source
stringlengths
31
227
text
stringlengths
9
2k
https://en.wikipedia.org/wiki/Cholesterolosis%20of%20gallbladder
In surgical pathology, strawberry gallbladder, more formally cholesterolosis of the gallbladder and gallbladder cholesterolosis, is a change in the gallbladder wall due to excess cholesterol. The name strawberry gallbladder comes from the typically stippled appearance of the mucosal surface on gross examination, which resembles a strawberry. Cholesterolosis results from abnormal deposits of cholesterol esters in macrophages within the lamina propria (foam cells) and in mucosal epithelium. The gallbladder may be affected in a patchy localized form or in a diffuse form. The diffuse form macroscopically appears as a bright red mucosa with yellow mottling (due to lipid), hence the term strawberry gallbladder. It is not tied to cholelithiasis (gallstones) or cholecystitis (inflammation of the gallbladder). Additional images See also Cholecystectomy Rokitansky-Aschoff sinuses
https://en.wikipedia.org/wiki/Genotropism
Genotropism is defined as the reciprocal attraction between carriers of the same or related latent recessive genes. Developed by the Hungarian psychiatrist Léopold Szondi in the 1930s, the theory concludes that instinct is biological and genetic in origin. Szondi believed that these genes regulated the "possibilities of fate" and was the working principle of the familial unconscious. Overview Genotropism consists of the theory that genes influence human behavior. While identified as entities, genes exist in groups because evolution favors cooperation. Within each gene group, it is possible to detect specific needs that function as mechanisms of screening and natural selection. Szondi arrived a sort of genetic determinism, a philosophical theory of predestination. "The latent hereditary factors in human beings, the recessive genes, do not remain dormant or inactive within the human organism, but exert a very important and even decisive influence upon its behavior. This latent or recessive gene theory claims that these non-dominant hereditary factors determine the Object selection, voluntary and involuntary, of the individual. The drives resulting from these latent genes, therefore, direct the individual's selection of love objects, friendships, occupations, diseases, and forms of death. Hence, from the very beginning of the human's existence there is a hidden plan of life guided by 'Instinctual drives'." Instinctual drives In Szondi's theory, each "need" (a link between genes and behavior) comprises a polarity of positive and negative tendencies. Needs also group together in polarities to form larger wholes called "instinctual drives." Together, behavior tendencies, needs, and drives combine to form patterned wholes. Szondi created a drive theory that determines that every drive has at least four genes. "The four Szondian drives are (1) contact, (2) sexual, (3) paroxysmal, and (4) ego. They are implicated in their corresponding psychiatric disorders and equival
https://en.wikipedia.org/wiki/Integrated%20information%20theory
Integrated information theory (IIT) proposes a mathematical model for the consciousness of a system. It comprises a framework ultimately intended to explain why some physical systems (such as human brains) are conscious, and to be capable of providing a concrete inference about whether any physical system is conscious, to what degree, and what particular experience it is having; why they feel the particular way they do in particular states (e.g. why our visual field appears extended when we gaze out at the night sky), and what it would take for other physical systems to be conscious (Are other animals conscious? Might the whole Universe be?). According to IIT, a system's consciousness (what it is like subjectively) is conjectured to be identical to its causal properties (what it is like objectively). Therefore it should be possible to account for the conscious experience of a physical system by unfolding its complete causal powers (see Central identity). IIT was proposed by neuroscientist Giulio Tononi in 2004. Despite significant interest, IIT remains controversial and has been widely criticized, including that it is unfalsifiable pseudoscience. Proponents counter that there is some experimental support for it, but the fundamental validity of some of the tests used is questioned by some critics. Overview Relationship to the "hard problem of consciousness" David Chalmers has argued that any attempt to explain consciousness in purely physical terms (i.e. to start with the laws of physics as they are currently formulated and derive the necessary and inevitable existence of consciousness) eventually runs into the so-called "hard problem". Rather than try to start from physical principles and arrive at consciousness, IIT "starts with consciousness" (accepts the existence of our own consciousness as certain) and reasons about the properties that a postulated physical substrate would need to have in order to account for it. The ability to perform this jump from pheno
https://en.wikipedia.org/wiki/Dahlander%20pole%20changing%20motor
A Dahlander motor (also known as a pole changing motor, dual- or two speed-motor) is a type of multispeed three-phase induction motor, in which the speed of the motor is varied by altering the number of poles; this is achieved by altering the wiring connections inside the motor. The motor may have fixed or variable torque depending on the stator winding. It is named after its inventor Robert Dahlander (1870–1935). Invention Robert Dahlander, a Swedish engineer working for ASEA, discovered that switching the poles in a motor led to a reduction in the speed of the motor. In 1897 he invented an electrical configuration to switch between poles in a motor for which he was granted a patent along with his co-worker Karl Arvid Lindström. The new connection was named the "Dahlander connection" and a motor having such a configuration is commonly referred to as a "pole changing motor" or a "Dahlander motor". Operation The Dahlander motor is based on a 'consequent pole' connection. The primary factor in determining the speed of an induction motor is the number of poles, given by the formula (RPM) where ns = Synchronous speed, in revolutions per minute f = AC power frequency p = Number of poles per phase winding A regular induction motor has an equal number of opposite poles; that is, at any instant, there are an equal number of North and South magnetic poles. Some smaller induction motors are connected so that all the poles are identical, causing the motor to act as though there is an equal number of opposite poles in between. A Dahlander motor achieves different speeds by switching the configuration of the electrical windings, indirectly adding or removing poles and thus varying the rotor speed. The poles can be varied at a ratio of 1:2 and thus the speed can be varied at 2:1. Normally, the electrical configuration of windings is varied from a delta connection (Δ) to a double star connection (YY) configuration in order to change the speed of the motor for constant tor
https://en.wikipedia.org/wiki/Volari%20V3
The Volari V3 is a video card manufactured by XGI Technology. History The V3 was introduced on September 15, 2003. It is a budget option, available with an 8x Accelerated Graphics Port interface from Walton Chaintech Corporation. It is similar in performance to the ATI Radeon 9200 SE, but is generally lower-priced.
https://en.wikipedia.org/wiki/Netherlands%20Forensic%20Institute
The Netherlands Forensic Institute (Dutch Nederlands Forensisch Instituut) is the national forensics institute of the Netherlands, located in the Ypenburg quarter of The Hague. It is an autonomous division of the Dutch Ministry of Security and Justice and falls under the Directorate-General for the Administration of Justice and Law Enforcement. History On 30 July 1945, the government decided to set up a Justice Laboratory. Three years later, on 4 November 1948, the laboratory became a department of the Ministry of Justice. A similar institution was founded in 1951: Gerechtelijk Geneeskundig Laboratorium (Judicial Medical Laboratory), which was later renamed Laboratorium voor Gerechtelijke Pathologie Laboratory for Judicial Pathology which were located at the building in The Hague which was later used by Europol. Pathologist Dr. Jan Zeldenrust was the first CEO of this laboratory. On 1 November 1999, the two laboratories merged into the Nederlands Forensisch Instituut (Netherlands Forensic Institute). The laboratory was based in Rijswijk until October 2004, when it moved to the Ypenburg quarter of The Hague. See also Deventer murder case
https://en.wikipedia.org/wiki/Chebychev%E2%80%93Gr%C3%BCbler%E2%80%93Kutzbach%20criterion
The Chebychev–Grübler–Kutzbach criterion determines the number of degrees of freedom of a kinematic chain, that is, a coupling of rigid bodies by means of mechanical constraints. These devices are also called linkages. The Kutzbach criterion is also called the mobility formula, because it computes the number of parameters that define the configuration of a linkage from the number of links and joints and the degree of freedom at each joint. Interesting and useful linkages have been designed that violate the mobility formula by using special geometric features and dimensions to provide more mobility than predicted by this formula. These devices are called overconstrained mechanisms. Mobility formula The mobility formula counts the number of parameters that define the positions of a set of rigid bodies and then reduces this number by the constraints that are imposed by joints connecting these bodies. Imagine a spherical seagull. A single unconstrained body soaring in 3-space has 6 degrees of freedom: 3 translational (say, x,y,z); and 3 rotational (say, roll, pitch, yaw). So a system of unconnected rigid bodies moving in space (a flock of soaring seagulls) has degrees of freedom measured relative to a fixed frame (coordinate system). The fixed frame can be chosen arbitrarily (an observer anywhere on the beach). And the frame can even be local or subjective: from the viewpoint of one of the seagulls, the world moves around it, while it stays fixed. So this frame can be included in the count of bodies (the flock of seagulls as seen from chosen gull A--perhaps A is standing on the beach, perhaps A is flying, but looking at the flock from the fixed local viewpoint of A), and thus mobility is independent of the choice of the link that will form the fixed frame. Then the degree-of-freedom of this system is where is the number of moving bodies plus the fixed body. Joints that connect bodies in this system remove degrees of freedom and reduce mobility. Spe
https://en.wikipedia.org/wiki/Outline%20of%20computer%20programming
The following outline is provided as an overview of and topical guide to computer programming: Computer programming – process that leads from an original formulation of a computing problem to executable computer programs. Programming involves activities such as analysis, developing understanding, generating algorithms, verification of requirements of algorithms including their correctness and resources consumption, and implementation (commonly referred to as coding) of algorithms in a target programming language. Source code is written in one or more programming languages. The purpose of programming is to find a sequence of instructions that will automate performing a specific task or solving a given problem. History History of computer science History of computing hardware History of computing hardware (1960s–present) History of programming languages Timeline of programming languages Computer programming in the punched card era Operating systems timeline Platforms Computer Computer hardware Analog computer Analytical Engine Digital computer Vacuum-tube computer List of vacuum-tube computers Transistor computer List of transistorized computers Mainframe Minicomputer Microcomputer Home computers IBM PC compatible Personal computer Desktop computer Laptop computer Mobile computer Personal digital assistant (PDA) Smartphone Tablet computer Wearable computer Server Supercomputer Virtual machine Hardware virtualization Runtime system Paradigms Agent-oriented Aspect-oriented Automata-based Data-driven Declarative (as opposed to imperative programming) Constraint Constraint logic Concurrent constraint logic Dataflow Flow-based (FBP) Reactive Functional Functional logic Purely functional Logic Abductive logic Answer set Concurrent logic Functional logic Inductive logic Event-driven Time-driven Expression-oriented Feature-oriented Function-level (as opposed to value-level programming) Generic Imperative (as opposed to declarative programming) Literate Procedural Induct
https://en.wikipedia.org/wiki/Frozen%20Charlotte%20%28doll%29
A Frozen Charlotte is a specific form of china or bisque doll made in one solid piece without joints from c. 1850 to c. 1920. They were typically inexpensive, and the name Penny doll is also used, in particular for smallest, most affordable versions. The dolls had substantial popularity during the Victorian era. History The name of the doll originates from the American folk ballad Fair Charlotte, based on the poem "A Corpse Going to a Ball" by Seba Smith, which tells of a young girl called Charlotte who refused to wrap up warmly to go on a sleigh ride because she did not want to cover up her pretty dress; she froze to death during the journey. The Frozen Charlotte doll is made in the form of a standing, naked figure molded as a solid piece. The dolls are also sometimes described as pillar dolls, solid chinas or bathing babies. The dolls ranged in size from under an inch to 18 inches plus. The smallest dolls were sometimes used as charms in Christmas puddings. and smaller sizes were very popular for putting in doll's houses. Occasionally versions are seen with a glazed china front and an unglazed stoneware back. This enabled the doll to float on its back when placed in a bath. Frozen Charlotte dolls were popular during the late 19th and early 20th centuries in the United States. The dolls were affordable enough that children of the era could buy them with their own pocket money. Smaller versions of the dolls were also known as penny dolls, because they were often sold for a cent. Most were made in Germany. They are also made in bisque, and can come in white, pink-tinted, or, more rarely, painted black. Some rare examples have moulded chemises. Male dolls (identified by their boyish hairstyles) are called Frozen Charlies. See also Pennywoods - inexpensive wooden dolls Penny toy - inexpensive tin toys
https://en.wikipedia.org/wiki/Smash%20and%20Grab%20%28biology%29
Smash and Grab is the name given to a technique developed by Charles S. Hoffman and Fred Winston used in molecular biology to rescue plasmids from yeast transformants into Escherichia coli, also known as E. coli, in order to amplify and purify them. In addition, it can be used to prepare yeast genomic DNA (and DNA from tissue samples) for Southern blot analyses or polymerase chain reaction (PCR).
https://en.wikipedia.org/wiki/Monodromy
In mathematics, monodromy is the study of how objects from mathematical analysis, algebraic topology, algebraic geometry and differential geometry behave as they "run round" a singularity. As the name implies, the fundamental meaning of monodromy comes from "running round singly". It is closely associated with covering maps and their degeneration into ramification; the aspect giving rise to monodromy phenomena is that certain functions we may wish to define fail to be single-valued as we "run round" a path encircling a singularity. The failure of monodromy can be measured by defining a monodromy group: a group of transformations acting on the data that encodes what happens as we "run round" in one dimension. Lack of monodromy is sometimes called polydromy. Definition Let be a connected and locally connected based topological space with base point , and let be a covering with fiber . For a loop based at , denote a lift under the covering map, starting at a point , by . Finally, we denote by the endpoint , which is generally different from . There are theorems which state that this construction gives a well-defined group action of the fundamental group on , and that the stabilizer of is exactly , that is, an element fixes a point in if and only if it is represented by the image of a loop in based at . This action is called the monodromy action and the corresponding homomorphism into the automorphism group on is the algebraic monodromy. The image of this homomorphism is the monodromy group. There is another map whose image is called the topological monodromy group. Example These ideas were first made explicit in complex analysis. In the process of analytic continuation, a function that is an analytic function in some open subset of the punctured complex plane may be continued back into , but with different values. For example, take then analytic continuation anti-clockwise round the circle will result in the return, not to but In this cas
https://en.wikipedia.org/wiki/Steering%20ratio
Steering ratio refers to the ratio between the turn of the steering wheel (in degrees) or handlebars and the turn of the wheels (in degrees). The steering ratio is the ratio of the number of degrees of turn of the steering wheel to the number of degrees the wheel(s) turn as a result. In motorcycles, delta tricycles and bicycles, the steering ratio is always 1:1, because the steering wheel is fixed to the front wheel. A steering ratio of x:y means that a turn of the steering wheel x degree(s) causes the wheel(s) to turn y degree(s). In most passenger cars, the ratio is between 12:1 and 20:1. For example, if one and a half turns of the steering wheel, 540 degrees, causes the inner & outer wheel to turn 35 and 30 degrees respectively, due to Ackermann steering geometry, the ratio is then 540:((35+30)/2) = 16.6:1. A higher steering ratio means that the steering wheel is turned more to get the wheels turning, but it will be easier to turn the steering wheel. A lower steering ratio means that the steering wheel is turned less to get the wheels turning, but it will be harder to turn the steering wheel. Larger and heavier vehicles will often have a higher steering ratio, which will make the steering wheel easier to turn. If a truck had a low steering ratio, it would be very hard to turn the steering wheel. In normal and lighter cars, the wheels are easier to turn, so the steering ratio doesn't have to be as high. In race cars the ratio is typically very low, because the vehicle must respond to steering input much faster than in normal cars. The steering wheel is therefore harder to turn. Variable-ratio steering Variable-ratio steering is a system that uses different ratios on the rack in a rack and pinion steering system. At the center of the rack, the space between the teeth are smaller and the space becomes larger as the pinion moves down the rack. In the middle of the rack there is a higher ratio and the ratio becomes lower as the steering wheel is turned towards loc
https://en.wikipedia.org/wiki/Happy%20ending%20problem
In mathematics, the "happy ending problem" (so named by Paul Erdős because it led to the marriage of George Szekeres and Esther Klein) is the following statement: This was one of the original results that led to the development of Ramsey theory. The happy ending theorem can be proven by a simple case analysis: if four or more points are vertices of the convex hull, any four such points can be chosen. If on the other hand, the convex hull has the form of a triangle with two points inside it, the two inner points and one of the triangle sides can be chosen. See for an illustrated explanation of this proof, and for a more detailed survey of the problem. The Erdős–Szekeres conjecture states precisely a more general relationship between the number of points in a general-position point set and its largest subset forming a convex polygon, namely that the smallest number of points for which any general position arrangement contains a convex subset of points is . It remains unproven, but less precise bounds are known. Larger polygons proved the following generalisation: The proof appeared in the same paper that proves the Erdős–Szekeres theorem on monotonic subsequences in sequences of numbers. Let denote the minimum for which any set of points in general position must contain a convex N-gon. It is known that , trivially. . . A set of eight points with no convex pentagon is shown in the illustration, demonstrating that ; the more difficult part of the proof is to show that every set of nine points in general position contains the vertices of a convex pentagon. . The value of is unknown for all . By the result of , is known to be finite for all finite . On the basis of the known values of for N = 3, 4 and 5, Erdős and Szekeres conjectured in their original paper that They proved later, by constructing explicit examples, that . In 2016 Andrew Suk showed that for Suk actually proves, for N sufficiently large, A 2020 preprint by Andreas F. Holmsen,
https://en.wikipedia.org/wiki/Renal%20protein%20reabsorption
Renal protein reabsorption is the part of renal physiology that deals with the retrieval of filtered proteins, preventing them from disappearing from the body through the urine. Almost all reabsorption takes place in the proximal tubule. Only ~1% is left in the final urine. The proteins cross the apical membrane by endocytosis. They are subsequently degraded in lysosomes. The remaining free amino acids are transported across the basolateral membrane by amino acid transporters. Overview table
https://en.wikipedia.org/wiki/Cross-browser%20compatibility
Cross-browser compatibility is the ability of a website or web application to function across different browsers and degrade gracefully when browser features are absent or lacking. History Background The history of cross-browser is involved with the history of the "browser wars" in the late 1990s between Netscape Navigator and Microsoft Internet Explorer as well as with that of JavaScript and JScript, the first scripting languages to be implemented in the web browsers. Netscape Navigator was the most widely used web browser at that time and Microsoft had licensed Mosaic to create Internet Explorer 1.0. New versions of Netscape Navigator and Internet Explorer were released at a rapid pace over the following few years. Due to the intense competition in the web browser market, the development of these browsers was fast-paced and new features were added without any coordination between vendors. The introduction of new features often took priority over bug fixes, resulting in unstable browsers, fickle web standards compliance, frequent crashes and many security holes. Creation of W3C and Web standardization The World Wide Web Consortium (W3C), founded in 1994 to promote open standards for the World Wide Web, pulled Netscape and Microsoft together with other companies to develop a standard for browser scripting languages called ECMAScript. The first version of the standard was published in 1997. Subsequent releases of JavaScript and JScript would implement the ECMAScript standard for greater cross-browser compatibility. After the standardization of ECMAScript, W3C began work on the standardization of Document Object Model (DOM), which is a way of representing and interacting with objects in HTML, XHTML and XML documents. DOM Level 0 and DOM Level 1 were introduced in 1996 and 1997. Only limited supports of these were implemented by the browsers, as a result, non-conformant browsers such as Internet Explorer 4.x and Netscape 4.x were still widely used as late as 2000
https://en.wikipedia.org/wiki/Leticia%20Brambila%20Paz
Gloria Leticia Brambila Paz (born 1953) is a Mexican mathematician specializing in algebraic geometry and the moduli of algebraic curves. She is a professor in the Centro de Investigación en Matemáticas (CIMAT) in Guanajuato, Mexico. Education and career Brambila was born on 26 January 1953. She went to Swansea University in the United Kingdom for doctoral study in mathematics, completing her PhD in 1986 with the dissertation Homomorphisms of Vector Bundles over Compact Riemann Surface supervised by Alan Thomas. She worked as an assistant professor at the National Autonomous University of Mexico from 1973 to 1976, and as a professor of mathematics at UAM Iztapalapa in Mexico City from 1983 to 1998, when she moved to her present position at CIMAT. She also became a life fellow of Clare Hall, Cambridge in 2011. Recognition Brambila was elected to the Mexican Academy of Sciences in 2001.
https://en.wikipedia.org/wiki/2-C-methyl-D-erythritol%204-phosphate%20cytidylyltransferase
In enzymology, a 2-C-methyl-D-erythritol 4-phosphate cytidylyltransferase () is an enzyme that catalyzes the chemical reaction: 2-C-methyl-D-erythritol 4-phosphate + CTP diphosphate + 4-(cytidine 5'-diphospho)-2-C-methyl-D-erythritol Thus, the two substrates of this enzyme are CTP and 2-C-methyl-D-erythritol 4-phosphate, whereas its two products are diphosphate and 4-diphosphocytidyl-2-C-methylerythritol. This enzyme belongs to the family of transferases, specifically those transferring phosphorus-containing nucleotide groups (nucleotidyltransferases). This enzyme participates in isoprenoid biosynthesis and stenvenosim. It catalyzes the third step of the MEP pathway; the formation of CDP-ME (4-diphosphocytidyl-2C-methyl-D-erythritol) from CTP and MEP (2C-methyl-D-erythritol 4-phosphate). The isoprenoid pathway is a well known target for anti-infective drug development. Nomenclature The systematic name of this enzyme class is CTP:2-C-methyl-D-erythritol 4-phosphate cytidylyltransferase. This enzyme is also called: MEP cytidylyltransferase CDP-ME synthetase It is normally abbreviated IspD. It is also referenced by the open reading frame YgbP. Structural studies The crystal structure of the E. coli 2-C-methyl-D-erythritol 4-phosphate cytidylyltransferase , & , reported by Richard et al. (2001), was the first one for an enzyme involved in the MEP pathway. As of February 2010, 13 other structures have been solved for this class of enzymes, with PDB accession codes , , , , , , , , ,, , and .
https://en.wikipedia.org/wiki/Resource
Resource refers to all the materials available in our environment which are technologically accessible, economically feasible and culturally sustainable and help us to satisfy our needs and wants. Resources can broadly be classified upon their availability — they are classified into renewable and non-renewable resources. They can also be classified as actual and potential on the basis of the level of development and use, on the basis of origin they can be classified as biotic and abiotic, and on the basis of their distribution, as ubiquitous and localised (private, community-owned, national and international resources). An item becomes a resource with time and developing technology. The benefits of resource utilization may include increased wealth, proper functioning of a system, or enhanced well-being. From a human perspective, a natural resource is anything obtained from the environment to satisfy human needs and wants. From a broader biological or ecological perspective, a resource satisfies the needs of a living organism (see biological resource). The concept of resources has been developed across many established areas of work, in economics, biology and ecology, computer science, management, and human resources for example - linked to the concepts of competition, sustainability, conservation, and stewardship. In application within human society, commercial or non-commercial factors require resource allocation through resource management. The concept of a resource can also be tied to the direction of leadership over resources, this can include the things leaders have responsibility for over the human resources, with management, help, support or direction such as in charge of a professional group, technical experts, innovative leaders, archiving expertise, academic management, association management, business management, healthcare management, military management, public administration, spiritual leadership and social networking administrator. individuals exp
https://en.wikipedia.org/wiki/Kummer%27s%20congruence
In mathematics, Kummer's congruences are some congruences involving Bernoulli numbers, found by . used Kummer's congruences to define the p-adic zeta function. Statement The simplest form of Kummer's congruence states that where p is a prime, h and k are positive even integers not divisible by p−1 and the numbers Bh are Bernoulli numbers. More generally if h and k are positive even integers not divisible by p − 1, then whenever where φ(pa+1) is the Euler totient function, evaluated at pa+1 and a is a non negative integer. At a = 0, the expression takes the simpler form, as seen above. The two sides of the Kummer congruence are essentially values of the p-adic zeta function, and the Kummer congruences imply that the p-adic zeta function for negative integers is continuous, so can be extended by continuity to all p-adic integers. See also Von Staudt–Clausen theorem, another congruence involving Bernoulli numbers
https://en.wikipedia.org/wiki/Alpha%20and%20beta%20male
Alpha male and beta male, or simply put alpha and beta, are pseudoscientific terms for men derived from the designation for alpha and beta animals in ethology. They may also be used with other genders, such as women, or additionally use other letters of the Greek alphabet (such as omega). The popularization of these terms to describe humans has been widely criticized by scientists. Both terms have been frequently used in internet memes. The term beta is used as a pejorative self-identifier among members of the manosphere, particularly incels, who do not believe they are assertive or traditionally masculine, and feel overlooked by women. It is also used to negatively describe other men who are not deemed to be assertive, particularly with women. History The terms were used almost solely in animal ethology prior to the 1990s, particularly in regard to mating privileges with females, ability to hold territory, and hierarchy in terms of food consumption within their herd or flock. In animal ethology, beta refers to an animal who is subordinate to a higher-ranking members in the social hierarchy, thus having to wait to eat and having fewer or negligible opportunities for copulation. In the 1982 book of Chimpanzee Politics: Power and Sex Among Apes, primatologist and ethologist Frans de Waal suggested that his observations of a chimpanzee colony could possibly be applied to human interactions. Some commentary on the book, including in the Chicago Tribune, discussed its parallels to human power hierarchies. In the early 1990s, some media outlets began to use the term alpha to refer to humans, specifically to "manly" men who excelled in business. Journalist Jesse Singal, writing in New York magazine, attributes the popular awareness of the terms to a 1999 Time magazine article, which described an opinion held by Naomi Wolf, who was at the time an advisor to then-presidential candidate Al Gore: "Wolf has argued internally that Gore is a 'Beta male' who needs to take on th
https://en.wikipedia.org/wiki/Gosper%27s%20algorithm
In mathematics, Gosper's algorithm, due to Bill Gosper, is a procedure for finding sums of hypergeometric terms that are themselves hypergeometric terms. That is: suppose one has a(1) + ... + a(n) = S(n) − S(0), where S(n) is a hypergeometric term (i.e., S(n + 1)/S(n) is a rational function of n); then necessarily a(n) is itself a hypergeometric term, and given the formula for a(n) Gosper's algorithm finds that for S(n). Outline of the algorithm Step 1: Find a polynomial p such that, writing b(n) = a(n)/p(n), the ratio b(n)/b(n − 1) has the form q(n)/r(n) where q and r are polynomials and no q(n) has a nontrivial factor with r(n + j) for j = 0, 1, 2, ... . (This is always possible, whether or not the series is summable in closed form.) Step 2: Find a polynomial ƒ such that S(n) = q(n + 1)/p(n) ƒ(n) a(n). If the series is summable in closed form then clearly a rational function ƒ with this property exists; in fact it must always be a polynomial, and an upper bound on its degree can be found. Determining ƒ (or finding that there is no such ƒ) is then a matter of solving a system of linear equations. Relationship to Wilf–Zeilberger pairs Gosper's algorithm can be used to discover Wilf–Zeilberger pairs, where they exist. Suppose that F(n + 1, k) − F(n, k) = G(n, k + 1) − G(n, k) where F is known but G is not. Then feed a(k) := F(n + 1, k) − F(n, k) into Gosper's algorithm. (Treat this as a function of k whose coefficients happen to be functions of n rather than numbers; everything in the algorithm works in this setting.) If it successfully finds S(k) with S(k) − S(k − 1) = a(k), then we are done: this is the required G. If not, there is no such G. Definite versus indefinite summation Gosper's algorithm finds (where possible) a hypergeometric closed form for the indefinite sum of hypergeometric terms. It can happen that there is no such closed form, but that the sum over all n, or some particular set of values of n, has a closed form. This question is only meaning
https://en.wikipedia.org/wiki/Choripetalae
Choripetalae Eichler (1876), is a descriptive botanical name used in the Eichler and Wettstein systems for a group of flowering plants. It was one of two groups within the Dicotyledones, the other being the Sympetalae. The latter have fused petals (sympetaly) which distinguishes them from the free, unfused petals of the Choripetalae. Thus if the petals are free from one another in the corolla, the plant is polypetalous or choripetalous; while if the petals are at least partially fused together, it is gamopetalous or sympetalous. See also Petal
https://en.wikipedia.org/wiki/Phonagnosia
Phonagnosia (from Ancient Greek φωνή phone, "voice" and γνῶσις gnosis, "knowledge") is a type of agnosia, or loss of knowledge, that involves a disturbance in the recognition of familiar voices and the impairment of voice discrimination abilities in which the affected individual does not suffer from comprehension deficits. Phonagnosia is an auditory agnosia, an acquired auditory processing disorder resulting from brain damage, other auditory agnosias include cortical deafness and auditory verbal agnosia also known as pure word deafness. Since people suffering from phonagnosia do not suffer from aphasia, it is suggested that the structures of linguistic comprehension are functionally separate from those of the perception of the identity of the speaker who produced it. History Phonagnosia is the auditory equivalent of prosopagnosia. Unlike prosopagnosia, investigations of phonagnosia have not been extensively pursued. Phonagnosia was first described by a study by Van Lancker and Cantor in 1982. The subjects in this study were asked to identify which of four names or faces matched a specific famous voice. The subjects could not complete the task. Since then, there have been a couple studies done on patients with phonagnosia. The clinical and radiologic findings with computerized tomographic scans (CAT scans) in these cases suggest that recognition of familiar voices is impaired by damage to the inferior and parietal regions of the right hemisphere while voice discrimination is impaired by temporal lobe damage of either hemisphere. These studies have also shown evidence for a double dissociation between voice recognition and voice discrimination. Some patients will perform normally on the discrimination tasks but poorly on the recognition tasks; whereas the other patients will perform normally on the recognition tasks but poorly on the discrimination tasks. Patients did not perform poorly on both tasks. Associative phonagnosia is a form of phonagnosia that develops w
https://en.wikipedia.org/wiki/Fern%20bar
Fern bar is an American slang term for an upscale or preppy (or yuppie) bar or tavern catering to singles, usually decorated with ferns or other greenery, as well as such decor as fake Tiffany lamps. The phrase came into common regional usage in the late 1970s. History One of the first fern bars was the original T.G.I. Friday's on the corner of 63rd Street and First Avenue in a neighborhood on the Upper East Side of New York City, where many young single adults lived at the time. The founder, Alan Stillman, borrowed several thousand dollars from his mother, leased a saloon and remodeled it, converting the ambience to one that he thought might be attractive to young single women. The bar opened on March 15, 1965 and was soon copied by other restaurants in the neighborhood. Another early fern bar, also thought to be the original birthplace of the Lemon Drop martini, was Henry Africa's in San Francisco, California. The bar opened in 1969 at Broadway and Polk Streets by out-of-work veteran Norman Hobday, who by his own account "took the opium-den atmosphere out of the saloons" in favor of "antique lamps and Grandma's living-room furniture." By some accounts Hobday copied the concept from another restaurant, Perry's, which opened several months earlier and was made famous as a singles "meet market" by Armistead Maupin's novel, Tales of the City. Hobday closed the establishment in 1986, and opened up Eddie Rickenbackers, another eclectic bar, the next year. Description Typical drinks served included wine spritzers, lemon drop martinis, frozen daiquirís, Harvey Wallbangers, and piña coladas. Franchises sometimes labeled "fern bars" include T.G.I. Friday's, Bennigan's, and Houlihan's. Fern bars were gathering places for well-dressed "upscale" young men and women, initially during the sexual revolution of the 1970s and later the yuppie era of the 1980s. Fern bars were frequently talked of disparagingly as singles bars where individuals would go to hit on men or wom
https://en.wikipedia.org/wiki/Prefix%20hash%20tree
A prefix hash tree (PHT) is a distributed data structure that enables more sophisticated queries over a distributed hash table (DHT). The prefix hash tree uses the lookup interface of a DHT to construct a trie-based data structure that is both efficient (updates are doubly logarithmic in the size of the domain being indexed), and resilient (the failure of any given node in a prefix hash tree does not affect the availability of data stored at other nodes).
https://en.wikipedia.org/wiki/IDX-184
IDX-184 is an antiviral drug which was developed as a treatment for hepatitis C, acting as a NS5B RNA polymerase inhibitor. While it showed reasonable effectiveness in early clinical trials it did not progress past Phase IIb. However research using this drug has continued as it shows potentially useful activity against other emerging viral diseases such as Zika virus, and coronaviruses including MERS, and SARS-CoV-2.
https://en.wikipedia.org/wiki/Hammer%20and%20pick
The hammer and pick, rarely referred to as hammer and chisel, is a symbol of mining, often used in heraldry. It can indicate mining, mines (especially on maps or in cartography), or miners, and is also borne as a charge in the coats of arms of mining towns. The symbol represents the traditional tools of the miner, a hammer and a chisel on a handle, similar to a pickaxe, but with one blunt end. They are pictured in the way a right-handed worker would lay them down: the pick with the point to the right and the handle to the lower left, the hammer with the handle to the lower right and the head to the upper left. The handle of the pick protrudes over the head, because the head is not permanently fixed, but can be swapped for a newly sharpened head when it is blunt from use. In coats of arms the symbol is often shown in black (Johanngeorgenstadt, Hövels), but also in natural colours (Telnice) or in gold or silver (Abertamy, Bodenwöhr, Gelsenkirchen). Examples Other The hammer and pick is used to indicate the working day, on timetables. As an emoji, it is often used as a symbol for fans of Premier League side West Ham United and for fans of Ukrainian Premier League club Shakhtar Donetsk. Unicode In Unicode, the "hammer and pick" symbol is U+2692 ⚒. See also Arm and hammer Hammer and sickle Political symbols Heraldic charges Mining culture and traditions
https://en.wikipedia.org/wiki/Irreducible%20component
In algebraic geometry, an irreducible algebraic set or irreducible variety is an algebraic set that cannot be written as the union of two proper algebraic subsets. An irreducible component is an algebraic subset that is irreducible and maximal (for set inclusion) for this property. For example, the set of solutions of the equation is not irreducible, and its irreducible components are the two lines of equations and . It is a fundamental theorem of classical algebraic geometry that every algebraic set may be written in a unique way as a finite union of irreducible components. These concepts can be reformulated in purely topological terms, using the Zariski topology, for which the closed sets are the algebraic subsets: A topological space is irreducible if it is not the union of two proper closed subsets, and an irreducible component is a maximal subspace (necessarily closed) that is irreducible for the induced topology. Although these concepts may be considered for every topological space, this is rarely done outside algebraic geometry, since most common topological spaces are Hausdorff spaces, and, in a Hausdorff space, the irreducible components are the singletons. In topology A topological space X is reducible if it can be written as a union of two closed proper subsets , of A topological space is irreducible (or hyperconnected) if it is not reducible. Equivalently, X is irreducible if all non empty open subsets of X are dense, or if any two nonempty open sets have nonempty intersection. A subset F of a topological space X is called irreducible or reducible, if F considered as a topological space via the subspace topology has the corresponding property in the above sense. That is, is reducible if it can be written as a union where are closed subsets of , neither of which contains An irreducible component of a topological space is a maximal irreducible subset. If a subset is irreducible, its closure is also irreducible, so irreducible components are
https://en.wikipedia.org/wiki/Delay%20insensitive%20circuit
A delay-insensitive circuit is a type of asynchronous circuit which performs a digital logic operation often within a computing processor chip. Instead of using clock signals or other global control signals, the sequencing of computation in delay-insensitive circuit is determined by the data flow. Data flows from one circuit element to another using "handshakes", or sequences of voltage transitions to indicate readiness to receive data, or readiness to offer data. Typically, inputs of a circuit module will indicate their readiness to receive, which will be "acknowledged" by the connected output by sending data (encoded in such a way that the receiver can detect the validity directly), and once that data has been safely received, the receiver will explicitly acknowledge it, allowing the sender to remove the data, thus completing the handshake, and allowing another datum to be transmitted. In a delay-insensitive circuit, there is therefore no need to provide a clock signal to determine a starting time for a computation. Instead, the arrival of data to the input of a sub-circuit triggers the computation to start. Consequently, the next computation can be initiated immediately when the result of the first computation is completed. The main advantage of such circuits is their ability to optimize processing of activities that can take arbitrary periods of time depending on the data or requested function. An example of a process with a variable time for completion would be mathematical division or recovery of data where such data might be in a cache. The Delay-Insensitive (DI) class is the most robust of all asynchronous circuit delay models. It makes no assumptions on the delay of wires or gates. In this model all transitions on gates or wires must be acknowledged before transitioning again. This condition stops unseen transitions from occurring. In DI circuits any transition on an input to a gate must be seen on the output of the gate before a subsequent transitio
https://en.wikipedia.org/wiki/Dynamic%20Ionosphere%20CubeSat%20Experiment
The Dynamic Ionosphere CubeSat Experiment (DICE) is a scientific mission consisting of two Miniaturized Satellites DICE-1 and DICE-2 flying in formation. The satellites are an unusual 1.5U variant of the CubeSat design for microsatellites. Both satellites were launched from Vandenberg Air Force Base in October 2011 atop a Delta II rocket. This was a multi-payload mission with four other CubeSats, AubieSat-1, M-Cubed, Explorer-1_Prime and RAX-2. The satellites are intended to map changes in the Earth's Plasmasphere caused by Geomagnetic storms. On board control is provided by a Pumpkin FM430 flight control module containing a Texas Instruments MPS430 microcontroller. Communications are provided by a half-duplex UHF modem with a 1.5 Mbit/s downlink (465 MHz) and 19.2 kbit/s uplink (450 MHz). The satellites carry four Electric Field Probe sensors on telescopic booms, two DC Langmuir probes for detection of ions and a three-axis magnetometer for measuring magnetic fields.
https://en.wikipedia.org/wiki/Lola%20%28computing%29
Lola is designed to be a simple hardware description language for describing synchronous, digital circuits. Niklaus Wirth developed the language to teach digital design on field-programmable gate arrays (FPGAs) to computer science students while a professor at ETH Zurich. The purpose of Lola is to statically describe the structure and function of hardware components and of the connections between them. A Lola text is composed of declarations and statements. It describes digital electronics hardware on the logic gate level in the form of signal assignments. Signals are combined using operators and assigned to other signals. Signals and the respective assignments can be grouped together into data types. An instance of a type is a hardware component. Types can be composed of instances of other types, thereby supporting a hierarchical design style and they can be generic, e.g., parametrizable with the word width of a circuit. All of the concepts mentioned above are demonstrated in the following example of a circuit for adding binary data. First, a fundamental building block () is defined, then this is used to declare a cascade of word-width 8, and finally the s are connected to each other. The defined in this example can serve as a building block on a higher level of the design hierarchy. MODULE Adder; TYPE Cell; (* Composite Type *) IN x,y,ci:BIT; (* input signals *) OUT z,co:BIT; (* output signals *) BEGIN z:=x-y-ci; co:=x*y+x*ci+y*ci; END Cell; CONST N:=8; IN X,Y:[N]BIT; ci:BIT; (* input signals *) OUT Z:[N]BIT; co:BIT; (* output signals *) VAR S:[N]Cell; (* composite type instances *) BEGIN S.0(X.0, Y.0, ci); (* inputs in cell 0 *) FOR i:=1..N-1 DO S.i(X.i,Y.i,S[i-1].co); (* inputs in cell i *) END; FOR i:=0..N-1 DO Z.i:=S.i.z; END; co:=S.7.co; END Adder. Wirth describes Lola from a user's perspective in his book Digital Circuit Design. A complementary view on the details of the Lola compiler's implementation can be found in Wirth'
https://en.wikipedia.org/wiki/Hyperpyramid
A hyperpyramid is a generalisation of the normal pyramid to n dimensions. In the case of the pyramid one connects all vertices of the base, a polygon in a plane, to a point outside the plane, which is the peak. The pyramid's height is the distance of the peak from the plane. This construction gets generalised to n dimensions. The base becomes a (n − 1)-polytope in a (n − 1)-dimensional hyperplane. A point called apex is located outside the hyperplane and gets connected to all the vertices of the polytope and the distance of the apex from the hyperplane is called height. This construct is called a n-dimensional hyperpyramid. A normal triangle is a 2-dimensional hyperpyramid, the triangular pyramid is a 3-dimensional hyperpyramid and the pentachoron or tetrahedral pyramid is a 4-dimensional hyperpyramid with a tetrahedron as base. The n-dimensional volume of a n-dimensional hyperpyramid can be computed as follows: Here denotes the n-dimensional volume of the hyperpyramid, A the (n − 1)-dimensional volume of the base and h the height, that is the distance between the apex and the (n − 1)-dimensional hyperplane containing the base A. For n = 2, 3 the formula above yields the standard formulas for the area of a triangle and the volume of a pyramid.
https://en.wikipedia.org/wiki/Genetic%20variability
Genetic variability is either the presence of, or the generation of, genetic differences. It is defined as "the formation of individuals differing in genotype, or the presence of genotypically different individuals, in contrast to environmentally induced differences which, as a rule, cause only temporary, nonheritable changes of the phenotype". Genetic variability in a population is important for biodiversity. Causes There are many sources of genetic variability in a population: Homologous recombination is a significant source of variability. During meiosis in sexual organisms, two homologous chromosomes cross over one another and exchange genetic material. The chromosomes then split apart and are ready to contribute to forming an offspring. Recombination is random and is governed by its own set of genes. Being controlled by genes means that recombination is variable in frequency. Immigration, emigration, and translocation – each of these is the movement of an individual into or out of a population. When an individual comes from a previously genetically isolated population into a new one it will increase the genetic variability of the next generation if it reproduces. Polyploidy – having more than two homologous chromosomes allows for even more recombination during meiosis allowing for even more genetic variability in one's offspring. Diffuse centromeres – in asexual organisms where the offspring is an exact genetic copy of the parent, there are limited sources of genetic variability. One thing that increased variability, however, is having diffused instead of localized centromeres. Being diffused allows the chromatids to split apart in many different ways allowing for chromosome fragmentation and polyploidy creating more variability. Genetic mutations – contribute to the genetic variability within a population and can have positive, negative, or neutral effects on a fitness. This variability can be easily propagated throughout a population by natural select
https://en.wikipedia.org/wiki/Search%20game
A search game is a two-person zero-sum game which takes place in a set called the search space. The searcher can choose any continuous trajectory subject to a maximal velocity constraint. It is always assumed that neither the searcher nor the hider has any knowledge about the movement of the other player until their distance apart is less than or equal to the discovery radius and at this very moment capture occurs. As mathematical models, search games can be applied to areas such as hide-and-seek games that children play or representations of some tactical military situations. The area of search games was introduced in the last chapter of Rufus Isaacs' classic book "Differential Games" and has been developed further by Shmuel Gal and Steve Alpern. The princess and monster game deals with a moving target. Strategy A natural strategy to search for a stationary target in a graph (in which arcs have lengths) is to find a minimal closed curve L that covers all the arcs of the graph. (L is called a Chinese postman tour). Then, traverse L with probability 1/2 for each direction. This strategy seems to work well if the graph is Eulerian. In general, this random Chinese postman tour is indeed an optimal search strategy if and only if the graph consists of a set of Eulerian graphs connected in a tree-like structure. A misleadingly simple example of a graph not in this family consists of two nodes connected by three arcs. The random Chinese postman tour (equivalent to traversing the three arcs in a random order) is not optimal, and the optimal way to search these three arcs is complicated. Unbounded domains In general, the reasonable framework for searching an unbounded domain, as in the case of an online algorithm, is to use a normalized cost function (called the competitive ratio in Computer Science literature). The minimax trajectory for problems of these types is always a geometric sequence (or exponential function for continuous problems). This result yields an easy me
https://en.wikipedia.org/wiki/Horocycle
In hyperbolic geometry, a horocycle (), sometimes called an oricycle, oricircle, or limit circle, is a curve whose normal or perpendicular geodesics all converge asymptotically in the same direction. It is the two-dimensional case of a horosphere (or orisphere). The centre of a horocycle is the ideal point where all normal geodesics asymptotically converge. Two horocycles who have the same centre are concentric. Although it appears as if two concentric horocycles cannot have the same length or curvature, in fact any two horocycles are congruent. A horocycle can also be described as the limit of the circles that share a tangent in a given point, as their radii go towards infinity. In Euclidean geometry, such a "circle of infinite radius" would be a straight line, but in hyperbolic geometry it is a horocycle (a curve). From the convex side the horocycle is approximated by hypercycles whose distances from their axis go towards infinity. Properties Through every pair of points there are 2 horocycles. The centres of the horocycles are the ideal points of the perpendicular bisector of the segment between them. No three points of a horocycle are on a line, circle or hypercycle. All horocycles are congruent. (Even concentric horocycles are congruent to each other) A straight line, circle, hypercycle, or other horocycle cuts a horocycle in at most two points. The perpendicular bisector of a chord of a horocycle is a normal of that horocycle and the bisector bisects the arc subtended by the chord and is an axis of symmetry of that horocycle. The length of an arc of a horocycle between two points is: longer than the length of the line segment between those two points, longer than the length of the arc of a hypercycle between those two points and shorter than the length of any circle arc between those two points. The distance from a horocycle to its center is infinite, and while in some models of hyperbolic geometry it looks like the two "ends" of a horocycle g
https://en.wikipedia.org/wiki/Peter%20B.%20Kronheimer
Peter Benedict Kronheimer (born 1963) is a British mathematician, known for his work on gauge theory and its applications to 3- and 4-dimensional topology. He is William Caspar Graustein Professor of Mathematics at Harvard University and former chair of the mathematics department. Education Kronheimer attended the City of London School. He completed his DPhil at Oxford University under the direction of Michael Atiyah. He has had a long association with Merton College, the oldest of the constituent colleges of Oxford University, being an undergraduate, graduate, and full fellow of the college. Career Kronheimer's early work was on gravitational instantons, in particular the classification of hyperkähler 4-manifolds with asymptotical locally Euclidean geometry (ALE spaces), leading to the papers "The construction of ALE spaces as hyper-Kähler quotients" and "A Torelli-type theorem for gravitational instantons." He and Hiraku Nakajima gave a construction of instantons on ALE spaces generalizing the Atiyah–Hitchin–Drinfeld–Manin construction. This constructions identified these moduli spaces as moduli spaces for certain quivers (see "Yang-Mills instantons on ALE gravitational instantons.") He was the initial recipient of the Oberwolfach prize in 1998 on the basis of some of this work. Kronheimer has frequently collaborated with Tomasz Mrowka from the Massachusetts Institute of Technology. Their collaboration began at the Mathematical Research Institute of Oberwolfach, and their first work developed analogues of Simon Donaldson's invariants for 4-manifolds with a distinguished surface. They used the tools developed to prove a conjecture of John Milnor, that the four-ball genus of a -torus knot is . They then went on to develop these tools further and established a structure theorem for Donaldson's polynomial invariants using Kronheimer–Mrowka basic classes. After the arrival of Seiberg–Witten theory their work on embedded surfaces culminated in a proof of th
https://en.wikipedia.org/wiki/TRSDOS
TRSDOS (which stands for the Tandy Radio Shack Disk Operating System) is the operating system for the Tandy TRS-80 line of eight-bit Zilog Z80 microcomputers that were sold through Radio Shack from 1977 through 1991. Tandy's manuals recommended that it be pronounced triss-doss. TRSDOS should not be confused with Tandy DOS, a version of MS-DOS licensed from Microsoft for Tandy's x86 line of personal computers (PCs). With the original TRS-80 Model I of 1977, TRSDOS was primarily a way of extending the MBASIC (BASIC in ROM) with additional I/O (input/output) commands that worked with disk files rather than the cassette tapes that were used by non-disk Model I systems. Later disk-equipped Model III computers used a completely different version of TRSDOS by Radio Shack which culminated in 1981 with TRSDOS Version 1.3. From 1983 disk-equipped TRS-80 Model 4 computers used TRSDOS Version 6, which was a development of Model III LDOS by Logical Systems, Inc. This last was updated in 1987 and released as LS-DOS 6.3. Completely unrelated was a version of TRSDOS by Radio Shack for its TRS-80 Model II professional computer from 1979, also based on the Z80 and equipped with 8-inch disk drives. The later machines in this line, the Models 12, 16 and 6000, used the Z80 as an alternate CPU to its main Motorola 68000 chip and could run this version of TRSDOS for backwards compatibility with older Z80 applications software. History Tandy Corporation's TRS-80 microcomputer did not have a disk drive or disk operating system at release. The first version of TRSDOS, by Randy Cook, was so buggy that others wrote alternatives, including NewDOS and LDOS. After disputes with Cook over ownership of the source code, Tandy hired Logical Systems, LDOS's developer, to continue TRSDOS development. TRSDOS 6, shipped with the TRS-80 Model 4 in 1983, is identical to LDOS 6.00. Dates May 8, 1979 – Radio Shack releases TRSDOS 2.3 May 1, 1981 – Radio Shack releases Model III TRSDOS 1.3 April 26, 19
https://en.wikipedia.org/wiki/Transient%20expression
Transient expression, more frequently referred to "transient gene expression", is the temporary expression of genes that are expressed for a short time after nucleic acid, most frequently plasmid DNA encoding an expression cassette, has been introduced into eukaryotic cells with a chemical delivery agent like calcium phosphate (CaPi) or polyethyleneimine (PEI). However, unlike "stable expression," the foreign DNA does not fuse with the host cell DNA, resulting in the inevitable loss of the vector after several cell replication cycles. The majority of transient gene expressions are done with cultivated animal cells. The technique is also used in plant cells; however, the transfer of nucleic acids into these cells requires different methods than those with animal cells. In both plants and animals, transient expression should result in a time-limited use of transferred nucleic acids, since any long-term expression would be called "stable expression." Methodology varies depending on the organism to transform. While plants can be transformed with a construct introduced into Agrobacterium tumefaciens via agroinfiltration or floral dip, most animal cells would require a viral vector. In humans, the field of transient transformation advanced rapidly during the 2020–2021 COVID-19 pandemic with major COVID-19 vaccines using either direct mRNA transfer into human or adenovirus vectors, with the RNA being expressed in the host human to produce spike proteins that induce an immune response. Advantages When choosing between inducing transient or stable expression in cells, time frame and experimental goal must be taken into consideration. Transiently transfected cells are often used to study the effects of short-term gene expression, perform RNA interference (RNAi)‑mediated gene silencing, or quickly generate small-scale recombinant proteins. This rapid generation small quantities of recombinant proteins can be applied towards evaluating their potential as drug candidates or
https://en.wikipedia.org/wiki/Relative%20atomic%20mass
Relative atomic mass (symbol: A; sometimes abbreviated RAM or r.a.m.), also known by the deprecated synonym atomic weight, is a dimensionless physical quantity defined as the ratio of the average mass of atoms of a chemical element in a given sample to the atomic mass constant. The atomic mass constant (symbol: m) is defined as being of the mass of a carbon-12 atom. Since both quantities in the ratio are masses, the resulting value is dimensionless. These definitions remain valid even after the 2019 redefinition of the SI base units. For a single given sample, the relative atomic mass of a given element is the weighted arithmetic mean of the masses of the individual atoms (including all its isotopes) that are present in the sample. This quantity can vary significantly between samples because the sample's origin (and therefore its radioactive history or diffusion history) may have produced combinations of isotopic abundances in varying ratios. For example, due to a different mixture of stable carbon-12 and carbon-13 isotopes, a sample of elemental carbon from volcanic methane will have a different relative atomic mass than one collected from plant or animal tissues. The more common, and more specific quantity known as standard atomic weight (A) is an application of the relative atomic mass values obtained from many different samples. It is sometimes interpreted as the expected range of the relative atomic mass values for the atoms of a given element from all terrestrial sources, with the various sources being taken from Earth. "Atomic weight" is often loosely and incorrectly used as a synonym for standard atomic weight (incorrectly because standard atomic weights are not from a single sample). Standard atomic weight is nevertheless the most widely published variant of relative atomic mass. Additionally, the continued use of the term "atomic weight" (for any element) as opposed to "relative atomic mass" has attracted considerable controversy since at least the 196
https://en.wikipedia.org/wiki/Statue%20of%20Balto
A bronze statue of Balto by Frederick Roth is installed in Central Park, Manhattan, New York. Balto (1919 – March 14, 1933) was an Alaskan husky and sled dog belonging to musher and breeder Leonhard Seppala. He achieved fame when he reportedly led a team of sled dogs on the final leg of the 1925 serum run to Nome, in which diphtheria antitoxin was transported from Anchorage, Alaska, to Nenana, Alaska, by train and then to Nome by dog sled to combat an outbreak of the disease. Description and history Located north of the Central Park Zoo near the intersection of East Drive and 67th Street, the sculpture was dedicated on December 17, 1925. Roth modeled the sculpture of Balto on a New Hampshire malamute named Chinook. A bas-relief rendering of the pivotal journey is carved into the pedestal. Balto himself was reportedly present at the ceremony. The statue is a popular attraction: children frequently climb the statue to pretend to ride on the dog. There is a plaque at the base of the statue, which reads:"Dedicated to the indomitable spirit of the sled dogs that relayed antitoxin six hundred miles over rough ice, across treacherous waters, through Arctic blizzards from Nenana to the relief of stricken Nome in the Winter of 1925. Endurance · Fidelity · Intelligence". Legacy The statue was used at the ending scene of the 1995 Universal Pictures animated film Balto. In September 2022, actor Kevin Bacon (who did the voice of Balto in the animated film) visited the statue during a walk. He posted a short video of himself endearingly commenting on the statue and his film role on his social media accounts, entitling the short video "Ran into an old friend of mine in the park #Balto". In 2019, the cast and crew of the film The Great Alaskan Race paid a visit to the statue. See also 1925 in art
https://en.wikipedia.org/wiki/Comanche%20%28horse%29
Comanche was a mixed-breed horse who survived George Armstrong Custer's detachment of the United States 7th Cavalry at the Battle of the Little Bighorn (June 25, 1876). Biography The horse was bought by the U.S. Army in 1868 in St. Louis, Missouri and sent to Fort Leavenworth, Kansas. His ancestry and date of birth were both uncertain. Captain Myles Keogh of the 7th Cavalry liked the gelding and bought him for his personal mount, to be ridden only in battle. He has alternatively been described as bay or bay dun. In 1868, while the army was fighting the Comanche in Kansas, the horse was wounded in the hindquarters by an arrow but continued to carry Keogh in the fight. He named the horse “Comanche” to honor his bravery. Comanche was wounded many more times but always exhibited the same toughness. On June 25, 1876, Captain Keogh rode Comanche at the Battle of the Little Bighorn, led by Lt. Col. George Armstrong Custer. The battle was notable as their entire detachment was killed. US soldiers found Comanche, badly wounded, two days after the battle. After being transported to Fort Lincoln, he was slowly nursed back to health. After a lengthy convalescence, Comanche was retired. In April 1878, Colonel Samuel D. Sturgis issued the following order: The ceremonial order inspired a reporter for the Bismarck Tribune to go to Fort Abraham Lincoln to interview Comanche. He "asked the usual questions which his subject acknowledged with a toss of his head, a stamp of his foot and a flourish of his beautiful tail." His official keeper, the farrier John Rivers of Company I, Keogh's old troop, saved "Comanche's reputation" by answering more fully. Here is the gist of what the reporter learned (Bismarck Tribune, May 10, 1878): Comanche was a veteran, 21 years old, and had been with the 7th Cavalry since its Organization in '66.... He was found by Sergeant [Milton J.] DeLacey [Co. I] in a ravine where he had crawled, there to die and feed the Crows. He was raised up an
https://en.wikipedia.org/wiki/Code42
Code42 is an American cybersecurity software company based in Minneapolis specializing in insider risk management. It is the maker of the cloud-native data protection product Incydr and security microlearning product Instructor. Code42’s Incydr is a SaaS data-loss protection product. Incydr is designed to help enterprise security teams detect insider risks to data that could lead to data leak and data loss and insider threat breaches, and respond to them appropriately. Code42’s Instructor is an integrated microlearning tool that allows security teams to send out security training videos to teach employees how to manage risk. History Code42 was founded as an IT consulting company in 2001, by Matthew Dornquast, Brian Bispala, and Mitch Coopet. The company's name honors Douglas Adams, who authored Hitchhiker’s Guide to the Galaxy and had died that year. In the book, the number 42 is the "answer to the ultimate question of life, the universe and everything". Some of Code42's first projects included a redesign of Sun Country Airlines’ website in 2002, a project for the retailer Target Corporation, and the ticket booking engine for Midwest Airlines. Income from the IT services business was used to fund product ideas for six years. In 2006, the company planned to create a Facebook-like desktop application, but the project became too large and impractical. Code42 focused on the online storage element of the application, creating CrashPlan in 2007. In June 2011, Code42 acquired a Minneapolis-based mobile development company, Recursive Awesome LLC, to support its software on mobile devices. In 2012, Code42 raised $52.5 million in funding. The funding was the first distribution from a $100 million pool established in 2011 by Accel Partners to fund Big Data companies. In 2013, Code42 developed, released and marketed a file sharing service called SharePlan. According to the Star Tribune, it competed with DropBox, but SharePlan used a PIN to access files and track users.
https://en.wikipedia.org/wiki/Zinc%20finger%20protein%20684
Zinc finger protein 684 is a protein that in humans is encoded by the ZNF684 gene.
https://en.wikipedia.org/wiki/Federal%20Identity%20Program
The Federal Identity Program (FIP, , PCIM) is the Government of Canada's corporate identity program. The purpose of the FIP is to provide to the public a consistent and unified image for federal government projects and activities. Other objectives of the program include facilitating public access to federal programs and services, promoting the equal status of the two official languages, and achieving better management of the federal identity. Managed by the Treasury Board Secretariat, this program, and the government's communication policy, help to shape the public image of the government. In general, logos – or, in the parlance of the policy, visual identifiers – used by government departments other than those specified in the FIP must be approved by the Treasury Board. Background The origin of the Federal Identity Program can be traced back to 1921 when King George V proclaimed the Royal Coat of Arms, making red and white the official colours of Canada. In 1965, Queen Elizabeth II proclaimed the Canadian flag, and the maple leaf became an official symbol of Canada. In 1969, the Official Languages Act was established to ensure the equality of English and French in all federal jurisdictions. That same year, the Task Force on Government Information found that the Canadian government was conveying a confused image to the populace through a hodge-podge of symbology and typefaces (fonts). In 1970, the FIP was created to standardize a corporate identity for the Canadian government. Applications The Federal Identity Program covers approximately 160 institutions and over 20,000 facilities across Canada and worldwide. Individual departments or agencies can manage their own corporate identity and decide the fields of application based on their mandate and operating needs. The corporate identity can be used either externally in communication with the public, or internally with government employees. Among the applications are stationery, forms, vehicular markings,
https://en.wikipedia.org/wiki/Richard%20Davis%20Anderson
Richard Davis Anderson, Sr. (February 17, 1922 – March 4, 2008) was an American mathematician known internationally for his work in infinite-dimensional topology. Much of his early work focused on proofs surrounding Hilbert space and Hilbert cubes. Life Richard Anderson and his twin brother, John, were born February 17, 1922, in Hamden, Connecticut. He received a bachelor's degree in mathematics from the University of Minnesota in 1941, after just two years of study. He went on to graduate school at the University of Texas at Austin, where he studied under R. L. Moore. His graduate work was interrupted by World War II. Two days after the Japanese attack on Pearl Harbor, he enlisted in the United States Navy. During his term in the U. S. Navy, he served on the USS Rocky Mount. After returning from the war, he finished his doctoral work at the University of Texas and went on to teach mathematics at the University of Pennsylvania, where he went through the ranks of instructor, assistant professor, and associate professor (from 1951 to 1956). During this time he also spent two years (the academic years 1951–1952 and 1955–1956) at the Institute for Advanced Study in Princeton, New Jersey. He then accepted a post at Louisiana State University, where he became the university's first Boyd Professor of mathematics. Boyd Professor is Louisiana State University's highest professor rank. Accomplishments Served as vice president of the American Mathematical Society in 1972 and 1973. Served as president of the Mathematical Association of America in 1981 and 1982. Served as chair of the Council of Scientific Society Presidents in 1984. Received the Award for Distinguished Service to Mathematics from the Mathematical Association of America in 1978. Received the Bolzano Medal from the Czechoslovakian Academy of Sciences in 1981. Invited lectures at conferences and colloquia in many places in the US and in cities of 21 other countries. Invited Speaker at the IC
https://en.wikipedia.org/wiki/Product%20structure%20modeling
Product structure is a hierarchical decomposition of a product, typically known as the bill of materials (BOM). As business becomes more responsive to unique consumer tastes and derivative products grow to meet the unique configurations, BOM management can become unmanageable. For manufacturers, a bill of materials (BOM) is a critical product information record that lists the raw materials, assemblies, components, parts and the quantities of each needed to manufacture a product. Advanced modeling techniques are necessary to cope with configurable products where changing a small part of a product can have multiple impacts on other product structure models. Concepts within this entry are in capital letters in order to indicate these concepts. Several concepts are related to the subject of product structure modeling. All these concepts are discussed in this section. These concepts are divided into two main aspects. First the product breakdown is discussed which involves all the physical aspects of a product. Second, different views at the product structure are indicated. Product breakdown Figure 1 illustrates the concepts that are important to the structure of a product. This is a meta-data model, which can be used for modeling the instances in a specific case of product structuring. The core of the product structure is illustrated by the product components (items) and their relationships. Thus, this involves the linking between items related to the product. The assembly can consist of subassemblies and parts, whereas subassemblies can also consist of other subassemblies or part. Thus, this is typically hierarchically ordered. These concepts are generalized into the concept of item. This classification is overlapping, because a subassembly could be a part in another assembly configuration. Due to differentiation and variation of items several concepts must be indicated into the product breakdown structure. Three concepts are involved in this differentiation, namely
https://en.wikipedia.org/wiki/Reflecting%20cardinal
In set theory, a mathematical discipline, a reflecting cardinal is a cardinal number κ for which there is a normal ideal I on κ such that for every X∈I+, the set of α∈κ for which X reflects at α is in I+. (A stationary subset S of κ is said to reflect at α<κ if S∩α is stationary in α.) Reflecting cardinals were introduced by . Every weakly compact cardinal is a reflecting cardinal, and is also a limit of reflecting cardinals. The consistency strength of an inaccessible reflecting cardinal is strictly greater than a greatly Mahlo cardinal, where a cardinal κ is called greatly Mahlo if it is κ+-Mahlo . An inaccessible reflecting cardinal is not in general Mahlo however, see https://mathoverflow.net/q/212597. See also List of large cardinal properties
https://en.wikipedia.org/wiki/Virus%20Research
Virus Research is a peer-reviewed scientific journal which focuses on fundamental research in all aspects of virology. The journal was established in 1984 by Brian Mahy and Richard Compans. Abstracting and indexing The journal is abstracted and indexed in: According to the Journal Citation Reports, the journal has a 2018 impact factor of 2.736. In 2021, the impact factor was updated to 6.286.
https://en.wikipedia.org/wiki/Calcium%20chloride%20transformation
Calcium chloride (CaCl2) transformation is a laboratory technique in prokaryotic (bacterial) cell biology. The addition of calcium chloride to a cell suspension promotes the binding of plasmid DNA to lipopolysaccharides (LPS). Positively charged calcium ions attract both the negatively charged DNA backbone and the negatively charged groups in the LPS inner core. The plasmid DNA can then pass into the cell upon heat shock, where chilled cells (+4 degrees Celsius) are heated to a higher temperature (+42 degrees Celsius) for a short time. History of bacterial transformation Frederick Griffith published the first report of bacteria's potential for transformation in 1928. Griffith observed that mice did not succumb to the "rough" type of pneumococcus (Streptococcus pneumoniae), referred to as nonvirulent, but did succumb to the "smooth" strain, which is referred to as virulent.  The smooth strain's virulence could be suppressed with heat-killing. However, when the nonvirulent rough strain was combined with the heat-killed smooth strain, the rough strain managed to pick up the smooth phenotype and thus become virulent. Griffith's research indicated that the change was brought on by a nonliving, heat-stable substance generated from the smooth strain. Later on, Oswald Avery, Colin MacLeod, and Maclyn McCarty identified this transformational substance as DNA in 1944. Principle of calcium chloride transformation Since DNA is a very hydrophilic molecule, it often cannot penetrate through the bacterial cell membrane. Therefore, it is necessary to make bacteria competent in order to internalize DNA. This may be accomplished by suspending bacteria in a solution with a high calcium concentration, which creates tiny holes in the bacterium's cells. Calcium suspension, along with the incubation of DNA together with competent cells on ice, followed by a brief heat shock, will directly lead extra-chromosomal DNA to forcedly enter the cell. According to previous research, the LPS
https://en.wikipedia.org/wiki/Temperature%20anomaly
A temperature anomaly is the departure, positive or negative, of a temperature from a base temperature that is normally chosen as an average of temperatures over a certain reference period, often called a base period. Commonly, the average temperature is calculated over a period of at least 30 years over a homogeneous geographic region, or globally over the entire planet. Temperatures are obtained from surface and offshore weather stations or inferred from meteorological satellite data. Anomalies can be calculated based on datasets of surface and upper-air atmospheric temperatures or sea surface temperatures. Description Temperature anomalies are a measure of temperature compared to a reference temperature, which is often calculated as an average of temperatures over a reference period, often called a base period. Records of global average surface temperature are usually presented as anomalies rather than as absolute temperatures. Using reference values computed for distinct areas over the same time period establishes a baseline from which anomalies are calculated, so that normalized data is used to more accurately compare temperature patterns to what is normal. For example, sub-global datasets may be for land-only, ocean-only, and hemispheric time series. Anomalies provide a frame of reference that allows more meaningful comparisons between locations and more accurate calculations of temperature trends. Using different base periods does not change the shape of time series charts or affect portrayal of the trends within them. For example, World Meteorological Organization (WMO) policy motivates use of a 30 year base period, whereas for conceptual simplicity a century-long base period is sometimes used to track the big-picture evolution of temperatures across the entire global surface. Different meteorological organizations have used respective base periods for global mean surface temperature datasets, such as 1951–1980 (NASA GISS and Berkeley Earth), 1961–1990
https://en.wikipedia.org/wiki/Video%20spectroscopy
Video spectroscopy combines spectroscopic measurements with video technique. This technology has resulted from recent developments in hyperspectral imaging. A video capable imaging spectrometer can work like a camcorder and provide full frame spectral images in real-time that enables advanced (vehicle based) mobility and hand-held imaging spectroscopy. Unlike hyperspectral line scanners, a video spectrometer can spectrally capture randomly and quickly moving objects and processes. The product of a conventional hyperspectral line scanner has typically been called a hyperspectral data cube. A video spectrometer produces a spectral image data series at much higher speeds (1 ms) and frequencies (25 Hz) that is called a hyperspectral video. This technology can initiate novel solutions and challenges in spectral tracking, field spectroscopy, spectral mobile mapping, real-time spectral monitoring and many other applications. See also Snapshot hyperspectral imaging Hyperspectral imaging Imaging spectroscopy Hyperspectral systems
https://en.wikipedia.org/wiki/Hadrosaurus%20Foulkii%20Leidy%20Site
The Hadrosaurus foulkii Leidy Site is a historic paleontological site in Haddonfield, Camden County, New Jersey. Now set in state-owned parkland, it is where the first relatively complete set of dinosaur bones were discovered in 1838, and then fully excavated by William Parker Foulke in 1858. The dinosaur was later named Hadrosaurus foulkii by Joseph Leidy. The site, designated a National Historic Landmark in 1994, is now a small park known as "Hadrosaurus Park" and is accessed at the eastern end of Maple Avenue in northern Haddonfield. History William Parker Foulke, an attorney and amateur paleontologist affiliated with Philadelphia's Academy of Natural Sciences, was vacationing in Haddonfield in 1858, when he was alerted to the discovery in 1838 of large bones on the farm of Joseph Hopkins. Hopkins and farm workers had been quarrying marl when they uncovered bones resembling vertebrae. Foulke proceeded to direct a careful excavation in the area surrounding Hopkins' marl pit, turning the finds over to Dr. Joseph Leidy for analysis. Foulke unearthed 35 of an estimated 80 bones from the Hadrosaurus, which is believed to have been herbivorous, 7 meters in length, and weigh 2.5 tons. It lived during the Cretaceous period, 73 million years ago. Leidy published an analysis in 1865, and oversaw the creation of a reconstructed skeleton of the creature found in 1868. This reconstruction, put on public display at the Academy, brought the find a wider public audience. The site lingered in obscurity until 1984 when a local Boy Scout from Troop 65, Christopher Brees, as part of an Eagle Scout project researched the site and generated publicity, eventually leading to the species being designated the official dinosaur of New Jersey. See also List of National Historic Landmarks in New Jersey National Register of Historic Places listings in Camden County, New Jersey
https://en.wikipedia.org/wiki/Jungle%20computing
Jungle computing is a form of high performance computing that distributes computational work across cluster, grid and cloud computing. The increasing complexity of the high performance computing environment has provided a range of choices beside traditional supercomputers and clusters. Scientists can now use grid and cloud infrastructures, in a variety of combinations along with traditional supercomputers - all connected via fast networks. And the emergence of many-core technologies such as GPUs, as well as supercomputers on chip within these environments has added to the complexity. Thus, high-performance computing can now use multiple diverse platforms and systems simultaneously, giving rise to the term "computing jungle". See also Heterogeneous computing
https://en.wikipedia.org/wiki/Optical%20tomography
Optical tomography is a form of computed tomography that creates a digital volumetric model of an object by reconstructing images made from light transmitted and scattered through an object. Optical tomography is used mostly in medical imaging research. Optical tomography in industry is used as a sensor of thickness and internal structure of semiconductors. Principle Optical tomography relies on the object under study being at least partially light-transmitting or translucent, so it works best on soft tissue, such as breast and brain tissue. The high scatter-based attenuation involved is generally dealt with by using intense, often pulsed or intensity modulated, light sources, and highly sensitive light sensors, and the use of infrared light at frequencies where body tissues are most transmissive. Soft tissues are highly scattering but weakly absorbing in the near-infrared and red parts of the spectrum, so that this is the wavelength range usually used. Types Diffuse optical tomography In near-infrared diffuse optical tomography (DOT), transmitted diffuse photons are collected and a diffusion equation is used to reconstruct an image from them. Time-of-flight diffuse optical tomography A variant of optical tomography uses optical time-of-flight sampling as an attempt to distinguish transmitted light from scattered light. This concept has been used in several academic and commercial systems for breast cancer imaging and cerebral measurement. The key to separation of absorption from scatter is the use of either time-resolved or frequency domain data which is then matched with a diffusion theory based estimate of how the light propagated through the tissue. The measurement of time of flight or frequency domain phase shift is essential to allow separation of absorption from scatter with reasonable accuracy. Fluorescence molecular tomography In fluorescence molecular tomography, the fluorescence signal transmitted through the tissue is normalized by the excitation
https://en.wikipedia.org/wiki/Hebrew%20diacritics
Hebrew orthography includes three types of diacritics: Niqqud in Hebrew is the way to indicate vowels, which are omitted in modern orthography, using a set of ancillary glyphs. Since the vowels can be understood from surrounding letters, context can help readers read the correct pronunciations of several letters of the Hebrew alphabet (the rafe sign and other rare glyphs are also listed as part of the niqqud system but are not in common use); geresh and gershayim, two diacritics that are not considered a part of niqqud, each of which has several functions (e.g. to denote Hebrew numerals); and cantillation, "accents" which are used exclusively to indicate how Biblical passages should be chanted and may possess a punctuating function. Several diacritical systems were developed in the Early Middle Ages. The most widespread system, and the only one still used to a significant degree today, was created by the Masoretes of Tiberias in the second half of the first millennium in the Land of Israel (see Masoretic Text, Tiberian Hebrew). The Niqqud signs and cantillation marks developed by the Masoretes are small in size compared to consonants, so they could be added to the consonantal texts without retranscribing them. Pointing (niqqud) In modern Israeli orthography, vowel and consonant pointing is seldom used, except in specialised texts such as dictionaries, poetry, or texts for children or for new immigrants. Israeli Hebrew has five vowel phonemes—, , , and —but many more written symbols for them. Niqqud distinguish the following vowels and consonants; for more detail, see the main article. Note 1: The symbol "ס" represents whatever Hebrew letter is used. Note 2: The letter "ש" is used since it can only be represented by that letter. Note 3: The dagesh, mappiq, and shuruk are different, however, they look the same and are inputted in the same manner. Also, they are represented by the same Unicode character. Note 4: The letter "ו" is used since it can only be repre
https://en.wikipedia.org/wiki/Evaluation%20of%20machine%20translation
Various methods for the evaluation for machine translation have been employed. This article focuses on the evaluation of the output of machine translation, rather than on performance or usability evaluation. Round-trip translation A typical way for lay people to assess machine translation quality is to translate from a source language to a target language and back to the source language with the same engine. Though intuitively this may seem like a good method of evaluation, it has been shown that round-trip translation is a "poor predictor of quality". The reason why it is such a poor predictor of quality is reasonably intuitive. A round-trip translation is not testing one system, but two systems: the language pair of the engine for translating into the target language, and the language pair translating back from the target language. Consider the following examples of round-trip translation performed from English to Italian and Portuguese from Somers (2005): {| !Original text | Select this link to look at our home page. |- !Translated | Selezioni questo collegamento per guardare il nostro Home Page. |- !Translated back | Selections this connection in order to watch our Home Page. |} {| !Original text | Tit for tat |- !Translated | Melharuco para o tat |- !Translated back | Tit for tat |} In the first example, where the text is translated into Italian then back into English—the English text is significantly garbled, but the Italian is a serviceable translation. In the second example, the text translated back into English is perfect, but the Portuguese translation is meaningless; the program thought "tit" was a reference to a tit (bird), which was intended for a "tat", a word it did not understand. While round-trip translation may be useful to generate a "surplus of fun," the methodology is deficient for serious study of machine translation quality. Human evaluation This section covers two of the large scale evaluation studies that have had significant
https://en.wikipedia.org/wiki/Sky%20and%20Water%20II
Sky and Water II is a lithograph print by the Dutch artist M. C. Escher first printed in 1938. It is similar to the woodcut Sky and Water I, which was first printed only months earlier. See also Tessellation Sources M. C. Escher—The Graphic Work; Taschen Publishers. M. C. Escher—29 Master Prints; Harry N. Abrams, Inc., Publishers. Works by M. C. Escher 1938 paintings Fish in art Birds in art he:שמים ומים#שמים ומים 2
https://en.wikipedia.org/wiki/Lanthanum%20pentanickel
LaNi5 is a hexagonal intermetallic compound composed of rare earth element lanthanum and transition metal nickel. It presents a calcium pentacopper (CaCu5) crystal structure. It is a melting compound with the same composition and has hydrogen storage capacity. Structure LaNi5 has a calcium pentacopper (CaCu5) type crystal structure, with a hexagonal lattice, space group is P6/mmm (No. 191), with lanthanum atom is located at coordinate origin 1a (0,0,0), two nickel atoms are located at 2c (1/ 3,2/3,0) and (2/3,1/3,0), the other three at 3g (1/2,0,1/2), (0,1/2,1/2), (1/2,1/2,1/2), with a=511pm, c=397pm. The unit cell contains 1 LaNi5 atom, the volume is 90×10−24 cm3, the LaNi5 unit cell contains a larger The six deformed tetrahedral voids can be used to fill in hydrogen atoms. Chemical reactions As a hydrogen storage alloy, LaNi5 can absorb hydrogen to form the hydride LaNi5Hx (x≈6) when the pressure is slightly high and the temperature is low, or when the pressure decreases or the temperature increases, hydrogen can be released to form repeated absorption and release of hydrogen. But for the dehydrogenation process, because it is an endothermic reaction, in order to enable the reaction to proceed, the necessary energy must be added, otherwise the reaction will stop due to the decrease in temperature. Characteristics and applications The hydrogen storage density per unit volume (crystal) of LaNi5H6.5 at 2 bar is equal to the density of gaseous molecular hydrogen at 1800 bar, and all hydrogen can be desorbed at 2 bar. Although the hydrogen storage density in practical applications is reduced due to the aggregation of some LaNi5 powders, it is still higher than the density of liquid hydrogen. This allows safe operation of hydrogen fuel. In order to improve its hydrogen storage performance, metals such as lead or manganese are often used to partially replace nickel. Currently, LaNi5 is commonly used in storage and transportation of hydrogen, hydrogen vehicle pow
https://en.wikipedia.org/wiki/Allergy%20test
Allergy testing can help confirm or rule out allergies and consequently reduce adverse reactions and limit unnecessary avoidance and medications. Correct allergy diagnosis, counseling and avoidance advice based on valid allergy test results is of utmost importance and can help reduce the incidence of symptoms, and the need for medications and improve quality of life. A healthcare provider can use the test results to identify the specific allergic triggers that may be contributing to the symptoms. Using this information, along with a physical examination and case history, the doctor can diagnose the cause of the symptoms and tailor treatments that will help the patient feel better. A negative result can help the doctor rule out allergies in order to consider other possibilities. Ruling out allergies is as important as confirming them to limit unnecessary avoidance, worry and negative social impact. Types of tests NIH guidelines for the diagnosis and management of food allergy and the diagnosis and management of asthma recommend either allergy blood testing or skin prick testing to reliably determine allergic sensitization. Blood test For an allergy blood test, a sample of the patient's blood is sent to a laboratory for analysis. Allergy blood tests measure the presence of IgE antibodies to specific foods, pollens, mites, animals, insects and other environmental factors. (IgE, short for "immunoglobulin E", is the antibody that triggers food allergy symptoms.) The doctor looks at the test results to help determine if the patient has allergies. Allergy blood tests are not affected by antihistamine use and can be performed for people with extensive rashes that prevent using skin prick tests. For babies and young children, a single needle stick for allergy blood testing is often more gentle than several skin tests. Skin allergy test Skin allergy testing comprises a range of methods for medical diagnosis of allergies that attempts to provoke a small, controlled,
https://en.wikipedia.org/wiki/Telefunken%20FuBK
The Telefunken FuBK (from the German Funkbetriebskommission for "Television Service Commission") is an electronic analogue television test card developed by AEG-Telefunken and Bosch Fernseh in West Germany as the successor to the monochrome T05 test card in the late-1960s and used with analogue 625-lines PAL broadcasts. Not as popular as the Philips PM5544, nevertheless it saw widespread use in West Germany (and later reunified Germany) and some other European, Asian, South American and African countries, and by a few commercial TV stations in Australia. Physical equipment The test card was generated electronically by several video-signal generators, including two variations of the Philips PM5644 generator (PM5644G/50 {PAL B/G} and PM5644G/70 {YCbCr}) and the Rohde & Schwarz SGPF-B3 (the Grundig VG 1001 test signal generator has a different pattern design, but is sometimes indicated as "FuBk" because it features similar test elements). It has also been used in conjunction with digital broadcasts by means of the PT5300 from ProTeleVision/DK Technologies. Test card features Some elements present on the FuBK test card are: Cross hatch - makes up the background of the table, with 19x15 white lines over a dark gray (25% luminance) background, allowing adjustment of CRT convergence and focus; Circle - provide a way to correct vertical and horizontal raster scan geometrical distortions; Colour bars - EBU colour bars at 75% luminance (75/0/75/0) to adjust colour saturation and purity Grey staircase - five bars (0%, 25%, 50%, 75%, 100%) that allow setting brightness, linearity and contrast control 2T convergence cross - check for signal reflections and group delay, help with geometrical image centering Multiburst- four grating with sine curves at 1, 2, 3 and 4.433 MHz, as a test of horizontal resolution Black section- check for reflections, transient response and group delay ±V/ +U ramp - two lines that allow checking PAL decoder linearity with UV signals +V/ ±U anti
https://en.wikipedia.org/wiki/Service%20assurance
Service assurance, in telecommunications, is the application of policies and processes by a Communications Service Provider (CSP) to ensure that services offered over networks meet a pre-defined service quality level for an optimal subscriber experience. The practice of service assurance enables CSPs to identify faults in the network and resolve these issues in a timely manner so as to minimize service downtime. The practice also includes policies and processes to proactively pinpoint, diagnose and resolve service quality degradations or device malfunctions before subscribers are impacted. Areas covered Service assurance encompasses the following: Fault and event management Performance management Probe monitoring Quality of service (QoS) management Network and service testing Network traffic management Customer experience management Service level agreement (SLA) monitoring Trouble ticket management Adoption There are many drivers for service assurance adoption, with some considering the most important to be the ability to measure the performance of a service. A subscriber’s service experience quality can be directly linked to customer churn. Therefore, maintaining satisfactory service quality levels is key to creating “customer stickiness.” Other factors driving growing interest in service assurance include increasing competition, new challenges due to the convergence of networks, services, applications and devices, enabling services over IP and the merging of IT and telecommunications services. But ultimately, it is the CSP’s ability to ensure a satisfactory level of QoS that will have the greatest impact on revenue. The importance of service performance is also reinforced by research stating that two thirds of subscribers will stop trying a new service after two failed attempts with that service. Therefore, it is increasingly apparent that service assurance tools must be put in place prior to the introduction of a new service if it is to be succes
https://en.wikipedia.org/wiki/Sniper%20Fury
Sniper Fury is an online single player video game developed and published by Gameloft. The action of Sniper Fury takes place in the near future. Technological development and geopolitical changes rendered former methods of resolving conflicts obsolete. Countries, corporations, and organizations employ services of highly trained professionals, who can eliminate specific targets with surgical precision. Gameplay The game revolves around mechanics common for most sniper games, where the player has to eliminate a great majority of his targets from long distance. To complete a task, the player can use a variety of futuristic gadgets, e.g. a detection device that will tell the location of every nearby human, or stimulants, which will boost reflexes to supernatural levels. Release Sniper Fury was released on 2 December 2015 for Android, iOS and Windows Phone. The Steam version was released on 13 June 2017. Reception Sniper Fury received "mixed or average" reviews, according to review aggregator Metacritic.
https://en.wikipedia.org/wiki/Nematode
The nematodes ( or ; ; ) roundworms or eelworms, constitute the phylum Nematoda. They are a diverse animal phylum inhabiting a broad range of environments. Most species are free-living, feeding on microorganisms, but there are many that are parasitic. The parasitic worms (helminths) are the cause of soil-transmitted helminthiases. They are taxonomically classified along with arthropods, tardigrades and other moulting animals in the clade Ecdysozoa. Unlike the vaguely similar flatworms, nematodes have a tubular digestive system, with openings at both ends. Like tardigrades, they have a reduced number of Hox genes, but their sister phylum Nematomorpha has kept the ancestral protostome Hox genotype, which shows that the reduction has occurred within the nematode phylum. Nematode species can be difficult to distinguish from one another. Consequently, estimates of the number of nematode species are uncertain. A 2013 survey of animal biodiversity published in the mega journal Zootaxa puts this figure at over 25,000. Estimates of the total number of extant species are subject to even greater variation. A widely referenced article published in 1993 estimated there may be over 1 million species of nematode. A subsequent publication challenged this claim, estimating the figure to be at least 40,000 species. Although the highest estimates (up to 100 million species) have since been deprecated, estimates supported by rarefaction curves, together with the use of DNA barcoding and the increasing acknowledgment of widespread cryptic species among nematodes, have placed the figure closer to 1 million species. Nematodes have successfully adapted to nearly every ecosystem: from marine (salt) to fresh water, soils, from the polar regions to the tropics, as well as the highest to the lowest of elevations. They are ubiquitous in freshwater, marine, and terrestrial environments, where they often outnumber other animals in both individual and species counts, and are found in locations
https://en.wikipedia.org/wiki/P4%20%28programming%20language%29
P4 is a programming language for controlling packet forwarding planes in networking devices, such as routers and switches. In contrast to a general purpose language such as C or Python, P4 is a domain-specific language with a number of constructs optimized for network data forwarding. P4 is distributed as open-source, permissively licensed code, and is maintained by the P4 Project (formerly the P4 Language Consortium), a not-for-profit organization hosted by the Open Networking Foundation. History P4 was originally described in a 2014 SIGCOMM CCR paper titled “Programming Protocol-Independent Packet Processors”—the alliterative name shortens to "P4". The first P4 workshop took place in June 2015 at Stanford University. An updated specification of P4, called P4-16, was released between 2016 and 2017, replacing P4-14, the original specification of P4. Design As the language is specifically targeted at packet forwarding applications, the list of requirements or design choices is somewhat specific to those use cases. The language is designed to meet several goals: Target independence P4 programs are designed to be implementation-independent: they can be compiled against many different types of execution machines such as general-purpose CPUs, FPGAs, system(s)-on-chip, network processors, and ASICs. These different types of machines are known as P4 targets, and each target must be provided along with a compiler that maps the P4 source code into a target switch model. The compiler may be embedded in the target device, an externally running software, or even a cloud service. As many of the initial targets for P4 programs were used for simple packet switching it is very common to hear the term "P4 switch" used, even though "P4 target" is more formally correct. Protocol independence P4 is designed to be protocol-independent: the language has no native support for even common protocols such as IP, Ethernet, TCP, VxLAN, or MPLS. Instead, the P4 programmer describes the
https://en.wikipedia.org/wiki/Ayellet%20Tal
Ayellet Tal (born 1962) is an Israeli researcher in computational geometry and computer graphics who holds the Alfred and Marion Bar Chair in Engineering at the Technion. Research Tal's research interests include computational geometry, computer graphics, geometric modeling, and geometry processing. She has also studied the applications of computer vision to archaeology. Education and career Tal has a bachelor's degree in mathematics and computer science from Tel Aviv University and a Ph.D. in 1995 in computer science from Princeton University. Her dissertation, Animation and Visualization of Geometric Algorithms, was supervised by David P. Dobkin. She is a professor of electrical engineering at the Technion – Israel Institute of Technology, and holds the Alfred and Marion Bar Chair in Engineering at the Technion. At the Technion, she is also the advisor for the advancement of women in science and engineering at the university. Recognition Tal was a keynote speaker at Computer Graphics International 2015.
https://en.wikipedia.org/wiki/Superior%20rectal%20vein
The inferior mesenteric vein begins in the rectum as the superior rectal vein (superior hemorrhoidal vein), which has its origin in the hemorrhoidal plexus, and through this plexus communicates with the middle and inferior hemorrhoidal veins. The superior rectal vein leaves the lesser pelvis and crosses the left common iliac vessels with the superior rectal artery, and is continued upward as the inferior mesenteric vein.
https://en.wikipedia.org/wiki/Cipher%20Bureau%20%28film%29
Cipher Bureau is a 1938 American film directed by Charles Lamont. The film was successful enough to elicit a sequel, Panama Patrol. Plot Philip Waring, the head of a listening agency in Washington D.C., is dedicated to breaking up a foreign radio-spy ring. He enlists his naval-officer brother and tangles with beautiful spies. Cast Leon Ames as Philip Waring Charlotte Wynters as Helen Lane Joan Woodbury as Therese Brahm Don Dillaway as Paul Waring Gustav von Seyffertitz as Albert Grood Tenen Holtz as Simon Herrick Walter Bonn as Anton Decker Si Wills as Lt. Clarke George Lynn as Lt. Tydall Jason Robards as Ellsworth Sidney Miller as Jimmy Hooper Atchley as Commander Nash Robert Frazer as Paul's counsel External links Turner Classic Movies page 1938 films American black-and-white films Films directed by Charles Lamont Grand National Films films 1938 drama films American drama films Cryptography in fiction 1930s English-language films 1930s American films
https://en.wikipedia.org/wiki/AdS%20black%20brane
An anti de Sitter black brane is a solution of the Einstein equations in the presence of a negative cosmological constant which possesses a planar event horizon. This is distinct from an anti de Sitter black hole solution which has a spherical event horizon. The negative cosmological constant implies that the spacetime will asymptote to an anti de Sitter spacetime at spatial infinity. Math development The Einstein equation is given bywhere is the Ricci curvature tensor, R is the Ricci scalar, is the cosmological constant and is the metric we are solving for. We will work in d spacetime dimensions with coordinates where and . The line element for a spacetime that is stationary, time reversal invariant, space inversion invariant, rotationally invariant and translationally invariant in the directions is given by,. Replacing the cosmological constant with a length scale L, we find that, with and integration constants, is a solution to the Einstein equation. The integration constant is associated with a residual symmetry associated with a rescaling of the time coordinate. If we require that the line element takes the form, , when r goes to infinity, then we must set . The point represents a curvature singularity and the point is a coordinate singularity when . To see this, we switch to the coordinate system where and is defined by the differential equation,.The line element in this coordinate system is given by,,which is regular at . The surface is an event horizon.
https://en.wikipedia.org/wiki/Multiple%20complex%20developmental%20disorder
Multiple complex developmental disorder (MCDD) is a research category, proposed to involve several neurological and psychological symptoms where at least some symptoms are first noticed during early childhood and persist throughout life. It was originally suggested to be a subtype of pervasive developmental disorders (PDD) with co-morbid schizophrenia or another psychotic disorder; however, there is some controversy that not everyone with MCDD meets criteria for both PDD and psychosis. The term multiplex developmental disorder was coined by Donald J. Cohen in 1986. Diagnostic criteria The current diagnostic criteria for MCDD are a matter of debate due to it not being in the DSM-V or ICD-10. Various websites contain various diagnostic criteria. At least three of the following categories should be present. Co-occurring clusters of symptoms must also not be better explained by being symptoms of another disorder such as experiencing mood swings due to autism, cognitive difficulties due to schizophrenia, and so on. The exact diagnostic criteria for MCDD remain unclear but may be a useful diagnosis for people who do not fall into any specific category. It could also be argued that MCDD is a vague and unhelpful term for these patients. Psychotic symptoms Criteria are met for a psychotic disorder. Some symptoms may include: Delusions, such as thought insertion, paranoid preoccupations, fantasies of personal omnipotence, over engagement with fantasy figures, grandiose fantasies of special powers, referential ideation, and confusion between fantasy and real life. Hallucinations and/or unusual perceptual experiences. Negative symptoms (anhedonia, affective flattening, alogia, avolition) Disorganized behavior and/or speech such as thought disorder, easy confusability, inappropriate emotions/facial expressions, uncontrollable laughter, etc. Catatonic behavior. Affective and behavioral symptoms These symptoms are not due to situations such as, person is depressed because of
https://en.wikipedia.org/wiki/Continuum%20%28sculpture%29
Continuum is a public artwork by American sculptor Charles O. Perry located in front of the National Air and Space Museum in Washington, DC, United States. Description The sculpture is a large swirling abstract that consists of 8 bronze pieces painted black and placed on a pole. It moves freely. Information According to the artist the piece "began as an exploration of the Möbius strip, a product of pure mathematics formed by joining two ends of a strip of paper after giving one end a 180-degree twist, thus creating only one edge. The center of the bronze sculpture symbolizes a black hole, while the edge shows the flow of matter through the center from positive to negative space and back again in a continuum." A similar sculpture by Perry, Continuum II, is installed in Marina Square in Singapore and dates to 1986. Condition In July 2010 the piece underwent restoration to remove a green patina that formed on the sculpture. Perry's vision was for the piece to remain black. The piece was removed from its location to the west end of the building where it underwent its conservation by a contractor. The granite base that holds the 7,000 pound sculpture was also repaired. See also Ad Astra (Lippold sculpture) Delta Solar List of public art in Washington, D.C., Ward 2
https://en.wikipedia.org/wiki/Gravitational%20potential
In classical mechanics, the gravitational potential is a scalar field associating with each point in space the work (energy transferred) per unit mass that would be needed to move an object to that point from a fixed reference point. It is analogous to the electric potential with mass playing the role of charge. The reference point, where the potential is zero, is by convention infinitely far away from any mass, resulting in a negative potential at any finite distance. In mathematics, the gravitational potential is also known as the Newtonian potential and is fundamental in the study of potential theory. It may also be used for solving the electrostatic and magnetostatic fields generated by uniformly charged or polarized ellipsoidal bodies. Potential energy The gravitational potential (V) at a location is the gravitational potential energy (U) at that location per unit mass: where m is the mass of the object. Potential energy is equal (in magnitude, but negative) to the work done by the gravitational field moving a body to its given position in space from infinity. If the body has a mass of 1 kilogram, then the potential energy to be assigned to that body is equal to the gravitational potential. So the potential can be interpreted as the negative of the work done by the gravitational field moving a unit mass in from infinity. In some situations, the equations can be simplified by assuming a field that is nearly independent of position. For instance, in a region close to the surface of the Earth, the gravitational acceleration, g, can be considered constant. In that case, the difference in potential energy from one height to another is, to a good approximation, linearly related to the difference in height: Mathematical form The gravitational potential V at a distance x from a point mass of mass M can be defined as the work W that needs to be done by an external agent to bring a unit mass in from infinity to that point: where G is the gravitational constant, an
https://en.wikipedia.org/wiki/John%20Billingham
Dr. John Billingham, BM BCh, (March 18, 1930 – August 4, 2013) was a British Physician and later director of the SETI Program Office and Director of the Life Sciences Division at the NASA Ames Research Center in the USA. After retiring from NASA he became a Trustee of the SETI Institute Board of Directors. He was born in Worcester, England in 1930 and educated at the Royal Grammar School Worcester. From there he went on to University College, Oxford to study physiology. He gained a BM BCh degree from Oxford and Guy's Hospital, London (which is equivalent to an M.D. in the US). He served as a medical officer with the Royal Air Force (RAF) for seven years, rising to the rank of Squadron Leader (equivalent to Major in the USAF). In 1963, he was invited to join NASA’s Lyndon B. Johnson Space Center in Houston, Texas, where he headed the Environmental Physiology Branch, and worked on the Mercury, Gemini and Apollo programs. In 1965 he moved to the NASA Ames Research Center in California, where he headed up the Biotechnology Division, then the Extraterrestrial Research Division, and later the Life Science Division. In 1977 he appeared in the television documentary Mysteries of the Gods hosted by William Shatner to outline the projected search for extraterrestrial life that would later become Project Cyclops. In 2009 he was inducted into the NASA Ames Hall of Fame where he was recognized for his efforts as the Father of SETI in NASA. After retiring from NASA he joined the SETI Institute as Senior Scientist, and in 1995 he became a Member of the SETI Institute's Board of Trustees, serving a term as Vice-Chair. He was also one of the people behind Project Cyclops. He died at the age of 83 in Grass Valley, California in August 2013.
https://en.wikipedia.org/wiki/Event-driven%20SOA
Event-driven SOA is a form of service-oriented architecture (SOA), combining the intelligence and proactiveness of event-driven architecture with the organizational capabilities found in service offerings. Before event-driven SOA, the typical SOA platform orchestrated services centrally, through pre-defined business processes, assuming that what should have already been triggered is defined in a business process. This older approach (sometimes called SOA 1.0) does not account for events that occur across, or outside of, specific business processes. Thus complex events, in which a pattern of activities—both non-scheduled and scheduled—should trigger a set of services is not accounted for in traditional SOA 1.0 architecture. SOA 2.0 SOA 2.0 architecture, ("event-driven SOA"), lets business users monitor, analyze, and enrich events to make the connections among disparate events that do not at first appear to be intuitively obvious. This makes these enriched events visible to others, especially business analysts or marketing directors, and also allows the SOA 2.0 system to possibly automate actions to take to address some unique pattern. SOA 2.0 is the ability to create high-level business events from numerous low-level system events. Events are created by filtering real-time data (from middleware, applications, databases, and Web services, for example) and infusing it with defining detail such as dependencies or causal relationships discovered by correlating other events. If it's clear, through the enriched events that are produced by an SOA 2.0 environment, that customer shopping cart abandonment rate has escalated in the last few days, a notification to the marketing department could initiate research into what competitors have done to cause customers to buy products elsewhere. Was there a common product in most shopping carts? If so, what are the prices that are being offered by the competition? In practice, this relationship of streamed events is processed thr
https://en.wikipedia.org/wiki/Ladder%20operator
In linear algebra (and its application to quantum mechanics), a raising or lowering operator (collectively known as ladder operators) is an operator that increases or decreases the eigenvalue of another operator. In quantum mechanics, the raising operator is sometimes called the creation operator, and the lowering operator the annihilation operator. Well-known applications of ladder operators in quantum mechanics are in the formalisms of the quantum harmonic oscillator and angular momentum. Terminology There is some confusion regarding the relationship between the raising and lowering ladder operators and the creation and annihilation operators commonly used in quantum field theory. The creation operator ai† increments the number of particles in state i, while the corresponding annihilation operator ai decrements the number of particles in state i. This clearly satisfies the requirements of the above definition of a ladder operator: the incrementing or decrementing of the eigenvalue of another operator (in this case the particle number operator). Confusion arises because the term ladder operator is typically used to describe an operator that acts to increment or decrement a quantum number describing the state of a system. To change the state of a particle with the creation/annihilation operators of QFT requires the use of both annihilation and creation operators. An annihilation operator is used to remove a particle from the initial state and a creation operator is used to add a particle to the final state. The term "ladder operator" is also sometimes used in mathematics, in the context of the theory of Lie algebras and in particular the affine Lie algebras, to describe the su(2) subalgebras, from which the root system and the highest weight modules can be constructed by means of the ladder operators. In particular, the highest weight is annihilated by the raising operators; the rest of the positive root space is obtained by repeatedly applying the lowering
https://en.wikipedia.org/wiki/Abuse%20of%20notation
In mathematics, abuse of notation occurs when an author uses a mathematical notation in a way that is not entirely formally correct, but which might help simplify the exposition or suggest the correct intuition (while possibly minimizing errors and confusion at the same time). However, since the concept of formal/syntactical correctness depends on both time and context, certain notations in mathematics that are flagged as abuse in one context could be formally correct in one or more other contexts. Time-dependent abuses of notation may occur when novel notations are introduced to a theory some time before the theory is first formalized; these may be formally corrected by solidifying and/or otherwise improving the theory. Abuse of notation should be contrasted with misuse of notation, which does not have the presentational benefits of the former and should be avoided (such as the misuse of constants of integration). A related concept is abuse of language or abuse of terminology, where a term — rather than a notation — is misused. Abuse of language is an almost synonymous expression for abuses that are non-notational by nature. For example, while the word representation properly designates a group homomorphism from a group G to GL(V), where V is a vector space, it is common to call V "a representation of G". Another common abuse of language consists in identifying two mathematical objects that are different, but canonically isomorphic. Other examples include identifying a constant function with its value, identifying a group with a binary operation with the name of its underlying set, or identifying to the Euclidean space of dimension three equipped with a Cartesian coordinate system. Examples Structured mathematical objects Many mathematical objects consist of a set, often called the underlying set, equipped with some additional structure, such as a mathematical operation or a topology. It is a common abuse of notation to use the same notation for the underlying
https://en.wikipedia.org/wiki/SWAC%20%28computer%29
The SWAC (Standards Western Automatic Computer) was an early electronic digital computer built in 1950 by the U.S. National Bureau of Standards (NBS) in Los Angeles, California. It was designed by Harry Huskey. Overview Like the SEAC which was built about the same time, the SWAC was a small-scale interim computer designed to be built quickly and put into operation while the NBS waited for more powerful computers to be completed (in particular, the RAYDAC by Raytheon). The machine used 2,300 vacuum tubes. It had 256 words of memory, using Williams tubes, with each word being 37 bits. It had only seven basic operations: add, subtract, and fixed-point multiply; comparison, data extraction, input and output. Several years later, drum memory was added. When the SWAC was completed in August 1950, it was the fastest computer in the world. It continued to hold that status until the IAS computer was completed a year later. It could add two numbers and store the result in 64 microseconds. A similar multiplication took 384 microseconds. It was used by the NBS until 1954 when the Los Angeles office was closed, and then by UCLA until 1967 (with modifications). It was charged out there for $40 per hour. In January 1952, Raphael M. Robinson used the SWAC to discover five Mersenne primes—the largest prime numbers known at the time, with 157, 183, 386, 664 and 687 digits. Additionally, the SWAC was vital in doing the intense calculation required for the X-ray analysis of the structure of vitamin B12 done by Dorothy Hodgkin. This was fundamental in Hodgkin receiving the Nobel Prize in Chemistry in 1964. See also List of vacuum tube computers
https://en.wikipedia.org/wiki/Omphalolith
An omphalolith or umbolith or omphalith or navel stone or umbilical concretion is a periumbilical mass that may form due to the accumulation of sebum and keratin. The colour is black or brown, and may be related to the skin type of the patient. It may resemble a malignant melanoma. It may be caused by poor hygiene, and may form in retracted navels in obese people. Etymology The name was derived from the Greek words omphalos (), meaning navel, and lithos (), meaning stone.
https://en.wikipedia.org/wiki/Irish%20logarithm
Irish logarithms were a system of number manipulation invented by Percy Ludgate for machine multiplication. The system used a combination of mechanical cams as look-up tables and mechanical addition to sum pseudo-logarithmic indices to produce partial products, which were then added to produce results. The technique is similar to Zech logarithms (also known as Jacobi logarithms), but uses a system of indices original to Ludgate. Ludgate's algorithm compresses the multiplication of two single decimal numbers into two table lookups (to convert the digits into indices), the addition of the two indices to create a new index which is input to a second lookup table that generates the output product. Because both lookup tables are one-dimensional, and the addition of linear movements is simple to implement mechanically, this allows a less complex mechanism than would be needed to implement a two-dimensional 10×10 multiplication lookup table. Ledgate stated that he deliberately chose the values in his tables to be as small as he could make them; given this fact Ludgate's tables can be simply constructed from first principles, either via pen-and-paper methods, or a systematic search using only a few tens of lines of program code. They do not correspond to either Zech logarithms, Remak indexes or Korn indexes. Pseudocode The following is an implementation of Ludgate's Irish logarithm algorithm in the Python programming language: table1 = [50, 0, 1, 7, 2, 23, 8, 33, 3, 14] table2 = [ 1, 2, 4, 8, 16, 32, 64, 3, 6, 12, 24, 48, 0, 0, 9, 18, 36, 72, 0, 0, 0, 27, 54, 5, 10, 20, 40, 0, 81, 0, 15, 30, 0, 7, 14, 28, 56, 45, 0, 0, 21, 42, 0, 0, 0, 0, 25, 63, 0, 0, 0, 0, 0, 0, 0, 0, 35, 0, 0, 0, 0, 0, 0, 0, 0, 0, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
https://en.wikipedia.org/wiki/Pirsonia
Pirsonia is a non photosynthetic genus of heterokonts. It comprises the entirety of the family Pirsoniaceae, order Pirsoniida and class Pirsonea in the subphylum Bigyromonada, phylum Gyrista. Taxonomy Class Pirsonea Cavalier-Smith 2017 [Pirsoniomycetes] Order Pirsoniales Cavalier-Smith 1998 [Pirsoniida Cavalier-Smith & Chao 2006] Family Pirsoniaceae Cavalier-Smith 1998 Pirsonia Schnepf, Debres & Elbrachter 1990 P. diadema Kühn 1996 P. eucampiae Kühn 1996 P. formosa Kühn 1996 P. guinardie Schnepf, Debres & Elbrachter 1990 P. mucosa Kühn 1996 P. punctigerae P. verrucosa Kühn 1996
https://en.wikipedia.org/wiki/Normally%20hyperbolic%20invariant%20manifold
A normally hyperbolic invariant manifold (NHIM) is a natural generalization of a hyperbolic fixed point and a hyperbolic set. The difference can be described heuristically as follows: For a manifold to be normally hyperbolic we are allowed to assume that the dynamics of itself is neutral compared with the dynamics nearby, which is not allowed for a hyperbolic set. NHIMs were introduced by Neil Fenichel in 1972. In this and subsequent papers, Fenichel proves that NHIMs possess stable and unstable manifolds and more importantly, NHIMs and their stable and unstable manifolds persist under small perturbations. Thus, in problems involving perturbation theory, invariant manifolds exist with certain hyperbolicity properties, which can in turn be used to obtain qualitative information about a dynamical system. Definition Let M be a compact smooth manifold, f: M → M a diffeomorphism, and Df: TM → TM the differential of f. An f-invariant submanifold Λ of M is said to be a normally hyperbolic invariant manifold if the restriction to Λ of the tangent bundle of M admits a splitting into a sum of three Df-invariant subbundles, one being the tangent bundle of , the others being the stable bundle and the unstable bundle and denoted Es and Eu, respectively. With respect to some Riemannian metric on M, the restriction of Df to Es must be a contraction and the restriction of Df to Eu must be an expansion, and must be relatively neutral on . Thus, there exist constants and c > 0 such that and See also Stable manifold Center manifold Hyperbolic fixed point Hyperbolic set Hyperbolic Lagrangian coherent structures
https://en.wikipedia.org/wiki/Proxy%20pattern
In computer programming, the proxy pattern is a software design pattern. A proxy, in its most general form, is a class functioning as an interface to something else. The proxy could interface to anything: a network connection, a large object in memory, a file, or some other resource that is expensive or impossible to duplicate. In short, a proxy is a wrapper or agent object that is being called by the client to access the real serving object behind the scenes. Use of the proxy can simply be forwarding to the real object, or can provide additional logic. In the proxy, extra functionality can be provided, for example caching when operations on the real object are resource intensive, or checking preconditions before operations on the real object are invoked. For the client, usage of a proxy object is similar to using the real object, because both implement the same interface. Overview The Proxy design pattern is one of the twenty-three well-known GoF design patterns that describe how to solve recurring design problems to design flexible and reusable object-oriented software, that is, objects that are easier to implement, change, test, and reuse. What problems can the Proxy design pattern solve? The access to an object should be controlled. Additional functionality should be provided when accessing an object. When accessing sensitive objects, for example, it should be possible to check that clients have the needed access rights. What solution does the Proxy design pattern describe? Define a separate Proxy object that can be used as substitute for another object (Subject) and implements additional functionality to control the access to this subject. This makes it possible to work through a Proxy object to perform additional functionality when accessing a subject. For example, to check the access rights of clients accessing a sensitive object. To act as substitute for a subject, a proxy must implement the Subject interface. Clients can't tell whether th
https://en.wikipedia.org/wiki/J%C3%A1n%20Min%C3%A1%C4%8D
Ján Mináč (born 15 June 1953) is a Canadian mathematician who is a professor of mathematics at The University of Western Ontario. His research interests include Galois groups, Galois cohomology, quadratic forms, and nonlinear dynamics. Early life and education Mináč received his bachelor's degree and his master's level RNDr. degree from from Comenius University, Czechoslovakia in 1976 and 1977 respectively. He then earned his Ph.D. in 1986 from Queen’s University in Canada under the supervision of Paulo Ribenboim. The title of his thesis is "Galois Groups, Order Spaces, and Valuations". His brother Matej Mináč is a film director. Career Mináč was a member of Mathematical Sciences Research Institute at Berkeley from 1986 to 1987 and then an NSF Postdoctoral Fellow at the University of California at Berkeley from 1987 to 1989. Afterward, he joined the University of Western Ontario as an assistant professor in 1989. He became an associate professor in 1991 and a full professor in 2003. Research Mináč and Nguyễn Duy Tân formulated the Mináč-Tân conjectures on the vanishing of Massey products over fields and the kernel unipotent conjecture. He has also worked on Galois theory and quadratic forms, Galois Demushkin groups, mild pro-2-groups, Galois modules, small quotients of Absolute Galois groups, ghosts in group cohomology, Koszulity properties of Galois cohomology, and Zassenhaus filtrations. Mináč has also worked on non-linear dynamics in networks and its applications to computational neuroscience. Awards Mináč received the Distinguished Research Professor Award at Western University during the years 2004-2005 and 2020-2021. In 2019, he became a Fellow of the Canadian Mathematical Society. During the year 2022-2023, he was a fellow at the Western Academy for Advanced Research. In 2013 he received an Excellence in Teaching Award from the Canadian Mathematical Society. Mináč also received multiple teaching awards at the University of Western Ontario.
https://en.wikipedia.org/wiki/Human-to-primate%20transmission
Human-to-primate transmission (HPT) is a seldom-remarked epidemiologic vector. It is by definition a cross-species transmission vector. Unsupervised HPT In 1998, The Zoonotic Importance of Mycobacterium Tuberculosis: Transmission From Human to Monkey was noticed. In 2001, scientists noticed that antibodies peculiar to humans were found in macaque monkeys, both wild and domesticated. Of the panel of human viruses studied, measles, influenza A, and parainfluenza 1, 2 and 3 were found in some of the studied animals. In 2006, scientists noticed HPT of measles, rubella, and parainfluenza in the case of performing monkeys, who are "a common phenomena in Asia". In 2015 and again in 2016, scientists found that HPT likely had occurred in the case of Staphylococcus aureus. In 2018, scientists speculated that HPT was likely to have occurred in the case of human malaria parasites. Also in 2018, scientists speculated that an outbreak of tuberculosis among a closed breeding colony of Aotus monkeys was likely due to continuing intermittent HPT exposure.
https://en.wikipedia.org/wiki/Opcode%20table
An opcode table (also called an opcode matrix) is a visual representation of all opcodes in an instruction set. It is arranged such that each axis of the table represents an upper or lower nibble, which combined form the full byte of the opcode. Additional opcode tables can exist for additional instructions created using an opcode prefix. Table values The structure and arrangement of an opcode table appears as follows: Each cell from 00-FF contains information about the operation such as the equivalent assembly instruction corresponding to the opcode, parameters, and CPU cycle counts. External links Game Boy LR35902 opcode table Z80 opcode table Intel x86 opcode table 6502/6510/8500/8502 opcode table Machine code
https://en.wikipedia.org/wiki/Comparison%20of%20content-control%20software%20and%20providers
This is a list of content-control software and services. The software is designed to control what content may or may not be viewed by a reader, especially when used to restrict material delivered over the Internet via the Web, e-mail, or other means. Restrictions can be applied at various levels: a government can apply them nationwide, an ISP can apply them to its clients, an employer to its personnel, a school to its teachers and/or students, a library to its patrons and/or staff, a parent to a child's computer or computer account or an individual to his or her own computer. Programs and services Providers Amesys Awareness Technologies Barracuda Networks Blue Coat Systems CronLab Cyberoam Detica Dope.security Fortinet GoGuardian Huawei Isheriff Lightspeed Systems Retina-X Studios SafeDNS Securly SmoothWall SonicWall Sophos SurfControl Webroot Websense MICT, 456.ir See also Accountability software Ad filtering Computer surveillance Deep packet inspection Deep content inspection Internet censorship Internet safety Parental controls Wordfilter
https://en.wikipedia.org/wiki/Peripheral%20nerve%20interface
A peripheral nerve interface is the bridge between the peripheral nervous system and a computer interface which serves as a bi‐directional information transducer recording and sending signals between the human body and a machine processor. Interfaces to the nervous system usually take the form of electrodes for stimulation and recording, though chemical stimulation and sensing are possible. Research in this area is focused on developing peripheral nerve interfaces for the restoration of function following disease or injury to minimize associated losses. Peripheral nerve interfaces also enable electrical stimulation and recording of the peripheral nervous system to study the form and function of the peripheral nervous system. For example, recent animal studies have demonstrated high accuracy in tracking physiological meaningful measures, like joint angle. Many researchers also focus in the area of neuroprosthesis, linking the human nervous system to bionics in order to mimic natural sensorimotor control and function. Successful implantation of peripheral nerve interfaces depend on a number of factors which include appropriate indication, perioperative testing, differentiated planning, and functional training. Typically microelectrode devices are implanted adjacent to, around or within the nerve trunk to establish contact with the peripheral nervous system. Different approaches may be used depending on the type of signal desired and attainable. Function The primary purpose of a neural interface is to enable two-way exchange of information with the nervous system for a sustained period of time to enable effective and high density stimulation and recording. The peripheral nervous system (PNS) is responsible for relaying information from the brain and spinal cord to the extremities of the body and back. The function of a peripheral nerve interface is to assist the nervous system when peripheral nerve function is compromised. To supplement the roles of the nervous syst
https://en.wikipedia.org/wiki/Southwest%20National%20Primate%20Research%20Center
The Southwest National Primate Research Center (SNPRC) is a federally funded biomedical research facility affiliated with the Texas Biomedical Research Institute. The SNPRC became the seventh National Primate Research Center in 1999. Research The SNPRC has two scientific units: "Infectious Diseases Immunology & Control" and "Comparative Medicine & Health Outcomes". The SNPRC also has a Laboratory Core Services Division, which consists of three laboratories: immunology, research imaging, and pathology. Primates in captivity The center houses over 2,500 non-human primates. Among the primates held in captivity at the SNPRC are baboons, chimpanzees, common marmosets, and rhesus macaques. The center houses over 1,000 baboons, which makes it the world's largest colony of baboons used for biomedical research. Furthermore, the center sells primates from their colonies to other researchers. Incidents and controversies 2014 In 2014, a male baboon was injured in its cage and died after its injuries were uncared for. The injuries went unreported and the baboon went uncared for several days after. As a result, the baboon was emaciated, developed scabs and a large abscess on its leg, and also contracted blood poisoning from which he died. In 2014, a macaque was placed in a new group of other macaques, and sustained several severe injuries during the following year including a tail degloving injury and multiple lacerations to the face and body. A veterinarian recommended that the group be assessed by the facility behavior team, but no assessment was ever conducted. In 2014, the USDA cited the SNPRC for inaccuracies on their 2013 annual report. More specifically, the SNPRC did not accurately report the number of animals which had pain or distress that did not have anesthetic, analgesics or tranquilizing drugs administered. In 2014, a juvenile baboon was killed when a guillotine door fell on the animal. 2015 In 2015, a USDA inspection found that one research protocol contain
https://en.wikipedia.org/wiki/Ectopic%20expression
Ectopic is a word used with a prefix, ecto, meaning “out of place.” Ectopic expression is an abnormal gene expression in a cell type, tissue type, or developmental stage in which the gene is not usually expressed. The term ectopic expression is predominantly used in studies using metazoans, especially in Drosophila melanogaster for research purposes. How is it used Although ectopic expression can be caused by a natural condition, it is uncommonly seen in nature because it is a product of defects in gene regulation. In fact, ectopic expression is more commonly used for research purposes. Artificially induced gene expression helps to determine the function of a gene of interest. Common techniques such as overexpressing or misexpressing the genes by UAS-Gal4 system in D. melanogaster are used. In model organisms, such techniques are used to perform genetic screens to identify a function of the gene involved in specific cellular or developmental processes. Ectopic expression using these techniques is a useful tool because phenotypes induced in a tissue or cell type where are not normally expressed are easily distinguishable compared to a tissue or cell type where the gene is normally expressed. By the comparison with its basal expression, the function of a gene of interest can be identified. Although the understanding of ectopic expressions deals with endogenous genes in an organism, it can be expended to a similar concept like transgenesis, which an exogenous gene is introduced to a cell or tissue type in which the gene is not usually expressed. Practices of ectopic expression in biological science is not only limited to identifying a function of the gene in a known cell or tissue type but also implemented to discover unknown or additional functions of the gene by ectopic expression. Research examples Paired box protein Paired box protein Pax-6 in humans is a transcription factor, which is a main regulatory gene of eye and brain development. Ectopic expression o
https://en.wikipedia.org/wiki/STOR2RRD
STOR2RRD is an open-source software tool that is used for monitoring and reporting performance in storage systems, SAN switches, and LAN switches. It is developed by the Czech company XoruX. Overview STOR2RRD is open-source software that is published under the GNU General Public License v3.0. As of November 2021, the latest version is 7.30. Beta versions were initially made available in 2013. Version 1.00 was released in October 2014. Besides storage systems, it can also be used to monitor SAN and LAN switches. STOR2RRD generates historical utilization graphs for these systems. The software is compatible with various systems by Dell, EMC, Hitachi, HPE, IBM, NetApp, Synology, and others. It is also integrated with various storage systems, including Tatlin.Unified.
https://en.wikipedia.org/wiki/Human%20mouth
In human anatomy, the mouth is the first portion of the alimentary canal that receives food and produces saliva. The oral mucosa is the mucous membrane epithelium lining the inside of the mouth. In addition to its primary role as the beginning of the digestive system, the mouth also plays a significant role in communication. While primary aspects of the voice are produced in the throat, the tongue, lips, and jaw are also needed to produce the range of sounds included in speech. The mouth consists of two regions, the vestibule and the oral cavity proper. The mouth, normally moist, is lined with a mucous membrane, and contains the teeth. The lips mark the transition from mucous membrane to skin, which covers most of the body. Structure Oral cavity The mouth consists of two regions: the vestibule and the oral cavity proper. The vestibule is the area between the teeth, lips and cheeks. The oral cavity is bounded at the sides and in front by the alveolar process (containing the teeth) and at the back by the isthmus of the fauces. Its roof is formed by the hard palate at the front, and the soft palate at the back. The uvula projects downwards from the middle of the soft palate at its back. The floor is formed by the mylohyoid muscles and is occupied mainly by the tongue. A mucous membrane – the oral mucosa, lines the sides and under surface of the tongue to the gums, and lines the inner aspect of the jaw (mandible). It receives secretions from the submandibular and sublingual salivary glands. Lips The lips come together to close the opening of the mouth, forming a line between the upper and lower lip. In facial expression, this mouth line is iconically shaped like an up-open parabola in a smile, and like a down-open parabola in a frown. A down-turned mouth means a mouth line forming a down-turned parabola, and when permanent can be normal. Also, a down-turned mouth can be part of the presentation of Prader–Willi syndrome. Nerve supply The teeth and the periodo
https://en.wikipedia.org/wiki/Sharp%20PC-7000
The Sharp PC-7000 is a luggable portable computer released by Sharp Electronics in 1985. The PC-7000 was Sharp's second entry into the IBM PC-compatible portable computer market, their first being the PC-5000. The PC-7000 eschewed the PC-5000's clamshell design, battery operation, and lighter weight— for the PC-7000 versus the PC-5000's . The compromise was an LCD display with electroluminescent backlighting, as well as an increased display line count—25 for the PC-7000 versus the PC-5000's eight. Sharp also replaced the predecessor's Intel 8088 processor with an 8086 running at a user-switchable 7.37 MHz and bumped the stock memory from 128 to 320 KB. These improvements led to higher performance and near-true IBM PC compatibility, in turn leading to a wider range of software that could be used with the computer. Sharp released the PC-7000 in October 1985 to high praise. It spawned a series of luggable computers featuring improvements to the original PC-7000's hardware. Sharp sold hundreds of thousands of units under this series—including the original—over the years, before discontinuing it in 1990. Specifications Construction The Sharp PC-7000's case sports the luggable form factor for portable computers; journalists compared it to a portable radio, a toaster, and a lunchbox. Its keyboard detaches from the display and serves as protection of the latter. The computer's case measures and weighs almost . The computer's chassis was fabricated from steel and provides much of the weight. The PC-7000's dimensions, when closed, were compliant with the contemporaneously revised restrictions on carry-on luggage set by the Federal Aviation Administration. The same was true even with the computer's optional printer attached. To further assist travelers, Sharp offered a carrying case through mail order. Components On the right side of the Sharp PC-7000 are two half-height, 5.25-inch floppy disk drives, mounted vertically and with shock absorption. These drives were man
https://en.wikipedia.org/wiki/NDUFS7
NADH dehydrogenase [ubiquinone] iron-sulfur protein 7, mitochondrial, also knowns as NADH-ubiquinone oxidoreductase 20 kDa subunit, Complex I-20kD (CI-20kD), or PSST subunit is an enzyme that in humans is encoded by the NDUFS7 gene. The NDUFS7 protein is a subunit of NADH dehydrogenase (ubiquinone) also known as Complex I, which is located in the mitochondrial inner membrane and is the largest of the five complexes of the electron transport chain. Structure The NDUFS7 gene is located on the p arm of chromosome 19 in position 13.3. The NDUFS7 gene produces a 25 kDa protein composed of 238 amino acids. The PSST subunit is highly conserved across evolutionary distances. Crystal structures and mutational studies indicate that it is one of the ubiquinone binding sites of Complex I, together with the TYKY (NDUFS8) subunit. It has been proposed that PSST, along with TYKY, 49 kDa, ND1 and ND5 subunits interact with iron-sulfur clusters as part of the catalytic core of NADH dehydrogenase (ubiquinone). Function The PSST subunit encoded by the NDUSF7 gene is one of over 40 subunits involved in the transfer of electrons from NADH to ubiquinone. Specifically, it is thought that the PSST subunit directly couples electron transfer between the iron-sulfur cluster N2 and ubiquinone, along with ubiquinone-binding ND1. Functional evidence for the importance of PSST has been garnered from mutational studies in the obligate aerobic yeast, Yarrow lipolytic, which elucidated a central role in proton translocation that was reduced in mutant forms of the subunit. Clinical Significance Mitochondrial complex I deficiency (MT-C1D) is caused by mutations affecting the NDUFS7 gene. Complex I deficiency is a disorder of the mitochondrial respiratory chain that causes a wide range of clinical manifestations, from lethal neonatal disease to adult-onset neurodegenerative disorders. Phenotypes include macrocephaly with progressive leukodystrophy, non-specific encephalopathy, cardiomyopathy, myo
https://en.wikipedia.org/wiki/Eugene%20Dynkin
Eugene Borisovich Dynkin (; 11 May 1924 – 14 November 2014) was a Soviet and American mathematician. He made contributions to the fields of probability and algebra, especially semisimple Lie groups, Lie algebras, and Markov processes. The Dynkin diagram, the Dynkin system, and Dynkin's lemma are named after him. Biography Dynkin was born into a Jewish family, living in Leningrad until 1935, when his family was exiled to Kazakhstan. Two years later, when Dynkin was 13, his father disappeared in the Gulag. Moscow University At the age of 16, in 1940, Dynkin was admitted to Moscow University. He avoided military service in World War II because of his poor eyesight, and received his MS in 1945 and his PhD in 1948. He became an assistant professor at Moscow, but was not awarded a "chair" until 1954 because of his political undesirability. His academic progress was made difficult due to his father's fate, as well as Dynkin's Jewish origin; the special efforts of Andrey Kolmogorov, his PhD supervisor, made it possible for Dynkin to progress through graduate school into a teaching position. USSR Academy of Sciences In 1968, Dynkin was forced to transfer from the Moscow University to the Central Economic Mathematical Institute of the USSR Academy of Sciences. He worked there on the theory of economic growth and economic equilibrium. Cornell He remained at the Institute until 1976, when he emigrated to the United States. In 1977, he became a professor at Cornell University. Death Dynkin died at the Cayuga Medical Center in Ithaca, New York, aged 90. Dynkin was an atheist. Mathematical work Dynkin is considered to be a rare example of a mathematician who made fundamental contributions to two very distinct areas of mathematics: algebra and probability theory. The algebraic period of Dynkin's mathematical work was between 1944 and 1954, though even during this time a probabilistic theme was noticeable. Indeed, Dynkin's first publication was in 1945, jointly with N. A
https://en.wikipedia.org/wiki/ATC%20code%20V09
V09A Central nervous system V09AA Technetium (99mTc) compounds V09AA01 Technetium (99mTc) exametazime V09AA02 Technetium (99mTc) bicisate V09AB Iodine (123I) compounds V09AB01 Iodine iofetamine (123I) V09AB02 Iodine iolopride (123I) V09AB03 Iodine ioflupane (123I) V09AX Other central nervous system diagnostic radiopharmaceuticals V09AX01 Indium (111In) pentetic acid V09AX03 Iodine (124I) 2β-carbomethoxy-3β-(4-iodophenyl)-tropane V09AX04 Flutemetamol (18F) V09AX05 Florbetapir (18F) V09AX06 Florbetaben (18F) V09AX07 Flortaucipir (18F) V09B Skeleton V09BA Technetium (99mTc) compounds V09BA01 Technetium (99mTc) oxidronic acid V09BA02 Technetium (99mTc) medronic acid V09BA03 Technetium (99mTc) pyrophosphate V09BA04 Technetium (99mTc) butedronic acid V09C Renal system V09CA Technetium (99mTc) compounds V09CA01 Technetium (99mTc) pentetic acid V09CA02 Technetium (99mTc) succimer V09CA03 Technetium (99mTc) mertiatide V09CA04 Technetium (99mTc) gluceptate V09CA05 Technetium (99mTc) gluconate V09CA06 Technetium (99mTc) ethylenedicysteine V09CX Other renal system diagnostic radiopharmaceuticals V09CX01 Sodium iodohippurate (123I) V09CX02 Sodium iodohippurate (131I) V09CX03 Sodium iothalamate (125I) V09CX04 Chromium (51Cr) edetate V09D Hepatic and reticulo endothelial system V09DA Technetium (99mTc) compounds V09DA01 Technetium (99mTc) disofenin V09DA02 Technetium (99mTc) etifenin V09DA03 Technetium (99mTc) lidofenin V09DA04 Technetium (99mTc) mebrofenin V09DA05 Technetium (99mTc) galtifenin V09DB Technetium (99mTc), particles and colloids V09DB01 Technetium (99mTc) nanocolloid V09DB02 Technetium (99mTc) microcolloid V09DB03 Technetium (99mTc) millimicrospheres V09DB04 Technetium (99mTc) tin colloid V09DB05 Technetium (99mTc) sulfur colloid V09DB06 Technetium (99mTc) rheniumsulfide colloid V09DB07 Technetium (99mTc) phytate V09DX Other hepatic and reticulo endothelial system diagnostic radiopharmaceuticals V09DX01 Selenium (75Se) tauroselcholic acid V09E Respirat
https://en.wikipedia.org/wiki/Food%20Weekly%20News
Food Weekly News is a weekly food science and agricultural newspaper reporting on the latest developments in research in food production. It is published by Vertical News, an imprint of NewsRx, LLC. External links Articles on HighBeam Research Food science Newspapers published in Atlanta Agricultural magazines Weekly newspapers published in the United States
https://en.wikipedia.org/wiki/Multiplicative%20order
In number theory, given a positive integer n and an integer a coprime to n, the multiplicative order of a modulo n is the smallest positive integer k such that . In other words, the multiplicative order of a modulo n is the order of a in the multiplicative group of the units in the ring of the integers modulo n. The order of a modulo n is sometimes written as . Example The powers of 4 modulo 7 are as follows: The smallest positive integer k such that 4k ≡ 1 (mod 7) is 3, so the order of 4 (mod 7) is 3. Properties Even without knowledge that we are working in the multiplicative group of integers modulo n, we can show that a actually has an order by noting that the powers of a can only take a finite number of different values modulo n, so according to the pigeonhole principle there must be two powers, say s and t and without loss of generality s > t, such that as ≡ at (mod n). Since a and n are coprime, a has an inverse element a−1 and we can multiply both sides of the congruence with a−t, yielding as−t ≡ 1 (mod n). The concept of multiplicative order is a special case of the order of group elements. The multiplicative order of a number a modulo n is the order of a in the multiplicative group whose elements are the residues modulo n of the numbers coprime to n, and whose group operation is multiplication modulo n. This is the group of units of the ring Zn; it has φ(n) elements, φ being Euler's totient function, and is denoted as U(n) or U(Zn). As a consequence of Lagrange's theorem, the order of a (mod n) always divides φ(n). If the order of a is actually equal to φ(n), and therefore as large as possible, then a is called a primitive root modulo n. This means that the group U(n) is cyclic and the residue class of a generates it. The order of a (mod n) also divides λ(n), a value of the Carmichael function, which is an even stronger statement than the divisibility of φ(n). Programming languages Maxima CAS : zn_order (a, n) Rosetta Code - examples of mu
https://en.wikipedia.org/wiki/Sight%20glass
A sight glass or water gauge is a type of level sensor, a transparent tube through which the operator of a tank or boiler can observe the level of liquid contained within. Liquid in tanks Simple sight glasses may be just a plastic or glass tube connected to the bottom of the tank at one end and the top of the tank at the other. The level of liquid in the sight glass will be the same as the level of liquid in the tank. Today, however, sophisticated float switches have replaced sight glasses in many such applications. Steam boilers If the liquid is hazardous or under pressure, more sophisticated arrangements must be made. In the case of a boiler, the pressure of the water below and the steam above is equal, so any change in the water level will be seen in the gauge. The transparent tube (the “glass” itself) may be mostly enclosed within a metal or toughened glass shroud to prevent it from being damaged through scratching or impact and offering protection to the operators in the case of breakage. This usually has a patterned backplate to make the magnifying effect of the water in the tube more obvious and so allow for easier reading. In some locomotives where the boiler is operated at very high pressures, the tube itself would be made of metal-reinforced toughened glass. It is important to keep the water at the specified level, otherwise the top of the firebox will be exposed, creating an overheat hazard and causing damage and possibly catastrophic failure. To check that the device is offering a correct reading and the connecting pipes to the boiler are not blocked by scale, the water level needs to be “bobbed” by quickly opening the taps in turn and allowing a brief spurt of water through the drain cock. The National Board of Boiler and Pressure Vessel Inspectors recommends a daily testing procedure described by the American National Standards Institute, chapter 2 part I-204.3 water level gauge. While not strictly required, this procedure is designed to allow a
https://en.wikipedia.org/wiki/Detritus
In biology, detritus () is dead particulate organic material, as distinguished from dissolved organic material. Detritus typically includes the bodies or fragments of bodies of dead organisms, and fecal material. Detritus typically hosts communities of microorganisms that colonize and decompose (i.e. remineralize) it. In terrestrial ecosystems it is present as leaf litter and other organic matter that is intermixed with soil, which is denominated "soil organic matter". The detritus of aquatic ecosystems is organic substances that is suspended in the water and accumulates in depositions on the floor of the body of water; when this floor is a seabed, such a deposition is denominated "marine snow". Theory The corpses of dead plants or animals, material derived from animal tissues (e.g. molted skin), and fecal matter gradually lose their form due to physical processes and the action of decomposers, including grazers, bacteria, and fungi. Decomposition, the process by which organic matter is decomposed, occurs in several phases. Micro- and macro-organisms that feed on it rapidly consume and absorb materials such as proteins, lipids, and sugars that are low in molecular weight, while other compounds such as complex carbohydrates are decomposed more slowly. The decomposing microorganisms degrade the organic materials so as to gain the resources they require for their survival and reproduction. Accordingly, simultaneous to microorganisms' decomposition of the materials of dead plants and animals is their assimilation of decomposed compounds to construct more of their biomass (i.e. to grow their own bodies). When microorganisms die, fine organic particles are produced, and if small animals that feed on microorganisms eat these particles they collect inside the intestines of the consumers, and change shape into large pellets of dung. As a result of this process, most of the materials of dead organisms disappear and are not visible and recognizable in any form, but are pres
https://en.wikipedia.org/wiki/Frobenius%20characteristic%20map
In mathematics, especially representation theory and combinatorics, a Frobenius characteristic map is an isometric isomorphism between the ring of characters of symmetric groups and the ring of symmetric functions. It builds a bridge between representation theory of the symmetric groups and algebraic combinatorics. This map makes it possible to study representation problems with help of symmetric functions and vice versa. This map is named after German mathematician Ferdinand Georg Frobenius. Definition The ring of characters Let be the -module generated by all irreducible characters of over . In particular and therefore . The ring of characters is defined to be the direct sumwith the following multiplication to make a graded commutative ring. Given and , the product is defined to bewith the understanding that is embedded into and denotes the induced character. Frobenius characteristic map For , the value of the Frobenius characteristic map at , which is also called the Frobenius image of , is defined to be the polynomial Remarks Here, is the partition of integers determined by . For example, when and , corresponds to the partition . Conversely, a partition of (written as ) determines a conjugacy class in . For example, given , is a conjugacy class. Hence by abuse of notation can be used to denote the value of on the conjugacy class determined by . Note this always makes sense because is a class function. Let be a partition of , then is the product of power sum symmetric polynomials determined by of variables. For example, given , a partition of , Finally, is defined to be , where is the cardinality of the conjugacy class . For example, when , . The second definition of can therefore be justified directly: Properties Inner product and isometry Hall inner product The inner product on the ring of symmetric functions is the Hall inner product. It is required that . Here, is a monomial symmetric function and is a product of co
https://en.wikipedia.org/wiki/Robovirus
A robovirus is a zoonotic virus that is transmitted by a rodent vector (i.e., rodent borne). Roboviruses mainly belong to the virus families Arenaviridae and Hantaviridae. Like arbovirus (arthropod borne) and tibovirus (tick borne) the name refers to its method of transmission, known as its vector. This is distinguished from a clade, which groups around a common ancestor. Some scientists now refer to arbovirus and robovirus together with the term ArboRobo-virus. Methods of transmission Rodent borne disease can be transmitted through different forms of contact such as rodent bites, scratches, urine, saliva, etc. Potential sites of contact with rodents include habitats such as barns, outbuildings, sheds, and dense urban areas. Transmission of disease through rodents can be spread to humans through direct handling and contact, or indirectly through rodents carrying the disease spread to ticks, mites, fleas (arboborne). Viral diseases transmitted by rodents One example of a robovirus is hantavirus, which causes hantavirus pulmonary syndrome. Humans can be infected with Hantavirus Pulmonary Syndrome through direct contact with rodent droppings, saliva, or urine infected with strains of the virus. These components mix into the air and get transmitted when inhaled through airborne transmission. Lassa virus from the Arenaviridae family causes Lassa hemorrhagic fever and is also a robovirus transmitted by the rodent genus Mastomys natalensis. The multimammate rat is able to excrete the virus in its urine and droppings. These rat are often found in the savannas and forests of Africa. When these rats scavenge and enter households this provides an outlet for direct contact transmission with humans. It has also been found that airborne transmission can occur by engaging in cleaning activities such as sweeping. In some areas of Africa, the Mastomys rodent is caught and used as a source of food. This process can also lead to transmission and infection. Viral diseases in