envisioned a third-generation "Super JavaStation" after Krups, with a JavaChip co-processor for native Java bytecode execution. This doesn't appear to have been produced.
The JavaStation concept was superseded by the Sun Ray series of thin client terminals.
Operating systems
The JavaStation comes with JavaOS in the flash memory, but it is also possible to install Linux |
https://en.wikipedia.org/wiki/Station%20biologique%20de%20Roscoff | The Station biologique de Roscoff (SBR) is a French marine biology and oceanography research and teaching center. Founded by Henri de Lacaze-Duthiers (1821–1901) in 1872, it is at the present time affiliated to the Sorbonne University (SU) and the Centre National de la Recherche Scientifique (CNRS).
Overview
The Station biologique is situated in Roscoff on the northern coast of Brittany (France) about 60 km east of Brest. Its location offers access to exceptional variety of biotopes, most of which are accessible at low tide. These biotopes support a large variety of both plant (700) and animal (3000) marine species. Founded in 1872 by Professor Henri de Lacaze-Duthiers (then Zoology Chair at the Sorbonne University ), the SBR constitutes, since March 1985, the Internal School 937 of the Pierre and Marie Curie University (UPMC). In November 1985, the SBR was given the status of Oceanographic Observatory by the Institut National des Sciences de l'Univers et de l'Environnement (National Institute for the Cosmological and Environmental Sciences; INSU). The SBR is also, since January 2001, a Research Federation within the Life Sciences Department of the CNRS.
The personnel of the SBR, which includes about 200 permanent staff, consists of scientists, teaching scientists, technicians, postdoctoral fellows, PhD students and administrative staff. These personnel is organized into various research groups within research units that are recognised by the Life Sciences Department of the CNRS (the current research units have the following codes: FR 2424, UMR 8227, UMR 7144, UMI 3614 and USR 3151). The various research groups work on a wide range of topics, ranging from investigation of the fine structure and function of biological macromolecules to global oceanic studies. Genomic approaches constitute an important part of many of the research programmes, notably via the European Network of Excellence "Marine Genomics" which is coordinated by the SBR. With the accommodation fac |
https://en.wikipedia.org/wiki/Piezoresistive%20effect | The piezoresistive effect is a change in the electrical resistivity of a semiconductor or metal when mechanical strain is applied. In contrast to the piezoelectric effect, the piezoresistive effect causes a change only in electrical resistance, not in electric potential.
History
The change of electrical resistance in metal devices due to an applied mechanical load was first discovered in 1856 by Lord Kelvin. With single crystal silicon becoming the material of choice for the design of analog and digital circuits, the large piezoresistive effect in silicon and germanium was first discovered in 1954 (Smith 1954).
Mechanism
In conducting and semi-conducting materials, changes in inter-atomic spacing resulting from strain affect the bandgaps, making it easier (or harder depending on the material and strain) for electrons to be raised into the conduction band. This results in a change in resistivity of the material. Within a certain range of strain this relationship is linear, so that the piezoresistive coefficient
where
∂ρ = Change in resistivity
ρ = Original resistivity
ε = Strain
is constant.
Piezoresistivity in metals
Usually the resistance change in metals is mostly due to the change of geometry resulting from applied mechanical stress. However, even though the piezoresistive effect is small in those cases it is often not negligible. In cases where it is, it can be calculated using the simple resistance equation derived from Ohm's law;
where
Conductor length [m]
A Cross-sectional area of the current flow [m²]
Some metals display piezoresistivity that is much larger than the resistance change due to geometry. In platinum alloys, for instance, piezoresistivity is more than a factor of two larger, combining with the geometry effects to give a strain gauge sensitivity of up to more than three times as large than due to geometry effects alone. Pure nickel's piezoresistivity is -13 times larger, completely dwarfing and even reversing the sign of the geometry-ind |
https://en.wikipedia.org/wiki/Palatine%20nerves | The palatine nerves (descending branches) are distributed to the roof of the mouth, soft palate, tonsil, and lining membrane of the nasal cavity.
Most of their fibers are derived from the sphenopalatine branches of the maxillary nerve.
In older texts, they are usually categorized as three in number: anterior, middle, and posterior. (In newer texts, and in Terminologia anatomica, they are broken down into "greater palatine nerve" and "lesser palatine nerve".) |
https://en.wikipedia.org/wiki/Waiting%20in%20healthcare | Waiting for healthcare refers to any waiting period experienced by a patient before or during medical treatment. Waiting to get an appointment with a physician, staying in a waiting room before an appointment, and being observed during a physician's watchful waiting are different concepts in waiting for healthcare.
When a patient is waiting, their family and friends may also be waiting for an outcome. Waiting time influences patient satisfaction. Patients can spend longer waiting for treatment than actually receiving treatment.
Some experts have suggested that patient waiting rooms in hospitals be integrated with the other rooms providing patient care so that information updates can come freely to anyone waiting. Time in the waiting room has been used to experiment with giving patient health education.
In 2014 the Patient-Centered Outcomes Research Institute began funding a study for improving the waiting room experience.
Patients who are waiting for surgery depend on the availability of the operating theater, and if any patient getting treatment in that room takes longer than scheduled, all patients who are waiting to be next must wait beyond their appointed time. It can be difficult to maximize efficient use of the operating room when unexpected delays can happen and lead to patients waiting. |
https://en.wikipedia.org/wiki/Sysload%20Software | Sysload Software, was a computer software company specializing in systems measurement, performance and capacity management solutions for servers and data centers, based in Créteil, France. It has been acquired in September 2009 by ORSYP, a computer software company specialist in workload scheduling and IT Operations Management, based in La Défense, France.
History
Sysload was created in 1999 as a result of the split of Groupe Loan System into two distinct entities: Loan Solutions, a developer of financial software and Sysload Software, a developer of performance management and monitoring software.
As of March 31, 2022, all Sysload products are in end of life.
Products
The following products are developed by Sysload:
SP Analyst
Is a performance and diagnostic solution for physical and virtual servers. It is a productivity tool destined to IT teams to diagnose performance problems and manage server resource capacity.
SP Monitor
A monitoring solution for incident management and IT service availability. It aims at providing real-time management of IT infrastructure events while correlating them to business processes. SP Monitor receives and stores event data, makes correlations and groups them within customizable views which can be accessed via an ordinary web browser.
SP Portal
A capacity and performance reporting solution for servers and data centers to allow IT managers analyze server resource allocation within information systems.
Sysload products are based on a 3-tiered (user interfaces, management modules and collection and analysis modules) architecture metric collection technology that provides detailed information on large and complex environments. Sysload software products are available for various virtualized and physical platforms including: VMware, Windows, AIX, HP-UX, Solaris, Linux, IBM i, PowerVM, etc. |
https://en.wikipedia.org/wiki/Metaplasticity | Metaplasticity is a term originally coined by W.C. Abraham and M.F. Bear to refer to the plasticity of synaptic plasticity. Until that time synaptic plasticity had referred to the plastic nature of individual synapses. However this new form referred to the plasticity of the plasticity itself, thus the term meta-plasticity. The idea is that the synapse's previous history of activity determines its current plasticity. This may play a role in some of the underlying mechanisms thought to be important in memory and learning such as long-term potentiation (LTP), long-term depression (LTD) and so forth. These mechanisms depend on current synaptic "state", as set by ongoing extrinsic influences such as the level of synaptic inhibition, the activity of modulatory afferents such as catecholamines, and the pool of hormones affecting the synapses under study. Recently, it has become clear that the prior history of synaptic activity is an additional variable that influences the synaptic state, and thereby the degree, of LTP or LTD produced by a given experimental protocol. In a sense, then, synaptic plasticity is governed by an activity-dependent plasticity of the synaptic state; such plasticity of synaptic plasticity has been termed metaplasticity. There is little known about metaplasticity, and there is much research currently underway on the subject, despite its difficulty of study, because of its theoretical importance in brain and cognitive science. Most research of this type is done via cultured hippocampus cells or hippocampal slices.
Hebbian plasticity
The brain is "plastic", meaning it can be molded and formed. This plasticity is what allows you to learn throughout your lifetime; your synapses change based on your experience. New synapses can be made, old ones destroyed, or existing ones can be strengthened or weakened. The original theory of plasticity is called "Hebbian plasticity", named after Donald Hebb in 1949. A quick but effective summary of Hebbian theory is t |
https://en.wikipedia.org/wiki/Crypt%20%28C%29 | crypt is a POSIX C library function. It is typically used to compute the hash of user account passwords. The function outputs a text string which also encodes the salt (usually the first two characters are the salt itself and the rest is the hashed result), and identifies the hash algorithm used (defaulting to the "traditional" one explained below). This output string forms a password record, which is usually stored in a text file.
More formally, crypt provides cryptographic key derivation functions for password validation and storage on Unix systems.
Relationship to Unix crypt utility
There is an unrelated crypt utility in Unix, which is often confused with the C library function. To distinguish between the two, writers often refer to the utility program as crypt(1), because it is documented in section 1 of the Unix manual pages, and refer to the C library function as crypt(3), because its documentation is in manual section 3.
Details
This same crypt function is used both to generate a new hash for storage and also to hash a proffered password with a recorded salt for comparison.
Modern Unix implementations of the crypt library routine support a variety of hash schemes. The particular hash algorithm used can be identified by a unique code prefix in the resulting hashtext, following a de facto standard called Modular Crypt Format.
The crypt() library function is also included in the Perl, PHP, Pike, Python (although it is now deprecated as of 3.11), and Ruby programming languages.
Key derivation functions supported by crypt
Over time various algorithms have been introduced. To enable backward compatibility, each scheme started using some convention of serializing the password hashes that was later called the Modular Crypt Format (MCF). Old crypt(3) hashes generated before the de facto MCF standard may vary from scheme to scheme. A well-defined subset of the Modular Crypt Format was created during the Password Hashing Competition. The format is defined as:
|
https://en.wikipedia.org/wiki/Trail-Crisp%20Award | The Trail-Crisp Award, of the Linnean Society of London, was established in 1966 and is an amalgamation of The Trail Award and The Crisp Award (both founded in 1910).
The Trail-Crisp Award is presented at intervals "in recognition of an outstanding contribution to biological microscopy that has been published in the UK".
Recipients
Trail Award
1915: Leonard Doncaster
1920: Helen Gwynne-Vaughan
1937: Carl Pantin
1948: Honor Fell
1954: Irene Manton
1960: L.E.R. Picken
Trail-Crisp Award
See also
List of biology awards |
https://en.wikipedia.org/wiki/Elena%20Moldovan%20Popoviciu | Elena Moldovan Popoviciu (26 August 1924–24 June 2009) was a Romanian mathematician known for her work in functional analysis and specializing in generalizations of the concept of a convex function. She was a winner of the Simion Stoilow Prize in mathematics.
Education and career
Elena Moldovan was born in Cluj to Ioan Moldovan and his wife, Rozalia. She studied mathematics at the Victor Babeș University in Cluj, earning a bachelor's degree there in 1947; afterwards, she became a schoolteacher. She returned to the university for doctoral study in the early 1950s, initially working with Grigore Calugăreanu, but she soon came under the influence of Tiberiu Popoviciu and began working with him in functional analysis. She completed her Ph.D. in 1960. Her dissertation, Sets of Interpolating Functions And The Notion of Convex Function, was supervised by Popoviciu. She married Popoviciu in 1964, remained at the university, and became a full professor there in 1969.
During her career, she supervised the Ph.D. thesis of 23 students. She served as the second editor-in-chief of the journal Revue d’Analyse Numérique et de Théorie de l’Approximation, founded in 1972 by her husband.
She died in Cluj-Napoca on June 24, 2009.
Recognition
Popoviciu won the Simion Stoilow Prize of the Romanian Academy, for her achievements in mathematics, in 1972. A conference in honor of Popoviciu's 75th birthday was held in 1999 at the Babeș-Bolyai University in Cluj, and a second conference in her honor was held five years later. |
https://en.wikipedia.org/wiki/Flag%20of%20the%20European%20Coal%20and%20Steel%20Community | The flag of the European Coal and Steel Community was a horizontal bicolour flag defaced with stars which represented the European Coal and Steel Community (ECSC) between 1958 (six years after the ECSC was founded) until 2002 when the Community was merged into the European Union (EU). Prior to 1958 the ECSC did not have a flag, and no other flag has been used by a historical part of the European Union other than the flag of Europe.
Design
The flag consisted of two horizontal stripes, blue on the top and black on the bottom. Black stood for coal while the blue stood for steel, the two resources the community managed. There were a number of gold, later white, stars equivalent to the number of states belonging to the community (until 1986, when the number was frozen at twelve). These stars were equally divided between each strip, aligned close to the centre border (if there were an odd number of stars, then the smaller number would be on the top stripe.
History
The flag was first unveiled at the 1958 Exposition in Brussels, seven years after the establishment of the Community. At the Expo, its rivalling flag, the flag of Europe, was also on one of its first public displays.
The number of stars began at six and increased with the membership of the Community until 1986 when it reached twelve. After this it was decided not to increase the number of stars to reflect the new members joining in the 1990s. This kept it inline with the flag of Europe (used by its sister organisations) which displayed twelve stars representing perfection and unity.
The Treaty of Paris setting up the ECSC expired on 23 July 2002 and the ECSC ceased to exist. On this day the ECSC flag outside the European Commission in Brussels was lowered for the final time by President Romano Prodi and replaced with the EU flag.
One original copy of the flag of the ECSC with 12 stars is exposed in the office of the President of the European University Institute in Florence, Prof. J. H.H. Weiler.
Evolution |
https://en.wikipedia.org/wiki/Internet%20Locator%20Server | An Internet Locator Server (abbreviated ILS) is a server that acts as a directory for Microsoft NetMeeting clients. An ILS is not necessary within a local area network and some wide area networks in the Internet because one participant can type in the IP address of the other participant's host and call them directly. An ILS becomes necessary when one participant is trying to contact a host who has a private IP address internal to a local area network that is inaccessible to the outside world, or when the host is blocked by a firewall. An ILS is also useful when a participant has a different IP address during each session, e.g., assigned by the Dynamic Host Configuration Protocol.
There are two main approaches to using Internet Location Servers: use a public server on the Internet, or run and use a private server.
Private Internet Location Server
The machine running an Internet Location Server must have a public IP address.
If the network running an Internet Location Server has a firewall, it is usually necessary to run the server in the demilitarized zone of the network.
Microsoft Windows includes an Internet Location Server. It can be installed in the Control Panel using Add/Remove Windows Components, under "Networking Services" (Site Server ILS Services).
The Internet Location Server (ILS) included in Microsoft Windows 2000 offers service on port 1002, while the latest version of NetMeeting requests service from port 389. The choice of 1002 was to avoid conflict with Windows 2000's domain controllers, which use LDAP and Active Directory on port 389, as well as Microsoft Exchange Server 2000, which uses port 389. If the server is running neither Active Directory nor Microsoft Exchange Server, the Internet Location Server's port can be changed to 389 using the following command at a command prompt:
ILSCFG [servername] /port 389
Additional firewall issues
Internet Location Servers do not address two other issues with using NetMeeting behind a firewall. First, |
https://en.wikipedia.org/wiki/Guardian%20Firewall | Guardian Firewall is a VPN, firewall and password manager for iOS which also blocks data and location trackers. Its network crypto suite is IPSec (Using IKEv2). The service, which claims to collect no user information, takes the form of an app which first became available in June 2019.
The company behind the product is Sudo Security Group. Its founder is Will Strafach, a security researcher, (Known for work on iOS jailbreaking tools) and COO is Chirayu Patel.
Guardian Firewall was featured in the show Lockdown in 2020. |
https://en.wikipedia.org/wiki/Nl%20%28format%29 | nl is a file format for presenting and archiving mathematical programming problems. Initially, this format has been invented for connecting solvers to AMPL. It has also been adopted by other systems such as COIN-OR (as one of the input formats), FortSP (for interacting with external solvers), and Coopr (as one of its output formats).
The nl format supports a wide range of problem types, among them:
Linear programming
Quadratic programming
Nonlinear programming
Mixed-integer programming
Mixed-integer quadratic programming with or without convex quadratic constraints
Mixed-integer nonlinear programming
Second-order cone programming
Global optimization
Semidefinite programming problems with bilinear matrix inequalities
Complementarity problems (MPECs) in discrete or continuous variables
Constraint programming
The nl format is low-level and is designed for compactness, not for readability. It has both binary and textual representation.
Most commercial and academic solvers accept this format either directly or through special driver programs.
The open-source AMPL Solver Library distributed via Netlib and AMPL/MP library provide nl parsers that are used in many solvers.
AMPL/MP library contains an NL writer and SOL reader.
See also
sol (format) - a file format for presenting solutions of mathematical programming problems |
https://en.wikipedia.org/wiki/Isodisomy | Isodisomy is a form of uniparental disomy in which both copies of a chromosome, or parts of it, are inherited from the same parent. It differs from heterodisomy in that instead of a complete pair of homologous chromosomes, the fertilized ovum contains two identical copies of a single parental chromosome. This may result in the expression of recessive traits in the offspring. Some authors use the term uniparental disomy and isodisomy interchangeably.
This genetic abnormality can result in the birth of a normal child who has no obvious disability. It is associated with abnormalities in the growth of the offspring and in the placenta. Isodisomy may be a common phenomenon in human cells, and "might play a role in the pathogenesis of various nonmalignant disorders and might explain local impaired function and/or clinical variability." |
https://en.wikipedia.org/wiki/Jonathan%20Borwein | Jonathan Michael Borwein (20 May 1951 – 2 August 2016) was a Scottish mathematician who held an appointment as Laureate Professor of mathematics at the University of Newcastle, Australia. He was a close associate of David H. Bailey, and they have been prominent public advocates of experimental mathematics.
Borwein's interests spanned pure mathematics (analysis), applied mathematics (optimization), computational mathematics (numerical and computational analysis), and high performance computing. He authored ten books, including several on experimental mathematics, a monograph on convex functions, and over 400 refereed articles. He was a co-founder in 1995 of software company MathResources, consulting and producing interactive software primarily for school and university mathematics. He was not associated with MathResources at the time of his death.
Borwein was also an expert on the number pi and especially its computation.
Early life and education
Borwein was born in St. Andrews, Scotland in 1951 into a Jewish family. His father was mathematician David Borwein, with whom he collaborated. His brother Peter Borwein was also a mathematician.
Borwein was married to Judith, and had three daughters.
He received his B.A. (Honours Math) from University of Western Ontario in 1971, and his D.Phil. from Oxford University in 1974 as a Rhodes Scholar at Jesus College.
Career
Prior to joining Simon Fraser University in 1993, he worked at Dalhousie University (1974–91), Carnegie-Mellon (1980–82) and the University of Waterloo (1991–93).
He was Shrum Professor of Science (1993–2003) and a Canada Research Chair in Information Technology (2001–08) at Simon Fraser University, where he was founding Director of the Centre for Experimental and Constructive Mathematics and developed the Inverse Symbolic Calculator together with his brother and Simon Plouffe. In 2004, he (re-)joined the Faculty of Computer Science at Dalhousie University as a Canada Research Chair in Distributed and |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.